Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 8 Forms and Files Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 8 Forms and Files

12th Computer Applications Guide Forms and Files Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
When you use the $_GET variable to collect data, the data is visible to.
a) none
b) only you
c) everyone
d) selected few
Answer:
c) everyone

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 2.
Which one of the following should not be used while sending passwords or other sensitive information?
a) GET
b) POST
c) REQUEST
d) NEXT
Answer:
a) GET

Question 3.
Which directive determines whether PHP scripts on the server can accept file up¬loads?
a) file_uploads
b) file_upload
c) file_input
d) fiie_intake
Answer:
a) file_uploads

Question 4.
In HTML form cinput type=”text”> is used for
a) One line text
b) Block of text
c) One paragraph
d) None
Answer:
a) One line text

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 5.
HTML classes that are already defined and allow us to apply styles on it are called as
a) Pseudo classes
b) Css classes
c) Javascript classes
d) None
Answer:
b) Css classes

Question 6.
If you would like to read a file character by character which function do you use?
a) fopen ()
b) fread ()
c) fgetc ()
d) file ()
Answer:
c) fgetc ()

Question 7.
PHP is a ……………… typed language.
a) User
b) Loosely
c) Server
d) System
Answer:
b) Loosely

Question 8.
What does fopen() function do in PHP?
a) It used to open files in PHP
b) It used to open Remote Server
c) It used to open folders in PHP
d) It used to open Remote Computer
Answer:
a) It used to open files in PHP

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 9.
How PHP files can be accessed?
a) Through Web Browser
b) Through HTML files
c) Through Web Server
d) All of Above
Answer:
a) Through Web Browser

Question 10.
Which of the following functions reads the entire contents of a file?
a) fgets()
b) file_get_contents()
c) fread()
d) readfile()
Answer:
b) file_get_contents()

Part II

Short answers

Question 1.
Define HTML form controls.
Answer:

  • Text inputs contain textbox and text area controls,
  • Buttons may contain Submit button, Reset but-ton and Cancel Button,
  • Checkbox is the important feature which selects more than one value from the HTML form,
  • Radio box is simiiar to checkbox but one value can be chosen at a time,
  • File select is the best feature to select one file from the local machine to server machine at a time.
  • Form tag is used to mention a method (POST or GET) and control the entire form controls in the HTML document.

Question 2.
Define for Form Handling method in PHP.
Answer:

  • Form tag is used to mention a method (POST or GET) and control the entire form controls in the HTML document.
  • All input values are synchronized and sent to the server via the POST or GET method.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 3.
What is Form Validation In RHP?
Answer:

  • Validation is a process of checking the input data submitted by the user from the client machine.
  • There are two types of validation available in PHP. They are as follows, Client-Side Validation, Server Side Validation.

Question 4.
List out HTML control to support PHP language.
Answer:

  • Text inputs
  • Buttons
  • Checkbox
  • Radio box
  • File Select
  • Form Tag

Question 5.
Write Syntax of Text box in HTML,
Answer:

TypeDescription
<input type=”text”>Defines a one-line text input field

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 6.
Define File handling in PHP.
Answer:
Files: File handling is an important activity of all web application development process.
Files are processed for different tasks using the following events:

  1. PHP Open a File
  2. PHP Read a File
  3. PHP Close a File
  4. PHP Write a File
  5. PHP Appending a File and
  6. PHP uploading a File.

Question 7.
Define Browse button in HTML.
Answer:

  • It is one of the types of button, which is used to upload a single file or multiple files.
  • The <input type=”file”> defines a file-select field and a “Browse” button for file uploads.
  • To define a file-select field that allows multiple files to be selected, add the “multiple” attribute.

Question 8.
Write Syntax of Browse button in HTML.
Answer:
Syntax:
cinput type=”file” name=”myFile”>

Question 9.
Compare Text box and Text area
Answer:

Text boxText Area
They are generally used for collecting information such as names, email ad­dresses, URLs, etc.These are larger versions of the TEXT BOX. They give more room for visi­tors input. TEXTAREAs are generally used to gather feedback or comments.
The <input> tag specifies an input field where the user can enter data.The <textarea> tag defines a multi-line text input control.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 10.
Usage of File open function.
Answer:

  1. fopen( ) is a system function available in PHP.
  2. This function helps to open a file in the server.
  3. It contains two parameters one for the file and the other one specifies in which mode the file should be opened (Read/Write).

Part III

Explain in brief answer

Question 1.
Write the features Form Handling.
Answer:

  • HTML Forms are required, when you want to collect some data from the site visitor.
  • A form will take input from the site visitor and then will post it to a back-end application such as CGI, ASP Script or PHP script etc.
  • The back-end application will perform required processing on the passed data based on defined business logic inside the application.

Question 2.
Write the purpose Get method and Post method.
Answer:
All input values are synchronized and sent to the server via POST method or GET method. Method is an attribute form tag in HTML. Once the data reaches the server, two PHP variables such as $_POST and $_GET collects the data and prepares the response accordingly.

Post Method:
The input data sent to the server with POST method is stored in the request body of the client’s HTTP request.

Get Method:
The input data sent to the server with POST method via URL address is known as query string. All input data are visible by user after they clicks the submit button.

Question 3.
Differentiate Get and Post Method
Answer:

Get Method

Post method

It is designed to get data from serverIt is designed to send data to the server
It is suitable to carry limited dataIt can carry unlimited of data
Faster to send the re­questIt is little slow compare to get method

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 4.
Write short notes on File handling.
Answer:

  • File handling is an important activity of all web application development process.
  • It is needed for any application. For some tasks to be done file needs to be processed.
  • File handling in PHP is similar as file handling is done by using any programming language.

Question 5.
Write short notes on File handling functions.
Answer:

  1. fopen( ) – PHP Open a File
  2. fread( ) – PHP Read a File,
  3. fclose( ) – PHP Close a File,
  4. fwrite( ) – PHP Write a File,
  5. file_put_contents( ) – PHP Appending a File

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Part IV

Explain in detail

Question 1.
Explain Form handling methods.
Answer:
PHP Basic Form Handling

  • When the user keying the input data in HTML controls and clicks the submit button the request will be generated and reaches a PHP file which is mentioned in the FORM tag under the Action attribute.
  • All input values are synchronized and sent to the server via POST method or GET method.
  • Method is an attribute form tag in HTML. Once the data reaches the server, two PHP variables such as $_POST and $_GET collects the data and prepares the response accordingly.

Post Method:

  • The input data sent to the server with POST method is stored in the request body of the client’s HTTP request.

Get Method:

  • The input data sent to the server with POST method via URL address is known as query string.
  • All input data are visible by user after they clicks the submit button.

Question 2.
Discuss in detail about HTML form controls.
Answer:

Value of type attributeDescription
TextCreate a Text Box.
The element used to get all kind of text input such as name, address etc.,
PasswordSimilar as Text box.

But, while entering data, the characters are appearing as coded symbois such as asterisk.

CheckboxCheck box is an element appearing like a small square box. When the user dick on the square a tiny tick mark will appear inside the square.
This element is used to select multiple options.
Radio ButtonRadio button is used to select any one of the multiple options from the list.
This element locks like a small circle, when the user select an item, a tiny dot will appear within the circle.
If the user selects another option, previously selected option will be deselected. This means, user can select any one of the given option form a group.
ResetIt is a special command button used to dear ail the entries made in the form.
SubmitIt is also a special command button used to submit all the entries made in the form to the backend server.
ButtonThis is a standard graphical button on the form used to call functions on click.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 3.
Explain the process File handling.
Answer:

  • File handling is an important part of any web ap¬plication. You often need to open and process a file for different tasks.
  • File handling is needed for any application. For some tasks to be done file needs to be processed.
  • File handling in RHP is similar as file handling is done by using any programming language like C.

Five major operations can he performed on file are:

  • Creation of a new file.
  • Opening an existing file.
  • Reading data from a file.
  • Writing data in a file.
  • Closing a file.

Steps for Processing a Fite

  • Declare a file pointer variable.
  • Open a file using open() function.
  • Process the file using the suitable function.
  • Close the file using fclose() function.

Question 4.
Explain concepts of HTTP Uploading process.
Answer:
File Upload:

  1. File upload is the best feature to select one file from the local machine to server machine. Form tag is used to mention a method as POST or GET and encrypt attribute mentioned as “multipart/form-data”.
  2. In the <Input> tag mention type=”file” attribute shows the input field as a file-select control, with a “Browse” button next to the input control.
  3. The form above sends data to a file called “Student_photo_upload.php”.
  4. First, ensure that PHP is configured to allow file uploads.
  5. In Server machine “php.ini” file, search for the file_uploads directive, and set it to On: “file_upIoads = On”
  6. After submitting the upload button the request reaches to Student_photo_upload.php file. In the file $_FILES variable collects all uploaded file information such as the name of the file, size of the file and extension of the file etc.
  7. All the details are checked thoroughly and the errors are saved in an array variable.
  8. The file finally moves under the image directory if the array error variable is empty.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 5.
Explain in detail of File handling functions.
Answer:

  • PHP Manipulating Files: PHP has several functions for creating, reading, uploading, and editing files.
  • PHP readfile() Function: The readfile() function reads a file and writes it to the output buffer.
  • PHP Open File – fopen(): A better method to open files is with the fopen() function.
    This function gives you more options than the readfile() function.
  • PHP Read File – read(): The fread() function reads from an open file.
  • PHP Close File – close(): The fclose() function is used to close an open file.
  • PHP Create File – fopen(): The fopen() function is also used to create a file.
  • Maybe a little confusing, but in PHP. a file is created using the same function used to open files.
  • PHP Write to File – write(): The fwrite() function is used to write to a file.

12th Computer Applications Guide Forms and Files Additional Important Questions and Answers

Part A

Choose the correct answers:

Question 1.
The main objective of PHP and HTML form controls are …………..
a) To collect data from users.
b) To create data from users.
c) To delete data from users.
d) to manipulate data from users.
Answer:
a) To collect data from users.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 2.
Pick the odd one out.
(a) Submit
(b) Reset
(c) File
(d) Cancel
Answer:
(c) File

Question 3.
Match the following:
(A) Check box – (1) Query String
(B) Email – (2) Client’s Request
(C) POST – (3) Should require @ and .strings
(D) GET – (4) Must be checkable minimum one value
Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files 1
Answer:
(D) GET – (4) Must be checkable minimum one value

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 4.
…………………………. is used to select one value can be chosen at a time.
(a) Checkbox
(b) Radio box
(c) Textbox
(d) File
Answer:
(b) Radio box

Question 5.
…………….. and ……………. are the most important concepts that the PHP web development processes.
a) Forms and files
b) Tables and Links
c) Both a and b
d) None of these
Answer:
a) Forms and files

Question 6.
……………. is a process of checking the input data submitted by the user from the client machine.
a) File
b) Form
c) Validation
d) All of these
Answer:
c) Validation

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 7.
Which tag is used to mention POST or GET method?
(a) Frame
(b) Form
(c) File
(d) Input
Answer:
(b) Form

Question 8.
Which of the following is a back-end application?
a) CGI
b) ASP Script
c) PHP Script
d) All of these
Answer:
d) All of these

Question 9.
……………….. is the best feature to select one file from the local machine to server machine,
a) File upload
b) Files
c) Forms
d) All of these
Answer:
a) File upload

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 10.
………………………. is a process of checking the input data submitted by the user from the client machine.
(a) collection
(b) verification
(c) validation
(d) Report
Answer:
(c) validation

Choose odd man out:

1. a) Submit
b) Cancel
c) File select
d) Reset
Answer:
c) File select

2. a) file_put_contents()
b) fopen ()
c) fread ()
d) fgetc ()
Answer:
d) fgetc ()

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

3. a) Append
b) Frame
c) File select
d) Form Tag
Answer:
a) Append

4. a) File
b) Data
c) Mode
d) Action
Answer:
d) Action

5. a) PHP
b) AJAX
c) JSP
d) ASP
Answer:
b) AJAX

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Very Short Answers

Question 1.
Give the syntax for fopen( ) function?
Answer:
Syntax:
$file_Object= fopen(“FileName”, “ReadAVriteMode”) or die(“Error Message!”);

Question 2.
What is the main objective of PHP and HTML?
Answer:
The main objective of PHP and HTML form controls is to collect data from users.

Question 3.
What is fopen() function?
fopen() is a system function available in PHP.

Question 4.
What is the purpose of fopen() function?
Answer:
fopen function helps to open a file in the server.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 5.
How many parameters are there in fopen() function?
Answer:
There are two parameters in fopen() function.

Question 6.
What is the purpose of fread() function?
Answer:
The fread() function reads from an open file.

Question 7.
How files are uploaded to the server?
Answer:
A PHP script can be used with an HTML form to allow users to upload files to the server.

Question 8.
What is file handling?
Answer:
File handling is used to open and process a file for different tasks.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 9.
What is the purpose of form validation?
Answer:
To protect your form from hackers and spammers!

Question 10.
What is HTML?
Answer:
HTML is the standard markup language for creating web pages and web applications.

Question 11.
Expand HTML.
Answer:
HTML stands Hypertext Markup Language.

Question 12.
What are the methods to be used to upload data?
Answer:
GET and POST methods are used to upload the data most frequently.

Question 13.
What is the purpose of encrypting attribute?
Answer:
This attribute is used to specify, how the browser encodes the data before it sends it to the server.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 14.
Expand AJAX.
Answer:
Asynchronous JavaScript And XML.

Question 15.
IS AJAX, a programming language?
Answer:
AJAX is not a programming language.

Match the following:

1. Text – More than one value
2. Buttons – Only one value
3. Checkbox – Post and Get
4. Radio box – Select file
5. File Select – Submit Reset and Cancel.
6. Form – Textbox and text area
7. URL address – _blank, _se!f, __parent
8. Target window – Query string
9. file_put_contents() – php.ini
10. Server machine – Append
Answer:
1. Textbox and text area
2. Submit, Reset and Cancel.
3. More than one value
4. Only one value
5. Select file
6. Post and Get
7. Query string
8. _blank, _self, _parent
9. Append
10. php.ini

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Syntax

1. fopen():
$file_Object= fopen(“FileName”, “Read/Write-Mode”) or die(“Error Message!”);

2. fread():
fread($file_Object,filesize(“FileName”));

3. fcloseQ:
fclose($file_Object);

4. fwriteQ:
fwrite($myfile, $txt);

Additional programs using forms:

1. Sample’PHP program to open and dosing a file:
i) Text(Notepad) file:
AJAX = Asynchronous JavaScript and XML CSS = Cascading Style Sheets HTML = Hyper Text Markup Language PHP = PHP Hypertext Preprocessor SQL = Structured Query Language SVG = Scalable Vector Graphics XML = Extensible Markup Language

ii) PHP File:
<?php
$myfile = fopen(“webdictionary.txt”, “r”) or dieC’Unable to open file!”); echo fread($myfile,filesize(“webdictionary. txt”)); fclose($myfile);
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

iii) OUTPUT
AJAX = Asynchronous JavaScript and XML CSS = Cascading Style Sheets HTML = Hyper Text Markup Language PHP = PHP Hypertext Preprocessor SQL = Structured Query Language SVG = Scalable Vector Graphics XML = Extensible Markup Language

2. An HTML code to demonstrate Form and Form controls (Login form)
<html>
<head>
<title> Login Form </title>
<body>
<h3 align=center> TamilNadu State Council of Educational Research and Training, Chennai </h3>
<Form Action = “mailto:abcd.xyz@com” method=post >
<p> User Name:
<Input type = text name=”user_name” size = 20 maxlength = 15> </p>
<p> Password:
clnputtype = password name=”pass”size = 20 maxlength = 15> </p>
<Input type = reset value = “Clear”>
<Input type = submit value = “Login”> </Form>
</body>
</html>
Output:
Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files 2

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Part B 

Short Answers

Question 1.
Write a note on client-side validation?
Answer:
Client-Side Validation: The input data validations are performed on the client machine’s web browsers using client-side scripts like Javascript or adding “required” attributes in HTML input tags.

Question 2.
What is the process of Server Side Validation:
Answer:
After the submission of data, validations are performed on the server-side using programming like PHP, ASP, or JSP, etc. available in the server machine.

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Brief Answers

Question 1.
Write the Validation rules for HTML input fields.
Answer:
Validation rules for HTML input field
Name (Text Input) : Should require letters and white-spaces
Email (Text Input) : Should require @ and .strings
Website (Text Input) : Should require a valid URL
Radio: Must be selectable minimum one value
Check Box: Must be checkable minimum one value
Drop-Down Menu: Must be selectable minimum one value

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 2.
Explain briefly about fopen() function.
Answer:
PHP Open a File

  • fopen() is a system function available in PHP.
  • This function helps to open a file in the server.
  • It contains two parameters one for the file and the other one specifies in which mode the file should be opened (Read/Write).

Syntax:
$file_Object= fopen(“FileName” “Read/WriteMode”) or dieC’Error Message!”);
Example:
<?php
$myfile = fopen(“Student.txt”, “r”) or
die(“Unable to open file!”);
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 3.
Explain briefly about fread() function.
Answer:
PHP Read a File:
The fread() function reads from an open file. The file object comes from fopen function.

Syntax:
fread($file_Object,filesize(“FileName”));

Example:
<?php
fread($myfile,filesize(“Student.txt”));
?>

Question 4.
Explain briefly about fclose() function.
Answer:
PHP Close a File:
The fclose() function is used to close an opened file.
The file object comes from fopen function.

Syntax:
fclose($file_Object);

Example:
<?php
$myfile = fopenC’student.txt”, “r”);
// some code to be executed….
fclose($myfile);
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Question 5.
Explain briefly about fwrite() function.
Answer:
PHP write a File:
The fwrite() function is used to write to a file.

Syntax:
fwrite($myfile, $txt);

Example:
<?php
$myfile = fopen(“new_schooL_file.txt”, “w”)
or dieC’Unable to open file!”);
$txt = “School Name\n”;
fwrite($myfile, $txt);
$txt = “Student Name\n”;
fwrite($myfile, $txt);
fclose($myfile);
?>

Question 6.
Write a short note on Appending a File
Answer:
The file_put_contents() function is used to Ap-
pend to a file.

Syntax:
file_put_contents(file,data,mode,context)

Example:
<?php
$txt = “Student id “;
$myfile = file_put_contentsClogs.txt’, $txt.
PHP_EOL , FILE_APPEND | LOCK_EX);
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 8 Forms and Files

Part D

Detailed Answers

Question 1.
Explain the file uploading method in PHP.
Answer:

  • File upload is the best feature to select one file from the local machine to the server machine.
  • The form tag is used to mention a method as POST or GET and encrypt attribute mentioned as “multipart/form-data”.
  • In the <Input> tag mention type=”file” attribute shows the input field as a file-select control, with a “Browse” button next to the input control.
  • The form above sends data to a file.
  • In Server machine “php.ini” file, search for the file_uploads directive, and set it to On: “file_up- loads = On”
  • After submitting the upload button the request reaches the file.
  • In the file $_FILES variable collects all uploaded file information such as the name of the file, size of the file and extension of the file, etc.
  • All the details are checked thoroughly and the errors are saved in an array variable.
  • The file finally moves under the image directory if the array error variable is empty.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 15 E-Commerce Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 15 E-Commerce

12th Computer Applications Guide E-Commerce Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
A company can be called E-Business if
a) it has many branches across the world.
b) it conduct business electronically over the Internet.
c) it sells commodities to a foreign country.
d) it has many employees.
Answer:
b) it conduct business electronically over the Internet.

Question 2.
Which of the following is not a tangible good?
a) Mobile
b) Mobile Apps
c) Medicine
d) Flower bouquet
Answer:
b) Mobile Apps

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
SME stands for
a) Small and medium sized enterprises
b) Simple and medium enterprises
c) Sound messaging enterprises
d) Short messaging enterprises
Answer:
a) Small and medium sized enterprises

Question 4.
The dotcom phenomenon deals with
a) Textile industries
b) Mobile phone companies
c) Internet based companies
d) All the above
Answer:
c) Internet based companies

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
Which of the following is not correctly matched
a) The First Wave of Electronic Commerce: 1985 -1990
b) The Second Wave of Electronic Commerce: 2004 -2009
c) The Third Wave of Electronic Commerce: 2010 – Present
d) Dotcom burst: 2000 – 2002
Answer:
a) The First Wave of Electronic Commerce: 1985 -1990

Question 6.
Assertion (A): The websites of first wave dot.com companies were only in En-glish
Reason (R The dot com companies of first wave are mostly American companies.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 7.
Off-shoring means
a) Work outsourced to a branch of its own company
b) Work outsourced to new employees
c) Work outsourced to a third party locally
d) Work outsourced to a third party outside its own country
Answer:
d) Work outsourced to a third party outside its own country

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 8.
G2G systems are classified into
a) Internal facing and external facing
b) Internet facing and Extranet facing
c) Internal flag and external flag
d) Internet flag and Extranet flag
Answer:
a) Internal facing and external facing

Question 9.
host the e-books on their websites.
a) Bulk-buying sites
b) Community sites
c) Digital publishing sites
d) Licensing sites
Answer:
c) Digital publishing sites

Question 10.
Which of the following is not a characteristics of E-Commerce
a) Products cannot be inspected physically before purchase.
b) Goods are delivered instantly.
c) Resource focus supply side
d) Scope of business is global.
Answer:
d) Scope of business is global.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Part II

Short Answers

Question 1.
Define E-Commerce.
Answer:
E-Commerce can be described as the process of buying or selling products, services, or information via computer networks.

Question 2.
Distinguish between E-Business and E-Commerce
Answer:

E-Commerce

E-business

1. E-commerce in­volves commercial transactions done over the internet.1. E-business is the conduct of business processes on the internet
2. E-commerce is a subset of E-business.2. E-business is a superset of E-business.
3. E-commerce usu­ally requires the use of just a website.3. E-business involves the use of CRM’S, ERP that connect different business processes.
4. E-commerce just involves buying and selling of products and services.4. E-business includes all kind of pre-sale and post-sale efforts.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Differentiate tangible goods and electronic goods with an example of your own.
Answer:

Tangible goods

Electronic goods

A physical item that can be perceived by the sense of touch.Components for controlling the flow of electrical currents for the purpose of informa­tion processing and system control.
Example:  cars,  food items, com­puters,Example: Goods with tran­sistors and diodes.

Question 4.
What are dotcom bubble and dotcom burst?
Answer:
Dotcom Bubble:

  1. The Dotcom Bubble was a historic excessive growth (excessive assumption) of the economy that occurred roughly between 1995 and 2000.
  2. During the dotcom bubble, the value of equity markets grew exponentially with the NASDAQ composite index of US stock market rising from under 1000 points to more than 5000 points.

Dotcom Burst:

  1. The Nasdaq-Composite stock market index fell from 5046.86 to 1114.11. This is infamous, known as the Dotcom Crash or Dotcom Burst.
  2. This began on March 11, 2000, and lasted until October 9, 2002. During the crash, thousands of online shopping companies, like Pets.com failed and shut down.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
Write a short note on out-sourcing.
Answer:
Out-sourcing is generally associated with B2B E-Commerce. If a company’s work is hired by another company, it would be termed as out-sourcing.

Part III

Explain In Brief Answer

Question 1.
Describe how E-Commerce is related to socio-technological changes.
Answer:

  • The growth of E-Commerce is also related to socio-technological changes.
  • The more, the medium becomes deep-rooted, the more, are the users drawn towards it.
  • An increase of users increases the markets.
  • As the markets expand, more business organizations are attracted.
  • The more businesses accumulate it creates competition.
  • The competition leads to innovation.
  • Innovation in turn drives the development of technology.
  • Technology facilitates E-Commerce’s growth.

Question 2.
Write a short note on the third wave of E-Commerce.
Answer:
The Third Wave of Electronic Commerce: 2010 – Present

  1. The third wave is brought on by mobile technologies. It connects users via mobile devices for real-time and on-demand transactions, mobile technologies.
  2. It connects users via mobile devices for real-time and on-demand transactions.
  3. Not only the information is filtered by time, but also the geographic coordinates are used to screen the specific location-tailored information properly.
  4. The term Web 3.0, summarizes the various characteristics of the future Internet which include Artificial Intelligence, Semantic Web, Generic Database, etc.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Explain B2B module in E-Commerce.
Answer:

  • In B2B E-Commerce, commercial, transactions take place between different business organizations, through the Internet.
  • For example, a cycle company may buy tyres from another company for their cycles.
  • When compared to other models, the value per transaction in B2B transactions is high, because of bulk purchases.
  • The company also might get the advantage of discounts on bulk purchases.

Question 4.
Write a note on name-your-price websites.
Answer:
Name-your-price sites are just like normal retail sites. In contrast, the buyer negotiates with the retailer for a particular product or service, https://in.hotels.com/

Question 5.
Write a note on the physical product dispute of E-Commerce.
Answer:

  • Physical product disputes are a major disadvantage in E-Commerce.
  • E-Commerce purchases are often made on trust.
  • This is because; we do not have physical access to the product.
  • Though the Internet is an effective channel for visual and auditory information it does not allow full scope for our senses.
  • We can see pictures of the perfumes, but could not smell their fragrance; we can see pictures of a cloth, but not its quality.
  • If we want to inspect something, we choose what we look at and how we look at it. But in online shopping, we would see only the pictures the seller had chosen for us.
  • People are often much more comfortable in buying generic goods (that they have seen or experienced before and in which there is little ambiguity) rather than unique or complex things via the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Part IV

Explain in Detail

Question 1.
Write about the development and growth of Electronic Commerce.
Answer:
The Development and Growth of Electronic Commerce:
Economists describe four distinct waves (or phases) that occurred in the Industrial Revolution. In each wave, different business strategies were successful. Electronic commerce and the information revolution brought about by the Internet likely go through such a series of waves.

The First Wave of Electronic Commerce: 1995 -2003

  • The Dotcom companies of the first wave are mostly American companies. Thereby their websites were only in English. The Dotcom bubble had attracted huge investments to first wave companies.
  • As the Internet was a mere read-only web (web 1.0) and network technology was in its beginning stage, the bandwidth and network security were very low.
  • Only EDI and unstructured E-mail remained as a mode of information exchange between businesses.
  • But the first wave companies enjoyed the first-move advantage and customers had left with no options.

The Second Wave of Electronic Commerce: 2004 – 2009

  • The second wave is the rebirth of E-Commerce after the dot-com bust. The second wave is considered as the global wave, with sellers doing business in many countries and in many languages.
  • Language translation and currency conversion were focused on the second wave websites.
    The second wave companies used their own internal funds and gradually expanded their E-Commerce opportunities.
  • As a result, E-Commerce grows more steadily, though more slowly. The rapid development of network technologies and interactive web (web 2.0, a period of social media) offered the consumers more choices of buying. The increased web users nourished E-Commerce companies (mostly B2C companies) during the second wave.

The Third Wave of Electronic Commerce: 2010 – Present

  • The third wave is brought on by mobile technologies. It connects users via mobile devices for real-time and on-demand transactions, mobile technologies.
  • It connects users via mobile devices for real-time and on-demand transactions. Not only the information is filtered by time, but also the geographic coordinates are used to screen the specific location-tailored information properly.
  • The term Web 3.0, summarize the various characteristics of the future Internet which include Artificial Intelligence, Semantic Web. Generic Database etc.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 2.
List all the E-Commerce business models and explain any four briefly.
Answer:
The various E-Commerce business models are

  1. Business to Business (B2B)
  2. Business to Consumer (B2C)
  3. Business to Government (B2G)
  4. Consumer to Business (C2B)
  5. Consumer to Consumer (C2C)
  6. Consumer to Government (C2G)
  7. Government to Business (G2B)
  8. Government to Consumer (G2C)
  9. Government to Government (G2G)

1. Business to Business (B2B)

  • In B2B E-Commerce, commercial transactions take place between different business organizations, through the Internet.
  • For example, a cycle company may buy tyres from another company for their cycles.
  • B2B transaction is high, because of bulk purchases.

2. Business to Consumer (B2C)

  • In B2C E-Commerce, commercial transactions take place between business firms and their consumers.
  • It is the direct trade between companies and end-consumers via the Internet.
  • Example: A book company selling books to customers. This mode is intended to benefit the consumer and can say B2C E-Commerce works as a ‘retail store’ over the Internet.

3. Consumer to Consumer (C2C)
C2C in E-Commerce provides an opportunity for trading products or services among consumers who are connected through the Internet.

4. Consumer to Government (C2G)

  • Citizens as Consumers and Government engage in C2G E-Commerce.
  • Here an individual consumer interacts with the Government.
  • C2G models usually include income tax or house tax payments, fees for issuance of certificates or other documents. People paying for renewal of license online may also fall under this category.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Explain any five E-Commerce revenue models.
Answer:

  • Apart from the regular selling of commodities, today there are many other ways by which companies can make money from the Internet.
  • The other forms of E-Commerce activities are:

1. Affiliate site

  • It is a form of third-party marketing in which the site owner gets paid based on the performance.
  • This site may be a price comparison service or shopping directories or review sites or blogs that contain a link to a normal retailing site and are paid when a customer makes a purchase through it.
  • The affiliate site usually attracts visitors by offering more information and tutorials on some specific product or a topic.

2. Auction site:
It is a kind of website, that auctions items on the Internet and levies some commission from the sales, e.g. https://www.ebay.com/

3. Banner advertisement site:
It displays advertisements of other companies in its websites and thereby earns revenue.

4. Bulk-buying sites:
It collects a number of users together all of who want to buy similar items; the site negotiates a discount with the supplier and takes a commission. e.g. https://www.alibaba.com/

5. Digital publishing sites:

  • It effectively hosts e-books or magazines on the web.
  • They make profits in a number of ways such as advertising, selling, etc., https://wordpress. org/

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 4.
How would you differentiate traditional commerce and E-Commerce?
Answer:

Traditional Commerce

E-Commerce

Traditional commerce is buying or selling of products and services physically.E-Commerce carries out commercial transactions electronically on the Internet.
Customers can easily identify, authenticate and talk to the merchant.Neither customer nor merchant sees the other.
Physical stores are not feasible to be open all the time.It is always available at all times and all days of the year.                                                                     ‘
Products can be inspected physically before purchase.Products can’t be inspected physically before pur­chase.
Scope of business is limited to a particular area.The scope of business is global. Vendors can expand their business Worldwide.
The resource focuses Supply side.The resource focuses Demand side.
Business Relationship is Linear.Business Relationship is End-to-end.
Marketing is one-way marketing.One-to-one marketing.
Payment is made by cash, cheque, cards, etc.The payment system is mostly credit card and through fund transfer.
Most goods are delivered instantly.It takes time to transport goods.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
What are the advantages and disadvantages of E-Commerce to a consumer?
Answer:
The pros and cons of E-Commerce affect three major stakeholders: consumers business organisations, and society.
The following are the advantages and disadvantages of E-Commerce for a consumer.

Advantages:
1. E-Commerce system is operated on all days and all the day. It is able to conduct business 24 × 7. Neither consumers nor suppliers need a physical stores to be opened to do business electronically. People can interact with businesses at the time of their convenience.

2. Speed is a major advantage in E-Commerce. Advanced Electronic communications systems allow messages to reach across the world instantaneously. There is no need to wait days for a catalogue to arrive by post. Communication delay is not a part of the Internet or E-Commerce world.

3. The Internet is too easy to ‘shop around’ for products and services that may be more cheaper and effective than left o buy only in a Brick and Mortar shop. It provides an opportunity to buy at reduced costs. It is possible to, explore the Internet, identify original manufacturers, thereby bypass wholesalers and achieve a cheaper price.

4. The whole world becomes a shop for today’s customers. They can have a wide choice by comparing and evaluating the same product at different websites before making a purchase decision.

5. Customers can shop from home or anywhere at their convenience. They don’t need a long wait to talk to a salesman. They can read the details regarding model numbers, prices, features, etc. of the product from the website and buy at their own convenience. Payments can also be made online.

Disadvantages:
1. E-Commerce is often used to buy goods that are not available locally but from businesses all over the world. Physical goods need to be transported, which takes time and costs money. In traditional commerce, when we walk out of a shop with an item, it’s ours; we have it; we know what it is, where it is, and how it looks. But in E-Commerce, we should wait between placing the order and having the product in hand. Some E-Commerce companies handle this by engaging their customers in updating the status of their shipments.

2. Unlike returning goods to a traditional shop returning goods online is believed to be an area of difficulty. The doubts about the period of returning, will the returned goods reach the source in time, refunds, exchange, and postage make one tiresome.

3. Privacy issues are serious in E-Commerce. In E-Commerce generating consumer information is inevitable. Not all companies use the personal information they obtained to improve services to consumers. Many companies misuse the information and make money out of it. It is true that privacy concerns are a critical reason why people get cold feet about online shopping.

4. Physical product disputes are a major disadvantage in E-Commerce. E-Commerce purchases are often made on trust. This is because we do not have physical access to the product. Though the Internet is an effective channel for visual and auditory information it does not allow full scope for our senses. We can see pictures of the perfumes, but could not smell their fragrance; we can see pictures of a cloth, but not it’s quality.

If we want to inspect something, we choose what we look at and how we look at it. But in online shopping, we would see only the pictures the seller had chosen for us. People are often much more comfortable in buying generic goods (that they have seen or experienced before and in which there is little ambiguity) rather than unique or complex things via the Internet.

5. We couldn’t think of ordering single ice cream or a coffee from a shop in Paris. Though specialized and refrigerated transport can be used, goods bought and sold via the Internet need to survive the trip from the supplier to the consumer. This makes the customers turn back towards traditional supply chain arrangements for perishable and non-durable goods.

6. Delivery ambiguity. Since supplying businesses can be conducted across the world, it can be uncertain whether they are indeed genuine businesses or just going to take our money. It is pretty hard to knock on their door to complain or seek legal recourse. Further, even if the item is sent, it is easy to start bothering whether or not it will ever arrive on time.
The following are some of the advantages and disadvantages of E-Commerce for a Business organisation.

The benefit of E-Commerce to a business organisation
Access to Global Market:
The Internet spans the world of E-Commerce, and it is possible to trade with any business or a person who is connected with the Internet. It helps to access the global marketplace. Simple local businesses such as herbal product stores are able to market and sell their products internationally using E-Commerce. Thus, the whole world becomes a potential market for an E-Commerce company.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

12th Computer Applications Guide E-Commerce Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
The term E-Business was coined by ……………………….
(a) Apple
(b) IBM
(c) Microsoft
(d) Sun Microsystems
Answer:
(b) IBM

Question 2.
The first online-only shop opens on ……………
a) 1991
b) 2000
c) 2005
d) 1999
Answer:
d) 1999

Question 3.
Find the wrong statement from the following.
(a) E-commerce is a subset of E-Business
(b) E-Business is a subset of E-Commerce
Answer:
(b) E-Business is a subset of E-Commerce

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 4.
The nascent stage is a ……………. of growth.
a) Initial stage
b) Secondary stage
c) final stage
d) None of these
Answer:
a) Initial stage

Question 5.
…………… is a platform for advertising products to targeted consumers.
a) Television
b) Radio
c) Mobile phones
d) social Media
Answer:
d) social Media

Question 6.
E-Commerce first emerged on private networks in ……………………….
(a) 1965
(b) 1967
(c) 1970
(d) 1972
Answer:
(c) 1970

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 7.
The First business to a business transaction from …………….
a) Amazon
b) e-bay
c)Thompson Holidays
d) reddiffshop
Answer:
c)Thompson Holidays

Question 8.
The First business to the business transaction was established in the year …………..
a) 1995
b) 1981
c) 1985
d)1987
Answer:
b) 1981

Question 9.
Who invented Teleputer?
(a) Michael Aldrich
(b) Sting’s
(c) Bob Frankston
(d) Dan Bricklin
Answer:
(a) Michael Aldrich

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 10.
The second wave of electronic commerce was …………..
a) 1995-2003
b) 1992-2003
c) 1993-2004
d) 2004-2009
Answer:
d) 2004-2009

Assertion And Reason

Question 1.
Assertion (A): E-Commerce can be described as the process of buying or selling products, services or information via computer networks
Reason(R): E-Commerce is not a completely new type of commerce
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 2.
Assertion (A): The growth of E-Commerce is also related to socio-technological changes.
Reason(R): Electronic commerce and the information revolution brought about by the Internet likely go through such a series of waves.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
Assertion (A): The Dotcom Bubble was a historic excessive growth (excessive assumption) of economy
Reason(R): Dotcom Bubble occurred roughly between 1990 and 2000.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 4.
Assertion (A): if a company’s work is hired to another company, it would be termed as out-sourcing.
Reason(R): If the work is outsourced to a company, which is outside of its own country, is termed off-shoring.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 5.
Assertion (A): Traditional commerce is buying or selling of products and services Physically.
Reason(R): Scope of business is Unlimited to a particular area.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 6.
Assertion (A): In E-Commerce Payment system is mostly credit card and through fund transfer
Reason(R): Licensing sites allow other websites to make use of their software.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 7.
Assertion (A): Speed is a major disadvantage in E-Commerce.
Reason(R): The pros and cons of E-Commerce affect three major stakeholders: consumer’s business organizations, and society.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 8.
Assertion (A): FinTech Financial technology is a collective term for technologically advanced financial innovations
Reason(R): Fintech is a new financial industry that uses technology to improve financial activity.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 9.
Assertion (A): Web 2,0 (Web of Communication) If 7 is a read-write web that allowed users to interact with each other.
Reason(R): The dot-com bubble was a rapid rise in the U.S, equity market of Internet-based companies during the 1990s.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 10.
Assertion (A): Marketing plays a significant role in any business.
Reason(R): Marketing could be started as early as it could be,
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Find The Odd One On The Following

1. (a) Marketing
(b) Finance
(c) Negotiation
(d) Gateways
Answer:
(d) Gateways

2. (a) Internet
(b) Ethernet
(c) Extranet
(d) Intranet
Answer:
(b) Ethernet

3. (a) EDI
(b) email
(c) HTML
(d) http
Answer:
(c) HTML

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

4. (a) Online Transaction
(b) Electronic Payment
(c) SCM
(d) Inventory Management Systems
Answer:
(d) Inventory Management Systems

5. (a) Network Infrastructure
(b) Messaging
(c) Multimedia Content
(d) Globalization
Answer:
(d) Globalization

6. (a) Scientific Journals
(b) Dotcoms
(c) Fintech
(d) Startups
Answer:
(a) Scientific Journals

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

7.(a) B2B – 1981
(b) E-mail – 1985
(c) Zappo’s – 1999
(d) Groupon – 2008
Answer:
(b) E-mail-1985

8.(a) 24×7 Working
(b) Low Cost
(c) platform dependent
(d) low transaction cost
Answer:
(c) platform dependent

9. (a) dynamic application
(b) Interactive Services
(c) Machine to Machine Interaction
(d) Hyperlinks
Answer:
(d) Hyperlinks

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

10. (a) Television
(b) Computer
(c) Telecom
(d) Modem
Answer:
(d) Modem

11. (a) Web 1.0 : Content
(b) Web2,0: Communication
(c) Web 3,0 : Contex
(d) Web4,0 : 4G :Tech
Answer:
(d) Web4,0 : 4G :Tech

12. (a) Facebook
(b) Whatsapp
(c) twitter
(d) eBay
Answer:
(d) eBay

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Important Years To Remember:

1960Electronic data interchange allows companies to carry out electronic transactions-a precursor to online Shopping
1979English inventor Michael Aldrich connected a TV set to a computer with a phone line and created “teleshopping”
1981The first business-to-business transaction from Thompson holidays
1984The ‘Electronic mail’ is launched by CompuServe
1991The National Science Foundation allows the internet to be used for commercial purposes
Aug 1994Online retailer Net Market makes the ‘first secure retail transaction on the web’
Oct 1994Joe McCambiey ran the first-ever online banner ad. It went like on Hot Wired.com and promoted 7 art museums.
July 1995Amazon sold its first item – a science textbook
Sep 1995eBay sold its first item – a broken laser pointer
1999The first online-only shoe, Zappo’s, opens
2005Social commerce (people using social me­dia in their buying decisions) is born thanks to networks like Facebook India
2008Group on is launched
2009India’s Total E-Commerce sale is3,9 billion American Dollar 1991 Oct 19
2018With mobile commerce, it is expected to hike 265% up and will be $ 850 billion American Dollar

PERIOD

DEVELOPMENT AND GROWTH OF ELECTRONIC COMMERCE

1995 -2003The First Wave of Electronic Commerce
2004 – 2009The Second Wave of Electronic Commerce
2010- PresentThe Third Wave of Electronic Commerce

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Abbreviation:
1. B2B – Business to Business
2. B2C – Business to Consumer
3. B2G – Business to Government
4. C2B – Consumer to Business
5. C2C – Consumer to Consumer
6. C2G – Consumer to Government
7. G2B – Government to Business
8. G2C – Government to Consumer
9. G2G – Government to Government
10. SMEs – Small Medium-sized Enterprises
11. SCM – Supply Chain Management

Match The Following:
1. Business to Business – House tax payments
2. Business to Consumer – Bulk purchases
3. Business to Government – Similar to C2G
4. Consumer to Business – Advertisement Website
5. Consumer to Consumer – Retail store
6. Consumer to Government – Web of Context
7. Government to Business – Reduce burdens on business
8. Government to Consumer – Services by Government
9. Government to Government – Non-Commercial
10. Web 1.0 – Web of Content
11. Web 2.0 – Web of Communication
12. Web 3,0 – Travel Website
Answers
1. Bulk purchases
2. Retail store
3. Services by Government
4. Travel Website
5. Advertisement Website
6. House tax payments
7. Reduce burdens on business
8. Similar to C2G
9. Non Commercial
10. Web of Content
11. Web of Communication
12. Web of Context

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Very Short Answers

Question 1.
When a company is called an E-Business?
Answer:
A company can be called E-Business if and only if-

  1. It has the ability to conduct business electronically over the Internet.
  2. It manages payment transactions through the Internet.
  3. It has a platform for selling products & services via the Internet.

Question 2.
Expand FinTEch.
Answer:
Financial technology

Question 3.
What is FinTech?
Answer:
Fintech is a new finance industry technology to improve financial activity.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 4.
What do you mean by dot-com bubble?
Answer:
The dotcom bubble was a rapid rise in U.S. equity market of Internet-based companies during 1990s.

Question 5.
What is Traditional commerce?
Answer:
It is buying or selling of products and services physically.

Question 6.
What is E-Commerce?
Answer:
It carries out commercial transactions electronically on the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 7.
What is another name of C2B?
Answer:
C2B is also called as reverse auction model,

Question 8.
Expand C2BC.
Answer:
Consumer to Business to Consumer

Question 9.
Mention the two types of G2G systems.
Answer:
Internal facing,
External facing.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 10.
What is the objective of G2B?
Answer:
The objective of G2B is to reduce burdens on business.

Part B

Short Answers

Question 1.
What is mean by Brick and mortar?
Answer:
Brick and mortar is the term that refers to a business that has a physical store; the opposite of online store.

Question 2.
What is mean by Mobile Commerce?
Answer:
Mobile commerce Businesses that are conducted through the Internet using mobile phones or other wireless hand-held devices.

Question 3.
Write a note on Business to Consumer?
Answer:
Business to Consumer (B2C):
In B2C E-Commerce, commercial transactions take place between business firms and their consumers. It is the direct trade between companies and end-consumers via the Internet. B2C companies sell goods, information, or services to customers online in a more personalized dynamic environment and are considered as real competitor for a traditional storekeeper. An example of a B2C transaction is a book company selling books to customers. This mode is intended to benefit the consumer and can say B2C E-Commerce works as a retail store’ over the Internet.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Part C

Explain In Brief Answer

Question 1.
Write short notes on web1.0, web2.0, web3.0.
Answer:

  • Web 1.0 (Web of Content) ¡s the early web that contained text, images, and hyperlinks and allowed users only to search for information and read it. There was very little in the way of user interaction or content generation.
  • Web 2.0 (Web of Communication) ¡s a read-write web that allowed users to interact with each other.
  • Web 3.0 (Web of Context) is termed as the semantic web or executable web with dynamic applications, interactive services, and “machine-to-machine” interaction.

Question 2.
Write a note on E-business building block elements.
Answer:

  • E-Business is grounded on technologies such as Network Infrastructures (like the Internet, Intranet, Extranet)
  • Multimedia content &network publishing infrastructures (like HTML, Online Marketing)
  • Messaging and information distribution infrastructures (like EDI, e-mail, http,
    Computerized Inventory Management Systems) and
  • Other Common business service infrastructures (like electronic payments gateways, globalized Supply Chain Management (SCM), Online Transaction Processing).

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 3.
When a company is can be called E-business?
Answer:
A company can be called E-Business if and only if

  • It has the ability to conduct business electronically over the Internet.
  • It manages payment transactions through the Internet.
  • It has a platform for selling products &services via the Internet.

Part D

Explain In Detail

Question 1.
Explain the Benefits of E-commerce to a business organisation?
Answer:
The benefit of E-Commerce to a business organisation.

1. Access to Global Market:
The Internet spans the world of E-Commerce, and it is possible to trade with any business or a person who is connected with the Internet. It helps to access the global marketplace. Simple local businesses such as herbal product stores are able to market and sell their products internationally using E-Commerce. Thus, the whole world becomes a potential market for an E-Commerce company.

2. Lower Transaction Cost:
E-Commerce reduces the cost of business transactions substantially. For instance, a significant number of customer service representatives in a bank can be reduced by using net banking. Since these interactions are initiated by customers, the customers provide a lot of data for the transactions that may otherwise need to be entered by employees. This means that some of the work and costs are effectively shifted to customers; this is referred as customer outsourcing’.

3. 24×7 working:
A website is open all 24 hours, 7 days a week. As an E-Commerce firm can provide information about its products and services to customers around the clock, it can thus, take
orders, keep an eye on delivery of goods and receive payments at any time.

4. Low cost of entry:
Though E-Commerce was fist emerged in private networks it did not remain the same. The Internet has changed the face of E-Commerce. The Internet is all about democratization. Internet is a place where the small guy can effectively fight against the giants and hope to win. Days, when E-Commerce was only for affordable large national chains, are gone.
Today, it is common for retailers to move their traditional store to online with very little add-on only for building a good website.

5. Computer platform-independent:
Most computers have the ability to communicate via the Internet, irrespective of operating systems and hardware. Consumers need not have to upgrade their computers or network to participate in E-Commerce. They are not limited by existing hardware or software.

Also, the E-Commerce company need not worry about fast changes in computer network technology. E-Commerce applications can be more efficiently developed and distributed because they are platform-independent. Internet’s altruism helps E-Commerce.

6. Snapping middleman:
E-Commerce enjoys the benefit of bypassing middlemen and reaching the end customer directly through the Internet. In B2C E-Commerce business firms establish direct contact with their customers by eliminating middlemen. It helps to increase the sales of the organization without any interventions. This results in cheaper prices for consumers and higher
profit margins for the companies.

Samacheer Kalvi 12th Computer Applications Guide Chapter 15 E-Commerce

Question 2.
Explain various limitations of Ecommerce for a business organisation?
Answer:
1. People won’t buy all products online:
There are certain products like high price jewels, clothes or furnishings which people might not like to buy online. They might want to, inspect it, feel the texture of the fabric, etc. which are not possible in E-Commerce. As online shopping does not allow physical inspection, customers have to rely on electronic images of the products.

E-Commerce is an effective means for buying known and established services, that is, things that are being used every day. Example booking tickets, buying books, music CDs and software. It is not suitable for dealing with the new or unexpected. Traditional commerce always takes advantage when it is perishables and touches and feel products.

2. Competition and Corporate vulnerability:
Access to Global Market is beneficial on one hand but it also comes with competition. The open Internet has paved way for all business firms to operate in the global market. Many businesses have been already facing international competition from web-enabled business opponents.

The competitors may access product details, catalogs, and other information about a business through its website and make it vulnerable. They might then indulge in web harvesting. Web harvesting is the illegal activity of extracting business intelligence from a competitor’s web pages.

3. Security:
Security remains to be a problem for E-Commerce. Customers might be reluctant to give their credit card numbers to the website. As a lot of cyber frauds take place in E-Commerce transactions, people generally afraid to provide their personal information. Legal issues arise when the customer’s data falls into the hands of strangers. Fraudulent activities in traditional commerce is comparatively less as there is the personal interaction between the buyer and the seller.

4. Customer loyalty:
Businesses cannot survive long without loyal customers. The customers would like to buy from a website where they are able to get the best deal. They cannot be loyal to a particular seller. In traditional commerce, the shopkeeper would interact with the consumer “face-to-face” and gain their loyalty too.

In E-Commerce, the interaction between the business and the consumer is “screen-to-face”. The customers would feel that they do not have received sufficient personal attention. Since there is no personal touch in E-Business, companies could not win over their loyalty easily.

5. Shortage of skilled employees:
Though most of the process in E-Commerce is automated, some sectors like packaging and delivery need manual interventions. There could be problems related to shipping delays which would need technically qualified staff with an aptitude to resolve.

E-Commerce has difficulty in recruiting, training and retaining talented people. There is a great shortage of skilled employees. Traditional organizational structures and poor work cultures in some places inhibit the growth of E-Commerce.

6. Size and value of transactions:
The delivery cost of a pen surpasses the cost of the pen itself. E-Commerce is most often conducted using credit cards for payments, and as a result, very small and very large transactions tend not to be conducted online.

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 7 Looping Structure Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 7 Looping Structure

12th Computer Applications Guide Looping Structure Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
Most complicated looping structure is
a) While
b) Do While
c) For
d) None of them
Answer:
c) For

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 2.
Loops that iterate for fixed number of times is called
a) Unbounded loops
b) Bounded loops
c) While loops
d) For loops
Answer:
b) Bounded loops

Question 3.
Which loop evaluates condition expression as Boolean, if it is true, it cutes statements and when it is false it will terminate?
a) For loop
b) For each loop
c) While loop
d) All of them
Answer:
d) All of them

Question 4.
Which loop evaluates condition expression as Boolean, if it is true, it executes statements and when it is false it will ter-minate?
a) For loop
b) For each loop
c) While loop
d) All of them
Answer:
d) All of them

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 5.
What will be displayed in a browser when the following PHP code is executed;
<?php
for ($counter = 20; $counter < 10;$counter++)
{
echo “Welcome to Tamilnadu “;
}
echo “Counter is: $counter”;
?>
a) Welcome to Tamilnadu
b) Counter is: 20
c) Welcome to Tamilnadu counter is: 22
d) Welcome to Tamilnadu Welcome to Tamilnadu Counter is: 22
e) Infinite loop
Answer:
e) Infinite loop

Question 6.
What will be displayed in a browser when the following PHP code is executed;
<?php
for ($counter = 10; $counter < 10; $counter = $counter + 5){ echo “Hello”;
>
?>
a) Hello Hello Hello Hello Hello
b) Hello Hello Hello
c) Hello
d) None of the above
Answer:
d) None of the above

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 7.
PHP supports four types of looping techniques;
a) for loop
b) while loop
c) foreach loop
d) all the above
Answer:
d) all the above

Question 8.
Consider the following code
<? php
$count=12;
do{
printf(“%d squared=%d<br/>”,$count,
pow($count,2));
} while($count<4);
?>
What will be the output of the code.

a) 12 squared 141
b) 12 squared=141
c) “12 squared=141
d) Execution error
Answer:
d) Execution error

Question 9.
What will be the output of the following PHP code ?
<?php
for ($x = 1; $x < 10;++$x)
{
print “*\t”;
}
?>
a) **********
b) *********
c) ***********
d) infinite l00p
Answer:
b) *********

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 10.
What will be the output of the following PH P code?
<?php
for ($x = -1; $x < 10;–$x)
{
print $x;
}
?>
a)123456713910412
b)123456713910
c) 1234567139104
d) Infinite loop
Answer:
d) Infinite loop

Part II

Short Answers

Question 1.
Define Looping Structure in PHP.
Answer:

  1. Looping Structures are useful for writing iteration logics.
  2. It is the most important feature of many programming languages, including PHP.
  3. They are implemented using the following categories,
    • for Loop
    • While Loop
    • foreach Loop
    • Do While Loop

Question 2.
Define for loop in PHP.
Answer:
For loop is an important functional looping system which is used for iteration logics when the programmer know in advance how many times the loop should run.

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 3.
What is For each loop in PHP?
Answer:

  • foreach loop is exclusively available in PHP.
  • It works only with arrays. The loop iteration deepens on each KEY Value pair in the Array.
  • For each, loop iteration the value of the current array element is assigned to $value variable and the array pointer is shifted by one, until it reaches the end of the array element.

Question 4.
List out Looping Structure in PHP.
Answer:

  • for Loop
  • foreach Loop
  • While Loop
  • Do While Loop

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 5.
Write Syntax of For loop in PHP.
Answer:
for (init counter; test counter; increment counter)
{
code to be executed;
}

Question 6.
Write Syntax of For each loop in PHP.
Answer:
for each ($array as $value)
{
code to be executed;
}

Question 7.
Write Syntax of while loop in PHP.
Answer:
while (condition is true)
{
code to be executed;
}

Question 8.
Write Syntax of Do while loop in PHP.
Answer:
do
{
code to be executed;
} while (condition is true);

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 9.
Compare for loop and for each loop.
Answer:

for loopfor each loop
loops through a block of code until the counter reaches a specified number.loops through a block of code for each element in an array.
for (init counter; test count­er; increment counter)
{
code to be executed;
}
for each ($array as $value)
{
code to be executed;
}

Question 10.
Usage for each loop in PHP
Answer:

  1. The foreach loop works only on arrays,
  2. It is used to loop through each key/value pair in an array.

Part III

Explain in brief answer

Question 1.
Write the features Looping Structure.
Answer:
Looping Structures are useful for writing iteration logics.
It is the most important feature of many programming languages, including PHP.
They are implemented using the following categories.

  • for loop
  • while loop
  • do-while loop
  • for each loop

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 2.
Write the purpose of Looping Structure in PHP
Answer:

  • In programming it is often necessary to repeat the same block of code a given number of times, or until a certain condition is met.
  • This can be accomplished using looping statements

Question 3.
Differentiate For each and While loop.
Answer:

While loopFor Each loop
Working principleThe while statement will execute a block of code If and as Song as a test ex­pression, is true.The foreach statement is used to loop through arrays.
Working principleIf the test expression is true then the code block will be executed. After the code has executed the test expression will again be evaluated and the loop will continue until the test expression is found to be false.For each pass, the value of the current array element is assigned to $value and the array pointer is moved by one and in the next pass, the next element will be processed.
Syntaxwhile(condition)
{
code to be executed;
}
for each ($array as $value)
{
code to be executed;
}

Question 4.
Write short notes on Do while Loop.
Answer:

  • Do while loop always run the statement inside of the loop block at the first time execution.
  • Then it is checking the condition whether true or false.
  • It executes the loop if the specified condition ¡s true.

Question 5.
Differentiate While and Do while loops.
Answer:

While loopDo while loop
The while state­ment will execute a block of code if and as long as a test expression is true.Do while loop always run the statement inside of the loop block at the first time execution.
If the test expres­sion is true then the code block will be executed. After the code has executed the test expression will again be evaluated and the loop will continue until the test expression is found to be false.Then it is checking the condition whether true or false. It executes the loop if the specified condition is true.
while(condition)
{
code to be execut­ed;
}
do
{
code to be executed;
}
while (condition is true);

Part IV

Explain in detail

Question 1.
Explain Looping Structure in PHP.
Answer:

  • Looping Structures are useful for writing iteration logics.
  • It is the most important feature of many programming languages, including PHP.
  • They are implemented using the following categories.
    for Loop
  • For loops execute a block of code a specified number of times.
    foreach Loop

The foreach construct provides an easy way to iterate over arrays

While Loop PHP
While loops execute a block of code while the specified condition is true.

Do While Loop
Do whileloop always run the statement inside of the loop block at the first time execution?

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 2.
Discuss in detail about Foreach loop.
Answer:

  • The foreach statement is used to loop through arrays.
  • For each pass the value of the current array element is assigned to $value and the array pointer is moved by one and in the next pass next element will be processed.

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure 1

Syntax
for each ($array as $value)
{
code to be executed;
}

Example:
<?php
$Student_name = a rrayÇ’MagiIan’ “Iniyan’
“NiIani’ “Sibi’ “Shini”);
foreach ($Student_name as $value) {
echo “$value <br>”;
}
?>

Question 3.
Explain the process Do while loop.
Answer:

  • Do while loop always run the statement ¡nside of the loop block at the first time execution.
  • Then it is checking the condition whether true or false. It executes the loop if the specified condition is true.

Syntax:
do
{
code to be executed;
} while (condition is true);

Example
<?php
$Student_count = 10;
$student_number= 1;
do
{
echo “The student number is: $student_num- ber<br>”;
$student_number++;
}
while($student_number<= $Student_count);
?>
Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure 2

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 4.
Explain concepts of for loop with example.
Answer:
For loop is an important functional looping system which is used for iteration logic when the programmer knows in advance how many times the loop should run.
Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure 3
Syntax
for (init counter; test counter; increment counter)
{
code to be executed;
>

Example:
<?php
for ($i = 0; $i<= 10; $i++)
{
echo “The number is: $i<br>”;
}
?>

Question 5.
Explain array concepts in Looping Structure.
Answer:
Using For each loop:

  • The for each statement is used to loop through arrays.
  • For each pass, the value of the current array element is assigned to $value and the array pointer is moved by one and in the next pass, the next element will be processed.

Example:
<?php
$Student_name = arrayO’Magilan”, “Iniyan”, “Nilani” “Sibi” “Shini”); foreach ($Student_name as $value) { echo “$value <br>”;
}
?>

Using For Loop:
To loop through and print all the values of an indexed array.

Example:
<?php$cars = arrayC’Volvo”, “BMW”, “Toyota”);
$arrlength = count(cars);
for($x = 0; $x < $arrlength; $x++){
echo $cars[$x];
echo “<br>”;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

12th Computer Applications Guide Looping Structure Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
The ……………… construct provides an easy way to iterate over arrays
a) for each
b) for
c) while
d) do..while
Answer:
a) for each

Question 2.
Which loop is used if you know in advance how many times the loop should run?
(a) For
(b) For each
(c) While
(d) Do-while
Answer:
(a) For

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 3.
Which of the following is an entry check loop?
a) foreach
b) for
c) while
d) All of these
Answer:
d) All of these

Question 4.
Which counter decides whether the loop should continue or ends?
(a) Init
(b) Test
(c) Increment
(d) Decrement
Answer:
(b) Test

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 5.
What will be displayed in a browser when the following PHP code is executed;
<?php
for ($i=1;$i<=5; $i++)
{
echo “$i”;
}
?>
a) 12345
b) 1234
c) 123
d) None of the above
Answer:
a) 12345

Fill in the blanks:

1. There are…………….types of loops in PHP.
Answer:
4

2. ………………… Structures are useful for writing iteration logics.
Answer:
Looping

3. …………….. loop works only with arrays.
Answer:
For each

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

4. …………….. loop always run the statement inside of the loop block at the first time execution and then it is checking the condition whether true or false.
Answer:
Do while

5. The loop iteration deepens on each…………… in the Array.
Answer:
KEY Value pair

Very Short Answers

Question 1.
How “for loop” will execute?
Answer:
For loops execute a block of code a specified number of times.

Question 2.
What is Wils provide for each” loop in PHP?
Answer:
The foreach construct provides an easy way to iterate over arrays

Question 3.
How “while loop” will execute?
Answer:
PHP while loops execute a block of code while the specified condition is true.

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 4.
How do,.while loop differs from other loops?
Answer:
do…while – loops through a block of code once, and then repeats the loop as long as the specified condition is true

Question 5.
Why looping structure is necessary in programming languages?
Answer:
To repeat the same block of code a given number of times, or until a certain condition is met. This can be accomplished using looping statements

Match the following:

1. For loop – Exit check loop
2. While loop – Works only with an array
3. For Each loop – Complicated looping structure
4. do-while loop – Simple iteration logics
Answer:
1. Complicated looping structure
2. Simple iteration Logics
3. Works only with array
4. Exit check loop

Syntax:

1. For loop
for (init counter; test counter; increment counter)
{
code to be executed;
}

2. While loop
while (condition is true)
{
code to be executed;
}

3. For Each loop
for each ($array as $value)
{
code to be executed;
}

4. Do… while loop:
do
{
code to be executed;
} while (condition is true);

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Additional programs:

Question 1.
Write a php program to display I to 10 numbers using while loop.
Answer:
<?php
$x = 1;
while($x <= 10)
{
echo $x;
$x++;
}
?>

Question 2.
Write a php program to display the string I “Hello World” 5 times using “for loop”.
Answer:
<?php
for ($x = 0; $x <= 5; $x++)
{
echo “Hello World <br>”;
}
?>

Question 3.
Write a PHP program to display color names using “foreach” loop
Answer:
<?php
$colors = arrayC’red”, “green”, “blue”, “yellow”);
foreach ($colors as $value)
{
echo “$value <br>”;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Question 4.
Write a PHP program to display the following
The number is: 1
The number is:2
The number is:3
The number is:4
The number is:5
Program;
<?php
$x = 1;
do {
echo “The number is: $x <br>”;
$x++;
} while ($x <= 5);
?>

Part B

Very Short Answers

Question 1.
Write the working principle of loop parameters.
Answer:

  • init counter: Initialize the loop initial counter value
  • Test counter: Evaluated for every iteration of the loop.
  • If it evaluates to TRUE, the loop continues. If it evaluates to FALSE, the loop ends.
  • Increment counter: Increases the loop counter value.

Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure

Part C

Short Answers

Question 1.
Draw the For loop Structure and Flow chart
Samacheer Kalvi 12th Computer Applications Guide Chapter 7 Looping Structure 4

Question 2.
Explain the parameters in the for loop?
Answer:
Parameters:

  1. init counter: Initialize the loop initial counter value
  2. Test counter: Evaluated for every iteration of the loop.
  3. If it evaluates to TRUE, the loop continues. If it evaluates to FALSE, the loop ends.
  4. Increment counter: Increases the loop counter value.

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 6 PHP Conditional Statements Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 6 PHP Conditional Statements

12th Computer Applications Guide PHP Conditional Statements Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
What will be the output of the following PHP code?
<?php
$x;
if ($x)
print “hi”;
else
print “how are u”;
?>
a) how are u
b) hi
c) error
d) no output
Answer:
c) error

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 2.
What will be the output of the following PHP code ?
<?php
$x = 0;
if ($x++)
print “hi”;
else
print “how are u”;
?>
a) hi
b) no output
c) error
d) how are u
Answer:
a) hi

Question 3.
What will be the output of the following PHP code ?
<?php
$x;
if ($x == 0)
print “hi”;
else
print “how are u”;
print “hello”
?>
a) how are uhello
b) hihello
c) hi
d) no output
Answer:
a) how are uhello

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 4.
Statement which is used to make choice between two options and only option is to be performed is written as
a) if statement
b) if else statement
c) then else statement
d) else one statement
Answer:
b) if else statement

Question 5.
What will be the output of the following PHP code ?
<?php
$a =
if ($a)
print “all”;
if
else
print “some”;
?>
a) all
b) some
c) error
d) no output
Answer:
c) error

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 6.
What will be the output of the following PHP code ?
<?php
$a = “”;
if ($a)
print “all”;
if
else
print “some”;
?>
a) all
b) some
c) error
d) no output

Question 7.
What will be the output of the following PHP code ?
<?php
$x = 10;
$y = 20;
if ($x > $y + $y != 3)
print “hi”;
else
print “how are u”;
?>
a) how are u
b) hi
c) error
d) no output
Answer:
b) hi

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 8.
What will be the output of the following PHP code ?
<?php
$x = 10;
$y = 20;
if ($x > $y && 1||1)
print “hi”;
else
print “how are u”;
?>
a) how are u
b) hi
c) error
d) no output
Answer:
b) hi

Question 9.
What will be the output of the following PHP code ?
<?php
if (-100)
print “hi”;
else
print “how are u”;
?>
a) how are u
b) hi
c) error
d) no output
Answer:
a) how are u

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Part II

Short Answers

Question 1.
Define Conditional Statements in PHP
Answer:
Conditional statements are useful for writing decision-making logics. It is the most important feature of many programming languages, including PHP. They are implemented by the following types:

  1. if Statement
  2. if…else Statement
  3. if…else if….else Statement
  4. switch Statement

Question 2.
Define if statement in PHP.
Answer:
If a statement executes a statement or a group of statements if a specific condition is satisfied as per the user expectation.
Syntax:
if (condition)
{
Execute statement(s) if condition is true;
}

Question 3.
What is an if-else statement in PHP?
Answer:
If else statement in PHP:

  1. If a statement executes a statement or a group of statements if a specific condition is satisfied by the user expectation.
  2. When the condition gets false (fail) the else block is executed.

Syntax:
if (condition)
{
Execute statement(s) if condition is true;
}
else
{
Execute statement(s) if condition is false;
}

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 4.
List out Conditional Statements in PHP.
Answer:

  • if Statement
  • if…else Statement
  • if…else if….else Statement
  • switch Statement

Question 5.
Write Syntax of the If else statement in PHP.
Answer:
if (condition)
{
Execute statement(s) if condition is true;
}
else
{
Execute statement(s) if condition is false;
}

Question 6.
Define if…elseif….else Statement in PHP.
Answer:

  • If-elseif-else statement is a combination of if-else statement.
  • More than one statement can execute the condition based on user needs.

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 7.
Usage of Switch Statement in PHP.
Answer:

  • The switch statement is used to perform different actions based on different conditions.
  • Switch statements work the same as if statements but they can check for multiple values at a time.

Question 8.
Write Syntax of the Switch statement.
Answer:
switch (n)
{
case label1:
code to be executed if n=la bel1;
break;
case Iabel2:
code to be executed if n=label2;
break;
case label3:
code to be executed if n=iabel3;
break;

default:
code to be executed if n is different from all labels;
}

Question 9.
Compare if and if-else statement.
Answer:

If StatementIf else Statement
if statement checks a condition and exe­cutes a set of state­ments when this con­dition is true, it does not do anything when the condition is false.if-else statement checks a condition and executes a set of statements when this condition is true, it executes another set of statements when the condition is false.

Part III

Explain in brief answer

Question 1.
Write the features Conditional Statements in PHP.
Answer:
PHP Conditional statements:

  1. Conditional statements are useful for writing decision-making logics.
  2. It is most important feature of many programming languages, including PHP.
  3. They are implemented by the following types:
  4. if Statement
  5. if…else Statement
  6. if…elseif….else Statement
  7. switch Statement

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 2.
Write is the purpose of if elseif else stament.
Answer:

  • A user can decide among multiple options.
  • The if statements are executed from the top I down.
  • As soon as one of the conditions controlling the if is true, the statement associated with that if is executed, and the rest of the ladder is bypassed.
  • If none of the conditions is true, then the final else statement will be executed.
  • More than one statement can execute the condition based on user needs.

Question 3.
Differentiate Switch and if-else statement.
Answer:

Switch statementif-else statement
Switch statement uses single expression for multiple choices.the if-else statement uses multiple statements for multiple choices.
Switch statement test only for equality.if-else statement test for equality as well as for logical expression.
Switch statement execute one case af­ter another till a break statement is appeared or the end of switch statement is reached.Either if statement will be executed or else statement is executed.

Question 4.
Write Short notes on the Switch statement.
Answer:

  1. The switch statement is used to perform different actions based on different conditions.
  2. It tests for equality only.
  3. It uses default value when all the case values are not matched.
  4. It can have multiple ease values.

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 5.
Differentiate if statement and if-else statement.
Answer:

If statementif else if else stamen
If-else if-else statement is a combination of if-else statement.It consists of a single “if statement”. There is no “else” statement here.
More than one state­ment can execute the condition based on user needsOnly one statement can execute
If the condition is false, there are more alterna­tives are thereIf the condition is false, there is no alternatives

Part IV

Explain in detail

Question 1.
Explain Functions of Conditional Statements in PHP.
Answer:
Function Conditional Statements:

  1. Function conditional statement is the function specified inside the conditional statements.
  2. We can’t call a conditional function before its definition.

Syntax:
if(expression)
{
function function_name( )
{
block of statements;
}
}
function_name( ); // calling function.
Eg:
<? php
display( );
if(TRUE)
{
function display( )
{
echo “condition and function”;
}
}
Output: condition and function

Question 2.
Discuss in detail about Switch statement with an example.
Answer:

  • The switch statement is used to perform different actions based on different conditions.
  • Switch statement test only for equality.
  • Switch statement execute one case after another till a break statement has appeared or the end of the switch statement is reached.

Syntax;
switch (n)
{
case label 1:
code to be executed if n=label1;
break;
case label 2:
code to be executed If n=label2;
break;
case label3:
code to be executed if n=label3;
break;

default:
code to be executed if n is different from all labels;
}

Example;
<?php
$favcolor = “red”;
switch ($favco!or) {
case “red”:
echo “Your favorite color is red!”;
break;
case “blue”:
echo “Your favorite color is blue!”;
break;
case “green”:
echo “Your favorite color is green!”;
break;
default:
echo “Your favorite color is neither red, blue, nor green!”;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 3.
Explain the process of Conditional Statements in PHP?
Answer:
Conditional statements are useful for writing decision-making logics. It is the most important feature of many programming languages, including PHP. They are implemented by the following types:

(i) if Statement:
If statement executes a statement or a group of statements if a specific condition is satisfied as per the user expectation.

(ii) if…else Statement:
If statement executes a statement or a group of statements if a specific condition is satisfied by the user expectation. When the condition gets false (fail) the else block is executed.

(iii) if…elseif….else Statement:
If-elseif-else statement is a combination of if-else statement. More than one statement can execute the condition based on user needs.

(iv) Switch Case:
The switch statement is used to perform different actions based on different conditions.

Question 4.
Explain concepts of if elseif else statement.
Answer:

  • If-elseif-else statement is a combination of if-else statement.
  • More than one statement can execute the condition based on user needs.

Syntax:
if (1st condition)
{
Execute statement(s) if condition is true;
}
elseif(2nd condition)
{
Execute statement(s) if 2ndcondition is true;
}
else
{
Execute statement(s) if both conditions are false;
}

Example Program:
<?php
$Pass_Mark=35;
$first_class=60;
$Student_Mark=70;
if ($Student_Mark>= $first_class){ echo “The Student is eligible for the promotion with First Class”;
}
elseif ($Student_Mark>= $Pass_Mark){ echo “The Student is eligible for the promotion”;
}
else {
echo “The Student is not eligible for the promotion”;
}?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 5.
Explain the if-else statement in PHP.
Answer:
If else statement in PHP:
If a statement executes a statement or a group of statements if a specific condition is satisfied by the user expectation. When the condition gets false (fail) the else block is executed.
Syntax:
if (condition)
{
Execute statement(s) if condition is true;
} else
{
Execute statement(s) if condition is false;
}
Example:
<?php
$Pass_Mark=35;
$Student_Mark=70;
if ($Student_Mark>= $Pass_Mark)
{
echo “The Student is eligible for the promotion”;
}
else
{
echo “The Student is not eligible for the promotion”; }
?>

12th Computer Applications Guide PHP Conditional Statements Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
How many types of PHP conditional statements are there?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(c) 4

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 2.
What will be the output of the following PHP code ?
<?php
if(0.0)
print”hi”;
else
print”how are u”;
?>
a) how are u
b) hi
c) error
d) no output
Answer:
a) how are u

Question 3.
The ……………………….. statement is used to perform different actions based on different conditions.
Answer:
switch

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 4.
What will be the output of the following PHP code ?
<?php
$a=”l”;
switch($a)
{
case1:
break;
print”hi”;
case2:
print’tiello”;
break;
default:
print”hil”;
>
?>
a) hihellohi1
b) hi
c) hihi1
d) hi1
Answer:
a) hihellohi1

Question 5.
What will be the output of the following PHP code ?
<?php
$x=l;
if($x=$x&0)
print$x;
else
break;
?>
a) 0
b) 1
c) error
d) no output
Answer:
c) error

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 6.
Which of the following can check for multiple values at a time?
(a) If
(b) If else
(c) Nested else
(d) Switch
Answer:
(d) Switch

Very Short Answers

Question 1.
How conditional statements perform?
Answer:
It performs different actions for different decisions in programing language

Question 2.
What is an “if statement” in PHP?
Answer:
The If Statement is a way to make decisions based upon the result of a condition.

Question 3.
How switch statement and if statement differs?
Answer:
Switch statements work the same as if statements but they can check for multiple values at a time

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Match the following:

1. Simple if statements – Multiple branching
2. If-else statement – Combination of if-else statement
3. If elseif else statement – Only one option
4. Switch case statement – Alternative statement

Part B

Short Answers

Question 1.
Write the syntax of the If statement.
Answer:
if (condition)
{
Execute statement(s) if condition is true;
}

Question 2.
What is mean by If else ladder?
Answer:

  • Else executes the following block of statements if the condition in the corresponding if is false.
  • After the else, if another condition is to be checked, then an if statement follows the else. This is else if and is called as if-else ladder.

SYNTAX:

1. If statement
Answer:
if (condition)
{
Execute statement(s) if condition is true;
}

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

2. If else statement
if (condition)
{
Execute statement(s) if condition is true;
}
else
{
Execute statement(s) if condition is false;
}

3. If elseif else statement
if (1st condition)
{
Execute statement(s) if condition is true;
}
elseif(2nd condition)
{
Execute statement(s) if 2ndcondition is true;
}
else
{
Execute statement(s) if both conditions are false;
}

4. Switch Case:
switch (n) { case label 1:
code to be executed if n=label1;
break;
case Iabel2:
code to be executed if n=label2;
break;
case Iabel3:
code to be executed if n=label3;
break;

default:
code to be executed if n is different from all labels;
}

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Part C

Explain in brief answer

Question 1.
Give the Syntax for If else statements in PHP?
Answer:
if (1st condition)
{
Execute statement(s) if condition is true;
}
elseif(2nd condition)
{
Execute statement(s) if 2nd condition is true;
}
else
{
Execute statement(s) if both conditions are false;
}

Programs

Question 1.
Write a php program to birthday greetings using if statement.
Answer:
<?php
$date=date(“m-d”);
if ($date==»01T0»)
{
echo “Wishing you a very Happy Birthday”;
}
?>

Question 2.
Write a php program to check whether the given number is positive or negative.
Answer:
<?php
$x = -12;
if ($x > 0)
{
echo “The number is positive”;
}
else{
echo “The number is negative”;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 3.
Write a PHP program to display independence day and republic day the greetings using If elseif else statement
Answer:
<?php
$x = “August”;
if ($x == “January”) {
echo “Happy Republic Day”;
}
elseif ($x == “August”) {
echo “Happy Independence Day!!!”;
}
else{
echo “Nothing to show”;
}
?>

Part D

Explain in detail

Question 1.
Write a PHP code to display the days of weak using switch statement
Answer:
<?php
$today=date(“D”);
switch($today)
{
case”Mon”:
echo’Today is Monday.
break;
case”Tue”:
echo’Today is Tuesday.”;
break;
case”Wed”:
echo’Today is Wednesday.”;
break;
case’Thu”:echo’Today is Thursday.”;
break;
case”Fri”:
echo’Today is Friday. Party tonight.”;
break;
case”Sat”:echo’Today is Saturday.”;
break;
case”Sun”:
echo’Today is Sunday.”;
break;
default:
echo”No information available for that day.”;
break;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 6 PHP Conditional Statements

Question 2.
Write a PHP program to display week days using switch case statement.
Answer:
<?php
$n = “February”;
switch($n) {
case “January”:
echo “Its January”;
break;
case “February”:
echo “Its February”;
break;
case “March”:
echo “Its March”;
break;
case “April”:
echo “Its April”;
break;
case “May”:
echo “Its May”;
break;
case “June”:
echo “Its June”;
break;
case “July”:
echo “Its July”;
break;
case “August”:
echo “Its August”;
break;
case “September”:
echo “Its September”;
break;
case “October”:
echo “Its October”;
break;
case “November”:
echo “Its November”;
break;
case “December”:
echo “Its December”;
break;
default:
echo “Doesn’t exist”;
}
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 16 Electronic Payment Systems Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 16 Electronic Payment Systems

12th Computer Applications Guide Electronic Payment Systems Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
Based on the monetary value e payment system can be classified into
a) Mirco and Macro
b) Micro and Nano
c) Maximum and Minimum
d) Maximum and Macro
Answer:
a) Mirco and Macro

Question 2.
Which of the following is not a category of micro payment?
a) Buying a movie ticket
b) Subscription to e journals
c) Buying a laptop
d) Paying for smartphone app
Answer:
b) Subscription to e journals

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Assertion (A): Micro electronic payment systems support higher value payments.
Reason (R): Expensive cryptographic operations are included in macro payments
a) Both (A) and (R) are correct and (R) is the cor-rect explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the cor-rect explanation of (A)

Question 4.
Which of the following is correctly matched?
a) Credit Cards – pay before
b) Debit Cards – pay now
c) Stored Value Card – pay later
d) Smart card – pay anytime
Answer:
b) Debit Cards – pay now

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 5.
ECS stands for
a) Electronic Clearing Services
b) Electronic Cloning Services
c) Electronic Clearing Station
d) Electronic Cloning Station
Answer:
a) Electronic Clearing Services

Question 6.
Which of the following is not a Altcoin?
a) Litecoin
b) Namecoin
c) Ethereum
d) Bitcoin
Answer:
c) Ethereum

Question 7.
Which of the following is true about Virtual payment address (VPA)?
a) Customers can use their e-mailid as VPA
b) VPA does not includes numbers
c) VPA is a unique ID
d) Multiple bank accounts cannot have single VPA
Answer:
d) Multiple bank accounts cannot have single VPA

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 8.
Pick the odd one in the credit card transaction
a) card holder
b) merchant
c) marketing manager
d) acquirer
Answer:
a) card holder

Question 9.
Which of the following is true about debit card?
i. Debit cards cannot be used in ATMs
ii. Debit cards cannot be used in online transactions
iii. Debit cards do not need bank accounts
iv. Debit cards and credit cards are identical in physical properties
a) i, ii, iii
b) ii, iii, iv
c) iii alone
d) iv alone
Answer:
d) iv alone

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Match the following
List A List B
A1) First Digit B1) Account number
A2) 9th to 15th Digit B2) Mil Code
A3) First 6 Digits B3) BIN Code
A4) Last Digit B4) Check digit
Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems 1
Answer:
b) B2 B1 B3 B4

Part II

Short Answers

Question 1.
Define electronic payment system
Answer:
The term electronic payment refers to a payment made from one bank account to another bank account using electronic methods forgoing the direct intervention of bank employees.

Question 2.
Distinguish microelectronic payment and macro electronic payment
Answer:

Microelectronic payment

Macroelectronic payment

Online payment system designed to allow efficient and frequent payments of small amounts.Macro electronic payment systems support payments of higher value.
In order to keep transaction costs very low, the communica­tion and computational costs are minimized here.The security requirements are more rigorous in macro pay­ment systems because of huge money transactions.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
List the types of microelectronic payments based on their algorithm
Answer:
Based on the algorithm used, it is classified into the following categories.

  1. Hash chain based micro electronic payment systems.
  2. Hash collisions and hash sequences based on micro electronic payment systems.
  3. Shared secrete keys based micro electronic payment systems.
  4. Probability-based micro electronic payment systems.

Question 4.
Explain the concept of an e-wallet
Answer:
Electronic wallets (e-wallets) or electronic purses allow users to make electronic transactions quickly and securely over the Internet through smartphones or computers.

Question 5.
What is a fork in cryptocurrency?
Answer:
Many cryptocurrencies operate on the basis of the same source code, in which the authors make only a few minor changes in parameters like time, date, distribution of blocks, number of coins, etc. These currencies are called as fork. In fork, both cryptocurrencies can share a common transaction history in block chain until the split.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Part III

Explain In Brief Answer

Question 1.
Define microelectronic payment and its role in E-Commerce.
Answer:
Definition:
Micro electric payment is an online payment system designed to allow efficient and frequent payments of small amounts.
Role in E-Commerce

  • An e-commerce payment system facilitates the acceptance of electronic payment for online transactions
  • E-commerce payment systems have become increasingly popular due to the widespread use of internet-based shopping and banking.

Question 2.
Compare and contrast the credit card and debit card. (3-5 points)
Answer:

Basis For ComparisonCredit CardDebit Card
MeaningA credit card is issued by a bank or any fi­nancial institution to allow the holder of the card to purchase goods and services on credit. The payment is made by the bank on the customer’s behalf.A debit card is issued by a bank to allow its customers to purchase goods and services, whose payment is made directly through the custom­er’s account linked to the card.
ImpliesPay laterPay now
Bank AccountA bank account is not a prerequisite for issuing a credit card.A bank account is a must for issu­ing a debit card.
LimitThe maximum limit of withdrawing money is determined according to the credit rating of the holder.The maximum limit of withdrawing money will be less than the money lying in the saving bank account.
BillThe holder of the card has to pay the credit card bill within 30 days of every month.There is no such bill, the amount is directly deducted from the custom­er’s account.
InterestInterest is charged when payment is not made to the bank within a specified time period.No interest is charged.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Explain briefly the Anatomy of a credit card.
Answer:
Publisher: Emblem of the issuing bank
Credit card number: The modem credit card number has a 16-digit unique identification number.

Question 4.
Briefly explain the stored value card and its types.
Answer:

  • A stored-value card is a type of debit card that is pre-loaded with a certain amount (value), with which a payment is made.
  • It is a card that has default monetary value on it.
  • The card may be disposed of when the value is used or recharged to use it again.
  • The major advantage of the stored-value card is that customers don’t need to have a bank account to get prepaid cards.
  • There are two varieties for the stored-value cards.

(i) Closed Loop

  • In closed-loop cards, money is metaphorically stored on the card in the form of binary-coded data.
  • Closed-loop cards are issued by a specific merchant or merchant and can only be used to make purchases from a specific place, e.g. Chennai metro rail travel card.

(ii) Open-loop (multipurpose)

  • Open-loop cards can be used to make debit transactions at a variety of retailers.
  • It is also called prepaid-debit cards.
  • It can be used anywhere the branded cards are accepted, e.g. Visa gift cards.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 5.
Write a note on mining in cryptocurrency.
Answer:
Mining:
The cryptocurrency units are created by the solution of cryptographic tasks called mining. The miners not only generate new monetary units but also initiate new transactions to the blockchain. As a reward, they will receive new Bitcoins.

Part IV

Explain In Detail

Question 1.
What is a credit card? Explain the key players of a credit card payment system and bring out the merits of it.
Answer:
Credit Card

  • A credit card is an electronic payment system normally used for retail transactions.
  • A credit card enables the bearer to buy goods or services from a vendor, based on the cardholder’s promise to the card issuer to pay back the value later with the agreed interest.

Key players in operations of credit card

1. Bearer:
The holder of the credit card account who is responsible for payment of invoices in full (transactor) or a portion of the balance (revolver) the rest accrues interest and carried forward.

2. Merchant:
Storekeeper or vendor who sells or providing service, receiving payment made by its customers through the credit card.

3. Acquirer:
Merchant’s bank that is responsible for receiving payment on behalf of merchant sends authorization requests to the issuing bank through the appropriate channels.

4. Credit Card Network:

  • It acts as the intermediate between the banks.
  • The Company is responsible for communicating the transaction between the acquirer and the credit card issuer.
  • These entities operate the networks that process credit card payments worldwide and levy interchange fees. E.g. Visa, MasterCard, Rupay

5. Issuer:
Bearer’s bank, that issue the credit card, set a limit of purchases, decides the approval of transactions, issue invoices for payment, charges the holders in case of default and offer card-linked products such as insurance, additional cards, and rewards plan.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 2.
Briefly explain Electronic Account transfer and its types.
Answer:
Electronic Account transfer

  • Apart from card-based payment systems, there are many alternative electronic payment systems.
  • With the advent of computers, network technologies, and electronic communications a large number of alternative electronic payment systems have emerged.

Types of Electronic Account transfer:

  1. ECS (Electronic Clearing Services)
  2. EFT(Electronic funds transfers)
  3. Real-Time Gross Settlement system (RTGS)

1. Electronic Clearing Services (ECS):
Electronic Clearing Service can be defined as a repeated transfer of funds from one bank account to multiple bank accounts or vice versa using computer and Internet technology.

2. Electronic Funds Transfer

  • Electronic Funds Transfer (EFT) is the “electronic transfer” of money over an online network.
  • The amount sent from the sender’s bank branch is credited to the receiver’s bank branch on the same day in batches.
  • Unlike traditional processes, EFT saves the effort of sending a demand draft through the post and the inherent delay in reaching the money to the receiver.
  • Banks may charge a commission for using this service.

3. Real Time Gross Settlement:

  • Real-Time Gross Settlement system (RTGS) is a payment system particularly used for the settlement of transactions between financial institutions, especially banks.
  • Real-time gross settlement transactions are:
  • Unconditional – the beneficiary will receive funds regardless of whether he fulfills his obligations to the buyer or whether he would deliver the goods or perform a service of a quality consistent with the order.
  • Irrevocable – a correctly processed transaction cannot be reversed and its money cannot get refunded.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Write a note on
a) Internet banking
b) Mobile Banking,
Answer:
(a) Internet banking:
Internet banking is a collective term for E-banking, online banking, virtual banking (operates only on the Internet with no physical branches), direct banks, web banking, and remote banking. Internet banking allows customers of a financial institution to conduct various financial transactions on a secure website operated by the banking institutions. This is a very fast and convenient way of performing any banking transactions.

It enables customers of a bank to conduct a wide range of financial transactions through its website. In fact, it is like a branch exclusively operating of an individual customer. The online banking system will typically connect to the core banking system operated by customers themselves (Self-service banking).

Advantages:

  1. The advantages of Internet banking are that the payments are made at the convenience of the account holder and are secured by user name and password, i.e. with Internet access it can be used from anywhere in the world and at any time.
  2. Any standard browser (e.g. Google Chrome) is adequate. Internet banking does not need .installing any additional software.

(b) Mobile banking:
Mobile banking is another form of net banking. The term mobile banking (also called m-banking) refers to the services provided by the bank to the customer to conduct banking transactions with the aid of mobile phones. These transactions include balance checking, account transfers, payments, purchases, etc.

Transactions can be done at any time and anywhere. The WAP protocol installed on a mobile phone qualifies the device through an appropriate application for mobile session establishment with the bank’s website. In this way, the user has the option of permanent control over the account and remote management of his own finances. Mobile Banking operations can be implemented in the following ways:

  • Contacting the call center.
  • Automatic IVR telephone service.
  • Using a mobile phone via SMS.
  • WAP technology.
  • Using smartphone applications.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 4.
What is cryptocurrency? Explain the same.
Answer:

  • A cryptocurrency is a unique virtual (digital) asset designed to work as a medium of exchange using a cryptographic algorithm.
  • This algorithm secures the transactions by recording them in blockchain and controls the creation of additional units of the currency.
  • Cryptocurrency is also called crypto coins, e-cash, alternative currencies, or virtual currencies and is classified as a subset of digital currencies.
  • Cryptocurrency can be defined as distributed accounting system based on cryptography, storing information about the state of ownership in conventional units.
  • The state of ownership of a cryptocurrency is related to individual system blocks called “portfolios”. Only the holder of the corresponding private key would have control over a given portfolio and it is impossible to issue the same unit twice.

Question 5.
Explain in detail the Unified payments interface
Answer:
(i) Unified Payments Interface (UPI) is a real-time payment system developed by the National Payments Corporation of India (NCPI) to facilitate inter-bank transactions.

(ii) It is simple, secure, and instant payment facility. This interface is regulated by the Reserve Bank of India and used for transferring funds instantly between two bank accounts through mobile (platform) devices. http://www. npci.org.in/

(iii) Unlike traditional e-wallets, which take a specified amount of money from the user and store it in its own account, UPI withdraws and deposits funds directly from the bank account whenever a transaction is requested.

(iv) It also provides the “peer-to-peer” collect request which can be scheduled and paid as per requirement and convenience.

(v) UPI is developed on the basis of Immediate Payment Service (IMPS). To initiate a transaction, UPI applications use two types of addresses – global and local.

  • The global address includes bank account numbers and IFSC.
  • Local address is a virtual payment address.

(vi) Virtual payment address (VPA) also called UPI-ID, is a unique ID similar to email id
(e.g. name@bankname) that enables us to send and receive money from multiple banks and prepaid payment issuers.

(vii) Bank or the financial institution allows the customer to generate VPA using a phone number associated with the Aadhaar number and bank account number. VPA replaces bank account details thereby completely hides critical information.

(Viii) The MPIN (Mobile banking Personal Identification Number) is required to confirm each payment. UPI allows operating multiple bank accounts in a single mobile application.

(ix) Some UPI application also allows customers to initiate the transaction using only Aadhaar number in absence VPA.

Advantages:

  1. Immediate money transfers through mobile devices round the clock 24 × 7.
  2. Can use a single mobile application for accessing multiple bank accounts.
  3. Single Click Authentication for transferring of the fund.
  4. It is not required to enter the details such as Card no, Account number, IFSC, etc. for every transaction.
  5. Electronic payments will become much easier without requiring a digital wallet or credit or debit card.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

12th Computer Applications Guide Electronic Payment Systems Additional Important Questions and Answers

Part A

Choose The Correct Answers

Question 1.
An electronic payment system is also called as …………………….
(a) liquidation
(b) clearing system
(c) clearing services
(d) all of these
Answer:
(d) all of these

Question 2.
The term credit card was first mentioned in ……………..
a) 1885
b) 1887
c) 1991
d) 1987
Answer:
b) 1887

Question 3.
I: Micro Electronic payments are expensive public-key cryptography.
II: Security of Micro Electronic Payment is low
(a) t-True, II-False
(b) I-False, II-True
(c) Both I, II are true
(d) Both I, II-False
Answer:
(b) I-False, II-True

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 4.
…………… is an Indian domestic open-loop card.
a) visa
b) Master
c) Rupay
d) Mastro
Answer:
c) Rupay

Question 5.
Rupaywas launched in
a) 2012
b) 2005
c)2017
d) 2019
Answer:
a) 2012

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
How many card-based payment systems are available (based on the transaction settlement method)
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 7.
……………. is the first six digits of the credit card number to uniquely identify financial institutions.
a) BIN
b) UNF
c) CVC2
d) UDI
Answer:
a) BIN

Question 8.
……………………… is an electronic payment system normally used for retail transactions.
Answer:
Credit Card

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 9.
…………. is a type of fraud where the same cryptocurrency is spent in more than one transactions.
a) booting
b) Interpreting
c) Double spend
d) None of these
Answer:
c) Double spend

Question 10.
……………….. allow users to make electronic transactions quickly and Securely
a) E-banking
b) Net banking
c) E-wallets
d) None of these
Answer:
c) E-wallets

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 11.
The term credit card was first mentioned in the sci-fi normal in the year ………………………
(a) 1997
(b) 1887
(c) 1987
(d) 1897
Answer:
(b) 1887

Question 12.
………… is the activity of buying or selling commodities through online services or over the Internet.
a) Mobile Banking
b) Internet banking
c) Both A and B
d) None of these
Answer:
b) Internet banking

Assertion And Reason

Question 1.
Assertion (A): An Electronic payment system is a financial arrangement
Reason(R): K consists of an intermediator to facilitate the transfer of money-substitute between a payer and a receiver.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 2.
Assertion (A): Microelectronic Payment Systems is an online payment system designed to allow efficient and frequent payments of small amounts.
Reason(R): A payment system is an essential part of a company’s financial operations.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Assertion (A) Payment cards are plastic cards that enable cashless payments.
Reason(R): Payment cards do not contain a chip.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 4.
Assertion (A): Credit card Allows purchases over the Internet installments.
Reason(R): credit cards are not accepted worldwide.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 5.
Assertion (A): All Payment cards (including debit cards) are usually plastic cards of size.
Reason (R): It is of size 85.60 mm width x 53.98 mm height, rounded corners with a radius of 2.88 mm to 3.48 mm, and thickness of 0.76 mm.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
Assertion (A): EMV chip is an integrated chip in addition to magnetic stripe to store cardholder’s information
Reason(R): CVC2 is used in contact transactions.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 7.
Assertion (A): The RFID symbol is four curved lines radiating rightwards similar to a tilted Wi-Fi symbol.
Reason(R): RFID indicates that it is a contactless smartcard.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 8.
Assertion (A): Cryptocurrency is a unique virtual (digital) asset designed to work as a medium of exchange using a cryptographic algorithm
Reason(R): Cryptocurrency is also called as Bitcoins.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 9.
Assertion (A): The bitcoin payment system, was developed in 2005
Reason(R): The function of cryptocurrency is based on technologies such as Mining, Blockchain, Directed Acyclic Graph, Distributed register (ledger).
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Question 10.
Assertion (A): Unified Payments Interface (UP!) is a real-time payment system developed by the National Payments Corporation of India (NCPI)
Reason(R): URI to facilitate inter-bank transactions.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Find The Odd One On The Following

1. (a) Paytm
(b) Bitcoin
(c) Amazon
(d) UPI
Answer:
(c) Amazon

2. (a) Customer
(b) Fund Transfer
(c) Service provider
(d) payment processor
Answer:
(b) Fund Transfer

3. (a) Hash chain
(b) Hash collision
(c) Hash secret
(d) Hash Sequences
Answer:
(c) Hash secret

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

4. (a) Bearer
(b) Provider
(c) Acquirer
(d) Merchant
Answer:
(b) Provider

5. (a) EFTPOS
(b) Offline debit
(c) Purush card system
(d) Authorization
Answer:
(d) Authorization

6. (a) ECS
(b) EFT
(c) GST
(d) RTGS
Answer:
(d) RTGS

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

7. (a) Crypto coins
(b) E-cash
(c) Virtual currencies
(d) Statistical Currencies
Answer:
(c) Virtu! currencies

8. (a) Mining
(b) Acyclic graphics
(c) ledger
(d) Debitor\Creditor
Answer:
(d) Debitor\Creditor

9.(a) Bitshares
(b) Master coin
(c) Trading
(d) WXT
Answer:
(c) Trading

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

10. (a). Paypal
(b) SBI Buddy
(c) Paytm
(d) Flipkart
Answer:
(d) Flipkart

Match The Following:

Question 1.
EFTPOS – Signature Debit
Offline Debit – PIN Debit
Closed Loop – Multi-Purpose
Open Loop – Single Purpose
Answers
1. PIN Debit table
2. Signature Debit
3. Single Purpose
4. Multi-Purpose

Question 2.
Hologram – Contactless Smart Card
RFID Symbol – Card Holder Information
EMV Chip – Emblem
Publisher – Prevents Duplication
Answers
1. card Holder Information
2. Emblem
3. prevents Duplication
4. contactless Smart Card

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Abbreviations:
1. UPI – Unified Payment Interface
2. MII – Major Industry Identifier
3. IIN – Issuer Identifier Number
4. BIN – Bank Identification Number
5. EMV – Europay, MasterCard, Visa
6. RFID –
7. CVV – Card Verification Code
8. ECS – Electronic Clearing Services
9. EFT – Electronic Fund Transfer
10 RTGS – Real Time Gross Settlement System
11. PoS – Point of Sale
12. NEFT – National Electronic Fund Transfer
13. RBI – Reserve Bank of India
14. IDRBT – Institute for Development and Research in Banking Technology
15. ICO – Initial Coin Offer
16. OTP – One-Time password
17. ACH – Automated Clearing House
18. NCPI – National Payment Corporation of India
19. IMPS – Immediate Payment Service
20. VPA – Virtual Payment Address
21. BHIM – Bharat Interface for Money
22. NPCI – National Payment Corporation of India

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Very Short Answers

Question 1.
What is the use of (POS) Point of Sale Terminal?
Answer:
It enables customers to make payments for the purchase of goods and services by means of credit and debit cards.

Question 2.
What are payment cards?
Answer:
Payment cards are plastic cards that enable cashless payments.

Question 3.
What are the two types of electronic payment systems?
Answer:
Microelectronic payment system and Macro electronic payment system

Question 4.
What are the three types of cards using for payment systems?
Answer:
Credit card, Debit card, Stored value card

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 5.
What are the two types of payment systems?
Answer:
Cash payment system and Non-cash payment system

Question 6.
What is a credit card payment system?
Answer:
A credit card is an electronic payment system normally used for retail transactions.

Question 7.
What is a debit card payment system?
Answer:
It is an electronic payment card where the transaction amount is deducted directly from the card holder’s bank account upon authorization.

Question 8.
What is a Magnetic stripe?
Answer:
It is an iron-based magnetic material containing encrypted data about the cardholder and account number.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 9.
What is an EMV chip?
Answer:
It is an integrated chip in addition to a magnetic stripe to store the card holder’s information.

Question 10.
What is Hologram?
Answer:
A hologram is a security feature that prevents duplication.

Question 11.
What is the use of real-time gross settlement?
Answer:
It is used for the settlement of transactions between financial institutions

Question 12.
What is Cryptocurrency?
Answer:
A cryptocurrency is a unique virtual asset designed to work as a medium of exchange.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 13.
What algorithm is used for Cryptocurrency?
Answer:
Cryptographic algorithm

Question 14.
What is Bitcoin?
Answer:
Bitcoin is the most popular and the first decentralized cryptocurrency

Question 15.
What is Altcoin?
Answer:
Altcoins is the collective name for all cryptocurrencies that appeared after Bitcoin.

Question 16.
What is Mining?
Answer:
The cryptocurrency units are created by the solution of cryptographic tasks called mining.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 17.
What is Blockchain?
Answer:
Blockchains are an open distributed book that records transactions of cryptocurrencies

Question 18.
What is the use electronic wallet?
Answer:
It is used to allow users to make electronic transactions quickly and securely over the Internet

Question 19.
What is another name of mobile banking?
Answer:
Net banking or m-banking

Question 20.
Who developed Unified Payments Interface (UPI)?
Answer:
National Payments Corporation of India (NCPI)

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Years To Remember

1887The term credit card was first mentioned
1920The modern credit cards concept was born in the U.S.A
2011Altcoins Litecoin and Namecoin appeared
2013Cryptocurrency platforms began
20142nd generation of cryptocurrency appeared

Part B

Short Answers

Question 1.
Write a note on payment cards?
Answer:
Payment cards are plastic cards that enable cashless payments. They are a simple embossed plastic card that authenticates the cardholder on behalf of a card issuing company, which allows the user to make use of various financial services.

Question 2.
Define liquidation or clearing system or clearing service.
Answer:

  • An Electronic payment system is a financial arrangement that consists of an intermediator to facilitate the transfer of money-substitute between a payer and a receiver.
  • It is known as liquidation, clearing system, or clearing service.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
What is the role of the Electronic payment system?
Answer:
Electronic payment system ensures the transfer of value from one subject of the economy to another and plays an important role in modern monetary systems.

Question 4.
What are the two types of payment systems?
Answer:
Payment systems are generally classified into two types. They are

  1. Microelectronic Payment Systems
  2. Macro Electronic Payment Systems

Question 5.
Define COD?
Answer:
Cash on delivery (COD) also called a collection on delivery describes a mode of payment in which the payment is made only on receipt of goods rather than in advance.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
List some popular macro on-line payment systems.
Answer:

  • Some popular macro on-line payment systems are
  • Card-based payment systems
  • Electronic account transfer
  • Electronic cash payment systems
  • Mobile payment systems and ¡nternetspayment systems

Question 7.
What are the three widely used card-based payment systems?
Answer:

  1. Credit card-based payment systems (pay later)
  2. Debit card-based payment systems (pay now)
  3. Stored value card-based payment systems (pay before)

Question 8.
What is mean by Credit Card?
Answer:

  • Credit card is an electronic payment system normally used for retail transactions.
  • A credit card enables the bearer to buy goods or services from a vendor, based on the cardholder’s promise to the card issuer to pay back the value later with the agreed interest.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 9.
How merchant will be one of the Key Players in the operations of credit cards?
Answer:
Storekeeper or vendor who sells or providing service, receiving payment made by its customers through the credit card.

Question 10.
How Acquirer will be one of the Key Players in the operations of credit cards?
Answer:
Merchant’s bank that is responsible for receiving payment on behalf of merchant sends authorization requests to the issuing bank through the appropriate channels.

Question 11.
What is mean by RFID symbol?
Answer:

  • RFID symbol is four curved lines radiating rightwards similar to a tilted Wi-Fi symbol.
  • It indicates that it is a contactless smartcard.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 12.
Define Hologram.
Answer:
A hologram is a security feature that prevents duplication. It is a 3-dimensional image formed by interference of light beams.

Question 13.
What is mean by CVC/CVV?
Answer:

  • CVV – Card Verification value
  • CVC – Card Verification code
  • It is a 3 digit code usually printed to the left of the signature pane that validates the card.

Question 14.
What is mean by Debit Card?
Answer:
Debit Card is an electronic payment card where the transaction amount is deducted directly from the card holder’s bank account upon authorization.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 15.
What is Smart card?
Answer:

  • A plastic card with a built-in microprocessor used typically to perform financial transactions.
  • The modern version of card-based payment is smart cards.
  • Smart card along with the regular features of any card-based payment system holds an EMV chip.

Question 16.
What are the two varieties for the stored-value cards?
Answer:
There are two varieties for the stored-value card.

  1. Closed-loop (single purpose)
  2. Open-loop (multipurpose)

Question 17.
List the advantages of smart card.
Answer:
The advantage of Smart cards is that it can

  • Provide Identification
  • Authentication
  • Data Storage
  • Application Processing.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 18.
What are the two types of smart card?
Answer:
Smart cards can be classified into

  1. Contact smart cards
  2. Contactless smart cards.

Question 19.
What is mean E-cash?
Answer:

  • Electronic cash is (E-Cash) is a currency that flows in the form of data.
  • It converts the cash value into a series of encrypted sequence numbers and uses these serial numbers to represent the market value of various currencies in reality.

Question 20.
List the advantages of Internet Banking.
Answer:

  • The advantages of Internet banking are that the payments are made at the convenience of the account holder and are secured by user name and password, i.e. with Internet access it can be used from anywhere in the world and at any time.
  • Any standard browser (e.g. Google Chrome) is adequate. Internet banking does not need installing any additional software.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Part C

Explain In Brief Answer

Question 1.
How will you do the Microelectronic payment transactions?
Answer:
In general, the parties involved in the micro on-line payments are the Customer, Service Provider, and Payment processor. The Microelectronic payment transactions can be explained in the following way.

  • Step 1: Customer proves his authentication and the payment processor issues micropayments.
  • Step 2: Customer pays the micropayments to the online service provider and gets the requested goods or services from them.
  • Step 3: Service provider deposits micro payments received from the customer to the payment processor and gets the money.

Question 2.
Write a short note on Real Time Gross Settlement?
Answer:

  • Real-Time Gross Settlement system (RTGS) is a payment system particularly used for the settlement of transactions between financial institutions, especially banks.
  • As the name indicates, RTGS transactions are processed in real-time.
  • RTGS payments are also called push payments that are initiated(“triggered”) by the payer.
  • RTGS payments are generally large-value payments, i.e. high-volume transactions.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 3.
Mention the advantages of a credit card?
Answer:
Advantages of credit card:

  1. Most credit cards are accepted worldwide.
  2. It is not necessary to pay physical money at the time of purchase. The customer gets an extra period to pay for the purchase.
  3. Depending on the card, there is no need to pay an annuity.
  4. Allows purchases over the Internet in installments.
  5. Some issuers allow “round up” the purchase price and pay the difference in cash to make the transactions easy.

Question 4.
What are three ways of processing debit card transactions?
Answer:
Three ways of processing debit card transactions are

  1. EFTPOS (also known as online debit or PIN debit)
  2. Offline debit (also known as signature debit)
  3. Electronic Purse Card System

Question 5.
Define
(i) Closed Loop
(ii) Open Loop
Answer:
(i) Closed Loop

  • In closed-loop cards, money is metaphorically stored on the card in the form of binary-coded data.
  • Closed-loop cards are issued by a specific merchant or merchant and can only be used to make purchases from specific places, e.g. Chennai metro rail travel cards.

(ii) Open loop (multipurpose)

  • Open-loop cards can be used to make debit transactions at a variety of retailers.
  • It is also called prepaid-debit cards.
  • It can be used anywhere the branded cards are accepted, e.g. Visa gift cards.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 6.
Give the two types of Real-time gross settlement transactions?
Answer:
Real-time gross settlement transactions are:
Unconditional – the beneficiary will receive funds regardless of whether he fulfills his obligations to the buyer or whether he would deliver the goods or perform a service of a quality consistent with the order.

Irrevocable – a correctly processed transaction cannot be reversed and its money cannot get refunded (the so-called settlement finality).

Part D

Explain In Detail

Question 1.
Explain Debit Card?
Answer:
Debit Card:
Debit Card is an electronic payment card where the transaction amount is deducted directly from the card holder’s bank account upon authorization.

Generally, debit cards function as ATM cards and act as a substitute for cash The way of using debit cards and credit cards is generally the same but unlike credit cards, payments using a debit card are immediately transferred from the cardholder’s designated bank account, instead of them paying the money back at a later with added interest. In the modern era, the use of debit cards has become so widespread.

The debit card and credit card are identical in their physical properties. It is difficult to differentiate two by their appearance unless they have the term credit or debit imprinted. Currently, there are three ways of processing debit card transactions:

  1. EFTPOS (also known as online debit or PIN debit)
  2. Offline debit (also known as signature debit)
  3. Electronic Purse Card System

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 2.
Explain in detail the Credit card Number.
Answer:

  • Credit card number: The modern credit card number has a 16-digit unique identification number.
  • The first digit of the credit card number is Major Industry Identifier (Mil).
    • It identifies the issuer category.
    • e.g. 1 – Airlines,4 – Banks
  • The next 5 digits uniquely identify the issuing organization.
  • The first 6 digits together called as Issuer Identifier Number (IIN) or Bank Identification Number (BIN).
  • The next 9 digits are the account number.
  • The last digit is a check digit (based to the Luhn algorithm).

Question 3.
Write in detail about the classification of smart cards
Answer:
(i) Contact smart cards

  • Contact smart cards have a contact area of approximately 1 square centimeter, comprising several gold-plated contact pads.
  • These pads provide electrical connectivity only when inserted into a reader, which is also used as a communications medium between the smart card and a host. e.g. a point of sale terminal(POS).

(ii) Contactless smart cards

  • Contactless smart card is empowered by RF induction technology.
  • Unlike contact smart cards, these cards require only near proximity to an antenna to communicate.
  • Smartcards, whether they are the contact or contactless cards do not have an internal power source.
  • Instead, they use an inductor to capture some of the interrupting radio-frequency signals, rectify it, and power the card’s processes.

Samacheer Kalvi 12th Computer Applications Guide Chapter 16 Electronic Payment Systems

Question 4.
Write the steps to transfer funds using Net Banking.
Answer:

  • Step 1; Login to net banking account using unique user name and password provided by the bank earlier.
  • Step 2: Add the beneficiary as a payee to enable transfer of fund. The following details like Account Number, Name, IFSC about the beneficiary are to be filled in the ‘Add New Payee’ section.
  • Step 3: Once the beneficiary Is added, choose RTGS / NEFT / IMPS as mode of Fund Transfer.
  • Step 4: Select the account to transfer money from, select the payee, enter the amount to be transferred and add remarks (optional).
  • Step 5: Click on submit.
  • Step 6: Enter the OTP received to mobile number linked to the corresponding account to complete the transaction.

Question 5.
Explain the advantages of UPI?
Answer:

  • Immediate money transfers through mobile device round the clock 24 × 7.
  • Can use single mobile application for accessing multiple bank accounts.
  • Single Click Authentication for transferring of fund.
  • It is not required to enter the details such as Card no, Account number, IFSC etc. for every transaction.
  • Electronic payments will become much easier without requiring a digital wallet or credit or debit card

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 5 PHP Function and Array Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 5 PHP Function and Array

12th Computer Applications Guide PHP Function and Array Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
Which one of the following is the right way of defining a function in PHP?
a) function { function body }
b) data type functionName(parameters) { function body }
c) functionName(parameters) { function body }
d) function functionName(parameters) { function body }
Answer:
d) function functionName(parameters) { function body }

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 2.
A function in PHP which starts with (double underscore) is known as ……………
a) Magic Function
b) Inbuilt Function
c) Default Function
d) User Defined Function
Answer:
a) Magic Function

Question 3.
PHP’s numerically indexed array begins with position …………….
a) 1
b) 2
c) 0
d) -1
Answer:
c) 0

Question 4.
Which of the following are correct ways of creating an array?
i) state[0] = “Tamilnadu”;
ii) $state[] = array(“Tamilnadu”);
iii) $state[0] = “Tamilnadu”;
iv) $state = array(“Tamilnadu”);
a) iii) and iv)
b) ii) and iii)
c) Only i)
d) ii), iii) and iv)
Answer:
d) ii), iii) and iv)

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 5.
What will be the output of the following PHP code?
<?php
$a=a rray (“A”,”Cat”,”Dog “,”A”,”Dog “);
$b=a rray C’A” “A” “Cat”,”A”,”Tiger”);
$c=array_combine($a,$b);
print__r(array_count_va!ues($c));
?>
a) Array ([A] => 5 [Cat] = > 2 [Dog] => 2 [Tiger] = >1)
b) Array ([A] => 2 [Cat] => 2 [Dog] => 1 [Tiger] = > 1)
c) Array ( [A] => 6 [Cat] => 1 [Dog] -> 2 [Tiger] = > 1)
d) Array ([A] => 2 [Cat] => 1 [Dog] => 4 [Tiger] = > 1)
e) None of these
Answer:
e) None of these

Question 6.
For finding nonempty elements in array we use
a) is„array () function
b) sizeof () function
c) array_count () function
d) count () function
Answer:
b) sizeof () function

Question 7.
Indices of arrays can be either strings or numbers and they are denoted as
a) $my_array {4}
b) $my_array [4]
c) $my_array | 4 |
d) None of them
Answer:
d) None of them

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 8.
PHP arrays are also called as
a) Vector arrays
b) Perl arrays
c) Hashes
d) All of them
Answer:
a) Vector arrays

Question 9.
As compared to associative arrays vector arrays are much
a) Faster
b) Slower
c) Stable
d) None of them
Answer:
b) Slower

Question 10.
What functions count elements in an array?
a) count
b) Sizeof
c) Array_Count
d) Count_array
Answer:
a) count

Part II

Short Answers

Question 1.
Define Function in PHP.
Answer:
In most of the programming language, a block of the segment in a program that performs specific operation tasks (Insert, Execute, Delete, Calculate, etc.). This segment is also known as Function. A Function is a type of subroutine or procedure in a program.

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 2.
Define User define Function.
Answer:

  • User-Defined Function (UDF) in PHP gives a privilege to the user to write their own specific: operation inside of existing program module.
  • A user-defined function declaration begins with the keyword “function”.
  • Users can write any custom logic inside the function block.

Question 3.
What is parameterized Function?
Answer:
Parameterized Function:

  1. PHP Parameterized functions are the functions with parameters or arguments.
  2. Required information can be shared between function declaration and function calling part inside the program.
  3. The parameter is also called as arguments, it is like variables.
  4. The arguments are mentioned after the function name and inside of the parenthesis.
  5. There is no limit for sending arguments, just separate them with a comma notation.

Question 4.
List out System defined Functions.
Answer:

  • is_bool() function -By using this function, we can check whether the variable is a boolean variable or not.
  • is_int() function 3y using this function, we can check the input variable is an integer or not.
  • is_float() function-By using this function, we can check the float variable is an integer or not.
  • is_null() function-By using the is_null function, we can check whether the variable is NULL or not.

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 5.
Write Syntax of the Function in PHP.
Answer:
SYNTAX:
function functionName()
{
Custom Logic code to be executed;
}

Question 6.
Define Array in PHP.
Answer:
Array is a concept that stores more than one value of the same data type (homogeneous) in the single array variable. They are 3 types of array in PHP.

  1. Indexed Arrays
  2. Associative Array and
  3. Multi-Dimensional Array

Question 7.
Usage of Array in PHP.
Answer:
The array() function is used to create an array.
In PHP, there are three types of arrays:

  • Indexed arrays – Arrays with a numeric index
  • Associative arrays – Arrays with named keys
  • Multidimensional arrays – Arrays containing one or more arrays

Question 8.
List out the types of the array in PHP.
Answer:
They are 3 types of array concepts in PHP.

  1. Indexed Arrays,
  2. Associative Array and
  3. Multi-Dimensional Array.

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 9.
Define associative array.
Answer:
Associative arrays are a key-value pair data structure. Instead of having storing data in a linear array, with associative arrays you can store your data in a collection and assign it a unique key which you may use for referencing your data.

Question 10.
Write array Syntax in PHP.
Answer:
array(key=>value,key=>value,key=> value,etc.); key = Specifies the key (numeric or string value – Specifies the value)

Part III

Explain in brief answer

Question 1.
Write the features System define Functions.
Answer:
System Defined Functions: A function is already created by system it is a reusable piece or block of code that performs a specific action. Functions can either return values when called or can simply perform an operation without returning any value.

Features of System defined functions:

  1. System defined functions are otherwise called as predefined or built-in functions.
  2. PHP has over 700 built in functions that performs different tasks.
  3. Built in functions are functions that exists in PHP installation package.

Question 2.
Write the purpose of parameterized Function.
Answer:

  • Information can be passed to functions through arguments.
  • An argument is just like a variable.
  • Arguments are specified after the function name, inside the parentheses. We can add as many arguments as you want, just separate them with a comma.

Question 3.
Differentiate user define and system define Functions.
Answer:

User-defined Functions.System define Functions
User-Defined Functions are the functions which are created by user as per his own requirements.System define Functions are Predefined functions.
In User Defined Functions, name of function can be changed any timeIn System Defined Functions, Name of function can’t be changed
In User Defined Functions, the name of function id de­cided by userIn System Defined Functions, it is giv­en by developers.

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 4.
Write Short notes on Array.
Answer:
Array is a concept that stores more than one value of same data type (homogeneous) in single array variable. They are 3 types of array concepts in PHP.

  1. Indexed Arrays,
  2. Associative Array and
  3. Multi-Dimensional Array.

Question 5.
Differentiate Associate array and Multidimensional array.
Answer:

Associate arrayMultidimensional array
Associative arrays are arrays that use named keys that you assign to them.Array containing one or more arrays.
It storing data in a linearMultidimensional arrays that are two, three, four, five, or more levels deep.
We can associate name with each array elements in PHP using => symbol.It can be represented in the form of a matrix which is represented by row * column.

Part IV

Explain in detail

Question 1.
Explain Function concepts in PHP.
Answer:
Functions in PHP
In most the programming language, a block of segments in a program that performs specific operation tasks (Insert, Execute, Delete, Calculate, etc.). This segment is also known as Function. A Function is a type of subroutine or procedure in a program.

Function will be executed by a call to the Function and the Function returns any data type values or NULL value to called Function in the part of the respective program.
The Function can be divided into three types as follows:

  1. User-defined Function,
  2. Pre-defined or System or built-in Function, and
  3. Parameterized Function.

1. User-Defined Function:
User-Defined Function (UDF) in PHP gives a privilege to the user to write own specific operation inside of existing program module. Two important steps the Programmer has to create for users to define Functions are Function declaration and Function calling.

2. System Define Functions:
A function is already created by system it is a reusable piece or block of code that performs a specific action. Functions can either return values when called or can simply perform an operation without returning any value.

3. Parameterized Function:
PHP Parameterized functions are the functions with parameters or arguments.

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 2.
Discuss in detail User-defined Functions.
Answer:

  • User-Defined Function (UDF) in PHP givesa privilege to user to write own specific operation inside of existing program module.
  • Two important steps the Programmer has to cre-ate for users define Functions are:

Function Declaration

  • A user-defined Function declaration begins with the keyword “function”.
  • User can write any custom logic inside the function block.

Syntax:
function functionName()
{
Custom Logic code to be executed;
}

Function Calling:

  • A function declaration part will be executed by a ! call to the function.
  • Programmer has to create Function Calling part j inside the respective program.

Syntax:
functionName();

Example:
<?php
function insertMsg() {
echo “Student Details Inserted Successfully!”;
}
insertMsg(); // call the function
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 3.
Explain the Multidimensional Array.
Answer:
Multidimensional Arrays:

  1. A multidimensional array is an array containing one or more arrays.
  2. PHP understands multidimensional arrays that are two, three, four, five, or more levels deep.
  3. However, arrays more than three levels deep are hard to manage for most people.

Example:
<?php
// A two-dimensional array Sstudent-array
(
array(“Iniyan”, 100,96),
array(“Kavin”,60,59),
array(“Nilani”,1313,139)
);
echo $$student[0][0].“: Tamil Mark: “.$student [0][1]English mark: “.$student [0] [2].”<br>”;

echo $$student[1][0].“: Tamil Mark: “.$student [1][1].”. English mark: “.$student [1] [2].”<br>”;

echo $$student[2][0].“: Tamil Mark: “.$student [2][1]English mark: “.$student [2] [2].”<br>”;
?>

Question 4.
Explain Array concepts and their types.
Answer:
Array is a concept that stores more than one value of same data type (homogeneous) insingle array variable. They are 3 types of array con¬cepts in PHP.

  1. Indexed Arrays,
  2. Associative Array and
  3. Multi-Dimensional Array.

Indexed Arrays

Arrays with numeric index for the available values in array variable which contains keyvalue pair as user / developer can take the values using keys.

Associative Arrays

  • Associative arrays are a key-value pair data structure.
  • Instead of having storing data in alinear array, with associative arrays you can store your data in a collection and assign it aunique key which you may use for referencing your data.

Multidimensional Arrays

  • A multidimensional array is an array containing one or more arrays.
  • PHP understands multidimensional arrays that are two, three, four, five, or more levels deep.
  • However, arrays more than three levels deep are hard to manage for most people.

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 5.
Explain Indexed array and Associatearray in PHP.
Answer:
Indexed Arrays:
Arrays with numeric index for the available values in array variable which contains key value pair as user / developer can take the values using keys.
Example:
<?php
$teacher_name=array(“Iniyan”, “Kavin”, “Nilani”);
echo “The students name are “ . $teacher_name[0]. “, “ . $$teacher_name[l]. “ and” . $teacher_name[2].
?>

Associative Arrays:

  1. Associative arrays are a key-value pair data structure.
  2. Instead of having storing data in a, linear array, with associative arrays you can store your data.

Example:
<?php
$Marks=array(“Student1”=>“35”,“Student2”==>“17”,“Student3”=>“43”);
echo “Student1 mark is” . $Marks[‘Student1’]. “ is eligible for qualification”;
echo “Student2 mark is” . $Marks[‘Student2’]. “ is not eligible for qualification”;

12th Computer Applications Guide Introduction to Hypertext Pre-Processor Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
A block of the segment in a program that performs specific operation tasks is known as
a) Arrays
b) Segments
c) Functions
d) All of these
Answer:
c) Functions

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 2.
PHP has over ………………………. built-in functions.
(a) 200
(b) 500
(c) 700
(d) 900
Answer:
(c) 700

Question 3.
is a concept that stores more than one value of the same data type in a single array variable,
a) Arrays
b) Segments
c) Functions
d) All of these
Answer:
a) Arrays

Question 4.
………………….. arrays are a key-value pair data structure.
a) Associative
b) Indexed
c) Multi-dimensional
d) All of these
Answer:
b) Indexed

Question 5.
Find the wrong statement from the following?
(a) pre-defined functions are called built-in functions
(b) pre-defined functions are called system functions
(c) parameterized functions are called system functions
Answer:
(c) parameterized functions are called system functions

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Fill in the blanks:

1. PHP has over …………. functions built-in that perform different tasks.
Answer:
700

2. PHP functions are dived into …………. types.
Answer:
three

3. A user-defined Function declaration begins with the keyword ………….
Answer:
function

4. The parameter is also called………….
Answer:
arguments

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

5. Array defines with the keyword ………….
Answer:
array()

SYNTAX

1. Function Declaration:
function functionName()
{
Custom Logic code to be executed;
}

2. Function Calling:
functionName();

3. Indexed Arrays:
$Array_Variable = array( “valuel”, “value2″”value2”);

4. Associative Arrays
array(key=>value,key=>value,key=>- value,etc.);

Choose the incorrect statements;

1. a) PHP Functions are Reducing duplication of code
b) PHP Functions are Decomposing complex problems into simpler pieces
c) PHP Functions are Improving the clarity of the code
d) PHP Functions are collections of variables.
Answer:
d) PHP Functions are collections of variables.

2. a) PHP Functions are Reuse of code
b) PHP Functions are Information hiding
c) PHP Parameterized functions are the functions without parameters
d) PHP arrays are using For each looping concepts
Answer:
c) PHP Parameterized functions are the functions without parameters

3. a) Array is a collection of heterogeneous data
b) An Array is a block of code that performs a specific action.
c) A function is already created by the system it is a reusable piece
d) An array is a special variable, which can hold more than one value at a time.
Answer:
b) An Array is a block of code that performs a specific action.

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 4.
a) An array is a block of statements that can be used repeatedly in a program.
b) The index can be assigned automatically in a collection of the data set
c) A multidimensional array is an array containing one or more arrays.
d) Associative arrays are arrays that use named keys that you assign to them.
Answer:
a) An array is a block of statements that can be used repeatedly in a program.

5. a) User Defined Function (UDF) in PHP gives a privilege to the user to write own specific operation inside of existing program module.
b) A user-defined Function declaration begins with the keyword “function”.
c) A Function is a type of subroutine or procedure in a program.
d) A Function will not be executed by a call to the Function
Answer:
d) A Function will not be executed by a call to the Function

Match the following:

1. Indexed Arrays – System function
2. Associative Arrays – Function with arguments
3. Multidimensional Arrays – Key value pair
4. Parameterized function – Array containing one or more array
5. Predefined function – Numeric Index

Answer:
1. Numeric Index
2. Key valued pair
3. Array containing one or more array
4. Function with arguments
5. System Function

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Very Short Answers

Question 1.
Classify functions?
Answer:
The Function can be divided into three types as follow:

  1. User-defined Function
  2. Pre-defined or System or built-in Function, and
  3. Parameterized Function.

Question 2.
What is an associative array?
Answer:
Associative arrays are arrays that use named keys that you assign to them.

Question 3.
How index will be assigned in an indexed array?
Answer:
The index can be assigned automatically in a collection of the data set

Question 4.
What is a Multi-Dimensional Array?
Answer:
A multidimensional array is an array containing one or more arrays.

Part B

Short Answers

Question 1.
Write a PHP program for function with one arguments?
Answer:
<?php
function School_Name($sname) {
echo $sname.“in Tamilnadu.<br>”;
}
SchoolName (“Government Higher Secondary School Madurai”);
SchoolName (“Government Higher Secondary School Trichy”);
School Name (“Government Higher Secondary School Chennai”);
School Name (“Government Higher Secondary School Kanchipuram”);
School Name (“Government Higher Secondary School Tirunelveli”);
?>

Samacheer Kalvi 12th Computer Applications Guide Chapter 5 PHP Function and Array

Question 2.
Give important characteristics of PHP functions?
Answer:

  1. PHP Functions are Reducing duplication of code.
  2. PHP Functions are Decomposing complex problems into simpler pieces.
  3. PHP Functions are Improving the clarity of the code.
  4. PHP Functions are Reuse of code.
  5. PHP Functions are Information hiding.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Economics Guide Pdf Chapter 12 Introduction to Statistical Methods and Econometrics Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Economics Solutions Chapter 12 Introduction to Statistical Methods and Econometrics

12th Economics Guide Introduction to Statistical Methods and Econometrics Text Book Back Questions and Answers

Part – I

Multiple Choice questions

Question 1.
The word ‘statistics’ is used as ……………..
a) Singular
b) Plural
c) Singular and Plural
d) None of above
Answer:
c) Singular and Plural

Question 2.
Who stated that statistics as a science of estimates and probabilities.
a) Horace Secrist
b) R. A Fisher
c) Ya – Lun – Chou
d) Boddington
Answer:
d) Boddington

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 3.
Sources of secondary data are ……………..
a) Published sources
b) Unpublished sources
c) neither published nor unpublished sources
d) Both (A) and (B)
Answer:
d) Both (A) and (B)

Question 4.
The data collected by questionnaires are ………………….
a) Primary data
b) Secondary data
c) Published data
d) Grouped data
Answer:
a) Primary data

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 5.
A measure of the strength of the linear relationship that exists between two variables is called:
a) Slope
b) Intercept
c) Correlation coefficient
d) Regression equation
Answer:
c) Correlation coefficient

Question 6.
If both variables X and Y increase or decrease simultaneously, then the coefficient of correlation will be:
a) Positive
b) Negative
c) Zero
d) one
Answer:
a) Positive

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 7.
If the points on the scatter diagram indicate that as one variable increases the other variable tends to decrease the value of r will be :
a) Perfect positive
b) Perfect negative
c) Negative
d) Zero
Answer:
c) Negative

Question 8.
The value of the coefficient of correlation r lies between :
a) 0 and 1
b) -1 and 0
c) -1 and +1
d) -0.5 and +0.5
Answer:
c) -1 and +1

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 9.
The term regression was used by :
a) Newton
b) Pearson
c) Spearman
d) Galton .
Answer:
d) Galton .

Question 10.
The purpose of simple linear regression analysis is to:
a) Predict one variable from another variable
b) Replace points on a scatter diagram by a straight-line
c) Measure the degree to which two variables are linearly associated
d) Obtain the expected value of the independent random variable for a given value of the dependent variable
Answer:
a) Predict one variable from another variable

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 11.
A process by which we estimate the value of dependent variable on the basis of one or more independent variables is called:
a) Correlation
b) Regression
c) Residual
d) Slope
Answer:
b) Regression

Question 12.
If Y = 2 – 0.2 X, then the value of Y-intercept is equal to
a)-0.2
b) 2
c) 0.2 X.
d) All of the above
Answer:
b) 2

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 13.
In the regression equation Y = β0+ β1 X, the Y is called
a) Independent variable
b) Dependent variable
c) Continuous variable
d) none of the above
Answer:
b) Dependent variable

Question 14.
In the regression equation X =β0+ β1 X, the X is called :
a) Independent variable
b) Dependent variable
c) Continuous Variable
d) none of the above
Answer:
a) Independent variable

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 15.
Econometrics is the integration of
a) Economics and Statistics
b) Economics and Mathematics
c) Economics, Mathematics, and Statistics
d) None of the above
Answer:
c) Economics, Mathematics, and Statistics

Question 16.
Econometric is the word coined by
a) Francis Gal ton
b) RagnarFrish
c) Karl Person
d) Spearsman
Answer:
b) RagnarFrish

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 17.
The raw materials of Econometrics are :
a) Data
b) Goods
c) Statistics
d) Mathematics
Answer:
a) Data

Question 18.
The term Uiin regression equation is
a) Residuals
b) Standard error
c) Stochastic error term
d) none
Answer:
c) Stochastic error term

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 19.
The term Uiis introduced for the representation of
a) Omitted Variable
b) Standard error
c) Bias
d) Discrete Variable
Answer:
a) Omitted Variable

Question 20.
Econometrics is the amalgamation of
a) 3 subjects
b) 4 subjects
c) 2 subjects
d) 5 subjects
Answer:
a) 3 subjects

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

PART-B

Answer the following questions in one or two sentences.

Question 21.
What is Statistics?
Answer:

  1. The term‘Statistics’is used in two senses: as singular and plural.
  2. In singular form it simply means statistical methods.
  3. Statistics when used in singular form helps in the collection, presentation, classification and interpretation of data to make it easily comprehensible.
  4. In its plural form it denotes collection of numerical figures and facts.
  5. In the narrow sense it has been defined as the science of counting and science of averages.

Question 22.
What are the kinds of Statistics?
Answer:

  • Descriptive statistics
  • Inferential statistics

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 23.
What do you mean by Inferential Statistics?
Answer:

  1. The branch of statistics concerned with using sample data to make an inference about a population of data is called Inferential Statistics.
  2. It draws conclusion for the population based on the sample result.
  3. It uses hypotheses, testing and predicting on the basis of the outcome.
  4. It tries to understand the population beyond the sample.

Question 24.
What are the kinds of data?
Answer:
Data may be classified Based on characteristics.

  1. Quantitative Data
  2. Qualitative Data Based on sources:
  3. Primary Data
  4. Secondary Data.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 25.
Define Correlation.
Answer:
Correlation is a statistical device that helps to analyse the covariation of two or more variables. Sir Francis Galton, is responsible for the calculation of correlation coefficient.

Question 26.
Define Regression.
Answer:
Regression means going back and it is a mathematical measure showing the average relationship between two variables.

Question 27.
What is Econometrics?
Answer:
Origin Of Econometrics:

  1. Economists tried to support their ideas with facts and figures in ancient times.
  2. Irving Fisher is the first person, developed mathematical equations in the quantity theory of money with help of data.
  3. Ragnar Frisch, a Norwegian economist and statistician named the integration of three subjects such that mathematics, statistical methods, and economics as Econometrics” in 1926.

PART – C

Answer the following questions in one paragraph.

Question 28.
What are the functions of Statistics?
Answer:

Functions of Statistics:

  1. Statistics presents facts in a definite form.
  2. It simplifies mass of figures.
  3. It facilitates comparison.
  4. It helps in formulating and testing.
  5. It helps in prediction.
  6. It helps in the formulation of suitable policies.

(I) Statistics are an aggregate of facts:
For example, numbers in a calendar pertaining to a year will not be called statistics, but to be included in statistics it should contain a series of figures with relationships for a prolonged period.

(II) Statistics are numerically enumerated, estimated and expressed.

(III) Statistical collection should be systematic with a predetermined purpose:
The purpose of the collection of statistics should be determined beforehand in order to get accurate information.

(IV) Should be capable of being used as a technique for drawing comparison:
It should be capable of drawing comparisons between two different sets of data by tools such as averages, ratios, rates, coefficients etc.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 29.
Find the Standard Deviation of the following data: 14, 22, 9, 15, 20, 17, 12, 11
(Answer: = 4.18)
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 1

Question 30.
State and explain the different kinds of Correlation.

1) Based on the direction of changé of variables:

  • Positive correlation
  • Negative correlation

2) Based upon the number of variables studied:

  • Simple correlation
  • Multiple correlations

3) Partial correlation
Based upon the constancy of the ratio of change between the variables:-

  • Linear correlation 1
  • Non-linear correlation

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 31.
Mention the uses of Regression Analysis.
Answer:

  1. Regression means going back and it is a mathematical measure showing the average relationship between two variables.
  2. Both the variables may be random variables.
  3. It indicates the cause and effect relationship between the variables and establishes a functional relationship.
  4. Besides verification, it is used for the prediction of one value, in relation to the other given value.
  5. The regression coefficient is an absolute figure. If we know the value of the independent variable, we can find the value of the dependent variable.
  6. In regression, there is no such spurious regression.
  7. It has wider application, as it studies linear and nonlinear relationships between the variables.
  8. It is widely used for further mathematical treatment.

Question 32.
Specify the objectives of econometrics.
Answer:

  1. It helps to explain the behaviour of a forthcoming period that is forecasting economic phenomena.
  2. It helps to prove the old and established relationships among the variables or between the variables.
  3. It helps to establish new theories and new relationships.
  4. It helps to test the hypotheses and estimation of the parameter.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 33.
Differentiate the economic model with the econometric model.
Answer:
Economic Model:

  1. Economic model is the theoretical construct that represents the complex economic process.
  2. Economic model is based on mathematical modeling.
  3. Economic model is focused on establishing the logical relationships between the variables in the model.
  4. Economic model is applied in stating the theoretical relationship into mathematical equations.
  5. Economic model believes that the outcome is certain and exact. So disturbance term is not required.
  6. Economic model is deterministic in nature.
  7. The Keynesian consumption function: C = a + by is the economic model

Econometric Model:

  1. Econometric model is the statistical concept that represents the numerical estimate of the variables involved in economic process.
  2. Econometric model is based on statistical modeling.
  3. Econometric model is focused on estimating the magnitude and direction of relationship between the variables.
  4. Econometric model is applied in stating the empirical extent of the economic model.
  5. Econometric model believes that outcome is certain but not exact. So disturbance term plays the vital role.
  6. Econometric model is stochastic in nature.
  7. The Keynesian consumption function: C = a + by + µ is the econometric model

Question 34.
Discuss the important statistical organizations (offices) in India.
Answer:

  • The Ministry of statistics has two wings, statistics and programme Implementation.
    The statistics wing called the National Statistical office (NSO) consists of the central Statistical office ((SO), the computer center and the National Sample Survey office (NSSO).
  • There is also National Statistical commission created through a Resolution of Government of India and an autonomous Institute (ie) Indian Statistical Institute.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 35.
Elucidate the nature and scope of Statistics.
Answer:
Nature of Statistics:

  1. Different Statisticians and Economists differ in views about the nature of statistics, some call it a science and some say it is an art.
  2. Tippett on the other hand considers Statistics both as a science as well as an art.

Scope of Statistics:
Statistics is applied in every sphere of human activity – social as well as physical – like Biology, Commerce, Education, Planning, Business Management, Information Technology, etc.

Statistics and Economics:

  1. Statistical data and techniques are immensely useful in solving many economic problems
  2. Such as fluctuation in wages, prices, production, distribution of income and wealth and so on.

Statistics and Firms:
Statistics is widely used in many firms to find whether the product is conforming to specifications or not.

Statistics and Commerce:

  1. Statistics are the lifeblood of successful commerce.
  2. Market survey plays an important role to exhibit the present conditions and to forecast the likely changes in future.

Statistics and Education:

  1. Statistics is necessary for the formulation of policies to start new courses, according to the changing environment.
  2. There are many educational institutions owned by public and privately engaged in research and development work to test the past knowledge and evolve new knowledge.
  3. These are possible only through statistics.

Statistics and Planning:
1. Statistics is indispensable in planning. In the modem world, which can be termed as the “world of planning”, almost all the organisations in the government are seeking the help of planning for efficient working, for the formulation of policy decisions and execution of the same.

2. In order to achieve the above goals, various advanced statistical techniques are used for processing, analyzing and interpreting data.

3. In India, statistics play an important role in planning, both at the central and state government levels, but the quality of data highly unscientific.

Statistics and Medicine:

  1. In Medical Sciences, statistical tools are widely used. In order to test the efficiency of a new drug or to compare the efficiency of two drugs or two medicines, a t-test for the two samples is used.
  2. More and more applications of statistics are at present used in clinical investigation.

Statistics and Modern applications:

  1. Recent developments in the fields of computer and information technology have enabled statistics to integrate their models and thus make statistics a part of the decision-making procedures of many organisations.
  2. There are many software packages available for solving simulation problems.

Question 36.
Calculate the Karl Pearson Correlation Co-efficient for the following data
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 2
Answer : r = 0.9955
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 3

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 37.
Find the regression equation Y on X and X on Y for the following data:
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 4
(Answer : Y = 0.787X + 7.26, and X = 0.87Y + 26.65)
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 5
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 6
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 7
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 8

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 38.
Describe the application of Econometrics in Economics.
Answer:

  1. To forecast macroeconomics indicators:
    Econometrical methods are used to forecast macroeconomic indicators, Time – series models can be used to make predictions about economic indicators.
  2. To Support Mathematical Economic Model:
    Tinbergen points out that “Econometrics as a result of certain outlook on the role of economics, consists of the application of mathematical statistics to economic data to lend empirical support to the models constructed by mathematical economics and to obtain numerical results.’
  3. Econometric methods are used for the firms in a number of ways like to determine minimum wage rate, factors responsible for the firm to remain in the market, Market Functions etc.

12th Economics Guide Introduction to Statistical Methods and Econometrics Additional Important Questions and Answers

I. Match the following:

Question 1.
a) Contribution to vital statistics – 1) Kautilya
b) Father of statistics – 2) GP Nelson
c) Arthashastra – 3) Akbar’s rule
d) ‘Am – .e – Akbari – 4) Ronald Fisher
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 9
Answer:
c) 3 4 1 2

Question 2.
a) Quantitative Data – 1) Collected for the first time
b) Qualitative Data – 2) Data from NSSO
c) Primary Data – 3) Number of firms
d) Secondary Data – 4) Gender
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 10
Answer:
c) 3 4 1 2

II. Choose the correct pair

Question 1.
a) Mean – Special Average
b) Geometric Mean – Simple Average
c) Standard Deviation – Root mean square deviation
d) Dispersion – frequency deviation
Answer :
c) Standard Deviation – Root mean square Deviation

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 2.
a) Correlation – Irving Fisher
b) Regression – Karl Pearson
c) Quantity theory – Francis Dalton
d) Econometrics – Ragnar Frisch
Answer:
d) Econometrics – Ragnar Frisch

III. Choose the incorrect pair

Question 1.
a) Statistics Day – June 29
b) NSSO – 1960
c) P. C. Mahalanobis – father of statistics in India.
d) Central Statistical office – New Delhi
Answer :
b) NSSO -1960

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 2.
a) Positive correlation – Y = a – bx
b) Simple correlation – Y = a + bx
c) Non linear correlation – Y = a + bx2
d) Multiple correlation – Qd = f (p, Pc,Ps, t, y)
Answer:
a) Positive correlation – Y = a – bx

IV. Pick the odd one out

Question 1.
a) Scatter diagram method
b) Graphic Method
c) Karl Pearson’s coefficient of regression
d) Method of least squares
Answer:
c) Karl Pearson’s coefficient of regression

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 2.
a) Simple correlation
b) Multiple correlations
c) Partial correlation
d) Positive correlation
Answer:
d) Positive correlation

V. Choose the correct statement

Question 1.
a) Correlation means “stepping back towards the Average”
b) Universal law of regression was given by Karl Pearson
c) Econometrics is concerned with the empirical determination of economic laws.
d) Econometrics is the integration of economics and mathematics.
Answer:
c) Econometrics is concerned with the empirical determination of economic laws

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 2.
a) Mathematics is a science of estimates and probabilities.
b) Tipett considered statistics as a science.
c) Karl Pearson introduced the concept of standard deviation
d) Correlation is a statistical device that helps to analyse the covariation of two or more variables.
Answer:
d) Correlation is a statistical device that helps to analyse the covariation of two or more variables.

VI. Choose the incorrect statement

Question 1.
a) Sir Francis Galton, is responsible for the calculation of the correlation coefficient.
b) If three variables are taken for study it is called a simple correlation.
c) Indian statistical institute is declared as an Institute of National importance by as Act of parliament.
d) The ministry of statistics and programme Implementation came into existence in 1999
Answer:
b) If three variables are taken for study it is called a simple correlation.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 2.
a) Econometrics may be considered as the integration of economics, statistics
and Accountancy
b) Ragnar Frish was awarded the Nobel prize in 1969.
c) The coefficient of correlation is a relative measure.
d) Regression is used for the further mathematical treatment of the variables.
Answer:
a) Econometrics may be considered as the integration of economics, statistics, and Accountancy.

VII. Fill in the blanks.

Question 1.
The term statistics originated in the Latin word known as ………………………….
(a) Statistik
(b) Status
(c) Statistique
(d) Statistics
Answer:
(b) Status

Question 2.
“Statistics is a science of estimates and probabilities” is a statement of …………………
a) Ronald Fisher
b) Boddington
c) Croxton
d) Cowdeg
Answer:
b) Boddington

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 3.
The first book to have statistics as its title was ………………………….
(a) Contributions to vital statistics
(b) Principles of statistics
(c) Statistics principles
(d) Statistics probabilities
Answer:
(a) Contributions to vital statistics

Question 4.
To test the efficiency of a new drug or to compare the efficiency of two drugs ………….. test in used.
a) t-test
b) f-test
c) chi-test
d) None
Answer:
a) t-test

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 5.
The branch of statistics devoted to the summarization and description of data is called …………….. statistics.
a) Interential
b) Descriptive
c) hypothetical
d) None
Answer:
b) Descriptive

Question 6.
Who is the father of statistics?
(a) Gottfried Achenwall
(b) Francis GP. Nelson
(c) Ronald Fisher
(d) R.A. Fisher
Answer:
(d) R.A. Fisher

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 7.
Karl Pearson introduced the concept of standard deviation is ………………….
a) 1891
b) 1892
c) 1893
d) 1894
Answer :
c) 1893

Question 8.
Statistics are the lifeblood of success………………………….
(a) Maths
(b) Datas
(c) Calculations
(d) Commerce
Answer:
(d) Commerce

VIII. Answer the following in one or two sentences.

Question 1.
Write five averages?
Answer:

  1. There are five averages.
  2. Among them mean, median, and mode are called simple averages and the other two averages geometric mean and harmonic mean are called special averages.

Question 2.
What is partial correlation?
Answer:
If there are more than two variables but only two variables are considered keeping the other variables constant, then the correction is said to be a partial correlation.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 3.
Write the kinds of dispersion?
Answer:
There are two kinds of measures of dispersion, namely

  1. The absolute measure of dispersion
  2. A relative measure of dispersion

Question 4.
Mention the methods of studying the correlation.
Answer:

  1. Scatter diagram method.
  2. Graphic method.
  3. Karl person’s coefficient of correlation
  4. Method of least squares.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 5.
State the formula to compute Karl person co-efficient of correlation.
Answer:
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 11

Question 6.
Explain the advantages of the Scatter diagram method?
Answer:
Advantages of the Scatter Diagram method:

  1. It is a very simple and non-mathematical method
  2. It is not influenced by the size of an extreme item.
  3. It is the first step in resting the relationship between two variables.

Question 7.
What are the types of Averages?
Answer:
There are five averages. Mean, median, and mode are called simple averages and geometric mean and harmonic mean are called special averages.

IX. Answer the following question in paragraph

Question 1.
Differentiate Descriptive and Inferential statistics.
Answer:

Descriptive StatisticsInferential Statistics
It describes the population under study.It draws conclusions for the population based on the sample result.
It presents the data in a meaning ­ful way through charts, diagrams, graphs, other than described in words.It uses hypotheses, testing, and predicting on the basis of the outcome.
It gives a summary of data.It tries to understand the population beyond the sample.

Question 2.
Briefly explain the kinds of measures of dispersion?
Answer:
There are two kinds of measures of dispersion, namely

  1. The absolute measure of dispersion
  2. A relative measure of dispersion

The absolute measure of dispersion indicates the amount of variation in a set of values in terms of units of observations. Relative measures of dispersion are free from the units of measurements of the observations. They are pure numbers. They are used to compare the variation in two or more sets, which are having different units of measurements of observations. Standard Deviation is one of the methods of Absolute measure of dispersion.

Karl Pearson introduced the concept of standard deviation in 1893. Standard deviation is also called Root- Mean Square Deviation. The reason is that it is the square – root of the mean of the squared deviation from the arithmetic mean. It provides accurate results. The Square of standard deviation is called Variance.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 3.
Explain the Characteristics of statistics.
Answer:

  • Statistics are an aggregate of facts.
  • Statistics are numerically enumerated, estimated, and expressed.
  • The statistical collection should be systematic with a predetermined purpose.
  • Should be capable of being used as a technique for drawing a comparison.

Question 4.
What are the limitations of statistics?
Answer:

  1. Statistics is not suitable to the study of the qualitative phenomenon
  2. Statistical laws are not exact.
  3. The statistics table may be misused.
  4. Statistics is only one of the methods of studying a problem.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 5.
Write a short note on NSSO.
Answer:
The National sample survey organization, now known as the National sample survey office, is an organization under the ministry of statistics of the Government of India. It is the largest organization in India, conducting regular socio-economic surveys. It was established in 1950.
NSSO has four divisions:

  • Survey Design and Research Division (SDRD)
  •  Field Operations Division (FOD)
  • Data processing division (DPD)
  • Co-ordination and Publication Division (CPD)

Question 6.
Calculate the standard deviation from the following data by the Actual Mean method.
Answer:
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 12
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 13

Question 6.
Write the assumptions of the Linear Regression Model?
Answer:
Assumptions of the Linear Regression Model:
The Linear regression model is based on certain assumptions

  1. Some of them refer to the distribution of the random variable.
  2. Some of them refer to the relationship between Ui and the explanatory variables (x1, x2, x3 given in the above example).
  3. Some of them refer to the relationship between Ui the explanatory variables themselves.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

X. Answer the following questions

Question 1.
Distinguish between correlation and Regression.
Answer:

CorrelationRegression
Correlation is the relationship between two or more variables, which vary with the other in the same or the opposite direction.Regression means going back and it is a mathematical measure showing the average relationship between
two variables.
Both the variables X and Y are random variables.Both the variables may be random variables.
There may be a spurious correlation between the two variables.In regression, there is no such spurious regression.
It has limited application because it is confined only to linear relationships be­tween the variables.It has wider application, as it stud­ies linear and nonlinear relation­ship between the variables.
It is not very useful for further mathemat­ical treatment.It is widely used for further mathe­matical treatment.

Question 2.
Explain the difference between correlation and regression?
Answer:
Difference between Correlation and Regression:
Correlation:

  1. Correlation is the relationship between two or more variables, which vary with the other in the same or the opposite direction.
  2. Both the variables X and Y are random variables.
  3. It finds out the degree of relationship between two variables and not the cause and effect relationship.
  4. It is used for testing and verifying the relation between two variables and gives limited information.
  5. The coefficient of correlation is a relative measure. The range of relationships lies between -1 and +1.
  6. There may be a spurious correlation between the two variables.
  7. It has limited application because it is confined only to a linear relationship between the variables.
  8. It is not very useful for further mathematical treatment.

Regression:

  1. Regression means going back and it is a mathematical measure showing the average relationship between two variables.
  2. Both the variables may be random variables.
  3. It indicates the cause and effect relationship between the variables and establishes the functional relationship.
  4. Besides verification, it is used for the prediction of one value, in relation to the other given value.
  5. The regression coefficient is an absolute figure. If we know the value of the independent variable, we can find the value of the dependent variable.
  6. In regression, there is no such spurious regression.
  7. It has wider application, as it studies the linear and nonlinear relationships between the variables.
  8. It is widely used for further mathematical treatment.

Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics

Question 3.
Find the coefficient of correlation with the actual mean Method for the following data:
E:\imagess\ch 10\Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 14.png
Answer:
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 15
Samacheer Kalvi 12th Economics Guide Chapter 12 Introduction to Statistical Methods and Econometrics 16

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 4 Introduction to Hypertext Pre-Processor Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 4 Introduction to Hypertext Pre-Processor

12th Computer Applications Guide Introduction to Hypertext Pre-Processor Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
What does PHP stand for?
a) Personal Home Page
b) Hypertext Preprocessor
c) Pretext Hypertext Processor
d) Pre-processor Home Page
Answer:
b) Hypertext Preprocessor

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 2.
What does PHP files have a default file extension?
a) .html
b) .xml
c) .php
d) .ph
Answer:
c) .php

Question 3.
A PHP script should start with………….. and end with …………….
a) <php>
b) < ? php ?>
c) < ? ? >
d) < ?php ? >
Answer:
b) < ? php ?>

Question 4.
Which of the following must be installed on your computer so as to run PHP script?
a) Adobe
b) windows
c) Apache
d) IIS
Answer:
c) Apache

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 5.
We can use to ………… comment a single line?
i) /?
ii) //
iii) #
iv) /* */
a) Only (ii)
b) (i), (iii) and (iv)
c) (ii), (iii) and (iv)
d) Both (ii) and (iv)
e) Both (ii) and (iii)
Answer:
e) Both (ii) and (iii)

Question 6.
Which of the following PHP statement/statements will store 41 in variable num?
(i) $x = 41;
(ii) $x = ’41’;
(iii) (i) $x = “41”;
a) Both (i) and (ii)
b) All of the mentioned,
c) Only (iii)
d) Only (i)
Answer:
d) Only (i)

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 7.
What will be the output of the following PHP code?
<?php
$num = 1;
$num1 = 2;
print $num . “+‘ $numl ;
a) 3
b) 1+2
c) 1.+.2
d) Error
Answer:
c) 1.+.2

Question 8.
Which of the following PHP statements will output Hello World on the screen?
a) echo (“Hello World”);
b) print (“Hello
World”);
c) printf (“Hello World”);
d) sprintf (“Hello
World”);
Answer:
a) echo (“Hello World”);

Question 9.
Which statement will output $x on the screen?
a) echo “\$x”;
b) echo “$$x”;
c) echo “/$x”;
d) echo “$x;
Answer:
b) echo “$$x”;

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 10.
Which of the below symbols is a newline character?
a) \r
b) \n
c) /n
d) /r
Answer:
a) \r

Part II

Short Answers

Question 1.
What are the common usages of PHP?
Answer:

  • It is a very simple and lightweight open-source server-side scripting language.
  • It can easily embed with HTML and other client-side scripting languages like CSS (Cascading Style Sheets) and Javascript.
  • It also creates dynamic and interactive Webpages in the red time Web development projects.

Question 2.
What is a Web server?
Answer:

  • A Web sewer is Software that uses HTTP (Hypertext Transfer Protocol) to serve the files that form Web pages to users
  • Web server software that runs on server hardware, governs the server-side scripting compilation into an intermediate bytecode that is then interpreted by the runtime engine,

Question 3.
What are the types of a scripting language?
Answer:
Web scripting languages are classified into two types, client-side and server-side scripting language. PHP is completely different from Client-side scripting language like Javascript. The PHP code entirely executes on Webserver which is installed in the remote machine.

Question 4.
Differentiate between Client and Server?
Answer:

ClientServer
The client-side environment used to run scripts is usually a browser.The server-side environment that runs a scripting language Is a web server.
Does not need server InteractionRequires server interaction.
Example: HTML, CSS, JavaScript etc.Example PHP, ASP.net, Ruby on Rails, Python, etc.

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 5.
Give few examples of Web Browser?
Answer:

  • Internet Explorer
  • UC Browser
  • Opera
  • Google Chrome and
  • Mozilla Firefox.

Question 6.
What is a URL?
Answer:

  • URL is the abbreviation of Uniform Resource Locator
  • It is the address of a specific Web page or fiie on the Internet,
  • URL is made up four parts-protocols, hostname, folder name and fiie name,
  • Example: http://www.googie.com/

Question 7.
Is PHP a case sensitive language?
Answer:
Yes, smaller case & uppercase letters are different in PHP.

Examples
If you defined a variable in lowercase, then you need to use it in lowercase everywhere In the program.

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 8.
How to declare variables in PHP?
Answer:

  • Variable name must always begin with a $ symbol.
  • Variable name can never start with a number,
  • Variable names are case-sensitive.

Question 9.
Define Client-Server Architecture.
Answer:
The client-server architecture introduces an application sharing mechanism between two different hardware systems over the network (Internet/intranet).

Question 10.
Define Web server.
Answer:
A Web server is Software that uses HTTP (Hyper-text Transfer Protocol) to serve the files that form
Web pages to users.

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Part III

Explain in brief answer

Question 1.
Write the features of server side scripting language.
Answer:

  • Server-side scripting offers greater protection for user privacy
  • It often reduces the loading rime for web pages
  • Some browsers don’t fully support JavaScript, so server-side scripting is essential to run dynamic pages on these browsers.

Question 2.
Write is the purpose of Web servers?
Answer:

  1. Webserver is software which is running in server hardware.
  2. It takes the responsibilities for the compilation and execution of server-side scripting languages.
  3. After receiving the request from the client machine the Web server tries to compile and interpret the PHP code which is available in remote machine.
  4. Next a response will be generated and sent back to the client machine over the network from Webserver.

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 3.
Differentiate Server side and Client Side Scripting language.
Answer:

Basis for
comparison
Server-side scriptingCiient-side scripting
BasicWorks in the back end which could not be visible at the client end.Works at the front end and script are visible among the users.
ProcessingRequires server interaction.Does not need interaction with the server.
Languages involvedPHP, ASP.net, Ruby on Rails, ColdFusion, Python, et­cetera.HTML, CSS, JavaScript, etc.
AffectCould effectively customize the web pages and provide dynamic websites.Can reduce the load to the server.
SecurityRelatively secure.Insecure

Question 4.
In how many ways you can embed PHP code in an HTML page?
Answer:

  1. PHP script can be written inside of HTML code and save the file with an extension of .php. The embedded PHP file gets executed in the Webserver, the browser receives only the HTML and other client-side files.
  2. Php files can also be embedded with css and js files.
  3. Using template engines like Smarty, DWOO, Mustache, Blade we can embed PHP files.

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 5.
Write short notes on PHP operator.
Answer:
An operator is a symbol which is used to perform mathematical and logical operations in programming languages.
Different types of the operator in PHP are:

  1. Arithmetic operators
  2. Assignment operators
  3. Comparison operators
  4. Increment/Decrement operators
  5. Logical operators and
  6. String operators

Part IV

Explain In Detail

Question 1.
Explain client-side and server-side scripting language.
Answer:
Web scripting languages are classified into two types, client-side and server-side scripting language.
Client-side Environment

  • The client-side environment used to run scripts is usually a browser.
  • The processing takes place on the end-users computer.
  • The source code is transferred from the webserver to the user’s computer over the internet and run directly in the browser,
  • The scripting language needs to be enabled on the client computer. Sometimes if a user is conscious of security risks they may switch the scripting facility off. .
  • When this is the case a message usually pops up to alert the user when the script Is attempting to run.

Server-side Environment

  • A server is a computer system that serves as a central repository of data and programs and is shared by clients
  • The server-side environment that runs a scripting language is a web server.
  • A user’s request is fulfilled by running a script directly on the webserver to generate dynamic HTML pages.
  • This HTML is then sent to the client browser.
  • It is usually used to provide interactive websites that interface to databases or other data stores on the server.
  • This is different from client-side scripting where scripts are run by the viewing web browser, usually in JavaScript.
  • The primary advantage to server-side scripting is the ability to highly customize the response based on the user’s requirements, access rights, or queries into data stores.

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 2.
Discuss in detail Website develop¬ment activities.
Answer:
The process of development also includes Web content generation, Web page designing, Website security, and so on.
PHP Script:

  1. Website or Web page is developed by the programmer using PHP script. Finally, the entire Website codes are moved to the Web server path in a remote server machine.
  2. From the client-side, the end-user opens a browser, types the URL of the Website or Webpage, and initiates the request to the remote server machine over the network.
  3. After receiving the request from the client machine the Web server tries to compile and interpret the PHP code which is available in a remote machine.
  4. Next, a response will be generated and sent back to the client machine over the network from Webserver.
  5. Finally, the browser which is installed in the client machine receives the response and displays the output to the user.

Question 3.
Explain the process of Webserver installation.
Answer:
The following are the steps to install and config¬ure Apache Httpd Web server and PHP module in windows server machine.
Step 1:
Go to the Apache foundation Website and download the Httpd Web server Software.
https://httpd.apache.org/download.cgi

Step 2:

  • After downloading. MSI file from Apache foundation Website, the user launches the. MSI file and clicks next and next button to finish the installation on the server machine.
  • The software takes default port number 130 or 130130.
  • Once the user finished, the Web server software is installed and configured on the server hardware machine as a service.

Step 3:

  • To test the installation of the Apache Http Web server, enter the following URL from your Web browser which is installed in your client machine.
    https://iocalhost:130/ or https:// localhost:130130
  • The output page that says “Its works”

Step 4:

  • Administrator user can start, stop and restart the Web server service at any time via the Windows Control panel.
  • Once the services stops, the client machine will not receive the response message from server machine.

Step 5:

  • Webserver’s configuration setting file “httpd. conf ” is located in the conf directory under the apache installation directory.
  • Edit this file and enable the PHP module to run PHP scripting language.

Question 4.
Discuss in detail PHP data types.
Answer:
PHP scripting language supports 13 primitive data types.
Data Types plays important role in all programming languages to classify the data according to the logic.
PHP supports the following data types.

  1. String
  2. Integer
  3. Float
  4. Boolean
  5. Array
  6. Object
  7. NULL
  8. Resource
Data typeExplanationExample
StringThe string is a collection of characters within the double or single quotes$x = “Computer Application!”;
IntegerAn integer is a data type which contains non-decimal numbers.$x = 59135;
FloatFloat is a data type which contains decimal numbers,$x = 19.15;
BooleanBoolean is a data type which denotes the possible two states, TRUE or FALSE$x = true;
$y = false;
ArrayThe array is a data type which has multiple values in a single variable.$cars = arrayC’Computer”,”Laptop”, Mobile”);
ObjectIt is a data type which contains information about data and function inside the class.$school_obj = new School ();
NULLNull Is a special data type which contains s single value; NULL$x = null;
ResourcesThe resource is a specific variable, it has a reference to an external resource.Shandle = fopen(“note.txt” “r”); var_dump($handle);

Question 5.
Explain operators in PHP with examples.
Answer:
The operator is a symbol that is used to perform mathematical and logical operations in programming languages,
Different types of the operator in PHP are:

  1. Arithmetic operators,
  2. Assignment operators,
  3. Comparison operators,
  4. Increment/Decrement operators,
  5. Logical operators, and
  6. String operators,
  7. Arithmetic operators

The Arithmetic operators in PHP perform genera! arithmetical operations, such as addition, subtraction, multiplication and division etc

SymbolOperator NamePurpose
+AdditionThis operator performs the process of adding numbers
SubtractionThis operator performs the process of subtracting numbers
*MultiplicationThis operator performs the process of multiplying numbers
/DivisionThis operator performs the process of dividing numbers
%ModulusThis operator performs the process of finding remainder in division

operation of two numbers

Assignment Operators:

  • Assignment operators are performed with numeric values to store a value to a variable.
  • The default assignment operator is This operator sets the left side operant value of expression to right side variable.
AssignmentSimilar toDescription
x = yx = yThis operator sets the left side operant value of expression to right side variable
x += yx = x+ yAddition
x- = yx = x – ySubtraction
x* = yx = x*yMultiplication
x/ = yx = x/yDivision
x % = yx = x % yModulus

Comparison Operators:

  • Comparison operators perform an action to compare two values.
  • These values may contain integer or string data types (Numbers or Strings).
SymbolOperator NameSymbolOperator Name
==Equal>Greater than
===Identical<less than
! =Not equal>=Greater than or equal to
<>Not equal<=Less than or equal to
!==Not identical

Increment and Decrement Operators:

  • Increment and decrement operators are used to perform the task of increasing or decreasing the variable’s value.
  • This operator is mostly used during iterations in the program logics.
OperatorNameDescription
++$xPre-incrementIncrement $x value by one, then returns $x
$x++Post-incrementReturns $x, then increments $x by one
—$xPre-decrementDecrements $x by one, then returns $x
$x~Post-decrementReturns $x, then decrements $x by one

Logical Operators:
Logical Operators are used to combine conditional statements.

SymbolOperator NameExampleResult
&&And$x && $yTrue if both $x and $y are true
||Or$x || $yTrue if either $x or $y is true
!Not!$xTrue if $x is not true
xorXor$x xor $yTrue if either $x or $y is true, but not both

String Operators:
Two operators are used to perform string related operations such as Concatenation and Concatenation assignment (Appends).

OperatorNameExampleResult
Concatenation$textl . $ text2Concatenation of $txtl and $txt2
.=Concatenation$textl .= $ text2Appends $txt2 to $txtl

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

12th Computer Applications Guide Introduction to Hypertext Pre-Processor Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
The variable in PHP begins with a dollar ………… symbol.
a) @
b) #
c) $
d) %
Answer:
c) $

Question 2.
……………………… Scripting languages was introduced to support Internet online business.
(a) Server
(b) Client
(c) Web
(d) Online
Answer:
(c) Web

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 3.
In PHP, a Variable name can never start with a ………….
a) alphabet
b) number
c) both a and b
d) either a or b
Answer:
b) number

Question 4.
PHP scripting language supports …………. primitive data types.
a) 10
b) 11
c) 12
d) 13
Answer:
d) 13

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 5.
CSS means
(a) combined script style
(b) cascading style sheets
(c) calculated spreadsheet
(d) consecutive script sheets
Answer:
(b) cascading style sheets

Question 6.
PHP was invented in ………….
a) 1992
b) 1993
c) 1994
d) 1995
Answer:
c) 1994

Question 7.
PHP can embed with ………….
a) HTML
b) CSS
c) Javascript
d) All of the above
Answer:
d) All of the above

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 8.
JSP means
(a) Joint Server photographs
(b) Java Server pages
(c) Java Script program
(d) Active script pages
Answer:
(b) Java Server pages

Question 9.
PHP also creates ………… Webpages in thereat time Web development projects,
a) Dynamic
b) interactive
c) both a and b
d) None of these
Answer:
c) both a and b

Question 10.
78.9 % of Website are developed by ………… scripting language.
a) ASP
b) JSP
c) VbScript
d) PHP
Answer:
d) PHP

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 11.
Which of the following is an assignment operator?
a) =
b) = =
c) = = =
d) ! = =
Answer:
a) =

Question 12.
CGI stands for
(a) Common Gateway Interface
(b) Call Gateway Interrupt
(c) Cold Gateway Interface
(d) Client Gateway Interface
Answer:
(a) Common Gateway Interface

Question 13.
Which of the following is a non-identical operator?
a) =
b) = =
c) = = =
d) ! = =
Answer:
d) ! = =

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 14.
Which of the following is an equal operator?
a) =
b) = =
c) = = =
d) ! = =
Answer:
b) = =

Question 15.
Find the Correct one
(i) PHP is an open source
(ii) Apache tom cat supports PHP
(iii) MS-ITS Supports PHP
(a) Only (i) is true
(b) (ii), (iii) – True
(c) (i), (ii) – True
(d) (i), (ii), (iii) – True
Answer:
(d) (i), (ii), (iii) – True

Question 16.
………….is a collection of characters within the double or single quotes
a) String
b) Boolean
c) Integer
d) Float
Answer:
a) String

Question 17.
Boolean is a data type which denotes …………
a) Integer numbers
b) Decimal point numbers
c) True or False state
d) Array
Answer:
c) True or False state

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 18.
…………is a data type which has multiple values in a single variable.
a) Integer numbers
b) Decimal point numbers
c) True or False state
d) Array
Answer:
d) Array

Question 19.
How many client-server architecture models there?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Question 20.
………… is a data type which contains information about data and function inside the class.
a) Integer numbers
b) Array
c) True or False state
d) Array
Answer:
d) Array

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Abbreviations:

  • ASP – Active Server Page
  • JSP – Java Server page
  • CSS – CascadingStyle Sheets
  • PHP – Hypertext Pre-processor
  • WWW – World Wide Web
  • CGI – Common Gatewaylnterface
  • OOPs – Object-Oriented Programming

Choose the incorrect sentences:

1. a) 25% of Websites are developed by PHP scripting language.
b) PHP is a Case Sensitive
c) PHP is a Simplicity Program language
d) PHP is an Open Source
Answer:
b) PHP is a Case Sensitive

2. a) PHP is an Efficiency Program language
b) PHP is a Platform dependent Program language
c) PHP is a Security Program language
d) PHP is a Flexibility Program language
Answer:
b) PHP ¡s a Platform dependent Program language

3. a) PHP is a Real-Time Access Monitoring Program
language
b) PHP Script should with “<Tag name>” and closes with “</Tagname>’
c) PHP files have a default file extension is .php.
d) PHP stands for Personal Home Page
Answer:
b) PHP Script should with “<Tag name>” and closes with “</Tagname>’

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

4. a) PHP can be executed via an interpreter which is installed in the Web servers or CGI.
b) PHP is an open-source community development initiation.
c) Website or Web page is developed by the programmer using PHP script only.
d) Three types of PHP Syntax are available.
Answer:
c) Website or Web page is developed by the programmer using PHP script only.

5. a) PHP script can be written inside of HTML code and save the file with an extension of .php.
b) The embedded PHP file gets executed in the Web server.
c) The browser receives only the HTML and other client-side files.
d) The raw PHP code ¡s visible ¡n browser which means that Compiler
Answer:
d) The raw PHP code ¡s visible ¡n browser which means that Compiler

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Find the odd one on the following

1. a) Python
b) C++
c) PHP
d) C
Answer:
a) Python

2. a) Microsoft SQL Server
b) Apache
c) Tomcat
d) Microsoft IIS
Answer:
a) Microsoft SQL Server

3. a) Default Syntax
b) Short open Tags
c) HTML Script embed Tags
d) Open Source
Answer:
d) Open Source

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

4. a) Array
b) Object
c) Structure
d) NULL
Answer:
d) NULL

5. a) Integer
b) Octal
c) Boolean
d) Float
Answer:
b) Octal

6. a) String
b) Binary
c) Resource
d) Boolean
Answer:
b) Binary

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

7. a) Arithmetic operators
b) Assignment operators
c) Comparison operators
d) Conditional Operator
Answer:
d) Conditional Operator

8. a) Increment operators
b) Decrement operators
c) Bitwise operator
d) Logical operators
Answer:
c) Bitwise operator

9. a) Ternary Operator
b) String operators.
c) Arithmetic Operator
d) Decrement Operator
Answer:
a) Ternary Operator

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

10. a) Average
b) Multiplication
c) Addition
d) Modulus
Answer:
a) Average

11. a) XOR
b) XNOR
c) AND
d) OR
Answer:
b) XNOR

12. a) =
b) = =
c) = = =
d) !=
Answer:
a) =

13. a) ! =
b) != –
c) < >
d)()
Answer:
d)()

14. a) &&
b) ||
c) !!
d) !
Answer:
c) !!

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

15. a) +
b) –
c) x
d) /
Answer:
c) x

Match the following:

1. String – Structured Information
2. Integer – Data and Function
3. Float – Database Connection
4. Boolean – Single value
5. Array – True/False
6. Object – Multiple values
7. NULL – Decimal numbers
8. Resource – Non- Decimal numbers
9. Var_dump() – Remainder
10. Modulus – Collection of characters
Answer:
1. Collection of characters
2. Decimal numbers
3. No-Decimal number
4. True/False
5. Multiple values
6. Data and functions
7. Single value
8. Database Connection
9. Structured information
10. Remainder

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Assertion and Reason

Question 1.
Assertion (A): The Web-based Internet application ensures the success of critical business in real-world competitions.
Reason (R): The legacy programming languages meet the expectations of the latest Internet concepts and executions.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 2.
Assertion (A): The Web-based Internet application ensures the success of critical business in real-world competitions.
Reason (R): The legacy programming languages meet the expectations of the latest Internet concepts and executions.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 3.
Assertion (A): PHP is a competitor and alternative for other server-side scripting languages like HTML and CSS.
Reason (R): Recent statistics of server-side scripting language usage depict that 78.9 % of Websites are developed by PHP scripting language.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Question 4.
Assertion (A): in the evolution of network architecture, various critical networks related problems are getting resolved by the client-server architecture model.
Reason (R): The client-server architecture introduces an application sharing mechanism between two different hardware systems over the network (Internet/intranet).
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 5.
Assertion (A): HTTP means HyperText Transfer Protocol. HTTP is the underlying protocol used by the World Wide Web
Reason (R); This protocol defines how messages are formatted and transmitted, and what actions Web servers and browsers should take in response to various commands
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Part B

Short Answers

Question 1.
Define Web browser?
Answer:

  • Web Browser: A Web browser (commonly referred to as a browser) is a software application for accessing information on the World Wide Web.
  • Each individual Web page, image, and video is identified by a distinct URL, enabling browsers to retrieve and display them on the user’s device.

Question 2.
Classification of Client-Server Architecture Model.
Answer:
Client-server architecture is classified into three types, as follows

  • Single Tier Architecture
  • Two-Tier Architecture
  • N/Multi/Three tire architecture.

Question 3.
Write a note on HTTP?
Answer:
HTTP:

  1. HTTP HyperText Transfer Protocol.
  2. HTTP is the underlying protocol used by the World Wide Web.
  3. This protocol defines how messages are formatted and transmitted.
  4. The actions were taken by web servers and browsers in response to various commands.

Question 4.
Write a note on the var-dump function?
Answer:
Var_dump:

  1. The var_dump( ) function is used to dump information about a variable.
  2. This function displays structured information such as the type and value of the given variable.
  3. Arrays and objects are explored recursively with values intended to show structure.

Part C

Explain in brief answer

Question 1.
Explain important features of PHP?
Answer:

  1. PHP is an Open Source
  2. PHP is a Case Sensitive
  3. PHP is a Simplicity Program language
  4. PHP is an Efficiency Program language
  5. PHP is a Platform Independent Program language
  6. PHP is a Security Program language
  7. PHP is a Flexibility Program language
  8. PHP is a Real-Time Access Monitoring Program language

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Question 2.
Write a short note on Var_dump() function with Example.
Answer:

  • The var_dump() function is used to dump information about a variable.
  • This function displays structured information such as the type and value of the given variable.
  • Arrays and objects are explored recursively with values intended to show structure.

Example;
<?php
$x = “COMPUTER APPLICATION!”;
$x = null; var_dump($x);
?>
OUTPUT; NULL

Question 3.
What do you mean by Resources?
Answer:

  • The resource is a specific variable.
  • It has a reference to an external resource.
  • These variables hold specific handlers to handle files and database connections irrespective PHP program.

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor

Part D

Explain in Detail

Question 1.
What are the three types of syntax in PHP? Explain them in detail.
Answer:
Default Syntax;
The default Syntax begins with “<?php”and closes with”?>”
Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor 1

Short open Tags

  • The Short open Tags begins with “<?” and closes with”?>”
  • But admin user has to enable Short style tags settings in the php.ini file on the server.

Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor 2

HTML Script embed Tags:
HTML Script embed Tags look just like HTML script tags.
Samacheer Kalvi 12th Computer Applications Guide Chapter 4 Introduction to Hypertext Pre-Processor 3

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 3 Introduction to Database Management System Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 3 Introduction to Database Management System

12th Computer Applications Guide Introduction to Database Management System Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
Which language is used to request information from a Database?
a) Relational
b) Structural
c) Query
d) Compiler
Answer:
c) Query

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 2.
The …………….. diagram gives a logical structure of the database graphically?
a) Entity-Relationship
b) Entity
c) Architectural Representation
d) Database
Answer:
a) Entity-Relationship

Question 3.
An entity set that does not have enough attributes to form a primary key is known as
a) Strong entity set
b) Weak entity set
c) Identity set
d) Owner set
Answer:
b) Weak entity set

Question 4.
_____ Command is used to delete a database.
a) Delete database database_name
b) Delete database_name
c) drop database database_name
d) drop database_name
Answer:
c) drop database database_name

Question 5.
Which type of below DBMS is MySQL?
a) Object-Oriented
b) Hierarchical
c) Relational
d) Network
Answer:
c) Relational

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 6.
MySQL is freely available and is open source.
a) True
b) False
Answer:
a) True

Question 7.
……………….. represents a “tuple” in a relational database?
a) Table
b) Row
c) Column
d) Object
Answer:
b) Row

Question 8.
Communication is established with MySQL using
a) SQL
b) Network calls
c) java
d) API’s
Answer:
a) SQL

Question 9.
Which is the MySQL instance responsible for data processing?
a) MySQL Client
b) MySQL Server
c) SQL
d) Server Daemon Program
Answer:
c) SQL

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 10.
The structure representing the organizational view of the entire database is known as _____ In MySQL database.
a) Schema
b) View
c) Instance
d) Table
Answer:
a) Schema

Part II

Short Answers

Question 1.
Define Data Model and list the types of data model used.
Answer:
Data models define how the logical structure of a database is modeled.
Data models define how data is connected to each other and how they are processed and stored inside the system. The various data models are;

  1. Hierarchical Database Model,
  2. Network Model,
  3. Relational Model and
  4. Object-oriented Database Model.

Question 2.
List few disadvantages of the file processing system.
Answer:
Data Duplication – Same data is used by multi¬ple resources for processing, thus created multiple copies of the same data wasting the spaces.

High Maintenance – Access control and verify- ing data consistency needs high maintenance cost.
Security – Less security provided to the data.

Question 3.
Define Single and multi-valued attributes.
Answer:
A single-valued attribute contains only one value for the attribute and they don’t have multiple numbers of values. For Example Age.
A multi-valued attribute has more than one value for that particular attribute. For Example Degree.

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 4.
List any two DDL and DHL commands with its Syntax.
Answer:
DDL Commands:

CommandsSyntax
CREATECREATE database databasename;
DROPDROP database databasename;

DML Commands:

CommandsSyntax
INSERTINSERT INTO table name VALUES (value1, value2, values);
DELETEDELETE from table name WHERE columnname=”value”;

Question 5.
What are the ACID properties?
Answer:
ACID Properties – The acronym stands for Atomicity, Consistency, Isolation and Durability. Atomicity follows the thumb rule “All or Nothing” while updating the data in the database for the user performing the update operation. Consistency ensures that the changes in data value to be constant at any given instance. Isolation property is needed during concurrent action. Durability is defined as the system’s ability to recover all committed actions during the failure of storage or the system.

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 6.
Which command is used to make permanent changes done by a transaction?
Answer:

  • These SQL commands manage the transactions in SQL databases.
  • It also helps to save the change into the database permanently.
  • COMMIT, ROLLBACK, SET TRANSACTION, and SAVEPOINT commands belong to this category.

Question 7.
What is a view in SQL?
Answer:
Views – A set of stored queries.

Question 8.
Write the difference between SQL and MySQL.
Answer:

SQLMySQL
SQL is a query language.MySQL is database software.
To query and operate a database system.Allows data handling, storing, modifying, deleting in a tabular format.

Question 9.
What is a Relationship and List its types?
Answer:
One-to-One relationship
One-to-Many relationship
Many-to-Many relationship

Question 10.
State a few advantages of Relational databases.
Answer:

  1. High Availability
  2. High Performance
  3. Robust transfer actions and support
  4. Ease of management
  5. Less cost

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Part III

Explain In Brief Answer

Question 1.
Explain on Evolution of DBMS.
Answer:

  1. The concept of storing the data started 40 years in various formats.
  2. In earlier days they have used punched card technology to store the data.
  3. Then files were used. The file systems were known as the predecessor of the database system.
  4. Various access methods in the file system were indexed, random, and sequential access.
  5. The file systems have limitations like duplication, less security. To overcome this, DBMS was introduced.

Question 2.
What is a relationship in databases? List its types.
Answer:
There exists a relationship between two tables when the foreign key of one table references the primary key of other tables.
The Entity-Relationship(ER) diagram is based on the three types listed below.

  • One-to-One relationship
  • One-to-Many relationship
  • Many-to-Many relationship

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 3.
Discuss on Cardinality in DBMS.
Answer:

  • It is defined as the number of different values in any given table column
  • It Is defined as the number of items that must be II included in a relationship.ie) number of entities | in one set mapped with the number of entities of I another set via the relationship,
  • Three classifications in Cardinality are one-to-one, jl one-to-many and Many-to-Many.

Question 4.
List any 5 privileges available in MySQL for the User.
Answer:

Privileges

Action Performed (If Granted)

Select_privUser can select rows from database tables.
Insert_privUser can insert rows into database tables.
Update_privUser can update rows of database tables.
Deiete^privUser can delete rows of database tables.
Create_privUser can create new tables in database

Question 5.
Write few commands used by DBA to control the entire database.
Answer:
USE Database
This command is used to select the database in MySQL for working.
Syntax: mysql>use test;

SHOW Databases
Lists all the databases available in the database server,
Syntax: mysql>show databases;

SHOW Tables
Lists all the tables available in the current database we are working in.
Syntax: mysql>show tables;

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Part IV

Explain In Detail

Question 1.
Discuss on various database model available in DBMS.
Answer:
The major database models are listed below:

  • Hierarchical Database Model
  • Network model
  • Relational model
  • Object-oriented database mode!

Hierarchical Database Model

  • In this model each record has information in par-ent/child relationship like a tree structure.
  • The collection of records was called as record types, which are equivalent to tables in relational model.
  • The individual records are equal to rows.
  • The famous Hierarchical database model was IMS (Information Management System), IBM’s first DBMS,

Advantages:

  • Less redundant data
  • Efficient search
  • Data integrity
  • Security

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Limitations:

  • Complex to implement and difficult in handling
  • Many to many relationships

Network model

  • The network model is similar to the Hierarchical model except that in this model each member can have
    more than one owner.
  • The many to many relationships are handled in a better way.
  • This model identified the three database components
  • Network schema – Defines all about the structure of the database
  • Sub schema – Controls on views of the database for the user.
  • Language for data management – Basic procedural for accessing the database.

Relational model:

Oracle and DB2 are few commercial relational models in use.
The relational model is defined with two terminologies Instance and Schema.

  • Instance – A table consisting of rows and columns
  • Schema – Specifies the structure including the name and type of each column.

A relation (table) consists of unique attributes (columns) and tuples (rows).

Object-oriented database model

  • This model incorporates the combination of Object-Oriented Programming(OOP’s) concepts and database technologies.
  • Practically, this model serves as the base of the Relational model.
  • The object-oriented model uses small, reusable software known as Objects.
  • These are stored in an object-oriented database.
  • This model efficiently manages a large number of different data types.
  • Moreover, complex behaviors are handled efficiently using OOP’s concepts.

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 2.
List the basic concepts of ER Model with suitable examples.
Answer:
The basic concepts of ER model consist of

  • Entity or Entity type
  • Attributes
  • Relationship

These are the general concepts which help to create an ER diagram and produce an ER model.

Entity or Entity type:

  • An Entity can be anything a real-world object or animation which is easily identifiable by anyone even by a common man.
  • Example: In a company’s database Employees, HR, Manager are considered entities.
  • An entity is represented by a rectangular box.

Types of Entity:

  1. Strong Entity
  2. Weak Entity
  3. Entity Instance

Strong Entity

  • A Strong entity is the one which doesn’t depend on any other entity on the schema or database
  • A strong entity will have a primary key with it.
  • It is represented by one rectangle

Weak Entity

  • A weak entity is dependent on other entities and it doesn’t have any primary key like the Strong entity.
  • It is represented by a double rectangle.

Entity Instance

  • Instances are the values for the entity if we consider animals as the entity their instances will be dog, cat, cow… Etc.
  • So an Entity Instance denotes the category values for the given entity.

Attributes:

  • An attribute is the information about that entity and it will describe, quantify, classify, and specify an entity.
  • An attribute will always have a single value, that value can be a number or character or string.

Types of attributes:

  1. Key Attribute
  2. Simple Attributes
  3. Composite Attributes
  4. Single Valued Attribute
  5. Multi-Valued Attribute

Relationship:
There exists a relationship between two tables when the foreign key of one table references primary key of other table.
The Entity-Relationship(ER) diagram is based on the three types listed below.

  • One-to-One relationship
  • One-to-Many relationship
  • Many-to-Many relationship

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 3.
Discuss in detail various types of attributes in DBMS.
Answer:
Types of attributes:
1. Key Attribute:
Generally, a key attribute describes a unique characteristic of an entity.

2. Simple Attribute:

  • The simple attributes cannot be separated it will be having a single value for their entity.
  • For Example: Let us consider the name as the attribute for the entity employee and here the value for that attribute is a single value.

3. Composite Attributes:

  • The composite attributes can be sub divided into simple attributes without change in the meaning of that attribute.
  • For Example: In the above diagram the employee is the entity with the composite attri¬bute Name which are sub-divided into two simple attributes first and last name.

4. Single Valued Attributes;

  • A single valued attribute contains only one value for the attribute and they don’t have multiple numbers of values.
  • For Example: Age- It is a single value for a person as we cannot give n number of ages for a single person; therefore it is a single valued attribute.

5. Multi-Valued Attributes:

  • A multi valued attribute has more than one value for that particular attribute.
  • For Example: Degree – A person can hold n number of degrees so it is a multi-valued attribute.

Question 4.
Write a note on open-source software tools available in MySQL Administration.
Answer:

  • MySQL is open source software that allows managing relational databases.
  • It also provides the flexibility of changing the source code as per the needs.
  • It runs on multiple platforms like Windows, Linux and is scalable, reliable and fast.

PHPMYADMIN (Web Admin)

  • This administrative tool of MySQL is aweb application written in PHP. They are used predominantly in web hosting.
  • The main feature is providing web interface,- importing data from CSV and exporting data to various formats.
  • It generates live charts for monitoring MySQL server activities like connections, processes and memory usage. It also helps in making the complex queries easier.

MySQL Workbench (Desktop Application)

  • It is a database tool used by developers and DBA’s mainly for visualization.
  • This toolhelps in data modeling, development of SQLServer configuration and backup for MySQLin a better way.
  • Its basic release version is 5.0and is now in 8.0 supporting all Operating Systems.
  • The SQL editor of this tool is veryflexible and comfortable in dealing multiple results set.

HeidiSQL (Desktop Application)

  • This open source tools helps in the administra-tion of better database systems.
  • It supports GUI (Graphical User Interface) features for monitoring server host, server connection, Databases, Tables, Views, Triggers and Events.

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 5.
Explain in detail on Sub Queries with suitable examples.
Answer:

  • The SQL query is written within amain Query.
  • This is called Nested Inner/SubQuery.
  • The sub query is executed first and the results of sub query are used as the condition for main query.

The sub query must follow the below rules:

  • Subqueries are always written within the parentheses.
  • Always place the Subquery on the right side of the comparison operator.
  • ORDER BY clause is not used insub query, since Subqueries cannot manipulate the results internally.

Example: (Consider the Employee tablewith the fields EmpID, Name, Age andSalary.)
SELECT * from Employee WHERE EmpID IN (SE-LECT EmpID from Employee WHERE Salary 20000);
First, the inner query is executed. Then outer query will be executed.

12th Computer Applications Guide Introduction to Database Management System Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
Expand DBMS?
(a) Database Management System
(b) Data Manipulation Schema
(c) Data Base Management Schema
(d) DataBase Manipulation Schema
Answer:
(a) Database Management System

Question 2.
DBMS provides to ………………… data
a) create
b) retrieve
c) update
d) all of the above
Answer:
d) all of the above

Question 3.
Expand ODBMS.
(a) Object DataBase Management System
(b) Objective Data Base Management System
(c) Object-Oriented DataBase Management System
(d) Objective Data Manipulation System
Answer:
(a) Object DataBase Management System

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 4.
……………. is defined as the system’s ability to recover all committed transactions during the failure of storage or the system.
a) Durability
b) Consistency
c) Concurrency
d) All of the above
Answer:
a) Durability

Question 5.
Which of the following is a commercial relational models in use.
a) Oracle
b) DB2
c) PostgreSQL
d) Both a and b
Answer:
d) Both a and b

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 6.
To prevent conflict in database updates, the transactions are isolated from other users and serialized. This is called as ……………………….
(a) Atomicity
(b) Consistency
(c) Isolation
(d) Degree of Consistency
Answer:
(d) Degree of Consistency

Question 7.
A key with more than one attribute to identify rows uniquely in a table is called…………….
a) Candidate Key
b) Super Key
c) Foreign Key
d) Composite Key
Answer:
d) Composite Key

Question 8.
An …………….  can be anything a real-world object or animation
a) Data
b) Entity
c) Instance
d) Relationship
Answer:
b) Entity

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 9.
Concurrency control and locking are needed
(a) Consistency
(b) data sharing
(c) data hiding
(d) TrAnswer:action
Answer:
(b) data sharing

Question 10.
………… describes a unique characteristic of an entity.
a) Key Attribute
b) Simple Attributes
c) Composite Attributes
d) Single Valued Attribute
Answer:
a) Key Attribute

Question 11.
………… can be subdivided into simple attributes without change in the meaning of that attribute.
a) Key Attribute
b) Simple Attributes
c) Composite Attributes
d) Single Valued Attribute
Answer:
c) Composite Attributes

Question 12.
A …………. contains only one value for the attribute and they don’t have multiple numbers of values.
a) Key Attribute
b) Simple Attributes
c) Composite Attributes
d) Single Valued Attribute
Answer:
d) Single Valued Attribute

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 13.
IBM’s first DBMS is ……………………..
(a) IMS
(b) IVS
(c) BMS
(d) VMS
Answer:
(a) IMS

Question 14.
A ……………. has more than one value for that particular attribute.
a) Multi-valued attribute
b) Simple Attributes
c) Composite Attributes
d) Single Valued Attribute
Answer:
a) Multi-valued attribute

Question 15.
The parent-child relationship is established in …………………….. database Models.
(a) Hierarchical
(b) Network
(c) Relational
(d) Object
Answer:
(a) Hierarchical

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Fill in the Blanks:

1. ………………is known a predecessor of database system
Answer:
File system

2. MySQL is a database management system founded by…………………
Answer:
Monty Widenius

3. ……………who takes care of configuration, installation, performance, security and data backup.
Answer:
Database Administrators

4. …………….. is a web application written in PHP
Answer:
PHPMYADMIN

5. ………………tool of MySQL is a web application written in PHP.
Answer:
PHPMYADMIN

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

6. ………………….. is a database tool used by developers and DBA’s mainly for visualization.
Answer:
MySQL Workbench

Question 7.
The ……………….. of this tool is very flexible and comfortable in dealing with multiple results set.
Answer:
SQL editor

Question 8.
…………………….. is a program or process of copying table contents into a file for future reference
Answer:
Backup

Question 9.
SQL query is written within a main Query is called as
Answer:
Sub Query

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 10.
An attribute is the information about that …………………
Answer:
Entity

Abbrevation

1. DBMS – Database Management System.
2. RDBMS – Relation Database Management System.
3. OSBMS – Objective Database Management System.
4. ACID – Automicity, Consistency, Isolation, And Durability.
5. IMS – Information Management System.
6. IDS – Integrated Data Store.
7. OOP’S – Object Oriented Programming.
8. SQL – Structure Query Language.
9. ER – Entity Relationship.
10. DBA – Database Administration.
11. ANSI – American National Standards Institute.
12. ISO – International Organization For Standardization.
13. DDL – Data Definition Language.
14. DML – Data Manipulation Language.
15. DQL – Data Query Language.
16. TCL – Transaction Control Language.
17. DCL – Data Control Language.

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Assertion And Reason

Question 1.
Assertion (A): database management system (DBMS) is system software for creating and managing databases.
Reason (R): The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data.”
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Question 2.
Assertion (A) : In a database, we would be grouping only related data together and storing them under one group name called table.
Reason (R): This helps in identifying which data stored where and under what name.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) ¡s true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 3.
Assertion (A): Oracle and DB2 are few commercial relational models in use.
Reason (R): Relational model is defined with two terminologies Instance and Schema.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) ¡s true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 4.
Assertion (A): A single-valued attribute con¬tains only one value for the attribute and they don’t have multiple numbers of values.
Reason (R): Age – It is a single value for a person as we cannot give n number of ages for a single person, therefore it is a single-valued attribute.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) Is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 5.
Assertion (A): Cardinality is defined as the number of items that must be included in a relationship.ie) number of entities in one set mapped with the number of entities of another set via the relationship.
Reason (R): Three classifications in Cardinality areMany-to-one, one-to-many and Many-to-Many,
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 6.
Assertion (A): The Database Administrator (DBA) frequently uses few commands to control the entire database.
Reason (R): These commands are known as SQL Server Commands.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 7.
Assertion (A); Subqueries are always written within the braces.
Reason (R): ORDER BY clause is not used in sub query, since Subqueries cannot manipulate the results internally.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Question 8.
Assertion (A); TCL commands manage the transactions in SQL databases. It also helps to save the change into database permanently.
Reason (R) : CREATE, ALTER, DROP, RENAME and TRUNCATE commands belongs to TCL category.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Question 9.
Assertion (A); A Strong entity is the one which doesn’t depend on any other entity on the schema or database and a strong entity will have a primary key with it
Reason (R): It is represented by one rectangle.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is faise
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 10.
Assertion (A) ; A weak entity is dependent on other entitles and it doesn’t have any primary key like the Strong entity.
Reason (R): It is represented by Diamond,
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Find the odd one on the following:

1. (a) Sorting
(b) Retrieving
(c) Filtering
(d) Aligning
Answer:
(d) Aligning

2. (a) Creating
(b) Updating
(c) Managing
(d) Converting
Answer:
(d) Converting

3. (a) Data Duplication
(b) Data Flexibility
(c) Data Maintenance
(d) Security
Answer:
(c) Data Maintenance

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

4. (a) Access
(b) SQL
(c) Oracle
(d) Notepad
Answer:
(b) SQL

5. (a) Consistency
(b) Durability
(c) Activity
(d) Isolation
Answer:
(c) Activity

6. (a) DBMS
(b) Network Schema
(c) Subschema
(d) Language
Answer:
(a) DBMS

7. (a) id:int
(b) name:int
(c) Nfname:string
(d) email:string
Answer:
(b) name:int

8. (a) Table
(b) attribute
(c) files
(d) Tuples
Answer:
(c) files

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

9. (a) Class
(b) Object
(c) Data
(d) Abstraction
Answer:
(c) Data

10. (a) Schema
(b) Key
(c) Tuple
(d) Cell
Answer:
(d) Cell

11. (a) Windows
(b) Linux
(c) MACOS
(d) MSSQLServer
Answer:
(d) MSSQLServer

12. (a) Row
(c) Record
(b) attribute
(d) Tuple
Answer:
(b) attribute

13. (a) Vertical Entity
(b) Attribute
(c) Tuple
(d) column
Answer:
(c) Tuple

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

14. (a) primary Key
(b) Secondary Key
(c) SuperKey
(d) Foreign Key
Answer:
(b) Secondary Key

15. (a) Strong Entity
(c) Super Entity
(b) Weak Entity
(d) Entity Instance
Answer:
(c) Super Entity

16. (a) Schema
(b) Database
(c) primary Key
(d) Foreign Key
Answer:
(d) Foreign Key

17. (a) Degree
(b) Bank Account
(c) Age
(d) Subjects
Answer:
(c) Age

18. (a) One:Unary
(b) Two: Binary
(c) Three:Ternary
(d) Four: penta
Answer:
(d) Four: penta

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

19. (a) Rectangle
(b) Square
(c) Rhombus
(d) Ellipse
Answer:
(b) Square

20. (a) DB2
(b) Netfix
(c) SQL Lite
(d) Oracle
Answer:
(b) Netfix

21. (a) Configuration
(b) Installation
(c) Performance
(d) Access
Answer:
(d) Access

22. (a) INSERT
(b) EDIT
(c) SELECT
(d) UPDATE
Answer:
(b) EDIT

23. (a) Select_Priv
(b) Delete_Priv
(c) create_Priv
(d) Edit_Priv
Answer:
(d) Edit_Priv

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

24. (a) MySQL
(b) Workbench
(c) PHPMYADMIN
(d) HeidiSQL
Answer:
(c) PHPMYADMIN

25. (a) ServerHost
(b) Server Connection
(c) Events
(d) processor
Answer:
(d) processor

26. (a) Dashboard
(b) Reports
(c) Table
(d) Statistics
Answer:
(c) Table

27. (a) Table
(b) Insert
(c) Queries
(d) Views
Answer:
(b) Insert

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

28. (a) TRUNCATE
(b) RENAME
(c) SELECT
(d) ALTER
Answer:
(c) SELECT

29. (a) DDL
(b) DML
(c) HeidiSQL
(d) DQL
Answer:
(c) HeidiSQL

30. (a) ANY
(b) AND
(c) UNIQUE
(d) XOR
Answer:
(d) XOR

MAtch the following:

1. Hierarchical Database – Sybase
2. Network Database – Rhombus
3. Relational Database – Multivalued Attribute
4. Column – Candidate Key
5. Row – Record
6. Primary key – Attribute
7. Super Key – Unique Key Identifier
8. Double Ellipse – Oracle
9. Relationships – IMS
10. Database – IDS
Answer:
1. IMS
2. IDS
3. Oracle
4. Attribute
5. Record
6. Unique Key
7. Candidate Key
8. Multivalued Attribute
9. Rhombus
10. Sybase

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Choose the incorrect statements:

Question 1.
a) SQL It (Structured query Language) is a programming language designed mainly for . managing data in RDBMS
b) Schema Retrieves data from two or more tables, by referencing columns in the tables that hold identical values
c) Query In SQL, all commands are named as query. The query statement is executed against the databases.
d) Record is referred in a table, which are composed of fields.
Answer:
b) Schema Retrieves data from two or more tables, by referencing columns in the tables that hold identical values

Question 2.
a) A Record is the information about that entity and it will describe, quantify, qualify, classify, and specify an entity.
b) Cardinality is defined as the number of items that must be included in a relationship
c) A multi-valued attribute has more than one value for that particular attribute.
d) A single-valued attribute contains only one value for the attribute and they don’t have multiple numbers of values.
Answer:
a) A Record is the information about that entity and it will describe, quantify, qualify, classify, and specify an entity.

Question 3.
a) Network schema defines all about the structure of the database.
b) Sub schema controls on views of the database for the user
c) The famous Hierarchical database model was IDS
d) Language is the basic procedural for accessing the database.
Answer:
c) The famous Hierarchical database model was IDS

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 4.
a) A table consisting of rows and columns
b) Schema – Specifies the structure including name and type of each column.
c) A relation consists of unique attributes and tuples.
d) Query is referred in a table, which are composed of fields.
Answer:
d) Query is referred in a table, which are composed of fields.

Question 5.
a) DCL commands manage the transactions
b) The DML commands deals with the manipulation of data present in the database
c) SELECT is the only SQL command used to fetch or retrieve the data from database tables that come under DQL.
d) The DDL commands are used to define database schema (Structure)
Answer:
a) DCL commands manage the transactions

Syntax & Example (Basic Sql Commands)

1) CREATE DATABASE:
Syntax: CREATE database databasename;
Example: mysql> create database studentDB;

2) DROP DATABASE:
Syntax: DROP database databasename;
Example: mysql> drop database studentDB;

3) SELECT DATABASE
Syntax: USE databasename;
Example: mysqi> USE studentDB;

4) INSERT RECORD
Syntax 1: INSERT INTO tablename (columnl, column 2, column 3) Values(vaiue 1, value 2, value 3)
Syntax 2: INSERT INTO tablename
Values(value 1, va!ue2, value3)

5) DELETING RECORD :
Syntax 1; DELETE for tablename WHERE Coiumnname =” value ”
Syntax 2; DELETE for tablename

6) MODIFYING RECORD:
Syntax : UPDATE tablename SET column 1= “newvalue” where column 2= value2

7) SORTING RECORD:
Syntax 1 SELECT * FROM TABLENAME ORDER BY COLUMNNAME;
Syntax 2 select * from tablename ORDER BY columnname DESC;

SQL DDL COMMANDS LIST
CommandsDescription
CREATEUsed to create database or tables
ALTERModifies the existing structure of database or table
DROPDeletes a database or table
RENAMEUsed to rename an existing object in the database
TRUNCATEUsed to delete all table records
SQL TCL COMMANDS LIST
CommandsDescription
COMMITPermanent save into database
ROLLBACKRestore database to orginal form since the last COMMIT
SET
TRANSACTION
SET TRANSACTION command set the transaction properties such as read-write or read-only access
SAVE POINTUse to temporarily save a trans­action so that we can rollback to that point whenever required
SQL DML COMMANDS LIST
CommandsDescription
INSERTAdds new rows into database table.
UPDATEmodifies existing data with new data within a table
DELETEDeletes the records from the table
SQL DQL COMMANDS LIST
CommandsDescription
 SELECTRetrieve data from the table

Part B

Short Answers

Question 1.
Define database?
Answer:
“A database management system (DBMS) is system software for creating and managing databases. The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data”.

Question 2.
Define DBMS
Answer:
Definition;

  • A database management system (DBMS), is system software for creating and managing databases.
  • The DBMS provides users and programmers with a systematic way to create, retrieve, update and manage data.

Question 3.
Define degree of consistency?
Answer:
To prevent conflict in database updates, the transactions are isolated from other users and serialized. This is also known as the Degree of Consistency.

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 4.
What are the limitations of the database?
Answer:

  • Data Duplication
  • High Maintenance
  • Security

Question 5.
Write the various forms of the database.
Answer:

  • Relational Database Management System (RDBMS)
  • And Object Database Management System (ODBMS).

Question 6.
Define relational database?
Answer:
Any database whose logical organization is based on a relational data model is known as Relational Database.

Question 7.
What do you mean by the table in the Relational database model?
Answer:
In relational database model,

  • The table is defined as the collection of data organized in terms of rows and columns.
  • The table is the simple representation of relations. The true relations cannot have duplicate rows

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 8.
Write the types of SQL commands.
Answer:

  • Data Definition Language (DDL)
  • Data Manipulation Language (DML)
  • Data Query Language (DQL)
  • Transaction Control Language (TCL)
  • Data Control Language (DCL)

Question 9.
Define Primary key?
Answer:

  1. The candidate key that is chosen to perform the identification task is called the primary key and any others are Alternate keys.
  2. Every tuple must-have, a unique value for its primary key.

Question 10.
What is XAMPP?
Answer:

  • XAMPP is a free and open-source package.
  • It was developed by Apache.
  • It is a software platform for MySQL, PHP and Peri programming languages.

Question 11.
Define Composite key?
Answer:
A key with more than one attribute to identify rows uniquely in a table is called a Composite key. This is also known as Compound Key.

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Part C

Explain In Brief Answer.

Question 1.
Explain three database components of the network model?
Answer:
The three database components of Network models are Network schema, Sub schema, and Language.
Network schema – schema defines all about the structure of the database.
Sub schema – controls on views of the database for the user.
Language – basic procedural for accessing the database.

Question 2.
List few commonly used databases.
Answer:

  • DB2
  • MySQL
  • Oracle
  • PostgreSQL
  • SQLite
  • SQL Server
  • Sybase

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 3.
What are the roles of a Database administrator?
Answer:

  • Database Administrators (DBA’s) who takes care of configuration, installation, performance, security and data backup.
  • DBA’s possess the skills on database design, database queries, RDMS, SQL and networking.
  • The primary task is the creation of new user and providing them with access rights.

Question 4.
Define Super key?
Answer:

  1. An attribute or group of attributes, which is sufficient to distinguish every tuple in the relation from every other one is known as Super Key.
  2. Each super key is called a candidate key.
  3. A candidate key is selected from the set of Super Key.

Question 5.
Write a note on MySQL.
Answer:

  • The candidate key that is chosen to perform
  • MySQL is a database management system founded by Monty Widenius
  • MySQL is open-source software that allows managing relational databases.
  • It also provides the flexibility of changing the source code as per the needs.
  • It runs on multiple platforms like Windows, Linux and is scalable, reliable and fast.

Question 6.
Write a short note on Row (or Record or tuple)
Answer:

  • A single entry in a table is called a Row or Record or Tuple.
  • Set of related data are represented in a row or tuple.
  • The horizontal entity in a table is known as a Record or row.

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 7.
Give the roles and responsibilities of DBA?
Answer:
Database Administrators (DBA’s) take care of configuration, installation, performance, security, and data backup.
DBA’s possess the skills in database design, database queries, RDMS, SQL, and networking.
The primary task is the creation of new users and providing them with access rights.

Part D

Explain in detail.

Question 1.
Explain the following:

  1. Primary Key
  2. Foreign Key
  3. Candidate Key
  4. Super Key
  5. Composite key

Answer:
1. Primary Key:

  • This key of the relational table identifies each record in the table in a unique way.
  • A primary key which is a combination of more than one attribute is called a composite primary key.
  • The candidate key that is chosen to perform the identification task is called the primary key

2. Foreign Key:

  • A foreign key is a “copy” of a primary key that has been exported from one relation into another to represent the existence of a relationship between them.
  • A foreign key is a copy of the whole of its parent primary key i.e if the primary key is composite, then so is the foreign key.
  • Foreign key values do not (usually) have to be unique.
  • Foreign keys can also be null.
  • A composite foreign key cannot have some attribute(s) null and others non-null.

3. Candidate Key:

  • Each super key is called a candidate key.
  • A candidate key is selected from the set of Super Key.
  • While selecting the candidate key, redundant attributes should not be taken.
  • The candidate key is also known as minimal super keys.

4. Super Key:
An attribute or group of attributes, which is sufficient to distinguish every tuple in the relation from every other one is known as Super Key.

5. Composite Key (Compound Key): A key with more than one attribute to identify rows uniquely in a table is called a Composite key. This is also known as Compound Key.

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Question 2.
Tabulate the ER diagram notations
Answer:
Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System 1

Samacheer Kalvi 12th Computer Applications Guide Chapter 3 Introduction to Database Management System

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Tamilnadu State Board New Syllabus Samacheer Kalvi 12th Computer Applications Guide Pdf Chapter 17 E-Commerce Security Systems Text Book Back Questions and Answers, Notes.

Tamilnadu Samacheer Kalvi 12th Computer Applications Solutions Chapter 17 E-Commerce Security Systems

12th Computer Applications Guide E-Commerce Security Systems Text Book Questions and Answers

Part I

Choose The Correct Answers

Question 1.
In E-Commerce, when a stolen credit card is used to make a purchase it is termed as
a) Friendly fraud
b) Clean fraud
c) Triangulation fraud
d) Cyber squatting
Answer:
b) Clean fraud

Question 2.
Which of the following is not a security element involved in E-Commerce?
a) Authenticity
b) Confidentiality
c) Fishing
d) Privacy
Answer:
c) Fishing

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 3.
Asymmetric encryption is also called as
a) Secure Electronic Transaction
b) Certification Authority
c) RSA algorithm
d) Payment Information
Answer:
c) RSA algorithm

Question 4.
The security authentication technology does not include
i) Digital Signatures
ii) Digital Time Stamps
iii) Digital Technology
iv) Digital Certificates

a) i, ii & iv
b) ii & iii
c) i, ii & iii
d) all the above
Answer:
b) ii & iii

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 5.
PGP stands for
a) Pretty Good Privacy
b) Pretty Good Person
c) Private Good Privacy
d) Private Good Person
Answer:
a) Pretty Good Privacy

Question 6.
…………….. protocol is used for securing credit cards transactions via the Internet
a) Secure Electronic Transaction (SET)
b) Credit Card Verification
c) Symmetric Key Encryption
d) Public Key Encryption
Answer:
a) Secure Electronic Transaction (SET)

Question 7.
Secure Electronic Transaction (SET) was developed in
a) 1999
b) 1996
c) 1969
d) 1997
Answer:
b) 1996

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 8.
The websites secured by Secure Socket Layer protocols can be identified using
a) html://
b) http://
c) htmls://
d) https://
Answer:
d) https://

Question 9.
3-D Secure, a protocol was developed by
a) Visa
b) Master
c) Rupay
d) PayTM
Answer:
b) Master

Question 10.
Which of the following is true about Ransomware
a) Ransomware is not a subset of malware
b) Ransomware deletes the file instantly
c) Typo piracy is a form of ransomware
d) Hackers demand ransom from the victim
Answer:
d) Hackers demand ransom from the victim

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Part II

Short Answers

Question 1.
Write about information leakage in E-Commerce.
Answer:
Information leakage:
The leakage of trade secrets in E-Commerce mainly includes two aspects:

  1. The content of the transaction between the vendor and customer is stolen by the third party;
  2. The documents provided by the merchant to the customer or vice versa are illegally used by another.
  3. This intercepting and stealing of online documents is called information leakage.

Question 2.
Write a short note on typo piracy.
Answer:

  • Typopiracy ¡s a variant of Cyber Squatting.
  • Some fake websites try to take advantage of users’ common typographical errors in typing a websíte address and direct users to a different website.
  • Such people try to take advantage of some popular websites to generate accidental traffic for their websites.

Examples:

  • www.goggle.com,
  • www.facebook.com

Question 3.
Define non-repudiation.
Answer:
Non-repudiation: prevention against violation agreement after the deal.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 4.
List the different types of security technologies in E-Commerce
Answer:

  • Encryption technology
  • Authentication technology
  • Authentication protocols

Question 5.
Write about digital signature.
Answer:

  1. A digital signature is a mechanism that is used to verify that a particular digital document, message, or transaction is authentic.
  2. Digital signatures are used to verify the trustworthiness of the data being sent.

Part III

Explain In Brief Answer

Question 1.
Write a note on certification authorities (CA)
Answer:

  • Digital certificates are issued by recognized Certification Authorities (CA).
  • When someone requests a digital certificate, the authority verifies the identity of the requester, and if the requester fulfills all requirements, the authority issues it.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 2.
List some E-Commerce Security Threats?
Answer:

  • Information leakage
  • Tampering
  • Payment frauds
  • Malicious code threats
  • Distributed Denial of Service (DDoS) Attacks
  • Cyber Squatting
  • Typopiracy

Question 3.
Differentiate asymmetric and symmetric algorithms.
Answer:
Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems 1

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 4.
Write a note on PGP.
Answer:
Pretty Good Privacy (PGP): Phil Zimmermann developed PGP in 1991. It is a decentralized encryption program that provides cryptographic privacy and authentication for data communication. PGP encryption uses a serial combination of hashing, data compression, symmetric-key cryptography, and asymmetric-key cryptography and works on the concept of “web of trust”.

Question 5.
Explain 3D secure payment protocols
Answer:

  • “3-D Secure is a secure payment protocol on the Internet.
  • It was developed by Visa to increase the level of transaction security, and it has been adopted by MasterCard.
  • It gives a better authentication of the holder of the payment card, during purchases made on websites.
  • The basic concept of this (XML-based) protocol is to link the financial authorization process with an online authentication system.

This authentication model comprises 3 domains (hence the name 3D) which are:

  1. The Acquirer Domain
  2. The Issuer Domain
  3. The interoperability’ Domain

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Part IV

Explain In Detail

Question 1.
Write about dimensions of E-Commerce Security.
Answer:
The following are some of the security elements involved in E-Commerce:

  1. Authenticity: conforming genuineness of data shared.
  2. Availability: prevention against data delay or removal.
  3. Completeness: unification of all business information.
  4. Confidentiality: protecting data against unauthorized disclosure.
  5. Effectiveness: effective handling of hardware, software and data.
  6. Integrity: prevention of the data being unaltered or modified.
  7. Non-repudiation: prevention against violation agreement after the deal.
  8. Privacy: prevention of customers’ personal data being used by others.
  9. Reliability: providing a reliable identification of the individuals or businesses.
  10. Review ability: capability of monitoring activities to audit and track the operations.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 2.
Explain encryption technology.
Answer:

  • Encryption technology is an effective information security protection.
  • It is defined as converting a Plaintext into meaningless Ciphertext using an encryption algorithm thus ensuring the confidentiality of the data.
  • The encryption or decryption process uses a key to encrypt or decrypt the data.

Types:
At present, two encryption technologies are widely used. They are:

  • Symmetric key encryption system
  • Asymmetric key encryption system.

Symmetric key encryption – Data Encryption Standard (DES):

  • It is a Symmetric-key data encryption method.
  • It is the typical block algorithm that takes a string of bits of clear text (plaintext) with a fixed length into another encrypted text of the same length.
  • It also uses a key to customize the transformation, so that, in theory, the algorithm can only be deciphered by people who know the exact key that has been used for encryption.
  • The DES key is apparently 64 bits, but in fact, the algorithm uses only 56. The other eight bits are only used to verify the parity and then it is discarded.
  • The key length increased by multiple uses of the DES, described as Triple-DES, also known as TDES, 3DES or DESede,

Asymmetric or Public key encryption

  • It is also called as RSA (Rivest-Shamir-Adleman) algorithm.
  • It uses public-key authentication and digital signatures.
  • Each user generates their own key pair, which consists of a private key and a public key.
  • A public-key encryption method is a method for converting a plaintext with a public key into a ciphertext from which the plaintext can be retrieved with a private key.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 3.
Differentiate digital signatures and digital certificates.
Answer:

Symmetric Key Encryption

Symmetric Key Encryption

A digital signature is a mechanism that is used to verify that a particular digital document, message, or transaction is authentic.A digital certificate is a computer file which officially ap­proves the relation between the holder of the certificate and a particular public key.
Digital signatures are used to verify the trustworthiness of the data being sentDigital certificates are used to verify the trustworthiness of the sender
A digital signature is to ensure that data remains secure from the point it was issued and it was not modified by a third party.A digital certificate binds a digital signature to an entity
It provides authentication, non-repudiation, and in­tegrityIt provides authentication and security
A digital signature is created using a Digital Signa­ture Standard (DSS). I use an SHA-1 or sha-2 algo­rithm for encrypting and decrypting the message.A digital certificate works on principles of public-key cry- pyrography standards (PKCS). It creates a certificate in the X.509 or PGP format.
The document is encrypted at the sending end and decrypted at the receiving end using asymmetric keys.A digital certificate consists of the certificate’s owner name and public key, expiration date, a certificate Authority’s name, a Certificate Authority’s digital signature

Question 4.
Define Secure Electronic Transaction (SET) and its features.
Answer:
There are two kinds of security authentication protocols widely used in E-Commerce, namely Secure Electronic Transaction (SET) and Secure Sockets Layer (SSL).

Secure Electronic Transaction:
Secure Electronic Transaction (SET) is a security protocol for electronic payments with credit cards, in particular via the Internet. SET was developed in 1996 by VISA and MasterCard, with the participation of GTE, IBM, Microsoft, and Netscape.

The implementation of SET is based on the use of digital signatures and the encryption of transmitted data with asymmetric and symmetric encryption algorithms. SET also use dual signatures to ensure privacy.

The SET purchase involves three major participants: the customer, the seller, and the payment gateway. Here the customer shares the order information with the seller but not with the payment gateway. Also, the customer shares the payment information only with the payment gateway but not with the seller.

So, with the SET, the credit card number may not be known to the seller and will not be stored in the seller’s files also could not be recovered by a hacker. The SET protocol guarantees the security of online shopping using credit cards on the open network. It has the advantages of ensuring the integrity of transaction data and the non-repudiation of transactions. Therefore, it has become the internationally recognized standard for credit card online transactions.

SET system incorporates the following key features:

  • Using public-key encryption and private key encryption ensure data confidentiality.
  • Use information digest technology to ensure the integrity of information.
  • Dual signature technology to ensure the identity of both parties in the transaction.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 5.
Briefly explain SSL.
Answer:

  • The most common Cryptographic protocol is Secure Sockets Layers (SSL).
  • SSL is a hybrid encryption protocol for securing transactions over the Internet.
  • The SSL standard was developed by Netscape in collaboration with MasterCard, Bank of America, MCI, and Silicon Graphics.
  • It is based on a public key cryptography process to ensure the security of data transmission over the internet.

Principle:

  • To establish a secure communication channel (encrypted) between a client and a server after an authentication step.
  • To ensure the security of data, located between the application layer and the transport layer in TCP.

Example:

  • A user using an internet browser to connect to an SSL secured E-Commerce site will send encrypted data without any more necessary manipulations.

Advantages:

  • Today, all browsers ¡n the market support SSL.
  • The secure communications are proceeded, through this protocol.
  • SSL works completely hidden for the user, who does not have to intervene in the protocol.
  • The URL starts with https:// instead of http:// where the “s” obviously means secured. It is also preceded by a green padlock.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

12th Computer Applications Guide E-Commerce Security Systems Additional Important Questions and Answers

Part A

Choose The Correct Answers:

Question 1.
A digital certificate is also known as ………………
a) Public key certificate
b) Asymmetric Key
c) Symmetric Key
d) All of the above
Answer:
a) Public key certificate

Question 2.
…………… is a process of taking down an E-Commerce site by sending continuous
overwhelming request to its server.
a) RSA
b) DES
c) DDoS
d) CA
Answer:
c) DDoS

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 3.
The stealing of online documents is called …………………….
(a) phishing
(b) virus
(c) Frauds
(d) information leakage
Answer:
(d) information leakage

Question 4.
Typopiracy is a variant of ………….
a) Payment Frauds
b) Tampering
c) Cybersquatting
d) All of the above
Answer:
c) Cybersquatting

Question 5.
How many types of payment frauds are there?
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(b) 3

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Abbreviations:

  1. DDoS Distributed Denial of Service
  2. DES Data Encryption Standard
  3. RSA Rivest-Shamir-Adleman
  4. CA Certification Authorities
  5. PGP Pretty Good Privacy
  6. PKI Public Key Infrastructure
  7. SET Secure Electronic Transaction
  8. SSL Secure Sockets Layers
  9. TLS Transport Layer Security
  10. MD Message Digest
  11. PIN Personal Identification Number
  12. OTP One Time Password
  13. FIPS Federal Information Processing Standard
  14. PKCS Public-key cryptography standards

Assertion And Reason

Question 1.
Assertion (A); A digital signature is a mechanism that is used to verify that a particular digital document, message, or transaction is authentic.
Reason (R); A digital certificate is a computer file which officially approves the relation between the holder of the certificate and a particular public key.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Question 2.
Assertion (A): Digital signatures are used to verify the trustworthiness of the data being sent.
Reason (R): A digital signature is a mechanism that is used to verify that a particular digital document, message, or transaction is authentic.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 3.
Assertion (A): A digital certificate is created using a Digital Signature Standard (DSS). It uses an SHA-1 or SHA-2 algorithm for encrypting and decrypting the message.
Reason (R); A digital certificate consists of the certificate’s owner name and public key, expiration date, a Certificate Authority’s name a Certificate Authority’s digital signature.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
d) (A) is false and (R) is true

Question 4.
Assertion (A); At present, there are two kinds of security authentication protocols widely used in E-Commerce.
Reason (R): SET is a Cryptographic protocol.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
c) (A) is true and (R) is false

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 5.
Assertion (A)s URL starts with https://instead of http:// where the “s” obviously means secured.
Reason (R): SSL works completely hidden for the user, who does not have to intervene in the protocol.
a) Both (A) and (R) are correct and (R) is the correct explanation of (A)
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)
c) (A) is true and (R) is false
d) (A) is false and (R) is true
Answer:
b) Both (A) and (R) are correct, but (R) is not the correct explanation of (A)

Very Short Answers

Question 1.
What is DES?
Answer:
The Data Encryption Standard (DES) is a Symmetric-key data encryption method.

Question 2.
When was DES introduced?
Answer:
It was introduced in America in the year 1976

Question 3.
Who introduced DES?
Answer:
It was introduced by Federal Information Processing Standard (FIPS).

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 4
Who developed PGP? When?
Answer:
Pretty Good Privacy (PGP): Phil Zimmermann developed PGP in 1991.

Question 5.
What is the use of digital certificates?
Answer:
Digital certificates are used to verify the Trust j worthiness of the sender.

Question 6.
What is the use of digital signatures?
Answer:
Digital signatures are used to verify the trustworthiness of the data being sent

Question 7.
Who developed 3D-Secure?
Answer:
3D-Secure was developed by Visa

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 8.
What is 3D-Secure?
Answer:
3-D Secure is a secure payment protocol on the Internet.

Question 9.
What is the purpose of 3D-Secure?
Answer:
To increase the level of transaction security,

Question 10.
What is the basic concept of 3D-Secure?
Answer:
To link the financial authorization process with an online authentication system.

Question 11.
What is SET?
Answer:
Secure Electronic Transaction (SET) is a security protocol for electronic payments

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 12.
What is SSL?
Answer:
The most common Cryptographic protocol is Secure Sockets Layers (SSL).

Question 13.
What is the purpose of SSL?
Answer:
To ensure the security of data transmission over the internet.

Question 14.
What are Brute-force attacks?
Answer:
It is the simplest attack method for breaking any encryption.

Question 15.
Who developed SSL?
Answer:
The SSL standard was developed by Netscape

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 16.
What is a repository?
Answer:
The certificate authority maintains a database of public keys called a repository

Question 17.
How TLS and SSL differ?
Answer:
TLS differs from SSL in the generation of symmetric keys.

Question 18.
How many domains are in the authentication model?
Answer:
There are 3 domains in the authentications model

Question 19.
When SSL renamed as TLS?
Answer:
Secure Sockets Layers (SSL) was renamed as Transport Layer Security (TLS) in 2001.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 20.
What is the principle of SSL?
Answer:
To establish a secure communication channel between a client and a server

Question 21.
What is public key infrastructure?
Answer:
Digital signatures use a standard, worldwide accepted format, called Public Key Infrastructure (PKI).

Question 22.
What is the purpose of PKI?
Answer:
To provide the highest levels of security and universal acceptance.

Question 23.
What is the role of security certification in authentication technology?
Answer:
To ensure Authentication, Integrity, and Non-repudiation.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 24.
Who are the participants involve in inset purchase?
Answer:

  • The customer
  • The seller
  • The payment gateway.

Question 25.
What is another name of Asymmetric encryption?
Answer:
RSA (Rivest-Shamir-Adleman) algorithm.

Important Years To Remember:

1976DES was introduced in America
1991Phil Zimmermann developed PGP
1996SET was developed by VISA and MasterCard

Find The Odd One On The Following

1. a) Authenticity
b) Availability
c) Completeness
d) Audacity
Answer:
d) Audacity

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

2. a) Confidentiality
b) Effectiveness
c) Tampering
d) Reliability
Answer:
c) Tampering

3. a) Cyber Squatting
b) Integrity
c) Non-repudiation
d) Privacy
Answer:
a) Cyber Squatting

4. a) Information leakage
b) Confidentiality
c) Payment frauds
d) Tampering
Answer:
b) Confidentiality

5. a) Malicious code threats
b) DDoS
c) Cyber Squatting
d) Confidentiality
Answer:
d) Confidentiality

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

6. a) DES
b) AES
c) ECC
d) RC4
Answer:
c) ECC

7. a) DES
b) ECC
c) DSA
d) RSA
Answer:
a) DES

8. a) TDES
b) AES
c) 3 DES
d) DESede
Answer:
b) AES

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

9. a) Authentication
b) Integrity
c) Non-repudiation
d) Plain Text
Answer:
d) Plain Text

10. a) Asymmetric encryption
b) Symmetric key encryption
c) Data Encryption Standard
d) Federal Information Processing Standard
Answer:
a) Asymmetric encryption

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Part B

Short Answer Questions

Question 1.
What is E-commerce Security?
Answer:
E-Commerce security is a set of protocols that safely guide E-Commerce transactions through the Internet.

Question 2.
What is Cyber Squatting?
Answer:
It is s the illegal practice of registering an Internet domain name that might be wanted by another person in an intention to sell it later for a profit

Question 3.
What is meant by cybersquatting?
Answer:
Cyber Squatting: Cybersquatting is the illegal practice of registering an Internet domain name that might be wanted by another person with an intention to sell it later for a profit.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Part c

Explain In Brief Answer

Question 1.
Define Phishing?
Answer:
Phishing is also an E-Commerce threat in which a target is contacted by e-mail, telephone, or text message by someone who pretends himself as a genuine authority. They try to trap individuals to provide sensitive data such as banking and credit card details, OTP, PIN, or passwords. Once they succeed, the results would lead to devastating acts such as identity theft and financial loss.

Question 2.
What are the subsets of Payment frauds?
Answer:

  • Friendly fraud (when customer demands false reclaim or refund
  • Clean fraud (when a stolen credit card is used to make a purchase)
  • Triangulation fraud (fake online shops offering cheapest price and collect credit card data) etc.

Samacheer Kalvi 12th Computer Applications Guide Chapter 17 E-Commerce Security Systems

Question 3.
Explain various types of payment frauds?
Answer:
Payment frauds: Payment frauds have subsets like Friendly fraud (when customer demands- false reclaim or refund), Clean fraud (when a stolen credit card is used to make a purchase) Triangulation fraud (fake online shops offering the cheapest price and collect credit card data), etc.

Question 4.
What is Distributed Denial of Service (DDoS) Attacks? Or What is network flooding?
Answer:

  • It is a process of taking down an E-Commerce site by sending a continuous overwhelming request to its server.
  • This attack will be conducted from numerous unidentified computers using a botnet. This attack will slow down and make the server inoperative.
  • DDoS attacks are also called network flooding.