0% found this document useful (0 votes)
56 views32 pages

Class 11th IT All Chapters Notes

The document discusses various aspects of computer organization, including characteristics of computers, types of memory, and the roles of different components such as the ALU and CU. It also covers networking concepts, including types of networks, communication methods, and devices like hubs, switches, and routers. Additionally, it provides troubleshooting steps for common computer issues and explains the importance of disk management and network connectivity.

Uploaded by

7828veer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views32 pages

Class 11th IT All Chapters Notes

The document discusses various aspects of computer organization, including characteristics of computers, types of memory, and the roles of different components such as the ALU and CU. It also covers networking concepts, including types of networks, communication methods, and devices like hubs, switches, and routers. Additionally, it provides troubleshooting steps for common computer issues and explains the importance of disk management and network connectivity.

Uploaded by

7828veer
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 32

Chapter 1 - Computer Organization

1. What are the different characteristics of a Computer?

Answer – The different characteristics of a computer are –

a. Speed – Computers are their ability to process data and instructions at a very
high speed.

b. Versatility – is the ability of a computer to do a variety of jobs at the same time.

c. Accuracy – Not only does the machine perform varied jobs with high speed, but
also does them with high precision and accuracy.

d. Diligence – Another noteworthy feature of computers is its ability to perform the


same task repeatedly over and over again without getting bored.

e. Memory – One of the notable features of a computer is its memory. However,


the computer’s main memory is volatile, i.e., it is lost when we switch off the com-
puter.

f. Storage – Huge amounts of data and information can be stored in a computer for
future retrieval. The human memory is limited and fades away with time, which is
not true for a computer.

2. What are the different memories in the computer system?


Answer – There are two different type of memory in computer system –
a. Primary Memory
b. Secondary memory

Primary Memory – Data stored in Primary Memory is directly accessible by the


CPU. The inputs received in the above steps are stored in the computer memory,
called random access memory (RAM). This storage is relatively fast and expensive
as compared to the secondary storage.

Secondary Memory – The memory which is external to the computer system


forms the secondary storage, for example, the magnetic tapes, compact disks, pen
drives are all examples of the secondary storage. These are not directly connected
to the CPU.

3. What are the different types of RAM?


Answer – RAM is a temporary storage device it is also known as Volatile memory.
RAM is divided into two type –

1|Page
• DRAM
• SRAM

4. What is the difference between SRAM and DRAM?


Answer – SRAM is a memory semiconductor that is more energy-efficient and
faster than DRAM. A memory device called a DRAM can store more data than an
SRAM chip, but it also consumes more power.

5. What is Cache Memory?


Answer – Cache memory is a particularly fast memory that helps the CPU keep up
with its high speed. It serves as a buffer and is often positioned between the CPU
and primary memory. It is quite pricey but decreases the average access time to
data from the main memory.

6. Briefly describe the roles of the ALU and CU?


Answer –
ALU – Arithmetic Logic Unit is referred to as ALU. It is a crucial component of the
CPU. It does all fundamental arithmetic operations, including addition, subtraction,
multiplication, and division, as well as logical operations.

CU – Control Unit is referred to as CU. It is one of the CPU’s core components.


Choosing the most effective approach to work is the major responsibility of the CU.
It directs all associated operations to the various processing components.

7. Establish a distinction between input and output devices.


Answer – An output device is connected to a computer that receives incoming
data, whereas an input device is connected to a computer that puts out data to the
computer. The output device copies or displays the data that was sent by the input
device to the computer for processing.

8. Describe the function of cache memory.


Answer – The effectiveness of data retrieval is increased by cache memory, which
is crucial. It saves information that the CPU will probably need later on, such as
data or programme instructions, that are frequently employed in the execution of
programmes.

9. Describe the computer’s storage components.


Answer – A storage device is any piece of computer hardware that is used to store,
transfer, or extract data files and objects. Information can be temporarily or perma-
nently stored by storage devices. They could be internal to a computer, server, or
other computing equipment or external.

10. Write a short note on Optical storage devices?


Answer – Low-power laser beams are used in optical storage, an electronic stor-
age media, to store and retrieve digital (binary) data. In optical storage technology,

2|Page
a laser beam creates tiny pits that are placed in a spiral pattern on the surface of an
optical, or laser, disc to encode digital data.

11. Explain the role of the Power Supply Unit.


Answer – A power supply unit (PSU) transforms mains AC electricity into low-volt-
age, regulated DC power for a computer’s internal components. Switched-mode
power supply are used in every modern personal computer.

12. List the various functions of an operating system.


Answer – The various functions of an operating system are –

a. Communication manager – The operating system handles the system’s com-


munication requirements, whether they include connecting to the internet or periph-
eral devices.

b. Resource Management – The management of a computer system’s resources


has a significant impact on how well it functions. The resources we discuss in this
article include the computer’s memory, CPU time, files, secondary storage, in-
put/output devices, and more.

c. Process Management – A programme that is now running in memory or waiting


for the CPU is referred to as a process. There are numerous processes running
simultaneously in a computer. All of the processes running on the computer are
managed, regulated, and scheduled by the OS.

d. Memory Management – The memory management section of an operating sys-


tem dynamically allocates memory to the processes as needed and releases it
when not in use.

e. File Management – All of the files and folders (directories) kept on the computer
drive are taken care of by the operating system. The fundamental operations that a
user must carry out on files include creating, renaming, deleting, copying, and relo-
cating files and folders.

13. Compare batch processing systems and multiprogramming systems?


Answer – Multiprogramming is the capacity of an operating system to run numer-
ous programmes at the same time on a single processor machine. Batch pro-
cessing is the grouping of several processing jobs to be completed one after an-
other by a computer without any human input.

14 What is FAT? Give an example.


Answer – The file system known as File Allocation Table (FAT) was created for
hard drives and at first used 12 or 16 bits for each cluster item. The operating sys-
tem (OS) makes use of it to control files on hard drives and in other computer sys-
tems.

3|Page
Example of FAT file system are – FAT16, FAT32 and NTFS

15. List some common troubleshooting steps that you should keep in mind.
Answer – Some of the common troubleshooting steps are –
a. Uninstall unnecessary file from the computer system
b. Always keep your antivirus update
c. Always use disk cleanup for temporary file
d. Remove unwanted files and folders from the system
e. Use defragmentation

16. What steps would you take if the monitor is not showing any display, or
the screen is blank?
Answer – If monitor is not showing any display then we have to take following
steps –
a. Check the cable connection
b. Check weather computer led light is ON or OFF
c. If laptop check weather laptop is not in sleep mode

17. What would you do when your keyboard or mouse is not responding/
working properly?
Answer – If keyboard or mouse is not responding properly then follow the following
steps –
a. Unplug USB cables and wait for some minutes
b. Try to use any other USB port
c. Check whether keyboard or mouse LED is On or OFF
d. If wireless, Check the battery

18. What troubleshooting step will you take when the printer is not respond-
ing?
Answer – If printer is not responding follow the following steps –
a. The printer is not connected properly or not switched on
b. The printer is Out of Paper
c. Check whether printer paper is Jam
d. Incorrect Printer Driver

19. How can you check the IP address of a printer connected through a wire-
less connection?
Answer –
Step 1 : Open the devices and printer dialog box by clicking
Start button >> Control Panel >> Hardware and Sound >> Device Printers
Step 2 : Select the Printer
Step 3 : Run the HP Print Assistant
Step 4 : Click on the Utilities icon to get the printer utilities screen
Step 5 : Run the “Update IP Address” utility
Step 6 : Press the Wireless button or touch the wireless icon on the printer display

4|Page
20. What steps do you need to take to change the default printer?
Answer – To change the Default Printer, open the devices and printer dialog box.
Click Start button >> Control Panel >> Hardware and Sound >> Devices and Print-
ers.

21. What could be the reasons for the print jobs being sent to the wrong
printer?
Answer – When there are multiple printers on a network, a possible problem could
be that a print job is being sent to the wrong printer. This is because your system
has set the default printer as Printer A, but you had actually wanted the print job to
go to Printer B. You could either change the default printer to Printer B or choose
Printer B for the current job.

22.. What checks would you undertake when the speaker is not working?
Answer – If speaker is not working then you can take following steps –
a. Check Speaker Volume
b. Check Audio Player Controls
c. Check the cables
d. Check the sound using headphones

23. What are the troubleshooting steps taken when an application freezes?
Answer – Sometimes an application may freeze. When this happens, you will not
be able to close the window or click any button within the application. The following
troubleshooting options may be tried:
a. Forcefully End the Application
b. Restart the computer

24. What could be the possible cause for all the applications to be running
slow?
Answer – The possible cause for all the applications running slow are –
a. Viruses are affected in the computer
b. Free space on the hard drive
c. Run a Disk Cleanup application
d. Delete unused files and programs
e. Empty your recycle bin
f. Remove Temporary files

25. How can one free disk space on the computer?


Answer – There should be at least 200-500 MB of free hard drive space on your
system. Non-availability of free space slows the functioning of the computer. To
create free space on the computer do the following –
a. Run a Disk CleanUp application
b. Delete Unused Files and Programs
c. Empty Your Recycle Bin
d. Remove Temporary File

5|Page
26. How do we remove temporary files?
Answer – To delete temporary files from the computer do the following –
Step 1 : Click on Search
Step 2 : Write %temp% and press enter
Step 3 : Delete all files and folder

27. Why is disk defragmentation required? How can we achieve disk


defragmentation?
Answer – The information in our files changes frequently. This results in gaps or
spaces in the file stored in memory (hard disk). The file thus takes more space on
the computer, and may cause the computer to slow down. You need to run a Disk
Defragmentation program to reclaim these gaps in
space. This can be achieved as follows.
− Open the Windows Explorer Application and click on My Computer.
− Highlight the C drive and right click to get a pop-up menu.
− Select the Properties option from this popup Menu.
− The dialog box showing the properties of the local disk (C:) is displayed
– Click on defragmentation

28. What steps do we take to remove unused shortcuts and program ser-
vices?
Answer – Old or unused programs that are not being used may still have compo-
nents running behind the scenes when you start your computer. This can slow
down the system. To prevent these programs from running when your computer
starts, turn off unused program services. For this purpose, from
the Windows startup, click Start button > All Programs > Startup. Right-click the
shortcuts that you do not need and click Delete

29. How can we check the network connectivity of your system?


Answer – A common problem is that you are unable to open a web page that you
had requested. This could be because you are unable to connect to the Internet. To
check the internet connection, view the Network icon (triangular in shape). This is
on the Taskbar (bottom right of the screen).

30. Explain how you would check the validity of the IP address.
Answer – First check the validity of the IP address of your system. In the bottom
left corner of your Windows screen click Start. In the Search box type CMD and
press Enter in the command prompt write IPCONFIG and press enter.

31. How will you check whether the network fly lead is working properly?
Answer – The fly lead is the cable that connects the network card in your computer
to a network point (usually on the wall). A non-operational network fly lead could
also cause failure in the internet connection. The network fly lead is seated in the
network slot on your computer.

6|Page
32. Describe the procedure to check whether the network card is working
properly .
Answer – A working network card is essential to connect to the Internet. The net-
work card lights must be flashing or lit up. If there are no lights, either the network
card is broken, or there is no network to connect to. A broken network card needs
repair or replacement.

7|Page
Chapter 2 - Networking and Internet
1. What is computer network?
Answer – Computer networking is the term for a network of connected computers
that may communicate and share resources. These networked devices transmit
data through wireless or physical technologies using a set of guidelines known as
communications protocols.

2. What are the communication take place in computer network?


Answer – A computer network is made up of a number of connected nodes that
communicate over a channel. There are three types of computer network communi-
cation:
a. Simplex
b. Half-duplex
c. Full-duplex

Simplex – Only one route of information transport is possible in simplex mode. Uni-
directional describes this mode. Simple data is transferred through numerous fibre
optics and satellites in computer networks.

Half-duplex – Only one node at a time can broadcast data in the half-duplex mode,
which allows for bidirectional communication between the two nodes. In low-band-
width situations, this mode is typically used to transfer files between nodes.

Full-duplex – In full-duplex mode, both communicating parties can send and re-
ceive at the same time. NIC Support full-duplex mode.

3. Difference between resource sharing and communication?


Answer – Difference between resource sharing and communication are –

Resource Sharing – Sharing hardware and software resources is made possible


by networking computers. Peripherals (such printers and scanners), the CPU, and
memory are a few examples of hardware resources. System and application soft-
ware, as well as files that may contain text, audio, and video content, are examples
of software resources.

Communication – Information sharing between network nodes is facilitated by


connecting computers through a network. For instance, since the printer is linked to
every network node, any of the computer systems send data to any of the printer,
the three other computers, or both.

4. What are the different transmission Medium in computer network?


Answer – A transmission medium is a channel of transmission that allows for the
signal-based transfer of data from one node to another. The data is converted into

8|Page
an appropriate form for transmission on the medium via a signal.
There are two types of transmission medium –

a. Guided medium – Physical conductors like twisted pairs, coaxial cable, and fi-
bre optics are referred to the guided medium. The signal travels as voltage and cur-
rent in coaxial and twisted pair cable, but it travels as light in optical fibre.

b. Unguided medium – Electro-magnetic waves are used by the unguided me-


dium, which eliminates the need for a physical conductor. Microwave, radio wave,
and infrared are a few examples of unguided media.

5. What is the purpose of repeater?


Answer – A signal may weaken and degrade with increased distance. In order to
increase the input signal’s range, a repeater is employed to return the signal to its
original state. It is positioned between two cable segments as a result.

6. What is the purpose of HUB?


Answer – A hub joins multiple lines, which are also known as cable segments, as
opposed to a repeater, which only connects two wires. Multiple input/output (I/O)
ports on a hub each connect to a single cable.

7. What is Bridge?
Answer – A bridge is a multiport network interface used to connect two or more
LANs, sometimes at differing speeds. Therefore, a bridge can be used to combine
smaller LANs to create a larger LAN.

8. What is Switch?
Answer – Switches are used to connect individual nodes in the network with one
another, as opposed to bridges, which join two or more computers in LAN. Each
node in the network is attached to a different switch port.

9. What is Router?
Answer – LAN or WAN routers are used to link different networks together. Data
from an incoming network is sent to another network via a router. A router keeps
track of different networks’ routing tables. The router chooses which network the in-
coming packet should be sent to based on the destination address.

10. What is Gateway?


Answer – A gateway enables communication across networks based on various
protocol systems. Data from one network that uses one protocol is translated to the
outgoing network’s protocol before being forwarded. As a result, a gateway can be
compared to a router that has software for protocol conversion.

9|Page
11. What are the different types of Network?
Answer – Networks can be roughly characterized as PAN, LAN, MAN, and WAN
based on their geographic range.

a. Personal area network (PAN) – A personal area network (PAN) is a type of


computer network designed to connect computers and other devices that are physi-
cally close to one person. Personal computers, printers, fax machines, telephones,
PDAs, scanners, and even gaming consoles are a few examples of the kinds of
gadgets that are utilized in a PAN.

b. Local area network (LAN) – Local Area networks can have a radius of up to 1
km and are private networks. They are typically established inside a structure or
campus. The operating speed of LANs is between 10 Mbps and 1 Gbps.

c. Metropolitan area network (MAN) – Metropolitan Area Network is the abbrevia-


tion. It could be held by several people or groups, not just one. These networks,
which have a radius of up to 50 km, are used to create connections within cities.

d. Wide area network (WAN) – Wide Area Network is referred to as WAN. A WAN
typically covers a distance of roughly 1000 km. They are useful for linking isolated
places and for long-distance communication. They create connections inside a na-
tion or continent.

12. What is topology?


Answer – The physical and logical configuration of a network’s nodes and links is
known as its topology. Devices like switches, routers, and software with switch and
router functionality are typically included in nodes. A graph is a common way to rep-
resent network topologies.

13. Different between broadcast and point-to-point topology?


Answer – Network topology refers to the positioning of nodes in a network, often
known as their layout. Broadly speaking, there are two different topologies: broad-
cast and point-to-point.

a. Broadcast topology – All nodes in a broadcast topology share a single physical


link. All nodes receive when one node sends. When multiple nodes broadcast at
once, collision may happen, and a collision resolution mechanism is in place to deal
with it. Bus and ring topologies dominate in broadcast networks.

b. Point-to-Point topologies – Every pair of nodes in a point-to-point architecture


has its own dedicated link. Star and mesh topologies are common for point-to-point
networks.

10 | P a g e
14. Types of topologies?
Answer – There are five different types of topologies?
a. Bus topologies
b. Ring topologies
c. Star topologies
d. Mesh topologies
e. Tree topologies

15. What is Bus topologies?


Answer – In a bus topology, several nodes are connected by a lengthy cable
known as the backbone cable (or just the backbone) using a connector known as
the tap. In this, every device linked to the backbone cable receives a message sent
by one. Less cabling is needed, and this topology is simple to establish and expand
the network built using it. However, isolating and locating faults is challenging.

16. What is Ring topologies?


Answer – In a ring topology, all the devices are connected by a cable that is
shaped like a ring. The intended recipient of the message is reached by way of a
one-way transmission of the intended message. Device addition and deletion, fault
isolation, and fault detection are simple processes. The topology, however, is con-
strained by single point failure, which can disrupt the entire network. It could take
longer to send a message from one node to another node (four steps when sending
from device A to device E).

17. What is Star Topology?


Answer – All of the devices in a star topology are linked to the hub, which serves
as the main controller. Any two devices can communicate with each other through
the hub that relays messages. Installation and configuration of the star network are
simple.
Furthermore, fault isolation and detection are simple. However, compared to bus
and ring topologies, it requires more cabling. Moreover, a failed hub will result in a
failed network.

18. What is Mesh Topology?


Answer – Every node in the network is connected to every other node due to mesh
topology. The topology offers secure data transfer without any traffic issues be-
cause every conceivable pair of nodes has a dedicated point-to-point connection.
To establish the topology, several connections are necessary. As the network ex-
pands, this makes installation more challenging as there are more nodes.

19. What is Tree topology?


Answer – A hybrid topology that combines bus and star topologies is called tree to-
pology. In a bus topology, the primary backbone cable functions as the tree’s trunk,
and star networks (and even individual nodes) are connected to it like the tree’s
branches. A portion of a network built using a tree topology will not be affected if it
is damaged. In comparison to other topologies, installation and configuration are

11 | P a g e
challenging. Additionally, if the backbone cable is broken, the network’s communi-
cation will be affected as a whole.

20. Purpose of MAC Address?


Answer – A network interface controller (NIC) is given a media access control ad-
dress (MAC address), which it can use as a network address in communications in-
side a network segment.

21. What is IP address?


Answer – Every computer in a network has an additional distinctive identification
code called an IP Address. The four bytes (or 32 bits) that make up an IP address
can range in value from 0 to 255.

22. What is Domain name?


Answer – When using client software to access a website, a domain name is a
string of characters that corresponds to a numeric IP address. A domain name is
just the text that a user types into their browser to access a specific website. For in-
stance, Google’s domain name is “google.com”.

23. Difference between generic domain and country specific domain?


Answer – A generic domain name, like toothpaste.com or videogame.com, is made
up of one or more words that are often used in dictionaries. TLDs can contain ge-
neric domain names, however the.com TLD is the most expensive of them.

Generally speaking, country-specific domain extensions identify the location or lan-


guage for which the website’s content is appropriate.

Generic Domain Names:


·com – commercial business
·edu – Educational institutions
·gov – Government agencies
·mil – Military
·net – Network organizations
·org – Organizations (nonprofit)

Country Specific Domain Names:


.in – India
·au – Australia
·ca – Canada
.ch – China
.nz – New Zealand
.pk – Pakistan
.jp – Japan
.us – United States of America

12 | P a g e
24. What is digital literacy?
Answer – Raising knowledge and understanding regarding technology, such as
desktop computers, smartphones, tablets, and other electronic devices, is referred
to as digital literacy. Internet and software tool familiarity are also included. People
may more easily and effectively obtain, evaluate, exchange, create, and transmit in-
formation because to this expertise.

25. What is the purpose of Internet Services?


Answer – Network services are programmes that are hosted by servers on a com-
puter network and offer functionality to network users. The Internet has several
uses, including e-mail, file sharing, remote login, and the World Wide Web (WWW).

26. What is Telnet?


Answer – Telnet is a network protocol that allows for two-way, collaborative, text-
based communication between two computers as well as remote computer access.
It uses the Transmission Control Protocol/Internet Protocol (TCP/IP) networking
protocol to create remote sessions in response to user commands.

27. What are the different TCP/IP model.


Answer – The TCP/IP Model are –
a. Application Layer
b. Transport Layer
c. Internet Layer
d. Link Layer

28. What do you mean by Application Layer?


Answer – Data or a message is created at the sending end and reviewed and pro-
cessed at the receiving end. The message that will be sent with the header must
likewise be enclosed by this layer. On this layer, a number of protocols like HTTP
(HyperText Transfer Protocol) and POP3 (Post Office Protocol version 3) operate.
POP3 enables you to download emails to your local computer so you can read
them offline.

29. What are the different types of Malware?


Answer – Malicious software (programmes) created with the purpose of interfering
with system performance by harming the system, gaining unauthorised access to
the system, or preventing legitimate users from using computing resources are re-
ferred to as malware. Malware includes viruses, worms, and Trojan horses.

30. What is Virus?


Answer – A virus is a piece of software code that can damage your computer by
corrupting or overwriting system data.

31. What is worm virus?


Answer – A worm is frequently acquired via a network, and it floods the hard disc

13 | P a g e
by automatically producing several copies of itself there. It causes network conges-
tion when a worm is received as an email attachment and automatically forwarded
to the recipients.

32. What is Trojan Horse?


Answer – A Trojan Horse Virus is a form of malware that instals itself on a com-
puter by impersonating a trustworthy application. The delivery technique often in-
volves an attacker hiding malicious malware in genuine software using social engi-
neering in an effort to get users’ system access.

33. What is Eavesdropping?


Answer – The act of surreptitiously or covertly listening to another person’s private
discussion or communications without that person’s agreement is known as eaves-
dropping. Telephone lines, cellphone networks, email, and instant messaging are
all used for eavesdropping.

34. What is Denial of Service?


Answer – A cyberattack known as a denial-of-service (DoS) attack renders a sys-
tem or network resource inaccessible to its users by temporarily or permanently in-
terrupting services.
In order to overwhelm systems and prevent requests from being fulfilled, denial of
service is often achieved by flooding the targeted computer or resource with unnec-
essary requests. A DoS attack is comparable to a crowding of customers at a
store’s entrance, making it difficult for actual customers to enter.

35. What are the different types Cyber Crime.


Answer – The different type of Cyber Crime activity are –
a. Cyber bulling
b. Cyber stalking
c. Online Job Fraud
d. Vishing
e. SMSing
f. SIM Swap scam
g. Creadit card fraud
h. Identity theft
i. Spamming
j. Ransomware

36. What is the purpose of Firewalls?


Answer – An enterprise, home, or individual’s internal network is protected by a
firewall from malicious traffic coming from other networks. This can be accom-
plished by installing a router or a computer (typically designated to act as a firewall)
between the internal network and the external network. Firewall examines network
traffic and permits only data that does not contravene security constraints to travel
through the network. A router-based hardware firewall stops harmful malware from
entering your network from the outside.

14 | P a g e
37. How to protect our self from measures while accessing internet?
Answer – To protect our self from measures activity –
a. Never click on a suspicious link specified on a web page or send through a mail.
b. Make sure that passwords are strong and are changged frequently.
c. Never disclose personal information
d. Report phishing issues to the concerned authorities
e. Ensure that the web browser is updated and secure.

15 | P a g e
Chapter 3 - Office Automation Tools
1. What is the need of a word processing software?
Answer – Using a standard word processor, a user can generate documents, mod-
ify them using the keyboard and mouse, store them for later access, and print them
to a printer. Microsoft Word, Microsoft Notepad, and Corel WordPerfect are all com-
mon word processing programs.

2. What is the task of a word processing software?


Answer – A word processor is a tool or computer application that allows for the en-
try, editing, formatting, and output of text.

3. Name an open source word processing software.


Answer – Apache OpenOffice Writer & Google doc

4. List the steps to start an OpenOffice Writer.


Answer – Click Start >> All Programs >> OpenOffice >> OpenOffice Writer from
the desktop if applicable. OpenOffice Writer users should select File > New > Text
Document. A text document appears on your screen in either scenario. (The text
document’s name can be seen at the top of the screen.

5. List the components of the main screen of OpenOffice Writer.


Answer – OpenOffice Writer’s home screen is divided into several sections, includ-
ing the Work Area, Ruler bar, Status bar, and Scroll bar.

6. Define the following:


a. Tabs
b. Ruler Bar
c. Status Bar
d. Scroll Bar
e. Work Area
Answer –
a. Tabs – Tabs like “File,” “Edit,” “View,” and “Insert” feature drop-down menus with
actions that are specific to the tab.
b. Ruler Bar – There are two rulers—a horizontal and vertical ruler—on the ruler
bar. We can change the margins and indentation using the Ruler Bar.

c. Status Bar – The status bar shows details about the open document that is cur-
rently open. The zoom slider, total number of pages in the document, and the cur-
rent page number are all displayed.

d. Scroll Bar – Both a horizontal and vertical scroll bar are present. They aid in
scrolling the document’s body or content.

e. Work area – This is the area where the document’s text is typed.

16 | P a g e
7. List the tabs in the OpenOffice Writer. What are the key tasks performed by
the tabs.
Answer – The Tab key in word processing and text editing inserts the ASCII tab
character, advances the insertion point to the following tab stop in a table, or inserts
numerous space characters (depending on the programme used).

8. What is the extension of the file created in OpenOffice Writer?


Answer – ODT is the extension for files produced by OOo Writer (OpenDocument
text). ODT files and Writer Files are the terms used in this site to refer to files made
in Writer.

9. What is the purpose of the following tabs?


a. File
b. Edit
c. View
d. Insert
Answer –
a. File – You can specify a file in the File tab where the log shall be saved. An indi-
cator that shows if file logging is active and a button to enable or disable it are lo-
cated at the top. (Take note that unless a file is chosen below, you cannot enable
it.) You can stop and start the file entering process using the button.

b. Edit – Editing principles and objectives Editing is done to carry on or emphasise


the significance of a scene or tale. It is often referred to as “creating diverse moods
and atmospheres,” and this can be done by editing techniques including fading,
three-way colour correction, and shot pacing.

c. View – By limiting access to a predetermined set of a table’s rows and columns,


views offer an extra layer of security. A view has the ability to conceal the complex-
ity of a multiple table join.

d. Insert – The user can add something (such a photograph) into a document or file
by using the Insert file menu and Ribbon area in software. For instance, in Microsoft
Word, the user can include a photo of themself into their paper using the Insert tab
in the Ribbon.

10. What is the difference between Save command and Save As command?
Answer – When we save a document, the most recent version can be modified to
reflect the most recent working version and the newly created document. We can
save our work for the first time using Save As, and it will also ask where and under
what name it should be saved.

11. What is the difference between Move text and Copy text?
Answer – Moving and copying are different in that the first creates a duplicate of a
file or directory at a new location without changing its original content, whereas the
latter moves the original file or directory to a new location.

17 | P a g e
12. How is Find and Replace option useful?
Answer – By using Find and Replace, you may easily find and replace any word or
formatting style within a page. This is very useful for lengthy papers. Perform the
keyboard shortcut Ctrl+H or go to Editing in the Home tab of the ribbon, then select
Replace to use Find and Replace.

13. List the steps for inserting a hyperlink to a web page in a document.
Answer –
Step 1 : Select the text you want to use as link
Step 2 : Insert >> Links >> Link
Step 3 : Type or paste the destination URL
Step 4 : Click on OK to create a hyperlink

14. What is the difference between toggle case and sentence case when us-
ing Change Case?
Answer – Sentence case will capitalise the first word; lowercase will change all of
the letters in the selection to lowercase; UPPERCASE will change all of the letters
to uppercase; and tOGGLE cASE will change all of the letters in the selection to the
opposite case.

15. What is a spreadsheet? List its uses.


Answer – In a spreadsheet application, data is arranged into rows and columns
and shown as a grid or table. Utilizing the numerical data, it is utilised to assess and
produce projections. Typically, a spreadsheet programme is used for the following
tasks –

• Enter data
• Edit data
• Format data
• Perform calculation on the data
• Present data in graphical form

16. Explain a workbook and worksheet.


Answer –
Workbook – You can use a file called a “Calculus Workbook” that contains numer-
ous worksheets to arrange various types of related material. The three worksheets
“sheet 1,” “sheet 2,” and “sheet 3” are included by default in a workbook.

Worksheet – A single spreadsheet with cells, rows, and columns can be found in a
calc worksheet. A worksheet always starts in row 1 and column A. A formula, text,
or number can be entered into each cell.

17. What is the purpose of using a spreadsheet?


Answer – The purpose of using spreadsheet are –
1. Managing financial data such as bank account information, budgets, transac-
tions, billing, and receipts.
18 | P a g e
2. Handling inventory, reviews, employee information, surveys, etc., using data en-
try forms.
3. Tracking student performance by calculating grades and other relevant infor-
mation such as attendance, highest score, and lowest score.
4. Creating lists of items which may not be numeric such as student list, grocery list.
5. Managing company information such as profit and sales by creating graphs from
the data.

18. What do you mean by Active Cell?


Answer – You’ll notice a thick black border surrounding the cell you’ve chosen
when you choose it. The selected cell is the active cell, as indicated by the thick
black border.

19. What are the various types of data available in a spreadsheet?


Answer – There are various types of data that can be entered in a cell –
a. Labels – These are alphabetic or alphanumeric entries without numeric value.
They can be a combination of letters, numbers, space, special characters etc. La-
bels are left justified by default.

b. Numbers or Values – These are numeric data which may be integers or can
contain decimals or fractions. Values are right-justified by default.

c. Formulas – Used to perform calculations such as addition, subtraction, multipli-


cation, division, average. Formulas must begin with an = sign.

20. What is the purpose of AutoFill in Spreadsheet?


Answer – You can enter data automatically in Spreadsheet. Use the AutoFill com-
mand to automatically expand a predictable sequence (such as 1, 2, 3, days of the
week, or hours of the day) that you are typing.

21. What is the need of a presentation software?


Answer – Users who want to deliver information to an audience can do so with the
aid of presentation software. It includes templates and tools for adding text, photos,
music, video, and graphs as well as other types of content. Using presentation soft-
ware, teachers can make their lessons more engaging.

22. What is the task of a presentation software?


Answer – It is possible to construct presentations of ideas by combining text,
graphics, and audio or video using presentation software, a subcategory of applica-
tion software. A tale is told, a speech is supported, or information is presented in a
presentation.

23. Name an open source presentation software


Answer –
a. Apache OpenOffice’s Impress.
b. LibreOffice’s Impress.
19 | P a g e
c. FreeOffice 2018’s Presentation.
d. Google Slides.

24. List the steps to start an OpenOffice Impress.


Answer –
Step 1 : Click on Start Button
Step 2 : Click on OpenOffice.org
Step 3 : Click on OpenOffice.org Impress

25. List the components of the main screen of OpenOffice Impress.


Answer – The Slides pane, Workspace, and Tasks panes make up the main Im-
press window. Several toolbars can also be shown or hidden while a presentation is
being created.

26. List the different view options in OpenOffice Impress.


Answer – Different ways in which presentation slides can be viewed are –
a. Normal View
b. Outline View
c. Slide Sorter
d. Slide Show
e. Notes Page
f. Handout Page

27. List the tabs in the OpenOffice Impress. What are the key tasks performed
by the tabs?
Answer – Insert tab are described as follows –
a. Insert page number, Date and Time – A Header and Footer Window opens.
Make settings here for date, time and page number.

b. Insert Fields – A pop-up menu appears. Select the element to be inserted. The
selected element will insert at the location of the cursor.

c. Insert Hyperlink – A dialog box opens. On the left side of the dialog box, select
where you want to link – current presentation slides, new presentation or Internet
link. Then fill the details path, Form (text, button), etc. The Text is the name that ap-
pears in your document as a hyperlink.

28. What is the extension of the file created in OpenOffice Impress.


Answer – ODP is the file extension for files produced by OOo Impress (OpenDocu-
ment Presentation). ODP files and Impress Files are the terms used in this site to
refer to files made in OOo Impress.

29. What is the purpose of the following views –


a. Normal
b. Outline
c. Slide Sorter
20 | P a g e
d. Slide Show
e. Notes Page
f. Handout Page
Answer –
a. Normal – This is the main editing view for writing and creating slides

b. Outline – This displays an outline of the text in the slides.

c. Slide Sorter – This presents all slides of the presentation in a miniature form. It
helps in viewing all slides together and allows easy moving of slides.

d. Slide Show – It shows slides as they will be actually presented. No editing can
take place in this view.

e. Notes Page – Allows users to make notes for the selected slide. The notes can
be seen only by the presenter while making a presentation. The note page is not
visible to the audience of the slide show presentation.

f. Handout Page – It displays slides on a page as seen when printed.

30. What is the need to use the Slide Master?


Answer – Each slide in your presentation has a general appearance that is con-
trolled by a slide master, including formatting and design. Every slide layout will be
updated as you make changes to the slide master within your presentation. At least
one slide master can be found in every template.

31. What is the difference between slide transition and slide animation?
Answer – The following are the differences between slide transition and custom
animation –
1. Slide Transition – The looks that move you from one slide to the next are known
as slide transitions.
2. Slide Animation – Slide animations are the motions you add to text, images,
and other items on a single presentation.

21 | P a g e
Chapter 4 - RDBMS
1. Write a short note on MySQL.
Answer – Based on structured query language, MySQL is a relational database
management system (RDBMS) created by Oracle (SQL). A systematic collection of
data is called a database. Anything from a straightforward shopping list to a photo
gallery or a location to store the enormous volumes of information in a business
network may be it.

2. Mention features of a DBMS.


Answer – Features of a DBMS –

• Minimum Redundancy and Duplication. …


• Usage Of Query Languages. …
• Multi User Access. …
• Reduced amount of space and money spent on storage. …
• Data Organization. …
• Customization of the Database. …
• Data Retrieval. …
• Data Integrity is Maintained.

3. What is the difference between DBMS and RDBMS?


Answer – Database Management System is referred to as DBMS, and Relational
Database Management System is referred to as RDBMS. Unlike RDBMS, which
stores data in the form of tables, DBMS stores data as a file.

4. List some features of MySQL.


Answer – Features of MySQL ae –
a. MySQL based on Client/Server Architecture
b. Free to use
c. Highly Flexibal
d. Compatible on many operating sytem
e. High performance
f. High productivity
g. Platform independent

5. How is Primary Key different from Candidate Key?


Answer – A record in a table is uniquely identified by its primary key, which must
be both unique and non-null. There can only be one primary key per table. A candi-
date key can be used in conjunction with a primary key to uniquely identify records
in a table.

6. Define the key(s) used in MySQL.


Answer – There are four different types of Keys –

22 | P a g e
a. Primary Key – The group of one or more columns used to uniquely identify each
row of a relation is called its Primary Key.

b. Cndidate Key – A column or a group of columns which can be used as the pri-
mary key of a relation is called a Candidate key because it is one of the candidates
available to be the primary key of the relation.

c. Alternate Key – A candidate key of a table which is not selected as the primary
key is called its Alternate Key.

d. Foreign Key – A primary key of a base table when used in some other table is
called as Foriegn Key.

7. State the similarity and difference between the Primary Key, Candidate
Key, Alternate Key and Foreign Key
Answer –
a. Primary Key – The group of one or more columns used to uniquely identify each
row of a relation is called its Primary Key.

b. Cndidate Key – A column or a group of columns which can be used as the pri-
mary key of a relation is called a Candidate key because it is one of the candidates
available to be the primary key of the relation.

c. Alternate Key – A candidate key of a table which is not selected as the primary
key is called its Alternate Key.

d. Foreign Key – A primary key of a base table when used in some other table is
called as Foriegn Key.

8. Which statement is used to select a database and make it current?


Answer – To choose data from a database, use the SELECT statement. The infor-
mation received is kept in a result table known as the result-set.

9. How is a database related to table(s)?


Answer – In databases, a table is a collection of data elements (values) organised
using a model of vertical columns (named) and horizontal rows, with a cell serving
as the intersection of a row and a column. A table can have any number of rows but
only a certain number of columns.

10. Write SQL statement to view names of all the tables contained in the cur-
rent database.
Answer – To display all the table in database –
SQL> SHOW TABLES;

23 | P a g e
11. In a database there is a table Cabinet. The data entry operator is not able
to put NULL in a column of Cabinet? What may be the possible reason(s)?
Answer – The data entry operator cannot enter duplicate values in a column of a
cabinet; this is likely because the column contains a primary key.

12. Do Primary Key column(s) of a table accept NULL values?


Answer – Primary Key column does not support NULL Values.

13. There is a table T1 with combination of columns C1, C2, and C3 as its pri-
mary key? Is it possible to enter:
a. NULL values in any of these columns?
b. Duplicate values in any of these columns?
Answer –
a. No
b. Not possible

18. What are the differences between DELETE and DROP commands of SQL?

Answer – The DELETE command in Data Manipulation Language (DML) is used to


remove tuples or records from a relation or table. In contrast, the DDL command
DROP is used to delete named schema elements such as relations, tables, con-
straints, or the whole schema.

19. How many types of language are there in the database?

DDL (Data definition language) – Data definition language is used to design and
modify the structure of a database.
Common DDL commands are
a. Create – This command is used to create database
b. Alter – This command is used to modify the database.
c. Drop – This command is used to delete database tables.

DML (Data manipulation language) – Data manipulation language provides com-


mands for manipulating data in databases.
Common DML commands are
a. Select – This command is used to display information from the database.
b. Insert – This command is used to insert new records in the database.
c. Delete – This command is used to delete records from the database.
d. Update – This command is used to modify records in the database.

24 | P a g e
20. Consider the following table “Teachers”

Percent-
Rollno Student_Name DOB Address Mobile_no Gender
age

1 Jugal 10/01/2003 Mumbai 5555555555 M 98

2. Pratigya 24/03/2002 Pune 4444444444 F 82

3 Sandeep 12/12/2003 Delhi 8888888888 M 91

4 Sangeeta 01/07/2004 Banglore 6666666666 F 96

5 Satti 05/09/2002 Mumbai 7777777777 M 89

Write SQL commands:


a. To display all the information from the table whose address is ‘Mumbai’.

Answer – Select * from students where address = “Mumbai”;

b. To list the details of all the students whose percentage is between 90 to


100.

Answer – Select * from students where percentage >= 90 and percentage <= 100;

c. To display the name of all the students whose gender is Female.

Answer – Select Subject from students where Gender = ‘F’;

d. To display the list of names of all the students in alphabetical order.

Answer – Select * from students order by Student_name;

25 | P a g e
21. Write the SQL commands to answer the queries based on Fabric table

FabricID Fname Type Disc

F001 Shirt Woolen 10

F002 Suit Cotton 20

F003 Tunic Cotton 10

F004 Jeans Denim 5

a. Write a query for insert the following record


(“F005”, “Kurta”, “Woollen”,5)

Answer – insert into Fabric values (‘F005’, ‘Kurta’, ‘Woolen’,5);

b. Write a query to display only those fabric whose disc is more than 10

Answer – select * from Fabric where Disc>10;

c. To display those record whose type is ‘Woolen’

Answer – select * from Fabric where type = ‘Woolen’;

d. To modify the fabric shirt by increasing discount by 10

Answer – update fabric set Disc = Disc + 10 where Fname = ‘Shirt’;

e. To delete the record of fabric F003 from table

Answer – delete from Fabric where FabricID =‘F003’;

26 | P a g e
22. Consider the following Vendor table and write the queries
VendorID VName DateofRegistration Location

V001 Mother Dairy 20-01-2009 Delhi

V002 Havmor 01-04-2015 Gujrat

V003 Amul 12-05-2012 Kolkata

V004 Kwality Walls 15-10-2013 Mumbai

a. Write a Query to display all records

Answer – Select * from Vendor;

b. Write a Query to add a new row with the following details


(„V005‟, „Vadilal‟, „2010-03-20‟, „Pune‟)

Answer – Insert into Vendor values (“V005‟, “Vadilal‟, “2010-03-20‟, “Pune‟);

c. Write a query to modify the location of V003 from Kolkata to Gujrat

Answer – Update Vendor Set location= “Gujrat‟ Where location= “Kolkata‟;

27 | P a g e
23. Consider the following table “ITEM”:

Itemno Iname Price Quantity

11 Soap 40 80

22 Powder 80 30

33 Face cream 250 25

44 Shampoo 120 100

55 Soap box 20 50

a. Display the total amount of each item. The amount must be calculated as
the price multiplied by quantity for each item.

Answer – Select price * quantity from item;

b. Display the details of items whose price is less than 50.

Answer – Select * from item where price < 50;

28 | P a g e
Chapter 5 - Fundamentals of Java
1. What is the purpose of NetBeans IDE?
Answer – Java applications can be simply created utilizing the effective GUI builder
in the NetBeans IDE. We can create application by dragging and dropping GUI ele-
ments from a palette onto a container. Correct spacing and alignment of the various
components in relation to one another are handled automatically by the GUI
builder.

3. What is the difference between Parent control and Child control in Net-
Beans?
Answer – There are two different type of control –
a. Parent or container controls – Controls that serve as a parent or container
serve as the backdrop for other controls. Consider Frame. All of a parent control’s
child controls are also destroyed when we remove it. All of a parent control’s child
controls move with it when the parent control is moved.

b. Child controls – Child controls are controls that are positioned inside a con-
tainer control. For instance, a text field, a label, a button, etc.

4. Write any two property of jFrame Form?


Answer – The two property of jFrame Form are –
a. defaultCloseOperation – Sets action to be performed when the user attempts to
close the form.
b. Title – Sets the text to be displayed in the Title bar of the form window.

5. What id purpose of property in NetBeans?


Answer – An object’s properties are used to determine how it will display on the
form. For instance, you can alter a textfield’s background color, font, and other
properties by changing its background attribute.

6. What is Methods?
Answer – To do some action on the object, methods are employed. For instance,
you may use a textfield’s setText() method to show something in it or use its
getText() method to retrieve its contents. Getters and setters are the two categories
into which methods can be separated.

7. What is Event?
Answer – Events are the actions which are performed on controls. Examples of
events are mouseClick, mouseMoved,keyPressed etc. When the user performs any
action on a control, an event happens and that event invokes the corresponding
part of the code and the application behaves accordingly.

29 | P a g e
8. Write any two method of jButton?
Answer –
a. getText() – Retrieves the text typed in jButton.
String result=<button-name>.getText( );
b. setText() – Changes the display text at runtime.
<button-name>.setText(String text);

9. What is Object Oriented Programming Language?


Answer – Object-oriented programming is known as OOP. While object-oriented
programming involves constructing objects that include both data and functions,
procedural programming involves developing procedures or functions that perform
actions on the data.

10. What are the major components of Object Oriented Programming?


Answer – The major components of Object Oriented Programming are –
1. Class
2. Object
3. Data Members & Methods
4. Access Specifier and Visibility Modes

11. What is data member and method?


Answer – Methods and data members are accessible in classes. In actual Java
programming, the methods are a series of steps put together to carry out a certain
action on the data, whilst the data will need to adhere to a specified data type, such
as char, int, float, or double.

12. What is Variables?


Answer – Variables act as a kind of container for the data they hold. Because they
can change their value but not their name, these things are called variables.

13. What are the different characteristics of variable?


Answer – The characteristics of a variable are:
• It has a name.
• It is capable of storing values.
• It provides temporary storage.
• It is capable of changing its value during program execution.

14. What is Data types? What are the different type of Data Type.
Answer – The data type describes the actions that may be performed on the type,
the range for the type, and how the type’s values are stored. Some of the example
of data types are –

a. Numeric Data Type – These data types are used to store integer values only i.e.
whole numbers only.
Example Byte, Short, Int, Long

30 | P a g e
b. Floating Data Types – These data types are used to store numbers having dec-
imal points i.e. they can store numbers having fractional values. for example float &
double.

c. Character Data Types – These data types are used to store characters. Charac-
ter data types can store any type of values – numbers, characters and special char-
acters.

15. What is Operator? What are the different type of operators.


Answer – Operators are symbols that manipulate, combine or compare variables.
The operators available in java are –
a. Assignment Operator – One of the most common operators is the assignment
operator “=” which is used to assign a value to a variable. We assign the value
given on the right hand side to the variable specified on
the left hand side.

b. Arithmetic Operator – These operators perform addition, subtraction, multiplica-


tion, and division. These symbols are similar to mathematical symbols. example +, -
, *, /, %

c. Relational Operator – A relational operator is used to test for some kind of rela-
tion between two entities. A mathematical expression created using a relational op-
erator forms a relational expression or a condition. example ==, !=, >, <, >=, <=

16. What is Bitwise Operator?


Answer – Bitwise operators can be used to change a number’s individual bits.
They are compatible with all integral kinds (char, short, int, etc). They are utilised
while updating and searching a binary indexed tree.

17. Design a GUI application to accept the side of a square in a text field and
calculate the area and perimeter of the square. Add Refresh button to clear all
text fields and a Stop button to end the application.

Hint [ Area of a square = side * side and perimeter = 2(side +side)]


Answer – //Coding for jButton1 (“Calculate the area” button)
private void jButton1ActionPerformed(java.awt.event.ActionEvent evt)
{
double a,b;
a=Double.parseDouble(jTextField1.getText());
b=a*a; jTextField2.setText(Double.toString(b));
}

//Coding for jButton2 (“Calculate the perimeter” button)


private void jButton3ActionPerformed(java.awt.event.ActionEvent evt)
{
31 | P a g e
doublea,c;
a=Double.parseDouble(jTextField1.getText());
c=4*a;
jTextField3.setText(Double.toString(c));
}

//Coding for jButton4 (“Refresh” button)


private void jButton4ActionPerformed(java.awt.event.ActionEvent evt)
{
jTextField1.setText(” “);jTextField2.setText(” “);jTextField3.setText(” “);
}

32 | P a g e

You might also like