100% found this document useful (2 votes)
13K views83 pages

12th Computer Applications Full Study Material English Medium PDF Download

The document is a study material for Computer Applications for 12th-grade students at Vivekananda Vidyalaya Matric HR Sec School, Kodai Kanal, prepared by P. Vaheeswaran and M. Ranjith. It includes various topics related to multimedia, such as definitions, components, file formats, and roles in multimedia production. Additionally, it contains exercises like multiple-choice questions and short answer sections to aid students in their exam preparation.

Uploaded by

Jeena Jabez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (2 votes)
13K views83 pages

12th Computer Applications Full Study Material English Medium PDF Download

The document is a study material for Computer Applications for 12th-grade students at Vivekananda Vidyalaya Matric HR Sec School, Kodai Kanal, prepared by P. Vaheeswaran and M. Ranjith. It includes various topics related to multimedia, such as definitions, components, file formats, and roles in multimedia production. Additionally, it contains exercises like multiple-choice questions and short answer sections to aid students in their exam preparation.

Uploaded by

Jeena Jabez
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 83

www.Padasalai.Net www.Trb Tnpsc.

Com

VIVEKANADA VIDYALAYA MATRIC HR SEC SCHOOL


PANNAIKADU PIRIVU
KODAIKANAL

et
TH
12 - STD

i.N
la
IF YOU FAIL NEVER
GIVE UP BECAUSEFAIL
Charles babbage
sa MEANS FIRST ATTEMPT
FaTher OF COMuTer IN LEARNING

COMPUTER APPLICATION FULL MATERIAL


da
(NEW EDITION 2024-25)
Pa

NAME : ________
________________________________
__________________

REG NO : ___________
________________________________
_______________
w.

PREPARED BY
P.VAHEESWARAN M.COM., M.PHIL. DC
DCA., B.ED., M.RANJITH
RANJITH KUMAR M.SC., M.ED.,
ww

VICE-PRINCIPAL, PRINCIPAL,
PG ASSISTANT IN COMMERCE & ACCOUNTANCY PG ASST IN COMPUTER SCIENCE,
VIVEKANANDA VIDYALAYA MATRIC HR SEC SCHOOL
PANNAIKADU PIRIVU, KODAIKANAL, DINDIGUL DT.
CELL: 9791324143 CELL: 9626105165
EMAIL: [email protected] E-MAIL: : [email protected]
ranjitjuly21

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA


M.Com.,M.Phil.,DCA.,B.Ed., Page 1

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

KfTiu
khzt ez;gh;fSf;F>
fzpdp mwptpay; ghlj;jpy; ey;y kjpg;ngz;fis ngw Ntz;Lk; vd;w Nehf;fj;jpy;
vspikahd Kiwapy; gbg;gjw;f;F trjpahf vdJ 10 tUl gzp mDgtj;ij nfhz;L
,e;j material – ia njhFj;Js;Nsd;. vdJ ghzpapy; vdJ khzth;fSf;F Vw;wthW

et
jahh; nra;j ,e;j njhFg;ig midj;J khz
khzth;
th;fSk; gad;ngw Ntz;Lk; vd;w
Nehf;fj;jpNyNa ntspapl;Ls;Nsd;. vdJ ,e;j njhFg;gpy; VNjDk; gpiofs; Fiwfs;
,Ue;jhy; rhpnra;J nfhs;sTk;. gpd; jq;fpa khzth;fSk; ey;y kjpg;ngz;fis ngw

i.N
Ntz;Lk; vd;w Nehf;fj;jpNyNa ,ij njhFj;Js;Nsd;.

jw;nghOJ muR ntspapl;Ls;s G


Gjpa
jpa ghlj; jpl;l njhFg;gpd; mbg;gilapy;
,e;j tpdh tpil njhFg;ig kl;Lk; vd;dhy; ,ad;w mstpw;f;F kpf vspikahf
cUthf;fpAs;Nsd;. KO kjpg;ngz;fs; ngw ,JNt NghJkhdJ. NkYk; nghJj;Njh;tpy;

la
gpd;jq;fpa khzth;fSk; ey;y kjpg;ngz;fis ngw itf;f Kbe;jJ. vdNt ,ij
cgNahfg;g gLj;
Lj;jp ey;y kjpg;ngz;fis ngwTk;.
sa
khzt ez;gh;fNs!! Neuj;ij rhpahf gad;gLj;jp nfhs;Sq;fs;. rhpahd
Neuj;jpy; rhpahd Kiwapy; gbj;J ntw;wp ngw;W mLj;j fl;l epiyf;F nry;y Ntz;ba
,Wjp epiyapy; cs;sha;. Neuj;ij tPzhf;fhNj! mLj;J vd;d nra;a Nghfpwha; vd;gij
Kjypy; jPh;khdp. kjpg;ngz;fis ngWtjpNyNa ftdj;ij it. Kad;why; KbahjJ
da
vJTkpy;iy. fbdkhf jhd; ,Uf;Fk;. f~;lg;gl;L gbj;jhy; ey;y Kd;Ndw;;wj;ij
miltha;.
gs;sp gUtj;jpy; eP ngWk; ntw;wpNa cd; tho;f;if KOtijAk; jPh;khdpf;f
NghfpwJ vd;gij ed;whf ftdk; nfhs;. jpdKk; f fhiyapy;
hiyapy; gbg;gjw;f;F Kd; cd;
Pa

,yf;F vd;d vd;gij ,U epkplk; Nahrpj;J ghh;. eP nry;tJ rhpahd ghijah vd;W
rpe;jp!!!! ey;y ghijNa ey;y Kbit jUk;. ey;y kjpg;ngz;fis ngWtNj cd;
Nehf;fkhf ,Uf;fl;Lk;. mJNt cd; tho;f;if vd;Dk; ghijf;F ey;topfhl;Lk;. gs;sp
tho;f;ifapd;; filrp epiyapy; cs;sha;!!!! ,q;F eP ngWk; kjpg;ngz;fNs cd; mLj;j
w.

fl;l ghijia cUthf;f Nghfpd;wd vd;gij epidtpy; vg;nghOJk; it.


cd; ngw;Nwhhpd; ciog;igAk; rpe;jpj;Jg; ghh;. gpwF gbf;f Muk;gp. ftdk;
rpjwhky; gbg;gpy; ftdj;ij nrYj;Jtha;. gpwF ePahfNt Kaw;rp nra;J ey;y
kjpg;ngz;fisAk; ngWtha;.
ww

cq;fSf;fhf ehq;fs;!!!!
cd; ntw;wpNa vq;fs; ntw;wp!!!!!
cq;fs; ntw;wpapy; ngUikg;ghl ehq;fSk; fhj;jpUf;fpNwhk;!!!!!!!

WISH YOU ALL THE BEST FOR YOUR EXAMINATION

Mrphpah;
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA
M.Com.,M.Phil.,DCA.,B.Ed., Page 2

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 1
MULTIMEDIA
I. CHOOSE THE CORRECT ANSWER:
1. What is multimedia?
a). a type of computer hardware

et
b). a type computer software
c). a type of computer network
d). the use of multiple forms of media to communicate information

i.N
2. ______ have five major components like text, images, sound, video and animation?
a). Multimedia b). Master page c). Master item d). Multi-word
3. What is raster Image?
a). a type of image made up of pixels b). a type of image made up of geometric shapes

la
c). a type of image made up of text d). a type of image made up of sound waves
4. What is vector image?
sa
a). a type of image made up of pixels
c). a type of image made up of text
b). a type of image made up of geometric shapes
d). a type of image made up of sound waves
5. Which of the following is a raster image file format?
a). JPEG b). EPS c). CDR d). SVG
da
6. Which of the following is a vector image file format?
a). PSD b). JPEG c). EPS d). BMP
7. RTF (Rich Text Format) file format was introduced by ______.
Pa

a) TCS b) Microsoft c) Apple Inc d) IBM


8. The expansion of JPEG is ________________________
a). Joint Photographic Experts Group b). Joint photo Experts Group
c). Join Photon Experts Group d). Joint Photographic express group
w.

9. AIFF file format was developed by


a). TCS b). Microsoft c). Apple Inc d). IBM
10. Which of the following is an audio file format?
ww

a). MP3 b). AVI c). MPEG d). PNG


II. SHORT ANSWERS:
1. Define Multimedia.
☻ Multimedia of two words is a “Many” and Media is a Medium
☻ Multimedia is an integration of many types of media like text, images, graphics, audio,
video, animation etc.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 3

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

2. List out Multimedia Components.


 Text
 Images
 Audio
 Video

et
 Animation
3. Classify the TEXT component in multimedia
 Static text – Heading, Line, Paragraph

i.N
 Hypertext - Node, Text, Link
4. Classify the IMAGE component in multimedia.
 Raster or bitmap images – Common images
 Vector image- Lines, Rectangles, Circles.

la
5. Define Animation.
 Animation is the process displaying still images so quickly so that they give the impression of
continuous movement.
sa
 2 –Dimensional Animations – X and Y
 3-Dimensaional Animation – X, Y, Z
III. EXPLAIN IN BRIEF ANSWER:
da
1. List out image file formats.
 BMG (Bitmap)
 TGA (Tagro)
 GIF (Graphics Interchange Format)
Pa

 PNG (Portable Network Graphics)


2. List out audio file formats.
☻ MP3 (MPEG Layer-3 Format)
w.

☻ OGG
☻ AIFF (Audio Interchange File Format)
☻ RA(Real Audio Format)
☻ WAV(Waveform Audio File Format)
ww

☻ RA (Real Audio Format)


3. List out video file formats
 AVI (Audio/File Interleave)
 WMV (Windows Media Video)
 MPEG (Moving Picture Experts Group)
 FLV (Flash Video)

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 4

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

IV. EXPLAIN IN DETAIL:


1. Explain in detail about production team Roles and Responsibilities.
i. Production Manager
☻ The role of production manager is to define, and coordinate, the production of the
multimedia project in time and with full quality.

et
☻ He should be an expertise in the technology, good at proposal writing, good communication
skills and budget management skills.
ii. Content Specialist

i.N
☻ It is responsible for performing all research activities concerned with the proposed
application’s content.
☻ Program content refers to projects information, graphics, data or facts presented through
the multimedia production.

la
iii. Script Writer
☻ Video and film scripts represent a linear sequence of events.
☻ The script writer visualizes the concepts in three dimensional environment and if needed
sa
uses the virtual reality integration into the program.
iv. Text Editor
☻ The content of a multimedia production always must flow logically and the text should
da
always be structured and correct grammatically.
☻ Text and narration is an integrated part of the application.
v. Multimedia Architect
☻ The multimedia architect integrates all the multimedia building blocks like graphics, text,
Pa

audio, music, video, photos and animation by using authoring software.


2. Explain about different file formats in multimedia files.
i). Text Formats:
 RTF:
w.

 Rich Text Format is the primary file format introduced in 1987 by Microsoft.
 Plain text:
 Plain text files can be opened, read, and edited with most text editors.
ww

ii). Image Formats:


 TIFF (Tagged Image File Format):
 This format is common in desktop publishing world is a high quality output.
 GIF (Graphics Interchange Format):
 GIF is a compressed image format.
 Most of the computer color images and backgrounds are GIF files.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 5

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 JPEG (Joint Photographic Experts Group):


 JPEG is a commonly used method of lossy compression for digital images.
 TGA (Tagra):
 It is the first popular format for high-resolution images.
iii). Digital Audio File Formats:

et
 WAV (Waveform Audio File Format) :
 It is the most popular audio file format in windows for storing uncompressed sound files.
 MP3 (MPEG Layer-3 Format):

i.N
 MPEG Layer-3 format is the most popular format for storing and downloading music.
 WMA (Windows Media Audio):
 It is a popular windows media audio format owned by Microsoft.
 WMA is a file extension used with windows media player.

la
 RA (Real Audio Format):
 Real Audio format is designed for streaming audio over the Internet.
 sa
The digital audio resources are usually stored as a computer file in computer’s hard drive
or CD/DVD.
iv). Digital Video File Formats:
 AVI (Audio/Video Interleave):
da
 AVI is the video file format for Windows.
 Here sound and picture elements are stored in alternate interleaved chunks in the file.
 MPEG (Moving Picture Experts Group):
Pa

 MPEG is a standard for generating digital video and audio compression under the
International Standards Organization (ISO) by the group of people.

************
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 6

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 2
AN INTRODUCTION TO ADOBE PAGEMAKER
I. CHOOSE THE CORRECT ANSWER:
1. DTP stands for ______________
(a) Desktop Publishing (b) Desktop Publication (c) Doctor to Patient (d) Desktop Printer

et
2. ____________ is a DTP software.
(a) Lotus 1-2-3 (b) Page Maker (c) Maya (d) Flash
3. Which menu contains the new option?

i.N
(a) File menu (b) Edit menu (c) Layout menu (d) Type menu
4. In PageMaker Window, the area outside of the dark border is referred to as _________.
(a) Page (b) pasteboard (c) blackboard (d) dashboard
5. Shortcut to close a document in PageMaker is ______________

la
(a) Ctrl + A (b) Ctrl + B (c) Ctrl + C (d) Ctrl + W
6. A __________ tool is used for magnifying the particular portion of the area.
sa
(a) Text tool (b) Line tool
7. _________ tool is used for drawing boxes.
(c) Zoom tool (d) Hand tool

(a) Line (b) Ellipse (c) Rectangle (d) Text


8. Place option is present in _____________ menu.
da
(a) File (b) Edit (c) Layout (d) Window
9. To select an entire document using the keyboard, press ___________
(a) Ctrl + A (b) Ctrl + B (c) Ctrl + C (d) Ctrl + D
Pa

10. Character formatting consists of which of the following text properties?


(a) Bold (b) Italic (c) Underline (d) All of these
11. Which tool lets you edit text?
(a) Text tool (b) Type tool (c) Crop tool (d) Hand too
w.

12. Shortcut to print a document in Pagemaker is ___________


(a) Ctrl + A (b) Ctrl + P (c) Ctrl + C (d) Ctrl + V
II. SHORT ANSWERS:
ww

1. What is desktop publishing?


☻ It is the creation of page layouts for documents using DTP software
2. Give some examples of DTP software.
 Adobe page maker,
 Adobe in design,
 Quark Xpress,

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 7

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

3. Write the steps to open PageMaker.


☻ Start All programs Adobe Page maker 7.0 Adobe Page maker 7.0
4. How do you create a New document in Page Maker?
 Choose file new in the menu bar. (or) press Ctrl + N in the keyboard
 Now document setup dialog box appears.

et
 Enter the appropriate settings.
 Click on OK.
5. What is a Pasteboard in Page Maker?

i.N
 A document page is displayed within a dark border.
 The area outside of the dark border is referred to as the pasteboard.
6. Write about the Menu bar of PageMaker.
 File,  Type,  View,

la
 Edit,  Element,  Windows,
 Layout,  Utilities,  Help,
7. Differentiate Ellipse tool from Ellipse frame tool.
sa
 Ellipse tool – used to draw circles and ellipses.
 Ellipse frame tool – used to crate elliptical placeholders for text and graphics.
8. What is text editing?
da
 A text block contains type, paste or import.
 You can’t see the borders of a text block until you select the pointer tool.
9. What is threading text blocks?
☻ The process of connecting Text among Text blocks is called threading text.
Pa

☻ It can be identified by a plus sign in its top or bottom, handles.


10. How do you insert a page in PageMaker?
 Step 1: Go to the page.
 Step 2: Layout Inset page
w.

Insert dialog box appears


 Step 3: Type Number of pages want.
 Step 4: Choose after from the pop-up menu.
ww

 Step 5: Click insert.


III. EXPLAIN IN BRIEF ANSWER:
1. What is PageMaker? Explain its uses.
 It is a page layout software. It is used to design and produce documents that can be printed.
 You can create anything from a simple business card to a large book.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 8

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 Example: Creating a Newsletter that includes articles and pictures on each page using page
maker.
2. Mention three tools in PageMaker and write their keyboard shortcuts.
 Pointer Tool F9
 Rotating Tool Shift + F2
 Line Tool Shift + F3

et
3. Write the use of any three tools in PageMaker along with symbols.
 Line Tool \ Used to draw straight lines in any direction.
 Constrained line tool - Used to draw vertical or horizontal lines.

i.N
 Rectangle tool Used to draw squares and rectangles
4. How do you rejoin split blocks?
 Place the cursor on the bottom handle of the second text block click and drag the bottom

la
handle up to the top.
 Place the cursor on the bottom handle of the first text block and click and drag the bottom
handle down if necessary.
sa
5. How do you link frames containing text?
 Draw a second frame.
 Click the first frame to select it.
da
 Click on the red triangle to load the text icon.
 Click the second
6. What is the use of Master Page?
 Any text or object that you place one the master page will appear on the entire document
Pa

pages to which the master is applied.


 Master page repeating logos, page numbers, headers and footers.
7. How to you insert page numbers in Master pages?
Click on Master Page icon
w.

Click on
Text tool
Click on
Left Master Page (that you want to put page number)
ww

Press
Ctrl + Alt + P (The page number display as ‘LM’ on the left master page)

Similarly click on right master page (RM) that you want to put

Press Ctrl + Alt + P

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 9

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

IV. EXPLAIN IN DETAIL:


1. Explain the tools in PageMaker toolbox.

et
i.N
la
sa
da
Explain any five tools

2. Write the steps to place the text in a frame.


☻ Click on any one Frame tool from the Toolbox.
Pa

☻ Draw a frame with onee of PageMaker’s Frame tools.


☻ Make sure the object remains selected.
☻ Click on File > Place. The Place dialog box will appears.
☻ Locate the document that contains the text you want to place, select it.
w.

☻ Click on Open.
☻ Click inside the frame to place the text in it.
☻ The text will be placed in the frame.
ww

3. Write the steps to draw a star using polygon tool?


 Draw the frame of your choice using one of the PageMaker’s Frame tool.
 Select the text block you want to insert in the frame.
 Click the frame while pressing the Shift key. Now both elements will be selected.
 Choose Element > Frame > Attach Content on the Menu bar.
 Now the text appears in the frame.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA
M.Com.,M.Phil.,DCA.,B.Ed., Page 10

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 3
INTRODUCTION TO DATEBASE MANAGEMENT SYSTEM
I. CHOOSE THE CORRECT ANSWER:
1. Which language is used to request information from a Database?
a) Relational b) Structural c) Query d) Compiler

et
2. The ---------- diagram gives a logical structure of the database graphically?
a) Entity-Relationship b) Entity c) Architectural Representation d) Database
3. An entity set that does not have enough attributes to form primary key is known as

i.N
a) Strong entity set b) Weak entity set c) Identity set d) Owner set
4. ---------- Command is used to delete a database.
a) Delete database database_name b) Delete database_name
c) Drop database database_name d) Drop database_name

la
5. MySQL belongs to which category of DBMS?
a) Object Oriented b) Hierarchical c) Relational d) Network
sa
6. MySQL is freely available and is open source.
a) True b) False c). True only for windows d). True only for UNIX
7. ---------- represents a “tuple” in a relational database?
a) Table b) Row c) Column d) Object
da
8. Communication is established with MySQL using
a) SQL b) Network calls c) Java d) API’s
9. Which is the MySQL instance responsible for data processing?
Pa

a) MySQL Client b) MySQL Server c) SQL d) Server Daemon Program


10. The structure representing the organizational view of entire database is known as --------
in MySQL database.
a) Schema b) View c) Instance d) Table
w.

II. SHORT ANSWERS:


1. Define Data Model and list the types of data model used.
Definition:
ww

 The databases technology came into existence in terms of model with relational and object-
relational behavior.
Types of data model:
 Hierarchical Databases Model  Relational Model
 Network Model  Object – Oriented Databases Model

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 11

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

2. List few disadvantages of file processing system.


 Data Duplication Wasting Spaces
 High Maintenance Cost
 Less Security Provided To The Data.
3. Define Single and multi valued attributes.

et
Single valued attribute.
 Only one value for the attributes
 No multiple values

i.N
 Ex: Age
Multi valued attribute
 More than one value of particular attribute
 Ex: Degree

la
4. List any two DDL and DML commands with its Syntax.
i )DDL Data Duplication Language
 Create
sa Syntax: CREATE DATABASE
Database_name;
 Alter
da
Syntax: ALTER TABLE table_name ADD
new_column_name
Column_definition;
ii)DML – Data Manipulication Language
Pa

 Insert
Syntax: INSERT INTO table_name(field 1, field 2,…value );
 Update
Syntax: UPDATE table_names SET
w.

Field 1 = new – value1, field 2= new –value2


[WHERE Clause];
5. What are the ACID properties?
ww

 Atomicity  Isolation
 Consistency  Durability
6. Which command is used to make permanent changes done by a transaction?
☻ Commit
7. What is view in SQL?
Views A set of stored quires
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 12

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

8. Write the difference between SQL and MySQL.


SQL MySOL
It is not a database It is a data bases management system
Access databases Management relational databases
Fixed Flexibility

et
9. What is Relationship and List its types.
 One- to- one relationship
 One- to -many relationship

i.N
 Many- to- many relationship
10. State few advantages of Relational databases.
 High Availability
 High Performance

la
 Robust Transactions And Support
 Erase Of Management
 Less Cost
sa
III. EXPLAIN IN BRIEF ANSWER:
1. Explain on Evolution of DBMS.
 In earlier days they have used punched card technology to store the data.
da
 The file systems were known as predecessor of database system.
 Various access methods in file system were indexed, random and sequential access.
 Database systems became popular to overcome the above limitations of file system.
2. What is relationship in databases? List its types.
Pa

 In ER Model, relationship exists between two entities.


 Each instance of the relationship between members of these entity types is called a
relationship instance
 The three types listed below.
w.

 One-to-One relationship:
 One-to-Many relationship:
 Many-to-Many relationship:
ww

3. Discuss on Cardinality in DBMS.


 The number of items that must be included in a relationship.
 Ex:
 Number of entities in one set mapped with the
 Number of entities of another set via the relationship.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 13

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

4. List any 5 privileges available in MySQL for the User.


Privileges Action Performed (If Granted)

Select_priv User can select rows from database tables.

Insert_priv User can insert rows into database tables.

Update_priv User can update rows of database tables.

et
Delete_priv User can delete rows of database tables.

Create_priv User can create new tables in database.

i.N
Alter_priv User can make changes to the database structure.

5. Write few commands used by DBA to control the entire database.


 USE Database – This command is used to select the database in MySQL for working.

la
If there exists a database named test, it is used as working database using the below Syntax.
Syntax:
sa mysql > use test;
Database changed
mysql>
 SHOW Databases – Lists all the databases available in the database server.
da
Syntax:
mysql > show databases;
 SHOW Tables – Lists all the tables available in the current database we are working in.
Syntax:
Pa

mysql > show tables;


IV. EXPLAIN IN DETAIL:
1. Discuss on various database models available in DBMS.
i). Hierarchical Database Model:
w.

 The famous Hierarchical database model was IMS, IBM’s first DBMS.
 In this model each record has information in parent/ child relationship like a tree structure.
 The collection of records is called as record types, which are equivalent to tables in
ww

relational model.
ii). Network model:
 Network model is similar to Hierarchical model except that in this model each member can
have more than one owner.
 The many to many relationships are handled in a better way.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 14

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

iii). Relational model:


 Oracle and DB2 are few commercial relational models in use. Relational model is defined
with two terminologies Instance and Schema.
 Instance – A table consisting of rows and columns
 Schema – Specifies the structure including name and type of each column.

et
iv). Object-oriented database model
 This model incorporates the combination of Object Oriented Programming concepts and
database technologies.

i.N
 Practically, this model serves as the base of Relational model.
 Object oriented model uses small, reusable software known as Objects.
2. List the basic concepts of ER Model with suitable example.
☻ Entity or Entity type

la
☻ Attributes
☻ Relationship
i). Entity or Entity type
sa
⁂ An Entity can be anything a real-world object or animation which is easily identifiable by
anyone even by a common man.
⁂ Eg: In a company’s database Employee, HR, Manager are considered as entities, where each
da
of these entity will be having their own attributes.
Types of Entity:
⁂ Strong Entity
⁂ Weak Entity
Pa

⁂ Entity Instance
ii). Attributes
⁂ An attribute is the information about that entity and it will describe, quantify, qualify,
classify, and specify an entity.
w.

⁂ An attribute will always have a single value, that value can be a number or character or
string.
Types of attributes:
ww

⁂ Key Attribute
⁂ Simple Attributes
⁂ Composite Attributes
⁂ Single Valued Attribute
⁂ Multi Valued Attribute

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 15

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

iii). Relationship Type


⁂ In ER Model, relationship exists between two entities.
⁂ Three types of relationships are available and the Entity- Relationship diagram is based
on the three types listed below.
⁂ One-to-One relationship

et
⁂ One-to-Many relationship
⁂ Many-to-Many relationship
3. Discuss in detail on various types of attributes in DBMS.

i.N
i). Key Attribute
 Generally a key attribute describes a unique characteristic of an entity.
ii). Simple Attribute
 The simple attributes cannot be separated.

la
 It will have a single value for that entity.
 For Example: Let us consider the name as the attribute for the entity employee and here the
sa
value for that attribute is a single value.
iii). Composite Attributes
 The composite attributes can be sub-divided into simple attributes without change in the
meaning of that attribute.
da
 For Example: In the above diagram the employee is the entity with the composite attribute
Name which are sub-divided into two simple attributes first and last name
iv). Single Valued Attributes:
Pa

 A single valued attribute contains only one value for the attribute and they don’t have
multiple numbers of values.
 For Example: Age- It is a single value for a person as we cannot give ‘n’ number of ages for a
single person; therefore it is a single valued attribute.
w.

v). Multi Valued Attributes:


 A multi valued attribute has more than one value for that particular attribute.
 For Example: Degree - A person can hold n number of degrees so it is a multi-valued
ww

attribute.
4. Write a note on open source software tools available in MySQL Administration.
 Many open source tools are available in the market to design the database in a better and
efficient manner.
 PhpMyAdmin is most popular for Web Administration.
 The popular Desktop Application tools are MySQL Workbench and HeidiSQL.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 16

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

PHPMYADMIN (Web Admin)


 This administrative tool of MySQL is a web application written in PHP.
 They are used predominantly in web hosting.
 The main feature is providing web interface, importing data from CSV and exporting data to
various formats.

et
MySQL Workbench (Desktop Application)
 It is a database tool used by developers and DBA’s mainly for visualization.
 This tool helps in data modeling, development of SQL, server configuration and backup for

i.N
MySQL in a better way.
 Its basic release version is 5.0 and is now in 8.0 supporting all Operating Systems.
 The SQL editor of this tool is very flexible and comfortable in dealing multiple results set.
HeidiSQL (Desktop Application)

la
 This open source tool helps in the administration of better database systems.
 It supports GUI (Graphical User Interface) features for monitoring server host, server
connection, Databases, Tables, Views, Triggers and Events.
sa
5. Explain the DDL command of their functions in SQL.
i). SQL:
SQL- Structured Query Language is a standard language used for accessing and
da
manipulating databases.
ii). Data Definition Language (DDL):
 The DDL commands are used to define database schema (Structure).
 Also to create and modify the structure of the database object in the database.
Pa

 CREATE, ALTER, DROP, RENAME and TRUNCATE commands belongs to this category.
SQL DDL COMMANDS List
Commands Description
CREATE Used to create database or tables
w.

ALTER Modifies the existing structure of database or table


DROP Deletes a database or table.
RENAME used to rename an existing object in the database
ww

TRUNCATE Used to delete all table records

**********

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 17

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 4
PHP: HYPERTEXT PRE-PROCESSOR
I. CHOOSE THE CORRECT ANSWERS:
1. The expansion of PHP is ____________?
a) PHP: Hyper text preprocessor b) Personal Hypertext Preprocessor

et
c) Pretext Home page d) Pre-processor Home Page
2. What does PHP files have a default file extension?
a) .html b) .xml c) .php d). ph

i.N
3. The PHP script should start with ______________
a) <?php b) <php c) <php? d) <:?
4. How many data types does PHP support?
a) 18 b) 28 c) 8 d) 38

la
5. Every variable name in PHP must begin with a _____________ symbol?
i) # ii) // iii) $ iv) <
sa
6. _______________ in PHP are case sensitive
a). Variable names b). Keyboard c). Variable names and keywords d). None
7. The assignment operator is _______________________
a) = b) == c) === d) !=
da
8. ___________ operators perform an action to compare two values.
a) Arithmetic b) Comparison c) Increment d) Logical
9. Which operator is called “Identical”?
Pa

a) = b) == c) === d) <>
10. _______________ is a data type which contains decimal numbers
a) Integer b) Float c) Boolean d)NULL
II. SHORT ANSWERS:
w.

1. What is PHP?
 It is a powerful language that is used to create dynamic and interactive web pages.
2. What is a dynamic web page?
ww

 A dynamic web page, on the other hand is a page whose content can change each it is
viewed.
3. What are the different types of comments in PHP. Give an example?
 Single-line comments - denoted by "//" or "#" at the beginning of a line.
 Example: # This is a comment
// This is also a comment

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 18

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 Multi-line comments - enclosed between "/" and "/".


 Example: /* This is an example of a multi-line comment.*/
4. List out any four operators in PHP?
 Arithmetic Operators
 Assignments Operators

et
 Comparison Operators
 String Operators
5. What is Echo statement used for? Give an example?

i.N
 The echo statement is used to output a string of text or a variable.
 Examples: echo ‘Hello, world!’;
III. EXPLAIN IN BRIEF ANSWER:
1. What are the features of PHP?

la
☻ Server-side scripting language
☻ Open source software
sa ☻ Platform Independent
☻ Database support
2. Explain then types of PHP tags?
i). PHP Default tags:
da
 In the PHP default tags, PHP code is enclosed in <?php and ?> tags.
<?php
// PHP code
?>
Pa

ii). Short Open tags:


 Short open tags are an alternative to the default syntax, and they allow you to use <? and
?>instead of <?php and ?>.
<?
w.

// PHP code
?>
iii). HTML script embed tags:
ww

 You can also embed PHP code within HTML script tahs like this.
<script language= “php”>
// PHP code
</script>

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 19

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

3. Write about the rules for naming a variable in PHP?


 A variable name must statrt with a dollar sign ($), for example, $name.
 The variables name can contain a combination of strings, numbers, and the underscore, for
example, $my_report1.
 The first character after the dollar sign must be either a letter or an underscore.

et
 Variable names in PHP are case-sensitive. This is very important rule. It means that $name
and $name are entirely different variables.
4. List out the different types of data types in PHP.

i.N
o Integer
o Float
o String
o Boolean

la
o Array
o Object
o Resource
sa
o NULL
5. Write about the syntax of PHP.
 PHP code enclosed in <? Php and ?> tags. These tags are called opening and closing tags.
da
Example:
<?php
// PHP code
?>
Pa

 A PHP statement must end with a semicolon(;).


Example:
<?php
Echo “Hello, world!”; // This is a valid PHP statement
w.

?>
IV. EXPLAIN IN DETAIL:
1. What are the data types in PHP? Explain? (explain any 5)
ww

⁂ PHP scripting language supports 13 primitive data types.


⁂ It play important role in all programming languages to classify the data to the logics.
⁂ PHP supports the following data types.
⁂ String ⁂ Boolean ⁂ NULL
⁂ Integer ⁂ Array ⁂ Resource
⁂ Float ⁂ Object
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 20

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

s.no Data type Explanation Example


1 String String is a collection of characters within $x = “Computer Application
the double or single quotes.
2 Integer Integer is a data type which contains $x = 59135;
non decimal numbers.
3 Float Float is a data type which contains $x = 19.15;

et
decimal numbers.
4 Boolean Boolean is a data type which denotes the $x = true;

i.N
possible two states, TRUE or FALSE $y = false;
5 Array Array is a data type which has multiple $cars =
values in single variable. array(“Computer”,”Laptop”,”Mobile”);
6 Object In PHP object is a data type which $school_obj = new School ();

la
contains information about data and
function inside the class.
7 Null
sa Null is a special data type which $x = null;
contains no value:
8 Resources It is a specific variable; it has a reference $handle = fopen(“note.txt”, “r”);
to an external resource. var_dump($handle);
da
2. Explain operators in PHP with example. (Explain any 5)
 Operator is a symbol which is used to perform mathematical and logical operations in the
programming languages.
 Different types of operator in PHP are:
Pa

⁂ Arithmetic operators, ⁂ Increment/Decrement operators,


⁂ Assignment operators, ⁂ Logical operators, and
⁂ Comparison operators, ⁂ String operators.
i). Arithmetic operators:
w.

☻ The arithmetic operators in PHP perform general arithmetical operations, such as addition,
subtraction, multiplication and division etc.
ii). Assignment Operators:
ww

☻ It’s performed with numeric values to store a value to a variable.


☻ The default assignment operator is “=”.
☻ This operator sets the left side operant value of expression to right side variable.
iii). Comparison Operators:
☻ Comparison operators perform an action to compare two values.
☻ These values may contain integer or string data types.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 21

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

iv). Increment and Decrement Operators:


☻ It’s used to perform the task of increasing or decreasing variable’s value.
☻ This operator is mostly used during iterations in the program logics.
v). Logical Operators:
☻ Logical Operators are used to combine conditional statements.

et
vi). String Operators:
☻ Two operators are used to perform string related operations such as Concatenation and
Concatenation assignment.

i.N
*********

la
sa
da
Pa
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 22

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 5
FUNCTION AND ARRAYS IN PHP
I. CHOOSE THE CORRECT ANSWERS:
1. A_________is a block of code that performs a specific task.
a) parameter b) function c) class d) label

et
2. Pre-defined functions are also called _________.
a) user-defined functions b) recursive functions
c) built-in functions d) lambda functions

i.N
3. Which one of the following is the right way of defining a function in PHP?
a) function functionname() { // code to be executed } b) function() {}
c) def myFunction(): d) None of the above
4. A user-defined function in PHP starts with the keyword _________.

la
a) function b) def c) defined d) funct
5. Which of the following is a correct way to call a function in PHP?
a) functionName();
sa b) call functionName;
c) execute functionName; d) run functionName();
6. What is an array in PHP?
a) An array is a special data type. b) It can hold many values under a single variable name.
da
c) An array element can be any type of data. d) All of the above
7. How many types of arrays are there in PHP?
a) 2 b) 3 c) 4 d) 5
8. What is the index of the first element in an indexed array in PHP?
Pa

a)0 b) 1 c) 2 d) 3
9. What is the index of the third element in an indexed array in PHP with 5 elements?
a) 2 b) 3 c) 4 d) 5
10. How do you create an indexed array in PHP?
w.

a) By enclosing a comma-separated list of values in square brackets


b) By using the array() function
c) By enclosing a comma-separated list of values in curly braces
ww

d) Both A and B
11. How do you access the elements of an indexed array in PHP?
a) By using the array index in square brackets
b) By using the array key in square brackets
c) By using the array index in curly braces
d) By using the array key in curly braces
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 23

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

II. SHORT ANSWERS:


1. What is a Function?
☻ A function is a collection of code that performs a specific task.
☻ It is an important feature of PHP and used to reuse code.
2. What are the different types of functions in PHP?

et
 Built –in functions
 User-defined functions
3. Write short note s on built-in functions in PHP?

i.N
 These are functions that are pre defined in the PHP language and can be used to perform a
variety of tasks, such as calculating the length of a string or sorting an array.
4. What is an array in PHP and what are its main types?
 An array is a special data type. It can hold many values under a single variable name.

la
 An array element can be any type of data.
 Indexed array
 Associative array
sa
 Multi-dimensional array
5. How do you create an indexed array in PHP?
 By enclosing a comma-separated list of values in square brackets.
da
 By using the array () function.
III. EXPLAIN IN BRIEF ANSWER:
1. What are the advantages of using functions in PHP?
i). Code reuse:
Pa

 It’s can save us time and effort when writing and maintaining our code.
ii). Testing and debugging:
 Functions allow us to test and debug our code more easily,
w.

iii). Modularity:
 Functions allow us to break down our code into smaller, modular pieces,
2. What is the syntax for defining a function in PHP?
function function Name([parameter list])
ww

{
// code to be executed
}
3. How do you call a function in PHP?
☻ Calling a function is another name for executing the function.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 24

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

☻ A function is called simply by using the function name, along with an argument list, as a
statement.
☻ Syntax
functionName( ); (or)
functionName(argument list);

et
4. Write Short notes on Associative Array.
 An associative array is a data structure that stores a collection of key-value pairs.
 The keys are used to identify the values, and the values can be of any data type.

i.N
 The keys in an associative array are often called “labels” because they label or identify the
corresponding values.
 Exampl:
$student =[“Name”=>“Ram”,“Age”=>25,“Place”=>“Trichy”

la
IV. EXPLAIN IN DETAIL:
1. Explain the User defined Functions with suitable example.
sa
User Defined Function:
 It in PHP gives a privilege to user to write their own specific operation inside of
existing program module.
 SYNTAX:
da
function functionName( )
(
{ Custom Logic code to be executed; }
)
Pa

Function Calling:
 Once a function is defined it is executed by a function call.
 The programmer has to give a functions Call inside the respective program.
SYNTAX:
w.

functionName();
Example:
<?php
ww

function insertMsg() {
echo “Student Details Inserted Successfully!”;
} insertMsg(); // call the function
?>
Example:
Student details
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 25

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

2. Explain Indexed array and Associate array in PHP.


i). Indexed Arrays
 An array is defined using the keyword “array”.
 Each element of line array is assigned on index values which commences from O and
ends with n-1.

et
 Syntax: $Array_Variable=array(“value1”,”value2”,”value2”);
 Example:
<?php

i.N
$teacher_name=array(“Iniyan”, “Kavin”, “Nilani”); e
cho “The students name are “ . $teacher_name[0] . “, “ .
$$teacher_name[1] . “ and “ .
$teacher_name[2] . “.”; ?>

la
 Output:
The student name are Iniyan, Kavin and Nilani
ii). Associative arrays:
sa
 It are a key-value pair data structure.
 Instead of storing data in a linear array, with associative arrays you can store your
data in a collection and assign it a unique key which you may use for referencing
da
your data.
 Syntax : $Array_Variable = array(key=>value,key=>value,key=>value,etc.);
 Example:
<?php
Pa

$Marks=array(“Student1”=>“35”,“Student2”=>“17”,“Student3”=>“43”);
echo “Student1 mark is” . $Marks[‘Student1’] . “ is eligible for qualification”;
echo “Student2 mark is” . $Marks[‘Student2’] . “ is not eligible for qualification”;
?>
w.

 Output:
Student 1 mark is 35 is eligible for qualification
Student 2 mark is 17 is not eligible for qualification
ww

***************

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 26

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 6
CONDITIONAL STATEMENTS IN PHP
I. CHOOSE THE CORRECT ANSWER:
1. Which of the following is NOT a type of conditional statement in PHP?
a) if b) if ... else c) if ... elseif ... else d) while

et
2. What type of statement is the if...else statement?
a) Conditional statement b) Looping c) Input statement d) Output statement
3. What is the simplest conditional statement in PHP?

i.N
a) if-else statement b) if statement c) switch statement d) if-elseif-else statement
4. How does the if statement work in PHP?
a) A block of code is executed if a certain condition is true.
b) A block of code is executed if a certain condition is false.

la
c) A block of code is executed if multiple conditions are true.
d) A block of code is executed if multiple conditions are false.
sa
5. What happens if the condition in an “if” statement is false?
a) The code inside the curly braces is executed.
b) The code inside the curly braces is skipped.
c) The program terminates.
da
d) None of the above
6. What is the syntax for an if-else statement in PHP?
a) if(condition) { //True-block; }
Pa

b) if(condition) { //True-block; } else { //False-block; }


c) if-else(condition) { //True-block; } else { //False-block; }
d) if-elseif(condition) { //True-block; } else { //False-block; }
7. Which of the following is used to specify multiple conditions in an if ... else if ... else
w.

statement?
a) AND b) OR c) case d) elseif
8. Which of the following is used to specify multiple conditions in a switch statement?
a) AND b) OR c) case d) if
ww

9. What happens if none of the case values match the expression in a switch statement?
a) The default case block is executed b) The program terminates
c) The nearest case block is executed d) The first case block is executed
10. Which of the following is used to terminate the switch statement?
a) return b) continue c) goto d) break

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 27

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

II SHORT ANSWERS:
1. What are the different types of conditional statements in PHP?
 ‘if ’ statement
 ‘if …else’ statement
 ‘if … elseif … else’ statement

et
 ‘switch’ statement
2. Write the syntax for an if statement in PHP?
if (condition)

i.N
{
// code to be executed if condition is true;
}
3. What is the purpose of the if … else statement?

la
 The if ... else statement is a conditional statement in PHP.
 If the condition is True then the True-block is executed and if the condition is False then the
False- block is executed.
sa
4. Write the syntax for an if… else statement in PHP?
Syntax:
If (condition)
{
da
Execute statement(s) if condition is true;
}
else
{
Pa

Execute statement(s) if condition is false;


}
5. What is the role of the break statement in a which statement?
 In a switch statement is to terminate the case and exit the switch statement

III EXPLAIN IN BRIEF ANSWER:


w.

1. Write the syntax for an if … elseif… else statement in PHP.


if (condition1)
{
ww

// code to be executed if condition1 is true;


}
elseif (condition2)
{
// code to be executed if condition1 is false and condition2 is true;
}
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 28

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

elseif (condition3)
{
// code to be executed if condition1 and condition2 are false and condition3 is true;
}
else

et
{
// code to be executed if all conditions are false;
}

i.N
2. Write the syntax for a Switch statement in PHP.
switch (expression)
{
case value1:

la
//code to be executed if expression = value1;
break;
case value2: //code to be executed if expression = value2; break;
sa
... default:
//code to be executed if expression is not equal to any of the values;
}
da
3. In an if … elseif … else statement, where is the code executed if all conditions are false?
 The if ... elseif ... else is a conditional statement that allows you to check multiple conditions
and run different code based on which condition is true.
 It begins with the keyword ‘if’ and followed by one or more ‘elseif’.
Pa

 Finally ends with an ‘else’ part if all condtions are false.


IV EXPLAIN IN DETAIL:
1. Explain if… elseif…else statements with an example?
 If-elseif-else statement is a combination of if-else statement.
w.

 Here multiple conditions can be checked and action is based on the result of the condition.

Syntax:
ww

if (Condition 1)
{
Statement(s) if condition 1 is true;
}
elseif(Condition 2)
{

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 29

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

Statement(s) if condition 2 is true;


}
else
{
Statement(s) if both conditions are false;

et
}

Example:

<?php

i.N
$Pass_Mark=35;
$first_class=60;
$Student_Mark=70;
if ($Student_Mark>= $first_class){

la
echo “The Student is eligible for the promotion with First Class”;
}
sa
elseif ($Student_Mark>= $Pass_Mark){
echo “The Student is eligible for the promotion”;
}
else {
da
echo “The Student is not eligible for the promotion”;
} ?>
2. Discuss in detail about Switch statement with an example.
Pa

 The switch case is an alternative to the if.. elseif..else statement which executes a block of
code corresponding to the match.
Syntax:
switch (n) {
w.

case label1:
code to be executed if n=label1;
break;
case label2:
ww

code to be executed if n=label2;


break;
case label3:
code to be executed if n=label3;
break;

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 30

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

...
default:
code to be executed if n is different from all labels;
}
Example:

et
<?php
$favcolor = “red”;
switch ($favcolor) {

i.N
case “red”:
echo “Your favorite color is red!”;
break;
case “blue”:

la
echo “Your favorite color is blue!”;
break;
sacase “green”:
echo “Your favorite color is green!”;
break;
default:
da
echo “Your favorite color is neither red, blue, nor green!”;
}
?>
Pa
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 31

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 7
LOOPS IN PHP
I. CHOOSE THE CORRECT ANSWER:
1. Which of the following is NOT a type of loop statement in PHP?
a) for b) if ... else c) while d) do … while

et
2. What type of loop is “for loop” in PHP?
a) Entry-Check Loop b) Exit-Check Loop c) Counter Loop d) Iteration Loop
3. What is the syntax for for loop in PHP?

i.N
a) for (initialization; condition; increment) { // code}
b) foreach(initialization; condition; decrement) { // code}
c) while(condition)
d) do{...}while(condition)

la
4. What are the three parts of the for loop syntax in PHP?
a) initialization, condition, increment b) initialization, code block, condition
sa
c) code block, condition, increment d) condition, initialization, code block
5. When is the ‘initialization’ part of a for loop executed?
a) Before each iteration b) After each iteration
c) Only once at the beginning of the loop d) Only once at the end of the loop
da
6. What is the purpose of the ‘increment’ part of a for loop?
a) To initialize variables b) To update variables
c) To check the condition d) To execute the code block
Pa

7. What type of loop is “while loop” in PHP?


a) Entry-Check Loop b) Exit-Check Loop c) Counter Loop d) Iteration Loop
8. What type of loop is “do...while loop” in PHP?
a) Entry-Check Loop b) Exit-Check Loop c) Counter Loop d) Iteration Loop
w.

9. Which looping structure should be used to iterate over elements of an array in PHP?
a) for loop b) while loop c) do...while loop d) foreach loop
10. What is the output of the following code?
ww

$array = array(1, 2, 3, 4, 5);


foreach ($array as $value)
{
echo $value;
}
a) 1 2 3 4 5 b) 5 4 3 2 1 c) 1 1 1 1 1 d) None of the above

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 32

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

II. SHORT ANSWERS:


1. What is the purpose of a loop in PHP?
 A loop executes a set of instructions repeatedly for a certain number of times or until a
certain condition is met.
2. Write the Syntax for an ‘For’ loop in PHP.

et
Syntax:
For (init counter; test counter; increment counter)
{
Code to be executed

i.N
}
3. Write the Syntax for ‘while’ loop in PHP.
Syntax:
While (condition is true)

la
{
code to be executed
}
4. How is the ‘condition’ in a while loop evaluated?
sa
 while loop’ is called as the entry-check loop.
 So the condition is evaluated at the beginning of each iteration of the loop.
 If it is true, the code block is executed.
da
 If it is false, the loop is terminated.
5. What is the output of the following code snippet?
$i = 1;
While ($i < = 5)
Pa

{
Echo $i. “<br>”;
$i++;
}
w.

Output:
1
2
ww

3
4
5

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 33

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

III. EXPLAIN IN BRIEF ANSWER:


1. Describe the three parts of a for loop in PHP(initialization, condition and increment) and
explain their purpose.
i). Initialization:
 It is executed only once at the beginning of the loop.

et
 It is used to initialize variables.
ii). Condition:
 It is evaluated before each iteration of the loop.

i.N
 If it is true, the code block is executed. If it is false, the loop is terminated.
iii). Increment:
 It is executed after each iteration of the loop.
 It is used to update variables.

la
2. Write a PHP code to print 1 to 10 numbers in ascending order using for loop?
To print the numbers from 1 to 10 in ascending order
<?php sa
for ($i = 1; $i<= 10; $i++)
{
echo $i . “<br>”;
da
}
?>
Output:
1
Pa

2
3
4
5
w.

6
7
8
ww

9
10

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 34

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

3. Explain the difference between While loop and Do…while loops in PHP?
While Loop Do While Loop
Entry check Loop Exit Check Loop
While loop is used to execute a block of The do… while loop is similar to the while loop,
code until a certain condition is true. except that the code block is always executed

et
at least once, even if the condition is false
Syntax: Syntax:
while (condition) do

i.N
{ {
//code to be executed; //code to be executed;
} } while (condition);

la
IV.EXPLAIN IN DETAIL:
1. Explain ‘for’ loop with example?
For Loop: sa
 for loop’ is called as the entry-check loop.
 The for loop is used to execute a block of code a specific number of times.
Syntax:
da
 for (initialization; condition; increment/decrement)
{
//code to be executed;
}
Pa

Purpose of for Loop:


i). Initialization:
 It is executed only once at the beginning of the loop.
 It is used to initialize variables.
w.

ii). Condition:
 It is evaluated before each iteration of the loop.
 If it is true, the code block is executed. If it is false, the loop is terminated.
ww

iii). Increment:
 It is executed after each iteration of the loop.
 It is used to update variables.
Example:
To print the numbers from 1 to 5 in ascending order

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 35

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

<?php
for ($i = 1; $i<= 5; $i++)
{
echo $i . “<br>”;
}

et
?>
Output:
1

i.N
2
3
4
5

la
2. Write a PHP code to print 10 to 20 numbers in ascending order using while loop and do …
while loop?
i). PHP code using while loop:
sa <?php
$i = 10;
while ($i<= 20)
da
{
echo $i . “<br>”;
$i++;
}
Pa

?>
Output:
10
11
w.

12
13
14
ww

15
16
17
18
19
20

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 36

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

ii). PHP code using do……while loop:


<?php
$i = 10;
do
{

et
echo $i . “<br>”;
$i++;
}

i.N
while ($i<= 20);
?>
Output:
10

la
11
12
13
14
sa
15
16
da
17
18
19
Pa

20
3. Explain ‘foreach’ loop with examples?
Foreach Loop:
☻ The foreach loop is used to iterate over elements of an array.
w.

Syntax:
foreach ($array as $value)
{
//code to be executed;
ww

}
Example:
To print the the elements of an array:
$array = array(1, 2, 3, 4, 5);
foreach ($array as $value)

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 37

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

{
echo $value . “<br>”;
}
Output:
1

et
2
3
4

i.N
5
foreach loop to iterate over the keys and values of an associative array:
Syntax:
foreach ($array as $key => $value)

la
{
//code to be executed;
} sa
☻ The foreach loop will iterate over each element of the array and assign the key of the
element to the $key variable and the value of the element to the $value variable.
Example:
da
$array = array(“a” => 1, “b” => 2, “c” => 3);
foreach ($array as $key => $value)
{
echo $key . “ => “ . $value . “<br>”;
Pa

}
Output:
a=>1
a=>2
w.

a=>3
Explanation:
☻ It is used to perform a set of actions on each element of an array, such as printing the
ww

elements, summing them up, or modifying them in some way.


☻ It is a simple and efficient way to iterate over arrays in PHP.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 38

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 8
FORMS AND FILES
I. CHOOSE THE CORRECT ANSWER:
1. What are HTML forms used for?
a) To collect input from users b) To create server-side programming language

et
c) To create a database d) To send emails
2. Which of the following is NOT a form control available in HTML forms?
a) Text inputs b) Buttons c) Checkboxes d) Cropping Tool

i.N
3. Which tag is used to create an HTML form?
a) form b) input c) textarea d) select
4. What form control allows the user to select multiple values?
a) text inputs b) buttons c) checkboxes d) radio buttons

la
5. What form control allows the user to select only one value at a time?
a) text inputs b) buttons c) checkboxes d) radio buttons
sa
6. What is the purpose of validation in PHP?
a) To check the input data submitted by the user from the client machine
b) To display data to users
c) To store data on the server
da
d) To send data to the client
7. How many types of validation are available in PHP?
a) One b) Two c) Three d) Four
Pa

8. Which PHP function can be used to open a file?


a) fopen() b) fread() c) fclose() d) fwrite()
9. What PHP function can be used to read a file?
a) fopen() b) fread() c) fclose() d) fwrite()
w.

10. What PHP function can be used to close a file?


a) fopen() b) fread() c) fclose() d) fwrite()
II.SHORT ANSWERS:
ww

1. What is the main objective of PHP and HTML form controls?


 Main objective of PHP and HTML form controls are to collect data from users.
 It’s using textbox, dropdown box and radio button etc., and sent to server using PHP.
2. What are basic HTML form controls available?
 Text inputs
 Buttons

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 39

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 Checkbox
 Radio box
 File Select
 Form Tag
3. How are data collected via HTML form controls sent to the server?

et
☻ These data are collected via HTML form controls like textbox, dropdown box and radio button
etc.,
☻ All the input values are synchronized and sent to the server via POST method or GET method.

i.N
4. What is Validation in PHP?
 Validation is a process of checking the input data submitted by the user from client
machine.
5. What are the two types of validation available in PHP?

la
 Client-side Validation
 Server side validation.
III. EXPLAIN IN BRIEF ANSWER:
sa
1. Explain the difference between check box and radio button in HTML forms?
Check box Radio button
It is a important feature which selects more It is similar to check box but one value can
da
than one value from the HTML form be chosen at a time.
Must be checkable minimum one value Must be selectable minimum one value
2. Explain the difference between the POST method and GET method of sending data to the
server in PHP?
Pa

POST METHOD GET Method


The input data sent to the server with POST The input data sent to the server with POST
method is stored in the request body of the method via URL address is known as query
client’s HTTP request. string. All input data are visible by user after
w.

they click the submit button.


3. What are the different file handling tasks that can be performed using PHP?
 Files are processed for different tasks using the following events:
ww

 PHP Open a File


 PHP Read a File
 PHP Close a File
 PHP Write a File
 PHP Appending a File
 PHP uploading a File
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 40

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

IV. EXPLAIN IN DETAIL:


1. Discuss in detail about HTML form controls.
⁂ Main objective of PHP and HTML form controls are to collect data from users.
⁂ The following control types are available in HTML form controlling:
 Text inputs  Radio box

et
 Buttons  File select
 Checkbox  Form tag
 Text inputs contain textbox and text area controls.

i.N
 Buttons may contain Submit button, Reset button and Cancel Button.
 Checkbox is a important feature which selects more than one value from the HTML form.
 Radio box is similar to checkbox but one value can be chosen at a time.
 File select is the best feature to select one file from the local machine to server machine at a

la
time.
 Form tag is used to mention a POST or GET method and control the entire form controls in
the HTML document.
sa
2. Explain in detail of File handling functions in PHP.
 File handling is an important activity of all web application development process.
 Files are processed for different tasks using the following events:
da
 PHP Open a File,
 PHP Read a File,
 PHP Close a File,
 PHP Write a File,
Pa

i). PHP Open a File


 fopen() is a system function available in PHP.
 This function helps to open a file in the server.
w.

 It contains two parameters one for the file and the other one specifies in which mode the file
should be opened (Read/Write).
Syntax:
 $file_Object= fopen(“FileName”, “Read/WriteMode”) or die(“Error Message!”);
ww

ii). PHP Read a File:


 The fread() function reads from an open file. The file object comes from fopen function.
Syntax:
 fread($file_Object,filesize(“FileName”));

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 41

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

iii). PHP Close a File:


 The fclose() function is used to close an opened file. The file object comes from fopen
function.
Syntax:
 fclose($file_Object);

et
iv). PHP write a File:
 The fwrite() function is used to write to a file.
Syntax:

i.N
 fwrite($myfile, $txt);

************

la
sa
da
Pa
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 42

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 9
CONNECTING PHP AND MYSQL
I. CHOOSE THE CORRECT ANSWER:
1. Which is the correct function to execute the SQL queries in PHP ?
a) mysqli_query(“Connection Object”,”SQL Query”)

et
b) query(“Connection Object”,”SQL Query”)
c) mysql_query(“Connection Object”,”SQL Query”)
d) mysql_query(“SQL Query”)

i.N
2. Which is the correct function Closing Connection in PHP ?
a) mysqli_close(“Connection Object”); b) close(“Connection Object”);
c) mysql_close(“Connection Object”); d) mysqli_close(“Database Object”);
3. Which is the correct function to establish Connection in PHP ?

la
a) mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
b) connect(“Server Name “,”User Name”,”Password”,”DB Name”);
sa
c) mysql_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
d) mysqli_connect (“Database Object”);
4. Which is the not a correct MySQL Function in PHP ?
a) Mysqli_connect() Function b) Mysqli_close() Function
da
c) mysqli_select_data() Function d) mysqli_affected_rows() Function
5. How many parameter are required for MYSQLi connect function in PHP ?
a) 2 b) 3 c) 4 d) 5
Pa

6. How many parameter are required for MYSQLi query function in PHP ?
a) 2 b) 3 c) 4 d) 5
7. How many parameter are required for MYSQLi Close function in PHP ?
a) 1 b) 2 c) 3 d) 5
w.

8. Which version of PHP supports MySQLi fuctions ?


a) Version 2.0 b) Version 3.0 c) Version 4.0 d) Version 5.0
II.SHORT ANSWERS
1. What are the MySQLi function available PHP?
ww

 Mysqli_connect()function
 Mysqli_close()function
 Mysqli_query()function
2. What is MySQLi function?
 It is extension in PHP scripting language which gives access to the MYSQL database.
 Functions are available for mysqli database connectively and executing SQL queries.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 43

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

3. What are the types MySQLi function available PHP?


 Database Connections
 Managing Database Connections
 Performing Queries
 Closing Connection

et
4. Difference between Connection and Close function?
Connection function Close function
Before accessing MySQL database, connect to Mysqli_close() function is used to close an

i.N
databae server machine via PHP scripting existing opend database connection between
language using Mysqli_connect() function PHP scripting and MySQL database server
Syntax: Syntax:
mysqli_connect mysqli_close(“Connection Object”);

la
(“server_Name”,”User_Name”,”Password”,
”DB_Name”);
sa
5. Give few examples of MySQLi Queries.
 $con=mysqli_connect(“localhost”, “my_user”, “my_password”, “Student_DB “);
 $sql=”SELECT student_name student_age FROM student”;
 mysqli_query($con,$sql);
da
6. What is Connection string?
 Before accessing MySQL Database, connect to Database Server machine via PHP scripting
language using MySQLI_connect()function.
Syntax:
Pa

 Mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);


III.EXPLAIN IN BRIEF ANSWER:
1. Write the Syntax for MySQLi Queries.
“MYSQLI_QUERY”
w.

 It is a function, that helps to execute the SQL query statements in PHP scripting language.
Syntax:
 mysqli_query(“Connection Object”,”SQL Query”)
ww

Example:
 $con=mysqli_connect(“localhost”,”my_user”,”my_password”,”Student_DB “);
 $sql=”SELECT student_name,student_age FROM student”;mysqli_query($con,$sql);
2. Write is the purpose of MySQLi function available.
 In PHP Scripting language many functions are available for MySQL Database connectivity and
executing SQL queries.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 44

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 Mysqli_connect() Function
 Mysqli_close() Function
 Mysqli_query()Function
3. Write MySQL Connection Syntax with example.
Syntax:

et
mysqli_connect (“Server Name “,”User Name”,”Password”,”DB Name”);
Example:
$conn = mysqli_connect($servername, $username, $password,$DB_name);

i.N
IV.EXPLAIN IN DETAIL:
1. Discuss in detail about MySQL functions with example?
 In PHP Scripting language many functions are available for MySQL Database connectivity and
executing SQL queries.

la
 Mysqli_connect() Function
 Mysqli_close() Function
sa  Mysqli_query()Function
i). Mysqli_connect() Function :
 Before accessing MySQL Database, connect to Database Server machine via PHP scripting
language using Mysqli_connect() Function.
da
Syntax:
 mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
ii). Mysqli_close() Function :
 mysqli_close() Function is used to close an existing opened database connection between
Pa

PHP scripting and MySQL Database Server.


Syntax:
mysqli_close(“Connection Object”);
w.

Example:
<?php
$con=mysqli_connect(“localhost”,”$user”,”$password”,”SCHOOL_DB”);
mysqli_close($con);
ww

?>
iii). Mysqli_query()Function
 The main goal of MySQL and PHP connectivity is to retrieve and manipulate the data from
MySQL database server.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 45

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 The SQL query statements help in PHP MySQL extension to achieve the objective of MySQL
and PHP connection.
 “mysqli_query” is a function that helps to execute the SQL query statements in PHP scripting
language.
Syntax:

et
 mysqli_query(“Connection Object”,”SQL Query”)
Example:
 $con=mysqli_connect(“localhost”,”my_user”,”my_password”,”Student_DB “);

i.N
 $sql=”SELECT student_name,student_age FROM student”;mysqli_query($con,$sql);
2. Explain in details types of MySQL connection method in PHP?
i). Database Connection :
 Before accessing MySQL Database, connect to Database Server machine via PHP scripting

la
language using Mysqli_connect() Function.
Syntax:
 mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
sa
ii). Managing Database Connection:
 The below code describes managing database connection methods and featurs.
<?php
da
$servername = “localhost”;
$username = “username”;
$password = “password”;
$DB_name = “School_DB”;
Pa

$conn = mysqli_connect($servername, $username, $password,$DB_name);

if (!$conn) {
w.

die(“Connection failed: “ . mysqli_connect_error());


}
echo “Connected successfully”;
?>
ww

 In the above code snippet, four variables are used to connect to the Database server.
 They are
$servername -> Database Server Server IP address
$username -> Database Server User Name
$password -> Database Server Password

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 46

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

$DB_Name -> Database Name


 The mysqli_connect function uses these variables to connect Database server to PHP.
 If connection gets fail, output will be printed with MySQL error code.
 Otherwise connection is success.
3. Explain MySQLi Queries with examples?

et
 The main goal of MySQL and PHP connectivity is to retrieve and manipulate the data from
MySQL database server.
 The SQL query statements help in PHP MySQL extension to achieve the objective of MySQL

i.N
and PHP connection.
 “mysqli_query” is a function that helps to execute the SQL query statements in PHP scripting
language.
Syntax:

la
 mysqli_query(“Connection Object”,”SQL Query”)
Example:
 $con=mysqli_connect(“localhost”,”my_user”,”my_password”,”Student_DB “);
sa
 $sql=”SELECT student_name,student_age FROM student”;
 mysqli_query($con,$sql);
da
Pa
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 47

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 10
INTRODUCTION TO COMPUTER NETWORK
I.CHOOSE THE CORRECT ANSWER:
1. A set of computers connecting together is called as ----------
a) Network b) Server c) Hub d) Node

et
2. Many discussion in an online forum leads to personal attacks and is called
a). Hackers b). Virus c). Online war d). Flame war

i.N
3. Wi-Fi is short name for
a) Wireless Fidelity b) Wired fidelity c) Wired fiber optic d) Wireless fiber optic
4. Which among them was challenging to the business people on computer networking
a) Hacking b) Viruses c) Both a & b d) none of this above

la
5. Which one of the following is not the social media
a) Gmail b) Facebook c) twitter d) Linkedin
6. In mobile network, land areas for network coverage was distributed as
sa
a) Firmware b) cells c) Range d) Service
7. Which one of the following are harmful to computer?
a) Bloggers b) Browser c) Hackers d) twitter
da
II.SHORT ANSWER:
1. What is Computer Network.
 A set of computers connected together for the purpose of sharing resources is called as
computer networks.
Pa

2. Write a short note on Internet.


 The connection of Individual networks operated by academic persons, industry people,
government and private parties.
 Internet stands for INTER connected Network.
w.

3. What are the common uses of computer network?


 Communication
 Resource sharing
ww

 Information Sharing
4. What is node in computer network?
 A computer which is connected to a network is called as node.
 The data transferred between nodes is also called as a source and destination

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 48

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

III. EXPLAIN IN BRIEF ANSWER:


1. Write a note on Resource sharing?
 It allows all kind of programs, equipments and data to be accessed by anyone via network
irrespective of the physical location of the resource.
 Simply resource sharing is a sharing of devices like printers, scanner, PDA, fax machine, and

et
modems.
2. List out some benefits of social networks.
 Group information sharing over long distances.

i.N
 Broadcast announcements.
 Fostering diversity of thought.
3. Write a note on mobile network?
☻ It is the network connecting devices without cable (wireless).

la
☻ Mobile computers, such as laptop, tablet, and hand held computers, were fastest growing
segments.
☻ At land areas network was distributed as cells, each will be served by single – location
sa
transceiver, but generally three cell sites or a base transceiver station.
☻ This portable transceivers used to communicate with one another with fixed transceivers and
moving via more than one cell during transmission.
da
IV.EXPLAIN IN DETAIL:
1. Explain uses of computer network
 The common uses of computer network are
 Communication
Pa

 Resource sharing
 Information sharing
 Communication:
☻ Using computer networks, we can interact with the different people with each other all
w.

over the world.


☻ People can easily communicate at very low cost via mobile, social media, telephone, e-
mail, chatting, video conferencing, SMS, MMS, groupware etc…
ww

 Resource sharing:
☻ It allows all kind of programs, equipments and data to be accessed by anyone via network
irrespective of the physical location of the resource.
☻ Simply resource sharing is a sharing of devices like printers, scanner, PDA, fax machine,
and modems.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 49

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 Information sharing:
☻ Using computer network, any application or other software can be stored at a central
computer or server.
☻ The software can be shared among other computers of the network.
2. Explain about social application in computer network?

et
 To get connected with people around the world through social network media,
 Applications like Whatsapp, Face book, Twitter, Blogs, Pinterest, Classmate and so on are in
full fledge use.

i.N
 Membership:
 Social nets generally requires user to register names and accounts to avoid duplicate and
maintain secrecy.
 Content contribution:

la
☻ These networks allow members to easily share comments, audio, video, text, animation
files etc with others.
sa
 Frequent visits:
 Healthy social net have a group of members who check in regularly to contribute their
share and also for new updates.
da
 Relationship building:
 The common goal of most social networks is to allow interaction among people, which
create stronger connection with people of different communities.
Pa

**********
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 50

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 11
NETWORK EXAMPLES AND PROTOCOLS
I. CHOOSE THE CORRECT ANSWER:
1. Which one of the following will be easy way to use Internet technology and the public
telecommunication system to securely share business’s information with suppliers,

et
vendors, partners and customers.
a) Extranet b) Intranet c) arpanet d) arcnet
2. Match the following and choose the correct answer

i.N
i. HTTP -The core protocol of the World Wide Web.
ii. FTP- enables a client to send and receive complete files from a server.
iii. SMTP - Provide e-mail services.
iv. DNS- Refer to other host computers by using names rather than numbers.

la
a) i, ii, iii, iv b) ii, iii, iv, i c) iii, iv, i, ii d) iv, iii, ii, i
3. Communication over ------------ ------is be made up of voice, data, images and text messages.
sa
a) Social media
4. Wi-Fi stands for---------------------
b) mobile network c) whatsapp d) software

a) Wireless Fidelity b) wired fidelity c) wired optic fibre d) wireless optic fibre
5. A TCP/IP network with access restricted to members of an organization
da
a) LAN b) MAN c) WAN d) Intranet
6. RFID stands for --------------
a) Radio Free identification b) real Frequency identity
Pa

c) Radio Frequency indicators d) Radio Frequency Identification.


7. It guarantees the sending of data is successful and which checks error on operation at OSI
layer is--------------
a) Application layer b) Network layer c) Transport Layer d) Physical layer
w.

8. Which one of the following will secure data on transmissions?


a) HTTPS b) HTTP c) FTP d) SMTP
9. ----------- provides e-mail service
a) DNS b) TCP c) FTP d) SMTP
ww

10. ------------- refer to other host computers by using names rather than numbers.
a) DNS b) TCP c) FTP d) SMTP

II.SHORT ANSWER:
1. Define Intranet
 It is a private network within an enterprise to share company data and computing resources
between the employees.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 51

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

2. What are the uses of mobile networks?


 Can connect the network without cable
 Less consumption of power
 Huge capacity than a large transmitter
 Covering large area than a single transmitter

et
3. List out the benefits of WiFi?
 It provides mobility
 It provides connection to internet

i.N
 Flexibility of LAN
 Ensures connectivity
4. Expand HTTP, HTTPS, FTP.
☻ HTTP – Hypertext Transfer Protocol

la
☻ HTTPS – Hypertext Transfer Protocol Secure
☻ FTP – File Transfer Protocol
III. EXPLAIN IN BRIEF ANSWER:
sa
1. Compare Internet, Intranet and Extranet
Internet Intranet Extranet
Public Private Private
da
Large number of connected Limited number of connected Limited number of connected
devices devices devices over internet
Not owned by anyone Owned by a particular Owned by one or more
organization organization
Pa

WWW, Email, Social media Departments company Suppliers, customers and


organization vendors

2. Write short notes on HTTP, HTTPS, FTP.


 HTTP – It is used between a web client and a web server and it guarantees non-secure data
w.

transmissions.
 HTTPS – It is used between a web client and a web server ensures secure data
transmissions.
ww

 FTP – It is used between computers for sending and receiving file.


4. What are the layers available in TCP/ IP Reference Model?
 Network Access Layer - concerned with building packets.
 Internet Layer - describes how packets are to be delivered.
 Transport Layer - ensure the proper transmission of data.
 Application Layer - application network processes.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 52

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

IV. EXPLAIN IN DETAIL:


1. Explain about Internet, Intranet and Extranet.
Internet  A global network, public TCP/IP network used by over a billion people all
over the world.
 Example: Sending email to a friend

et
Intranet  A TCP/IP network with access restricted to members of an organization.
 Example: Accessing your record in the employee personnel file
Extranet  A TCP/IP network with restricted access to members.

i.N
 Example: Checking availability of inventory from an outside supplier
2. Discuss about OSI model with its layers.
OSI Layers Definition
Physical Layer This is the 1st layer, it defines the electrical and physical specification for

la
devices.
Data Link Layer This is the 2nd layer it guarantees that the data transmitted. “802.3 for
sa
Network Layer
Ethernet” and “802.11 for Wi-Fi”.
This is the 3rd layer, determining the path of the data packet is using IP
Address.
Transport Layer This is the 4th layer guarantees the sending data is successful. It includes
da
error checking operation .
Session Layer This is the 5th layer identifies the system session between different
network entities.
Presentation Layer This is the 6th layer Encryption and decryption protocols occur in this
Pa

layers such as secure socket layer.


Application Layer This is the 7th layer it acts the user interface platform comprising of
software within the system
3. Difference between TCP/IP and OSI Reference Model.
w.

S.NO TCP/IP OSI


1 Implementation of OSI model Reference model
2 4 layers 7 layers
ww

3 Horizontal approach Vertical approach


4 Supports only connection less Supports connectionless and connection-
communication oriented communication
5 Protocol dependent standard Protocol independent standard
6 Considered more reliable Considered a reference tool
*********

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 53

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 12
DNS(DOMAIN NAME SYSTEM)
I. CHOOSE THE CORRECT ANSWER:
1. Which of the following is used to maintain all the directory of domain names?
a) Domain name system b) Domain name space c) Name space d) IP address

et
2. Which of the following notation is used to denote IPv4 addresses?
a) Binary b) Dotted-decimal c) Hexadecimal d) a and b
3. How many bits are used in the IPv6 addresses?

i.N
a) 32 b) 64 c) 128 d) 16
4. Expansion of URL is
a) Uniform Resource Location b) Universal Resource Location
c) Uniform Resource Locator d) Universal Resource Locator

la
5. How many types are available in Relative URL?
a) 2 b) 3 c) 4 d) 5
sa
6. Maximum characters used in the label of a node?
a) 255 b) 128 c) 63 d) 32
7. In domain name, sequence of labels are separated by
a) ;(semicolon) b) .(dot) c) : (colon) d) NULL
da
8. Which of the following initiates the mapping of domain name to IP address?
a) Zone b) Domain c) Resolver d) Name servers
9. Which is the contiguous area up to which the server has access?
Pa

a) Zone b) Domain c)Resolver d) Name servers


10. Root name servers are maintained by
a). IANA b). ICANN c). WHOIS d). DNS
II. SHORT ANSWERS:
w.

1. List any four domain names.


☻ .Com
☻ .Edu
☻ .Gov
ww

☻ .mil
2. What is an IP address?
 Increased protocol address is the logical address in the network layer
 IP address is also used to find the host system in the whole network

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 54

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

3. What is an URL?
 URL is the address of a document on the Internet.
 URL is made up four parts protocols, host name, folder name and file name.
4. List out four URLs you know.
☻ http://www.googe.com

et
☻ http://www.yahoo.com
☻ http://www.facebook.com
☻ http://www.gmail.com

i.N
5. What is a zone?
⁂ A group of contiguous domains and sub domains in the domain name space.
6. What is a resolver?
 A program which is responsible for initiating the translation of a domain name into an IP

la
Address.
7. Write any four generic Top Level Domains.
 Com – Commercial Organization
sa
 Edu – Educational Institutions
 Gov –Government
 Mil – Military groups
da
8. Mentioned the components of DNS.
 Name space
 Name server
 Zone
Pa

 Resolver
III. EXPLAIN IN BRIEF ANSWER:
1. Write a note on URL and its types.
 URL (Uniform Resource Locator) is the address of a document on the Internet.
w.

 It is made up four parts: protocols, hostname, folder name and file name.
 URL Type:
 Absolute URL  Relative URL
ww

2. Differentiate IPv4 and IPv6.


IPv4 IPv6
32 bits 128 bits
Binary and dotted-decimal notation Hexadecimal notation
4billion addresses 16 billion addresses

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 55

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

3. What are the differences between Absolute URL and Relative URL?
Absolute URL Relative URL
Used to link web pages on different websites. Used to link web pages within the same websites.
Difficult to manage Easy to manage
Protocols, hostname, folder name and file Folder name and file name.
Name.

et
4. Write a note on domain name.
 It is the sequence of labels.

i.N
 In domain name the sequence of labels are separated by dot (.).
 The domain name is always read from the lower level to higher level i.e., from the leaf
node to root node.
IV. EXPLAIN IN DETAIL:

la
1. Classify and Explain the IP address and its classification.
 Internet Protocol (IP) address is simply the logical address in the network layer.
 The door number or flat number is used to differentiate individual house from others in the
sa
same apartment.
 IP address is also used to find the host system in the whole network.
Headings Internet Protocol Version 4 Internet Protocol version 6
da
Deployed 1981 1999
Address size 32-bit number 128-bit number
Address format Dotted decimal notation Hexadecimal notation
Pa

Notation 192.149.252.76 3FFE:F200:0234:AB00


0123:4566:8901:ABCD
Configuration Manually or DHCP Auto-configuration or DHCP
Number of Address 232 = 4 billion address 2128 – 16 billion address
Address types Unicast, multicast, broadcast Unicast, multicast, anycast
w.

Packet Routers and sending hosts Sending hosts only


fragmentation
2. Explain about the name server? And its types?
ww

Name Server:
 Name Server is a main part in the Domain Name System (DNS).
 It translates the domain names to IP addresses.
 The DNS database which consists of domain names and their corresponding IP addresses.
 There is a need to store large number of domain names for the world wide usage.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 56

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 So plenty of servers are used in the hierarchical manner.


 Name servers do the important task of searching the domain names.
Types of Name Servers
 Root Name Server :
 The top level server which contains entire DNS tree, maintained by ICANN.

et
 There are 13 servers.
 Primary/Master Name Server
 It contains a zone resource records.

i.N
 These records are updatable by domain name holders such as organizations.
 Secondary/Slave Name Server:
 It contains a copy of primary server files.
 This server has no authority to update, but reduce the workload of master server

la
by sharing the queries
3. Explain how the DNS is working.
 The user enters the URL in the browser, the system first checks its DNS cache for the
sa
corresponding IP address.
 If the IP address is found in the cache then the information is retrieved from cache.
 The system needs to query the resolver about the IP address from Internet Service Provider
da
(ISP).
 Each resolver has its own cache and if it is found in that then that information is retrieved.
 Then the resolver returns the record back to the computer browser which is then viewed by
the user.
Pa

***********
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 57

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 13
NETWORK CABLING
I. CHOOSE THE CORRECT ANSWER:
1. ARPANET stands for
a) American Research Project Agency Network b) Advanced Research Project Area Network

et
c) Advanced Research Project Agency Network d) American Research Programs And Network
2. WWW was invented by
a) Tim Berners Lee b) Charles Babbage c) Blaise Pascal d) John Napier

i.N
3. Which cable is used in cable TV to connect with setup box?
a) UTP cable b) Fibre optics c) Coaxial cable d) USB cable
4. Expansion of UTP is
a) Uninterrupted Twisted Pair b) Uninterrupted Twisted Protocol

la
c) Unshielded Twisted Pair d) Universal Twisted Protocol
5. Which medium is used in the optical fibre cables to transmit data?
sa
a) Microwave b) Infra red c) Light d) Sound
6. Which of the following is a small peripheral device with a sim slot to connect the computers
to Internet?
a) USB b) Dongles c) Memory card d) Mobiles
da
7. Which connector is used in the Ethernet cables?
a) RJ11 b) RJ21 c) RJ61 d) RJ45
8. Which of the following connector is called as champ connector?
Pa

a) RJ11 b) RJ21 c) RJ61 d) RJ45


9. How many pins are used in RJ45 cables?
a) 8 b) 6 c) 50 d) 25
10. Which wiring standard is used for connecting two computers directly?
w.

a) Straight Through wiring b) Cross Over wiring c) Rollover wiring d) None


II. SHORT ANSWERS:
1. Write a note on co-axial cable.
 Coaxial cables are used for connecting the television with setup box.
ww

 This cable is used to transfer the information at 10 mbps speed.


2. What are the uses of USB cables?
 Universal Serial Bus, connects all the peripheral devices with the computers.
3. What is an Ethernet port?
 The Ethernet pot is the jack where the Ethernet cable is to be connected.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 58

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 This port will be there in both the computers and the LAN port.
4. What is the use of Crimping tool?
 It is a physical tool which is used to connect the patch wire and the Ethernet connector
(RJ45).
5. What are the types of twisted pair cables?

et
 Shield Twister pair (STP)
 Unshielded Twisted Pair (UTP)
6. What is meant by champ connector?

i.N
 RJ -21 connector has 50 pins with 25 pins a one end and 25 pins at the other end it is also
called as champ connector.
III. EXPLAIN IN BRIEF ANSWER:
1. Write a note on crossover cables.

la
 The first colored wire at one end of the cable is the third colored wire at the other end of the
cable.
 It is called crossover cables.
sa
2. Write a short note on RJ45 connector.
☻ The RJ45 Ethernet connector is a small plastic cup which will be used to connect the wire
inside the connector and ready to use to connect the Internet.
da
3. What is meant by null modem cable? Give the example?
 A cable interconnecting two devices directly is known as a null modern cable.
 RS-232 cable is also for inter connecting two computers without modern
 So it is also a null modern cable
Pa

5. What are the components involved in Ethernet cabling?


 Patch cable (Twisted pair)
 RJ45 Connector
 Ethernet Ports
w.

 Crimping tool
6. What are the types of Fiber optic cables?
☻ There are two types of fiber optic cables are available
ww

☻ Single mode
☻ Multimode
IV. EXPLAIN IN DETAIL:
1. What is meant by Registered Jack? Explain briefly the types of Jacks.
i). Registered Jacks:

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 59

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 A Registered Jack commonly known as RJ is a network interface used for network cabling,
wiring and jack construction.
 The primary function of the registered jack is to connect different data equipment and
telecommunication devices.
 The registered jack refers to the male physical connector (Plug), a female physical connector

et
(Jack) and it’s wiring.
ii). Types:
 RJ-11  RJ-21

i.N
 RJ-45  RJ-28.
iii). Explanation:
i). RJ-11:
 It is the most popular modern form of registered jack.

la
 It is found in home and office.
 This registered jack is mainly used in telephone and landlines.
 There are 6 pin where 2 pin give transmission configuration and another 2 pin give
sa
receiver configuration.
ii). RJ-14 and RJ-61:
 The RJ-14 is the same as RJ-11 which will be used for telephone lines which has 6 pins.
da
 This RJ-61 will use the twisted pair cable with a modular 8 connection.
iii). RJ-21:
 The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end.
 It is also called as champ connector or Amphenol connector.
Pa

 The Amphenol is a connector manufacturer.


 The RJ-21 interface is typically used for data communication trucking applications.
2. Explain the components used in Ethernet cabling.
 Ethernet cabling is the process of connecting the computers with other devices using
w.

Ethernet cables.
 The four main components used in the Ethernet cabling components are
 Patch Cable (Twisted pair)
ww

 RJ45 Connector
 Ethernet Ports
 Crimping Tool
i). Patch Cable (Twisted Pair):
 These Cables are generally made up of 8 wires in different colors.
 Four of them are solid colours, and the others are striped.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 60

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 The eight colors are white green, green, white orange, blue, white blue, orange, white brown
and brown.
ii). RJ45 connector:
 In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of
interface standard.

et
 It is a Small plastic cup.
 It has eight pins
iii). Ethernet card and Port:

i.N
 Ethernet port is an opening which is a part of an Ethernet card.
 It accepts RJ45 connector with Ethernet cable.
 It is found on personal computers, laptops, routers, switches.
iv). Crimping Tool:

la
 It is a physical tool which is used to connect the patch wire and the Ethernet connector
 The crimping toos looks like a small cutting handle with two mold of Ethernet port.
3. Explain the types of network cables?
sa
 There are many types of cables available in the networking.
 Here we are going to discuss about six different types of cables.
i). Coaxial Cables:
da
 It is used to connect the television sets to home antennas.
 This cable is used to transfer the information in 10 mbps.
 The cable is divided into thinnet and thicknet cables.
ii). Twisted Pair Cables:
Pa

 It is type of cable with two or more insulated wires twisted together.


 It started with a speed of 10 mbps (10BASE-T cable is used).
 There are two types of twisted pair cables, Unshielded Twisted Pair (UTP) and Shielded
Twisted pair (STP).
w.

iii). Fiber Optics:


 These cable strands of glass and pulse of light is used to send the information.
 They are mainly used in wide area network.
ww

 These cables are placed in deep underground to avoid any damage to the cables.
 Single mode cables used for long distance transmission and at a high cost.
 Multi-mode cables are used for short distance transmission at a very low cost.
iv). USB Cables:
 The Universal Serial Bus is used to connect keyboard, mouse and other peripheral devices.
 To connect the Internet through the USB called dongles.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 61

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 The dongle is a small peripheral device with a slim slot in it and connects the Internet.
V). Ethernet Cables:
 Ethernet cable is the most common type of network cable mainly used for connecting the
computers or devices at home or office.
 This cable connects wired devices within the local area network (LAN) for sharing the

et
resources and accessing Internet.

****************

i.N
la
sa
da
Pa
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 62

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 14
OPEN SOURCE CONCEPTS
I. CHOOSE THE CORRECT ANSWER:
1. If the source code of a software is freely accessible by the public, then it is known as
a) Freeware b) Firmware c) Open source d) Public source

et
2. Which of the following is a software program that replicates the functioning of a computer
network?
a) Network software b) Network simulation

i.N
c) Network testing d) Network calculator
3. Which of the following can document every incident that happened in the simulation and
are used for examination?
a) Net Exam b) Network hardware c) Trace file d) Net document

la
4. Which is an example of network simulator?
a) simulator b) TCL c) Ns2 d) C++
sa
5. Choose the Correct Pair from the following to build NS2
a) UNIX & TCL b) UNIX & a. C++ c) C++ & OTcl d) C++ & NS2
6. Which of the following is not network simulation software?
a) Ns2 b) OPNET c) SSFNet d) C++
da
7. Which of the following is a open source network monitoring software?
a) C++ b) OPNET c) Open NMS d) OMNet++
8. Open NMS was released in …………………
Pa

a) 1999 b) 2000 c) 2003 d) 2004


II. SHORT ANSWERS:
1. What is open source software?
 Open Source denotes to some program whose source code is made available for usage or
w.

reform as users or other developers see appropriate


2. What is meant by network simulator?
☻ It is a software program that replicates the functioning of a computer network.
3. What is trace file?
ww

☻ A significant output of simulations is the trace files.


☻ It can document every incident that happened in the simulation and are used examination.
4. Write short notes on NS2.
☻ OTCL and C++ used to create and run NS2.
☻ It works on windows and Linux that supports wired or wireless network.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 63

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

5. Write short note on Open NMS?


☻ Open Network Management System is a free and open-source initiative grade network
monitoring and management platform.
III. EXPLAIN IN BRIEF ANSWER:
1. What are the uses of Open source Network Software?

et
 Select and use any software
 Without any cost and restrictions
 Software are very user friendly

i.N
 Program writing skills.
2. Explain Free software.
 Free software is a concept developed in the 1980s by an MIT computer science researcher, Richard
Stallman who defined four conditions - as outlined by the nonprofit Free Software Foundation.

la
 It enhances the ability of users to use and enjoy software as they see fit.
3. List out the Popular open source software.
sa NS2 Open Office
OPEN NMS ANDROID
MySQL PHP
PDF Creator FIREFOX
da
4. Write note on open source hardware.
 The computers used by individuals or business organisations may have spy hardwares of
rivals.
Pa

 Open source hardware technology helps in such threats.


 In this technique we get the components of the hardware and its circuit diagram, so that we
can remove suspicious spyware if found.
5. Explain Types of Organisations related to Open Source.
w.

 Apache Software foundation


 The Document Foundation
 The Eclipse Foundation
 Free Software Foundation
ww

 Linux Foundation
 Open Course Ware Conortium
 Open Source Initiative

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 64

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

IV. EXPLAIN IN DETAIL:


1. Differentiate Proprietary and open source software.
Proprietary Software Open Source Software
It is owned by the Individual or It is developed and tested through open
organization. collaboration

et
The project is managed by developers and The project is managed by group of
programmers individuals or team work
It provides limited scope with restrictions It provides better flexibility and more

i.N
and all freedom
Not edit the source code Edit the source code
Ex: Windows, Mac OS, google earth etc., Ex: Android, Firefox, Ubuntu etc.,

la
2. List out the Benefits of Open Source Software?
 OSS projects are collaboration opportunities that improve skills and build connections in the
field.
sa
 Domains that developers can contribute to the open source community include:
 Communication tools.
 Distributed revision control systems.
da
 Bug trackers and task lists.
 Testing and debugging tools.
 There are many open source software’s. So, we can select and use any software.
 The complete options of the software can be used without any cost and restrictions.
Pa

 We can share our ideas with the team, write the required code and share it with many.
 We can learn many ideas and make our program writing skills more efficient.
 Many open source software are very user friendly.
***********
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 65

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 15
E-COMMERCE

I. CHOOSE THE CORRECT ANSWER:


1. A company has E-Business if

et
a) it has many branches across the world.
b) it conduct business electronically over the Internet.
c) it sells commodities to a foreign country.

i.N
d) it has many employees.
2. Which of the following is not a tangible good?
a) Mobile b) Mobile Apps c) Medicine d) Flower bouquet
3. SME stands for

la
a) Small and medium sized enterprises b) Simple and medium enterprises
c) Sound messaging enterprises d) Short messaging enterprises
4. The dotcom phenomenon deals with ________
sa
a) Textile industries b) Mobile phone companies
c) Internet based companies d) All the above
5. Which of the following is not correctly matched
da
a) The First Wave of Electronic Commerce: 1985 -1990
b) The Second Wave of Electronic Commerce: 2004 – 2009
c) The Third Wave of Electronic Commerce: 2010 – Present
d) Dotcom burst: 2000 – 2002
Pa

6. Assertion (A): The websites of first wave dotcom companies were only in English
Reason (R): The dotcom companies of first wave are mostly American companies.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
w.

c) (A) is true and (R) is false d) (A) is false and (R) is true
7. Off-shoring means
a) Work outsourced to a branch of its own company
ww

b) Work outsourced to new employees


c) Work outsourced to a third party locally
d) Work outsourced to a third party outside its own country
8. G2G systems are classified into
a) Internal facing and external facing b) Internet facing and Extranet facing
c) Internal flag and external flag d) Internet flag and Extranet flag
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 66

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

9. ____ host the e-books on their websites.


a) Bulk-buying sites b) Community sites c) Digital publishing sites d) Licensing sites
10. Which of the following is not a characteristic of E-Commerce?
a) Products cannot be inspected physically before purchase.
b) Goods are delivered instantly.

et
c) Resource focus supply side d) Scope of business is global.
II. SHORT ANSWERS:
1. Define E-Commerce.

i.N
 It can be described as the process of buying or selling products, service or information via
Internet.
 E-stands for electronic.
2. Distinguish between E-Business and E-Commerce

la
E-Business E-Commerce
It’s entirely depends on the internet for its It is commercial transaction through
every intra and inter company activities.
sa Internet
it is grounded on technologies such as network It is limited with monetary transaction
infrastructure, messaging and information. using internet
It is superset of E-Commerce It is a subset of E-Business
da
3. Differentiate tangible goods and electronic goods with example of your own.
Tangible Electronic (Intangible)
They have a physical existence They do not have a physical existence.
Pa

Ex: Vehicle, plant, machinery Ex: Software, Logo, Patent etc.,


4. What is dotcom bubble and dotcom burst?
 The dotcom bubble was a historic excessive growth.
 The Dotcom burst Nasdaq-composite stock market index.
w.

5. Write a short note on out-sourcing.


 Hiring third party service providers to handle business on behalf.
 If a company’s work is hired to another company, it would be termed as outsourcing
III. EXPLAIN IN BRIEF ANSWER:
ww

1. Describe how E-Commerce is related to socio-technological changes.


☻ Growth of E-commerce is also related to the socio-technological changes.
☻ Increase of users, increase the markets.
☻ Technology facilities E-commerce Growth.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 67

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

2. Write a short note on the third wave of E-Commerce.


 It is brought on by the mobile technologies.
 It connects users via mobile devices for real-time and on demand transaction.
 Not only the information is filtered by time, but also the geographic coordinates are used to
screen the specific location-tailored information properly.

et
3. Explain B2B module in E-Commerce.
 In B2B E-Commerce, commercial transactions take place between different business
organizations, through the Internet.

i.N
 For example, a cycle company may buy tyres from another company for their cycles.
 The company also might get the advantages of discounts on bulk purchases.
4. Write a note on name-your-price websites.
 Name-your-own price sites are just like normal retail sites.

la
 It contrast, the buyer negotiates with the retailer for a particular product or service.
 Ex: https://in.hotels.com/.
5. Write a note on physical product dispute of E-Commerce.
sa
 Physical product disputes are a major disadvantage in E-commerce.
 It purchase are often made on trust.
 This is because, we do not have physical access to the product.
da
IV. EXPLAIN IN DETAIL:
1. List all the E-Commerce business models and explain any four briefly.
 Business to Business (B2B)  Consumer to Government (C2G)
 Business to Consumer (B2C)  Government to Business (G2B)
Pa

 Business to Government (B2G)  Government to Consumer (G2C)


 Consumer to Business (C2B)  Government to Government (G2G)
 Consumer to Consumer (C2C)
i). Business to Business (B2B)
w.

 In B2B E-Commerce, commercial transactions take place between different business


organizations, through the Internet.
 For example, a cycle company may buy tyres from another company for their cycles.
ww

ii). Business to Consumer (B2C)


 In B2C E-Commerce, commercial transactions take place between business firms and their
consumers.
 It is the direct trade between companies and end-consumers via the Internet.
 Example: A book company selling books to customers.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 68

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

iii). Business to Government (B2G)


 B2G is a business model that refers to business organizations sells products, services or
information to Governments.
 Example: The Government or its administration buys laptops for students.
iv). Consumer to Business (C2B)

et
 C2B is websites generate revenue through affiliate links, sponsored advertisement r even a
small commission in every booking.
 Example: Name-your price websites.

i.N
2. Explain any five E-Commerce revenue models.
i). Auction site:
 It is a kind of website, that auctions items on the Internet and levies some commission from
the sales.

la
 e.g. https://www.ebay.com/
ii). Banner advertisement site:
 It displays advertisements of other companies in its websites and thereby earns revenue.
sa
iii). Bulk-buying sites:
 It collect a number of users together where every one wants to buy similar items - the site
negotiates a discount with the supplier and takes commission.
da
 e.g. https://www.alibaba.com/
iv). Digital publishing sites:
 It effectively host the e-books or magazines on the web. They make profits in a number of
ways such as advertising, selling etc.,
Pa

 E.g: https://wordpress.org/
v). Licensing sites:
 It allow other websites to make use of their software. For example, the search engines which
allow a visitor of the site to search within the website more easily.
w.

3. How would you differentiate a traditional commerce and E-Commerce? (any5)


Traditional Commerce E-Commerce
 Traditional commerce is buying or selling of  E-Commerce carries out commercial
ww

products and services physically. transactions electronically on the Internet.


 Customer can face to face identify, authenticate  Neither customer nor merchant see the other.
and talk to the merchant.
 Scope of business is limited to particular area.  Scope of business is global. Vendors can
expand their business Worldwide.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 69

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 Resource focus Supply side.  Resource focus Demand side.


 Business Relationship is Linear.  Business Relationship is End-to-end.
 Marketing is one way marketing.  One-to-one marketing.
 Payment is made by cash, cheque, cards etc.  Payment system is mostly through credit card,
debit card or fund transfer.

et
 Most goods are delivered instantly.  It takes time to transport goods.

**********

i.N
la
sa
da
Pa
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 70

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 16
ELECTRONIC PAYMENT SYSTEM
I. CHOOSE THE CORRECT ANSWER:
1. Based on the monetary value e payment system can be classified into
a) Mirco and Macro b) Micro and Nano

et
c) Maximum and Minimum d) Maximum and Macro
2. __________ refers to payment made from one bank account to another bank account using
electronic methods.

i.N
a). Electronic payment b). Direct payment c). Indirect payment d). None of these
3. Assertion (A): Micro electronic payment systems support higher value payments.
Reason (R): Expensive cryptographic operations are included in macro payments
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

la
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false d) (A) is false and (R) is true
sa
4. Which of the following is correctly matched?
a) Credit Cards - pay before b) Debit Cards - pay now
c) Stored Value Card - pay late d) Smart card – pay anytim
5. ECS stands for
da
a) Electronic Clearing Services b) Electronic Cloning Services
c) Electronic Clearing Station d) Electronic Cloning Station
6. Which of the following is a online payment system for small payments.
Pa

a) Card based payment b) Micro electronic payment


c) Macro electronic payment d) Credit card payment
7. Which of the following is true about Virtual payment address (VPA)
a) Customers can use their e-mail id as VPA b) VPA does not includes numbers
w.

c) VPA is a unique ID d) Multiple bank accounts cannot have single VPA


8. Pick the odd one in the credit card transaction
a) card holder b) merchant c) marketing manager d) acquirer
9. Which of the following is true about debit card?
ww

i. Debit cards cannot be used in ATMs


ii. Debit cards cannot be used in online transactions
iii. Debit cards do not need bank accounts
iv. Debit cards and credit cards are identical in physical properties
a) i, ii, iii b) ii, iii, iv c) iii alone d) iv alone

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 71

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

10. Match the following


List A List B
A1) First Digit B1) Account number
A2) 9th to 15th Digit B2) MII Code
A3) First 6 Digits B3) BIN Code
A4) Last Digit B4) Check digit

et
A1 A2 A3 A4
a) B4 B3 B2 B1

i.N
b) B2 B1 B3 B4
c) B2 B3 B4 B1
d) B2 B4 B3 B1
II. SHORT ANSWERS:
1. Define electronic payment system

la
 It refers to a payment made form one bank account to another bank account using
electronic methods.
sa
2. Distinguish micro electronic payment and macro electronic payment
Micro electronic payment Macro electronic payment
On-line payment system designed to allow Macro electronic payments systems support
efficient and frequent payments of small payments of higher value.
da
amounts.
In order to keep transaction costs very The security requirements are more rigorous
low, the communication and in macro payments systems because of huge
Pa

computational costs are minimized here. money transaction.


3. Explain the concept of e-wallet
 Electronic purses allow users to make electronic transactions quickly and securely.
4. Write a short note on credit-card?
w.

 Credit card is an electronic payment system normally used for retail transactions.
 Its plays a major role in electronic payment system worldwide.
 Every credit card account has a purchase limit set by the issuing bank.
ww

5. What is smart card?


 The modern version of card based payment is smart cards.
 It’s along with the regular features of any card based payment system holds a EMV chip.
 It can provide identification, authentication data storage and application processing.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 72

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

III. EXPLAIN IN BRIEF ANSWER:


1. Define micro electronic payment and its role in E-Commerce.
 It is an on-line payment system designed to allow efficient and frequent payments of small
amounts.
Role in E-Commerce:

et
 Electronic payment for online transactions.
 Increasingly popular due to the widespread use of the internet-based shopping and banking.
2. Compare and contrast the credit card and debit card.

i.N
Credit Card Debit card
Credit card is pay letter Debit card is pay now
Interest is charged No interest is charged
To pay the credit card bill within 30 days The amount is directly deducted from the

la
of every month customer’s account
3. Explain briefly Anatomy of a credit card.
sa
☻ Plastic cards of size
☻ Rounded corners with a radius
- 85.60 mm width x 53.98 mm height
– 2.88 mm to 3.48 mm
☻ Thickness - 0.76 mm
4. Briefly explain the stored value card and its types.
da
 It is a type of debit card that is pay before. Customers don’t need to have a bank account.
 Types:
 Closed loop (single purpose) Ex: Chennai metro rail travel card.
Pa

 Open loop (multipurpose) Ex: Visa Gift cards


5. What is electronic fund transfer?
☻ Electronic Funds Transfer (EFT) is the “electronic transfer” of money over an online
network.
w.

☻ The amount sent from the sender’s bank branch is credited to the receiver’s bank branch on
the same day in batches.
☻ EFT saves the effort of sending a demand draft through post and the inherent delay in
reaching the money to the receiver.
ww

IV. EXPLAIN IN DETAIL:


1. Explain the key players of a credit card payment system and bring out the merits of it.
i). Credit card:
 It is an electronic payment system normally used for retail transactions.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 73

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 It enables the bearer to buy goods or services from a vendor, based on the cardholder’s
promise to the card issuer to payback the value later with an agreed interest.
ii). Key players in operations of credit card
 Bearer:
 The holder of the credit card account who is responsible for payment of invoices in full

et
or a portion of the balance.
 Merchant:
 Storekeeper or vendor who sell or providing service, receiving payment made by its

i.N
customers through the credit card.
 Acquirer:
 Merchant’s bank that is responsible for receiving payment on behalf of merchant send
authorization requests to the issuing bank through the appropriate channels.

la
 Credit Card Network:
 It acts as the intermediate between the banks.
sa
 Its for communicating the transaction between the acquirer and the credit card
issuer.
 E.g. Visa, MasterCard, Rupay
 Issuer:
da
 Bearer’s bank, that issue the credit card, set limit of purchases, decides the approval of
transactions, issue invoices for payment, charges the holders.
iii). Merits of credit card:
Pa

 Most credit cards are accepted worldwide.


 It is not necessary to pay physical money at the time of purchase.
 The customer gets an extra period to pay the purchase.
 Depending on the card, there is no need to pay annuity.
w.

 Allows purchases over the Internet in installments.


2. Write a note on a. Internet banking b. Mobile banking
a). Internet banking:
ww

☻ It is a collective term for E-banking, online banking, virtual banking, direct banks, web
banking and remote banking.
☻ It allows customers of a financial institution to conduct various financial transactions on a
secure website.
b). Mobile Banking:
☻ Mobile banking is another form of net banking.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 74

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

☻ It refers to the services provided by the bank to the customer to conduct banking
transactions with the aid of mobile phones.
☻ These transactions include balance checking, account transfers, payments, purchases, etc.
☻ Transactions can be done at anytime and anywhere.
3. Explain in detail: Unified payments interface.

et
 It is a real-time payment system developed by National Payments Corporation of India to
facilitate inter-bank transactions.
 It is simple, secure and instant payment facility.

i.N
 UPI is developed on the basis of Immediate Payment Service.
 To initiate a transaction, UPI applications use two types of address - global and local.
 Global address includes bank account numbers and IFSC.
 Local address is a virtual payment address.

la
 UPI allows operating multiple bank accounts in a single mobile application.
Advantages
 Immediate money transfers through mobile device round the clock 24 x 7.
sa
 Can use single mobile application for accessing multiple bank accounts.
 Single Click Authentication for transferring of fund.
 It is not required to enter the details such as Card no, Account number, IFSC etc. for every
da
transaction.
 Electronic payments will become much easier without requiring a digital wallet or credit or
debit card.
Pa

************
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 75

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 17
E-COMMERCE SECURITY SYSTEM
I. CHOOSE THE CORRECT ANSWER:
1. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as
a) Friendly fraud b) Clean fraud c) Triangulation fraud d) Cyber squatting

et
2. Which of the following is not a security element involved in E-Commerce?
a) Authenticity b) Confidentiality c) Fishing d) Privacy
3. Asymmetric encryption use ________________________ keys for encryption and decryption

i.N
a) Same b) Different c) Positive d) Negative
4. The security authentication technology does not include
i) Digital Signatures ii) Digital Currency
iii) Digital Image iv) Digital Certificates

la
a) i, & iv ` b) ii & iii c) i, ii & iii d) all the above
5. PGP stands for
sa
a) Pretty Good Privacy
c) Private Good Privacy
b) Pretty Good Person
d) Private Good Person
6. _____ protocol is used for securing credit cards transactions via the Internet
a) Secure Electronic Transaction (SET) b) Credit Card Verification
da
c) Symmetric Key Encryption d) Public Key Encryption
7. Secure Electronic Transaction (SET) was developed in
a) 1999 b) 1996 c) 1969 d) 1997
Pa

8. The websites secured by Secure Socket Layer protocols can be identified using
a) html:// b) http:// c) htmls:// d) https://
9. ___________ is the process of converting plain text into meaningless cipher text
a) Encryption b) Decryption c) Digital certificate d) Digital signature
w.

10. Which of the following is true about Ransomware


a) Ransomware is not a subset of malware b) Ransomware deletes the file instantly
c) Typopiracy is a form of ransomware d) Hackers demand ransom from the victim
II. SHORT ANSWERS:
ww

1. Write about information leakage in E-Commerce.


☻ The content of the transaction between the vendor and customer is stolen by the third
party.
☻ The documents provided by the merchant to the customer or illegally used by the
another’

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 76

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

2. Write a short note on Typopiracy.


 Some fake websites try to take advantage of users common typographical errors typing
a website address and direct users to a different website.
 Ex: www.goggle.com, www.faceblook.com
3. Write about phishing.

et
 It is acquiring critical data like login credentials through telephone, sms, e-mail or any social
media by the crackers disguising as authentic
4. List the different types of security technologies in E-Commerce

i.N
 Encryption technology
 Authentication technology
 Authentication protocols
5. Write about digital signature.

la
 A digital signature is a mechanism that is used to verify that a particular digital
document, message or transaction is authentic.
III. EXPLAIN IN BRIEF ANSWER:
sa
1. What is E-commerce Security System?
 It is a set of protocols that safely guide E-commerce transaction through the Internet.
 Security has become a critical factor and core isse in the emerging E-business.
da
 Solving the security problems in transaction is the basis for ensuring the smooth
development of E-business
2. List any two E-Commerce Security Threats?
i). Malicious code threats:
Pa

 Within an E-Commerce site, there are multiple vulnerable areas that can serve as an
intrusion point for a hacker to gain payment and user information.
 Using malware, Cross Site Scripting or SQL Injection, an attacker will extract the credit card
information and sell the acquired data on black markets.
w.

ii). Distributed Denial of Service (DDoS) Attacks:


 It is a process of taking down an E-Commerce site by sending continious overwhelming
request to its server.
ww

 This attack will be conducted from numerous unidentified computers using botnet.
3. Write a note on asymmetric key encryption?
⁂ Different keys are used for encryption and decryption.
⁂ Speed of encryption or decryption is comparatively slow
⁂ The size of cipher text is always greater than plain text.
⁂ Algorithms like RSA, ECC, DSA use asymmetric key encryption
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 77

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

4. Write a note on digital certificate?


 A digital certificate is an electronic document used to prove the ownership of a public key.
 This certificate includes the information about the sender’s identity, digital signature and a
public key.
 Digital certificates are issued by recognized Certification Authorities (CA).

et
5. Write about Plain Text and Cipher Text?
i). Plain Test:
 It is the unencrypted information also called as input chip.

i.N
ii). Cipher Test:
 It is encrypted data usually the output of an algorithm
IV. EXPLAIN IN DETAIL:
1. Write about dimensions of E-Commerce Security.

la
 Authenticity: conforming genuineness of data shared.
 Availability: prevention against data delay or removal.
 Completeness: unification of all business information.
sa
 Confidentiality: protecting data against unauthorized disclosure.
 Effectiveness: effective handling of hardware, software and data.
 Integrity: prevention of the data being unaltered or modified.
da
 Non-repudiation: prevention against violation agreement after the deal.
 Privacy: Prevention of customers personal data being used by others.
 Reliability: providing a reliable identification of the individuals or businesses.
 Review ability: capability of monitoring activities to audit and track the operations
Pa

2. Differentiate symmetric key and asymmetric key encryption.


Symmetric Key Asymmetric Key
Same key is used for both encryption and Different keys are used for encryption and
decryption decryption
w.

Speed of encryption or decryption is very fast Speed of encryption or decryption is


comparatively slow
Plain text and cipher text are of same size The size of cipher text is always greater than
ww

plain text.
Algorithms like DES, AES, RC4 uses Algorithms like RSA, ECC, DSA use asymmetric
symmetric key encryption key encryption
Provides confidentiality Provides confidentiality, authenticity and non-
repudiation

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 78

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

3. Explain authentication protocols?


 At present, there are two kinds of security authentication protocols widely used in E-
Commerce. These are
i). Secure Electronic Transaction:
 It is a security protocol for electronic payments with credit cards, in particular via the

et
Internet.
 SET was developed in 1996 by VISA and MasterCard, with the participation of GTE, IBM,
Microsoft and Netscape.

i.N
 The implementation of SET is based on the use of digital signatures.
 The encryption of transmitted data with asymmetric and symmetric encryption algorithms.
 SET also use dual signatures to ensure the privacy.
ii). Secure Sockets Layers:

la
 It is the most common Cryptographic protocol.
 SSL is a hybrid encryption protocol for securing transactions over the Internet.
sa
 The SSL standard was developed by Netscape in collaboration with MasterCard, Bank of
America, MCI and Silicon Graphics.
 It is based on a public key cryptography process to ensure the security of data transmission
over the internet.
da
 Its principle is to establish a secure communication channel between a client and a server
after an authentication step.
Pa

***********
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 79

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

CHAPTER 18
ELECTRONIC DATA INTERCHANGE -EDI
I. CHOOSE THE CORRECT ANSWER:
1. EDI stands for
a) Electronic Details Information b) Electronic Data Information

et
c) Electronic Data Interchange d) Electronic Details Interchange
2. Which of the following is an internationally recognized standard format for FDI?
a) TSLFACT b) SETFACT c) FTPFACT d) EDIFACT

i.N
3. Which is the first industry-specific EDI standard?
a) TDCC b) VISA c) Master d) ANSI
4. Which of the following is a type of EDI?
a) Direct EDI b) Indirect EDI c) Collective EDI d) Unique EDI

la
5. Who is called as the father of EDI?
a) Charles Babbage b) Ed Guilbert c) Pascal d) None of the above
sa
II. SHORT ANSWERS :
1. Define EDI.
 The Electronic Data Interchange is the exchange of business documents between one
trade partner and another electronically
da
2. List few types of business documents that are transmitted through EDI.
 Delivery notes
 Invoices
Pa

 Purchase orders
 Advance ship notice
 Functional acknowledgements
3. Write any two EDI standards?
w.

 Basic Standards
 Document Standards
 Management Standards
ww

 Application Standards
III. EXPLAIN IN BRIEF ANSWER:
1. Write a short note on EDI via VAN.
 It is where EDI documents are transferred with the support of third party network service
providers.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 80

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

 Many business prefer this network model to protect them from the updating ongoing
complexities if network technologies.
2. List the various layers of EDI.
 Semantic layer
 Standards translation layer

et
 Transport layer
 Physical layer
3. Write a note on UN/EDIFACT.

i.N
 United Nations/Electronic Data Interchange For Administration, Commerce and
Transport (UN/EDIFACT) is an International EDI – standard developed under the
supervision of the United Nations.
 In 1987 the UN/EDIFACT syntax rules were approved as ISO: Iso9735.

la
 It is a cross industry standard data format of electronic data for commercial transactions.
IV. EXPLAIN IN DETAIL:
1. Briefly explain types of EDI.
sa
 Direct EDI/Point-to-Point:
☻ It is also called as Point-to-Point EDI.
☻ It establishes a direct connection between various business stakeholders and
da
partners individually.
 EDI via VAN:
☻ EDI via VAN (Value Added Network) is where EDI documents are transferred with the
support of third party network service providers.
Pa

 EDI via FTP/VPN, SFTP,FTPS:


☻ When protocols like FTP/VPN, SFTP and FTPS are used for exchange of EDI based
documents through the Internet or Intranet.
 Web EDI:
w.

☻ Web based EDI conducts EDI using and web browser via the Internet.
☻ To use any browser to transfer data to their business partners.
☻ Web based EDI is easy and convenient for small and medium organizations.
ww

 Mobile EDI:
☻ Smart phones or other such handheld devices are used to transfer EDI documents.
☻ It is called as mobile EDI.
☻ Mobile EDI applications considerably increase the speed of EDI transactions.

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 81

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

2. What are the advantages of EDI?


 Improving service to end users
 Increasing productivity
 Minimizing errors
 Slashing response times

et
 Automation of operations
 Cutting costs
 Integrating all business and trading partners

i.N
 Providing information on process status
 Optimizing financial ratios

la
***************

sa
da
Pa
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 82

Kindly Send Me Your Key Answer to Our email id - [email protected]


www.Padasalai.Net www.Trb Tnpsc.Com

et
i.N
WIsh YOu

la
sa
all The besT
da

FOr YOur
Pa

eXaMINaTION
w.
ww

Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., 83

Kindly Send Me Your Key Answer to Our email id - [email protected]

You might also like