Study Material 2024 XII - Comp Applications
Study Material 2024 XII - Comp Applications
1 Multimedia 1
7 Loops in PHP 42
13 Network Cabling 71
14 Open-Source Concepts 77
15 E-Commerce 81
Part – I
Choose the best answer: 1 Mark
1. What is multimedia?
a) a type of computer hardware
b) a type of computer software
c) a type of computer network
d) the use of multiple forms of media to communicate information
2. ________ has five major components like text, images, sound, video and animation.
a) Multimedia b) Master Page c) Master item d) Multi-word
3. What is a raster image?
a) a type of image made up of pixels
b) a type of image made up of geometric shapes
c) a type of image made up of text
d) a type of image made up of sound waves
4. What is a vector image?
a) a type of image made of pixels
b) a type of image made up of geometric shapes
c) a type of image made up of text
d) a type of image made up of sound waves
5. Which of the following is a raster image file format?
a) JPEG b) EPS c) CDR d) SVG
6. Which of the following is a vector image file format?
a) PSD b) JPEG c) EPS d) BMP
7. RTF (Rich Text Format) file format was introduced by __________
a) TCS b) Microsoft c) Apple Inc. d) IBM
8. The expansion of JPEG is _____________
a) Joint Photographic Experts Group b) Joint Photo Experts Group
c) Join Photon Experts Group d) Joint Photographic Express Group
9. AIFF file format was developed by _______
a) TCS b) Microsoft c) Apple Inc. d) IBM
10. Which of the following is an audio file format?
a) MP3 b) AVI c) MPEG d) PNG
Part - II
Short Answers: 2 Marks
1. Define Multimedia.
Multimedia is a computer-based presentation technique that incorporates text, images,
sound, video and animation.
..1..
1. MULTIMEDIA
2. List out Multimedia Components.
❖ Text ❖ Images ❖ Sound
❖ Video and ❖ Animation.
3. Classify the TEXT components in multimedia.
❖ Static text
❖ hypertext
4. Classify the IMAGE components in multimedia.
❖ Raster image
❖ Vector image
5. Define Animation.
Animation is the process of displaying still images so quickly so that they give the
impression of continuous movement.
Part - III
Explain in Brief Answer: 3 Marks
1. List out image file formats.
❖ TIFF (Tagged Image File format) ❖ BMP (Bitmap)
❖ DIB (Device Independent Bitmap) ❖ GIF (Graphics Interchange Format)
❖ JPEG (Joint Photographic Experts Group) ❖ TGA (Tagra)
❖ PNG (Portable Network Graphics)
2. List out audio file formats.
❖ Wav (Wave form Audio File format) ❖ MP3 (MPEG Layer-3 format)
❖ OGG ❖ AIFF (Audio Interchange File Format)
❖ WMA (Windows Media Audio) ❖ RA (Real Audio Format).
3. List out video file formats.
❖ AVI (Audio Video Interleave)
❖ MPEG (Moving Pictures Experts Group) ❖ WMV (Windows Media Video)
❖ MOV (Quick time format) ❖ FLV (Adobe Flash Video Format)
Part – IV
Explain in detail: 5 Marks
1. Explain in detail about Production team roles and responsibilities.
❖ Production Manager:
In a multimedia production, the role of production manager is to define, and
coordinate, the production of the multimedia project in time and with full quality.
❖ Content Specialist:
Content specialist is responsible for performing all research activities concerned with
the proposed application’s content.
❖ Script Writer:
The script writer visualizes the concepts in three-dimensional environment and if
needed uses the virtual reality integration into the program.
..2..
1. MULTIMEDIA
❖ Text Editor:
The content of a multimedia production always must flow logically and the text
should always be structured and correct grammatically. Text and narration is an
integrated part of the application.
❖ Multimedia Architect:
The multimedia architect integrates all the multimedia building blocks like graphics,
text, audio, music, video, photos and animation by using an authoring software.
❖ Computer Graphic:
Artist The role of Computer Graphic Artist is to deal with the graphic elements of the
programs like backgrounds, bullets, buttons, pictures editing, 3-D objects, animation, and
logos etc.
❖ Audio and Video Specialist:
The roles of these specialists are needed for dealing with narration and digitized
videos to be added in a multimedia presentation. They are responsible for recording,
editing sound effects and digitizing.
❖ Computer Programmer:
The computer programmer writes the lines of code or scripts in the appropriate
language. These scripts usually develop special functions like developing the software to
give the size and shape of video windows, controlling peripherals and so on.
❖ Web Master:
The responsibility of the web master is to create and maintain an Internet web page.
They convert a multimedia presentation into a web page. The web master provides access
to a wide range of community through web-services.
2. Explain in detail about different file formats in multimedia files.
❖ Text Formats:
➢ RTF:
Rich Text Format is the primary file format introduced in 1987 by Microsoft with
the specification of their published products and for cross-platform documents
interchange.
➢ Plain text:
Plain text files can be opened, read, and edited with most text editors. The
commonly used text editors are Notepad (Windows), Gedit or nano (Unix, Linux),
TextEdit (Mac OS X) and so on.
❖ Image Formats:
➢ TIFF (Tagged Image File Format):
This format is common in desktop publishing world (high quality output), and is
supported by almost all software packages. It is comfortable for moving large files
between computers.
➢ BMP (Bitmap):
Initially this format is in use with Windows 3.1. It is quite large and uncompressed.
..3..
1. MULTIMEDIA
➢ DIB (Device Independent Bitmap):
A device independent bitmap contains a colour table. The colour describes how
pixel values corresponds to RGB colour values, which describes colors that are
produced by emitting light.
..4..
1. MULTIMEDIA
❖ Digital Video File Formats:
➢ AVI (Audio/Video Interleave):
AVI is the video file format for Windows. Here sound and picture elements are
stored in alternate interleaved chunks in the file.
➢ MPEG (Moving Picture Experts Group):
MPEG is a standard for generating digital video and audio compression under the
International Standards Organization (ISO) by the group of people.
ADDITIONAL QUESTIONS
1. 8-bits indicates ______ colors.
a) 8 b) 16 c) 256 d) 128
2. The least frame rate of at least _______ frames per second gives the impression of
smoothness.
a) 16 b) 26 c) 8 d) 12
3. The frame rate should be at least _______ frames per second for natural looking.
a) 15 b) 16 c) 25 d) 28
4. What is static text?
Static text will remain static as a heading or in a line, or in a paragraph. The words are
given along with the images to explain about the images.
5. What is Hypertext?
A hypertext is a system which consists of nodes, the text and the links between the nodes,
which defines the path the user need to follow for the text access in non-sequential ways.
6. Explain about images.
Images acts as a vital component in multimedia. These images are generated by the
computer in two ways, as raster images and as vector images.
Raster Images:
The common and comprehensive form of storing images in a computer is raster image.
Raster image is made up of the tiny dots called pixel. Each pixel consists of two or more colors.
Based on how much data, in bits is used to determine the number of colors, the color depth
is determined.
Examples of raster image file types are : BMP, TIFF, GIF, JPEG
Vector Images:
Vector image is a type of image made up of geometric shapes. The advantage of vector
image is relatively small amount of data is required to represent the image and thereby only
less memory is needed to store. It is useful for storing large number of images and speeding
transmission for networked application.
Examples of vector image file types are : AI, EPS, SVG, CDR
7. What are the two types of animation? Write a note on them.
The two basic types of animations are Path animation and Frame animation.
Path Animation:
Path animation involves moving an object on a screen that has a constant background.
..5..
1. MULTIMEDIA
Frame Animation:
In frame animation, multiple objects are allowed to travel simultaneously and the
background or the object also changes.
8. Write about MIDI.
Musical Instrument Digital Identifier (MIDI) is a standard communication tool developed
for computers and electronic instruments. This tool is flexible and easy for composing the
projects in multimedia. Tools for synthesizing the sound and software for sequencing are
necessary for MIDI.
9. What are the types of videos?
Analog video and digital video are of two types.
..6..
2 AN INTRODUCTION TO ADOBE PAGEMAKER
Part – I
Choose the best answer: 1 Mark
1. DTP stands for ______________
(a) Desktop Publishing (b) Desktop Publication
(c) Doctor To Patient (d) Desktop Printer
2. ____________ is a DTP software.
(a) Lotus 1-2-3 (b) PageMaker (c) Maya (d) Flash
3. Which menu contains the New option?
(a) File menu (b) Edit menu
(c) Layout menu (d) Type menu
4. In PageMaker Window, the area outside of the dark border is referred to as ______.
(a) page (b) pasteboard
(c) blackboard (d) dashboard
5. Shortcut to close a document in PageMaker is ______________
(a) Ctrl + A (b) Ctrl + B (c) Ctrl + C (d) Ctrl + W
6. A __________ tool is used for magnifying the particular portion of the area.
(a) Text tool (b) Line tool (c) Zoom tool (d) Hand tool
7. _________ tool is used for drawing boxes.
(a) Line (b) Ellipse (c) Rectangle (d) Text
8. Place option is present in _____________ menu.
(a) File (b) Edit (c) Layout (d) Window
9. To select an entire document using the keyboard, press ___________
(a) Ctrl + A (b) Ctrl + B (c) Ctrl + C (d) Ctrl + D
10. Character formatting consists of which of the following text properties?
(a) Bold (b) Italic (c) Underline (d) All of these
11. Which tool lets you edit text?
(a) Text tool (b) Type tool (c) Crop tool (d) Hand tool
12. Shortcut to print a document in PageMaker is ___________
(a) Ctrl + A (b) Ctrl + P (c) Ctrl + C (d) Ctrl + V
Part - II
Short Answers: 2 Marks
1. What is desktop publishing?
Desktop publishing (abbreviated DTP) is the creation of page layouts for documents using
DTP software.
2. Give some examples of DTP software.
❖ Adobe PageMaker
❖ Adobe InDesign
❖ QuarkXPress, etc.
..7..
2. ADOBE PAGEMAKER
3. Write the steps to open PageMaker.
In the Windows 7 operating system, we can open Adobe PageMaker using the command
sequence Start → All Programs → Adobe → PageMaker 7.0 → Adobe PageMaker 7.0.
4. How do you create a new document in PageMaker?
1. Choose File > New in the menu bar. (or) Press Ctrl + N in the keyboard. Now Document
Setup dialog box appears.
2. Enter the appropriate settings for your new document in the Document Setup dialog box.
3. Click on OK. Now a new document called Untitled - 1 opens on the screen.
5. What is a Pasteboard in PageMaker?
In PageMaker document, the area outside of the dark border is referred to as the
pasteboard.
6. Write about the Menu bar of PageMaker.
➢ Menu bar contains the following menus File, Edit, Layout, Type, Element, Utilities, View,
Window, Help.
➢ When you click on a menu item, a pulldown menu appears. There may be sub-menus
under certain options in the pull-down menus.
7. Differentiate Ellipse tool from Ellipse frame tool.
Ellipse tool Ellipse frame tool
Used to draw circles and ellipses. Used to create elliptical placeholders for
text and graphics.
8. What is text editing?
Making changes of text in a document is called text editing.
9. What is threading text blocks?
A Text block can be connected to other text block so that the text in one text block can
flow into another text block. Text blocks that are connected in this way are threaded text
blocks.
10. How do you insert a page in PageMaker?
1. Go to the page immediately before the page you want to insert.
2. Choose Layout > Insert Pages in the menu bar. The Insert Pages dialog box appears.
3. Type the number of pages you want to insert.
4. To insert pages after the current page, choose ‘after’ from the pop-up menu.
5. Click on Insert button.
6. The new pages are inserted in your publication.
Part - III
Explain in Brief Answer: 3 Marks
1. What is PageMaker? Explain its uses.
➢ Adobe PageMaker is a page layout software.
➢ It is used to design and produce documents that can be printed. You can create anything
from a simple business card to a large book.
..8..
2. ADOBE PAGEMAKER
2. Mention three tools in PageMaker and write their keyboard shortcuts.
Tools Keyboard Short Cut
Pointer Tool F9
Rotating Tool Shift + F2
Line Tool Shift + F3
3. Write the use of any three tools in PageMaker along with symbols.
Tool Toolbox Cursor Use
Used to select, move, and resize
Pointer Tool
text objects and graphics.
Used to draw straight lines in any
Line tool
direction.
Used to draw squares and
Rectangle tool
rectangles.
4. How do you rejoin split blocks?
To rejoin the two text blocks
1. Place the cursor on the bottom handle of the second text block, click and drag the bottom
handle up to the top.
2. Then place the cursor on the bottom handle of the first text block, and click and drag the
bottom handle down if necessary.
5. How do you link frames containing text?
1. Draw a second frame with the Frame tool of your choice.
2. Click the first frame to select it.
3. Click on the red triangle to load the text icon.
4. Click the second frame. PageMaker flows the text into the second frame.
6. What is the use of Master Page?
Any text or object that you place on the master page will appear on all the document
pages to which the master is applied. It shortens the amount of time because you don’t have
to create the same objects repeatedly on subsequent pages.
Master Pages commonly contain repeating logos, page numbers, headers, and footers.
7. How to you insert page numbers in Master pages?
1. Click on Master Pages icon.
2. Then click on Text Tool. Now the cursor changes to I - beam.
3. Then Click on the left Master page where you want to put the page number.
4. Press Ctrl + Alt + P.
5. The page number displays as ‘LM’ on the left master page.
6. Similarly click on the right Master page where you want to put the page number.
7. Press Ctrl + Alt + P.
8. The page number displays as ‘RM’ on the right master page, but will appear correctly on
the actual pages.
..9..
2. ADOBE PAGEMAKER
Part - IV
Explain in detail: 5 Marks
1. Explain the tools in PageMaker toolbox.
Tool Toolbox Cursor Use
Pointer Tool Used to select, move, and resize text
objects and graphics.
..10..
2. ADOBE PAGEMAKER
5. Click on Open.
6. Click inside the frame to place the text in it. The text will be placed in the frame.
3. Write the steps to draw a star using polygon tool?
1. Click on the Polygon tool from the toolbox. The cursor changes to a crosshair.
2. Click and drag anywhere on the screen. As you drag, a Polygon appears.
3. Release the mouse button when the Polygon is of the desired size.
4. Choose Element > Polygon Settings in the menu bar. Now Polygon Settings dialogue box
appears.
5. Type 5 in the Number of sides text box.
6. Type 50% in Star inset textbox.
7. Click OK. Now the required star appears on the screen.
ADDITIONAL QUESTIONS
1. In PageMaker, to create a new document using the shortcut key
a) Ctrl + A b) Ctrl + B c) Ctrl + C d) Ctrl + N
2. Anything that is placed completely in the _______ is not visible when you print the document.
a) Pasteboard b) Title c) Footer d) All
3. In PageMaker, the default name of the document is
a) Text1 b) Untitled1 c) Title1 d) Page1
4. The name of the software is displayed on the left of
a) Toolbar b) Menu bar c) Title bar d) Status bar
5. The keyboard shortcut for pointer tool is
a) F7 b) Shift + F2 c) F9 d) Shift + F4
6. The keyboard shortcut to Ellipse Tool is
a) Shift + F5 b) Shift + F2 c) Shift + F3 d) Shift + F4
7. To show the ruler, Click on
a) Edit > Show Rulers b) View > Show Rulers
c) Window> Show Rulers d) Tools > Show Rulers
8. The keyboard shortcut to be pressed to select to the end of the current line is
a) Shift + → b) Shift + End c) Shift + Home d) Alt + End
9. Match:
A) Edit → Copy - i) Ctrl + V
B) Edit → Cut - ii) Ctrl + P
C) Edit → Print - iii) Ctrl + C
D) Edit → Paste - iv) Ctrl + X
a) i), ii), iii), iv) b) i), iii), ii), iv) c) iv), iii), ii), i) d) iii), iv), ii),i)
10. Match:
A) Edit → Save - i) Ctrl + O
B) Edit → Save As - ii) Ctrl + W
C) Edit → Close - iii) Shift + Ctrl + S
D) Edit → Open - iv) Ctrl + S
a) i), ii), iii), iv) b) i), iii), ii), iv) c) iv), iii), ii), i) d) iii), iv), ii), i)
..11..
2. ADOBE PAGEMAKER
11. Keys to press to move up one paragraph
a) Shift + Up arrow b) Ctrl + Up arrow
c) Up arrow d) Alt + Up arrow
12. What is text block?
A text block contains the text you type, paste, or import. You can’t see the borders
of a text block until you select it with the pointer tool.
13. What is threading text?
A Text block can be connected to other text block so that the text in one text block can
flow into another text block. Text blocks that are connected in this way are threaded text
blocks.
14. What is story?
➢ Text that flows through one or more threaded blocks is called a story.
➢ A PageMaker story is similar to a newspaper article. The front page of a newspaper may
contain several independent articles, some of which continue on other pages.
15. How to go to a specific page in a PageMaker document?
1. Choose Layout > Go to Page in the menu bar (or) Press Alt + Ctrl + G in the keyboard.
Now the Go to Page dialog box appears.
2. In the dialogue box, type the page number that you want to view.
3. Then click on OK. The required page is displayed on the screen.
16. How to print a PageMaker document?
1. Choose File > Print in the menu bar (or) Press Ctrl + P in the keyboard. The Print
Document dialog box appears.
2. Choose the settings in the Print Document dialog box as
➢ Select the printer from the Printer drop-down list box.
➢ Choose the pages to be printed in the Pages group box by selecting one of the
following available options :
o All: This option prints the whole document.
o Ranges: This option prints individual pages by the page number or a range
of pages.
3. Print : You can also print only odd-numbered or even-numbered pages. Select the Odd
pages or Even pages option from the Print drop-down list box.
➢ Type the number of copies you want in the Copies text box.
➢ You can choose whether to collate the pages or not.
4. After choosing from the options in the Print Document dialog box, click Print button to
print the document. Make sure the printer is switched on.
..12..
3 INTRODUCTION TO DATABASE MANAGEMENT SYSTEM
Part – I
Choose the best answer: 1 Mark
1. Which language is used to request information from a Database?
a) Relational b) Structural c) Query d) Compiler
2. The ---------- diagram gives a logical structure of the database graphically?
a) Entity-Relationship b) Entity
c) Architectural Representation d) Database
3. An entity set that does not have enough attributes to form primary key is known as
a) Strong entity set b) Weak entity set
c) Identity set d) Owner set
4. ---------- Command is used to delete a database.
a) Delete database database_name b) Delete database_name
c) drop database database_name d) drop database_name
5. MySQL belongs to which category of DBMS?
a) Object Oriented b) Hierarchical c) Relational d) Network
6. MySQL is freely available and is open source.
a) True b) False
7. ---------- represents a “tuple” in a relational database?
a) Table b) Row c) Column d) Object
8. Communication is established with MySQL using
a) SQL b) Network calls c) Java d) API’s
9. Which is the MySQL instance responsible for data processing?
a) MySQL Client b) MySQL Server
c) SQL d) Server Daemon Program
10. The structure representing the organizational view of entire database is known as -------- in
MySQL database.
a) Schema b) View c) Instance d) Table
Part – II
Short Answers: 2 Marks
1. Define Data Model and list the types of data model used.
The database technology came into existence in terms of models with relational and object-
relational behavior. The major database models are listed below:
❖ Hierarchical Database Model ❖ Network model
❖ Relational model ❖ Object-oriented database model
2. List few disadvantages of file processing system.
The file system had more limitations like
❖ Data Duplication:
Same data is used by multiple resources for processing, thus created multiple copies
of same data wasting the spaces.
..13..
3. Database Management System
❖ High Maintenance:
Access control and verifying data consistency needs high maintenance cost.
❖ Security:
Less security provided to the data.
3. Define single and multi valued attributes.
❖ Single valued attribute:
A single valued attribute contains only one value for the attribute and they don’t
have multiple number of values.
For Example:
Age - It is a single value for a person as we cannot give ‘n’ number of ages for a
single person.
❖ Multi valued attributes:
A multi valued attribute has more than one value for that particular attribute.
For Example:
Degree - A person can hold n number of degrees so it is a multi-valued attribute.
4. List any two DDL and DML commands with its Syntax.
DDL commands:
➢ CREATE - Used to create database or tables.
Syntax: CREATE database database_name;
➢ DROP - Deletes a database or table.
Syntax: drop database database_name;
DML commands:
➢ UPDATE - modifies existing data with new data in a table.
Syntax: UPDATE tablename SET column =“new value” Where column2 = “value2”;
➢ DELETE - Deletes the records from the table.
Syntax: DELETE from tablename WHERE Columnname = “value”;
5. What are the ACID properties?
1. Atomicity 2. Consistency
3. Isolation and 4. Durability
6. Which command is used to make permanent changes done by a transaction?
COMMIT
7. What is view in SQL?
View is a set of stored queries.
8. Write the difference between SQL and MySQL.
SQL MySQL
..14..
3. Database Management System
9. What is Relationship and List its types.
In ER Model, relationship exists between two entities. Three types of relationships are
available. They are
1. One-to-One relationship
2. One-to-Many relationship
3. Many-to-Many relationship
10. State few advantages of Relational databases.
❖ High Availability ❖ High Performance
❖ Robust Transactions and support ❖ Ease of management
❖ Less cost
Part – III
Explain in Brief Answer: 3 Marks
1. Explain on Evolution of DBMS.
➢ The concept of storing the data started before 40 years in various formats.
➢ In earlier days they have used punched card technology to store the data. Then files were
used. The file systems were known as predecessor of database system.
2. What is relationship in databases? List its types.
In ER Model, relationship exists between two entities. Three types of relationships are
available. They are
1. One-to-One relationship
2. One-to-Many relationship
3. Many-to-Many relationship
3. Discuss on Cardinality in DBMS.
It is defined as the number of items that must be included in a relationship.ie number of
entities in one set mapped with the number of entities of another set via the relationship. The
three classifications in Cardinality are one-to-one, one-to-many and Many-to-Many.
4. List any 5 privileges available in MySQL for the User.
Privileges Action Performed (If Granted)
Select_priv User can select rows from database tables.
Insert_priv User can insert rows into database tables.
Update_priv User can update rows of database tables.
Delete_priv User can delete rows of database tables.
Create_priv User can create new tables in database.
Alter_priv User can make changes to the database structure.
5. Write few commands used by DBA to control the entire database.
The Database Administrator (DBA) frequently uses few commands to control the entire
database. These commands are known as Administrative MySQL Commands. Few commands
are as follows:
❖ USE Database – This command is used to select the database in MySQL for working.
..15..
3. Database Management System
Syntax:
mysql > use test;
❖ SHOW Databases – Lists all the databases available in the database server.
Syntax:
mysql > show databases;
❖ SHOW Tables – Lists all the tables available in the current database we are working in.
Syntax:
mysql > show tables;
Part – IV
Explain in detail: 5 Marks
1. Discuss on various database models available in DBMS.
❖ Hierarchical Database Model:
✓ The famous Hierarchical database model was IMS (Information Management
System), IBM’s first DBMS.
✓ In this model each record has information in parent/ child relationship like a tree
structure.
✓ The collection of records is called as record types, which are equivalent to tables in
relational model. The individual records are equal to rows.
School
Teachers Students
College
Examination
..16..
3. Database Management System
❖ Relational model:
✓ Oracle and DB2 are few commercial relational models in use. Relational model is
defined with two terminologies Instance and Schema.
o Instance – A table consisting of rows and columns
o Schema – Specifies the structure including name and type of each column.
✓ A relation (table) consists of unique attributes (columns) and tuples (rows).
2. Attributes:
✓ An attribute is the information about that entity and it will describe, quantify,
qualify, classify, and specify an entity.
✓ An attribute will always have a single value, that value can be a number or
character or string.
✓ An attribute is represented by an ellipse box.
Person entity
3. Relationship Type:
✓ In ER Model, relationship exists between two entities. Three types of
relationships are available and the Entity-Relationship(ER) diagram is based on
the three types listed below.
1. One-to-One relationship
2. One-to-Many relationship
3. Many-to-Many relationship
..18..
3. Database Management System
✓ For Example: In the above diagram the employee is the entity with the composite
attribute Name which are sub-divided into two simple attributes first and last name.
❖ Single Valued Attributes:
✓ A single valued attribute contains only one value for the attribute and they don’t have
multiple number of values.
✓ For Example: Age - It is a single value for a person as we cannot give ‘n’ number of
ages for a single person, therefore it is a single valued attribute.
❖ Multi Valued Attributes:
✓ A multi valued attribute has more than one value for that particular attribute.
✓ For Example: Degree - A person can hold n number of degrees so it is a multi-valued
attribute.
Simple Attributes
Student
..19..
3. Database Management System
❖ HeidiSQL (Desktop Application):
➢ This open-source tool helps in the administration of better database systems. It
supports GUI (Graphical User Interface) features for monitoring server host, server
connection, Databases, Tables, Views, Triggers and Events.
5. Explain the DDL command of their functions in SQL.
The DDL commands are used to define database schema (Structure). Also to create and
modify the structure of the database object in the database. The various DDL commands are:
Commands Description
CREATE Used to create database or tables.
ALTER Modifies the existing structure of database or table.
DROP Deletes a database or table.
RENAME Used to rename an existing object in the database.
TRUNCATE Used to delete all table records.
ADDITIONAL QUESTIONS
1. RDBMS stands for
a) Relative Data Management System b) Regional Database Management System
c) Relational Database Management System d) Regional Database Maintenance System
2. ODBMS means
a) Object Database Management Service b) Oracle Database Management System
c) Oracle Data Maintenance System d) Object Database Management System
3. In this model each record has information in parent/ child relationship like a tree structure.
a) Object-oriented database model b) Relational model
c) Hierarchical database model d) Network model
4. A weak entity in an ER diagram is represented by
a) Simple rectangular box b) Double rectangular boxes
c) Rhombus d) Ellipse
5. Multivalued Attribute for Entity
a) Simple rectangular box b) Double rectangular boxes
c) Ellipse d) Double Ellipse
6. A set of stored queries
a) Views b) Information c) Records d) All of these
7. The field in the database table is grouped by
A) ORDER BY B) HAVING C) GROUP BY D) WHERE
8. What is database management system?
A database management system (DBMS) is system software for creating and managing
databases. The DBMS provides users and programmers with a systematic way to create,
retrieve, update and manage data.
9. What is table in relational database model?
In relational database model, table is defined as the collection of data organized in terms
of rows and columns. Table is the simple representation of relations.
..20..
3. Database Management System
10. What is an attribute and record?
Each column in a table is known as attributes. The attribute is defined in a table to hold
values of same type. This is known as Attribute Domain.
A single entry in a table is called as Row or Record or Tuple. Set of related data’s are
represented in a row or tuple.
11. What is primary key?
A primary key in a table that uniquely identifies each row and column or set of columns
in the table.
12. What is foreign key?
A foreign key is a “copy” of a primary key that has been exported from one relation into
another to represent the existence of a relationship between them.
13. What is Super key?
Super Key An attribute or group of attributes, which is sufficient to distinguish every
tuple in the relation from every other one is known as Super Key. Each super key is called a
candidate key.
14. What is Composite key?
Composite Key A key with more than one attribute to identify rows uniquely in a table
is called Composite key. This is also known as Compound Key.
15. Write a note on ER diagram.
ER Diagram presents data visually on how they are related to each other. This model
follows separate notations for representing data into entities, attributes and relationship
between the entities.
16. List some commonly used databases.
❖ DB2 ❖ MySQL ❖ Oracle ❖ PostgreSQL
❖ SQLite ❖ SQL Server ❖ Sybase
17. Who is DBA - Database Administrator? What is his role?
➢ DBA is the database administrators who takes care of configuration, installation,
performance, security and data backup.
➢ DBA’s possess the skills on database design, database queries, RDMS, SQL and
networking.
➢ The primary task is the creation of new user and providing them with access rights.
18. What are the three major parts that forms a database?
Tables, queries and views.
19. Write notes on queries.
It is a question with multiple conditions posted to the database. The records in the
database that satisfies the passed conditions are retrieved.
20. How many types are SQL commands divided into based on their functionality?
What are they?
SQL commands are classified into five major categories depending on their
functionality. They are
i. Data Definition Language – DDL
..21..
3. Database Management System
ii. Date manipulation Language DML
iii. Data Query Language - DQL
iv. Transaction Control Language - TCL
v. Data Control Language - DCL)
21. Explain DML commands and their functions.
Commands Description
25. Write the syntax for sorting the records in the database table.
Select from tablename ODER BY Columnname[DESC];
26. Tabulate ER diagram notations.
ER Component Description (how it is represented) Notation
..22..
3. Database Management System
Age
Ellipse Symbol connected to the
Attributes
entity
Student
Key Attribute for Underline the attribute name inside Key Attribute
Entity Ellipse Key Attribute
Derived Attribute
Dotted ellipse inside main ellipse
for Entity
Multivalued
Double Ellipse
Attribute for Entity
27. Explain the commands Create, Show, Use and Drop for creating and
manipulating a database.
❖ Creating a database:
Create Database - Used to create a new SQL database.
Syntax: Example:
CREATE database databasename; mysql>create database studentDB;
❖ View created database:
mysql>Show databases;
✓ As a result, the newly created studentDB will be listed.
❖ Selecting database you have created:
Syntax: Example:
USE databasename; mysql>USE StudentDB;
❖ Deleting database:
Drop database – used to remove any of the existing SQL Database.
Syntax: Example:
DROP database database name; mysql>DROP database studentDB;
28. Explain the operations of inserting, updating and deleting records in a
database table.
In a database table,
❖ Insert record:
New rows are added to the table using the Insert command.
..23..
3. Database Management System
Syntax1:
INSERT INTO tablename (column 1, column 2, column 3) VALUES (value 1, value 2, value 3);
Example:
mysql>INSERT INTO Biodata (firstname, lastname, age) VALUES (Krishna, Sam, 10)
Syntax2:
INSERT INTO tablename VALUES (value 1, value 2, value 3);
Example:
mysql>INSERT INTO Biodata VALUES (Krishna, Sam, 10);
❖ Selecting record:
✓ From the multiple records available in the table, the enquired data are retrieved from
the table-using the SELECT command with some conditions specified in it.
✓ We can retrieve all the fields of a record or specify the necessary fields in a table.
Syntax1: Syntax2:
SELECT * from tablename; SELECT column1, column2 from tablename;
Example: Example:
mysql>SELECT * from Biodata; mysql>SELECT firstname, age from Biodata;
Firstname Lastname Age Firstname Age
Krishna S 10 Krishna 10
Sugal S 14 Sugal 14
Mani K 18 Mani 18
❖ Deleting Record:
✓ The existing record in a table is removed from the table using DELETE command.
✓ Entire record or specified columns in the table can be deleted.
✓ If we want to perform delete operation on specific columns, then the condition is
given using WHERE clause. If the condition is not specified, then the entire data will
be deleted.
Syntax:
DELETE from tablename WHERE Columnname = “value”.
Example:
Mysql>DELETE from Biodata;
❖ Modifying Record:
✓ SQL provides us with modifying and updating the existing records in a table using
UPDATE command.
Syntax:
UPDATE tablename SET column “new value” Where column 2 = “value 2”;
For example, the age of Krishna in Biodata table is changed using the below Syntax.
mysql>UPDATE Biodata SET age=13 WHERE firstname=”Krishna”;
..24..
4 PHP: HYPERTEXT PREPROCESSOR
Part – I
Choose the best answer: 1 Mark
1. The expansion of PHP is _________
a) PHP: Hypertext Preprocessor b) Personal Hypertext Preprocessor
c) Pretext Home page d) Preprocessor Home Page
2. What is the extension of PHP file?
a) .html b) .xml c) .php d) .ph
3. The PHP script should start with _________
a) <?php b) <php c) <php? d) <:?
4. How many data types does PHP support?
a) 18 b) 28 c) 8 d) 38
5. Every variable name in PHP must begin with a _________ symbol.
a) # b) // c) $ d) <
6. _________ in PHP are case – sensitive.
a) variable names b) keywords
c) Variable names and keywords d) None of the above
7. The assignment operator is ___________
a) = b) == c) === d) !=
8. _________ operators perform an action to compare two values.
a) arithmetic b) comparison c) increment d) logical
9. Which operator is called “identical”?
a) = b) == c) === d) <>
10. _________ is a data type which contains decimal numbers.
a) Integer b) Float c) Boolean d) NULL
Part – II
Answer the following questions: 2 marks
1. What is PHP?
➢ PHP stands for PHP: Hypertext Preprocessor. PHP is a server-side scripting language.
➢ PHP is a powerful language that is used to create dynamic and interactive web pages. It
can be used to interact with databases in a very efficient way.
2. What is a dynamic web page?
A dynamic web page, on the other hand, is a page whose content can change each time
it is viewed.
3. What are the different types of comments in PHP. Give an example.
There are two types of comments in PHP: single-line comment and multi-line comments.
❖ To add a single line comment to our code, we precede the comment with # or //.
Example:
# This is a comment
// This is also a comment
..25..
4. PHP: Hypertext Preprocessor
❖ To add multiple lines comment, we enclose the comment in /*...*/.
Example:
/*This is an example of a
multi-line comment. */
4. List out any four operators in PHP.
i. Arithmetic operators
ii. Assignment operators
iii. Comparison operators
iv. Logical operators
5. What is ‘Echo’ statement used for? Give an example.
➢ In PHP, the echo statement is used to output a string or other data to the screen. It is a
simple and efficient way to display information to the user.
Examples:
(i) echo ‘Hello, world!’; (ii) $rollno = 123001;
echo “My name is $rollno”;
Part – III
Answer the following questions: 3 marks
1. What are the features of PHP?
❖ Server-side scripting language:
PHP is a server-side scripting language, which means that the scripts are executed on
the server and the output is sent to the client (i.e., the web browser). This allows you to
create dynamic web pages that can interact with databases.
❖ Open-source software:
PHP is an open-source software, which means that the source code is available for
anyone to view and modify.
❖ Platform independent:
PHP can be run on many different operating systems, including Windows, Linux, and
macOS.
❖ Database support:
This makes it easy to create database-driven websites.
2. Explain the types of PHP Tags.
PHP supports three different sets of tags:
1. PHP Default tags: In the PHP Default tags, PHP code is enclosed in <?php and ?> tags.
<?php
// PHP code
?>
2. Short open tags: Short open tags are an alternative to the default syntax, and they allow
you to use <? and ?> instead of <?php and ?>.
<?
// PHP code
?>
..26..
4. PHP: Hypertext Preprocessor
3. HTML script embed tags: You can also embed PHP code within HTML script tags, like
this:
<script language=“php”>
// PHP code
</script>
3. Write about the rules for naming a variable in PHP?
All variables in PHP follow certain syntactical rules:
➢ A variable’s name must start with a dollar sign ($)
For example, $name
➢ The variable’s name can contain a combination of strings, numbers, and the underscore.
For example, $my_report1.
➢ The first character after the dollar sign must be either a letter or an underscore (it cannot
be a number).
➢ Variable names in PHP are case-sensitive. This is a very important rule. It means that
$name and $Name are entirely different variables.
4. List out the different types of data types in PHP.
The eight different types of data types in PHP are
1. Integer 2. Float 3. String 4. Boolean
5. Array 6. Object 7. Resource 8. NULL
5. Write about the syntax of PHP.
➢ PHP code is enclosed in <?php and ?> tags. These tags are called opening and closing tags.
➢ A PHP statement must end with a semicolon (;).
Example :
<?php
echo “Hello, World!”;
?>
Part – IV
Answer the following questions: 5 marks
1. What are the datatypes in PHP? Explain.
Values assigned to variables in PHP will be of a set data type. The following are the eight
data types:
1. Integer: Integer is a data type which contains whole numbers. It can be positive, negative,
or zero.
Example: $age = 30;
2. Float: Float is a data type which contains decimal numbers.
Example: $price = 19.99;
3. String: String is a data type which contains a sequence of characters enclosed in single
quotes (‛′) or double quotes (“ ”).
Example: $name = “Vijay Akash”;
4. Boolean: Boolean is a data type which contains the value True or False.
Example: $is_admin = true;
..27..
4. PHP: Hypertext Preprocessor
5. Array: An array is a data type which has multiple values in a single variable.
Example: $prices = array(10, 20, 30);
6. Object: An object is a data type that represents an instance of a class.
Example: $user = new User();
7. Resource: A resource is a special type of data that represents a connection to an external
resource, such as a file or a database.
Example: $fp = fopen(“file.txt”, “r”);
8. NULL: NULL is a special data type which contains NULL value. A null value simply means
no value. The keyword NULL is not case sensitive.
Example: $x = null;
2. Explain operators in PHP with examples.
1. Arithmetic Operators:
Arithmetic operators are used to perform math operations, for example, addition,
subtraction, multiplication, and division.
Operator Operator Name Example Output
+ Addition 5+2 7
- Subtraction 5-2 3
Multiplication 52 10
/ Division 5/2 2.5
% Modulus 5%2 2
2. Assignment Operator:
➢ The assignment operator = is used to assign a value to a variable.
➢ The assignment operator takes the value of its right-hand operand and assigns it to
its left-hand operand.
Operator Operator Name Example Output
If $a = 5; $b = 2
= Assignment Operator $a = 5; 5
+= Addition assignment $a += $b; 7
-= Subtraction assignment $a -= $b; 3
*= Multiplication assignment $a *= $b; 10
/= Division assignment $a /= $b; 2.5
%= Modulo assignment $a %= $b; 1
3. Comparison Operators:
Comparison operators are used to compare two values and determine whether a
certain condition is true or false.
Operator Operator Name Example Output
> Greater than 5>2 True
< Less than 5<2 False
..28..
4. PHP: Hypertext Preprocessor
>= Greater than or equal to 5 >= 2 True
<= Less than or equal to 5 <= 2 False
== Equal to 5 == 2 False
Identical 5 === 5 True
===
5 === 5.0 False
!= Not Equal to 5 != 2 True
!== Not Identical 5 !== 5 False
4. Logical Operators:
Logical operators are used to perform logical operations on variables and values.
Operator
Operator Meaning Example Output
Name
It returns true if both
&& Logical AND operands are true, and false (5>3) && (5>7) False
otherwise.
It returns true if at least one
|| Logical OR of the operands is true, and (5>3) || (5>7) True
false otherwise.
It returns true if exactly one
xor XOR of the operands is true, and (5>3) xor (5>7) True
false otherwise.
It returns the opposite of the
operand (i.e., true if the
! Logical NOT ! (5>3) False
operand is false, and false if
the operand is true).
5. Increment / Decrement Operators:
➢ In PHP, the increment operator ++ is used to increase the value of a variable by 1, and
the decrement operator -- is used to decrease the value of a variable by 1.
➢ The increment and decrement operators can be used as either prefix or postfix
operators.
Operator Operator Name Example Meaning
$x = ++$a First, $a is incremented by 1 and
++ ++ $a (Pre-increment)
then the value is returned.
(increment
operator) $a ++ (Post- First, the value of $a is returned
$x = $a++
increment) and then it is incremented by 1.
-- $a (Pre-decrement) First, $a is decremented by 1
-- $x = --$a
and then the value is returned.
(decrement
operator) First, the value of $a is returned
$a (Post-decrement) $x = $a—
and then it is decremented by 1.
..29..
4. PHP: Hypertext Preprocessor
6. String Operator:
➢ String operators have concatenation operator(.) and concatenation assignment
operator(.=).
➢ Concatenation means adding one or more variables to an existing variable.
Operator
Operator Meaning Example Output
Name
Concatenation It concatenates (joins) $a = ‘Hello’;
. (Dot) two strings together. $b = ‘World’; HelloWorld
$c = $a . $b;
It appends one string to
$a = ‘Hello’;
.= (Dot Concatenation another and assigns the HelloWorld
$b = ‘World’;
equal to) assignment result to a variable in a
$a .= $b;
single statement.
ADDITIONAL QUESTIONS
1. PHP was created by
a) Sundar Pichai b) Rasmus Lerdorf c) Elon Musk d) Bill Gates
2. PHP was created in
a) 1994 b) 1984 c) 2004 d) 1974
3. It is a symbol that performs a given action on a value or group of values.
a) Formula b) Punctuation c) Program d) Operator
4. PHP is an ______ language, which means you do not have to compile it and create an
executable file.
a) interpreted b) AI c) OOP d) Compiled
5. _____ is used to structure and format the content of a web page.
a) HTML b) JavaScript c) CSS d) None
6. _____ is a client-side scripting language that is used to add interactivity to web pages.
a) HTML b) JavaScript c) CSS d) None
7. _____ is a style sheet language that is used to control the appearance of a web page.
a) HTML b) JavaScript ` d) None
8. Which of the following is a valid variable?
a) $1st_name b) $full-name c) $full name d) $is_admin
9. In echo statement, To output multiple strings, separated by ________
a) comma (,) b) dot (.) c) colon (:) d) Semicolon (;)
10. What is the output of the following code?
$a = 3;
$b = 4;
$a = $a % $b;
a) 1 b) 4 c) 3 d) 0
..30..
4. PHP: Hypertext Preprocessor
11. WAMP is
a) Website, Apache, MySQL, and PowerPoint b) Windows, Apache, MyServer, and PHP
c) Windows, Apache, MySQL, and PHP d) Windows, Access, MySQL, and Program
12. What is a variable in PHP?
➢ In PHP, a variable is a named location in memory where a value can be stored.
➢ Variables are denoted by a dollar sign ($) followed by the name of the variable.
13. How does a PHP script work?
Steps:
1. The client sends a request for a webpage to the server.
2. The server receives the request and processes it. If the webpage contains PHP code, the
server passes the PHP code to the PHP interpreter.
3. The PHP interpreter executes the PHP code and generates output.
4. The output from the PHP script is combined with the rest of the HTML file to create the
final webpage.
5. The server sends the completed webpage to the client’s web browser.
6. The client’s web browser receives the webpage and renders it for the user to view.
..31..
5 FUNCTIONS AND ARRAYS IN PHP
Part – I
Choose the best answer: 1 Mark
1. A_________is a block of code that performs a specific task.
a) parameter b) function c) class d) label
2. Pre-defined functions are also called _________.
a) user-defined functions b) recursive functions
c) built-in functions d) lambda functions
3. Which one of the following is the right way of defining a function in PHP?
a) function functionname() { // code to be executed }
b) function() {}
c) def myFunction():
d) None of the above
4. A user-defined function in PHP starts with the keyword _________.
a) function b) def c) defined d) funct
5. Which of the following is a correct way to call a function in PHP?
a) functionName(); b) call functionName;
c) execute functionName; d) run functionName();
6. What is an array in PHP?
a) An array is a special data type.
b) It can hold many values under a single variable name.
c) An array element can be any type of data.
d) All of the above
7. How many types of arrays are there in PHP?
a) 2 b) 3 c) 4 d) 5
8. What is the index of the first element in an indexed array in PHP?
a) 0 b) 1 c) 2 d) 3
9. What is the index of the third element in an indexed array in PHP with 5 elements?
a) 2 b) 3 c) 4 d) 5
10. How do you create an indexed array in PHP?
a) By enclosing a comma-separated list of values in square brackets
b) By using the array() function
c) By enclosing a comma-separated list of values in curly braces
d) Both A and B
11. How do you access the elements of an indexed array in PHP?
a) By using the array index in square brackets
b) By using the array key in square brackets
c) By using the array index in curly braces
d) By using the array key in curly braces
..32..
5. Functions and Arrays in PHP
Part - II
Answer the following questions: 2 marks
1. What is a function?
A function is a block of code that performs a specific task and are used to reuse code
2. What are the different types of functions in PHP?
1. Built-in functions
2. User-defined functions
3. Write short notes on built-in functions in PHP?
These are functions that are pre-defined in the PHP language and can be used to perform
a variety of tasks, such as calculating the length of a string or sorting an array
4. What is an array in PHP and what are its main types?
An array is a special data type. It can hold many values under a single variable name. An
array element can be any type of data.
There are three main types of arrays in PHP:
1. Indexed array 2. Associative array 3. Multi-dimensional array
5. How do you create an indexed array in PHP?
We can create an indexed array in PHP,
✓ by enclosing a comma-separated list of values in square brackets (or)
✓ by using the array() function.
Syntax:
$arrayVariable = [ element1, element2, element3, … elementN];
(or)
$arrayVariable = array( element1, element2, element3, … elementN);
Examples:
(a) $fruits = [‘apple’, ‘banana’, ‘orange’];
(b) $fruits = array(‘apple’, ‘banana’, ‘orange’);
Part - III
Answer the following questions: 3 marks
1. What are the advantages of using functions in PHP?
❖ Code reuse:
Functions allow us to reuse code, which can save us time and effort when writing and
maintaining our code.
❖ Testing and debugging:
Functions allow us to test and debug our code more easily, as we can test individual
functions separately from the rest of the code.
❖ Modularity:
Functions allow us to break down our code into smaller, modular pieces, which can
make it easier to maintain and modify.
..33..
5. Functions and Arrays in PHP
2. What is the syntax for defining a function in PHP?
function functionName([parameter list])
{
// code to be executed
}
3. How do you call a function in PHP?
Calling a function is another name for executing the function. A function is called simply
by using the function name, along with an argument list, as a statement.
Syntax:
functionName( ); (or) functionName(argument list);
✓ We can also pass arguments to a function by including them within the parentheses,
separated by commas.
Examples:
(i) display() (ii) power(a, b)
4. Write short notes on an Associative array.
➢ An associative array is a data structure that stores a collection of key-value pairs. The keys
are used to identify the values, and the values can be of any data type.
➢ The keys in an associative array are often called “labels” because they label or identify the
corresponding values.
Example:
$student = [ “Name” => “Ram”, “Age” => 25, “Place” => “Trichy” ];
Part - IV
Answer the following questions: 5 marks
1. Explain the user-defined function with suitable examples.
We can define a user defined function by using the ‘function’ keyword, followed by the
name of the function and a set of parentheses.
Syntax for creating a function in PHP:
function functionName([parameter list])
{
// code to be executed
}
✓ The ‘function’ keyword is used to define a function.
✓ functionName is the name of the function.
✓ parameter list is a comma-separated list of variables.
✓ Inside the curly braces, we can put any code we want the function to execute.
Example:
<?php
function printGreeting()
{ function definition
echo “Hello, world!”;
}
..34..
5. Functions and Arrays in PHP
printGreeting(); → function calling
?>
Output:
“Hello, world!”
2. Explain indexed array and associative array in PHP.
Indexed array:
❖ An indexed array is an array that uses a numeric index to access its elements. The index
is a number that starts at 0 for the first element and increases by 1 for each subsequent
element.
❖ We can create an indexed array in PHP, by enclosing a comma-separated list of values in
square brackets (or) by using the array() function.
Syntax:
$arrayVariable = [ element1, element2, element3, … elementN];
(or)
$arrayVariable = array( element1, element2, element3, … elementN);
Examples:
(a) $fruits = [‘apple’, ‘banana’, ‘orange’];
(b) $fruits = array(‘apple’, ‘banana’, ‘orange’);
Associative array:
❖ An associative array is a data structure that stores a collection of key-value pairs. The keys
are used to identify the values, and the values can be of any data type.
❖ The keys in an associative array are often called “labels” because they label or identify the
corresponding values.
❖ We can create an associative array in PHP, by enclosing a comma-separated list of
key-value pairs in square brackets (or) by using the array() function.
Syntax:
$arrayVariable = ["key1" => "value1", "key2" => "value2", …, "keyN ⇒ "valueN" ];
(or)
$arrayVariable = array("key1" => "value1", "key2" => "value2", …, "keyN ⇒ "valueN" ];
Examples:
(i) $student = [ “Name” => “Ram”, “Age” => 25, “Place” => “Trichy” ];
(ii) $student = array( “Name” => “Ram”, “Age” => 25, “Place” => “Trichy” );
ADDITIONAL QUESTIONS
1. The variables that are placed in the function definition are called as
a) Arguments b) Special variables c) Parameters d) Elements
2. The variables that are placed in the function calling statement are called as
a) Arguments b) Special variables c) Parameters d) Elements
3. In _____, there is no restriction that all elements in an array must belong to the same data
type.
a) C++ b) PHP c) C d) All
..35..
5. Functions and Arrays in PHP
4. Write a note on user defined function.
We can define a user defined function by using the ‘function’ keyword, followed by the
name of the function and a set of parentheses.
5. How can you access the elements of an indexed array?
To access the elements of an indexed array in PHP, you can use the array index in square
brackets. The index starts at 0 and increments by 1 for each element in the array.
Example:
$fruits = array(“apple”, “banana”, “orange”, “mango”);
echo $fruits[0];
Output:
“apple”.
6. How can you access the elements of an associative array?
We can access the values in an associative array using the keys:
echo $arrayVariable[“key1”];
Example:
$student = [ “Name” => “Ram”, “Age” => 25, “Place” => “Trichy” ];
echo $student[“Name”];
Output:
“Ram”
7. Explain the multi-dimensional array with an example.
➢ In PHP, a multidimensional array is an array that contains one or more arrays as its
elements.
➢ The elements of a multidimensional array can themselves be arrays, creating an array of
arrays, also known as a nested array.
Example:
$arr = array(array(1, 2, 3), array(4, 5, 6), array(7, 8, 9) );
echo $arr[1][2];
Output:
6
✓ You can access the elements of this array using two sets of square brackets, with the
first set specifying the row and the second set specifying the column.
..36..
6 CONDITIONAL STATEMENTS IN PHP
Part – I
Choose the correct answer: 1 Mark
1. Which of the following is NOT a type of conditional statement in PHP?
a) if b) if ... else c) if ... elseif ... else d) while
2. What type of statement is the if...else statement?
a) Conditional statement b) Looping
c) Input statement d) Output statement
3. What is the simplest conditional statement in PHP?
a) if-else statement b) if statement
c) switch statement d) if-elseif-else statement
4. How does the if statement work in PHP?
a) A block of code is executed if a certain condition is true.
b) A block of code is executed if a certain condition is false.
c) A block of code is executed if multiple conditions are true.
d) A block of code is executed if multiple conditions are false.
5. What happens if the condition in an “if” statement is false?
a) The code inside the curly braces is executed.
b) The code inside the curly braces is skipped.
c) The program terminates.
d) None of the above
6. What is the syntax for an if-else statement in PHP?
a) if(condition) { //True-block; }
b) if(condition) { //True-block; } else { //False-block; }
c) if-else(condition) { //True-block; } else { //False-block; }
d) if-elseif(condition) { //True-block; } else { //False-block; }
7. Which of the following is used to specify multiple conditions in an if...elseif...else statement?
a) AND b) OR c) case d) elseif
8. Which of the following is used to specify multiple conditions in a switch statement?
a) AND b) OR c) case d) if
9. What happens if none of the case values match the expression in a switch statement?
a) The default case block is executed b) The program terminates
c) The nearest case block is executed d)The first case block is executed
10. Which of the following is used to terminate the switch statement?
a) return b) continue c) goto d) break
Part II
Short Answers: 2 Marks
1. What are the different types of conditional statements in PHP?
1. ‘if ’ statement 2. ‘if …else’ statement
3. ‘if … elseif … else’ statement 4. ‘switch’ statement
..37..
6. Conditional Statements in PHP
2. Write the syntax for an if statement in PHP.
if (condition)
{
// code to be executed if condition is true;
}
3. What is the purpose of the if ... else statement?
The if ... else statement is a conditional statement in PHP. It executes one block of code if
a condition is true and another block of code if the condition is false.
4. Write the syntax for an if … else statement in PHP.
if (condition)
{
// True-block;
}
else
{
// False-block;
}
5. What is the role of the break statement in a switch statement?
The role of the break statement in a switch statement is to terminate the case and exit
the switch statement.
Part III
Explain in Brief Answer: 3 Marks
1. Write the syntax for an if ... elseif ... else statement in PHP.
if (condition1)
{
// code to be executed if condition1 is true;
}
elseif (condition2)
{
// code to be executed if condition1 is false and condition2 is true;
}
elseif (condition3)
{
// code to be executed if condition1 and condition2 are false and condition3 is true;
}
else
{
// code to be executed if all conditions are false;
}
..38..
6. Conditional Statements in PHP
2. Write the syntax for a switch statement in PHP?
switch (expression)
{
case value1:
//code to be executed if expression = value1;
break;
case value2:
//code to be executed if expression = value2;
break;
...
default:
//code to be executed if expression is not equal to any of the values;
}
3. In an if ... elseif ... else statement, where is the code executed if all conditions are
false?
In an if ... elseif ... else statement, If all the conditions are false, then else the block will be
executed.
Part IV
Explain in detail: 5 Marks
1. Explain if … elseif … else statement with an example.
➢ The if ... elseif ... else statement is a conditional statement that allows you to check
multiple conditions and run different code based on which condition is true.
➢ This type of statement begins with the keyword ‘if’. It can be followed by one or more
‘elseif’. Finally ends with an ‘else’ part.
Syntax:
if (condition1)
{
// code to be executed if condition1 is true;
}
elseif (condition2)
{
// code to be executed if condition1 is false and condition2 is true;
}
elseif (condition3)
{
// code to be executed if condition1 and condition2 are false and condition3 is true;
}
else
{
// code to be executed if all conditions are false;
}
..39..
6. Conditional Statements in PHP
Example:
<?php
$x = 12;
if ($x > 20)
{
echo “x is greater than 20”;
}
elseif ($x > 15)
{
echo “x is greater than 15 but not greater than 20”;
}
elseif ($x > 10)
{
echo “x is greater than 10 but not greater than 15”;
}
else
{
echo “x is not greater than 10”;
}
?>
Output:
x is greater than 10 but not greater than 15
✓ It’s important to note that only one of the blocks of code will be executed,
depending on which condition is true.
✓ If none of the conditions are true, the code inside the ‘else block’ will be executed.
2. Discuss in detail about switch statement with an example.
This is a multiple branching statement where, based on a condition, the control is
transferred to one of the many possible points.
Syntax:
switch (expression)
{
case value1:
//code to be executed if expression = value1;
break;
case value2:
//code to be executed if expression = value2;
break;
...
default:
//code to be executed if expression is not equal to any of the values;
✓ }
..40..
6. Conditional Statements in PHP
✓ The break statement is used to terminate each case.
✓ If a break statement is not used, the code will continue to execute for all subsequent
case statements until a break is encountered.
✓ The default case is optional, and will be executed if none of the other case statements
match the value of the expression.
Example:
<?php
$x = 10;
switch ($x)
{
case 5:
echo “x is equal to 5”;
break;
case 10:
echo “x is equal to 10”;
break;
case 15:
echo “x is equal to 15”;
break;
default:
echo “x is not equal to 5, 10, or 15” }
?>
Output:
x is equal to 10
ADDITIONAL QUESTIONS
1. _______separate the blocks of statements.
a) The curly braces { } b) parentheses ( )
c) Square brackets [ ] d) Angle brackets < >
2. Condition / expression must be enclosed with in ________.
a) The curly braces { } b) parentheses ( )
c) Square brackets [ ] d) Angle brackets < >
3. What are Control statements or Control Structures?
The statements that cause a jump of control from one part of a script to are called Control
statements or Control Structures.
..41..
7 LOOPS IN PHP
Part – I
Choose the best answer: 1 Mark
1. Which of the following is NOT a type of loop statement in PHP?
a) for b) if ... else c) while d) do … while
2. What type of loop is “for loop” in PHP?
a) Entry-Check Loop b) Exit-Check Loop c) Counter Loop d) Iteration Loop
3. What is the syntax for for loop in PHP?
a) for(initialization; condition; increment) { // code}
b) foreach(initialization; condition; decrement) { // code}
c) while(condition)
d) do{...}while(condition)
4. What are the three parts of the for-loop syntax in PHP?
a) initialization, condition, increment
b) initialization, code block, condition
c) code block, condition, increment
d) condition, initialization, code block
5. When is the ‘initialization’ part of a for loop executed?
a) Before each iteration b) After each iteration
c) Only once at the beginning of the loop d) Only once at the end of the loop
6. What is the purpose of the ‘increment’ part of a for loop?
a) To initialize variables b) To update variables
c) To check the condition d) To execute the code block
7. What type of loop is “while loop” in PHP?
a) Entry-Check Loop b) Exit-Check Loop
c) Counter Loop d) Iteration Loop
8. What type of loop is “do...while loop” in PHP?
a) Entry-Check Loop b) Exit-Check Loop
c) Counter Loop d) Iteration Loop
9. Which looping structure should be used to iterate over elements of an array in PHP?
a) for loop b) while loop
c) do...while loop d) foreach loop
10. What is the output of the following code?
$array = array(1, 2, 3, 4, 5);
foreach ($array as $value)
{
echo $value;
}
a) 1 2 3 4 5 b) 5 4 3 2 1 c) 1 1 1 1 1 d) None of the above
..42..
7. LOOPS IN PHP
Part II
Short Answers: 2 Marks
1. What is the purpose of a loop in PHP?
In PHP, a loop executes a set of instructions (a block of code) repeatedly for a certain
number of times or until a certain condition is met.
2. Write the syntax for an ‘for’ loop in PHP.
for (initialization; condition; increment/decrement)
{
//code to be executed;
}
3. Write the syntax for ‘while’ loop in PHP.
while (condition)
{
//code to be executed;
}
4. How is the ‘condition’ in a while loop evaluated?
The condition is evaluated at the beginning of each iteration of the loop. If it is true, the
code block is executed. If it is false, the loop is terminated.
5. What is the output of the following code snippet?
$i = 1;
while ($i <= 5)
{
echo $i . “<br>”;
$i++;
}
Output:
1
2
3
4
5
Part III
Explain in Brief Answer: 3 Marks
1. Describe the three parts of a for loop in PHP (initialization, condition and increment)
and explain their purpose.
Initialization Part:
The initialization part is executed only once at the beginning of the loop. It is used to
initialize variables.
The condition:
The condition is evaluated before each iteration of the loop. If it is true, the code block is
executed. If it is false, the loop is terminated.
..43..
7. LOOPS IN PHP
The increment/ decrement part:
The increment/ decrement part is executed after each iteration of the loop. It is used to
update variables.
2. Write a PHP code to print 1 to 10 numbers in ascending order using for loop.
for ($i = 1; $i<=10; $i++)
{
echo $i . “<br>”;
}
3. Explain the difference between while loop and do … while loop in PHP.
While loop Do..while loop
The while loop first evaluates the condition The do...while loop first executes the
before executing the code block. code block and then evaluates the
condition.
The while loop may not execute the code The do...while loop, on the other hand,
block at all if the condition is false from the guarantees that the code block will be
beginning. executed at least once, even if the
condition is false.
Part IV
Explain in detail: 5 Marks
1. Explain ‘for’ loop with example.
‘for loop’ is called as the entry-check loop. The for loop is used to execute a block of code
a specific number of times.
Syntax:
for (initialization; condition; increment/decrement)
{
//code to be executed;
}
✓ The initialization part is executed only once at the beginning of the loop. It is used to
initialize variables.
✓ The condition is evaluated before each iteration of the loop. If it is true, the code block is
executed. If it is false, the loop is terminated.
✓ The increment/ decrement part is executed after each iteration of the loop. It is used to
update variables.
Example: Output:
// To print the numbers from 1 to 5 in ascending order. 1
for ($i = 1; $i<= 5; $i++) 2
{ 3
echo $i . “<br>”; 4
} 5
..44..
7. LOOPS IN PHP
2. Write a PHP code to print 10 to 20 numbers in ascending order using while loop and
do… while loop.
Using while loop: Using do … while loop:
$i = 10; $i = 10;
while ($i<= 20) do
{ {
echo $i . “<br>”; echo $i . “<br>”;
$i++; $i++;
} } while ($i<= 20);
3. Explain ‘foreach’ loop with examples.
The foreach loop is used to iterate over elements of an array.
Syntax:
foreach ($array as $value)
{
//code to be executed;
}
Example: Output:
To print the elements of an array: 1
$array = array(1, 2, 3, 4, 5); 2
foreach ($array as $value) 3
{ 4
echo $value . “<br>”; 5
}
ADDITIONAL QUESTIONS
1. which one of the following not a loop?
a) foreach() b) while() c) switch() d) do … while()
2. What is loop?
A loop is a control structure that repeatedly executes a block of code until a certain
condition is met or a specific number of times.
3. What is Code Block?
A block of code, also known as a code block, is a group of statements to be executed
together as a single unit.
4. What are the differences between ‘while loop’ and do .. while loop’?
❖ Execution order:
✓ The while loop first evaluates the condition before executing the code block. If the
condition is true, the code block is executed. If the condition is false, the loop is
terminated.
✓ On the other hand, the do...while loop first executes the code block and then
evaluates the condition. If the condition is true, the code block is executed again. If
the condition is false, the loop is terminated.
❖ Minimum number of iterations:
✓ The while loop may not execute the code block at all if the condition is false from the
beginning.
✓ The do...while loop, on the other hand, guarantees that the code block will be
executed at least once, even if the condition is false.
..45..
8 FORMS AND FILES
Part – I
Choose the best answer: 1 Mark
1. What are HTML forms used for?
a) To collect input from users b) To create server-side programming language
c) To create a database d) To send emails
2. Which of the following is NOT a form control available in HTML forms?
a) Text inputs b) Buttons c) Checkboxes d) Cropping Tool
3. Which tag is used to create an HTML form?
a) form b) input c) textarea d) select
4. What form control allows the user to select multiple values?
a) text inputs b) buttons c) checkboxes d) radio buttons
5. What form control allows the user to select only one value at a time?
a) text inputs b) buttons c) checkboxes d) radio buttons
6. What is the purpose of validation in PHP?
a) To check the input data submitted by the user from the client machine
b) To display data to users
c) To store data on the server
d) To send data to the client
7. How many types of validation are available in PHP?
a) One b) Two c) Three d) Four
8. Which PHP function can be used to open a file?
a) fopen() b) fread() c) fclose() d) fwrite()
9. What PHP function can be used to read a file?
a) fopen() b) fread() c) fclose() d) fwrite()
10. What PHP function can be used to close a file?
a) fopen() b) fread() c) fclose() d) fwrite()
Part - II
Short Answers: 2 Marks
1. What is the main objective of PHP and HTML form controls?
Main objective of PHP and HTML form controls are to collect data from users.
2. What are the basic HTML form controls available?
❖ Text inputs ❖ Buttons ❖ Checkbox
❖ Radio box ❖ File Select ❖ Form Tag
3. How are data collected via HTML form controls sent to the server?
All the input values are synchronized and sent to the server via POST method or GET
method.
4. What is Validation in PHP?
Validation is a process of checking the input data submitted by the user from client machine.
..46..
8. Forms and Files
5. What are the two types of validation available in PHP?
❖ Client-Side Validation
❖ Server-Side Validation
Part - III
Explain in Brief Answer: 3 Marks
1. Explain the difference between checkbox and radio button in HTML forms.
❖ Checkbox selects more than one value from the HTML form.
❖ Radio box is similar to checkbox but one value can be chosen at a time.
2. Explain the difference between the POST method and GET method of sending data to
the server in PHP.
❖ Post Method:
The input data sent to the server with POST method is stored in the request body of
the client’s HTTP request.
❖ Get Method:
The input data sent to the server with POST method via URL address. It is known as
query string.
3. What are the different file handling tasks that can be performed using PHP?
❖ PHP Open a File ❖ PHP Read a File ❖ PHP Close a File
❖ PHP Write a File ❖ PHP Appending a File ❖ PHP uploading a File.
Part - IV
Explain in detail: 5 Marks
1. Discuss in detail about HTML form controls.
➢ Text inputs contain textbox and text area controls.
➢ Buttons may contain Submit button, Reset button and Cancel Button.
➢ Checkbox selects more than one value from the HTML form.
➢ Radio box is similar to checkbox but one value can be chosen at a time.
➢ File select is the best feature to select one file from the local machine to server machine
at a time.
➢ Form tag is used to mention a method (POST or GET) and control the entire form controls
in the HTML document.
2. Explain in detail of File handling functions in PHP.
File handling is an important activity of all web application development process.
❖ PHP Open a File:
fopen() is helps to open a file in the server. It contains two parameters one for the file
and the other one specifies in which mode the file should be opened (Read/Write).
Syntax:
$file_Object= fopen(“FileName”, “Read/WriteMode”) or die(“Error Message!”);
Example:
<?php
$myfile = fopen(“Student.txt”, “r”) or die(“Unable to open file!”);
?>
..47..
8. Forms and Files
❖ PHP Read a File:
The fread() function reads from an open file. The file object comes from fopen
function.
Syntax:
fread($file_Object,filesize(“FileName”));
Example:
<?php
fread($myfile,filesize(“Student.txt”));
?>
❖ PHP Close a File:
The fclose() function is used to close an opened file. The file object comes from fopen
function.
Syntax:
fclose($file_Object);
Example:
<?php
$myfile = fopen(“student.txt”, “r”);
// some code to be executed.... fclose($myfile);
?>
❖ PHP write a File:
The fwrite() function is used to write to a file.
Syntax:
fwrite($myfile, $txt);
Example:
<?php
$myfile = fopen(“student.txt”, “r”);
$txt=”Writing files”
fwrite($myfile, $txt);
?>
ADDITIONAL QUESTIONS
1. There are______ types of validation available in PHP.
a) one b) two c) three d) four
2. Java script and HTML are
a) Server Side Validation b) Client-Side Validation
c) Browser based Validation d) None of these
3. Which one of the following not a Server Side Validation
a) PHP b) ASP
c) JSO d) JavaScript
4. 4.Form Attribute action Backend script ready to process your passed data.
a) action Backend script b) action Frontend script
c) action Database script d) All of these
..48..
8. Forms and Files
5. Target Specify the target window or frame where the result of the script will be displayed.
a) URL b) Window c) Target d) link
6. Write the Validation rules for HTML input field.
➢ Name (Text Input) : Must contain letters and white-spaces.
➢ Email (Text Input) : Must contain @ and .strings.
➢ Website (Text Input) : Must contain a valid URL.
➢ Radio : Must be selectable minimum one value.
➢ Check Box : Must be checkable minimum one value.
➢ Drop Down menu : Must be selectable minimum one value.
..49..
9 CONNECTING PHP AND MYSQL
Part – I
Choose the best answer: 1 Mark
1. Which is the correct function to execute the SQL queries in PHP ?
a) mysqli_query(“Connection Object”,”SQL Query”)
b) query(“Connection Object”,”SQL Query”)
c) mysql_query(“Connection Object”,”SQL Query”)
d) mysql_query(“SQL Query”)
2. Which is the correct function Closing Connection in PHP ?
a) mysqli_close(“Connection Object”); b) close(“Connection Object”);
c) mysql_close(“Connection Object”); d) mysqli_close(“Database Object”);
3. Which is the correct function to establish Connection in PHP ?
a) mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
b) connect(“Server Name “,”User Name”,”Password”,”DB Name”);
c) mysql_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
d) mysqli_connect (“Database Object”);
4. Which is the not a correct MySQL Function in PHP ?
a) Mysqli_connect() Function b) Mysqli_close() Function
c) mysqli_select_data() Function d) mysqli_affected_rows() Function
5. How many parameters are required for MYSQLi connect function in PHP ?
a) 2 b) 3 c) 4 d) 5
6. How many parameters are required for MYSQLi query function in PHP ?
a) 2 b) 3 c) 4 d) 5
7. How many parameters are required for MYSQLi Close function in PHP ?
a) 1 b) 2 c) 3 d) 5
8. Which version of PHP supports MySQLi fuctions ?
a) Version 2.0 b) Version 3.0 c) Version 4.0 d) Version 5.0
Part - II
Short Answers: 2 Marks
1. What are the MySQLi function available PHP?
➢ Mysqli_connect() Function
➢ Mysqli_close() Function
➢ Mysqli_query()Function
2. What is MySQLi function?
MySQLi is extension in PHP scripting language which gives access to the MYSQL database.
3. What are the types MySQLi function available PHP?
❖ Database Connections
❖ Managing Database Connections
❖ Performing Queries
❖ Closing Connection
..50..
9. Connecting PHP and MYSQL
4. Difference between Connection and Close function?
mysqli_connect() mysqli_close()
Connect to Database Server machine via It is used to close an existing opened database
PHP scripting language using connection between PHP scripting and MySQL
Mysqli_connect() Function. Database Server.
This function requires four parameters. This function requires only one parameter.
5. Give few examples of MySQLi Queries.
➢ $sql=”SELECT student_name,student_age FROM student”;
mysqli_query($con,$sql);
➢ sql_stmt = “SELECT * FROM my_contacts”;
$result = mysqli_query($connection,$sql_stmt);
6. What is connection string?
A connection string is a sequence of variable that will address the specific database.
Part - III
Explain in Brief Answer: 3 Marks
1. Write the Syntax for MySQLi Queries.
mysqli_query (“Connection Object”, “SQL query”)
2. Write is the purpose of MySQLi function available.
❖ mysqli_connect() function:
Connect to Database Server machine via PHP scripting language using
Mysqli_connect() Function.
❖ mysqli_query() function:
“mysqli_query” is a function, that helps to execute the SQL query statements in PHP
scripting language.
❖ mysqli_close() function:
mysqli_close() Function is used to close an existing opened database connection
between PHP scripting and MySQL Database Server.
3. Write MySQL Connection Syntax with example.
Syntax:
mysqli-connect (“Server Name”, “User Name”, “Pass Word”, “DB Name”);
Example:
<?php
$servername = “localhost”;
$username = “username”;
$password = “password”;
$DB_name = “School_DB”;
$conn = mysqli_connect($servername, $username, $password,$DB_name);
?>
..51..
9. Connecting PHP and MYSQL
Part – IV
Explain in detail: 5 Marks
1. Discuss in detail about MySQL functions with example .
❖ mysqli_connect() function:
Connect to Database Server machine via PHP scripting language using
Mysqli_connect() Function.
Syntax:
mysqli-connect (“Server Name”, “User Name”, “Pass Word”, “DB Name”);
Example:
<?php
$servername = “localhost”;
$username = “username”;
$password = “password”;
$DB_name = “School_DB”;
$conn = mysqli_connect($servername, $username, $password,$DB_name);
?>
❖ mysqli_query() function:
“mysqli_query” is a function, that helps to execute the SQL query statements in PHP
scripting language.
Syntax:
mysqli_query (“Connection Object”, “SQL query”)
Example:
$con=mysqli_connect(“localhost”,”my_user”,”my_password”,”Student_DB “);
$sql=”SELECT student_name,student_age FROM student”;
mysqli_query($con,$sql);
❖ mysqli_close() function:
mysqli_close() Function is used to close an existing opened database connection
between PHP scripting and MySQL Database Server.
Syntax:
mysqli_close(“Connection Object”);
Example:
<?php
$con=mysqli_connect (“localhost”,”$user”, ”$password”, ”SCHOOL_DB”);
mysqli_close($con);
?>
2. Explain in details types of MySQL connection method in PHP.
Connect to Database Server machine via PHP scripting language using Mysqli_connect()
function.
Syntax:
mysqli-connect (“Server Name”, “User Name”, “Pass Word”, “DB Name”);
..52..
9. Connecting PHP and MYSQL
Example:
<?php
$servername = “localhost”;
$username = “username”;
$password = “password”;
$DB_name = “School_DB”;
$conn = mysqli_connect($servername, $username, $password,$DB_name);
?>
✓ The sequence of variables $servername , $username , $password , $DB_Name specified
to create Mysql database services is called connection string.
✓ The mysqli_connect function uses these variables to connect Database server to PHP
✓ If connection gets fail, output will be printed with MySQL error code. Otherwise
connection is success.
3. Explain MySQLi Queries with examples.
❖ The main goal of MySQL and PHP connectivity is to retrieve and manipulate the data from
MySQL database server.
❖ The SQL query statements help in PHP MySQL extension to achieve the objective of
MySQL and PHP connection.
❖ “mysqli_query” is a function, that helps to execute the SQL query statements in PHP
scripting language.
Syntax:
mysqli_query(“Connection Object”,”SQL Query”)
Example:
$con=mysqli_connect(“localhost”,”my_user”,”my_password”,”Student_DB “);
$sql=”SELECT student_name,student_age FROM student”;
mysqli_query($con,$sql);
ADDITIONAL QUESTIONS
1. one of the most important for all computer and Internet related applications.
a) Data b) Picture
c) Laptop d) Mobile Phone
2. RDBMS stands for
a) Relational Data Management Services
b) Random Date Management System
c) Relational Database Management System
d) Relational Database Maintenance System
3. SQL stands for
a) Structured Query Language b) System Query Language
c) System Query Label d) Structured Query Laboratory
4. ______ is Open source & Community support scripting language
a) MySQL b) PHP
c) Oracle d) MS Access
..53..
9. Connecting PHP and MYSQL
5. List out the Relational Database Management System (RDMS) software.
➢ MySQL
➢ Oracle
➢ IBM DB2
➢ Microsoft SQLSERVER
6. What is the purpose of connecting MySQL and PHP?
The main goal of MySQL and PHP connectivity is to retrieve and manipulate the data from
MySQL database server.
7. What is SQL?
SQL is a domain-specific language used in programming and designed for managing data
held in a relational database management system.
8. What is MySQL ?
MySQL is an open-source relational database management system.
..54..
10 INTRODUCTION TO COMPUTER NETWORKS
Part – I
Choose the best answer: 1 Mark
1. A set of computers connecting together is called as ----------
a) Network b) Server c) Hub d) Node
2. Many discussions in an online forum leads to personal attacks and is called
a) Hackers b) Virus c) Online war d) Flame war
3. Wi-Fi is short name for
a) Wireless Fidelity b) Wired fidelity
c) Wired fiber optic d) Wireless fiber optic
4. Which among them was challenging to the business people on computer networking
a) Hacking b) Viruses
c) Both a & b d) none of the above
5. Which one of the following is not the social media
a) Gmail b) Facebook c) twitter d) Linkedin
6. In mobile network, land areas for network coverage was distributed as
a) Firmware b) cells c) Range d) Service
7. Which one of the following are harmful to computer?
a) Bloggers b) Browser c) Hackers d) twitter
Part - II
Short Answers: 2 Marks
1. What is a Computer Network.
A set of computers connected together for the purpose of sharing resources is called as
computer networks.
2. Write a short note on Internet.
➢ At present, Internet is the most common resource shared everywhere.
➢ Internet is simply defined as the connection of individual networks
3. What are the common uses of computer network?
❖ Communication
❖ Resource sharing
❖ Information sharing
4. What is node in Computer network.
A Computer which is connected to a network is called as node. The data originates and
terminates at these particular nodes is called as a source and destination.
Part - III
Explain in Brief Answer: 3 Marks
1. Write a note on Resource sharing.
➢ It allows all kind of programs, equipments and data to be accessed by anyone via network
irrespective of the physical location of the resource.
..55..
10. Introduction to Computer Networks
➢ Simply resource sharing is a sharing of devices like printers, scanner, PDA, fax machine,
and modems.
2. List out some benefits of social networks.
❖ Group information sharing over long distances:
➢ Although friends and family members can keep in contact via mobile phone calls or
by text messages, social nets provide a much richer environment for staying
connected.
➢ We can also share photo albums, videos and convey daily wishes through the social
network.
➢ Group discussions and Group chats go on in various groups through which people are
kept in touch with each other.
❖ Broadcast announcements:
➢ Quick, easy way to spread information of emergencies and natural calamities. Venues
and local shops can advertise upcoming events on social networks.
➢ Business people can market their products through these networks.
❖ Fostering diversity of thought:
➢ Some critics of social networks say that online communities attract people by similar
interests and backgrounds.
➢ Indeed, when the people with different opinions do get together on online, many
discussions in an online forum leads to personal attacks and is called “flame wars.”
➢ The arguments go online, healthy debate takes place and some of them become viral
also.
3. Write a note on Mobile networks.
➢ Mobile network is the network connecting devices without cable (wireless).
➢ Mobile computers, such as laptop, tablet, and hand-held computers, were fastest growing
segments.
➢ At land areas network was distributed as cells, each will be served by single – location
transceiver, but generally three cell sites or a base transceiver station.
➢ This base station provides the cell with network coverage and other features that can be
utilized for transmission of voice, data and other content as well.
➢ Joining together all radio coverage is called as wide geographical area.
➢ This portable transceiver used to communicate with one another with fixed transceivers
and moving via more than one cell during transmission.
Part - IV
Explain in detail: 5 Marks
1. Explain uses of Computer network.
❖ Communication:
Using computer networks, we can interact with the different people with each other
all over the world. People can easily communicate at very low cost via mobile, social
media, telephone, e-mail, chatting, video conferencing, SMS, MMS, groupware etc.
..56..
10. Introduction to Computer Networks
❖ Resource sharing:
It allows all kind of programs, equipment and data to be accessed by anyone via
network irrespective of the physical location of the resource. Simply resource sharing is a
sharing of devices like printers, scanner, PDA, fax machine, and modems.
❖ Information sharing
Using computer network, any application or other software can be stored at a central
computer or server. The software can be shared among other computers of the network.
It provides high reliability and backup can also be stored at one location for easy
availability in case of crash.
2. Explain about social applications in Computer network.
➢ The world through social network media, applications like WhatsApp, Facebook, Twitter,
Blogs, Pinterest, Classmate and so on are in full fledge use.
➢ Through the social media we share our thoughts, ideas, files and also chats.
➢ Besides being a fun place to meet and relax with people, social networking leads to some
extremely useful benefits to individuals and communities:
❖ Group information sharing over long distances:
➢ Although friends and family members can keep in contact via mobile phone calls or
by text messages, social nets provide a much richer environment for staying
connected.
➢ We can also share photo albums, videos and convey daily wishes through the social
network.
➢ Group discussions and Group chats go on in various groups through which people are
kept in touch with each other.
❖ Broadcast announcements:
➢ Quick, easy way to spread information of emergencies and natural calamities. Venues
and local shops can advertise upcoming events on social networks.
➢ Business people can market their products through these networks.
❖ Fostering diversity of thought:
➢ Some critics of social networks say that online communities attract people by similar
interests and backgrounds.
➢ Indeed, when the people with different opinions do get together on online, many
discussions in an online forum leads to personal attacks and is called “flame wars.”
➢ The arguments go online, healthy debate takes place and some of them become viral
also.
ADDITIONAL QUESTIONS
1. ________is the most common resource shared everywhere.
a) Internet b) Laptop
c) computer d) Mobile phone
2. WWW stands for
a) World Wide Wide b) World Web Wide
c) World Wide Web d) Web Web Web
..57..
10. Introduction to Computer Networks
3. Who is known as the father of the INTERNET
a) Bill Gates b) Vint Cerf
c) Mark Zuckerberg d) Robert E Kha
4. A Computer which is connected to a network is called as _____.
a) Internet b) Laptop
c) Node d) Mobile phone
5. IP stands for
a) Inspector of Police b) Internet Protocol
c) Indian Police d) Internet Protection
6. INTERNET stands for
a) Internal Network b) Interested News
c) Indian Network d) INTERconnectedNETwork
7. Which services is available all day(24x7) around the year(365 days).
a) Internet b) Computer c) Money d) Mobile Phone
8. Which one of the following is not a search engine?
a) Google b) YAHOO c) Edge d) BING
9. With the development of_______ global access and security issues were restricted.
a) internet b) computer
d) Data science d) cloud computing
10. Match.
In B2B, B2G, C2B, C2C,C2G,G2B, G2C and G2G,
a) B - (i) Computer
b) C - (ii) Business
c) G - (iii)Consumer
- (iv) Government
a) (i), (ii), (iii) b) (i), (ii), (iv) c) (ii), (iii), (iv) d) (iv), (ii), (iii)
11. Which network services can be easily accessed and used from home?
Network at home helps us to perform e-banking, e-learning, e-governance, e-health,
telemedicine, call centers, video conferencing, digitalization of memories.
12. Write the Disadvantages of Social Network.
❖ Simply wasting the precious time on Internet by surfing, searching unwanted things.
❖ Lot of unnecessary wrong information are sometimes posted by some people on their
web pages, blog etc.
❖ Different types of thefts related to money and other valuables can take place through
Internet as hackers and viruses are always active around.
..58..
11 NETWORK EXAMPLES AND PROTOCOLS
Part – I
Choose the best answer: 1 Mark
1. Which of the following system securely share business’s information with suppliers, vendors,
partners and customers.
a) Extranet b) Intranet c) Arpanet d) arcnet
2. Match the following and choose the correct answer
i. HTTP -The core protocol of the World Wide Web.
ii. FTP- enables a client to send and receive complete files from a server.
iii. SMTP - Provide e-mail services.
iv. DNS- Refer to other host computers by using names rather than numbers.
a) i, ii, iii, iv b) ii, iii, iv, i c) iii, iv, i, ii d) iv, iii, ii, i
3. Communication over ________ is be made up of voice, data, images and text messages.
a) Social media b) Mobile Network c) whatsapp d) software
4. Wi-Fi stands for ________
a) Wireless Fidelity b) wired fidelity
c) wired optic fibre d) wireless optic fibre
5. A TCP/IP network with access restricted to members of an organization
a) LAN b) MAN c) WAN d) Intranet
6. RFID stands for ________
a) Radio Free identification b) real Frequency identity
c) Radio Frequency indicators d) Radio Frequency Identification.
7. It guarantees the sending of data is successful and which checks error on operation at OSI
layer is ________
a) Application layer b) Network layer c) Transport Layer d) Physical layer
8. Which one of the following will secure data on transmissions
a) HTTPS b) HTTP c) FTP d) SMTP
9. ________ provides e-mail service
a) DNS b) TCP c) FTP d) SMTP
10. ________ refer to other host computers by using names rather than numbers.
a) DNS b) TCP c) FTP d) SMTP
Part - II
Short Answers: 2 Marks
1. Define Intranet .
It is a private network within an enterprise to share company data and computing
resources between the employees.
2. What are the uses of mobile networks?
➢ Mobile networking assign to the technology supports voice/data, network connectivity
using via radio transmission solution.
..59..
11. Network Examples and Protocols
➢ Communication over mobile network is made up of voice, data, images and text
messages.
3. List out the benefits of WiFi.
➢ It provides mobility.
➢ It provides connection to Internet.
➢ Flexibility of LAN.
➢ Ensures connectivity.
➢ Low cost, high benefits.
4. 4. Expand HTTP, HTTPS, FTP.
➢ HTTP - Hyper Text Transfer Protocol
➢ HTTPS - Hyper Text Transfer Protocol Secure
➢ FTP – File Transfer Protocol
Part - III
Explain in Brief Answer: 3 Marks
1. Compare Internet, Intranet and Extranet
❖ INTERNET:
The Internet is a network of global connections – comprising private, public, business,
academic and government networks.
❖ INTRANET:
Intranet is a private network within an enterprise to share company data and
computing resources between the employees.
❖ EXTRANET:
Extranet is a private network that uses Internet technology and the public
telecommunication system to securely share business information with suppliers,
vendors, partners, customers, or other business.
2. Write short notes on HTTP, HTTPS, FTP.
❖ HTTP – It is used between a web client and a web server and it guarantees non-secure
data transmissions.
❖ HTTPS – It is used between a web client and a web server ensures secure data
transmissions.
❖ FTP – It is used between computers for sending and receiving file.
3. What are the layers available in TCP/IP Reference Model?
There are four total layers of TCP/IP protocol:
1. Network Access Layer - concerned with building packets.
2. Internet Layer - describes how packets are to be delivered.
3. Transport Layer - ensure the proper transmission of data.
4. Application Layer - application network processes. These processes include File Transfer
Protocol (FTP), Hypertext Transfer Protocol (HTTP), and Simple Mail Transfer Protocol
(SMTP).
..60..
11. Network Examples and Protocols
Part - IV
Explain in detail: 5 Marks
1. Explain about Internet, Intranet and Extranet.
❖ INTERNET:
➢ The Internet is a network of global connections – comprising private, public, business,
academic and government networks.
➢ It was developed by the Advanced Research Projects Agency (ARPA) of the U.S.
government in 1969. It was first recognized as the ARPANet.
❖ INTRANET:
➢ Intranet is a private network within an enterprise to share company data and
computing resources between the employees.
➢ It may consist of many interlinked local area networks.
➢ It includes connections through one or more gateway (connects two networks using
different protocols together known as protocol convertor) computers to outside
Internet.
❖ EXTRANET:
➢ Extranet is a private network that uses Internet technology and the public
telecommunication system to securely share business information with suppliers,
vendors, partners, customers, or other business.
2. Discuss about OSI model with its layers.
❖ OSI Layers:
1. Physical Layer:
➢ This is the 1st layer, it defines the electrical and physical specifications for devices.
2. Data Link Layer:
➢ It is the 2nd layer and it guarantees that the data transmitted are free of errors.
➢ This layer has simple protocols like “802.3 for Ethernet” and “802.11 for Wi-Fi”.
3. Network Layer:
➢ It is the 3rd layer determining the path of the data packets.
➢ This layer is responsible for routing of data packets using IP Addressing.
4. Transport Layer:
➢ It is the 4th layer that guarantees the transportation/sending of data successfully.
➢ It includes the error checking operation.
5. Session Layer:
➢ It is the 5th layer, identifies the established system session between different
network entities.
➢ It controls dialogues between computers .
6. Presentation Layer:
➢ It is the 6th layer that does the translation of data to the next layer.
➢ Encryption and decryption protocols occur in this layer such as, SSL (Secure
Socket Layer).
➢
..61..
11. Network Examples and Protocols
7.Application Layer:
➢ It is the 7th layer, which acts as the user interface platform comprising of software
within the system.
3. Difference between TCP/IP and OSI Reference Model.
TCP / IP OSI
Transmission Control Protocol / Internet Open System Inter Connection
protocol
TCP/IP is a set of protocols which governs OSI layer is general framework that enables
communications among all computers on network protocols along with software and
the Internet. systems to be developed based on general
set of guidelines.
TCP/IP protocol tells how information It describes the standards for the inter-
should be packaged, sent, and received, as computer communication.
well as how to get to its destination.
There are four layers of TCP/IP protocol. There are seven layers of OSI layer.
ADDITIONAL QUESTIONS
1. An extension of the ARPANET developed by the US government in 1969.
a) Advanced Research Projects Agency Network
b) American Research Projects Agency Network
c) Advanced Research Projects American Network
d) American Research Projects Aget Network
2. IOT is
a) Internet of Transports b) International Things
c) Internet of Tourism d) Internet of Things
3. “All Persons Should Try New Diet Plan” this statement is related to which of the following?
a) TCP/IP b) IP c) OSI layer d) FTP
4. Which generation released NMT?
a) First Generation (1G) b) Second Generation (2G)
c) Third Generation (3G) d) Fourth Generation (4G)
5. Which generation released GSM?
a) First Generation (1G) b)Second Generation (2G)
c)Third Generation (3G) d) Fourth Generation (4G)
6. Which generation released GPRS?
a) First to Second Generation b) Second to Third Generation
c)Third to fourth generation d) Fourth to fifth Generation
7. NMT stands for
a) NumericMethod of Communication
b) Normal Mobile Telephone Communication
c) Nordic Mobile Telephone Communication
d) Norway Mobile Telephone Communication
..62..
11. Network Examples and Protocols
8. GSM stands for
a) Global System for Mobile Communication
b) Global System for Mobile Corporation
c) Global Service for Mobile Communication
d) Giga Service for Mobile Communication
9. SIM stands for
a) SupplierIndentity Module b) Subscriber International Movement
c) Subscriber Indentity Module d) Subscriber Indentity Method
10. Expand TDMA
a) Trade Division Multiple Access b) Time Division Method Access
c) Time Division Multi Approaches d) Time Division Multiple Access
11. Expand CDMA
a) Commercial Division Multiple Access b) Code Division Multiple Access
c) Code Division Method of Accessing d) Common Division Multiple Access
12. GPRS stands for
a) General Packet Radio Service b) General Process of Radio Service
c) Global Packet Radio Service d) General Packet Random Service
13. Open System Interconnection (OSI) model was found in the year of__ ?
a) 1914 b) 1934 c) 1974 d) 2004
14. Which of the following OSI layer guarantees that the data transmitted are free of errors.
a) Application Layer b)N etwork Layer
c) Data Link Layer d) Presentation Layer
15. In the OSI model Encryption and decryption protocols occur at this layer
a)Application Layer b)Network Layer c)Data Link Layer d)Presentation Layer
16. Expand FTP
a) File Transfer Protocol b) File Transfer Procedure
c) File Transport Path d) Frame Transfer Protocol
17. Expand SMTP
a) Simple Mail Transfer Path b) Simple Mail Transfer Protocol
c) Simple Message Transfer Protocol d) Simple mail Transfer Procedure
18. List out the Application of Internet.
❖ Download programs and files ❖ File Sharing
❖ Social media ❖ E- Governance
❖ E-Mail ❖ Information browsing
❖ E-Banking ❖ Search the web addresses for access
❖ Audio and Video Conferencing through search engine
❖ E-Commerce ❖ Chatting and etc.
19. List out the Application of Intranet.
❖ Sharing of company policies/rules and regulations
❖ Access employee database
❖ Distribution of circulars/ Office Orders
..63..
11. Network Examples and Protocols
❖ Access product and customer data
❖ Sharing of information of common interest
❖ Launching of personal/ departmental home pages
❖ Submission of reports
❖ Corporate telephone directories.
20. List out the Application of Extranet.
❖ Customer communications ❖ Supply – chain managements
❖ Online education/ training ❖ Order status enquiry
❖ Account status enquiry ❖ Warranty registration
❖ Inventory enquiry ❖ Claims
❖ Online discussion ❖ Distributor promotions
21. What is a network protocol? Explain its types.
A network protocol is a set of rules that determine how data is transmitted between
different devices in the same network.
Types of networking protocols:
i. Network communication protocols:
It is the basic data communication protocol it includes of HTTP and TCP/ IP.
ii. Network security protocol
It confirms security over network communication and includes HTTPS, SFTP and SSL.
iii. Network management protocol:
It Provides network governance and maintenance and include ICMP and SNMP.
..64..
12 DOMAIN NAME SYSTEM (DNS)
Part – I
Choose the best answer: 1 Mark
1. Which of the following is used to maintain all the directories of domain names?
a) Domain name system b) Domain name space
c) Name space d) IP address
2. Which of the following notation is used to denote IPv4 addresses?
a) Binary b) Dotted-decimal c) Hexadecimal d) a and b
3. How many bits are used in the IPv6 addresses?
a) 32 b) 64 c) 128 d) 16
4. Expansion of URL is
a) Uniform Resource Location b) Universal Resource Location
c) Uniform Resource Locator d) Universal Resource Locator
5. How many types are available in URL?
a) 2 b) 3 c) 4 d) 5
6. Maximum characters used in the label of a node?
a) 255 b) 128 c) 63 d) 32
7. In the domain name, the sequence of labels is separated by
a) semicolon (;) b) dot (.) c) colon (:) d) NULL
8. . Which of the following initiates the mapping of domain name to IP address?
a) Zone b) Domain c) Resolver d) Name servers
9. Which is the contiguous area up to which the server has access?
a) Zone b) Domain c)Resolver d) Name servers
10. Root Name servers are maintained by
a) IANA b) ICANN c) WHOIS d) DNS
Part - II
Short Answers: 2 Marks
1. List any four domain names.
i) .com ii) .gov
iii) .org iv) .net
2. What is an IP address?
Internet Protocol (IP) address is simply the logical address in the network layer. IP address
is also used to find the host system in the whole network.
3. What is an URL?
URL (Uniform Resource Locator) is the address of a document on the Internet.
4. List out four URLs you know.
1. https://tnschools.gov.in/ 2. https://annauniv.edu/
3. https://www.icai.org/ 4. https://www.w3schools.com/
..65..
12. Domain Name System (DNS)
5. What is a zone?
Zone is a group of contiguous domains and sub domains. If the zone has a single domain,
then zone and domain are the same.
6. What is a resolver?
The resolver is a program which is responsible for initiating the translation of a domain
name into an IP address.
7. Write any four generic Top Level Domain.
1. .com (Commercial Organisation) 3. .gov Government (US)
2. .edu (Educational Institutions) 4. .org (Non-profit Organization)
8. Mention the components of DNS.
There are four important components in the Domain Name System. They are,
➢ Namespace ➢ Zone
➢ Name server ➢ Resolver
Part - III
Explain in Brief Answer: 3 Marks
1. Write a note on URL and its types.
➢ URL (Uniform Resource Locator) is the address of a document on the Internet.
➢ It is made up four parts : protocols, hostname, folder name and file name.
Example:
http:// cms.tn.gov.in/sites/default/files/press_release/pr070119a.jpg
..66..
12. Domain Name System (DNS)
There are two ways to represent the IP In IPv6 address, the 128 bits are divided into
addresses is Binary notation and Dotted- eight 16-bits blocks. Each block is then
decimal notation changed into 4-digit Hexadecimal numbers
✓ In binary notation the address is separated by colon symbols.
expressed as 32-bit binary values. For E.g.
E.g. 00111001 10001001 00111000 00000111 2001:0000:3231:DFE1:0063:0000:0000:FEFB
✓ In dotted-decimal notation the address
is written in decimal format separated
by dots(.).
For e.g. 128.143.137.144
3. What are the differences between Absolute URL and Relative URL?
Absolute URL Relative URL
The complete address of a document on The relative URL is the partial address of a
the Internet. document on the Internet.
It contains all the information that is It contains only a file name or a file name
required to find the files on the Internet. with folder name.
If any of the four parts is missing, then the We can use this type of URL when the file is
browser will not be able to link to the on the same server related to current
specific file. So, all the four parts are very document.
important in absolute URL.
4. Write a note on domain name.
➢ Domain name is the sequence of labels separated by dot (.).
➢ The domain name is always read from the leaf node to root node.
➢ The root node always represents NULL string.
Part - IV
Explain in detail: 5 Marks
1. Classify and explain the IP address and its classification.
➢ Internet Protocol (IP) address is simply the logical address in the network layer.
➢ IP address is also used to find the host system in the whole network.
➢ There are two types: IPv4 and IPv6.
❖ IPv4:
➢ The IPv4 address is a 32-bit unique address given to a computer on the network. The
number of addresses that can be formed in IPv4 is 232.
➢ There are two ways to represent the IP addresses is Binary notation and Dotted-decimal
notation.
i. In binary notation the address is expressed as 32-bit binary values.
Example: 00111001 10001001 00111000 00000111
ii. In dotted-decimal notation the address is written in decimal format separated by
dots(.).
Example: 128.143.137.144
..67..
12. Domain Name System (DNS)
10000000 10001111 10001001 10010000
1st Byte 2nd Byte 3rd Byte 4th Byte
= 128 = 143 = 137 = 144
128.143.137.144
Examples of IPv4
❖ IPv6:
➢ The IPv6 address is a 128-bit unique address given to a computer on the network. The
number of addresses that can be formed in IPv6 is 2128.
➢ In IPv6 address, the 128 bits are divided into eight 16-bits blocks. Each block is then
changed into 4-digit Hexadecimal numbers separated by colon symbols.
Example: 2001:0000:3231:DFE1:0063:0000:0000:FEFB.
128 Bits
Network prefix (64 bits) Host number (64 bits)
XXXX XXXX XXXX XXXX XXXX XXXX XXXX XXXX
X – Hexadecimal number (0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F)
XXXX → 0000 to FFFF
Examples of IPv6
2. Explain the Name server and its types.
➢ It is a software program that run on a physical system.
➢ It has the DNS database consisting of domain names and their corresponding IP
addresses. Name Server translates the domain name to IP address.
➢ While you searching for a website, Local Nameserver (provided by ISP) asks the different
name servers until one of them finds out the answer. At last, it returns IP address for that
domain name. Your computer is now connected to the requested webpage.
Types of Name Servers:
There are three types of Name Servers which control the entire Domain Name System:
1) Root Name Server - top level server which contains entire DNS tree, maintained by
ICANN. There are 13 servers.
2) Primary Name Server - contains a zone resource record. These records are
updatable by domain name holders.
3) Secondary Name Server – contains a copy of primary server files. This server has no
authority to update, but reduce the workload of primary server by sharing the
queries.
3. Explain how the DNS is working.
➢ When the user enters the URL in the browser, the system first checks its DNS cache for
the corresponding IP address.
..68..
12. Domain Name System (DNS)
➢ If the IP address is found in the cache, then the information is retrieved from cache. If not,
the system needs to query the resolver about the IP address from Internet Service
Provider (ISP).
➢ Each resolver has its own cache and if it is found in that then that information is retrieved.
If not, then the query is passed to next domain server i.e., TLD (Top Level Domain) which
reviews the request and direct the query to name servers associated with that specific
domain.
➢ Until the query is solved it is passed to next level domains. Finally, the IP address is
detected and the corresponding record is sent to the resolver.
➢ Then the resolver returns the record back to the computer browser Now the user can
view the webpages for the detected IP address.
..69..
12. Domain Name System (DNS)
7. URL address is made ______ parts
a) 2 b) 3 c) 4 d) 5
8. How many parts are there in the domain name system?
a) 2 b) 3 c) 4 d) 5
9. Each node in the DNS tree-like structure has a name, called a ___________.
a) Label b) Root c) Leaf d) Computer
10. The entire domain name may be at most ______characters long.
a) 61 b) 32 c) 128 d) 253
11. Expansion of ISP
a) Information Service Provider b) Internet Service Program
c) Internet Service Protocols d) Internet Service Provider
12. Containing zonal resource records ____
a) Root Name Server b) Primary Name Server
c) Secondary Name Server d) Domain name
13. Which assigns names and numbers for all Internet resources like domain names and IP
addresses.
a) Web Browser b) IANA c) ICANN d) DNS
14. It is the root element on the top. It can have a maximum of 128 levels starting from root
element taking the level 0 to level 127.
a) Domain Namespace b) Name server c) Zone d) Resolver
15. What is Domain Name System (DNS)?
Domain Name System (DNS) maintains all the directory of domain names and help us to
access the websites using the domain names. It translates the domain name into IP address.
16. What is label?
Label is a string which can have maximum of 63 characters. Each node in that level should
have unique label.
17. Write the Basic rules of Domain names.
➢ Domain name can consist of alphabets (a-z, A-Z) and the digits (0-9).
➢ Hyphens are allowed, but hyphens cannot be used as the first character of a domain
name. Spaces are not allowed.
➢ Special symbols (such as !, $, &, _ and so on) are not permitted.
➢ The entire domain name may be at most 253 characters long.
➢ Domain names are not case-sensitive.
18. What is Domain name space?
Domain name space is a tree like structure with root element on the top. It can have a
maximum of 128 levels starting from root element taking the level 0 to level 127.
19. What do you mean by ICANN?
ICANN, Internet Corporation for Assigned Names and Numbers is the Non-profit
Organization which assigns names and numbers for all Internet resources like domain names
and IP addresses.
..70..
13 NETWORK CABLING
Part – I
Choose the best answer: 1 Mark
1. ARPANET stands for
a) American Research Project Agency Network
b) Advanced Research Project Area Network
c) Advanced Research Project Agency Network
d) American Research Programs and Network
2. WWW was invented by
a) Tim Berners Lee b) Charles Babbage c) Blaise Pascal d) John Napier
3. Which cable is used in cable TV?
a) UTP cable b) Fibre optics c) Coaxial cable d) USB cable
4. Expansion of UTP is
a) Uninterrupted Twisted Pair b) Uninterrupted Twisted Protocol
c) Unshielded Twisted Pair d) Universal Twisted Protocol
5. Which medium is used in the optical fibre cables to transmit data?
a) Microwave b) infra-red c) light d) sound
6. Which of the following is a small peripheral device with a sim slot to connect the computers
to internet?
a) USB b) Dongles c) Memory card d) Mobiles
7. Which connector is used in the Ethernet cables?
a) RJ11 b) RJ21 c) RJ61 d) RJ45
8. Which of the following connector is called as champ connector?
a) RJ11 b) RJ21 c) RJ61 d) RJ45
9. How many pins are used in RJ45 cables?
a) 8 b) 6 c) 50 d) 25
10. Which wiring standard is used for connecting two computers directly?
a) straight Through wiring b) Cross Over wiring
c) Rollover wiring d) None
Part - II
Short Answers: 2 Marks
1. Write a note on co-axial cable.
➢ This cable is used to connect the television sets to home antennas.
➢ It has a copper wire inside and insulation is covered on the top of the copper wire to
provide protection to the cable.
➢ It is very difficult to install and maintain, because they are too big to carry and replace.
➢ This cable is used to transfer the information at 10 mbps speed.
➢ The cable is classified into thin-net and thick-net cables.
..71..
13. Network Cabling
2. What are the uses of USB cables?
➢ The Universal Serial Bus are used to connect keyboard, mouse and other peripheral
devices.
➢ Micro USB is a miniaturized version of the USB used for connecting mobile devices such
as smart phones, GPS devices and digital cameras.
3. What is an Ethernet port?
Ethernet port is an opening which is a part of an Ethernet card. It accepts RJ45 connector
with Ethernet cable. It is found on personal computers, laptops, routers, switches, hubs and
modems.
4. What is the use of Crimping tool?
The crimping tool is a physical tool which is used to connect the patch wire and the
Ethernet connector.
5. What are the types of twisted pair cables?
➢ Unshielded Twisted Pair (UTP)
➢ Shielded Twisted pair (STP)
6. What is meant by champ connector?
The RJ-21 connector is called as champ connector. The RJ-21 connector has 50 pins with
25 pins at one end and 25 pins at the other end.
Part – III
Explain in Brief Answer: 3 Marks
1. Write a note on crossover cables.
➢ Cross over cable is used to join two network devices of the same type like example two
PCs or two network devices.
➢ The Null modem Cables are the example of the crossover cables.
2. Write a short note on RJ45 connector.
➢ In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the interface
standard.
➢ The RJ45 connector is a small plastic cube. It has eight pins.
➢ It is connected to each end of the Ethernet cable. It is also known as 8P8C connector.
3. What is meant by null modem cable? Give the examples.
A cable interconnecting two devices directly is known as a null modem cable.
Example : RS-232 cable is also used for interconnecting two computers without modem.
4. What are the components involved in Ethernet cabling?
1. Patch Cable (Twisted pair) 2. RJ45 Connector
3. Ethernet Ports 4. Crimping Tool
5. What are the types of Fibre optic cables?
❖ Single- mode cables:
Used for long distance transmission and at a high cost
❖ Multimode cables:
Used for short distance transmission at a very low cost.
..72..
13. Network Cabling
Part - IV
Explain in detail: 5 Marks
1. What is meant by Registered Jack? Explain briefly the types of Jacks.
A Registered Jack commonly known as RJ is a network interface used for network
cabling, wiring and jack construction. The primary function of the registered jack is to connect
different data equipment and telecommunication devices.
The commonly used registered jacks are :
❖ RJ-11:
➢ It is the most popular modern form of registered jack.
➢ It is found in home and office used for landline phones.
➢ There are 6 pins where the two pins give the transmission configuration, the two pins
give the receiver configuration and the other two pins will be kept for reserved.
❖ RJ-14 and RJ-61:
➢ The RJ-14 is also used in telephone lines like RJ-11.
➢ It has 6 pins whereas the RJ-61 has 8 pins. RJ-61 uses the twisted pair cable to connect
the network devices.
❖ RJ-21:
➢ The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end.
➢ It is also called as champ connector or Amphenol connector. The Amphenol is a
connector manufacturer.
➢ The RJ-21 interface is typically used for data communication trucking applications.
2. Explain the components used in Ethernet cabling.
1. Patch Cable (Twisted Pair):
➢ These Cables are generally made up of 8 wires in different colors. Four of them are
solid colours, and the others are striped.
➢ Ethernet cables are normally manufactured in several industrial standards such as Cat
3, Cat 5, Cat 6, Cat 6e and cat 7. “Cat” simply stands for “Category,” and the following
number indicates the version. Latest version denotes faster and higher frequencies,
measured in Mhz.
➢ Increasing the size of the cable also lead to slower transmission speed.
2. RJ45 Connector:
➢ In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the
interface standard.
➢ The RJ45 connector is a small plastic cube. It has eight pins.
➢ It is connected to each end of the Ethernet cable. It is also known as 8P8C connector.
➢ These plugs (connector) are inserted into Ethernet port of the network card.
3. Ethernet Port:
➢ Ethernet port is an opening which is a part of an Ethernet card. It accepts RJ45
connector with Ethernet cable.
➢ It is found on personal computers, laptops, routers, switches, hubs and modems.
..73..
13. Network Cabling
➢ Once you inject the plug into the port the two led lights will glow in the computer,
one is green and another one is orange. The orange light will start blinking which
indicates that the Internet is connected.
4. Crimping Tool:
➢ Crimping is the process of joining two or more pieces of wire to hold each other.
➢ Joining RJ45 connector together with twisted pair cable at each end is an essential
process in Ethernet cabling which lead the cable to function properly.
➢ The crimping tool is a physical tool which is used to connect the patch wire and the
Ethernet connector.
3. Explain the types of network cables.
There are many types of cables available in the networking. Here we are going to discuss
about some types of cables.
1. Coaxial Cable:
➢ This cable is used to connect the television sets to home antennas.
➢ It has a copper wire inside and insulation is covered on the top of the copper wire to
provide protection to the cable.
➢ It is very difficult to install and maintain, because they are too big to carry and replace.
➢ This cable is used to transfer the information at 10 mbps speed.
➢ The cable is classified into thin-net and thick-net cables.
2. Twisted Pair Cable:
➢ It is a type of cable with two or more insulated wires twisted together. It has 8 wires
which are twisted to ignore electromagnetic interference.
➢ There are two types of twisted pair cables, Unshielded Twisted Pair (UTP) and
Shielded Twisted pair (STP).
3. Fiber Optic cable:
➢ This cable is made by using strands of glass. It uses pulses of light to send the
information. They are mainly used in Wide Area Network (WAN).
➢ These cables are placed in deep underground to avoid any damage to the cables.
There are two types of fiber optic cables available,
✓ Single-mode cables: Used for long distance transmission and at a high cost
✓ Multimode cables: Used for short distance transmission at a very low cost.
4. USB Cables:
➢ The Universal Serial Bus are used to connect keyboard, mouse and other peripheral
devices.
➢ Micro USB is a miniaturized version of the USB used for connecting mobile devices
such as smart phones, GPS devices and digital cameras.
➢ The latest version of USB is USB 3.0 which has the data transfer rate 4.85 Gbps.
5. Serial and Parallel cables:
➢ Before Ethernet cable was invented, the Serial and Parallel interface cables were used
to connect the system to the Internet.
➢ They were sometime used for PC-to-PC networking. E.g. RS232 cable.
..74..
13. Network Cabling
➢ The serial cable sends 1 bit at time whereas the parallel port sends 8 bit at a time.
6. Ethernet Cables:
➢ This is a type of twisted pair cable. It is the most common type of network cable
mainly used for connecting the computers or devices at home or office.
➢ This cable connects wired devices within the local area network (LAN) for sharing the
resources and accessing Internet.
ADDITIONAL QUESTIONS
1. Expansion for STP
a) Systemated Twisted Pair b) Security Twisted Protocol
c) Shielded Twisted Pair d) Serial Twisted Protocol
2. It uses pulses of light to send the information.
a) UTP cable b) Fiber Optic cable c) Coaxial Cable d) USB Cables
3. Which cable are used to connect keyboard, mouse and other peripheral devices.
a) UTP cable b) Fiber Optic cable c) Coaxial Cable d) USB Cables
4. RJ is
a) Registered Jack b) Registered Jnk
c) Registered Jammmer d) Regional Jack
5. Expansion of NIC
a) Network Internet Card b) Network Interface Card
c) Network Interface Cover d) Network Internet Cafe
6. What is Computer Networking?
Computer Networking is a group of interconnected computers or other devices for sharing
the data and resources among them.
7. What is Internet?
Internet is a global network that connects billons of computers across the world with each
other.
8. What is WWW (World Wide Web)?
The essential service of Internet is WWW (World Wide Web).That is a collection of billions
of web pages.
9. What is Ethernet card?
Ethernet card is a Network Interface Card (NIC) that allows computers to connect and
transmit data to the devices on the network.
10. Explain about Ethernet Cable Color Coding Techniques .
There are three types of wiring techniques to construct the Ethernet cable. It is also known as
color coding techniques.
1. Straight-Through Wiring:
➢ In general, the cables used for Ethernet
connections are “straight-through cables”.
➢ These cable wires are in the same means that
pin 1 of the plug on one end is connected to
pin 1 of the plug on the other end .
..75..
13. Network Cabling
➢ The straight through wiring cables are mostly used for connecting PC / NIC card to a
hub.
➢ This is a simple physical connection used in printers, computers and other network
interfaces.
2. Cross-over Wiring:
➢ If you require a cable to connect two computers or
Ethernet devices directly together without a hub,
then you will need to use a Crossover cable instead.
➢ Here, the pairs of Tx and Rx lines are crossed.
➢ It means pin 1 & 2 of the plug on one end are
connected with pin 3 & 6 of the plug on other end,
and vice versa (3 & 6 to pin 1 & 2).
3. Roll-over Wiring:
➢ Rollover cable is a type of null-modem cable that is
often used to connect a device console port to make
programming changes to the device.
➢ The roll over wiring has opposite pin arrangements, all
the cables are rolled over to different arrangements.
➢ In the rollover cable, the coloured wires are reversed on other end i.e. The pins on
one end are connected with other end in reverse order (i.e. pin 1 to 8, 2 to 7, 3 to 6,
4 to 5, 5 to 4, 6 to 3, 7 to 2, 8 to 1).
➢ Rollover cable is also known as Console cable.
..76..
14 OPEN SOURCE CONCEPTS
Part – I
Choose the best answer: 1 Mark
1. If the source code of a software is freely accessible by the public, then it is known as
a) freeware b) Firmware c) Open source d) Public source
2. Which of the following is a software program that replicates the functioning of a computer
network?
a) Network software b) Network simulation
c) Network testing d) Network calculator
3. Which of the following can document every incident that happened in the simulation and are
used for examination?
a) Net Exam b) Network hardware
c) Trace file d) Net document
4. Which is an example of network simulator?
a) simulator b) TCL c) Ns2 d) C++
5. Choose the Correct Pair from the following to build NS2
a) UNIX & TCL b) UNIX & a. C++ c) C++ & OTcl d) C++ & NS2
6. Which of the following is not a network simulation software?
a) Ns2 b) OPNET c) SSFNet d) C++
7. Which of the following is a open source network monitoring software?
a) C++ b) OPNET c) Open NMS d) OMNet++
8. Open NMS was released in …………………
a) 1999 b) 2000 c) 2003 d) 2004
Part - II
Short Answers: 2 Marks
1. What is Open Source Software?
Open Source Software is usually created and updated by many programmers ,Its refers to
making the source code of the software freely available for users or other developers to use
and make changes into the original repository or fork the project into and build a new one.
2. What is meant by network simulator?
In computer network, network simulation is a method where a software program models
the activities of a network
3. What is trace file?
A significant output of simulation is the trace files. Trace files can document every incident
that happened in the simulation and are used for examination.
4. Write short notes on NS2.
NS2 is the abbreviation of NETWORK SIMULATOR version 2. It was considered explicitly
for exploration in network communication and event- driven open-source simulator in
computer.
..77..
14. Open Source Concepts
5. Write short note on Open NMS?
➢ Open NMS (Network Management System) is a free and open-source initiative grade
network monitoring and management platform.
➢ In 2004 OpenNMS is written in Java and can run on all type of platform. It has won lot of
awards for best Open Source Software.
➢ The goal is for Open NMS to be actually distributed, scalable management application
platform for all features of the FCAPS (Fault, configuration, accounting, performance,
security) network management model. Presently the emphasis is on Fault and
Performance Management.
Part - III
Explain in Brief Answer: 3 Marks
1. What are the uses of Open source Network Software?
Especially when there are more systems are connected, the complexity is more, so we
need Network Software to Control, Analyse the Server, System, protocol, Network, Traffic flow
and reports about ups and downs of network parts.
Networking software provides the following important information.
➢ Notification message: Is the network administrator and user easily working on the
network and its hardware and software? Isn't it? It helps us to know.
➢ Warning message: Tells you where and when the error occurred.
2. Explain Free software.
➢ Free software is a concept developed in the 1980s by an MIT computer science
researcher, Richard Stallman who defined four conditions - as outlined by the nonprofit
Free Software Foundation. These “four freedoms” emphasize the ability of users to use
and enjoy software as they see fit.
➢ Freeware usually refers to proprietary software that users can download at no cost, but
whose source code cannot be changed.
3. List out the Popular Open Source Software.
❖ NS2 ❖ Open Office ❖ VLC
❖ OpenNMS ❖ 7zip GNUCash ❖ Mozilla FireFox
❖ Ubuntu ❖ GIMP ❖ Magento
❖ MySQL ❖ Blender ❖ PHP and
❖ PDF Creator ❖ Audacity ❖ Android
4. Write note on open source hardware.
➢ In this period of increased competition and cyber crimes, the computers used by
individuals or business organizations may have spy hardwares of rivals. Open source
hardware technology helps in such threats.
➢ In this technique we get the components of the hardware and its circuit diagram, so that
we can remove suspicious spyware if found.
5. Explain Types of Organisations related to Open Source.
❖ Apache Software Foundation ❖ Linux Foundation
❖ Free Software Foundation ❖ Open Source Initiative
..78..
14. Open Source Concepts
Part - IV
Explain in detail: 5 Marks
1. Differentiate Proprietary and Open-Source Software.
Proprietary Software Open-Source Software
It is owned by the individual or organization Open-Source Software is usually created and
updated by many programmers .
The makers of proprietary software have not It refers to making the source code of the
allowed the users or other developers to view or software freely available for users or other
edit the source code. developers to use and make changes into the
original repository or fork the project into and
build a new one.
The proprietary software is that it gives more Sometimes Lack of Responsibility, service and
control, support, training, security and stability problems related to hardware compatibility.
for user making the software reliable to the users
2. List out the Benefits of Open-Source Software.
➢ Communication tools.
➢ Distributed revision control systems.
➢ Bug trackers and task lists.
➢ Testing and debugging tools.
➢ There are many Open Source Softwares. so, we can select and use any software that suits
our needs.
➢ The complete options of the software can be used without any cost and restrictions.
➢ We can share our ideas with the team, write the required code and share it with many.
➢ As we can identify the programming techniques of group members, we can learn many
ideas and make our program writing skills more efficient.
➢ The coding in Open Source Softwares are being groomed by many enthusiastical
members of the group. So if we report problems that we have in the program they are
quickly mended by the group’s effort.
➢ As we can make changes to the Open Source Softwares, we can add the most required
features in the software.
➢ Many Open Source Software are very user friendly.
ADDITIONAL QUESTIONS
1. Which language was used to written openNMS?
a) C b) C++ c) Java d) Cobol
2. What is the Stands for GPL in GNU – GPL
a) General Public License b) General Public Library
c) General Proceedings of License d) General Profit License
3. Expansion of API
a) Advanced Program Interface b) Application Program Interests
c) Application Platform Interface d) Application Program Interface
..79..
14. Open Source Concepts
4. Stands for BOSS
a) Basic Operating System Solutions b) Bharat Operating System Services
c) Bharat Operating System Solutions d) Basic Operating System Services
5. Free software is a concept developed in the 1980s by an MIT computer science researcher
____
a) Richard Stallman b) Paul V. Mogabatris
c) John Postel d) Elan musk
6. Write short note on BOSS.
BOSS (Bharat Operating System Solutions) Operating System Developed in India by C-DAC
(Centre for Development of Advanced Computing) helps to prompt the use of Open-Source
Software in India. It supports many Indian Languages.
7. List out the Types of open-source license.
❖ Apache license 2.0
❖ BSD 3-Clause “New” or “Revised” License
❖ BSD 2-Clause “Simplified” or “Free BSD” License
❖ GNU General Public License (GPL)
..80..
15 E - COMMERCE
Part – I
Choose the best answer: 1 Mark
1. A company involved in E-Business if
a) it has many branches across the world.
b) it conducts business electronically over the Internet.
c) it sells commodities to a foreign country.
d) it has many employees.
2. Which of the following is not a tangible good?
a) Mobile Phone b) Mobile Apps
c) Medicine d) Flower bouquet
3. SME stands for
a) Small and medium sized enterprises b) Simple and medium enterprises
c) Sound messaging enterprises d) Short messaging enterprises
4. The dotcom phenomenon deals with ________
a) Textile industries b) Mobile phone companies
c) Internet based companies d) All the above
5. Which of the following is not correctly matched
a) The First Wave of Electronic Commerce: 1985 -1990
b) The Second Wave of Electronic Commerce: 2004 – 2009
c) The Third Wave of Electronic Commerce: 2010 – Present
d) Dotcom burst: 2000 – 2002
6. Assertion (A): The websites of first wave dotcom companies were only in English
Reason (R): The dotcom companies of first wave are mostly American companies.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
7. Off-shoring means
a) Work outsourced to a branch of its own company
b) Work outsourced to new employees
c) Work outsourced to a third party locally
d) Work outsourced to a third party outside its own country
8. G2G systems are classified into
a) Internal facing and External facing b) Internet and Extranet
c) First wave and Second wave d) Left facing and right facing
9. _______ host the e-books on their websites.
a) Bulk-buying websites b) Community websites
c) Digital publishing websites d) Licensing websites
..81..
15. E - Commerce
10. Which of the following is a characteristics of E-Commerce
a) Products can be inspected physically before purchase.
b) Goods are delivered instantly.
c) Resource focus supply side
d) Scope of business is global.
Part - II
Short Answers: 2 Marks
1. Define E-Commerce.
E-Commerce can be described as the process of buying or selling products, services or
information via computer networks.
2. Distinguish between E-Business and E-Commerce
E-Business E-Commerce
It is widespread. E-Commerce is a subset of E-Business.
E-Business entirely depends on the Internet E-Commerce can be described as the
such as procurement of raw materials, process of buying or selling products,
marketing, finance, manufacturing, selling services or information via computer
and negotiation. networks.
3. Differentiate tangible goods and intangible goods with example of your own.
➢ Tangibles products may be like printed books, CD’s and DVD’s, lamp .
➢ Intangible products may be like digital files, downloaded video games, music files are
movies which cannot be physically touch.
4. What is dotcom bubble and dotcom burst?
Dotcom Bubble:
The Dotcom Bubble was a historic excessive growth (excessive assumption) of economy
that occurred roughly between 1995 and 2000.
Dotcom Burst:
The Nasdaq-Composite stock market index, fell from 5046.86 to 1114.11. This is
infamously, known as the Dotcom Crash or Dotcom Burst.
5. Write a short note on out-sourcing.
If a company’s work is hired to another company, it would be termed as out-sourcing.
Part - III
Explain in Brief Answer: 3 Marks
1. Describe how E-Commerce is related to socio-technological changes.
➢ The growth of E-Commerce is also related to the socio-technological changes.
➢ The more, the medium becomes deep-rooted, the more, are the users drawn towards it.
Increase of users, increases the markets. As the markets expand, more business
organizations are attracted.
➢ The more businesses accumulate it create competition. The competition leads to
innovation; innovation in turn drives the development of technology; technology
facilitates E-Commerce’s growth.
..82..
15. E - Commerce
2. Write a short note on the third wave of E-Commerce.
➢ 2010 to Present The third wave is brought on by the mobile technologies.
➢ It connects users for real-time and on-demand transactions via mobile technologies.
➢ The term Web 3.0, summarize the various characteristics of the future Internet which
include Artificial Intelligence, Semantic Web, Generic Database etc.
3. Explain B2B module in E-Commerce.
➢ Business to Business (B2B) In B2B E-Commerce, commercial transactions take place
between different business organizations, through the Internet.
For example, a cycle company may buy tyres from another company for their cycles.
➢ When compared to other models, the value per transaction in B2B transaction is high,
because of bulk purchase. The company also might get the advantage of discounts on bulk
purchases.
➢ Out-sourcing and Off-shoring are generally associated with B2B E-Commerce.
4. Write a note on name-your-own-price websites.
➢ Name-your-own-price website are just like normal retail sites. These websites generate
revenue through affiliate links, sponsored advertisement or even a small commission in
every booking.
➢ The buyer negotiates with the retailer for a particular product or service.
Example : https://in.hotels.com/
5. Write a note on physical product dispute of E-Commerce.
➢ Physical product disputes are a major disadvantage in E-Commerce.
➢ E-Commerce purchases are often made on trust. This is because, we do not have physical
access to the product. Though Internet is an effective channel for visual and auditory
information it does not allow full scope for our senses.
➢ We can see pictures of the perfumes, but cannot smell their fragrance, we can see
pictures of a cloth, but not its quality.
➢ If we want to inspect something, we choose what we look at and how we look at it. But
in online shopping, we would see only the pictures the seller had chosen for us.
➢ People are often much more comfortable in buying the generic goods rather than unique
or complex things via the Internet.
Part - IV
Explain in detail: 5 Marks
1. List all the E-Commerce business models and explain any four briefly.
1. Business to Consumer (B2C):
➢ In B2C E-Commerce, commercial transactions take place between business firms and
their consumers. It is the direct trade between companies and end-consumers via the
Internet.
➢ B2C companies sell goods, information or services to customers through online in a
more personalized dynamic environment and is considered as real competitor for a
traditional storekeeper.
..83..
15. E - Commerce
➢ This mode is intended to benefit the consumer and can say B2C E-Commerce works
as ’retail store’ over Internet.
2. Business to Government (B2G):
➢ B2G is a business model that refers to business organizations sells products, services
or information to Governments or to its administrations.
➢ In other words, when a company get paid for its goods, services by the Government
through Internet it is called as B2G model.
e.g. The Government or its administration buys laptops for students.
3. Consumer to Business (C2B):
➢ C2B can be described as a form of E-Commerce where, the transaction is originated
by the consumers. The consumers will fix a requirement or specific price for a service
or a commodity.
➢ C2B model, is also called as reverse auction model.
➢ Here, customer bid his price for a service or a product. Then E-Commerce business
entity will match the requirement of the consumer to the best possible extent.
4. Government to Consumer (G2C):
➢ G2C in E-Commerce is very similar to C2G. Here the Government provides platform
for its citizens to avail its services and information through the Internet.
➢ The services may be issue of certificates through online.
e.g. https://csc.gov.in/governmenttocitizen.
2. Explain any five E-Commerce revenue models.
1. Auction website is a kind of website, that auctions items on the Internet and levies some
commission from the sales.
e.g. https://www.ebay.com/
2. Banner advertisement website displays advertisements of other companies in its
websites and thereby earns revenue.
3. Bulk-buying website collect a number of users together where everyone wants to buy
similar items - the site negotiates a discount with the supplier and takes commission.
e.g. https://www.alibaba.com/
4. Digital publishing sites effectively host the e-books or magazines on the web. They
make profits in a number of ways such as advertising, selling etc., https://wordpress.org/
5. Licensing sites allow other websites to make use of their software. For example, the
search engines which allow a visitor of the site to search within the website more easily.
For example, Google Search in IGNOU website
3. How would you differentiate a traditional commerce and E-Commerce?
Traditional Commerce E-Commerce
Traditional commerce is buying or selling E-Commerce carries out commercial
of products and services physically. transactions electronically on the Internet.
Customer can face to face identify, Neither customer nor merchant see the other.
authenticate and talk to the merchant.
..84..
15. E - Commerce
Physical stores are not feasible to be open It is always available on all time and all days of
at all times. the year. Products can be inspected physically
before purchase.
Products can be inspected physically Products can’t be inspected physically before
before purchase. purchase.
Scope of business is limited to particular Scope of business is global. Vendors can
area. expand their business Worldwide.
Resource focus Supply side. Resource focus Demand side.
Business Relationship is Linear. Business Relationship is End-to-end.
Marketing is one way marketing. One-to-one marketing.
Payment is made by cash, cheque, cards Payment system is mostly through credit card,
etc. debit card or fund transfer.
Most goods are delivered instantly. It takes time to transport goods.
ADDITIONAL QUESTIONS
1. Which company coined the Term E-Business in 1996?
a) ORACLE b) Google c) IBM d) Microsoft
2. The following business model can say works as ’retail store’ over Internet.
a) B2C E-commerce b) B2B E-commerce
c) B2G E-commerce d) C2B E-commerce
3. he following business model is also called as reverse auction model.
a) B2C E-commerce b) B2B E-commerce
c) B2G E-commerce d) C2B E-commerce
4. Write a short note on off-shoring.
If the work is outsourced to a company, which is outside its own country, it is called as
off-shoring.
5. Write about FinTech.
FinTech Financial technology is a collective term for technologically advanced financial
innovations. In simple words Fintech is a new finance industry that uses technology to improve
financial activity.
6. What is Teleputer?
Teleputer is Fusion of television, computer and telecom networking technologies.
7. Write The objective of G2B.
The objective of G2B is to reduce burdens on business, provide one-stop access to
information thereby boost the economy.
8. What are the Types of E-Commerce business models?
1. Business to Business (B2B) 6. Consumer to Government (C2G)
2. Business to Consumer (B2C) 7. Government to Business (G2B)
3. Business to Government (B2G) 8. Government to Consumer (G2C)
4. Consumer to Business (C2B) 9. Government to Government (G2G)
5. Consumer to Consumer (C2C)
..85..
15. E - Commerce
9. Explain The Development and Growth of Electronic Commerce.
❖ The First Wave of Electronic Commerce: 1995 -2003
➢ The Dotcom companies of first wave are mostly American companies. Thereby their
websites were only in English.
➢ The Dotcom bubble had attracted huge investments to first wave companies.
➢ network technology was in its beginning stage, the bandwidth and network security
were very low. Only EDI and unstructured E-mail remained as a mode of information
exchange between businesses.
➢ But the first wave companies enjoyed the first-move advantage and customers were
left with no option.
❖ The Second Wave of Electronic Commerce: 2004 – 2009
➢ The second wave is the rebirth of E-Commerce after the dotcom burst.
➢ The second wave is considered as the global wave, with sellers doing business in many
countries and in many languages.
➢ Language translation and currency conversion were focused in the second wave
websites. The second wave companies used their own internal funds and gradually
expanded their E-Commerce opportunities
➢ The rapid development of network technologies and interactive web (web 2.0, a
period of social media) offered the consumers more choices of buying.
➢ The increased web users nourished E-Commerce companies (mostly B2C companies)
during the second wave.
❖ Third Wave of E-Commerce: 2010 to Present
➢ 2010 to Present The third wave is brought on by the mobile technologies.
➢ It connects users for real-time and on-demand transactions via mobile technologies.
➢ The term Web 3.0, summarize the various characteristics of the future Internet which
include Artificial Intelligence, Semantic Web, Generic Database etc.
10. Write the Advantages and Disadvantages of E-Commerce.
❖ Advantages:
➢ E-Commerce system is operated on all days and all the day 24 x 7.
➢ Speed is a major advantage in E-Commerce. Advanced Electronic communications
systems allow messages to reach across the world instantaneously. Communication
delay is not a part of the Internet or E-Commerce world.
➢ The Internet is too easy to ‘shop around’ for products and services that may be
cheaper and more effective. It provides an opportunity to buy at reduced costs.
➢ The whole world becomes a shop for today’s customers. They can have wide choice
by comparing and evaluating the same product at different websites before making
a purchase decision.
➢ Customers can shop from home or anywhere at their convenience. They don’t need
a long wait to talk to a salesman. Payments can also be made through online.
❖ Disadvantages:
➢ In E-Commerce we should wait to get the product in hand.
..86..
15. E - Commerce
➢ Returning goods through online is believed to be an area of difficulty.
➢ Privacy issues are serious in E-Commerce.
➢ Physical product disputes are a major disadvantage in E-Commerce.
➢ This makes the customers turn back towards traditional supply chain arrangements
for perishable and non-durable goods.
➢ It is pretty hard to knock on their door to complain or seek legal recourse. Further,
even if the item is sent, it is easy to start bothering whether or not it will ever arrive
on time.
..87..
16 ELECTRONIC PAYMENT SYSTEMS
Part – I
Choose the best answer: 1 Mark
1. Based on the monetary value e payment system can be classified into
a) Mirco and Macro b) Micro and Nano
c) Maximum and Minimum d) Maximum and Macro
2. ______ refers to a payment made from one bank account to another bank account using
electronic methods.
a) Electronic payment b) Direct payment
c) Indirect payment d) None of the above
3. Assertion (A): Macro electronic payment systems support higher value payments.
Reason (R): Expensive cryptographic operations are included in macro payments
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
4. Which of the following is correctly matched
a) Credit Cards - pay before b) Debit Cards - pay now
c) Stored Value Card - pay later d) Smart card – pay anytime
5. ECS stands for
a) Electronic Clearing Services b) Electronic Cloning Services
c) Electronic Clearing Station d) Electronic Cloning Station
6. Which of the following is a online payment system for small payments.
a) Card based payment b) Micro electronic payment
c) Macro electronic payment d) Credit card payment
7. Which of the following is true about Virtual payment address (VPA)
a) Customers can use their e-mail id as VPA
b) VPA does not includes numbers
c) VPA is a unique ID
d) Multiple bank accounts cannot have single VPA
8. Pick the odd one in the credit card transaction
a) card holder b) merchant
c) marketing manager d) acquirer
9. Which of the following is true about debit card
i. debit cards cannot be used in ATMs
ii. debit cards cannot be used in online transactions
iii. debit cards do not need bank accounts
iv. debit cards and credit cards are identical in physical properties
a) i, ii, iii b) ii, iii, iv c) iii alone d) iv alone
..88..
16. Electronic Payment Systems
10. Match the following
List A List B A1 A2 A3 A4
A1) First Digit B1) Account number a B4 B3 B2 B1
A2) 9th to 15th Digit B2) MII Code b B2 B1 B3 B4
A3) First 6 Digits B3) BIN Code c B2 B3 B4 B1
A4) Last Digit B4) Check digit d B2 B4 B3 B1
Part - II
Short Answers: 2 Marks
1. Define electronic payment system.
The term electronic payment refers to a payment made from one bank account to another
bank account using electronic methods forgoing the direct intervention of bank employees.
2. Distinguish micro electronic payment and macro electronic payment.
Micro electronic payment Macro electronic payment
It is an on-line payment system designed to Macro electronic payment systems support
allow efficient and frequent payments of payments of higher value.
small amounts.
the communication and computational The security requirements are more
costs are minimized here. rigorous in macro payment systems because
of huge money transactions.
3. Explain the concept of e-wallet.
Electronic wallets (e-wallets) or electronic purses allow users to make electronic
transactions quickly and securely over the Internet through smartphones or computers. The
electronic wallet functions almost the same as a physical wallet in term that it holds our
money.
4. Write a short note on credit card?
Credit card is an electronic payment system normally used for retail transactions. A credit
card enables the bearer to buy goods or services from a vendor, based on the cardholder’s
promise to the card issuer to payback the value later with an agreed interest.
5. What is smart card?
The modern version of card-based payment is smart cards. The advantage of Smart cards
is that it can provide identification, authentication, data storage and application processing.
Part - III
Explain in Brief Answer: 3 Marks
1. Define micro electronic payment and its role in E-Commerce.
❖ Micro electronic Payment Systems is an on-line payment system designed to allow
efficient and frequent payments of small amounts.
❖ The majority of micro electronic payment systems are designed to pay for simple goods
on the Internet. e.g., subscriptions of online games, read journals, listen to a song or
watch a movie online etc.
..89..
16. Electronic Payment Systems
2. Compare and contrast the credit card and debit card.
Similarity of credit card and debit card
❖ The way of using debit cards and credit cards is generally the same.
❖ The debit card and credit card are identical in their physical properties.
Difference between credit card and debit card:
❖ Credit card:
➢ Normally used for retail transactions.
➢ The credit card issuer allows you to spend the money.
➢ The card issuer to payback the value later with an agreed interest.
❖ Debit card:
➢ Debit Card is an electronic payment card where the transaction amount is deducted
directly from the card holder’s bank account upon authorization.
➢ Generally, debit cards function as ATM cards and act as a substitute for cash.
3. Explain briefly Anatomy of a credit card.
1. Publisher: Emblem of the issuing bank.
2. Credit card number: The modern credit card number
has 16-digit unique identification number.
3. Name of the cardholder: It is visibly embossed on the
front side of the card.
4. EMV chip: It is integrated chip in addition to magnetic
stripe to store cardholder’s information.
5. RFID symbol: It indicates that it is a contactless
smartcard.
6. Expiration month and year: The card is valid until the
last day of the month printed on it.
7. Card brand logo: It is the name of the credit card
network company. Eg: Visa, MasterCard and Rupay
8. Magnetic stripe: It is a magnetic material containing
encrypted data about the card holder and account number.
9. Hologram: Hologram is a security feature that prevents duplication.
10. Signature: It is cardholder’s signature at the back of the card.
11. CVC/CVV: Card Verification code/ value is a 3-digit code usually printed to the left of
signature pane validates the card.
4. 4. Briefly explain the stored value card and its types.
➢ Stored value card is a type of debit card that is pre-loaded with certain amount(value),
with which a payment is made. It is a card that has default monetary value onto it.
➢ The card may be disposed when the value is used, or recharged to use it again.
➢ The major advantage of stored value card is that customers don’t need to have a bank
account to get prepaid cards.
..90..
16. Electronic Payment Systems
There are two varieties for stored value card.
1. Closed loop (single purpose): e.g. chennai metro rail travel card.
2. Open loop (multipurpose): e.g. Visa gift cards
5. What is electronic fund transfer?
Electronic Funds Transfer (EFT) is the “electronic transfer” of money over an online
network. The amount sent from the sender’s bank branch is credited to the receiver’s bank
branch on the same day in batches.
EFT is a widely used method for moving funds from one account to another in B2B
business models.
Part - IV
Explain in detail: 5 Marks
1. Explain the key players of a credit card payment system.
1. Bearer:
The holder of the credit card account who is responsible for payment of invoices in
full (transactor) or a portion of the balance (revolver) the rest accrues interest and carried
forward.
2. Merchant:
Storekeeper or vendor who sell or providing service, receiving payment made by its
customers through the credit card.
3. . Acquirer:
Merchant’s bank that is responsible for receiving payment on behalf of merchant
send authorization requests to the issuing bank through the appropriate channels.
4. Credit Card Network:
It acts as the intermediate between the banks. The Company responsible for
communicating the transaction between the acquirer and the credit card issuer. These
entities operate the networks that process credit card payments worldwide and levy
interchange fees. E.g. Visa, MasterCard, Rupay
5. Issuer:
Bearer’s bank, that issue the credit card, set limit of purchases, decides the approval
of transactions, issue invoices for payment, charges the holders in case of default and
offer card-linked products such as insurance, additional cards and rewards plan.
2. Write a note on a. Internet banking b. Mobile banking
a. Internet banking:
➢ Internet banking is a collective term for E-banking, online banking, virtual banking
(operates only on the Internet with no physical branches), direct banks, web banking and
remote banking.
➢ Internet banking allows customers of a financial institution to conduct various financial
transactions on a secure website operated by the banking institutions. This is a very fast
and convenient way of performing any banking transactions.
➢ The online banking system will typically connect to the core banking system operated by
customers themselves (Self-service banking).
..91..
16. Electronic Payment Systems
➢ It can be used from anywhere in the world and at any time.
➢ Apart from regular transactions, Internet banking portal provides complete control over
all banking demands such as available balance, transaction statements, recent
transactions, bill payment, blocking a card in case of theft or loss, information about other
bank products like payment cards, deposits, loans etc.
b. Mobile banking:
➢ Mobile banking is another form of net banking. The term mobile banking (also called m-
banking) refers to the services provided by the bank to the customer to conduct banking
transactions with the aid of mobile phones. These transactions include balance checking,
account transfers, payments, purchases, etc.
➢ Transactions can be done at anytime and anywhere.
➢ These transactions include balance checking, account transfers, payments, purchases,
etc. Transactions can be done at anytime and anywhere.
3. Explain in detail : Unified payments interface.
➢ Unified Payments Interface (UPI) is a real-time payment system developed by National
Payments Corporation of India (NCPI) to facilitate inter-bank transactions. It is simple,
secure and instant payment facility.
➢ This interface is regulated by the Reserve Bank of India and used for transferring funds
instantly between two bank accounts through mobile (platform) devices.
➢ UPI withdraws and deposits funds directly from requested. It also provides the “peer to
peer” collect request which can be scheduled and paid as per requirement and
convenience.
✓ UPI applications use two types of address - global and local.
❖ Global address includes bank account numbers and IFSC.
❖ Local address is a virtual payment address
➢ Virtual payment address (VPA) also called as UPI-ID, is a unique ID similar to email id
(e.g. name@bankname).
➢ VPA replaces bank account details thereby completely hides critical information.
➢ The MPIN (Mobile banking Personal Identification number) is required to confirm each
payment.
➢ UPI allows operating multiple bank accounts in a single mobile application.
❖ Advantages:
✓ Immediate money transfers through mobile device round the clock 24 x 7.
✓ Can use single mobile application for accessing multiple bank accounts.
✓ Single Click Authentication for transferring of fund.
✓ It is not required to enter the details such as Card no, Account number, IFSC etc. for
every transaction.
✓ Electronic payments will become much easier without requiring a digital wallet or
credit or debit card.
..92..
16. Electronic Payment Systems
ADDITIONAL QUESTIONS
1. Which number is required to confirm each payment?
a) Passcode b) MPIN c) OTP d) Password
2. Expansion of MPIN.
a) Mobile Banking Personal Identification Number
b) MovementBanking Personal Identification Number
c) Mobile Banking Payment Identification Number
d) Mobile Banking Personal Index Number
3. Expansion of RTGS
a) Real Time Gross Services b) Retail Transfer Gross Settlement
c) Retail Trade Gross Settlement d) Real Time Gross Settlement
4. Expansion of IFSC
a) Indian Financial System Code b) Indian Financial Service Code
c) Internet Financial System Coding d) International Financial System Code
5. Expansion of UPI
a) Universal Payments Interface b) Unified Payments Interchange
c) Unified Payments Interface d) Universal Payroll Interface
6. Expansion of VPA
a) Visual payment address b) Virtual payment address
c) Virtual payment amount d) Virtual payable amount
7. Expansion of COD
a) Cash On Delivery b) Cash on Demand
c) Call on Demand d) Call on Delivery
8. Cash on delivery (COD) also called as ____________.
a) Collection on Delivery b) Cash on Demand
c) Cash on Deposit d) Collection on Demand
9. What is a Payment cards?
Payment cards are plastic cards that enable cashless payments. They are simple
embossed plastic card that authenticates the card holder on behalf of card issuing company,
which allows the user to make use of various financial services. More than 90% of online
payments are card-based payments.
10. List out widely used card-based payment systems.
1. Credit card-based payment systems (pay later)
2. Debit card-based payment systems (pay now)
3. Stored value card-based payment systems (pay before)
11. What is an Electronic Clearing Services (ECS) ?
Electronic Clearing Service can be defined as repeated transfer of funds from one
bank account to multiple bank accounts or vice versa using computer and Internet
technology.
..93..
16. Electronic Payment Systems
12. What is a Real Time Gross Settlement?
Real Time Gross Settlement system (RTGS) is a payment system particularly used for the
settlement of transactions between financial institutions, especially banks. As name indicates,
RTGS transactions are processed at the real- time. RTGS payments are also called as push
payments that are initiated by the payer.
13. What are the ways can be implemented in Mobile Banking operations?
❖ Contacting the call center.
❖ Automatic IVR telephone service.
❖ Using a mobile phone via SMS.
❖ WAP technology.
❖ Using Smartphone applications.
14. Write the steps to transfer fund using net banking.
Step 1: Login to net banking account using unique user name and password provided by the
bank earlier.
Step 2: Add the beneficiary as a payee to enable transfer of fund. The following details like
Account Number, Name, IFSC about the beneficiary are to be filled in the ‘Add New
Payee’ section.
Step 3: Once the beneficiary is added, choose RTGS / NEFT / IMPS as mode of Fund
Transfer.
Step 4: Select the account to transfer money from, select the payee, enter the amount to be
transferred and add remarks (optional).
Step 5: Click on submit.
Step 6: Enter the OTP received to mobile number linked to the corresponding account to
complete the transaction.
..94..
17 E-COMMERCE SECURITY SYSTEMS
Part – I
Choose the best answer: 1 Mark
1. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as
a) Friendly fraud b) Clean fraud
c) Triangulation fraud d) Cyber squatting
2. Which of the following is not a security element involved in E-Commerce?
a) Authenticity b) Confidentiality
c) Fishing d) Privacy
3. Asymmetric encryption use ___________ keys for encryption and decryption
a) Same b) Different
c) Positive d) Negative
4. The security authentication technology includes
i) Digital Signatures
ii) Digital Currency
iii) Digital Image
iv) Digital Certificates
a) i & iv b) ii & iii
c) i, ii & iii d) all the above
5. PGP stands for
a) Pretty Good Privacy b) Pretty Good Person
c) Private Good Privacy d) Private Good Person
6. _______ protocol is used for securing credit cards transactions via the Internet
a) Secure Electronic Transaction (SET) b) Credit Card Verification
c) Symmetric Key Encryption d) Public Key Encryption
7. Secure Electronic Transaction (SET) was developed in
a) 1999 b) 1996 c) 1969 d) 1997
8. The websites secured by Secure Socket Layer protocols can be identified using
a) html:// b) http:// c) htmls:// d) https://
9. ______ is the process of converting plain text into meaningless cipher text
a) Encryption b) Decryption
c) Digital certificate d) Digital signature
10. Which of the following is true about Ransomware
a) Ransomware is not a subset of malware
b) Ransomware deletes the file instantly
c) Typopiracy is a form of ransomware
d) Hackers demand ransom from the victim
..95..
17. E-Commerce Security Systems
Part - II
Short Answers: 2 Marks
1. Write about information leakage in E-Commerce.
➢ The content of the transaction between the vendor and customer is stolen by the third
party.
➢ The documents provided by the merchant to the customer or vice versa are illegally used
by the other.
This intercepting and stealing of online documents is called information leakage.
2. Write a short note on typo piracy.
➢ Typo piracy is a variant of Cyber Squatting. Some fake websites try to take advantage of
users’ common typographical errors in typing a website address and direct users to a
different website.
➢ Such people try to take advantage of some popular websites to generate accidental traffic
for their websites. e.g. www.goggle.com, www.faceblook.com
3. Write about phishing.
Phishing is also a E-Commerce threat in which a target is contacted by e-mail, telephone
or text message by someone who pretend himself as a genuine authority. They try to trap
individuals to provide sensitive data such as, banking and credit card details, OTP, PIN or
passwords. Once they succeed, the results would lead to devastating acts such as identity theft
and financial loss.
4. List the different types of security technologies in E-Commerce.
❖ Encryption technology
❖ Authentication technology
❖ Authentication protocols
5. What is Digital signature?
➢ A digital signature is a mechanism that is used to verify that a particular digital document,
message or transaction is authentic.
➢ It provides the receiver the guarantee that the message was actually generated by the
sender.
➢ It also confirms that the information originated from the signer and has not been altered
by a cracker in the middle.
Part - III
Explain in Brief Answer: 3 Marks
1. What is E-Commerce Security system?
E-Commerce security is a set of protocols that safely guide E-Commerce transactions
through the Internet.
2. List any two E-Commerce Security Threats.
➢ Information leakage
➢ Tampering
3. Write a note on asymmetric key encryption.
➢ Different keys are used for encryption and decryption.
..96..
17. E-Commerce Security Systems
➢ The size of cipher text is always greater than plain text.
➢ Algorithms like RSA, ECC, DSA use asymmetric key encryption.
➢ Provides confidentiality, authenticity and non-repudiation.
4. Write a note on digital certificate.
A digital certificate is an electronic document used to prove the ownership of a public key.
This certificate includes the information about the sender’s identity, digital signature and a
public key.
Digital certificates are issued by recognized Certification Authorities (CA). Common digital
certificate systems are X.509 and PGP (Pretty Good Privacy).
5. Write about plain text and cipher text.
➢ Plain text is the unencrypted information also called as input chip.
➢ Cipher text is the encrypted data usually the output of an encryption algorithm.
Part - IV
Explain in detail: 5 Marks
1. Write about dimensions of E-Commerce Security.
➢ Authenticity: conforming genuineness of data shared.
➢ Availability: prevention against data delay or removal.
➢ Completeness: unification of all business information.
➢ Confidentiality: protecting data against unauthorized disclosure.
➢ Effectiveness: effective handling of hardware, software and data.
➢ Integrity: prevention of the data being unaltered.
➢ Non-repudiation: prevention against violation agreement after the deal.
➢ Privacy: prevention of customers’ personal data being used by others.
➢ Reliability: providing a reliable identification of the individuals or businesses.
➢ Review ability: capability of monitoring activities to audit and track the operations.
2. Differentiate symmetric key and asymmetric key encryption.
Symmetric Key Encryption Asymmetric Key Encryption
Same key is used for both encryption and Different keys are used for encryption and
decryption decryption
Speed of encryption or decryption is very Speed of encryption or decryption is
fast comparatively slow
Plain text and cipher text are of same size The size of cipher text is always greater than
plain text.
Algorithms like DES, AES, RC4 uses Algorithms like RSA, ECC, DSA use
symmetric key encryption asymmetric key encryption
..97..
17. E-Commerce Security Systems
3. Explain Authentication protocols.
❖ Secure Electronic Transaction :
➢ Secure Electronic Transaction (SET) is a security protocol for electronic payments
with credit cards, in particular via the Internet.
➢ SET was developed in 1996 by VISA and MasterCard, with the participation of GTE,
IBM, Microsoft and Netscape.
➢ The implementation of SET is based on the use of digital signatures and the
encryption of transmitted data with asymmetric and symmetric encryption
algorithms. SET also use dual signatures to ensure the privacy.
❖ Secure Sockets Layers:
➢ The most common Cryptographic protocol is Secure Sockets Layers (SSL). SSL is a
hybrid encryption protocol for securing transactions over the Internet.
➢ The SSL standard was developed by Netscape in collaboration with MasterCard,
Bank of America, MCI and Silicon Graphics. It is based on a public key cryptography
process to ensure the security of data transmission over the internet.
➢ Its principle is to establish a secure communication channel (encrypted) between a
client and a server after an authentication step.
➢ Today, all browsers in the market support SSL, and most of the secure
communications are proceeded through this protocol. SSL works completely hidden
for the user, who does not have to intervene in the protocol.
➢ The only thing the user has to do is make sure the URL starts with https:// instead
of http:// where the “s” obviously means secured. It is also preceded by a green
padlock.
ADDITIONAL QUESTIONS
1. Expansion of SET
a) Secure Electronic Transaction b) Secure Electronic Transfer
c) Secure Electric Transaction d) Systematic Electronic Transaction
2. SSL stands for
a) Secure Sockets Layout b) Secure Sockets Layers
c) Sockets Secure Layers d) Secured Sockets Laboratories
3. Write short note on Tampering.
When hackers grasp the data transmitted on the network, it can be falsified in the middle
through various technical means, and then sent to the destination, thereby destroying the
authenticity and integrity of the data.
4. What is Distributed Denial of Service (DDoS) Attacks?
It is a process of taking down an E-Commerce site by sending continuous overwhelming
request to its server. This attack will be conducted from numerous unidentified computers
using botnet. This attack will slow down and make the server inoperative. DDoS attacks is also
called as network flooding.
..98..
17. E-Commerce Security Systems
5. Write short note on Cyber Squatting.
Cybersquatting is the illegal practice of registering an Internet domain name that might
be wanted by another person in an intention to sell it later for a profit.
Cyber squatters also involve in trading on the reputation and goodwill of such third parties
by inducing a customer to believe that it is an official web page.
6. What do you mean by certificate authority?
The certificate authority maintains a database of public keys called repository so that it
can verify the user with digital signatures. Expired certificates are usually deleted from the
database by the certificate authority.
7. What is Hacking ?
Hacking refers to unauthorized intrusion into a computer or a network. That is to say
breaking security to gain access to a website illegally and intercept confidential information.
..99..
18 ELECTRONIC DATA INTERCHANGE - EDI
Part – I
Choose the best answer: 1 Mark
1. EDI stands for
a) Electronic Details Information b) Electronic Data Information
c) Electronic Data Interchange d) Electronic Details Interchange
2. Which of the following is an internationally recognized standard format for EDI?
a) TSLFACT b) SETFACT c) FTPFACT d) EDIFACT
3. Which is the first industry-specific EDI standard?
a) TDCC b) VISA c) Master d) ANSI
4. Which of the following is a type of EDI?
a) Direct EDI b) Indirect EDI c) Collective EDI d) Unique EDI
5. Who is called as the father of EDI?
a) Charles Babbage b) Ed Guilbert c) Pascal d) None
Part - II
Short Answers: 2 Marks
1. Define EDI.
The Electronic Data Interchange (EDI) is the exchange of business documents between
one trade partner and another electronically. It is transferred through a dedicated channel or
through the Internet in a predefined format without much human intervention.
2. List few types of business documents that are transmitted through EDI.
❖ Delivery notes ❖ Advance ship notice
❖ Invoices ❖ Functional acknowledgements
❖ Purchase orders
3. Write any two EDI Standards.
❖ Basic standards
❖ Code standards
❖ Message standards
❖ Document standards
❖ Management standards
❖ Application standards
❖ Communication standards
❖ Security standards.
..100..
Part - III
Explain in Brief Answer: 3 Marks
1. Write a short note on EDI via VAN.
➢ EDI via VAN (Value Added Network) is where EDI documents are transferred with the
support of third-party network service providers.
➢ Many businesses prefer this network model to protect them from the updating ongoing
complexities of network technologies.
2. List the various layers of EDI .
1. Semantic layer 3. Transport layer
2. Standard translation layer 4. Physical layer
3. Write a note on UN/EDIFACT.
➢ United Nations / Electronic Data Interchange for Administration, Commerce and
Transport (UN / EDIFACT) is an international EDI - standard developed under the
supervision of the United Nations.
➢ In 1987, the UN / EDIFACT syntax rules were approved as ISO: ISO9735 standard by the
International Organization for Standardization.
➢ EDIFACT includes a set of internationally agreed standards, catalogues and guidelines for
electronic exchange of structured data between independent computer systems.
➢ It is a cross-industry, standard data format of electronic data for commercial transactions.
➢ Maintenance and further development of this standard goes through the United Nations
Center for Trade Facilitation and Electronic Business (UN/CEFACT), which is affiliated to
the UN Economic Commission for Europe (UNECE).
Part - IV
Explain in detail: 5 Marks
1. Briefly explain types of EDI.
❖ Direct EDI/Point-to-Point:
➢ It is also called as Point-to-Point EDI. It establishes a direct connection between
various business stakeholders and partners individually.
➢ This type of EDI suits to larger businesses with a lot of day-to-day business
transactions.
❖ EDI via VAN:
➢ EDI via VAN (Value Added Network) is where EDI documents are transferred with
the support of third-party network service providers.
➢ Many businesses prefer this network model to protect them from the updating
ongoing complexities of network technologies.
❖ EDI via FTP/VPN, SFTP, FTPS:
➢ When protocols like FTP/VPN, SFTP and FTPS are used for exchange of EDI based
documents through the Internet or Intranet it is called as EDI via FTP/VPN, SFTP,
FTPS.
❖ Web EDI:
..101..
➢ Web based EDI conducts EDI using an web browser via the Internet. Here the
businesses are allowed to use any browser to transfer data to their business
partners. Web based EDI is easy and convenient for small and medium organizations.
❖ Mobile EDI:
➢ When smartphones or other such handheld devices are used to transfer EDI
documents it is called as mobile EDI.
➢ Mobile EDI applications considerably increase the speed of EDI transactions.
2. What are the advantages of EDI?
❖ EDI was developed to solve the problems inherent in paper-based transaction processing
and in other forms of electronic communication.
❖ Implementing EDI system offers a company greater control over its supply chain and allow
it to trade more effectively.
❖ It also increases productivity and promotes operational efficiency.
❖ The following are the other advantages of EDI.
➢ Improving service to end users
➢ Increasing productivity
➢ Minimizing errors
➢ Slashing response times
➢ Automation of operations
➢ Cutting costs
➢ Integrating all business and trading partners
➢ Providing information on process status
➢ Optimizing financial ratios
ADDITIONAL QUESTIONS
1. In ___________ first EDI standards were released by TDCC.
a) 1975 b) 1965 c) 2005 d)1985
2. The first industry-specific EDI standard was the ___________published by the Transportation
Data coordinating Committee in 1975.
a) EFT b) TDCC c) UN/EDIFACT d) ANSI X12
3. The TDCC is renamed as Electronic Data Interchange Association (EDIA) in the year of__ ?
a) 1968 b) 1988 c) 1978 d) 2008
4. In 1985, UN created _______to assist with the global reach of technology in E-Commerce.
a) EFT b) TDCC c) UN/EDIFACT d) ANSI X12
5. Every EDI message consists of _______ English Alphabets.
a) 6 b) 7 c) 8 d) 5
..102..