Plus Two History Notes Chapter 15 Kerala: Towards Modernity

Students can Download Chapter 15 Kerala: Towards Modernity, Plus Two History Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus Two History Notes Chapter 15 Kerala: Towards Modernity (Economy, Society, and Polity)

In this chapter, we discuss the factors that led Kerala to modernity. The most important factor for the modernization of Kerala is the colonial intervention. Colonialism brought changes in the existing landowning system and system of laws. All this resulted in the development of the estate (plantation) economy, capital, investment, deposits, growth of new industries, and growth in travel and communication. This era witnessed the beginning of missionary education, the publication of dictionaries, the start of public education, the ban on slavery, movements for a democratic society, and the resistance to colonialism.

The national movements under the leadership of the Indian National Congress and Praja Mandal and the agricultural protests against feudal, colonial exploitation resulted in the formation of Kerala State. The 19th and 20th century Social Reform Movements and the formation of Malayali identity played a big role in leading Kerala to modernity. All these are stressed in this chapter.

In the first part of the 19th century, there was administrative stability in all three regions of Kerala. Western influence was most felt during this period. This influence positively helped in paving the base for modem Kerala. There were many reforms in the society initiated by the British as well as the rulers of Travancore and Kochi. Of course, behind the reforms brought by the British, there were colonial interests. Most of these reforms were brought with the intention of solidifying British rule in India. But they did bring changes in the attitude of Keralites and the circumstances prevailing here.

As the British established their authority here in Kerala, there were also strong resistance movements against them. Regional leaders and the people rose in revolt against British dominance. Pazhassiraja, Kurichiar, the Mappila farmers of Malabar, Veluthambi Dalava, Paliathachan, etc. were the leaders of these protests.

In the 19th century Kerala, there were many superstitions, evil practices, and social inequalities. The repressive administration by the feudal lords and the dominance by upper-caste Hindus made the life of the backward communities very painful and unbearable. Society had a lot of illegal and illogical practices in relation to menstruation, pregnancy, and death.

Many social evils and controls based on Caste existed in Kerala. Some sections of the society were denied even their essential fundamental rights. Human dignity did not mean anything to some people. Certain civil rights movements came up against such injustice. Some of them were very important.

The State Re-organization Committee under Sayyid Fasal Ali made the dream of a United Kerala a reality. The recommendation was to form Kerala State with Malabar, Kochi, and Travancore as its constituent regions. On 1 November 1956, Kerala officially became a reality.

Plus Two History Notes Chapter 14 Pre Modern Kerala

Students can Download Chapter 14 Pre Modern Kerala, Plus Two History Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus Two History Notes Chapter 14 Pre Modern Kerala (Economy, Society, and Polity)

In this chapter, we talk about the historical changes that took place in Kerala from the early times to 1800 CE. This chapter is divided into 4: a. The EdVly Moopan rule and the different types of earning a livelihood, b. Unification of agricultural centers and the formation of a hierarchical society, c. The Rise of Makotha Perumals. d. The social, political, and economic activities from 1200 to 1800 CE.

The period 12 to 18th century was one of change and also continuity. Agricultural production, exchange, political structure, land ownership, land relations, tax system, etc. continued and at the same time changed gradually. This period witnessed the coming of the Europeans, the Mysore attack, and the establishment of British colonial rule.

“Sanketam” is another type of political power that existed in Kerala. The Sanketams of Brahmins and Temples were very famous. Sanketam is a semi-autonomous area. In this, there would be a Brahmin temple and around it some villages. Sanketams were of two kinds: a) Sanketams established by Brahmin landowners and b) Sanketams established by political authorities as symbols of dedication and; piety to Brahmins.

The first Europeans to come to Kerala were the Portuguese. In 1498, Vasco da Gama landed at Kappad in Kozhikode. This was the beginning of an eventful era. K.M. Panicker says that in Asian History it started an age called the Vasco da Gama Age. European Colonialism lasted in India for 5 centuries and it was started by the coming of the Portuguese.

In the 18th century, far-reaching economic and political changes took place in Travancore, Kochi, and Malabar. In 1792, Marthanda Varma came to power and from then there were changes in Travancore. He started a new era in the history of Travancore. He is considered the founder of modern Travancore. He brought drastic changes to the economic structure of Travancore.

With the establishment of British authority, a new era began in Kerala. It was an era of resistance against colonialism. In Malabar, this resistance movement was organized by Pazhassiraja and Kurichiars. In Travancore, it was Veluthampi Dalava and in Kochi Paliath Komi Achan led such resistance.

Plus Two History Notes Chapter 13 Understanding Partition

Students can Download Chapter 13 Understanding Partition, Plus Two History Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus Two History Notes Chapter 13 Understanding Partition (Politics, Memories, and Experiences)

On 15 August 1947, the British rule in India ended. India was divided into two sovereign nations-India and Pakistan. India witnessed some most tragic incidents as a result of the partition. The joy of freedom from colonial chains was extinguished by the cruelty and violence of the Partition. Thousands of people died. There were dramatic changes in the lives of people. Cities changed, India changed, a new nation was born. Mass murders and violence were everywhere. There was the flow of refugees and migrations.

This chapter deals with the history of Partition. It discusses why and how the Partition occurred. It also discusses the dreadful experiences of people during the 1946-50 period.

In the beginning, Congress was against Partition. But in March 1947, the Congress High Command agreed to divide Punjab into two – an area of Muslim majority and the other with Hindu/Sikh majority. By this time The Congress and Sikh leaders started seeing the partition of Punjab as a ‘necessary evil’. If there was no partition, the leaders thought, the Muslim majority would overshadow other communities. They were afraid they would have to obey the Muslim authorities.

The Congress thought in Bengal also such a partition was necessary. In Bengal, there was a section of Hindus known as ‘Bhadralok Bengali’. This section wanted to maintain its political power. Without partition, they would remain in the shadows of the Muslim majority.

Bhadralok was a minority in Bengal. They believed that only through partition they could maintain their political power.

Timeline

1930 – Urdu Poet Mohammed Iqbal presents the concept of a North-Western Indian Muslim Nation with autonomy within the Indian Federation.

1933 – Choudhary Rehmat Ali, a Punjabi student of Cambridge, proposes the name Pakistan for the proposed Muslim Nation.

1937-39 – In 7 out of the 11 Provinces of India, Congress Ministries come to power.

1940 – Muslim League passes a Resolution demanding self-rule in areas with Muslim majorities.

March-June 1946 – The Cabinet Mission visits India.

16 Aug. 1946 – To get Pakistan, Muslim League declares an agitation. Hindu-Muslim riots in Calcutta. Thousands are killed.

March 1947 – Congress agrees to divide Punjab into two on the basis of the majority population. One will be Muslim Majority and the other Hindu-Sikh majority. The same principle is used in Bengal. Britain is ready to leave India.

14-15 Aug. 1947 – India gets freedom. Pakistan is formed. To bring about peace Gandhi tours Noakhali (East Bengal)

Plus Two History Notes Chapter 12 Mahatma Gandhi and the Nationalist Movement Civil Disobedience and Beyond

Students can Download Chapter 12 Mahatma Gandhi and the Nationalist Movement Civil Disobedience and Beyond, Plus Two History Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus Two History Notes Chapter 12 Mahatma Gandhi and the Nationalist Movement Civil Disobedience and Beyond

This chapter discusses the activities of Gandhiji during the period 1915-1948. it also talks about the work he did among the various sections of the Indian society, it examines many democratic Movements for which he was the inspiration and also the leader. This chapter also talks about Gandhiji’s life, political activities, and the social movements related to his work.

The Champaran, Kheda, and Ahmedabad Satyagraha of Gandhi were a preparation for his entry into Indian National Movement. These activities helped him in understanding the problems of the people.

They helped Gandhi to have close contact with people. The sympathy he showed to the poor people helped him to get a place in their hearts.

The Non-Cooperation Movement was the first strong moment of Gandhi against the British. It was part of Gandhi’s concept of non-violence. In the beginning, he co-operated with the British. He believed in their sense of righteousness. He showed his loyalty to the British in the First World War by asking the Indians to join the British army. But some developments in 1919 made Gandhi change his attitude. The Rowlett Acts, Jaiian Wala Bagh tragedy, the Khilafat Movement, etc. were some of them. These incidents made his attitude towards British change and made him not to cooperate with them. They also prompted him to start the Non-Cooperation Movement.

By 1922, Gandhi was able to make Indian Nationalism a highly popular Movement. Until then it was a Movement of intellectuals and professionals. But soon, with the efforts of Gandhi, thousands of farmers, artisans, and workers joined the Movement. Many of them started calling Gandhi ‘Mahatma’ showing him their respect. He was not like other leaders who preferred to keep some distance from people. He sympathized with them and became one of them. He lived like them and dressed like them. He also spoke in their language.

After the stopping of the Non-Cooperation Movement, Gandhiji retired from active political life. Then he concentrated on social issues like the propagation of khadi and removal of untouchability. Bu 1928, he started thinking of re-entering political activities. That year two important things happened – a. The visit of the Simon Commission and b. the Bardoli Satyagraha.

In 1942, the then British PM, Winston Churchill, sent a Mission under one of his Cabinet Members, Sir Stafford Cripps, to make an agreement with Gandhi and the Congress.

The Cripps Mission failed. After that Gandhiji decided to start his third protest against the British. This is the Quit India Movement. It was started in August 1942.

On 30 January 1948, as Gandhiji was going to take part in a prayer meeting, Nathuram Godse shot and killed him. Godse was a Brahmin from Pune.

Timeline

1915 – Mahatma Gandhi returns to India from South Africa.

1917 – Champaran Movement

1918 – The Peasant Unrest in Kheda, The Labour Movement in Allahabad.

1919 – Rowlett Satyagraha (March-April) Julian Wala Bagh murder (April)

1921 – Non-Cooperation Movement and the Khilafat Movement.

1928 – Peasant Revolt in Bardot.

1929 – Congress’s Lahore Meeting; Poorna Swaraj is accepted as the aim.

1930 – Civil Disobedience Movement starts – Dandi March (March-April)

1931 – Gandhi Irwin Pact (March), II Round Table Conference.

1935 – India Government passes Laws-Some form of Representative Government is promised.

1939 – Congress Ministries resign.

1942 – Quit India Movement (August)

1946 – Gandhiji visits Noakhali and other areas to prevent religious strife.

Plus Two History Notes Chapter 11 Rebels and the Raj The Revolt of 1857 and its Representations

Students can Download Chapter 11 Rebels and the Raj The Revolt of 1857 and its Representations, Plus Two History Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus Two History Notes Chapter 11 Rebels and the Raj The Revolt of 1857 and its Representations

The 1857 mutiny (It is also called the First War of Independence) was the first effort of Indians to throw the British Raj out. It resulted from the dissatisfaction of Indians because of the anti-Indian policies of the British. British rule had created dissatisfaction among all sections of Indians. In 1857, it burst into a mutiny. It was the Sepoys in the Indian army that started the mutiny. Soon it became a nation-wide mutiny. It shook the base of the British Raj in India.

The Mutiny began in the military camp of Meerut on 10 May 1857. It started in the Native Infantry and soon it spread to the Cavalry.

The British did many things to capture the Princely States. Accusing the rulers of maladministration, they took over Awadh. Using the Law of Adoption, they acquired Jhansi and Satara. In all the places they took over, they implemented their own administrative system, laws, and land tax systems. They also arranged for the collection of taxes.

The British could not suppress the 1857 mutiny so easily. They took legal, military, and diplomatic strategies to suppress it.

The mutineers were killed in the most brutal manner. The thirst for their revenge is reflected in this. Some were killed by shooting and some were hanged. They also sent out pictures of the killings through their journals.

Timeline

1801 – Lord Wellesley introduces Military Aid System in Awadh.

1856 – Nawab Khalid Ali Shah removed from the throne. Awadh captured.

1856-57 – Temporary Tax system was introduced inAwadh.

10.5.1857 – Revolt starts in Meerut

10, 11.5.57 – Revolt in Delhi – Bahadur Shah takes up the leadership

May 30 – Revolts in Aligarh, Itawa, Mainpuri, and Ita

May-June – In the Chinhat Battle, the British lost.

Sept 25 – Under the command of Havelock and Outram, the British army enters Lucknow Residency.

1859 – Rani Laxmibai killed in battle.

Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability

Kerala State Board New Syllabus Plus Two Maths Chapter Wise Previous Questions and Answers Chapter 13 Probability.

Kerala Plus Two Maths Chapter Wise Previous Questions and Answers Chapter 13 Probability

Plus Two Maths Probability 3 Marks Important Questions

Question 1.
Suppose 10 cards numbered I to lo are placed in a box and shuffled and one card ¡s drawn at random.
(i) If A is the event that the number on the card is even, then write A.
(ii) If B is the event that the number on the card is more than 3, Find P(A/B). (May – 2010)
Answer:
A = {2,4,6,8,10}
B = {4, 5, 6, 7, 8, 9, 10}
A ∩ B = {4,6,8,10}
\(P(A / B)=\frac{P(A \cap B)}{P(B)}=\frac{\frac{4}{10}}{\frac{7}{10}}=\frac{4}{7}\)

Question 2.
\(P(A)=\frac{5}{12}, P(B)=\frac{7}{12}, P(A \cap B)=\frac{1}{4}\)
Find P(A/B) (March – 2010)
(ii) And B try independently to solve a problem.
The probability that A solves it 1/3 & that B is 3/5. Find the probability that the problem is solved.
Answer:
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 1

Question 3.
(i) If X is a random variable whose possible values x1, x2, …………….., xn are occur with probabilities p1, p2, ……… pn respectively, then E(X) =……..
(ii) A husband and wife appears for an Interview for 2 posts. The probability of husband selection is 1/7 and that of wife is 1/5. What is the probability that one is selected? (May – 2011)
Answer:
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 2

Question 4.
Two balls are drawn at random with replacement from a box containing 10 black aid 8 red balls. Find the probability that
(a) Both the balls are red.
(b)One of them is black and the other is red. (May – 2014)
Answer:
(a) P (both all red) \(=\frac{8}{18} \times \frac{8}{18}=\frac{16}{81}\)
(b) P (one of them is black and other red) = P(First ball black, second red) or P (First red, second black) \(=\frac{10}{18} \times \frac{8}{18}+\frac{8}{18} \times \frac{10}{18}=\frac{20}{81}+\frac{20}{81}=\frac{40}{81}\)

Question 5.
(a) For two independent events A and B, which of the following pair of events need not be independent?
(i) A’, B’
(ii) A,B’
(iii) A’,B
(iv) A-B, B-A

(b) it P(A) = 0.6; P(B) = 0.7 and P(A U B) = 0.9 , then find P(A/B) and P(B/A) (March – 2015)
Answer:
(a) A – B, B – A
(b) P(A∩B) = P(A) + P(B) -P(A∪B)
= 0.6 + 0.7 – 0.9 = 0.4
\(P(A / B)=\frac{P(A \cap B)}{P(B)}=\frac{0.4}{0.7}=\frac{4}{7}\)

Plus Two Maths Probability 4 Marks Important Questions

Question 1.
The probability distribution of a random variable X is given below
(i) Find the value of k.
(ii) Find the mean and variance of the variable. (May – 2010)
Answer:
(i) We have sum of the probabilities ¡s 1.
k + 2k + 3k + 4k + 5k + 5k = 1 ⇒ k = 1/20
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 4

Question 2.
(i) An urn contains 8 white and 6 black balls. Two are drawn from the urn one after the other without replacement. What is the probability that both drawn balls arewhite?
(ii) Prove that Variance = E(X2) – [E(x)]2 (March – 2010)
Answer:
Describe the events as follows.
W1 : First ball is white.
W2 : Second ball is white.
\(P\left(W_{1}\right)=\frac{8}{14}\)
Since the event is executed without replacement. The white ball number will be 7 and total will be 13.
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 5

Question 3.
(i) For any two events A and B, write the expression for P(A/B).
(ii) In a bulb factory, machine A, B and C manufacture60%, 30% and 10% bulbs respectively. 1%, 2% and 3%-of the bulbs produced byA, B and C respectively are defective. A bulb is drawn at randomfror the totaL “ production and found to b defective. Find the probability that-this has been produced from machine A. (May – 2011)
Answer:
(i) \(P(A / B)=\frac{P(A \cap B)}{P(B)}\)
(ii) Describe the events as follows.
D: Getting a defective bulb.
A: Machine A. B: Machine B. C: Machine C.
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 6

Question 4.
(i) Two balls are drawn with replacement from a box containing lo black and 8 red balls. Find the probability that one of them is black and other is red.
(ii) Find the probability of getting 5 exactly twice in 7 throw of a die. (March – 2012)
Answer:
Describe the events as follows.
B1, B: first, second black.
R1, R2 : first, second red.
P(one black and other red) = P(B1 R2) + P(R1 B2)
= P(B1) P(R2/B1) + P(R1 ) P(B2/R1)
\(=\frac{10}{18} \times \frac{8}{18}+\frac{8}{18} \times \frac{10}{18}=\frac{40}{81}\)

(ii) Let X denotes the random variable of number of 5 in a throw of a die.
Clear X has a Binomial Distribution with n = 7
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 7

Question 5.
(i) Write the probability function of Binomial Distribution.
(ii) Five Defective bulbs are accidentally mixed with 20 good ones. It is not possible to just look at a bulb and tell whether or not it is defective. Find the probability distribution of the number of defective bulbs if 3 bulbs are drawn at random. (May – 2011)
Answer:
(i) P(X = x) = nCxqn-xpx
(ii) Let X denotes the random vanable of number of defective bulbs. Then X can take values 0, 1, 2, 3 D: Getting a defective bulb.
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 8
The required Probability Distribution is

X0123
P (X)64/12548/12512/1251/125

Question 6.
(i) Two balls are drawn with replacement from a box containing 10 black and 8 red balls. Find the probability that one of them is black and other ¡s red.
(ii) Find the probability of getting 5 exactly twice ¡n 7 throw of a die. (March – 2012)
Answer:
Describe the events as follows.
B1, B2: first,second black.
R1, R2: first, second red.
P(one black and other red) = P(B1R,)÷P(R1B2)
P(B1) P(R2/B1) + P(R1) P(B2/R1)
\(=\frac{10}{18} \times \frac{8}{18}+\frac{8}{18} \times \frac{10}{18}=\frac{40}{81}\)

(ii) Let X denotes the random variable of number of 5 in athrowofa die.
Clearly X has a Binomial Distribution with n = 7
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 9

Question 7.
(i) A die is tossed thrice. Find the probability of getting an odd number at least once.
(ii)Bag I contains 3 red and 4 black balls while another Bag Il contains 5 red and 6 black balls. One ball is drawn at random from one of the Bag it is found to be red. Find the probability that it was drawn from Bag II. (March – 2012)
Answer:
(i) P(getting an odd number)
= 1 – P(an even number I all three tosses)
\(=1-\frac{1}{2} \times \frac{1}{2} \times \frac{1}{2}=\frac{7}{8}\)

(ii) Describe the events as follows.
A: getting a red ball
E1: Bagl. E2:Bagll.
P(E1) = P(E) = 1/2
P(A/E1) P (a red ball from Bag I) = 3/7
P(A/E2) P (a red ball from Bag II) = 5/11
P (a ball from Bag li, being given that it is red)
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 10

Question 8.
(i) If A and B are independent events, prove that \(\bar{A}\) and \(\bar{B}\) are independent
(ii) A box contains 30 defective bulbs and 30 non-defective bulbs. Two bulbs are drawn at random. The event A and B are defined as follows. A: first bulb is defective.’ B: ‘the second bulb is non-defective.’
Find probability of A and B. Prove that A and B are independent events. (May – 2012)
Answer:
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 11
Hence \(\bar{A}\) and \(\bar{B}\) are independent.

(ii) Given, A:’first bulb is defective.’
B: the second bulb is non-defective.’
Let D: Defective bulb, \(\bar{D}\): Non-defective bulb. Since the experiment is drawing 2btbs. The sample space will be \(S=\{D D, D \bar{D}, \bar{D} D, \overline{D D}\}\)
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 12
Hence independent events.

Question 9.
In a factory which manufactures bulbs, machine X,Y and Z manufactures respectively 25%, 35% and 40% of the bulbs. Of the outputs 1%, 2% and 3% are respectively defective bulbs. A bulb is drawn at random and found to be defective. What ¡s the probability that it is manufactured by machine Y? (May – 2012)
Answer:
Describe the events as follows.
D: Getting a defective bulb.
X: Machine X. Y: Machine Y. Z: Machine Z.
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 13

Question 10.
A and B try to solve a problem independently. Find probability that A solves the problem is and that of B solves the problem is. Find the probability that
(i) Both of them solve the problem.
(ii) The problem is solved. (March – 2013)
Answer:
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 14

Question 11.
If A and B are two independent events, then
(i) Prove that A and B’ are independent events.
(ii) Show that the probability of occurrence of at least one of A and B is I – P(A’)P (B’) (March – 2013)
Answer:
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 15
Hence A and B’ are independent events.

Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 16

Question 12.
There are two identical boxes. Box I contains 5 red and 4 black balls, while Box II contains 3 red and 3 black balls. A person choose a box at random and takes out a ball.
(a) Find the probability that the ball drawn is red.
(b) If the ball drawn is black, what is the probability that it ¡s drawn from Box II. (May – 2014)
Answer:
(a) Let E1 be the event selecting box I and E2 be the event selecting box II.
\(P=\left(E_{1}\right)=1 / 2, P=\left(E_{2}\right)=1 / 2\)
Let A be the event selecting of a red ball then
\(P\left(A / E_{1}\right)=\frac{1}{2} \times \frac{5}{9}=\frac{5}{18}\)
\(P\left(A / E_{2}\right)=\frac{1}{2} \times \frac{3}{6}=\frac{3}{12}\)
P (taking a red ball) = \(\frac{5}{18}+\frac{3}{12}=\frac{19}{36}\)

b) Let B be the event selecting a black ball
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 17

Question 13.
(a) If P(A) = O.8,P(B) = O.5,P(B/A) = 0.4 then find P(AUB)
(b) If a fair coin is tossed 10 times, then find the probability of getting exactly 6 heads. (May – 2015)
Answer:
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 18
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 19

Question 14.
(a) If P(A) = 0.3, P(B) =0.4, then the value of where A and B are independent events
(i) 0.48
(ii) 0.51
(iii) 0.52
(iv) 0.58

(b) A card from a pack 0152 cards is lost. From the remaining cards of the packet, two cards are drawn and found to be diamonds. Find the probability of the lost card being a diamond. (March – 2016)
Answer:
(a) (iv) 0.58
(b) E1: lost card is a diamond.
E2: lost card is not a diamond.
A: Select 2 diamonds from the remaining cards.
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 20

Question 15.
(a) A pair of dice is thrown 4 times. If getting a doublet is considered as a success.
(b) Find the probability of getting a doublet.
(c) Hence find the probability of getting two success. (March – 2016)
Answer:
(a) Probability of getting a doublet = 1/6
(b) Let X denotes the random variable of number of doublet in 4 throws of a die.
Clearly X has a Binomial Distribution with n = 4
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 21

Plus Two Maths Probability 6 Marks Important Questions

Question 1.
(i) State and prove the theorem of total probability.
(ii) If a fair coin is tossed 10 times, what is the probability that the outcome is exactly 6 heads? (May – 2010)
Answer:
Theorem:
Let {E1,E2,….,En}be a partition of the sample space S, and suppose that each of the events E1, E2,….,En as nonzero probability of occurrence. Let A be any event associated with S, then
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 22

By multiplication rule of probability we have;
\(P(A)=P\left(E_{1}\right) P\left(A / E_{1}\right)+P\left(E_{2}\right) P\left(A / E_{2}\right)+\ldots . .+P\left(E_{n}\right) P\left(A / E_{n}\right)\)

(ii) Let X denotes the random variable of number of heads in an experiment of 10 trials. Clearly X has a Binomial Distribution with n = 10
Here n = 10, p = 1/2, q = 1 – p = 1/2
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 23

Question 2.
(i) 3 Coin are tossed and X be the number of heads turning up. Write probability distribution of X.
(ii) There are 5% defective items in a large bulk of items. What is the probability that a sample of 10 items will include not more than one defective item? (March – 2010)
Answer:
(1) S = { HHH , HHT ,HTH, THH, HTT , THT , HTH , TTT)
Let X denotes the random variable of getting a Head. Then X can take values 0,1 ,2,3.
P(X = 0) = P(no Heads)
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 24
The required Probability Distribution is

X0123
P(X)1/83/83/81/8

(ii) Let X denotes the random variable of number of defective items.
Clearly X has a Binomial Distribution with n = 10
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 25

Question 3.
A class 15 students whose ages are 14, 17, 15, 14, 21, 17, 19, 20, 16, 18, 20, 17, 16, 19 and20 years. One student uis selected sucthat each has the same chance of being selected; the age X of the selected student is recorded.
(i) Write the probability Distribution of X.
(ii) Find E(X).
(iii) Find Var(X). (March – 2011)
Answer:
(i) Let X denotes the random vanable age of students.
Then X can take values 14, 15, 16, 17, 18, 19, 20, 21.

X1415161718192021
P(X)2/151/152/153/151/152/153/151/15

Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 26
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 27.

Question 4.
(i) An unbiased die is thrown twice. Let A be event ‘odd number on the first throw’ and B be the event ‘odd number on the second throw’. Check the independence of A and B.
(ii) If P(A) = O.8,P(B) = O.5,P(B/A) = 0.4,
Find
(a) P(A∩B)
(b) P(A/B)
(c) P(A∪B) (March – 2011)
Answer:
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 28

Question 5.
(i) A and B are two events such that P(A) = 0.8,P(B) = 0.5 and P(B/A) = 0.4, then find P(A/B)
(ii) Find the mean and variance of the number obtained on a throw of an unbiased die. (March – 2014)
Answer:
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 29

Question 6.
(i) Two events E and F are such that
P(E) = 0.6, P(F) = 0.2 and P(E∪F) O.68. Are E and F independent?
(ii) A die is thrown 6 times. If getting an odd number is a success, what is the probability of getting
(a) 5 successes?
(b) At least 5 successes?
(c) At most 5 successes? (March – 2014; May – 2016)
Answer:
(i) P(E∪F) = P(E) + P(F) – P(E∩F)
= 0.68 = 0.6 + 0.2 – P(E∩F)
= P(E∩F)=O.12
P(E) x P(F)= 0.2 x 0.6 = 0.12 = P(E∩F)
Hence E and F are independent events.

(ii) (a) Let X denotes the random variable of number of odd number in the throw of a die 6 times. Clearly X has a Binomial Distribution with n = 6 and \(p=\frac{3}{6}=\frac{1}{2}\)
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 31

Question 7.
The probability distribution of a random variable X is as given below.

X12345
P(X)1/21/41/81/16P

(a) Find the value of p.
(b) Find the mean of X.
(c) Find the variance of X. (March – 2015)
Answer:
Plus Two Maths Chapter Wise Previous Questions Chapter 13 Probability 32

Question 8.
(a) A die is thrown thrice. Find the probability of getting an odd number at least once.
(b) Two cards are drawn successively with replacement from a pack of 52 cards. Find the probability distribution of the number of aces. (May – 2015)
Answer:
Let X denote the number of odds, X = 0, 1, 2, 3
The experiment follows Binomial distribution
\(n=3, p=\frac{1}{2}, q=\frac{1}{2}\)
The required probability = 1 – P(X = O)
\(=1-{ }^{3} C_{0}\left(\frac{1}{2}\right)^{3}\left(\frac{1}{2}\right)^{0}=1-\frac{1}{8}=\frac{7}{8}\)

(b) P(Two cards are aces with replacement) = \(\frac{4 \times 4}{52 \times 52}=\frac{1}{169}\)
We know there are 4 aces in a deck of 52 cards.
Let X denote the number of aces. Then X can take values 0,1,2.
P(X0) = P(no ace and no ace)
= P(no ace) x P(no ace)
\(=\frac{48}{52} \times \frac{48}{52}=\frac{144}{169}\)
P(X=1)= P(ace and no ace or no ace and ace)
= P(ace and no ace ) + P(no ace and ace)
\(=\frac{4}{52} \times \frac{48}{52}+\frac{48}{52} \times \frac{4}{52}=\frac{24}{169}\)
P(X =2) = P(ace & ace) = P(ace) x P(ace)
\(=\frac{4}{52} \times \frac{4}{52}=\frac{1}{169}\)
Therefore the distribution is as follows.

X012
P(X)144/16924/1691/169

Plus Two Computer Application Chapter Wise Previous Questions Chapter 11 Trends and Issues in ICT

Kerala State Board New Syllabus Plus Two Computer Application Chapter Wise Previous Questions and Answers Chapter 11 Trends and Issues in ICT.

Kerala Plus Two Computer Application Chapter Wise Previous Questions Chapter 11 Trends and Issues in ICT

Plus Two Computer Application Trends and Issues in ICT 1 Mark Important Questions

Question 1.
_____ is a Linux based mobile operating system from Google. (MARCH-2016)
a) ios
b) Blackberry
c) Android
d) windows Phone
Answer:
Android

Question 2.
_________ is a packet-oriented mobile data service on GSM. (MARCH-2016)
Answer:
GPRS

Question 3.
In ______ system, several transmitters can send information simultaneously over a single communication channel. (MAY-2016)
Answer:
Decision Support System

Question 4.
SIM stands for ______ (MAY-2016)
a) Subscriber Information Module
b) Subscriber Identify Module
c) Subscriber Identify Machine
d) Subscriber Information Memory
Answer:
b) Subscriber Identify Module

Question 5.
A 4G mobile network uses ______ (MARCH-2017)
a) CDMA
b) WCDMA
c) OFDMA
d) None of these
Answer:
c) OFDMA

Question 6.
_______ is the popular mobile OS developed by Google based on Linux Kernel. (MAY-2017)
a) Android
b) iOS
c) Blackberry
d) go
Answer:
a) Android

Question 7.
Pick the odd one out: (MAY-2017)
a) Kitkat
b) Jelly Bean
c) Icecream Sandwich
d) iOS
Answer:
d) iOS

Plus Two Computer Application Trends and Issues in ICT 2 Marks Important Questions

Question 1.
Raju sends a short text message to his friend. Explain how the text message is exchanged. (MARCH-2016)
Answer:
SMS is used for sending short messages SMSC provides a store and forward mechanism. If the recipient is not available SMSC waits and retrieves. It uses the SS7 protocol.

Question 2.
GPS is very useful for tracking vehicles by transport companies. How is it possible? (MAY-2016)
Answer:
Global Positioning System(GPS): It is a space-based satellite navigation system that provides location and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. The system provides critical capabilities to military, civil, and commercial users around the world. It is maintained by the United States government and is freely accessible to anyone with a GPS receiver. GPS was created and realized by the U.S. Department of Defense (DoD) and was originally run with 24 satellites. It is used for vehicle navigation, aircraft navigation, ship navigation, oil exploration, Fishing, etc. GPS receivers are now integrated with mobile phones.

Question 3.
Write a short note on the Android operating system. (MARCH-2017)
Answer:
IP Android OS: It is a Linux-based OS for Touch screen devices such as smartphones and tablets. lt was developed by Android Inc. founded in Palo Alto, California in 2003 by Andy Rubin and his friends. In 2005, Google acquired this. A team led by Rubin developed a mobile device platform powered by the Linux Kernel. The interface of Android OS is based on touch inputs like swiping,-tapping, pinching in, and out to manipulate on-screen objects. From 2007 onwards this OS is used in many mobile phones and tablets

Plus Two Computer Application Trends and Issues in ICT 3 Marks Important Questions

Question 1.
What is Industrial Property Right? Write a short note on any two Industrial property Rights. (MARCH-2016)
Answer:
Intellectual Property Right: Some people spend lots of money, time body, and mental power to create some products such as a classical movie, album, artistic work, discoveries, invention, software, etc. These types of Intellectual properties must be protected from unauthorized access by law. This is called Intellectual Property right(IPR). Paris convention held in 1883 protects Industrial Property Berne Convention held in 1886 protects Literary and Artistic work.

World Intellectual Property Organisation(WIPO) in 1960, Guided by the United Nations(UN) ensures/protects the rights of creators or owners and rewarded for their creation.
A person or an organization can register their Intellectual property such as creations, trademarks, designs, etc.

Intellectual property is divided into two categories

  1. Industrial Property
  2. Copyright

1. Industrial property: It ensures the protection of industrial inventions, designs, Agricultural products etc from unauthorized copying or creation or use. In India, this is done by the Controller of Patents Designs and Trademarks.

  • Patents: A person or organization that invented a product or creation can be protected from unauthorized copying or creation without the permission of the creator by law. This right is called Patent. In India, the validity of the right is up to 20 years. After this, anybody can use it freely.
  • Trademark: This is a unique, simple, and memorable sign to promote a brand and hence increase the business and goodwill of a company. It must be registered. The period of registration is for 10 years and can be renewed. The registered trademark under Controller General of Patents Design and Trademarks cannot use or copy by anybody else.
  • Industrial designs: A product or article is designed so beautifully to attract customers. This type of design is called industrial design. This is a prototype and used as a model for large scale production.
  • Geographical indications: Some products are well known by the place of their origin. Kozhikode Halwa, Marayoor Sharkkara (Jaggery), Thirupathi Ladoo, etc are examples.

2. Copyright: The trademark is ©, copyright is the property right that arises automatically when a person creates new work on his own, and by Law, it prevents the others from the unauthorized or intentional copying of this without the permission of the creator for 60 years after the death of the author.

AttributesPatentTrademarkCopyright
ItemsProduct, processName, logo, signsCreativity, artistic
Registration requiredYesYesNo (automatic)
Duration20 years10 yearsUpto 60 years after the death of the author
RenewableNoYesNA

Question 2.
What is Cyber Crime? Write a short note on any two cyber crimes against individuals. (MAY-2016)
Answer:
Just like normal crimes(theft, trespassing private area, destroy, etc,) Cybercrimes(Virus, Trojan Horse, Phishing, Denial of Service, Pornography, etc) also increased significantly. Due to cybercrime, the victims lose money, reputation, etc and some of them commit suicide.

Cybercrimes against individuals

i) Identity theft: The various information such as personal details(name, Date of Birth, Address, Phone number, etc.), Credit / Debit Card details(Card number, PIN, Expiry Date, CW, etc), Bank details, etc. are the identity of a person. Stealing this information by acting as the authorized person without the permission of a person is called Identity theft. The misuse of this information is a punishable offense.

ii) Harassment: Commenting badly about a particular person’s gender, color, race, religion, nationality, in Social Media is considered harassment. This is done with the help of the Internet is called Cyberstalking (Nuisance). This is a kind of torturing and it may lead to spoiling friendship, career, self-image, and confidence. Sometimes may lead to a big tragedy of a whole family or a group of persons.

iii) Impersonation and cheating: Fake accounts are created in Social media and act as the original one for the purpose of cheating or misleading others. Eg: Fake accounts in Social Medias (Facebook, Twitter, etc), fake SMS, fake emails, etc.

iv) Violation of privacy: Trespassing into another person’s life and try to spoil life. It is a punishable offense. A hidden camera is used to capture the video or picture and blackmailing them.

v) Dissemination of obscene material: With the help of hidden camera capture unwanted video or picture. Distribute or publish these obscene clips on the Internet without the consent of the victims may mislead people specifically the younger ones.

Question 3.
What is copyright? How does it differ from patent? (MARCH-2017)
Answer:
Copyright: The trademark is ©, copyright is the property right that arises automatically when a person creates a new work by his own, and by Law, it prevents the others from the unauthorized or intentional copying of this without the permission of the creator for 60 years after the death of the author. Patents: A person or organization that invented a product or a creation can be protected from unauthorized copying or creation without the permission of the creator by law. This right is called Patent. In India, the validity of the right is up to 20 years. After this, anybody can use it freely.

Question 4.
Differentiate GPS and EDGE. (MAY-2017)
Answer:
Global Positioning System(GPS): It is a space-based satellite navigation system that provides lo¬cation and time information in all weather conditions, anywhere on or near the Earth where there is an unobstructed line of sight to four or more GPS satellites. It is used for vehicle navigation, aircraft navigation, ship navigation, oil exploration, Fishing, etc. GPS receivers are now integrated with mobile phones.
EDGE(Enhanced Data rates for GSM Evolution): It is three times faster than GPRS. It is used for voice communication as well as an internet connection.

Question 5.
Write a short note on IPR infringement (MAY-2017)
Answer:
Infringement (Violation): Unauthorized copying or use of Intellectual property rights such as Patents, Copyrights, and Trademarks are called intellectual property Infringement(violation). It is a punishable offense.

  • Patent Infringement: It prevents others from the unauthorized or intentional copying or use of Patent without the permission of the creator.
  • Piracy: It is the unauthorized copying, distribution, and use of a creation without the permission of the creator. It is against the copyright act and hence the person committed deserves the punishment.
  • Trademark Infringement: It prevents others from the unauthorized or intentional copying or use of Trademark without the permission of the creator.
  • Copy right Infringement: It prevents others from the unauthorized or intentional copying or use of Copy right without the permission of the creator.

Plus Two Computer Application Chapter Wise Previous Questions Chapter 10 Enterprise Resource Planning

Kerala State Board New Syllabus Plus Two Computer Application Chapter Wise Previous Questions and Answers Chapter 10 Enterprise Resource Planning.

Kerala Plus Two Computer Application Chapter Wise Previous Questions Chapter 10 Enterprise Resource Planning

Plus Two Computer Application Enterprise Resource Planning 1 Mark Important Questions

Question 1.
_______ is an open-source ERP software. (MARCH-2016)
a) SAP
b) Tally ERP
c) Oracle
d) Odoo
Answer:
d) Odoo

Question 2.
DSS stands for (MAY-2016)
a) Digital Signal System
b) Design Support System
c) Decision Support System
d) Database Support System
Answer:
c) Decision Support System

Question 3.
SAP stands for (MAY-2017)
Answer:
System Applications and products for data processing.

Plus Two Computer Application Enterprise Resource Planning 3 Marks Important Questions

Question 1.
Briefly explain any two ERP related technology. (MARCH-2016)
Answer:
Product Life Cycle Management (PLM): It manages the entire life cycle of a product. PLM consists of programs to increase the quality and reduce the price by the efficient use of resources.
2) Customer Relationship Management (CRM): As we know the customer is the king of the market. The existence of a company mainly the customers. CRM consists of programs to enhance the customer’s relationship with the company.

Question 2.
Explain the benefits of the ERP system. (MAY-2016)
Answer:
1) Improved resource utilization: Resources such as Men, Money, Material and Machine are utilized maximum hence increase productivity and profit.
2) Better customer satisfaction: Without spending more money and time all the customer’s needs are considered well. Because the customer is the king of the market. Nowadays a customer can track the status of an order by using the docket number through the Internet.
3) Provides accurate information: Right information at the right time will help the company to plan and manage the future cunningly. A company can increase or reduce production based upon the right information hence increase productivity and profit.
4) Decision-making capability: Right information at the right time will help the company to make a good decision.
5) Increased flexibility: A good ERP will help the company to adopt good things as well as avoid bad things rapidly. It denotes flexibility.
6) Information integrity: A good ERP integrates various departments into a single unit. Hence
reduce redundancy, inconsistency, etc.

Question 3.
List the benefits of ERP implementation in an Enterprise. (MAY-2017)
Answer:
Benefits of ERP system
1. Improved resource utilization: Resources such as Men, Money, Material, and Machine are utilized maximum hence increase productivity and profit.
2. Better customer satisfaction: Without spending more money and time all the customer’s needs are considered well. Because the customer is the king of the market. Nowadays a customer can track the status of an order by using the docket number through the Internet.
3. Provides accurate information: Right information at the right time will help the company to plan and manage future cunningly. A company can increase or reduce production based upon the right information hence increase productivity and Profit.
4. Decision-making capability: Right information at the right time will help the company to take a good decision.
5. Increased flexibility: A good ERP will help the company to adopt good things as well as avoid bad things rapidly. It denotes flexibility.
6. Information integrity: A good ERP integrates various departments into a single unit. Hence reduce the redundancy, inconsistency, etc.

Plus Two Computer Application Enterprise Resource Planning 5 Marks Important Questions

Question 1.
Explain the importance of BPR in ERP implementation. (MARCH-2017)
Answer:
ERP and BPR will not make much change if they are stand-alone. To improve the efficiency of an enterprise integrate both ERP and BPR because they are the two sides of a coin. For better results conducting BPR before implementing ERP, will help an enterprise to avoid unnecessary modules from the software.
The different phases of ERP implementation are given below

  • Pre-evaluation screening: Many ERP packages are available in the markets. At most care should be taken before implementing an ERP. Select a few from the available ERP packages.
  • Package selection: Selection of the right ERP to our enterprise is a laborious task and it needs a huge investment. Various factors should be kept in mind before you purchase an ERP that should meet our complete needs.
  • Project planning: Good planning is essential to implement an ERP. From the beginning to the end activities are depicted in this phase.
  • Gap analysis: A cent percent(100%) problem-solving ERP is not available in the market. Most of them solve a maximum of 70% to 80% problems. The rest (30% to 20%) of the problems and their solutions are mentioned here.
  • Business Process Re-engineering: In general BPR is the series of activities such as rethinking and redesign of the business process to enhance the enterprise’s performance such as reducing the cost (expenses), improve the quality, prompt, and speed(time-bound) service.
    BPR enhances the productivity and profit of an enterprise
  • Installation and configuration: In this phase, the new system is installing, before implementing the whole system a miniature of the actual system is going to be implemented as a test dose. Then check the reactions if it is good it is the time to install the whole system completely.
  • Implementation team training: In this phase, the company trains its employees to implement and run the system.
  • Testing: This phase is very important. It determines whether the system produces proper results. Errors in design and logic are identified.
  • Going live: Here a change over is taken place to the new system from the old system. It is not an easy process without the support and service from the ERP vendors.
  • End-user training: This phase will start familiarising the users with the procedures to be used in the new system. It is very important.
  • Post-implementation: Once the system is implemented maintenance and review begin. In this phase repairing or correct previously ill-defined problems and upgrade or adjust the performance according to the company needs.

Question 2.
Selection of ERP package is very crucial in the implementation of ERP system. Give a short note on any four popular ERP packages. (MARCH-2017)
Answer:
Popular ERP packages are given below
A) Oracle: American based company famous in the database (Oracle 9i-SQL) packages situated in Redwood Shores, California.
ERP packages are a solution for finance and accounting problems. Their other products are
1) Customer Relationship Management (CRM)
2) Supply Chain Management (SCM)Software

B) SAP: SAP stands for Systems, Applications, and Products for data processing.
It is a German MNC in Walldorf and founded in 1972.
Earlier they developed ERP packages for large MNC. But nowadays they developed for small scale industries also.
The other software products they developed are

  • Customer Relationship Management (CRM)
  • Supply Chain Management (SCM)
  • Product Life cycle Management (PLM)

C) Odoo: Formerly known as Open ERP.
It is an open-source code ERP. Unlike other companies, their source code is available and can be modified as and when the need arises.

D) Microsoft Dynamics
American MNC in Redmond, Washington
ERP for midsized companies.
This ERP is more user friendly
Another s/w is Customer Relationship Management(CRM)

E) Tally ERP
Indian company situated in Bangalore.
This ERP provides a total solution for accounting, inventory, and Payroll.

Plus Two Computer Application Chapter Wise Previous Questions Chapter 9 Structured Query Language

Kerala State Board New Syllabus Plus Two Computer Application Chapter Wise Previous Questions and Answers Chapter 9 Structured Query Language.

Kerala Plus Two Computer Application Chapter Wise Previous Questions Chapter 9 Structured Query Language

Plus Two Computer Application Structured Query Language 1 Mark Important Questions

Question 1.
______ keyword is used in the SELECT query to eliminate duplicate values in a column. (MARCH-2016)
UNIQUE
b) DISTINCT
NOT NULL
d) PRIMARY
Answer:
DISTINCT

Question 2.
______ clause of SELECT query is used to apply conditions to form groups of records. (MAY-2016)
a) orderby
(b) groupby
(c) having
(d) where
Answer:
(b) groupby

Question 3.
_______ command in SQL is used to display the structure of a table.(MAY-2017)
a) LIST
b) STRUCT
c) DESCRIBE
d) SHOW
Answer:
c) DESCRIBE

Plus Two Computer Application Structured Query Language 2 Marks Important Questions

Question 1.
How will you add a new column to an existing table using SQL statement ? (MARCH-2016)
Answer:
Alter command with add keyword is used to add a new column to an existing table. Avertable <table name> add <column name> <datatype> [<size>] [<constraint>][FIRST/AFTER<column name>];
Eg : Avertable ACCOUNTS add Type varchar(10) AFTER Name;

Question 2.
What is a view? How can we create a view using SQL statement? (MAY-2016)
Answer:
A view is a virtual table. That does not really exists but is derived from one or more tables. It is used to view a small part of the entire database.
Create view command is used to create a view. Syntax eg:- create view <view name> as select * from <table name> [Where <condition>];
eg:- create view studentView as select from student;

Question 3.
Explain primary key constraint with an example. (MAY-2017)
Answer:
Primary Key: A primary key is one of the Candidate Keys. It is a set of one or more attributes that can uniquely identify tuples in a relation. Rollno, AdmNo, EmpCode etc are examples of primary key.

Plus Two Computer Application Structured Query Language 3 Marks Important Questions

Question 1.
Answer the following questions. (MARCH-2016)

Acc. No.NameBranchAmount
1001AnilTrivandrum30000
1002SanjayErnakulam130000
1003MeeraKottayam275000
1004SnehaKottayam50000
1005RajanThrissur75000

a) Write SQL statements to do the following :
i) Display all the details of accounts with an amount greater than 50000 in the Ernakulam branch.
ii) Display Acc. No., Branch and Amount in the descending order of amount.
iii) Display the number of accounts in each branch.
Answer:
i) Select * from ACCOUNTS where Amount>50000 and Branch = “Ernakulam”
ii) Select Acc.No, Branch, Amount from ACCOUNTS order by Amount desc;
iii) Select Branch, count (*) from ACCOUNTS group by branch.

b) write SQL statements to do the following
i) Add a new record to the table.
ii) Update the amount of Sanjay to 100000.
iii) Delete the details of Anil.
Answer:
i) Insert into ACCOUNTS values (1006, ‘Alvis’, ‘Thrissur’, 50000);
ii) Update ACCOUNTS set Amount = 100000 where Name = ‘Sanjay’;
iii) Delete from ACCOUNTS where Name = ‘Anil’;

Question 2.
a) Explain SQL statements used to insert and delete data from a table. (MAY-2016)
b) Explain any two DDL commands
Answer:
a) Insert command is used to insert new records into a table,. The keyword used with insert is into
Syntax: Insert into <table name>[column1, Column2,………, column N] values [value1,Value 2,……… value N];
eg:- Insert into student (Regno, name) Values(101,‘Jose’);

b) delete This command is used to delete one or all records from a table
Syntax: delete from <table name> [where con-dition];
eg:- delete from the student; -This command deletes all records.

b) DDL Commands

1) Create table: This command is used to create a table.
Syntax: create table <table name>
(column name> <data type>[<constraint>]
[, column name> <data type>,]……… );
eg:- create table student (Rno int primary key, name varchar(20));

2) Alter table: This command is used to change the structure or add a new column to an existing table.
Modify, Add are the keywords used.
Syntax: Alter table <table name> modify column name><data type>
[<size>] [constraint];
eg:- Alter table student modify name varchar (30);
Syntax: Alter table <table name>
Add <new column name> <data type>
[<size>] [constraint>] [first j After <column-name>];
eg:- Alter table student add grade varchar (2);

3) Drop table: This command is used to delete the structure of the table.
Syntax: Drop table <table name>;
eg:- Drop table student;

Question 3.
Write SQL for (MAY-2017)
a) Create a table student with the data [nafne_char(20), rollno number(3),marks number(3)].
b) List name and rollno of all students
c) List name and rollno of students having marks>600.
Answer:
a) create table student(name varchar(20) primary key.rollno int,marks int);
b) select name.rollno from student;
c) select name.rollno from student where marks>600;

Question 4.
An employee table contains name, empno, basicpay, desig. (MAY-2017)
Write SQL for
a) Display name, empno and basicpay of all managers,(desig=”manager”)
b) Display empno and salary of all employees
(salary=basicpay + da)
(da=basicpay  *  1.15)
c) Display name and empno of all the employees whose basicpay<10000.
Answer:
a) select name,empno,basicpay from employee where design=”manager”;
b) select empno,basicpay + basicpay * 1.15 from employee;
c) select name,empno from employee where basicpay< 10000;

Plus Two Computer Application Structured Query Language  5 Marks Important Questions

Question 1.
The structure of the table ‘EMPLOYEE’ is given below. (MARCH-2017)
Plus Two Computer Application Chapter Wise Previous Questions Chapter 9 Structured Query Language 1
Write a SQL statement for the following
a) Insert a record into the table.
b) Update DA with 60% basic pay
c) Display the details of employees whose basic pay is greater than 20000.
d) Rename the table EMPLOYEE to EMPDETAILS
Answer:
INSERT INTO EMPLOYEE VALUES
(101,’Alvis’,25000,NULL,NULL);
b) UPDATE EMPLOYEE SET DA= Basicpay * 6;
c) SELECT * FROM EMPLOYEE WHERE Basicpay > 20000;
d) ALTER TABLE EMPLOYEE RENAME TO EMPDETAILS;

Plus Two Computer Application Chapter Wise Previous Questions Chapter 8 Database Management System

Kerala State Board New Syllabus Plus Two Computer Application Chapter Wise Previous Questions and Answers Chapter 8 Database Management System.

Kerala Plus Two Computer Application Chapter Wise Previous Questions Chapter 8 Database Management System

Plus Two Computer Application Database Management System 1 Mark Important Questions

Question 1.
_____ level describes only a part of a database (MARCH-2016)
a) View
b) Physical
c) Logical
d) high
Answer:
a) View

Question 2.
The number of attributes in a relation is called _____ (MAY-2016)
a) tuple
b) degree
c) cardinality
d) domain
Answer:
b) degree

Question 3.
_______ is the symbol used for select operation in relational algebra. (MAY-2017)
a) σ
b) π
c) ∩
d) ∪
Answer:
a) σ

Plus Two Computer Application Database Management System 2 Marks Important Questions

Question 1.
Is it possible to combine SELECT and of relational algebra into a single statement? Explain with an example. (MARCH-2017)
Answer:
Yes. It is possible to combine SELECT and PROJECT operations of relational algebra into a single statement.
πnamedesignation = “Manager”(EMPLOYEE))
The above query means select the names of employee whose designation is Manager from the table EMPLOYEE.

Plus Two Computer Application Database Management System 3 Marks Important Questions

Question 1.
Explain different level of data abstraction in DBMS. (MARCH-2017)
Answer:
Sip Levels of Database Abstraction
1) Physical Level (Lowest Level-how) – It describes how the data is actually stored in the storage medium.
2) Logical Level (Next Higher Level-what) – It describes what data are stored in the database.
3) View Level (Highest level-way) – It is closest to the users. It is concerned with the way in which the individual users view the data.

Plus Two Computer Application Database Management System 5 Marks Important Questions

Question 1.
What is relational algebra? Explain any three relational algebra operations. (MARCH-2016)
Answer:
Relational Algebra: It consists of a set of operations that takes one or two relations as input and produces a new relation as a result.
A) SELECT operation
SELECT operation is used to select tuples in a relation that satisfy a selection condition. Greek letter σ (sigma) is used to denote the operation. Syntax,
σcondition (relation)
eg: – σsalary<10000 (EMPLOYEE)-selects tuple whose salary is less than 10000 from EMPLOYEE relation.

B) PROJECT operation
PROJECT operation selects certain columns from the table and discards the other columns. Greek letter π(pi) is used to denote PROJECT operation.
Syntax, πcondition (relation)
eg:- πname,salary (EMPLOYEE) displays only the name and salary of all employees

C) UNION operation
This operation returns a relation consisting of all tuples appearing in either or both of the two specified relations. It is denoted by U. duplicate tuples are eliminated. Union operation can take place between compatible relations only, i.e., the number and type of attributes in both the relations should be the same and also their order.
e.g:-SCIENCE U COMMERCE gives all the tuples in both COMMERCE and SCIENCE.

D) INTERSECTION operation
This operation returns a relation consisting of all the tuples appearing in both of the specified relations. It is denoted by n. It can takes place only on compatible relations,
e.g:- FOOTBALL ∩ CRICKET returns the players who are in both football and cricket teams.

Question 2.
Explain the components of DBMS. (MAY-2016)
Answer:
Components of DBMS are given below.
1) Hardware :- It includes computers such as pc, workstations, Server Computer and super computer, storage devices such as hard disk, network devices such as hubs, switches, routers and other supporting devices used for storage and retrieval.

2) Software:- Collection of programs (DBMS) used to define the structure of a table (DDL), used to add, retrieve, modify and delete records in database (DML), and used to maintain the security to the data (DCL).

3) Data:- It is the main Component for effective storage and retrieval of information data is categorised as fields, records and files.
Fields :- smallest unit of stored data, eg :- Regno, name, batch etc Record:-Collection of related fields eg :-101, Jose, Science
File:- collection of related records
eg :-101, Jose, Science
102, Raju, Commerce
103, Alvis, Humanities etc.

4) Users :- Those who uses the ata
eg :- Data Base Administrator (DBA), Application Programmes, Sophisticated users and end users.

5) Procedures:- These are the steps to follow while using a database.
1) Start and stop the DBMS
2) Log on the DBMS
3) Take backups in regular intervals.

Question 3.
Explain advantages of DBMS over conventional file system. (MAY-2017)
Answer:
Advantages of DBMS
1) Data Redundancy – It means duplication of data. DBMS eliminates redundancy. DBMS does not store more than one copy of the same data.
2) Inconsistency can be avoided – If redundancy occurs there is a chance to inconsistency. If redundancy is removed, then inconsistency cannot occur.
3) Data can be shared – The data stored in the database can be shared by the users or programs.
4) Standards can be enforced – The data in the database follows some standards.
Eg : a field ‘Name’ should have 40 characters long. Some standards are ANSI, ISO, etc.
5) Security restrictions can be applied – The data is of great value so it must be kept secure and private. Data security means the protection of data against accidental or intentional disclosure or unauthorized destruction or modification by unauthorized person.
6) Integrity can be maintained – It ensures that the data is to be entered in the database is correct.
7) Efficient data access – It stored a huge amount of data efficiently and can be retrieved whenever a need arise.
8) Crash recovery – Sometimes all or a portion of the data is lost when a system crashes. A good DBMS helps to recover data after the system crashed.

Plus Two Computer Application Chapter Wise Previous Questions Chapter 7 Web Hosting

Kerala State Board New Syllabus Plus Two Computer Application Chapter Wise Previous Questions and Answers Chapter 7 Web Hosting.

Kerala Plus Two Computer Application Chapter Wise Previous Questions Chapter 7 Web Hosting

Plus Two Computer Application Web Hosting 1 Mark Important Questions

Question 1.
Identify the odd : (MARCH-2016)
Answer:
a) Word Press
b) FileZilla
c) Joomal
d) Drupal

Question 2.
______ provides an easy way to design and manage attractive websites. (MAY-2016)
a) free hosting
b) CMS
c) WHOIS
d) FTP
Answer:
b)CMS

Plus Two Computer Application Web Hosting 2 Marks Important Questions

Question 1.
What type of homing package is suitable for a multinational online shopping site? Mention any two advantages of the package. (MARCH-2016)
Answer:
Dedicated hosting
a) Dedicated Hosting
b) A web server and its resources are exclusively for one website that has a large volume of traffic means a large volume of requests by visitors. Some Govt, departments or large organizations require uninterrupted services for that round the clock power supply is needed. It is too expensive but it is more reliable and provides good service to the public.
Eg : It is similar to living in an Our own house. All the resources in your house are only for you. No one else’s account resides on the computer and would not be capable of tapping into your resources.

Question 2.
What is SFTP? (MAY-2016)
Answer:
FTP (File Transfer Protocol) client software
When a client requests a website by entering the website address. Then FTP client software helps to establish a connection between the client computer and the remote server computer. Unauthorised access is denied by using user name and password hence secure our website files for that SSH(Secure Shell) FTP simply SFTP is used. Instead of http://, it uses ftp://.
By using FTP client s/w we’ can transfer(upload) the files from our computer to the web server by using the ‘drag and drop’ method. The popular FTP client software is FileZilla, CuteFTP, SmartFTP, etc.

Question 3.
Differentiate shared and dedicated web hosting. (MAY-2017)
Answer:

Shared Dedicated
The resources areThe resources are
sharednot shared
Suitable for smallSuitable for websites
websites with lesswith large volume of
traffictraffic
It is cheapIt is highly expensive
It is slowerIt is faster

Plus Two Computer Application Web Hosting 3 Marks Important Questions

Question 1.
What is the need of registering a domain name for a website? Explain the procedure of domain name registration. (MARCH-2016)
Answer:
Millions of websites are available over the Internet so that our website must be registered with a suitable name. Domain Name registration is used to identify a website over the Internet. A domain name must be unique(i.e. no two websites with the same name are available). So you have to check the availability of do¬main name before you register it, for this will help. If the domain name entered is available then we can register it by paying the Annual registration fees online. Consider a Post Office, it has two addresses one string address (Irinjalakuda) and one numeric(pin) code (680121). Just like this, the website has also two addresses a string address for example www.agker.cag.gov.in, and a numeric address (http:/ /210.212.239.70/). We are following a string address, hence this domain name has to be connected to the corresponding IP address of the webserver. This is done by using ‘A record’(Address record) of the domain. ‘A record’ is used to store the IP address and the corresponding domain name.

Question 2.
Compare shared hosting and VPS. (MAY-2016)
Answer:
Types of web hosting: Various types of web hosting services are available. We can choose the web hosting services according to our needs depends upon the storage space needed for hosting, the number of visitors expected to visit, etc.

1) Shared Hosting: This type of hosting shares resources, like memory, disk space, and CPU hence the name shared. Several websites share the same server. This is suitable for small websites that have less traffic and it is not suitable for large websites that have large bandwidth, large storage space, and have a large volume of traffic.
Eg: Shared hosting is very similar to living in an Apartment(Villas) complex. All residents are in the same location and must share the available resources(Car parking area, Swimming pool, Gymnasium, playground, etc) with everyone.

2) Dedicated Hosting: A web server and its resources are exclusively for one website that has a large volume of traffic means a large volume of requests by the visitors. Some Govt, departments, or large organizations require uninterrupted services for that round the clock power supply is needed. It is too expensive but it is more reliable and provides good service to the public.
Eg: It is similar to living in an Our own house. All the resources in your house is only for you. No one else’s account resides on the computer and would not be capable of tapping into your resources.

3) Virtual Private Server (VPS): A VPS is a virtual machine sold as a service by an Internet hosting Service. A VPS runs its own copy of an OS (Operating System) and customers have super level access to that OS instance, so they can install almost any s/w that runs on that OS. This type is suitable for websites that require more features than shared hosting but less features than dedicated hosting.
Eg: It is similar to owning a Condo

Question 3.
Amita wanted to get the name ‘www. smartproducts.com’ for her newly designed website. How it is possible? (MARCH-2017)
Answer:
Millions of websites are available over the Internet so that our website must be registered with a suitable name. Domain Name registration is used to identify a website over the Internet. A domain name must be unique (i.e. no two websites with the same name is available). So you have to check the availability of the domain name before you register it, for this www.whois.net website will help. If the domain name entered is available then we can register it by paying the Annual registration fees online.

Question 4.
Ajith created a website using the software ‘Joomla’. What is the peculiarity of this software and write any four advantages of using this software? (MARCH-2017)
Answer:
Joomla is an example of a Content Management System.CMS is a collection of programs that are used to create, modify, update, and publish website content. CMS can be downloaded freely and is useful to design and manage attractive and interactive websites with the help of templates that are avail¬able in CMS. WordPress, Joomla, etc are examples of CMS.

Question 5.
Explain responsive web design. (MAY-2017)
Answer:
The home page is displayed differently according to the screen size of the browser window(different screen sized devices -mobile phone, palmtop, tablet, laptop, and desktop) we used. The website is designed dynamically(flexibly) that suit the screen size of a different device introduced by Ethan Marcotte. Before this, companies have to design different websites for different screen sized devices. By responsive web design, companies have to design only one website that suitably displayed according to the screen size of the devices.
It is implemented by using a flexible grid layout, images, and media queries.

Plus Two Computer Application Chapter Wise Previous Questions Chapter 6 Client-Side Scripting Using Java Script

Kerala State Board New Syllabus Plus Two Computer Application Chapter Wise Previous Questions and Answers Chapter 6 Client-Side Scripting Using Java Script.

Kerala Plus Two Computer Application Chapter Wise Previous Questions Chapter 6 Client-Side Scripting Using Java Script

Plus Two Computer Application Client-Side Scripting Using Java Script Using HTML 3 Marks Important Questions

Question 1.
Develop a webpage to display the following login screen. (MARCH-2016)
Plus Two Computer Application Chapter Wise Previous Questions Chapter 6 Client-Side Scripting Using Java Script 1
Write JavaScript do the following validation:
a) The application number should be int he ranges 10000 to 99999
b) The password should contain atleast 8 characters.
Answer:
<html>
<head>
<title>
Javascript – login
</title>
<script language =”Javascript”>
function showValid ( )
{
var appno,pas;
appno=document. frmlogin.txtappno. value;
pas=document.frmlogin.txtpass. value;
if (appno<10000|| appno>99999)
{
alert (“The number should be in the range 10000 to 99999. Try again”);
return;
}
if (pas.length <8)
{
alert (” The password must contain atleast 8 characters. Try again”);
return;
}
</SCRIPT>
</HEAD>
<Body bgcolor = “Cyan”>
<Form Name = “frmlogin”>
<Center>
Application No.
<inputtype= “text” name = “txtappno”>
<br> <br> password
<input type = “password” Name = “txtpass”> <br> <br>
<input type= “button” value = “show” onClick = “showValid()”>
</center>
</Form>
</body>
</html>

Question 2.
Design the following web page enter the mark of a student: (MAY-2016)
Plus Two Computer Application Chapter Wise Previous Questions Chapter 6 Client-Side Scripting Using Java Script 2
a) Write HTML code forthe website.
b) Provide validations for the text box using JavaScript. The mark should be in the range of 0 to 100 and should up a number. The text box should not be empty.
Answer:
<html>
<head>
<title>
student details
</title>
<SCRIPT Language=”JavaScript”>
function showValid()
{
varmark;
mark=document.frmcheck.txtmark.value;
if(mark<0 || mark >100)
{
alert(“The mark should be in the range 0 to 100”);
return;
}
if (isNaN(mark))
{
alert (“The mark should be a number”);
return;
}
if(mark == ” “)
{
alert (“please enter a valid mark”); return;
}
}
</SCRIPT>
<BODY BGLOLOR= “Red”>
<Form Name = “frmcheck”>
<Center>
Mark
<input type= “text” name = “txtmark”>
<br><br>
<input type= “button” Value= “Check” onClick=”showValid ( )”>
</center>
</FORM>
</body>
</htm>

Question 3.
Develop a webpage to display the following screen: (MARCH-2017)
Plus Two Macroeconomics Chapter Wise Previous Questions Chapter 6 Open Economy Macroeconomics 11
The user can enter a name in the textbox. On checking the ‘show’ button the name entered in the textbox should be changed into uppercase. Include JavaScript code in the HTML for doing this.
Answer:
<HTML>
<head>
<title>
check
</title>
<SCRIPT Language=”JavaScript”>
function convert( )
{
var str1
str1=document.frmconvert.txtname.value;
document.fimconvert.txtname.value=str1.toUpperCase( );
}
</SCRIPT>
<BODY>
<form name=”frmconvert”>
Enter Name
<input type=”text” name=”txtname”>
<br>
<br>
<inputtype=”button” value=”show” onClick-’convert( )”> </form>
</BODY>
</HTML>

Question 4.
Write a JavaScript which inputs the name, rollno, and date of birth of a student. Date of birth contains month, day and year. The month should be selected from a drop-down list. (MAY-2017)
Answer:
<html>
<head>
<Script Language=”JavaScript”>
function get( )
{
}
</Script>
</head>
</body bgcolor=”cyan”>
<form name=”frm”>
Enter your name
<input type=”text” name=”txtname”>
<br>
Enter your rollno
<input type=”text”name=”txtroll”>
<br>
Entr your Date of Birth
<br>
Day
<input type=”text” name=”txtroll”>
month
<select size=”1″ name=”cbomth”>
<option>January</option>
<option>Februry</option>
<option>March</option>
<option>April</option>
<option>May</option>
<option>June</option>
<option>July</option>
<option>August</option>
<option>September</option>
<option>October</option>
<option>November</option>
<option>December</option>
</select>
Year
<input type=”text” name=”txtyr”>
<br>
<input type=”button” value=”submit”
onClick=”get( )”>
</form>
</body>
</html>

Plus Two Computer Application Chapter Wise Previous Questions Chapter 5 Web Designing Using HTML

Kerala State Board New Syllabus Plus Two Computer Application Chapter Wise Previous Questions and Answers Chapter 5 Web Designing Using HTML.

Kerala Plus Two Computer Application Chapter Wise Previous Questions Chapter 5 Web Designing Using HTML

Plus Two Computer Application Web Designing Using HTML 1 Mark Important Questions

Question 1.
Write HTML tag to set the colour of hyperlink to red. (MARCH-2016)
a) < A colour=”red”?
b) <A colour=”#FF0000″>
c) <BODY LINK = “Red”>
d) <BODYALINK-‘Red”>
Answer:
c) <BODY LINK= “Red”>

Question 2.
Consider the following list created using HTML. (MARCH-2016)
D. Laptop
E. Desktop
F. Printer
a) START= “D” TYPE = “A”
b) START =”4″ TYPE = “A”
c) START = “4” TYPE = “I”
d) START = “D” TYPE =”l”
Answer:
d) START = “D” TYPE =”l”

Question 3.
Nila wanted to set the picture “sky.jpg” as the background of his web page. Choose the correct tag for doing this. (MAY-2016)
IMG SRC = “sky.jpg”>
b) <BODY SRC= “sky.jpg”>
c) <IMG BACKGROUND= “sky.jpg”>
d) <BODY BACKGROUD = “sky.jpg”>
Answer:
d) <BODY BACKGROUD = “sky.jpg”>

Question 4.
_______ attribute of <frame>tag is used to prevent users from resizing the border of a specific frame by dragging it. (MAY-2016)
a) scrolling
b) No resize
c) margin width
d) margin height
Answer:
b) No resize

Question 5.
Write the complete HTML tag that links the text “PSC” to the website www.keralapsc.org (MARCH-2017)
Answer:
<A HREF=”www.keralapsc.org”>PSC</A>

Question 6.
_______ tag in HTML is used to create a drop-down list. (MAY-2017)
a) SELECT
b) OPTION
c) INPUT
d) LIST
Answer:
a) SELECT

Plus Two Computer Application Web Designing Using HTML 2 Marks Important Questions

Question 1.
Write the HTML code to create the following table: (MARCH-2017)
Plus Two Computer Application Chapter Wise Previous Questions Chapter 5 Web Designing Using HTML 1
Answer:
Sp <html>
<head>
<title>
table creation </title>
</head>
<body bgcolor=”cyan”>
<table border=”1″>
<tralign=”center>
<th colspan=”2″>No. of Students</th>
</tr>
<tralign=”left”>
<th>Science</th>
<td>55</td>
</tr>
<tralign=”left”>
<th>Commerce</th>
<td>60</td>
</tr>
<tr align=”left”>
<th>Humanities</th>
<td>58</td>
</tr>
</table>
</body>
</html>

Plus Two Computer Application Web Designing Using HTML 3 Marks Important Questions

Question 1.
Explain the HTML tag <table> and its attributes. (MARCH-2016)
Answer:

  1. Border: It specifies the thickness of the borderlines around the table
  2. Border color: It specifies the colour for borderlines
  3. Align: It specifies the table alignment, the values can be left, right or center
  4. Bgcolor: It specifies the background colour for the table.
  5. Cellspacing: It specifies the space between two table cells
  6. Cellpadding: It specifies the space between cell border and content
  7. Cols: It specifies the number of columns
  8. Width: It determines the table width
  9. Frame: It specifies the border lines around the table, values are void, border, box, above, below,…

Question 2.
Explain <OL> tag with suitable example (MAY-2016)
Answer:
Ordered list (<OI>)- This tag is used to display items with follwing type values
Type=1 for 1,2,3,
Type =i for i,ii,iii,
Type = I for I,II,III
Type = a for a,b,c,…,
Type = A for A,B,C,….
Eg:-<OLType=”1″>
<li>Apple
<li>Orange
<li>Grapes
</OL>

Question 3.
Explain nesting of framesets with an example. (MARCH-2017)
Answer:
Nesting of framesets
A <frameset> tag contains another <frameset> tag
Eg:
<frameset cols=”30%,*”>
<frame src=”page1.html”>
<frameset rows=”33%,33%,*”>
<frame src=”page2.html”>
<frame src=”page3.htmr>
<frame src=”page4.html”>
</frameset>
</frameset>

Question 4.
Write an HTML code to create the following table. (MAY-2017)

PAY-ROLL
EMPNONAMESALARY
101ABIN15,000
102SINI25,000
103ANU20,000

Answer:
<html>
<head>
<title>
table
</title>
</head>
<body bgcolor=”cyan”>
<table border=”1″>
<tralign=”center”>
<th colspan=”3″>PAY ROLL</th>
</tr>
<tralign=”center”>
<th>EMPNO</th>
<th>NAME</th>
<th>SALARY</th>
</tr>
<tralign=”center”>
<td>101 <br>102<br>103</td>
<td>ABIN<br>SINI<br>ANU</td>
<td>15,000<br>25,000<br>20,000</td>
</tr>
</table>
</body>
</html>

Plus Two Computer Application Chapter Wise Previous Questions Chapter 4 Web Technology

Kerala State Board New Syllabus Plus Two Computer Application Chapter Wise Previous Questions and Answers Chapter 4 Web Technology.

Kerala Plus Two Computer Application Chapter Wise Previous Questions Chapter 4 Web Technology

Plus Two Computer Application Web Technology 1 Mark Important Questions

Question 1.
The default port number of http is (MARCH-2016)
a) 20
b) 80
c) 110
d) 53
Answer:
b) 80

Question 2.
_______ tag is used to make the size of the text smaller than current text in HTML.  (MAY-2016)
a) <b>
b) <small>
c) <sub>
d) <sup>
Answer:
b) <small>

Question 3.
A designed website has to be uploaded into a to make it available to internet users all over the world. (MARCH-2017)
Answer:
Webserver

Question 4.
______ is a server that acts as a bridge between the merchant server and the bank server. (MARCH-2017)
Answer:
Payment gateway

Question 5.
The port no. for HTTP protocol is ______ (MAY-2017)
a) 20
b) 80
c) 110
d) 53
Answer:
b) 80

Question 6.
Pick the odd one out: (MAY-2017)
a) BODY
b) HTML
c) HEAD
d) ALIGN
Answer:
d) ALIGN

Question 7.
DNS stands for _____ (MAY-2017)
Answer:
Domain Name System

Plus Two Computer Application Web Technology 2 Marks Important Questions

Question 1.
A webpage is created to display the result of the engineering entrance examination. (MARCH-2016)
a) What type of webpage it is?
b) Mention any two features of it.
Answer:
a) Dynamic web page
b) 1) Content and layout is not fixed
2) It uses databases
3) It runs as the server-side application program
4) interactive

Question 2.
Compare client-side scripting and server-side scripting. (MAY-2016)
Answer:

Client-Side ScriptingServer Side Scripting
Script is copied to client browserto the webserver
Executed by the clientExecuted by the server and result gets back to the browser window
Used for Client level validationConnect to the database in the server
It is possible to block by the userCannot possible
Client side scripts depends the type and version of the browserIt does not depend the type and version of the browser

Question 3.
Every web browser has default colors to display text and hyperlink. How can we change this default colour? (MARCH-2017)
Answer:
Attribute of BODY tag is used for this.
1) TEXT-Specifies the color of the text content of the page
Eg. <BODY TEXT= “Red”>
2) LINK- Specifies colour of the hyperlinks that are not visited by the user
3) ALINK-Specifies the colour of hyperlinks
4) VLINK-Specifies the color of hyperlinks which are a I ready visited by the viewer.
Eg. < BODYALINK= “Cyan” LINK-’ Magenta” VLINK= “Orange”>

Question 4.
Differentiate static and dynamic web page. (MAY-2017)
Answer:

Static web pagesDynamic web pages
Content and layout is fixedContent and layout are changed frequently
Never use databaseDatabase is used
Run by browserIt runs on the server and the result get back to the client (browser)
Easy to developNot at all easy

Plus Two Computer Application Web Technology 3 Marks Important Questions

Question 1.
Compare static and dynamic web pages (MARCH-2017)
Answer:

Static web pagesDynamic web pages
Content and layout is fixedContent and layout is changed frequently
Never use databaseDatabase is used
Run by browserIt runs on the server and the result get back to the client(browser)
Easy to developNot at all easy

Question 2.
Compare Client-side scripting and Server-side scripting languages. (MARCH-2017)
Answer:

Client-Side ScriptingServer Side Scripting
Script is copied to client browserto the webserver
Executed by the clientExecuted by the server and result gets back to the browser window
Used for Client level validationConnect to the database in the server
It is possible to block by the userCannot possible
Client side scripts depends the type and version of the browserIt does not depend the type and version of the browser

Plus Two Computer Application Chapter Wise Previous Questions Chapter 3 Functions

Kerala State Board New Syllabus Plus Two Computer Application Chapter Wise Previous Questions and Answers Chapter 3 Functions.

Kerala Plus Two Computer Application Chapter Wise Previous Questions Chapter 3 Functions

Plus Two Computer Application Functions 1 Mark Important Questions

Question 1.
function is used to check whether a character is alphanumeric. (MAY-2016)
a) isdigit( )
b) inalnum( )
c) isupper( )
d) islower( )
Answer:
b) isalnum( );

Question 2.
char s1 [10]=”hello”,s2[10]; (MAY-2017)
strcpy (s2, s1);
cout<<s2;
What will be the output?
Answer:
a) hello

Plus Two Computer Application Functions 2 Marks Important Questions

Question 1.
Consider the followjjig code: (MARCH-2016)
char S1[ ] = “program”
char S2[ ] = “PROGRAM” int n;
n=strcmpi (S1, S2)
What is the value of n?
a) n=0
b) n=1
c) n>1
d) n<0
Answer:
a) n =0

Question 2.
Explain two stream functions for input operation for example. (MARCH-2017)
Answer:
Input functions: The input functions like get( )(to read a character from the keyboard) and getline( ) (to read a line of characters from the keyboard) is used with cin and dot(.) operator.

Question 3.
Explain how allocation of string takes place in memory. (MAY-2017)
Answer:
A string is automatically appended by a null character(‘\0’). The null character is treated as one character. charname[20];
Here we can store a name with character up to 19.

Question 4.
Explain gets( ) and puts ( ) functions (MAY-2017)
Answer:
gets( ) function is used to get a string from the key board including spaces.
puts( ) function is used to print a string on the screen. To use gets( ) and puts ( ) function the header file cstdio must be included.

Plus Two Computer Application Functions 3 Marks Important Questions

Question 1.
Explain any three stream function for I/O operation.(MARCH-2016)
Answer:
Stream functions for I/O operation are given below
1) get ( ):- To read a character from the key board
eg: cin.get(ch);

2) getline ( ):- To read a line of characters from the keyboard
eg: cin.getline(str, len);

3) put( ):- To print a characters on the screen
eg:cout.put(‘A’);

4) write ( ):- To print a line of characters on the screen
eg: cout.write (str, len);

Question 2.
Write a code to do the following: (MARCH-2016)
a) A function named largest accept two integer numbers and return the largest number.
b) Use this function to find the largest of two numbers.
Answer:
a) int largest (int a, int b)
{
if (a>b)
return a;
else
return b;
}

b) void main ( )
{
int x, y;
cout<<“Enter 2 numbers”; cin>>x>>y;
cout<< “The largest among these is”
<< largest (x,y);
}

Question 3.
Explain any three string function with example. (MAY-2016)
Answer:
Functions in C++
Some functions that are already available in C++ are called pre-defined or built in functions.
In C++, we can create our own functions for a specific job or task, such functions are called user defined functions.
A C++ program must contain a main( ) function. A C++ program may contain many lines of statements(including so many functions) but the execution of the program starts and ends with main( ) function.
Predefined functions
To invoke a function that requires some data for performing the task, such data is called parameter or argument. Some functions return some value back to the called function.
String functions
To manipulate string in C++ a header file called string.h must be included.
a) strlen( )- to find the number of characters in a string(i.e. string length).
Syntax: strlen(string);
Eg- cout<<strlen(“Computer”); It prints 8.

b) strcpy( )- It is used to copy second string into first string.
Syntax: strcpy(string1 ,string2);
Eg. strcpy(str,”BVM HSS”); cout<<str; It prints BVM HSS.

c) strcat( )- It is used to concatenate second string into first one.
Syntax: strcat(string1 ,string2)
Eg. strcpy(str1,’’Hello”); strcpy(str2,” World”); strcat(str1,str2);
cout<<str1; It displays the concatenated string “Hello World”

d) strcmp( )- it is used to compare two strings and returns an integer.
Syntax: strcmp (string1 ,string2)
if it is 0 both strings are equal.
if it is greater than 0(i.e. +ve) string1 is greater than string2
if it is less than 0(i.e. -ve) string2 is greater than string1
Eg.
include
#include using namespace std; int main()
{
char str1 [10],str2[10];
strcpy(str1 ,”Kiran”);
strcpy(str2,”Jobi”);
cout<<strcmp(str1 ,str2);
}
It returns a +ve integer.

e) strcmpi( )- It is same as strcmp( ) but it is not case sensitive. That means uppercase and lowercase are treated as same.
Eg. “ANDREA” and “Andrea” and “andrea” are the same.
# include
#include
using namespace std;
int main( )
{
char str1 [10],str2[10];
strcpy(str1,”Kiran”);
strcpy(str2,”KIRAN”);
cout<<strcmpi(str1 ,str2);
}
It returns 0. That is both are same.

Question 4.
Write a function that accept 3 numbers of type float as argument and return the average of three numbers. Write program which use this function to find the average of three numbers using C++. (MAY-2016)
Answer:
# include
using namespace std;
float avg(float n1, float n2, float n3)
{
return ((n1 +n2+n3)/3);
}
int main( )
{
float x, y, z;
cout <<“Enter 3 nos”; cin>> x>>y>>z;
cout <<“the average is”<<avg(x,y,z);
}

Question 5.
“Initialized formal arguments are called default arguments.” Using this concept write the function prototype and definition of a user-defined function Sum() which accepts two or three integer numbers and returns their sum. (MARCH-2017)
Answer:
#include
using namespace std;
int sum(int x=100,int y=50,int z=10)
{
retum(x+y+z);
}
int main( )
{
cout<<sum( )<<endl; cout<<sum(1)<<endl;
cout<<sum(1,2)<<endl;
cout<<sum(1,2,3)<<endl;
}

Question 6.
Write the output of the following code segment. (MARCH-2017)
char S1[25]=” Computer”;
char S2[15]=” Applications”;
strcat(S1 ,S2);
cout<<S1;
Answer:
The output is “ComputerApplicatios”. That is the second string is concatenated to the first string.

Question 7.
Explain three string functions in C++. (MAY-2017)
Answer:
a) strlen( )- to find the number of characters in a string(i.e. string length).
Syntax: strlen(string);
Eg. cout<<strlen(“Computer”);
It prints 8.

b) strcpy( )- It is used to copy second string into first string.
Syntax: strcpy(string1, string2);
Eg. strcpy(str,”BVM HSS”);
cout<<str;
It prints BVM HSS.

c) strcat( )- It is used to concatenate second string into first one.
Syntax: strcat(string1,string2)
Eg. strcpy(str1,’’Hello”);
strcpy(str2,” World”);
strcat(str1 ,str2);
cout<<str1;
It displays the concatenated string “Hello World”

Question 8.
Write a program using a function to interchange the value of two variables. (Use call by reference method for passing arguments.) (MAY-2017)
Answer:
#include
using namespace std;
void swap(int &x,int &y)
{
int temp; temp=x;
x=y;
y=temp;
}
intmain()
{
intx=100,y=200;
cout<<“values before swap”<<endl;
cout<<“x=”<<x<<“,y=”<<y<<“\n”;
swap(x,y);
cout<<“values after swap”<<endl;
cout<<“x=”<<x<<“,y-‘<<y<<“\n”;