12th Computer Applications Full Study Material English Medium PDF Download
12th Computer Applications Full Study Material English Medium PDF Download
Com
et
TH
12 - STD
i.N
la
IF YOU FAIL NEVER
GIVE UP BECAUSEFAIL
Charles babbage
sa MEANS FIRST ATTEMPT
FaTher OF COMuTer IN LEARNING
NAME : ________
________________________________
__________________
REG NO : ___________
________________________________
_______________
w.
PREPARED BY
P.VAHEESWARAN M.COM., M.PHIL. DC
DCA., B.ED., M.RANJITH
RANJITH KUMAR M.SC., M.ED.,
ww
VICE-PRINCIPAL, PRINCIPAL,
PG ASSISTANT IN COMMERCE & ACCOUNTANCY PG ASST IN COMPUTER SCIENCE,
VIVEKANANDA VIDYALAYA MATRIC HR SEC SCHOOL
PANNAIKADU PIRIVU, KODAIKANAL, DINDIGUL DT.
CELL: 9791324143 CELL: 9626105165
EMAIL: [email protected] E-MAIL: : [email protected]
ranjitjuly21
KfTiu
khzt ez;gh;fSf;F>
fzpdp mwptpay; ghlj;jpy; ey;y kjpg;ngz;fis ngw Ntz;Lk; vd;w Nehf;fj;jpy;
vspikahd Kiwapy; gbg;gjw;f;F trjpahf vdJ 10 tUl gzp mDgtj;ij nfhz;L
,e;j material – ia njhFj;Js;Nsd;. vdJ ghzpapy; vdJ khzth;fSf;F Vw;wthW
et
jahh; nra;j ,e;j njhFg;ig midj;J khz
khzth;
th;fSk; gad;ngw Ntz;Lk; vd;w
Nehf;fj;jpNyNa ntspapl;Ls;Nsd;. vdJ ,e;j njhFg;gpy; VNjDk; gpiofs; Fiwfs;
,Ue;jhy; rhpnra;J nfhs;sTk;. gpd; jq;fpa khzth;fSk; ey;y kjpg;ngz;fis ngw
i.N
Ntz;Lk; vd;w Nehf;fj;jpNyNa ,ij njhFj;Js;Nsd;.
la
gpd;jq;fpa khzth;fSk; ey;y kjpg;ngz;fis ngw itf;f Kbe;jJ. vdNt ,ij
cgNahfg;g gLj;
Lj;jp ey;y kjpg;ngz;fis ngwTk;.
sa
khzt ez;gh;fNs!! Neuj;ij rhpahf gad;gLj;jp nfhs;Sq;fs;. rhpahd
Neuj;jpy; rhpahd Kiwapy; gbj;J ntw;wp ngw;W mLj;j fl;l epiyf;F nry;y Ntz;ba
,Wjp epiyapy; cs;sha;. Neuj;ij tPzhf;fhNj! mLj;J vd;d nra;a Nghfpwha; vd;gij
Kjypy; jPh;khdp. kjpg;ngz;fis ngWtjpNyNa ftdj;ij it. Kad;why; KbahjJ
da
vJTkpy;iy. fbdkhf jhd; ,Uf;Fk;. f~;lg;gl;L gbj;jhy; ey;y Kd;Ndw;;wj;ij
miltha;.
gs;sp gUtj;jpy; eP ngWk; ntw;wpNa cd; tho;f;if KOtijAk; jPh;khdpf;f
NghfpwJ vd;gij ed;whf ftdk; nfhs;. jpdKk; f fhiyapy;
hiyapy; gbg;gjw;f;F Kd; cd;
Pa
,yf;F vd;d vd;gij ,U epkplk; Nahrpj;J ghh;. eP nry;tJ rhpahd ghijah vd;W
rpe;jp!!!! ey;y ghijNa ey;y Kbit jUk;. ey;y kjpg;ngz;fis ngWtNj cd;
Nehf;fkhf ,Uf;fl;Lk;. mJNt cd; tho;f;if vd;Dk; ghijf;F ey;topfhl;Lk;. gs;sp
tho;f;ifapd;; filrp epiyapy; cs;sha;!!!! ,q;F eP ngWk; kjpg;ngz;fNs cd; mLj;j
w.
cq;fSf;fhf ehq;fs;!!!!
cd; ntw;wpNa vq;fs; ntw;wp!!!!!
cq;fs; ntw;wpapy; ngUikg;ghl ehq;fSk; fhj;jpUf;fpNwhk;!!!!!!!
Mrphpah;
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA
M.Com.,M.Phil.,DCA.,B.Ed., Page 2
CHAPTER 1
MULTIMEDIA
I. CHOOSE THE CORRECT ANSWER:
1. What is multimedia?
a). a type of computer hardware
et
b). a type computer software
c). a type of computer network
d). the use of multiple forms of media to communicate information
i.N
2. ______ have five major components like text, images, sound, video and animation?
a). Multimedia b). Master page c). Master item d). Multi-word
3. What is raster Image?
a). a type of image made up of pixels b). a type of image made up of geometric shapes
la
c). a type of image made up of text d). a type of image made up of sound waves
4. What is vector image?
sa
a). a type of image made up of pixels
c). a type of image made up of text
b). a type of image made up of geometric shapes
d). a type of image made up of sound waves
5. Which of the following is a raster image file format?
a). JPEG b). EPS c). CDR d). SVG
da
6. Which of the following is a vector image file format?
a). PSD b). JPEG c). EPS d). BMP
7. RTF (Rich Text Format) file format was introduced by ______.
Pa
et
Animation
3. Classify the TEXT component in multimedia
Static text – Heading, Line, Paragraph
i.N
Hypertext - Node, Text, Link
4. Classify the IMAGE component in multimedia.
Raster or bitmap images – Common images
Vector image- Lines, Rectangles, Circles.
la
5. Define Animation.
Animation is the process displaying still images so quickly so that they give the impression of
continuous movement.
sa
2 –Dimensional Animations – X and Y
3-Dimensaional Animation – X, Y, Z
III. EXPLAIN IN BRIEF ANSWER:
da
1. List out image file formats.
BMG (Bitmap)
TGA (Tagro)
GIF (Graphics Interchange Format)
Pa
☻ OGG
☻ AIFF (Audio Interchange File Format)
☻ RA(Real Audio Format)
☻ WAV(Waveform Audio File Format)
ww
et
☻ He should be an expertise in the technology, good at proposal writing, good communication
skills and budget management skills.
ii. Content Specialist
i.N
☻ It is responsible for performing all research activities concerned with the proposed
application’s content.
☻ Program content refers to projects information, graphics, data or facts presented through
the multimedia production.
la
iii. Script Writer
☻ Video and film scripts represent a linear sequence of events.
☻ The script writer visualizes the concepts in three dimensional environment and if needed
sa
uses the virtual reality integration into the program.
iv. Text Editor
☻ The content of a multimedia production always must flow logically and the text should
da
always be structured and correct grammatically.
☻ Text and narration is an integrated part of the application.
v. Multimedia Architect
☻ The multimedia architect integrates all the multimedia building blocks like graphics, text,
Pa
Rich Text Format is the primary file format introduced in 1987 by Microsoft.
Plain text:
Plain text files can be opened, read, and edited with most text editors.
ww
et
WAV (Waveform Audio File Format) :
It is the most popular audio file format in windows for storing uncompressed sound files.
MP3 (MPEG Layer-3 Format):
i.N
MPEG Layer-3 format is the most popular format for storing and downloading music.
WMA (Windows Media Audio):
It is a popular windows media audio format owned by Microsoft.
WMA is a file extension used with windows media player.
la
RA (Real Audio Format):
Real Audio format is designed for streaming audio over the Internet.
sa
The digital audio resources are usually stored as a computer file in computer’s hard drive
or CD/DVD.
iv). Digital Video File Formats:
AVI (Audio/Video Interleave):
da
AVI is the video file format for Windows.
Here sound and picture elements are stored in alternate interleaved chunks in the file.
MPEG (Moving Picture Experts Group):
Pa
MPEG is a standard for generating digital video and audio compression under the
International Standards Organization (ISO) by the group of people.
************
w.
ww
CHAPTER 2
AN INTRODUCTION TO ADOBE PAGEMAKER
I. CHOOSE THE CORRECT ANSWER:
1. DTP stands for ______________
(a) Desktop Publishing (b) Desktop Publication (c) Doctor to Patient (d) Desktop Printer
et
2. ____________ is a DTP software.
(a) Lotus 1-2-3 (b) Page Maker (c) Maya (d) Flash
3. Which menu contains the new option?
i.N
(a) File menu (b) Edit menu (c) Layout menu (d) Type menu
4. In PageMaker Window, the area outside of the dark border is referred to as _________.
(a) Page (b) pasteboard (c) blackboard (d) dashboard
5. Shortcut to close a document in PageMaker is ______________
la
(a) Ctrl + A (b) Ctrl + B (c) Ctrl + C (d) Ctrl + W
6. A __________ tool is used for magnifying the particular portion of the area.
sa
(a) Text tool (b) Line tool
7. _________ tool is used for drawing boxes.
(c) Zoom tool (d) Hand tool
et
Enter the appropriate settings.
Click on OK.
5. What is a Pasteboard in Page Maker?
i.N
A document page is displayed within a dark border.
The area outside of the dark border is referred to as the pasteboard.
6. Write about the Menu bar of PageMaker.
File, Type, View,
la
Edit, Element, Windows,
Layout, Utilities, Help,
7. Differentiate Ellipse tool from Ellipse frame tool.
sa
Ellipse tool – used to draw circles and ellipses.
Ellipse frame tool – used to crate elliptical placeholders for text and graphics.
8. What is text editing?
da
A text block contains type, paste or import.
You can’t see the borders of a text block until you select the pointer tool.
9. What is threading text blocks?
☻ The process of connecting Text among Text blocks is called threading text.
Pa
Example: Creating a Newsletter that includes articles and pictures on each page using page
maker.
2. Mention three tools in PageMaker and write their keyboard shortcuts.
Pointer Tool F9
Rotating Tool Shift + F2
Line Tool Shift + F3
et
3. Write the use of any three tools in PageMaker along with symbols.
Line Tool \ Used to draw straight lines in any direction.
Constrained line tool - Used to draw vertical or horizontal lines.
i.N
Rectangle tool Used to draw squares and rectangles
4. How do you rejoin split blocks?
Place the cursor on the bottom handle of the second text block click and drag the bottom
la
handle up to the top.
Place the cursor on the bottom handle of the first text block and click and drag the bottom
handle down if necessary.
sa
5. How do you link frames containing text?
Draw a second frame.
Click the first frame to select it.
da
Click on the red triangle to load the text icon.
Click the second
6. What is the use of Master Page?
Any text or object that you place one the master page will appear on the entire document
Pa
Click on
Text tool
Click on
Left Master Page (that you want to put page number)
ww
Press
Ctrl + Alt + P (The page number display as ‘LM’ on the left master page)
Similarly click on right master page (RM) that you want to put
et
i.N
la
sa
da
Explain any five tools
☻ Click on Open.
☻ Click inside the frame to place the text in it.
☻ The text will be placed in the frame.
ww
CHAPTER 3
INTRODUCTION TO DATEBASE MANAGEMENT SYSTEM
I. CHOOSE THE CORRECT ANSWER:
1. Which language is used to request information from a Database?
a) Relational b) Structural c) Query d) Compiler
et
2. The ---------- diagram gives a logical structure of the database graphically?
a) Entity-Relationship b) Entity c) Architectural Representation d) Database
3. An entity set that does not have enough attributes to form primary key is known as
i.N
a) Strong entity set b) Weak entity set c) Identity set d) Owner set
4. ---------- Command is used to delete a database.
a) Delete database database_name b) Delete database_name
c) Drop database database_name d) Drop database_name
la
5. MySQL belongs to which category of DBMS?
a) Object Oriented b) Hierarchical c) Relational d) Network
sa
6. MySQL is freely available and is open source.
a) True b) False c). True only for windows d). True only for UNIX
7. ---------- represents a “tuple” in a relational database?
a) Table b) Row c) Column d) Object
da
8. Communication is established with MySQL using
a) SQL b) Network calls c) Java d) API’s
9. Which is the MySQL instance responsible for data processing?
Pa
The databases technology came into existence in terms of model with relational and object-
relational behavior.
Types of data model:
Hierarchical Databases Model Relational Model
Network Model Object – Oriented Databases Model
et
Single valued attribute.
Only one value for the attributes
No multiple values
i.N
Ex: Age
Multi valued attribute
More than one value of particular attribute
Ex: Degree
la
4. List any two DDL and DML commands with its Syntax.
i )DDL Data Duplication Language
Create
sa Syntax: CREATE DATABASE
Database_name;
Alter
da
Syntax: ALTER TABLE table_name ADD
new_column_name
Column_definition;
ii)DML – Data Manipulication Language
Pa
Insert
Syntax: INSERT INTO table_name(field 1, field 2,…value );
Update
Syntax: UPDATE table_names SET
w.
Atomicity Isolation
Consistency Durability
6. Which command is used to make permanent changes done by a transaction?
☻ Commit
7. What is view in SQL?
Views A set of stored quires
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 12
et
9. What is Relationship and List its types.
One- to- one relationship
One- to -many relationship
i.N
Many- to- many relationship
10. State few advantages of Relational databases.
High Availability
High Performance
la
Robust Transactions And Support
Erase Of Management
Less Cost
sa
III. EXPLAIN IN BRIEF ANSWER:
1. Explain on Evolution of DBMS.
In earlier days they have used punched card technology to store the data.
da
The file systems were known as predecessor of database system.
Various access methods in file system were indexed, random and sequential access.
Database systems became popular to overcome the above limitations of file system.
2. What is relationship in databases? List its types.
Pa
One-to-One relationship:
One-to-Many relationship:
Many-to-Many relationship:
ww
et
Delete_priv User can delete rows of database tables.
i.N
Alter_priv User can make changes to the database structure.
la
If there exists a database named test, it is used as working database using the below Syntax.
Syntax:
sa mysql > use test;
Database changed
mysql>
SHOW Databases – Lists all the databases available in the database server.
da
Syntax:
mysql > show databases;
SHOW Tables – Lists all the tables available in the current database we are working in.
Syntax:
Pa
The famous Hierarchical database model was IMS, IBM’s first DBMS.
In this model each record has information in parent/ child relationship like a tree structure.
The collection of records is called as record types, which are equivalent to tables in
ww
relational model.
ii). Network model:
Network model is similar to Hierarchical model except that in this model each member can
have more than one owner.
The many to many relationships are handled in a better way.
et
iv). Object-oriented database model
This model incorporates the combination of Object Oriented Programming concepts and
database technologies.
i.N
Practically, this model serves as the base of Relational model.
Object oriented model uses small, reusable software known as Objects.
2. List the basic concepts of ER Model with suitable example.
☻ Entity or Entity type
la
☻ Attributes
☻ Relationship
i). Entity or Entity type
sa
⁂ An Entity can be anything a real-world object or animation which is easily identifiable by
anyone even by a common man.
⁂ Eg: In a company’s database Employee, HR, Manager are considered as entities, where each
da
of these entity will be having their own attributes.
Types of Entity:
⁂ Strong Entity
⁂ Weak Entity
Pa
⁂ Entity Instance
ii). Attributes
⁂ An attribute is the information about that entity and it will describe, quantify, qualify,
classify, and specify an entity.
w.
⁂ An attribute will always have a single value, that value can be a number or character or
string.
Types of attributes:
ww
⁂ Key Attribute
⁂ Simple Attributes
⁂ Composite Attributes
⁂ Single Valued Attribute
⁂ Multi Valued Attribute
et
⁂ One-to-Many relationship
⁂ Many-to-Many relationship
3. Discuss in detail on various types of attributes in DBMS.
i.N
i). Key Attribute
Generally a key attribute describes a unique characteristic of an entity.
ii). Simple Attribute
The simple attributes cannot be separated.
la
It will have a single value for that entity.
For Example: Let us consider the name as the attribute for the entity employee and here the
sa
value for that attribute is a single value.
iii). Composite Attributes
The composite attributes can be sub-divided into simple attributes without change in the
meaning of that attribute.
da
For Example: In the above diagram the employee is the entity with the composite attribute
Name which are sub-divided into two simple attributes first and last name
iv). Single Valued Attributes:
Pa
A single valued attribute contains only one value for the attribute and they don’t have
multiple numbers of values.
For Example: Age- It is a single value for a person as we cannot give ‘n’ number of ages for a
single person; therefore it is a single valued attribute.
w.
attribute.
4. Write a note on open source software tools available in MySQL Administration.
Many open source tools are available in the market to design the database in a better and
efficient manner.
PhpMyAdmin is most popular for Web Administration.
The popular Desktop Application tools are MySQL Workbench and HeidiSQL.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 16
et
MySQL Workbench (Desktop Application)
It is a database tool used by developers and DBA’s mainly for visualization.
This tool helps in data modeling, development of SQL, server configuration and backup for
i.N
MySQL in a better way.
Its basic release version is 5.0 and is now in 8.0 supporting all Operating Systems.
The SQL editor of this tool is very flexible and comfortable in dealing multiple results set.
HeidiSQL (Desktop Application)
la
This open source tool helps in the administration of better database systems.
It supports GUI (Graphical User Interface) features for monitoring server host, server
connection, Databases, Tables, Views, Triggers and Events.
sa
5. Explain the DDL command of their functions in SQL.
i). SQL:
SQL- Structured Query Language is a standard language used for accessing and
da
manipulating databases.
ii). Data Definition Language (DDL):
The DDL commands are used to define database schema (Structure).
Also to create and modify the structure of the database object in the database.
Pa
CREATE, ALTER, DROP, RENAME and TRUNCATE commands belongs to this category.
SQL DDL COMMANDS List
Commands Description
CREATE Used to create database or tables
w.
**********
CHAPTER 4
PHP: HYPERTEXT PRE-PROCESSOR
I. CHOOSE THE CORRECT ANSWERS:
1. The expansion of PHP is ____________?
a) PHP: Hyper text preprocessor b) Personal Hypertext Preprocessor
et
c) Pretext Home page d) Pre-processor Home Page
2. What does PHP files have a default file extension?
a) .html b) .xml c) .php d). ph
i.N
3. The PHP script should start with ______________
a) <?php b) <php c) <php? d) <:?
4. How many data types does PHP support?
a) 18 b) 28 c) 8 d) 38
la
5. Every variable name in PHP must begin with a _____________ symbol?
i) # ii) // iii) $ iv) <
sa
6. _______________ in PHP are case sensitive
a). Variable names b). Keyboard c). Variable names and keywords d). None
7. The assignment operator is _______________________
a) = b) == c) === d) !=
da
8. ___________ operators perform an action to compare two values.
a) Arithmetic b) Comparison c) Increment d) Logical
9. Which operator is called “Identical”?
Pa
a) = b) == c) === d) <>
10. _______________ is a data type which contains decimal numbers
a) Integer b) Float c) Boolean d)NULL
II. SHORT ANSWERS:
w.
1. What is PHP?
It is a powerful language that is used to create dynamic and interactive web pages.
2. What is a dynamic web page?
ww
A dynamic web page, on the other hand is a page whose content can change each it is
viewed.
3. What are the different types of comments in PHP. Give an example?
Single-line comments - denoted by "//" or "#" at the beginning of a line.
Example: # This is a comment
// This is also a comment
et
Comparison Operators
String Operators
5. What is Echo statement used for? Give an example?
i.N
The echo statement is used to output a string of text or a variable.
Examples: echo ‘Hello, world!’;
III. EXPLAIN IN BRIEF ANSWER:
1. What are the features of PHP?
la
☻ Server-side scripting language
☻ Open source software
sa ☻ Platform Independent
☻ Database support
2. Explain then types of PHP tags?
i). PHP Default tags:
da
In the PHP default tags, PHP code is enclosed in <?php and ?> tags.
<?php
// PHP code
?>
Pa
// PHP code
?>
iii). HTML script embed tags:
ww
You can also embed PHP code within HTML script tahs like this.
<script language= “php”>
// PHP code
</script>
et
Variable names in PHP are case-sensitive. This is very important rule. It means that $name
and $name are entirely different variables.
4. List out the different types of data types in PHP.
i.N
o Integer
o Float
o String
o Boolean
la
o Array
o Object
o Resource
sa
o NULL
5. Write about the syntax of PHP.
PHP code enclosed in <? Php and ?> tags. These tags are called opening and closing tags.
da
Example:
<?php
// PHP code
?>
Pa
?>
IV. EXPLAIN IN DETAIL:
1. What are the data types in PHP? Explain? (explain any 5)
ww
et
decimal numbers.
4 Boolean Boolean is a data type which denotes the $x = true;
i.N
possible two states, TRUE or FALSE $y = false;
5 Array Array is a data type which has multiple $cars =
values in single variable. array(“Computer”,”Laptop”,”Mobile”);
6 Object In PHP object is a data type which $school_obj = new School ();
la
contains information about data and
function inside the class.
7 Null
sa Null is a special data type which $x = null;
contains no value:
8 Resources It is a specific variable; it has a reference $handle = fopen(“note.txt”, “r”);
to an external resource. var_dump($handle);
da
2. Explain operators in PHP with example. (Explain any 5)
Operator is a symbol which is used to perform mathematical and logical operations in the
programming languages.
Different types of operator in PHP are:
Pa
☻ The arithmetic operators in PHP perform general arithmetical operations, such as addition,
subtraction, multiplication and division etc.
ii). Assignment Operators:
ww
et
vi). String Operators:
☻ Two operators are used to perform string related operations such as Concatenation and
Concatenation assignment.
i.N
*********
la
sa
da
Pa
w.
ww
CHAPTER 5
FUNCTION AND ARRAYS IN PHP
I. CHOOSE THE CORRECT ANSWERS:
1. A_________is a block of code that performs a specific task.
a) parameter b) function c) class d) label
et
2. Pre-defined functions are also called _________.
a) user-defined functions b) recursive functions
c) built-in functions d) lambda functions
i.N
3. Which one of the following is the right way of defining a function in PHP?
a) function functionname() { // code to be executed } b) function() {}
c) def myFunction(): d) None of the above
4. A user-defined function in PHP starts with the keyword _________.
la
a) function b) def c) defined d) funct
5. Which of the following is a correct way to call a function in PHP?
a) functionName();
sa b) call functionName;
c) execute functionName; d) run functionName();
6. What is an array in PHP?
a) An array is a special data type. b) It can hold many values under a single variable name.
da
c) An array element can be any type of data. d) All of the above
7. How many types of arrays are there in PHP?
a) 2 b) 3 c) 4 d) 5
8. What is the index of the first element in an indexed array in PHP?
Pa
a)0 b) 1 c) 2 d) 3
9. What is the index of the third element in an indexed array in PHP with 5 elements?
a) 2 b) 3 c) 4 d) 5
10. How do you create an indexed array in PHP?
w.
d) Both A and B
11. How do you access the elements of an indexed array in PHP?
a) By using the array index in square brackets
b) By using the array key in square brackets
c) By using the array index in curly braces
d) By using the array key in curly braces
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 23
et
Built –in functions
User-defined functions
3. Write short note s on built-in functions in PHP?
i.N
These are functions that are pre defined in the PHP language and can be used to perform a
variety of tasks, such as calculating the length of a string or sorting an array.
4. What is an array in PHP and what are its main types?
An array is a special data type. It can hold many values under a single variable name.
la
An array element can be any type of data.
Indexed array
Associative array
sa
Multi-dimensional array
5. How do you create an indexed array in PHP?
By enclosing a comma-separated list of values in square brackets.
da
By using the array () function.
III. EXPLAIN IN BRIEF ANSWER:
1. What are the advantages of using functions in PHP?
i). Code reuse:
Pa
It’s can save us time and effort when writing and maintaining our code.
ii). Testing and debugging:
Functions allow us to test and debug our code more easily,
w.
iii). Modularity:
Functions allow us to break down our code into smaller, modular pieces,
2. What is the syntax for defining a function in PHP?
function function Name([parameter list])
ww
{
// code to be executed
}
3. How do you call a function in PHP?
☻ Calling a function is another name for executing the function.
☻ A function is called simply by using the function name, along with an argument list, as a
statement.
☻ Syntax
functionName( ); (or)
functionName(argument list);
et
4. Write Short notes on Associative Array.
An associative array is a data structure that stores a collection of key-value pairs.
The keys are used to identify the values, and the values can be of any data type.
i.N
The keys in an associative array are often called “labels” because they label or identify the
corresponding values.
Exampl:
$student =[“Name”=>“Ram”,“Age”=>25,“Place”=>“Trichy”
la
IV. EXPLAIN IN DETAIL:
1. Explain the User defined Functions with suitable example.
sa
User Defined Function:
It in PHP gives a privilege to user to write their own specific operation inside of
existing program module.
SYNTAX:
da
function functionName( )
(
{ Custom Logic code to be executed; }
)
Pa
Function Calling:
Once a function is defined it is executed by a function call.
The programmer has to give a functions Call inside the respective program.
SYNTAX:
w.
functionName();
Example:
<?php
ww
function insertMsg() {
echo “Student Details Inserted Successfully!”;
} insertMsg(); // call the function
?>
Example:
Student details
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 25
et
Syntax: $Array_Variable=array(“value1”,”value2”,”value2”);
Example:
<?php
i.N
$teacher_name=array(“Iniyan”, “Kavin”, “Nilani”); e
cho “The students name are “ . $teacher_name[0] . “, “ .
$$teacher_name[1] . “ and “ .
$teacher_name[2] . “.”; ?>
la
Output:
The student name are Iniyan, Kavin and Nilani
ii). Associative arrays:
sa
It are a key-value pair data structure.
Instead of storing data in a linear array, with associative arrays you can store your
data in a collection and assign it a unique key which you may use for referencing
da
your data.
Syntax : $Array_Variable = array(key=>value,key=>value,key=>value,etc.);
Example:
<?php
Pa
$Marks=array(“Student1”=>“35”,“Student2”=>“17”,“Student3”=>“43”);
echo “Student1 mark is” . $Marks[‘Student1’] . “ is eligible for qualification”;
echo “Student2 mark is” . $Marks[‘Student2’] . “ is not eligible for qualification”;
?>
w.
Output:
Student 1 mark is 35 is eligible for qualification
Student 2 mark is 17 is not eligible for qualification
ww
***************
CHAPTER 6
CONDITIONAL STATEMENTS IN PHP
I. CHOOSE THE CORRECT ANSWER:
1. Which of the following is NOT a type of conditional statement in PHP?
a) if b) if ... else c) if ... elseif ... else d) while
et
2. What type of statement is the if...else statement?
a) Conditional statement b) Looping c) Input statement d) Output statement
3. What is the simplest conditional statement in PHP?
i.N
a) if-else statement b) if statement c) switch statement d) if-elseif-else statement
4. How does the if statement work in PHP?
a) A block of code is executed if a certain condition is true.
b) A block of code is executed if a certain condition is false.
la
c) A block of code is executed if multiple conditions are true.
d) A block of code is executed if multiple conditions are false.
sa
5. What happens if the condition in an “if” statement is false?
a) The code inside the curly braces is executed.
b) The code inside the curly braces is skipped.
c) The program terminates.
da
d) None of the above
6. What is the syntax for an if-else statement in PHP?
a) if(condition) { //True-block; }
Pa
statement?
a) AND b) OR c) case d) elseif
8. Which of the following is used to specify multiple conditions in a switch statement?
a) AND b) OR c) case d) if
ww
9. What happens if none of the case values match the expression in a switch statement?
a) The default case block is executed b) The program terminates
c) The nearest case block is executed d) The first case block is executed
10. Which of the following is used to terminate the switch statement?
a) return b) continue c) goto d) break
II SHORT ANSWERS:
1. What are the different types of conditional statements in PHP?
‘if ’ statement
‘if …else’ statement
‘if … elseif … else’ statement
et
‘switch’ statement
2. Write the syntax for an if statement in PHP?
if (condition)
i.N
{
// code to be executed if condition is true;
}
3. What is the purpose of the if … else statement?
la
The if ... else statement is a conditional statement in PHP.
If the condition is True then the True-block is executed and if the condition is False then the
False- block is executed.
sa
4. Write the syntax for an if… else statement in PHP?
Syntax:
If (condition)
{
da
Execute statement(s) if condition is true;
}
else
{
Pa
elseif (condition3)
{
// code to be executed if condition1 and condition2 are false and condition3 is true;
}
else
et
{
// code to be executed if all conditions are false;
}
i.N
2. Write the syntax for a Switch statement in PHP.
switch (expression)
{
case value1:
la
//code to be executed if expression = value1;
break;
case value2: //code to be executed if expression = value2; break;
sa
... default:
//code to be executed if expression is not equal to any of the values;
}
da
3. In an if … elseif … else statement, where is the code executed if all conditions are false?
The if ... elseif ... else is a conditional statement that allows you to check multiple conditions
and run different code based on which condition is true.
It begins with the keyword ‘if’ and followed by one or more ‘elseif’.
Pa
Here multiple conditions can be checked and action is based on the result of the condition.
Syntax:
ww
if (Condition 1)
{
Statement(s) if condition 1 is true;
}
elseif(Condition 2)
{
et
}
Example:
<?php
i.N
$Pass_Mark=35;
$first_class=60;
$Student_Mark=70;
if ($Student_Mark>= $first_class){
la
echo “The Student is eligible for the promotion with First Class”;
}
sa
elseif ($Student_Mark>= $Pass_Mark){
echo “The Student is eligible for the promotion”;
}
else {
da
echo “The Student is not eligible for the promotion”;
} ?>
2. Discuss in detail about Switch statement with an example.
Pa
The switch case is an alternative to the if.. elseif..else statement which executes a block of
code corresponding to the match.
Syntax:
switch (n) {
w.
case label1:
code to be executed if n=label1;
break;
case label2:
ww
...
default:
code to be executed if n is different from all labels;
}
Example:
et
<?php
$favcolor = “red”;
switch ($favcolor) {
i.N
case “red”:
echo “Your favorite color is red!”;
break;
case “blue”:
la
echo “Your favorite color is blue!”;
break;
sacase “green”:
echo “Your favorite color is green!”;
break;
default:
da
echo “Your favorite color is neither red, blue, nor green!”;
}
?>
Pa
w.
ww
CHAPTER 7
LOOPS IN PHP
I. CHOOSE THE CORRECT ANSWER:
1. Which of the following is NOT a type of loop statement in PHP?
a) for b) if ... else c) while d) do … while
et
2. What type of loop is “for loop” in PHP?
a) Entry-Check Loop b) Exit-Check Loop c) Counter Loop d) Iteration Loop
3. What is the syntax for for loop in PHP?
i.N
a) for (initialization; condition; increment) { // code}
b) foreach(initialization; condition; decrement) { // code}
c) while(condition)
d) do{...}while(condition)
la
4. What are the three parts of the for loop syntax in PHP?
a) initialization, condition, increment b) initialization, code block, condition
sa
c) code block, condition, increment d) condition, initialization, code block
5. When is the ‘initialization’ part of a for loop executed?
a) Before each iteration b) After each iteration
c) Only once at the beginning of the loop d) Only once at the end of the loop
da
6. What is the purpose of the ‘increment’ part of a for loop?
a) To initialize variables b) To update variables
c) To check the condition d) To execute the code block
Pa
9. Which looping structure should be used to iterate over elements of an array in PHP?
a) for loop b) while loop c) do...while loop d) foreach loop
10. What is the output of the following code?
ww
et
Syntax:
For (init counter; test counter; increment counter)
{
Code to be executed
i.N
}
3. Write the Syntax for ‘while’ loop in PHP.
Syntax:
While (condition is true)
la
{
code to be executed
}
4. How is the ‘condition’ in a while loop evaluated?
sa
while loop’ is called as the entry-check loop.
So the condition is evaluated at the beginning of each iteration of the loop.
If it is true, the code block is executed.
da
If it is false, the loop is terminated.
5. What is the output of the following code snippet?
$i = 1;
While ($i < = 5)
Pa
{
Echo $i. “<br>”;
$i++;
}
w.
Output:
1
2
ww
3
4
5
et
It is used to initialize variables.
ii). Condition:
It is evaluated before each iteration of the loop.
i.N
If it is true, the code block is executed. If it is false, the loop is terminated.
iii). Increment:
It is executed after each iteration of the loop.
It is used to update variables.
la
2. Write a PHP code to print 1 to 10 numbers in ascending order using for loop?
To print the numbers from 1 to 10 in ascending order
<?php sa
for ($i = 1; $i<= 10; $i++)
{
echo $i . “<br>”;
da
}
?>
Output:
1
Pa
2
3
4
5
w.
6
7
8
ww
9
10
3. Explain the difference between While loop and Do…while loops in PHP?
While Loop Do While Loop
Entry check Loop Exit Check Loop
While loop is used to execute a block of The do… while loop is similar to the while loop,
code until a certain condition is true. except that the code block is always executed
et
at least once, even if the condition is false
Syntax: Syntax:
while (condition) do
i.N
{ {
//code to be executed; //code to be executed;
} } while (condition);
la
IV.EXPLAIN IN DETAIL:
1. Explain ‘for’ loop with example?
For Loop: sa
for loop’ is called as the entry-check loop.
The for loop is used to execute a block of code a specific number of times.
Syntax:
da
for (initialization; condition; increment/decrement)
{
//code to be executed;
}
Pa
ii). Condition:
It is evaluated before each iteration of the loop.
If it is true, the code block is executed. If it is false, the loop is terminated.
ww
iii). Increment:
It is executed after each iteration of the loop.
It is used to update variables.
Example:
To print the numbers from 1 to 5 in ascending order
<?php
for ($i = 1; $i<= 5; $i++)
{
echo $i . “<br>”;
}
et
?>
Output:
1
i.N
2
3
4
5
la
2. Write a PHP code to print 10 to 20 numbers in ascending order using while loop and do …
while loop?
i). PHP code using while loop:
sa <?php
$i = 10;
while ($i<= 20)
da
{
echo $i . “<br>”;
$i++;
}
Pa
?>
Output:
10
11
w.
12
13
14
ww
15
16
17
18
19
20
et
echo $i . “<br>”;
$i++;
}
i.N
while ($i<= 20);
?>
Output:
10
la
11
12
13
14
sa
15
16
da
17
18
19
Pa
20
3. Explain ‘foreach’ loop with examples?
Foreach Loop:
☻ The foreach loop is used to iterate over elements of an array.
w.
Syntax:
foreach ($array as $value)
{
//code to be executed;
ww
}
Example:
To print the the elements of an array:
$array = array(1, 2, 3, 4, 5);
foreach ($array as $value)
{
echo $value . “<br>”;
}
Output:
1
et
2
3
4
i.N
5
foreach loop to iterate over the keys and values of an associative array:
Syntax:
foreach ($array as $key => $value)
la
{
//code to be executed;
} sa
☻ The foreach loop will iterate over each element of the array and assign the key of the
element to the $key variable and the value of the element to the $value variable.
Example:
da
$array = array(“a” => 1, “b” => 2, “c” => 3);
foreach ($array as $key => $value)
{
echo $key . “ => “ . $value . “<br>”;
Pa
}
Output:
a=>1
a=>2
w.
a=>3
Explanation:
☻ It is used to perform a set of actions on each element of an array, such as printing the
ww
CHAPTER 8
FORMS AND FILES
I. CHOOSE THE CORRECT ANSWER:
1. What are HTML forms used for?
a) To collect input from users b) To create server-side programming language
et
c) To create a database d) To send emails
2. Which of the following is NOT a form control available in HTML forms?
a) Text inputs b) Buttons c) Checkboxes d) Cropping Tool
i.N
3. Which tag is used to create an HTML form?
a) form b) input c) textarea d) select
4. What form control allows the user to select multiple values?
a) text inputs b) buttons c) checkboxes d) radio buttons
la
5. What form control allows the user to select only one value at a time?
a) text inputs b) buttons c) checkboxes d) radio buttons
sa
6. What is the purpose of validation in PHP?
a) To check the input data submitted by the user from the client machine
b) To display data to users
c) To store data on the server
da
d) To send data to the client
7. How many types of validation are available in PHP?
a) One b) Two c) Three d) Four
Pa
Checkbox
Radio box
File Select
Form Tag
3. How are data collected via HTML form controls sent to the server?
et
☻ These data are collected via HTML form controls like textbox, dropdown box and radio button
etc.,
☻ All the input values are synchronized and sent to the server via POST method or GET method.
i.N
4. What is Validation in PHP?
Validation is a process of checking the input data submitted by the user from client
machine.
5. What are the two types of validation available in PHP?
la
Client-side Validation
Server side validation.
III. EXPLAIN IN BRIEF ANSWER:
sa
1. Explain the difference between check box and radio button in HTML forms?
Check box Radio button
It is a important feature which selects more It is similar to check box but one value can
da
than one value from the HTML form be chosen at a time.
Must be checkable minimum one value Must be selectable minimum one value
2. Explain the difference between the POST method and GET method of sending data to the
server in PHP?
Pa
et
Buttons File select
Checkbox Form tag
Text inputs contain textbox and text area controls.
i.N
Buttons may contain Submit button, Reset button and Cancel Button.
Checkbox is a important feature which selects more than one value from the HTML form.
Radio box is similar to checkbox but one value can be chosen at a time.
File select is the best feature to select one file from the local machine to server machine at a
la
time.
Form tag is used to mention a POST or GET method and control the entire form controls in
the HTML document.
sa
2. Explain in detail of File handling functions in PHP.
File handling is an important activity of all web application development process.
Files are processed for different tasks using the following events:
da
PHP Open a File,
PHP Read a File,
PHP Close a File,
PHP Write a File,
Pa
It contains two parameters one for the file and the other one specifies in which mode the file
should be opened (Read/Write).
Syntax:
$file_Object= fopen(“FileName”, “Read/WriteMode”) or die(“Error Message!”);
ww
et
iv). PHP write a File:
The fwrite() function is used to write to a file.
Syntax:
i.N
fwrite($myfile, $txt);
************
la
sa
da
Pa
w.
ww
CHAPTER 9
CONNECTING PHP AND MYSQL
I. CHOOSE THE CORRECT ANSWER:
1. Which is the correct function to execute the SQL queries in PHP ?
a) mysqli_query(“Connection Object”,”SQL Query”)
et
b) query(“Connection Object”,”SQL Query”)
c) mysql_query(“Connection Object”,”SQL Query”)
d) mysql_query(“SQL Query”)
i.N
2. Which is the correct function Closing Connection in PHP ?
a) mysqli_close(“Connection Object”); b) close(“Connection Object”);
c) mysql_close(“Connection Object”); d) mysqli_close(“Database Object”);
3. Which is the correct function to establish Connection in PHP ?
la
a) mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
b) connect(“Server Name “,”User Name”,”Password”,”DB Name”);
sa
c) mysql_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
d) mysqli_connect (“Database Object”);
4. Which is the not a correct MySQL Function in PHP ?
a) Mysqli_connect() Function b) Mysqli_close() Function
da
c) mysqli_select_data() Function d) mysqli_affected_rows() Function
5. How many parameter are required for MYSQLi connect function in PHP ?
a) 2 b) 3 c) 4 d) 5
Pa
6. How many parameter are required for MYSQLi query function in PHP ?
a) 2 b) 3 c) 4 d) 5
7. How many parameter are required for MYSQLi Close function in PHP ?
a) 1 b) 2 c) 3 d) 5
w.
Mysqli_connect()function
Mysqli_close()function
Mysqli_query()function
2. What is MySQLi function?
It is extension in PHP scripting language which gives access to the MYSQL database.
Functions are available for mysqli database connectively and executing SQL queries.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 43
et
4. Difference between Connection and Close function?
Connection function Close function
Before accessing MySQL database, connect to Mysqli_close() function is used to close an
i.N
databae server machine via PHP scripting existing opend database connection between
language using Mysqli_connect() function PHP scripting and MySQL database server
Syntax: Syntax:
mysqli_connect mysqli_close(“Connection Object”);
la
(“server_Name”,”User_Name”,”Password”,
”DB_Name”);
sa
5. Give few examples of MySQLi Queries.
$con=mysqli_connect(“localhost”, “my_user”, “my_password”, “Student_DB “);
$sql=”SELECT student_name student_age FROM student”;
mysqli_query($con,$sql);
da
6. What is Connection string?
Before accessing MySQL Database, connect to Database Server machine via PHP scripting
language using MySQLI_connect()function.
Syntax:
Pa
It is a function, that helps to execute the SQL query statements in PHP scripting language.
Syntax:
mysqli_query(“Connection Object”,”SQL Query”)
ww
Example:
$con=mysqli_connect(“localhost”,”my_user”,”my_password”,”Student_DB “);
$sql=”SELECT student_name,student_age FROM student”;mysqli_query($con,$sql);
2. Write is the purpose of MySQLi function available.
In PHP Scripting language many functions are available for MySQL Database connectivity and
executing SQL queries.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 44
Mysqli_connect() Function
Mysqli_close() Function
Mysqli_query()Function
3. Write MySQL Connection Syntax with example.
Syntax:
et
mysqli_connect (“Server Name “,”User Name”,”Password”,”DB Name”);
Example:
$conn = mysqli_connect($servername, $username, $password,$DB_name);
i.N
IV.EXPLAIN IN DETAIL:
1. Discuss in detail about MySQL functions with example?
In PHP Scripting language many functions are available for MySQL Database connectivity and
executing SQL queries.
la
Mysqli_connect() Function
Mysqli_close() Function
sa Mysqli_query()Function
i). Mysqli_connect() Function :
Before accessing MySQL Database, connect to Database Server machine via PHP scripting
language using Mysqli_connect() Function.
da
Syntax:
mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
ii). Mysqli_close() Function :
mysqli_close() Function is used to close an existing opened database connection between
Pa
Example:
<?php
$con=mysqli_connect(“localhost”,”$user”,”$password”,”SCHOOL_DB”);
mysqli_close($con);
ww
?>
iii). Mysqli_query()Function
The main goal of MySQL and PHP connectivity is to retrieve and manipulate the data from
MySQL database server.
The SQL query statements help in PHP MySQL extension to achieve the objective of MySQL
and PHP connection.
“mysqli_query” is a function that helps to execute the SQL query statements in PHP scripting
language.
Syntax:
et
mysqli_query(“Connection Object”,”SQL Query”)
Example:
$con=mysqli_connect(“localhost”,”my_user”,”my_password”,”Student_DB “);
i.N
$sql=”SELECT student_name,student_age FROM student”;mysqli_query($con,$sql);
2. Explain in details types of MySQL connection method in PHP?
i). Database Connection :
Before accessing MySQL Database, connect to Database Server machine via PHP scripting
la
language using Mysqli_connect() Function.
Syntax:
mysqli_connect(“Server Name “,”User Name”,”Password”,”DB Name”);
sa
ii). Managing Database Connection:
The below code describes managing database connection methods and featurs.
<?php
da
$servername = “localhost”;
$username = “username”;
$password = “password”;
$DB_name = “School_DB”;
Pa
if (!$conn) {
w.
In the above code snippet, four variables are used to connect to the Database server.
They are
$servername -> Database Server Server IP address
$username -> Database Server User Name
$password -> Database Server Password
et
The main goal of MySQL and PHP connectivity is to retrieve and manipulate the data from
MySQL database server.
The SQL query statements help in PHP MySQL extension to achieve the objective of MySQL
i.N
and PHP connection.
“mysqli_query” is a function that helps to execute the SQL query statements in PHP scripting
language.
Syntax:
la
mysqli_query(“Connection Object”,”SQL Query”)
Example:
$con=mysqli_connect(“localhost”,”my_user”,”my_password”,”Student_DB “);
sa
$sql=”SELECT student_name,student_age FROM student”;
mysqli_query($con,$sql);
da
Pa
w.
ww
CHAPTER 10
INTRODUCTION TO COMPUTER NETWORK
I.CHOOSE THE CORRECT ANSWER:
1. A set of computers connecting together is called as ----------
a) Network b) Server c) Hub d) Node
et
2. Many discussion in an online forum leads to personal attacks and is called
a). Hackers b). Virus c). Online war d). Flame war
i.N
3. Wi-Fi is short name for
a) Wireless Fidelity b) Wired fidelity c) Wired fiber optic d) Wireless fiber optic
4. Which among them was challenging to the business people on computer networking
a) Hacking b) Viruses c) Both a & b d) none of this above
la
5. Which one of the following is not the social media
a) Gmail b) Facebook c) twitter d) Linkedin
6. In mobile network, land areas for network coverage was distributed as
sa
a) Firmware b) cells c) Range d) Service
7. Which one of the following are harmful to computer?
a) Bloggers b) Browser c) Hackers d) twitter
da
II.SHORT ANSWER:
1. What is Computer Network.
A set of computers connected together for the purpose of sharing resources is called as
computer networks.
Pa
Information Sharing
4. What is node in computer network?
A computer which is connected to a network is called as node.
The data transferred between nodes is also called as a source and destination
et
modems.
2. List out some benefits of social networks.
Group information sharing over long distances.
i.N
Broadcast announcements.
Fostering diversity of thought.
3. Write a note on mobile network?
☻ It is the network connecting devices without cable (wireless).
la
☻ Mobile computers, such as laptop, tablet, and hand held computers, were fastest growing
segments.
☻ At land areas network was distributed as cells, each will be served by single – location
sa
transceiver, but generally three cell sites or a base transceiver station.
☻ This portable transceivers used to communicate with one another with fixed transceivers and
moving via more than one cell during transmission.
da
IV.EXPLAIN IN DETAIL:
1. Explain uses of computer network
The common uses of computer network are
Communication
Pa
Resource sharing
Information sharing
Communication:
☻ Using computer networks, we can interact with the different people with each other all
w.
Resource sharing:
☻ It allows all kind of programs, equipments and data to be accessed by anyone via network
irrespective of the physical location of the resource.
☻ Simply resource sharing is a sharing of devices like printers, scanner, PDA, fax machine,
and modems.
Information sharing:
☻ Using computer network, any application or other software can be stored at a central
computer or server.
☻ The software can be shared among other computers of the network.
2. Explain about social application in computer network?
et
To get connected with people around the world through social network media,
Applications like Whatsapp, Face book, Twitter, Blogs, Pinterest, Classmate and so on are in
full fledge use.
i.N
Membership:
Social nets generally requires user to register names and accounts to avoid duplicate and
maintain secrecy.
Content contribution:
la
☻ These networks allow members to easily share comments, audio, video, text, animation
files etc with others.
sa
Frequent visits:
Healthy social net have a group of members who check in regularly to contribute their
share and also for new updates.
da
Relationship building:
The common goal of most social networks is to allow interaction among people, which
create stronger connection with people of different communities.
Pa
**********
w.
ww
CHAPTER 11
NETWORK EXAMPLES AND PROTOCOLS
I. CHOOSE THE CORRECT ANSWER:
1. Which one of the following will be easy way to use Internet technology and the public
telecommunication system to securely share business’s information with suppliers,
et
vendors, partners and customers.
a) Extranet b) Intranet c) arpanet d) arcnet
2. Match the following and choose the correct answer
i.N
i. HTTP -The core protocol of the World Wide Web.
ii. FTP- enables a client to send and receive complete files from a server.
iii. SMTP - Provide e-mail services.
iv. DNS- Refer to other host computers by using names rather than numbers.
la
a) i, ii, iii, iv b) ii, iii, iv, i c) iii, iv, i, ii d) iv, iii, ii, i
3. Communication over ------------ ------is be made up of voice, data, images and text messages.
sa
a) Social media
4. Wi-Fi stands for---------------------
b) mobile network c) whatsapp d) software
a) Wireless Fidelity b) wired fidelity c) wired optic fibre d) wireless optic fibre
5. A TCP/IP network with access restricted to members of an organization
da
a) LAN b) MAN c) WAN d) Intranet
6. RFID stands for --------------
a) Radio Free identification b) real Frequency identity
Pa
10. ------------- refer to other host computers by using names rather than numbers.
a) DNS b) TCP c) FTP d) SMTP
II.SHORT ANSWER:
1. Define Intranet
It is a private network within an enterprise to share company data and computing resources
between the employees.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 51
et
3. List out the benefits of WiFi?
It provides mobility
It provides connection to internet
i.N
Flexibility of LAN
Ensures connectivity
4. Expand HTTP, HTTPS, FTP.
☻ HTTP – Hypertext Transfer Protocol
la
☻ HTTPS – Hypertext Transfer Protocol Secure
☻ FTP – File Transfer Protocol
III. EXPLAIN IN BRIEF ANSWER:
sa
1. Compare Internet, Intranet and Extranet
Internet Intranet Extranet
Public Private Private
da
Large number of connected Limited number of connected Limited number of connected
devices devices devices over internet
Not owned by anyone Owned by a particular Owned by one or more
organization organization
Pa
transmissions.
HTTPS – It is used between a web client and a web server ensures secure data
transmissions.
ww
et
Intranet A TCP/IP network with access restricted to members of an organization.
Example: Accessing your record in the employee personnel file
Extranet A TCP/IP network with restricted access to members.
i.N
Example: Checking availability of inventory from an outside supplier
2. Discuss about OSI model with its layers.
OSI Layers Definition
Physical Layer This is the 1st layer, it defines the electrical and physical specification for
la
devices.
Data Link Layer This is the 2nd layer it guarantees that the data transmitted. “802.3 for
sa
Network Layer
Ethernet” and “802.11 for Wi-Fi”.
This is the 3rd layer, determining the path of the data packet is using IP
Address.
Transport Layer This is the 4th layer guarantees the sending data is successful. It includes
da
error checking operation .
Session Layer This is the 5th layer identifies the system session between different
network entities.
Presentation Layer This is the 6th layer Encryption and decryption protocols occur in this
Pa
CHAPTER 12
DNS(DOMAIN NAME SYSTEM)
I. CHOOSE THE CORRECT ANSWER:
1. Which of the following is used to maintain all the directory of domain names?
a) Domain name system b) Domain name space c) Name space d) IP address
et
2. Which of the following notation is used to denote IPv4 addresses?
a) Binary b) Dotted-decimal c) Hexadecimal d) a and b
3. How many bits are used in the IPv6 addresses?
i.N
a) 32 b) 64 c) 128 d) 16
4. Expansion of URL is
a) Uniform Resource Location b) Universal Resource Location
c) Uniform Resource Locator d) Universal Resource Locator
la
5. How many types are available in Relative URL?
a) 2 b) 3 c) 4 d) 5
sa
6. Maximum characters used in the label of a node?
a) 255 b) 128 c) 63 d) 32
7. In domain name, sequence of labels are separated by
a) ;(semicolon) b) .(dot) c) : (colon) d) NULL
da
8. Which of the following initiates the mapping of domain name to IP address?
a) Zone b) Domain c) Resolver d) Name servers
9. Which is the contiguous area up to which the server has access?
Pa
☻ .mil
2. What is an IP address?
Increased protocol address is the logical address in the network layer
IP address is also used to find the host system in the whole network
3. What is an URL?
URL is the address of a document on the Internet.
URL is made up four parts protocols, host name, folder name and file name.
4. List out four URLs you know.
☻ http://www.googe.com
et
☻ http://www.yahoo.com
☻ http://www.facebook.com
☻ http://www.gmail.com
i.N
5. What is a zone?
⁂ A group of contiguous domains and sub domains in the domain name space.
6. What is a resolver?
A program which is responsible for initiating the translation of a domain name into an IP
la
Address.
7. Write any four generic Top Level Domains.
Com – Commercial Organization
sa
Edu – Educational Institutions
Gov –Government
Mil – Military groups
da
8. Mentioned the components of DNS.
Name space
Name server
Zone
Pa
Resolver
III. EXPLAIN IN BRIEF ANSWER:
1. Write a note on URL and its types.
URL (Uniform Resource Locator) is the address of a document on the Internet.
w.
It is made up four parts: protocols, hostname, folder name and file name.
URL Type:
Absolute URL Relative URL
ww
3. What are the differences between Absolute URL and Relative URL?
Absolute URL Relative URL
Used to link web pages on different websites. Used to link web pages within the same websites.
Difficult to manage Easy to manage
Protocols, hostname, folder name and file Folder name and file name.
Name.
et
4. Write a note on domain name.
It is the sequence of labels.
i.N
In domain name the sequence of labels are separated by dot (.).
The domain name is always read from the lower level to higher level i.e., from the leaf
node to root node.
IV. EXPLAIN IN DETAIL:
la
1. Classify and Explain the IP address and its classification.
Internet Protocol (IP) address is simply the logical address in the network layer.
The door number or flat number is used to differentiate individual house from others in the
sa
same apartment.
IP address is also used to find the host system in the whole network.
Headings Internet Protocol Version 4 Internet Protocol version 6
da
Deployed 1981 1999
Address size 32-bit number 128-bit number
Address format Dotted decimal notation Hexadecimal notation
Pa
Name Server:
Name Server is a main part in the Domain Name System (DNS).
It translates the domain names to IP addresses.
The DNS database which consists of domain names and their corresponding IP addresses.
There is a need to store large number of domain names for the world wide usage.
et
There are 13 servers.
Primary/Master Name Server
It contains a zone resource records.
i.N
These records are updatable by domain name holders such as organizations.
Secondary/Slave Name Server:
It contains a copy of primary server files.
This server has no authority to update, but reduce the workload of master server
la
by sharing the queries
3. Explain how the DNS is working.
The user enters the URL in the browser, the system first checks its DNS cache for the
sa
corresponding IP address.
If the IP address is found in the cache then the information is retrieved from cache.
The system needs to query the resolver about the IP address from Internet Service Provider
da
(ISP).
Each resolver has its own cache and if it is found in that then that information is retrieved.
Then the resolver returns the record back to the computer browser which is then viewed by
the user.
Pa
***********
w.
ww
CHAPTER 13
NETWORK CABLING
I. CHOOSE THE CORRECT ANSWER:
1. ARPANET stands for
a) American Research Project Agency Network b) Advanced Research Project Area Network
et
c) Advanced Research Project Agency Network d) American Research Programs And Network
2. WWW was invented by
a) Tim Berners Lee b) Charles Babbage c) Blaise Pascal d) John Napier
i.N
3. Which cable is used in cable TV to connect with setup box?
a) UTP cable b) Fibre optics c) Coaxial cable d) USB cable
4. Expansion of UTP is
a) Uninterrupted Twisted Pair b) Uninterrupted Twisted Protocol
la
c) Unshielded Twisted Pair d) Universal Twisted Protocol
5. Which medium is used in the optical fibre cables to transmit data?
sa
a) Microwave b) Infra red c) Light d) Sound
6. Which of the following is a small peripheral device with a sim slot to connect the computers
to Internet?
a) USB b) Dongles c) Memory card d) Mobiles
da
7. Which connector is used in the Ethernet cables?
a) RJ11 b) RJ21 c) RJ61 d) RJ45
8. Which of the following connector is called as champ connector?
Pa
This port will be there in both the computers and the LAN port.
4. What is the use of Crimping tool?
It is a physical tool which is used to connect the patch wire and the Ethernet connector
(RJ45).
5. What are the types of twisted pair cables?
et
Shield Twister pair (STP)
Unshielded Twisted Pair (UTP)
6. What is meant by champ connector?
i.N
RJ -21 connector has 50 pins with 25 pins a one end and 25 pins at the other end it is also
called as champ connector.
III. EXPLAIN IN BRIEF ANSWER:
1. Write a note on crossover cables.
la
The first colored wire at one end of the cable is the third colored wire at the other end of the
cable.
It is called crossover cables.
sa
2. Write a short note on RJ45 connector.
☻ The RJ45 Ethernet connector is a small plastic cup which will be used to connect the wire
inside the connector and ready to use to connect the Internet.
da
3. What is meant by null modem cable? Give the example?
A cable interconnecting two devices directly is known as a null modern cable.
RS-232 cable is also for inter connecting two computers without modern
So it is also a null modern cable
Pa
Crimping tool
6. What are the types of Fiber optic cables?
☻ There are two types of fiber optic cables are available
ww
☻ Single mode
☻ Multimode
IV. EXPLAIN IN DETAIL:
1. What is meant by Registered Jack? Explain briefly the types of Jacks.
i). Registered Jacks:
A Registered Jack commonly known as RJ is a network interface used for network cabling,
wiring and jack construction.
The primary function of the registered jack is to connect different data equipment and
telecommunication devices.
The registered jack refers to the male physical connector (Plug), a female physical connector
et
(Jack) and it’s wiring.
ii). Types:
RJ-11 RJ-21
i.N
RJ-45 RJ-28.
iii). Explanation:
i). RJ-11:
It is the most popular modern form of registered jack.
la
It is found in home and office.
This registered jack is mainly used in telephone and landlines.
There are 6 pin where 2 pin give transmission configuration and another 2 pin give
sa
receiver configuration.
ii). RJ-14 and RJ-61:
The RJ-14 is the same as RJ-11 which will be used for telephone lines which has 6 pins.
da
This RJ-61 will use the twisted pair cable with a modular 8 connection.
iii). RJ-21:
The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end.
It is also called as champ connector or Amphenol connector.
Pa
Ethernet cables.
The four main components used in the Ethernet cabling components are
Patch Cable (Twisted pair)
ww
RJ45 Connector
Ethernet Ports
Crimping Tool
i). Patch Cable (Twisted Pair):
These Cables are generally made up of 8 wires in different colors.
Four of them are solid colours, and the others are striped.
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 60
The eight colors are white green, green, white orange, blue, white blue, orange, white brown
and brown.
ii). RJ45 connector:
In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of
interface standard.
et
It is a Small plastic cup.
It has eight pins
iii). Ethernet card and Port:
i.N
Ethernet port is an opening which is a part of an Ethernet card.
It accepts RJ45 connector with Ethernet cable.
It is found on personal computers, laptops, routers, switches.
iv). Crimping Tool:
la
It is a physical tool which is used to connect the patch wire and the Ethernet connector
The crimping toos looks like a small cutting handle with two mold of Ethernet port.
3. Explain the types of network cables?
sa
There are many types of cables available in the networking.
Here we are going to discuss about six different types of cables.
i). Coaxial Cables:
da
It is used to connect the television sets to home antennas.
This cable is used to transfer the information in 10 mbps.
The cable is divided into thinnet and thicknet cables.
ii). Twisted Pair Cables:
Pa
These cables are placed in deep underground to avoid any damage to the cables.
Single mode cables used for long distance transmission and at a high cost.
Multi-mode cables are used for short distance transmission at a very low cost.
iv). USB Cables:
The Universal Serial Bus is used to connect keyboard, mouse and other peripheral devices.
To connect the Internet through the USB called dongles.
The dongle is a small peripheral device with a slim slot in it and connects the Internet.
V). Ethernet Cables:
Ethernet cable is the most common type of network cable mainly used for connecting the
computers or devices at home or office.
This cable connects wired devices within the local area network (LAN) for sharing the
et
resources and accessing Internet.
****************
i.N
la
sa
da
Pa
w.
ww
CHAPTER 14
OPEN SOURCE CONCEPTS
I. CHOOSE THE CORRECT ANSWER:
1. If the source code of a software is freely accessible by the public, then it is known as
a) Freeware b) Firmware c) Open source d) Public source
et
2. Which of the following is a software program that replicates the functioning of a computer
network?
a) Network software b) Network simulation
i.N
c) Network testing d) Network calculator
3. Which of the following can document every incident that happened in the simulation and
are used for examination?
a) Net Exam b) Network hardware c) Trace file d) Net document
la
4. Which is an example of network simulator?
a) simulator b) TCL c) Ns2 d) C++
sa
5. Choose the Correct Pair from the following to build NS2
a) UNIX & TCL b) UNIX & a. C++ c) C++ & OTcl d) C++ & NS2
6. Which of the following is not network simulation software?
a) Ns2 b) OPNET c) SSFNet d) C++
da
7. Which of the following is a open source network monitoring software?
a) C++ b) OPNET c) Open NMS d) OMNet++
8. Open NMS was released in …………………
Pa
et
Select and use any software
Without any cost and restrictions
Software are very user friendly
i.N
Program writing skills.
2. Explain Free software.
Free software is a concept developed in the 1980s by an MIT computer science researcher, Richard
Stallman who defined four conditions - as outlined by the nonprofit Free Software Foundation.
la
It enhances the ability of users to use and enjoy software as they see fit.
3. List out the Popular open source software.
sa NS2 Open Office
OPEN NMS ANDROID
MySQL PHP
PDF Creator FIREFOX
da
4. Write note on open source hardware.
The computers used by individuals or business organisations may have spy hardwares of
rivals.
Pa
Linux Foundation
Open Course Ware Conortium
Open Source Initiative
et
The project is managed by developers and The project is managed by group of
programmers individuals or team work
It provides limited scope with restrictions It provides better flexibility and more
i.N
and all freedom
Not edit the source code Edit the source code
Ex: Windows, Mac OS, google earth etc., Ex: Android, Firefox, Ubuntu etc.,
la
2. List out the Benefits of Open Source Software?
OSS projects are collaboration opportunities that improve skills and build connections in the
field.
sa
Domains that developers can contribute to the open source community include:
Communication tools.
Distributed revision control systems.
da
Bug trackers and task lists.
Testing and debugging tools.
There are many open source software’s. So, we can select and use any software.
The complete options of the software can be used without any cost and restrictions.
Pa
We can share our ideas with the team, write the required code and share it with many.
We can learn many ideas and make our program writing skills more efficient.
Many open source software are very user friendly.
***********
w.
ww
CHAPTER 15
E-COMMERCE
et
a) it has many branches across the world.
b) it conduct business electronically over the Internet.
c) it sells commodities to a foreign country.
i.N
d) it has many employees.
2. Which of the following is not a tangible good?
a) Mobile b) Mobile Apps c) Medicine d) Flower bouquet
3. SME stands for
la
a) Small and medium sized enterprises b) Simple and medium enterprises
c) Sound messaging enterprises d) Short messaging enterprises
4. The dotcom phenomenon deals with ________
sa
a) Textile industries b) Mobile phone companies
c) Internet based companies d) All the above
5. Which of the following is not correctly matched
da
a) The First Wave of Electronic Commerce: 1985 -1990
b) The Second Wave of Electronic Commerce: 2004 – 2009
c) The Third Wave of Electronic Commerce: 2010 – Present
d) Dotcom burst: 2000 – 2002
Pa
6. Assertion (A): The websites of first wave dotcom companies were only in English
Reason (R): The dotcom companies of first wave are mostly American companies.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
w.
c) (A) is true and (R) is false d) (A) is false and (R) is true
7. Off-shoring means
a) Work outsourced to a branch of its own company
ww
et
c) Resource focus supply side d) Scope of business is global.
II. SHORT ANSWERS:
1. Define E-Commerce.
i.N
It can be described as the process of buying or selling products, service or information via
Internet.
E-stands for electronic.
2. Distinguish between E-Business and E-Commerce
la
E-Business E-Commerce
It’s entirely depends on the internet for its It is commercial transaction through
every intra and inter company activities.
sa Internet
it is grounded on technologies such as network It is limited with monetary transaction
infrastructure, messaging and information. using internet
It is superset of E-Commerce It is a subset of E-Business
da
3. Differentiate tangible goods and electronic goods with example of your own.
Tangible Electronic (Intangible)
They have a physical existence They do not have a physical existence.
Pa
et
3. Explain B2B module in E-Commerce.
In B2B E-Commerce, commercial transactions take place between different business
organizations, through the Internet.
i.N
For example, a cycle company may buy tyres from another company for their cycles.
The company also might get the advantages of discounts on bulk purchases.
4. Write a note on name-your-price websites.
Name-your-own price sites are just like normal retail sites.
la
It contrast, the buyer negotiates with the retailer for a particular product or service.
Ex: https://in.hotels.com/.
5. Write a note on physical product dispute of E-Commerce.
sa
Physical product disputes are a major disadvantage in E-commerce.
It purchase are often made on trust.
This is because, we do not have physical access to the product.
da
IV. EXPLAIN IN DETAIL:
1. List all the E-Commerce business models and explain any four briefly.
Business to Business (B2B) Consumer to Government (C2G)
Business to Consumer (B2C) Government to Business (G2B)
Pa
et
C2B is websites generate revenue through affiliate links, sponsored advertisement r even a
small commission in every booking.
Example: Name-your price websites.
i.N
2. Explain any five E-Commerce revenue models.
i). Auction site:
It is a kind of website, that auctions items on the Internet and levies some commission from
the sales.
la
e.g. https://www.ebay.com/
ii). Banner advertisement site:
It displays advertisements of other companies in its websites and thereby earns revenue.
sa
iii). Bulk-buying sites:
It collect a number of users together where every one wants to buy similar items - the site
negotiates a discount with the supplier and takes commission.
da
e.g. https://www.alibaba.com/
iv). Digital publishing sites:
It effectively host the e-books or magazines on the web. They make profits in a number of
ways such as advertising, selling etc.,
Pa
E.g: https://wordpress.org/
v). Licensing sites:
It allow other websites to make use of their software. For example, the search engines which
allow a visitor of the site to search within the website more easily.
w.
et
Most goods are delivered instantly. It takes time to transport goods.
**********
i.N
la
sa
da
Pa
w.
ww
CHAPTER 16
ELECTRONIC PAYMENT SYSTEM
I. CHOOSE THE CORRECT ANSWER:
1. Based on the monetary value e payment system can be classified into
a) Mirco and Macro b) Micro and Nano
et
c) Maximum and Minimum d) Maximum and Macro
2. __________ refers to payment made from one bank account to another bank account using
electronic methods.
i.N
a). Electronic payment b). Direct payment c). Indirect payment d). None of these
3. Assertion (A): Micro electronic payment systems support higher value payments.
Reason (R): Expensive cryptographic operations are included in macro payments
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
la
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false d) (A) is false and (R) is true
sa
4. Which of the following is correctly matched?
a) Credit Cards - pay before b) Debit Cards - pay now
c) Stored Value Card - pay late d) Smart card – pay anytim
5. ECS stands for
da
a) Electronic Clearing Services b) Electronic Cloning Services
c) Electronic Clearing Station d) Electronic Cloning Station
6. Which of the following is a online payment system for small payments.
Pa
et
A1 A2 A3 A4
a) B4 B3 B2 B1
i.N
b) B2 B1 B3 B4
c) B2 B3 B4 B1
d) B2 B4 B3 B1
II. SHORT ANSWERS:
1. Define electronic payment system
la
It refers to a payment made form one bank account to another bank account using
electronic methods.
sa
2. Distinguish micro electronic payment and macro electronic payment
Micro electronic payment Macro electronic payment
On-line payment system designed to allow Macro electronic payments systems support
efficient and frequent payments of small payments of higher value.
da
amounts.
In order to keep transaction costs very The security requirements are more rigorous
low, the communication and in macro payments systems because of huge
Pa
Credit card is an electronic payment system normally used for retail transactions.
Its plays a major role in electronic payment system worldwide.
Every credit card account has a purchase limit set by the issuing bank.
ww
et
Electronic payment for online transactions.
Increasingly popular due to the widespread use of the internet-based shopping and banking.
2. Compare and contrast the credit card and debit card.
i.N
Credit Card Debit card
Credit card is pay letter Debit card is pay now
Interest is charged No interest is charged
To pay the credit card bill within 30 days The amount is directly deducted from the
la
of every month customer’s account
3. Explain briefly Anatomy of a credit card.
sa
☻ Plastic cards of size
☻ Rounded corners with a radius
- 85.60 mm width x 53.98 mm height
– 2.88 mm to 3.48 mm
☻ Thickness - 0.76 mm
4. Briefly explain the stored value card and its types.
da
It is a type of debit card that is pay before. Customers don’t need to have a bank account.
Types:
Closed loop (single purpose) Ex: Chennai metro rail travel card.
Pa
☻ The amount sent from the sender’s bank branch is credited to the receiver’s bank branch on
the same day in batches.
☻ EFT saves the effort of sending a demand draft through post and the inherent delay in
reaching the money to the receiver.
ww
It enables the bearer to buy goods or services from a vendor, based on the cardholder’s
promise to the card issuer to payback the value later with an agreed interest.
ii). Key players in operations of credit card
Bearer:
The holder of the credit card account who is responsible for payment of invoices in full
et
or a portion of the balance.
Merchant:
Storekeeper or vendor who sell or providing service, receiving payment made by its
i.N
customers through the credit card.
Acquirer:
Merchant’s bank that is responsible for receiving payment on behalf of merchant send
authorization requests to the issuing bank through the appropriate channels.
la
Credit Card Network:
It acts as the intermediate between the banks.
sa
Its for communicating the transaction between the acquirer and the credit card
issuer.
E.g. Visa, MasterCard, Rupay
Issuer:
da
Bearer’s bank, that issue the credit card, set limit of purchases, decides the approval of
transactions, issue invoices for payment, charges the holders.
iii). Merits of credit card:
Pa
☻ It is a collective term for E-banking, online banking, virtual banking, direct banks, web
banking and remote banking.
☻ It allows customers of a financial institution to conduct various financial transactions on a
secure website.
b). Mobile Banking:
☻ Mobile banking is another form of net banking.
☻ It refers to the services provided by the bank to the customer to conduct banking
transactions with the aid of mobile phones.
☻ These transactions include balance checking, account transfers, payments, purchases, etc.
☻ Transactions can be done at anytime and anywhere.
3. Explain in detail: Unified payments interface.
et
It is a real-time payment system developed by National Payments Corporation of India to
facilitate inter-bank transactions.
It is simple, secure and instant payment facility.
i.N
UPI is developed on the basis of Immediate Payment Service.
To initiate a transaction, UPI applications use two types of address - global and local.
Global address includes bank account numbers and IFSC.
Local address is a virtual payment address.
la
UPI allows operating multiple bank accounts in a single mobile application.
Advantages
Immediate money transfers through mobile device round the clock 24 x 7.
sa
Can use single mobile application for accessing multiple bank accounts.
Single Click Authentication for transferring of fund.
It is not required to enter the details such as Card no, Account number, IFSC etc. for every
da
transaction.
Electronic payments will become much easier without requiring a digital wallet or credit or
debit card.
Pa
************
w.
ww
CHAPTER 17
E-COMMERCE SECURITY SYSTEM
I. CHOOSE THE CORRECT ANSWER:
1. In E-Commerce, when a stolen credit card is used to make a purchase it is termed as
a) Friendly fraud b) Clean fraud c) Triangulation fraud d) Cyber squatting
et
2. Which of the following is not a security element involved in E-Commerce?
a) Authenticity b) Confidentiality c) Fishing d) Privacy
3. Asymmetric encryption use ________________________ keys for encryption and decryption
i.N
a) Same b) Different c) Positive d) Negative
4. The security authentication technology does not include
i) Digital Signatures ii) Digital Currency
iii) Digital Image iv) Digital Certificates
la
a) i, & iv ` b) ii & iii c) i, ii & iii d) all the above
5. PGP stands for
sa
a) Pretty Good Privacy
c) Private Good Privacy
b) Pretty Good Person
d) Private Good Person
6. _____ protocol is used for securing credit cards transactions via the Internet
a) Secure Electronic Transaction (SET) b) Credit Card Verification
da
c) Symmetric Key Encryption d) Public Key Encryption
7. Secure Electronic Transaction (SET) was developed in
a) 1999 b) 1996 c) 1969 d) 1997
Pa
8. The websites secured by Secure Socket Layer protocols can be identified using
a) html:// b) http:// c) htmls:// d) https://
9. ___________ is the process of converting plain text into meaningless cipher text
a) Encryption b) Decryption c) Digital certificate d) Digital signature
w.
et
It is acquiring critical data like login credentials through telephone, sms, e-mail or any social
media by the crackers disguising as authentic
4. List the different types of security technologies in E-Commerce
i.N
Encryption technology
Authentication technology
Authentication protocols
5. Write about digital signature.
la
A digital signature is a mechanism that is used to verify that a particular digital
document, message or transaction is authentic.
III. EXPLAIN IN BRIEF ANSWER:
sa
1. What is E-commerce Security System?
It is a set of protocols that safely guide E-commerce transaction through the Internet.
Security has become a critical factor and core isse in the emerging E-business.
da
Solving the security problems in transaction is the basis for ensuring the smooth
development of E-business
2. List any two E-Commerce Security Threats?
i). Malicious code threats:
Pa
Within an E-Commerce site, there are multiple vulnerable areas that can serve as an
intrusion point for a hacker to gain payment and user information.
Using malware, Cross Site Scripting or SQL Injection, an attacker will extract the credit card
information and sell the acquired data on black markets.
w.
This attack will be conducted from numerous unidentified computers using botnet.
3. Write a note on asymmetric key encryption?
⁂ Different keys are used for encryption and decryption.
⁂ Speed of encryption or decryption is comparatively slow
⁂ The size of cipher text is always greater than plain text.
⁂ Algorithms like RSA, ECC, DSA use asymmetric key encryption
Prepared by P.VAHEESWARAN M.Com.,M.Phil.,DCA.,B.Ed., Page 77
et
5. Write about Plain Text and Cipher Text?
i). Plain Test:
It is the unencrypted information also called as input chip.
i.N
ii). Cipher Test:
It is encrypted data usually the output of an algorithm
IV. EXPLAIN IN DETAIL:
1. Write about dimensions of E-Commerce Security.
la
Authenticity: conforming genuineness of data shared.
Availability: prevention against data delay or removal.
Completeness: unification of all business information.
sa
Confidentiality: protecting data against unauthorized disclosure.
Effectiveness: effective handling of hardware, software and data.
Integrity: prevention of the data being unaltered or modified.
da
Non-repudiation: prevention against violation agreement after the deal.
Privacy: Prevention of customers personal data being used by others.
Reliability: providing a reliable identification of the individuals or businesses.
Review ability: capability of monitoring activities to audit and track the operations
Pa
plain text.
Algorithms like DES, AES, RC4 uses Algorithms like RSA, ECC, DSA use asymmetric
symmetric key encryption key encryption
Provides confidentiality Provides confidentiality, authenticity and non-
repudiation
et
Internet.
SET was developed in 1996 by VISA and MasterCard, with the participation of GTE, IBM,
Microsoft and Netscape.
i.N
The implementation of SET is based on the use of digital signatures.
The encryption of transmitted data with asymmetric and symmetric encryption algorithms.
SET also use dual signatures to ensure the privacy.
ii). Secure Sockets Layers:
la
It is the most common Cryptographic protocol.
SSL is a hybrid encryption protocol for securing transactions over the Internet.
sa
The SSL standard was developed by Netscape in collaboration with MasterCard, Bank of
America, MCI and Silicon Graphics.
It is based on a public key cryptography process to ensure the security of data transmission
over the internet.
da
Its principle is to establish a secure communication channel between a client and a server
after an authentication step.
Pa
***********
w.
ww
CHAPTER 18
ELECTRONIC DATA INTERCHANGE -EDI
I. CHOOSE THE CORRECT ANSWER:
1. EDI stands for
a) Electronic Details Information b) Electronic Data Information
et
c) Electronic Data Interchange d) Electronic Details Interchange
2. Which of the following is an internationally recognized standard format for FDI?
a) TSLFACT b) SETFACT c) FTPFACT d) EDIFACT
i.N
3. Which is the first industry-specific EDI standard?
a) TDCC b) VISA c) Master d) ANSI
4. Which of the following is a type of EDI?
a) Direct EDI b) Indirect EDI c) Collective EDI d) Unique EDI
la
5. Who is called as the father of EDI?
a) Charles Babbage b) Ed Guilbert c) Pascal d) None of the above
sa
II. SHORT ANSWERS :
1. Define EDI.
The Electronic Data Interchange is the exchange of business documents between one
trade partner and another electronically
da
2. List few types of business documents that are transmitted through EDI.
Delivery notes
Invoices
Pa
Purchase orders
Advance ship notice
Functional acknowledgements
3. Write any two EDI standards?
w.
Basic Standards
Document Standards
Management Standards
ww
Application Standards
III. EXPLAIN IN BRIEF ANSWER:
1. Write a short note on EDI via VAN.
It is where EDI documents are transferred with the support of third party network service
providers.
Many business prefer this network model to protect them from the updating ongoing
complexities if network technologies.
2. List the various layers of EDI.
Semantic layer
Standards translation layer
et
Transport layer
Physical layer
3. Write a note on UN/EDIFACT.
i.N
United Nations/Electronic Data Interchange For Administration, Commerce and
Transport (UN/EDIFACT) is an International EDI – standard developed under the
supervision of the United Nations.
In 1987 the UN/EDIFACT syntax rules were approved as ISO: Iso9735.
la
It is a cross industry standard data format of electronic data for commercial transactions.
IV. EXPLAIN IN DETAIL:
1. Briefly explain types of EDI.
sa
Direct EDI/Point-to-Point:
☻ It is also called as Point-to-Point EDI.
☻ It establishes a direct connection between various business stakeholders and
da
partners individually.
EDI via VAN:
☻ EDI via VAN (Value Added Network) is where EDI documents are transferred with the
support of third party network service providers.
Pa
☻ Web based EDI conducts EDI using and web browser via the Internet.
☻ To use any browser to transfer data to their business partners.
☻ Web based EDI is easy and convenient for small and medium organizations.
ww
Mobile EDI:
☻ Smart phones or other such handheld devices are used to transfer EDI documents.
☻ It is called as mobile EDI.
☻ Mobile EDI applications considerably increase the speed of EDI transactions.
et
Automation of operations
Cutting costs
Integrating all business and trading partners
i.N
Providing information on process status
Optimizing financial ratios
la
***************
sa
da
Pa
w.
ww
et
i.N
WIsh YOu
la
sa
all The besT
da
FOr YOur
Pa
eXaMINaTION
w.
ww