Plus Two Botany Previous Year Question Paper Say 2018

Kerala State Board New Syllabus Plus Two Botany Previous Year Question Papers and Answers.

Kerala Plus Two Botany Previous Year Question Paper Say 2018 with Answers

BoardSCERT
ClassPlus Two
SubjectBotany
CategoryPlus Two Previous Year Question Papers

Time: 1 Hour
Cool off time : 10 Minutes
Maximum : 30 Score

General Instructions to candidates:

  • There is a ‘cool off time’ of 15 minutes in addition to the writing time of 2 hrs.
  • You are not allowed to write your answers nor to discuss anything with others during the ‘cool off time’.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • All questions are compulsory and only internal choice is allowed.
  • When you select a question, all the sub-questions must be answered from the same question itself.                  ,
  • Calculations, figures and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

(Questions 1 to 3) : Answer all the questions. Each question carries 1 score. (3 × 1 = 3)

Question 1.
Identify the freshwater fish from the following:
a) Sardine
b) Mackerel
c) Rohu
d) Hilsa
Answer:
c) Rohu

Question 2.
In Gel electrophoresis the separated DNA fragments can be visualized after staining. Name the stain used for it.
Answer:
Ethidium bromide

Question 3.
In a forest ecosystem different plant species are occupied in different vertical levels. Name such vertical arrangement.
Answer:
Stratification

(Questions 4 to 14. Answer any 9 questions. Each question carries 2 scores. (9 × 2 = 18)

Question 4.
Primate and non-primate female mammals exhibit cyclic changes in the activities of ovaries and accessory ducts as well as hormones during the reproductive phase. Name the cyclic changes in these groups.
Answer:
Primates – menstrual cycle
Nonprimate – oestrous cycle

Question 5.
Bamboo species and Strobilanthus Kunthiana exhibit usual flowering phenomena. Explain their flowering characteristics.
Answer:
Bamboo – flower only after 50- 100 years
Strobilanthus kunthiana – flower once in 12 years

Question 6.
A population has certain attributes that an individual organism does not. What are they?
Answer:

  • Natality
  • Mortality
  • Sex ratio
  • Population density

Question 7.
Multiple copies of gene of interest can be synthesised in vitro. Name the technique and its requirements.
Answer:
Polymerase chain reaction
2 set of Primers and DNA Polymerase enzyme

Question 8.
Catalytic converters are used in automobiles to control air pollution. Briefly comment on its role.
Answer:
Unburnt hydrocarbons are converted into carbon dioxide and water.
Carbon monoxide and nitric oxide are changed to carbon dioxide and nitrogen gas respectively.

Question 9.
Your friend wishes to start a poultry farm. What are the important suggestions given to him for the successful management of the farm?
Answer:

  1. Selection of disease-free breeds
  2. Proper and safe farm conditions
  3. Proper feed and water and hygiene and health care are components of poultry farm management.

Question 10.
Pollination by water is seen in Zostera and Vallisneria. Enumerate its adaptations.
Answer:

  • In Vallisneria, the female flower reach the surface of water by the long stalk and the male flowers or pollen grains are released on to the surface of water. Stigma collects pollen grains and reached the water inside.
  • In zostera female flowers are found inside the water and pollen grains are released in the water.
  • In some species pollen grains are prevented from wetting by mucilaginous covering.

Question 11.
Parasites evolved special adaptations to live on host. What are they?
Answer:

  • Loss of unnecessary sense organs
  • Presence of suckers to cling on to the host
  • Loss of digestive system and
  • High reproductive capacity.

Question 12.
Domestic sewage and industrial effluents contain large amount of nutrients. What are the probable effects of these nutrients on water bodies?
Answer:

  1. It causes excessive growth of planktonic (free-floating) algae, called an algal bloom which gives colour to the water bodies.
  2. Algal blooms cause lose of water quality and fish mortality.

Question 13.
Match the Column A with Column B :

Column AColumn B
a) Human Alpha lactalbumin1) Elisa
b) Antigen-Antibody Interaction2) Eli Lily
c) Genetically engineered Insulin3) Corn Borer
d) Cry I Ab4) Rosie
5) Boll Worm

Answer:

Column AColumn B
a) Human Alpha lactalbuminRosie
b) Antigen-Antibody InteractionElisa
c) Genetically engineered InsulinEli lily
d) Cry I AbCorn Borer

Question 14.
Humification leads to accumulation of a dark coloured amorphous substance. Identify the substance and its peculiarities.
Answer:
The substance is humus.
It is highly resistant to microbial action and undergoes decomposition at an extremely slow rate. It serves as the reservoir of nutrients.

(Questions 15 to 18): Answer any 3 questions. Each question carries 3 scores. (3 × 3 = 9)

Question 15.
Bt cotton is a transgenic pest resistant plant.
a) How this was achieved?
b) How do this plant survive on pest attack?
Answer:
a) Cry genes are isolated from Bacillus thuringiensis and inserted into cotton by gene manipulation technique.

b) Bt toxin protein exists as inactive protoxins. It is converted into an active form in the presence of the alkaline pH of insect gut.

The activated toxin binds to the surface of midgut epithelial cells and creates pores that causes cell swelling and lysis and results in the death of insect.

Question 16.
Depending on the source of pollen, pollination can be divided into three types. What are they? Explain each.
Answer:
i) Autogamy:
It is the transfer of pollen grains from the anther to the stigma of the same flower.
ii) Geitonogamy:
Transfer of pollen grains from the anther to the stigma of another flower of the same plant.
iii) Xenogamy:
Transfer of pollen grains from anther to the stigma of a different plant.

Question 17.
Hydrach succession takes place in wetter areas and the successional series progress from ‘hydric’ to ‘mesic’ condition. List out the stages in correct sequence.
Answer:

  • Phytoplankton stage.
  • Submerged plant stage.
  • Submerged free-floating plant stage
  • Reed swamp stage
  • Marsh – meadow stage.
  • Scrub stage.
  • Forest stage.

Question 18.
Restriction endonuclease enzymes are used to cut the DNA at specific sequence.
a) Write the name of first isolated one.
b) Write the convention for naming these enzymes.
Answer:
a) Hind II

b) First capital letter – genus name
Second two letters – species name
Next letter – the strain of bacterium from which the restriction enzyme is isolated
Last roman letter – order of isolation of enzyme.

Plus Two Botany Previous Year Question Paper March 2019

Kerala State Board New Syllabus Plus Two Botany Previous Year Question Papers and Answers.

Kerala Plus Two Botany Previous Year Question Paper March 2019 with Answers

BoardSCERT
ClassPlus Two
SubjectBotany
CategoryPlus Two Previous Year Question Papers

Time: 1 Hour
Cool off time : 10 Minutes
Maximum : 30 Score

General Instructions to candidates:

  • There is a ‘cool off time’ of 15 minutes in addition to the writing time of 2 hrs.
  • You are not allowed to write your answers nor to discuss anything with others during the ‘cool off time’.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before you answering.
  • All questions are compulsory and only internal choice is allowed.
  • When you select a question, all the sub-questions must be answered from the same question itself.                  ,
  • Calculations, figures and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non programmable calculators are not allowed in the Examination Hall.

Answer All questions from 1 to 3. Each carries 1 score. (3 × 1 = 3)

Question 1.
What is the function of Restriction Endonuclease in recombinant DNA technology?
a) Linktogetherfragmentof DNA
b) Make millions of copies of DNA
c) Cut DNA into many fragments
d) Separate fragments of DNA
Answer:
Cut the DNA into many fragments

Question 2.
The government of India has introduced the concept of ……….., so as to work closely with the local communities for protecting and managing forests.
Answer:
Joint forest management (JFM)

Question 3.
Which among the following is not a greenhouse gas?
a) N2O
b) Methane
c) Carbon dioxide
d) Ozone
Answer:
d) Ozone

Answer any 9 questions from 4 to 14. Each carries 2 scores. (9 × 2 = 18)

Question 4.
Many countries encourage the cultivation of Genetically Modified Crops (G.M. Plants). Write any two advantages of GM plants.
Answer:
Made crops more tolerant to abiotic stresses (cold, drought, salt, heat)
2 Reduce reliance on chemical pesticides (pest resistant crop)

Question 5.
Match the columns (A) and (B)

AB
i) Mutualisma) An orchid growing on a tree trunk
ii) Predationb) Gauss’s Exclusion Principle
iii) Commensalismc) Biological control
iv) Competitiond) Derives nutrition from the host organism
e) Mycorrhiza

Answer:

AB
i) mutualismmycorrhiza
ii) predationbiological control
iii) commensalisman orchid growing on a tree trunk
iv) competitionGauses exclusion principle

Question 6.
Write the asexual reproductive structure given in the diagrams (a), (b), (c) and (d).
Plus Two Botany Previous Year Question Paper March 2019, 1
Answer:
a) zoospore
b) conidia
c) bud
d) gemmule

Question 7.
PCR and ELISA are two molecular diagnostic techniques.
a) How is PCR useful in molecular diagnosis?
b) What is the principle of ELISA?
Answer:
Early detection of disease is possible by these methods
a) PCR
i) used in the amplification of pathogenic nucleic acid.
ii) Find out cancer and other genetic diseases

b) ELISA – Antigen – antibody interaction

Question 8.
a) Identify the type of ecological pyramid given below.
b) Pyramid of energy is always upright. WHy?
Plus Two Botany Previous Year Question Paper March 2019, 2
Answer:
a) pyramid of biomass
b) energy decreases from one trophic level to the next or energy transfer from one trophic level to the next is 10%.

Question 9.
Deforestation is a serious issue in the present scenario. Write any two major consequences of deforestation.
Answer:

  1. Leads to global warming due to excess carbon dioxide
  2. Loss of biodiversity

Question 10.
Observe the flow chart given below:
a) Name the processes represented as A and B.
b) If ‘Nt’ is the population density at time t, then write down the population density equation at time t + 1.
Plus Two Botany Previous Year Question Paper March 2019, 3
Answer:
a) Mortality, Emigration
b) Nt + 1 = Nt + [(B + I) – (D + E)]

Question 11.
The early stages of embryo development are similar in both dicots and monocots. However, mature embryos have differences. Write two major differences between dicot embryo and monocot embryo.
Answer:

Dicot EmbryoMonocot Embryo
1. Two cotyledon present1. Single cotyledon present
2. Coleorhiza absent2. Coleorhiza present

Question 12.
Given below is a flow chart showing the accumulation of DDT in different trophic levels:
a) Name the phenomenon.
b) How does it affect bird population?
Plus Two Botany Previous Year Question Paper March 2019, 4
Answer:
a) Biomagnification.
b) High concentrations of DDT disturb calcium metabolism in birds, which causes the thinning of eggshell and their premature breaking, causing decrease in bird populations.

Question 13.
Detritivores play a major role in decomposition.
a) What are detritivores?
b) Write an example for a detritivore.
Answer:
a) Organism which breaks up detritus into smaller particles
b) Earthworm and termite

Question 14.
Double fertilization is a characteristic feature of angiosperms.
a) Which are the events in double fertilization?
b) Name the triploid nucleus formed as a result of double fertilization.
Answer:
a) syngamy and triple fusion
b) PEN (Primary endosperm nucleus)

Answer any 3 questions from 15 to 18. Each carries 3 scores. (3 × 3 = 9)

Question 15.
Recombinant DNA technology is a complex process which involves several steps. Write down the major steps in recombinant DNA technology.
Answer:

  • Isolation of the Genetic Material (DNA)
  • Cutting of DNA at Specific Locations
  • Amplification of Gene of Interest by using PCR
  • Insertion of Recombinant DNA into the Host Cell/Organism
  • Obtaining the Foreign Gene Product
  • Downstream Processing

Question 16.
The discovery of Restriction Endonuclease is considered as “milestone” in the history of genetic engineering.
a) Which is the first discovered restriction endonuclease?
b) What are the criteria for naming of restriction endonuclease?
Answer:
a) Hind II

b) first capital letter – genus name
second two letters – species name
next letter – the strain of bacterium from which the restriction enzyme is isolated
last roman letter – order of isolation of enzyme

Question 17.
Observe the diagram of young anther given below.
a) Identify the parts labelled as A, B, C and D
b) Which layer nourishes the developing pollen grains?
Plus Two Botany Previous Year Question Paper March 2019, 5
Answer:
a) A – Epidermis
B- Endothecium
C – Middle layer
D – tapetum

b) tapetum

Question 18.
Outbreeding in animals may be outcrossing, cross- creeding and interspecific hybridisation.
a) Give an example for a progeny obtained by interspecific hybridisation.
b) How does outcrossing differs from crossbreeding?
Answer:
a) Mule

b) Out-crossing:
It is mating of animals within the same breed, but having no common ancestors on either side of their pedigree up to 4-6 generations. The offspring produced called as out-cross.

Cross-breeding:
It is the method of mating superior males of one breed with superior females of another breed.

Plus Two Zoology Previous Year Question Paper Say 2018

Kerala State Board New Syllabus Plus Two Zoology Previous Year Question Papers and Answers.

Kerala Plus Two Zoology Previous Year Question Paper Say 2018 with Answers

BoardSCERT
ClassPlus Two
SubjectZoology
CategoryPlus Two Previous Year Question Papers

Time: 1 Hour
Cool off time : 10 Minutes
Maximum : 30 Score

General Instructions to Candidates :

  • There is a ‘cool off time’ of 10 minutes each for Botany and Zoology in addition to the writing time of 1 hour each. Further, there is ‘5 minutes’ ‘Preparatory Time’ at the end of the Botany Examination and before the commencement of Zoology Examination.
  • You are not allowed to write your answers nor to discuss anything with others during the ‘cool off time’ and ‘Preparatory time’.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before answering.
  • All questions are compulsory and the only internal choice is allowed.
  • When you select a question, all the sub-questions must be answered from the same question itself.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Answer all questions from 1 to 3. Each question carries 1 score. (3 × 1 = 3)

Question 1.
Number of spermatids produced from 25 primary spermatocyte are ………….
a) 25
b) 50
c) 100
d) 250
Answer:
c) 100

Question 2.
Study the relationship between the first two words and fill the blank space with a suitable word.
Sterilization in male: Vasectomy
Sterilization in female: ……….
Answer:
Tubectomy

Question 3.
Identify the bacterial disease from the following:
a) Typhoid
b) Amoebiasis
c) Malaria
d) Filariasis
Answer:
a) Typhoid

Answer any 9 questions 4 – 14. Each carries 2 scores. (9 × 2 = 18)

Question 4.
The incidence of STDs are reported more among the age group between 15 – 24 years.
a) What are STDs?
b) Suggest methods to prevent STDs.
Answer:
a) Sexually transmitted disease
b) i) Avoid sex with unknown partners/multiple partners.
ii) Always use condoms during coitus.

Question 5.
Observe the following cross between heterozygous dominant progeny and homozygous recessive parent. Answer the following questions.
Plus Two Zoology Previous Year Question Paper Say 2018, 1
a) Identify the cross.
b) Mention the significance of this cross.
Answer:
a) Test cross
b) In a testcross genotype of F1 can be determined when it is crossed with recessive parent.

Question 6.
Following diagram shows amino acid sequences of a part of β chain of Haemoglobin of two individuals. Observe the amino acid sequence and answer the following questions:
Plus Two Zoology Previous Year Question Paper Say 2018, 2
a) Which among the above indicates sickle cell anaemic condition?
b) Justify your answer.
c) Describe what is single base substitution.
Answer:
a) Second amino acid chain.
b) The defect is caused by the substitution of Glutamic acid by Valine at the sixth position of the beta globin chain of the haemoglobin molecule.
c) It is due to the single base substitution at the sixth codon of the beta globin gene from GAG to GUG.

Question 7.
“Human genome project is a mega project”. Give two reasons to explain this.
Answer:

  1. Determine the sequences of the 3 billion chemical base pairs.
  2. Store this information in database.
  3. Determine the sequences of the 3 billion chemical base pairs.

Question 8.
Observe the diagram and answer the following questions:
Plus Two Zoology Previous Year Question Paper Say 2018, 3
a) Identify the diagram.
b) Name the enzymes A, B and C.
Answer:
a) Lacoperon
b) A – beta galactosidase
B – Permease
C – Tranacetylase

Question 9.
In sewage treatment plants microbes play a significant role. Distinguish between primary and secondary treatment in sewage plants.
Answer:
Primary treatment: It is the removal of large and small particles from the sewage through filtration and sedimentation.

Secondary treatment: The primary effluent is passed into large aeration tanks that is agitated and air is pumped into it. It results the vigorous growth of useful aerobic microbes into floes.

Question 10.
Human beings can conserve and protect our eco-system and biodiversity. Prepare a handout to show different methods of Biodiversity conservation.
Answer:
In situ conservation:
Some areas are considered as ‘biodiversity hotspots’ that shows high species richness and high degree of endemism. So organisms are conserved in their natural habitat.

Ex situ Conservation:
It is the conservation of threatened animals and plants outside their natural habitat.

Question 11.
“Genetic code is universal in nature”.
a) Substantiate this statement.
b) Mention any two other salient features of genetic code.
Answer:
a) From bacteria to human being triplet codon code for the same amino acid.

b) i) The codon is triplet.
ii) One codon codes for only one amino acid, it is unambiguous.
iii) Some amino acids are coded by more than one codon, It is degenerate.
iv) The codon is read in mRNA in a contiguous fashion. There are no punctuations.

Question 12.
p2 + 2pq + q2 = 1 is the gene frequency of a popula¬tion showing an evolutionary priciple.
a) Name the principle
b) Enlist any three factors affecting this principle.
Answer:
a) Hardy weinberg principle.
b) Gene migration, Genetic drif, Mutation and Natural selection.

Question 13.
The blood group of a child is ‘O’. His father is with ‘A’ blood group and mother with ‘B’ blood group. Write down the genotype of the child and genotypes of parents.
Answer:
The genotype of child is O group
Father IA i
Mother IB i

Question 14.
Plus Two Zoology Previous Year Question Paper Say 2018, 4
Above homologous organs provide evidence for a particular type of evolution.
a) Identify the type of evolution.
b) What do you mean by homologous organs?
Answer:
a) Divergent evolution
b) Homologous organ – same structure but different function.

(Q. 15 to 18). Answer any three. Each carries 3 scores. (3 × 3 = 9)

Question 15.
Match the columns B & C with column A.

ABC
OvulationEndometriumLH
ImplantationUterusProgesterone
GestationGraafian follicleHCG

Answer:

ABC
OvulationGraafian follicleLH
ImplantationEndometriumprogesterone
GestationUterusHCG

Question 16.
Prepare a flowchart of evolution of man in descending order by choosing the names given below:
Homo sapiens, Homo erectus, Homo habilis, Australopithecines, Ramapithicus, Neanderthal
Answer:
Ramapithecus → Australopithecus → homo habilus → homo erectus → neanderthal man → Homo sapiens.

Question 17.
Classify the following barriers of innate immunity under three suitable headings:
Skin, Saliva, WBC, Monocyte, Mucus, Acid of stomach
Answer:
Physical barrier – skin and mucus
Physiological barrier – acid in stomach and saliva
Cellular barrier – WBC, Monocyte

Question 18.
Expand the following:
1) SNP
2) BAC
3) YAC
Answer:
1) SNP Single nucleotide polymorphism
2) BAC Bacterial artificial chromosome
3) YAC Yeast artificial chromosome

Plus Two Zoology Previous Year Question Paper March 2019

Kerala State Board New Syllabus Plus Two Zoology Previous Year Question Papers and Answers.

Kerala Plus Two Zoology Previous Year Question Paper March 2019 with Answers

BoardSCERT
ClassPlus Two
SubjectZoology
CategoryPlus Two Previous Year Question Papers

Time: 1 Hour
Cool off time : 10 Minutes
Maximum : 30 Score

General Instructions to Candidates :

  • There is a ‘cool off time’ of 10 minutes each for Botany and Zoology in addition to the writing time of 1 hour each. Further, there is ‘5 minutes’ ‘Preparatory Time’ at the end of the Botany Examination and before the commencement of Zoology Examination.
  • You are not allowed to write your answers nor to discuss anything with others during the ‘cool off time’ and ‘Preparatory time’.
  • Use the ‘cool off time’ to get familiar with the questions and to plan your answers.
  • Read questions carefully before answering.
  • All questions are compulsory and the only internal choice is allowed.
  • When you select a question, all the sub-questions must be answered from the same question itself.
  • Calculations, figures, and graphs should be shown in the answer sheet itself.
  • Malayalam version of the questions is also provided.
  • Give equations wherever necessary.
  • Electronic devices except non-programmable calculators are not allowed in the Examination Hall.

Answer all questions from 1 to 3. Each carries 1 score. (3 × 1 = 3)

Question 1.
Which among the following belongs to ex-situ conservation?
Wildlife sanctuaries, Biosphere reserves, Zoological parks, National parks, Sacred groves
Answer:
Zoological park

Question 2.
The milk produced during the initial few days of lactation is called …………
Answer:
Colostrum

Question 3.
Diagrammatic representation of the central dogma given below is not correct. Make necessary corrections and redraw it:
Plus Two Zoology Previous Year Question Paper March 2019, 1
Answer:
Plus Two Zoology Previous Year Question Paper March 2019, 2

Answer any 9 questions from 4 to 14. Each carries 2 scores. (9 × 2 = 18)

Question 4.
Prepare a flow chart showing the evolution of modem man in the hierarchical order of their evolution using the details given below:
Homo erectus, Homo habilis, Dryopithecus, Australopithecines, Homo sapiens, Ramapithecus, Neanderthal man
Answer:
Dryopitheus Ramapithecus → Australopithecus → Homo habilus → Homo erectus → Neanderthal man →
Homo sapiens.

Question 5.
Observe the figure given below:
Plus Two Zoology Previous Year Question Paper March 2019, 3
a) Identify the figure
b) How many histone molecules are present in the Histone core?
c) Distinguish Euchromatin and Heterochromatin
Answer:
a) Nucleosome
b) 8
c) euchromatin – Region of loosely packed chromatin Heterochromatin – Region of tightly packed chromatin.

Question 6.
Some examples of evolutionary structures are given below. Classify them under suitable heading:
a) Forelimb of Man, Cheetah, Whale, Bat
b) Wings of Butterfly, Bird
c) Thorns and tendrils of Bougainvillea and Cucurbita
d) Vertebrate hearts or brains
e) Eye of the Octopus and Mammals
f) Flippers of Penguins and Dolphins
Answer:
Homologous organs:
a) Forelimb of Man, Cheetah, Whale, Bat.
d) Vertebrate hearts or brains.
c) Thorns and tendrils of Bougainvillea and cucurbita.

Analogous organs:
e) Eye of the octopus and mammals.
f) Flippers of penguins and dolphins.
b) Wings of butterfly, bird

Question 7.
“The sex of the baby is determined by the father and not by the mother.” Do you agree with this statement? Substantiate your answer.
Answer:
yes.
In case the ovum fertilises with a sperm carrying X chromosome the zygote develops into a female (XX) and with Y-chromosome results into a male offspring. Thus the genetic makeup of the sperm that determines the sex of the child.

Question 8.
Find the odd one out. Justify your answer.
Down’s syndrome. Turner’s syndrome, Phenylketonuria, Klinefelter’s syndrome.
Answer:
Phenylketonuria, it is the mendelian disorder or metabolic disorder.

Question 9.
Observe the diagram given below showing the sectional view of the female reproductive system and name the parts labelled ‘A’, ‘B’, ‘C’ & ‘D’.
Plus Two Zoology Previous Year Question Paper March 2019, 4
Answer:
A – endometrium
B – ovary
C – isthmus
D – ampulla

Question 10.
Microbes are useful to human beings in diverse ways. If so, name the following:
a) Microbe known as ‘‘Baker’s Yeast”.
b) Lactic acid producing bacterium.
c) Fungus which helps in the production of bio-active molecule – cyclosporine A.
d) Symbiotic nitrogen fixing bacterium.
Answer:
A – Saccharomyces
B – Lactobacillus
C – Trichoderma
D – rhizobium

Question 11.
Complete the flow chart given below:
Plus Two Zoology Previous Year Question Paper March 2019, 5
Answer:
A – aquired immunity
B – Physiological barrier
C – Cytokine barrier
D – Cell mediated immunity

Question 12.
A wide range of contraceptive methods are presently available. If so,
a) Name one contraceptive method having least side effect.
b) Which contraceptive method is generally adviced for females as a termination method to prevent any more pregnancies?
c) List out any two possible ill-effects of the usage of contraceptive methods.
Answer:
a) Natural method
b) Tubectomy
c) Irregular menstrual bleeding and Breast cancer

Question 13.
The causes of biodiversity loss are designated as “EVIL QUARTET”. Explain the Evil Quartet in biodiversity loss.
Answer:

  • Habitat loss and fragmentation:
  • Over-exploitation
  • Alien species invasions
  • Co-extinctions

Question 14.
List of some diseases commonly occurring in man are given below. Arrange them based on causative organism in the table.
Malaria, Common cold, Filariasis, Typhoid, Ascariasis, Ringworms, Amoebiadid, Pneumonia

BacteriaFungusVirusprotozoans

Answer:

BacteriaFungusVirusprotozoans
TyphoidRingwormCommon coldamoebiasis
Pneumoniamalaria

Answer any 3 questions from 15 to 18. Each carries 3 scores. (3 × 3 = 9)

Question 15.
The amino acid composition of the relevant portion of β chain of two hemoglobin molecules (A & B) are shown below:
Plus Two Zoology Previous Year Question Paper March 2019, 6
a) Which one of the polypeptide chain is abnormal?
b) Name the disorder caused by it.
c) What is the reason for this abnormality?
d) What is the effect of this abnormality in such individuals?
Answer:
a) B
b) Sickle cell anemia
c) Substitution of glutamic acid by valine.
d) The mutant hemoglobin molecule under low oxygen tension causing the change in the shape of the RBC from biconcave disc to elongated sickle like structure.

Question 16.
The diagrammatic representation of the DNA fingerprint from a crime scene and that of a suspected persons are given below:
Plus Two Zoology Previous Year Question Paper March 2019, 7
a) What is your conclusion about the suspects based on DNA Fingerprint given?
b) What is VNTR?
c) Who developed this technique first?
Answer:
a) The DNA finger print of suspect II matches with DNA from the crime scene. So suspect II is identified as culprit.
b) variable number tandem repeats
c) Alec Jeffreys

Question 17.
a) Expand STDs.
b) Cite any two examples for STD.
c) Suggest any two methods for the prevention of STDs.
Answer:
a) sexually transmitted disease
b) Gonorrhoea, syphilis, genital herpes, chlamydiasis.
c) Avoid sex with unknown partners/multiple partners.

Question 18.
The diagrammatic representation of a process in bacteria is given below:
Plus Two Zoology Previous Year Question Paper March 2019, 8
a) Identify the process.
b) Name the enzyme involved in this process.
c) Explain the three major steps in this process.
Answer:
a) Transcription

b) DNA dependent RNA polymerase

c) Initiation:
RNA polymerase binds to promoter and initiates transcription (Initiation).
Elongation:
It uses nucleoside triphosphates as substrate and polymerises in a template.
Termination:
Once the polymerases reaches the terminator region, the nascent RNA and RNA polymerase falls off. This results in termination of transcription.

Plus One Computer Application Notes Chapter 10 IT Applications

Students can Download Chapter 10 IT Applications Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 10 IT Applications

E-Governance
The integration of computers and communication technology for the benefit of government functions to the public is termed as E-Governance by this Govt can serve the public in a convenient, efficient, and transparent manner.

Types of interactions in e-Governance facilitate interaction between different Stakeholders in governance

  • Government to Government(G2G): Electronically exchanging data or information among Government agencies, departments, or organizations.
  • Government to Citizens(G2C): Exchange information between Government and Citizens
  • Government to Business(G2B): Interaction between the Government and Businessmen.
  • Government to Employees(G2E): The exchange of information between the Government and its employees

E-Government infrastructure
a) State Data Centre(SDC): It is used for providing e-Governance to Government agencies(G2G), Citizens(G2C), Business persons(G2B) by National e-Governance Plan(NeGP). The services are

b) Kerala State Wide Area Network(KSWAN)
It is envisaged to be the core common network infrastructure for e-Governance and the State Information Infrastructure(SII), connecting Thiruvananthapuram, Kochi, and Calicut. It acts as the backbone of SII.

c) Common Service Centre(CSC): These are the web-enabled points of the government, private, and social sector services. They provide services such as Agriculture, Health, Banking, Educational, Entertainment, Commercial, Transport services for the rural citizens of India. In Kerala, Akshaya centers are working as CSC.

Akshaya centers: These were launched in 2002 in the Malappuram Dist. In Kerala by the project of Kerala State Information Technology Mission(KSITM). Its aim is to provide services such as e-grants, e filing, e district, e-ticketing, ration card application, voter Id application, insurance, and Banking to the peoples of Kerala.

Benefits of E-governance: Its main aim is to provide better service to the people at any time and place with high speed. In the modern world, it is very helpful and convenient for people.

  • It enables automation of Govt, services
  • It ensures the participation of citizens hence strengthen the democracy
  • It ensures more transparency hence eliminates corruption
  • It enhances the responsibilities of various Govt. Departments
  • Its proper implementation saves time and money of the people by avoiding unnecessary visits to offices.

Challenges to E-Governance

  • Due to lack of e-Literacy, there is difficulty to access the service of E-Governance.
  • High-security measures are required because of the possibility of cyberattacks.
  • Implementation and maintenance requires a huge amount and planning
  • Some people refuse to give personal information due to anxiety
  • Various Departments’ integration is needed for the efficiency and effectiveness of e- Governance

Useful E Governance websites
Plus One Computer Application Notes Chapter 10 IT Applications 1

E-business(electronic Business): Providing services or running a business through the internet is called E-business.

e-commerce and e-business: Both are different. E-commerce means Electronic commerce. It includes the exchange of goods or services through the internet that involves the exchange of money whereas e-Business includes activities to run a business.

Electronic Payment System(EPS): It is also called plastic money that is electronically exchanging money between two individuals or firms(buyers and sellers) in, an online environment.

E-banking (Electronic Banking): Through electronic channels doing all the banking activities at any time and place through the internet.

Advantages of e-business:

  • It overcomes geographical limitations
  • It reduces the operational cost
  • It minimizes the time and cost
  • It remains open all the time
  • We can locate the product faster from a wider range of choices

Challenges to E-business

  • Peoples are unaware of IT applications and its uses
  • Most peoples don’t have plastic money(credit/debit card) and net banking
  • It requires high-security measurements otherwise you may lose money
  • We can’t touch or smell products through online
  • Some companies may not have proper Goods delivery service.

Useful e-Business websites
Plus One Computer Application Notes Chapter 10 IT Applications 2

Learning: It is the use of electronic media(lt includes text, audio, video, image, animation, etc), educational technology(lt includes Satellite TV, CD ROM, Computer Based Learning, etc) and information and communication technologies(ICT- it uses intranet/extranet and web-based learning) in education.

e-Learning tools

  • Electronic books reader(eBooks): With the help of a tablet or portable computer or any other device we can read digital files by using an s/w is called electronic books reader.
  • e-text: The electronic format of textual data is called e-Text.
  • Online chat: Real-time exchange of text or audio or video messages between two or more people over the Internet.
  • e-Content: The data or information such as text, audio, video, presentations, images, animations etc, are stored in electronic format.
  • Educational TV channels: TV channels dedicated only for the e-Learning purpose.
    Eg. VICTERS (Virtual Classroom Technology on Edusat for Rural Schools OR Versatile ICT Enabled Resources for Students)

Advantages of E-Learning :

  • It can offer a variety of courses to a large number of students from distant locations.
  • It saves journey time and money, instructor fees, etc.
  • People can enjoy e-Learning at a lower cost
  • It enables people to do courses conducted by national or international institutions.

Challenges to e-Learning

  • Face to face contact between student and teachers is not possible
  • Proper interaction is limited lack of infrastructure facilities
  • Its implementation requires a computer and high-speed Internet
  • The pupil may not get the proper motivation
  • It does not provide a real lab facility

Useful e-Learning websites
Plus One Computer Application Notes Chapter 10 IT Applications 3

ICT applications in health care
In the field of medicine and healthcare computers play a very important role. Such as diagnosing diseases, monitoring patients during surgery etc.

Medical equipment: Most of the medical equipment such as CT scanner, MRI scanner, Ultra Sound scanner, ECG, ECHO test, TMT, etc work with the help of computers

Electronic Medical Record(EMR): It is a digital version of a paper chart that contains all of a patient’s medical history from one practice. An EMR is mostly used by doctors for diagnosis and treatment.

Web-based support/diagnosis
Internet is used by the doctors to acquire information to diagnose and give treatment to the patients who are suffering from diseases,

Telemedicine:
With the help of Tele-Medicine, equipment doctors and nurses can examine patients in remote locations by monitoring the patient conditions such as BP, temperature etc., and give the correct medical treatment. Telemedicine is implemented with a telephone line and a computer.

Research and development:
Computers play an inevitable role in almost every branch of science and engineering. The role of computers in different fields of research and development is unavoidable. The most complex genetic problem may be evaluated with the help of computers easily and can simulate the actual systems using a computer. The computers help in diagnosis, treatment of patients and better running of hospitals

ICT enabled services:
Business Process Outsourcing(BPO): A business firm’s main aim is to increase the profit by reducing the expenditure for this some works are transferred to other contractors(manpower supply company common in other countries). The parent company is not responsible to such employees but the work will be carried out smoothly.

Knowledge Process Outsourcing(KPO): It is a form of outsourcing. Here the main job is knowledge and information related that is carried out by a third party company.

Call center: It is a third party company and its main aim is to serve the public for the payment of bills, purchase of goods, doubt clearance, etc. Here Telephone facility is set up to handle incoming and outgoing calls about goods or services for an organization.

Teleconferencing: It is a way of conferring, discussing or communicating by audio and video circuits, by a group of people located in geographically distributed areas. There are two types of conferencing video and audio. In audio conferencing, the participants can’t see each other but only hear the voices of one another.

Video conferencing: It is a type of Teleconferencing. The participants can see each other live on-screen and can speak to each other with the help of teleconferencing. They must.be sit in conference rooms connected through a teleconference system(A video camera and a speakerphone are connected to a computer with an Internet connection).

Plus One Computer Application Notes Chapter 9 Internet

Students can Download Chapter 9 Internet Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 9 Internet

History of the Internet: the Internet means an international network of networks. The first form of Internet is ARPANET(Advanced Research Project Agency Network) started by the US Department of Defence for their military during 1970’s. In 1989 a team lead by Tim Berners Lee introduced WWW(World Wide Web) by using the protocol HTTP. In 1998, the Internet Corporation for Assigned Names and Numbers (ICANN) was established.

Internet: It is a network of networks. It means that the international network. We can transfer information between computers within nations very cheaply and speedily.

Intranet: A private network inside a company or organisation is called an intranet.
Extranet: It allows vendors and business partners to access the company resources.

The hardware and software requirements for the internet.

  • A computer with a modem (internal/external)
  • A telephone connection
  • An account with an ISP
  • A browser S/W eg: Internet ExplorerorMozilla…

Types of connectivity
There are two ways to connect to the internet. First one dialing to an ISP’s computer or with a direct connection to an ISP.

Dial-up Connection: Here the internet connection is established by dialing into an ISP’s computer. If ISP is not busy they verify the user name and password if it is valid they will connect our computer to the internet.lt uses Serial Line Internet Protocol (SLIP) or Point to Point Protocol (PPP). It is slower and has a higher error rate.

Direct connection: In direct connection, there is a fixed cable or dedicated phone line to the ISP. Here it uses ISDN (Integrated Services Digital Network) a high-speed version of a standard phone line. Another method is leased lines that uses fibre optic cables. Digital Subscribers Line (DSL) is another direct connection, this uses copper wires instead of fibre, optic for data transfer. Direct connection provides high-speed internet connection and error rate is less. Fibre To The Home(FTTH) uses optical fibers for data transmission.

Wireless broadband connectivity
a) Mobile broadband: Accessing the Internet using wireless devices like mobile phones, tablet, USB dongles.

b) Wi-MAX(Wireless Microwave Access): It uses microwaves to transmit information across a network in a range 2 GHz to 11 GHz over very long distance.

c) Satellite broadband: Accessing internet through satellite. A Very Small Aperture Terminal(VSAT) dish antenna and transceiver and modem are required at the user’s location. Expensive and high speed.

Internet access sharing methods:
One Internet connection can be shared among several computers using a LAN, Wi-Fi or Li-Fi
a) Using LAN: The Internet connection in a LAN can be shared among other computers in the network

b) Using Wi-Fi (Wireless Fidelity): It uses radio waves to transmit information across a network in a range of 2.4 GHz to 5 GHz in short distance. Nowadays this technology is used to access the internet in campuses, hypermarkets, hotels by using Laptops, Desktops, tablet, mobile phones etc

c) Using Li-Fi(Light Fidelity) network: It is a fast optical(uses visible light for data transmission) version of Wi Fi. Its main component is a LED. lamp that can transmit data and a photodiode that acts as a receiver.

Services on the Internet
a) www – World Wide Web – This means this website address is unique and can be accessed each nook and corner of the world.

b) A browser is a piece of software that acts as an interface between the user and the internal working of the. internet. With the help of a browser the user can search information on the internet and it allows user to navigate through the web pages. The different browsers are

  • Microsoft internet explorer
  • Mozilla Firefox
  • Netscape Navigator
  • Google Chrome
  • Opera

c. Web Browsing:

  1. The browser determines the URL entered.
  2. The browser asks the DNS for URLS corresponding IP address (Numeric address)
  3. The DNS returns tne address to the browser.
  4. The browser makes a TCP connection using the IP address.
  5. then it sends a GET request for the required file to the server.
  6. The server collects the file and send it back to the browser.
  7. The TCP connection is released.
  8. The text and the images in the web pages are displayed in the browser.

Search engines
By using search engines we will get a variety of information. It is a newly developed tool that helped to search the information on the internet more effectively and easily. Search engines are programs that help people to locate information from crores of website on internet using a database that consists of references. Users can interact with the search engine through the home page of the search engine. To get the information about artificial intelligence just type this in the box provided for it and click the search button. Search engines searches by using a particular search algorithm then displays the matching documents or web addresses. Search engine use soft wares called spiders or bots to search documents and their web addresses. Spiders search the internet using the directions given by the search engines and prepare an index and stores it in a database. The searching algorithm searched this database when the users submits a request and create a web page displaying the matching results as hyperlinks.
Eg: Google, Yahoo, Rediff etc.

Email(Electronic mail) : It is used to send text, multimedia messages between computers over internet. An example of an email id is [email protected]. Here jobi_cg is the user name, rediffmail is the website address and .com is the top-level domain which identifies the types of the organisation. To send an email we require an email address. Some websites provide free email facility. To send an email first type the recipient’s address and type the message then click the send button. The website’s server first check the email address is valid, if it is valid it will be sent otherwise the message will not be sent and the sender will get an email that it could not deliver the message. This message will be received by the recipient’s server and will be delivered to the recipient’s mailbox. He can read it and it will remain in his mailbox as long as he will be deleted. Simple Mail Transfer Protocol(SMTP) is used.

The email message contains the following fields.

  1. To: Recipient’s address will be entered here. Multiple recipients are also allowed by using coma.
  2. CC: Enter the address of other recipients to get a carbon copy of the message.
  3. bcc: The address to whom blind carbon copies are to be sent. This feature allows people to send copies to third recipient without the knowledge of primary and secondary recipients.
  4. From: Address of the sender
  5. Reply to: The email address to which replies are to be sent.
  6. Subject: Short summary of the message.
  7. Body: Here the actual message is to be typed.

The advantages of email are given below:

  • Speed is high
  • It is cheap
  • We can send email to multiple recipients
  • Incoming messages can be saved locally
  • It reduces the usage of paper
  • We can access the mailbox anytime and from anywhere.

The disadvantages are:

  • It requires a computer, a modem, software, and an internet connection to check the mail.
  • Some mails may contain viruses
  • Mailboxes are filled with junk mail. So very difficult to find the relevant mail.

a. Social media: Various social media are Internet forums, social blogs, microblogs etc.

  1. Internet forums: It is an online discussion site where people can exchange information about various issues like social, political, educational, etc in text form.
  2. Social blogs: Conducting discussions about particular subjects by entries or posts.
    Eg. Blogger.com
  3. Microblogs: It allows users to exchange short messages, multimedia files etc.
    Eg. www.twitter.com
  4. Wikis: In this, we can give our contributions regarding various topics.
    Eg. www.wikipedia.org
  5. Social networks: By using these websites we can post our data and view others’ data.
    Eg. www.facebook.com
  6. Content communities. By using these websites we can share multi-media files.
    Eg. www.youtube.com

b. Advantages of social media.

  • Bring people together: It allows people to maintain the friendship
  • Plan and organize events: It allows users to plan and organize events.
  • Business promotion: It helps the firms to promote their sales.
  • Social skills: There is a key role of the formation of society.

c. Disadvantages.

  • Intrusion to privacy: Some people may misuse personal information.
  • Addiction: sometimes it may waste time and money.
  • Spread rumours: The news will spread very quickly and negatively.

Cyber Security: It is used to provide protection of valuable information such as credit card information from unauthorized access, intentional access, deletion etc. while shopping on the internet.

Computer virus: A virus is a bad program or harmful program to damage the routine working of a computer system. It reduces the speed of a computer. It may delete the useful system files and make the computer useless.

Worm: It is a stand-alone malware program that replicates itself in order to spread to other computers. It slows down the traffic by consuming the bandwidth. In 2000 a worm called “ILOVEYOU” is affected by many computers.

Trojan horse: It appears as useful software but it is harmful software and it will delete useful software or files.

Spams: Sending an email without the recipient’s consent to promote a product or service is called spamming. Such an email is called spam.

Hacking: It is a process of trespassing computer networks. Two types of white hats and black hats. White hats hack the computer networks to test the security but black hats intentionally stealing valuable data or destroying data.

Phishing (Fishing): It is an attempt to get other information such as usernames, passwords, bank a/c details etc by acting as the authorized website. Phishing websites have URLs and home pages similar to their original ones and mislead others it is called spoofing.

Denial of Service(DoS) attack: Its main target is a Web server. Due to this attack, the Web server/computer forced to restart and this results in refusal of service to the genuine users. If we want to access a website first you have to type the website address in the URL and press the Enter key, the browser requests that page from the webserver. Dos attacks send a huge number of requests to the web server until it collapses due to the load and stop functioning.

Man in the Middle attacks: It is an attack in which an attacker secretly intercepts electronic messages sent by the sender to the receiver and then modifies the message and retransmit it to the receiver. To prevent this type, of attack encrypted connections such as HTTPS(HTTP Secure), SFTP(Secure FTP), etc, must be used, which will be displayed in the URL.

Preventing network attacks
Firewall: It is a system that controls the incoming and outgoing network traffic by analyzing the data and then provides security to the computer network in an organization from another network (internet)

Antivirus scanners: It is a tool used to scan computer files for viruses, worms, and Trojan horses and cure the infected system. If any fault found it stops the file from running and stores the file in a special area called Quarantine(isolated area) and can be deleted later.

Cookies: Cookies are small text files that are created when we visit a website that keeps track of our details. This information will help the hacker to use it for malicious purposes. It acts like spyware.

Guidelines for using computers over the internet

  • Emails may contain Viruses so do not open any unwanted emails
  • Download files from reputed sources(sites)
  • Avoid clicking on pop-up Advt.
  • Most of the Viruses spread due to the use of USB drives so use cautiously.
  • Use a firewall in your computer
  • Use anti-virus and update regularly
  • Take backups in regular time intervals

Plus One Computer Application Notes Chapter 8 Computer Networks

Students can Download Chapter 8 Computer Networks Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 8 Computer Networks

Computer network: Two or more computers connected through a communication media that allows the exchange of information between computers is called a Computer Network.
Eg: Internet

Need for network
The advantages of Networks are given below.

  1. Resource sharing: All the computers in a network can share software (programs, data ) and hardware (printer, scanner, CD drive, etc.).
  2. Reliability: If one computer fails, the other computer can perform the work without any delay. This is very important for banking, air traffic control, and other application.
  3. Price Vs Performance: A mainframe computer can be 10 times faster than a PC but it costs a thousand times a PC. Therefore instead of a mainframe 10 personal computers are used with less cost and the same performance.
  4. Communication Medium: It is a powerful communication medium. We can exchange information between computers in a network.
  5. Scalable: This means, System performance can be increased by adding computers to a network.

Terminologies
Bandwidth: The maximum amount of data that can be transmitted by the medium measured in Hertz.
Noise: It is the unwanted electrical or electromagnetic interferences that adversely affect the transmitted data signals.
Node: A computer or an I/O device connected to a network is called Node.

Data communication system
Communication is the exchange of information between two human beings. But data communication is the exchange of information between two computers(devices).
Message: It is the data/information to be transmitted from one computer to another
Sender: It is a computer or a device that sends data. It is also called source or transmitter
Receiver: It is a computer or a device that receives data.
Medium: It is the path through which a message transmitted from the sender to the receiver. There are two types Guided and Un Guided media. Protocol: The rules and conventions for transmitting data.

Communication Medium – There are two types guided and unguided.
Guided Media

  1. Twisted Pair cable – 2 types unshielded twisted pair and shielded twisted pair. Two copper wires individually insulated and twisted around each other and put in a plastic cover.
  2. Coaxial cable – A sturdy copper wire is insulated by plastic, it is covered just like a mesh by a conductor which is enclosed in a protective plastic coating. It is expensive, less flexible and more difficult to install. But it is more reliable and carry for higher data rates.
  3. Optical fiber – These are made of glass fibers that are enclosed in a plastic jacket. It uses light instead of electrical signals. The light sources are LED or ILD.

Unguided Media

  1. Radio waves – It transmits data at different frequencies ranging from 3 KHz. to 300 GHz.
  2. Microwaves – Microwave signals can travel in straight line if there is any obstacle in its path, it can’t bend. So it uses tall towers instead of short one.
  3. Infrared waves – These waves are used for transmitting data in short distance and its frequency range is 300 GHz to 400 GHz.

Wireless communication technologies using radio waves

  1. Bluetooth: This technology uses radio waves in the frequency range of 2.402 GHz to 2.480 GHz. And transmit data in a short distance. Mobile phones, Laptops, tablets etc use Bluetooth technology to transmit data.
  2. Wi-Fi(Wireless Fidelity): It uses radio waves to transmit information across a network in a range 2.4 GHz to 5 GHz in a short distance. Nowadays this technology is used to access internet in Laptops, Desktops, Tablets, Mobile phones etc.
  3. Wi-MAX(Wireless Microwave Access): It uses micro waves to transmit information across a network in a range 2 GHz to 11 GHz over very long distance.
  4. Satellites: By using satellites we can communicate from any part of the world to any other. The ground stations are connected via satellite. The data signals transmitted from earth to satellite (uplink) ahd from the satellite to the earth (downlink).

Data communication devices: It acts as an interface between computer and the communication channel

Network Interface Card (NIC): This device enables a computer to connect to a network and transmit information.

Hub: It is a small, simple and inexpensive device used to connect computers(devices) to a network. If a computer wants to transmit data to another computer. First it sends to the hub, the hub retransmits this data to all other computers. Each and every computer gets the data and check whether it is for them or not. It increases the network traffic and hence the transmission speed is low.

Switch: It is an expensive device used to connect computers(devices) to a network. Unlike a hub, switch transmit data not to all computers, it retransmits data only to the intended computer. So the traffic is less and speed is high

Repeater – It is a device used to strengthen weak signals on the network.

Bridge – It is a device used to link the same type of network.

Router – It is similar to a bridge, but it can connect two networks with different protocols.

Gateway – It is used to connect two different networks with different protocols.

Data terminal equipment: This device are used to control data flow to and from a computer

Modem – It is a device used to connect the computer to the internet. It converts the digital signal into an analog signal (modulation) and vice versa (Demodulation)

Multiplexer – It combines the inputs from different channels of a medium and produces one output.

Network topologies: Physical or logical arrangement of computers on a network is called structure or topology. It is the geometrical arrangement of computers in a network. The major topologies developed are star, bus, ring, tree, and mesh.

1. Star Topology: A star topology has a server all other computers are connected to it. If computer A wants to transmit a message to computer B. Then computer A first transmit the message to the server then the server retransmits the message to computer B. That means all the messages are transmitted through the server. Advantages are added or remove workstations to a star network is easy and the failure of a workstation will not affect the other. The disadvantage is that if the server fails the entire network will fail.

2. Bus Topology: Here all the computers are attached to a single cable called bus. Here one computer transmits all other computers listen. Therefore it is called a broadcast bus. The transmission from any station will travel in both the direction. The connected computers can hear the message and check whether it is for them or not.
Advantages are added or remove a computer is very easy. It requires less cable length and the installation cost is less. The disadvantage is fault detection is very difficult because of no central computer.

3. Ring Topology: Here all the computers are connected in the shape of a ring and it is a closed-loop. Here also there is no central computer. Here a computer transmits a message, which is tagged along with its destination computer’s address. The message travels in one direction and each node check whether the message is for them. If not, it passes to the next node.
It requires only short cable length. If a single node fails, at least a portion of the network will fail. To add a node is very difficult.

4. Hybrid Topology: It is a combination of any two or more network topologies. Tree topology and mesh topology can be considered as hybrid topologies.

a) Tree Topology: The structure of a tree topology is the shape of an inverted tree with a central node and branches as nodes. It is a variation of bus topology. The data transmission takes place in the way as in bus topology. The disadvantage is that if one node fails, the entire portion will fail.

b) Mesh Topology: In this topology, each node is connected to more than one node. It is just like a mesh (net). There are multiple paths between computers. If one path fails, we can transmit data through another path.

Types of networks
The networks are classified into the following based upon the amount of geographical area that covers.
i) Personal Area Network(PAN): It is used to connect devices situated in a small radius by using guided media or unguided media

ii) Local Area Network (LAN): This is used to connect computers in a single room, rooms within a building, or buildings of one location by using twisted-pair wire or coaxial cable. Here the computers can share hardware and software. The data transfer rate is high and the error rate is less.
eg: The computers connected in a school lab.

iii) Metropolitan Area Network (MAN): A Metropolitan Area Network is a network spread over a city. For example a Cable TV network. MAN has a lesser speed than LAN and the error rate is less. The here optical fiber cable is used.

iv) Wide Area Network (WAN): This is used to connect computers over a large geographical area. It is a network of networks.
Here the computers are connected using telephone lines or Micro Wave stations or Satellites. Internet js an example for this. LAN and MAN are. owned by a single organization but WAN is owned by multiple organizations. The error rate in data transmission js high. ,

Logical classification of networks
Peer to peer: In this configuration, all the computers have equal priority. That means each computer can function as both a client and a server. There is no dedicated server.

Client-Server: In this configuration, a computer is powerful which acts as a dedicated server and all others are clients (work stations). A Server fulfills the needs of the clients.

  • File Server: A computer that stores and manages files for other devices on a network
  • Web Server: A computer that handles the requests for web pages.
  • Print Server: A computer that handles the print jobs from other computers on a network.
  • Database Server: A computer that manages the database.

Network protocols
A protocol is a collection of rules and regulations to transfer data from one location to another. Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level. Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level

FTP – File Transfer Protocol which is used for transferring files between computers connected to local network or internet.
HTTP – is a protocol used for WWW for enabling the web browse to access web server and request HTML documents.
DNS (Domain Name System): When we type web sites address in the address bar , the browser determines the URL and asks the DNS for URLS corresponding IP address (Numeric address). The DNS returns the address to the browser.

Identification of computers over a network: A computer gets a data packet on a network, it can identify the sender’s address easily. It is similar to our snails mail, each letter is stamped in sender’s post office as well as receiver’s post office.

Media Access Control(MAC) address. It is a unique 12 digit hexadecimal number (IMEI for mobile phones, it is a 15 digit decimal number) assigned to each NIC by its manufacturer. This address is known as MAC address and its permanent.
It is of the form. MM:MM:MM:SS:SS:SS.
The first MM:MM:MM contains the ID number of the adapter company and the second SS:SS:SS represents the serial number assigned to the adapter by the company.

Internet Protocol (IP) address: An IP address has 4 parts numeric address. Each parts contains 8 bits. By using 8 bits we can represent a decimal number between 0 to 255(28=256 numbers). Each part is separated by dot. A total of 4*8=32 bits used. But nowadays 128 bits are used for IP address.

Uniform Resource Locator(URL): Every resource on the internet has a unique URL. Mainly it has three parts
Eg: http://www.hscap.kerala.gov.in/index.html.
http: http means hyper text transfer protocol. It is a protocol used to transfer hyper text.
www: World Wide Web. With an email address we can open our mail box from anywhere in the world.
hscap.kerala: It is a unique name. It is the official website name of Single Window System
gov: It is the top-level domain. It means that it is a government organization’s website.
in: It is the geographical top-level domain. It represents the country, in is used for India.
index.html: It represents the file name.

TOP Level Domain Names

  • .com – The site register for commercial purpose
  • .edu – The site register for educational purpose
  • .gov – The site register by Government agencies
  • .mil – The site register for military services
  • .net – The site register for network purpose
  • .org – The site register by organizations

Country Specific Domain Names

  • .in – India
  • .au – Australia
  • .ca – Canada
  • .ch – China
  • .jp – Japan
  • .us – United States of America

Plus One Computer Application Notes Chapter 7 Control Statements

Students can Download Chapter 7 Control Statements Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 7 Control Statements

These are classified into two decision making and iteration statements

Decision-making statements:
if statement:
Syntax: if (condition)
{
Statement block;
}
First, the condition is evaluated if it is true the statement block will be executed otherwise nothing will happen.

if… else statement:
Syntax: if (condition)
{
Statement block1;
}
Else
{
Statement block2;
}

Nested if
An if statement contains another if statement completely then it is called nested if.
if (condition 1)
{
if (condition 2)
{
Statement block;
}
}
The statement block will be executed only if both the conditions evaluated are true.

The else if ladder: The syntax will be given below
if (expression 1)
{
statement block 1;
}
else if (expression 2)
{
statement block 2;
}
else if (expression 3)
{
statement block 3;
}
else
{
statement block n;
}

Here firstly, expression 1 will be evaluated if it is true only the statement block1 will be executed otherwise expression 2 will be evaluated if it is true only the statement block 2 will be executed and so on. If all the expression evaluated is false then only statement block n will be executed

switch statement:
It is a multiple branch statement. Its syntax is given below.
switch(expression)
{
case value: statements;break;
case value: statements;break;
case value: statements;break;
case value: statements;break;
case value: statements;break;
…………..
default: statements;
}

First expression evaluated and selects the statements with matched case value. If all values are not matched the default statement will be executed.

Conditional operator: It is a ternary operator hence it needs three operands. The operator is ?:. Syntax: expression ? value if true : value if false. First evaluates the expression if it is true the second part will be executed otherwise the third part will be executed.

Iteration statements: If we have to execute a block of statements more than once then iteration statements are used.

while statement
It is an entry controlled loop. An entry controlled loop first checks the condition and execute(or enters in to) the body of loop only if it is true. The syntax is given below
Loop variable initialised
while(expression)
{
Body of the loop;
Update loop variable;
}

Here the loop variable must be initialised before the while loop. Then the expression is evaluated if it is true then only the body of the loop will be executed and the loop variable must be updated inside the body. The body of the loop will be executed until the expression becomes false.

for statement
The syntax of for loop is
for(initialization; checking ; update loop variable)
{
Body of loop;
}

First part, initialization is executed once, then checking is carried out if it is true the body of the for loop is executed. Then loop variable is updated and again checking is carried Out this process continues until the checking becomes false. It is an entry controlled loop.

do – while statement: It is an exit controlled loop. Exit control loop first execute the body of the loop once even if the condition is false then check the condition.
do
{
Statements
} while(expression);

Here the body executes at least once even if the condition is false. After executing the body it checks the expression if it false it quits the body otherwise the process will continue.

Plus One Computer Application Notes Chapter 6 Introduction to Programming

Students can Download Chapter 6 Introduction to Programming Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 6 Introduction to Programming

Structure of a C++ program
A typical C++ program would contain four sections as shown below.
Include files(Preprocessor directives)
Function declarations
Function definitions
Main function programs
Eg.
#include
using namespace std;
int sum(int x, int y)
{
return (x+y);
}
int main()
{
cout<<sum(2, 3);
}

Preprocessor directives: A C++ program starts with the preprocessor directive i.e., #include, #define, #undef, etc, are such a preprocessor directive. By using #inciude we can link the header files that are needed to use the functions. By using #define we can define some constants.
Eg. #define × 100. Here the value of x becomes 100 and cannot be changed in the program.
No semicolon is needed.

Header files:
header files: A header file is a pre-stored file that helps to use some operators and functions. To write C++ programs the header files are a must.
Following are the header files
iostream
iomanip
cstdio
cctype
cmath
cstring
The syntax for including a header file is as follows #include
Eg. #include

The main function: The main function is the first function which is invoked at the time of execution and the program ends within main(). The other functions are invoked from main().

Programming tips: The identifier name must be clear, precise, brief, and meaningful
Use clear and simple expressions.
Use comments wherever needed.
To give tips in between the program comments are used. A comment is not considered as part of the program and can not be executed. There are 2 types of comments single line and multiline.
Single line comment starts with //(2 slashes) but multi-line comment starts with /* and ends with */
indentation: Giving leading spaces to the statements is called indentation. It is a good programming practice.

Variable initialisation: Giving value to a variable at the time of declaration.
Eg: int age=16; Here the OS allocates 4 bytes memory for the variable age and it stores a value 16.

const – The access modifier: By using the keyword const we can create symbolic constants its value does not change during execution.
Eg: const int bp=100;

Type modifiers: With the help of type modifiers we can change the sign and range of data with the same size. The important modifiers are signed, unsigned, long and Short.
Plus One Computer Application Notes Chapter 6 Introduction to Programming 1
Shorthands in C++

Arithmetic assignment operators: It is faster. This is used with all the arithmetic operators as follows.
Plus One Computer Application Notes Chapter 6 Introduction to Programming 2
a) Increment operator(++): It is used for incrementing the content by one. ++x(pre increment) and x++ (post increment) both are equivalent to x = x+1.
b) decrement operator (–): It is used for decrementing the content by one. –x (pre decrement) and x– (post decrement) both are equivalent to x=x-1.

Prefix form: In this, the operator is placed before the operand and the operation is performed first then use the value.

Postfix form: In this, the operator is placed after the operand and the value of the variable is used first then the operation is performed.
Eg: Post increment a++
Here first use the value of ‘a’ and then change the value of ‘a’.
Eg: if a=10 then b=a++. After this statement b=10 and a=11 Pre increment ++a
Here first change the value of a and then use the value of a.
Eg: if a=10then b=++a. After this statement b=11 and a=11.

Precedence of operators: Consider a situation where an expression contains all the operators then the operation will be carried in the following order(priority)
Plus One Computer Application Notes Chapter 6 Introduction to Programming 3

Type conversion: Type conversions are of two types.
1) Implicit type conversion: This is performed by the C++ compiler internally. C++ converts all the lower sized data type to the highest sized operand. It is known as type promotion. Data types are arranged lower size to higher size is as follows.
unsigned int(2 bytes), int(4 bytes),long (4 bytes), unsigned long (4 bytes), float(4 bytes), double(8 bytes), long double(10 bytes)
2) Explicit type conversion: It is known as typecasting. This is done by the programmer. The syntax is given below.
(data type to be converted) expression
Eg. int x=10;
(float) x;
This expression converts the data type of the variable from integer to float.

Plus One Computer Application Notes Chapter 5 Data Types and Operators

Students can Download Chapter 5 Data Types and Operators Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 5 Data Types and Operators

Concepts of data types: The nature of data is different, data type specifies the nature of data we have to store.

C++ data types
Plus One Computer Application Notes Chapter 5 Data Types and Operators 1

Fundamental data types: It is also called built in data type. They are int, char, float, double and void
i) int data type: It is used to store whole numbers without fractional (decimal point) part. It can be either negative or positive. It consumes 4 bytes (32 bits) of memory. i.e. 232 numbers. That is 231 negative numbers and 231 positive numbers (0 is considered as +ve) So a total of 232 numbers. We can store a number in between -231 to + 231 – 1.

ii) char data type: Any symbol from the keyboard, eg. ‘A’, ‘?’, ‘9’„…. It consumes one byte( 8 bits) of memory. It is internally treated as integers, i.e: 28 = 256 characters. Each character is having a ASCII code, ‘a’ is having ASCII code 97 and zero is having ASCII code 48.

iii) float data type: It is used to store real numbers he. the numbers with decimal point. It uses 4 bytes(32 bits) of memory.
Eg. 67.89, 89.9 E-15.

iv) double data type: It is used to store very large real numbers. It uses 8 bytes(64 bits) of memory.

v) void data type: void means nothing. It is used to represent a function returns nothing.
User defined Data types: C++ allows programmers to define their own data type. They are Structure(struct), enumeration (enum), union, class, etc.
Derived data types: The data types derived from fundamental data types are called Derived data types. They are Arrays, pointers, functions, etc

Variables:
The named*memory locations are called variable. A variable has three important things

  1. variable name: A variable should have a name
  2. Memory address: Each and every byte of memory has an address. It is also called location (L) value
  3. Content: The value stored in a variable is called content.lt is also called Read(R) value.

Operators: An operator is a symbol that performs an operation. The data on which operations are carried out are called operands. Following are the operators
1) Input(>>) and output(<<) operators are used to perform input and output operation. Eg. cin>>n;
cout<<n;

2) Arithmetic operators: It is a binary operator. It is used to perform addition(+), subtraction(-), division (/), multiplication(*) and modulus(%-gives the remainder) operations.
Eg. If x = 10 and y = 3 then
Plus One Computer Application Notes Chapter 5 Data Types and Operators 2
x/y = 3, because both operands are integer. To get the floating point result one of the operand must be float.

3) Relational operator: It is also a binary operator. It is used to perform comparison or relational operation between two values and it gives either true(1) or false(0). The operators are <, <=, >, >=, == (equality)and !=(not equal to)
Eg. If x = 10 and y = 3 then
Plus One Computer Application Notes Chapter 5 Data Types and Operators 3

4) Logical operators: Here AND(&&), OR(||) are binary operators and NOT (!) is a unary operator. It is used to combine relational operations and it gives either true(1) or false(0).
If x = 1 and y = 0 then
Plus One Computer Application Notes Chapter 5 Data Types and Operators 4
Both operands must be true to get a true value in the case of AND (&&) operation.
If x = 1 and y = 0 then
Plus One Computer Application Notes Chapter 5 Data Types and Operators 5
Either one of the operands must be true to get a true value in the case of OR(||) operation
If x = 1 and y = 0 then
Plus One Computer Application Notes Chapter 5 Data Types and Operators 6

5) Conditional operator: It is a ternary operator hence it needs three operands. The operator is?:. Syntax: expression ? value if true: value if false. First evaluates the expression if it is true the second part will be executed otherwise the third part will be executed.
Eg. If x = 10 and y = 3 then
x>y ? cout<>) operator is used to perform input operation.
Eg. cin>>n;

Output statements
output(<<) operator is used to perform output operation.
Eg. cout<<n; Cascading of I/O operations The multiple use of input or output operators in a single statement is called cascading of i/o operators. Eg: To take three numbers by using one statement is as follows cin>>x>>y>>z;
To print three numbers by using one statement is as follows
cout<<x<<y<<z;

Plus One Computer Application Notes Chapter 4 Getting Started with C++

Students can Download Chapter 4 Getting Started with C++ Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 4 Getting Started with C++

It is developed by Bjarne Stroustrup. It is an extension of the C Language.

Character set: To study a language first we have to familiarize the character set. For example, to study the English language first we have to study the alphabet. Similarly here the character set includes letters(A to Z & a to z), digits(0 to 9), special characters(+, -, *, /, …..) white spaces(non printable) etc..

Token: It is the smallest individual unit similar to a word in English or Malayalam language. C++ has 5 tokens
1) Keywords: These are reserved words for the compiler. We can’t use it for any other purposes
Eg: float is used to declare variables to store numbers with a decimal point. We can’t use this for any other purpose

2) Identifier: These are user-defined words. Eg: variable name, function name, class name, object name, etc…

3) Literals (Constants): Its value does not change during execution
i) Integer literals: Whole numbers without fractional parts are known as integer literals, its value does not change during execution. There are 3 types of decimal, octal, and hexadecimal.
Eg. Fordecimal 100, 150, etc..
For octal 0100, 0240, etc..
For hexadecimal 0 × 100, 0 × 1A, etc

ii) Float literals: A number with fractional parts and its value does not change during execution is called floating-point literals.
Eg. 3.14157, 79.78, etc…

iii) Character literal: A valid C++ character enclosed in single quotes, its value does not change during execution.
Eg. ‘m’, ‘f ’ etc

iv) String literal: One or more characters enclosed in double-quotes is called string constant. A string is automatically appended by a null character(‘\0’)
Eg. “Mary’s”,’’ India”,etc

4) Punctuators: In English or Malayalam language punctuation marks are used to increase the readability but here it is used to separate the tokens.
Eg:{,},(,),…

5) Operators: These are symbols used to perform an operation (Arithmetic, relational, logical, etc…)

Integrated Development Environment(IDE): It is used for developing programs

  • It helps to write as well as editing the program.
  • It helps to compile the program and linking it to other (header files and other users) programs
  • It helps to run the program

Turbo C++ IDE
Following is a C++ IDE
Plus One Computer Application Notes Chapter 4 Getting Started with C++ 1
a) Opening the edit window
Method I: File → Click the menu item New
Method II: Press Alt and F simultaneously then press N

b) Saving the program:
Click File → Save or Press Function key F2 or Alt+F and then press S
Then give a file name and press ok.

c) Running/executing the program
Press Alt+R then press R OR Click Run → press R, OR Press Ctrl + F9

d) Viewing the output: Press Alt+F5

e) Closing Turbo C++ IDE
Click File → then press Quit menu Or Press Alt+X

Geany IDE
Plus One Computer Application Notes Chapter 4 Getting Started with C++ 2

  • Step 1: Take Geany Editor and type the program (source code)
  • Step 2: Save the file with extension .cpp
  • Step 3: Compile the program by Click the Compile Option
  • Step 4: After successful compilation, Click the Build option
  • Step 5: Then click on the Execute option

Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving

Students can Download Chapter 3 Principles of Programming and Problem Solving Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving

Problem-solving using computers:
It has no intelligent quotient. Hence they are slaves arid human beings are the masters. It can’t make its own decisions. They can perform tasks based upon the instructions given by the humans (programmers).

Approaches in problem-solving
Top-down design: Larger programs are divided into smaller ones and solve each task by performing simpler activities. This concept is known as a top-down design in problem-solving

Bottom-Up design: Here also larger programs are divided into smaller ones and the smaller ones are again subdivided until the lowest level of detail has been reached. We start solving from the lowest module onwards. This approach is called a Bottom-up design.

Phases in programming
1. Problem identification: This is the first phase in programming. The problem must be identified then only it can be solved, for this, we may have to answer some questions. During this phase, we have to identify the data, its type, quantity, and formula to be used as well as what activities are involved to get the desired output is also identified for example if you are suffering from stomach ache and consult a Doctor. To diagnose the disease the doctor may ask you some questions regarding the diet, duration of pain, previous occurrences, etc, and examine some parts of your body by using a stethoscope X-ray, scanning, etc.

2. Deriving the steps to obtain the solution.
There are two methods, Algorithm and flowchart, are used for this.
a) Algorithm: The step-by-step procedure to solve a problem is known as an algorithm. It comes from the name of a famous Arab mathematician Abu Jafer Mohammed Ibn Musaa Al-Khowarizmi, The last part of his name Al-Khowarizmi was corrected to the algorithm.

b) Flowchart: The pictorial or graphical representation of an algorithm is called a flowchart.
Flow chart symbols are explained below
1) Terminal (Oval)
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 1
It is used to indicate the beginning and end of a problem

2) Input/Output (parallelogram)
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 2
It is used to take input or print output.

3) Processing (Rectangle)
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 3
It is used to represent processing That means to represent arithmetic operation such as addition, subtraction, multiplication

4) Decision (Rhombus)
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 4
It is used to represent decision making. It has one entry flow and two exit flows but one exit path will be executed at a time.

5) Flowlines (Arrows)
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 5
It is used to represent the flow of operation

6) Connector
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 6

3. Coding: The dummy codes (algorithm) or flowchart is converted into a program by using a computer language such s Cobol, Pascal, C++, VB, Java, ….. etc.

4. Translation: The computer only knows machine language. |t does not know HLL, but the human beings HLL is very easy to write programs. Therefore a translation’ is needed to convert a program written in HLL into machine code (object code). During this step, the syntax errors of the program will be displayed. These errors are to be corrected and this process will be continued till we get a “No errors” message. Then it is ready for execution.

5. Debugging: The program errors are called ‘bugs’ and the process of detecting and correcting errors is called debugging. In general, there are two types of errors syntax errors and logical errors. When the rules or syntax of the language are not followed then syntax errors occurred and it is displayed after compilation. When the logic of a program is wrong then logical errors occurred and it is not displayed after compilation but it is displayed in the execution and testing phase.

6. Execution and Testing: In this phase, the program will be executed and give test data for testing the purpose of this is to determine whether the result produced by the program is correct or not. There is a chance of another type of error, Run time error, this may be due to inappropriate data.

7. Documentation: It is the last phase in I programming. A computerized system must be documented properly and it is an ongoing process that starts in the first phase and continues till its implementation. It is helpful for the modification of the program later.

Plus One Computer Application Notes Chapter 2 Components of the Computer System

Students can Download Chapter 2 Components of the Computer System Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 2 Components of the Computer System

Hardware: The tangible parts of a computer that we can touch and see are called hardware.
Eg: Monitor, Keyboard, Mouse, CPU, Etc.

Processors: It is the brain of the computer and consists of three components
Arithmetic Logic Unit(ALU) – As the name implies it performs all calculations and comparison operations.
Control Unit(CU)- It controls over all functions of a computer
Registers – It stores the intermediate results temporarily.

A CPU is an Integrated Circuit(IC) package that contains millions of transistors and other components. Popular Processors are Intel core i3, core i5, core i7, AMD Quadcore etc.
Important registers inside a CPU are

  • Accumulator: After performing an operation (arithmetic or logical) the result is stored in the accumulator
  • Memory Address Register(MAR): It stores the address of the memory location to which data is either read or written by the processor.
  • Memory Buffer Register (MBR) : It stores the data, either to be written to or read from the memory by the processor.
  • Instruction Register(IR): It stores the instructions to be executed by the processor.
  • Program Counter(PC): It stores the address of the next instruction to be executed by the processor.

Motherboard: It is a Printed Circuit Board(PCB). All the major components like Processor (Remember the processor must be compatible with the Motherboard), RAM, ROM, HDD, Graphics card, Sound card, etc are connected to the Motherboard.

Peripherals and Ports

  • Serial Port: It transmits data one bit at a time (eg: 101000001010). Its transmission speed
    is low but it is cheaper. It is suitable to transmit data over long distance.
  • Parallel port: It can transmit data more than one bit at a time. It is faster and used to connect the printer.
  • USB (Universal Serial Bus) port: It has high bandwidth hence it is faster. Nowadays it is used to connect all the devices like keyboard, mouse, printer, scanner, pen drive, digital camera, mobile phones, dongle etc.
  • LAN port: By using this port we can connect our computer to another network by a cable.
  • PS/2(Personal System/2) poet: It is introduced by IBM for connecting keyboard and mouse earlier.
  • Audio ports: It is used to connect audio devices like speakers, mic etc.
  • Video Graphics Array (VGA) port: It is introduced by IBM to connect a monitor or LCD projector to a computer.
  • High Definition Multimedia Interface(HDMI): Through this port, we can connect high definition quality video and multi-channel audio over a single cable.

Memory
Storage Unit(Memory Unit): A computer has huge storage capacity. It is used to store data and instructions before starts the processing. Secondly it stores the intermediate results and thirdly it stores information(processed data), that is the final results before send to the output unit(Visual Display Unit, Printer, etc)
Memory measuring units are given below.

  • 1 bit – 1 or 0(Binary Digit)
  • 4 bits – 1 Nibble
  • 1 bits – 1 Byte
  • 1024 Bytes – 1 KB(KiloByte)
  • 1024 KB – 1 MB(Mega Byte)
  • 1024 MB – 1 GB(Giga Byte)
  • 1024 GB – 1 TB(Tera Byte)
  • 1024 TB – 1 PB(Peta Byte)

Two Types of the storage unit
i) Primary Storage alias Main Memory: It is further be classified into Two – Random Access Memory (RAM) and Read-Only Memory (ROM). The one and only memory that the CPU can directly access is the main memory at a very high speed. It is expensive hence storage capacity is less.

RAM is volatile(when the power is switched off the content will be erased) in nature but ROM is nonvolatile (lt is permanent). In ROM a “boot up” program called BIOS(Basic Input Output System) is stored to “boots up” the computer when it switched on. Some ROMs are given below.
1. PROM(Programmable ROM): It is programmed at the time of manufacturing and cannot be erased.
2. EPROM (Erasable PROM): It can be erased and can be reprogrammed using special electronic circuit.
3. EEPROM (Electrically EPROM): It can be erased and rewritten electrically Cache Memory: The processor is a very high speed memory but comparatively RAM is slower than Processor. So there is a speed mismatch between the RAM and Processor, to resolve this a high-speed memory is placed in between these two this memory is called cache memory. Commonly used cache memories are Level(L1) Cache(128 KB), L2(1 MB)

ii. Secondary Storage alias Auxiliary Memory: Because of limited storage capacity of primary memory its need arises. When a user saves a file, it will be stored in this memory hence it is permanent in nature and its capacity is huge. Eg: Hard Disc Drive(HDD), Compact Disc(CD), DVD, Pen Drive, Blu Ray Disc etc.

a) Magnetic storage device: It uses plastic tape or metal/plastic discs coated with magnetic material.
Hard Disk: Instead of flexible or soft disk it uses rigid material hence the name hard disk. Its storage capacity and data transfer rate are high and low access time. These are more lasting and less error-prone. The accessing mechanism and storage media are combined together in a single unit and connect to the motherboard via cable.

b) Optical storage device.
Optical Disk: The high-power laser uses a concentrated, narrow beam of light, which is focused and directed with lenses, prisms and mirrors for recording data. These beams burn very very small spots in master disk, which is used for making molds and these molds are used for making copies on plastic disks. A thin layer of aluminum followed by a transparent plastic layer is deposited on it. The holes made by the laser beam are called pits, interpreted as bit 0 and unbumed areas are called lands interpreted as bit 1. Lower power laser beam is used to retrieve the data.

DVD(Digital Versatile Disc): It is similar to CD but its storage capacity is much higher. The capacity of a DVD starts.from 4.7 GB

Blu-ray Disc: It is used to read and write High Definition video data as well as to store very huge amount of data. While Cd and DVD uses red laser to read and write but it uses Blue-Violet laser, hence the name Bid ray disc. The blue-violet laser has a shorter wavelength than a red laser so it can pack more data tightly.

iii) Semiconductorstorage (Flash memory): It uses EEPROM chips. It is faster and long-lasting.
USB flash drive: It is also called a thumb drive or pen drive. Its capacity varies from 2 GB to 32 GB.
Flash memory cards: It is used in Cameras, Mobile phones, tablets etc to store all types of data.

Input/Output devices: It is used to supply data to the computer for processing
1. Keyboard: It is the most widely used device to input information in the form of words, numbers etc. There are 101 keys on a standard keyboard. The keys on the keyboard are often classified into alpha numeric keys (A to Z, 0 to 9), function keys (F1 to F12), special purpose keys (Special characters), cursor movement keys (arrow keys). While pressing a key, the corresponding code’s signal is transmitted to the computer.

2. Mouse: It is a pointing device, that controls the movement of the cursor, or pointer as a display screen. A mouse has two or.three buttons, it is often used in GUI oriented computers. Under the mouse there is a ball, when the mouse moves on a flat surface this ball also moves. This mechanical motion is converted into digital values that represent the x and y values of the mouse movement.

3. Light Pen: It is an input device that use a light-sensitive detector to select objects directly on a display screen using a pen. Light pen has a photocell placed in a small tube. By using light pen, we can locate the exact position on the screen.

4. Touch screen: It allows the user to enter data by simply touching on the display screen. This technology is applied in tablets, cell phones, computers etc.

5. Graphic tablet: It consists of an electronic writing area. We can create graphical images by using a special pen.

6. Touchpad: It is a pointing device found on portable computers(laptop). Just like a mouse it consists of two buttons below the touch surface to do the operations like left-click and right-click. By using our fingers we can easily operate.

7. Joy Stick: It is a device that lets the user move an object Quickly on the screen. It has a liver that moves in all directions and controls the pointer or object. It is used for computer games and CAD/CAM systems.

8. Microphone: By using this device we can convert voice signals into digital form.

9. Scanner: It is used to read text or pictures printed on paper and translate the information into computer-usable form. It is just like a photostat machine but it gives information to the computer.

10. Optical Mark Reader (OMR): This device identifies the presence or absence of a pen or pencil mark. It is used to evaluate objective type exams. In this method, special preprinted forms are designed with circles can be marked with dark pencil or ink. A high-intensity beam in the OMR* converts this into computer-usable form and detects the number and location of the pencil marks. By using this we can evaluate easily and reduce the errors.

11. Bar code/Quick Response (QR) code reader: Light and dark bars are used to record item name, code and price is called Bar Code. This information can be read and input into a computer quickly without errors using Bar Code Readers. It consists of a photo electric scanner and it is used in supermarket, jewellery, textiles etc. QR codes are similar to barcodes but it uses two dimensional instead of single-dimensional used in Barcode.

12. Biometric sensor: It is used to read unique human physical features like fingerprints, retina, iris pattern, facial expressions etc. Most of you give this data to the Government for Aadhaar.

13. Smart card reader: A plastic card(may be like your ATM card) stores and transmit data with the help of a reader.

14. Digital Camera: By using digital camera, we can take photographs and store in a computer. Therefore we can reduce the use of film. Hence it is economical.

Output devices: After the data processing the result is displayed as soft copy(soft copy can view, only by using a device) or hard copy(it can read
easily).
1) Visual Display Unit
a) Cathode Ray Tube (CRT) There are two types of CRT’s, mpnochrome (Black and white) and colour. Monochrome CRT consists of one electron gun but colour CRT consists of 3 electron guns (Red, Green and Blue) at one end and the other end coated with phosphor. It is a vacuum tube. The phosphor coated screen can glow when electron beams produced by electron guns hit, It is possible to create all the colours using Red, Green and Blue. The images produced by this is refreshed at the rate of 50 or 60 times each second. Its disadvantage is it is heavy and bulky. It consumes more power and emits heat. But it is cheap. Nowadays its production is stopped by the company.

b) Liquid Crystal Display (LCD): It consists of two electrically conducting plates filled with liquid crystal. The front plate has transparent electrodes and the back plate is a mirror. By applying proper electrical signals across the plates,1he liquid crystals either transmit or block the light and then reflecting it back from the mirror to the viewer and hence produce images.- It is used in where small sized displays are required.

c) Light Emitting Diode(LED): It uses LED behind the liquid crystals in order to light up the screen. It gives a better quality and clear image with wider viewing angle. Its power consumption is less.

d) Plasma Panels: It consists of two glass plates filled with neon gas. Each plate has several parallel electrodes, right angles to each other. When low voltage is applied between, two electrodes, one on each plate, a small portion of gas is glow and hence produce images. Plasma displays provide high resolution but are expensive. It is used in, where quality and size is a matter of concern.

e) Organic Light Emitting Diode(OLED) Monitors: It is made up of millions of tiny LEDs. OLED monitors are thinner and lighter than LCDs and LEDs. It consumes less power and produce better quality images but it is very expensive.
LCD projector : It is used to display video, images or data from a computer on a large screen. Its main component is a high intensity light-producing bulb and a lens.

2) Printer: There are two types of printers impact and non impact printers. Printers are used to produce hard copy.
Impact Printers : There is a mechanical contact between print head and the paper.

i) Dot Matrix Printer: Here characters are formed by using dots. The printing head contains a vertical array of pins. The letters are formed by’ using 5 dot rows and 7 dot columns. Such a pattern is called 5×7 matrix. This head moves across the paper, the selected pins fire against an inked ribbon to form characters by dot. They are capable of faster printing, but their quality is not good.

Non-impact Printers : There is no mechanical contact between print head and paper so carbon copies cannot be possible to take. They are inkjet, laser, thermal printers etc. .

a) Ink jet Printer: It works in the same fashion asdot matrix printers, but the dots are formed with tiny droplets of ink to be fired from a bottle through a nozzle. These droplets are deflected by an electric field using horizontal and vertical deflection plates to form characters and images. It is possible to generate colour output. They produce less noise1 and produce high quality printing output. The printing cost is higher. Here liquid ink is used.

b) Laser Printer: It uses photo copying technology. Here instead of liquid ink dry ink powder called toner is used. A drum coated with positively charged photo conductive material is scanned by a laser beam. The positive charges that are illuminated by the beam are dissipated. The drum is then rolled through a reservoir of negatively charged toner which is picked up by the charged portions of the drum. It adheres to the positive charges and hence creating a page image on the drum. Monochrome laser printer uses a single toner whereas the colour, laser printer uses four toners. Its print quality is good less noise and printing cost is higher.

c) Thermal Printers: It is same as dot matrix printer but it needs heat sensitive paper. It produces images by pushing electrically heated pins to the special paper. It does not make an.impact on the paper so we cannot produce carbon copies, ft produce less noise, low quality print and inexpensive. It is used in fax machine.

3. Plotter
A plotter is a device that draws pictures or diagrams on paper based on commands from a computer. Plotters draw lines using a pen. Pen plotters generally use drum or flat bed paper holders. In a drum plotter the paper is mounted on the surface of a drum. Here the paper is rotated. But in a flat bed plotter the paper does not move and the pea holding mechanism provides the motion that draws pictures. Plotters are used in engineering applications where precision is needed.

4. Three Dimensional (3D) printer: This device is used to print 3D objects.

5. Audio output devices: Speakers are used to produce sound by the backward and forward movement of the diaphragm in the speaker according to the electrical signals from the computer through the audio port.

e-Waste(electronic waste): It refers to the mal functioning electronic products such -as faulty computers, mobile phones, tv sets, toys, CFL etc.

Why should we concern about e Waste?
It contains poisonous substances such as lead, mercury, cadmium etc and may cause diseases if not properly managed.

What happens to e-Waste?
A small amount is recycled. Due to this our natural resources are contaminated(poisoned). Some of them can recycle properly. But it is a very big problem in front of the Government to collect segregate, recycle and disposal of e-Waste.

e-Waste disposal methods

  • Reuse: Reusability has an important role in e-Waste management and can reduce the volume of e-Waste
  • Incineration: It is the process of burning Waste at high temperature in a chimney
  • Recycling of e-Waste: It is the process of making new products from this e-Waste.
  • Landfilling: It is used to level pits and cover by a thick layer of soil.

Students role in e-Waste disposal

  • Stop buying unnecessary electronic equipment
  • Repair Faulty electronic equipment instead of buying a new one.
  • Give electronic equipment to recycle
  • Buy durable, efficient, quality, toxic-free, good warranty products
  • check the website or call the dealer if there is any exchange scheme
  • Buy rechargeable battery products

Green computing or Green IT: It is the study and practice of eco-friendly computing or IT such as designing, manufacturing, using and disposal of .computers and components (monitors, printers, storage devices etc.)
Following are some steps to follow to reduce the adverse impact on the global environment
Turn off computer and other devices when not in use ‘

  • Use power saver mode
  • Use laptops instead of desktops
  • Avoid print outs if not needed
  • Use LCD s instead of CRT s to save power
  • Use Energy Star rated HA/V or S/w and Solar energy(Hybrid Energy)
  • Dispose e Waste properly as per norms

Following are the steps to promote green computing
Green design: Design energy-efficient and eco-friendly devices
Green manufacturing: reduce non-eco-friendly parts while manufacturing
Green use: Use energy saver devices
Green disposal: Use easily disposable devices

Software: The set of instructions that tell the hardware how to perform a task is called software. Without software, computers cannot do anything. Two types of System s/w and Application s/w
System software:
It is a collection of programs used to manage system resources and control its operations. It is further classified into two.

  • Operating System
  • Language Processor

a) Operating System: It is a collection of programs which acts as an interface between user and computer. Without an operating system computer cannot do anything. Its main function is make the computer usable and use hardware in an efficient manner.
eg: Windows XP, Windows Vista, Linux, Windows 7, etc.

Major functions of an operating System
i) Process management: It includes allocation and deallocation of processes(program in execution) as well as scheduling system resources in efficient manner
ii) Memory management: It takes care of allocation and de allocation of memory in efficient manner
iii) File management: This includes organizing, naming , storing, retrieving, sharing , protecting and recovery of files.
iv) Device management: Many devices are connected to a computer so it must be handled efficiently.

b) Language Processes: We know that a program is a set of instructions. The instructions to the computer are written in different languages. They are high-level language (HLL) andjow level language. In HLL English like statements are used to. write programs. They are C, C++, COBOL, PASCAL, VB, Java etc. HLL is very easy and can be easily understood by the human being.
Low level language are classified into Assembly Language and Machine Language.
In assembly language mnemonics (codes) are used to write programs
ADD A, B A = A + B
SUB A, B A = A – B
INC A A = A + 1

In Machine Language 0’s and 1’s are used to write program. It is very difficult but this is the only language which is understood by the computer. Usually programmers prefer HLL to write programs because of its simplicity. But computer understands only machine language. So there is a translation needed. The program which perform this job are language processors.
The different language processors are given below:
1) Assembler: This converts programs written in assembly language into machine language.
2) Interpreter: This converts a HLL program into machine language by converting and executing it line by line. The first line is converted if there is no error it will be executed otherwise you have to correct it and the second line and so on.
3) Compiler: It is same as interpreter but there is a difference it translates HLL program into machine language by converting all the lines at
a time. If there is no error then only it will be executed.

II. Application Software
Programs developed to serve a particular application is known as application software.
eg: MS Office, Compression Utility, Tally etc.
Application software can further be subdivided into
three categories.

  • Packages
  • Utilities
  • Customized Software

a) Packages: Application software that makes the computer useful for people to do every task. Packages are used to do general-purpose applications.
They are given below:
1) Word Processes : This is used for creation and modification of text documents. That means a word processor helps the people to create, edit and format a textual data with less effort and maximum efficiency. By using word processor we can change font and font size of character, change alignment (left, right, center and justify), check spelling and grammar of the whole document etc. eg: MS Word.

2) Spread Sheets: It contains data or information in rows and columns and can perform calculation (Arithmetic, Relational and logical Operation). It helps to calculate results of a particular formula and the formula can apply different cells (A cell is the intersection of a row and column. Each column carries an alphabet for its name and row is numbered). It is used to prepare budgets, balance sheets, P & L account, Payroll etc. We can easily prepare graphs and charts using data entered in a worksheet. A file is a work.book that contains one or more work sheets, eg: MS Excel is spreadsheet software.

3. Presentation and Graphics: You can present your idea with sound and visual effects with the help of presentation software by preparing slides. The application software that manipulate visual images is known as graphics software.
Eg: MS PowerPoint is a presentation package.

4. Data base package: Database is a collection of large volume of data. DBMS is a set of programs that manages the datas are for the centralized control of data such that creating new fecords to the database, deleting, records whenever not wanted from the database and modification of the existing database. Example for a DBMS is MS Access.

DTP Packages: DTP means Desk Top Publishing. By using this we can create books, periodicals, magazines etc. easily and fastly. Now DTP packages are used to create in Malayalam also, eg:-PageMaker.

b) Utilities: Utilities are programs which are designed to assist computer for its smooth functioning. The utilities are given below:

  1. Text editor: It is used for creating and editing text files.
  2. Backup utility: Creating a copy of files in another location to protect them against loss, if your hard disk fails or you accidentally overwrite or delete data.
  3. Compression Utility: It is used to reduce the , size of a file by using a program and can be restored to its original form when needed.
  4. Disk Defragmenter: It is used to speeds up disk access by rearranging the files that are stored in different locations as fragments to contiguous memory and free space is consolidated in one contiguous block.
  5. Virus Scanner: It is a program called antivirus software scans the disk for viruses and removes them if any virus is found.

c) Specific purpose software (Customized software): It is a collection of programs which are developed to meet user needs to serve a particular application. It is also called tailor-made software.

Free and open source software: Here “free” means there is no copy right or licensing. That is we can make copies of the s/w or modify the source code without legal permission of its vendor (creator) we can use and distribute its copy to our friends without permission. That is Freedom to use ,to modify and redistribute.
The Four freedoms are

  • Freedom 0: To run program for any purpose
  • Freedom 1: To study how it works and allows you to adapt according to your needs. Also allows accessing source code.
  • Freedom 2: Allows to take copies and distribute
  • Freedom 3: Allows you to change source code and release the program.

Examples for Free and open source software are given below
Linux: it is a free s/w. If was written by Linux Trovalds at the University of Helsinki. It is a GUI and multi-user, multi-tasking O.S. with many more other features. It is also independent of the hardware. It is used by ISP’s, programmers who uses Java to Write program, etc. The main Linux distributors are. Open Linux Red hat, Debian, Gnu Linux, etc…

GNU/Linux: It was organized by Richard Stallman in 1983

GIMP (GNU Image Manipulation Program): It is a very helpful software to perform all the activities to an image.

Mozilla Firefox: This web browser helps users to browse safely.

OpenOffice.org: This package contains different s/w s that help the users to draft letters neatly by using “Writer”, perform calculations by using “Calc” and prepare presentations by using “Impress”. It is platform-independent (That means it works on both Linux and Windows platfprms.

Freeware: A s/w with Copy right is available free of cost for unlimited use.

Shareware: It is an introductory pack distributed on a trial basis with limited functionality and period.

Plus One Computer Application Notes Chapter 1 Fundamentals of Computer

Students can Download Chapter 1 Fundamentals of Computer Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 1 Fundamentals of Computer

Data and Information
Data: It represents raw facts and figures. It may be a number, string(combination of characters), etc.
Eg: Alvis, 6, First
Information: It is meaningful and processed form of data
Eg: Alvis aged 6 years is in first standard.

Data Processing: Data processing is defined as a series of actions or operations that converts data into useful information.
Data processing phases (6)

  1. Capturing data – In this step acquire or collect data from the user to input into the computer.
  2. Input – It is the next step. In this step appropriate data is extracted and feed into the computer.
  3. Storage – The data entered into the computer must be stored before starting the processing.
  4. Processing/Manipulating data – It is a laborious work. It consists of various steps like computations, classification, comparison, summarization, etc. that converts input into output.
  5. Output of information – In this stage, we will get the results as information after processing the data.
  6. Distribution of information – In this phase the information(result) will be given to the concerned persons/computers.

Functional units of computer
A computer is not a single unit but it consists of many functional units(lntended to perform jobs) such as Input unit, Central Processing Unit(ALU and Control Unit), Storage (Memory) Unit and Output Unit.
1. Input Unit: Its aim is to supply data (Alphanumeric, image , audio, video, etc.) to the computer for processing. The Input devices are keyboard, mouse, scanner, mic, camera, etc

2. Central Processing Unit (CPU): It is the brain of the computer and consists of three components
Arithmetic Logic Unit(ALU) – As the name implies it performs all calculations and comparison operations.
Control Unit(CU) – It controls the overall functions of a computer.
Registers – It stores the intermediate results temporarily.

3. Storage Unit(Memory Unit): A computer has huge storage capacity. It is used to store data and instructions before starts processing. Secondly, it stores the intermediate results and thirdly it stores information(processed data), that is the final results before send to the output unit(Visual Display Unit, Printer, etc)

Two Types of the storage unit
i. Primary Storage alias Main Memory: It is further be classified into Two- Random Access Memory(RAM) and Read-Only Memory(ROM). The one and only memory that the CPU can directly access is the main memory at a very high speed. It is expensive hence storage Capacity is less. RAM is volatile (when the power is switched off the content will be erased) in nature but ROM is non-volatile (It is permanent)

ii. Secondary Storage alias Auxiliary Memory: Because of the limited storage capacity of primary memory its need arises. When a user saves a file, it will be stored in this memory hence it is permanent in nature and its, capacity is huge.
Eg: Hand Disc Drive(HDD), Compact Disc(CD), DVD, Pen Drive, Blu Ray Disc etc.

4. Output Unit: After processing the data we will get information as result, that will be given to the end user through the output unit in a human-readable form. Normally monitor and printer are used.

Computer: It is an electronic machine used to perform tasks based upon set of instructions and produce results at a high degree of accuracy and speed.
Advantages of computer:

  1. Speed – It can perform operations at a high speed.
  2. Accuracy – It produces result at a high degree of accuracy.
  3. Diligence – Unlike human beings, a computer is free from monotony, tiredness, Jack of concentration etc. We know that it is an electronic machine. Hence it can work hours without making any errors.
  4. Versatility – It is capable of performing many tasks. It is useful in many fields.
  5. Power of Remembering – A computer consists of huge amount of memory. So it can store and recall any amount of information without delay. Unlike human beings it can store huge amount of data and can be retrieved whenever the need arises.

Disadvantages of computer

  1. No. IQ: It has no intelligent quotient. Hence they are slaves and human beings are the masters. It can’t make its own decisions.
  2. No feelings: Since they are machines they have no feelings and instincts. They can perform tasks based upon the instructions given by the humans (programmers).

Number System: It is a systematic way to represent numbers in different ways. Each number system has its own Base, that is a number and that number of symbols or digits used.
The various number systems are given below:
Most Significant Digit (MSD): The digit with the most weight is called MSD. MSD is also called Left Most Digit(LMD)
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 1
Least Significant Digit (LSD): The digit with the least weight is called LSD. LSD is also called Right Most Digit(RMD)
Eg:
1) 106 : Here MSD : 1 and LSD : 6
2) 345.78: Here MSD : 3 and LSD : 8
A Binary Digit is also called a bit.
The weight of each digit of a number can be represented by the power of its base.

Number conversions
In general, to convert a decimal number into another number system(binary or octal or hexadecimal) do the following
Divide the number successively by the base of the number system do you want to convert and write down the remainders from bottom to top.
To convert a decimal fraction into another number system .multiply the number by the base of the number system do you want to convert then integer part and fractional part are separated again multiply the fractional part by the base and do the steps repeatedly until the fractional part becomes zero. Finally, write down the integer part from top to bottom.

Decimal to Binary: Divide the number by the base 2 successively and write down the remainders from bottom to top.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 2
Decimal fraction to binary
multiply the number by the base 2 then the integer part and fractional part are separated again multiply the fractional part by the base 2 and do the steps repeatedly until the fractional part becomes zero.
Finally, write down the integer part from top to bottom.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 3
Decimal to Octal: Divide the number by the base 8 successively and write down the remainders from bottom to top.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 4
Decimal fraction to octal
multiply the number by the base 8 then integer part and fractional part are separated again multiply the fractional part by the base 8 and do the steps repeatedly until the fractional part becomes zero.
Finally write down the integer part from top to bottom.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 5
Decimal to Hexadecimal: Divide the number by the base 16 successively and write down the remainders from bottom to top.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 6
Decimal fraction to hexadecimal
multiply the number by the base 16 then integer part and fractional part are separated again multiply- the fractional part by the base 16 and do the steps repeatedly until the fractional part becomes zero. Finally write down the integer part from top to bottom.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 7
Converting a number from any number system into decimal: For this multiply each digit by its corresponding weight and sum it up.

Binary to decimal conversion: For this multiply each bit by its corresponding weight and sum it up. The weights are power of 2.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 8
Octal to decimal conversion: For this multiply each bit by its corresponding weight and sum it up. The weights are the power of 8.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 9

Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 10

Hexadecimal to decimal conversion: For this multiply each bit by its corresponding weight and sum it up. The weights are the power of 16.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 11

Octal to binary conversion: Convert each octal digit into its 3-bit binary equivalent.
Consider the following table
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 12

Hexadecimal to binary conversion: Convert each Hexadecimal digit into its 4-bit binary equivalent.
Consider the following table
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 13

Binary to octal conversion
Divide the binary number into groups of 3 bits starting from the right to left(But in the fractional part start dividing from left to right). Insert necessary zeros in the left side(or right side in the case of fractional part)if needed and write down the corresponding octal equivalent.
Eg: (10100110)2= ()8?
Insert one zero in the left side to form 3 bits group
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 14

Binary to Hexadecimal conversion
Divide the binary number into groups of 4 bits starting from the right to left (But in the fractional part start dividing from left to right). Insert necessary zeros in the left side(or right side in the case of fractional part) if needed and write down the corresponding Hexadecimal equivalent.
Eg: (100100110)2 = ()16?
Insert 3 zeros in the left side to form 4 bits group
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 15

Octal to Hexadecimal conversion
First, convert an octal number into binary, then convert this binary into hexadecimal
Eg: Convert (67)8 = ( )16
Step I. First, convert this number into the binary equivalent for this do the following:
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 16
Step II. Next, convert this number into the hexadecimal equivalent for this do the following.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 17
So the answer is (67)8 = (37)16

Hexadecimal to octal conversion
First convert Hexadecimal to binary, then convert this binary into 0ctal
Eg: Convert (A1)16 = ()8?
Step I. First convert this number into the binary equivalent. For this do the following
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 18
Step II. Next convert this number into octal equivalent. For this do the following.
So the answer is (A1)16 = (241)8

Data representation: The data stored in the computer memory is in the form of binary.

Representation of integers
There are three ways to represent integers on computers. They are as follows:

  1. Sign and Magnitude-Representation (SMR)
  2. 1’s Complement Representation
  3. 2’s Complement Representation

1) SMR: Normally a number has two parts sign and magnitude.
eg: Consider a number +5. Here + is the sign and 5 is the magnitude. In SMR the Most Significant Bit (MSB) js used to represent the sign. If MSB is 0 sign is +ve and MSB is 1 sign is -ve.
eg: If a computer has word size is 1 byte then +5 is represented as 0 0 0 0 0 1 0 1
-5 is represented as 1 0 0 0 0 1 0 1
Here MSB is used for a sign then the remaining 7 bits are used to represent magnitude. So we can represent 27 = 128 numbers. But there are negative and positive numbers. So 128 + 128 = 256 number. The numbers are 0 to +127 and 0 to -127. Here zero is repeated. So we can represent 256 – 1 = 255 numbers.

2) 1’s Complement Representation: To get the 1’s complement of a binary number, just replace every 0 with 1 and every 1 with 0. Negative numbers are represented using 1’s complement but +ve number has no 1’s complement.
eg: To find the 1 ’s complement of -21 + 21 = 0 0 0 1 0 1 0 1
To get the 1’s complement change all 0 to 1 and all 1 to 0.
-21 = 11101010
1’s complement of -21 is 1 1 1 0 1 0 1 0
Eg: 2) Find the 1’s complement of +21
Positive numbers are represented by using SMR.
+21 = 0 0 0 1 0 1 0 1 (No need to take the 1’s complement)

3) 2’s Complement Representation: To get the 2’s complement of a binary number, just add 1 to its 1’s complement +ve number has no 2’s complement.
eg:- To find the 2’s complement of -21
+21 = 0 0 0 1 0 1 0 1
First take the 1 ’s complement for this change all 1 to 0 and all 0 to 1
-21 = 1 1 1 0 1 0 1 0
Then add 1 = 1 1 1 0 1 0 1 1
2’s complement of -21 is 1 1 1 0 1 0 1 1

b) Representation of floating point numbers.
A real number consists of an integer part and fractional part and represent by using Exponent and Mantissa method. This method is also used to represent too big numbers as well as too small numbers.
Eg: .0000000000000000000000001 can be represented easily as 1 × 10-25. Here 1 is the Mantissa and -25 is the exponent.
A computer with 32 bit word length is used 24 bits for mantissa and the remaining 8 bits used to store exponent.
1. Representation of characters,
a) ASCII(American Standard Code for Information Interchange): It is 7 bits code used to represent alphanumeric and some special characters in computer memory. It is introduced by the U.S. government. Each character in the keyboard has a unique number.
Eg: ASCII code of ‘a’ is 97, when you press ‘a’ on the keyboard, a signal equivalent to 1100001 (Binary equivalent of 97 is 1100001) is passed to the computer memory. 27 = 128, hence we can represent only 128 characters by using ASCII. It is not enough to represent all the characters of a standard keyboard.

b) EBCDIC(Extended Binary Coded Decimal Interchange Code): It is an 8 bit code introduced by IBM(International Business Machine). 28 = 256 characters can be represented by using this.

c) ISCII(Indian Standard Code for Information Interchange): It uses 8 bits to represent data and introduced by the standardization committee and adopted by the Bureau of Indian Standards(BIS).

d) Unicode: The limitations to store more characters is solved by the introduction of Unicode. It uses 16 bits so 216 = 65536 characters (i.e, world’s all written language characters) can store by using this.

Representation of audio, image, and video: Various methods are used to represent an image, audio and video data. A file (image or audio or video) consists of two parts header information (such as file name, its size, format etc.) and image data(a compressed form of value pixels intensity). Image file formats are JPEG (Joint Picture Experts Group) Format, BMP (Bitmap), TIFF (Tagged Image File Format), GIF(Graphics Interchange Format), PNG (Portable Network Graphic).
Audio File formats are WAV,MP3,MIDI,AIFF etc.
Video File formats AVI, JPEG2, WMV etc.

Plus One Computer Application Chapter Wise Questions Chapter 10 IT Applications

Students can Download Chapter 10 IT Applications Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions Chapter 10 IT Applications

Plus One Computer Application IT Applications 1 Mark Questions and Answers

Question 1.
Name the application of Information and Communication Technology (ICT) for delivering government services to the citizens in a convenient, efficient, and transparent manner.
Answer:
e-Governance

Question 2.
“e-Governance facilitates interaction between different stakeholders in governance”. Say whether the statement is True or False.
Answer:
It is true.

Question 3.
The system of financial exchange between buyers and sellers in an online environment is known as _________.

Answer:
Electronic Payment System(EPS)

Question 4.
Check whether the following statement is True or False.
“e-Business is an extension of e-Commerce”
Answer:
Yes It is True.

Question 5.
Real time exchange of text messages between two or more persons over Internet is termed as _____.
Answer:
Online chat

Question 6.
Pick the odd one out
a) e- Book Reader
b) e-Text
c) Television channels
d) e-Business
Answer:
c) e-Business, the others are e-Learning tools

Question 7.
Define e-Text.
Answer:
The electronic form&t of textual data is called e- Text. It can be read aloud by an e-Text reader device that will help the visually challenged people.

Question 8.
Give an example for e-Learning tool.
Answer:
Electronic Books Reader

Question 9.
Name an electronic device using which we can easily read e-Text.
Answer:
e-Book reader

Question 10.
Write the full forms of BPO and KPO.
Answer:
BPO is Business Process Outsourcing KPO is Knowledge Process Outsourcing

Question 11.
Name any two e-Learning tools.
Answer:
1) e-Book Reader
2) Online chat

Question 12.
The system used for financial exchange between buyers and sellers in a online business is _____
a) electronic business online
b) electronic payment system
c) business process outsourcing
d) online payment system
Answer:
b) Electronic Payment System

Question 13.
Online railway reservation is an example of _____.
a) e-Business
b) e-Rail
c) e-Governance
d) e-Leaming
Answer:
e-Governance

Question 14.
Which one of the following is NOT an e-business website?
a) www.amazon.com
b) www.dhsekerala.gov.in
c) www.keralartc.com
d) www.irtc.com
Answer:
b) www.dhsekprala.gov.in

Question 15.
In ICT enabled services BPO stands for _____.
Answer:
Business Process Outsourcing

Question 16.
Application of ICT for delivering government services to citizens in a convenient and transparent manner is called_______.
Answer:
e- Governance

Plus One Computer Application IT Applications 2 Marks Questions and Answers

Question 1.
Define the term e-Governance.
Answer:
The integration of computers and communication technology for the benefit of government functions to#the public is termed as E-Governance by this Govt can serve the public in a convenient, efficient and transparent manner.

Question 2.
Give an example for e-Governance website.
Answer:
m www.hscap.kerala.gov.in, This site is used to manage +2 admission (Ekajalakam or Single Window System)

Question 3.
What is KSWAN?
Answer:
It is envisaged to be the core common network infrastructure for e-Governance and the State Information Infrastructure(SII), connecting Thiruvananthapuram, Kochi and Calicut. It acts as backbone of SII.

Question 4.
Define e-Business
Answer:
It is Electronic business. It provides services or running business through internet is called E business

Question 5.
Define e-Banking.
Answer:
Doing all the banking activities at any time and place through internet. We can check the balance amount, transfer money from our a/c to another a/c at any time and location. We can sit our home or any place and conduct banking activities hence it is very convenient to the public.

Question 6.
Write down the functions of call centres.
Answer:
Call centre is a third party company and its main aim is to serve the public for the payment of bills, purchase of goods, doubt clearance, etc. Here Telephone facility is set up to handle incoming and out going calls about goods or service for an organisation.

Plus One Computer Application IT Applications 3 Marks Questions and Answers

Question 1.
List out different types of interactions in e-Governance.
Answer:
The integration of computers and communication technology for the benefit of government functions to the public is termed as E-Govemance.
Types of interactions in e-Governance is given below

  • Government to Government(G2G): Electronically exchanging data or information among Government agencies, departments or organizations. Government to Citizens(G2C): Exchange of information between
  • Government and Citizens Government to Business(G2B) : Interaction between the Government and
  • Business men. Government to Employees(G2E) : The exchange of information between Government and its employees

Question 2.
Differentiate between BPO and KPO.
Answer:
BPO means Business Process Outsourcing: A business firm’s main aim is to increase the profit by reduce the expenditure for this some works are transferred to other contractors(man power supply company common in other countries). The parent company is not responsible to such employees but the work will be carried out smoothly. Knowledge Process Outsourcing(KPO): It is similar as BPO but the main job in KPO is knowledge and information related that is carried out by a third party company

Question 3.
What are the advantages of e-Governance?
Answer:
The advantages of e-Governance is given below Its main aim is to provide better service to the people at any time and place with high speed. In the modern world it is very helpful and convenient to the people.

  • It enables automation of Govt, services .
  • It ensures the participation of citizens hence strengthen the democracy
  • It ensures more transparency hence eliminates corruption
  • It enhances responsibilities of various Govt. Departments
  • Its proper implementation saves time and money of the people by avoiding unnecessary visits to offices,

Question 4.
What are the duties of Akshaya?
Answer:
These were launched in 2002 in the Malappuram Dist.ln Kerala by the project of Kerala State Information Technology Mission(KSITM). Its aim is to provide services such as e-grants, e filing, e district, e ticketing,/ation card application, Voters Id application,New Vehicles Registration application, insurance and Banking to the peoples of Kerala.

Question 5.
What is Common Service Center(CSC)? List some of the services offered through CSC.
Answer:
Common Service Centres are the web enabled points of the government, private and social sector services. They provide services such as Agriculture, Health, Banking, Educational, Entertainment, Commercial, Transport services for the rural citizens of India. In Kerala Akshaya centers are working as CSC.

Question 6.
What are the major challenges faced in the implementation of e-Learning?
Answer:
Following are the challenges to e Learning

  • Face to face contact between student and teachers is not possible
  • Proper interaction is limited lack of infrastructure facilities
  • Its implementation requires computer and high speed Internet
  • Pupil may not get proper motivation
  • It does not provide a real lab facility

Question 7.
a) Explain the term, ICT.
b) Briefly explain the advantages of implementing e-Governance.
Answer:
a) Information and Communication Technology .
b) The advantages of e-Govemance is given below Its main aim is to provide better service to the people at any time and place with high speed. In the modern world it is very helpful and convenient to the people.

  • It enables automation of Govt, services.
  • It ensures the participation of citizens hence strengthen the, democracy
  • It ensures more transparency hence eliminates corruption
  • It enhances responsibilities of various Govt. Departments
  • Its proper implementation saves time and money of the people by avoiding unnecessary visits to offices.

Question 8.
Remya has got a job at a call center. What is a call center? What kind of job does a call center provide?
Answer:
Call centre is a third party company and its main aim is to serve the public for the payment of bills, purchase’of goods, doubt clearance, etc. Here Telephone facility is set up to handle incoming and out going calls about goods or service for an organisation

Question 9.
Explain any three e-learning tools,
Answer:
e Learning tools

  • Electronic books reader(e Books): With the help of a tablet or portable computer or any other device we can read digital files by using a s/w is called electronic books reader.
  • e text: The electronic format of textual data is called e-Text.
  • Online chat: Real time exchange of text or audio or video messages between two or more person over the Internet.
  • e Content : The data or information such as text, audio, video , presentations, images, animations etc, are stored in electronic format.
  • Educational TV channels : TV channels dedicated only for the e-Learning purpose :
    Eg-. VICTERS (Virtual Class room Technology on Edusat for Rural Schools OR Versatile ICT Enabled Resources for Students)

Question 10.
Define e-Governance. Write any four advantages of e-Governance.
Answer:
E-Governance
The integration of computers and communication technology for the benefit of government functions to the public is termed as E-Governance by this Govt can serve the public in a convenient, efficient and transparent manner.

Benefits of E-Governance : Its main aim is to provide better service to the people at any time and place with high speed. In the modern world it is very helpful and convenient to the people.

  • It enables automation of Govt.services.
  • It ensures the participation of citizens hence strengthen the democracy.
  • It ensures more transparency hence eliminates corruption.
  • It enhances responsibilities of various Govt Departments.
  • Its proper implementation saves time and money of the people by avoiding unnecessary visits to offices.

Question 11.
i) Which of the following system in e-Business . exchanges money between buyer and seller?
a) Automatic Teller Machine
b) Electronic Payment System
c) Payment Service System
d) Financial Data Center.
ii) e-Governance provide a lot of government services to citizens through ICT. What are the different categories of e-Governance interactions?
Answer:
i) b) Electronic Payment System
ii) Types of interactions in e-Governance e-Governance facilitates interaction between different stakeholders in governance .
Government to Government(G2G): Electronically exchanging data or information among Government agencies, departments or organizations.
Government to Citizens(G2C): Exchange information between Government and Citizens .
Government to Business(G2B) : Interaction’ between the Government and Business men.
Government to Employees(G2E) : The exchange of information between Government and its employees

Question 12.
Explain any three tools that enhance e-Learning process.
Answer:
e Learning tools

  • Electronic books reader(e Books): With the help of a tablet or portable computer or any other device we can read digital files by using a s/w is called electronic books reader.
  • e text: The electronic format of textual data is called e-Text.
  • Online chat: Real time exchange of text or audio or video messages between two or more person over the Internet.
  • e Content : The data or information such as text, audio, video , presentations, images, animations etc, are stored in electronic format.
  • Educational TV channels : TV channels dedicated only for the e-Learning purpose : Eg. VICTERS (Virtual Class.room Technology on Edusat for Rural Schools OR Versatile ICT Enabled Resources for Students).

Question 13.
Compare the advantages and disadvantages of implementing e-Business.
Answer:
Advantages of E-business is given below

  • It overcomes geographical limitations
  • It reduces the operational cost
  • It minimizes the time and cost
  • It remains open all the time
  • We can locate the product faster from a wider range of choices

Disadvantages of E-business is given below

  • Peoples are unaware of IT applications and its uses
  • Most peoples don’t have plastic money(credit / debit card) and net banking
  • It requires high security measurements otherwise you may lose money
  • We can’t touch or smell products through online
  • Some companies may not have proper Goods delivery service.

Plus One Computer Application IT Applications 5 Marks Questions and Answers

Question 1.
Compare the advantages and disadvantages of implementing e-Business?
Answer:
Advantages of e business is given below

  • It overcomes geographical limitations
  • It reduces the operational cost
  • It minimizes the time and cost
  • It remains open all the time
  • We can locate the product faster from a wider range of choices

Disadvantages of E business is given below:

  • Peoples are unaware of IT applications and its uses
  • Most peoples don’t have plastic money(credit / debit card) and net banking
  • It requires high security measurements otherwise you may lose money
  • We can’t touch or smell products through online
  • Some companies may not have proper Goods delivery service

Question 2.
Explain any three IT enabled services in detail.
Answer:
1) Call centre : It is a third party company and its main aim is to serve the public for the payment of bills, purchase of goods, doubt clearance, etc. Here Telephone facility is set up to handle incoming and out going calls about goods or service for an organisation.
2) Teleconferencing : It is a Way of conferring, discussing or communicating by audio and video circuits, by a group of people located in geographically distributed areas. There are two types of conferencing video and audio. In audio conferencing the participants can’t see each other but only hear voices of one another.
3) Video conferencing : It is a type of Teleconferencing. The participants can see each other live on screen and can speak to each other with the help of teleconferencing. They must be sit in conference rooms connected through a teleconference system(A video camera and a speaker phone are connected to a computer with Internet connection)

Question 3.
Discuss in detail various uses of IT in health care field.
Answer:
In the field of medicine and health care computers play very important role. Such as diagnosing diseases, monitoring patients during surgery etc.

1) Medical equipments : Most of the medical equipments such as CT scanner, MRI scanner, Ultra Sound scanner, ECG, ECHO test, TMT, etc work with the help of computers

2) Electronic Medical Record(EMR): It is a digital version of a paper chart that contains all of a patient’s medical history from one practice. An EMR is mostly used by doctors fordiagnosis and treatment.

3) Web based support / diagnosis : Internet is used by the doctors to acquire information to diagnose and give treatment to the patients who are suffering from diseases.

4) Telemedicine : With the help of TeleMedicine equipment doctors and nurses can examine patients in remote locations by monitoring the patient conditions such as BP, temperature etc. and give the correct medical treatment. Tele medicine is implemented with a telephone line and a computer.

5) Research and development: Computers play inevitable role in almost every branch of science and engineering. The role of computers in different fields of research and development is unavoidable. The most complex genetic problem may evaluated with the help of computers easily and can simulate actual system using a computer. The computers help in diagnosis, treatment of patients and better running of hospitals.