Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Bio Botany Guide Pdf Chapter 7 Cell Cycle Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Bio Botany Solutions Chapter 7 Cell Cycle

11th Bio Botany Guide Cell Cycle Text Book Back Questions and Answers

Choose The Correct Answer:

Question 1.
The correct sequence in cell cycle is
a) S M G1 G2
b) S G1 G2 M
c) G1 S G2 M
d) M G1 G2 S
Answer:
c) G1 S G2 M

Question 2.
If mitotic division is restricted in G, phase the cell cycle, then the condition is known as
a) S Phase
b) G2 Phase
c) M Phase
d) G0 phase
Answer:
d) G0 phase

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 3.
Anaphase promoting complex APC is a protein degradation machinery necessary for proper mitosis of animal cells. If APC is defective in a human cells. Which of the following is expected to occur?
a) Chromosomes will be fragmented
b) Chromosomes will not condense
c) Chromosomes will not regregate
d) Recombination of Chromosomes will occur
Answer:
c) Chromosomes will not segregate

Question 4.
In the S phase of cell cycle
a) Amount of DNA doubles in each cell
b) Amount of DNA remain same in each cell
c) Chromosome number is increased
d) Amount of DNA is reduced to half in each cell
Answer:
a) Amount of DNA doubles in each cell

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 5.
The centromere is required for
a) Transcription
b) Crossing over
c) Cytoplasmic cleavage
d) movement of chromosome towards the pole
Answer:
d) movement of chromosome towards the pole

Question 6.
Synapsis occurs between
a) m RNA and ribosomes
b) spindle fibres and centromeres
c) two homologous chromosomes
d) a male and a female gemale
Answer:
c) two homologous chromosomes

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 7.
In meiosis crossing over is initiated at
a) Diplotene
b) Pachytene
c) Leptotene
d) Zygotene
Answer:
b) Pachytene

Question 8.
Colchicine prevents the mitosis of the cells at which of the following stage
a) Anaphase
b) Metaphase
c) Prophase
d) Interphase
Answer:
a) Anaphase

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 9.
The pairing of homologous chromosomes on meiosis is known as
a) Bivalent
b) Synapsis
c) Disjunction
d) Synergids
Answer:
b) Synapsis

Question 10.
Anastral mitosis is the characteristic feature of
a) Lower animals
b) Higher animals
c) Higher plants
d) All living Organism
Answer:
c) Higher plants

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 11.
Write any three significance of mitosis
Answer:
Exact copy of the parent cell is produced by mitosis (genetically identical).

  1. Genetic stability – daughter cells are genetically identical to parent cells.
  2. Repair of tissues – damaged cells must be replaced by identical new cells by mitosis.
  3. Regeneration – Arms of starfish.

Question 12.
Differentiate between Mitosis and Meiosis.
Answer:
Differences between Mitosis and Meiosis

Mitosis

Meiosis

One division Two division
The number of chromosomes remains the same The number of chromosomes is halved
Homologous chromosomes line up separately on the metaphase plate Homologous chromosomes line up in pairs at the metaphase plate
Homologous chromosome do not pair up Homologous chromosome pair up to form bivalent
Chiasmata do not form and crossing over never occurs Chiasmata form and crossing over occurs
Daughter cells are genetically identical Daughter cells are genetically different from the parent cells
Two daughter cells are formed Four daughter cells are formed

Question 13.
Differentiate Cytokinesis in plant cells & animal cells
Answer:
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 1Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 2

Question 14.
Given an account of the Go phase.
Answer:
Some cells exit G1 and enters a quiescent stage called G0, where the cells remain metabolically active without proliferation. Cells can exist for long periods in G0 phase. In G0 cells cease growth with reduced rate of RNA and protein synthesis. The G0 phase is not permanent. Mature neuron and skeletal muscle cell remain permanently in G0. Many cells in animals remains in G0 unless called onto proliferate by appropriate growth factors or other extracellular signals. G0 cells are not dormant.

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 15.
Write about the Pachytene and Diplotene stage of Prophase I.
Answer:
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 3.
3. Pachytene stage

  • Chromosome appear as bivalent or tetrads
  • 4 chromatids & 2 centromeres are seen
  • Synapsis of homologous chromosomes between non-sister chromatids completes except at chiasmata where crossing over occurs
  • Recombination (exchange of chromosomal bits is completed by the end) – but chromosomes are linked at the sites of crossing over
  • Enzyme – Recombinase mediates the process.

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

4. Diplotene

  • Synaptonemal complex disassembled & dissolves
  • Nonsister chromatids of homologous chromosomes get attached where x like shape occur at Crossing over known as chiasmata holding the homologous chromosomes together the homologous chromosomes tend to separate except at chiasmat
  • The sub-stage last for days or years depending on the sex & the organism follows Pachytene
  • synaptical complex disassembled & dissolves
  • The chromosomes are actively transcribed in females as the eggs stores up materials for embryonic development
  • Exception In Lamp brush chromosome prominent loops occur.

11th Bio Botany Guide Cell Cycle Additional Important Questions and Answers

I.Choose the correct answer: (1 Marks)

Question 1.
Most of the neurons in the brain are in …………… stage.
(a) G1
(b) S
(c) G2
(d) G0
Answer:
(d) G0

Question 2.
Un differentiated cells include
a) Stem cells in animals
b) Meristematic cells in plants
c) RBC which carry out the transportation of oxygen
d) Mesophyll cells which carry out photosynthesis
(i) a & b
(ii) c & d
(iii) a & c
(iv) b & c
Answer:
(i) a & b

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 3.
Robert Brown discovered the nucleus in the cells of …………… roots.
(a) Mirabilis
(b) Orchid
(c) Moringa
(d) Oryza
Answer:
(b) Orchid

Question 4.
The proteins that activate the cell to perform cell division are
a) Actin and Myosin
b) Kinases and Cyclin
c) Histamine and Cyclin
d) Tubulin and Actin
Answer:
b) Kinases & Cyclin

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 5.
The number of chromosomes in the onion cell is …………….
(a) 8
(b) 16
(c) 32
(d) 64
Answer:
(a) 16

Question 6.
Mitosis is called
a) Direct cell division
b) Indirect cell division
c) Mitotic Meiotic cell division
d) Reduction division
Answer:
a) Direct cell division

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 7.
During Anaphase
(I) The daughter chromosome move to the opposite poles due to the shortening of the phragmoplast
(II) due to the thickening of chromosomes
(III) Shortening of microtubules
(IV) Shortening of asters
Answer:
(III) Shortening of microtubules

Question 8.
Cell cycle was discovered by …………….
(a) Singer & Nicolson
(b) Prevost & Dumans
(c) Schleider & Schwann
(d) Boveri
Answer:
(b) Prevost & Dumans

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 9.
The cells without nucleus are
a) RBC – platelets, tracheids & vessels
b) RBC – sievetube, companion cells thrombocytes
c) WBC – platelets, companion cells & vessels
d) RBC – platelets, companion cells & neurons
Answer:
a) RBC – platelets, tracheids & vessels

Question 10.
The stage between two meiotic division is called
a) Cytokinesis
b) Interphase I
c) Inter kinesis
d) Interphase II
Answer:
c) Inter kinesis

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 11.
Replication of DNA occurs at …………… phase.
(a) G0
(b) G1
(c) S
(d) G2
Answer:
(c) S

II. Find out the true and false statements from the following and on that basis find the correct answer.

Question 1.
(I) Nucleolus disappear during the metaphase stage of mitosis
(II) The microtubules arrange to form asters in plant cells
(III) In plant cells phragmoplast is formed prior to the formation of cell plate
(IV) Mitosis is responsible for the Regeneration of lost arms of starfish
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 4
Answer:
b) False – False – True- True

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 2.
(i) The word Protoplasm was coined by – Purkinje
(ii) Structure of bacteria was observed first – Edouard Van Beneden through a microscope by
(iii) Centrosome & Chromosome theory – Theodor Boveri Proposed by
(iv) Cell division in round Worm was – Walther Flemming Observed by
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 5
Answer:
b) True – False – True – False

Question 3.
(i) C Value is the amount in picograms of DNA contained within a haploid Nucleus
(ii) Nucleolan membrane disappear during Ana Phase stage of mitosis
(iii) The arrangement of microtubules is called to form Asters -, which is a unique feature of plant cells
(iv) One of the protein synthesis in G2 – phase is known as Maturation Promoting Factor
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 6
Answer:
a) True – False – False – True

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

III. Find out the correct match from the following.

Question 1.
Zygotene – Chromosomes appear as tetrads
Pachytene – Synapsis of homologous chromosomes occur
Diplotene – Condensation of chromosomes takes place
Diakinesis – Terminalisation of chiasmata occur & Nucleolus Disappear
Answer:
Diakinesis -Terminalisation of chiasmata occur & Nucleolus Disappear

Question 2.
Duration of different Phases of cell cycle given find out the correct match
(I) S Phase – 12 Hours
(II) G1 Phase – 11 Hours
(III) G2 Phase – 4 Hours
(IV) M Phase – 2 Hours
Answer:
(III) G2 Phase – 4 Hours

IV. Find out the Wrong match

Question 1.
(I) The chromosome does not divide as chromatids, for centromere does not divide – Anaphase I
(II) The chromatids move to the opposite poles by the splitting of the centromere – Anaphase
(III) Sister chromatids get separated by splitting of Centromere – Anaphase II
(IV) Homologous chromosomes appear as bivalent or tetrad – Metaphase II
Answer:
(IV) Homologous chromosomes appear as bivalent or tetrad – Metaphase II

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 2.
Most nëurons remain in G-’o’ stage do not divide
(I) This technique can be applied to replace neurons in dementia patients
(II) neurons can be activated by giving electric shocks
(III) neurons can be replaced by surgical procedures
(IV) Dead or injured neurons can be replaced by stem cell therapy
Answer:
(IV) Dead or injured neurons can be replaced by stem cell therapy

V.

Question 1.
Match the following and find the
(I) Robert Brown – A) Coined the word cell
(II) Robert Hook – B) Coined the word Mitosis
(III) Schleiden & Schwann – C) Studied the presence of Nucleus in cells
(IV) Waither Flemming – D) Cell theory
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 7
Answer:
d) C-A- D- B

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 2.
(I) Cell cycle – A) division that follows the nuclear division
(II) Restriction point – B) Longest part but not resting stage
(III) lnterphae – C) A series of events leading to the formation of a new Cell
(IV) Cytokinesis – D) The checkpoint at the end of Gi determine a cell’s fate
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 8
Answer:
c) C-D- B- A

VI. 

Question 1.
Read the following Assertion and Reason. Find the correct answer
Assertion A: The mitochondrial inheritance in higher animals is uniparental
Reason R: The mitochondria from the male partner either undergo degeneration or rejected and only mitochondria from egg or ova is accepted.
(a) Assertion and Reason are correct Reason is explaining assertion
(b) Assertion and Reason are correct, but the reason is not explaining assertion
(c) Assertion is true but Reason not explaining assertion
(d) Assertion is true but Reason is wrong
Answer:
a) Assertion and Reason are correct. Reason is explaining assertion

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 2.
Assertion A: In Meiosis Prophase I is a longer but significant phase
Reason R: Chiasma formation and crossing over takes place and recombination takes place
(a) Assertion and Reason are correct Reason is explaining Assertion
(b) Assertion and Reason are correct but Reason is not explaining Assertion
(c) Assertion is true but Reason is wrong
(d) Assertion is true but Reason not explaining Assertion
Answer:
b) Assertion and Reason are correct but Reason is not explaining Assertion

Question 3.
Assertion A: Interphase is the longest part of cell division and the cell actively involved protein synthesis & DNA synthesis
Reason: The Interphase is also known as the resting phase, & the cell takes rest between successive cell division
(a) Assertion and Reason are correct Reason is explaining Assertion
(b) Assertion and Reason are correct but Reason is not explaining Assertion
(c) Assertion is true but Reason is wrong
(d) Assertion is true but Reason not explaining assertion
Answer:
c) Assertion is true but Reason is wrong

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 4.
Assertion A: The sister chromatids of homologous chromosomes exchange chromosomal bits
Reason R: This process of exchange of chromosomal bits is known as crossing over
(a) Assertion and Reason are correct Reason is explaining Assertion
(b) Assertion and Reason are correct but Reason is not explaining Assertion
(c) Assertion is true but Reason is wrong
(d) Assertion is true but Reason not explaining assertion
Answer:
d) Assertion is true but Reason not explaining assertion

VII. 

Question 1.
See the diagram & label the parts
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 9
Answer:
A – Leptotene
B – Chromosomes are visible under a light microscope
C – Paired sister chromatids begin to condense

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 2.
See the diagram and write the correct answer.
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 10

A

B C

D

a) Cell growth interphase Mitotic phase Cyto kinesis
b) Interphase Cell growth Mitotic phase Cytokinesis
c) Cell growth Inter Phase Cytokinesis Mitotic phase
d) Interphase Cell growth Cytokineses Mitotic phase

Answer:
a) Cell growth – Interphase – Mitotic phase – Cyto kinesis

Question 3.
See the diagram & label Find out the correct labelling.
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 11

A B C D
a) Chromatin Kineto chore See constriction Centromere
b) Centromere Chromatin See constriction Kineto chore
c) Centromere Kineto chore Chromatin Centomere
d) Chromatin See Constriction Kineto chore Centomere

Answer:
b) Centromere – Chromatin – Secondary constriction – Kinetochore

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 4.
Label the diagram properly.
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 12
Answer:
A – Non-sister Chromatids
B – Centromere
C – Chiasma
D – Bivalent or Tetrad

Question 5.
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 13
Answer:
A – Outer kinetochore
B – Fibrous corona
C – Inner Kinetochore
D – Microtubules

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

2 Mark Questions.

Question 1.
Name the two types of nuclear division.
Answer:
The two types of nuclear division:

  1. Mitosis and
  2. Meiosis.

Question 2.
What are the reasons for the arresting growth of cell during G1 Phase?
Answer:

  • Deprivation of nutrition
  • Lack of growth factors or density-dependent inhibition occur
  • Some metabolic changes leads to Go – stage

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 3.
Point out the reasons responsible for the arresting of the cell in the G1 phase?
Answer:
Cells are arrested in G1 due to:

  • Nutrient deprivation
  • Lack of growth factors or density dependant inhibition
  • Undergo metabolic changes and enter into G0 state.

Question 4.
Differentiate between karyokinesis and Cytokinesis of Amitosis.
Answer:

Karyokinesis

Cytokinesis

Division of Nucleus occur Division of Cytoplasm occur
Nucleus develop contraction at the centre become dumbbell shaped contriction deepen divide nucleus into two Plasma membrane develop constriction along with nuclear contraction, which deepen centripetally and the cell divides into two

Question 5.
Define amitosis & write about its drawbacks.
Answer:
Amitosis is known as Direct cell division or Incipient cell division.
No spindle formation, no condensation of chromatin material occur.

It has one 2 steps

  1. Karyokinesis
  2. Cytokinesis

Drawbacks: Causes unequal distribution of chromosomes Can lead to abnormalities in

  • metabolism
  • reproduction

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 6.
Distinguish between Closed and Open mitosis.
Answer:

Closed mitosis

Open mitosis

Nuclear envelope remain intact & chromosomes migrate to opposite poles of a spindle with in the Nucleus
Eg – Unicellular Eukaryotes – Yeast, Slime molds
Nuclear envelope breaks down and then reforms around the 2 sets of separated Chromosome
Eg – Most higher Plants & Animals

Question 7.
Differentiate between Anastral and Amphiastral cell division
Answer:

Anastral

Amphiastral

  • Occur in plant cell
  • No asters or centrioles are formed,
    only spindle fibres are formed Eg. Plants
  • Occur in animal cells
  • Asters and centrioles formed at each pole of the spindle during cell division Eg. Animals

Question 8.
What happens to plant cells at the end of Telophase in Mitosis?
Answer:
In plants, phragmoplast are formed between the daughter cells. A cell plate is formed between the two daughter cells, reconstruction of cell wall takes place. Finally, the cells are separated by the distribution of organelles, macromolecules into two newly formed daughter cells.

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 9.
Differentiate meiosis in Plants & Animals.
Answer:

Plants

Animals

In flowering plants meiosis occur during Microsporogenesis (anther) & in Mega sporogenesis (i.e) (ovule) development It take place in reproductive organs at the time of production of gametes Spermatogenesis – produces haploid sperms Oogenesis – produces haploid eeas

Question 10.
Define Mitogens.
Answer:

  • The biochemical substances or factors which promote cell cycle acceleration & proliferation is called Mitogen.
  • Eg. Gibberellin, Ethylene, Indole Acelic Acid, Kinetin.
  • They are also known as Growth promotors.

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 11.
Explain briefly about Endomitosis.
Answer:
The replication of chromosomes in the absence of nuclear division and cytoplasmic division resulting in numerous copies within each cell is called endomitosis. Chromonema do not separate to form chromosomes but remain closely associated with each other. Nuclear membrane does not rupture. So no spindle formation. It occurs notably in the salivary glands of Drosophila and other flies. Cells in these tissues contain giant chromosomes (polyteny), each consisting of over thousands of intimately associated, or synapsed, chromatids. Example: Polytene chromosome.

3 Mark Questions

Question 1.
Write down the significance of Meiosis.
Answer:

  • Maintain chromosome number constant
  • Crossing over (exchange of genetic meterial) leads to variations
  • Variation – the raw material for Evolution
  • Finally, meiosis produces genetic variability by partitioning different combinations of genes into gametes through an independent assortment.
  • Responsible for Adaptations of organisms to various environmental stress.

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 2.
Differentiate between Mitosis in Plants & Animals.
Answer:

Plants

Animals

Centrioles are absent Centrioles are present
Asters are not formed Asters are formed
Cell division involves the formation of a cell Cell division involves furrowing and cleavage of cytoplasm
Occurs mainly at the meristem Occurs in tissues throughout the body

Question 3.
Explain Endomitosis.
Answer:
Sometimes, the replication of chromosomes occur in the absence of karyokinesis & cytokinesis resulting in numerous copies within each cell condition known as Endomitosis.

  • Chromonema donot separate to form Chromosomes
  • Nuclear membrance does not repture
  • No spindle formation occur
  • Each chromosome consisting of over thousands of synapsed Chromatids
    Eg – Salvary gland chromosome of Drosophila (Polytene or Chromosome).

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 4.
Differentiate between Anaphase I & Anaphase II of Meiosis.
Answer:
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 14

5 Mark Questions

Question 1.
Explain in detail the various stages of Prophase I.
Answer:
The various stages of Prophase I:
1. Prophase I – Prophase I is of longer duration and it is divided into 5 substages – Leptotene, Zygotene, Pachytene, Diplotene and Diakinesis.

2. Leptotene – Chromosomes are visible under light microscope. Condensation of chromosomes takes place. Paired sister chromatids begin to condense.

3. Zygotene – Pairing of homologous chromosomes takes place and it is known as synapsis. Chromosome synapsis is made by the formation of synaptonemal complex. The complex formed by the homologous chromosomes are called as bivalent (tetrads).

4. Pachytene – At this stage bivalent chromosomes are clearly visible as tetrads. Bivalent of meiosis I consists of 4 chromatids and 2 centromeres. Synapsis is completed and recombination nodules appear at a site where crossing over takes place between non – sister chromatids of homologous chromosome. Recombination of homologous chromosomes is completed by the end of the stage but the chromosomes are linked at the sites of crossing over. This is mediated by the enzyme recombinase.

5. Diplotene – Synaptonemal complex disassembled and dissolves. The homologous chromosomes remain attached at one or more points where crossing over has taken place. These points of attachment where ‘X’ shaped structures occur at the sites of crossing over is called.

6. Chiasmata: Chiasmata are chromatin structures at sites where recombination has been taken place. They are specialised chromosomal structures that hold the homologous chromosomes together. Sister chromatids remain closely associated whereas the homologous chromosomes tend to separate from each other but are held together by chiasmata. This substage may last for days or years depending on the sex and organism. The chromosomes are very actively transcribed in females as the egg stores up materials for use during embryonic development. In animals, the chromosomes have prominent loops called lampbrush chromosome.

7. Diakinesis – Terminalisation of chiasmata. Spindle fibres assemble. Nuclear envelope breaks down. Homologous chromosomes become short and condensed. Nucleolus disappears.

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 2.
Explain karyokinesis in mitosis of plant cell
Answer:
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 15

Prophase – Longest Phase

  • Chromosomes visible thread like condenses into thick chromosomes
  • Initiation of spindle fibres occur
  • Nucleolus disappear Nuclear envelope breaks down
  • Golgi apparatus & ER not seen

Metaphase

  • Sister chromatids attached to spindle fibres by kinetochore of centromere
  • Chromosome align on the equatorial plane (metaphase plate)
    (spindle assembly check point decide the fate of the cell)

Anaphase

  • Centromere split daughter chromatids move to opposite poles
  • Shortening of spindle create pull divide centromere & divide chromosome into a chromatids
    (APC /C leads to degradation of protein lead to separation of chromatids

Telophase

  • Genetic material division completed Nucleolus & Nuclear membrane reform.
  • Sister chromatids become thick chromosomes with its own centromere.

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 3.
Explain S phase & G2 phase, til S Phase
Answer:
(i) S Phase:

  • Known as synthetic phase of interphase of mitosis
  • Growth of cell continues
  • Replication of DNA occur
  • Histones synthesised and attach to DNA
  • Duplication of centrioles occur
  • DNA content doubles from 2C to 4C

(ii) G2 phase

  • 4 C amount of DNA
  • Cell growth continues
  • Synthesis of
    • organelle,
    • mitochondria & chloroplast
    • tubulin synthesised, microtubules formed
  • Spindle begin to occur
  • Nuclear division follows
  • MPF (Maturation Promoting factor) formed brings out condensation of interphase chromosomes into mitotic form.

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Question 4.
Draw the Cell cycle.
Answer:
Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle 16

Question 5.
What are the significances of Mitosis.
Answer:
Exact copy of the parent cell is produced by mitosis (genetically identical).

  1. Genetic stability – Daughter cells are genetically identical to parent cells.
  2. Growth – As multicellular organisms grow, the number of cells making up their tissue increases. The new cells must be identical to the existing ones.
  3. Repair of tissues – Damaged cells must be replaced by identical new cells by mitosis.
  4. Asexual reproduction – Asexual reproduction results in offspring that are identical to the parent. Example Yeast and Amoeba.
  5. In flowering plants, structure such as bulbs, corms, tubers, rhizomes and runners are produced by mitotic division. When they separate from the parent, they form a new individual. The production of large numbers of offsprings in a short period of time, is possible only by mitosis. In genetic engineering and biotechnology, tissues are grown by mitosis (i.e. in tissue culture).
  6. Regeneration – Arms of starfish

Samacheer Kalvi 11th Bio Botany Guide Chapter 7 Cell Cycle

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Physics Guide Pdf Chapter 11 Waves Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Physics Solutions Chapter 11 Waves

11th Physics Guide Waves Book Back Questions and Answers

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

I. Multiple choice questions:

Question 1.
A student tunes his guitar by striking a 120 Hertz with a tuning fork, and simultaneously plays the 4th string on his guitar. By keen observation, he hears the amplitude of the combined sound oscillating thrice per second. Which of the following frequencies is the most likely the frequency of the 4th string on his guitar?
(a) 130
(b) 117
(c) 110
(d) 120
Answer:
(b) 117

Hint:
Frequency of the fourth string can be derived from harmonic series generated by the strings.
Frequencies of first 4 strings are 120, 119, 118, 117 Hz.
f4 = 117Hz

Question 2.
A transverse wave moves from a medium A to a medium B. In medium A, the velocity of the transverse wave is 500 ms-1 and the wavelength is 5 m. The frequency and the wavelength of the wave in medium B when its velocity is 600 ms-1, respectively are:
(a) 120 Hz and 5 m
(b) 100 Hz and 5 m
(c) 120 Hz and 6 m
(d) 100 Hz and 6 m
Answer:
(d) 100 Hz and 6 m

Hint:
vA = 500 ms-1; λA = 5 m
∴ Frequency in medium B
fB = \(\frac{v_{\mathrm{A}}}{\lambda_{\mathrm{A}}}\) = \(\frac { 500 }{ 5 }\) = 100 Hz
Wavelength in medium B is
λB = \(\frac{v_{\mathrm{B}}}{f_{\mathrm{B}}}\) = \(\frac { 600 }{ 100 }\) = 6m

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 3.
For a particular tube, among six harmonic frequencies below 1000 Hz, only four harmonic frequencies are given: 300 Hz, 600 Hz, 750 Hz and 900 Hz. What are the two other frequencies missing from this list?
(a) 100 Hz, 150 Hz
(b) 150 Hz, 450 Hz
(c) 450 Hz, 700 Hz
(d) 700 Hz, 800 Hz
Answer:
(b) 150 Hz, 450 Hz

Hint: Fundamental frequency f0 = 150 Hz
From the series of frequencies we get
f1 = 2f0
f2 = 3f0
= 3 x 150
= 450 Hz

Question 4.
Which of the following options is correct?
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 1
Options for (1), (2) and (3), respectively are:
(a) (b), (c) and (a)
(b) (c), (a) and (b)
(c) (a), (b) and (c)
(d) (b), (a) and (c)
Answer:
(a) (b), (c) and (a)

Question 5.
Compare the velocities of the wave forms given below, and choose the correct option.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 2
where, vA, vB, vC and vD are velocities given in (a), (b), (c) and (d), respectively.
(a) vA > vB > vD > vC
(b) vA < vB < vD < vC
(c) vA = vB = vD = vC
(d) vA > vB = vD > vC
Answer:
(c) vA = vB = vD = vC

Hint:
The amplitude of the velocity waves is same in all four cases.

Question 6.
A sound wave whose frequency is 5000 Hz travels in air and then hits the water surface. The ratio of its wavelengths in water and air is:
(a) 4.30
(b) 0.23
(c) 5.30
(d) 1.23
Answer:
(a) 4.30

Hint:
Frequency = 5000 Hz
Speed of sound in air vair = 332 m/s
Speed of sound in water vwater = 1450 m/s
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 3

Question 7.
A person standing between two parallel hills fires a gun and hears the first echo after t1 sec and the second echo after t2 sec. The distance between the two hills is:
(a) \(\frac{v\left(t_{1}-t_{2}\right)}{2}\)
(b) \(\frac{v\left(t_{1} t_{2}\right)}{2\left(t_{1}+t_{2}\right)}\)
(c) v(t1 + t2)
(d) \(\frac{v\left(t_{1}+t_{2}\right)}{2}\)
Answer:
(d) \(\frac{v\left(t_{1}+t_{2}\right)}{2}\)

Hint:
For first echo 2d1 = vt1
For second echo 2d2 = vt2
∴ d = d1 + d2 = \(\frac{v\left(t_{1}+t_{2}\right)}{2}\)

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 8.
An air column in a pipe which is closed at one end, will be in resonance with the vibrating body of frequency 83 Hz. Then the length of the air column is:
(a) 1.5 m
(b) 0.5 m
(c) 1.0 m
(d) 2.0 m
Answer:
(c) 1.0 m

Hint:
l = \(\frac { λ }{ 4 }\); f = 83 Hz
v = 332 m/s
λ = \(\frac { v }{ f }\)
= \(\frac { 332 }{ 83 }\)
= 4 m
l = \(\frac { λ }{ 4 }\) = \(\frac { 4m }{ 4 }\) = 1m = 1.0 m

Question 9.
The displacement y of a wave travelling in the x direction is given by y = (2 x 10-3) sin (300t – 2x + \(\frac { π }{ 4 }\)), where x and y are measured in metres and t in second. The speed of the wave is:
(a) 150 ms-1
(b) 300 ms-1
(c) 450 ms-1
(d) 600 ms-1
Answer:
(a) 150 ms-1

Hint:
The given equation is similar to
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 4

Question 10.
Consider two uniform wires vibrating simultaneously in their fundamental notes. The tensions, densities, lengths and diameter of the two wires ,are in the ratio 8:1, 1:2, (x : y) and 4 : 1 respectively. If the note of the higher pitch has a frequency of 360 Hz and the number of beats produced per second is 10, then the value of (x : y) is:
(a) 36 : 35
(b) 35 : 36
(c) 1 : 1
(d) 1 : 2
Answer:
(a) 36 : 35

Hint:
No. of beats = 10
Frequency of higher pitch f1 = 360 Hz
Frequency of lower pitch f2 = 360 – 10 = 350 Hz
x : y = Ratio of length
l ∝ f
l1 : l2 = x : y = f1 : f2
= 360 : 350
= 36 : 35

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 11.
Which of the following represents a wave:
(a) (x – vt)³
(b) x(x + vt)
(c) \(\frac { 1 }{ (x +vt) }\)
(d) sin(x + vt)
Answer:
(d) sin(x + vt)

Hint:
Wave must have a wave function.
Since y = a sin ωt

Question 12.
A man sitting on a swing which is moving to an angle of 60° from the vertical is blowing . a whistle which has a frequency of 2.0 k Hz. The whistle is 2.0 m from the fixed support point of the swing. A sound detector which detects the whistle sound is kept in front of the swing. The maximum frequency the sound detector detected is:
(a) 2.027 kHz
(b) 1.914 kHz
(c) 9.14 kHz
(d) 1.011 kHz
Answer:
(a) 2.027 kHz

Hint:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 5

Question 13.
Let y = \(\frac{1}{1+x^{2}}\) at t = 0 be the amplitude of the wave propagating in the positive x-direction. At t = 2s, the amplitude of the wave propagating becomes y = \(\frac{1}{1+(x-2)^{2}}\). Assume that the shape of the wave does not
change during propagation. The velocity of the wave is:
(a) 0.5 ms-1
(b) 1.0 ms-1
(c) 1.5 ms-1
(d) 2.0 ms-1
Answer:
(b) 1.0 ms-1

Hint:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 6

Question 14.
A uniform rope having mass m hangs vertically from a rigid support. A transverse wave pulse is produced at the lower end. Which of the following plots shows the correct variation of speed v with height h from the lower end?
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 7
Answer:

Hint:
Speed varies exponentially with height h.

Question 15.
An organ pipe A closed at one end is allowed to vibrate in its first harmonic and another pipe B open at both ends is allowed to vibrate in its third harmonic. Both A and B are in resonance with a given tuning fork. The ratio of the length of A and B is:
(a) \(\frac { 8 }{ 3 }\)
(b) \(\frac { 3 }{ 8 }\)
(c) \(\frac { 1 }{ 6 }\)
(d) \(\frac { 1 }{ 2 }\)
Answer:
(d) \(\frac { 1 }{ 2 }\)

Hint:
First harmonic of a closed organ pipe
LC = \(\frac { 3 λ }{ 4 }\)
Third harmonic of an open organ pipe
L0 = \(\frac { 3 λ }{ 2 }\)
\(\frac{\mathrm{L}_{\mathrm{C}}}{\mathrm{L}_{\mathrm{O}}}\) = \(\frac { 3 π }{ 4 }\) x \(\frac { 3 }{ 3λ }\)
= \(\frac { 2 }{ 4 }\)
= \(\frac { 1 }{ 2 }\)
∴ \(\frac{\mathrm{L}_{\mathrm{C}}}{\mathrm{L}_{\mathrm{O}}}\) = \(\frac { 1 }{ 2 }\)

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

II. Short Answer Questions:

Question 1.
What is meant by waves?
Answer:
The disturbance which carries energy and momentum from one point in space to another point in space without the transfer of the medium is known as a wave.

Question 2.
Write down the types of waves.
Answer:
Waves can be classified into two types –

  • Transverse waves
  • Longitudinal waves

Question 3.
What are transverse waves? Give one example.
Answer:
In transverse wave motion, the constituents of the medium oscillate or vibrate about their mean positions in a direction perpendicular to the direction of propagation (direction of energy transfer) of waves.
Example: light (electromagnetic waves)

Question 4.
What are longitudinal waves? Give one example.
Answer:
The direction of vibration of particles in a medium is parallel to the direction of propagation of the wave.
Example: Sound waves traveling in air.

Question 5.
Define wavelength.
Answer:
For transverse waves, the distance between two neighbouring crests or troughs is known as the wavelength. For longitudinal waves, the distance between two neighbouring compressions or rarefactions is known as the wavelength. The SI unit of wavelength is meter.

Question 6.
Write down the relation between frequency, wavelength and velocity of a wave.
Answer:
Velocity of the wave is v = λf.

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 7.
What is meant by the interference of waves?
Answer:
Interference is a phenomenon in which two waves moving in the same direction superimpose to form a resultant wave of greater, lower or the same amplitude.

Question 8.
Explain the beat phenomenon.
Answer:
When two or more waves superimpose each other with slightly different frequencies, then a sound of periodically varying amplitude at a point is observed. This phenomenon is known as beats. The number of amplitude maxima per second is called beat frequency. If we have two. sources, then their difference in frequency gives the beat frequency. Number of beats per second n = |f1 – f2| per second

Question 9.
Define intensity of sound and loudness of sound.
Answer:
“Loudness is defined as the degree of the sensation of sound produced in the ear or the perception of sound by the listener”. The intensity of sound is defined as “the sound power transmitted per unit area placed normal to the propagation of sound wave”.

Question 10.
Explain Doppler Effect.
Answer:
When the source and the observer are in relative motion with respect to each other and to the medium in which sound propagates, the frequency of the sound wave observed is different from the frequency of the source. This phenomenon is called Doppler Effect.

Question 11.
Explain red. shift and blue shift in Doppler Effect.
Answer:
If the spectral lines of the star are found to shift towards red end of the spectrum (called redshift) then the star is receding away from the Earth. If the spectral lines of the star are found to shift towards the blue end of the spectrum (called blue shift) then the star is approaching Earth.

Question 12.
What is meant by end correction in resonance air column apparatus?
Answer:
Since the antinodes are not exactly formed at the open end, we have to include a correction, called end correction e. It is calculated, by assuming that antinode is formed at a small distance above the open end e = 0.3 d.

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 13.
Sketch the function y = x + a. Explain your sketch.
Answer:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 9

Question 14.
Write down the factors affecting velocity of sound in gases.
Answer:
(i) Effect of pressure: Speed of sound is independent of pressure for a fixed temperature.

(ii) Effect of temperature: Speed of sound varies directly to the square root of temperature in kelvin. Speed of sound in air increases by 0.61 ms-1 per degree celcius rise in temperature.

(iii) Effect of density: Velocity of sound in a gas is inversely proportional to the square root of the density of the gas.

(iv) Effect of moisture (humidity): Speed of sound increases with rise in humidity.

(v) Effect of wind: In the direction along the wind blowing, the speed of sound to wind blowing, the speed of sound decreases.

Question 15.
What is meant by an echo? Explain.
Answer:
An echo is a repetition of sound produced by the reflection of sound waves from a wall, mountain or other obstructing surfaces. The minimum distance from a sound-reflecting wall to hear an echo at 20°C is 17.2 meter.

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

III. Long Answer Questions:

Question 1.
Discuss how ripples are formed in still water.
Answer:
Suppose we drop a stone in a trough of still water, we can see a disturbance produced at the place where the stone strikes the water surface. We find that this disturbance spreads out (diverges out) in the form of concentric circles of ever-increasing radii (ripples) and strikes the boundary of the trough. This is because some of the kinetic energy of the stone is transmitted to the water molecules on the surface.

Actually, the particles of the water (medium) themselves do not move outward with the disturbance. This can be observed by keeping a paper strip on the water surface. The strip moves up and down when the disturbance (wave) passes on the water surface. This shows that the water molecules only undergo vibratory motion about their mean positions.

Question 2.
Briefly explain the difference between traveling waves and standing waves.
Answer:
Progressive waves:

  1. Crests and troughs ate formed in transverse progressive waves. Compression and rarefaction are formed in longitudinal progressive waves. These waves move forward or backward in a medium i.e., they will advance in a medium with a definite velocity.
  2. All the particles in the medium vibrate in such a way that the amplitude of the vibration for all particles is the same.
  3. These waves carry energy while propagating.

Stationary waves:

  1. Crests and troughs are formed in transverse stationary waves. Compression and rarefaction are formed in longitudinal stationary waves. These waves neither move forward nor backward in a medium i.e., they will not advance in a medium.
  2. Except at nodes, all other particles of the medium vibrate such that the amplitude of vibration is different for different particles. The amplitude is minimum or zero at nodes and maximum at antinodes.
  3. These waves do not transport energy.

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 3.
Show that the velocity of a traveling wave produced in a string is v = \(\sqrt{\frac{T}{\mu}}\)
Answer:
Let us consider an elemental segment in the string as shown in the Figure. Let A and B be two points on the string at an instant of time. Let dl and dm be the length and mass of the elemental string, respectively. By definition, linear mass density, μ is
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 10
μ = \(\frac { dm }{ dl }\) … (1)
dm = μ dl … (2)
Consider an elemental string AB having a curvature which looks like an arc of a circle with centre at O, radius R and the arc subtending an angle θ at the origin O as shown in Figure. The angle 0 can be written in terms of arc length and radius as \(\frac { dl }{ R }\) = θ. The centripetal acceleration supplied by the tension in the string is
acp = \(\frac{v^{2}}{\mathrm{R}}\) … (3)
Then, centripetal force can be obtained when mass of the string (dm) is included in equation (3)
Fcp = \(\frac{(dm)v^{2}}{\mathrm{R}}\) … (4)
Experienced by elemental string can be calculated by substituting equation (2) in equation (4) we get the centripetal force as
\(\frac{(dm)v^{2}}{\mathrm{R}}\) = \(\frac{\mu v^{2} d l}{R}\) … (5)
The tension T acts along the tangent of the elemental segment of the string at A and B. Since the arc length is very small, variation in the tension force can be ignored. T can be resolved into horizontal component T cos (\(\frac { θ }{ 2 }\)) and vertical component T sin (\(\frac { θ }{ 2 }\)).

The horizontal components at A and B are equal in magnitude but opposite in direction. Hence, they cancel each other. Since the elemental arc length AB is taken to be very small, the vertical components at A and B appears to acts vertical towards the centre of the arc and hence, they add up. The net radial force Fr is
Fr = 2Tsin(\(\frac { θ }{ 2 }\)) … (6)
Since the amplitude of the wave is very small when it is compared with the length of the string, the sine of small angle is approximated
as sin (\(\frac { θ }{ 2 }\)) ≈ \(\frac { θ }{ 2 }\). Hence, equation (6) can be written as,
Fr = 2T x \(\frac { θ }{ 2 }\) = Tθ … (7)
But θ = \(\frac { dl }{ R }\), therefore substituting in equation (7), we get
Fr = T \(\frac { dl }{ R }\) … (8)
Applying Newton’s second law to the elemental string in the radial direction, under equilibrium, the radial component of the force is equal to the centripetal force. By equating equation (5) and equation (8), we get,
T \(\frac { dl }{ R }\) = μv²dl
v = \(\sqrt{\frac{\mathrm{T}}{\mu}}\) measured in ms-1

Question 4.
Describe Newton’s formula for velocity of sound waves in air and also discuss the Laplace’s correction.
Answer:
Newton assumed that when sound propagates in air, the formation of compression and rarefaction takes place in a very slow manner so that the process is isothermal in nature. It is found that, the heat produced during compression (pressure increases, volume decreases), and heat lost during rarefaction (pressure decreases, volume increases) occur over a period of time such in a way that the temperature of the medium remains constant. Hence, by treating the air molecules to form an ideal gas, the changes in pressure and volume obey Boyle’s law, Mathematically
PV= Constant …(1)
Differentiating equation (1), we get
PdV + Vdp = 0
(or) P = – V\(\frac { dp }{ dv }\) = BT … (2)
where, BT is an isothermal bulk modulus of air.
v = \(\sqrt{\frac{\mathrm{B}}{\rho}}\) … (3)
Substituting equation (2) in equation (3), the speed of sound in air is
vT = \(\sqrt{\frac{\bar{B}_{\mathrm{T}}}{\rho}}\) = \(\sqrt{\frac{\mathrm{P}}{\rho}}\)
Since P is the pressure of air whose value at NTP (Normal Temperature and Pressure) is 76 cm of mercury, we have
P = (0.76 x 13.6 x 10³ x 9.8)Nm-2
ρ = 1.293 kg m-3.
Here p is density of air. Then the speed of sound in air at normal temperature and pressure (NTP) is
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 11
But the speed of sound in air at 0°C is experimentally observed as 332 ms-1 that is close up to 16% more than theoretical value.

Laplace correction: Laplace satisfactorily corrected this discrepancy by assuming that when the sound propagates through a medium, the particles oscillate very rapidly such that the compression and rarefaction occur very fast. Hence the exchange of heat produced due to compression and cooling effect due to rarefaction do not take place, because, air (medium) is a poor conductor of heat. Since, temperature is no longer considered as a constant here, propagation of sound is an adiabatic process. By adiabatic considerations, the gas obeys Poisson’s law (not Boyle’s law as Newton assumed), that is
PV’ = Constant … (4)
where, γ = \(\frac{\mathrm{C}_{\mathrm{p}}}{\mathrm{C}_{\mathrm{v}}}\), that is the ratio between specific heat at constant pressure and specific heat at constant volume.
Differentiating equation (4) on both the sides, we get
Vγ dP + P (γVγ-1 dV) = 0
or, γP = – V\(\frac { dp }{ dv }\) = BA … (5)
where, BA is the adiabatic bulk modulus of air.
v = \(\sqrt{\frac{\mathrm{B}}{\rho}}\)
Now, substituting equation (5) in equation (6), the speed of sound in air is
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 12
Since air contains mainly, nitrogen, oxygen, hydrogen etc, (diatomic gas), we take γ = 1.47. Hence, speed of sound in air is vA = (\(\sqrt{1.4}\))(280ms-1) = 331.30 ms-1, which is very much closer to experimental data.

Question 5.
Write short notes on reflection of sound waves from plane and curved surfaces.
Answer:
When the sound waves hit the plane wall, they bounce off in a manner similar to that of light. When a loudspeaker is kept at an angle with respect to a wall (plane surface), then the waves coming from the source (assumed to be a point source) can be treated as spherical wave fronts. Hence, the reflected wave front on the plane surface is also spherical, such that its centre of curvature can be treated as the image of the sound source (virtual or imaginary loud speaker) that can be assumed to be at a position behind the plane surface. These are shown in figures.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 13
The behaviour of sound is different when it is reflected from different surfaces-convex or concave or plane. The sound reflected from a convex surface is spread out and so it is easily attenuated and weakened. Whereas, if it is reflected from the concave surface it will converge at a point and this can be easily amplified. The parabolic reflector (curved reflector) that is used to focus the sound precisely to a point is used in designing the parabolic mics which are known as high directional microphones.

We know that any surface (smooth or rough) can absorb sound. For instance, the sound produced in a big hall or auditorium or theatre is absorbed by the walls, ceilings, floor, seats etc. To avoid such losses, a curved sound board (concave board) is kept in front of the speaker, in such a way that the board reflects the sound waves of the speaker towards the audience. This method will minimize the spreading of sound waves in all possible direction in that hall it also enhances the uniform distribution of sound throughout the hall. Hence a person sitting at any position in that hall can hear the sound without any disturbance.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 14

Question 6.
Briefly explain the concept of the superposition principle.
Answer:
When two or more waves in a medium overlap, their total displacement is the vector sum of the individual displacements.
Let us consider two functions which characterize the displacement of the waves, for example,
y1 = A1 sin(kx – ωt)
and y2 = A2 sin(kx – ωt)
Since both y1 and y2 satisfy the wave equation (solutions of wave equation) then their algebraic sum
y = y1 + y2
also satisfies the wave equation. It is meant that the displacements are additive.

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 7.
Explain how the interference of waves is formed.
Answer:
Interference is a phenomenon in which two waves superimpose to form a resultant wave of greater, lower, or the same amplitude.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 15
Let us consider two harmonic waves having identical frequencies, constant phase difference φ, and same waveform (can be treated as coherent source), but having amplitudes A1 and A2, then
y1 = A1 sin(kx – ωt) … (1)
y2 = A2 sin(kx – ωt) … (2)
Suppose they move simultaneously in a particular direction, then interference occurs (i.e., the overlap of these two waves). Mathematically y = y1 + y2 … (3)
Hence by substituting equation (1) and equation (2) in equation (3), we get
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 16
By squaring and adding equation (5) and (6), we get,
A² = A1² + A2² + 2A1A2cosφ … (8)
Since, intensity is square of the amplitude (I – A²), we get,
I = I1 + I2 + 2\(\sqrt{\mathrm{I}_{1} \mathrm{I}_{2}} \cos \varphi\) … (9)
This means the resultant intensity at any point depends on the phase difference at that point.

Question 8.
Describe the formation of beats.
Answer:
When two or more waves superimpose each other with slightly different frequencies, then a sound having periodically varying amplitude at a point is observed. This phenomenon is known as beats. The number of amplitude maxima per second is called beat frequency. If we have two sources, then their difference in frequency gives the beat frequency.
Number-of beats per second
n = \(\left|f_{1}-f_{2}\right|\) Per second

Question 9.
What are stationary waves? Explain the formation of stationary waves and also write down the characteristics of stationary waves.
Answer:
When the wave hits the rigid boundary it bounces back to the original medium and can interfere with the original waves. A pattern is formed, that is known as standing waves or waves stationary. Let us consider two harmonic progressive waves (formed by strings) that have the same amplitude and same velocity but move in opposite directions. Then the displacement of the first wave (incident wave) is
y1 = A sin(kx – ωt) … (1)
(waves move toward right)
The displacement of the second wave (reflected wave) is
y2 = A sin(kx + ωt) … (2)
(waves move toward left)
both will interfere with each other by the principle of superposition, the net displacement is
y = y1 + y2 … (3)
By substituting equation (1) and equation (2) in equation (3), we get
y = \(\left\{\begin{array}{l}
\mathrm{A} \sin (k x-\omega t) \\
+\mathrm{A} \sin (k x+\omega t)
\end{array}\right.\) … (4)
Using trigonometric identity, we rewrite equation (4) as
y(x, t) = 2A cos(ωt) sin(kx) … (5)
This represents a stationary wave or standing wave, It is meant that this wave does not move either forward or backward, whereas progressive or travelling waves will move forward or backward. In addition, the displacement of the particle in equation (5) can be written in more compact form,
y(x, t) = A’cos(cot)
where, A’ = 2A sin(Ax). It is implied implying that the particular element of the string executes simple harmonic motion with amplitude equals to A’. The maximum of this amplitude occurs at positions for which
sin(kx) = 1
⇒ kx = \(\frac { π }{ 2 }\), \(\frac { 3π }{ 2 }\), \(\frac { 5π }{ 2 }\), … = nπ
where m takes half-integer or half-integral values. The position of maximum amplitude is known as an antinode. Expressing wave number in terms of wavelength, let us represent the anti-nodal positions as
xm = (\(\frac { 2m+1 }{ 2 }\)) \(\frac { λ }{ 2 }\) … (6)
where, m = 0, 1, 2 ….
For m = 0 we have maximum at
x0 = \(\frac { λ }{ 2 }\)
For m = 1 we have maximum at
x0 = \(\frac { 3λ }{ 4 }\)
For m = 2 we have maximum at
x2 = \(\frac { 5λ }{ 4 }\)
and so on.
The distance between two successive antinodes can be computed by,
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 17
Similarly, the minimum of the amplitude A’ also occurs at some points in the space, and these points can be determined by setting
sin(kx) = 0
⇒ kx = 0, π, 2π, 3π, … = nπ
where n takes integer or integral values. It is noted that the elements at these points do not vibrate (not move), and the points are called nodes. The nth nodal positions is given by,
xn = n\(\frac { λ }{ 2 }\) … (7)
where, n = 0, 1, 2, …
For n = 0 we have minimum at
xo = 0
For n = 1 we have minimum at
x1 = \(\frac { λ }{ 2 }\)
For n = 2 we have maximum at
x2 = λ
and so on.
The distance between any two successive nodes can be calculated as
xn – xn-1 – n\(\frac { λ }{ 2 }\) – (n-1)\(\frac { λ }{ 2 }\) = \(\frac { λ }{ 2 }\)

Characteristics of stationary waves:

  • Stationary waves are characterized by the confinement of a wave disturbance between two rigid boundaries. It is meant that the wave does not move forward or backward in a medium (does not advance), it remains steady at its place. Hence, they are called “stationary waves or standing waves”.
  • Certain points in the region in which the wave exists have maximum amplitude, called anti-nodes. At certain points, the amplitude is minimum or zero, called nodes.
  • The distance between two consecutive nodes (or) anti-nodes is \(\frac { λ }{ 2 }\).
  • The distance between a node and its neighboring anti-node is \(\frac { λ }{ 4 }\).
  • The transfer of energy along the standing wave is zero.

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 10.
Discuss the law of transverse vibrations in stretched strings.
Answer:
There are three laws of transverse vibrations of stretched strings that are given as follows:
(i) The law of length: For a given wire with tension T (which is fixed) and mass per unit length µ. (fixed) the frequency varies inversely with the vibrating length. Therefore,
f ∝ \(\frac { 1 }{ f }\) ⇒ f = \(\frac { C }{ l }\)
⇒ l x f = C, when C is a constant.

(ii) The law of tension: For a given vibrating length l (fixed) and mass per unit length µ (fixed) the frequency varies directly with the square root of the tension T,
f ∝ \(\sqrt{T}\)
⇒ f = A\(\sqrt{T}\), when A is a constant.

(iii) The law of mass: For a given vibrating length l (fixed) and tension T (fixed) the frequency varies inversely with the square root of the mass per unit length μ,
f ∝ \(\frac{1}{\sqrt{\mu}}\) when B is a constant.

Question 11.
Explain the concepts of frequency, harmonics and detail.
Answer:
(i) The fundamental frequency is the lowest natural frequency.

(ii) If natural frequencies are written as integral multiples of the fundamental frequency, then the frequencies are said to be in harmonics. So, the first harmonic is v1 = v1, (the fundamental frequency is called first harmonics), the second harmonics is v2 = 2v1 the third harmonics is v3 = 3v1, and so on.

(iii) The frequency higher than the fundamental frequency can be produced by blowing air strongly at the open end. Such frequencies are called overtones.

First overtone, (f2 = 3f1) since here, the frequency is three times the fundamental frequency it is called third harmonic. Second overtone, (f3 = 5f1) and since n = 5 here, this is called fifth harmonic.

Question 12.
What is a sonometer? Give its construction and working. Explain how to determine the frequency of tuning fork using a sonometer.
Answer:
Sonometer is used for sound-related measurements. Using this device, The following quantities can be determined.
(i) The frequency of the tuning fork or frequency of the alternating current.
(ii) The tension in the string.
(iii) The unknown hanging mass.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 18
Construction: The sonometer is made up of a hollow box that is one meter long with a uniform metallic thin string attached to it. One end of the string is connected to a hook and the other end is connected to a weight hanger through a pulley as shown in Figure. Since only one string is used, it is also known as monochord. The weights are added to the free end of the wire to increase the tension of the wire. Two adjustable wooden knives are put over the board, and their positions are adjusted to change the vibrating length of the stretched wire.

Procedure: A transverse stationary or standing wave is produced. So, at the knife edges P and Q, nodes are formed. In between the knife edges, anti-nodes are formed.
If the length of the vibrating element is l then
l = \(\frac { λ }{ 2 }\) ⇒ λ = 2l
Let f be the frequency of the vibrating element, T the tension in the string, and p the mass per unit length of the string.
Then using the the equation v = \(\sqrt{\frac{\mathrm{T}}{\mu}}\) measured in ms-1, we get,
f = \(\frac { v }{ λ }\) = \(\frac { 1 }{ 2l }\)\(\sqrt{\frac{\mathrm{T}}{\mu}}\) in Hertz.
Let ρ be the density of the material of the string and d be the diameter of the string. Then the mass per unit length μ,
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 19

Question 13.
Write short notes on intensity and loudness.
Answer:
The intensity of sound is defined as “the sound power transmitted per unit area taken normal to the propagation of the sound wave”. The intensity of sound is inversely proportional to the square of the distance from the source.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 20
This is known as the inverse square law of sound intensity. Two sounds with the same intensities need not have the same loudness. For example, the sound heard during the explosion of balloons in a silent closed room is very loud when compared to the same explosion happening in a noisy market.

If the intensity of sound is increased then loudness also increases. Loudness depends on both intensities of the sound wave and sensitivity of the ear.

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 14.
Explain how overtones are produced in a,
(a) closed organ pipe
(b) Open organ pipe
Answer:
(a) Closed organ pipes: If one end of a pipe is closed, the wave reflected at this closed-end is 180° out of phase with the incoming wave. So, there is no displacement of the particles at the closed end. Hence, nodes are formed at the closed end and anti-nodes are formed at the open end.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 21
Consider the simplest mode of vibration of the air column called the fundamental mode. Anti-node is formed at the open end and node at the closed end. From the above figure, let L be the length of the tube and the wavelength of the wave produced. For the fundamental mode of vibration, we have,
– L = \(\frac{\lambda_{1}}{4}\) (or)
Wave length λ1 = 4L
The frequency of the note emitted is
f1 = \(\frac{v}{\lambda_{1}}\) = \(\frac { v }{ 4L }\)
which is called the fundamental note.
The frequencies higher than the fundamental frequency can be produced by blowing air strongly at the open end. Such frequencies are called overtones.
The second mode of vibration in open pipes is shown in the figure.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 22
is called the first overtone, since here, the frequency is three times the fundamental frequency it is called third harmonic. The Figure shows the third mode of vibration having three nodes and three anti-nodes.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 22a
is called the second overtone, and since n = 5 here, this is called fifth harmonic. Hence, the closed organ pipe has only odd harmonics and the frequency of the nth harmonic is fn = (2n+l)f1. Hence, the frequencies of harmonics are in the ratio,
f1 : f2 : f3 : f4 = 1 : 3 : 5 : 7 : …

(b) Open organ pipes:
The flute is an example of an open organ pipe. It is a pipe with both ends are opened. At both open ends, anti-nodes are formed. Consider the simplest mode of vibration of the air column called fundamental mode. Since anti-nodes are formed at the open end, a node is formed at the mid-point of the pipe.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 22b
From above Figure, if L be the length of the tube, the wavelength of the wave produced is given by
L=\(\frac{\lambda_{1}}{2}\) (or) λ1 = 2L
The frequency of the note emitted is
f1 = \(\frac{v}{\lambda_{1}}\) = \(\frac { v }{ 2L }\)
That is called the fundamental note.
The frequencies higher than the fundamental frequency can be produced by blowing air strongly at one of the open ends. Such frequencies are called overtones.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 22c
The second mode of vibration in open pipes is shown in figure. It has two nodes and three anti-nodes,
∴ L = λ2 (or) λ2 = L
The frequency,
f2 = \(\frac{v}{\lambda_{2}}\) = \(\frac { v }{ L }\) = 2 x \(\frac { v }{ 2L }\) = 2f1
is called first over tone. Since n = 2 here, it is called the second harmonic.
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 23
The Figure above shows the third mode of vibration having three nodes and four anti-nodes
∴ L = \(\frac { 3 }{ 2 }\)λ3 (or) λ3 = \(\frac { 2L }{ 3 }\)
The frequency,
f3 = \(\frac{v}{\lambda_{3}}\) = \(\frac { 3v }{ 2L }\) = 31
is called second over tone. Since n = 3 here, it is called the third harmonic.
Hence, the open organ pipe has all the harmonics, and the frequency of the nth harmonic is fn = nf1.
Hence, the frequencies of harmonics are in the ratio f1 : f2 : f3 : f4 = 1 : 2 : 3 : 4 : …

Question 15.
How will you determine the velocity of sound using the resonance air column apparatus?
Answer:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 24
The resonance air column apparatus is used to measure the speed of sound in air at room temperature.

Construction:
(i) It consists of a cylindrical glass tube of one-meter length whose one end A is open and another end B is connected to the water reservoir R through a rubber tube as shown in Figure.

(ii) This cylindrical glass tube is mounted on a vertical stand with a scale attached to it. The tube is partially filled with water and the water level can be adjusted by raising or lowering the water in the reservoir R.

(iii) The surface of the water will act as a closed-end and others as the open end. Hence, it behaves like a closed organ pipe, forming nodes at the surface of water and antinodes at the closed end.

(iv) When a vibrating tuning fork is brought near the open end of the tube, longitudinal waves are formed inside the air column.

(v) These waves move downward as shown in Figure, and reach the surfaces of water and get reflected and produce standing waves.

(vi) The length of the air column is varied by changing the water level until a loud sound is produced in the air column.

(vii) At this particular length the frequency of waves in the air column resonates with the frequency of the tuning fork (natural frequency of the tuning fork).

(viii) At resonance, the frequency of sound waves produced is equal to the frequency of the tuning fork. This will occur only when the length of the air column is proportional to (\(\frac { 1 }{ 4 }\))th of the wavelength of the sound waves produced. \(\frac { 1 }{ 4 }\)λ = L1 … (1)
But since the antinodes are not exactly formed at the open end, a Correction is to include. It is called end correction e, by assuming that the antinode is formed at some small distance above the open end. Including this end correction, the first resonance is \(\frac { 1 }{ 4 }\)λ = L1 + e … (2)
Now the length of the air column is increased to get the second resonance. Let L2 be the length at which the second resonance occurs. Again taking end correction into account, we have
\(\frac { 3 }{ 4 }\)λ = L2 + e … (3)
In order to avoid end correction, let us make the difference of equation (3) and equation (2), we get
\(\frac { 3 }{ 4 }\)λ – \(\frac { 1 }{ 4 }\)λ = (L2 + e) – (L1 + e)
⇒ \(\frac { 1 }{ 2 }\)λ = L2 – L1 = ∆L
⇒ λ = 2∆L
The speed of the sound in air at room temperature can be calculated by using the formula
v = fλ = 2f∆L.

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 16.
What is meant by the Doppler effect? Discuss the following cases.
(i) Source in motion and Observer at rest

  • Source moves towards the observer
  • Source moves away from the observer

(ii) Observer in motion and Source at rest.

  • The observer moves towards Source
  • Observer resides away from the Source

(iii) Both are in motion

  • Source and Observer approach each other
  • Source and Observer resides from each other
  • Source chases Observer
  • Observer chases Source

Answer:
When the source and the observer are in relative motion with respect to each other and to the medium in which sound is propagated, the frequency of the sound wave observed is different from the frequency of the source. This phenomenon is called Doppler Effect.

(i) Source in motion and the observer at rest:
(a) Source moves towards die observer:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 25
Suppose a source S moves to the right (as shown in Figure) with a velocity vs and let the frequency of the sound waves produced by the source be fs. It is assumed that the velocity of sound in a medium is v.

The compression (sound wavefront) produced by the source S at three successive instants of time are shown in the Figure. When S is at position x1 the compression is at C1. When S is at position x2, the compression is at C2 and similarly for x3 and C3.

It is assumed that if C1 reaches the observer’s position A then at that instant C2 reaches point B and C3 reaches point C as shown in the Figure. Obviously it is seen that the distance between compressions C2 and C3 is shorter than the distance between C1 and C2.

It is meant that the wavelength decreases when the source S moves towards the observer O. But frequency is inversely related to wavelength and therefore, frequency increases.
Calculation:
Let λ be the wavelength of the source S as measured by the observer when S is at position x1 and λ’ be the wavelength of the source observed by the observer when S moves to position x2.

Then the change in wavelength is ∆λ = λ – λ’ = vst, where t is the time taken by the source to travel between x1 and x2 Therefore,
λ’ = λ – vst … (1)
But t = \(\frac { λ }{ v }\) … (2)
On substituting equations (2) in equation (1), we get.
λ’ = λ(1 – \(\frac{v_{s}}{v}\))
Since frequency is inversely proportional to wavelength, we have
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 26
Since, \(\frac{v_{s}}{v}\) << 1, by using the binomial expansion and retaining only first order in \(\frac{v_{s}}{v}\), we get
f ‘ = f(1 + \(\frac{v_{s}}{v}\)) … (4)

(b) Source moves away from the observer Since the velocity of the source is opposite in direction when compared to case (a), hence by changing the sign of the velocity of the source in the above case i.e., by substituting (vs → – v ) in equation (1), we get
f ‘= \(\frac{f}{\left(1+\frac{v_{s}}{v}\right)}\) … (5)
Using binomial expansion again, we get
f ‘= f(1 – \(\frac{v_{s}}{v}\)) … (6)

(ii) Observer in motion and source at rest:
(a) Observer moves towards Source:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 27
We can assume that the observer O moves towards the source S with velocity vo. The source S is at rest and the velocity of sound waves (with respect to the medium) produced by the source is v.
From the Figure, It is observed that both vo and v are in opposite direction. Then, their relative velocity is vr = v + vo. The wavelength of the sound wave is λ = \(\frac { v }{ f }\), which means the frequency observed by the observer O is f ‘ = \(\frac{v_{r}}{\lambda}\). Then
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 28

(b) Observer recedes away from the Source: If the observer O is moving away (receding away) from the source S, then velocity v0 and v move in the same direction. Hence, their relative velocity is vr = v – v0. Hence, the frequency observed by the observer O is
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 29

(iii) Both are in motion:
(a) Source and observer approach each other:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 30
Let vs and vo be the respective velocities of source and observer approaching each other as shown in Figure. In order to calculate the apparent frequency observed by the observer, let us have a dummy (behaving as observer or source) in between the source and observer. Since the dummy is at rest, the dummy (observer) observes the apparent frequency due to approaching source as given in equation f ‘ =\(\frac{f}{\left(1-\frac{v_{s}}{v}\right)}\)
fd = \(\frac{f}{\left(1-\frac{v_{s}}{v}\right)}\) … (1)
The true observer approaches the dummy from the other side at that instant of time. Since the source (true source) comes in a direction opposite to the true observer, the dummy (source) is treated as a stationary source for the true observer at that instant. Hence, apparent frequency when the true observer approaches the stationary source (dummy source), f’ = f(1 + \(\frac{v_{0}}{v}\)).
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 31
Since this is true for any arbitrary time, therefore, comparing equation (1) and equation (2), we get
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 32

(b) Source and observer recede from each other:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 33
It is noticed that the velocity of the source and the observer each point in opposite directions with respect to the case in (a) and hence, we substitute (vs → – vs) and (v0 → – v0) in equation (3), and therefore, the apparent frequency observed by the observer when the source and observer recede from each other is f’ = \(\left(\frac{v-v_{0}}{v+v_{s}}\right)\)f

(c) Source chases the observer:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 33a
Only the observer’s velocity is oppositely directed when compared to case (a). Therefore, substituting (v0 → – v0) in equation (3), we get f’ = \(\left(\frac{v-v_{0}}{v-v_{s}}\right)\)f

(d) Observer chases the source:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 34
Only the source velocity is oppositely directed when compared to case (a). Therefore, substituting (vs → – vs) in equation (3), we get f’ = \(\left(\frac{v+v_{0}}{v+v_{s}}\right)\)f

IV. Numerical Problems:

Question 1.
The speed of a wave in a certain medium is 900 m/s. If 3000 waves pass over a certain point of the medium in 2 minutes, then compute its wavelength?
Answer:
Given:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 35

Question 2.
Consider a mixture of 2 mol of helium and 4 mol of oxygen. Compute the speed of sound in this gas mixture at 300 K.
Answer:
Number of molecules of helium = 2
Number of molecules of oxygen = 4
When helium and oxygen are mixed, hence the molecular weight of the mixture of gases is given by
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 36
In addition, helium is monoatomic,
\(\mathrm{C}_{v_{2}}\) = \(\frac { 2R }{ 2 }\)
Oxygen is diatomic \(\mathrm{C}_{v_{1}}\) = \(\frac { 5R }{ 2 }\)
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 37
Ratio of specific heat capacitors of a mixture of gases is
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 38
According to Laplace, the speed of sound in a gas is
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 39
∴ The speed of sound = 400.9 m/s

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 3.
A ship in a sea sends SONAR waves straight down into the seawater from the bottom of the ship. The signal reflects from the deep bottom bedrock and returns to the ship after 3.5 s. After the ship moves to 100 km it sends another signal which returns back after 2 s. Calculate the depth of the sea in each case and also compute the difference in height between two cases.
Answer:
In the first case
time = 3.5s
Velocity sound in sea water = 1450 m/s
Distance 2d = v x t
= 1450 x 3.5 = 5,075 m
Depth of the sea d = \(\frac { 5075 }{ 2 }\) = 2537.5 m
In the second case,
time = 2s
Velocity of sound in water = 1450 m/s
Distance 2d = vt
= 1450 x 2
= 2900 m
Depth of the sea d = \(\frac { 2900 }{ 2 }\) = 1450
Difference ∆d = 2537.5 – 1450 = 1087.5
= 1087.5 m

Question 4.
A sound wave is transmitted into a tube as shown in the figure. The sound wave splits into two waves at point A which recombine at point B. Let R be the radius of the semi-circle which is varied until the first minimum. Calculate the radius of the semi-circle if the wavelength of the sound is 50.0 m.
Answer:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 40
Path difference = πR – 2R
[Here AB = 2R; Semicircle path = πR]
Formula:
Path difference = (2n – 1)\(\frac { λ }{ 2 }\) (for minimum n – 1)
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 41

Question 5.
N tuning forks are arranged in order of increasing frequency and any two successive tuning forks give n beats per second when sounded together. If the last fork gives double the frequency of the first (called as octave), Show that the frequency of the first tuning fork is f = (N – 1)n.
Answer:
f,f + n,f+ 2n, … f + (m – 1)n
f + (N – 1)n = 2f
n = \(\frac { f }{ N-1 }\)
(or) f = n(N – 1)

Question 6.
Let the source propagate a sound wave whose intensity at a point (initially) be I. Suppose we consider a case when the amplitude of the sound wave is doubled and the frequency is reduced to one-fourth. Calculate now the new intensity of sound at the same point?
Answer:
Given:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 42

Question 7.
Consider two organ pipes of the same length in which one organ pipe is closed and another organ pipe is open. If the fundamental frequency of closed pipe is 250 Hz. Calculate the fundamental frequency of the open pipe.
Answer:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 43
Formula:
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 44

Question 8.
Police in a siren car moving with a velocity of 20 ms-1 chases a thief who is moving in a car with a velocity v0ms-1. The police car sounds at frequency 300 Hz, and both of them move towards a stationary siren of frequency 400 Hz. Calculate the speed at which the thief is moving.
Answer:
Velocity of sound v = 330 m/s
Velocity of a police siren car vs = 20 m/s
Frequency of a police siren car f = 300 Hz
Let the velocity of the thief be v m/s
The frequency of police siren heard by a thief is
f1 = \(\left(\frac{330-v}{330-20}\right)\) x 300
= \(\left(\frac{330-v}{310}\right)\) x 300 Hz
Frequency of stationary siren = 400 Hz
Frequency of stationaiy siren heard by a thief
f2 = \(\left(\frac{330+v}{330}\right)\) x 400
If there are no beats then
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 45

Question 9.
Consider the following function,
(a) y = x² + 2 α tx
(b) y = (x + vt)²
which among the above function can be characterized as a wave?
Answer:
Given:
Formula:
For the function to be a wave function \(\frac { (dy/dx) }{ (dy/dt) }\) should be a constant.
For function (a):
Samacheer Kalvi 11th Physics Guide Chapter 11 Waves 46
Hence, function
(a) does not describe a wave.
(b) satisfies wave function.

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

V. Conceptual Questions:

Question 1.
Why is it that transverse waves cannot be produced in a gas? Can the transverse waves be produced in solids and liquids?
Answer:
They travel in the form of crests and troughs and so involve a change in shape. They can be produced in a medium that has elasticity in shape. As gas has no elasticity of shape, hence transverse waves cannot be produced in a gas. Transverse waves can be produced in solids anion the surface of liquids.

Question 2.
Why is the roar of our national animal different from the sound of a mosquito?
Answer:
The pitch of the sound of our national animal lion is higher than that of mosquitoes. In addition, the frequency of sound waves generated by our national animal is more than the frequency of sound waves generated by mosquitoes.

Question 3.
A sound source and listener are both stationary and a strong wind is blowing. Is there a Doppler effect?
Answer:
When both source and listener are stationary, there is no relative motion between the source and the observer. Hence there is no Doppler effect.

Question 4.
In an empty room, why is it that a tone sounds louder than in the room having things like furniture, etc.
Answer:
When a room has furniture reverberation time can be suitably decreased since furniture has a large absorption coefficient of sound. So a tone sounds with lesser amplitude and intensity. Whereas in an empty room, reverberation time will be more than a room having things like furniture.

Samacheer Kalvi 11th Physics Guide Chapter 11 Waves

Question 5.
How do animals sense the impending danger of hurricanes?
Answer:
Hurricane produces a shock wave which has a speed greater than the speed of sound. It travels with a supersonic sound that can be easily sensed by animals using the Doppler effect. The multiple reflections of sound can be easily sensed by animals.

Question 6.
Is it possible to realize whether a vessel kept under the tap is about to fill with water?
Answer:
Yes. The frequency of a note generated by an air column is inversely proportional to its length. Consequently, as the length of the air column decreases, the frequency increases, i.e., the note becomes more shrill. In our case, when a vessel kept under the top is about to fill with water, as the water level rises, the length of the air column in the vessel goes on decreasing and the emitted sound becomes more and more shrill. Hence it is realised.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Computer Science Guide Pdf Chapter 17 Computer Ethics and Cyber Security Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

11th Computer Science Guide Computer Ethics and Cyber Security Text Book Questions and Answers

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Part -I

Choose The Correct Answer

Question 1.
Which of the following deals with procedures, practices and values?
a) piracy
b) programs
c) virus
d) computer ethics
Answer:
d) computer ethics

Question 2.
Commercial programs made available to the public illegally are known as
a) freeware
b) warez
c) free software
d) software
Answer:
b) warez

Question 3.
Which one of the following are self-repeating and do npt require a computer program to attach themselves?
a) viruses
b) worms
c) spyware
d) Trojans
Answer:
b) worms

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 4.
Which one of the following tracks a user visits a website?
a) spyware
b) cookies
c) worms
d) Trojans
Answer:
b) cookies

Question 5.
Which of the following is not a malicious program on computer systems?
a) worms
d) Trojans
c) spyware
d) cookies
Answer:
d) cookies

Question 6.
A computer network security that monitors and controls incoming and outgoing traffic is
a) Cookies
b) Virus
c) Firewall
d) worms
Answer:
c) Firewall

Question 7.
The process of Converting cipher text to plain text is called
a) Encryption
b) Decryption
c) key
d) proxy server
Answer:
b) Decryption

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 8.
e-commerce means
a) electronic commerce
b) electronic data exchange
c) electric data exchange
d) electronic commercialization.
Answer:
a) electronic commerce

Question 9.
Distributing unwanted e-mail to others is called
a) scam
b) spam
c) fraud
d) spoofing
Answer:
b) spam

Question 10.
Legal recognition for transactions are carried out by
a) Electronic Data Interchange
b) Electronic Data Exchange
c) Electronic Data Transfer
d) Electrical Data Interchange
Answer:
a) Electronic Data Interchange

Part – II

Very Short Answers

Question 1.
What is harvesting?
Answer:
A person or program collects login and password information from a legitimate user to illegally gain access to others account(s).

Question 2.
What are Warez?
Answer:
Commercial programs that are made available to the public illegally are often called warez.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 3.
Write a short note on cracking.
Answer:
Cracking is where someone edits a program source so that the code can be exploited or modified. “Cracking” means trying to get into computer systems in order to steal, corrupt, or illegitimately view data.

Question 4.
Write two types of cyber attacks.
Answer:
The following are cyber attacks:

  • Virus
  • Worms
  • Spyware
  • Ransomware

Question 5.
What is a Cookie?
Answer:
A cookie (also called HTTP cookie, web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing the internet.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Part – III

Short Answers

Question 1.
What is the role of firewalls?
Answer:
Role of firewalls:

  • A firewall is a computer network security based system that monitors and controls incoming and outgoing network traffic based on predefined security rules.
  • A firewall commonly establishes a block between a trusted internal computer network and entrusted computer outside the network.

Question 2.
Write about encryption and decryption.
Answer:
Encryption and decryption are processes that ensure confidentiality that only authorized persons can access the information. Encryption is the process of translating plain text data (plaintext) into random and mangled data (called ciphertext). Decryption is the reverse process of converting the ciphertext back to plaintext. Encryption and decryption are done by cryptography. In cryptography, a key is a piece of information (parameter) that determines the functional output of a cryptographic algorithm.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 1

Question 3.
Explain symmetric key encryption.
Answer:
SYMMETRIC KEY ENCRYPTION:
Symmetric encryption is a technique to use the same key for both encryption and decryption.

The main disadvantage of symmetric key encryption is that all authorized persons involved, have to exchange the key used to encrypt the data before they can decrypt it. If anybody intercepts the key information, they may read all messages.
The following Figure depicts the working of symmetric key encryption.
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 2

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 4.
What are the guidelines to be followed by any computer user?
Answer:
Generally, the following guidelines should be observed by computer users:

  1. Honesty: Users should be truthful while using the internet.
  2. Confidentiality: Users should not share any important information with unauthorized people.
  3. Respect: Each user should respect the privacy of other users.
  4. Professionalism: Each user should maintain professional conduct.
  5. Obey The Law: Users should strictly obey the cyber law in computer usage.
  6. Responsibility: Each user should take ownership and responsibility for their actions.

Question 5.
What are ethical issues? Name some of them.
Answer:
An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as right (ethical) or wrong (unethical). These issues must be addressed and resolved to have a positive influence in society.

Some of the common ethical issues are listed below:

  • Cyber crime
  • Software Piracy
  • Unauthorized Access
  • Hacking
  • Use of computers to commit fraud
  • Sabotage in the form of viruses
  • Making false claims using computers

Part IV

Explain in Detail

Question 1.
What are the various crimes happening using computers?
Answer:
Cyber Crime:
Cyber crime is an intellectual, white-collar crime. Those who commit such crimes generally manipulate the computer system in an intelligent manner. For example – illegal money transfer via the internet.

Examples of some Computer crimes and their functions are listed below in the following Table :

Crime Function
Crime Function Hacking, threats, and blackmailing towards a business or a person.
Cyber stalking Harassing online.
Malware Malicious programs can perform a variety of functions including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions, and monitoring user’s computer activity without their permission.
Denial of service attack Overloading a system with fake requests so that it cannot serve normal legitimate requests.
Fraud Manipulating data, for example changing the banking records to transfer money to an unauthorized account.
Harvesting A person or program collects login and password information from a legitimate user to illegally gain access to others’ account(s).
Identity theft It is a crime where the criminals impersonate individuals, usually for financial gain.
Intellectual property theft Stealing practical or conceptual information developed by another person or company.
Salami slicing Stealing tiny amounts of money from each transaction.
Scam Tricking people into believing something that is not true.
Spam Distribute unwanted e-mail to a large number of internet users.
Spoofing It is a malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 2.
What is piracy? Mention the types of piracy? How can it be prevented?
Answer:
Software Piracy:
Software Piracy is about the copyright violation of software created originally by an individual or an institution. It includes stealing codes/programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.

In simple words, Software Piracy is “unauthorized copying of software*’. The following Figure shows a diagrammatical representation of software piracy.
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 3

Types Of Piracy:

Shareware: An entirely different approach to software piracy is called shareware, which acknowledges the futility of trying to stop people from copying software and instead relies on people’s honesty.

Warez: Commercial programs that are made available to the public illegally are often called warez.

Prevention Method:

  • Illegal copying and distribution of commercial software should not be practiced.
  • Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses that program regularly to pay a registration fee to the program’s author directly.

Question 3.
Write the different types of cyber attacks.
Answer:
Types Of Cyber Attacks:
Malware is a type of software designed through which criminals gain illegal access to software and cause damage. Various types of cyber-attacks and their functions are given in the following Table.

No. ‘Cyber Attack

Function

1. Virus A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common viruses is Trojan.

Trojan
A Trojan virus is a program that appears to perform one function (for example, virus removal) but actually performs malicious activity when executed.

2. Worms Worms are self-repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.
3. Spyware Spyware can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software.
4. Ransomware Ransomware is a type of malicious program that demands payment after launching a cyber-attack on a computer system. This type of malware has become increasingly popular among criminals and costs the organization millions each year.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

11th Computer Science Guide Computer Ethics and Cyber Security Additional Questions and Answers

Part I

Choose The Correct Answer

Question 1.
A moral code that is evaluated as right is ………………..
(a) piracy
(b) viruses
(c) cracking
(d) ethics
Answer:
(d) ethics

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 2.
Information Technology is widespread through ________
a) Computers
b) Mobile phones
c) Internet
d) All the above
Answer:
d) All the above

Question 3.
Stealing data from a computer system without knowledge or permission is called ………………..
(a) warez
(b) hacking
(c) cracking
(d) phishing
Answer:
(b) hacking

Question 4.
A(n) ________ is a crime which involves computer and network.
a) Cyber-crime
b) Ethics
c) Cyber-law
d) None of these
Answer:
a) Cyber-crime

Question 5.
……………….. is the intermediary between the end-users and a web browser.
(a) Firewall
(b) Proxy server
(c) Cookies
(d) Warez
Answer:
(b) Proxy server

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 6.
________ is a cybercrime.
a) Phishing
b) Hacking
c) Identity thefts
d) All the above
Answer:
d) All the above

Question 7.
________ is a cybercrime.
a) Pharming
b) Piracy
c) Online financial transaction
d) All the above
Answer:
d) All the above

Question 8.
Ethics means________
a) What is wrong
b) What is Right
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 9.
________ is a set of moral principles that rule the behavior of individuals who use computers,
a) Ethics
b) Cyber-Crime
c) Virus
d) None of these
Answer:
a) Ethics

Question 10.
An individual gains knowledge to follow the right behavior, using morals that are also known as________
a) Ethics
c) Phishing
c) Hacking
d) None of these
Answer:
a) Ethics

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 11.
________ refer to the generally accepted standards of right and wrong in the society,
a) Piracy
b) Morals
c) Virus
d) None of these
Answer:
b) Morals

Question 12.
________ is a cyber world standard.
a) Do not use pirated software
b) Do not hack
c) Do not steal others’ passwords
d) All the above
Answer:
b) Do not hack

Question 13.
________ is a guidelines of computer ethics.
a) Honesty
b) Confidentiality
c) Respect
d) All the above
Answer:
d) All the above

Question 14.
________ is a guidelines of computer ethics.
a) Professionalism
b) Obey the law
c) Responsibility
d) All the above
Answer:
d) All the above

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 15.
Identify the correct statement from the following.
a) Ethics is a set of moral principles that govern the behavior of an individual in a society.
b) Computer ethics is set of moral principles that regulate the use of computers by users.
c) An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as right or wrong.
d) All the above
Answer:
d) All the above

Question 16.
Identify the correct statement from the following related to ethics.
a) Users should be truthful while using the internet.
b) Users should not share any important information with unauthorized people.
c) Each user should respect the privacy of other users.
d) All the above
Answer:
d) All the above

Question 17.
Identify the correct statement from the following related to ethics.
a) Each user should maintain a professional conduct.
b) Users should strictly obey the cyber law in computer usage.
c) Each user should take ownership and responsibility for their actions
d) All the above
Answer:
d) All the above

Question 18.
Cybercrime is a(n) ________ crime.
a) Intellectual
b) White-collar
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 19.
Harassing through online is called ________
a) Cyber Stalking
b) Cyber Harassment
c) Cyber torture
d) None of these
Answer:
a) Cyber Stalking

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 20.
________ are malicious programs that can perform a variety of functions on user’s computer activity without their permission.
a) Cyber Stalking
b) Malware
c) Antivirus
d) None of these
Answer:
b) Malware

Question 21.
Malicious programs that can perform a variety of functions including ________ on user’s Computer activity without their permission.
a) Encrypting or Deleting sensitive data
b) Stealing
c) Hijacking core computing functions
d) All the above
Answer:
d) All the above

Question 22.
Overloading a system with fake requests so that it cannot serve normal legitimate requests is called________
a) Cyber Stalking
b) Malware
c) Denial of service attack
d) None of these
Answer:
c) Denial of service attack

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 23.
Manipulating data like changing the banking records to transfer money to an unauthorized account is called ________
a) Cyber Stalking
b) Malware
c) Denial of service attack
d) Fraud
Answer:
d) Fraud

Question 24.
________ means a person or program collects login and password information from a legitimate user to illegally gain access to others accounts.
a) Harvesting
b) Malware
c) Denial of service attack
d) Fraud
Answer:
a) Harvesting

Question 25.
________ is a crime where the criminals impersonate individuals, usually for financial gain.
a) Harvesting
b) Identity theft
c) Denial of service attack
d) Fraud
Answer:
b) Identity theft

Question 26.
________ means stealing practical or conceptual information developed by another person or company.
a) Harvesting
b) Identity theft
c) Intellectual property theft
d) Fraud
Answer:
c) Intellectual property theft

Question 27.
________ meant tricking people into believing something that is not true.
a) Harvesting
b) Scam
c) Intellectual property theft
d) Fraud
Answer:
b) Scam

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 28.
Stealing tiny amounts of money from each transaction means ________
a) Salami slicing
b) Scam
c) Intellectual property theft
d) Fraud
Answer:
a) Salami slicing

Question 29.
Distribute unwanted e-mail to a large number of internet is termed as ________
a) Salami slicing
b) Scam
c) Intellectual property theft
d) Spam
Answer:
d) Spam

Question 30.
________ is a malicious practice in which communication is send from unknown source disguised as a source known to the receiver.
a) Salami slicing
b) Scam
c) Spoofing
d) Spam
Answer:
c) Spoofing

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 31.
Software________ is about the copyright violation of software created originally by an individual or an institution.
a) Piracy
b) Fraud
c) Theft
d) None of these
Answer:
a) Piracy

Question 32.
________ includes stealing of codes / programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.
a) Piracy
b) Scam
c) Salami slicing
d) None of these
Answer:
a) Piracy

Question 33.
To prevent unauthorized access ________ is used.
a) Firewalls/ Intrusion Detection Systems
b) Virus and Content Scanners
c) Patches and Hotfixes
d) All the above
Answer:
d) All the above

Question 34.
IDS means.________
a) Intrusion Detection Systems
b) Intrusion Defective Systems
c) Intrusion Direction Systems
d) Intrusion Detach Systems
Answer:
a) Intrusion Detection Systems

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 35.
________ is intruding into a computer system to steal personal data without the owner’s permission or knowledge.
a) Piracy
b) Hacking
c) IDS
d) None of these
Answer:
b) Hacking

Question 36.
Steal a password is________
a) Piracy
b) Hacking
c) IDS
d) None of these
Answer:
b) Hacking

Question 37.
________ is where someone edits a program source so that the code can be exploited or modified.
a) Piracy
b) Hacking
c) Cracking
d) None of these
Answer:
c) Cracking

Question 38.
A cracker is called as a ________
a) Black hat
b) Dark side hacker
c) Both A and B
d) None of these
Answer:
c) Both A and B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 39.
Cracking means trying to get into computer systems in order to________ data.
a) Steal
b) Corrupt
c) Illegitimately view
d) All the above
Answer:
d) All the above

Question 40.
A ________ is someone who breaks into someone else’s computer system, often on a network, bypassing passwords or licenses in computer programs.
a) Cracker
b) Programmer
c) Server
d) None of these
Answer:
a) Cracker

Question 41.
Password cracking can be performed by________
a) Using an automated program
b) Can be manually realized
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 42.
IRC means ________
a) International Relay Chat
b) Internet Relay Chat
c) Internal Relay Chat
d) Internet Ready Chat
Answer:
b) Internet Relay Chat

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 43.
The method that uses social engineering crackers is ________ guessing.
a) Password
b) Username
c) Website name
d) URL
Answer:
a) Password

Question 44.
Identify the correct statement from the following related with cracking.
a) It is a method of getting passwords and information using human weakness.
b) Crackers find your personal information from some persona! data/facts and try to guess a password.
c) Crackers may send official e-mail requesting some sensitive information. It may look like a legitimate e-mail from bank or other official institution.
d) All the above
Answer:
d) All the above

Question 45.
________ is a collection of various technologies, processes and measures that reduces the risk of cyber attacks.
a) Cyber Security
b) Cyber Crime
c) Cyber Gateway
d) None of these
Answer:
a) Cyber Security

Question 46.
________ protects organizations and individuals from computer based threats.
a) Cyber Security
b) Cyber Crime
c) Cyber Gateway
d) None of these
Answer:
a) Cyber Security

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 47.
________ is a type of software designed through which the criminals gain iliegal access to software and cause damage.
a) Malware
b) Piracy
c) Cracking
d) None of these
Answer:
a) Malware

Question 48.
A ________ is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file.
a) Virus
b) Piracy
c) Cracking
d) None of these
Answer:
a) Virus

Question 49.
________ is the most common virus.
a) Trojan
b) Melisa
c) Sasser
d) Code Red
Answer:
a) Trojan

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 50.
A ________ is a program that appears to perform one function but actually performs malicious activity when executed.
a) Cracking
b) Trojan virus
c) Piracy
d) None of these
Answer:
b) Trojan virus

Question 51.
________ can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software.
a) Spyware
b) Worms
c) Ransomware
d) None of these
Answer:
a) Spyware

Question 52.
________ is a type of malicious program that demands payment after launching a cyber-attack on a computer system.
a) Spyware
b) Worms
c) Ransomware
d) None of these
Answer:
c) Ransomware

Question 53.
________ type of malware has become increasingly popular among criminals and costs the organizations millions each year.
a) Spyware
b) Worms
c) Ransomware
d) None of these
Answer:
c) Ransomware

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 54.
________ is an example of social engineering.
a) Phishing
b) Pharming
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 55.
Phishing is a type of computer crime used to attack, steal user data, including ________
a) Login name
b) Password
c) Credit card numbers
d) All the above
Answer:
d) All the above

Question 56.
________ occurs when an attacker targets a victim into opening an e-maiior an instant text message.
a) Phishing
b) Pharming
c) Both A and B
d) None of these
Answer:
a) Phishing

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 57.
________ is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent web sites without their knowledge or permission.
a) Phishing
b) Pharming
c) Both A and B
d) None of these
Answer:
b) Pharming

Question 58.
Pharming has been called________
a) Phishing without a trap
b) Phishing with a trap
c) Illegal access
d) None of these
Answer:
a) Phishing without a trap

Question 59.
________ is a cyber-attack intended to redirect a website’s traffic to a fake site.
a) Phishing
b) Pharming
c) Trojan
d) None of these
Answer:
b) Pharming

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 60.
MITM stands for ________
a) Man In The Middle
b) Malware In The Middle
c) Move In The Middle
d) Must In The Middle
Answer:
a) Man In The Middle

Question 61.
________ is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating With each other.
a) Cyber
b) Man-in-the-middle attack
c) Cracking
d) None of these
Answer:
b) Man-in-the-middle attack

Question 62.
MITM is also called as________
a) Janus attack
b) Junk attack
c) Genious attack
d) None of these
Answer:
a) Janus attack

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 63.
A ________ is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing internet,
a) Cookie
b) MITM
c) Cracking
d) Piracy .
Answer:
a) Cookie

Question 64.
A ________ cookie is also called as cookie.
a) HTTP or Web
b) Internet
c) Browser
d) All the above
Answer:
d) All the above

Question 65.
________ can be used to remember arbitrary pieces of information that the user previously entered into form fields such as names, addresses, passwords, and credit card numbers.
a) Cookie
b) MITM
c) Cracking
d) Piracy
Answer:
a) Cookie

Question 66.
An anonymous user is called as________
a) Hacker
b) Malware
c) Cracker
d) None of these
Answer:
a) Hacker

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 67.
Who can access the cookie information and misuse it?
a) Hacker
b) Service provider
c) Cracker
d) None of these
Answer:
a) Hacker

Question 68.
Web sites typically use cookies for the ________ reason.
a) To collect demographic information about who has visited the Web site.
b) Sites often use this information to track how often visitors come to the site and how long they remain on the site.
c) It helps to personalize the user’s experience on the Web site.
d) All the above
Answer:
d) All the above

Question 69.
________ can help to store personal information about users so that when a user subsequently returns to the site.
a) Cookie
b) MITM
c) Cracking
d) Piracy
Answer:
a) Cookie

Question 70.
________ do not act maliciously on computer system.
a) Virus
b) MITM
c) Cracking
d) Cookie
Answer:
d) Cookie

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 71.
________ are merely text files that can be deleted at any time.
a) Cookies
b) MITM
c) Cracking
d) Virus
Answer:
a) Cookies

Question 72.
________ cannot be used to spread viruses and they cannot access our hard drive.
a) MITM
b) Cookies
c) Cracking
d) Virus
Answer:
b) Cookies

Question 73.
A ________ commonly establishes a block between a trusted internal computer network and entrusted computer outside the network.
a) Firewall
b) Cookie
c) Hacking
d) None of these
Answer:
a) Firewall

Question 74.
Firewall category is ________
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
c) Either A or B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 75.
________ firewalls are positioned on the gateway computers of LANs [Local Area Network], WANs [Wide Area Network] and intranets.
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
a) Network-based

Question 76.
________ firewalls are positioned on the network node itself.
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
b) Host-based

Question 77.
The ________ firewall may be a service as a part of the operating system or an agent application such as endpoint security or protection.
a) Network-based
b) Host-based
c) Either A or B
d) None of these
Answer:
b) Host-based

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 78.
A ________ acts as an intermediary between the end-users and a web server.
a) Proxy server
b) System software
c) Node
d) None of these
Answer:
a) Proxy server

Question 79.
________ typically keep the frequently visited site addresses in its cache which leads to improved response time.
a) Proxy servers
b) System software
c) Node
d) None of these
Answer:
a) Proxy servers

Question 80.
________ is a process that ensures confidentiality that only authorized persons can access the information.
a) Encryption
b) Decryption
c) Both A and B
d) None of these
Answer:
c) Both A and B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 81.
________ is the process of translating the plain text data (plaintext) into random and mangled data.
a) Encryption
b) Decryption
c) Sampling
d) None of these
Answer:
a) Encryption

Question 82.
The encrypted text is called________
a) Cybertext
b) Cipher-text
c) Secured text
d) None of these
Answer:
b) Cipher-text

Question 83.
________ is the process of converting the cipher¬text back to plaintext.
a) Encryption
b) Decryption
c) Warping
d) None of these
Answer:
b) Decryption

Question 84.
________ is done by cryptography.
a) Encryption
b) Decryption
c) Both A and B
d) None of these
Answer:
c) Both A and B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 85.
In cryptography, a ________ is a piece of information that determines the functional output of a cryptographic algorithm.
a) Key
b) Parameter
c) Input
d) Output
Answer:
a) Key

Question 86.
Encryption has been used by ________ to facilitate secret communication.
a) Militaries
b) Governments
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 87.
________ now commonly used in protecting information within many kinds of civilian systems.
a) Encryption
b) Sampling
c) Warping
d) None of these
Answer:
a) Encryption

Question 88.
________ is used to protect data in communication system.
a) Encryption
b) Sampling
c) Warping
d) None of these
Answer:
a) Encryption

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 89.
Encryption used in ________
a) Data being transferred via networks
b) Mobile telephones
c) Wireless microphones
d) All the above
Answer:
d) All the above

Question 90.
Encryption used in________
a) Wireless intercom systems
b) Bluetooth devices
c) Bank automatic teller machines
d) All the above
Answer:
d) All the above

Question 91.
Data should be ________ when transmitted across networks in order to protect against the network traffic by unauthorized users.
a) Encrypted
b) Translated
c) Converted
d) None of these
Answer:
a) Encrypted

Question 92.
There are________ types of encryption schemes.
a) three
b) four
c) two
d) five
Answer:
c) two

Question 93.
________ is a encryption scheme.
a) Symmetric Key encryption
b) Public Key encryption
c) Both A and B
d) None of these
Answer:
c) Both A and B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 94.
encryption is a technique to use the same key for both encryption and decryption.
a) Symmetric Key
b) Public Key
c) Either A and B
d) None of these
Answer:
a) Symmetric Key

Question 95.
In________ encryption all authorized persons involved, have to exchange the key used to encrypt the data before they can decrypt it.
a) Symmetric Key
b) Public Key
c) Either A and B
d) None of these
Answer:
a) Symmetric Key

Question 96.
________ encryption is also called Asymmetric encryption
a) Symmetric Key
b) Public Key
c) Both A and B
d) None of these
Answer:
b) Public Key

Question 97.
________ uses the concept of a key-value pair, a different key is used for the encryption and decryption process.
a) Symmetric Key encryption
b) Public Key encryption
c) Both A and B
d) None of these
Answer:
b) Public Key encryption

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 98.
________ key is used in public key encryption.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 99.
The ________ key is kept secret by the owner.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
a) Private

Question 100.
The ________ key is either shared amongst authorized recipients.
a) Private
b) Public
c) Both A and B
d) None of these
Answer:
b) Public

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 101.
The data encrypted with the recipient’s ________ key can only be decrypted with the
corresponding key.
a) Public, Private
b) Private, Public
c) Public, Protected
d) None of these
Answer:
a) Public, Private

Question 102.
A digital certificate in a client-server model of communication is one of the example of________
a) Asymmetric Encryption
b) Symmetric
c) Either A or B
d) None of these
Answer:
a) Asymmetric Encryption

Question 103.
A________ is a package of information that identifies a user and a server.
a) Signature
b) Signal
c) Certificate
d) None of these
Answer:
c) Certificate

Question 104.
A certificate contains information such as________
a) An organization’s name
b) The organization that issued the certificate
c) The users’ email address and country and user’s public key
d) All the above
Answer:
d) All the above

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 105.
Digital signatures are can provide ________ .
a) Assurances of evidence to origin
b) Identity and status of an electronic document, transaction or message
c) Acknowledging informed by the signer
d) All the above
Answer:
d) All the above

Question 106.
________ law is used to prevent cybercrime.
a) Cyber Law or Cyber Space Law
b) Information Technology Law
c) Internet Law
d) Either A or B or C
Answer:
d) Either A or B or C

Question 107.
In India Cyberlaw and IT Act 2000, modified in ________ are being articulated to prevent computer crimes.
a) 2018
b) 2008
c) 1998
d) None of these
Answer:
b) 2008

Question 108.
EDI stands for ________
a) Electronic Data Interchange
b) Electronic Document Interchange
c) Electronic Data Information
d) Electrical Data Interchange
Answer:
a) Electronic Data Interchange

Question 109.
________ is a term that encapsulates the legal issues related to using of the Internet.
a) Cyberlaw
b) Internet law
c) Either A or B
d) None of these
Answer:
c) Either A or B

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 110.
________ of cybercrime remains unsolved.
a) 75%
b) 50%
c) 25%
d) 10%
Answer:
c) 25%

Question 111.
To protect the information follow________
a) Complex password setting can make your surfing secured.
b) When the internet is not in use, disconnect it.
c) Do NOT open spam mail or emails that have an unfamiliar sender.
d) All the above
Answer:
d) All the above

Question 112.
Identify the correct statement from the following:
a) Information security is the immune system in the body of business.
b) Awareness is the key to security.
c) When using anti-virus software, keep it up-to-date.
d) All the above
Answer:
d) All the above

Part II

Very Short Answers

Question 1.
What is hacking?
Answer:
Hacking is intruding into a computer system to steal personal data without the owner’s permission or knowledge (like to steal a password). It is also gaining unauthorized access to a computer system, and altering its contents.

Question 2.
What is cyber-crime?
Answer:
A cyber-crime is a crime which involves computer and network. This is becoming a growing threat to society and is caused by criminals or irresponsible actions of individuals who are exploiting the widespread use of the Internet.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 3.
Mention any 2 reasons as to why the websites use cookies?
Answer:

  1. To collect demographic information about who has visited the Web site.
  2. It helps to personalize the user’s experience on the Website.

Question 4.
What are the types of Cybercrime?
Answer:
It is depicted in the following diagram:
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 4

Question 5.
Define software piracy.
Answer:
Software Piracy is about the copyright violation of software created originally by an individual or an institution. It includes stealing codes/programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.

Question 6.
What are the standards in the cyber-world?
Answer:
In the cyber-world, there are certain standards such as:

  • Do not use pirated software.
  • Do not use unauthorized user accounts.
  • Do not steal others’ passwords.
  • Do not hack.

Question 7.
What are the core issues in computer ethics?
Answer:
The core issues in computer ethics are based on the scenarios arising from the use of the internets such as privacy, the publication of copyrighted content, unauthorized distribution of digital content, and user interaction with websites, software, and related services.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 8.
What are the changes in society due to the internet?
Answer:

  • With the help of the internet, the world has now become a global village.
  • The Internet has been proven to be a boon to individuals as well as various organizations and businesses.
  • e-Commerce is becoming very popular among businesses as it helps them to reach a wide range of customers faster than any other means;

Question 9.
What are the roles of computer ethics?
Answer:
Computer ethiŒ deals with the proœdures, values, and practices that govern the process of consuming computer technology and its related disciplines without damaging or violating the moral values and beliefs of any individual, organization, or entity.

Question 10.
What is the difference between ethics and computer ethics?
Answer:

  • Ethics is a set of moral principles that govern the behavior of an individual in a society.
  • Computer ethics is set of moral principles that regulate the use of computers by users.

Question 11.
What is cybercrime? Give an example.
Answer:
Cyber Crime
Cybercrime is an intellectual, white-collar crime. Those who commit such crimes generally manipulate the computer system in an intelligent manner.
For example – illegal money transfer via the internet.

Question 12.
How to prevent unauthorized access?
Answer:
To prevent unauthorized access, Firewalls, Intrusion Detection Systems (IDS), Virus and Content Scanners, Patches and Hotfixes are used.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 13.
What is social engineering? Give an example.
Answer:
Social engineering
A misuse of an individual’s weakness, achieved by making them to click malicious links, or by physically accessing the computer through tricks. Phishing and pharming.

Question 14.
What are Cookies?
Answer:
A cookie is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing the internet.

Question 15.
What are the types of encryption?
Answer:
There are two types of encryption schemes as listed below:

  • Symmetric Key encryption
  • Public Key encryption

Question 16.
What is a certificate?
Answer:
A certificate is a package of information that identifies a user and a server. It contains information such as an organization’s name, the organization that issued the certificate, the users’ email address and country, and the user’s public key.

Question 17.
What is a digital certificate?
Answer:

  • A digital certificate in a client-server model of communication.
  • It is one of the examples of Asymmetric Encryption.

Question 18.
What is a digital signature?
Answer:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity, and status of an electronic document, transaction, or message, as well as acknowledging informed by the signer.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 19.
Write a note on Cyberlaw or Internet law.
Answer:
Cyberlaw or Internet law is a term that encapsulates the legal issues related to using the Internet.

Question 20.
Write about IT Act 2000.
Answer:
IT Act 2000 is an act to provide legal recognition for transactions carried out by means of Electronic Data Interchange (EDI) and other means of electronic communication.

Part III

Short Answers 3 Marks

Question 1.
What are the guidelines of ethics?
Answer:
GUIDELINES OF ETHICS:
Generally, the following guidelines should be observed by computer users:

  • Honesty: Users should be truthful while using the internet.
  • Confidentiality: Users should not share any important information with unauthorized people.
  • Respect: Each user should respect the privacy of other users.
  • Professionalism: Each user should maintain professional conduct.
  • Obey The Law: Users should strictly obey the cyber law in computer usage.
  • Responsibility: Each user should take ownership and responsibility for their actions

Question 2.
Write a short note on ethics.
Answer:
Ethics means “What is Wrong and What is Right”. It is a set of moral principles that rule the behavior of individuals who use computers. An individual gains knowledge to follow the right behavior, using morals that are also known as ethics. Morals refer to the generally accepted standards of right and wrong in society. Similarly, in the cyber world, there are certain standards such as

  1. Do not use pirated software.
  2. Do not use unauthorized user accounts.
  3. Do not steal others’ passwords.
  4. Do not hack.

Question 3.
Write a note on unauthorized access.
Answer:
UNAUTHORIZED ACCESS:
Unauthorized access is when someone gains access to a website, program, server, service, or another system by breaking into a legitimate user account.

For example, if someone tries guessing a password or user name for an account that was not theirs until they gained access, it is considered unauthorized access.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 4.
What are cyber-attack and cybersecurity?
Answer:

  • Cyber attacks are launched primarily for causing significant damage to a computer system or for stealing important information from an individual or from an organization.
  • Cybersecurity is a collection of various technologies, processes, and measures that reduces the risk of cyber-attacks and protects organizations and individuals from computer-based threats.

Question 5.
What is phishing? Explain with a suitable diagram.
Answer:
Phishing:
Phishing is a type of computer crime used to attack, steal user data, including login name, password and credit card numbers. It occurs when an attacker targets a victim into opening an e-mailer an instant text message.

The attacker uses phishing to distribute malicious links or attachments that can perform a variety of functions including the extraction of sensitive login credentials from victims.

Diagrammatic representation of Phishing
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 5

Question 6.
What is Pharming? Explain with suitable diagram.
Answer:
Pharming:
Pharming is a scamming practice in which malicious code is installed on a personal computer or server, misdirecting users to fraudulent web sites without their knowledge or permission.

Pharming has been called “phishing without a trap”. It is another way hackers attempt to manipulate users on the Internet. It is a cyberattack intended to redirect a website’s traffic to a fake site.

Diagrammatic representation of Pharming :
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 6

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 7.
What do you mean by Man In The Middle attack or Janus attack? Illustrate in a diagram.
Answer:
Man In The Middle (MITM) :
A man-in-the-middle attack (MITM; also Janus attack) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

Example:
Suppose Alice wishes to communicate with Bob. Meanwhile, Mallory wishes to intercept the conversation to overhear and optionally to deliver a false message to Bob.

An illustration of the man-in-the-middle attack :
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 7

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 5.
Write down the points to be noted to be safe from cybercrime.
Answer:
To protect the information the following points to be noted:

  1. A complex password setting can make your surfing secured.
  2. When the internet is not in use, disconnect it.
  3. Do NOT open spam mail or emails that have an unfamiliar sender.
  4. When using anti-virus software, keep it up to date.

Question 9.
Explain the working of the Proxy Server.
Answer:
A proxy server acts as an intermediary between the end-users and a web server. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resources available from a different server.

The proxy server examines the request, checks authenticity, and grants the request based on that. Proxy servers typically keep the frequently visited site addresses in their cache which leads to improved response time.
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 8

Question 10.
How to prevent cybercrime?
Answer:
To protect the information the following points to be noted:

  • A complex password setting can make your surfing secured.
  • When the internet is not in use, disconnect it.
  • Do NOT open spam mail or emails that have an unfamiliar sender.
  • When using anti-virus software, keep it up-to-date.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Part IV

Explain in Detail

Question 1.
List the computer crimes and their functions.
Answer:

Crime Function
Crime

Function

Hacking, threats, and blackmailing

towards a business or a person.

Cyberstalking Harassing online.
Malware Malicious programs can perform a variety of functions including stealing, encrypting, or deleting sensitive data, altering or hijacking core computing functions, and monitoring user’s computer activity without their permission.
Denial of service attack Overloading a system with fake requests so that it cannot serve normal legitimate requests.
Fraud Manipulating data, for example changing the banking records to transfer money to an unauthorized account.
Harvesting A person or program collects login and password information from a legitimate user to illegally gain access to others’ account(s).
Identity theft It is a crime where the criminals impersonate individuals, usually for financial gain.
Intellectual property theft Stealing practical or conceptual information developed by another person or company.
Salami slicing Stealing tiny amounts of money from each transaction.
Scam Tricking people into believing something that is not true.
Spam Distribute unwanted e-mail to a large number of internet users.
Spoofing It is a malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.

Question 2.
Explain Hacking in detail.
Answer:
HACKING:
Hacking is intruding into a computer system to steal personal data without the owner’s permission or knowledge (like to steal a password). It is also gaining unauthorized access to a computer system, and altering its contents. It may be done in pursuit of criminal activity or it may be a hobby.
Diagrammatic representation of Hacking
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 9

Question 3.
Write short notes on:

  1. Spam
  2. Fraud
  3. Cyberstalking
  4. Spoofing
  5. Virus
  6. Worms

Answer:

  1. Spam: Distribute unwanted email to a large number of internet users.
  2. Fraud: Manipulating data, for example changing the banking records to transfer money to an unauthorized account.
  3. Cyberstalking: Harassing through online.
  4. Spoofing: It is a malicious practice in which communication is sent from an unknown source disguised as a source known to the receiver.
  5. Virus: A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common viruses is Trojan.
  6. Worms: Worms are self – repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 4.
Explain the working of the Firewall server. Firewall Server:
Answer:
A firewall is a computer network security-based system that monitors and controls the incoming and outgoing network traffic based on predefined security rules. A firewall commonly establishes a block between a trusted internal computer network and entrusted computer outside the network.

They are generally categorized as network-based or host-based.

Network-based firewalls are positioned on the gateway computers of LANs [local area Network], WANs [Wide Area Network], and intranets.

Host-based firewalls are positioned on the network node itself. The host-based firewall may be a service as a part of the operating system or an agent application such as endpoint security or protection.
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 10

Question 5.
Explain public key encryption.
Answer:
PUBLIC KEY ENCRYPTION:
Public key encryption is also called asymmetric encryption. It uses the concept of a key-value pair, a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.

The private key is kept secret by the owner and the public key is either shared amongst authorized re.dQle.ats. cvr made, available to the public at large.

The data encrypted with the recipient’s public key can only be decrypted with the corresponding private key.
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 11

Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security

Question 6.
What is a digital signature? Explain the function of the digital signature with a suitable diagram.
Answer:
Digital Signature:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity, and status of an electronic document, transaction, or message, as well as acknowledging informed by the signer.

To create a digital signature, signing software (email) creates a one-way hash of the electronic data to be signed. The user’s private key encrypts the hash, returning a value that is unique to the hashed data.

The encrypted hash, along with other information such as the hashing algorithm, forms the digital signature. Any change in the data, even to a single bit, results in a different hash value. This attribute enables others to validate the integrity of the data by using the signer’s public key to decrypt the hash.

If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn’t changed since it was signed.

If the two hashes don’t match, the data has either been tampered with in some way (indicating a failure of integrity) or the signature was created with a private key that doesn’t correspond to the public key presented by the signer (indicating a failure of authentication).
Samacheer Kalvi 11th Computer Science Guide Chapter 17 Computer Ethics and Cyber Security 12

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Computer Science Guide Pdf Chapter 18 Tamil Computing Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 18 Tamil Computing

11th Computer Science Guide Tamil Computing Text Book Questions and Answers

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Very Short Answers

Question 1.
List of the search engines supporting Tamil.
Answer:
Google and Bing provide searching facilities in Tamil, which means you can search everything through Tamil. A Google search engine gives you an inbuilt Tamil virtual keyboard.

Question 2.
What are the keyboard layouts used in Android?
Answer:
Sellinam and Ponmadal are familiar Tamil keyboard layouts that work on the Android operating system in Smart phone using phonetics.

Question 3.
Write a short note about Tamil Programming Language.
Answer:
Based on the Python programming language, the first Tamil programming language “Ezhil” (எழில்) is designed. With the help of this programming language, you can write simple programs in Tamil.

Question 4.
What TSCII?
Answer:
TSCII (Tamil Script Code for Information Interchange) is the first coding system to handle our Tamil language in an analysis of an encoding scheme that is easily handled in electronic devices, including non-English computers.
This encoding scheme was registered in the IANA (Internet Assigned Numbers Authority) unit of ICANN.

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Question 5.
Write a short note on Tamil Virtual Academy
Answer:
With the objectives of spreading Tamil to the entire world through the internet, Tamil Virtual University was established on 17th February 2001 by the Govt, of Tamil Nadu. Now, this organisation is functioning with the name “Tamil Virtual Academy”. This organisation offers different courses regarding the Tamil language, culture, heritage, etc., from kindergarten to under graduation level.

11th Computer Science Guide Tamil Computing Additional Questions and Answers

Part I

I. Choose The Correct Answer 1 Mark 

Question 1.
Human civilization developed with the innovation of computer in the ……………
(a) 11th century
(b) 13th century
(c) 16th century
(d) 20th century
Answer:
(d) 20th century

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Question 2.
_______ internet users consider local language digital content to be more reliable than English.
a) 74%
b) 68%
c) 42%
d) 28%
Answer:
b) 68%

Question 3.
Getting government services through the internet is known as ……………
(a) e-library
(b) e-governance
(c) Tamil programming language
(d) Tamil translation applications
Answer:
(b) e-governance

Question 4.
From 2021 onwards, _______of people in India will access the internet using Tamil.
a) 74%
b) 68%
c) 42%
d) 28%
Answer:
a) 74%

Question 5.
The _______are used to search any information from cyberspace.
a) Search Engines
b) Browsers
c) Cookies
d) None of these
Answer:
a) Search Engines

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Question 6.
In the top ten search engines, _______takes first place.
a) Google
b) Bing
c) Yahoo
d) None of these
Answer:
a) Google

Question 7.
In the top ten search engines,_______takes second place.
a) Google
b) Bing
c) Yahoo
d) None of these
Answer:
b) Bing

Question 8.
In the top ten search engines, _______takes third place.
a) Google
b) Bing
c) Yahoo
d) None of these
Answer:
c) Yahoo

Question 9.
_______search engine provides searching facilities in Tamil.
a) Google
b) Bing
c) Yahoo
d) Google and Bing
Answer:
d) Google and Bing

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Question 10.
A _______search engine gives you an inbuilt Tamil virtual keyboard.
a) Google
b) Bing
c) Yahoo
d) Google and Bing
Answer:
a) Google

Question 11.
Getting Government services through the internet is known as_______
a) e-Services
b) e-Governance
c) Web Governance
d) None of these
Answer:
b) e-Governance

Question 12.
Outside India, the Government of _______provides all their services through the official website in Tamil.
a) Srilanka
b) Canada
c) Nepal
d) None of these
Answer:
a) Srilanka

Question 13.
_______are portal or website of collection of e-books.
a) E-Libraries
b) E-Learning
c) E-Content
d) None of these
Answer:
a) E-Libraries

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Question 14.
_______ is a familiar Tamil keyboard interface software that is used for Tamil typing which works on Tamil Unicode, using phonetics.
a) NHM Writer
b) E-Kalappai
c) Lippikar
d) All the above
Answer:
d) All the above

Question 15.
_______is a familiar Tamil keyboard layout that works on the Android operating system in Smartphone using phonetics.
a) Sellinam
b) Ponmadal
c) Sellinam and Ponmadal
d) None of these
Answer:
c) Sellinam and Ponmadal

Question 16.
_______ office automation software provides a complete Tamil interface facility.
a) Microsoft Office
b) Open Office
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 17.
_______is office automation software working exclusively for Tamil.
a) Azhagi Unicode Editor
b) Ponmozhi & Menthamiz
c) Kamban and Vani
d) All the above
Answer:
d) All the above

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Question 18.
_______ is a Tamil translation application having more than 30000 Tamil words equivalent to English words.
a) Thamizpori
b) Sellinam
c) Ponmadal
d) None of these
Answer:
a) Thamizpori

Question 19.
The first Tamil programming language is _______
a) Thamizpori
b) Ezhil
c) Kamban
d) None of these
Answer:
b) Ezhil

Question 20.
With the help of _______ programming language, you can write simple programs in Tamil.
a) Thamizpori
b) Ezhil
c) Kamban
d) None of these
Answer:
b) Ezhil

Question 21.
Expand TSCII
a) Telugu Script Code for Information Interchange
b) Total Script Code for Information Interchange
c) Tamil Script Code for Information Interchange
d) Technical Script Code for Information Interchange
Answer:
c) Tamil Script Code for Information Interchange

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Question 22.
Computers are handle data and information as a _______ system.
a) Binary
b) Decimal
c) Octal
d) Hexadecimal
Answer:
a) Binary

Question 23.
The ASCII encoding system is applicable only for handling _______ language.
a) English
b) Hindi
c) French
d) Tamil
Answer:
a) English

Question 24.
_______is the first coding System to handle our Tamil language in an analysis of an encoding scheme that is easily handled in electronic devices, including non-English computers.
a) ASCII
b) TSCII
c) EBCDIC
d) None of these
Answer:
b) TSCII

Question 25.
IANA means _______
a) Internet Assigned Numbers Authority
b) Internet Assigned Names Authority
c) Internet Access Numbers Authority
d) Intranet Assigned Numbers Authority
Answer:
a) Internet Assigned Numbers Authority

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Question 26.
Expand ISCII
a) International Script Code for Information Interchange
b) Internet Script Code for Information Interchange
c) Indian Script Code for Information Interchange
d) Instant Script Code for Information Interchange
Answer:
c) Indian Script Code for Information Interchange

Question 27.
_______encoding schemes specially designed for Indian languages including Tamil.
a) ASCII
b) EBCDIC
c) BCD
d) ISCII
Answer:
d) ISCI

Question 28.
_______ is an encoding system, designed to handle various world languages, including Tamil.
a) ASCII
b) EBCDIC
c) UNICODE
d) ISCII
Answer:
c) UNICODE

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Question 29.
Unicode first version 1.0.0 was introduced on _______
a) October 1991
b) October 2001
c) October 1993
d) October 1999
Answer:
a) October 1991

Question 30.
A(n) _______is needed to access electronic systems such as computer and smartphone.
a) Browser
b) Operating system
c) Search Engine
d) None of these
Answer:
b) Operating system

Question 31.
Identify the correct statement from the following.
a) An operating system should be easy to work and its environment should be in an understandable form.
b) Windows Tamil Environment interface shows all windows elements such as Taskbar, desktop elements, names of icons, commands in Tamil.
c) Among the various encoding scheme, Unicode is suitable to handle Tamil.
d) All the above
Answer:
d) All the above

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Question 32.
Tamil Virtual University was established on _____ by the Govt, of Tamilnadu.
a) 17th February 1991
b) 17th February 2011
c) 17th February 2001
d) 27th February 2001
Answer:
c) 17th February 2001

Question 33.
_______organisation offers different courses regarding Tamil language, Culture, heritage, etc., from kindergarten to under graduation level.
a) Tamil Virtual Institute
b) Tamil Virtual Academy
c) Tamil Virtual Association
d) Tamil Virtual Organisation
Answer:
b) Tamil Virtual Academy

Question 34.
_______ is an open and voluntary initiative to collect and publish free electronic editions of ancient Tamil literary classics.
a) Project Madurai
b) Project Tamilnadu
c) Project Madras
d) Project Nellai
Answer:
a) Project Madurai

Question 35.
In 1998, Project Madurai released in Tamil script form as per _______ encoding.
a) ASCII
b) TSCII
c) BCD
d) None of these
Answer:
b) TSCII

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Very Short Answers (2 Marks)

Question 1.
What is e-governance?
Answer:
Getting Government services through the internet is known as e-Governance. Govt, of Tamil Nadu, has been giving its services through the Internet. One can communicate with Govt, of Tamil Nadu from any comer of the state. One can get important announcements, government orders, and government welfare schemes from the web portal of Govt. of. Tamil Nadu.

Question 2.
Which search engine provides an inbuilt Tamil virtual keyboard.
Answer:
The Google search engine gives you an inbuilt Tamil virtual keyboard.

Question 3.
Explain Tamil translation applications.
Answer:
Thamizpori (தமிஸ்ப்பூரி) is a Tamil translation application having more than 30000 Tamil words equivalent to English words. Using this application, we can translate small English sentences into Tamil. Google also gives an online translation facility, using this online facility we can translate from Tamil to any other language and vice versa.

Question 4.
Write about the Tamil translation application.
Answer:
Thamizpori (தமிஸ்ப்பூரி) is a Tamil translation application having more than 30000 Tamil words equivalent to English words? Using this application, we can translate small English sentences into Tamil. Google also gives an online translation facility, using this online facility we can translate from Tamil to any other language vice versa.

Question 5.
Explain ISCII.
Answer:
Indian Script Code for Information Interchange (ISCII ), is one of the encoding schemes specially designed for Indian languages including Tamil. It was unified with Unicode.

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Short Answers

Question 1.
What is Unicode?
Answer:
Unicode is an encoding system, designed to handle various world languages, including Tamil. Its first version 1.0.0 was introduced in October 1991. While the introduction of this scheme can be able to handle nearly 23 languages including Tamil. Among the various encoding scheme, Unicode is suitable to handle Tamil.

Question 2.
List the website address of popular e-Libraries.
Answer:

Tamil e-Library Website address
Tamilnadu School Education and Teacher Education Training Textbooks and Resource Books http://www.textbooksonline.tn.nic.in/
Tamil Virtual Academy http://www.tamilvu.org/library/libindex.htm
Connemara Public Library http://connemarapublic librarychennai.com/ Veettukku_oru_noolagam /index.html
Tamil Digital Library http://tamildigitallibrary.in/
Chennai Library http://www.chennailibrary.com/
Thamizhagam http: //www. thamizhagam.net/parithi/
parithi.html

Question 3.
Write a short note on Tamil on the internet.
Answer:
Internet is the best information technological device, through which we get know everything from the Internet. In 2017 a study conducted by KPMG a Singapore-based organization along with google reported that Tamil topped the list, among the most widely used languages in India where 42% are using the Internet in Tamil. Moreover, in 2021 onwards, 74% of people in India will access the internet using Tamil and it will be in the top usage of the Internet in India.

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Question 4.
Write a note on Unicode.
Answer:
Unicode is an encoding system, designed to handle various world languages, including Tamil. Its first version 1.0.0 was introduced in October 1991. While the introduction of this scheme can be able to handle nearly 23 languages including Tamil. Among the various encoding scheme, Unicode is suitable to handle Tamil.

Question 5.
Write a note on the Tamil operating system.
Answer:
An operating system should be easy to work and its environment should be in an understandable form. Thus, all operating systems used in computers and smartphones offered an environment in Tamil.
Windows Tamil Environment interface should be downloading and install from the internet. It shows all windows elements such as Taskbar, desktop elements, names of icons, commands in Tamil.

Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing

Explain in Detail (5 Marks)

Question 1.
Write about Tamil Office Automation Applications.
Answer:
Famous Office automation software like Microsoft Office, Open Office, etc., provides a complete Tamil interface facility. These softwares are downloadable and installed on your computer.

After installation, our office automation software environment will completely change to Tamil. Menu bars, names of icons, dialog boxes will be shown in Tamil. Moreover, you can save files with Tamil names and create folders with Tamil names.
Samacheer Kalvi 11th Computer Science Guide Chapter 18 Tamil Computing 1

Apart from that Tamil Libra Office, Tamil Open Office, Azhagi Unicode Editor, Ponmozhi, Menthamiz, Kamban, Vani are office automation software working exclusively for Tamil. These applications are designed to work completely in Tamil.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Computer Science Guide Pdf Chapter 2 Number Systems Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 2 Number Systems

11th Computer Science Guide Number Systems Text Book Questions and Answers

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Part – I

I. Choose The Correct Answer :

Question 1.
Which is a basic electronic circuit which operates on one or more signals?
a) Boolean algebra
b) Gate
c) Fundamental gates
d) Derived gates
Answer:
b) Gate

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 2.
Which gate is called as the logical inverter?
a) AND
b) OR
c) NOT
d) XNOR
Answer:
c) NOT

Question 3.
A + A = ?
a) A
b) O
c) 1
d) A
Answer:
a) A

Question 4.
NOR is a combination of ?
a) NOT(OR)
b) NOT(AND)
c) NOT(NOT)
d) NOT(NOR)
Answer:
a) NOT(OR)

Question 5.
NAND is called as _______ Gate
a) Fundamental Gate
b) Derived Gate
c) Logical Gate
d) Electronic gate
Answer:
b) Derived Gate

Part II

Short Answers:

Question 1.
What is Boolean Algebra?
Answer:
Boolean algebra is a mathematical discipline that is used for designing digital circuits in a digital computer. It describes the relationship between inputs and outputs of a digital circuit.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 2.
Write a short note on NAND Gate.
Answer:
The NAND gate operates an AND gate followed by a NOT gate. It acts in the manner of the logical operation “AND” followed by an inversion. The output is “false” if both inputs are “true” otherwise, the output is “true”. In other words, the output of the NAND gate is 0 if and only if both the inputs are 1, otherwise the output is 1.
The logical symbol of the NAND gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 2
The truth table for NAND gate is

Input Output
A ‘ B C
0 0 1
0 1 1
1 0 1
1 1 0

Question 3.
Draw the truth table for the XOR gate.
Answer:
The truth table for XOR gate is

In put Output
A ‘ B C
0 0 0
0 1 1
1 0 1
1 1 0

Question 4.
Write the associative laws?
Answer:
A + (B + C) = (A + B) + C
A.(B.C) = (A.B).C

Question 5.
What are derived gates?
Answer:
The logic gates which are derived from the fundamental gates are called derived gates. Ex. NAND, NOR, XOR and XNOR are derived gates.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Part – III

Explain In Brief

Question 1.
Write the truth table of fundamental gates.
Answer:
The fundamental logic gates are AND, OR, and NOT gates.
The truth table for AND Gate is

Input Output
A B C
0 0 0
0 1 0
1 0 0
1 1 1

The truth table for OR gate is

Input Output
A B C
0 0 0
0 1 1
1 0 1
1 1 1

The truth table for NOT gate is

Input Output
A C
1 0
0 1

Question 2.
Write a short note on the XNOR gate.
Answer:
The XNOR (exclusive – NOR) gate is a combination XOR gate followed by an inverter. Its output is “true” if the inputs are the same, and “false” if the inputs are different. In simple words, the output is 1 if the input is the same, otherwise, the output is 0. The logic symbol of the XNOR gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 3
The truth table for XNOR Gate is

Input Output
A B C
0 0 1
0 1 0
1 0 0
1 1 1

Question 3.
Reason out why the NAND and NOR are called universal gates?
Answer:
NAND and NOR gates are called Universal gates because the fundamental logic gates can be realized through them.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 4.
Give the truth table of XOR gate.
Answer:
The truth table for XOR Gate is

Input Output
A B C
0 0 0
0 1 1
1 0 1
1 1 0

Question 5.
Write the De Morgan’s law.
Answer:
De Morgan’s \(\overline{\mathrm{A}+\mathrm{B}}\) = \(\overline{\mathrm{A}}\) . \(\overline{\mathrm{B}}\)
(\(\overline{\mathrm{A}+\mathrm{B}}\)) = \(\overline{\mathrm{A}}\) + \(\overline{\mathrm{B}}\)

Part IV

Explain In Detail

Question 1.
Explain the fundamental gates with an expression and truth table.
Answer:
A gate is a basic electronic circuit which operates on one or more signals to produce an output signal. There are three fundamental gates namely AND, OR and NOT.

AND Gate
The AND gate can have two or more input signals and produce an output signal. The output is “true” only when both inputs are “true” otherwise, the output is “false”. In other words the output will be 1 if and only if both inputs are 1; otherwise, the output is 0.

The logical symbol of the AND gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 11

The output of the AND gate is C = A . B or C = AB
The truth table for AND Gate is

Input Output
A B C
0 0 0
0 1 0
1 0 0
1 1 1

OR Gate
The OR gate gets its name from its behaviour like the logical inclusive “OR”. The output is “true” if either or both of the inputs are “true”. If both inputs are “false” then the output is “false”. In other words, the output will be 1 if and only if one or both inputs are 1; otherwise, the output is 0.
The logical symbol of the OR gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 12

The OR gate output is C = A OR B. We use the + sign to denote the OR function. Therefore, C = A + B.
The truth table for OR Gate is

Input Output
A B C
0 0 0
0 1 1
1 0 1
1 1 1

NOT Gate
The NOT gate, called a logical inverter, has only one input. It reverses the logical state. In other words the output C is always the complement of the input.
The logical symbol of the NOT gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 13

The boolean function of NOT gate is C = NOT A. In boolean algebra, the overbar stands for NOT operation. Therefore, \(C=\bar{A}\)
The truth table for NOT gate is

Input Output
A C
1 0
0 1

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 2.
How AND and OR can be realized using NAND and NOR gate.
Answer:
NAND and NOR gates are called Universal gates because the fundamental logic gates can be realized through them.
NAND gates can be used to implement the fundamental logic gates NOT, AND, and OR.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 14

NOR gates can also be used to implement NOT, OR and AND gates.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 15

Question 3.
Explain the Derived gates with expression and truth table.
Answer:
The other logic gates like NAND, NOR, XOR, and XNOR are derived gates which are derived from the fundamental gates.

NOR Gate
The NOR gate circuit is an OR gate followed by an inverter. Its output is “true” if both inputs are “false” Otherwise, the output is “false”. In other words, the only way to get ‘1’ as output is to have both inputs ‘O’. Otherwise, the output is 0. The logic circuit of the NOR gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 16

The logic symbol of NOR gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 17

The output of the NOR gate is C = A + B
The truth table for NOR gate is

Input Output
A B C
0 0 1
0 1 0
1 0 0
1 1 0

NAND Gate

The NAND gate operates an AND gate followed by a NOT gate. It acts in the manner of the logical operation “AND” followed by an inversion. The output is “false” if both inputs are “true” otherwise, the output is “true”. In other words, the output of the NAND gate is 0 if and only if both the inputs are 1, otherwise the output is 1. The logic circuit of the NAND gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 18

The logical symbol of NAND gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 19

The output of the NAND gate is \(C=\overline{A . B}\)
The truth table for NAND gate is

Input Output
A B C
0 0 1
0 1 1
1 0 1
1 1 0

XOR Gate
The XOR (exclusive – OR) gate acts in the same way as the logical “either/or.” The output is “true” if either, but not both, of the inputs, are “true”. The output is “false” if both inputs are “false” or if both inputs are “true.” Another way of looking at this circuit is to observe that the output is 1 if the inputs are different, but 0 if the inputs are the same. The logic circuit of the XOR gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 20

The logical symbol of XOR gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 21

The output of the XOR gate is
\(\begin{aligned}
C &=A \oplus B \\
&=\bar{A} \cdot B+A \cdot \bar{B}
\end{aligned}\)

The truth table for XOR gate is

Input Output
A B C
0 0 0
0 1 1
1 0 1
1 1 0

XNOR Gate
The XNOR (exclusive – NOR) gate is a combination XOR gate followed by an inverter. Its output is “true” if the inputs are the same, and “false” if the inputs are different. In simple words, the output is 1 if the input are the same, otherwise the output is 0. The logic circuit of XNOR gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 22

The Logic Symbol is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 23

In boolean algebra, \(\mathrm{A} \odot \mathrm{B}\) or “included dot” stands for the XNOR.
Therefore, C = \(\mathrm{A} \odot \mathrm{B}\)
The truth table for XNOR gate is

Input Output
A B C
0 0 1
0 1 0
1 0 0
1 1 1

11th Computer Science Guide Number Systems Additional Questions and Answers

Part I

I. Choose The Correct Answer :

Question 1.
_______ is used for designing digital circuits in a digital computer.
a) Boolean algebra
b) Calculus
c) Iteration
d) None of these
Answer:
a) Boolean algebra

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 2.
_______describes the relationship between inputs and outputs of a digital circuit.
a) Boolean algebra
b) Calculus
c) Iteration
d) None of these
Answer:
a) Boolean algebra

Question 3.
Who proposed the basic principles of boolean algebra?
a) George Boole
b) Charles Babbage
c) John Napier
d) Lady Ada Lovelace
Answer:
a) George Boole

Question 4.
The sentences which can be determined to be True or False are called _______ .
a) Logical Statement
b) Truth Functions
c) Either A or B
d) None of these
Answer:
a) Logical Statement

Question 5.
The results of a logical statement True or False are called _______
a) Truth Values
b) Constant
c) True value
d) None of these
Answer:
a) Truth Values

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 6.
The truth values depicted by logical constant as_________ .
a) 1
b) 0
c) 1 and 0
d) None of these
Answer:
c) 1 and 0

Question 7.
The truth value depicted by logical constant 1 means _______
a) False
b) True
c) Either True or False
d) None of these
Answer:
b) True

Question 8.
The truth value depicted by logical constant 0 means _______
a) False
b) True
c) Either True or False
d) None of these
Answer:
a) False

Question 9.
The variable which can store truth values are called _______ variables.
a) Logical
b) Binary valued
c) Boolean
d) A OR B OR C
Answer:
a) Logical

Question 10.
Boolean algebra makes use of _______
a) variables
b) operations
c) Both A AND B
d) None of these
Answer:
c) Both A AND B

Question 11.
The basic logical operation is _______
a) AND
b) OR
c) NOT
d) All the above
Answer:
d) All the above

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 12.
The basic logical operation AND is symbolically represented by _______.
a) dot (.)
b) plus ( + )
c) over bar / single apostrophe
d) None of these
Answer:
a) dot (.)

Question 13.
The basic logical operation OR is symbolically represented by _______.
a) dot (.)
b) plus ( + )
c) over bar / single apostrophe
d) None of these
Answer:
b) plus ( + )

Question 14.
The basic logical operation NOT is symbolically represented by
a) dot (.)
b) plus ( + )
c) over bar / single apostrophe
d) None of these
Answer:
c) over bar / single apostrophe

Question 15.
_______symbol is called as Logical Operator.
a) dot (.)
b) plus ( + )
c) over bar / single apostrophe
d) All the above
Answer:
d) All the above

Question 16.
A represents all the possible values of logical variables or statements along with all the possible results of a given combination of truth values.
a) Truth table
b) Log table
c) I/O Table
d) None of these
Answer:
a) Truth table

Question 17.
_______boolean operator is similar to multiplication in ordinary algebra.
a) AND
b) OR
c) NOT
d) All the above
Answer:
a) AND

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 18.
The AND operator takes _______inputs.
a) only one
b) only two
c) two or more
d) None of these
Answer:
c) two or more

Question 19.
The _______operator output is true only if all the inputs are true.
a) AND
b) OR
c) NOT
d) All the above
Answer:
a) AND

Question 20.
The OR operator takes _______ inputs.
a) only one
b) only two
c) two or more
d) None of these
Answer:
c) two or more

Question 21.
The _______ operator output is true if at least one input is true.
a) AND
b) OR
c) NOT
d) All the above
Answer:
b) OR

Question 22.
The _______operator has one input and one output
a) AND
b) OR
c) NOT
d) All the above
Answer:
c) NOT

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 23.
The ______operator inverts the input.
a) AND
b) OR
c) NOT
d) All the above
Answer:
c) NOT

Question 24.
Identify the true statements from the following.
a) The NOT operator input is either true or false and the output is always the opposite.
b) Boolean algebra is a mathematical discipline that is used for designing digital circuits.
c) The AND operator will give only one output
d) All the above
Answer:
d) All the above

Question 25.
The_________is the combination of NOT and AND.
a) NOR
b) NAND
c) XNOR
d) Bubbled AND
Answer:
b) NAND

Question 26.
The _________is generated by inverting the output of an OR operator.
a) NOR
b) NAND
c) XNOR
d) Bubbled AND
Answer:
b) NAND

Question 27.
The algebraic expression of the NAND function is:
a) \(Y=\overline{A . B}\)
b) \(Y=\overline{A+B}\)
c) \(Y=\overline{\bar{A} \cdot \bar{B}}\)
d) \(Y=\bar{A} \cdot \bar{B}\)
Answer:
a) \(Y=\overline{A . B}\)

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 28.
The _________ is the combination of NOT and OR.
a) NOR
b) NAND
c) XNOR
d) Bubbled AND
Answer:
a) NOR

Question 29.
The ____________ is generated by inverting the output of an AND operator.
a) NOR
b) NAND
c) XNOR
d) Bubbled AND
Answer:
a) NOR

Question 30.
The algebraic expression of the NOR function is:
a) \(Y=\overline{A . B}\)
b) \(Y=\overline{A+B}\)
c) \(Y=\overline{\bar{A} \cdot \bar{B}}\)
d) \(Y=\bar{A}+\bar{B}\)
Answer:
b) \(Y=\overline{A+B}\)

Question 31.
_________ is a fundamental logic gate.
a) AND
b) NAND
c) NOT
d) Bubbled AND
Answer:
d) Bubbled AND

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 32.
is a derived gate.
a) NOR
b) NAND
c) XNOR
d) All the above
Answer:
d) All the above

Question 33.
is not a derived gate.
a) BUBBLED AND
b) NAND
c) XNOR
d) NOT
Answer:
d) NOT

Question 34.
A . is a basic electronic circuit which operates on one or more signals to produce an output signal.
a) logic gate
c) boolean algebra
c) boolean gate
d) None of these
Answer:
a) logic gate

Question 35.
_________gate is called universal gate.
a) NAND
b) NOR
c) NAND and NOR
d) None of these
Answer:
c) NAND and NOR

Question 36.
The fundamental logic gates can be realized through _________gate.
a) NAND
b) NOR
c) NAND and NOR
d) None of these
Answer:
c) NAND and NOR

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 37.
The _________ gate has only one input.
a) NAND
b) NOR
c) NOT
d) XNOR
Answer:
c) NOT

Question 38.
A bubbled AND gate produces the same output as a _________gate.
a) NAND
b) NOR
c) NOT
d) XNOR
Answer:
b) NOR

Question 39.
We can replace e.v H NOR gate by a _________gate.
a) NAND
b) NOR
c) Bubbled AND
d) Bubbled OR
Answer:
c) Bubbled AND

Question 40.
The output of NOR gate is _________if both inputs are “false”.
a) true
b) false
c) either true or false
d) None of these
Answer:
a) true

Question 41.
The output of the NAND gate is 0 if and only if both the inputs are _________
a) 0
b) 1
c) false
d) None of these
Answer:
b) 1

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 42.
The truth tables of the bubbled OR gate and _________ gates are identical.
a) NAND
b) NOR
c) Bubbled AND
d) XOR
Answer:
a) NAND

Question 43.
We can replace each NAND gate by a _________gate.
a) NAND
b) NOR
c) Bubbled AND
d) Bubbled OR
Answer:
d) Bubbled OR

Question 44.
A+B represents _________ gate
a) XOR
b) NOR
c) NOT
d) XNOR
Answer:
a) XOR

Question 45.
In XOR gate, the output is _________ if the inputs are different.
a) 0
b) 1
c) 1 or 0
d) None of these
Answer:
b) 1

Question 46.
In XOR gate, the output is _________if the inputs are same.
a) 0
b) 1
c) 1 or 0
d) None of these
Answer:
a) 0

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 47.
The _________gate is a combination XOR gate followed by an Inverter.
a) XOR
b) NOR
c) NOT
d) XNOR
Answer:
d) XNOR

Question 48.
A ® B represent _________gate.
a) XOR
b) NOR
c) NOT
d) XNOR
Answer:
d) XNOR

Question 49.
Identify the true statement from the following.
a) Using a combination of logic gates, complex operations can be performed.
b) Arrays of logic gates are found in digital integrated circuits.
c) In boolean algebra, © or “included dot” stands for the XNOR.
d) All the above
Answer:
d) All the above

Question 50.
AB + \(\overline{\mathbf{A}} \overline{\mathbf{B}}\) is the equation for gate.
a) XOR
b) NOR
c) NOT
d) XNOR
Answer:
d) XNOR

Question 51.
\(\bar{A} B+A B\) is the equation for _________gate.
a) XOR
b) NOR
c) NOT
d) XNOR
Answer:
a) XOR

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 52.
The logical symbol of XOR gate is _________.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 1
Answer:
a

Part II

Short Answers:

Question 1.
What are the logical operations?
Answer:
The basic logical operations are AND, OR, and NOT, which are symbolically represented by a dot ( . ), plus ( + ), and over bar / single apostrophe respectively. These symbols are also called “Logical Operators”.

Question 2.
What is Truth Table?
Answer:
A truth table represents all the possible values of logical variables or statements along with all the possible results of a given combination of truth values.

Question 3.
Write a note on NOT operator.
Answer:
The NOT operator has one input and one output. The input is either true or false, and the output is always the opposite, that is, the NOT operator inverts the input.
The truth table for a NOT operator where A is the input variable and Y is the output is shown below:

A Y
0 1
1 0

The NOT operator is represented algebraically by the Boolean expression: Y = A.
The truth table for NAND gate is \(\mathbf{Y}=\overline{\mathbf{A}}\)

Question 4.
What are the universal gates? Why it is called so?
Answer:
NAND and NOR gates are called Universal gates because the fundamental logic gates can be realized through them.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 5.
What is logic gate? What are the fundamental logic gates?
Answer:
A gate is a basic electronic circuit which operates on one or more signals to produce an output signal.
There are three fundamental gates namely AND, OR, and NOT.

Question 6.
Write the commutative theorem of boolean algebra.
Answer:
i) A + B = B + A
ii) A . B = B . A.

Question 7.
Write the associative theorem of boolean algebra.
Answer:
i) A + (B + C) = (A + B) + C
ii) A . (B . C) = (A . B) . C.

Question 8.
Write the distributive theorem of boolean algebra.
Answer:
i) A . (B + C) = A . B + A . C
ii) A + (B . C) = (A + B) . (A + C).

Question 9.
Write the absorption theorem of Boolean algebra.
Answer:
i) A + (A . B) = A
ii) A . (A + B) = A.

Question 10.
Write the 3rd distributive theorem of Boolean algebra.
Answer:
A + A 1 B = A + B

Question 11.
Write the De Morgan’s theorems of Boolean algebra.
\(i) \overline{\mathrm{A}+\mathrm{B}}=\overline{\mathrm{A}} \cdot \overline{\mathrm{B}}
ii) \overline{\mathrm{A} \cdot \mathrm{B}}=\overline{\mathrm{A}}+\overline{\mathrm{B}}\)

Question 12.
Write the Null element theorem of Boolean algebra.
Answer:
i) A + 1 = 1
ii) A . 0 = 0

Question 13.
Write the Identity theorem of Boolean algebra.
Answer:
i) A + 0 = A
ii) A . 1 = A

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 14.
Write the complement theorem of Boolean algebra.
Answer:
i) A + A = 1
ii) A . A = 0.

Part – III

Explain In Brief

Question 1.
Write note on AND operator.
Answer:
The AND operator is defined in Boolean algebra by the use of the dot (.) operator. It is similar to multiplication in ordinary algebra. The AND operator combines two or more input variables so that the output is true only if all the inputs are true. The truth table for a 2-input AND operator is shown as follows:

A B Y
0 0 0
0 1 0
.1 0 0
1 1 1

The above 2-input AND operation is expressed as:
Y = A . B.

Question 2.
Write note on OR operator.
Answer:
The plus sign is used to indicate the OR operator. The OR operator combines two or more input variables so that the output is true if at least one input is true. The truth table for a 2-input OR operator is shown as follows:

A B y
0 0 0
0 1 1
1 0 1
1 1 1

The above 2-input OR operation is expressed as Y = A + B.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 3.
Write a note on the NAND operator.
Answer:
The NAND is the combination of NOT and AND. The NAND is generated by inverting the output of an AND operator. The algebraic, expression of the NAND function is: Y = \(\overline{\mathrm{A}, \mathrm{B}}\)
The NAND function truth table is shown below:

A B y
0 0 1
0 1 1
1 0 1
1 1 0

A NAND B = NOT (A AND B).

Question 4.
Write a note on the NOR operator.
Answer:
The NOR is the combination of NOT and OR. The NOR is generated by inverting the output of an OR operator. The algebraic expression of the NOR function is: Y = \(\overline{A+B}\)
The NOR function truth table is shown below:

A B y
0 0 1
0 1 0
1 0 0
1 1 0

A NOR B = NOT (A OR B).

Question 5.
Explain AND gate with its symbols and truth table.
Answer:
The AND gate can have two or more input signals and produce an output signal. The output is “true” only when both inputs are “true” otherwise, the output is “false”. In other words, the output will be 1 if and only if both inputs are 1; otherwise, the output is 0.

The output of the AND gate is represented by a variable say C, where A and B are two and if input boolean variables. In boolean algebra, a variable can take either of the values ‘0’ or ‘1’. The logical symbol of the AND gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 4

One way to symbolize the action of an AND gate is by writing the boolean function.
C = A AND B

In Boolean algebra, the multiplication sign stands for the AND operation. Therefore, the output of the AND gate is
C = A . B or simply C = AB

The truth table for AND Gate is

Input Output
A B C
0 0 0
0 1 0
1 0 0
1 1 1

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 6.
Explain OR gate with its symbols and truth table.
Answer:
The OR gate gets its name from its behaviour like the logical inclusive “OR”. The output is “true” if either or both of the inputs are “true”. If both inputs are “false” then the output is “false”. In other words, the output will be 1 if and only if one or both inputs are 1; otherwise, the output is 0. The logical symbol of the OR gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 5
The OR gate output is C = A OR B
We use the + sign to denote the OR function.
Therefore, C = A + B
The truth table for OR gate is 

Input

Output

A B C
0 0 0
0 1 1
1 0 1
1 1 1

The boolean function of NOT gate is C = NOT A In boolean algebra, the overbar stands for NOT operation. Therefore, \(C=\bar{A}\)

Question 7.
Explain NOT gate with its symbols and truth table.
Answer:
The NOT gate, called a logical inverter, has only one input. It reverses the logical state. In other words, the output C is always the complement of the input. The logical symbol of the NOT gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 6

The boolean function of NOT gate is C = NOT A
In boolean algebra, the overbar stands for NOT operation. Therefore, \(C=\bar{A}\)

The truth table for NOT gate is

Input Output
A C
1 0
0 1

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 8.
Explain NOR gate with its symbols and truth table.
Answer:
The NOR gate circuit is an OR gate followed by an inverter. Its output is “true” if both inputs are “false” Otherwise, the output is “false”. In other words, the only way to get ‘1’ as output is to have both inputs ‘O’. Otherwise, the output is 0. The logic circuit of the NOR gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 7

The Logic Symbol of NOR Gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 8

The output of NOR gate is \(C=\overline{A+B}\)
The truth table for NOR gate is

Input Output
A ‘ B C
0 0 1
0 1 0
1 0 0
1 1 0

Question 9.
Explain Bubbled AND gate with its symbols and truth table.
Answer:
The Logic Circuit of Bubbled AND Gate
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 9
In the above circuit, inverters on the input lines of the AND gate gives the output as C = A.B.
The Logic symbol of Bubbled AND Gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 10

The truth table of Bubbled AND Gate is

Input Output
A B C
0 0 1
0 1 0
1 0 0
1 1 0

Part IV

Explain In Detail

Question 1.
Explain Bubbled OR gate with its symbols and truth table.
Answer:
The logic circuit of bubbled OR gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 24
The output of this circuit can be written as \(C=\bar{A}+\bar{B}\)
The Logic symbol of Bubbled OR Gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 25
The truth table for the bubbled OR is

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 2.
Explain the XOR gate with its symbols and truth table.
Answer:
The XOR (exclusive – OR) gate acts in the same way as the logical “either/or.” The output is “true” if either, but not both, of the inputs, are “true”. The output is “false” if both inputs are “false” or if both inputs are “true.”
Another way of looking at this circuit is to observe that the output is 1 if the inputs are different, but 0 if the inputs are the same.
The Logic circuit of XOR Gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 26
The output of the XOR gate is
\(C=A \oplus B=\bar{A} B+A B\)
The Logic symbol of XOR Gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 27

The truth table for XOR gate is

Input Output
A ‘ B C
0 0 1
0 1 0
1 0 0
1 1 0

Question 3.
Explain the XNOR gate with its symbols and truth table.
Answer:
The XNOR (exclusive – NOR) gate is a combination XOR gate followed by an inverter. Its output is
true” if the inputs are the same, and “false” if the inputs are different. In simple words, the output is 1 if the input are the same, otherwise, the output is 0.
The logic circuit of the XNOR gate is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 28
The output of the XNOR is NOT of XOR
\(C=(A \oplus B)^{\prime}=A B+\bar{A} \bar{B}\)
In boolean algebra, 0 or “included dot” stands for
the XNOR.
Therefore, C = \(\mathrm{A} \odot \mathrm{B}\)
The logical symbol is
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 29
The truth table for the XNOR gate is

Input Output
A ‘ B C
0 0 1
0 1 0
1 0 0
1 1 1

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 4.
Write all the theorems of boolean algebra.
Answer:
Theorems of boolean algebra.
Identity
A + 0 = A
A • 1 = A

Complement
\(\begin{array}{l}
A+\bar{A}=1 \\
A \cdot \bar{A}=0
\end{array}\)

Commutative
A + B = B + A
A . B = B . A

Associative
A + (B + C) = (A + B) + C
A . (B . C) = (A; B) . C

Distributive
A-(B + C) = A- B + A- C
A + (B . C) = (A + B) . (A + C)

Null Element
A + 1 = 1
A . 0 = 0

Involution
\((\overline{\bar{A}})=A\)

Indempotence
A + A = A
A . A = A

Absorption
A + (A . B) = A
A . (A + B) = A

3rd Distributive
A + A.B = A + B

De Morgan’s
\(\begin{aligned}
\overline{A+B} &=\bar{A} \cdot \bar{B} \\
\overline{A . B} &=\bar{A}+\bar{B}
\end{aligned}\)

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 5.
List all the logic gates with their symbols and truth tables.
Answer:
Logic Gates and their corresponding Truth Tables
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 30 Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems II 31

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Chemistry Guide Pdf Chapter 2 Quantum Mechanical Model of Atom Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Chemistry Solutions Chapter 2 Quantum Mechanical Model of Atom

11th Chemistry Guide Quantum Mechanical Model of Atom Text Book Back Questions and Answers

Textual Questions:

I. Choose the best Answer:

Question 1.
Electronic configuration of species M2+ is 1s2 2s2 2p6 3s2 3p6 3d6 and its atomic weight is 56. The number of neutrons in the nucleus of species M is
(a) 26
(b) 22
(c) 30
(d) 24
Answer:
(c) 30

Question 2.
The energy of light of wavelength 45nm is
(a) 6.65 × 1015 J
(b) 6.67 × 1011 J
(c) 4.42 × 10-18 J
(d) 4.42 × 10-5 V
Answer:
(c) 4.42 × 10-18 J

Question 3.
The energies E1 and E2 of two radiation are 25 eV and 50 eV respectively. The radiation between their wavelengths ie., λ1 and λ2 will be
(a) \(\frac{\lambda_{1}}{\lambda_{2}}\) = 1
(b) λ1 = 2 λ2
(c) λ1 = \(\sqrt{225 \times 50}\) λ2
(d) 2λ1 = λ2
Answer:
(b) λ1 = 2 λ2

Question 4.
Splitting of spectral lines in an electric field is called
(a) Zeeman effect
(b) shielding effect
(c) Compton effect
(d) stark effect
Answer:
(d) stark effect

Question 5.
Based on equation E = -2.178 × 10-18 J(z2/n2), certain conclusions are written. Which of them is not correct?
(a) Equation can be used to calculate the change in energy when the electron changes orbit
(b) For n – 1 , the electron has a more negative energy then it does for n = 6 which means that the eiectron is more loosely bound in the smallest allowed orbit
(c) The negative sign in equation simply means that the energy of electron bound to the nucleus is lower than it would be if the electrons were at the infinite distance ffome nucleus.
(d) Larger the value of n, the larger is the orbit radius.
Answer:
(b) For n – 1 , the electron has a more negative energy then it does for n = 6 which means that the eiectron is more loosely bound in the smallest allowed orbit.

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 6.
According to the Bohr Theory , which of the following transitions in the hydrogen atom will give rise to least energetic photon?
(a) n = 6 to n = 1
(b) n = 5 to n = 4
(c) n = 5 to n = 3
(d) n = 6 to n = 5
Answer:
(d) n = 6 to n = 5

Question 7.
Assertion:
The spectrum of He+ is expected to be similar to that of hydrogen
Reason: He+ is also one electron system.
(a) If both assertion and reason are true and reason is the correct explanation of assertion.
(b) If both assertion and reason are true but reasons is not the correct explanation of assertion.
(c) If assertion is true but reason is false
(d) If both assertion and reason are false
Answer:
(a) If both assertion and reason are true and reason is the correct explanation of assertion.

Question 8.
Which of the following pairs of d-orbitals will have electron density along the axes?
(a) dz2, dxz
(b) dxz, dyz
(c) dx2, dx2 – y2
(d) dxy, dx2 – y2
Answer:
(c) dx2, dx2 – y2

Question 9.
Two electron occupying the same orbital are distinguished by
(a) Azimuthal quantum number
(b) Spin quantum number
(c) Magnetic quantum number
(d) Orbital quantum number
Answer:
(b) Spin quantum number

Question 10.
The electronic configuration of Eu (Atomic no, 63), Gd (Atomic no . 64), and Tb (Atomic no. 65) are
(a) [Xe] 4f6 5d1 6s2, [Xe] 4f7 5d1 6s2 and [Xe] 4f8 5d1 6s2
(b) [Xe] 4f7 6s2, [Xe] 4f1 5d1 6s2 and [Xe] 4f9 6s2
(c) [Xe] 4f7 6s2, [Xe] 4f8 6s2 and [Xe] 4f8 5d1 6s2
(d) [Xe] 4f6 5d1 6s2, [Xe] 4f1 5d1 6s2 and [Xe] 4f9 6s2
Answer:
(b) [Xe] 4f7 6s2, [Xe] 4f1 5d1 6s2 and [Xe] 4f9 6s2

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 11.
The maximum number of electrons in a sub shell is given by the expression
(a) 2n2
(b) 2l + 1
(c) 4l + 2
(d) none of these
Answer:
(c) 4l + 2

Question 12.
For d-electrons, the orbit angular momentum is
(a) \(\frac{\sqrt{2} h}{2 \pi}\)

(b) \(\frac{\sqrt{2 h}}{2 \pi}\)

(c) \(\frac{\sqrt{2 \times 4} \mathrm{~h}}{2 \pi}\)

(d) \(\frac{\sqrt{6} \mathrm{~h}}{2 \pi}\)
Answer:
(d) \(\frac{\sqrt{6} \mathrm{~h}}{2 \pi}\)

Question 13.
What is the maximum number electrons that car be associated with following set of quantum numbers? n = 3, l = 1 and m = -1
(a) 4
(b) 6
(c) 2
(d) 10
Answer:
(c) 2

Question 14.
Assertion:
The number of radials and angular nodes for 3p orbital are I, 1 respectively.
Reason:
The number of radials and angular nodes depends only one the quantum number.
(a) Both assertion and reason are true and the reason is the correct explanation of the assertion
(b) Both assertion and reason are true but the reason is not the correct explanation of the assertion
(c) Assertion is true but the reason is false
(d) Both assertion and reason are false
Answer:
(c) Assertion is true but the reason is false

Question 15.
The total number of orbitals associated with the principal quantum number n = 3 is
(a) 9
(b) 8
(c) 5
(d) 7
Answer:
(a) 9

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 16.
If n = 6, the sequence for filling electrons will be,
(a) ns → (n – 2)f → (n – 1)d → np
(b) ns → (n – 1 )d → (n – 2)f → np
(c) ns → {n – 2)f → np → (n – 1 )d
(d) none of these are correct
Answer:
(a) ns → (n – 2)f → (n – 1)d → np

Question 17.
Consider the following sets of quantum numbers:
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 1
Which of the following sets of quantum numbers is not possible?
(a) (i), (ii) and (iv)
(b) (ii), (iv) and (v)
(c) (i) and (iii)
(d) (ii), (iii) and (iv)
Answer:
(b) (ii), (iv) and (v)

Question 18.
How many electrons in an atom with atomic number 105 can have (n + l) = 8?
(a) 30
(b) 17
(c) 15
(d) unpredictable
Answer:
(b) 17

Question 19.
Electron density in the yz plane of 3dx2 – y2 orbital is
(a) zero
(b) 0.50
(c) 0.75
(d) 0.90
Answer:
(a) zero

Question 20.
If uncertainty in position and momentum are equal, then minimum uncertainty in velocity is
(a) \(\frac{1}{m} \sqrt{\frac{h}{\pi}}\)

(b) \(\sqrt{\frac{\mathrm{h}}{\pi}}\)

(c) \(\frac{1}{2 m} \sqrt{\frac{h}{\pi}}\)

(d) \(\frac{\mathrm{h}}{4 \pi}\)
Answer:
(c) \(\frac{1}{2 m} \sqrt{\frac{h}{\pi}}\)

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 21.
A macroscopic particle of mass 100 g and moving at a velocity of 100 cm s-1 will have a de Broglie wavelength of
(a) 6.6 × 10-29 cm
(b) 6.6 × 10-30 cm
(c) 6.6 × 10-31 cm
(d) 6.6 × 10-32 cm
Answer:
(c) 6.6 × 10-31 cm

Question 22.
The ratio of de Brogue wavelengths of a deuterium atom to that of an α – particle, when the velocity of the former is five times greater than that of later, is
(a) 4
(b) 0.2
(c) 2.5
(d) 0.4
Answer:
(d) 0.4

Question 23.
The energy of an electron in the 3rd orbit of a hydrogen atom is -E. The energy of an electron in the first orbit will be
(a)-3E
(b) -E/3
(c) -E/9
(d) -9E
Answer:
(d) -9E

Question 24.
Time independent Schnodinger wave equation is
(a) Hψ = Eψ
(b) ∆2ψ + 8π2m(E + V)ψ
(c) \(\frac{\partial^{2} \psi}{\partial x^{2}}+\frac{\partial^{2} \psi}{\partial y^{2}}+\frac{\partial^{2} \psi}{\partial z^{2}}+\frac{2 m}{h^{2}}(\mathrm{E}-\mathrm{V}) \psi=0\)
(d) all of these
Answer:
(a) Hψ = Eψ

Question 25.
Which of the following does not represent the mathematical expression for the Heisenberg uncertainty principle?
(a) ∆x . ∆p ≥ \(\frac{h}{4}\)
(b) ∆x . ∆v ≥ \(\frac{h}{4 \pi m}\)
(c) ∆E . ∆t ≥ \(\frac{h}{4 \pi}\)
(d) ∆E . ∆x ≥ \(\frac{h}{4 \pi}\)
Answer:
(d) ∆E . ∆x ≥ \(\frac{h}{4 \pi}\)

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

II. Write brief answers to the following questions:

Question 26.
Which quantum number reveals information about the shape, energy, orientation, and size of orbitals?
Answer:
Magnetic quantum numbers reveal information about the shape, energy, orientation, and size of orbitals.

Question 27.
How many orbitals are possible for n = 4?
Answer:
When n = 0, l = 0, 1,2 and 3. Hence, there are four subshells namely, s, p, d and f
l = 0, m1 = 0; one 4s orbital, l = 1, m = -1, 0, +1; three 4p orbitals,
l = 2, m1 = – 2, -1, 0, +1, +2; five 4d orbitals and
l = 3, m1 = – 3, -2, -1, 0, 1, 2, 3; seven 4f orbitals. Hence, the number of possible orbitals when n = 4 are sixteen.

Question 28.
How many radial nodes for 25, 4p, 5d and 4f orbitals exhibit? How many angular nodes?
Answer:
The number of radial nodes is equal to (n – l – 1) and angular nodes is l.

Orbital N l Radial node (n – l – 1) Angular node, l
2s 2 0 1 0
4p 4 1 2 1
5d 5 2 2 2
4f 4 3 0 3

The number of radial nodes for 2s, 4p, 5d, and 4f orbitals are respectively 1,2,2 and 0 and the number of angular nodes for 2s, 4p, 5d, and 4f orbitals respectively are 0, 1, 2, and 3.

Question 29.
The stabilization of a half-filled d – orbital is more pronounced than that of the p-orbital. Why?
Answer:
The exactly half-filled orbitals have greater stability. The reason for their stability are –

  1. symmetry
  2. exchange energy.

(1) Symmetry: The half-filled orbitals are more symmetrical than partially filled orbitals and this symmetry leads to greater stability.

(2) Exchange energy: The electrons with the same spin in the different orbitals of the same sub-shell can exchange their position. Each such exchange releases energy and this is known as exchange energy. Greater the number of exchanges, the greater the exchange energy, and hence greater the stability. In d-orbital, 10 exchanges are possible but in p-orbital 6 exchanges are possible. So, d – orbital with 5 unpaired electrons (10 exchanges)n i.e. half-filled is more stable than p – orbital with 3 unpaired electrons (6 exchanges).

Question 30.
Consider the following electronic arrangements for the d5 configuration.
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 2
(i) Which of these represents the ground state?
(ii) Which configuration has the maximum exchange energy?
Answer:
(i) The ground state electronic configuration is
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 3

(ii) The configuration has the maximum exchange energy is
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 3

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 31.
State and explain Paull’s exclusion principle.
Answer:
Pauli’s exclusion principle states that “No two electrons in an atom can have the same set of values of all four quantum numbers”.
Illustration: H(Z = 1) 1s1.
One electron is present in hydrogen atom, the four quantum numbers are n = 1, l = 0, m = 0 and s = + \(\frac {1}{2}\). For helium Z = 2. He: 1s2. In this one electron has the quantum number same as that of hydrogen, n = 1,l = 0, m = 0 and s = +½ For other electron, fourth quantum number is different, i.e. n = 1, l = 0, m = 0 and s = – ½.

Question 32.
Define orbital. What are ‘n’ and ‘l’ values for 3px and 4d x2 – y2 electron?
Answer:
Orbital is a three-dimensional space in which the probability of finding the electron is maximum. The values of ‘n’ and ‘l’ for 3px orbital are n = 3 and l = 1, 4d x2 – y2 orbital are n = 4 and l = 2.

Question 33.
Explain briefly the time-independent Schrodinger wave equation.
Answer:
Erwin Schrodinger expressed the wave nature of electrons in terms of a differential equation. This equation determines the change of wave function in space depending on the field of force in which the electron moves. The time-independent Schrodinger equation can be expressed as
Hψ = Eψ, where H is called Hamiltonian operator, ψ is the wave function and is a function of position coordinates of the particle and is denoted as ψ(x, y, z), E is the energy of the system.
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 4
The above Schrodinger wave equation does not contain time as a variable and is referred to as time-independent Schrodinger wave equation. This equation can be solved only for certain values of E, the total energy, i.e., the energy of the system is quantized. The permitted total energy values are called eigenvalues and corresponding wave functions represent the atomic orbitals.

Question 34.
Calculate the uncertainty in position of an electron, if ∆v = 0.1 % and υ = 2.2 × 106 ms-1.
Answer:
Heisenberg’s Uncertainty Principle is ∆x. ∆v > h/4πm.
Given:
∆v = 0.1%,
υ = 22 × 106 ms-1.
h = 6.626 × 10-34 kgm2s-1 .
m = 9.1 X 10 21 kg.
∆v = \(\frac{0.1 \times 2.2 \times 10^{6} \mathrm{~ms}^{-1}}{100}\)

= 2.2 × 103 ms-1
Uncertainty in position,
∆x ≥ \(\frac{h}{4 \pi m}\)
∆x ≥ \(\frac{6.626 \times 10^{-34} \mathrm{kgm}^{2} \mathrm{~s}^{-1}}{9.1 \times 10^{-31} \mathrm{~kg} . \times 2.2 \times 10^{3} \mathrm{~ms}^{-1}}\)

∆x ≥ 2.64 × 10-8 m.

Question 35.
Determine the values of all the four quantum numbers of the 8th electron in the O – atom and 15th electron in the Cl atom and the last electron in Chromium.
Answer:
(1) O (Z = 8) 1s2 2s2 2px2 2py1 2pz1
Four quantum numbers for 2px1 electron in oxygen atom:
n = principal quantum number = 2
l = azimuthal quantum number =1
m = magnetic quantum number =+1
s = spin quantum number = +\(\frac {1}{2}\)

(2) Cl (Z = 17) 1s2 2s2 2p6 3s2 3px2 3py2 3pz1
Four quantum numbers for 15th electron in chlorine atom:
n = 3, l = 1, m = 0, s = + ½

(3) Cr (Z = 24) 1s2 2s2 2p2 3s2 3p2 3d2 4s1
n = 3, l = 2, m = +2, s = + ½

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 36.
The quantum mechanical treatment of the hydrogen atom gives the energy value:
En = –\(\frac{-13.6}{n^{2}}\) eV/atom
(i) Use this expression to find ∆E between n = 3 and n = 4.
(ii) Calculate the wavelength corresponding to the above transition.
Answer:
Energy of the electron in the nth orbit is
En = –\(\frac{-13.6}{n^{2}}\)eV/atom.

When n = 3,
E3 = \(\frac{-13.6 \mathrm{eV} / \text { atom }=-1.51 \mathrm{eV} / \text { atom }}{9}\)

When n = 4,
E4 = \(\frac{-13.6 \mathrm{eV} / \text { atom }=-0.85 \mathrm{eV} / \text { atom }}{16}\)

∆E = (E4 – E3) = (-0.85) – (-1.51) = 0.66 eV/atom
Wavelength corresponding to this transition,

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 5

Question 37.
How fast must a 54g tennis ball travel in order to have a de Broglie wavelength that is equal to that of a photon of green light 5400 Å?
Answer:
de Broglie wavelength,
λ = \(\frac{h}{m v}\)
Given:
de Broglie wavelength, λ = 5400 Å and mass, m = 54 g.
Velocity of the tennis ball
v = \(\frac{h}{m \lambda}\)

v = \(\frac{6.626 \times 10^{-34} J s}{54 \times 10^{-3} k g \times 5400 \times 10^{-10} m}\)

v = 2.27 × 10-26 ms-1

Question 38.
For each of the following, give the sub level designation, the allowable m values and the number of orbitals,
(i) n = 1, l = 2
(ii) n = 5, l = 3
(iii) n = 7, l = 0
Answer:
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 6

Question 39.
Give the electronic configuration of Mn2+ and Cr3+.
Answer:
1. Mn (Z = 25)
Mn → Mn2+ + 2e
Mn2+ electronic configuration is 1s 1s2 2s2 2p6 3s2 3p6 3d5

2. Cr (Z = 24)
Cr → Cr3+ + 3e
Cr3+ electronic configuration is Is2 2s2 2p6 3s23p6 3d3

Question 40.
Describe the Aufbau principle.
Answer:
Aufbau Principle states that “In the ground state of the atoms, the orbitals are filled in the order of their increasing energies”. That is the electrons first occupy the lowest energy orbital available to them. Once the lower energy orbitals are completely filled, then the electrons enter the next higher energy orbitals. The order of filling of various orbitals as per the Aufbau principle is given in the figure. which is in accordance with the (n + l) rule.
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 7

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 41.
An atom of an element contains 35 electrons and 45 neutrons. Deduce
(i) the number of protons
(ii) the electronic configuration for the element
(iii) All the four quantum numbers for the last electron.
Answer:
(i) Atomic Number of the element, z = No. of protons or No. of electrons. = 35
Mass number of the element, A = No. of protons + No of neutrons = 35 + 45 = 80
Number of Protons = 80 – 45 = 35.

(ii) Electronic configuration of the element (z = 35)
1s2 2s2 2p6 3s2 3p6 4s2 3d10 4p5

(iii) Quantum number for the last electron (4pz),
n = 4, l = 1, m = +1, or -1 s = +1/2

Question 42.
Show that the circumference of the Bohr orbit for the hydrogen atom is an integral multiple of the de Broglie wavelength associated with the electron revolving around the nucleus.
Answer:
According to the de Broglie concept, the electron that revolves around the nucleus exhibits both particle and wave character. In order for the electron wave to exist in phase, the circumference of the orbit should be an integral multiple of the wavelength of the electron wave, Otherwise, the electron wave is out of phase.
Circumference of the orbit = nλ
2πr = nλ
2πr = \(\frac{n h}{m v}\)
Rearranging,
mvr = \(\frac{n h}{m v}\)
Angular momentum = \(\frac{n h}{2 \pi}\)
The above equation was already predicted by Bohr.
Hence, de Broglie and Bohr’s concepts are in agreement with each other.

Question 43.
Calculate the energy required for the process.
He+(g) → He2+(g) + e
The ionization energy for the H atom in its ground state is — 13.6 eV/atom.
Answer:
He+(g) → He2+(g) + e and
En = – 13.6z2/n2
El = – \(\frac{13.6(2)^{2}}{(1)^{2}}\) = -56.4 eV

E = \(\frac{-13.6(2)^{2}}{(\infty)^{2}}\) = 0

Required energy for the given process is,
E – El = 0 – (-56.4) = 56.4 eV.

Question 44.
An ion with mass number 37 possesses unit negative charge. It the ion contains 11.1% more neutrons than electrons. Find the symbol of the ion.
Answer:
Let the number of electrons in an ion = x
number of neutrons = n = x + \(\frac{11.1}{100}\) eV = 1.111 x
(As the number of neutrons is 11.1% more than the number of electrons)
In the neutral of the atom, a number of electrons.
e = x – 1 (as the ion carries -1 charge)
Similarly number of protons = P = x – 1
Number of protons + number of neutrons = mass number = 37
(x – 1) + 1.111 x = 37 .
2.111 x = 37 +1
2.111 x = 38
x = \(\frac{38}{2.111}\) = 18.009 = 18
∴ Number of protons = atomic number – 1 = 18-1 = 17
∴ The symbol of the ion = \(_{17}^{37} \mathrm{Cl}\).

Question 45.
The Li2+ ion is a hydrogen-like ¡on that can be described by the Bohr model. Calculate the Bohr radius of the third orbit and calculate the energy of an electron in 4th orbit.
Answer:
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 8

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 46.
Protons can be accelerated in particle accelerators. Calculate the wavelength (in Å) of such accelerated proton moving at 2.85 × 108ms-1 (mass of proton is 1.673 × 10-27 kg).
Answer:
Given:
velocity, v = 2.85 × 108ms-1.
mass, m = 1.673 × 10-27 kg
λ = \(\frac{h}{m v}\)

λ = \(\frac{6.626 \times 10^{-34} \mathrm{kgms}^{-1}}{1.673 \times 10-27 \mathrm{~kg} \times 2-85 \times 10^{8} \mathrm{~ms}^{-1}}\)

λ = 1.389 × 10-8 Å

Question 47.
What is the de Broglie wavelength (in cm) of a 160g cricket ball travelling at 140 Km hr-1.
Answer:
Given:
velocity, v = 140 km/hr. = \(\frac{140 \times 10^{3}}{60 \times 60 \mathrm{~ms}^{-1}}\)

mass, m = 160g = 160 × 10-3 kg
λ = \(\frac{h}{m v}\)
λ =\(\frac{6.626 \times 10^{-34} \mathrm{kgm}^{2} \mathrm{~s}^{-\mathrm{le}}}{160 \times 10^{-3} \mathrm{~kg} \times 3.88 \mathrm{~ms}^{-1}}\)

λ = 1.605 × 10-34 m.

Question 48.
Suppose that the uncertainty in determining the position of an electron in an orbit is 0.6 Å. What is the uncertainty in its momentum?
Answer:
Heisenberg Uncertainity Principle is ∆x . ∆p ≥ \(\frac{h}{4 \pi}\)
Given:
∆x = 0.6 Å = 0.6 × 10-10 m
h = 6.626 × 10-34 kgm2s-1
Uncertainity in momentum,
∆p ≥ \(\frac{h}{4 \pi \Delta x}\)

∆p ≥ \(\frac{6.626 \times 10^{-34} \mathrm{kgm}^{2} \mathrm{~s}^{-1}}{4 \times 3.14 \times 0.6 \times 10^{-10} \mathrm{~m}}\)

∆p ≥ 8.8 × 10-25 kgms-1

Question 49.
Show that if the measurement of the uncertainty in the location of the particle is equal to its de Broglie wavelength, the minimum uncertainty in its velocity (∆V) is equal to 1/4π of its velocity(V)
Answer:
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 9

Question 50.
What is the de Brogue wave length of an electron, which is accelerated from the rest, through a potential difference of 100V?
Answer:
Potential difference = 100 V = 100 × 106 × 10-19 J
λ = \(\frac{h}{\sqrt{2} \text { mev }}\)

λ = \(\frac{6.626 \times 10^{-34} \mathrm{Kgm}^{2} \mathrm{~s}}{\sqrt{2} \times 9.1 \times 10^{-31} \mathrm{~kg} \times 100 \times 1.6 \times 10^{-19} \mathrm{~J}}\)

λ = 1.22 × 10-10

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 51.
Identify the missing quantum numbers and the sub energy level.
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 10
Answer:
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 11

11th Chemistry Guide Quantum Mechanical Model of Atom Additional Questions and Answers

I. Choose the best Answer:

Question 1.
The angular momentum of the electron in the nth orbit is
(a) \(\frac{\pi h}{2 n}\)

(b) \(\frac{2 n h}{\pi}\)

(c) \(\frac{n h}{2 \pi}\)

(d) \(\frac{2 \pi}{n h}\)
Answer:
(c) \(\frac{n h}{2 \pi}\)

Question 2.
The frequency of radiation emitted when an electron jumps from higher energy state (E2) to a lower energy state (E1) is given by
(a) v = \(\frac{\left(E_{2}+E_{1}\right)}{h}\)

(b) v = \(\frac{\left(E_{1}+E_{2}\right)}{h}\)

(c) v = \(\frac{\left(E_{1}-E_{2}\right)}{h}\)

(d) v = \(\frac{\left(E_{2}-E_{1}\right)}{h}\)
Answer:
(d) v = \(\frac{\left(E_{2}-E_{1}\right)}{h}\)

Question 3.
Splitting of spectral lines in the presence of a magnetic field is called
(a) Zeeman effect
(b) Stark effect
(e) shielding effect
(d) Compton effect
Answer:
(a) Zeeman effect

Question 4.
Which one of the following has zero rest mass?
(a) electron
(b) proton
(c) neutron
(d) photon
Answer:
(d) photon

Question 5.
For a microscopic particle such as an electron, the mass is of the order of
(a) 10-29 kg
(b) 10-31 kg
(c) 1031 kg
(d) 10-30 kg
Answer:
(b) 10-31 kg

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 6.
Which one of the following has insignificant de Broglie wavelength?
(a) electron
(b) proton
(e) neutron
(d) iron ball
Answer:
(d) iron ball

Question 7.
Which of the following statements are true about de Broglie wavelength?
(i) The particle travels at a speed much higher than the speed of light.
(ii) The particle can have high linear momentum.
(iii) The mass of the particle is of the order of 10-30 kg.
(iv) The particle travels at speed much less than the speed of light.
(a) (i) and (ii)
(b) (iii) and (iv)
(c) (i) and (iii)
(d) (ii) and (iv)
Answer:
(b) (iii) and (iv)

Question 8.
The correct mathematical expression/s for Heisenberg Uncertainty principle is
(i) ∆x . ∆p ≥ \(\frac{h}{4 \pi}\)

(ii) ∆x . ∆p ≥ \(\frac{h}{4 \pi m}\)

(iii) ∆x . ∆v ≥ \(\frac{h}{4 \pi m}\)

(iv) ∆x . ∆v ≥ \(\frac{h}{4 \pi}\)
(a) (i) and (ii)
(b) (ii) and(iv)
(c) (i) and (iii)
(d) (ii) and (iii)
Answer:
(c) (i) and (iii)

Question 9.
The wave nature of electron was experimentally confirmed by
(a) Louis de Broglie
(b) Davisson and German
(c) Schrodinger
(d) Niels Bohr
Answer:
(b) Davisson and German

Question 10.
The term ‘ ψ ’ in the Schrodinger equation is
(a) Eigenvalue
(b) Hamiltonian operator
(c) Wave function
(d) all of these
Answer:
(c) Wave function

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 11.
The permitted total energy values in the Schrodinger equation are called
(a) eigenvalues
(b) eigen functions
(c) wave functions
(d) Hamiltonian operator
Answer:
(a) eigenvalues

Question 12.
_______ is a three-dimensional space in which the probability of finding the electron is maximum.
(a) orbit
(b) Orbital
(c) wave function
(d) eigenvalue
Answer:
(b) Orbital

Question 13.
Which of the following has always positive value?
(a) ψ
(b) ψ2
(c) both ψ and ψ2
(d) ψ3
Answer:
(b) ψ2

Question 14.
The maximum number of electrons that can be accommodated in M shell is
(a) 8
(b) 32
(c) 16
(d) 18
Answer:
(d) 18

Question 15.
The maximum number of electrons that can be accommodated in a given subshell is
(a) (2l + 1)
(b) 4l + 2
(c) l + 2
(d) 2(l + 1)
Answer:
(b) 4l + 2

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 16.
The region where the probability density function reduces to zero is called
(a) wave function
(b) orbital
(c) nodal surface
(d) probability density region
Answer:
(c) nodal surface

Question 17.
Number of subshells and electrons associated with n = 4 respectively are
(a) 4, 16
(b) 32, 64
(c) 16, 32
(d) 8, 16
Answer:
(c) 16, 32

Question 18.
The radial wave function in the ψ(r, θ, φ) = R(r), f(θ), g(φ) is
(a) f(θ)
(b) g(φ)
(c) R(r)
(d) f(θ) and g(φ)
Answer:
(c) R(r)

Question 19.
The plot of _______ shows the maximum probability that occurs at a distance of 0.52 Å from the nucleus.
(a) 4π2r2 vs ψ2
(b) 4π2 r2 ψ2 vs r2
(c) 4π2 ψ2 vs r
(d) 4π2 ψ2 vs r2
Answer:
(d) 4π2 ψ2 vs r2

Question 20.
The number of radial nodes for a 3s orbital is
(a) 3
(b) 2
(c) 1
(d) 0
Answer:
(b) 2

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 21.
The number radial nodes for a ‘nd’ orbital is
(a) (n – 1)
(b) (n – l)
(c) (n – l + 1)
(d) (n – l – 1)
Answer:
(d) (n – l – 1)

Question 22.
The order of the effective nuclear charge felt by an electron in an orbital within a shell is
(a) s < p < d < f
(b) s > p > d > f
(c) s < p ≈ d < f
(d) s ≈ p > d ≈ f
Answer:
(b) s > p > d > f

Question 23.
Which of the following sequences shows the correct increasing order of energy’?
(a) 3s, 3p, 4s, 3d, 4p, 5s, 4d, 5p
(b) 3s, 3p, 4s, 4p, 3d, 5s, 4d, 5p
(c) 3s, 3p, 4s, 4p, 3d, 5s, 5p, 4d
(d) 3s, 3p, 4s, 4p, 3d, 4d, 5s, 5p
Answer:
(a) 3s, 3p, 4s, 3d, 4p, 5s, 4d, 5p

Question 24.
The orbital with following quantum numbers (i) n = 4,1 = 3 and (ii) n = 3 and 1 = 2 are
(a) 3d, 4f
(b) 3d, 4d
(c) 3f, 4f
(d) 3p, 4f
Answer:
(c) 3f, 4f

Question 25.
The energy of one photon of a beam of light with wavelength 3.31 × 10-6 m is
(a) 6 × 10-20 J
(b) 2 × 10-20 J
(c) 6 × 10-21 J
(d) 2 × 10-21 J
Answer:
(a) 6 × 10-20 J

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 26.
The ratio of energies of two radiations with wavelengths of 300 nm and 900 nm is
(a) 1 : 3
(b) 2 : 1
(c) 3 : 1
(d) 1 : 2
Answer:
(c) 3 : 1

Question 27.
The momentum of a particle which has a wavelength of 6.62 Å is (in kg ms-1)
(a) 10-20
(b) 10-22
(c) 10-34
(d) 10-24
Answer:
(d) 10-24

Question 28.
If the energy difference between the ground state of an atom and its excited state is 3.31 × 10-19 J, the wavelength of the photon required to produce this transition is
(a) 3 × 10-9 m
(b) 6 × 10-7 m
(c) 3 × 10-8 m
(d) 6 × 10-6 m
Answer:
(b) 6 × 10-7 m

Question 29.
The spectrum of He+ is similar to
(a) Li+
(b) H+
(c) He
(d) Li2+
Answer:
(c) He

Question 30.
An atom has two electrons in the K shell, eight electrons in the L shell, and eight electrons in the M shell. The number of ‘s’ electrons present in that element is
(a) 18
(b) 10
(c) 6
(d) 4
Answer:
(c) 6

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 31.
The atomic number of an element ‘A’ is 25. How many electrons are present in the third shell of the element in its A3+ state?
(a) 10
(b) 12
(c) 15
(d) 4
Answer:
(b) 12

Question 32.
Which of the following sets of quantum numbers are not possible?
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 12
(a) (i), (iii) and (iv)
(b) (i), (iv) and (v)
(c) (iii), (iv) and (v)
(d) (i), (ii) and (iii)
Answer:
(c) (iii), (iv) and (v)

Question 33.
ψ2 is always
(a) negative
(b) positive
(c) either positive or negative
(d) none of these
Answer:
(b) positive

Question 34.
Which of the following sets of quantum numbers represents the highest energy of an atom?
(a) n = 4, l = 1, m = 0, s = +1/2
(b) n = 3, l = 0, m = 0, s = +1/2
(c) n = 3, l = 0, m = 1, s = +1/2
(d) n = 4, l = 0, m = 0, s = +1/2
Answer:
(a) n = 4, l = 1, m = 0, s = +1/2

Question 35.
The number of possible exchanges for [Ar] 3d4 4s2 configuration is
(a) 10
(b) 6
(c) 4
(d) 1
Answer:
(b) 6

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

II. Very Short Question and Answers (2 Marks):

Question 1.
Write a note about J.J. Thomson’s atomic model.
Answer:

  • J.J. Thomson’s cathode ray experiment revealed that atoms consist of negatively charged particles called electrons.
  • He proposed that an atom is a positively charged sphere in which the electrons are embedded like the seeds in the watermelon.

Question 2.
What is the Zeeman effect?
Answer:
The splitting of spectral lines in the presence of a magnetic field is called the Zeeman effect.

Question 3.
What is Stark effect?
Answer:
The splitting of spectral lines in the presence of electric field is called Stark effect.

Question 4.
Write the limitation of Bohr’s postulates?
Answer:
Bohr’s postulates are applicable to one electron speciesvsuch as H, He+ and Li2+ etc.,

Question 5.
Write the formulae for the radius and energy of electron in the nth orbit of electron.
Answer:
Radius of electron in the nth orbit,
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 13

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 6.
Write de Broglie equation and explain the terms in it.
Answer:
de Beoglie equation is λ = \(\frac{h}{m v}\)
where λ = de Broglie wavelength of matter waves, m = mass of the particle and v = velocity.

Question 7.
What are quantum numbers?
Answer:

  • The electron in an atom can be characterized by a set of four quantum numbers, namely principal quantum number (n), azimuthal quantum number (l), magnetic quantum number (m), and spin quantum number (s).
  • When the Schrodinger equation is solved for a wave function T, the solution contains the first three quantum numbers n, l, and m.
  • The fourth quantum number arises due to the spinning of the electron about its own axis.

Question 8.
State Heisenberg Uncertainty principle.
Answer:
It is impossible to accurately determine both the position as well as the momentum of a microscopic particle simultaneously.

Question 9.
What is classical mechanics?
Answer:
The motion of objects that we come across in our daily life can be well described based on Newton’s law of motion is called classical mechanics.

Question 10.
What is the limitation of classical mechanics?
Answer:
Classical mechanics does not consider the dual nature of the matter which is significant for microscopic particles. As a consequence, it fails to explain the motion of microscopic particles.

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 11.
What is quantum mechanics?
Answer:
Based on Heisenberg’s principle and the dual I nature of the microscopic particles, a new mechanics I developed to study the motion of microscopic particles is called quantum mechanics.

Question 12.
What is Schrodinger’s equation?
Answer:
Erwin Schrodinger expressed the wave nature of electron in terms of the differential equation is called Schrodinger equation. This equation determines the change of wave equation in space depending on the field of force in which the electron moves.

Question 13.
Write the Schrodinger equation in terms of the operator?
Answer:
The time-independent Schrodinger equation can be expressed as Hψ = Eψ
where H is called Hamiltonian operator, ψ is the wave function and E is the energy of the system.

Question 14.
Write the Schrodinger equation in terms of a differential equation?
Answer:
The time independent Schrodinger equation in terms of a differential equation is
\(\frac{\partial^{2} \Psi}{\partial x^{2}}+\frac{\partial^{2} \Psi}{\partial y^{2}}+\frac{\partial^{2} \Psi}{\partial z^{2}}+\frac{8 \pi^{2} m}{h^{2}}(\mathrm{E}-\mathrm{V}) \Psi=0\)

Question 15.
What is a Hamiltonian operator?
Answer:
The total energy operator is called Hamiltonian operator and it can be expressed as
Ĥ = [latex]\frac{-h^{2}}{8 \pi^{2} m}\left(\frac{\partial^{2}}{\partial x^{2}}+\frac{\partial^{2}}{\partial y^{2}}+\frac{\partial^{2}}{\partial z^{2}}\right)+V[/latex]

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 16.
Define an orbital.
Answer:
Orbital is a three-dimensional space in which the probability of finding the electron is maximum.

Question 17.
Calculate the total number of angular nodes and radial nodes present in 4p and 4d orbitals.
Answer:
1. For 4p orbital:
Number of angular nodes = l
For 4p orbital 7 = l
Number of angular nodes = l
Number of radial nodes = n – l – 1 = 4 -1 -1 = 2
Total number of nodes = n -1 = 4 – 1 = 3
1 angular node and 2 radial nodes.

2. For 4d orbital:
Number of angular nodes = l
For 4d orbital l = 2
Number of angular nodes = 2
Number of radial nodes = n – l – 1 = 4 – 2 – 1 = 1
Total number of nodes = n – l = 4 – l = 3
1 radial nodes and 2 angular node.

Question 18.
The energies of the same orbital decrease with an increase in the atomic number. Justify this statement.
Answer:
The energy of the 2s orbital of a hydrogen atom is greater than that of 2s orbital of lithium and that of lithium is greater than that of sodium and so on because of H (Z =1), Li (Z = 3), and Na (Z = 11). When the atomic number increases, the energies of the same orbital decrease. E2s(H) > E2s(Li) > E2s(Na) > E2s(K) ………….

Question 19.
What is the principal quantum number?
Answer:
The principal quantum number represents the energy level in which an electron revolving around the nucleus and is denoted by the symbol ‘n’.

Question 20.
What is a nodal surface or a radial node?
Answer:
The region where this probability density function reduces to zero is called nodal surface or a radial node.

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 21.
What is the significance of the solution to the Schrodinger equation?
Answer:
The solution to the Schrodinger equation gives the permitted energy values called eigenvalues and the wave functions corresponding to the eigenvalues are called atomic orbitals.

Question 22.
What are radial and angular wave functions?
Answer:
The solution of the Schrodinger wave equation for one electron system can be expressed in spherical polar coordinates as ψ(r, θ, φ) = R(r). f(θ). g(φ) Where R(r) is called a radial wave function, f(θ) and g(φ) are called angular wave functions.

Question 23.
What is the ground state?
Answer:
The electron present in the lowest energy state is called the ground state.

Question 24.
State (n + l) rule.
Answer:
The lower the value of (n + l) for an orbital, the lower is its energy. If two orbitals have the same value of (n + l), the orbital with lower value of ‘n’ will have the lower energy.

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

III. Short Question and Answers (3 Marks):

Question 1.
What are the conclusions of Rutherford’s α – rays scattering experiment?
Answer:

  • Rutherford bombarded a thin gold foil with a stream of fast-moving α – particles.
  • It was observed that most of the a-particles passed through the foil.
  • Some of them were deflected through a small angle.
  • Very few α- particles were reflected back by 180°.
  • Based on these observations, he proposed that in an atom, there is a tiny positively charged nucleus and the electrons are moving around the nucleus with high speed.

Question 2.
Write the assumptions of Bohr’s atom model.
Answer:
Bohr’s atom model is based on the following assumptions:
(i) The energies of electrons are quantized.
(ii) The electron is revolving around the nucleus in a certain fixed circular path called stationary orbit.
(iii) Electron can revolve only in those orbitsJn which the angular momentum {mvr) of the electron must be equal to an integral multiple of \(\frac{h}{2 \pi}\)
i,e., mvr = \(\frac{n h}{2 \pi}\), where n = 1, 2, 3, … etc.,
(iv) As long as an electron revolves in the fixed orbit, it does lose its energy. However, when an electron jumps from higher energy state (E2) to a lower energy state (E1), the excess energy is emitted as radiation.
The frequency of the emitted radiation is (E2 – E1) = hυ.

Frequency, υ = \(\frac{\left(E_{2}-E_{1}\right)}{h}\)
Conversely, when suitable energy is supplied to an electron, it will jump from lower energy orbit to a higher energy orbit.

Question 3.
Explain Davisson and Germer’s experiment.
Answer:

  • The wave nature of electrons was experimentally confirmed by Davisson and Germer.
  • They allowed the accelerated beam of electrons to fall on a nickel crystal and recorded the diffraction pattern.
  • The resultant diffraction pattern is similar to the X-ray diffraction pattern.
  • The finding of wave nature of electron leads to the development of various experimental techniques such as electron microscope, low energy electron diffraction, etc.

Question 4.
Show that de Broglie and Bohr’s concepts are in agreement with each other.
Answer:
According to the de Broglie concept, the electron that revolves around the nucleus exhibits both particle and wave character. In order for the electron wave to exist in phase, the circumference of the orbit should be an integral multiple of the wavelength of the electron wave, Otherwise, the electron wave is out of phase.
Circumference of the orbit = nλ
2πr = nλ
2πr = \(\frac{n h}{m v}\)
Rearranging,
mvr = \(\frac{n h}{2 \pi}\)
Angular momentum = \(\frac{n h}{2 \pi}\)
The above equation was already predicted by Bohr. Hence, de Broglie and Bohr’s concepts are in agreement with each other.

Question 5.
Write a note about the principal quantum number.
Answer:

  • The principal quantum number represents the energy level in which an electron revolves around the nucleus and is denoted by the symbol ‘n’.
  • The ‘n’ can have the values 1, 2, 3,… n = 1 represents K shell; n=2 represents L shell and n = 3, 4, 5 represent the M, N, O shells, respectively.
  • The maximum number of electrons that can be accommodated in a given shell is 2n2.
  • ‘n’ gives the energy of the electron,

En = \(\frac{(-1312.8) Z^{2}}{n^{2}}\) KJ mol-1 and the distance of the electron from the nucleus is given by rn = \(\frac{(-0.529) n^{2}}{Z}\) A.

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 6.
Write the significance of principle quantum number.
Answer:
Principle quantum number represents the energy level in which electron revolves around the nucleus and is denoted by the symbol ‘n’.
(i) The ‘n’ can have the values 1, 2, 3, … n = 1 represent K shell: n = 2 represents L shell and n = 3, 4, 5 represent the M, N, O shells respectively.
(ii) The maximum number of electrons that can be accommodated in a given shell, is 2n2.
(iii) ‘n’ gives the energy of the electron,
En = \(\frac{(-1312.8) Z^{2}}{n^{2} k J m o l^{-1}}\)

and the distance of the electron from the nucleus is given by
rn = \(\frac{(0.529) n^{2}}{Z}\) Å.

Question 7.
Write notes on Azimuthal Quantum number.
Answer:
(i) Azimuthal quantum number is represented by the letter ‘l’ and can take integral values from zero to (n – l), where n is the principle quantum number.
(ii) Each l value represents a subshell. l = 0, 1,2, 3 and 4 represents the s, p, d, f and g orbitals respectively.
(iii) The maximum number of electrons that can be accommodated in a given subshell is 2 (2l + 1).
(iv) It is used to calculate the orbital angular momentum using the expression
Angular momentum = \(\frac{\sqrt{l(l+1) h}}{2 \pi}\)

Question 8.
Write the significance of magnetic quantum numbers.
Answer:
(i) Spin quantum number is denoted by the letter ‘ml’. It takes integral values ranging from -l to +l through 0. i.e., if l = 1: m = -1, 0 and +1.
(ii) Different values of m for a given l value, represent different orientations of orbitals in space.
(iii) The Zeeman effect provides the experimental justification for this quantum number.
(iv) The magnitude of the angular momentum is determined by the quantum number ‘l’ while its direction is given by magnetic quantum number.

Question 9.
Write notes on spin quantum number.
Answer:
(i) The spin quantum number represents the spin of the electron and is denoted by the letter ‘ms‘.
(ii) The electron in an atom revolves not only around the nucleus but also spins. It is usual to write this as an electron spins about its own axis either in a clockwise direction or in an anti-clockwise direction. The visualization is not true. However, spin is to be understood as representing a property that revealed itself in magnetic fields.
(iii) Corresponding to the clockwise and anti¬clockwise spinning of the electron, a maximum of two values are possible for this quantum number.
(iv) The values of ‘ms‘ is equal to -1/2 and +1/2.

Question 10.
Write the significance of ψ and ψ2.
Answer:
The wave function ψ has no physical meaning and the square of the wave function |ψ|2 is related to the probability of finding the electrons within a given volume of space. |ψ|2 varies with the distance from nucleus (radial distribution of the probability) and the direction from the nucleus (angular distribution of the probability).

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 11.
Show that the probability of finding the electron is independent of the direction from the nucleus.
Answer:
The variation of the probability of locating the electron on a sphere with nucleus at its centre depends on the azimuthal quamtum number of the orbital in which the electron is present. For 1s orbital, l = 0, and m = 0.
f(θ) = \(\frac{1}{\sqrt{2}}\) and g(φ) = \(\frac{1}{\sqrt{2 \pi}}\)

Therefore, the angular distribution function is equal to \(\frac{1}{2 \sqrt{\pi}}\) i.e., it is independeent of the angle θ and φ. Hence, the probability of finding the electron is independent of the direction from the nucleus.

Question 12.
Sketch the shapes of 1s, 2s and 3s orbitals.
Answer:
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 14

Question 13.
Sketch and explain the shapes of p-orbitals.
Answer:
The shape of the p-orbitais are shown in figure, For p orbitaIs, l = 1 and the corresponding m values are -1, 0 and +1. The three different ‘m’ values indicates that there are three different orientations possible for p orbitals. These orbitals are designated as px, py and pz and the angular distribution for these orbitals shows that the lobes are along the x, y and z axis respectively.
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 15

Question 14.
What are ground and excited states?
Answer:
The electron in the hydrogen atom occupies the ly orbital that has the lowest energy. This state is called ground state. When this electron gains some energy, it moves to the higher energy orbitals such as 2s, 2p etc., These states are called excited states.

Question 15.
Explain the significance of effective nuclear charge.
Answer:
In a multi-electron atom, in addition to the electrostatic attractive force between the electron and nucleus, there exists a repulsive force among the electrons. These two forces are operating in the opposite direction. This results in the decrease in the nuclear force of attraction on electron.
The net charge experienced by the electron is called effective nuclear charge. The effective nuclear charge depends on the shape of the orbitals and it decreases with increase in azimuthal quantum number l. The order of the effective nuclear charge felt by a electron in an orbital within the given shell is s > p > d > l.

Greater the effective nuclear charge, greater is the stability of the orbital. Hence, within a given energy level, the energy of the orbitals are in the following order s < p < d <f.

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 16.
State and explain Hund’s rule.
Answer:
Hund’s rule of maximum multiplicity states that- electron pairing in the degenerate orbitals does not take place until all the available orbitals contains one electron each. Consider the carbon atom which has six electrons. According to Aufbau principle, the electronic configuration is 1s2, 2s2, 2p2.
It can be represented as below,
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 16
In this case, in order to minimize the electron- electron repulsion, the sixth electron enters the unoccupied 2py orbital as per Hund’s rule, i.e., it does not get paired with the fifth electron already present in the 2px orbital.

IV. Long Question and Answers:

Question 1.
Derive de Broglie equation.
Answer:
Albert Einstein proposed that light has dual nature. i.e., light photons behave both like a particle and as a wave. Louis de Broglie extended this concept and proposed that all forms of matter showed dual character. To quantify this relation, he derived an equation for the wave length of a matter wave. He combined the following two equations of energy of which one represents wave character (hυ) and the other represents the particle nature (mc2).
Planck’s quantum hypothesis is
E = hυ ………..(1)
Einstein’s mass-energy relationship,
E = mc2
From (1) and (2), hυ = mc2
\(\frac{h c}{\lambda}\) = mc2
λ = \(\frac{h}{m c}\)
Equation (3) represents the wavelength of photons whose momentum is given by mc. For a particle of matter with mass ‘m’ and moving with a velocity ‘v’, the equation (3) can be written as
λ = \(\frac{h}{m v}\) …………..(4)

The equation (4) is called de Broglie equation for matter waves and this is valid only when the particle travels at speeds much less than the speed of light. This equation implies that a moving particle can be considered as a wave and a wave can exhibit the properties of a particle.

For a particle with high linear momentum the wavelength will be so small and cannot be observed. For a microscopic particle such as an electron, the mass is of the order of 10-31 kg, hence the wavelength is much larger than the size of atom and it becomes significant.

Question 2.
Write the main features of the quantum mechanical model of atom.
Answer:
(i) The energy of electrons in atoms is quantized.
(ii) The existence of quantized electronic energy levels is a direct result of the wave-like properties of electrons.
(iii) According to Heisenberg uncertainty principle, the exact position and momentum of an electron cannot be determined with absolute accuracy. As a consequence, quantum mechanics introduced the concept of orbital. Orbital is a three dimensional space in which the probability of finding the electron is maximum.
(iv) The solution of Schrodinger wave equation for the allowed energies of an atom gives the wave function, ψ, which represents an atomic orbital. The wave nature of electron present in an orbital can be well defined by the wave function ψ.
(v) The wave function, ψ, itself has no physical meaning. However, the probability of finding the electron in a small volume dxdydz around a point (x, y, z) is proportional to |ψ(x, y, z)|2 dxdydz. |ψ(x, y, z)|2 is known as probability density and is always positive.

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 3.
Describe the radial distribution function of 1s and 2s orbitals of hydrogen atom.
Answer:
Consider a single electron of hydrogen atom in the ground state for which the quantum numbers are n = 1 and l = 0. i.e., it occupies l.y orbital. The plot R(r)2 versus r for is orbital given in figure.

The graph shows that as the distance between the electron and the nucleus decreases, the probability of finding the electron increases. At r = 0, the quantity R(r)2 is maximum. The maximum value for |ψ|2 is at the nucleus. However, probability of finding the electron in a given spherical shell around the nucleus is important. Let us consider the volume (dV) bounded by two spheres of radii r and r + dr.

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 17
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 18

The above plot shows that the maximum probability occurs at distance of 0.52 Å. from the nucleus. This is equal to the Bohr radius. It indicates that the maximum probability of finding the electron around the nucleus is at this distance. However, there is a probability to find the electron at other distances also. The radial distribution function of 2s, orbital of the hydrogen atom represented as follows.

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 19

Question 4.
Sketch and explain the shapes of d-orbitals.
Answer:
For ‘d’ orbital l = 2 and the corresponding ‘m’ values are -2, -1, 0, +1, +2. The shape of the ‘d’ orbital looks like a ‘clover leaf’. The five m values give rise to five d orbitals namely dxy, dyz, dzx, dx2 – y2, and dz2. The 3d orbitals contain two nodal planes as shown in figure.

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 20
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 21

Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom

Question 5.
Sketch and explain the shapes of f-orbitals.
Answer:
For ‘f orbitals, l = 3 and the m values are -3, -2, -1, 0, +1, +2, +3 corresponding to seven f orbitals which are shown in figure. There are three nodal planes in the f orbitals.
Samacheer Kalvi 11th Chemistry Guide Chapter 2 Quantum Mechanical Model of Atom 22

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Computer Science Guide Pdf Chapter 13 Introduction to Object-Oriented Programming Techniques Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 13 Introduction to Object-Oriented Programming Techniques

11th Computer Science Guide Introduction to Object-Oriented Programming Techniques Text Book Questions and Answers

Book Evaluation

Part I

Choose The Correct Answer

Question 1.
The term is used to describe a programming approach based on classes and objects is
a) OOP
b) POP
c) ADT
d) SOP
Answer:
a) OOP

Question 2.
The paradigm which aims more at procedures.
a) Object Oriented Programming
b) Procedural programming
c) Modular programming
d) Structural programming
Answer:
b) Procedural programming

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 3.
Which of the following is a user defined data type?
a) class
b) float
c) int
d) object
Answer:
a) class

Question 4.
The identifiable entity with some characteristics and behaviour is.
a) class
b) object
c) structure
d) member
Answer:
b) object

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 5.
The mechanism by which the data and functions are bound together into a single unit is known as
a) Inheritance
b) Encapsulation
c) Polymorphism
d) Abstraction
Answer:
b) Encapsulation

Question 6.
Insulation of the data from direct access by the program is called as
a) Data hiding
b) Encapsulation
c) Polymorphism
d) Abstraction
Answer:
a) Data hiding

Question 7.
Which of the following concept encapsulate all the essential properties of the object that are to be created?
a) class
b) Encapsulation
c) Polymorphism
d) Abstraction
Answer:
d) Abstraction

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 8.
Which of the following is the most important advantage of inheritance?
a) data hiding
b) code reusability
c) code modification
d) accessibility
Answer:
b) code reusability

Question 9.
“Write once and use it multiple time” can be achieved by
a) redundancy
b) reusability
c) modification
d) composition
Answer:
b) reusability

Question 10.
Which of the following supports the transitive nature of data?
a) Inheritance
b) Encapsulation
c) Polymorphism
d) Abstraction
Answer:
a) Inheritance

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Part – II

Very Short Answer

Question 1.
How is modular programming different from the procedural programming paradigm?
Answer:
Modular programming:

  • Emphasis on the algorithm rather than data.
  • Programs are divided into individual modules.
  • Each modules are independent of each other and have their own local data.
  • Modules can work with their own data as well as with the data passed to it.

Procedural programming:

  • Programs are organized in the form of subroutines or subprograms.
  • All data items are global.
  • Suitable for a small-sized software applications.
  • Difficult to maintain and enhance the program code as any change in data type needs to be propagated to all subroutines that use the same data type.

Question 2.
Differentiate classes and objects.
Answer:
Class: A Class is a construct in C++ which is used to bind data and its associated function together into a single unit using the encapsulation concept. Class is a user-defined data type.

Object: An identifiable entity with some characteristics and behaviour is called an object.

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 3.
What is polymorphism?
Answer:
Polymorphism is the ability of a message or function to be displayed in more than one form.

Question 4.
How are encapsulation and abstraction are interrelated?
Answer:
The mechanism by which the data and functions are bound together into a single unit is known as Encapsulation. It implements abstraction.
Abstraction refers to showing only the essential features without revealing background details.

Question 5.
Write the disadvantages of OOP.
Answer:

  1. Size: Object-Oriented Programs are much larger than other programs.
  2. Effort: Object-Oriented Programs require a lot of work to create.
  3. Speed: Object-Oriented Programs are slower than other programs, because of their size.

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Part – III

Short Answers

Question 1.
What is a paradigm? Mention the different types of paradigm.
Answer:
The paradigm means organizing principle of a program. It is an approach to programming.
There are different approaches available for problem-solving using computers. They are:

  • Procedural programming,
  • Modular Programming and
  • Object-Oriented Programming.

Question 2.
Write a note on the features of procedural programming.
Answer:
Important features of procedural programming

  1. Programs are organized in the form of subroutines or subprograms
  2. All data items are global
  3. Suitable for small-sized software application
  4. Difficult to maintain and enhance the program code as any change in data type needs to be propagated to all subroutines that use the same data type. This is time-consuming.
  5. Example: FORTRAN and COBOL.

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 3.
List some of the features of modular programming
Answer:
Important features of modular programming:

  • Emphasis on the algorithm rather than data.
  • Programs are divided into individual modules.
  • Each modules are independent of each other and have their own local data.
  • Modules can work with its own data as well as with the data passed to it.
  • Example: Pascal and C.

Question 4.
What do you mean by modularization and software reuse?
Answer:

  1. Modularization: where the program can be decomposed into modules.
  2. Software reuse: where a program can be composed of existing and new modules.

Question 5.
Define information hiding.
Answer:
The data is not accessible to the outside world, and only those functions which are wrapped in the class can access it.These functions provide the interface between the object’s data and the program.
This encapsulation of data from direct access by the program is called data hiding or information hiding.

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Part-IV

Explain in Detail

Question 1.
Write the differences between object-oriented programming and procedural programming.
Answer:
Object-Oriented Programming:

  • Emphasizes data rather than algorithms.
  • Data abstraction is introduced in addition to procedural abstraction.
  • Data and its associated operations are grouped into a single unit.
  • Programs are designed around the data being operated.
  • Example: C++, Java, VB.Net, Python

Procedural Programming:

  • Programs are organized in the form of subroutines or subprograms.
  • All data items are global.
  • Suitable for a small-sized software application.
  • Difficult to maintain and enhance the program code as any change in data type needs to be propagated to all subroutines that use the same data type.
  • Example: FORTRAN and COBOL

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 2.
What are the advantages of OOPs?
Answer:
Advantages of OOP Re-usability:
“Write once and use it multiple times” you can achieve this by using class.

Redundancy:
Inheritance is a good feature for data redundancy. If you need the same functionality in multiple classes you can write a common class for the same functionality and inherit that class to sub-class.

Easy Maintenance:
It is easy to maintain and modify existing code as new objects can be created with small differences to existing ones.

Security:
Using data hiding and abstraction only necessary data will be provided thus maintains the security of data.

Question 3.
Write a note on the basic concepts that support OOPs?
Answer:
Object-Oriented Programming has been developed to overcome the drawbacks of procedural and modular programming. It is widely accepted that object-oriented programming is the most important and powerful way of creating software.

The Object-Oriented Programming approach mainly encourages:

  1. Modularization: where the program can be decomposed into modules.
  2. Software reuse: where a program can be composed of existing and new modules.

Main Features of Object-Oriented Programming:

  1. Data Abstraction
  2. Encapsulation
  3. Modularity
  4. Inheritance
  5. Polymorphism

Encapsulation:
The mechanism by which the data and functions are bound together into a single unit is known as Encapsulation. It implements abstraction. Encapsulation is about binding the data variables and functions together in class. It can also be called data binding. Encapsulation is the most striking feature of a class.

The data is not accessible to the outside world, and only those functions which are wrapped in the class can access it. These functions provide the interface between the object’s data and the program. This encapsulation of data from direct access by the program is called data hiding or information hiding.

Data Abstraction:
Abstraction refers to showing only the essential features without revealing background details. Classes use the concept of abstraction to define a list of abstract attributes and function which operate on these attributes. They encapsulate all the essential properties of the object that are to be created. The attributes are called data members because they hold information. The functions that operate on these data are called methods or member functions.

Modularity:
Modularity is designing a system that is divided into a set of functional units (named modules) that can be composed into a larger application.

Inheritance:
Inheritance is the technique of building new classes (derived class) from an existing class (base class). The most important advantage of inheritance is code reusability.

Polymorphism:
Polymorphism is the ability of a message or function to be displayed in more than one form.

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

11th Computer Science Guide Introduction to Object-Oriented Programming Techniques Additional Questions and Answers

Choose The Correct Answer (1 Mark)

Question 1.
In procedural programming all data items are ……………….
(a) Cobol
(b) global
(c) fortran
(d) class
Answer:
(b) global

Question 2.
The object-oriented paradigm allows us to organize software as a collection of objects that consist of …………………..
a) Data
b) Behaviour
c) Both data and behaviour
d) None of these
Answer:
c) Both data and behaviour

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 3.
………………. is an example of object-oriented programming.
(a) Python
(b) Java
(c) VB.Net
(d) All the above
Answer:
(d) All the above

Question 4.
Paradigm means ………………..
a) Organizing principle of a program
b) An approach to programming
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 5.
………………. is about binding the data variables and functions together in class.
(a) Data abstraction
(b) Modularization
(c) Redundancy
(d) Encapsulation
Answer:
(d) Encapsulation

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 6.
In ………………. approach programs are organized in the form of subroutines or subprograms.
a) Modular Programming
b) Procedural Programming
c) Object-Oriented Programming
d) All the above
Answer:
b) Procedural Programming

Question 7.
…………………. approach of the program is time-consuming.
a) Modular Programming
b) Procedural Programming
c) Object-Oriented Programming
d) All the above
Answer:
b) Procedural Programming

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 8.
……………… language is based on procedural programming.
a) FORTRAN
b) COBOL
c) Both A and B
d) C++
Answer:
c) Both A and B

Question 9.
…………….. paradigm consists of multiple modules; each module has a set of functions of related types.
a) Modular Programming
b) Procedural Programming
c) Object-Oriented Programming
d) All the above
Answer:
a) Modular Programming

Question 10.
In ……………… approach data is hidden under the modules
a) Modular Programming
b) Procedural Programming
c) Object-Oriented Programming
d) All the above
Answer:
a) Modular Programming

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 11.
______ language is based on modular programming.
a) Pascal
b) C
c) Both A and B
d) C++
Answer:
c) Both A and B

Question 12.
………………. paradigm emphasizes the data rather than the algorithm.
a) Modular Programming
b) Procedural Programming
c) Object-Oriented Programming
d) All the above
Answer:
c) Object-Oriented Programming

Question 13.
………………… implements programs using classes and objects.
a) Modular Programming
b) Procedural Programming
c) Object-Oriented Programming
d) All the above
Answer:
c) Object-Oriented Programming

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 14.
A …………….. is a construct in C++ which is used to bind data and its associated function together into a single unit.
a) Class
b) Structure
c) Array
d) None of these
Answer:
a) Class

Question 15.
A Class is a construct in C++ which uses the ……………….. concept.
a) Polymorphism
b) Encapsulation
c) Abstraction
d) Inheritance
Answer:
b) Encapsulation

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 16.
Class is a ……………… data type.
a) User-defined
b) Derived
c) Primitive
d) None of these
Answer:
a) User-defined

Question 17.
…………………. can be defined as a template or blueprint representing a group of objects that share common properties and relationship.
a) Class
b) Structure
c) Array
d) None of these
Answer:
a) Class

Question 18.
……………….. are the basic unit of OOP.
a) Attributes
b) Objects
c) Members
d) None of these
Answer:
b) Objects

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 19.
The class variables are called……………………
a) Instances
b) Objects
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 20.
An identifiable entity with some characteristics and behaviour is called ………………
a) Instances
b) Objects
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 21.
In ……………… method, programs are designed around the data being operated.
a) Modular Programming
b) Procedural Programming
c) Object-Oriented Programming
d) All the above
Answer:
c) Object-Oriented Programming

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 22.
………………… language is based on object-oriented programming.
a) C++, Java
b) VB.Net
c) Python
d) All the above
Answer:
d) All the above

Question 23.
……………… is widely accepted that object-oriented programming is the most important and powerful way of creating software.
a) Modular Programming
b) Procedural Programming
c) Object-Oriented Programming
d) All the above
Answer:
c) Object-Oriented Programming

Question 24.
The Object-Oriented Programming approach mainly encourage ______
a) Modularisation
b) Software re-use
c) Both A and B
d) None of these
Answer:
c) Both A and B

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 25.
…………………….. means the program can be decomposed into modules.
a) Modularisation
b) Software re-use
c) Both A and B
d) None of these
Answer:
a) Modularisation

Question 26.
………………… means, a program can be composed of existing and new modules.
a) Modularisation
b) Software re-use
c) Both A and B
d) None of these
Answer:
b) Software re-use

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 27.
The main feature of Object-Oriented Programming is ………………….
a) Data Abstraction and Encapsulation
b) Modularity
c) Inheritance and Polymorphism
d) All the above
Answer:
d) All the above

Question 28.
……………………. implements abstraction.
a) Polymorphism
b) Encapsulation
c) Abstraction
d) Inheritance
Answer:
b) Encapsulation

Question 29.
……………….. can be called data binding.
a) Polymorphism
b) Encapsulation
c) Abstraction
d) Inheritance
Answer:
b) Encapsulation

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 30.
……………………… is the most striking feature of a class,
a) Polymorphism
b) Encapsulation
c) Abstraction
d) Inheritance
Answer:
b) Encapsulation

Question 31.
The encapsulation of data from direct access by the program is called …………………….
a) Data hiding
b) Information hiding
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 32.
…………………… refers to showing only the essential features without revealing background details,
a) Polymorphism
b) Encapsulation
c) Abstraction
d) Inheritance
Answer:
c) Abstraction

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 33.
The attributes are called ……………………..
a) Data members
b) Methods
c) Member functions
d) Either B or C
Answer:
a) Data members

Question 34.
…………………….. hold information.
a) Data members
b) Methods
c) Member functions
d) Either B or C
Answer:
a) Data members

Question 35.
The functions that operate on data numbers are called …………………..
a) Data members
b) Methods
c) Member functions
d) Either B or C
Answer:
d) Either B or C

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 36.
………………. is designing a system that is divided into a set of functional units.
a) Polymorphism
b) Modularity
c) Abstraction
d) Inheritance
Answer:
b) Modularity

Question 37.
……………………. is the technique of building new classes from an existing class,
a) Polymorphism
b) Modularity
c) Abstraction
d) Inheritance
Answer:
d) Inheritance

Question 38.
In inheritance, the existing class is called as …………………….. class.
a) Base
b) Derived
c) Abstract
d) None of these
Answer:
a) Base

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 39.
In inheritance, the newly created class is called as ………………… class.
a) Base
b) Derived
c) Abstract
d) None of these
Answer:
b) Derived

Question 40.
……………… is the ability of a message or function to be displayed in more than one form.
a) Polymorphism
b) Modularity
c) Abstraction
d) Inheritance
Answer:
a) Polymorphism

Question 41.
……………. means, write once and use it multiple times.
a) Re-usability
b) Redundancy
c) Security
d) None of these
Answer:
a) Re-usability

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 42.
If we need the same functionality in multiple class you will write a common class for the same functionality and inherit that class to subclass is called ……………………
a) Re-usability
b) Redundancy
c) Security
d) None of these
Answer:
b) Redundancy

Question 43.
………………. is a good feature for data redundancy.
a) Polymorphism
b) Modularity
c) Abstraction
d) Inheritance
Answer:
d) Inheritance

Question 44.
…………………… programs are much larger than other programs.
a) Modular
b) Procedural
c) Object-Oriented
d) All the above
Answer:
c) Object-Oriented

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Question 45.
………………….. program requires a lot of work to create.
a) Modular
b) Procedural
c) Object-Oriented
d) All the above
Answer:
c) Object-Oriented

Question 46.
……………… programs .are slower than other programs, because of their size.
a) Modular
b) Procedural
c) Object-Oriented
d) All the above
Answer:
c) Object-Oriented

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Very Short Answers 2 Marks

Question 1.
Write a note on an object-oriented program.
Answer:
Object-Oriented Programming (OOP) is the term used to describe a programming approach based on classes and objects. The object-oriented paradigm allows us to organize software as a collection of objects that consist of both data and behaviour.

Question 2.
What is modularity?
Answer:
Modularity is designing a system that is divided into a set of functional units (named modules) that can be composed into a larger application.

Question 3.
Define Data binding.
Answer:
Encapsulation is about binding the data variables and functions together in class. It can also be called data binding.

Samacheer Kalvi 11th Computer Science Guide Chapter 13 Introduction to Object-Oriented Programming Techniques

Short Answers (3 Marks)

Question 1.
Write about objects.
Answer:
Objects: Represents data and its associated function together into a single unit. Objects are the basic unit of OOP. Basically, an object is created from a class. They are instances of class also called class variables. An identifiable entity with some characteristics and behaviour is called an object.

Question 2.
What are Encapsulation and data binding?
Answer:
The mechanism by which the data and functions are bound together into a single unit is known as Encapsulation. Encapsulation is the most striking feature of a class. The data is not accessible to the outside world, and only those functions which are wrapped in the class can access it. These functions provide the interface between the object’s data and the program. This encapsulation of data from direct access by the program is called data hiding or information hiding.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Computer Science Guide Pdf Chapter 12 Arrays and Structures Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 12 Arrays and Structures

11th Computer Science Guide Arrays and Structures Text Book Questions and Answers

Book Evaluation

Part I

Choose The Correct Answer

Question 1.
which of the following is the collection of variables of the same type that are referenced by a common name ?
a) int
b) float
c) Array
d) class
Answer:
c) Array

Question 2.
Array subscripts is always starts with which number ?
a) -1
b) 0
c) 2
d) 3
Answer:
b) 0

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 3.
int age[ ]={6,90,20,18,2}; How many elements are there in this array?
a) 2
b) 5
c) 6
d) 4
Answer:
b) 5

Question 4.
cin>>n[3]; To which element does this statement accepts the value?
a) 2
b) 3
c) 4
d) 5
Answer:
c) 4

Question 5.
By default, the string end with which character?
a) \0
b) \t
c) \n
d) \b
Answer:
a) \0

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Part – II

Very Short Answers

Question 1.
What is Traversal in an Array?
Answer:
Accessing each element of an array at least once to perform any operation is known as “Traversal”. Displaying all the elements in an array is an example of “traversal”.

Question 2.
What is Strings?
Answer:
A string is defined as a sequence of characters where each character may be a letter,’ number or a symbol.
Every string is terminated by a null (\0) character which must be. appended at the end of the string.

Question 3.
What is the syntax to declare two – dimensional array? ‘
Answer:
The declaration of a 2-D array is
datatype array_name[row – size] [col – size];
In the above declaration, data-type refers to any valid C++ data – type, array _ name refers to the name of the 2 – D array, row – size refers to the number of rows and col-size refers to the number of columns in the 2 – D array.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Part – III

Short Answers

Question 1.
Define an Array. What are the types?
Answer:
An array is a collection of variables of the same type that are referenced by a common name.
There are different types of arrays used in C++. They are:

  • One-dimensional arrays
  • Two-dimensional arrays
  • Multi-dimensional arrays

Question 2.
With note an Array of strings.
Answer:
An array of strings is a two – dimensional character array. The size of the first Index (rows) denotes the number of strings and the size of the second index (columns) denotes the maximum length of each string. Usually, an array of strings are declared in such a way to accommodate the null character at the end of each string. For example, the 2-D array has the declaration:
char name [7][10];
In the above declaration,
No. of rows = 7;
No. of columns = 10;
We can store 7 strings each with a maximum length of 10 characters.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 3.
Write a C++ program to accept and print your name?
Answer:
PROGRAM
#include<iostream>
using namespace std;
int main( )
{
char str[100];
cout<< “Enter your name :”;
cin.get(str,100);
cout<< “You name is : ” << str <<endl;
return 0;
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 1

Part – IV

Explain In Detail

Question 1.
write a c++ program to find the difference between two matrix.
Answer:
PROGRAM
#include<iostream>
#include<conio.h>
using namespace std;
int main( )
{
int row, col, m1[10][10], m2[10][10], sum[10][10];
cout<<“Enter the number of rows : “;
cin>>row;
cout<<“Enter the number of columns :”;
cin>>col;
cout<< “Enter the elements of first matrix: “<<endl;
for (int i = 0;i<row;i++ )
for (int j = 0;j <col;j++ )
cin>>m1[i][j];
cout< < “Enter the elements of second matrix: “<<endl;
for (int i = 0;i<row;i++ )
for (int j = 0;j<col;j++ )
< cin>>m2[i][j];
cout<<“Output: “<<endl;
for (int i = 0;i<row;i++ )
{
for (int j = 0;j<col;j++ )
{
sum[i][j]=m1[i][j] – m2[i][j]); cout<<sum[i][j]<<“”;
}
cout<<endl<<endl;
}
getch( );
return 0;
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 2

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 2.
How will you pass two dimensional array to a function explain with example.
Answer:
Passing 2″D array to a function:
C++ program to display values from two dimensional array.
#include<iostream>
using namespace std;
void display (int n[3][2]);
int main( )
{
int num[3][2] = { {3, 4}, {9, 5>, {7, 1} } ;
display(num);
return 0;
}
void display(int n[3][2])
{
cout << “\n Displaying Values” << endl; for (int i=0; i<3; i++)
{
for (int j=0; j<2; j++)
{
cout << n[i][j] << “”;
}
cout << endl << endl;
}
}
Output
Displaying Values
3 4
9 5
7 1
In the above program, the two-dimensional array num is passed to the function display
( ) to produce the results.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

11th Computer Science Guide Arrays and Structures Additional Questions and Answers

Choose The Correct Answer (1 Mark)

Question 1.
The size of the array is referred to as its ………………..
(a) dimension
(b) direction
(c) location
(d) space
Answer:
(a) dimension

Question 2.
…………… is an easy way of storing multiple values of the same type referenced by a common name.
a) Variables
b) Literals
c) Array
d) None of these
Answer:
c) Array

Question 3.
Displaying all the elements in an array is an example of ………………..
(a) memory allocation
(b) call by reference
(c) traversal
(d) none of these
Answer:
(c) traversal

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 4.
A (n) ………………….. is a collection of variables of the same type that are referenced by a common name.
a) Structures
b) Array
c) Unions
d) None of these
Answer:
b) Array

Question 5.
During ……………….. the array of elements cannot be initialized more than its size.
(a) declaration
(b) initialization
(c) assigning
(d) execution
Answer:
(b) initialization

Question 6.
The …………….. of the array is referred to as its dimension.
a) Elements
b) Size
c) Format
d) None of these
Answer:
b) Size

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 7.
Pass an array to a function in C++, the function needs the array name as ………………..
(a) a function
(b) an argument
(c) global object
(d) string
Answer:
(b) an argument

Question 8.
…………………. is a type of arrays used in C++.
a) One-dimensional array
b) Two-dimensional array
c) Multidimensional array
d) All the above
Answer:
d) All the above

Question 9.
A structure without a name tag is called ………………..
(a) homogenous structure
(b) anonymous structure
(c) array of structure
(d) dynamic memory
Answer:
(b) anonymous structure

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 10.
A one-dimensional array represents values that are stored in a single …………….
a) Row
b) Column
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 11.
Array size should be specified with …………………
a) square brackets[ ]
b) Parenthesis ( )
c) Curly braces{ }
d) Angle brackets < >
Answer:
a) square brackets[ ]

Question 12.
In an array declaration, ……………… defines how many elements the array will hold.
a) array_name
b) array_size
c) data_type
d) None of these
Answer:
b) array_size

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 13.
In an array declaration, …………………. declares the basic type of the array, which is the type of each element in the array.
a) array_name
b) array_size
c) data type
d) None of these
Answer:
c) data type

Question 14.
In an array declaration, ……………….. specifies the name with which the array will be referenced
a) array_name
b) array_size
c) data type
d) None of these
Answer:
a) array_name

Question 15.
The array subscript always starts with ………………
a) 0
b) 1
c) -1
d) None of these
Answer:
a) 0

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 16.
The subscript always is a(n) ………………value.
a) Integer
b) Unsigned integer
c) Signed integer
d) float
Answer:
b) Unsigned integer

Question 17.
In Turbo C++, int data type requires …………….. bytes of memory.
a) 4
b) 8
c) 2
d) 1
Answer:
c) 2

Question 18.
In Dev C++, int data type requires ………………. bytes of memory,
a) 4
b) 8
c) 2
d) 1
Answer:
a) 4

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 19.
The memory space allocated for an array can be calculated using the -formula.
a) Number of bytes allocated for the type of array + Number of elements
b) Number of bytes allocated for the type of array x Number of elements
c) Number of bytes allocated for the type of array – Number of elements
d) None of these
Answer:
b) Number of bytes allocated for the type of array x Number of elements

Question 20.
An array can be initialized at the time of its ………………
a) Declaration
b) Process
c) Either A or B
d) None of these
Answer:
a) Declaration

Question 21.
Unless an array is initialized, all the array elements contain ……………..values.
a) Null
b) Default
c) Garbage
d) None of these
Answer:
c) Garbage

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 22.
While declaring and Initializing values In an array, the values should be given within the ……………..
a) square brackets[ ]
b) Parenthesis ()
c) Curly braces{ }
d) Angle brackets < >
Answer:
c) Curly braces{ }

Question 23.
The …………….. of an array may be optional when the array is initialized during declaration.
a) Data type
b) Size
c) Name
d) None of these
Answer:
b) Size

Question 24.
The subscript in the bracket can be a(n) ……………….
a) Variable
b) Constant
c) Expression that evaluates to an integer
d) Either A or B or C
Answer:
d) Either A or B or C

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 25.
Accessing each element of an array at least once to perform any operation is known as ………………..
a) Traversal
b) Process
c) Reference
d) None of these
Answer:
a) Traversal

Question 26.
…………………. is a process of finding a particular value present in a given set of numbers.
a) Filtering
b) Searching
c) Seeking
d) None of these
Answer:
b) Searching

Question 27.
The ………………. compares each element of the list with the value that has to be searched until all the elements in the array have been traversed and compared.
a) Linear search
b) Sequential search
c) Either A or B
d) None of these
Answer:
c) Either A or B

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 28.
A ……………. is defined as a sequence of characters where each character may be a letter, number, or a symbol.
a) String
b) Character
c) Literal
d) Identifier
Answer:
a) String

Question 29.
In C++, there is no basic data type to represent a …………….
a) String
b) Character
c) Literal
d) float
Answer:
a) String

Question 30.
How much memory required for the following array?
char country[6];
a) 12 bytes
b) 6 bytes
c) 60 Bytes
d) 24 bytes
Answer:
b) 6 bytes

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 31.
…………….. is a way of initializing the character array:
a) char country[6]={T, ‘N’ ‘D’ ‘I’, ‘A’, ‘\0’};
b) char country[ ]=”INDIA”;
c) char country[ ]={T, ‘N’, ‘D’, T, ‘A’ ‘\0’};
d) Either A or B or C
Answer:
d) Either A or B or C

Question 32.
Which is a correct statement from the following?
a) At the end of the string, a null character is automatically added by the compiler.
b) If the size of the array is not explicitly mentioned, the compiler automatically calculates the size of the array based on the number of elements in the list and allocates space accordingly.
c) In the initialization of the string, if all the characters are not initialized, then the rest of the characters will be filled with NULL.
d) All the above
Answer:
d) All the above

Question 33.
In C++,………………. is used to read a line of text including blank spaces.
a) cin.get( )
b) cin
c) put( )
d) None of these
Answer:
a) cin.get( )

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 34.
………………. function can read the characters till it encounters a newline character or a delimiter specified by the user.
a) getline( )
b) put
c) puts( )
d) None of these
Answer:
a) getline( )

Question 35.
…………………. arrays are a collection of similar elements where the elements are stored in a certain number of rows and columns.
a) One dimensional
b) Two dimensional
c) Multidimensional
d) All the above
Answer:
b) Two dimensional

Question 36.
In two dimensional arrays, …………………. size is compulsory.
a) Column
b) Row
c) Both A and B
d) None of these
Answer:
a) Column

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 37.
In two dimensional arrays, …………….. size is optional.
a) Column
b) Row
c) Both A and B
d) None of these
Answer:
b) Row

Question 38.
int A[3][4 j; How many elements are there in the array “A”?
a) 3
b) 4
c) 7
d) 12
Answer:
d) 12

Question 39.
The two-dimensional array uses ………………. index values to access a particular element in it.
a) two
b) one
c) three
d) many
Answer:
a) two

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 40.
In a two dimensional array, the first index specifies the …………….. value.
a) Column
b) Row
c) Both A and B
d) None of these
Answer:
b) Row

Question 41.
In a two dimensional array, the second index specifies the …………… value.
a) Column
b) Row
c) Both A and B
d) None of these
Answer:
a) Column

Question 42.
The two-dimensional array can be viewed as a …………………
a) List
b) Matrix
c) Linear block
d) None of these
Answer:
b) Matrix

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 43.
There are …………… types of 2-D array memory representations.
a) two
b) one
c) three
d) many
Answer:
a) two

Question 44.
……………… is a type of 2-D array memory representation.
a) Row-Major order
b) Column-Major order
c) Either A or B
d) None of these
Answer:
c) Either A or B

Question 45.
In row-major order, all the elements are stored ……………… in contiguous memory locations.
a) Column by Column
b) Row by Row
c) Both A and B
d) None of these
Answer:
b) Row by Row

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 46.
In column-major order, all the elements are stored ………………. in contiguous memory locations.
a) Column by Column
b) Row by Row
c) Both A and B
d) None of these
Answer:
a) Column by Column

Question 47.
An array of strings is a ………………. dimensional character array,
a) Two
b) One
c) Multi
d) None of these
Answer:
a) Two

Question 48.
In a two-dimensional character array, the size of the first index (rows) denotes the ……………….
a) Maximum length of each string
b) Number of strings
c) Maximum characters
d) None of these
Answer:
b) Number of strings

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 49.
In a two-dimensional character array, the size of the second index (rows) denotes the ……………….
a) Maximum length of each string
b) Number of strings
c) Maximum characters
d) None of these
Answer:
a) Maximum length of each string

Question 50.
char Name[6][10]; How many strings can be stored in the above array?
a) 10
b) 60
c) 6
d) 16
Answer:
c) 6

Question 51.
To pass an array to a function in C++, the function needs the ………….. as an argument,
a) Array name
b) Array type
c) Dimension
d) None of these
Answer:
a) Array name

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Very Short Answers (2 Marks)

Question 1.
What is the formula to calculate the memory space allocated for an array?
Answer:
A number of bytes allocated for the type of array x Number of elements.

Question 2.
What are the types of arrays?
Answer:
There are different types of arrays used in C++. They are:

  1. One-dimensional arrays
  2. Two-dimensional arrays
  3. Multi-dimensional arrays

Question 3.
Write about returning structures from functions.
Answer:
A structure can be passed to a function through its object. Therefore, passing a structure to a function or passing a structure object to a function is the same because the structure object represents the structure. Like a normal variable, a structure variable(structure object) can be passed by value or by references/addresses. Similar to built-in data types, structures also can be returned from a function.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 4.
Write the syntax and example for one-dimensional declaration and initialization.
Answer:
Syntax:
[size] = {value-1,value-2,………….,value-n};
Example:
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 3

Question 5.
What is a global object?
Answer:
Objects declared along with structure definition are called global objects.

Question 6.
Write a note on strings.
Answer:
strings:
A string is defined as a sequence of characters where each character may be a letter, number or symbol. Each element occupies one byte of memory. Every string is terminated by a null C\0′ ASCII code 0) character which must be appended at the end of the string.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 7.
Differentiate array and structure.
Answer:
Array:

  • An array is a collection of variables of the same data type.
  • Array data are accessed using index.
  • Array allocates static memory
  • Array element access takes lesser time.

Structure:

  • A structure is a collection of variables of different data type.
  • Structure elements are accessed using operator.
  • Structures allocate dynamic memory.
  • Structure elements take more time.

Short Answers (3 Marks)

Question 1.
Write about the initialization of 2 – D array.
Answer:
The array can be initialized in more than one way at the time of 2-D array declaration.
For example
int matrix[4][3] = {
{10,20,30},// Initializes row 0
{40,50,60},// Initializes row 1
{70,80,90},// Initializes row 2
{100,110,120}// Initializes row 3
};
int matrix[4][3] = {10, 20, 30, 40, 50, 60, 70, 80, 90, 100, 110, 120};
Array’s row size is optional but column size is compulsory.

Question 2.
What is subscript? Give its rules,
Answer:
subscript:
Each element has a unique index number starting from 0 which is known as a subscript.
Rules for subscript:

  • The subscript always starts with 0.
  • It should be an unsigned integer value.
  • Each element of an array is referred to by its name with a subscript index within the square bracket.

For example:
num[3] refers to the 4th element in the array.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 3.
How memory locations are allocated to a one-dimensional array?
Answer:
Memory representation of a one-dimensional array:
The amount of storage required to hold an array is directly related to type and size.
The following figure shows the memory allocation of an array with five elements.
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 4
The above figure clearly shows that the array num is an integer array with 5 elements. Here, there is a total of 5 elements in the array, where for each element, 4 bytes in Dev C++ (or)2 bytes in Turbo C++ will be allocated. Totally 20 bytes will be allocated for this array (In Turbo C++ 10 Bytes).

Question 4.
Tabulate the memory requirement of data type in Turbo C++ and Dev C++.
Answer:

Data type

Turbo C++

Dev C++

char 1 1
int 2 4
float 4 4
long 4 4
double 8 8
long double 10 10

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 5.
Explain character Array (String) creation with syntax and example.
Answer:
To create any kind of array, the size (length) of the array must be known in advance, so that the memory locations can be allocated according to the size of the array. Once an array is created, its length is fixed and cannot be changed during run time, This is shown in the following figure.
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 5
Syntax of array declaration is:
char array_name[size];
In the above declaration, the size of the array must be an unsigned integer value.

For example,
char country[6];
Here, the array reserves 6 bytes of memory, for storing’ a seqi characters. The length of the string cannot be more than 5 characters and one location is reserved for the null character at the end.

Question 6.
What is an array of strings?
Answer:
An array of strings is a two – dimensional character array. The size of the first index (rows) denotes the number of strings and the size of the second index (columns) denotes the maximum length of each string. Usually, an array of strings are declared in such a way to accommodate the null character at the end of each string. For example, the 2 – D array has the declaration: char Name[6][10];
In the above declaration, the 2 – D array has two indices which refer to the row size and column size, that is 6 refers to the number of rows, and 10 refers to the number of columns.

Question 7.
Write note on getline( ) function.
Answer:
In C++, getline( ) is also used to read a line . of text from the input stream. It can read the characters tilt it encounters a newline character or a delimiter specifier’ by the user. This function is available in the header.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 8.
How memory represented for a 2-D array?
Answer:
There are two types of 2-D array memory representations. They are:

  • Row Major order
  • Column Major order

For example:
int A[4][3]={ { 8,6,5}, { 2,1,9}, {3,6,4}, {4,3,2} };
Row Major order:
In row-major order, all the elements are stored row by row in continuous memory locations, that is, ail the elements in first row, then in the second row and soon. The memory representation of row-major order is as shown below.
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 6

Question 9.
How 2-D character array initialized and stored in memory? Explain.
Answer:
2D char array initialization:

For example:
char Name[6][10] = {“Mr. Bean’; “Mr.Bush”
“Nicole”, “Kidman” “Arnold”, “Jodie”};
In the above’ example, the 2-D array is initialized with 6 strings, where the string is a maximum of 9 characters long since the last character is null. The memory arrangement of a 2-D array is shown below and ail the strings are stored in continuous locations.
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 7

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 10.
What is called nested structure? Give example.
Answer:
The structure declared within another structure is called a nested structure. Nested structures act as members of another structure and the members of the child structure can be accessed as parent structure name. Child structure name. Member name, struct dob
{
int date;
char month[3];
int year;
} ;
Values can be assigned to this structure as follows.
dob = {25, “DEC”, 2017}

Question 11.
Write a program to pass an array as an argument to a function.
Answer:
In C++, arrays can be passed to a function as an argument.
To pass an array to a function in C++, the function needs the array name as an argument.
C++ program-to display marks of 5 students (one-dimensional array)
#indude<iostream>
using namespace std;
void display (int m[5]);
int main( )
{
int marks[5]={88, 76, 90, 61, 69};
display(marks);
return 0;
}
void’ display (int m[5])
{
cout << “\n. Display Marks: ” << end!; for (int i=0; i<5; i++)
{
cout <-< “Student” << i+1 << ” << m[i]<<endl;
}
}
Output
Display Marks:
Student 1: 88
Student 2: 76
Student 3: 90
Student 4: 61
Student 5: 69

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 12.
Write a C++ program to pass a 2-D array to a function.
Answer:
C++ program to display values from two dimensional array:
#include<iostream>
using namespace std;
void display (int n[3][2]);
int main( )
{
int num[3][2] = { {3, 4}, (9, 5}, {7,1} };
display(num);
return 0; ‘
}
void display(int n[3][2])
{
cout << “\n Displaying Values” << endl;
for (int i=0; i<3; i++)
{
for (int j=0; j<2; j++)
{
cout << n[i][j] << ”
}
cout << endl << endl;
}
}
Output
Displaying Values
3 4
9 5
7 1

Question 13.
Write a user-defined function to return the structure after accepting value through the keyboard. The structure definition is as follows: struct Item{int item no; float price;};
Answer:
item accept (item i)
{

cout << “\n Enter the Item No:”; cin >> i.no;
cout << “\n Enter the Item Price:”; cin >> i.price;
return i;

}

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Explain in Detail (5 Marks)

Question 1.
How will you search an element in a one-dimensional array? Explain linear search.
Answer:
Searching in a one-dimensional array:
Searching is a process of finding a particular value present in a given set of numbers. The linear search or sequential search compares each element of the list with the value that has to be searched until all the elements in the array have been traversed and compared.

Program for Linear Search
#include<iostream>
using namespace std;
int Search(int arr[ ], int size, int value)
{
for (int i=0; <size; i++)
{
if (arr[i] == value)
return i; // return index value
}
return -1;
}
int main( )
{
int num[10], val, id;
for (int i=0; i< 10; i++) .
{
cout<<“\n Enter value” << i+1 <<“=”;
cin>>num[i];
}
cout<< “\n Enter a value to be searched: “;
cin>>val;
id=Search(num,10,val);
if(id==-1) .
cout<< “\n Given value is not found in the array..”;
else
cout<< “\n The value is found at the position” << id+1;
return 0;
}
The above program reads an array and prompts for the values to be searched. It calls the Search() function which receives array, size and value to be searched as parameters. If the value is found, then it returns the array index to the called statement; otherwise, it returns -1.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 2.
Explain two-dimensional array with syntax and example.
Answer:
Two-dimensional array:
Two-dimensional (2D) arrays are collections of similar elements where the elements are stored in a certain number of rows and columns. An example m x n matrix where m denotes the number of rows and n denotes the number of columns is shown in the following figure, int arr[3][3];
2D array conceptual memory representation
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 8

The array arr can be conceptually viewed in matrix form with 3 rows and columns. point to be noted here is since the subscript starts with 0 arr [0][0] represents the first element.

The syntax for declaration of a 2-D array is:
data-type array_name[row-size][col-size];
In the above declaration, data-type refers to any valid C++ data-type, array_name refers to the name of the 2-D array, row-size refers to the number of rows and col-size refers to the number of columns in the 2-D array.

For example:
int A[3][4];
In the above example, A is a 2-D array, 3 denotes the number of rows and 4 denotes the number of columns. This array can hold a maximum of 12 elements.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Case Study

Question (1)
Write a program to accept the marks of 10 students and find the average, maximum and minimum marks.
Answer:
PROGRAM
#include<iostream>
using namespace std;
int main( )
{
int marks[10], sum=0,max,min;
float avg;
cout<< “\n Enter Mark 1” << “=”;
cin>> marks[0];
max=marks[0];
min=marks[0];
for(int i=1; i< 10; i++)
{
cout<< “\n Enter Mark” << i+1 << “=”;
cin>> marks[i];
sum=sum+marks[i];
if (marks[i]>max)
max = marks[i];
if (marks[i]<min)
min = marks[i];
}
avg=sum/10.0;
cout<< “\n The Total Marks: ” << sum;
cout<< “\n The Average Mark: ” <<avg;
cout<< “\n The Maximum Mark: ” <<max;
cout<< “\n The Minimum Mark: ” <<min;
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 9

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question (2)
Write a program to accept rainfall recorded in four metropolitan cities of India and find the city that has the highest and lowest rainfall.
Answer:
PROGRAM
#include<iostream>
#include<string.h>
using namespace std;
int main( )
{
int rate[10],min,n;
char shop[5][20];
char minshop[20];
cout<<“\nHow many Shops
cin>>n;
for(int i=0;i<n;i++)
{
cout<<“\nEnter Name of the Shop “<<i+1<<” :”;
cin> >shop[i];
cout<<“\nEnter price of Product-X at “<<shop[i]<<” :”;
cin>>rate[i];
}
min=rate[0];
strcpy(minshop,shop[0]);
for(int i=l;i<n;i++)
{
if (rate[i]<min)
{
min = rate[i];
strcpy(minshop,shop[i]);
}
}
cout< < “\n The Lowest cost of the Proudct=X at the” “<<minshop <<“is”<<min;
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 10

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question (3)
Survey your neighboring shops and find the price of any particular product of interest and suggest where to buy the product at the lowest cost.
Answer:
PROGRAM
#include<iostream>
#include<string.h>
using namespace std;
int main( )
{
int rate[10],min,n;
char shop[5][20];
char minshop[20];
cout<<“\nHow many Shops “;
cin>>n;
for(int i=0;i<n;i++)
{
cout<<“\nEnter Name of the Shop “<<i+l<<” :”;
cin>>shop[i];
cout<<“\nEnter price of Product-X at “<<shop[i]<<“:”;
cin> >rate[i];
}
min=rate[0];
strcpy(nninshop,shop[0]);
for(int i=l;i<n;i++)
{
if (rate[i]<min)
{
min = rate[i];
strcpy(minshop,shop[i]);
}
}
cout< < “\n The Lowest cost of the Proudct=X at the ” <<minshop <<“is”<<min;
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 11

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

STRUCTURES

Book Evaluation

Part -I

Choose The Correct Answer

Question 1.
The data elements in the structure are also known as ……………..
a) objects
b) members
c) data
d) records
Answer:
b) members

Question 2.
Structure definition is terminated by ……………..
a) :
b) }
c) ;
d) ::
Answer:
c) ;

Question 3.
What will happen when the structure is declared?
a) it will not allocate any memory
b) it will allocate the memory
c) it will be declared and initialized
d) it will be only declared
Answer:
b) it will allocate the memory

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 4.
What is the out of this program?
#include<iostream>
#include<string.h>
using namespace std;
int main( )
{
struct student
{
int n;
char name[10];
};
students;
s.n = 123;
183
strcpy(s.name, “Balu”);
cout<<s.n;
co
ut<< s.name <<endl;
return 0;
}
a) 123Balu
b) BaluBalu
c) Balul23
d) 123 Balu
Answer:
a) 123Balu

Question 5.
A structure declaration is given below.
struct Time
{
int hours;
int minutes;
int seconds;
}t;
Using the above declaration which of the following refers to seconds.
a) Time.seconds
b) Time::seconds
c) seconds
d) t. seconds
Answer:
d) t. seconds

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 6.
What will be the output of this program?
#include <iostream>
using namespace std;
struct ShoeType
{
string name; double price;
>; , ‘ ‘
int main()
184 {
ShoeType shoe1, shoe2;
shoe1.name = “Adidas”;
shoe1.price = 9.99;
cout<< shoe1.name<< ” #. “<< shoe1.
price<<endl;
shoe2 = shoe1;
shoe2.price = shoe2.price / 9;
cout<< shoe2.name<< ” # “<< shoe2.price;
return 0;

a) Adidas # 9.99 Adidas #1.11 b) Adidas # 9.99 Adidas # 9.11
c) Adidas # 9.99 Adidas # 11.11 d) Adidas #9.11 Adidas # 11.11

Answer:
a) Adidas # 9.99 Adidas #1.11

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 7.
Which of the following is a properly defined structure?
a) struct {int num;}
b) struct sum {int num;}
c) struct sum int sum;
d) struct sum {int num;};
Answer:
d) struct sum {int num;};

Question 8.
A structure declaration is given below.
struct employee
{
int empno;
char ename[10];
} e[5];
Using the above declaration which of the following statement is correct.
a) cout<<e[0].empno<<e[0].ename;
b) cout<<e[0].empno<<ename;
c) cout< <e[0]->empno< <e[0]->ename;
d) cout<<e.empno<<e.ename;
Answer:
a) cout<<e[0].empno<<e[0].ename;

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 9.
Which of the following cannot be a structure member?
a) Another structure
b) Function
c) Array
d) variable of double datatype
Answer:
b) Function

Question 10.
When accessing a structure member, the identifier to the left of the dot operator is the name of
a) structure variable
b) structure tag
c) structure member
d) structure-function
Answer:
a) structure variable

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Part – II

Very Short Answers

Question 1.
Define structure. What is its use?
Answer:
Definition:
The structure is user-defined which has the combination of data items with different data types. This allows to a group of variables of mixed data types together into a single unit.
Use: The structure provides a facility to store different data types as a part of the same logical element in one memory chunk adjacent to each other.

Question 2.
To store 100 integer numbers which of the following is good to use?
Answer:
Array or Structure State the reason.
In any situation when more than one variable is required to represent objects of uniform data types, an array can be used. If the elements are of different data types, then the array cannot support them.
The structure provides a facility to store different data types as a part of the same logical element in one memory chunk adjacent to each other. So, to store 100 integer numbers Array is good.

Question 3.
What is the error in the following structure definition.
Answer:
struct employee {inteno; charename[20]; char dept;}
Employee e1,e2;

Error:
In the above code objects for employee strcture is created at the end of structure definition. So,structure name is not needed. It may written as:
struct employee
{
int eno;
char ename[20];
char dept;
}e1,e2;

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 4.
Write a structure definition for the structure student containing exam no, name and an array for storing five subject marks.
Answer:
Structure definition:
struct student
{
int examno;
char sname[30];
int mark [5];
};

Question 5.
Why for passing a structure to a function call by reference is advisable to us?
Answer:
In call by reference, any change made to the contents of structure variable inside the function are reflected back to the calling function. Otherwise changes in the structure content within the function will not implement in the structure content.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 6.
What is the size of the following highlighted variable in terms of byte if it is compiled in dev C++
Answer:
struct A{ float f[3]; char ch[5];long double d;>;
struct B{ A a; int arr[2][3];}b[3]
struct A {float f[3]; char ch[5]; long double d;>;
Memory requirements (Using Dev C++):

Variable

Memory requirement

float f(3); 12 Bytes
char ch[5];   , 5 Bytes
double d; 8 Bytes

Using Turbo C++ also the same memory is needed. (Only int data type requirement is differ. Here no int members. So, no change in the requirement.)
struct B { A a; int arr[2][3];}b[3];
Memory requirements (Using Dev C++):

Variable

Memory requirement

A a; (Which is a structure variable) 25 Bytes
int arr[2][3]; 24 Bytes
b[3] which is a structure variable of structure B 49 Bytes for each element of b. So, Total requirement of b[3] is 147 Bytes.

Memory requirements (Using Turbo C++):

Variable

Memory requirement

A a; (Which is a structure variable) 25 Bytes
int arr[2][3]; 12 Bytes
b[3] which is a structure variable of structure B 37 Bytes for each element of b. So, Total requirement of b[3] is 111 Bytes.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 7.
Is the following snippet is fully correct. If not identify the error.
Answer:
struct sum1{ int n1,n2;}s1;
struct sum2{int n1,n2}s2;
cin>>s1.n1>>s1.n2;
s2=s1;
No. It is not fully correct. The following errors are there.
Errors:

Statement

Error

struct sum1 {int n1,n2;}sl; No Error
struct sum2 {int n1,n2}s2; Semicolon missing at the end of declaration statement;
cin>>s1.n1>>s1. n2; No Error
s2-s1; Objects of different structures can not be directly copied.

Question 8.
Differentiate array and structure.
Answer:
In any situation when more than one variable is required to represent objects of uniform data¬types, array can be used. If the elements are of different data types, then array cannot support. If more than one variable is used, they can be stored in memory but not in adjacent locations. It increases the time consumption while searching.

The structure provides a facility to store different data types as a part of the same logical element in one memory chunk adjacent to each other.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 9.
What are the different ways to initialize the structure members?
Answer:
Values can be assigned to structure elements similar to assigning values to variables.
Example:
Consider the following structure: struct Student
{
long int rollno;
int age;
float weight;
}
balu ;
We can initialize as given below:
balu.rollno= 702016;
balu. age=18; ‘
balu.weight= 48.5;
Also, values can be assigned directly as similar to assigning values to Arrays.
balu={702016, 18, 48.5};

Question 10.
What is wrong with the following C++ declarations?
Answer:
A. struct point ( double x, y)
B. struct point { double x, double y >;
C. struct point { double x; double y >
D. struct point { double x; double y; };
E. struct point { double x; double y; >

Errors:
A. struct point (double x, y)
Structure definition must be terminated with;. It is missing. Members must be enclosed in { }. So it may be written as
struct point { double x, y };

B. struct point {double x, double y>;
Structure member declaration must be terminated with; It is missing. So, it may corrected as
struct point {double x; double y;>; or struct point {double x, y;>;

C. struct point {double x; double y>
Structure member declaration and definition must be terminated with ; It is missing. So, it may corrected as
struct point {double x; double y;>; or
struct point { double x, y; >;

D. struct point {double x; double y;};,
No error .
E. struct point {double x; double y;>
– Structure definition must be terminated with ; it is missing. So, it may be corrected as
struct point {double x; double y;>;

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Part – III

Short Answers

Question 1.
How will you pass a structure to a function ?
Answer:
A structure variable can be passed to a function in a similar way of passing any argument that is of built-in data type,

  1. If the structure itself is an argument, then it is called “call by value”.
  2. If the reference of the structure is passed as an argument then it is called, “call by reference”.

Call by value
When a structure is passed as argument to a function using call by value method,any change made to the contents of the structure variable inside the function to which it is passed do not affect the structure variable used as an argument.

Call by reference
In this method of passing the structures to functions, the address of a structure variable / object is passed to the function using address of(&) operator. So any change made to the contents of structure variable inside the function are reflected back to the calling function.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 2.
The following code sums up the total of all students name starting with ‘S’ and display it. Fill in the blanks with required statements.
Answer:
struct student {int exam no, lang, eng, phy, che, mat, esc, total; char name[15];>;
int main( )
{
student s[20];
for(int i=0;i<20;i++)
{
…………………. //accept student details
}
for(int i=0;i<20;i++)
{
……………. //check for name starts with’ letter “S”
…………….. // display the detail of the checked name
}
return 0;
}
MODIFIED PROGRAM
using namespace std;
#include<iostream>
struct student
{
int exam_.no,lang,eng,phy,che,mat,esc,total; char name[15];
};
int main( )
{
student s[20];
for(int i=0;i<20;i++)
{
//accept student details
cout<<“\nEnter student name”;
cin>>s[i].name;
cout<<“\nEnter student exam number”;
cin>>s[i].exam_no;
cout<<“\nEnter Languge Mark”;
cin>>s[i].lang;
cout<<“\nEnter Engjish Mark”;
cin>>s[i].eng;
cout<<“\nEnter Physics Mark”;
cin>>s[i].phy;
cout<<“\nEnter Chemistry Mark”;
cin>>s[i].che;
cout<<“\nEnter Maths Mark”;
cin>>s[i].mat;
cout<<“\nEnter Computer Science Mark”;
cin>>s[i].csc;
s[i].total = s[i].lang + s[i].eng + s[i]. phy+s[i].che+s[i].mat+s[i]. csc;
}
cout<<“\nDetails of student name starts with letter S “<<endl;
for(int i=0;i<20;i++)
{
//check for name starts with letter “S” if(s[i].name[0] == ‘S’)
{
// display the detail of the checked name

cout<<“\nName : “<<s[i].
name<<“Total Mark”<<s[i].
total <<endl;
}
}
return 0;
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 12

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 3.
What is called nested structure. Give example
Answer:
The structure declared- within another structure is called a nested structure.
Example:
struct Student
{
int age;
float height, weight;
struct dob
{
int date;
char month[4];
int year;
};
}mahesh;
The nested structures act as members of another structure and the members of the child structure can be accessed as parent structure name. Child structure name. Member name.
Example:
mahesh. dob. date
Here

  • mahesh is a parent structure name.
  • dob is a child structure name
  • date is a member of child structure

Question 4.
Rewrite the following program after removing the syntactical error(s), if any.
Answer:
Underline each correction.
struct movie
{
charm_name[10];
charm-Lang[10];
float ticket cost =50;};
Movie;
void main( )
{
gets(m_name);
cin>>m-lang;
return 0; ,
}
MODIFIED PROGRAM
PROGRAM (USING DEV C++)
#include<iostream>
#include<conio.h>
#include<stdio.h>
struct movie
{
char m_name[10];
char m_lang[10];
float ticket_cost;
} Movie;
int main( )
{
std::cout<<“\nEnter Move! Name ;
gets(Movie.m_name);
std::cout<<:”\nEnter Movie Language ,:
std: :cin>>Movie.m -lang;
std::cout<<“\nEnter Ticket Cost: “;
std::cin>>Movie.ticket_cost;
std::cout<<“\nMovie name is : “<
std::cout< <“\nMovie Language is : “<<Movie.m-lang;
std::cout<<“\nTicket cost is : “<<Movie.ticket_cost;
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 13

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 5.
What ¡s the difference among the following two programs?
a) #include<iostream.h>
struct point
{
double x;
double y;
};
int main()
{
struct point test;
testx = .25; test.y = .75;
cout< <test.x< ctest.y;
return 0;
}
b) #include
struct .
{
double x;
double y;
} Point;
int main(void)
{
Point test={.25,.75>;
return 0;
}
Answer:
The method of structure initialisation is different.

Question 6.
How to access members of a structure? Give f example.
Answer:
Once the two objects of student structure type are declared, their members can be accessed directly. The syntax for that is using a dot (.) between the object name and the member name.
Syntax is :
Object name. Member

For example:
struct Student
{
longrollno;
int age;
float weight;
}balu, frank;
The elements of the structure Student can be accessed as follows: balu.rollno balu.age balu. weight frank, rollno frank.age frank.weight
balu.rollno
balu.age
balu.weight
frank.rollno
frank.age
frank.weight

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 7.
Write the syntax and an example for structure.
Answer:
Structure is declared using the keyword ‘struct’. The syntax of creating a structure is given below.
struct structure_name
{
type member_name1;
type member_name2;
} reference_name;
An optional field reference_name can be used to declare objects of the structure type directly.

Example:
struct Student
{
longrollno;
int age;
float weight;
}balu, frank;

Question 8.
For the following structure, definition writes the user-defined function to accept data through the keyboard.
struct date
{
int dd,mm,yy
};
struct item
{
int item id;
char name[10];
float price;
date date_manif;
}
Answer:
USER DEFINED FUNCTION
item accept( )
{
item obj;
cout<<“\n Enter Item Id “;
cin> > obj. item id;
cout<<“\nEnter Name “;
cin>obj.name;
cout<<“\nEnter Price “;
cin>>obj.price;
cout<<“\nEnter Date: date, month and year
cin>>obj.date_manif.dd >> obj.date_manif. mm >> obj.date_manif.yy;
return(obj);
}

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 9.
What is called an anonymous structure? Give an example.
Answer:
A structure without a name/tag is called anonymous structure, struct
{
long rollno;
int age;
float weight;
} student;
The student can be referred to as a reference name to the above structure and the elements can be accessed like
student, roll no
student.age and
student.weight.

Question 10.
Write a user-defined function to return the structure after accepting value through the keyboard. The structure definition is as follows:
struct Item{int item no;float price;};
Answer:
USER DEFINED FUNCTION
Item accept( )
{
Item obj; ,
cout<<‘AnEnter Item Number and Price “; cin>>obj.item_no>>obj, price.
return(obj);
}

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Part-IV

Explain in Detail

Question 1.
Explain the array of structures with examples.
Answer:
A class may contain many students. So, the definition of structure for one student can also be extended to all the students. If the class has 20 students, then 20 individual structures are required. For this purpose, an array of structures can be used.
An array of structures is declared in the same way as declaring an array with built-in data types like int or char.
The following program reads the details of 20 students and prints the same.
#include<iostream>
using namespace std;
struct Student
{
int age;
float height, weight;
char name[30];
};
void main()
{
Student std[20];
int i;
cout<< ” Enter the details for 20 students”<<endl;
for(i=0;i<20;i++)
{
cout<< ” Enter the details of student”<<i+1<<endl;
cout<< ” Enter the age:”<<endl; cin>>std[i].age;
cout<< “Enter the height:”<<endl; cin>>std[i].height;
cout<< “Enter the weight:”<<endl; cin>>std[i].weight;
}
cout<< “The values entered for Age, height and weight are”<<endl;
for(i=0;i<20;i++)
cout<< “Student “<<i+l<< “\t”< <std[i]. age<< “\t”<<std[i].height<< “\t”<<std[i]. weight;
}
Output
Enter the details of 20 students
Enter the details for student1
Enter the age:
18
Enter the height:
160.5
Enter the weight:
46.5
Enter the details for student2
Enter the age:
18
Enter the height:
164.5
Enter the weight:
61.5
………………………………….
…………………………
The values entered for Age, height and weight are
Student 1 18 160.5 46.5
Student 2 18 164.5 61.5
………………………

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 2.
Explain call by value with respect to structure.
Answer:
A structure variable can be passed to a function in a similar way of passing any argument that is of built-in data type. If the structure itself is an argument, then it is called “call by value”.

Call by value
When a structure is passed as argument to a function using call by value method,any change made to the contents of the structure variable inside the function to which it is passed do not affect the structure variable used as an argument.
Example:
#include<iostream>
using namespace std;
struct Employee
{
char name[50]; ,
int age;
float salary;
};
void printData(Employee); // Function declaration
int main( )
{
Employee p;
cout<< “Enter Full name: “;
cin>>p.name;
cout<< “Enter age: “;
cin>>p.age;
cout<< “Enter salary: “;
cin>>p.salary;
// Function call with structure variable as an argument
printData(p);
return 0;
}
void printData(Employee q)
{
cout<< “\nDisplaying Information.” <<endl;
cout<< “Name: ” << q.name <<endl;
cout<<“Age: ” <<q.age<<endl;
cout<< “Salary:” <<q.salary;
}
Output
Enter Full name: Kumar
Enter age: 55
Enter salary: 34233.4
Displaying Information.
Name: Kumar
Age: 55
Salary: 34233.4
In the above example, a structure named Employee is declared and used. The values that are entered into the structure are name, age and salary of a Employee are displayed using a function named printData( ).

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 3.
How call by reference is used to pass structure to a function .Give an Example
Answer:
Call by reference
In this method of passing the structures to functions ,the address of a structure variable / object is passed to the function using address of(&) operator. So any change made to the contents of structure variable inside the function are reflected back to the calling function
Example:
#include<iostream>
using namespace std;
struct Employee
{
char name[50];
int age;
float salary;
};
void readData(Employee &);
void printData(Employee);
int main()
{
Employee p;
readData(p);
printData(p);
return 0;
}
void readData(Employee &p)
{
cout<< “Enter Full name: “;
cin.get(p.name, 50);
cout<< “Enter age:
cin>>p.age; ,
cout<< “Enter salary:
cin>>p. salary;
}
void printData(Employee p)
{
cout<< “\nDisplaying Information.” <<endl;
cout<< “Name: ” << p.name <<endl;
cout<<“Age:” <<p.age<<endl;
cout<< “Salary:” <<p.salary;
}
Output
Enter Full name: Kumar
Enter age: 55
Enter salary: 34233.4
Displaying Information.
Name: Kumar
Age: 55
Salary: 34233.4
Structures are usually passed by reference method because it saves the memory space and executes faster.

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 4.
Write a C++ program to add two distances using the following structure definition
Answer:
struct Distance
{
int feet;
float inch;
}d1, d2, sum;
PROGRAM
#include<iostream>
using namespace std;
struct Distance
{
int feet;
float inch;
} d1, d2, sum;
int main( )
{
cout<<“\nEnter distance 1: feet and inch : “;
cin>>d1.feet>>d1.inch;
cout<<“\nEnter distance 2: feet and inch :
cin>>d2.feet>>d2.inch;
sum.feet = d1.feet + d2.feet;
sum.inch =(d1.inch + d2.inch) – (int) (d1.inch + d2,inch) / 12 * 12;
sum.feet = sum.feet + (d1.inch + d2.inch)/12;
cout<<“\nDitance 1: Feet = “<<d1.feet<<”
Inch = “<<d1.inch;
cout<<“\nDitance 2: Feet = “<<d2.feet<<”
Inch = “<<d2.inch;
cout<<“\nSum of Distance 1 and 2 : Feet = “<<sum.feet<<” Inch = “<<sum.inch;
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 14

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 5.
Write a C++ Program to Add two Complex Numbers by Passing Structure to a Function for the following structure definition
Answer:
struct complex
{
float real;
float imag;
};
The prototype of the function is complex add Complex Numbers(complex, complex);
PROGRAM
#include<iostream>
using namespace std;
struct complex
{
float real;
float imag;
};
complex add Complex Numbers (complex obj1,complex obj2)
{
complex obj3;
obj3.real = obj1.reai+obj2,real;
obj3.imag = obj1.imag + obj2.imag;
return(obj3);
}
int main( )
{
complex c1,c2,c3;
cout<<“\nEnter First complex number real and imaginary :”;
cin>>c1,real>>c1.imag;
cout<<“\nEnter Second complex number real and imaginary :”;
cin>>c2.real>>c2.imag;
c3 = addComplexNumbers(c1,c2);
cout<<“\nFirst Complex Number is : “< }
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 15

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 6.
WrIte a C++ Program to declare a structure book containing name and author as character array of 20 elements each and price as Integer. Declare an array of book. Accept the name, author, price detail for each book. Define a user defined function to display the book details and calculate the total price. Return total price to the calling function.
Answer:
PROGRAM
using namespace std;
#include<iostream>
#include<iomanip>
#include<istdio.h>
struct book
{
char bname[20],author[20];
int price;
};
int display(book x[5])
{
int total;
for(int i=0;i<5;i++)
{
total = total + x[i].price;
cout<<“\nBook name : “<<x[i].
bname;
cout<<“\nAuthor name : “<<x[i].
author;
cout<<“\nPrice of the book: “<<x[i].
price;
}
return(total);C++C
}
int main( )
{
book. b[5];
for(int i=0;i<5;i++)
{
cout<<“\nEnter Book name “;
cin>>b[i].bname;
cout<<“\nEnter Author name “;
cin>>b[i].author;
cout<<“\nEnter Book Price “;
cin > > b[i]. price;
}
cout<<“\nDetails of Books”<<endl;
cout<<“\nTotal cost of the book is : Rs.”<<display(b);
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 16

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 7.
Write a C++ program to declare and accept an array of professors. Display the details of the department=”COMP.SCI” and the name of the professors start with ‘A’. The structure “college” should contain the following members.
prof-id as integer ,
name and Department as character array
Answer:
PROGRAM
using namespace std;
#include<iostream>
#include<iomanip>
#include<string.h>
struct college .
{
char pname[20],department[20]; int prof-id;
};
void display(college x[5])
{
for(int i=0;i<5;i++)
{
if((strcmp(x[i]. department,”COMP. SCI”)==0) && x[i].pname[0]==’A’)
cout<<x[i].pname«endl;
}
return;
}
int main( )
{
college c[5];
for(int i=0;i <5;i++)
{
cout<<“\nEnter Professor Name “;
cin>>c[i].pname; ,
cout<<“\nEnter Department Name “;
cin> >c[i] .department;
cout< <“\nEnter Professor Id
cin>>c[i].prof-id;
}
cout<<“\nDetails of Comp. Sci. . Dept, Professors whose name starts. with A “<<endl; . display(c);
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 17

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 8.
Write the output of the following C++ program
Answer:
#incluçle<iostream>
#include<stdio>
#include<string>
#include<conio>
using namespace std;
struct books
{
char name[20), author[20];
} a[50];
int main ( )
{
clrscr( );
cout<< “Details of Book No ” << 1 << “\n”;
cout<< “———————\n”;
cout<< ‘Book Name :”<<strcpy(a[0].
name,”Programming “)<<endl;
cout<< “Book Author :”<<strcpy(a[0].
author,”Dromy”)<<endl;
cout<< “\nDetails of Book No ” << 2 <<”\n”;
cout<< ” ——————- \n”;
cout<<- “Book Name :”<<strcpy(a[l].
name,”C++programming” )<<endl;
cout<< “Book Author :”<<strcpy(a[l].
author,”BjarneStroustrup “)< <endl;
cout<<“\n\n”;
cout<< “======================
============================
\n”; ‘
cout<< ” S.No\t| Book Name\t|author\n”;
cout<< “=======================
=============================
for (int i = 0; i < 2; i++)
{
cout<< “\n ” << i + 1 << “\t|” << a[i].name << “\t| ” << a[i],author;
}
cout<< “\n=========-==========
===========================
==”;
return 0;
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 18

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 9.
Write the output of the following C++ program
Answer:
#include<iostream>
#include<string>
using namespace std;
struct student
{
introll_no;
char name[10];
long phone_number;
};
int main() .
{
student p1 = {1,”Brown”,123443};
student p2, p3;
p2.roll_no = 2;
strcpy(p2.name,”Sam”);
p2.phone_number = 1234567822;
p3.roll_no = 3;
strcpy(p3.name,”Addy”);
p3.phone_number = 1234567844;
cout<< “First Student” <<endl;
cout<< “roll no : ” << p1.roll_no <<endl;
cout<< “name : ” << p1.name <<endl;
cout<< “phone no ; ” << p1.phone_number <<endl;
cout<< “Second Student” <<endl;
cout<< “roll no : ” << p2.roll_no <<endl;
cout<< “name : ” << p2.name <<endl;
cout<< “phone no : ” << p2.phone_number <<endl;
cout<< “Third Student” <<endl;
cout<< “roll no : ” << p3.roll_no <<endl;
cout<< “name : ” << p3.name <<endl;
cout<< “phone no : ” << p3.phone_number <<endl;
return0;
}
Output
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 19

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 10.
Debug the error in the following program.
Answer:
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 20
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 21
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 22
MODIFIED PROGRAM
#include<iostream.h>
struct PersonRec
{
char lastName[10];
char firstName[10];
int age;
}
Person Rec PeopleArrayType[ 10];
void LoadArray(PeopleRec peop[10]);
void main( )
{
PersonRec people [10];
for (i = 0; i < 10; i++)
{
cout< < people[i].firstName< < ” <<peopie[i].lastName <<setw(10) <<people[i].age;
}
}
LoadArray(PersonRec peop[10])
{
for (int i = 0; i < 10; i++)
{
cout<< “Enter first name: “;
cin<<peop[i].firstName;
cout<< “Enter last name: “;
cin>>peop[i].lastName;
cout<< “Enter age: “;
cin>> peop[i].age;←
}

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

11th Computer Science Guide Arrays and Structures Additional Questions and Answers

Choose The Correct Answer 1 mark

Question 1.
…………….. is a user-defined which has the combination of data items with different data types.
a) Structure
b) Class
c) Union
d) Array
Answer:
a) Structure

Question 2.
…………………. allows to group of variables of mixed data types together into a single unit.
a) Structure
b) Class
c) Union
d) Array
Answer:
a) Structure

Question 3.
If the elements are of different data types,then ……………… cannot support.
a) Structure
b) Class
c) Union
d) Array
Answer:
d) Array

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 4.
Structure is declared using the keyword …………………
a) Structure
b) struct
c) Stru
d) STRUCT
Answer:
b) struct

Question 5.
Identify the structure name from the following; struct Student balu;
a) balu
b) struct
c) Student
d) None of these
Answer:
c) Student

Question 6.
Identify the structure variable (object) from the following: struct Student balu;
a) balu
b) struct
c) Student
d) None of these
Answer:
a) balu

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 7.
How much of memory is required for the object of the following structure in Dev C++.
struct Student
{
long rollno;
int age;
float weight;
}balu, frank;
a) 12 Bytes
b) 8 Bytes
c) 10 Bytes
d) None of these
Answer:
a) 12 Bytes

Question 8.
How much of memory is required for the object of the following structure in Turbo C++.
struct Student
{
long rollno;
int age;
float weight;
}balu, frank;
a) 12 Bytes
b) 8 Bytes
c) 10 Bytes
d) None of these
Answer:
c) 10 Bytes

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 9.
If the members are pointer types then ……………….. is used to access the structure members.
a) →
b) ←
c) .(dot)
d) None of these
Answer:
a) →

Question 10.
A structure without a …………….. is called an anonymous structure.
a) Name
b) Tag
c) Name/Tag
d) None of these
Answer:
c) Name/Tag

Question 11.
…………………… operator is used to accessing structure member.
a) ::
b) @
c) .(dot)
d) $
Answer:
c) .(dot)

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 12.
The structure declared within another structure is called a …………….. structure.
a) Nested
b) Group
c) Block
d) None of these
Answer:
a) Nested

Question 13.
……………. structures act as members of another structure.
a) Nested
b) Group
c) Block
d) None of these
Answer:
a) Nested

Question 14.
The members of the child structure can be accessed as …………………….
a) Child structure name. Parent structure name. Member name
a) Parent structure name. Child structure name. Member name
a) Parent structure name. Member name. Child structure name
a) Member name. Parent structure name. Child structure name
Answer:
a) Child structure name. Parent structure name. Member name

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 15.
A structure variable can be passed to a function in a similar way of passing any argument that is of ……………………. data type.
a) Derived
b) User-defined
c) Built-in
d) None of these
Answer:
c) Built-in

Question 16.
If the structure itself is an argument to a function, then it is called ………………..
a) Call by value
b) Call by Reference
c) Call by Expression
d) None of these
Answer:
a) Call by value

Question 17.
If the reference of the structure is passed as an argument then it is called ……………….
a) Call by value
b) Call by Reference
c) Call by Expression
d) None of these
Answer:
b) Call by Reference

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 18.
When a structure is passed as an argument to a function using ……………… method, any change made to the contents of the structure variable inside the function to which it is passed do not affect the structure variable used as an argument.
a) Call by value
b) Call by Reference
c) Call by Expression
d) None of these
Answer:
a) Call by value

Question 19.
In ……………….method of passing the structures to functions, any change made to the contents of structure variable inside the function are reflected back to the calling function.
a) Call by value
b) Call by Reference
c) Call by Expression
d) None of these
Answer:
b) Call by Reference

Question 20.
Structures are usually passed by reference method because ……………..
a) It saves the memory space
b) Executes faster
c) Both A and B
d) None of these
Answer:
c) Both A and B

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 21.
Identify the correct statement from the following.
a) A structured object can also be assigned to another structure object only if both the objects are of the same structure type.
b) The structure elements can be initialized either by using separate assignment statements or at the time of declaration by surrounding its values with braces.
c) Array of structure variable can also be created.
d) All the above
Answer:
d) All the above

Very Short Answers (2 Marks)

Question 1.
What is the drawback of an array?
Answer:
In any situation when more than one variable is required to represent objects of uniform data-types, array can be used. If the elements are of different data types, then array cannot support.
If more than one variable is used, they can be stored in memory but not in adjacent locations. It increases the time consumption while searching.

Question 2.
What is the advantage of structure?
Answer:
The structure provides a facility to store different data types as a part of the same logical element in one memory chunk adjacent to each other.

Question 3.
What are global objects?
Answer:
Objects declared along with structure definition are called global objects

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 4.
Write note on the anonymous structure.
Answer:
A structure without a name/tag is called an anonymous structure.

Example:
struct
{
long rollno;
int age;
float weight;
} student;
The student can be referred to as a reference name to the above structure and the elements can be accessed like a student, roll no, student.age and student.weight

Question 5.
Define Nested structure.
Answer:
The structure declared within another structure is called a nested structure.

Question 6.
Give an example of nested structure.
Answer:
struct Student
{
int age;
float height, weight;
struct dob
{
int date;
char month[4];
int year;
};
}mahesh;

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 7.
How to access nested member structure?
Answer:
The nested structures act as members of another structure and the members of the child structure can be accessed as
parent structure name. Child structure name. Member name
Example:
mahesh. dob. date

Short Answers 3 Marks

Question 1.
Write the syntax of defining a structure? Give an example.
Answer:
Structure is declared using the keyword ‘struct’. The syntax of creating a structure is given below.
struct structure_name
{
type member-name1;
type member_name2;
} reference_name;
An optional field reference_name can be used to declare objects of the structure type directly.
Example:
struct Student
{
long rollno;
int age;
float weight;
};

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Question 2.
How memory is allocated for a structure?
Answer:
Consider the following structure :
struct Student
{
long rollno;
int age;
float weight;
};
In the above declaration of the struct, three variables rollno, age and weight are used. These variables (data element) within the structure are called members (or fields). In order to use the Student structure, a variable of type Student is declared and the memory allocation is shown in the following figure.
Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures 23

Question 3.
How will you refer structure elements?
Answer:
Referencing Structure Elements
Once the two objects of student structure type are declared, their members can be accessed directly.
The syntax for that is using a dot (.) between the object name and the member name. For example, the elements of the structure Student can be accessed as follows:
balu.rollno
frank, rollno
balu.age
frank.age
balu.weight
frank.weight

Samacheer Kalvi 11th Computer Science Guide Chapter 12 Arrays and Structures

Explain In Detail 5 Marks

Question 1.
Explain structure assignments in detail.
Answer:
Structure Assignments
Structures can be assigned directly instead of assigning the values of elements individually.
Example:
If Mahesh and Praveen are same age and same height and weight then the values of Mahesh can be copied to Praveen struct Student
{
int age;
float height, weight;
}mahesh;
The age of Mahesh is 17 and the height and weights are 164.5 and 52.5 respectively.The following statement will perform the assignment.
mahesh = {17, 164.5, 52.5};
praveen = mahesh;
will assign the same age, height and weight to Praveen.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Computer Science Guide Pdf Chapter 2 Number Systems Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 2 Number Systems

11th Computer Science Guide Number Systems Text Book Questions and Answers

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Part – I

I. Choose The Correct Answer:

Question 1.
Which refers to the number of bits processed by a computer’s CPU? .
a) Byte
b) Nibble
c) Word length
d) Bit
Answer:
c) Word length

Question 2.
How many bytes does 1 KiloByte contain?
a) 1000
b) 8
c) 4
d) 1024
Answer:
d) 1024

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 3.
Expansion for ASCII
a) American School Code for Information Interchange
b) American Standard Code for Information Interchange
c) All Standard Code for Information Interchange
d) American Society Code for Information Interchange
Answer:
b) American Standard Code for Information Interchange

Question 4.
2^50 is referred as
a) Kilo
b) Tera
c) Peta
d) Zetta
Answer:
c) Peta

Question 5.
How many characters can be handled in Binary Coded Decimal System?.
a) 64
b) 255
c) 256
d) 128
Answer:
a) 64

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 6.
For 11012 whai is the Hexadecimal equivalent?
a) F
b) E
c) D
d) B
Answer:
c) D

Question 7.
What is the 1’s complement of 00100110?
a) 00100110
b) 11011001
c) 11010001
d) 00101001
Answer:
b) 11011001

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 8.
Which amongst this is not an Octal number?
a) 645
b) 234
c) 876
d) 123
Answer:
c) 876

Part II

Very Short Answers.

Question 1.
What is data?
Answer:
The term data comes from the word datum which means a raw fact. The data is a fact about people, places, or some objects.
Example: Rajesh, 16, XI.

Question 2.
Write the l’s complement procedure.
Answer:
The steps to be followed to find l’s complement of a number:
Step 1: Convert given Decimal number into Binary
Step 2: Check if the binary number contains 8 bits, if less add O at the left most bit, to make it as 8 bits.
Step 3: Invert all bits (i.e. Change 1 as 0 and 0 as 1)

Example: Find 1’s complement for (-24)10
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 1

Question 3.
Convert (46)10 into a Binary number.
Answer:
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 2

Question 4.
We cannot find l’s complement for (28)10 State reason.
Answer:
Since it is a positive number. 1’s complement will come only for negative numbers.

Question 5.
List the encoding systems for characters in memory.
Answer:
There are several encoding systems used for computers. They are

  • BCD – Binary Coded Decimal
  • EBCDIC – Extended Binary Coded Decimal Interchange Code
  • ASCII – American Standard Code for Information Interchange
  • Unicode
  • ISCII – Indian Standard Code for Information Interchange

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Part III

III. Very Short Answers

Question 1.
What is radix of a number system? Give example.
Answer:
Each number system Is uniquely Identified by Its base value or radix. Radix or base Is the count of number of digits In each number system. Radix or base is the general Idea behind positional numbering system. Ex.

Number system Base / Radix
Binary 2
Octal 8
Decimal 10
Hexadecimal 16

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 2.
Write a note on the binary number system.
Answer:
There are only two digits in the Binary system, namely, 0 and 1. The numbers in the binary system are represented to the base 2 and the positional multipliers are the powers of 2.

The leftmost bit in the binary number is called the Most Significant Bit (MSB) and it has the largest positional weight. The rightmost bit is the Least Significant Bit (LSB) and has the smallest positional weight.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 3

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 3.
Convert (150)10 into Binary, then convert that Binary number to Octal.
Answer:
Decimal to Binary conversion 150
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 4

Binary to octal conversion
LSB to MSB divide the number into three-digit binary and write the equivalent octal digit
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 5

Question 4.
Write a short note on ISCII.
Answer:
ISCII – Indian Standard Code for Information Interchange (ISCII) is the system of handling the character of Indian local languages. This is an 8 – bit coding system. Therefore it can handle 256 (28) characters. It is recognized by the Bureau of Indian Standards (BIS). It is integrated with Unicode.

This system is formulated by the Department of Electronics in India in the year 1986-88 and recognized by the Bureau of Indian Standards (BIS). Now, this coding system is integrated with Unicode.

Question 5.
Add : a) -2210 + 1510 b) 2010 + 2510.
Answer:
a) -2210 + 1510
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 6
Answer in 2’s complement form . 11111001 is 2’s complement of 7 which is the answer.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Part IV

IV. Detail Answers.

Question 1.
a) Write the procedure to convert fractional Decimal to Binary.
Answer:
Conversion of fractional Decimal to Binary
The method of repeated multiplication by 2 has to be used to convert such kinds of decimal fractions.

The steps involved in the method of repeated multiplication by 2:

Step 1. : Multiply the decimal fraction by 2 and note the integer part. The integer part is either 0 or 1.
Step 2: Discard the integer part of the previous product. Multiply the fractional part of the previous product by 2. Repeat Step 1 until the same fraction repeats or terminates (0).
Step 3: The resulting integer part forms a sequence of 0’s and 1’s that becomes the binary equivalent of a decimal fraction.
Step 4: The final answer is to be written from the first integer part obtained till the last integer part obtained.
Integer part (last integer part obtained)
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 7
Write the integer parts from top to bottom to obtain the equivalent fractional binary number.
Hence
(0.2)10 = (0.00110011.,.)2 = (0.00110011)2.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

b) Convert (98.46)10 to Binary.
Convert (98.46)10 to Binary
Procedure: Conversion of an integral part:
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 8
(98)10 = (1100010)2 Conversion of fractional part:
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 9

Question 2.
Find l’s Complement and 2’s Complement for the following Decimal number.
a) -98
b) -135
Answer:
a) Conversion of (98)10 into binary
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 10

Conversion of (135)10 into binary
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 11

Question 3.
a) Add 11010102 + 101101)2
Answer:
a) Add 11010102 + 1011012
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 12

b) Subtract 11010112 – 1110102.
Subtract 11010112 – 1110102
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 13

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

11th Computer Science Guide Number Systems Additional Questions and Answers

Part I

Choose The Correct Answer.

Question 1.
The simplest method to represent a negative binary number is called ………………..
(a) signed magnitude
(b) sign bit or parity bit
(c) binary
(d) decimal
Answer:
(a) signed magnitude

Question 2.
Computer understand ________________language.
a) High level
b) Assembly
c) Machine
d) All the above
Answer:
c) Machine

Question 3.
Expansion for BCD ………………..
(a) Binary coded decimal
(b) binary complement decimal
(c) binary computer decimal
(d) binary convert decimal
Answer:
(a) Binary coded decimal

Question 4.
__________is the basic unit of data in computer.
a) BIT
b) BYTE
c) NIBBLE
d) WORD
Answer:
a) BIT

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 5.
The ……………….. operator is defined in boolean algebra by the use of the dot (.) operator.
(a) AND
(b) OR
(c) NOT
(d) NAND
Answer:
(a) AND

Question 6.
Binary digit means __________
a) 0
b) 1
c) either 0 or 1
d) None of these
Answer:
c) either 0 or 1

Question 7.
The convert (65)10 into its equivalent octal number ………………..
(a) (101)8
(b) (101)10
(c) (101)12
(d) (101)4
Answer:
(a) (101)8

Question 8.
A collection of 8 bits is called __________
a) BIT
b) BYTE
C) NIBBLE
d) WORD
Answer:
b) BYTE

Question 9.
……………….. is the general idea behind the positional numbering system.
(a) Radix
(b) Computer memory
(c) Binary number
(d) Decimal number
Answer:
(a) Radix

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 10.
__________refers to the number of bits processed by a computer’s CPU.
a) Word length
b) Nibble
c) Word size
d) None of these
Answer:
a) Word length

Question 11.
Bit means ………………..
(a) nibble
(b) byte
(c) word length
(d) binary digit
Answer:
(d) binary digit

Question 12.
__________is a valid word length of a computer.
a) 64
b) 32
c) 16
d) All the above
Answer:
d) All the above

Question 13.
The computer can understand ……………….. languages.
(a) computer
(b) machine
(c) post
(d) pre
Answer:
(b) machine

Question 14.
1 KiloByte equals to __________bytes.
a) 1024
b) 256
c) 1000
d) 128
Answer:
a) 1024

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 15.
How many bytes does 1 zettabyte contain?
(a) 290
(b) 280
(c) 270
(d) 260
Answer:
(c) 270

Question 16.
1024 MegaBytes equals to _________
a) 1 GigaByte
b) 1 TeraByte
c) 1 YottaByte
d) None of these
Answer:
a) 1 GigaByte

Question 18.
1-kilo byte represents ……………….. bytes.
(a) 512
(b) 256
(c) 1024
(d) 64
Answer:
(c) 1024

Question 18.
1Kb equals to _________bytes.
a) 210
b) 220
c) 230
d) 240
Answer:
a) 210

Question 19.
How many megabytes does 1 GB contain?
(a) 220
(b) 210
(c) 230
(d) 240
Answer:
(b) 210

Question 20.
1 GB equals to ________ bytes.
a) 210
b) 220
c) 230
d) 240
Answer:
c) 230

Question 21.
What is the 1’ s complement of 11001?
(a) 11100110
(b) 01010101
(c) 11110000
(d) 100100111
Answer:
(a) 11100110

Question 22.
1 PetaByte(PB) equals to _________bytes.
a) 250
b) 260
c) 270
d) 280
Answer:
a) 250

Question 23.
The hexadecimal equivalent of 15 is ………………..
(a) A
(b) B
(c) E
(d) F
Answer:
(d) F

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 24.
1 ZettaByte (1ZB) equals to _______ bytes.
a) 250
b) 260
c) 270
d) 280
Answer:
c) 270

Question 25.
The radix of a hexadecimal number is ………………..
(a) 2
(b) 8
(c) 16
(d) 10
Answer:
(c) 16

Question 26.
Computer memory is normally represented in terms of ________ bytes.
a) Kilo
b) Mega
c) Kilo or Mega
d) None of these
Answer:
c) Kilo or Mega

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 27.
The most commonly used number system is ………………..
(a) binary
(b) decimal
(c) octal
(d) hexadecimal
Answer:
(b) decimal

Question 28.
The most commonly used coding scheme to represent character set and the number is ________
a) BCD
b) ASCII
c) EBCDIC
d) All the above
Answer:
b) ASCII

Question 29.
What does MSB mean?
(a) Major sign bit
(b) Most sign bit
(c) Minor sign bit
(d) Most significant bit
Answer:
(d) Most significant bit

Question 30.
The ASCII value for blank space is _________
a) 43
b) 42
c) 32
d) 62
Answer:
c) 32

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 31.
The binary equivalent of hexadecimal number B is ………………..
(a) 1011
(b) 1100
(c) 1001
(d) 1010
Answer:
(a) 1011

Question 32.
The most commonly used numbering system in real life is the _________number system.
a) Hexadecimal
b) Octal
c) Binary
d) Decimal
Answer:
d) Decimal

Question 33.
What is the range of ASCII values for lower case alphabets?
(a) 65 to 90
(b) 65 to 122
(c) 97 to 122
(d) 98 to 122
Answer:
(c) 97 to 122

Question 34.
_________is the count of number of digits in each number system.
a) base
b) radix
c) base or radix
d) symbols
Answer:
c) base or radix

Question 35.
What is the ASCII value for blank space?
(a) 8
(b) 2
(c) 18
(d) 32
Answer:
(d) 32

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 36.
Identify the true statement from the following.
a) In the positional number system, each decimal digit is weighted relative to its position in the number.
b) A numbering system is a way of representing numbers.
c) The speed of a computer depends on the number of bits it can process at once.
d) All the above
Answer:
d) All the above

Question 37.
Which one of the following bits has the smallest positional weight?
(a) MSB
(b) LSB
(c) UPS
(d) USB
Answer:
(b) LSB

Question 38.
The rightmost bit in the binary number is called as the __________
a) MSB
b) LSB
c) FSB
d) None of these
Answer:
b) LSB

Question 39.
Name the person who proposed the basic principles of Boolean Algebra?
(a) Wiliam Boole
(b) George Boole
(c) James Boole
(d) Boolean George
Answer:
(b) George Boole

Question 40.
_______ numbers are used as a shorthand form of a binary sequence.
a) Hexadecimal
b) Octal
c) Decimal
d) None of these
Answer:
a) Hexadecimal

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 41.
What is the other name for a logical statement?
(a) Truth values
(b) Truth functions
(c) Truth table
(d) Truth variables
Answer:
(b) Truth functions

Question 42.
In hexadecimal number system letter ‘E’ represents _______
a) 12
b) 13
c) 14
d) 15
Answer:
c) 14

Question 43.
The NOT operator is represented by the symbol.
(a) over bar
(b) single apostrophe
(c) a and b
(d) plus
Answer:
(c) a and b

Question 44.
_______is a method to convert decimal number to binary number.
a) Repeated division by 2
b) Sum of powers of 2
c) Repeated addition by 2
d) Either A or B
Answer:
d) Either A or B

Question 45.
The output for the AND operator is ………………..
(a) A + B
(b) –
(c) A.B
(d) AB + C
Answer:
(c) A.B

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 46.
Computer can handle _______ numbers.
a) signed
b) unsigned
c) signed and unsigned
d) None of these
Answer:
c) signed and unsigned

Question 47.
Which gate takes only one input?
(a) OR
(b) AND
(c) NOT
(d) XOR
Answer:
(c) NOT

Question 48.
In the signed magnitude method, the leftmost bit is called _______bit.
a) sign
b) parity
c) sign or parity
d) None of these
Answer:
c) sign or parity

Question 49.
Which is not a derived date?
(a) AND
(b) NAND
(c) NOR
(d) XOR
Answer:
(a) AND

Question 50.
The numbers are represented in computers in _______method.
a) Signed magnitude representation
b) 1’s complement
c) 2’s complement
d) All the above
Answer:
d) All the above

Question 51.
The statement “C equal the complement of A or B” means
(a) C = A + B
(b) C = \(\overline{\mathrm{A}}+\overline{\mathrm{B}}\)
(c) C = \(\overline{\mathrm{A}}\) + \(\overline{\mathrm{B}}\)
(d) C = \(\overline{\mathrm{A}\mathrm{B}}\)
Answer:
(a) C = A + B

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 52.
If the number has_______sign, it will be considered as negative in signed magnitude representation.
a) +
b) no
c) –
d) A or B
Answer:
c) –

Question 54.
What is the output of the XOR gate?
(a) C = A% B
(b) C = A \(\otimes\) A
(c) C = A \(\odot\) B
(d) C = A \(\oplus\) B
Answer:
(d) C = A \(\oplus\) B

Question 54.
2’s complement of (0001i000)2 is_______
a) 11100111
b) 00011001
c) 11101000
d) None of these
Answer:
c) 11101000

Question 55.
Find A + \(\overline{\mathrm{A}}\) .B = ………………..
(a) A + B
(b) A.B
(c) \(\overline{\mathrm{A}}\).B
(d) A.\(\overline{\mathrm{B}}\)
Answer:
(d) A.\(\overline{\mathrm{B}}\)

Question 56.
When two binary numbers are added _______will be the output.
a) sum
b) carry
c) sum and carry
d) None of these
Answer:
c) sum and carry

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 57.
When subtracting 1 from 0, borrow 1 from the next _______
a) LSB
b) MSB
c) either A or B
d) None of these
Answer:
b) MSB

Question 58.
Find the wrong pair from the following:
(a) Null element : A + 1 = 1
(b) Involution : \(\overset { = }{ A }\) = A
(c) Demorgan’s : \(\overline{\mathrm{A+B}}\) =\(\overline{\mathrm{A}}\) . \(\overline{\mathrm{A}}\)
(d) Commutative : A + B = B . A
Answer:
(d) Commutative : A + B = B . A

Question 59.
_______ is the character encoding system.
a) BCD and ISCII
b) EBCDIC
c) ASCII and Unicode
d) All the above
Answer:
d) All the above

Question 60.
With 2 inputs in the truth table, how many sets of values will be obtained.
(a) 4
(b) 8
(c) 2
(d) 1
Answer:
(a) 4

Question 61.
EBCDIC stands for _______
a) Extensive Binary Coded Decimal Interchange Code
b) Extended Binary Coded Decimal Interchange Code
c) Extended Binary Coded Digit Interchange Code
d) Extended Bit Coded Decimal Interchange Code.
Answer:
b) Extended Binary Coded Decimal Interchange Code

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 62.
ASCII stands for _______
a) Arithmetic Standard Code for Information Interchange
b) American Structured Code for Information Interchange
c) American Standard Code for Information Interchange
d) American Standard Code for Instant Interchange
Answer:
c) American Standard Code for Information Interchange

Question 63.
ISCII stands for_______
a) International Standard Code for Information Interchange
b) Indian Structured Code for Information Interchange
c) India’s Standard Code for Information Interchange
d) Indian Standard Code for Information Interchange
Answer:
d) Indian Standard Code for Information Interchange

Question 64.
BCD is _______bit code.
a) 6
b) 7
c) 8
d) None of these
Answer:
a) 6

Question 65.
EBCDIC is_______ bit code
a) 6
b) 7
c) 8
d) None of these
Answer:
c) 8

Question 66.
ASCII is________ bit code
a) 6
b) 7
c) 8
d) None of these
Answer:
b) 7

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 67.
Unicode is _______ bit code
a) 16
b) 7
c) 8
d) None of these
Answer:
a) 16

Question 68.
ISCII is_______ bit code
a) 16
b) 7
c) 8
d) None of these
Answer:
c) 8

Question 69.
_______coding system is formulated by IBM.
a) BCD
b) EBCDIC
c) ISCII
d) None of these
Answer:
b) EBCDIC

Question 70.
IBM stands for_______
a) Indian Business Machine
b) International Basic Machine
c) International Business Method
d) International Business Machine
Answer:
d) International Business Machine

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 71.
_______is the system of handling the characters of Indian local languages.
a) ASCII
b) Unicode
c) BCD
d) ISCII
Answer:
d) ISCII

Question 72.
ISCII system is formulated fay the _______ in India.
a) Department of Electronics
b) Department of Electricity
c) Department of E-commerce
d) Department of Economics
Answer:
a) Department of Electronics

Question 73.
SCO system can handle___________characterscharacters.
a) 64
b) 128
c) 256
d) 65536
Answer:
a) 64

Question 74.
EBCDIC system can handle _______ characters.
a) 64
b) 128
c) 256
d) None of these
Answer:
c) 256

Question 75.
ASCII system can handle _______characters.
a) 64
b) 128
c) 256
d) None of these
Answer:
c) 256

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 76.
Unicode system can handle _______ characters.
a) 64
b) 128
c) 256
d) 65536
Answer:
d) 65536

Question 77.
ISCII system can handle _______ characters.
a) 64
b) 128
c) 256
d) 65535
Answer:
c) 256

Question 78.
__________ language characters are not represented by ASCII.
a) Tamil
b) Malayalam
c) Telugu and Kannada
d) All the above
Answer:
d) All the above

Question 79.
Tamil, Malayalam, Telugu, and Kannada language characters are represented by _______ code.
a) ASCII
b) Unicode
c) BCD
d) ISCII
Answer:
b) Unicode

Question 80.
_______scheme is denoted by hexadecimal numbers
a) ASCII
b) Unicode
c) BCD
d) ISCII
Answer:
b) Unicode

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 81.
ISCII code was formulated in the year_______
a) 1986 – 88
b) 1984 – 86
c) 1988
d) 1987
Answer:
a) 1986 – 88

Question 82.
_______coding system is integrated with Unicode.
a) ASCII
b) EBCDIC
c) BCD
d) ISCII
Answer:
d) ISCII

Question 83.
_______was generated to handle all the coding system of Universal languages.
a) ASCII
b) Unicode
c) BCD
d) ISCII
Answer:
b) Unicode

Question 84.
The popular coding scheme after ASCII is_______
a) EBCDIC
b) Unicode
c) BCD
d) ISCII
Answer:
b) Unicode

Question 85.
BCD system is_______bit encoding system.
a) 28
b) 216
c) 26
d) 24
Answer:
c) 26

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 86.
EBCDIC system is _______bit encoding system.
a) 28
b) 216
c) 26
d) 27
Answer:
a) 28

Question 87.
ASCII system is a bit encoding system.
a) 28
b) 216
c) 26
d) 27
Answer:
d) 27

Question 88.
Unicode system is _________bit encoding system.
a) 28
b) 216
c) 26
d) 27
Answer:
b) 216

Question 89.
ISCII svstem is _________bit encoding system.
a) 28
b) 216
c) 26
d) 27
Answer:
a) 28

Question 90.
The input code in ASCII can be converted into _________system.
a) EBCDIC
b) Unicode
c) BCD
d) ISCII
Answer:
a) EBCDIC

Question 91.
What is ASCII value for ‘A’ in a decimal number,
a) 97
b) 65
c) 98
d) 32
Answer:
b) 65

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 92.
What is the ASCII value for ‘A’ in a binary number?
a) 01100001
b) 01000001
c) 01100010
d) 00100000
Answer:
b) 01000001

Question 93.
What is the ASCII value for ‘A’ in an octal number?
a) 141
b) 101
c) 142
d) 40
Answer:
b) 101

Question 94.
What is the ASCII value for ‘A’ in hexadecimal numbers?
a) 61
b) 41
c) 62
d) 20
Answer:
b) 41

Question 95.
Find the false statement in the following.
a) Computers can handle positive and negative numbers.
b) MSB is called a sign bit
c) LSB is called a parity bit
d) All the above
Answer:
c) LSB is called a parity bit

Question 96.
Match the following.
a) 78 – (1) Binary number
b) linn – (2) Octal number
c) CAFE – (3) Decimal number
d) 71 – (4) Hexadecimal number

a) 3, 1, 4, 2
b) 4, 3, 2, 1
c) 1, 3, 2, 4
d) 3, 1, 2, 4
Answer:
a) 78 – (1) Binary number

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 97.
In signed magnitude representation,_________ in the sign bit represents negative number.
a) 0
b) 1
c) No symbol
d) None of these
Answer:
b) 1

Question 98.
In signed magnitude representation, __________in the sign bit represents positive number.
a) 0
b) 1
c) No symbol
d) None of these
Answer:
a) 0

Question 99.
The term data comes from the word __________
a) datum
b) date
c) fact
d) None of these
Answer:
a) datum

Part II

Very Short Answers.

Question 1.
What is nibble?
Answer:
Nibble is a collection of 4 bits. A nibble is half a byte.

Question 2.
Define information.
Answer:
Information is a processed fact and obtained from the computer as output. It conveys meaning.

Question 3.
What is radix?
Answer:
The base value of a number is also known as the radix.

Question 4.
Define Bit and Byte.
Answer:
Bit: A bit is the short form of a Binary digit which can be ‘0’ or ‘1’. It is the basic unit of data in computers.
Byte: A collection of 8 bits is called Byte. It is the basic unit of measuring the memory size in the computer.

Question 5.
Expand: BCD, EBCDIC, ASCII
Answer:
BCD – Binary Coded Decimal; EBCDIC – Extended Binary Coded Decimal Interchange Code; ASCII – American Standard Code for Information Interchange.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 6.
What are the different types of coding schemes to represent the character sets?
Answer:
The different coding schemes are

  • BCD – Binary Coded Decimal
  • EBCDIC – Extended Binary Coded Decimal Interchange Code
  • ASCII – American Standard Code for Information Interchange
  • Unicode
  • ISCII – Indian Standard Code for Information Interchange.

Question 7.
What are the methods of converting a number from decimal to binary?
Answer:

  1. Repeated division by two.
  2. Sum of powers of 2.

Question 8.
What does base or radix mean?
Answer:
Radix or base is the count of a number of digits in each number system. Radix or base is the general idea behind the positional numbering system.

Question 9.
What are the various ways for Binary representation of signed numbers?
Answer:

  1. Signed magnitude representation
  2. 1’s complement
  3. 2’s complement

Question 10.
Write a note on the decimal number system.
Answer:
It consists of 0,1,2,3,4,5,6,7,8,9(10 digits). It is the oldest and most popular number system used in our day-to-day life. In the positional number system, each decimal digit is weighted relative to its position in the number.
Its base or radix is 10.

Question 11.
Write about the octal number system.
Answer:
Octal number system uses digits 0,1,2,3,4,5,6 and 7 (8 digits). Each octal digit has its own positional value or weight as a power of 8. Its base or radix is 8.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 12.
How will you convert decimal to hexadecimal?
Answer:
To convert Decimal to Hexadecimal, “Repeated division by 16” method can be used) In this method, we have to divide the given number by 16.
Example: Convert (31)10 into its equivalent hexadecimal number.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 14

Question 13.
Give the procedure to Octal to Binary.
Answer:
Procedure: For each octal digit in the given number write its 3 digits binary equivalent using positional notation.
Example: Convert (6213)8 to equivalent Binary number.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 15

Question 14.
How will you convert Hexadecimal to Binary?
Answer:
Procedure: Write 4 bits Binary equivalent for each Hexadecimal digit for the given number using the positional notation method.
Example:
Convert (8BC)16 into an equivalent Binary number.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 16

Question 15.
Write short note on Binary Coded Decimal (BCD).
Answer:
This is 26 bit encoding system. This can handle 26 = 64 characters only. This encoding system is not
in the practice right now.

Question 16.
Write note on EBCDIC encoding system.
Answer:
Extended Binary Coded Decimal Interchange Code (EBCDIC) is similar to ASCII Code with 8 bit representation. This coding system is formulated by International Business Machine (IBM). The coding system can handle 256 characters. The input code in ASCII can be converted to EBCDIC system and vice – versa.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 17.
Write a note on the ISCII encoding system.
Answer:
ISCII is the system of handling the character of Indian local languages. This is an 8-bit coding system. Therefore it can handle 256 (28) characters. This system is formulated by the Department of Electronics in India in the year 1986-88 and recognized by the Bureau of Indian Standards (BIS). Now, this coding system is integrated with Unicode.

Part III

III. Very Short Answers

Question 1.
Write about the binary number system.
Answer:
There are only two digits in the Binary system, namely, 0 and 1. The numbers in the binary system are represented to the base 2 and the positional multipliers are the powers of 2.
The leftmost bit in the binary number is called the Most Significant Bit (MSB) and it has the largest positional weight. The rightmost bit is the Least Significant Bit (LSB) and has the smallest positional weight.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 17

Question 2.
What is the octal number system?
Answer:
The octal number system uses digits 0, 1, 2, 3, 4, 5, 6, and 7 (8 digits): Each octal digit has its own positional value or weight as a power of 8.
Example: The Octal sequence (547)8 has the decimal equivalent:

Question 3.
Give the procedure to convert decimal to octal.
Answer:
To convert Decimal to Octal, “Repeated Division by 8” method can be used) In this method, we have to divide the given number by 8.
Example:
Convert (65)10 into its equivalent Octal number.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 18

Question 4.
Give the procedure to convert Octal to Decimal
Answer:
To convert Octal to Decimal, we can use positional notation method)

  • Write down the Octal digits and list the powers of 8 from right to left (Positional Notation).
  • For each positional notation of the digit write the equivalent weight.
  • Multiply each digit with its corresponding weight.
  • Add all the values.

Example:
Convert (1265)8 to equivalent Decimal number.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 19

(1265)8 = 512 x 1 + 64 x 2 + 8 x 6 + 1 x 5
= 512 + 128 + 48 + 5
(1265)8 = (693)10

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 5.
How will you convert Hexadecimal to Decimal?
Answer:
To convert Hexadecimal to Decimal we can use the positional notation method.

  • Write down the Hexadecimal digits and list the powers of 16 from right to left (Positional Notation)
  • For each positional notation written for the digit, now write the equivalent weight.
  • Multiply each digit with its corresponding weight
  • Add all the values to get one final value.

Example:
Convert (25F)16 into its equivalent Decimal number.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 20
(25F)16 = 2 x 256 + 5 x 16 + 15 x 1
= 512 + 80 + 15 (25F)16
= (607)10

Question 6.
Write about binary representation for signed numbers.
Answer:
Computers can handle both positive (unsigned) and negative (signed) numbers. The simplest method to represent negative binary numbers is called Signed Magnitude. In signed magnitude method, the leftmost bit is the Most Significant Bit (MSB), which is called the sign bit or parity bit.
The numbers are represented in computers in different ways:

  • Signed Magnitude representation
  • 1’s Complement
  • 2’s Complement

Question 7.
Explain ASCII code in detail.
Answer:
This is the most popular encoding system recognized by the United States. Most of the computers use this system. Remember this encoding system can handle English characters only. This can handle 27 bit which means 128 characters.

In this system, each character has an individual number. The new edition ASCII -8, has 28 bits and can handle 256 characters are represented from 0 to 255 unique numbers.

The ASCII code equivalent to the uppercase letter ‘A’ is 65. The binary representation of the ASCII (7 bit) value is 1000001. Also 01000001 in ASCII-8 bit.

Question 8.
Explain Unicode in detail.
Answer:
This coding system is used in most modern computers. The popular coding scheme after ASCII is Unicode. ASCII can represent only 256 characters. Therefore English and European Languages alone can be handled by ASCII. Particularly there was a situation when the languages like Tamil, Malayalam, Kannada, and Telugu could not be represented by ASCII.

Hence, Unicode was generated to handle all the coding system of Universal languages. This is a 16-bit code and can handle 65536 characters. The unicode scheme is denoted by hexadecimal numbers.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Part IV

IV. Detail Answers.

Question 1.
Explain decimal to binary conversion using Repeated Division by 2 methods.
Answer:
To convert Decimal to Binary “Repeated Division by 2” method can be used. Any Decimal number divided by 2 will leave a remainder of 0 or 1. Repeated division by 2 will leave a sequence of 0s and Is that become the binary equivalent of the decimal number.

Suppose it is required to convert the decimal number N into binary form, dividing N by 2 in the decimal system, we will obtain a quotient N1 and a remainder Rl, where R1 can have a value of either 0 or 1. The process is repeated until the quotient becomes 0 or 1. When the quotient is ‘0’ or ‘1’, it is the final remainder value. Write the final answer starting from the final remainder value obtained to the first remainder value obtained.

Example:
Convert (65)10 into its equivalent binary number
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 21

Question 2.
Explain decimal to binary conversion using Sum of powers of 2 methods.
Answer:
A decimal number can be converted into a binary number by adding up the powers of 2 and then adding bits as needed to obtain the total value of the number.
a) Find the largest power of 2 that is smaller than or equal to 65.
6510 > 6410

b) Set the 64’s bit to 1 and subtract 64 from the original number
65 – 64 = 1

c) 32 is greater than the remaining total.
Therefore, set the 32’s bit to 0.

d) 16 is greater than the remaining total.
Therefore, set the 16’s bit to 0
.
e) 8 is greater than the remaining total.
Therefore, set the 8’s bit to 0.

f) 4 is greater than the remaining total.
Therefore, set the 4’s bit to 0.

g) 2 is greater than the remaining total.
Therefore, set the 2’s bit to 0.

h) As the remaining value is equivalent to l’s bit, set it to 1.
1 – 1 = 0
Conversion is complete 6510 = (1000001)2

Example:
The conversion steps can be given as follows:
Given Number: 65
Equivalent or value less than the power of 2 is: 64
(1) 65 – 64 = 1
(2) 1 – 1= 0
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 22
6510 = (1000001)2.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 3.
Explain the procedure to convert fractional decimal to Binary.
Answer:
The method of repeated multiplication by 2
has to be used to convert such kind of decimal fractions.
The steps involved in the method of repeated multiplication by 2:

Step 1: Multiply the decimal fraction by 2 and note the integer part. The integer part is either 0 or 1.
Step 2: Discard the integer part of the previous product. Multiply the fractional part of the previous product by 2. Repeat Step 1 until the same fraction repeats or terminates (0).
Step 3: The resulting integer part forms a sequence of Os and Is that becomes the binary equivalent of a decimal fraction.
Step 4: The final answer is to be written from the first integer part obtained till the last integer part obtained.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 23
Write the integer parts from top to bottom to obtain the equivalent fractional binary number. Hence (0.2)10= (0.00110011…)2 = 0.00110011)2

Question 4.
How will you convert Binary to Decimal?
Answer:
To convert Binary to Decimal we can use the positional notation method.
Step 1: Write down the Binary digits and list the powers of 2 from right to left (Positional Notation)
Step 2: For each positional notation written for the digit, now write the equivalent weight.
Step 3; Multiply each digit with its corresponding weight
Step 4: Add all the values.

Example:
Convert (111011)2 into its equivalent decimal number.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 24
32 + 16 + 8 + 0 + 2 + 1 = (59)10
(111011)2 = (59)10

Question 5.
How will you convert Binary to Octal?
Answer:
Step 1.: Group the given binary number into 3 bits from right to left.
Step 2: You can add preceding O to make a group of 3 bits if the leftmost group has less than 3 bits.
Step 3: Convert equivalent octal value using “2’s power positional weight method”

Example
Convert (11010110)2 into an octal equivalent number

Step 1: Group the given number into 3 bits from right to left.
011 010 110
The left-most groups have less than 3 bits, so 0 is added to its left to make a group of 3 bits.

Step-2: Find the Octal equivalent of each group.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 25

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 6.
Give the procedure to convert Binary to Hexadecimal.
Answer:
Step 1: Group the given number into 4 bits from right to left.
Step 2: You can add preceding 0’s to make a group of 4 bits if the leftmost group has less than 4 bits.
Step 3: Convert equivalent Hexadecimal value using “2’s power positional weight method”.

Example
Convert (1111010110)2 into Hexadecimal number
Step 1: Group the given number into 4 bits from right to left. 1
0011 1101 0110
0’s are added to the leftmost group to make it a group of 4 bits.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 26

Question 7.
Give the procedure to convert fractional Binary to Decimal equivalent.
Answer:
The steps to convert fractional Binary number to its decimal equivalent:
Step 1 : Convert an integral part of Binary to Decimal equivalent using positional notation method.
Step 2 : To convert the fractional part of binary to its decimal equivalent.
Step 2,1 : Write down the Binary digits in the fractional part.
Step 2,2 : For all the digits write powers of 2 from left to right starting
from 2-1, 2-2, 2-3 2-n, now write the equivalent weight.
Step 2.3 : Multiply each digit with its corresponding weight.
Step 2.4 : Add all the values which you obtained in Step 2.3.

Step 3 : To get final answer write the integral
part (after conversion), followed by a decimal point(.) and the answer arrived at Step 2.4

Example:
Convert the given Binary number (11.011)2 into its decimal equivalent Integer part (11)2 = 3
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 27

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 8.
Explain the method of representing signed binary numbers in the Signed Magnitude representation.
Answer:
The value of the whole numbers can be determined by the sign used before it. If the number has a ‘+’ sign or no sign it will be considered as positive. If the number has signed it will be considered negative.

Example:
+ 43 or 43 is a positive number
– 43 is a negative number

In signed binary representation, the leftmost bit is considered as a sign bit. If this bit is 0, it is a positive number and if it 1, it is a negative number. Therefore a signed binary number has 8 bits, only 7 bits used for storing values (magnitude), and 1 bit is used for signs.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 28

Question 9.
Explain the method of representing signed binary numbers in l’s complement representation.
Answer:
This is an easier approach to represent signed numbers. This is for negative numbers only i.e. the number whose MSB is 1.

The steps to be followed to find l’s complement of a number:

Step 1: Convert given Decimal number into Binary
Step 2: Check if the binary number contains 8 bits, if less add 0 at the left most bit, to make it as 8 bits.
Step 3: Invert all bits (i.e. Change 1 as 0 and 0 as 1)

Example: Find 1’s complement for (-24)10
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 29

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 10.
Explain the method of representing signed binary numbers in 2’s complement representation.
Answer:
The 2’s-complement method for the negative number is as follows:
a) Invert all the bits in the binary sequence (i.e., change every 0 to 1 and every 1 to 0 ie.,l’s complement)
b) Add 1 to the result to the Least Significant Bit (LSB).
Example: 2’s Complement represent of (-24)10

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 30

Question 11.
Explain binary addition with a suitable example.
Answer:
The following table is useful when adding two binary numbers.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 31
In 1 + 1 = 10, is considered as sum 0 and the 1 as carry bit. This carry bit is added with the previous position of the bit pattern.
Example: Add: 10112 + 10012
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 32

Example: Perform Binary addition for the following:
2310 + 1210
Step 1: Convert 23 and 12 into binary form
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 33

Step 2: Binary addition of 23 and 12:
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 34

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 11.
Explain binary subtraction with a suitable example.
Answer:
The table for Binary Subtraction is as follows:
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 35

When subtracting 1 from 0, borrow 1 from the next Most Significant Bit, when borrowing from the next Most Significant Bit, if it is 1, replace it with 0. If the next Most Significant Bit is 0, you must borrow from a more significant bit that contains 1 and replace it with 0 and 0s upto that point become Is.
Example : Subtract 10010102 — 101002.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 36
Example: Perform Binary addition for the
following:
(-21)10 + (5)10
Step 1: Change -21 and 5 into binary form
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 37 Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 38

Workshop

Question 1.
Identify the number system for the following numbers.
Answer:
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 39

Question 2.
State whether the following numbers are valid or not. If invalid, give a reason.
Answer:
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 40

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 3.
Convert the following Decimal numbers to their equivalent Binary, Octal, Hexadecimal.
i) 1920
ii) 255
iii) 126
Answer:
i) 1920
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 41

ii) 255
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 42

iii) 126
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 43

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 4.
Convert the given Binary number into its equivalent Decimal, Octal, and Hexadecimal numbers.
i)101110101
ii) 1011010
iii) 101011111
Answer:
i) 101110101
Binary to Decimal (Multiply by positional value and then add)
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 44

ii) 1011010
Binary to decimal
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 45 Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 46

iii) 101011111
Binary to decimal
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 47

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 5.
Convert the following Octal numbers into Binary numbers.
a) 472
b) 145
c) 347
d) 6247
e) 645
Answer:
Procedure: Write three digits binary number for every octal digit that will give the equivalent binary number.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 48
Ans.
(472)8 = (100111010)2

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 49
Answer:
(145)8 = (001100101)2

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 50
Answer:
(347)8 = (011100111)2

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 51
Answer:
(6247)8 = (110010100111)2

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 52
Answer:
(645)8 = (110100101)2.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 6.
Convert the following Hexadecimal numbers to Binary numbers
a) A6
b) BE
c) 9BC8
d) BC9
Answer:
Procedure: Write four digits binary number for every Hexadecimal digit that will give the equivalent binary number.
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 53
Answer:
(A6)16 = (10100110)2.

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 54
Answer:
(BE)16 = (1011 1110)2

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 55
Answer:
(9BC8)16 = (1001101111001000)2

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 56
Answer:
(BC9)16 = (101111001001)2

Question 7.
Write the l’s complement number and 2’s complement number for the following decimal numbers:
Perform the following binary computations:
a) -22
b) -13
c) -65
d) -46
Answer:
a) -22
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 57

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 58
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 59

Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems

Question 8.
a) 1010 + 1510
b) – 1210 + 510
c) 1410 – 1210
d) (-2)10 – (-6)10
Answer:
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 60
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 61
Samacheer Kalvi 11th Computer Science Guide Chapter 2 Number Systems 62

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Tamilnadu State Board New Syllabus Samacheer Kalvi 11th Computer Science Guide Pdf Chapter 8 Iteration and Recursion Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 8 Iteration and Recursion

11th Computer Science Guide Iteration and Recursion Text Book Questions and Answers

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Part I

Choose The Correct Answer :

Question 1.
A loop invariant need not be true.
a) at the start of the loop
b) at the start of each iteration
c) at the end of each iteration
d) at the start of the algorithm
Answer:
d) at the start of the algorithm

Question 2.
We wish to cover a chessboard with dominoes, I I 1 the number of black squares andSamacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion 1 the number of white squares covered by dominoes, respectively, placing a domino can be modeled by
a) b ; = b + 2
b) w := w + 2
c) b, w : = b + 1, w + 1
d) b : = w
Answer:
d) b : = w

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Question 3.
If m x a + n x b is an invariant for the assignment a, b : -a + 8, b + 7, the values of m and n are
a) m = 8, n = 7
b) m – 1, n = -8
c) m = 7, n = 8
d) m – 8, n = -7
Answer:
b) m – 1, n = -8

Question 4.
Which of the following is not an invariant of the assignment? m, n ; = m + 2, n + 3.
a) m mod 2
b) n mod 3
c) 3 x m – 2 x n
d) 2 x m – 3 x n
Answer:
d) 2 x m – 3 x n

Question 5.
If Fibonacci number is defined recursively as
Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion 2
to evaluate F(4), how many times F( ) is applied?
a) 3
b) 4
c) 8
d) 9
Answer:
a) 3

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Question 6.
Using this recursive definition
Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion 3
how many multiplications are needed to calculate a10?
a) 11
b) 10
c) 9
d) 8
Answer:
c) 9

Part – II

Short Answers

Question 1.
What is an invariant?
Answer:
An expression involving variables, which remain unchanged by an assignment to one of these variables is called an invariant of the assignment.

Question 2.
Define a loop invariant.
Answer:
Each time the loop body is executed, the variables which remains unchanged by the execution of the loop body is called the loop invariant.

Question 3.
Does testing the loop condition affect the loop invariant? Why?
Answer:
No, the loop condition does not affect the loop invariant. Because the loop invariant is true at four points.

  1. At the start of the loop.
  2. At the start of each iteration.
  3. At the end of each iteration.
  4. At the end of the loop.

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Question 4.
What is the relationship between loop invariant, loop condition, and the input-output recursively?
Answer:

  • Establish the loop invariant at the start of the loop.
  • The loop body should so update the variables as to progress toward the end and maintain the loop invariant, at the same time.
  • When the loop ends, the termination condition and the loop invariant should establish the input-output relation.

Question 5.
What is recursive problem-solving?
Answer:
Recursion is a method of solving problems that involves breaking a problem down into smaller and smaller subproblems until the user gets into a small problem that can be solved trivially. Usually, recursion involves a function calling itself. While it may not seem like much on the surface, recursion allows us to write elegant solutions to problems that may otherwise be very difficult to program.

Question 6.
Define factorial of a natural number recursively.
Answer:
factoriai(n)
— inputs: n
— outputs: f
if n = 0
f = 1
else
f = n x factorial(n -1) → Recursive process
Example:
To calculate 5 factorial factorial(5)
= 5 x factorial(4)
= 5 x 4 x factorial(3)
= 5 x 4 x 3 x factorial(2)
= 5 x 4 x 3 x 2 x factorial (1) =5 x 4 x 3 x 2 x 1 = 120

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Part – III

Explain In Brief

Question 1.
There are 7 tumblers on a table, all standing upside down. You are allowed to turn any 2 tumblers simultaneously in one move. Is it possible to reach a situation when all the tumblers are right side up? (Hint: The parity of the number of upside-down tumblers is invariant).
Solution:
Let u – No. of tumblers right side up
v – No. of tumblers upside down
Initial stage : u = 0, v = 7 (All tumblers upside down)
Final stage output: u = 7, v = 0 (All tumblers right side up)

Possible Iterations:
(i) Turning both up side down tumblers to right side up
u = u + 2, v = v – 2 [u is even]

(ii) Turning both right side up tumblers to upside down.
u = u – 2, v = v + 2 [u is even]

(iii) Turning one right side up tumblers to upside down and other tumblers from upside down to right side up.
u = u + 1 – 1 = u, v = v + 1 – 1 = v [u is even]

Initially u = 0 and continues to be even in all three cases. Therefore u is always even. Invariant: u is even (i. e. No. of right side up tumblers are always even)
But in the final stage (Goal), u = 7 and v = 0 i. e. u is odd.
Therefore it is not possible to reach a situation where all the tumblers are right side up.

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Question 2.
A knockout tournament is a series of games. Two players compete in each game; the loser is knocked out (i.e. does not play anymore), the winner carries on. The winner of the tournament is the player that is left after all other players have been knocked out. Suppose there are 1234 players in a tournament. How many games are played before the tournament winner is decided?
Solution :
Suppose there are 2 players A and B competing in a knockout match, so the number of possible matches is – A Vs B
The answer is Only One.
Suppose there are 3 players A, B and C competing in a knockout match, so the Number of possible matches is – 2.
A Vs B , and A/B( Whoever wins with plays with C) vs C.
Suppose there are 4 players A, B, C & D competing in a knockout match, so the Number of possible matches is – 3.
A Vs B , C Vs D A/B Vs C/D
Thus the General Observations is –
When there are 2 players – 1 Match
When there are 3 players – 2 Matches
When there are 4 players – 3 Matches
When there are n players – ( n – 1) Matches
Hence when there are 1234 players there will be 1233 matches.
The number of games in a single-elimination tournament is always 1 less than the number of players/teams.

Question 3.
King Vikramaditya has two magic swords. With one, he can cut off 19 heads of a dragon, but after that, the dragon grows 13 heads. With the other sword, he can cut off 7 heads, but 22 new heads grow. If all heads are cut off, the dragon dies. If the dragon has originally 1000 heads, can it ever die? (Hint: The number of heads mod 3 is invariant.)
Answer:
No. of heads of dragon = 1000
sword 1: cuts 19 heads but 13 heads grow back.
sword 2: cuts 7 heads but 22 heads grow back.
Let n be the number of heads of the dragon at the initial state.

Case 1: King uses Sword 1
Sword 1 cuts off 19 heads but 13 heads grow back.
n : = n – 19 + 13 = n – 6 No. of heads are reduced by 6.

Case 2: King uses Sword 2
Sword 2 cuts 7 heads but 22 heads grow back.
n : = n – 7 + 22 = n + 15
No. of heads are increased by 15.

Note:
In the above two cases, either 6 heads are removed or 15 heads added. Both 6 and 15 are multiples of 3.
Therefore repeating case 1 and case 2 recursively will either reduce or increase dragon heads in multiples of 3.
That is invariant is n mod 3.
If n mod 3 = 0 then there is a possibility that the dragon dies.
But 1000 is not a multiple of 3 1000 mod 3 = 1 ≠ 0
It is not possible to kill the dragon. The dragon never dies.

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Part IV

Explain In Detail

Question 1.
Assume an 8 x 8 chessboard with the usual coloring. “Recoloring” operation changes the color of all squares of a row or a column. You can recolor repeatedly. The goal is to attain just one black square. Show that you cannot achieve the goal. (Hint: If a row or column has b black squares, it changes by (|8 – b) – b |).
Solution:
Let us start with a normal coloured chessboard, with a number of black squares B=32 and the number of white squares W=32.
So W – B = 0, which is divisible by 4 and W + B = 64.
W-B = 0 mod 4

Whenever we change the colours of a row or column, we change the colour of 8 squares. Let this row (or column) have w white squares + b black squares w + b = 8 squares.

If this operation B increases (or decreases) by 2n, then W decreases (or increases) by 2n so that W + B = 64, but B – W will change by 4n and it will remain divisible by 4.
W – B = 0 mod 4

After every operation, “B – W mod 4” can have no other values.
But the required state has 63 white squares and 1 black square, so it requires
W-B = 63-1 = 62 = 2 mod 4 which is impossible.

Question 2.
Power can also be defined recursively as
Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion 4
Construct a recursive algorithm using this definition. How many multiplications are needed to calculate a10?
Recursive Algorithm
power(a,n)
— inputs: n is an integer, n ≥ 0
— outputs: an
if n = 0 → Base case
1
else
if(n%2 = 0)
a x power(a, an-1) → Recursion step for odd number else
a x power(an/2 x an/2) → → Recursion step for even number

To calculate a10
power(a, 10)
= a x power(a5 x a5)
= a x power(a, a4) x power(a, a4)
= a x a x power(a2 x a2) x power(a, a4)
= a x a x a x power(a, a0) x power(a, a0 ) x
power(a, a4)
= a x a x a x a x a x power(a2 x a2)
= a x a x a x a x a x a x a x power(a, a0) x a x power(a, a0)
=a x a x a x a x a x a x a x a x a x a
There are nine multiplications are needed.

Question 3.
A single-square-covered board is a board of 2n x 2n squares in which one square is covered with a single square tile. Show that it is possible to cover this board with triominoes without overlap.
Solution :
A triamine is an L-shaped tile formed with three adjacent squares.
Corner-covered board and triamine
Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion 5 Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion 6

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Cover the corner-covered board with the L-shaped triominoes without overlap, Triominoes can be rotated as needed.
The size of the problem is n (board of size 2n x 2n). We can solve the problem by recursion. The base case is n = 1. It is a 2 x 2 corner-covered board. We can cover it with one triamine and solve the problem.

In the recursion step, divide the corner-covered board of size 2n x 2n into 4 sub-boards, each of size 2n-1 x 2n-1, by drawing horizontal and vertical lines through the center of the board. Place a triamine at the center of the entire board so as to not cover the corner-covered sub-board, as shown in the left-most board of the given figure below. Now, we have four corner-covered boards, each of size 2n-1 x 2n-1.
Recursive process of covering a corner-covered board of size 2 x 23
Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion 7
Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion 8

We have 4 sub-problems whose size is strictly smaller than the size of the given problem. We can solve each of the sub-problems recursively. tile corner_covered board of size n
if n = 1 — base case
cover the 3 squares with one triominoe
else — recursion step
divide board into 4 sub_boards of size n – 1
place a triominoe at centre of the board
leaving out the corner_covered sub-board
tile each sub-board of size n-1

The resulting recursive process for covering a 23 x 23 corner-covered board is illustrated in the above Figure.

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

11th Computer Science Guide Iteration and Recursion Additional Questions and Answers

Part I

Choose The Correct Answer:

Question 1.
………………… is an algorithm design technique, closely related to induction.
(a) Iteration
(b) Invariant
(c) Loop invariant
(d) Recursion
Answer:
(d) Recursion

Question 2.
Each time the loop body is executed, the variables are _________
a) updated
b) unchanged
c) neither A nor B
d) destroyed
Answer:
a) updated

Question 3.
In a loop, if L is an invariant of the loop body B, then L is known as a …………………
(a) recursion
(b) variant
(c) loop invariant
(d) algorithm
Answer:
(c) loop invariant

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Question 4.
_________ is more powerful than the iteration.
a) Recursion
b) Specification
c) Composition
d) None of these
Answer:
a) Recursion

Question 5.
The unchanged variables of the loop body are…………………
(a) loop invariant
(b) loop variant
(c) condition
(d) loop variable
Answer:
(a) loop invariant

Question 6.
_________ is a recursive solver case.
a) Base case
b) Recursion steps
c) Both A and B
d) None of these
Answer:
c) Both A and B

Question 7.
If L is a loop variant, then it should be true at ………………… important points in the algorithm.
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Question 8.
In_________, the size of moot to a sub-problem must be strictly smaller than the size of the given input.
a) Recursion
b) Specification
c) Composition
d) None of these
Answer:
a) Recursion

Question 9.
In an expression, if the variables have the same value before and after an assignment, then it is of an assignment.
(a) variant
(b) Invariant
(c) iteration
(d) variable
Answer:
(b) Invariant

Question 10.
An expression involving variables, which remains unchanged by an assignment to one of these variables, is called _________ of the assignment.
a) an invariant
b) variant
c) neither A nor B
d) None of these
Answer:
a) an invariant

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Question 11.
When the solver calls a sub solver, then it is called …………………
(a) Iterative call
(b) solver call
(c) recursive call
(d) conditional call
Answer:
(c) recursive call

Question 12.
_________ Is an algorithm design technique
to execute the same action repeatedly.
a) iteration
b) recursion
c) Both iteration and recursion
d) None of these
Answer:
c) Both iteration and recursion

Question 13.
Which of the following is updated when each time the loop body is executed?
(a) data type
(b) subprogram
(c) function
(d) variable
Answer:
(d) variable

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Question 14.
Recursion is an algorithm design technique, closely related to _________
a) induction
b) introduction
c) intuition
d) None of these
Answer:
a) induction

Part II

Short Answers

Question 1.
When the loop variant will be true?
Answer:
The loop invariant is true before the loop body and after the loop body, each time.

Question 2.
How problems are solved using recursion?
Answer:
Using recursion, we solve a problem with a given input, by solving the same problem with a part of the input and constructing a solution to the original problem from the solution to the partial input.

Question 3.
If L is a loop variant, then where it is true in the algorithm?
Answer:
It is true in the following four points of an algorithm.

  1. at the start of the loop.
  2. at the start of each iteration.
  3. at the end of each iteration.
  4. at the end of the loop.

Part – III

Explain In Brief

Question 1.
Write a note on Recursion.
Answer:
Recursion:
Recursion is another algorithm design technique, closely related to iteration, but more powerful. Using recursion, we solve a problem with a given input, by solving the same problem with a part of the input and constructing a solution to the original problem from the solution to the partial input.

Question 2.
Write the recursive algorithm for the length of a sequence.
Answer:
The recursive algorithm for the length of a sequence
can be written as
length (s)
— inputs: s
— outputs : length of s
if s has one customer — base case
1
else
1 + length(tail(s)) — recursion step.

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Part IV

Explain In Detail

Question 1.
Explain loop Invariant in detail.
Answer:
In a loop, if L is an invariant of the loop body B, then L is known as a loop invariant,
while C
— L
B
— L
The loop invariant is true before the loop body and after the loop body, each time. Since L is true at the start of the first iteration, L is true

at the start of the loop also (just before the loop). Since L Is true at the end of the last iteration, L is true when the loop ends also (just after the loop). Thus, if L is a loop variant, then it is true at four important points in the algorithm, as annotated in the algorithm and shown in Figure 3.1.

i) at the start of the loop (just before the loop)
ii) at the start of each iteration (before loop body)
iii) at the end of each iteration (after loop body)
iv) at the end of the loop (just after the loop)

i) — L, start of loop
while
C

ii) — L, start of iteration
B

iii) –L, end of Iteration

iv) — L, end of loop

The points where the loop invariant is true
Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion 9

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Question 2.
Design an iterative algorithm to compute an.
Answer:
Let us name the algorithm power(a, n).
For example,
power(10, 4) = 10000
power (5,3) = 125 .
power (2,5) = 32
Algorithm power(a, n) computes an by multiplying a cumulatively n times.
Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion 10
The specification and the loop invariant are shown as comments.

power (a, n)
— inputs: n is a positive integer
— outputs: p = an
p, i := 1,0
while i ≠ n
— loop invariant: p = ai
p, i: = p x a, i + 1
The step by step execution of power (2, 5) is shown in the following Table
Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion 11

Samacheer Kalvi 11th Computer Science Guide Chapter 8 Iteration and Recursion

Question 3.
Explain the outline of the recursive problem-solving technique.
Answer:
The outline of the recursive problem-solving technique is shown below.

solver (input)
if the input is small enough
construct solution
else
find sub_problems of reduced input
solutions to sub_problems = solver for each sub_problem
construct a solution to the problem from
solutions to the sub_problems

Whenever we solve a problem using recursion, we have to ensure these two cases: In the recursion step, the size of the input to the recursive call is strictly smaller than the size of the given input, and there is at least one base case.