Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 13 Network Cabling Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 13 Network Cabling

12th Computer Applications Guide Network Cabling Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
ARPANET stands for
a) American Research Project Agency Network
b) Advanced Research Project Area Network
c) Advanced Research Project Agency Network
d) American Research Programs And Network
Answer:
c) Advanced Research Project Agency Network

Question 2.
WWW was invented by
a) Tim Berners Lee
b) Charles Babbage
c) Blaise Pascal
d) John Napier
Answer:
a) Tim Berners Lee

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 3.
Which cable is used in cable TV to connect with setup box?
a) UTP cable
b) Fibre optics
c) Coaxial cable
d) USB cable
Answer:
c) Coaxial cable

Question 4.
Expansion of UTP is
a) Uninterrupted Twisted Pair
b) Uninterrupted Twisted Protocol
c) Unshielded Twisted Pair
d) Universal Twisted Protocol
Answer:
c) Unshielded Twisted Pair

Question 5.
Which medium is used in the optical fibre cables to transmit data?
a) Microwave
b) infra red
c) light
d) sound
Answer:
c) light

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 6.
Which of the following is a small peripheral device with a sim slot to connect the computers to Internet?
a) USB
b) Dongles
c) Memory card
d) Mobiles
Answer:
a) USB

Question 7.
Which connector is used in the Ethernet cables?
a) RJ11
b) RJ21
c) RJ61
d) RJ45
Answer:
d) RJ45

Question 8.
Which of the following connector is called as champ connector?
a) RJ11
b) RJ21
c) RJ61
d) RJ45
Answer:
b) RJ21

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 9.
How many pins are used in RJ45 cables?
a) 8
b) 6
c) 50
d) 25
Answer:
a) 8

Question 10.
Which wiring standard is used for connecting two computers directly?
a) straight Through wiring
b) Cross Over wiring
c) Rollover wiring
d) None
Answer:
b) Cross Over wiring

Question 11.
Pick the odd one out from the following cables
a) roll over
b) cross over
c) null modem
d) straight through
Answer:
c) null modem

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 12.
Match the following
1. Ethernet – Port
2. RJ45 connector – Ethernet
3. RJ45 jack – Plug
4. RJ45 cable – 802.3
a) 1, 2, 4, 3
b) 4, 1, 3, 2
c) 4, 3, 1, 2
d) 4, 2, 1, 3
Answer:
d) 4, 2, 1, 3

Part II

Short Answers

Question 1.
Write a note on twisted pair cable?
Answer:

  • Twisted Pair Cables is a type of cable with two or more insulated wires twisted together.
  • It started with the speed of 10 Mbps (10BASE-T cable is used).
  • It started with the speed of 10 Mbps (10BA.SE-T cable is used).
  • Then the cable is improved and the speed was higher and went to 100 Mbps and the cable was renamed 100BASE-TX.

Question 2.
What are the uses of USB cables?
Answer:

  • The Universal Serial Bus is used to connect the keyboard, mouse, and other peripheral devices.
  • Micro USB is a miniaturized version of the USB used for connecting mobile devices such as smartphones, GPS devices, and digital cameras.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 3.
Write a note on the types of RJ45 connectors?
Answer:

  1. Wiring schemes specify how the wires to be connected with the RJ45 connector.
  2. There are two wiring schemes available to terminate the twisted-pair cable on each end, which are
    • T-568A
    • T-568B.

Question 4.
What is an Ethernet port?
Answer:

  • The Ethernet port is the jack where the Ethernet cable is to be connected.
  • This port will be there In both the computers and the LAN port.

Question 5.
What is the use of the Crimping tool?
Answer:
A crimping tool is a physical tool which is used to connect the patch wire and the Ethernet connector. The tool will puncture the connector and makes the wire set in the connector.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 6.
What are the types of twisted pair cables?
Answer:
There are two types of twisted pair cables, Unshielded Twisted Pair (UTP) and Shielded Twisted pair (STP). The UTP is used nowadays as modem cables for the Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.

Question 7.
What is meant by champ connector?
Answer:
The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end. It is also called a champ connector or Amphenol connector. The Amphenol is a connector manufacturer. The RJ-21 interface is typically used for data communication trucking applications.

Part III

Explain In Brief Answer

Question 1.
Write a note on crossover cables.
Answer:

  • If you require a cable to connect two computers or Ethernet devices directly together without a hub, then you will need to use a Crossover cable instead.
  • The easiest way to make a crossover cable is to make one end to T568A colour coding and the other end to T568B.
  • Another way to make the cable is to remember the colour coding used in this type. Here Green set of wires at one end are connected with the Orange set of wires at another end and vice versa.

Question 2.
Write a short note on RJ45 connector?
Answer:
RJ45 Connector:

  1. The RJ45 connector is a small plastic cup which will be used to connect the wire inside the connector and ready to connect to the Internet.
  2. The RJ45 connector looks similar to a telephone jack but it looks slightly wider. The Ethernet cables are sometimes called RJ45 cables.
  3. In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standards in the cable.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 3.
What are the differences between serial and parallel ports?
Answer:

Subject

Serial Port

parallel port

Pins9 pins25 pins
Type of portMale portFemale Port
ColorUsually Purple in colorUsually Green in color
Data Transfer RateSlower than Parallel PortFaster than Serial Port
Moving BitsSerial move bits inline, one at a time.Parallel moves bits next to each other
Usage of WireSerial ports are only used 2 wires for transmitting and receiving dataParallel Port used 8 or more wire for trans­mitting and receiving data.

Question 4.
What is meant by a null modem cable?
Answer:
RS-232 cable is also used for interconnecting two computers without a modem. So it is also a null-modem cable. A cable interconnecting two devices directly are known as a null-modem cable.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 5.
What are the components involved in Ethernet cabling?
Answer:
The three main components are used in the Ethernet cabling components are

  1. Patch Cable (Twisted pair)
  2. RJ45 Connector
  3. Ethernet Ports
  4. Crimping Tool

Question 6.
What are the types of Fibre optic cables?
Answer:
There are two types of fiber optic cables available.

  1. One is single-mode (100BaseBx)
  2. Multimode (lOOBaseSX).
    • Single-mode cables are used for long-distance transmission and at a high cost
    • Multimode cables are used for short-distance transmission at a very low cost.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Part IV

Explain In Detail

Question 1.
What is meant by Registered Jack? Explain briefly the types of Jacks.
Answer:
Registered Jacks:

  • A Registered Jack commonly known as RJ is a network interface used for network cabling, wiring, and jack construction.
  • The primary function of the registered jack is to connect different data equipment and telecommunication devices.
  • The commonly known registered jacks are RJ-11, RJ-45, RJ-21, and RJ-28.
  • The registered jack refers to the male physical connector (Plug), a female physical connector (Jack) and it’s the wiring.

RJ-11:

  • It is the most popular modern form of the registered jack.
  • It is found in the home and office.
  • This registered jack is mainly used in telephone and landlines.
  • There are 6 pins where
    • The two pins give the transmission configuration,
    • The two pins give the receiver configuration and
    • The other two pins will be kept for reserved.
    • The two pin will have the positive terminal and the negative terminal.

RJ-14 and RJ-61:

  • The RJ-14 is the same as RJ-11 which will be used for telephone lines where same it as 6 pins whereas the RJ-61 will have 8 pins.
  • This RJ-61 will use the twisted pair cable with a modular connection.

RJ-21:

  • The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end.
  • It is also called as champ connector or Amphenol connector.
  • The Amphenol is a connector manufacturer.
  • The RJ-21 interface is typically used for data communication trucking applications.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 2.
Explain wiring techniques used in Ethernet cabling.
Answer:

  • There are three types of wiring techniques to construct the Ethernet cable.
  • It is also known as color coding techniques. They are
    • Straight-Through Wiring
    • Cross-over Wiring
    • Roll-over Wiring

Straight-Through Wiring

  • In general, the Ethernet cables used for Ethernet connections are “straight through cables”.
  • These cable wires are in the same sequence at both ends of the cable, which means that pin 1 of the plug on one end is connected to pin 1 of the plug on the other end (for both standard – T568A & T568B).
  • The straight through wiring cables are mostly used for connecting PC / NIC card to a hub.
  • This is a simple physical connection used in printers, computers and other network interfaces.

Cross-over Wiring

  • Crossover cable is used to to connect two com¬puters or Ethernet devices directly together without a hub.
  • The pairs(Tx and Rx lines) will be crossed which means pin 1 & 2 of the plug on one end are connected with pin 3 & 6 of the plug on other end, and vice versa (3 & 6 to pin 1 & 2).
  • The Null modem Cables are the example of the crossover cables.

Roll-over Wiring

  • Rollover cable is a type of null-modem cable that is often used to connect a device console port to make programming changes to the device.
  • The rollover wiring have opposite pin arrangements, all the cables are rolled over to different arrangements.
  • In the rollover cable, the colored wires are reversed on other end i.e. the pins on one end are connected with other end in reverse order.
  • Rollover cable is also known as Yost cable or Console cable. It is typically flat (and light blue color) to distinguish it from other types of network cabling.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 3.
Explain about RJ45 connector.
Answer:

  • The RJ45 connector is a small plastic cup which will be used to connect the wire inside the connector and ready to connect the Internet.
  • The RJ45 connector looks similar like a telephone jack but it looks a slightly wider.
  • The Ethernet cables are sometime called as RJ45 cables.
  • In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standard in the cable.
  • Each RJ45 connector has eight pins and connected to each end of the Ethernet cable, since it has 8-position, 8-contact (8P8C) modular plug,
  • It is also known as 8P8C connector. These plugs (connector) are then inserted into Ethernet port of the network card.

Wiring schemes and color codes of the connector

  • The RJ45 connector has eight small jack inside to connect eight small wires of the patch cable.
  • The eight cables are in eight different colors. Let’s discuss that eight colors and where does that eight colors connect to the RJ45 connector.
  • Wiring schemes specifies how the wires to be connected with RJ45 connector. There are two wiring schemes available to terminate the twisted-pair cable on each end, which are T-568A and T-568B.
  • Although four pairs of wires are available in the cable, Ethernet uses only two pairs: Orange and Green. The other two colors (blue and brown) can be used ISDN or phone connections.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 4.
Explain the components used in Ethernet cabling.
Answer:

The main components are used in the Ethernet cabling are

  1. Patch Cable (Twisted pair)
  2. RJ45 Connector
  3. Ethernet Ports
  4. Crimping Tool

1. Patch Cable (Twisted Pair):
1. These Cables are generally made up of 8 wires in different colors.

2. Four of them are solid colours, and the others are striped.
3. The eight colors are white green, green, white orange, blue, white blue, orange, white brown and brown. The following figure 13.8 shows the patch cable.
Ethernet cables are normally manufactured in several industrial standards such as Cat 3, Cat 5, Cat 6, Cat 6e and cat 7. “Cat” simply stands for “Category,”. Increasing the size of the cable also lead to slower transmission speed.

4. The cables together with male connectors (RJ45) on each end are commonly referred as Ethernet cables. It is also called as RJ45 cables, since Ethernet cable uses RJ45 connectors.

2. RJ45 Connector:

  • The RJ45 connector is a small plastic cup which will be used to connect the wire inside the connector and ready to connect the Internet.
  • The RJ45 connector looks similar like a telephone jack but it looks a slightly wider.
  • The Ethernet cables are sometime called as RJ45 cables.
  • In RJ45 the “RJ” stands for the Registered Jack and the “45” simply refers to the number of interface standard in the cable.
  • Each RJ45 connector has eight pins and connected to each end of the Ethernet cable.
  • Since it has 8-position, 8-contact (8P8C) modular plug, It is also known as 8P8C connector. Th£se plugs (connector) are then inserted into Ethernet port of the network card.

3. Ethernet card and Port:

  • Ethernet card is a Network Interface Card (NIC) that allows computers to connect and transmit data to the devices on the network. It may be an expansion card or built-in type.
  • Expansion card is a separate circuit board also called as PCI Ethernet card which is inserted into PCI slot on motherboard of a computer.
  • Now a days most of the computers come with built-in Ethernet cards which resides on motherboard.
  • Wireless Ethernet cards are also available, which uses radio waves to transmit data.
  • Ethernet port is an opening which is a part of an Ethernet card. It accepts RJ45 connector with Ethernet cable. It is also called as RJ45 jack. It is found on personal computers, laptops, routers, switches, hubs and modems.
  • In these days, most of the computers and laptops have a built-in Ethernet port for connecting the device to a wired network.

4. Crimping Tool:

  • Crimping is the process of joining two or more pieces of metal or wire by deforming one or both of them to hold each other.
  • A crimping tool is a physical tool which is used to connect the patch wire and the Ethernet connector.
  • The tool will puncture the connector and makes the wire set in the connector.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 5.
Explain the type of Network cables?
Answer:
There are many types of cables available in networking. Here we discuss six different cables.
1. Coaxial Cables:

  • This cable is used to connect the television sets to home antennas and transfer the information in 10 Mbps,
  • It is divided into thinnet and thicknet cables.
  • These cables have a copper wire inside and insulation Is covered on the top of the copper wire to provide protection to the cable.
  • These cables are very difficult to install and maintain because they are too big to carry and replace.
  • The coaxial cable got its name by the word “coax”. Nowadays coaxial cables are also used for dish TV where the setup box and the television is connected using the coaxial cable only.
  • Some of the cable names are Media Bridge 50-feet Coaxial cable, Amazon basics CL2- Rated Coaxial cables, etc.

Twisted Pair Cables:

  • It is type of cable with two or more insulated wires twisted together.
  • It started with the speed of 10 Mbps (10BASE-T cable is used).
  • Then the cable is improved and the speed was higher and went to 100 Mbps and the cable was renamed 100BASE-TX.
  • Then finally the cable improved more made to 10 Gbps and named as 10GBASE-T.
  • This twisted cable has 8 wires which are twisted to ignore electromagnetic interference.
  • Also, the eight wires cannot be placed in a single unit there could be a difficulty in spacious, so it is twisted to make as one wire.
  • There are two types of twisted pair cables, Unshielded Twisted Pair (UTP) and Shielded Twisted pair (STP).
  • The UTP is used nowadays as modern cables for the Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.
  • STP is similar to UTP, but it is covered by an additional jacket to protect the wires from External interference.

Fiber Optics:

  • This cable is different from the other two cables.
  • The other two cables had an insulating material on the outside and the conducting material like copper inside.
  • But in this cable it is of strands of glass and pulse of light is used to send the information.
  • They are mainly used in Wide Area Network (WAN)/The WAN Is a network that extends to the very large distance to connect the computers,

Ethernet Cables:

  • Ethernet cable is the most common type of network cable mainly used for connecting the computers or devices at home or office.
  • This cable connects wired devices within the local area network (LAN) for sharing the resources and accessing the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

12th Computer Applications Guide Network Cabling Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
Which year were the co-axial cables invented?
(a) 1880
(b) 1890
(c) 1990
(d) 2000
Answer:
(a) 1880

Question 2.
The latest version of USB is ………………
a) 2.0
b) 4.0
c) 5.0
d) 3.0
Answer:
d) 3.0

Question 3.
Co-axial cables transfer the information in …………………………
(a) 10 kbps
(b) 10 Mbps
(c) 10 GBPS
(d) 10 TBPS
Answer:
(b) 10 Mbps

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 4.
……………….. cable connects wired devices within the local area network for sharing the resources and accessing the Internet.
a) wireless Cable
b) Ethernet cable
c) Coaxial Cable
d) Twisted Wire
Answer:
d) Twisted Wire

Question 5.
Co-axial cables are made up of ……………………..
(a) Steel
(b) Iron
(c) Copper
(d) Aluminium
Answer:
(c) Copper

Question 6.
………….. are used for connecting the television with the setup box.
a) UTP
b) STP
c) Twisted Cable
d) Coaxial cables
Answer:
d) Coaxial cables

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 7.
…………………….. is a type of cable with two or more insulated wires twisted together.
Answer:
Twisted pair cables

Question 8.
The ……………. uses light to transmit the information from one place to another.
a) Fibre cable
b) Network cable
c) optic cable
d) None of these
Answer:
c) optic cable

Question 9.
Assertion (A): 8 wires of the twisted cable are twisted
Reason (R): To ignore electromagnetic interference.
(a) A is true R is the reason
(b) A, R both false
(c) A is false R is true
(d) A is true, R is not the reason
Answer:
(a) A is true R is the reason

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 10.
…………….. are used for long-distance transmission and at a high cost.
a) optic cable
b) Network cable
c) Multimode cable
d) Single-mode cables
Answer:
b) Network cable

Question 11.
STP stands for ………………………
(a) Shielded Turn paper
(b) Shielded Twisted pair
(c) Soft Turn Photo
(d) Short Time processing
Answer:
(b) Shielded Twisted pair

Question 12.
The serial port will send ………….. at one time.
a) 2 bit
b) Null
c) 1 bit
d) 5 bit
Answer:
c) 1 bit

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 13.
Find the wrongly matched pair.
(a) coaxial cables – TV
(b) Twisted pair cables – ATP, UTP
(c) Fiber optic cables – Single-mode, Multimode
Answer:
(b) Twisted pair cables – ATP, UTP

Question 14.
The Null modem Cables are an example of the crossover cables.
a) coaxial
b) crossover cables
c) parallel cables
d) Serial cable
Answer:
b) crossover cables

Question 15.
The ……………. is the basic component of the Local Area Network(LAN)
a) parallel cables
b) Serial cable
c) coaxial
d) Ethernet cable
Answer:
d) Ethernet cable

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 16.
The two types of fiber optic cables are ……………………… and ………………………..
Answer:
Single-mode, Multi-mode

Fill In The Blanks

1. The …………… is a small plastic cup which will be used to connect the wire inside the connector and ready to use to connect the Internet.
Answer:
RJ45 Ethernet connector

2. The ………….. has eight small pins inside to connect eight small wires in the patch cable. The eight cables have eight different colours.
Answer:
RJ45 connector

3. The …………….. is the jack where the Ethernet cable is to be connected.
Answer:
Ethernet port

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

4. …………….. port will be there in both the computers and the LAN port.
Answer:
Ethernet port

5. The …………… is a physical tool which is used to connect the patch wire and the Ethernet connector(RJ45).
Answer:
crimping tool

6. A ……………. is a network interface used for connecting different data equipment and telecommunication devices.
Answer:
Registered Jack (RJ)

7. ……………… jack is mainly used in telephone and landlines.
Answer:
RJ11

8. ……………… cable is used to transfer the information in 10 Mbps.
Answer:
Coaxial

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Very Short Answers

Question 1.
What is the purpose of network cables?
Answer:
The Network cables are used to transfer the data and information to another computer.

Question 2.
What is the use of coaxial cable?
Answer:
Coaxial cables are used for connecting the television with the setup box.

Question 3.
How many wires are there in the twisted cable? Why?
Answer:
Twisted cable has 13 wires which are twisted to ignore electromagnetic interference

Question 4.
What are the two types of twisted pair cables?
Answer:
Unshielded Twisted Pair (UTP) and Shielded Twisted pair (STP).

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 5.
Expand ARPANET.
Answer:
Advanced Research Project Agency Network

Question 6.
What is ARPANET?
Answer:
It is the predecessor of the modern Internet.

Question 7.
What is the use of USB cables?
Answer:
USB cables are used to connect keyboard, mouse, and other peripheral devices

Question 8.
What is the use of parallel cables?
Answer:
The parallel cables are used to connect to the printer and other disk drivers.

Question 9.
What are the two types of fiber-optic cable?
Answer:
Single-mode ((100 Base Bx)) and Multimode ((100 Base SX))

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 10.
How serial port and parallel port differ?
Answer:
It will send 1 bit at one time whereas the parallel port will send 13 bit at one time.

Question 11.
What is the use of serial and parallel interface?
Answer:
The Serial and Parallel interface cables are used to connect the Internet to the system.

Question 12.
What is the purpose of cross-over cable?
Answer:
Cross over cable is used to join two network devices of the same type

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 13.
What is RJ Network?
Answer:
A Registered Jack (RJ) is a network interface

Question 14.
Where is the RJ11 cable used?
Answer:
RJ11 jack is mainly used in telephone and landlines

Question 15.
What is the use of a crimping tool?
Answer:
The crimping tool is used to connect the patch wire and the Ethernet connector.

Question 16.
What is an Ethernet port?
Answer:
The Ethernet port is the jack where the Ethernet cable is to be connected.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 17.
What is an Ethernet cable?
Answer:
The Ethernet cable is the basic component of the Local Area Network

Question 18.
What is the purpose of using Fiber optic cable?
Answer:
Fiber optic cables are used in Wide Area Network (WAN).

Question 19.
What is a dongle?
Answer:
The dongle is a small peripheral device which has compatible with mobile broadband.

Question 20.
How the internet is connected through a dongle?
Answer:
A sim slot in it and connects the Internet and acts as a modem to the computer.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Abbreviation:

  1. ARPANET – Advanced Research Project Agency Network
  2. WWW – World Wide Web
  3. W3C – World Wide Web Consortium
  4. LAN – Local Area Network
  5. WAN – Wide Area Network
  6. UTP – Unshielded Twisted Pair
  7. STP – Shielded Twisted pair
  8. NIC – Network Interface Card
  9. USB – Universal Serial Bus
  10. RJ – Registered Jack
  11. 8P8C – 8-position, 8-contact

Find The Odd One On The Following

l. (a) Media Bridge
(b) 50feet coaxial cable
(c) 10BASE-T
(d) CL2
Answer:
(c) 10BASE-T

2. (a) 100BaseBX
(b) 100BaseSX
(c) WAN
(d) 10 Base T
Answer:
(d) 10 Base T

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

3. (a) Keyboard
(b) Monitor
(c) Mouse
(d) peripheral devices
Answer:
(b) Monitor

4. (a) Smartphones
(b) GPS devices
(c) Digital cameras
(d) Mouse
Answer:
(d) Mouse

5. (a) Speakers
(b) Infra Red
(c) Blue tooth
(d) WiFi
Answer:
(a) Speakers

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

6. (a) RJ45Connector
(b) UTP Cable
(c) coaxial cable
(d) plastic covering
Answer:
(c) coaxial cable

7. (a) USB cable
(b) RJ45 Connector
(c) Ethernet Ports
(d) Crimping Tools
Answer:
(a) USB cable

8. (a) White Green
(b) White Red
(c) White Orange
(d) White brown
Answer:
(b) White Red

9. (a) Cat 5
(b) Cat 6e
(c) Cat 7
(d) Cat 5e
Answer:
(d) Cat 5e

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

10. (a) RJ-11
(b) RJ-21
(c) RJ-08
(d) RJ-45
Answer:
(c) RJ-08

11. (a) Registered Jack
(b) Mobile
(c) 6pin
(d) Landlines
Answer:
(b) Mobile

12. (a) ChampConnector
(b) Amphenol Connector
(c) Wireless Connector
(d) RJ21
Answer:
(c) Wireless Connector

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

13. (a) Champ over
(b) Cross Over
(c) Straight Through
(d) Roll Over
Answer:
(a) Champ over

14. (a) T568A
(b) T568B
(c) Tx, Rx lines
(d) RJ-28
Answer:
(d) RJ-28

15. (a) Twisted pair
(b) UTP
(c) FTP
(d) STP
Answer:
(c) FTP

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Choose The Incorrect Pair:

1. a) Media Bridge 50-feet Coaxial cable, Amazon basicsCL2-Rated Coaxial cables.
b) Unshielded Twisted Pair and Shielded Twisted pair.
c) USB cables and Parallel cables
d) Single-Mode and Multimode
Answer:
c) USB cables and Parallel cables

2. a) Serial and Parallel cables
b) Patch Cable, RJ45 Connector
c) Ethernet Ports, Crimping Tool
d) Coaxial cable, Serial Port
Answer:
d) Coaxial cable, Serial Port

3. a) Ethernet cable and serial cable
b) RJ45 plug, Ethernet connector.
c) Rj45 jack, Ethernet Port
d) RJ45, 802.3
Answer:
a) Ethernet cable and serial cable

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

4. a) RJ-11, RJ-45
b) RJ-45 and RJ47
c) RJ-14 and RJ-61
d) RJ-21, RJ-28
Answer:
b) RJ-45 and RJ47

5. a) USB cables, Peripheral devices
b) Coaxial cables, 10 Mbps
c) Ethernet port, LAN port
d) Parallel port, 100BaseSX
Answer:
d) Parallel port, 100BaseSX

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Match The Following:

Question 1.
A) Tim Berners Lee -1) WAN
B) Coaxial cables – 2) WWW
C) Twisted pair – 3) CL2 Related coaxial
D) Fiber optics cable – 4) STP
a) 1 2 3 4
b) 2 31 4
c) 4 3 2 1
d) 2 3 4 1
Answer:
d) 2 3 4 1

Question 2.
A) Coaxial cables – 10gbps
B) Twisted pair – 100 BASE-BX
C) Fiber optics cable – 100 GBASE-T
D) Ethernet Cable -10 Mbps
a) 1 2 3 4
b) 2 31 4
c) 4 3 2 1
d) 2 3 4 1
Answer:
c) 4 3 2 1

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 3.
A) RJ45 connector -1) Crimping Tool
B) Ethernet -2) Small 8 jack inside
C) Expansion card -3) NIC
D) RJ45 Cable -4) Ethernet cable
a) 1234
b) 2 31 4
c) 4 3 2 1
d) 2 3 4 1
Answer:
d) 2 3 4 1

Question 4.
A) Ethernet Technology – RJ45, 802.3
B) RJ45 Connector(male) – RJ45 plug, Ethernet connector, 8P8C connector
C) RJ45 socket (female) – Rj45 jack, Ethernet Port
D) RJ45 Cable – Ethernet cable
a) 1 2 3 4
b) 2 31 4
c) 4 3 2 1
d) 2 3 4 1
Answer:
a) 1 2 3 4

Question 5.
A) RJ11 Jack – Peripheral devices
B) RJ45 Connector – Telephones and landlines
C) USB Cables – Crimping Tool
D) Cross over cable – Null modem Cables
a) 1 2 3 4
b) 2 31 4
c) 4 3 2 1
d) 2 3 4 1
Answer:
b) 2 31 4

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Part B

Short Answers

Question 1.
Write a note on coaxial cables?
Answer:
Coaxial Cables:
This cable was invented in the late 1880s, which is used to connect television sets to home antennas. This cable is used to transfer the information in 10 Mbps.

Question 2.
What is mean by Expansion card?
Answer:

  • The expansion card is a separate circuit board also called PCI.
  • Ethernet card is inserted into a PCI slot on the motherboard of a computer.

Question 3.
Mention the different types of cables used to connect the computer on Network?
Answer:
Computers can be connected on the network with the help of wired media (Unshielded Twisted pair, shielded Twisted pair, Co-axial cables, and Optical fiber) or wireless media (Infra Red, Bluetooth, WiFi)

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 4.
List the type of Network cables
Answer:

  1. Coaxial Cables
  2. Twisted Pair Cables
  3. Fiber Optics
  4. USB Cables
  5. Serial and Parallel cables
  6. Ethernet Cables

Question 5.
Give the Pin details of RJ-11?
Answer:
Pin details of the RJ-11, there is 6 pin where the two pins give the transmission configuration, the two pins give the receiver configuration and the other two pins will be kept for reserved. The two-pin will have the positive terminal and the negative terminal.

Question 6.
What are the two types of twisted-pair cables?
Answer:
There are two types of twisted pair cables,

  1. Unshielded Twisted Pair (UTP) and
  2. Shielded Twisted pair (STP).

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 7.
What is the use of UTP?
Answer:

  • The UTP is used nowadays as modern cables for the Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.
  • STP is similar to UTP, but it is covered by an additional jacket to protect the wires from External interference.

Question 8.
Write about Fiber Optics
Answer:

  • Fiber Optics cable is different from the other two cables.
  • The other two cables had an insulating material at the outside and the conducting material like copper inside.
  • But in this cable it is of strands of glass and pulse of light is used to send the information.

Question 9.
What are the two types of fiber optic cables available,
Answer:
There are two types of fiber optic cables available

  1. Single-mode (100BaseBx) another
  2. Multimode (100BaseSX).

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Question 10.
What is the use of a Single-mode Cable?
Answer:
Single-mode cables are used for long-distance transmission and at a high cost.

Question 11.
What is the use of Multi-Mode Cable?
Answer:

  • Multimode cables are used for short-distance transmission at a very low cost.
  • The optic cables are easy to maintain and install.

Question 12.
What is the use of Micro USB?
Answer:
Micro USB is a miniaturized version of the USB used for connecting mobile devices such as smartphones, GPS devices, and digital cameras.

Question 13.
What is the use of cross-over Cable?
Answer:
Cross over cable is used to join two network devices of the same type for example two PCs or two network devices.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Part C

Explain In Brief Answer

Question 1.
Compare UTP and STP?
Answer:
UTP: The UTP is used nowadays as modem cables for the Internet and they are lower in cost and installation and maintenance is easy compared to the coaxial cables.

STP: STP is similar to UTP, but it is covered by an additional jacket to protect the wires from External interference.

Question 2.
How to determine the type of Ethernet Cable?
Answer:

  1. Straight-through: The coloured wires are in the same sequence at both ends of the cable.
  2. Cross-over: The first coloured wire at one end of the cable is the third coloured wire at the other end of the cable.
  3. Poll-over: The coloured wires are in the opposite sequence at either end of the cable.

Samacheer Kalvi 12th Computer Applications Guide Chapter 13 Network Cabling

Part D

Explain In Detail

Question 1.
Explain the Crimping process to make Ethernet cables?
Answer:
Crimping process for making Ethernet cables

  1. Cut the cable with the desired length
  2. Strip the insulation sheath about 1 inch from both ends of the cable and expose the Twisted pair of wires
  3. After stripping the wire, untwist the smaller wires and arrange them into the proper wiring scheme, T568B preferred generally.
  4. Bring the wires tighter together and cut them down so that they all have the same length ( Vi inch).
  5. Insert all 8 coloured wires into the eight grooves in the connector. The wires should be, inserted until the plastic sheath is also inside the connector.
  6. Use the crimping tool to lock the RJ45 connector on the cable. It should be strong enough to handle manual traction. Now it is ready for data transmission.
  7. Use a cable tester to verify the proper connectivity of the cable, if need.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 14 Open Source Concepts Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 14 Open Source Concepts

12th Computer Applications Guide Open Source Concepts Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
If the source code of a software is freely accessible by the public, then it is known as
a) freeware
b) Firmware
c) Open source
d) Public source
Answer:
c) Open source

Question 2.
Which of the following is a software pro¬gram that replicates the functioning of a computer network?
a) Network software
b) Network simulation
c) Network testing
d) Network calculator
Answer:
b) Network simulation

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
Which of the following can document every incident that happened in the simulation and are used for examination?
a) Net Exam
b) Network hardware
c) Trace file
d) Net document
Answer:
c) Trace file

Question 4.
Which is an example of network simulator?
a) simulator
b) TCL
c) Ns2
d) C++
Answer:
c) Ns2

Question 5.
Fill in the blanks: NS2 comprises of key languages?
a) 13
b) 3
c) 2
d) 4
Answer:
c) 2

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 6.
Choose the Correct Pair from the following to build NS2
a) UNIX & TCL
b) UNIX & C++
c) C++ & OTCL
d) C++ & NS2
Answer:
c) C++ & OTCL

Question 7.
Which of the following is not a network simulation software?
a) Ns2
b) OPNET
c) SSFNet
d) C++
Answer:
a) Ns2

Question 8.
Which of the following is a open source network monitoring software?
a) C++
b) OPNET
c) Open NMS
d) OMNet++
Answer:
c) Open NMS

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 9.
Open NMS was released in
a) 1999
b) 2000
c) 2003
d) 2004
Answer:
d) 2004

Question 10.
OpenNMS Group was created by
a) Balog
b) Matt Brozowski
c) David Flustace
d) All of them.
Answer:
d) All of them.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Part II

Short Answers

Question 1.
Explain the History of open-source software.
Answer:
History of open source software:

  1. In the early day of computing, programmers and developers shared software in order to learn from each other
  2. Eventually, it moved to the wayside of commercialization of software in 1970-1980
  3. The Netscape communication corporation released their popular Netscape Communicator Internet suite as free software. This made others look into how to bring the free software ideas.
  4. The Open Source Initiative was founded in Feb 1998 to encourage the use of the new term open-source.

Question 2.
What is meant by a network simulator?
Answer:

  • A network simulator is a software program that replicates the functioning of a computer network.
  • In simulators, the computer network is typically demonstrated with devices, traffic etc. and the performance is evaluated.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
What is a trace file?
Answer:
A significant output of the simulation is the trace files. Trace files can document every incident that happened in the simulation and are used for examination.
C++ and Object-oriented Tool Command Language (OTCL) and network monitoring.

Question 4.
Write short notes on NS2.
Answer:
NS2 is the abbreviation of NETWORK SIMULA-TOR version 2. NS2 has C++ and Object-oriented Tool Command Language (OTcl) of languages 2. It is one the open-source application software

Question 5.
Explain NRCFOSS.
Answer:
NRCFOSS: National Resource Centre for Free and Open Source Software an Institution of Government of India. To help in the development of FOSS in India.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 6.
Write a short note on Open NMS?
Answer:
There are two types in this Meridian and Horizon.

  • Meridian: When we need stability and long-term support choose Meridian which is best for Enterprises as well as businesses.
  • Horizon: Horizon used where innovation occurs frequently. It is Best for IT-ecosystem, new technologies monitoring.

Part III

Explain In Brief Answer

Question 1.
What are the uses of Open source Network Software?
Answer:

  • There are many opensource softwares, so, we can select and use any software that suits our needs.
  • The software can be used without any cost and restrictions.
  • We can share our ideas with the team.
  • We can learn many ideas and make our program writing skills more efficient.
  • We can add the most required features to the software User friendly.

Question 2.
Explain Free software.
Answer:
Free software a concept developed in the 1980s by an MIT computer science researcher, Richard Stallman is defined by four conditions, as outlined by the nonprofit Free Software Foundation.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
List out the Popular open-source software.
Answer:

  • NS2 , OPEN NMS, Ubuntu , MySQL, PDF Creator, Open Office, 7zip, GnuCash, GIMP, BLENDER,
  • AUDACITY, VLC, MOZILAi FIREFOX, MAGENTO, ANDROID, PHP

Question 4.
Write note on open source hardware.
Answer:
In this period of increased competition and cyber crimes, the computers used by indivudals or business organisations may have spy hardwares of rivals. Open source hardware technology helps in such threats. In this technique we get the components of the hardware and its circuit diagram, so that we can remove suspicious spyware if found.

Question 5.
What are the main functional areas of Open NMS?
Answer:

  1. Service monitoring, where a number of monitor modules can govern if network-based services (ICMP, HTTP, DNS, etc.) are accessible.
  2. Data Gathering by using SNMP and JMX.
  3. Event management and notifications, which comprises alarm reduction and a robust announcement system with accelerations and duty schedules.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 6.
Explain Types of Organizations related to Open Source.
Answer:

  1. Organizations related to Open Source
  2. Apache Software Foundation
  3. The Document Foundation The Eclipse Foundation
  4. Free Software Foundation
  5. Linux Foundation
  6. OpenCourseWare Consortium
  7. Open Source Initiative

Part IV

Explain In Detail

Question 1.
Differentiate Proprietary and open-source software.
Answer:

                      Open Source Software

Proprietary Software

It is developed and tested through open collaborationIt is owned by the indi­vidual or the organiza­tion that developed if
Anyone with the aca­demic knowledge can access, inspect, modi­fy and redistribute the source code.Only the owner or pub­lisher who holds the legal property rights of the source code can ac­cess it.
The project is managed by an open-source community of develop­ers and programmersThe project is managed by a dosed group of in­dividuals or a team that developed it
They are not aimed at unskilled users outside of the programming communityThere are focused on a limited market of both skilled and unskilled end users
It Provides better flex­ibility which means more freedom which encourages innovationThere is a very limit­ed scope of innovation with the restrictions and all
Example; Android, Firefox etcExample: Windows, macOS

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 2.
List out the Benefits of Open Source Software.
Answer:
There are many open source softwares, so, we can select and use any software that suits our needs.

  • The complete options of the software can be used without any cost and restrictions.
  • We can share our ideas with the team, write the required code and share it with many.
  • As we can identify the programming techniques of group members, we can learn many ideas and make our program writing skills more efficient.
  • The coding in open source softwares is being groomed by many enthusiastic members of the group. So if we report problems that we have in the program they are quickly mended by the group’s effort.
  • As we can make changes to the open-source softwares, we can add the most required features in the software.
  • Much open-source software is very user friendly.

Question 3.
Explain various Open Source Licenses.
Answer:
Types of open source license

  1. Apache License 2.0
  2. BSD 3-Clause “New” or “Revised” license
  3. BSD 2-Clause “Simplified” or “FreeBSD” license
  4. GNU General Public License (GPL)
  5. GNU Library or “Lesser” Genera! Public License (LGPL)
  6. MIT license
  7. Mozilla Public License 2.0
  8. Common Development and Distribution License
  9. Eclipse Public License
  10. When you change the source code. OSS requires the inclusion, of what you altered as well as your methods.
  11. The software created after code modifications may or may not be made available for free.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

12th Computer Applications Guide Open Source Concepts Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
…………… software has been developed by a variety of programmers.
a) Open source
b) Free Software
c) Proprietary’ Software
d) All of these
Answer:
a) Open source

Question 2.
Proprietary Software is owned by an …………………………
(a) Organization
(b) Individual
(c) both a and b
(d) none of these
Answer:
(c) both a and b

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
Which of the following organization is not related to Open Source?
a) Apache Software Foundation
b) The Document Foundation
c) The Eclipse Foundation
d) Initiative Foundation.
Answer:
d) Initiative Foundation.

Question 4.
The free software concept is developed in ……………
a) 1980s
b) 1970s
c) 1990s
d) None of the above
Answer:
a) 1980s

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 5.
Pick the odd one out
(a) Apache Software Foundation
(b) The document Foundation
(c) The Eclipse Foundation
(d) The round Foundation
Answer:
(d) The round Foundation

Question 6.
Which of the following is not an open-source application?
a) AUDACITY
b) VLC
c) Mozilla Firefox
d) MS Office
Answer:
d) MS Office

Question 7.
BOSS developed by ……………………..
(a) A-DAC
(b) M-DAC
(c) D-MAC
(d) C-DAC
Answer:
(d) C-DAC

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 8.
…………… a pure event base software tool with super simulation design
a) OpenNMS
b) API
c) NS2
d) OTCL
Answer:
b) API

Question 9.
How many Indian Languages are supported by BOSS?
(a) 15
(b) 10
(c) 5
(d) many
Answer:
(d) many

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 10.
In OpenNMS, Data are Gathering by using ……………..
a) SNMP
b) JMX
c) Both a and b
d) None of these
Answer:
c) Both a and b

Question 11.
Which of the following is a network-based service?
a) ICMP
b) HTTP
c) DNS
d) All of the above
Answer:
d) All of the above

Question 12.
The free software was developed in the year …………………….
(a) 1972
(b) 1978
(c) 1980
(d) 2003
Answer:
(c) 1980

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Abbreviation

  1. NRCFOSS- National Resource Centre for Free and Open Source Software
  2. BOSS – Bharat Operating System Solutions
  3. C-DAC – Centre for Development of Advanced Computing
  4. GNU – General Public License
  5. FCAPS – Fault, configuration, accounting, performance, security
  6. NMS – Network Management System)
  7. OTCL – Object-oriented Tool Command Language
  8. SSFNet – Scalable Simulation Framework Net Models
  9. API – Application Program Interface
  10. SOURCE CODE – Set of Instructions that decide, how the software should work
  11. NS2 – Network Simulation 2
  12. OpenNMS – Open Source Network Management Software

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Assertion And Reason

Question 1.
Assertion (A): In a computer network, network simulation is a method whereby a software program models the activities of a network by calculating the communication between the different network objects such as(routers, nodes, switches, access points, links etc.).
Reason(R): A network simulator is a software program that replicates the functioning of a computer network.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:

Question 2.
Assertion (A): There is much Open Source software. So, we can select and use any software that suits our needs.
Reason(R): The complete options of the software can be used without any cost and restrictions.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
Assertion (A): Open NMS (Network Management System) is a free and open-source initiative grade network monitoring and management platform.
Reason(R); It is established and maintained by a community of users, developers and by the Open NMS Group, it offering services, training and support.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 4.
Assertion (A); Service monitoring, where a number of monitor modules can govern if network-based services (ICMP, HTTP, DNS, etc.) are accessible.
Reason(R): Data Gathering by using HTML and JSP.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 5.
Assertion (A): AJAX has C++and Object-oriented Tool Command Language (OTCL) of languages
Reason(R): NS2 link together for C++ and the OTCL using TCLCL.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Match The Following:
1. Richard Stallman – Software Program
2. BOSS – Open-source Application software
3. BSD 2-Clause – LGPL
4. BSD 3-Clause – Free software concept
5. GNU Library – Data Gathering
6. NS2 – Revised license
7. Open NMS – C++, OTCL
8. Network Simulation – FCAPS
9. BLENDER – Free BSD license
10. SNMP – C-DAC
Answers
1. Free software a concept
2. C-DAC
3. FreeBSD license
4. Revised license
5. LGPL
6. C++, OTCL
7. FCAPS
8. Software Program
9. Open source Application software
10. Data Gathering

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Very Short Answers

Question 1.
What is a trace file?
Answer:
Trace file is a document file, consists of every incident that happens in a simulation.

Question 2.
What is the use of Network monitoring software notifications?
Answer:
It is used to help the user or administrator for fixed errors.

Question 3.
Mention some large enterprise management products?
Answer:
HP Open View, IBM Micro muse or IBM Tivoli.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 4.
How NS2 links C++ and OTCL?
Answer:
It links together for C++ and the OTCL using TCLCL.

Question 5.
What is the use of trace files?
Answer:
Trace files can document every incident that happened in the simulation and are used for examination.

Question 6.
What does open-source denote?
Answer:
Open Source denotes some program whose I source code is made available for usage

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Find The Odd One On The Following

1. (a) Support
(b) Training
(c) Edit Source By User
(d) Security
Answer:
(c) Edit Source By User

2. (a) Apache
(b) Microsoft
(c) Linux
(d) Document
Answer:
(b) Microsoft

3. (a) GUI
(b) GPL
(c) LG PL
(d) MIT
Answer:
(a) GUI

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

4. (a) Routers
(b) Nodes
(c) OpenSource
(d) Access points
Answer:
(c) OpenSource

5. (a) Openoffice
(b) VLC
(c) Microsoft word
(d) NS2
Answer:
(c) Microsoft word

6. (a) Fault
(b) Communication
(c) Accounting
(d) Performance
Answer:
(b) Communication

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

7. (a) Event Management
(b) Service Monitoring
(c) Data Collection
(d) MAGENTO
Answer:
(d) MAGENTO

8. (a) ICMP
(b) HTTP
(c) JMX
(d) DNS
Answer:
(c) JMX

9. (a) Mozilla Firefox
(b) Chrome
(c) Internet Explorer
(d) Android
Answer:
(d) Android

10. (a) Bjarne Stroustrup
(b) Steve Giles
(c) Brian Weaver
(d) LukeRindfuss.
Answer:
(a) Bjarne Stroustrup

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Important Years To Remember:

1980Free software concept developed
1999Open NMS was released by Steve Giles, Brian Weaver, and Luke Rindfuss
2004OpenNMS Group was created by Balog, Matt Brozowski, and David Hustace

Part B

Short Answers

Question 1.
Write a short note on open source software and developers?
Answer:
Open-Source Software and Developers:
OSS projects are collaboration opportunities that improve skills and build connections in the field. Domains that developers can contribute to the open-source community include:

  1. Communication tools.
  2. Distributed revision control systems.
  3. Bug trackers and task lists.
  4. Testing and debugging tools.

Question 2.
What is the network simulator?
Answer:

  • A network simulator is a software program that replicates the functioning of a computer network.
  • In simulators, the computer network is typically demonstrated with devices, traffic etc. and the performance is evaluated.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
Write a short note on BOSS.
Answer:

  • BOSS (Bharat Operating System Solutions) Operating System Developed in India by C-DAC (Centre for Development of Advanced Computing) Help to prompt the use of open-source software in India.
  • It Supports many Indian languages.

Part C

Explain In Brief Answer

Question 1.
Write some Organizations related to Open Source.
Answer:

  • Apache Software Foundation
  • The Document Foundation
  • The Eclipse Foundation
  • Free Software Foundation
  • Linux Foundation
  • Open Courseware Consortium
  • Open Source Initiative

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 2.
List the various types of open NMS?
Answer:
There are two types in this Meridian and Horizon.

  • Meridian: When we need stability and long-term support choose Meridian which is best for Enterprises as well as businesses.
  • Horizon: Horizon used where innovation occurs frequently. It is Best for IT-ecosystem, new technologies monitoring.

Question 3.
Write a short note on Open-Source Software and Developers
Answer:

  • OSS projects are collaboration opportunities that improve skills and build connections in the field.
  • Domains that developers can contribute to the open-source community include:
    • Communication tools.
    • Distributed revision control systems.
    • Bug trackers and task lists.
    • Testing and debugging tools.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Part D

Explain In Detail

Question 1.
Differentiate Open Source Software with free software?
Answer:
Open-Source Software vs. Free Software:
Although the terms are often used interchangeably, OSS is slightly different from free software. Both deal with the ability to download and modify software without restriction or charge.

However, free software a concept developed in the 1980s by an MIT computer science researcher, Richard Stallman is defined by four conditions, as outlined by the nonprofit Free Software Foundation. These “four freedoms” emphasize the ability of users to use and enjoy software as they see fit.

In contrast, the OSS criteria, which the Open Source Initiative developed a decade later, place more emphasis on the modification of software, and the consequences of altering source code, licensing, and distribution.

Obviously, the two overlap; some would say the differences between OSS and free software are more philosophical than practical. However, neither should be confused with freeware. Freeware usually refers to proprietary software that users can download at no cost, but whose source code cannot be changed.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 2.
Explain in detail about Open NMS.
Answer:

  • Open NMS (Network Management System) is a free and open-source initiative-grade network monitoring and management platform.
  • It is established and maintained by a community of users, developers, and the Open NMS Group.
  • It offering services, training, and support.

The goal is for Open NMS

  • The goal is for Open NMS to be an actually distributed, scalable management application platform for all features of the FCAPS (Fault, Configuration, Accounting, Performance, Security) network management model.
  • Presently the emphasis is on Fault and Performance Management.
  • It was intended to cope with tens of thousands of devices from a single server as well as achieve unlimited devices using a cluster of servers.

Features:

  • OpenNMS comprises a discovery engine to routinely configure and manage network devices without operator intervention. It is written in Java and is issued under the GNU (General Public License.)
  • OpenNMS is the World’s first software for Network monitor and management with open-source options.

OpenNMS- Types:
There are two types in this Meridian and Horizon.
Meridian: When we need stability and long-term support choose Meridian which is best for Enterprises as well as businesses.
Horizon:

  • It is used where innovation occurs frequently.
  • It is Best for IT-ecosystem, new technology monitoring.

History:

  • OpenNMS was Released in 1999 by Steve Giles, Brian Weaver, and Luke Rindfuss.
  • In 2004 OpenNMS Group was created by Balog, Matt Brozovvski, and David Hustace.
  • It is written in Java and can run on all type of platform,
  • It gives us Event management & Notification, Discovery & Provisioning, service monitoring, and Data Collection.
  • Won lot of awards for best of open-source software.

Samacheer Kalvi 12th Computer Applications Guide Chapter 14 Open Source Concepts

Question 3.
Explain in Detail Open NMS?
Answer:
Open NMS

  • Open NMS (Network Management System)is a free and open-source initiative-grade network monitoring and management platform.
  • It is established and maintained by a community of users, developers, and by the Open NMS
    Group, it offering services, training, and support.
  • The goal is for Open NMS to be an actually distributed, scalable management application platform for all features of the FCAPS (Fault, configuration, accounting, performance,
    security) network management model.
  • Presently the emphasis is on Fault and Performance Management.
    It was intended to cope with tens of thousands of devices from a single server as well as achieve unlimited devices using a cluster of servers.
  • Open NMS comprises a discovery engine to routinely configure and manage network devices without operator intervention.
  • It is written in Java and is issued under the GNU (General Public License.)
  • Open NMS is the Worlds first software for Network monitor and management with open source options. There are two types in this Meridian and Horizon.
  • When we need stability and long-term support choose Meridian which is best for Enterprises as well as businesses, for Horizon used where innovation occurs frequently. It is Best for IT-ecosystem, new technologies monitoring.

Open Source Hardware:

  1. Remix
  2. Remake
  3. Remanufacture
  4. Redistribute
  5. Resell
  6. Study and Learn

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 15 E-Commerce Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 15 E-Commerce

12th Computer Applications Guide E-Commerce Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
A company can be called E-Business if
a) it has many branches across the world.
b) it conduct business electronically over the Internet.
c) it sells commodities to a foreign country.
d) it has many employees.
Answer:
b) it conduct business electronically over the Internet.

Question 2.
Which of the following is not a tangible good?
a) Mobile
b) Mobile Apps
c) Medicine
d) Flower bouquet
Answer:
b) Mobile Apps

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
SME stands for
a) Small and medium sized enterprises
b) Simple and medium enterprises
c) Sound messaging enterprises
d) Short messaging enterprises
Answer:
a) Small and medium sized enterprises

Question 4.
The dotcom phenomenon deals with
a) Textile industries
b) Mobile phone companies
c) Internet based companies
d) All the above
Answer:
c) Internet based companies

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
Which of the following is not correctly matched
a) The First Wave of Electronic Commerce: 1985 -1990
b) The Second Wave of Electronic Commerce: 2004 -2009
c) The Third Wave of Electronic Commerce: 2010 – Present
d) Dotcom burst: 2000 – 2002
Answer:
a) The First Wave of Electronic Commerce: 1985 -1990

Question 6.
Assertion (A): The websites of first wave dot.com companies were only in En-glish
Reason (R The dot com companies of first wave are mostly American companies.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 7.
Off-shoring means
a) Work outsourced to a branch of its own company
b) Work outsourced to new employees
c) Work outsourced to a third party locally
d) Work outsourced to a third party outside its own country
Answer:
d) Work outsourced to a third party outside its own country

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 8.
G2G systems are classified into
a) Internal facing and external facing
b) Internet facing and Extranet facing
c) Internal flag and external flag
d) Internet flag and Extranet flag
Answer:
a) Internal facing and external facing

Question 9.
host the e-books on their websites.
a) Bulk-buying sites
b) Community sites
c) Digital publishing sites
d) Licensing sites
Answer:
c) Digital publishing sites

Question 10.
Which of the following is not a characteristics of E-Commerce
a) Products cannot be inspected physically before purchase.
b) Goods are delivered instantly.
c) Resource focus supply side
d) Scope of business is global.
Answer:
d) Scope of business is global.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Part II

Short Answers

Question 1.
Define E-Commerce.
Answer:
E-Commerce can be described as the process of buying or selling products, services, or information via computer networks.

Question 2.
Distinguish between E-Business and E-Commerce
Answer:

E-Commerce

E-business

1. E-commerce in­volves commercial transactions done over the internet.1. E-business is the conduct of business processes on the internet
2. E-commerce is a subset of E-business.2. E-business is a superset of E-business.
3. E-commerce usu­ally requires the use of just a website.3. E-business involves the use of CRM’S, ERP that connect different business processes.
4. E-commerce just involves buying and selling of products and services.4. E-business includes all kind of pre-sale and post-sale efforts.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Differentiate tangible goods and electronic goods with an example of your own.
Answer:

Tangible goods

Electronic goods

A physical item that can be perceived by the sense of touch.Components for controlling the flow of electrical currents for the purpose of informa­tion processing and system control.
Example:  cars,  food items, com­puters,Example: Goods with tran­sistors and diodes.

Question 4.
What are dotcom bubble and dotcom burst?
Answer:
Dotcom Bubble:

  1. The Dotcom Bubble was a historic excessive growth (excessive assumption) of the economy that occurred roughly between 1995 and 2000.
  2. During the dotcom bubble, the value of equity markets grew exponentially with the NASDAQ composite index of US stock market rising from under 1000 points to more than 5000 points.

Dotcom Burst:

  1. The Nasdaq-Composite stock market index fell from 5046.86 to 1114.11. This is infamous, known as the Dotcom Crash or Dotcom Burst.
  2. This began on March 11, 2000, and lasted until October 9, 2002. During the crash, thousands of online shopping companies, like Pets.com failed and shut down.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
Write a short note on out-sourcing.
Answer:
Out-sourcing is generally associated with B2B E-Commerce. If a company’s work is hired by another company, it would be termed as out-sourcing.

Part III

Explain In Brief Answer

Question 1.
Describe how E-Commerce is related to socio-technological changes.
Answer:

  • The growth of E-Commerce is also related to socio-technological changes.
  • The more, the medium becomes deep-rooted, the more, are the users drawn towards it.
  • An increase of users increases the markets.
  • As the markets expand, more business organizations are attracted.
  • The more businesses accumulate it creates competition.
  • The competition leads to innovation.
  • Innovation in turn drives the development of technology.
  • Technology facilitates E-Commerce’s growth.

Question 2.
Write a short note on the third wave of E-Commerce.
Answer:
The Third Wave of Electronic Commerce: 2010 – Present

  1. The third wave is brought on by mobile technologies. It connects users via mobile devices for real-time and on-demand transactions, mobile technologies.
  2. It connects users via mobile devices for real-time and on-demand transactions.
  3. Not only the information is filtered by time, but also the geographic coordinates are used to screen the specific location-tailored information properly.
  4. The term Web 3.0, summarizes the various characteristics of the future Internet which include Artificial Intelligence, Semantic Web, Generic Database, etc.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Explain B2B module in E-Commerce.
Answer:

  • In B2B E-Commerce, commercial, transactions take place between different business organizations, through the Internet.
  • For example, a cycle company may buy tyres from another company for their cycles.
  • When compared to other models, the value per transaction in B2B transactions is high, because of bulk purchases.
  • The company also might get the advantage of discounts on bulk purchases.

Question 4.
Write a note on name-your-price websites.
Answer:
Name-your-price sites are just like normal retail sites. In contrast, the buyer negotiates with the retailer for a particular product or service, https://in.hotels.com/

Question 5.
Write a note on the physical product dispute of E-Commerce.
Answer:

  • Physical product disputes are a major disadvantage in E-Commerce.
  • E-Commerce purchases are often made on trust.
  • This is because; we do not have physical access to the product.
  • Though the Internet is an effective channel for visual and auditory information it does not allow full scope for our senses.
  • We can see pictures of the perfumes, but could not smell their fragrance; we can see pictures of a cloth, but not its quality.
  • If we want to inspect something, we choose what we look at and how we look at it. But in online shopping, we would see only the pictures the seller had chosen for us.
  • People are often much more comfortable in buying generic goods (that they have seen or experienced before and in which there is little ambiguity) rather than unique or complex things via the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Part IV

Explain in Detail

Question 1.
Write about the development and growth of Electronic Commerce.
Answer:
The Development and Growth of Electronic Commerce:
Economists describe four distinct waves (or phases) that occurred in the Industrial Revolution. In each wave, different business strategies were successful. Electronic commerce and the information revolution brought about by the Internet likely go through such a series of waves.

The First Wave of Electronic Commerce: 1995 -2003

  • The Dotcom companies of the first wave are mostly American companies. Thereby their websites were only in English. The Dotcom bubble had attracted huge investments to first wave companies.
  • As the Internet was a mere read-only web (web 1.0) and network technology was in its beginning stage, the bandwidth and network security were very low.
  • Only EDI and unstructured E-mail remained as a mode of information exchange between businesses.
  • But the first wave companies enjoyed the first-move advantage and customers had left with no options.

The Second Wave of Electronic Commerce: 2004 – 2009

  • The second wave is the rebirth of E-Commerce after the dot-com bust. The second wave is considered as the global wave, with sellers doing business in many countries and in many languages.
  • Language translation and currency conversion were focused on the second wave websites.
    The second wave companies used their own internal funds and gradually expanded their E-Commerce opportunities.
  • As a result, E-Commerce grows more steadily, though more slowly. The rapid development of network technologies and interactive web (web 2.0, a period of social media) offered the consumers more choices of buying. The increased web users nourished E-Commerce companies (mostly B2C companies) during the second wave.

The Third Wave of Electronic Commerce: 2010 – Present

  • The third wave is brought on by mobile technologies. It connects users via mobile devices for real-time and on-demand transactions, mobile technologies.
  • It connects users via mobile devices for real-time and on-demand transactions. Not only the information is filtered by time, but also the geographic coordinates are used to screen the specific location-tailored information properly.
  • The term Web 3.0, summarize the various characteristics of the future Internet which include Artificial Intelligence, Semantic Web. Generic Database etc.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 2.
List all the E-Commerce business models and explain any four briefly.
Answer:
The various E-Commerce business models are

  1. Business to Business (B2B)
  2. Business to Consumer (B2C)
  3. Business to Government (B2G)
  4. Consumer to Business (C2B)
  5. Consumer to Consumer (C2C)
  6. Consumer to Government (C2G)
  7. Government to Business (G2B)
  8. Government to Consumer (G2C)
  9. Government to Government (G2G)

1. Business to Business (B2B)

  • In B2B E-Commerce, commercial transactions take place between different business organizations, through the Internet.
  • For example, a cycle company may buy tyres from another company for their cycles.
  • B2B transaction is high, because of bulk purchases.

2. Business to Consumer (B2C)

  • In B2C E-Commerce, commercial transactions take place between business firms and their consumers.
  • It is the direct trade between companies and end-consumers via the Internet.
  • Example: A book company selling books to customers. This mode is intended to benefit the consumer and can say B2C E-Commerce works as a ‘retail store’ over the Internet.

3. Consumer to Consumer (C2C)
C2C in E-Commerce provides an opportunity for trading products or services among consumers who are connected through the Internet.

4. Consumer to Government (C2G)

  • Citizens as Consumers and Government engage in C2G E-Commerce.
  • Here an individual consumer interacts with the Government.
  • C2G models usually include income tax or house tax payments, fees for issuance of certificates or other documents. People paying for renewal of license online may also fall under this category.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Explain any five E-Commerce revenue models.
Answer:

  • Apart from the regular selling of commodities, today there are many other ways by which companies can make money from the Internet.
  • The other forms of E-Commerce activities are:

1. Affiliate site

  • It is a form of third-party marketing in which the site owner gets paid based on the performance.
  • This site may be a price comparison service or shopping directories or review sites or blogs that contain a link to a normal retailing site and are paid when a customer makes a purchase through it.
  • The affiliate site usually attracts visitors by offering more information and tutorials on some specific product or a topic.

2. Auction site:
It is a kind of website, that auctions items on the Internet and levies some commission from the sales, e.g. https://www.ebay.com/

3. Banner advertisement site:
It displays advertisements of other companies in its websites and thereby earns revenue.

4. Bulk-buying sites:
It collects a number of users together all of who want to buy similar items; the site negotiates a discount with the supplier and takes a commission. e.g. https://www.alibaba.com/

5. Digital publishing sites:

  • It effectively hosts e-books or magazines on the web.
  • They make profits in a number of ways such as advertising, selling, etc., https://wordpress. org/

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 4.
How would you differentiate traditional commerce and E-Commerce?
Answer:

Traditional Commerce

E-Commerce

Traditional commerce is buying or selling of products and services physically.E-Commerce carries out commercial transactions electronically on the Internet.
Customers can easily identify, authenticate and talk to the merchant.Neither customer nor merchant sees the other.
Physical stores are not feasible to be open all the time.It is always available at all times and all days of the year.                                                                     ‘
Products can be inspected physically before purchase.Products can’t be inspected physically before pur­chase.
Scope of business is limited to a particular area.The scope of business is global. Vendors can expand their business Worldwide.
The resource focuses Supply side.The resource focuses Demand side.
Business Relationship is Linear.Business Relationship is End-to-end.
Marketing is one-way marketing.One-to-one marketing.
Payment is made by cash, cheque, cards, etc.The payment system is mostly credit card and through fund transfer.
Most goods are delivered instantly.It takes time to transport goods.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
What are the advantages and disadvantages of E-Commerce to a consumer?
Answer:
The pros and cons of E-Commerce affect three major stakeholders: consumers business organisations, and society.
The following are the advantages and disadvantages of E-Commerce for a consumer.

Advantages:
1. E-Commerce system is operated on all days and all the day. It is able to conduct business 24 × 7. Neither consumers nor suppliers need a physical stores to be opened to do business electronically. People can interact with businesses at the time of their convenience.

2. Speed is a major advantage in E-Commerce. Advanced Electronic communications systems allow messages to reach across the world instantaneously. There is no need to wait days for a catalogue to arrive by post. Communication delay is not a part of the Internet or E-Commerce world.

3. The Internet is too easy to ‘shop around’ for products and services that may be more cheaper and effective than left o buy only in a Brick and Mortar shop. It provides an opportunity to buy at reduced costs. It is possible to, explore the Internet, identify original manufacturers, thereby bypass wholesalers and achieve a cheaper price.

4. The whole world becomes a shop for today’s customers. They can have a wide choice by comparing and evaluating the same product at different websites before making a purchase decision.

5. Customers can shop from home or anywhere at their convenience. They don’t need a long wait to talk to a salesman. They can read the details regarding model numbers, prices, features, etc. of the product from the website and buy at their own convenience. Payments can also be made online.

Disadvantages:
1. E-Commerce is often used to buy goods that are not available locally but from businesses all over the world. Physical goods need to be transported, which takes time and costs money. In traditional commerce, when we walk out of a shop with an item, it’s ours; we have it; we know what it is, where it is, and how it looks. But in E-Commerce, we should wait between placing the order and having the product in hand. Some E-Commerce companies handle this by engaging their customers in updating the status of their shipments.

2. Unlike returning goods to a traditional shop returning goods online is believed to be an area of difficulty. The doubts about the period of returning, will the returned goods reach the source in time, refunds, exchange, and postage make one tiresome.

3. Privacy issues are serious in E-Commerce. In E-Commerce generating consumer information is inevitable. Not all companies use the personal information they obtained to improve services to consumers. Many companies misuse the information and make money out of it. It is true that privacy concerns are a critical reason why people get cold feet about online shopping.

4. Physical product disputes are a major disadvantage in E-Commerce. E-Commerce purchases are often made on trust. This is because we do not have physical access to the product. Though the Internet is an effective channel for visual and auditory information it does not allow full scope for our senses. We can see pictures of the perfumes, but could not smell their fragrance; we can see pictures of a cloth, but not it’s quality.

If we want to inspect something, we choose what we look at and how we look at it. But in online shopping, we would see only the pictures the seller had chosen for us. People are often much more comfortable in buying generic goods (that they have seen or experienced before and in which there is little ambiguity) rather than unique or complex things via the Internet.

5. We couldn’t think of ordering single ice cream or a coffee from a shop in Paris. Though specialized and refrigerated transport can be used, goods bought and sold via the Internet need to survive the trip from the supplier to the consumer. This makes the customers turn back towards traditional supply chain arrangements for perishable and non-durable goods.

6. Delivery ambiguity. Since supplying businesses can be conducted across the world, it can be uncertain whether they are indeed genuine businesses or just going to take our money. It is pretty hard to knock on their door to complain or seek legal recourse. Further, even if the item is sent, it is easy to start bothering whether or not it will ever arrive on time.
The following are some of the advantages and disadvantages of E-Commerce for a Business organisation.

The benefit of E-Commerce to a business organisation
Access to Global Market:
The Internet spans the world of E-Commerce, and it is possible to trade with any business or a person who is connected with the Internet. It helps to access the global marketplace. Simple local businesses such as herbal product stores are able to market and sell their products internationally using E-Commerce. Thus, the whole world becomes a potential market for an E-Commerce company.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

12th Computer Applications Guide E-Commerce Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
The term E-Business was coined by ……………………….
(a) Apple
(b) IBM
(c) Microsoft
(d) Sun Microsystems
Answer:
(b) IBM

Question 2.
The first online-only shop opens on ……………
a) 1991
b) 2000
c) 2005
d) 1999
Answer:
d) 1999

Question 3.
Find the wrong statement from the following.
(a) E-commerce is a subset of E-Business
(b) E-Business is a subset of E-Commerce
Answer:
(b) E-Business is a subset of E-Commerce

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 4.
The nascent stage is a ……………. of growth.
a) Initial stage
b) Secondary stage
c) final stage
d) None of these
Answer:
a) Initial stage

Question 5.
…………… is a platform for advertising products to targeted consumers.
a) Television
b) Radio
c) Mobile phones
d) social Media
Answer:
d) social Media

Question 6.
E-Commerce first emerged on private networks in ……………………….
(a) 1965
(b) 1967
(c) 1970
(d) 1972
Answer:
(c) 1970

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 7.
The First business to a business transaction from …………….
a) Amazon
b) e-bay
c)Thompson Holidays
d) reddiffshop
Answer:
c)Thompson Holidays

Question 8.
The First business to the business transaction was established in the year …………..
a) 1995
b) 1981
c) 1985
d)1987
Answer:
b) 1981

Question 9.
Who invented Teleputer?
(a) Michael Aldrich
(b) Sting’s
(c) Bob Frankston
(d) Dan Bricklin
Answer:
(a) Michael Aldrich

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 10.
The second wave of electronic commerce was …………..
a) 1995-2003
b) 1992-2003
c) 1993-2004
d) 2004-2009
Answer:
d) 2004-2009

Assertion And Reason

Question 1.
Assertion (A): E-Commerce can be described as the process of buying or selling products, services or information via computer networks
Reason(R): E-Commerce is not a completely new type of commerce
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 2.
Assertion (A): The growth of E-Commerce is also related to socio-technological changes.
Reason(R): Electronic commerce and the information revolution brought about by the Internet likely go through such a series of waves.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Assertion (A): The Dotcom Bubble was a historic excessive growth (excessive assumption) of economy
Reason(R): Dotcom Bubble occurred roughly between 1990 and 2000.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 4.
Assertion (A): if a company’s work is hired to another company, it would be termed as out-sourcing.
Reason(R): If the work is outsourced to a company, which is outside of its own country, is termed off-shoring.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
Assertion (A): Traditional commerce is buying or selling of products and services Physically.
Reason(R): Scope of business is Unlimited to a particular area.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 6.
Assertion (A): In E-Commerce Payment system is mostly credit card and through fund transfer
Reason(R): Licensing sites allow other websites to make use of their software.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 7.
Assertion (A): Speed is a major disadvantage in E-Commerce.
Reason(R): The pros and cons of E-Commerce affect three major stakeholders: consumer’s business organizations, and society.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 8.
Assertion (A): FinTech Financial technology is a collective term for technologically advanced financial innovations
Reason(R): Fintech is a new financial industry that uses technology to improve financial activity.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 9.
Assertion (A): Web 2,0 (Web of Communication) If 7 is a read-write web that allowed users to interact with each other.
Reason(R): The dot-com bubble was a rapid rise in the U.S, equity market of Internet-based companies during the 1990s.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 10.
Assertion (A): Marketing plays a significant role in any business.
Reason(R): Marketing could be started as early as it could be,
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Find The Odd One On The Following

1. (a) Marketing
(b) Finance
(c) Negotiation
(d) Gateways
Answer:
(d) Gateways

2. (a) Internet
(b) Ethernet
(c) Extranet
(d) Intranet
Answer:
(b) Ethernet

3. (a) EDI
(b) email
(c) HTML
(d) http
Answer:
(c) HTML

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

4. (a) Online Transaction
(b) Electronic Payment
(c) SCM
(d) Inventory Management Systems
Answer:
(d) Inventory Management Systems

5. (a) Network Infrastructure
(b) Messaging
(c) Multimedia Content
(d) Globalization
Answer:
(d) Globalization

6. (a) Scientific Journals
(b) Dotcoms
(c) Fintech
(d) Startups
Answer:
(a) Scientific Journals

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

7.(a) B2B – 1981
(b) E-mail – 1985
(c) Zappo’s – 1999
(d) Groupon – 2008
Answer:
(b) E-mail-1985

8.(a) 24×7 Working
(b) Low Cost
(c) platform dependent
(d) low transaction cost
Answer:
(c) platform dependent

9. (a) dynamic application
(b) Interactive Services
(c) Machine to Machine Interaction
(d) Hyperlinks
Answer:
(d) Hyperlinks

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

10. (a) Television
(b) Computer
(c) Telecom
(d) Modem
Answer:
(d) Modem

11. (a) Web 1.0 : Content
(b) Web2,0: Communication
(c) Web 3,0 : Contex
(d) Web4,0 : 4G :Tech
Answer:
(d) Web4,0 : 4G :Tech

12. (a) Facebook
(b) Whatsapp
(c) twitter
(d) eBay
Answer:
(d) eBay

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Important Years To Remember:

1960Electronic data interchange allows companies to carry out electronic transactions-a precursor to online Shopping
1979English inventor Michael Aldrich connected a TV set to a computer with a phone line and created “teleshopping”
1981The first business-to-business transaction from Thompson holidays
1984The ‘Electronic mail’ is launched by CompuServe
1991The National Science Foundation allows the internet to be used for commercial purposes
Aug 1994Online retailer Net Market makes the ‘first secure retail transaction on the web’
Oct 1994Joe McCambiey ran the first-ever online banner ad. It went like on Hot Wired.com and promoted 7 art museums.
July 1995Amazon sold its first item – a science textbook
Sep 1995eBay sold its first item – a broken laser pointer
1999The first online-only shoe, Zappo’s, opens
2005Social commerce (people using social me­dia in their buying decisions) is born thanks to networks like Facebook India
2008Group on is launched
2009India’s Total E-Commerce sale is3,9 billion American Dollar 1991 Oct 19
2018With mobile commerce, it is expected to hike 265% up and will be $ 850 billion American Dollar

PERIOD

DEVELOPMENT AND GROWTH OF ELECTRONIC COMMERCE

1995 -2003The First Wave of Electronic Commerce
2004 – 2009The Second Wave of Electronic Commerce
2010- PresentThe Third Wave of Electronic Commerce

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Abbreviation:
1. B2B – Business to Business
2. B2C – Business to Consumer
3. B2G – Business to Government
4. C2B – Consumer to Business
5. C2C – Consumer to Consumer
6. C2G – Consumer to Government
7. G2B – Government to Business
8. G2C – Government to Consumer
9. G2G – Government to Government
10. SMEs – Small Medium-sized Enterprises
11. SCM – Supply Chain Management

Match The Following:
1. Business to Business – House tax payments
2. Business to Consumer – Bulk purchases
3. Business to Government – Similar to C2G
4. Consumer to Business – Advertisement Website
5. Consumer to Consumer – Retail store
6. Consumer to Government – Web of Context
7. Government to Business – Reduce burdens on business
8. Government to Consumer – Services by Government
9. Government to Government – Non-Commercial
10. Web 1.0 – Web of Content
11. Web 2.0 – Web of Communication
12. Web 3,0 – Travel Website
Answers
1. Bulk purchases
2. Retail store
3. Services by Government
4. Travel Website
5. Advertisement Website
6. House tax payments
7. Reduce burdens on business
8. Similar to C2G
9. Non Commercial
10. Web of Content
11. Web of Communication
12. Web of Context

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Very Short Answers

Question 1.
When a company is called an E-Business?
Answer:
A company can be called E-Business if and only if-

  1. It has the ability to conduct business electronically over the Internet.
  2. It manages payment transactions through the Internet.
  3. It has a platform for selling products & services via the Internet.

Question 2.
Expand FinTEch.
Answer:
Financial technology

Question 3.
What is FinTech?
Answer:
Fintech is a new finance industry technology to improve financial activity.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 4.
What do you mean by dot-com bubble?
Answer:
The dotcom bubble was a rapid rise in U.S. equity market of Internet-based companies during 1990s.

Question 5.
What is Traditional commerce?
Answer:
It is buying or selling of products and services physically.

Question 6.
What is E-Commerce?
Answer:
It carries out commercial transactions electronically on the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 7.
What is another name of C2B?
Answer:
C2B is also called as reverse auction model,

Question 8.
Expand C2BC.
Answer:
Consumer to Business to Consumer

Question 9.
Mention the two types of G2G systems.
Answer:
Internal facing,
External facing.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 10.
What is the objective of G2B?
Answer:
The objective of G2B is to reduce burdens on business.

Part B

Short Answers

Question 1.
What is mean by Brick and mortar?
Answer:
Brick and mortar is the term that refers to a business that has a physical store; the opposite of online store.

Question 2.
What is mean by Mobile Commerce?
Answer:
Mobile commerce Businesses that are conducted through the Internet using mobile phones or other wireless hand-held devices.

Question 3.
Write a note on Business to Consumer?
Answer:
Business to Consumer (B2C):
In B2C E-Commerce, commercial transactions take place between business firms and their consumers. It is the direct trade between companies and end-consumers via the Internet. B2C companies sell goods, information, or services to customers online in a more personalized dynamic environment and are considered as real competitor for a traditional storekeeper. An example of a B2C transaction is a book company selling books to customers. This mode is intended to benefit the consumer and can say B2C E-Commerce works as a retail store’ over the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Part C

Explain In Brief Answer

Question 1.
Write short notes on web1.0, web2.0, web3.0.
Answer:

  • Web 1.0 (Web of Content) ¡s the early web that contained text, images, and hyperlinks and allowed users only to search for information and read it. There was very little in the way of user interaction or content generation.
  • Web 2.0 (Web of Communication) ¡s a read-write web that allowed users to interact with each other.
  • Web 3.0 (Web of Context) is termed as the semantic web or executable web with dynamic applications, interactive services, and “machine-to-machine” interaction.

Question 2.
Write a note on E-business building block elements.
Answer:

  • E-Business is grounded on technologies such as Network Infrastructures (like the Internet, Intranet, Extranet)
  • Multimedia content &network publishing infrastructures (like HTML, Online Marketing)
  • Messaging and information distribution infrastructures (like EDI, e-mail, http,
    Computerized Inventory Management Systems) and
  • Other Common business service infrastructures (like electronic payments gateways, globalized Supply Chain Management (SCM), Online Transaction Processing).

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
When a company is can be called E-business?
Answer:
A company can be called E-Business if and only if

  • It has the ability to conduct business electronically over the Internet.
  • It manages payment transactions through the Internet.
  • It has a platform for selling products &services via the Internet.

Part D

Explain In Detail

Question 1.
Explain the Benefits of E-commerce to a business organisation?
Answer:
The benefit of E-Commerce to a business organisation.

1. Access to Global Market:
The Internet spans the world of E-Commerce, and it is possible to trade with any business or a person who is connected with the Internet. It helps to access the global marketplace. Simple local businesses such as herbal product stores are able to market and sell their products internationally using E-Commerce. Thus, the whole world becomes a potential market for an E-Commerce company.

2. Lower Transaction Cost:
E-Commerce reduces the cost of business transactions substantially. For instance, a significant number of customer service representatives in a bank can be reduced by using net banking. Since these interactions are initiated by customers, the customers provide a lot of data for the transactions that may otherwise need to be entered by employees. This means that some of the work and costs are effectively shifted to customers; this is referred as customer outsourcing’.

3. 24×7 working:
A website is open all 24 hours, 7 days a week. As an E-Commerce firm can provide information about its products and services to customers around the clock, it can thus, take
orders, keep an eye on delivery of goods and receive payments at any time.

4. Low cost of entry:
Though E-Commerce was fist emerged in private networks it did not remain the same. The Internet has changed the face of E-Commerce. The Internet is all about democratization. Internet is a place where the small guy can effectively fight against the giants and hope to win. Days, when E-Commerce was only for affordable large national chains, are gone.
Today, it is common for retailers to move their traditional store to online with very little add-on only for building a good website.

5. Computer platform-independent:
Most computers have the ability to communicate via the Internet, irrespective of operating systems and hardware. Consumers need not have to upgrade their computers or network to participate in E-Commerce. They are not limited by existing hardware or software.

Also, the E-Commerce company need not worry about fast changes in computer network technology. E-Commerce applications can be more efficiently developed and distributed because they are platform-independent. Internet’s altruism helps E-Commerce.

6. Snapping middleman:
E-Commerce enjoys the benefit of bypassing middlemen and reaching the end customer directly through the Internet. In B2C E-Commerce business firms establish direct contact with their customers by eliminating middlemen. It helps to increase the sales of the organization without any interventions. This results in cheaper prices for consumers and higher
profit margins for the companies.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 2.
Explain various limitations of Ecommerce for a business organisation?
Answer:
1. People won’t buy all products online:
There are certain products like high price jewels, clothes or furnishings which people might not like to buy online. They might want to, inspect it, feel the texture of the fabric, etc. which are not possible in E-Commerce. As online shopping does not allow physical inspection, customers have to rely on electronic images of the products.

E-Commerce is an effective means for buying known and established services, that is, things that are being used every day. Example booking tickets, buying books, music CDs and software. It is not suitable for dealing with the new or unexpected. Traditional commerce always takes advantage when it is perishables and touches and feel products.

2. Competition and Corporate vulnerability:
Access to Global Market is beneficial on one hand but it also comes with competition. The open Internet has paved way for all business firms to operate in the global market. Many businesses have been already facing international competition from web-enabled business opponents.

The competitors may access product details, catalogs, and other information about a business through its website and make it vulnerable. They might then indulge in web harvesting. Web harvesting is the illegal activity of extracting business intelligence from a competitor’s web pages.

3. Security:
Security remains to be a problem for E-Commerce. Customers might be reluctant to give their credit card numbers to the website. As a lot of cyber frauds take place in E-Commerce transactions, people generally afraid to provide their personal information. Legal issues arise when the customer’s data falls into the hands of strangers. Fraudulent activities in traditional commerce is comparatively less as there is the personal interaction between the buyer and the seller.

4. Customer loyalty:
Businesses cannot survive long without loyal customers. The customers would like to buy from a website where they are able to get the best deal. They cannot be loyal to a particular seller. In traditional commerce, the shopkeeper would interact with the consumer “face-to-face” and gain their loyalty too.

In E-Commerce, the interaction between the business and the consumer is “screen-to-face”. The customers would feel that they do not have received sufficient personal attention. Since there is no personal touch in E-Business, companies could not win over their loyalty easily.

5. Shortage of skilled employees:
Though most of the process in E-Commerce is automated, some sectors like packaging and delivery need manual interventions. There could be problems related to shipping delays which would need technically qualified staff with an aptitude to resolve.

E-Commerce has difficulty in recruiting, training and retaining talented people. There is a great shortage of skilled employees. Traditional organizational structures and poor work cultures in some places inhibit the growth of E-Commerce.

6. Size and value of transactions:
The delivery cost of a pen surpasses the cost of the pen itself. E-Commerce is most often conducted using credit cards for payments, and as a result, very small and very large transactions tend not to be conducted online.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 16 Electronic Payment Systems Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 16 Electronic Payment Systems

12th Computer Applications Guide Electronic Payment Systems Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
Based on the monetary value e payment system can be classified into
a) Mirco and Macro
b) Micro and Nano
c) Maximum and Minimum
d) Maximum and Macro
Answer:
a) Mirco and Macro

Question 2.
Which of the following is not a category of micro payment?
a) Buying a movie ticket
b) Subscription to e journals
c) Buying a laptop
d) Paying for smartphone app
Answer:
b) Subscription to e journals

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Assertion (A): Micro electronic payment systems support higher value payments.
Reason (R): Expensive cryptographic operations are included in macro payments
a) Both (A) and (R) are correct and (R) is the cor-rect explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the cor-rect explanation of (A)

Question 4.
Which of the following is correctly matched?
a) Credit Cards – pay before
b) Debit Cards – pay now
c) Stored Value Card – pay later
d) Smart card – pay anytime
Answer:
b) Debit Cards – pay now

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 5.
ECS stands for
a) Electronic Clearing Services
b) Electronic Cloning Services
c) Electronic Clearing Station
d) Electronic Cloning Station
Answer:
a) Electronic Clearing Services

Question 6.
Which of the following is not a Altcoin?
a) Litecoin
b) Namecoin
c) Ethereum
d) Bitcoin
Answer:
c) Ethereum

Question 7.
Which of the following is true about Virtual payment address (VPA)?
a) Customers can use their e-mailid as VPA
b) VPA does not includes numbers
c) VPA is a unique ID
d) Multiple bank accounts cannot have single VPA
Answer:
d) Multiple bank accounts cannot have single VPA

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 8.
Pick the odd one in the credit card transaction
a) card holder
b) merchant
c) marketing manager
d) acquirer
Answer:
a) card holder

Question 9.
Which of the following is true about debit card?
i. Debit cards cannot be used in ATMs
ii. Debit cards cannot be used in online transactions
iii. Debit cards do not need bank accounts
iv. Debit cards and credit cards are identical in physical properties
a) i, ii, iii
b) ii, iii, iv
c) iii alone
d) iv alone
Answer:
d) iv alone

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Match the following
List A List B
A1) First Digit B1) Account number
A2) 9th to 15th Digit B2) Mil Code
A3) First 6 Digits B3) BIN Code
A4) Last Digit B4) Check digit
Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems 1
Answer:
b) B2 B1 B3 B4

Part II

Short Answers

Question 1.
Define electronic payment system
Answer:
The term electronic payment refers to a payment made from one bank account to another bank account using electronic methods forgoing the direct intervention of bank employees.

Question 2.
Distinguish microelectronic payment and macro electronic payment
Answer:

Microelectronic payment

Macroelectronic payment

Online payment system designed to allow efficient and frequent payments of small amounts.Macro electronic payment systems support payments of higher value.
In order to keep transaction costs very low, the communica­tion and computational costs are minimized here.The security requirements are more rigorous in macro pay­ment systems because of huge money transactions.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
List the types of microelectronic payments based on their algorithm
Answer:
Based on the algorithm used, it is classified into the following categories.

  1. Hash chain based micro electronic payment systems.
  2. Hash collisions and hash sequences based on micro electronic payment systems.
  3. Shared secrete keys based micro electronic payment systems.
  4. Probability-based micro electronic payment systems.

Question 4.
Explain the concept of an e-wallet
Answer:
Electronic wallets (e-wallets) or electronic purses allow users to make electronic transactions quickly and securely over the Internet through smartphones or computers.

Question 5.
What is a fork in cryptocurrency?
Answer:
Many cryptocurrencies operate on the basis of the same source code, in which the authors make only a few minor changes in parameters like time, date, distribution of blocks, number of coins, etc. These currencies are called as fork. In fork, both cryptocurrencies can share a common transaction history in block chain until the split.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Part III

Explain In Brief Answer

Question 1.
Define microelectronic payment and its role in E-Commerce.
Answer:
Definition:
Micro electric payment is an online payment system designed to allow efficient and frequent payments of small amounts.
Role in E-Commerce

  • An e-commerce payment system facilitates the acceptance of electronic payment for online transactions
  • E-commerce payment systems have become increasingly popular due to the widespread use of internet-based shopping and banking.

Question 2.
Compare and contrast the credit card and debit card. (3-5 points)
Answer:

Basis For ComparisonCredit CardDebit Card
MeaningA credit card is issued by a bank or any fi­nancial institution to allow the holder of the card to purchase goods and services on credit. The payment is made by the bank on the customer’s behalf.A debit card is issued by a bank to allow its customers to purchase goods and services, whose payment is made directly through the custom­er’s account linked to the card.
ImpliesPay laterPay now
Bank AccountA bank account is not a prerequisite for issuing a credit card.A bank account is a must for issu­ing a debit card.
LimitThe maximum limit of withdrawing money is determined according to the credit rating of the holder.The maximum limit of withdrawing money will be less than the money lying in the saving bank account.
BillThe holder of the card has to pay the credit card bill within 30 days of every month.There is no such bill, the amount is directly deducted from the custom­er’s account.
InterestInterest is charged when payment is not made to the bank within a specified time period.No interest is charged.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Explain briefly the Anatomy of a credit card.
Answer:
Publisher: Emblem of the issuing bank
Credit card number: The modem credit card number has a 16-digit unique identification number.

Question 4.
Briefly explain the stored value card and its types.
Answer:

  • A stored-value card is a type of debit card that is pre-loaded with a certain amount (value), with which a payment is made.
  • It is a card that has default monetary value on it.
  • The card may be disposed of when the value is used or recharged to use it again.
  • The major advantage of the stored-value card is that customers don’t need to have a bank account to get prepaid cards.
  • There are two varieties for the stored-value cards.

(i) Closed Loop

  • In closed-loop cards, money is metaphorically stored on the card in the form of binary-coded data.
  • Closed-loop cards are issued by a specific merchant or merchant and can only be used to make purchases from a specific place, e.g. Chennai metro rail travel card.

(ii) Open-loop (multipurpose)

  • Open-loop cards can be used to make debit transactions at a variety of retailers.
  • It is also called prepaid-debit cards.
  • It can be used anywhere the branded cards are accepted, e.g. Visa gift cards.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 5.
Write a note on mining in cryptocurrency.
Answer:
Mining:
The cryptocurrency units are created by the solution of cryptographic tasks called mining. The miners not only generate new monetary units but also initiate new transactions to the blockchain. As a reward, they will receive new Bitcoins.

Part IV

Explain In Detail

Question 1.
What is a credit card? Explain the key players of a credit card payment system and bring out the merits of it.
Answer:
Credit Card

  • A credit card is an electronic payment system normally used for retail transactions.
  • A credit card enables the bearer to buy goods or services from a vendor, based on the cardholder’s promise to the card issuer to pay back the value later with the agreed interest.

Key players in operations of credit card

1. Bearer:
The holder of the credit card account who is responsible for payment of invoices in full (transactor) or a portion of the balance (revolver) the rest accrues interest and carried forward.

2. Merchant:
Storekeeper or vendor who sells or providing service, receiving payment made by its customers through the credit card.

3. Acquirer:
Merchant’s bank that is responsible for receiving payment on behalf of merchant sends authorization requests to the issuing bank through the appropriate channels.

4. Credit Card Network:

  • It acts as the intermediate between the banks.
  • The Company is responsible for communicating the transaction between the acquirer and the credit card issuer.
  • These entities operate the networks that process credit card payments worldwide and levy interchange fees. E.g. Visa, MasterCard, Rupay

5. Issuer:
Bearer’s bank, that issue the credit card, set a limit of purchases, decides the approval of transactions, issue invoices for payment, charges the holders in case of default and offer card-linked products such as insurance, additional cards, and rewards plan.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 2.
Briefly explain Electronic Account transfer and its types.
Answer:
Electronic Account transfer

  • Apart from card-based payment systems, there are many alternative electronic payment systems.
  • With the advent of computers, network technologies, and electronic communications a large number of alternative electronic payment systems have emerged.

Types of Electronic Account transfer:

  1. ECS (Electronic Clearing Services)
  2. EFT(Electronic funds transfers)
  3. Real-Time Gross Settlement system (RTGS)

1. Electronic Clearing Services (ECS):
Electronic Clearing Service can be defined as a repeated transfer of funds from one bank account to multiple bank accounts or vice versa using computer and Internet technology.

2. Electronic Funds Transfer

  • Electronic Funds Transfer (EFT) is the “electronic transfer” of money over an online network.
  • The amount sent from the sender’s bank branch is credited to the receiver’s bank branch on the same day in batches.
  • Unlike traditional processes, EFT saves the effort of sending a demand draft through the post and the inherent delay in reaching the money to the receiver.
  • Banks may charge a commission for using this service.

3. Real Time Gross Settlement:

  • Real-Time Gross Settlement system (RTGS) is a payment system particularly used for the settlement of transactions between financial institutions, especially banks.
  • Real-time gross settlement transactions are:
  • Unconditional – the beneficiary will receive funds regardless of whether he fulfills his obligations to the buyer or whether he would deliver the goods or perform a service of a quality consistent with the order.
  • Irrevocable – a correctly processed transaction cannot be reversed and its money cannot get refunded.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Write a note on
a) Internet banking
b) Mobile Banking,
Answer:
(a) Internet banking:
Internet banking is a collective term for E-banking, online banking, virtual banking (operates only on the Internet with no physical branches), direct banks, web banking, and remote banking. Internet banking allows customers of a financial institution to conduct various financial transactions on a secure website operated by the banking institutions. This is a very fast and convenient way of performing any banking transactions.

It enables customers of a bank to conduct a wide range of financial transactions through its website. In fact, it is like a branch exclusively operating of an individual customer. The online banking system will typically connect to the core banking system operated by customers themselves (Self-service banking).

Advantages:

  1. The advantages of Internet banking are that the payments are made at the convenience of the account holder and are secured by user name and password, i.e. with Internet access it can be used from anywhere in the world and at any time.
  2. Any standard browser (e.g. Google Chrome) is adequate. Internet banking does not need .installing any additional software.

(b) Mobile banking:
Mobile banking is another form of net banking. The term mobile banking (also called m-banking) refers to the services provided by the bank to the customer to conduct banking transactions with the aid of mobile phones. These transactions include balance checking, account transfers, payments, purchases, etc.

Transactions can be done at any time and anywhere. The WAP protocol installed on a mobile phone qualifies the device through an appropriate application for mobile session establishment with the bank’s website. In this way, the user has the option of permanent control over the account and remote management of his own finances. Mobile Banking operations can be implemented in the following ways:

  • Contacting the call center.
  • Automatic IVR telephone service.
  • Using a mobile phone via SMS.
  • WAP technology.
  • Using smartphone applications.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 4.
What is cryptocurrency? Explain the same.
Answer:

  • A cryptocurrency is a unique virtual (digital) asset designed to work as a medium of exchange using a cryptographic algorithm.
  • This algorithm secures the transactions by recording them in blockchain and controls the creation of additional units of the currency.
  • Cryptocurrency is also called crypto coins, e-cash, alternative currencies, or virtual currencies and is classified as a subset of digital currencies.
  • Cryptocurrency can be defined as distributed accounting system based on cryptography, storing information about the state of ownership in conventional units.
  • The state of ownership of a cryptocurrency is related to individual system blocks called “portfolios”. Only the holder of the corresponding private key would have control over a given portfolio and it is impossible to issue the same unit twice.

Question 5.
Explain in detail the Unified payments interface
Answer:
(i) Unified Payments Interface (UPI) is a real-time payment system developed by the National Payments Corporation of India (NCPI) to facilitate inter-bank transactions.

(ii) It is simple, secure, and instant payment facility. This interface is regulated by the Reserve Bank of India and used for transferring funds instantly between two bank accounts through mobile (platform) devices. http://www. npci.org.in/

(iii) Unlike traditional e-wallets, which take a specified amount of money from the user and store it in its own account, UPI withdraws and deposits funds directly from the bank account whenever a transaction is requested.

(iv) It also provides the “peer-to-peer” collect request which can be scheduled and paid as per requirement and convenience.

(v) UPI is developed on the basis of Immediate Payment Service (IMPS). To initiate a transaction, UPI applications use two types of addresses – global and local.

  • The global address includes bank account numbers and IFSC.
  • Local address is a virtual payment address.

(vi) Virtual payment address (VPA) also called UPI-ID, is a unique ID similar to email id
(e.g. name@bankname) that enables us to send and receive money from multiple banks and prepaid payment issuers.

(vii) Bank or the financial institution allows the customer to generate VPA using a phone number associated with the Aadhaar number and bank account number. VPA replaces bank account details thereby completely hides critical information.

(Viii) The MPIN (Mobile banking Personal Identification Number) is required to confirm each payment. UPI allows operating multiple bank accounts in a single mobile application.

(ix) Some UPI application also allows customers to initiate the transaction using only Aadhaar number in absence VPA.

Advantages:

  1. Immediate money transfers through mobile devices round the clock 24 × 7.
  2. Can use a single mobile application for accessing multiple bank accounts.
  3. Single Click Authentication for transferring of the fund.
  4. It is not required to enter the details such as Card no, Account number, IFSC, etc. for every transaction.
  5. Electronic payments will become much easier without requiring a digital wallet or credit or debit card.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

12th Computer Applications Guide Electronic Payment Systems Additional Important Questions and Answers

Part A

Choose The Correct Answers

Question 1.
An electronic payment system is also called as …………………….
(a) liquidation
(b) clearing system
(c) clearing services
(d) all of these
Answer:
(d) all of these

Question 2.
The term credit card was first mentioned in ……………..
a) 1885
b) 1887
c) 1991
d) 1987
Answer:
b) 1887

Question 3.
I: Micro Electronic payments are expensive public-key cryptography.
II: Security of Micro Electronic Payment is low
(a) t-True, II-False
(b) I-False, II-True
(c) Both I, II are true
(d) Both I, II-False
Answer:
(b) I-False, II-True

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 4.
…………… is an Indian domestic open-loop card.
a) visa
b) Master
c) Rupay
d) Mastro
Answer:
c) Rupay

Question 5.
Rupaywas launched in
a) 2012
b) 2005
c)2017
d) 2019
Answer:
a) 2012

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
How many card-based payment systems are available (based on the transaction settlement method)
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 7.
……………. is the first six digits of the credit card number to uniquely identify financial institutions.
a) BIN
b) UNF
c) CVC2
d) UDI
Answer:
a) BIN

Question 8.
……………………… is an electronic payment system normally used for retail transactions.
Answer:
Credit Card

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 9.
…………. is a type of fraud where the same cryptocurrency is spent in more than one transactions.
a) booting
b) Interpreting
c) Double spend
d) None of these
Answer:
c) Double spend

Question 10.
……………….. allow users to make electronic transactions quickly and Securely
a) E-banking
b) Net banking
c) E-wallets
d) None of these
Answer:
c) E-wallets

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 11.
The term credit card was first mentioned in the sci-fi normal in the year ………………………
(a) 1997
(b) 1887
(c) 1987
(d) 1897
Answer:
(b) 1887

Question 12.
………… is the activity of buying or selling commodities through online services or over the Internet.
a) Mobile Banking
b) Internet banking
c) Both A and B
d) None of these
Answer:
b) Internet banking

Assertion And Reason

Question 1.
Assertion (A): An Electronic payment system is a financial arrangement
Reason(R): K consists of an intermediator to facilitate the transfer of money-substitute between a payer and a receiver.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 2.
Assertion (A): Microelectronic Payment Systems is an online payment system designed to allow efficient and frequent payments of small amounts.
Reason(R): A payment system is an essential part of a company’s financial operations.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Assertion (A) Payment cards are plastic cards that enable cashless payments.
Reason(R): Payment cards do not contain a chip.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 4.
Assertion (A): Credit card Allows purchases over the Internet installments.
Reason(R): credit cards are not accepted worldwide.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 5.
Assertion (A): All Payment cards (including debit cards) are usually plastic cards of size.
Reason (R): It is of size 85.60 mm width x 53.98 mm height, rounded corners with a radius of 2.88 mm to 3.48 mm, and thickness of 0.76 mm.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
Assertion (A): EMV chip is an integrated chip in addition to magnetic stripe to store cardholder’s information
Reason(R): CVC2 is used in contact transactions.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 7.
Assertion (A): The RFID symbol is four curved lines radiating rightwards similar to a tilted Wi-Fi symbol.
Reason(R): RFID indicates that it is a contactless smartcard.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 8.
Assertion (A): Cryptocurrency is a unique virtual (digital) asset designed to work as a medium of exchange using a cryptographic algorithm
Reason(R): Cryptocurrency is also called as Bitcoins.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 9.
Assertion (A): The bitcoin payment system, was developed in 2005
Reason(R): The function of cryptocurrency is based on technologies such as Mining, Blockchain, Directed Acyclic Graph, Distributed register (ledger).
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Question 10.
Assertion (A): Unified Payments Interface (UP!) is a real-time payment system developed by the National Payments Corporation of India (NCPI)
Reason(R): URI to facilitate inter-bank transactions.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Find The Odd One On The Following

1. (a) Paytm
(b) Bitcoin
(c) Amazon
(d) UPI
Answer:
(c) Amazon

2. (a) Customer
(b) Fund Transfer
(c) Service provider
(d) payment processor
Answer:
(b) Fund Transfer

3. (a) Hash chain
(b) Hash collision
(c) Hash secret
(d) Hash Sequences
Answer:
(c) Hash secret

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

4. (a) Bearer
(b) Provider
(c) Acquirer
(d) Merchant
Answer:
(b) Provider

5. (a) EFTPOS
(b) Offline debit
(c) Purush card system
(d) Authorization
Answer:
(d) Authorization

6. (a) ECS
(b) EFT
(c) GST
(d) RTGS
Answer:
(d) RTGS

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

7. (a) Crypto coins
(b) E-cash
(c) Virtual currencies
(d) Statistical Currencies
Answer:
(c) Virtu! currencies

8. (a) Mining
(b) Acyclic graphics
(c) ledger
(d) Debitor\Creditor
Answer:
(d) Debitor\Creditor

9.(a) Bitshares
(b) Master coin
(c) Trading
(d) WXT
Answer:
(c) Trading

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

10. (a). Paypal
(b) SBI Buddy
(c) Paytm
(d) Flipkart
Answer:
(d) Flipkart

Match The Following:

Question 1.
EFTPOS – Signature Debit
Offline Debit – PIN Debit
Closed Loop – Multi-Purpose
Open Loop – Single Purpose
Answers
1. PIN Debit table
2. Signature Debit
3. Single Purpose
4. Multi-Purpose

Question 2.
Hologram – Contactless Smart Card
RFID Symbol – Card Holder Information
EMV Chip – Emblem
Publisher – Prevents Duplication
Answers
1. card Holder Information
2. Emblem
3. prevents Duplication
4. contactless Smart Card

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Abbreviations:
1. UPI – Unified Payment Interface
2. MII – Major Industry Identifier
3. IIN – Issuer Identifier Number
4. BIN – Bank Identification Number
5. EMV – Europay, MasterCard, Visa
6. RFID –
7. CVV – Card Verification Code
8. ECS – Electronic Clearing Services
9. EFT – Electronic Fund Transfer
10 RTGS – Real Time Gross Settlement System
11. PoS – Point of Sale
12. NEFT – National Electronic Fund Transfer
13. RBI – Reserve Bank of India
14. IDRBT – Institute for Development and Research in Banking Technology
15. ICO – Initial Coin Offer
16. OTP – One-Time password
17. ACH – Automated Clearing House
18. NCPI – National Payment Corporation of India
19. IMPS – Immediate Payment Service
20. VPA – Virtual Payment Address
21. BHIM – Bharat Interface for Money
22. NPCI – National Payment Corporation of India

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Very Short Answers

Question 1.
What is the use of (POS) Point of Sale Terminal?
Answer:
It enables customers to make payments for the purchase of goods and services by means of credit and debit cards.

Question 2.
What are payment cards?
Answer:
Payment cards are plastic cards that enable cashless payments.

Question 3.
What are the two types of electronic payment systems?
Answer:
Microelectronic payment system and Macro electronic payment system

Question 4.
What are the three types of cards using for payment systems?
Answer:
Credit card, Debit card, Stored value card

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 5.
What are the two types of payment systems?
Answer:
Cash payment system and Non-cash payment system

Question 6.
What is a credit card payment system?
Answer:
A credit card is an electronic payment system normally used for retail transactions.

Question 7.
What is a debit card payment system?
Answer:
It is an electronic payment card where the transaction amount is deducted directly from the card holder’s bank account upon authorization.

Question 8.
What is a Magnetic stripe?
Answer:
It is an iron-based magnetic material containing encrypted data about the cardholder and account number.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 9.
What is an EMV chip?
Answer:
It is an integrated chip in addition to a magnetic stripe to store the card holder’s information.

Question 10.
What is Hologram?
Answer:
A hologram is a security feature that prevents duplication.

Question 11.
What is the use of real-time gross settlement?
Answer:
It is used for the settlement of transactions between financial institutions

Question 12.
What is Cryptocurrency?
Answer:
A cryptocurrency is a unique virtual asset designed to work as a medium of exchange.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 13.
What algorithm is used for Cryptocurrency?
Answer:
Cryptographic algorithm

Question 14.
What is Bitcoin?
Answer:
Bitcoin is the most popular and the first decentralized cryptocurrency

Question 15.
What is Altcoin?
Answer:
Altcoins is the collective name for all cryptocurrencies that appeared after Bitcoin.

Question 16.
What is Mining?
Answer:
The cryptocurrency units are created by the solution of cryptographic tasks called mining.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 17.
What is Blockchain?
Answer:
Blockchains are an open distributed book that records transactions of cryptocurrencies

Question 18.
What is the use electronic wallet?
Answer:
It is used to allow users to make electronic transactions quickly and securely over the Internet

Question 19.
What is another name of mobile banking?
Answer:
Net banking or m-banking

Question 20.
Who developed Unified Payments Interface (UPI)?
Answer:
National Payments Corporation of India (NCPI)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Years To Remember

1887The term credit card was first mentioned
1920The modern credit cards concept was born in the U.S.A
2011Altcoins Litecoin and Namecoin appeared
2013Cryptocurrency platforms began
20142nd generation of cryptocurrency appeared

Part B

Short Answers

Question 1.
Write a note on payment cards?
Answer:
Payment cards are plastic cards that enable cashless payments. They are a simple embossed plastic card that authenticates the cardholder on behalf of a card issuing company, which allows the user to make use of various financial services.

Question 2.
Define liquidation or clearing system or clearing service.
Answer:

  • An Electronic payment system is a financial arrangement that consists of an intermediator to facilitate the transfer of money-substitute between a payer and a receiver.
  • It is known as liquidation, clearing system, or clearing service.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
What is the role of the Electronic payment system?
Answer:
Electronic payment system ensures the transfer of value from one subject of the economy to another and plays an important role in modern monetary systems.

Question 4.
What are the two types of payment systems?
Answer:
Payment systems are generally classified into two types. They are

  1. Microelectronic Payment Systems
  2. Macro Electronic Payment Systems

Question 5.
Define COD?
Answer:
Cash on delivery (COD) also called a collection on delivery describes a mode of payment in which the payment is made only on receipt of goods rather than in advance.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
List some popular macro on-line payment systems.
Answer:

  • Some popular macro on-line payment systems are
  • Card-based payment systems
  • Electronic account transfer
  • Electronic cash payment systems
  • Mobile payment systems and ¡nternetspayment systems

Question 7.
What are the three widely used card-based payment systems?
Answer:

  1. Credit card-based payment systems (pay later)
  2. Debit card-based payment systems (pay now)
  3. Stored value card-based payment systems (pay before)

Question 8.
What is mean by Credit Card?
Answer:

  • Credit card is an electronic payment system normally used for retail transactions.
  • A credit card enables the bearer to buy goods or services from a vendor, based on the cardholder’s promise to the card issuer to pay back the value later with the agreed interest.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 9.
How merchant will be one of the Key Players in the operations of credit cards?
Answer:
Storekeeper or vendor who sells or providing service, receiving payment made by its customers through the credit card.

Question 10.
How Acquirer will be one of the Key Players in the operations of credit cards?
Answer:
Merchant’s bank that is responsible for receiving payment on behalf of merchant sends authorization requests to the issuing bank through the appropriate channels.

Question 11.
What is mean by RFID symbol?
Answer:

  • RFID symbol is four curved lines radiating rightwards similar to a tilted Wi-Fi symbol.
  • It indicates that it is a contactless smartcard.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 12.
Define Hologram.
Answer:
A hologram is a security feature that prevents duplication. It is a 3-dimensional image formed by interference of light beams.

Question 13.
What is mean by CVC/CVV?
Answer:

  • CVV – Card Verification value
  • CVC – Card Verification code
  • It is a 3 digit code usually printed to the left of the signature pane that validates the card.

Question 14.
What is mean by Debit Card?
Answer:
Debit Card is an electronic payment card where the transaction amount is deducted directly from the card holder’s bank account upon authorization.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 15.
What is Smart card?
Answer:

  • A plastic card with a built-in microprocessor used typically to perform financial transactions.
  • The modern version of card-based payment is smart cards.
  • Smart card along with the regular features of any card-based payment system holds an EMV chip.

Question 16.
What are the two varieties for the stored-value cards?
Answer:
There are two varieties for the stored-value card.

  1. Closed-loop (single purpose)
  2. Open-loop (multipurpose)

Question 17.
List the advantages of smart card.
Answer:
The advantage of Smart cards is that it can

  • Provide Identification
  • Authentication
  • Data Storage
  • Application Processing.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 18.
What are the two types of smart card?
Answer:
Smart cards can be classified into

  1. Contact smart cards
  2. Contactless smart cards.

Question 19.
What is mean E-cash?
Answer:

  • Electronic cash is (E-Cash) is a currency that flows in the form of data.
  • It converts the cash value into a series of encrypted sequence numbers and uses these serial numbers to represent the market value of various currencies in reality.

Question 20.
List the advantages of Internet Banking.
Answer:

  • The advantages of Internet banking are that the payments are made at the convenience of the account holder and are secured by user name and password, i.e. with Internet access it can be used from anywhere in the world and at any time.
  • Any standard browser (e.g. Google Chrome) is adequate. Internet banking does not need installing any additional software.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Part C

Explain In Brief Answer

Question 1.
How will you do the Microelectronic payment transactions?
Answer:
In general, the parties involved in the micro on-line payments are the Customer, Service Provider, and Payment processor. The Microelectronic payment transactions can be explained in the following way.

  • Step 1: Customer proves his authentication and the payment processor issues micropayments.
  • Step 2: Customer pays the micropayments to the online service provider and gets the requested goods or services from them.
  • Step 3: Service provider deposits micro payments received from the customer to the payment processor and gets the money.

Question 2.
Write a short note on Real Time Gross Settlement?
Answer:

  • Real-Time Gross Settlement system (RTGS) is a payment system particularly used for the settlement of transactions between financial institutions, especially banks.
  • As the name indicates, RTGS transactions are processed in real-time.
  • RTGS payments are also called push payments that are initiated(“triggered”) by the payer.
  • RTGS payments are generally large-value payments, i.e. high-volume transactions.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Mention the advantages of a credit card?
Answer:
Advantages of credit card:

  1. Most credit cards are accepted worldwide.
  2. It is not necessary to pay physical money at the time of purchase. The customer gets an extra period to pay for the purchase.
  3. Depending on the card, there is no need to pay an annuity.
  4. Allows purchases over the Internet in installments.
  5. Some issuers allow “round up” the purchase price and pay the difference in cash to make the transactions easy.

Question 4.
What are three ways of processing debit card transactions?
Answer:
Three ways of processing debit card transactions are

  1. EFTPOS (also known as online debit or PIN debit)
  2. Offline debit (also known as signature debit)
  3. Electronic Purse Card System

Question 5.
Define
(i) Closed Loop
(ii) Open Loop
Answer:
(i) Closed Loop

  • In closed-loop cards, money is metaphorically stored on the card in the form of binary-coded data.
  • Closed-loop cards are issued by a specific merchant or merchant and can only be used to make purchases from specific places, e.g. Chennai metro rail travel cards.

(ii) Open loop (multipurpose)

  • Open-loop cards can be used to make debit transactions at a variety of retailers.
  • It is also called prepaid-debit cards.
  • It can be used anywhere the branded cards are accepted, e.g. Visa gift cards.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
Give the two types of Real-time gross settlement transactions?
Answer:
Real-time gross settlement transactions are:
Unconditional – the beneficiary will receive funds regardless of whether he fulfills his obligations to the buyer or whether he would deliver the goods or perform a service of a quality consistent with the order.

Irrevocable – a correctly processed transaction cannot be reversed and its money cannot get refunded (the so-called settlement finality).

Part D

Explain In Detail

Question 1.
Explain Debit Card?
Answer:
Debit Card:
Debit Card is an electronic payment card where the transaction amount is deducted directly from the card holder’s bank account upon authorization.

Generally, debit cards function as ATM cards and act as a substitute for cash The way of using debit cards and credit cards is generally the same but unlike credit cards, payments using a debit card are immediately transferred from the cardholder’s designated bank account, instead of them paying the money back at a later with added interest. In the modern era, the use of debit cards has become so widespread.

The debit card and credit card are identical in their physical properties. It is difficult to differentiate two by their appearance unless they have the term credit or debit imprinted. Currently, there are three ways of processing debit card transactions:

  1. EFTPOS (also known as online debit or PIN debit)
  2. Offline debit (also known as signature debit)
  3. Electronic Purse Card System

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 2.
Explain in detail the Credit card Number.
Answer:

  • Credit card number: The modern credit card number has a 16-digit unique identification number.
  • The first digit of the credit card number is Major Industry Identifier (Mil).
    • It identifies the issuer category.
    • e.g. 1 – Airlines,4 – Banks
  • The next 5 digits uniquely identify the issuing organization.
  • The first 6 digits together called as Issuer Identifier Number (IIN) or Bank Identification Number (BIN).
  • The next 9 digits are the account number.
  • The last digit is a check digit (based to the Luhn algorithm).

Question 3.
Write in detail about the classification of smart cards
Answer:
(i) Contact smart cards

  • Contact smart cards have a contact area of approximately 1 square centimeter, comprising several gold-plated contact pads.
  • These pads provide electrical connectivity only when inserted into a reader, which is also used as a communications medium between the smart card and a host. e.g. a point of sale terminal(POS).

(ii) Contactless smart cards

  • Contactless smart card is empowered by RF induction technology.
  • Unlike contact smart cards, these cards require only near proximity to an antenna to communicate.
  • Smartcards, whether they are the contact or contactless cards do not have an internal power source.
  • Instead, they use an inductor to capture some of the interrupting radio-frequency signals, rectify it, and power the card’s processes.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 4.
Write the steps to transfer funds using Net Banking.
Answer:

  • Step 1; Login to net banking account using unique user name and password provided by the bank earlier.
  • Step 2: Add the beneficiary as a payee to enable transfer of fund. The following details like Account Number, Name, IFSC about the beneficiary are to be filled in the ‘Add New Payee’ section.
  • Step 3: Once the beneficiary Is added, choose RTGS / NEFT / IMPS as mode of Fund Transfer.
  • Step 4: Select the account to transfer money from, select the payee, enter the amount to be transferred and add remarks (optional).
  • Step 5: Click on submit.
  • Step 6: Enter the OTP received to mobile number linked to the corresponding account to complete the transaction.

Question 5.
Explain the advantages of UPI?
Answer:

  • Immediate money transfers through mobile device round the clock 24 × 7.
  • Can use single mobile application for accessing multiple bank accounts.
  • Single Click Authentication for transferring of fund.
  • It is not required to enter the details such as Card no, Account number, IFSC etc. for every transaction.
  • Electronic payments will become much easier without requiring a digital wallet or credit or debit card

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 17 E-Commerce Security Systems Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 17 E-Commerce Security Systems

12th Computer Applications Guide E-Commerce Security Systems Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
In E-Commerce, when a stolen credit card is used to make a purchase it is termed as
a) Friendly fraud
b) Clean fraud
c) Triangulation fraud
d) Cyber squatting
Answer:
b) Clean fraud

Question 2.
Which of the following is not a security element involved in E-Commerce?
a) Authenticity
b) Confidentiality
c) Fishing
d) Privacy
Answer:
c) Fishing

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 3.
Asymmetric encryption is also called as
a) Secure Electronic Transaction
b) Certification Authority
c) RSA algorithm
d) Payment Information
Answer:
c) RSA algorithm

Question 4.
The security authentication technology does not include
i) Digital Signatures
ii) Digital Time Stamps
iii) Digital Technology
iv) Digital Certificates

a) i, ii & iv
b) ii & iii
c) i, ii & iii
d) all the above
Answer:
b) ii & iii

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 5.
PGP stands for
a) Pretty Good Privacy
b) Pretty Good Person
c) Private Good Privacy
d) Private Good Person
Answer:
a) Pretty Good Privacy

Question 6.
…………….. protocol is used for securing credit cards transactions via the Internet
a) Secure Electronic Transaction (SET)
b) Credit Card Verification
c) Symmetric Key Encryption
d) Public Key Encryption
Answer:
a) Secure Electronic Transaction (SET)

Question 7.
Secure Electronic Transaction (SET) was developed in
a) 1999
b) 1996
c) 1969
d) 1997
Answer:
b) 1996

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 8.
The websites secured by Secure Socket Layer protocols can be identified using
a) html://
b) http://
c) htmls://
d) https://
Answer:
d) https://

Question 9.
3-D Secure, a protocol was developed by
a) Visa
b) Master
c) Rupay
d) PayTM
Answer:
b) Master

Question 10.
Which of the following is true about Ransomware
a) Ransomware is not a subset of malware
b) Ransomware deletes the file instantly
c) Typo piracy is a form of ransomware
d) Hackers demand ransom from the victim
Answer:
d) Hackers demand ransom from the victim

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Part II

Short Answers

Question 1.
Write about information leakage in E-Commerce.
Answer:
Information leakage:
The leakage of trade secrets in E-Commerce mainly includes two aspects:

  1. The content of the transaction between the vendor and customer is stolen by the third party;
  2. The documents provided by the merchant to the customer or vice versa are illegally used by another.
  3. This intercepting and stealing of online documents is called information leakage.

Question 2.
Write a short note on typo piracy.
Answer:

  • Typopiracy ¡s a variant of Cyber Squatting.
  • Some fake websites try to take advantage of users’ common typographical errors in typing a websíte address and direct users to a different website.
  • Such people try to take advantage of some popular websites to generate accidental traffic for their websites.

Examples:

  • www.goggle.com,
  • www.facebook.com

Question 3.
Define non-repudiation.
Answer:
Non-repudiation: prevention against violation agreement after the deal.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 4.
List the different types of security technologies in E-Commerce
Answer:

  • Encryption technology
  • Authentication technology
  • Authentication protocols

Question 5.
Write about digital signature.
Answer:

  1. A digital signature is a mechanism that is used to verify that a particular digital document, message, or transaction is authentic.
  2. Digital signatures are used to verify the trustworthiness of the data being sent.

Part III

Explain In Brief Answer

Question 1.
Write a note on certification authorities (CA)
Answer:

  • Digital certificates are issued by recognized Certification Authorities (CA).
  • When someone requests a digital certificate, the authority verifies the identity of the requester, and if the requester fulfills all requirements, the authority issues it.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 2.
List some E-Commerce Security Threats?
Answer:

  • Information leakage
  • Tampering
  • Payment frauds
  • Malicious code threats
  • Distributed Denial of Service (DDoS) Attacks
  • Cyber Squatting
  • Typopiracy

Question 3.
Differentiate asymmetric and symmetric algorithms.
Answer:
Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems 1

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 4.
Write a note on PGP.
Answer:
Pretty Good Privacy (PGP): Phil Zimmermann developed PGP in 1991. It is a decentralized encryption program that provides cryptographic privacy and authentication for data communication. PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and asymmetric-key cryptography and works on the concept of “web of trust”.

Question 5.
Explain 3D secure payment protocols
Answer:

  • “3-D Secure is a secure payment protocol on the Internet.
  • It was developed by Visa to increase the level of transaction security, and it has been adopted by MasterCard.
  • It gives a better authentication of the holder of the payment card, during purchases made on websites.
  • The basic concept of this (XML-based) protocol is to link the financial authorization process with an online authentication system.

This authentication model comprises 3 domains (hence the name 3D) which are:

  1. The Acquirer Domain
  2. The Issuer Domain
  3. The interoperability’ Domain

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Part IV

Explain In Detail

Question 1.
Write about dimensions of E-Commerce Security.
Answer:
The following are some of the security elements involved in E-Commerce:

  1. Authenticity: conforming genuineness of data shared.
  2. Availability: prevention against data delay or removal.
  3. Completeness: unification of all business information.
  4. Confidentiality: protecting data against unauthorized disclosure.
  5. Effectiveness: effective handling of hardware, software and data.
  6. Integrity: prevention of the data being unaltered or modified.
  7. Non-repudiation: prevention against violation agreement after the deal.
  8. Privacy: prevention of customers’ personal data being used by others.
  9. Reliability: providing a reliable identification of the individuals or businesses.
  10. Review ability: capability of monitoring activities to audit and track the operations.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 2.
Explain encryption technology.
Answer:

  • Encryption technology is an effective information security protection.
  • It is defined as converting a Plaintext into meaningless Ciphertext using an encryption algorithm thus ensuring the confidentiality of the data.
  • The encryption or decryption process uses a key to encrypt or decrypt the data.

Types:
At present, two encryption technologies are widely used. They are:

  • Symmetric key encryption system
  • Asymmetric key encryption system.

Symmetric key encryption – Data Encryption Standard (DES):

  • It is a Symmetric-key data encryption method.
  • It is the typical block algorithm that takes a string of bits of clear text (plaintext) with a fixed length into another encrypted text of the same length.
  • It also uses a key to customize the transformation, so that, in theory, the algorithm can only be deciphered by people who know the exact key that has been used for encryption.
  • The DES key is apparently 64 bits, but in fact, the algorithm uses only 56. The other eight bits are only used to verify the parity and then it is discarded.
  • The key length increased by multiple uses of the DES, described as Triple-DES, also known as TDES, 3DES or DESede,

Asymmetric or Public key encryption

  • It is also called as RSA (Rivest-Shamir-Adleman) algorithm.
  • It uses public-key authentication and digital signatures.
  • Each user generates their own key pair, which consists of a private key and a public key.
  • A public-key encryption method is a method for converting a plaintext with a public key into a ciphertext from which the plaintext can be retrieved with a private key.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 3.
Differentiate digital signatures and digital certificates.
Answer:

Symmetric Key Encryption

Symmetric Key Encryption

A digital signature is a mechanism that is used to verify that a particular digital document, message, or transaction is authentic.A digital certificate is a computer file which officially ap­proves the relation between the holder of the certificate and a particular public key.
Digital signatures are used to verify the trustworthiness of the data being sentDigital certificates are used to verify the trustworthiness of the sender
A digital signature is to ensure that data remains secure from the point it was issued and it was not modified by a third party.A digital certificate binds a digital signature to an entity
It provides authentication, non-repudiation, and in­tegrityIt provides authentication and security
A digital signature is created using a Digital Signa­ture Standard (DSS). I use an SHA-1 or sha-2 algo­rithm for encrypting and decrypting the message.A digital certificate works on principles of public-key cry- pyrography standards (PKCS). It creates a certificate in the X.509 or PGP format.
The document is encrypted at the sending end and decrypted at the receiving end using asymmetric keys.A digital certificate consists of the certificate’s owner name and public key, expiration date, a certificate Authority’s name, a Certificate Authority’s digital signature

Question 4.
Define Secure Electronic Transaction (SET) and its features.
Answer:
There are two kinds of security authentication protocols widely used in E-Commerce, namely Secure Electronic Transaction (SET) and Secure Sockets Layer (SSL).

Secure Electronic Transaction:
Secure Electronic Transaction (SET) is a security protocol for electronic payments with credit cards, in particular via the Internet. SET was developed in 1996 by VISA and MasterCard, with the participation of GTE, IBM, Microsoft, and Netscape.

The implementation of SET is based on the use of digital signatures and the encryption of transmitted data with asymmetric and symmetric encryption algorithms. SET also use dual signatures to ensure privacy.

The SET purchase involves three major participants: the customer, the seller, and the payment gateway. Here the customer shares the order information with the seller but not with the payment gateway. Also, the customer shares the payment information only with the payment gateway but not with the seller.

So, with the SET, the credit card number may not be known to the seller and will not be stored in the seller’s files also could not be recovered by a hacker. The SET protocol guarantees the security of online shopping using credit cards on the open network. It has the advantages of ensuring the integrity of transaction data and the non-repudiation of transactions. Therefore, it has become the internationally recognized standard for credit card online transactions.

SET system incorporates the following key features:

  • Using public-key encryption and private key encryption ensure data confidentiality.
  • Use information digest technology to ensure the integrity of information.
  • Dual signature technology to ensure the identity of both parties in the transaction.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 5.
Briefly explain SSL.
Answer:

  • The most common Cryptographic protocol is Secure Sockets Layers (SSL).
  • SSL is a hybrid encryption protocol for securing transactions over the Internet.
  • The SSL standard was developed by Netscape in collaboration with MasterCard, Bank of America, MCI, and Silicon Graphics.
  • It is based on a public key cryptography process to ensure the security of data transmission over the internet.

Principle:

  • To establish a secure communication channel (encrypted) between a client and a server after an authentication step.
  • To ensure the security of data, located between the application layer and the transport layer in TCP.

Example:

  • A user using an internet browser to connect to an SSL secured E-Commerce site will send encrypted data without any more necessary manipulations.

Advantages:

  • Today, all browsers ¡n the market support SSL.
  • The secure communications are proceeded, through this protocol.
  • SSL works completely hidden for the user, who does not have to intervene in the protocol.
  • The URL starts with https:// instead of http:// where the “s” obviously means secured. It is also preceded by a green padlock.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

12th Computer Applications Guide E-Commerce Security Systems Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
A digital certificate is also known as ………………
a) Public key certificate
b) Asymmetric Key
c) Symmetric Key
d) All of the above
Answer:
a) Public key certificate

Question 2.
…………… is a process of taking down an E-Commerce site by sending continuous
overwhelming request to its server.
a) RSA
b) DES
c) DDoS
d) CA
Answer:
c) DDoS

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 3.
The stealing of online documents is called …………………….
(a) phishing
(b) virus
(c) Frauds
(d) information leakage
Answer:
(d) information leakage

Question 4.
Typopiracy is a variant of ………….
a) Payment Frauds
b) Tampering
c) Cybersquatting
d) All of the above
Answer:
c) Cybersquatting

Question 5.
How many types of payment frauds are there?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Abbreviations:

  1. DDoS Distributed Denial of Service
  2. DES Data Encryption Standard
  3. RSA Rivest-Shamir-Adleman
  4. CA Certification Authorities
  5. PGP Pretty Good Privacy
  6. PKI Public Key Infrastructure
  7. SET Secure Electronic Transaction
  8. SSL Secure Sockets Layers
  9. TLS Transport Layer Security
  10. MD Message Digest
  11. PIN Personal Identification Number
  12. OTP One Time Password
  13. FIPS Federal Information Processing Standard
  14. PKCS Public-key cryptography standards

Assertion And Reason

Question 1.
Assertion (A); A digital signature is a mechanism that is used to verify that a particular digital document, message, or transaction is authentic.
Reason (R); A digital certificate is a computer file which officially approves the relation between the holder of the certificate and a particular public key.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 2.
Assertion (A): Digital signatures are used to verify the trustworthiness of the data being sent.
Reason (R): A digital signature is a mechanism that is used to verify that a particular digital document, message, or transaction is authentic.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 3.
Assertion (A): A digital certificate is created using a Digital Signature Standard (DSS). It uses an SHA-1 or SHA-2 algorithm for encrypting and decrypting the message.
Reason (R); A digital certificate consists of the certificate’s owner name and public key, expiration date, a Certificate Authority’s name a Certificate Authority’s digital signature.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Question 4.
Assertion (A); At present, there are two kinds of security authentication protocols widely used in E-Commerce.
Reason (R): SET is a Cryptographic protocol.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 5.
Assertion (A)s URL starts with https://instead of http:// where the “s” obviously means secured.
Reason (R): SSL works completely hidden for the user, who does not have to intervene in the protocol.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Very Short Answers

Question 1.
What is DES?
Answer:
The Data Encryption Standard (DES) is a Symmetric-key data encryption method.

Question 2.
When was DES introduced?
Answer:
It was introduced in America in the year 1976

Question 3.
Who introduced DES?
Answer:
It was introduced by Federal Information Processing Standard (FIPS).

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 4
Who developed PGP? When?
Answer:
Pretty Good Privacy (PGP): Phil Zimmermann developed PGP in 1991.

Question 5.
What is the use of digital certificates?
Answer:
Digital certificates are used to verify the Trust j worthiness of the sender.

Question 6.
What is the use of digital signatures?
Answer:
Digital signatures are used to verify the trustworthiness of the data being sent

Question 7.
Who developed 3D-Secure?
Answer:
3D-Secure was developed by Visa

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 8.
What is 3D-Secure?
Answer:
3-D Secure is a secure payment protocol on the Internet.

Question 9.
What is the purpose of 3D-Secure?
Answer:
To increase the level of transaction security,

Question 10.
What is the basic concept of 3D-Secure?
Answer:
To link the financial authorization process with an online authentication system.

Question 11.
What is SET?
Answer:
Secure Electronic Transaction (SET) is a security protocol for electronic payments

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 12.
What is SSL?
Answer:
The most common Cryptographic protocol is Secure Sockets Layers (SSL).

Question 13.
What is the purpose of SSL?
Answer:
To ensure the security of data transmission over the internet.

Question 14.
What are Brute-force attacks?
Answer:
It is the simplest attack method for breaking any encryption.

Question 15.
Who developed SSL?
Answer:
The SSL standard was developed by Netscape

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 16.
What is a repository?
Answer:
The certificate authority maintains a database of public keys called a repository

Question 17.
How TLS and SSL differ?
Answer:
TLS differs from SSL in the generation of symmetric keys.

Question 18.
How many domains are in the authentication model?
Answer:
There are 3 domains in the authentications model

Question 19.
When SSL renamed as TLS?
Answer:
Secure Sockets Layers (SSL) was renamed as Transport Layer Security (TLS) in 2001.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 20.
What is the principle of SSL?
Answer:
To establish a secure communication channel between a client and a server

Question 21.
What is public key infrastructure?
Answer:
Digital signatures use a standard, worldwide accepted format, called Public Key Infrastructure (PKI).

Question 22.
What is the purpose of PKI?
Answer:
To provide the highest levels of security and universal acceptance.

Question 23.
What is the role of security certification in authentication technology?
Answer:
To ensure Authentication, Integrity, and Non-repudiation.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 24.
Who are the participants involve in inset purchase?
Answer:

  • The customer
  • The seller
  • The payment gateway.

Question 25.
What is another name of Asymmetric encryption?
Answer:
RSA (Rivest-Shamir-Adleman) algorithm.

Important Years To Remember:

1976DES was introduced in America
1991Phil Zimmermann developed PGP
1996SET was developed by VISA and MasterCard

Find The Odd One On The Following

1. a) Authenticity
b) Availability
c) Completeness
d) Audacity
Answer:
d) Audacity

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

2. a) Confidentiality
b) Effectiveness
c) Tampering
d) Reliability
Answer:
c) Tampering

3. a) Cyber Squatting
b) Integrity
c) Non-repudiation
d) Privacy
Answer:
a) Cyber Squatting

4. a) Information leakage
b) Confidentiality
c) Payment frauds
d) Tampering
Answer:
b) Confidentiality

5. a) Malicious code threats
b) DDoS
c) Cyber Squatting
d) Confidentiality
Answer:
d) Confidentiality

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

6. a) DES
b) AES
c) ECC
d) RC4
Answer:
c) ECC

7. a) DES
b) ECC
c) DSA
d) RSA
Answer:
a) DES

8. a) TDES
b) AES
c) 3 DES
d) DESede
Answer:
b) AES

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

9. a) Authentication
b) Integrity
c) Non-repudiation
d) Plain Text
Answer:
d) Plain Text

10. a) Asymmetric encryption
b) Symmetric key encryption
c) Data Encryption Standard
d) Federal Information Processing Standard
Answer:
a) Asymmetric encryption

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Part B

Short Answer Questions

Question 1.
What is E-commerce Security?
Answer:
E-Commerce security is a set of protocols that safely guide E-Commerce transactions through the Internet.

Question 2.
What is Cyber Squatting?
Answer:
It is s the illegal practice of registering an Internet domain name that might be wanted by another person in an intention to sell it later for a profit

Question 3.
What is meant by cybersquatting?
Answer:
Cyber Squatting: Cybersquatting is the illegal practice of registering an Internet domain name that might be wanted by another person with an intention to sell it later for a profit.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Part c

Explain In Brief Answer

Question 1.
Define Phishing?
Answer:
Phishing is also an E-Commerce threat in which a target is contacted by e-mail, telephone, or text message by someone who pretends himself as a genuine authority. They try to trap individuals to provide sensitive data such as banking and credit card details, OTP, PIN, or passwords. Once they succeed, the results would lead to devastating acts such as identity theft and financial loss.

Question 2.
What are the subsets of Payment frauds?
Answer:

  • Friendly fraud (when customer demands false reclaim or refund
  • Clean fraud (when a stolen credit card is used to make a purchase)
  • Triangulation fraud (fake online shops offering cheapest price and collect credit card data) etc.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 3.
Explain various types of payment frauds?
Answer:
Payment frauds: Payment frauds have subsets like Friendly fraud (when customer demands- false reclaim or refund), Clean fraud (when a stolen credit card is used to make a purchase) Triangulation fraud (fake online shops offering the cheapest price and collect credit card data), etc.

Question 4.
What is Distributed Denial of Service (DDoS) Attacks? Or What is network flooding?
Answer:

  • It is a process of taking down an E-Commerce site by sending a continuous overwhelming request to its server.
  • This attack will be conducted from numerous unidentified computers using a botnet. This attack will slow down and make the server inoperative.
  • DDoS attacks are also called network flooding.

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 18 Electronic Data Interchange – EDI Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 18 Electronic Data Interchange – EDI

12th Computer Applications Guide Electronic Data Interchange – EDI Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
EDI stands for
a) Electronic Details Information
b) Electronic Data Information
c) Electronic Data Interchange
d) Electronic Details Interchange
Answer:
a) Electronic Details Information

Question 2.
Which of the following is an internationally recognized standard format for trade, transportation, insurance, banking and customs?
a) TSLFACT
b) SETFACT
c) FTPFACT
d) EDIFACT
Answer:
d) EDIFACT

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 3.
Which is the first industry-specific EDI standard?
a) TDCC
b) VISA
c) Master
d) ANSI
Answer:
a) TDCC

Question 4.
UNSM stands for
a) Universal Natural Standard Message
b) Universal Notations for Simple Message
c) United Nations Standard Message
d) United Nations Service Message
Answer:
c) United Nations Standard Message

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 5.
Which of the following is a type of EDI?
a) Direct EDI
b) Indirect EDI
c) Collective EDI
d) Unique EDI
Answer:
a) Direct EDI

Question 6.
Who is called the father of EDI?
a) Charles Babbage
b) Ed Guilbert
c) Pascal
d) None of the above
Answer:
b) Ed Guilbert

Question 7.
EDI interchanges start with ……………. and end with ……………
a) UNA, UNZ
b) UNB, UNZ
c) UNA, UNT
d) UNB, UNT
Answer:
b) UNB, UNZ

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 8.
EDIFACT stands for
a) EDI for Admissible Commercial Transport
b) EDI for Advisory Committee and transport
c) EDI for Administration, Commerce, and Transport
d) EDI for Admissible Commerce and Trade
Answer:
c) EDI for Administration, Commerce, and Transport

Question 9.
The versions of EDIFACT are also called as
a) Message types
b) Subsets
c) Directories
d) Folders
Answer:
c) Directories

Question 10.
Number of characters in a single EDIFACT messages
a) 5
b) 6
c) 4
d) 3
Answer:
b) 6

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Part II

Short Answers

Question 1.
Define EDI.
Answer:
The Electronic Data Interchange (EDI) is the exchange of business documents between one trade partner and another electronically. It is transferred through a dedicated channel or – through the Internet in a predefined format without much human intervention.

Question 2.
List few types of business documents that are transmitted through EDI.
Answer:

  1. Delivery notes
  2. Invoices
  3. Purchase orders
  4. Advance ship notice
  5. Functional acknowledgments etc.

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 3.
What are the 4 major components of EDI?
Answer:
There are four major components of EDI. They are:

  1. Standard document format
  2. Translator and Mapper
  3. Communication software
  4. Communication network

Question 4.
What is meant by directories inEDIFACT?
Answer:

  • The versions of EDIFACT are also called as directories.
  • These EDIFACT directories will he revised twice a year.

Question 5.
Write a note on EDIFACT subsets.
Answer:
Due to the complexity, branch-specific subsets of EDIFACT have developed. These subsets of EDIFACT include only the functions relevant to specific user groups.
Example:

  • CEFIC – Chemical industry
  • EDIFURN – furniture industry
  • EDIGAS – gas business

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Part III

Explain In Brief Answer

Question 1.
Write a short note on EDI.

  • The Electronic Data Interchange (EDI)is the exchange of business documents between one trade partner and another electronically,
  • It is transferred through a dedicated channel or through the Internet in a predefined format without much human intervention,
  • It is used to transfer documents such as delivery notes, invoices, purchase orders, advance ship notices, functional acknowledgments, etc.

Question 2.
List the various layers of EDI.
Answer:
Electronic data interchange architecture specifies four different layers namely

  1. Semantic layer
  2. Standa, us translation layer
  3. Transport layer
  4. Physical layer

These EDI layers describe how data flows from one computer to another.

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 3.
Write a note on UN/EDIFACT.
Answer:

  • United Nations / Electronic Data Interchange for Administration, Commerce, and Transport
  • (UN / EDIFACT) is an international EDI – a standard developed under the supervision of the United Nations.
  • In 1987, the UN / EDIFACT syntax rules were approved as ISO: IS09735 standard by the International Organization for Standardization.
  • EDIFACT includes a set of internationally agreed standards, catalogs, and guidelines for the electronic exchange of structured data between independent computer systems.

Question 4.
Write a note on the EDIFACT message.
Answer:

  • The basic standardization concept of EDIFACT is that there are uniform message types called United Nations Standard Message (UNSM).
  • In so-called subsets, the message types can be specified deeper in their characteristics depending on the sector.
  • The message types, all of which always have exactly one nickname consisting of six uppercase English alphabets.
  • The message begins with UNH and ends with UNT.

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 5.
Write about EDIFACT separators
Answer:
EDIFACT has the following punctuation marks that are used as standard separators.
Character Uses

Character

Uses

Apostrophe (‘)segment terminator
Plus sign (+)segment tag and data element separator
Colon (;)component data element separator
Question mark (?)Release character
Period (.)decimal point

Part IV

Explain In Detail

Question 1.
Briefly explain various types of EDI.
Answer:
The types of EDI were constructed based on how EDI communication connections and the conversion were organized. Thus based on the medium used for transmitting EDI documents the following are the major EDI types.

  1. Direct EDI
  2. EDI via VAN
  3. EDI via-FTP/VPN, SFTP, FTPS
  4. Web EDI
  5. Mobile EDI
  6. Direct EDI/Point-to-Point

It is also called as Point-to-Point EDI. It establishes a direct connection between various business stakeholders and partners individually. This type of EDI suits to larger businesses with a lot of day to day business transactions.

EDI via VAN:
EDI via VAN (Value Added Network) is where EDI documents are transferred with the support of third-party network service providers. Many businesses prefer this network model to protect them from the updating ongoing complexities of network technologies.

EDI via FTP/VPN, SFTP, FTPS:
When protocols like FTP/VPN, SFTP, and FTPS are used for the exchange of EDI-based documents through the Internet or Intranet it is called EDI via FTP/VPN, SFTP, FTPS.

Web EDI:
Web-based EDI conducts EDI using a web browser via the Internet. Here the businesses are allowed to use any browser to transfer data to their business partners. Web-based EDI is easy and convenient for small and medium organizations.

Mobile EDI:
When smartphones or other such handheld devices are used to transfer EDI documents it is called mobile EDI. Mobile EDI applications considerably increase the speed of EDI transactions.

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 2.
What are the advantages of EDI?
Answer:

  • EDI was developed to solve the problems inherent in paper-based transaction processing and in other forms of electronic communication.
  • Implementing an EDI system offers a company greater control over its supply chain and allow it to trade more effectively. It also increases productivity and promotes operational efficiency.

The following are the other advantages of EDI.

  • Improving service to end-users
  • Increasing productivity
  • Minimizing errors
  • Slashing response times
  • Automation of operations
  • Cutting costs
  • Integrating all business and trading partners

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 3.
Write about the structure of EDIFACT.
Answer:

  • EDIFACT is a hierarchical structure where the top level is referred to as an interchange, and lower levels contain multiple messages.
  • The messages consist of segments, which in turn consist of composites.
  • The final iteration is a data element.

Segment Tables

  • The segment table lists the message tags.
  • It contains the tags, tag names, requirements designator, and repetition field.
  • The requirement designator may be mandatory (M) or conditional (C).
  • The (M) denotes that the segment must appear at least once. The (C) denotes that the segment may be used if needed.
  • Example: CIO indicates repetitions of a segment or group between 0 and 10.

EDI Interchange

  • Interchange is also called an envelope.
  • The top-level of the EDIFACT structure is Interchange.
  • An interchange may contain multiple messages. It starts with UNB and ends with UNZ

EDIFACT message

  • The basic standardization concept of EDIFACT is that there are uniform message types called United Nations Standard Message (UNSM).
  • In so-called subsets, the message types can be specified deeper in their characteristics depending on the sector.
  • The message types, all of which always have exactly one nickname consisting of six uppercase English alphabets.
  • The message begins with UNH and ends with UNT

Service messages

  • To confirm/reject a message, CONTRL and APERAK messages are sent.
  • CONTRL- Syntax Check and Confirmation of Arrival of Message
  • APERAK – Technical error messages and acknowledgment

Data exchange

  • CREMUL – multiple credit advice
  • DELFOR- Delivery forecast
  • IFTMBC – Booking confirmation

EDIFACT Segment

  • It is the subset of messages.
  • A segment is a three-character alphanumeric code.
  • These segments are listed in segment tables.
  • Segments may contain one, or several related user data elements.

EDIFACT Elements

  • The elements are the piece of actual data.
  • These data elements may be either simple or composite.

EDI Separators
EDIFACT has the following punctuation marks that are used as standard separators.

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

12th Computer Applications Guide Electronic Data Interchange – EDI Additional Important Questions and Answers

Part A

Choose The Correct Answers

Question 1.
……………………. is the exchange of business documents between one trade partner and another electronically.
(a) EDI
(b) UDI
(c) FDI
(d) DDI
Answer:
(a) EDI

Question 2.
First EDI standards were released by ………..
a) EDI
b) EFT
c) EDIA
d) TDCC
Answer:
d) TDCC

Question 3.
……………………. is a paperless trade.
(a) EDI
(b) XML
(c) EDIF
(d) EFT
Answer:
(a) EDI

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 4.
………… establishes a direct connection between various business stakeholders
and partners individually.
a) Direct EDI
b) EDI via VAN
c) Web EDI
d) Mobile EDI
Answer:
a) Direct EDI

Question 5.
Electronic data interchange architecture specifies ……………. different layers.
a) two
b) three
c) four
d) five
Answer:
c) four

Question 6.
TDCC was formed in the year …………………….
(a) 1964
(b) 1966
(c) 1968
(d) 1970
Answer:
(c) 1968

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 7.
In ……………… UN created the EDIFACT to assist with the global reach of technology in E-Commerce.
a)1985
b)1978
c)1974
d)1975
Answer:
a)1985

Question 8.
Expand EDIA
(a) Electronic Data Interchange Authority
(b) Electronic Data Information Association
(c) Electronic Data Interchange Association
(d) Electronic Device Interface Amplifier
Answer:
(c) Electronic Data Interchange Association

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 9.
Which of the following is for the exchange of EDI-based documents through the Internet?
a) FTP/VPN
b) SFTP
c) FTPS
d) All of the above
Answer:
d) All of the above

Question 10.
EDIA has become …………………….. committee.
(a) ANSIXI2
(b) ANSIXI3
(c) ANSIXI4
(d) ANSIX15
Answer:
(a) ANSIXI2

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Fill In The Blanks:

1. ……….. was developed to solve the problems inherent in paper-based transaction processing.
Answer:
EDT

2. ………….. is also called as Point-to-Point EDI.
Answer:
Direct EDT

3. Interchange is also called…………..
Answer:
Envelope

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

4. EDT is ……………… Trade.
Answer:
Paperless

5. EFT is …………….. Payment
Answer:
Paperless

6. ………… is “the computer-to-computer interchange of strictly formatted messages.
Answer:
EDI

7. …………….. EDI is easy and convenient for small and medium organizations.
Answer:
Web-based

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

8. The …………. is the most critical part of the entire EDI.
Answer:
standard

Abbreviations

  1. EDI – Electronic Data Interchange
  2. EFT – Electronic Transfer
  3. TDCC – Transportation Data Coordinating Committee
  4. EDIA – Electronic Data Interchange Association
  5. ANSI – American National Standards Institute
  6. VAN – Value Added Network
  7. ANSI ASC – American National Standards Institute Accredited Standard Committee
  8. GTDI – Guideline for Trade Data Interchange
  9. UN/ECE/ – United -Nations Economic Commission for Europe
  10. UN/EDIFACT -United Nations / Electronic Data Interchange for Administration, Commerce, and Transport
  11. UNSM -United Nations Standard Message

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Assertion And Reason
Question 1.
Assertion (A): According to the National Institute of Standards and Technology, EDI is the computer-to-computer interchange of strictly formatted messages that represent documents other than monetary instruments.
Reason(R): The Electronic Data Interchange (EDI) is the exchange of business documents between one trade partner and another electronically.
a) Both (A) and (R) are correct and (R) ¡s the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 2.
Assertion(A): EFT is “Paperless Trade”
Reason(R): The Electronic Data Interchange (EDI) is the exchange of business documents between one trade partner and another electronically.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 3,
Assertion (A): United Nations / Electronic Data Interchange for Administration, Commerce, and Transport (UN / EDIFACT) is an international EDI – a standard developed under the supervision of the United Nations.
Reason(R): In 1985, the UN / EDIFACT syntax rules were approved as ISO: IS09735 standard by the International Organization for Standardization.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 4.
Assertion (A): The segment table lists the message tags.
Reason(R): It contains the tags, tag names, requirements designator, and repatriation field.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 5.
Assertion (A): The top level of EDIFACT structure is Interchange.
Reason(R): Interchange is also called an envelope. An interchange may contain multiple messages. It starts with UNB and ends with UNZ
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Short Answer Questions

Question 1.
Who is the father of EDI?
Answer:
Ed Guilbert is called the father of EDI

Question 2.
What is Paperless trade?
Answer:
The exchange of business documents between one trade partner and another electronically is called Paperless trade.

Question 3.
What is Paperless Payment?
Answer:
Transfer of money from one bank account to another, via computer-based systems, is known as Paperless payment

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 4.
What is another name of Direct EDI?
Answer:
Another name of Direct EDI is Point-to-Point EDI.

Question 5.
How many alphabets require for EDI messages?
Answer:
Every EDI message requires six uppercase English Alphabets

Match The Following:

1. EDI – Booking confirmation
2. EFT – Paperless Trade
3. EDIFACT – Envelope
4. Interchange – Delivery forecast
5. CEFIC – Directories
6. EDIFURN – Chemical industry
7. EDIGAS – Technical error
8. CONTRL – Multiple credit advice
9. APERAK – Furniture industry
10. CREMUL – Arrival of Message
11. DELFOR – Gas business
12. IFTMBC – Paperless Payment

Answers
1. Paperless Trade
2. Paperless Payment
3. Directories
4. Envelope
5. Chemical industry
6. Furniture industry
7. Gas business
8. Arrival of Message
9. Technical error
10. Multiple credit advice
11. Delivery forecast
12. Booking confirmation

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Find The Odd One On The Following

1. (a) Deliver/ Notes
(b) Invoices
(c) Advance Ship Notice
(d) EDIFACT
Answer:
(d) EDIFACT

2. (a) EDIFACT
(b) XML
(c) CDMA
(d) ANSI ASCX12
Answer:
(c) CDMA

3. (a) Direct EDI
(b) InDirectEDI
(c) Web EDI
(d) Mobile EDI
Answer:
(b) InDirectEDI

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

4. (a) FTP/VPN
(b) HTTP
(c) SFTPP
(d) FTPS
Answer:
(b) HTTP

5. (a) Dial-Up Line
(b) I way
(c) point to point
(d) Internet
Answer:
(c) point to point

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

6. (a) Email
(b) MIME
(c) HTTP
(d) ANSI X12
Answer:
(d) ANSI X12

7. (a) Transport Layer
(b) Semantic Layer
(c) Application Layer
(d) physical Layer
Answer:
(c) Application Layer

8. (a) Standards
(b) Catalogs
(c) TDCC
(d) guidelines
Answer:
(c) TDCC

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

9. (a) CREMUL
(b) DELFOR
(c) APERAK
(d) IFTMBC
Answer:
(c) APERAK

10. (a) Segment Terminator
(b) : – component data
(c) ? – data element separator
(d). – decimal point
Answer:
(c) ? – data element separator

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Important Years To Remember:

1975First EDI standards were released by TDCC
1977Drafting and using an EDI project begin
1978TDCC is renamed as Electronic Data Interchange Association (EDIA)
1979ANSI ASC developed ANSI X12
1985UN created the EDIFACT
1986UN/EDIFACT is officially proposed
1987UN / EDIFACT syntax rules were approved

Part B

Short Answers

Question 1.
What is VAN?
Answer:
A value-added network is a company, that is based on its own network, offering EDI services to other businesses. A value-added network acts as an intermediary between trading partners. The principal operations of value-added networks are the allocation of access rights and providing high data security.

Question 2.
What are the types of EDI?
Answer:

  1. Direct EDI
  2. EDI via VAN
  3. EDI via FTP/VPN, SFTP, FTPS
  4. Web EDI
  5. Mobile EDI

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 3.
Write a short note on the Segment Table?
Answer:
Segment Tables:
The segment table lists the message tags. It contains the tags, tag names, requirements designator, and repetitation field. The requirement designator may be mandatory (M) or conditional (C). The (M) denotes that the segment must appear atleast once. The (C) denotes that the segment may be used if needed.

Question 4.
Mention some International accepted EDI Standards.
Answer:

  • EDIFACT
  • XML
  • ANSI
  • ASC XI2,

Part C

Brief Answers

Question 1.
Write a short note on EDIFACT Structure.
Answer:

  • EDIFACT is a hierarchical structure where the top level is referred to as an interchange, and lower levels contain multiple messages.
  • The messages consist of segments, which in turn consist of composites.
  • The final iteration is a data element.

Question 2.
What is EDI interchange?
Answer:

  • The top-level of the EDIFACT structure is Interchange.
  • An interchange may contain multiple messages.
  • It starts with UNB and ends with UNZ

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 3.
What is the EDI segment?
Answer:

  • A segment is a three-character alphanumeric code.
  • These segments are listed in segment tables.
  • Segments may contain one, or several related user data elements.

Question 4.
Write a note on EDI Interchange?
Answer:
EDI Interchange:
Interchange is also called an envelope. The top-level of the EDIFACT structure is Interchange. An interchange may contain multiple messages. It starts with UNB and ends with UNZ.

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Part D

Detailed Answers

Question 1.
Explain EDI standards?
Answer:
EDI Standards:

  • The standard is the most critical part of the entire EDI. Since EDI is the data transmission and information exchange in the form of an agreed message format, it is important to develop a unified EDI standard.
  • The EDI standard is mainly divided into the following aspects: basic standards, code-standards, message standards, document standards, management standards, application standards, communication standards, and security standards.
  • The first industry-specific EDI standard was the TDCC published by the Transportation Data Coordinating Committee in 1975.
  • Then other industries started developing unique standards based on their individual needs. E.g. WINS in the warehousing industry.
  • Since the application of EDI has become more mature, the target of trading operations is often not limited to a single industry.
  • In 1979, the American National Standards Institute Accredited Standard Committee (ANSI ASC) developed a wider range of EDI standards called ANSI XI2.
  • On the other hand, the European region has also developed an integrated EDI standard. Known as GTDI (Guideline for Trade Data Interchange).
  • ANSI X12 and GTDI have become the two regional EDI standards in North America and Europe respectively.
  • After the development of the two major regional EDI standards and a few years after the trial, the two standards began to integrate and conduct research and development of common EDI standards.
  • Subsequently, the United Nations Economic Commission for Europe (UN/ECE/WP.4) hosted the task of the development of international EDI standards. In 1986, UN/EDIFACT is officially proposed. The most widely used EDI message standards are the United Nations EDIFACT and the ANSI X12.

Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI

Question 2.
Draw the structure of the UN/EDIFACT message.
Samacheer Kalvi 12th Computer Applications Guide Chapter 18 Electronic Data Interchange – EDI 1

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Science Guide Pdf Chapter 7 Python Functions Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Science Solutions  Chapter 7 Python Functions

12th Computer Science Guide Python Functions Text Book Questions and Answers

I. Choose the best answer (I Marks)

Question 1.
A named blocks of code that are designed to do one specific job is called as
a) Loop
b) Branching
c) Function
d) Block
Answer:
c) Function

Question 2.
A Function which calls itself is called as
a) Built-in
b) Recursion
c) Lambda
d) return
Answer:
b) Recursion

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 3.
Which function is called anonymous un-named function PTA –
a) Lambda
b) Recursion
c) Function
d) define
Answer:
a) Lambda

Question 4.
Which of the following keyword is used to begin the function block?
a) define
b) for
c) finally
d) def
Answer:
d) def

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 5.
Which of the following keyword is used to exit a function block?
a) define
b) return
c) finally
d) def
Answer:
b) return

Question 6.
While defining a function which of the following symbol is used.
a) ; (semicolon)
b) . (dot)
c) : (colon)
d) $ (dollar)
Answer:
c): (colon)

Question 7.
In which arguments the correct positional order is passed to a function?
a) Required
b) Keyword
c) Default’
d) Variable-length
Answer:
a) Required

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 8.
Read the following statement and choose the correct statement(s).
I) In Python, you don’t have to mention the specific data types while defining function.
II) Python keywords can be used as function name.
a) I is correct and II is wrong
b) Both are correct
c) I is wrong and II is correct
d) Both are wrong
Answer:
a) I is correct and II is wrong

Question 9.
Pick the correct one to execute the given statement successfully, if ………… : print
(x, ” is a leap year”)
a) x%2=0
b) x%4==0
c) x/4=0
d) x%4=0
Answer:
b) x%4==0

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 10.
Which of the following keyword is used to define the function testpython(): ?
a) define
b) pass
c) def
d) while
Answer:
c) def

II. Answer the following questions (2 Marks)

Question 1.
What is a function?
Answer:
Functions are named blocks of code that are designed to do a specific job. If you need to perform that task multiple times throughout your program, you just call the function dedicated to handling that task.

Question 2.
Write the different types of functions.
Answer:

  1. User-defined functions
  2. Built-in functions
  3. Lambda functions
  4. Recursive functions

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 3.
What are the main advantages of function?
Answer:

  • It avoids repetition and makes high degree of code reusing.
  • It provides better modularity for your application.

Question 4.
What is meant by scope of variable? Mention its types.
Answer:

  • Scope of variable refers to the part of the program, where it is accessible, i.e., area where the variables can refer (use).
  • The scope holds the current set of variables and their values.
  • The two types of scopes are – local scope and global scope

Question 5.
Define global scope.
Answer:
A variable, with global scope can be used anywhere in the program. It can be created by defining a variable outside the scope of any function/block.

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 6.
What is the base condition in a recursive function
Answer:

  • A recursive function calls itself. Imagine a process would iterate indefinitely if not stopped by some condition. Such a process is known as infinite iteration.
  • The condition that is applied in any recursive function is known as a base condition.
  • A base condition is must in every recursive function otherwise it will continue to execute like an infinite loop.

Question 7.
How to set the limit for recursive function? Give an example.
Answer:
Python also allows you to change the limit using sys.setrecursionlimit (limit value).
Example:
import sys
sys.setrecursionlimit(3000)
def fact (n):
if n = = 0:
return 1
else:
return n * fact (n – 1)
print (fact (2000))

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

III. Answer the following questions (3 Marks)

Question 1.
Write the rules of the local variable.
Answer:

  • A variable with a local scope can be accessed only within the function or block that it is created in.
  • When a variable is created inside the function/block, the variable becomes local to it.
  • A local variable only exists while the function is executing.
  • The format arguments are also local to function.

Question 2.
Write the basic rules for a global keyword in python.
Answer:

  • When we define a variable outside a function, it’s global by default. We don’t have to use the global keyword.
  • We use a global keyword to read and write a global variable inside a function.
  • Use of global keyword outside a function has no effect.

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 3.
What happens when we modify the global variable inside the function?
Answer:
It will change the global variable value outside the function also.

Question 4.
Differentiate ceil() and floor() function?

Cell()

Floor ()

ceil () returns the smallest integer greater than or equal to the given value.floor() returns the largest integer less than or equal to the given value.

Question 5.
Write a Python code to check whether a given year is leap year or not
Answer:
n = int (input(“Enter any year”))
if (n % 4 = = 0):
print “Leap year”
else:
print “Not a Leap year”
Output:
Enter any year 2001
Not a Leap year

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 6.
What is a composition in functions?
Answer:

  • The value returned by a function may be used as an argument for another function in a nested manner is called composition.
  • For example, if we wish to take a numeric value or an expression as a input from the user, we take the input string from the user using the function input() and apply eval() function to evaluate its value

Question 7.
How recursive function works?
Answer:

  • Recursive function is called by some external code.
  • If the base condition is met then the program gives meaningful output and exits.
  • Otherwise, the function does some required processing and then calls itself to continue recursion.

Question 8.
What are the points to be noted while defining a function?
Answer:

  • Function blocks begin with the keyword “def”followed by function name and parenthesis() .
  • Any input parameters or arguments should be placed within these parentheses when you define a function.
  • The code block always comes after colon(;) and is indented.
  • The statement “return [expression]” exits a function, optionally passing back an expression to the caller.
  • A “return” with no arguments is the same as return None.

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

IV. Answer the following questions (5 Marks)

Question 1.
Explain the different types of function with an example.
Answer:

Functions

Description

User-defined functionsFunctions defined by the users themselves
Built-in functionsFunctions that are inbuilt within Python.
Lambda functionsFunctions that are anonymous un-named function.
Recursive functionsFunctions that call themselves is known as recursive.

1. User-defined function:
Functions defined by the users themselves are called User-defined functions.
Syntax:
def :
< Block of statement >
return < expression / None>
Example:
def welcome():
print(“Welcome to Python”)
return

2. Built-in functions:
Functions which are using Python libraries are called Built-in functions.
Example:
x=20
y=-23
print(‘First number = ” ,x)
print(‘Second number = ” ,y)
Output:
First number = 20
Second number = 23
3. Lambda function:

  • Lambda function is mostly used for creating small and one-time anonymous function.
  • Lambda functions are mainly used in combination with the functions like filter]), map]) and reduce]).
    Syntax of Lambda function (Anonymous Functions):
    lambda [argument(s)]: expression

Example:
sum = lambda arg1, arg2: arg1 + arg2
print (The Sum is :’, sum(30, 40)
print (The Sum is sum(-30, 40)

Output:
The Sum is: 70
The Sum is: 10

4. Recursive function:

  • A recursive function calls itself. Imagine a process would iterate indefinitely if not stopped by some condition! Such a process is known as infinite iteration.
  • The condition that is applied in any recursive function is known as a base condition.
  • A base condition is must in every recursive function otherwise it will continue to execute like an infinite loop.
  • Overview of how recursive function works:
  • Recursive function is called by some external code.
  • If the base condition is met then the. program gives meaningful output and exits.
  • Otherwise, function does some required processing and then calls itself to continue recursion.
    Here is an example of recursive function used to calculate factorial.

Example:
def fact(n):
if n==0:
return 1
else:
return n * fact (n-1)
print (fact (0))
print (fact (5))

Output:
1
120

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 2.
Explain the scope of variables with an example.
Answer:
Scope of Variables:
Scope of variable refers to the part of the program, where it is accessible, i.e., an area where you can refer (use) it. We can say that scope holds the current set of variables and their values.
The two types of scopes are local scope and global scope.

(I) Local scope:
A variable declared inside the function’s body or in the local scope is called a local variable.

Rules of local variable:

  1. A variable with local scope can be accessed only within the function/block that it is created in.
  2. When a variable is created inside the function/block; the variable becomes local to it.
  3. A local variable only exists while the function is executing.
  4. The formate arguments are also local to function.

Example: Create a Local Variable
def loc ( ):
y = 0 # local scope
print (y)
loc ( )
Output:
0
(II) Global Scope:
A variable, with global scope can be used anywhere in the program. It can be created by defining a variable outside the scope of any function/block.

Rules of global Keyword:
The basic rules for global keyword in Python are:

  1. When we define a variable outside a function, it’s global by default. You don’t have to useglobal keyword.
  2. We use global keyword to read and write a global variable inside a function.
  3. Use of global keyword outside a function has no effect

Example: Global variable and Local variable with same name
x = 5 def loc ( ):
x = 10
print (“local x:”, x)
loc ( )
print (“global x:”, x)
Output:
local x: 10
global x: 5
In the above code, we used same name ‘x’ for both global variable and local variable. We get a different result when we print same variable because the variable is declared in both scopes, i.e. the local scope inside the function loc() and global scope outside the function loc ( ).
The output:- local x: 10, is called local scope of variable.
The output: – global x: 5, is called global scope of variable.

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 3.
Explain the following built-in functions.
Answer:
a) id()
b) chr()
c) round ()
d) type()
e) pow()
Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions 1
Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions 2

Question 4.
Write a Python code to find the L.C.M. of two numbers.
Answer:
Program:
# Python Program to find the L.C.M. of two input number
defcompute_lcm(x, y):
# choose the greater number
if x > y:
greater = x
else:
greater = y
while (True):
if((greater % x == 0) and (greater % y == 0)):
1cm = greater
break
greater += 1
return 1cm
num1=int(input(//Enter first number=”))
num2=int(input(“Enter second number=”))
print
(“The L.C.M. is”, compute_lcm(num1, num2))
Output:
Enter first number=8
Enter second number=4
The L.C.M. is 8

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 5.
Explain the recursive function with an example.
Answer:
Python recursive functions
When a function calls itself is known as recursion. Recursion works like loop but sometimes it makes more sense to use recursion than loop. You can convert any loop to recursion.
A recursive function calls itself. Imagine a process would iterate indefinitely if not stopped by some condition! Such a process is known as infinite iteration. The condition that is applied in any recursive function is known as base condition. A base condition is must in every recursive function otherwise it will continue to execute like an infinite loop.

Working Principle:

  1. Recursive function is called by some external code.
  2. If the base condition is met then the program gives meaningful output and exits.
  3. Otherwise, function does some required processing and then calls itself to continue recursion. Here is an example of recursive function used to calculate factorial.

Example:
def fact (n):
if n = = 0:
return 1
else:
return n * fact (n – 1)
print (fact (0))
print (fact (5))
Output:
1
120

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

12th Computer Science Guide Python Functions Additional Questions and Answers

I. Choose the best answer

Question 1.
The name of the function is followed by ………………………….
(a) ( )
(b) [ ]
(c) <>
(d) { }
Answer:
(a) ( )

Question 2.
Which of the following provides better modularity for your python application
a) tuples
b) function
c) dictionaries
d) control structures
Answer:
b) function.

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 3.
How many types of functions are there in python?
a) 3
b) 2
c) 4
d) 5
Answer:
c) 4

Question 4.
Functions that call itself are known as
a) User-defined
b) Built-in
c) Recursive
d) Lambda
Answer:
c) Recursive

Question 5.
If the return has no argument, …………………………….. will be displayed as the last statement of the output.
(a) No
(b) None
(c) Nothing
(d) No value
Answer:
(b) None

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 6.
In which of the following the number of arguments in the function call should match exactly with the function definition?
a) Keyword arguments
b) Required arguments
c) Default arguments
d) Variable-length arguments
Answer:
b) Required arguments

Question 7.
Which of the following is used to define variable-length arguments?
a) $
b) *
c) #
d) //
Answer:
b) *

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 8.
What is the symbol used to denote variable-length arguments?
(a) +
(b) *
(c) &
(d) ++
Answer:
(b) *

Question 9.
Which function can take any number of arguments and must return one value in the form of an expression?
a) user-defined
b) recursive
c) default
d) lambda
Answer:
d) lambda

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 10.
How many return statement is executed at runtime?
a) 2
b) multiple
c) 3
d) 1
Answer:
d) 1

Question 11.
How many types of scopes in Python?
a) 3
b) 4
c) many
d) 2
Answer:
d) 2

Question 12.
Lambda functions cannot be used in combination with ………………………….
(a) Filter
(b) Map
(c) Print
(d) Reduce
Answer:
(c) Print

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 13.
Function blocks begin with the keyword …………………
a) Fun
b) Definition
c) Function
d) Def
Answer:
d) Def

Question 14.
………………. function can only access global variables.
a) user-defined
b) recursive
c) Lambda
d) return
Answer:
c) Lambda

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 15.
Find the correct one:
(a) Global keyword outside the function has no effect
(b) Global keyword outside the function has an effect
Answer:
(a) Global keyword outside the function has no effect

II. Answer the following questions (2 and 3 Marks)

Question 1.
Define nested blocks?
Answer:
Nested Block:
A block within a block is called a nested block. When the first block statement is indented by a single tab space, the second block of statement is indented by double tab spaces.

Question 2.
Differentiate parameters and arguments.
Answer:

Parameters

Arguments

Parameters are the variables used in the function definition.Arguments are the values we pass to the function parameters.

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 3.
Differentiate parameters and arguments?
Answer:
Parameters are the variables used in the function definition whereas arguments are the values we pass to the function parameters.

Question 4.
Write the syntax of variable-length arguments.
Answer:
def function_name(*args):
function_body
return_statement

Question 5.
What are the methods used to parse the arguments to the variable length arguments?
Answer:
In Variable Length arguments, we can parse the arguments using two methods.

  • Non-keyword variable arguments
  • Keyword variable arguments

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 6.
What is a local variable?
Answer:
A variable declared inside the function’s body or in the local scope is known as a local variable.

Question 7.
What are the two methods of passing arguments in variable-length arguments?
Answer:
In Variable Length arguments, we can pass the arguments using two methods.

  1. Non-keyword variable arguments
  2. Keyword variable arguments

Question 8.
Write a note on return statement?
Answer:
The return Statement

  1. The return statement causes your function to exit and returns a value to its caller. The point of functions in general is to take inputs and return something.
  2. The return statement is used when a function is ready to return a value to its caller. So, only one return statement is executed at run time even though the function contains multiple return statements.
  3. Any number of ‘return’ statements are allowed in a function definition but only one of them is executed at run time.

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 9.
Write a note on min (), max () and sum () with an example
Answer:
Function: min ()
Description: Returns the minimum value in a list.
Syntax: min (list)
Example:
My List = [21,76,98,23]
print (‘Minimum of My List:’,
min(My List))
Output:
Minimum of My List: 21
Function.: max ()
Description:
Returns the maximum value in a list.
Syntax : min (list)
Example:
My List = [21,76,98,23]
print (‘maximum of My List :‘, max
(my list)
Output:
Maximum of My List: 98
Function : sum ()
Description:
Returns the sum of values in a list.
Syntax :sum (list)
Example:
My List = [21,76,98,23]
print (Sum of My List :‘, sum(My List))
Output:
Sum of My List :218

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 10.
Write a note on the floor, cell () and sqrt () with an example
Answer:
Function: floor ()
Description: Returns the largest integer
less than or equal to x.
Syntax: math.floor (x)
Example:
x=26.7
y=-26.7
print (math.floor (x))
print (math.floor (y))
Output:
26
-27
Function: ceil ()
Description: Returns the smallest integer greater than or equal to x.
Syntax: math.ceil (x)
Example:
x=26.7
y=-26.7
print (math.ceil (x))
print (math.ceil (y))
Output:
27
-26 . ‘
Function : sqrt ()
Description: Returns the square root of x (Note: x must be greater than zero) Syntax: sqrt (x)
Example:
a=49
b= 25
print (math.sqrt (a))
print (math.sqrt (b))
Output:
7.0
5.0

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

Question 11.
Write a note on the format () with an example.
Answer:
Function: format ()
Description:
Returns the output based on the given format.

  • Binary format: Outputs the number in base 2.
  • Octal format: Outputs the number in base 8.
  • Fixed-point notation: Displays the number as a fixed-point number. The default precision is 6.

Syntax : format (value [‚format_spec])
Example:
x=14
y=25
print (‘x value in binary :’,format(x/b’))
print (‘y value in octal ^formatfy/o’))
print(‘y value in Fixed-point no ‘,format(y/f’))
Output:
x value in binary: 1110
y value in octal: 31
y value in Fixed-point no : 25.000000

Samacheer Kalvi 12th Computer Science Guide Chapter 7 Python Functions

III. Answer the following questions (5 Marks)

Question 1.
Explain different types of arguments used in python with an example.
Answer:

  • Arguments are used to call a function.
  • There are primarily four types of functions namely:
    1. Required arguments
    2. Keyword arguments,
    3. Default arguments
    4. Variable-length arguments.

Required Arguments:

  • “Required Arguments” are the arguments passed to a function in correct positional order.
  • The number of arguments in the function call should match exactly with the function definition.
  • Atleast one parameter to prevent syntax errors to get the required output.

Example:
defprintstring(str):
print (“Example – Required arguments”)
print (str)
return
# Now you can call printstring() function
printstring (“Welcome”)

Output:
Example – Required arguments Welcome
When the above code is executed, it
produces the following error.
Traceback (most recent call last):
File “Req-arg.py”, line 10, in < module >
printstring()
TypeError: printstring() missing 1
required positional argument: ‘str’
Instead of printstring() in the above code if we use printstring (“Welcome”) then the output is
Output:
Example – Required arguments Welcome

Keyword Arguments:

  • Keyword arguments will invoke the function after the parameters are recognized by their parameter names.
  • The value of the keyword argument is matched with the parameter name and so, one can also put arguments in improper order (not in order).

Example:
def printdata (name):
print (“Example-1 Keyword arguments”)
print (“Name : “:name)
return
# Now you can call printdatat() function
print data(name = “Gshan”) When the above code is executed, it produces the following output:

Output:
Example-1 Keyword arguments
Name: Gshan
Default Arguments:

  • In Python the default argument is an argument that takes a default value if no value is provided in the function call.
  • The following example uses default arguments, that prints default salary when no argument is passed.

Example:
def printinfo( name, salary = 3500):
print (“Name:”, name)
print (“Salary: “, salary)
return
printinfo(“Mani”)
When the above code is executed, it produces the following output

Output:
Name: Mani
Salary: 3500
When the above code is changed as print info(“Ram,”:2000) it produces the following

Output:
Name: Ram
Salary: 2000

Variable-Length Arguments:

  • In some instances, it is needed to pass more arguments that have already been specified.
  • These arguments are not specified in the function’s definition and an asterisk (*) is used to define such arguments.
  • These types of arguments are called Variable-Length arguments.

Syntax:
def function_name(*args):
function_body
return_statement

Example:
def printnos (*nos):
for n in nos:
print(n)
return
# now invoking the printnos() function
print (‘Printing two values’)
printnos (1,2)
Print (‘Printing three values’)
printnos (10,20,30)

Output:
Printing two values
1
2
Printing three values
10
20
30

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Science Guide Pdf Chapter 6 Control Structures Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Science Solutions Chapter 6 Control Structures

12th Computer Science Guide Control Structures Text Book Questions and Answers

I. Choose the best answer (1 Mark)

Question 1.
How many important control structures are there in Python?
a) 3
b) 4
c) 5
d) 6
Answer:
a) 3

Question 2.
elif can be considered to be abbreviation of
a) nested if
b) if..else
c) else if
d) if..elif
Answer:
c)else if

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 3.
What plays a vital role in Python programming?
a) Statements
b) Control
c) Structure
d) Indentation
Answer:
d) Indentation

Question 4.
Which statement is generally used as a placeholder?
a) continue
b) break
c) pass
d) goto
Answer:
c) pass

Question 5.
The condition in the if statement should be in the form of
a) Arithmetic or Relational expression
b) Arithmetic or Logical expression
c) Relational or Logical expression
d) Arithmetic
Answer:
c) Relational or Logical expression

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 6.
Which is the most comfortable loop?
a) do..while
b) while
c) for
d) if..elif
Answer:
c) for

Question 7.
What is the output of the following snippet?
i=l
while True:
if i%3 ==0:
break
print(i/end=”)
i +=1
a) 12
b) 123
c) 1234
d) 124
Answer:
a) 12

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 8.
What is the output of the following snippet?
T=1
while T:
print(True)
break
a) False
b) True
c) 0
d) no output
Answer:
b) True

Question 9.
Which amongst this is not a jump statement ?
a) for
b) goto
c) continue
d) break
Answer:
a) for

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 10.
Which punctuation should be used in the blank?
if < condition >
statements-block 1
else:
statements-block 2
a) ;
b) :
c) ::
d) !
Answer:
b) :

II. Answer the following questions (2 Marks)

Question 1.
List the control structures in Python.
Answer:
There are three important control structures

  1. Sequential
  2. Alternative or Branching
  3. Iterative or Looping

Question 2.
Write note on break statement.
Answer:

  • The break statement terminates the loop containing it.
  • Control of the program flows to the statement immediately after the body of the loop.
  • When the break statement is executed, the control flow of the program comes out of the loop and starts executing the segment of code after the loop structure.
  • If break statement is inside a nested loop (loop inside another loop), break will terminate the innermost loop.

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 3.
Write is the syntax of if..else statement
Answer:
Syntax:
if:
statements – block 1
else:
statements – block 2

Question 4.
Define control structure.
Answer:
A program statement that causes a jump of control from one part of the program to another is called a control structure or control statement.

Question 5.
Write note on range () in loop
Answer:
Usually in Python, for loop uses the range() function in the sequence to specify the initial, final and increment values. range() generates a list of values starting from start till stop – 1.

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

III. Answer the following questions (3 Marks)

Question 1.
Write a program to display
Answer:
A
AB
ABC
ABCD
ABCDE
For i in range (1,6,1):
ch=65
for j in range (ch,ch+i,1):
a=chr(j)
print (a, end =’ ‘)
print ()

Question 2.
Write note on if..else structure.
Answer:
The if-else statement provides control to check the true block as well as the false block. Following is the syntax of ‘if-else’ statement.
Syntax:
if:
statements – block 1
else:
statements – block 2

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 3.
Using if..else..elif statement write a suitable program to display largest of 3 numbers.
Answer:
a = int (input (“Enter number 1″)
b = int (input (” Enter number 2″)
c = int (input (” Enter number 3″)
if a > b and a > c:
put (” A is greatest”)
elif b > a and b > c:
print (“B is greatest”)
else:
print (“C is greatest”)

Question 4.
Write the syntax of while loop.
Answer:
The syntax of while loop in Python has the following syntax:
Syntax:
while:
statements block 1
[else:
statements block 2]

Question 5.
List the differences between break and continue statements.
Answer:

Break

Continue

Break statement terminates the loop containing it and control reaches after the body of the loopContinue statement skips the remaining part of a loop and start with next iteration.

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

IV. Answer the following questions (5 Marks)

Question 1.
Write a detail note on for loop
Answer:
for loop:

  • for loop is the most comfortable loop. It is also an entry check loop.
  • The condition is checked in the beginning and the body of the loop
    (statements-block 1) is executed if it is only True otherwise the loop is not executed.

Syntax:
for counter_variable in
sequence:
statements – block 1
[else: # optional block statements – block 2]

  • The counter, variable mentioned in the syntax is similar to the control variable that we used in the for loop of C++ and the sequence refers to the initial, final and increment value.
  • Usually in Python, for loop uses the range () function in the sequence to specify the initial, final and increment values, range () generates a list of values starting from start till stop-1.

The syntax of range() follows:
range (start, stop, [step])
Where,
start – refers to the initial value
stop – refers to the final value
step – refers to increment value,
this is optional part.

Examples for range():
range (1,30,1) – will start the range of values from 1 and end at 29 range (2,30,2) – will start the range of values from 2 and end at 28 range (30,3,-3) – will start the range of values from 30 and end at 6E range (20) – will consider this value 20 as the end value ( or upper limit) and starts the range count from 0 to 19 (remember always range () will work till stop -1 value only)

Example-Program:
#Program to illustrate the use of for loop – to print single digit even number
for i in range (2,10,2):
print (i, end=”)

Output:
2468
Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures 1

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 2.
Write a detail note on if..else..elif statement with suitable example.
Answer:

  • When we need to construct a chain of if statement(s) then ‘elif’ clause can be
    used instead of ‘else’.
    Syntax:
    if < condition -1>:
    statements-block 1
    elif< condition -2>:
    statements-block 2
    else:
    statements-block n
  • In the syntax of if..elif ..else mentioned above, condition -1 is tested if it is true then statements-block 1 is executed, otherwise, the control checks condition-Z, if it is true statements- block2 is executed and even if it fails statements-block n mentioned in else part is executed.
  • ‘elif’ clause combines if..else- if ..else statements to one if..elif … else, “elif’ can be considered to be abbreviation of ‘else if’. In an’if’ statement there is no limit of ‘elif’ clause that can be used, but an clause if used should be placed at the end.

Example:

# Program to illustrate the use of nested if statement
Average – Grade
> =80 and above A
> =70 and above B
> =60 and <70 C
> =50 and <60 D
Otherwise E

Example-program
m1 = int (input(“Enter mark in first subject:”))
m2 = int (input(” Enter mark in second subject:”))
avg = (ml+ml)/2
if avg> =80:
print (“Grade: A”)
elif avg> =70 and avg< 80:
print (“Grade: B”)
elif avg> =60 and avg< 60:
print (“Grade: C”)
elif avg> =50 and avg< 60: .
print (“Grade: D”)
else:
print(“Grade: E”)

Output 1:
Enter mark in first
subject: 34
Enter mark in second
subject: 78
Grade: D

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 3.
Write a program to display all 3 digit odd numbers.
Answer:
Odd Number (3 digits)
for a in range (100, 1000)
if a % 2 = = 1:
print b
Output:
101, 103, 105, 107, .. …… 997, 999

Question 4.
Write a program to display multiplication table for a given number.
Answer:
Coding:
num=int(input(“Display Multiplication Table of “))
for i in range(1,11):
print(i, x ,num, ‘=’, num*i)
Output:
Display Multiplication Table of 2
1 x 2 = 2
2 x 2 = 4
3 x 2 = 6
4 x 2 = 8
5 x 2 = 10
6 x 2 = 12
7 x 2 =14
8 x 2 = 16
9 x 2 =18
10 x 2 = 20
>>>

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

12th Computer Science Guide Control Structures Additional Questions and Answers

I. Choose the best answer ( I Mark)

Question 1.
Executing a set of statements multiple times are called…………………………..
(a) Iteration
(b) Looping
(c) Branching
(d) Both a and b
Answer:
(d) Both a and b

Question 2.
………… important control structures are available in python.
a) 2
b) 3
c) 4
d) many
Answer:
b) 3

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 3.
Identify which is not a control structure?
(a) Sequential
(b) Alternative
(c) Iterative
(d) Break
Answer:
(d) Break

Question 4.
To construct a chain of if statement, else can be replaced by
a) while
b) ifel
c) else if
d) elif
Answer:
d) elif

Question 5.
Branching statements are otherwise called……………………………
(a) Alternative
(b) Iterative
(c) Loop
(d) Sequential
Answer:
(a) Alternative

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 6.
Which statement is used to skip the remaining part of a loop and start with the next iteration?
a) continue
b) break
c) pass
d) condition
Answer:
a) continue

Question 7.
In the …………….. loop, the condition is any valid Boolean expression returning True or false.
a) if
b) else
c) elif
d) while
Answer:
d) while

Question 8.
How many blocks can be given in Nested if.. elif.. else statements?
(a) 1
(b) 2
(c) 3
(d) n
Answer:
(d) n

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 9.
A loop placed within another loop is called as …………… loop structure.
a) entry check
b) exit check
c) nested
d) conditional
Answer:
c) nested

Question 10.
What types of Expressions can be given in the while loop?
(a) Arithmetic
(b) Logical
(c) Relational
(d) Boolean
Answer:
(d) Boolean

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

II. Answer the following questions (2 and 3 Marks)

Question 1.
Write a note on sequential statements?
Answer:
A sequential statement is composed of a sequence of statements which are executed one after another. A code to print your name, address, and phone number is an example of a sequential statement.

Question 2.
Write the syntax of for loop.
Answer:
Syntax:
for counter_variable in sequence:
statements-block 1
[else: # optional block
statement-block 2]

Question 3.
Define loops?
Answer:
Iteration or loop are used in a situation when the user needs to execute a block of code several times or till the condition is satisfied. A loop statement allows executing a statement or group of statements multiple times.

Question 4.
What is meant by Nested loop structure?
Answer:

  • A loop placed within another loop is called a nested loop structure.
  • A while; within another while; for within another for;
  • For within while and while within for to construct nested loops.

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 5.
Give the syntax of range O in for loop?
Answer:
The syntax of range ( ) is as follows:
range (start, stop, [step] )
Where,
start – refers to the initial value
stop – refers to the final value
step – refers to increment value, this is an optional part.

Question 6.
Write a note on the pass statement.
Answer:

  • pass statement in Python programming is a null statement.
  • pass statement when executed by the interpreter it is completely ignored.
  • Nothing happens when the pass is executed, it results in no operation.

III. Answer the following questions (5 Marks)

Question 1.
Explain the types of alternative or branching statements provided by Python?
Answer:
The types of alternative or branching statements provided by Python are:

  1. Simple if statement
  2. if..else statement
  3. if..elif statement

1) Simple if statement
Simple if is the simplest of all decision-making statements. The condition should be in the form of relational or logical expression.
Syntax:
if:
statements-block1
Example:
x=int (input(“Enter your age :”))
if x > =18:
print (“You are; eligible for voting”)
Output:
Enter your age :34
You are eligible for voting

2) if..else statement
The if.. else statement provides control to check the true block as well as the false block. Following is the syntax of ‘if..else statement.
Syntax:
if:
statements-block 1
else:
statements-block 2
Example:
a = int(input(” Enter any number :”))
if a%2==0:
print (a, ” is an even number”) else:
print (a, ” is an odd number”)
Output 1:
Enter any number:56
56 is an even number
Output 2:
Enter any number:67
67 is an odd number
Flowchart- if..else statement Execution
Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures 2
3) Nested if..elif…else statement:

  • When we need to construct a chain of if statement(s) then ‘elif’ clause can be used instead of ‘else.
  • ‘elif’ clause combines if..else-if.. elsestatements to one if ..elif… else. elif can be considered to be abbreviation of else if.
  • In an ‘if statement there is no limit of ‘elif clause that can be used, but an ‘else clause if used should be placed at the end.

Syntax:
if<statements-block 1>:
elif :
statements-block 2
else:
statements-block n
Example:
a = int (input (“Enter number 1″)
b = int (input (” Enter number 2″)
c = int (input (” Enter number 3″)
if a > b and a > c:
put (” A is greatest”)
elif b > a and b > c:
print (“B is greatest”)
else:
print (“C is greatest”)

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 2.
Explain while loop with example.
Answer:

  • While loop belongs to entry check loop type, that is it is not executed even once
    if the condition is tested False in the beginning.
  • In the while loop, the condition is any valid Boolean expression returning
    True or False.
  • The else part of while is optional part of while. The statements blocki is kept
    executed till the condition is True.
  • If the else part is written, it is executed when the condition is tested False.

Syntax:
while< condition >:
statements block 1
[else:
statements block 2]
Flowchart-while loop execution:
Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures 3
Example:

i=10# intializing part of the control variable
while (i<=15):# test condition
print (i,end=,\t/)# statements – block1
i=i+1# Updation of the control variable

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 3.
Explain the Jump statement in python.
Answer:

  • The jump statement in Python is used to unconditionally transfer the control from one part of the program to another.
  • There are three keywords to achieve jump statements. in Python: break, continue, pass.

Flowchart -Use of break, continue statement in loop structure:

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures 4

  • break statement:
  • The break statement terminates the loop containing it.
  • Control of the program flows to the statement immediately after the body of the loop.
  • A while or for loop will iterate till the condition is tested false, but one can even transfer the control out of the loop (terminate) with help of a break statement.
  • When the break statement is executed, the control flow of the program comes out of the loop and starts executing the segment of code after the loop structure.
  • If the break statement is inside a nested loop (loop inside another loop), the break will terminate the innermost loop. Syntax for break statement:
    break
    Example: for word in “Jump Statement”:
    ifword = = “e”:
    break print (word, end= “)
    Output: Jump Stat
    Flowchart- Working of break statement:

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures 5
Working of break statement

continue statement: Continue statement unlike the break statement is used to skip the remaining part of a loop and start with the next iteration.

Syntax of continue statement:
continue Example:
for word in “Jump Statement”:
if word = = “e”:
continue print (word, end=”)
print (“\n End of the program”)

Output:
Jump Statement
End of the program

pass statement:

  • pass statement is generally used as a placeholder.
  • When we have a loop or function that is to be implemented in the future and not now, we cannot develop such functions or loops with empty body segments because the interpreter would raise an error.
  • So, to avoid this we can use a pass statement to construct a body that does nothing.

Syntax of pass statement:
pass

Example:
forval in “Computer”:
pass
print (“End of the loop, loop structure will be built in future”)
Output: End of the loop, loop structure will be built in future

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 4.
What kind of Nested ioop structure can be created?
Answer:

  • A loop placed within another loop is called a nested loop structure.
  • A while; within another while; for within another for;
  • for within while and while within to construct nested loops.

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures 6

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures 7

HANDS-ON PRACTICE

Question 1.
Write a program to check whether the given character is a vowel or not.
Answer:
Coding:
ch=input (“Enter a character :”)
# to check if the letter is vowel
if ch in (‘a’, ‘A’, e , E , i , I , o ,O , u’, ‘U’):
print (ch/ is a vowel’)
Output:
Enter a character:e
e is a vowel

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 2.
(i) Write a program to display all 3 digit even numbers.
(ii) Write the output for the following program.
Answer:
i=1
while (i<=6):
for j in range (1, i):
print(j, end=’\t’)
print (end=’ \ n’)
i+=1
i) Python Program:
for i in range(100,1000,2):
Print(i)
ii) Output: 1
1 2
1 2 3
1 2 3 4
1 2 3 4 5

Question 3.
Write a program to check if a number is Positive, Negative or zero.
Answer:
Coding:
num = float(input(” Enter a number: “))
if num > 0:
print(“Positive number”)
elifnum == 0:
print(“Zero”)
else:
print(“Negative number”)
Output:
Enter a number:5
Positive number

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 4.
Write a program to display Fibonacci series 0112345 (up to n terms)
Answer:
Coding:
Number = int(input(“\n Please Enter the Range Number: “))
i = 0
First_ Value = 0
Second-Value = 1
while(i < Number):
if(i <= 1):
Next = i else:
Next = First-Value + Second_Value
First_Value = Second_Value
Second_Value = Next
print(Next)
i = i + 1
Output:
Please Enter the Range Number: 4
0
1
1
2
3

Question 5.
Write a program to display sum of natural numbers, up to n.
Answer:
Coding:
number = int(input(“Please Enter any Number:”))
total = 0
for value in range(l, number + 1):
total = total + value
print(“The Sum of Natural Numbers is total)
Output:
Please Enter any Number:5
The Sum of Natural Numbers is : 15

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 6.
Write a program to check if the given number is a palindrome or not.
Answer:
Coding:
n=int(input(“Enter number:”))
temp=n
rev=0
while(n>0):
dig=n%10
rev=rev*10+dig
n=n//10
if(temp==rev):
print(“The number is a palindrome!”)
else:
print(“The number isn’t a palindrome!”)
Output:
isn’t a palindrome!

Question 7.
Write a program to print the following pattern
* * * * *
* * * *
* * *
* *
*
Answer:
Coding:
number = int(input(“Please Enter Pattern Number: “))
for i in range(number,0,-l):
for j in range(1,i+1,1):
print(“*”, end”)
print()
Output:
Please Enter Pattern Number:5
* * * * *
* * * *
* * *
* *
*

Samacheer Kalvi 12th Computer Science Guide Chapter 6 Control Structures

Question 8.
Write a program to check if the year is leap year or not.
Answer:
Coding:
def leap_year(y):
.’ if (y % 400 = = 0):
print(y, “is the leap year”)
elif(y%4 = = 0):
print(y, “is the leap year”)
else:
print(y, “is not a leap year”)
year = int(input(“Enter a year…”)
print(leap_year(year))
Output:
Enter a year… 2007
2007 is the leap year

Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Business Maths Guide Pdf Chapter 5 Numerical Methods Miscellaneous Problems Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Business Maths Solutions Chapter 5 Numerical Methods Miscellaneous Problems

Question 1.
If f (x) = eax then show that f(0), Δf(0), Δ²f(0) are in G.P
Solution:
Given f(x) = eax
f(0) = e° = 1 ……… (1)
Δf(x) = ea(x+h) – eax
= e ax+ah – eax
= eax. eah – eax
= eax (eah – 1)
Δf(0) = e° (eah – 1)
= (eah – 1) …….. (2)
Δ²f(x)= Δ [Δf(x)]
= Δ [ea(x+h) – eax]
[ea(x+h+h) – ea(x+h)] – [ea(x+h) – eax]
= ea(x+2h) – ea(x+h) – ea(x+h) + eax
Δ²f(0) = Δ [Δf(x)]
= ea(2h) – ea(h) – ea(h) + e0
= e2ah – eah – eah + 1
= (eah)² – 2eah + 1
= [eah – 1]² ………… (3)
from (1), (2) & (3)
[t2]² =[Δf(0)]² = (eah – 1)²
t1 × t3 = f(0) × Δ²f(0)
= (1)(eah – 1)² = (eah – 1)²
⇒ [Δf(0)]² = f(0) × Δ²f(0)
∴ f(0), Δf(0), Δ²f(0) an is G.P.

Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems

Question 2.
Prove that
(i) (1 + Δ) (1 – ∇) = 1
(ii) Δ∇ = Δ – ∇
(iii) EV = Δ = ∇E
Solution:
(i) LHS = (1 + Δ) (1 – ∇)
= (E) (E-1) = E1-1
= E° = 1
= RHS
Hence proved.

(ii) LHS = Δ∇
= (E – 1)(1 – E-1)
= E – EE-1 + E-1
= E – 1 – 1 – E-1
= E – 2 – E-1 ………… (1)
RHS = Δ – ∇
= (E – 1) -(1 – E-1)
= E – 1 – 1 + E-1
= E – 2 + E-1 ………. (2)
from (1) & (2) LHS = RHS
Hence proved.

Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems

(iii) E∇ = EE-1Δ [∵ ∇ = E-1Δ]
= Δ ……… (1)
∇E = E-1 ΔE
= E-1
= Δ ………. (2)
from (1) (2)
E∇ = Δ = ∇E

Question 3.
A second degree polynomial passes though the point (1, -1) (2, -1) (3, 1) (4, 5). Find the polynomial.
Solution:
Points are (1, -1), (2, -1), (3, 1) and (4, 5)
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 1
we will use Newton’s backward interpolation formula to find the polynomial.
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 2
= 5 + (x – 4) (4) + (x – 4) (x – 3) + 0
= 5 + 4x – 16 + x² – 7x + 12
y(x) = x² – 3x + 1

Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems

Question 4.
Find the missing figures in the following table
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 3
Solution:
Here y0 = 7; y1 = 11; y2 = ?; y3 = 18; y4 = ?; y5 = 32
Since only four values of f(x) are given, the polynomial which fits the data is of degree three. Hence fourth differences are zeros.
Δ4yk = 0
(ie) (E – 1)4 yk = 0
(i.e) (E4 – 4E³ + 6E² – 4E + 1)yk = 0 ……….. (1)
Put k = 0 in (1)
(E4 – 4E³ + 6E² – 4E + 1)y0 = 0
E4 y0 – 4E3 y0 + 6E² y0 – 4E y0 + y0 = 0
y4 – 4y3 + 6y2 – 4y1 + y0 = 0
y4 – 4(18) + 6y2 – 4(11) + 7 = 0
y4 – 72 + 6y2 – 44 + 7 = 0
y4 + 6y2 = 109
(2)
Put k = 1 in (1)
(E4 – 4E3 + 6E² – 4E + 1)y1 = 0
[E4 y1 – 4E y1 + 6E² y1 – 4Ey1 + y] = 0
y5 – 4y4 + 6y3 – 4y2 + y1 = 0
32 – 4 (y4) + 6(18) — 4(y2) + 11 = 0
32 – 4y4 + 108 – 4y2 + 11 = 0
-4y4 – 4y2 + 151 = 0
4y4 + 4y2 = 151 ,……. (3)
Solving equation (1) & (2)
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 4
Substitute y2 = 14.25 in eqn (1)
y4 + 6(14.25) = 109
y4 + 25.50 = 109
y4 = 109 – 85.5
∴ y4 = 23.5
∴ Required two missing values are 14.25 and 23.5.

Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems

Question 5.
Find f (0.5) if f(-1) = 202, f(0) = 175, f(1) = 82 and f(2) = 55
Solution:
From the given data
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 5
Here we have to apply Newton’s forward interpolation formula, since the value of f(x) is required near the beginning of the table.
y(x= x0+nh) =f(x0) + \(\frac { n }{1!}\) Δf(x0) + \(\frac { n(n-1) }{2!}\) Δ²f(x0) + \(\frac { n(n-1)(n-2) }{3!}\) Δ³f(x0) + ………
Given:
x = 0.5 and h = 1
x0 + nh = x
-1 + n(1) = 0.5
n = 1 + 0.5
∴ n = 1.5
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 6
= 202 – 40.5 – 24.75 – 8.25
= 202 – 73.5
f(0.5) = 128.5

Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems

Question 6.
From the following data find y at x = 43 and x = 84
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 7
Solution:
To find y at x = 43
Since the value of y is required near the beginning of the table, we use the Newton’s forward interpolation formula.
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 8
= 184 + (0.3) (20) + (0.3) (-0.7)
= 184 + 6.0 – 0.21
= 190 + 0.21
y(x=43) = 189.79
To find y at x = 84
Since the value of y is required at the end of the table, we apply backward interpolation formula.
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 9
xn + nh = x
90 + n(10) = 84
10n = 84 – 90
10n = -6
∴ n = -0.6
y(x=84) = 304 + \(\frac { (0.6) }{1!}\) (28) + \(\frac {(0.6)(-0.6 + 1) }{2!}\)(2) +
= 304 + (0.6) (28) + \(\frac { (-0.6)(0.4) }{2}\) + 2
= 304 – 16.8 – 0.24
= 304 – 17.04
= 286.96

Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems

Question 7.
The area A of circle of diameter ‘d’ is given for the following values
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 10
Find the approximate values for the areas of circles of diameter 82 and 91 respectively.
Solution:
To find A at D = 82
Since the value of A is required near the beginning of the table. We use the Newton’s forward interpolation formula.
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 11
= 5026 + 259.2 – 4.8 – 0.128 – 0.1664
= 5285.2 – 5.0944
= 5280.1056
A = 5280.11
To find Δ at D = 91
Since the value of A is required near the beginning of the table. We use the Newton’s forward interpolation formula.
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 12
= 7854 – 1378.8 + 28.8 + 0.096 + 0.0576
= 7882.9536 – 1378.8
= 6504.1536
= 6504.15

Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems

Question 8.
If u0 = 560, u1 = 556, u2 = 520, u4 = 385, show that u3 = 465
Solution:
U0 = 560; U1 = 556; U2 = 520; U4 = 385
Since only four values of U are given, the polynomial which fits the data is of degree three. Hence fourth differences are zeros.
Δ4U0
(E – 1)4 U0 = 0
⇒ (E4 – 4E³ + 6E² – 4E + 1) U0 = 0
⇒ E4U0 – 4E³U0 + 6E²U0 – 4EU0 + U0 = 0
U4 – 4U3 + 6U2 – 4U1 + U0 = 0
385 – 4(U3) + 6 (520) – 4 (556) + 560 = 0
385 – 4(U3) + 3120 – 2224 + 560 = 0
1841 – 4U3 = 0
4U3 = 1841 ⇒ U3 = \(\frac { 1841 }{4}\)
U3 = 460.25

Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems

Question 9.
From the following table obtain a polynomial of degree y in x
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 13
Solution:
We will use Newton’s backward interpolation formula to find the polynomial.
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 14
To find y in terms of x
xn + nh = x
5 + n(1) = x
∴ n = x – 5
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 15
= 1 + 2x – 10 + 2 (x² – 9x + 20) + \(\frac { 4 }{3}\) (x – 5) (x² – 7x + 12) + \(\frac { 2 }{3}\)(x² – 9x + 20)(x² – 5x + 6)
= 1 + 2x – 10 + 2x² – 18x + 40 + \(\frac { 4 }{3}\)
[x³ – 7x² + 12x – 5x² + 35x – 60] + \(\frac { 2 }{3}\) [x4 – 5x³ + 6x² – 9x³ + 45x² – 54x + 20x² – 100x + 120]
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 16

Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems

Question 10.
Using Lagrange’s interpolation formula find a polynominal which passes through the points (0, -12), (1, 0), (3, 6) and (4, 12).
Solution:
We can construct a table using the given points.
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 17
Here x0 = 0; x1 = 1; x2 = 3; x3 = 4,
y0 = -12; y1 = 0; y2 = 6; y3 = 12
Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems 18
= (x³ – 7x² + 12x – x² + 7x – 12) – (x³ – 5x² + 4x) + (x³ – 4x² + 3x)
= (x³ – 8x² + 19x – 12) – (x³ – 5x² + 4x) + (x³ – 4x² + 3x)
= x³ – 8x² + 19x – 12 – x³ + 5x² – 4x + x³ – 4x² + 3x
∴ y = x³ – 7x² + 18x – 12

Samacheer Kalvi 12th Business Maths Guide Chapter 5 Numerical Methods Miscellaneous Problems

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Science Guide Pdf Chapter 5 Python -Variables and Operators Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Science Solutions Chapter 5 Python -Variables and Operators

12th Computer Science Guide Python -Variables and Operators Text Book Questions and Answers

I. Choose the best answer (1 Marks)

Question 1.
Who developed Python ?
a) Ritche
b) Guido Van Rossum
c) Bill Gates
d) Sunder Pitchai
Answer:
b) Guido Van Rossum

Question 2.
The Python prompt indicates that Interpreter is ready to accept instruction.
a) > > >
b) < < <
c) #
d) < <
Answer:
a) > > >

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 3.
Which of the following shortcut is used to create a new Python Program?
a) Ctrl + C
b) Ctrl + F
c) Ctrl + B
d) Ctrl + N
Answer:
d) Ctrl + N

Question 4.
Which of the following character is used to give comments in Python Program?
a) #
b) &
c) @
d) $
Answer:
a) #

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 5.
This symbol is used to print more than one item on a single line.
a) Semicolon(;)
b) Dollor($)
c) commaQ
d) Colon(:)
Answer:
c) commaQ

Question 6.
Which of the following is not a token?
a) Interpreter
b) Identifiers
c) Keyword
d) Operators
Answer:
a) Interpreter

Question 7.
Which of the following is not a Keyword in Python?
a) break
b) while
c) continue
d) operators
Answer:
d) operators

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 8.
Which operator is also called a Comparative operator?
a) Arithmetic
b). Relational
c) Logical
d) Assignment
Answer:
b) Relational

Question 9.
Which of the following is not a Logical operator?
a) and
b) or
c) not
d) Assignment
Answer:
d) Assignment

Question 10.
Which operator is also called a Conditional operator?
a) Ternary
b) Relational
c) Logical
d) Assignment
Answer:
a) Ternary

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

II. Answer the following questions (2 Marks)

Question 1.
What are the different modes that can be used to test Python Program?
Answer:
In Python, programs can be written in two ways namely Interactive mode and Script mode. The Interactive mode allows us to write codes in Python command prompt (>>>) whereas in script mode programs can be written and stored as separate file with the extension .py and executed. Script mode is used to create and edit python source file.

Question 2.
Write short notes on Tokens.
Answer:
Python breaks each logical line into a sequence of elementary lexical components known as Tokens.
The normal token types are

  1. Identifiers
  2. Keywords
  3. Operators
  4. Delimiters
  5. Literals

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 3.
What are the different operators that can be used in Python?
Answer:
In computer programming languages operators are special symbols which represent computations, conditional matching etc. The value of an operator used is called operands. Operators are categorized as Arithmetic, Relational, Logical, Assignment etc.

Question 4.
What is a literal? Explain the types of literals?
Answer:

  • Literal is raw data given in a variable or constant.
  • In Python, there are various types of literals.
  1. Numeric
  2. String
  3. Boolean

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 5.
Write short notes on Exponent data.
Answer:
An Exponent data contains decimal digit part, decimal point, exponent part followed by one or more digits.
12.E04, 24.e04 # Exponent data

III. Answer the following questions (3 Marks)

Question 1.
Write short notes on the Arithmetic operator with examples.
Answer:

  • An arithmetic operator is a mathematical operator that takes two operands and performs a calculation on them.
  • They are used for simple arithmetic.
  • Most computer languages contain a set of such operators that can be used within equations to perform different types of sequential calculations.
  • Python supports the following Arithmetic operators.
Operator-OperationExamplesResult
Assume a=100 and b=10 Evaluate the following expressions
+ (Addition)> > > a+b110
– (Subtraction)> > > a-b90
* (Multiplication)> > > a*b1000
/ (Division)> > > a/b10.0
% (Modulus)> > > a% 3010
** (Exponent)> > > a**210000
/ / (Floor Division)> > > a// 30 (Integer Division)3

Question 2.
What are the assignment operators that can be used in Python?
Answer:

  • In Python,= is a simple assignment operator to assign values to variables.
  • There are various compound operators in Python like +=, -=, *=, /=,%=, **= and / / = are also available.
  • Let = 5 and = 10 assigns the values 5 to and 10 these two assignment statements can also be given a =5 that assigns the values 5 and 10 on the right to the variables a and b respectively.
OperatorDescriptionExample
Assume x=10
=Assigns right side operands to left variable»> x=10

»> b=”Computer”

+=Added and assign back the result to left operand i.e. x=30»> x+=20 # x=x+20
=Subtracted and assign back the result to left operand i.e. x=25>>> x-=5 # x=x-5

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 3.
Explain the Ternary operator with examples.
Answer:
Conditional operator:
Ternary operator is also known as a conditional operator that evaluates something based on a condition being true or false. It simply allows testing a condition in a single line replacing the multiline if-else making the code compact.
The Syntax conditional operator is,
Variable Name = [on – true] if [Test expression] else [on – false]
Example:
min = 50 if 49 < 50 else 70 # min = 50 min = 50 if 49 > 50 else 70 # min = 70

Question 4.
Write short notes on Escape sequences with examples.
Answer:

  • In Python strings, the backslash “\” is a special character, also called the “escape” character.
  • It is used in representing certain whitespace characters: “t” is a tab, “\n\” is a new line, and “\r” is a carriage return.
  • For example to print the message “It’s raining”, the Python command is > > > print (“It \ ‘s raining”)
  • output:
    It’s raining
Escape sequence characterDescriptionExampleOutput
wBackslash>>> print(“\\test”)\test
YSingle-quote»> print(“Doesn\’t”)Doesn’t
\”Double-quote»> print(“\”Python\””)“Python”
\nNew linepr in t (” Python “,” \ n”,” Lang..”)Python Lang..
\tTabprint(“Python”,”\t”,”Lang..”)Python Lang..

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 5.
What are string literals? Explain.
Answer:
String Literals:
In Python, a string literal is a sequence of characters surrounded by quotes. Python supports single, double and triple quotes for a string. A character literal is a single character surrounded by single or double-quotes. The value with triple – the quote is used to give multi-line string literal.
Strings = “This is Python”
char = “C”
multiline _ str = “This is a multiline string with more than one line code”.

IV. Answer the following questions (5 Marks)

Question 1.
Describe in detail the procedure Script mode programming
Answer:

  • Basically, a script is a text file containing the Python statements.
  • Python Scripts are reusable code.
  • Once the script is created, it can be executed again and again without retyping.
  • The Scripts are editable

Creating Scripts in Python:

  • Choose File → New File or press Ctrl + N in the Python shell window.
  • An untitled blank script text editor will be displayed on the screen.
  • Type the code in Script editor
    a=100
    b=350
    c=a+b
    print(“The Sum=”,c)

Saving Python Script:

  • Choose File →Save or press Ctrl+S
  • Now, Save As dialog box appears on the screen
  • In the Save As dialog box, select the location where you want to save your Python code, and type the File name box Python files are by default saved with extension by Thus, while creating Python scripts using Python Script editor, no need to specify the file extension.
  • Finally, ‘click Save button to save your Python script.

Executing Python Script:

  • Choose Run-Run Module or Press F5
  • If code has any error, it will be shown in red color in the IDLE window,, and Python describes the type of error occurred. To correct the errors, go back to Script editor, make corrections, save the file using Ctrl + S or File→Save and execute it again.
  • For all error-free code, the output will appear in the IDLE window of Python.

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 2.
Explain input () and print() functions with examples.
Answer:
input () function:
In Python input() function is used to accept data as input at run time.
Syntax:
Variable = input (“prompt string”)

  • where, prompt string in the syntax is a statement or message to the user, to know what input can be given.
  • The input() takes whatever is typed from the keyboard and stores the entered data in the given variable.
  • If prompt string is not given in input() no message is displayed on the screen, thus, the user will not know what is to be typed as input

Example:
> > > city=input(“Enter Your City: “)
Enter Your City: Madurai
> > > print(“I am from “, city)
I am from Madurai

  • The input () accepts all data as string or characters but not as numbers.
  • If a numerical value is entered, the input values should be explicitly converted into numeric data type.
  • The int( ) function is used to convert string data as integer data explicitly.

Example:
x= int (input(“Enter Number 1: “))
y = int (input(“Enter Number 2: “))
print (“The sum =”, x+y)
Output
Enter Number 1: 34
Enter Number 2: 56
The sum = 90
print () function :
In Python, the print() function is used to display result on the screen. The syntax for print() is as follows:

Syntax:
print (“string to be displayed as output” )
print (variable)
print (“String to be displayed as output variable)
print (“String 1 “, variable, “String 2′”,variable, “String 3” )….)

Example
> > > print (“Welcome to Python Programming”)
Welcome to
Python Programming
> > > x= 5
> > > y= 6
> > > z=x+y
> > > print (z)
11
> > > print (“The sum =”,z)
The sum=11
> > > print (“The sum of”,x, “and “, y, “is “,z)
The sum of 5 and 6 is 11

  • The print( ) evaluates the expressions before printing it on the monitor
  • The print( ) displays an entire statement which specified within print ( )
  • Comma (,) is used as a separator in print more than one time

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 3.
Discuss in detail about Tokens in Python
Answer:
Python breaks each logical line into a sequence of elementary lexical components known as Token.
The normal token types are

  1. Identifiers
  2. Keywords
  3. Operators
  4. Delimiters and
  5. Literals.

Identifiers:

  • An Identifier is a name used to identify a variable, function, class, module or object.
  • An identifier must start with an alphabet
    (A..Z or a..z) or underscore (_). Identifiers may contain digits (0 .. 9). „
  • Python identifiers are case sensitive i.e. uppercase and lowercase letters are distinct. Identifiers must not be a python keyword.
  • Python does not allow punctuation characters such as %,$, @, etc., within identifiers.

Keywords:
Keywords are special words used by Python interpreters to recognize the structure of the program. As these words have specific meanings for interpreters, they cannot be used for any other purpose.

Operators:

  • In computer programming languages operators are special symbols which represent computations, conditional matching, etc.
  • The value of an operator used is called operands.
  • Operators are categorized as Arithmetic, Relational, Logical, Assignment, etc. Value and variables when used with the operator are known as operands

Delimiters:
Python uses the symbols and symbol combinations as delimiters in expressions, lists, dictionaries, and strings
Following are the delimiters knew as operands.
Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators 1
Literals:
Literal is raw data given in a variable or constant. In Python, there are various types of literals.

  • Numeric
  • String
  • Boolean

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

12th Computer Science Guide Python -Variables and Operators Additional Questions and Answers

I. Choose the best answer (1 Mark)

Question 1.
Python language was released in the year
a) 1992
b) 1994
c) 1991
d) 2001
Answer:
c) 1991

Question 2.
CWI means ……………………………
Answer:
Centrum Wiskunde & Information

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 3.
In Python, How many ways programs can be written?
a) 4
b) 2
c) 3 ‘
d) many
Answer:
b) 2

Question 4.
Find the wrong statement from the following.
(a) Python supports procedural approaches
(b) Python supports object-oriented approaches
(c) Python is a DBMS tool
Answer:
(c) Python is a DBMS tool

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 5.
Which mode displays the python code result immediately?
a) Compiler
b) Script
c) Interactive
d) program
Answer:
c) Interactive

Question 6.
Which of the following command is used to execute the Python script?
a) Run → Python Module
b) File → Run Module
c) Run → Module Fun
d) Run → Run Module
Answer:
d) Run → Run Module

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 7.
The extension for the python file is ……………………………
(a) .pyt
(b) .pt
(c) .py
(d) .pyth
Answer:
(c) .py

Question 8.
Which operator replaces multiline if-else in python?
a) Local
b) Conditional
c) Relational
d) Assignment
Answer:
b) Conditional

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 9.
Which of the following is a sequence of characters surrounded by quotes?
a) Complex
b) String literal
c) Boolean
d) Octal
Answer:
b) String literal

Question 10.
What does prompt (>>>) indicator?
(a) Compiler is ready to debug
(b) Results are ready
(c) Waiting for the Input data
(d) Interpreter is ready to accept Instructions
Answer:
(d) Interpreter is ready to accept Instructions

Question 11.
In Python shell window opened by pressing.
a) Alt + N
b) Shift + N
c) Ctrl + N
d) Ctrl + Shift +N
Answer:
c) Ctrl + N

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 12.
In Python, comments begin with …………..
a) /
b) #
c)\
d) //
Answer:
b) #

Question 13.
Which command is selected from the File menu creates a new script text editor?
(a) New
(b) New file
(c) New editor
(d) New Script file
Answer:
(b) New file

Question 14.
Python uses the symbols and symbol combinations as ……………. in expressions
a) literals
b) keywords
c) delimiters
d) identifiers
Answer:
c) delimiters

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 15.
All data values in Python are ……………
a) class
b) objects
c) type
d) function
Answer:
b) objects

Question 16.
…………………………… command is used to execute python script?
(a) Run
(b) Compile
(c) Run ? Run Module
(d) Compile ? Compile Run
Answer:
(c) Run ? Run Module

Question 17.
Octal integer uses …………………………… to denote octal digits
(a) OX
(b) O
(c) OC
(d) Od
Answer:
(b) O

Question 18.
Find the hexadecimal Integer.
(a) 0102
(b) 0876
(c) 0432
(d) 0X102
Answer:
(d) 0X102

Question 19.
How many floating-point values are there is a complex number?
(a) 1
(b) 2
(c) 3
(d) 4
Answer:
(b) 2

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

II. Answer the following questions (2 and 3 Marks)

Question 1.
Write a note on keywords. Give examples?
Answer:
Keywords are special words used by Python interpreters to recognize the structure of the program. As these words have specific meanings for interpreters, they cannot be used for any other purpose. Eg, While, if.

Question 2.
What are keywords? Name any four keywords in Python.
Answer:
Keywords are special words that are used by Python interpreters to recognize the structure of the program.
Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators 2

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 3.
Write a note on the relational or comparative operator.
Answer:

  • A Relational operator is also called a Comparative operator which checks the relationship between two operands.
  • If the relation is true, it returns True otherwise it returns False.

Question 4.
Write a short note on the comment statement.
Answer:

  • In Python, comments begin with hash symbol (#).
  • The lines that begins with # are considered as comments and ignored by the Python interpreter.
  • Comments may be single line or no multilines.
  • The multiline comments should be enclosed within a set of # as given below.
    # It is Single line Comment
    # It is multiline comment which contains more than one line #

Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

Question 5.
What are the key features of python?
Answer:
Key features of Python:
It is a general-purpose programming language which can be used for both scientific and non – scientific programming
It is a platform-independent programming language.
The programs written in Python are easily readable and understandable

Question 6.
What are the uses of the logical operators? Name the operators.
Answer:

  • In python, Logical operators are used to performing logical operations on the given relational expressions.
  • There are three logical operators they are and or not.
  • Samacheer Kalvi 12th Computer Science Guide Chapter 5 Python -Variables and Operators

III. Answer the following questions (5 Marks)

Question 1.
Explain data types in python?
Answer:
Python Data types:
All data values in Python are objects and each object or value has a type. Python has Built-in or Fundamental data types such as Numbers, String, Boolean, tuples, lists, and dictionaries.

Number Data type:
The built-in number objects in Python supports integers, floating-point numbers, and complex numbers.
Integer Data can be decimal, octal, or hexadecimal. Octal integers use O (both upper and lower case) to denote octal digits and hexadecimal integers use OX (both upper and lower case) and L (only upper case) to denote long integers.
Example:
102, 4567, 567 # Decimal integers
0102, o876, 0432 # Octal integers
0X102, oX876, 0X432 # Hexadecimal integers
34L, 523L # Long decimal integers
A floating-point data is represented by a sequence of decimal digits that includes a decimal point. An Exponent data contains decimal digit part, decimal point, exponent part followed by one or more digits.
Example :
123.34, 456.23, 156.23 # Floating point data
12.E04, 24.e04 # Exponent data
A complex number is made up of two floating-point values, one each for the real and imaginary parts.

Boolean Data type:
A Boolean data can have any of the two values: True or False.

Example:
Bool_varl = True
Bool_var2 = False

String Data type:
String data can be enclosed with a single quote or double quote or triple quote.

Example:
Char_data = ‘A’
String_data = “Computer Science”
Multiline_data= “““String data can be enclosed with single quote or double quote or triple quote.”””