Plus One Computer Application Notes Chapter 6 Introduction to Programming

Students can Download Chapter 6 Introduction to Programming Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 6 Introduction to Programming

Structure of a C++ program
A typical C++ program would contain four sections as shown below.
Include files(Preprocessor directives)
Function declarations
Function definitions
Main function programs
Eg.
#include
using namespace std;
int sum(int x, int y)
{
return (x+y);
}
int main()
{
cout<<sum(2, 3);
}

Preprocessor directives: A C++ program starts with the preprocessor directive i.e., #include, #define, #undef, etc, are such a preprocessor directive. By using #inciude we can link the header files that are needed to use the functions. By using #define we can define some constants.
Eg. #define × 100. Here the value of x becomes 100 and cannot be changed in the program.
No semicolon is needed.

Header files:
header files: A header file is a pre-stored file that helps to use some operators and functions. To write C++ programs the header files are a must.
Following are the header files
iostream
iomanip
cstdio
cctype
cmath
cstring
The syntax for including a header file is as follows #include
Eg. #include

The main function: The main function is the first function which is invoked at the time of execution and the program ends within main(). The other functions are invoked from main().

Programming tips: The identifier name must be clear, precise, brief, and meaningful
Use clear and simple expressions.
Use comments wherever needed.
To give tips in between the program comments are used. A comment is not considered as part of the program and can not be executed. There are 2 types of comments single line and multiline.
Single line comment starts with //(2 slashes) but multi-line comment starts with /* and ends with */
indentation: Giving leading spaces to the statements is called indentation. It is a good programming practice.

Variable initialisation: Giving value to a variable at the time of declaration.
Eg: int age=16; Here the OS allocates 4 bytes memory for the variable age and it stores a value 16.

const – The access modifier: By using the keyword const we can create symbolic constants its value does not change during execution.
Eg: const int bp=100;

Type modifiers: With the help of type modifiers we can change the sign and range of data with the same size. The important modifiers are signed, unsigned, long and Short.
Plus One Computer Application Notes Chapter 6 Introduction to Programming 1
Shorthands in C++

Arithmetic assignment operators: It is faster. This is used with all the arithmetic operators as follows.
Plus One Computer Application Notes Chapter 6 Introduction to Programming 2
a) Increment operator(++): It is used for incrementing the content by one. ++x(pre increment) and x++ (post increment) both are equivalent to x = x+1.
b) decrement operator (–): It is used for decrementing the content by one. –x (pre decrement) and x– (post decrement) both are equivalent to x=x-1.

Prefix form: In this, the operator is placed before the operand and the operation is performed first then use the value.

Postfix form: In this, the operator is placed after the operand and the value of the variable is used first then the operation is performed.
Eg: Post increment a++
Here first use the value of ‘a’ and then change the value of ‘a’.
Eg: if a=10 then b=a++. After this statement b=10 and a=11 Pre increment ++a
Here first change the value of a and then use the value of a.
Eg: if a=10then b=++a. After this statement b=11 and a=11.

Precedence of operators: Consider a situation where an expression contains all the operators then the operation will be carried in the following order(priority)
Plus One Computer Application Notes Chapter 6 Introduction to Programming 3

Type conversion: Type conversions are of two types.
1) Implicit type conversion: This is performed by the C++ compiler internally. C++ converts all the lower sized data type to the highest sized operand. It is known as type promotion. Data types are arranged lower size to higher size is as follows.
unsigned int(2 bytes), int(4 bytes),long (4 bytes), unsigned long (4 bytes), float(4 bytes), double(8 bytes), long double(10 bytes)
2) Explicit type conversion: It is known as typecasting. This is done by the programmer. The syntax is given below.
(data type to be converted) expression
Eg. int x=10;
(float) x;
This expression converts the data type of the variable from integer to float.

Plus One Computer Application Notes Chapter 5 Data Types and Operators

Students can Download Chapter 5 Data Types and Operators Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 5 Data Types and Operators

Concepts of data types: The nature of data is different, data type specifies the nature of data we have to store.

C++ data types
Plus One Computer Application Notes Chapter 5 Data Types and Operators 1

Fundamental data types: It is also called built in data type. They are int, char, float, double and void
i) int data type: It is used to store whole numbers without fractional (decimal point) part. It can be either negative or positive. It consumes 4 bytes (32 bits) of memory. i.e. 232 numbers. That is 231 negative numbers and 231 positive numbers (0 is considered as +ve) So a total of 232 numbers. We can store a number in between -231 to + 231 – 1.

ii) char data type: Any symbol from the keyboard, eg. ‘A’, ‘?’, ‘9’„…. It consumes one byte( 8 bits) of memory. It is internally treated as integers, i.e: 28 = 256 characters. Each character is having a ASCII code, ‘a’ is having ASCII code 97 and zero is having ASCII code 48.

iii) float data type: It is used to store real numbers he. the numbers with decimal point. It uses 4 bytes(32 bits) of memory.
Eg. 67.89, 89.9 E-15.

iv) double data type: It is used to store very large real numbers. It uses 8 bytes(64 bits) of memory.

v) void data type: void means nothing. It is used to represent a function returns nothing.
User defined Data types: C++ allows programmers to define their own data type. They are Structure(struct), enumeration (enum), union, class, etc.
Derived data types: The data types derived from fundamental data types are called Derived data types. They are Arrays, pointers, functions, etc

Variables:
The named*memory locations are called variable. A variable has three important things

  1. variable name: A variable should have a name
  2. Memory address: Each and every byte of memory has an address. It is also called location (L) value
  3. Content: The value stored in a variable is called content.lt is also called Read(R) value.

Operators: An operator is a symbol that performs an operation. The data on which operations are carried out are called operands. Following are the operators
1) Input(>>) and output(<<) operators are used to perform input and output operation. Eg. cin>>n;
cout<<n;

2) Arithmetic operators: It is a binary operator. It is used to perform addition(+), subtraction(-), division (/), multiplication(*) and modulus(%-gives the remainder) operations.
Eg. If x = 10 and y = 3 then
Plus One Computer Application Notes Chapter 5 Data Types and Operators 2
x/y = 3, because both operands are integer. To get the floating point result one of the operand must be float.

3) Relational operator: It is also a binary operator. It is used to perform comparison or relational operation between two values and it gives either true(1) or false(0). The operators are <, <=, >, >=, == (equality)and !=(not equal to)
Eg. If x = 10 and y = 3 then
Plus One Computer Application Notes Chapter 5 Data Types and Operators 3

4) Logical operators: Here AND(&&), OR(||) are binary operators and NOT (!) is a unary operator. It is used to combine relational operations and it gives either true(1) or false(0).
If x = 1 and y = 0 then
Plus One Computer Application Notes Chapter 5 Data Types and Operators 4
Both operands must be true to get a true value in the case of AND (&&) operation.
If x = 1 and y = 0 then
Plus One Computer Application Notes Chapter 5 Data Types and Operators 5
Either one of the operands must be true to get a true value in the case of OR(||) operation
If x = 1 and y = 0 then
Plus One Computer Application Notes Chapter 5 Data Types and Operators 6

5) Conditional operator: It is a ternary operator hence it needs three operands. The operator is?:. Syntax: expression ? value if true: value if false. First evaluates the expression if it is true the second part will be executed otherwise the third part will be executed.
Eg. If x = 10 and y = 3 then
x>y ? cout<>) operator is used to perform input operation.
Eg. cin>>n;

Output statements
output(<<) operator is used to perform output operation.
Eg. cout<<n; Cascading of I/O operations The multiple use of input or output operators in a single statement is called cascading of i/o operators. Eg: To take three numbers by using one statement is as follows cin>>x>>y>>z;
To print three numbers by using one statement is as follows
cout<<x<<y<<z;

Plus One Computer Application Notes Chapter 4 Getting Started with C++

Students can Download Chapter 4 Getting Started with C++ Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 4 Getting Started with C++

It is developed by Bjarne Stroustrup. It is an extension of the C Language.

Character set: To study a language first we have to familiarize the character set. For example, to study the English language first we have to study the alphabet. Similarly here the character set includes letters(A to Z & a to z), digits(0 to 9), special characters(+, -, *, /, …..) white spaces(non printable) etc..

Token: It is the smallest individual unit similar to a word in English or Malayalam language. C++ has 5 tokens
1) Keywords: These are reserved words for the compiler. We can’t use it for any other purposes
Eg: float is used to declare variables to store numbers with a decimal point. We can’t use this for any other purpose

2) Identifier: These are user-defined words. Eg: variable name, function name, class name, object name, etc…

3) Literals (Constants): Its value does not change during execution
i) Integer literals: Whole numbers without fractional parts are known as integer literals, its value does not change during execution. There are 3 types of decimal, octal, and hexadecimal.
Eg. Fordecimal 100, 150, etc..
For octal 0100, 0240, etc..
For hexadecimal 0 × 100, 0 × 1A, etc

ii) Float literals: A number with fractional parts and its value does not change during execution is called floating-point literals.
Eg. 3.14157, 79.78, etc…

iii) Character literal: A valid C++ character enclosed in single quotes, its value does not change during execution.
Eg. ‘m’, ‘f ’ etc

iv) String literal: One or more characters enclosed in double-quotes is called string constant. A string is automatically appended by a null character(‘\0’)
Eg. “Mary’s”,’’ India”,etc

4) Punctuators: In English or Malayalam language punctuation marks are used to increase the readability but here it is used to separate the tokens.
Eg:{,},(,),…

5) Operators: These are symbols used to perform an operation (Arithmetic, relational, logical, etc…)

Integrated Development Environment(IDE): It is used for developing programs

  • It helps to write as well as editing the program.
  • It helps to compile the program and linking it to other (header files and other users) programs
  • It helps to run the program

Turbo C++ IDE
Following is a C++ IDE
Plus One Computer Application Notes Chapter 4 Getting Started with C++ 1
a) Opening the edit window
Method I: File → Click the menu item New
Method II: Press Alt and F simultaneously then press N

b) Saving the program:
Click File → Save or Press Function key F2 or Alt+F and then press S
Then give a file name and press ok.

c) Running/executing the program
Press Alt+R then press R OR Click Run → press R, OR Press Ctrl + F9

d) Viewing the output: Press Alt+F5

e) Closing Turbo C++ IDE
Click File → then press Quit menu Or Press Alt+X

Geany IDE
Plus One Computer Application Notes Chapter 4 Getting Started with C++ 2

  • Step 1: Take Geany Editor and type the program (source code)
  • Step 2: Save the file with extension .cpp
  • Step 3: Compile the program by Click the Compile Option
  • Step 4: After successful compilation, Click the Build option
  • Step 5: Then click on the Execute option

Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving

Students can Download Chapter 3 Principles of Programming and Problem Solving Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving

Problem-solving using computers:
It has no intelligent quotient. Hence they are slaves arid human beings are the masters. It can’t make its own decisions. They can perform tasks based upon the instructions given by the humans (programmers).

Approaches in problem-solving
Top-down design: Larger programs are divided into smaller ones and solve each task by performing simpler activities. This concept is known as a top-down design in problem-solving

Bottom-Up design: Here also larger programs are divided into smaller ones and the smaller ones are again subdivided until the lowest level of detail has been reached. We start solving from the lowest module onwards. This approach is called a Bottom-up design.

Phases in programming
1. Problem identification: This is the first phase in programming. The problem must be identified then only it can be solved, for this, we may have to answer some questions. During this phase, we have to identify the data, its type, quantity, and formula to be used as well as what activities are involved to get the desired output is also identified for example if you are suffering from stomach ache and consult a Doctor. To diagnose the disease the doctor may ask you some questions regarding the diet, duration of pain, previous occurrences, etc, and examine some parts of your body by using a stethoscope X-ray, scanning, etc.

2. Deriving the steps to obtain the solution.
There are two methods, Algorithm and flowchart, are used for this.
a) Algorithm: The step-by-step procedure to solve a problem is known as an algorithm. It comes from the name of a famous Arab mathematician Abu Jafer Mohammed Ibn Musaa Al-Khowarizmi, The last part of his name Al-Khowarizmi was corrected to the algorithm.

b) Flowchart: The pictorial or graphical representation of an algorithm is called a flowchart.
Flow chart symbols are explained below
1) Terminal (Oval)
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 1
It is used to indicate the beginning and end of a problem

2) Input/Output (parallelogram)
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 2
It is used to take input or print output.

3) Processing (Rectangle)
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 3
It is used to represent processing That means to represent arithmetic operation such as addition, subtraction, multiplication

4) Decision (Rhombus)
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 4
It is used to represent decision making. It has one entry flow and two exit flows but one exit path will be executed at a time.

5) Flowlines (Arrows)
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 5
It is used to represent the flow of operation

6) Connector
Plus One Computer Application Notes Chapter 3 Principles of Programming and Problem Solving 6

3. Coding: The dummy codes (algorithm) or flowchart is converted into a program by using a computer language such s Cobol, Pascal, C++, VB, Java, ….. etc.

4. Translation: The computer only knows machine language. |t does not know HLL, but the human beings HLL is very easy to write programs. Therefore a translation’ is needed to convert a program written in HLL into machine code (object code). During this step, the syntax errors of the program will be displayed. These errors are to be corrected and this process will be continued till we get a “No errors” message. Then it is ready for execution.

5. Debugging: The program errors are called ‘bugs’ and the process of detecting and correcting errors is called debugging. In general, there are two types of errors syntax errors and logical errors. When the rules or syntax of the language are not followed then syntax errors occurred and it is displayed after compilation. When the logic of a program is wrong then logical errors occurred and it is not displayed after compilation but it is displayed in the execution and testing phase.

6. Execution and Testing: In this phase, the program will be executed and give test data for testing the purpose of this is to determine whether the result produced by the program is correct or not. There is a chance of another type of error, Run time error, this may be due to inappropriate data.

7. Documentation: It is the last phase in I programming. A computerized system must be documented properly and it is an ongoing process that starts in the first phase and continues till its implementation. It is helpful for the modification of the program later.

Plus One Computer Application Notes Chapter 2 Components of the Computer System

Students can Download Chapter 2 Components of the Computer System Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 2 Components of the Computer System

Hardware: The tangible parts of a computer that we can touch and see are called hardware.
Eg: Monitor, Keyboard, Mouse, CPU, Etc.

Processors: It is the brain of the computer and consists of three components
Arithmetic Logic Unit(ALU) – As the name implies it performs all calculations and comparison operations.
Control Unit(CU)- It controls over all functions of a computer
Registers – It stores the intermediate results temporarily.

A CPU is an Integrated Circuit(IC) package that contains millions of transistors and other components. Popular Processors are Intel core i3, core i5, core i7, AMD Quadcore etc.
Important registers inside a CPU are

  • Accumulator: After performing an operation (arithmetic or logical) the result is stored in the accumulator
  • Memory Address Register(MAR): It stores the address of the memory location to which data is either read or written by the processor.
  • Memory Buffer Register (MBR) : It stores the data, either to be written to or read from the memory by the processor.
  • Instruction Register(IR): It stores the instructions to be executed by the processor.
  • Program Counter(PC): It stores the address of the next instruction to be executed by the processor.

Motherboard: It is a Printed Circuit Board(PCB). All the major components like Processor (Remember the processor must be compatible with the Motherboard), RAM, ROM, HDD, Graphics card, Sound card, etc are connected to the Motherboard.

Peripherals and Ports

  • Serial Port: It transmits data one bit at a time (eg: 101000001010). Its transmission speed
    is low but it is cheaper. It is suitable to transmit data over long distance.
  • Parallel port: It can transmit data more than one bit at a time. It is faster and used to connect the printer.
  • USB (Universal Serial Bus) port: It has high bandwidth hence it is faster. Nowadays it is used to connect all the devices like keyboard, mouse, printer, scanner, pen drive, digital camera, mobile phones, dongle etc.
  • LAN port: By using this port we can connect our computer to another network by a cable.
  • PS/2(Personal System/2) poet: It is introduced by IBM for connecting keyboard and mouse earlier.
  • Audio ports: It is used to connect audio devices like speakers, mic etc.
  • Video Graphics Array (VGA) port: It is introduced by IBM to connect a monitor or LCD projector to a computer.
  • High Definition Multimedia Interface(HDMI): Through this port, we can connect high definition quality video and multi-channel audio over a single cable.

Memory
Storage Unit(Memory Unit): A computer has huge storage capacity. It is used to store data and instructions before starts the processing. Secondly it stores the intermediate results and thirdly it stores information(processed data), that is the final results before send to the output unit(Visual Display Unit, Printer, etc)
Memory measuring units are given below.

  • 1 bit – 1 or 0(Binary Digit)
  • 4 bits – 1 Nibble
  • 1 bits – 1 Byte
  • 1024 Bytes – 1 KB(KiloByte)
  • 1024 KB – 1 MB(Mega Byte)
  • 1024 MB – 1 GB(Giga Byte)
  • 1024 GB – 1 TB(Tera Byte)
  • 1024 TB – 1 PB(Peta Byte)

Two Types of the storage unit
i) Primary Storage alias Main Memory: It is further be classified into Two – Random Access Memory (RAM) and Read-Only Memory (ROM). The one and only memory that the CPU can directly access is the main memory at a very high speed. It is expensive hence storage capacity is less.

RAM is volatile(when the power is switched off the content will be erased) in nature but ROM is nonvolatile (lt is permanent). In ROM a “boot up” program called BIOS(Basic Input Output System) is stored to “boots up” the computer when it switched on. Some ROMs are given below.
1. PROM(Programmable ROM): It is programmed at the time of manufacturing and cannot be erased.
2. EPROM (Erasable PROM): It can be erased and can be reprogrammed using special electronic circuit.
3. EEPROM (Electrically EPROM): It can be erased and rewritten electrically Cache Memory: The processor is a very high speed memory but comparatively RAM is slower than Processor. So there is a speed mismatch between the RAM and Processor, to resolve this a high-speed memory is placed in between these two this memory is called cache memory. Commonly used cache memories are Level(L1) Cache(128 KB), L2(1 MB)

ii. Secondary Storage alias Auxiliary Memory: Because of limited storage capacity of primary memory its need arises. When a user saves a file, it will be stored in this memory hence it is permanent in nature and its capacity is huge. Eg: Hard Disc Drive(HDD), Compact Disc(CD), DVD, Pen Drive, Blu Ray Disc etc.

a) Magnetic storage device: It uses plastic tape or metal/plastic discs coated with magnetic material.
Hard Disk: Instead of flexible or soft disk it uses rigid material hence the name hard disk. Its storage capacity and data transfer rate are high and low access time. These are more lasting and less error-prone. The accessing mechanism and storage media are combined together in a single unit and connect to the motherboard via cable.

b) Optical storage device.
Optical Disk: The high-power laser uses a concentrated, narrow beam of light, which is focused and directed with lenses, prisms and mirrors for recording data. These beams burn very very small spots in master disk, which is used for making molds and these molds are used for making copies on plastic disks. A thin layer of aluminum followed by a transparent plastic layer is deposited on it. The holes made by the laser beam are called pits, interpreted as bit 0 and unbumed areas are called lands interpreted as bit 1. Lower power laser beam is used to retrieve the data.

DVD(Digital Versatile Disc): It is similar to CD but its storage capacity is much higher. The capacity of a DVD starts.from 4.7 GB

Blu-ray Disc: It is used to read and write High Definition video data as well as to store very huge amount of data. While Cd and DVD uses red laser to read and write but it uses Blue-Violet laser, hence the name Bid ray disc. The blue-violet laser has a shorter wavelength than a red laser so it can pack more data tightly.

iii) Semiconductorstorage (Flash memory): It uses EEPROM chips. It is faster and long-lasting.
USB flash drive: It is also called a thumb drive or pen drive. Its capacity varies from 2 GB to 32 GB.
Flash memory cards: It is used in Cameras, Mobile phones, tablets etc to store all types of data.

Input/Output devices: It is used to supply data to the computer for processing
1. Keyboard: It is the most widely used device to input information in the form of words, numbers etc. There are 101 keys on a standard keyboard. The keys on the keyboard are often classified into alpha numeric keys (A to Z, 0 to 9), function keys (F1 to F12), special purpose keys (Special characters), cursor movement keys (arrow keys). While pressing a key, the corresponding code’s signal is transmitted to the computer.

2. Mouse: It is a pointing device, that controls the movement of the cursor, or pointer as a display screen. A mouse has two or.three buttons, it is often used in GUI oriented computers. Under the mouse there is a ball, when the mouse moves on a flat surface this ball also moves. This mechanical motion is converted into digital values that represent the x and y values of the mouse movement.

3. Light Pen: It is an input device that use a light-sensitive detector to select objects directly on a display screen using a pen. Light pen has a photocell placed in a small tube. By using light pen, we can locate the exact position on the screen.

4. Touch screen: It allows the user to enter data by simply touching on the display screen. This technology is applied in tablets, cell phones, computers etc.

5. Graphic tablet: It consists of an electronic writing area. We can create graphical images by using a special pen.

6. Touchpad: It is a pointing device found on portable computers(laptop). Just like a mouse it consists of two buttons below the touch surface to do the operations like left-click and right-click. By using our fingers we can easily operate.

7. Joy Stick: It is a device that lets the user move an object Quickly on the screen. It has a liver that moves in all directions and controls the pointer or object. It is used for computer games and CAD/CAM systems.

8. Microphone: By using this device we can convert voice signals into digital form.

9. Scanner: It is used to read text or pictures printed on paper and translate the information into computer-usable form. It is just like a photostat machine but it gives information to the computer.

10. Optical Mark Reader (OMR): This device identifies the presence or absence of a pen or pencil mark. It is used to evaluate objective type exams. In this method, special preprinted forms are designed with circles can be marked with dark pencil or ink. A high-intensity beam in the OMR* converts this into computer-usable form and detects the number and location of the pencil marks. By using this we can evaluate easily and reduce the errors.

11. Bar code/Quick Response (QR) code reader: Light and dark bars are used to record item name, code and price is called Bar Code. This information can be read and input into a computer quickly without errors using Bar Code Readers. It consists of a photo electric scanner and it is used in supermarket, jewellery, textiles etc. QR codes are similar to barcodes but it uses two dimensional instead of single-dimensional used in Barcode.

12. Biometric sensor: It is used to read unique human physical features like fingerprints, retina, iris pattern, facial expressions etc. Most of you give this data to the Government for Aadhaar.

13. Smart card reader: A plastic card(may be like your ATM card) stores and transmit data with the help of a reader.

14. Digital Camera: By using digital camera, we can take photographs and store in a computer. Therefore we can reduce the use of film. Hence it is economical.

Output devices: After the data processing the result is displayed as soft copy(soft copy can view, only by using a device) or hard copy(it can read
easily).
1) Visual Display Unit
a) Cathode Ray Tube (CRT) There are two types of CRT’s, mpnochrome (Black and white) and colour. Monochrome CRT consists of one electron gun but colour CRT consists of 3 electron guns (Red, Green and Blue) at one end and the other end coated with phosphor. It is a vacuum tube. The phosphor coated screen can glow when electron beams produced by electron guns hit, It is possible to create all the colours using Red, Green and Blue. The images produced by this is refreshed at the rate of 50 or 60 times each second. Its disadvantage is it is heavy and bulky. It consumes more power and emits heat. But it is cheap. Nowadays its production is stopped by the company.

b) Liquid Crystal Display (LCD): It consists of two electrically conducting plates filled with liquid crystal. The front plate has transparent electrodes and the back plate is a mirror. By applying proper electrical signals across the plates,1he liquid crystals either transmit or block the light and then reflecting it back from the mirror to the viewer and hence produce images.- It is used in where small sized displays are required.

c) Light Emitting Diode(LED): It uses LED behind the liquid crystals in order to light up the screen. It gives a better quality and clear image with wider viewing angle. Its power consumption is less.

d) Plasma Panels: It consists of two glass plates filled with neon gas. Each plate has several parallel electrodes, right angles to each other. When low voltage is applied between, two electrodes, one on each plate, a small portion of gas is glow and hence produce images. Plasma displays provide high resolution but are expensive. It is used in, where quality and size is a matter of concern.

e) Organic Light Emitting Diode(OLED) Monitors: It is made up of millions of tiny LEDs. OLED monitors are thinner and lighter than LCDs and LEDs. It consumes less power and produce better quality images but it is very expensive.
LCD projector : It is used to display video, images or data from a computer on a large screen. Its main component is a high intensity light-producing bulb and a lens.

2) Printer: There are two types of printers impact and non impact printers. Printers are used to produce hard copy.
Impact Printers : There is a mechanical contact between print head and the paper.

i) Dot Matrix Printer: Here characters are formed by using dots. The printing head contains a vertical array of pins. The letters are formed by’ using 5 dot rows and 7 dot columns. Such a pattern is called 5×7 matrix. This head moves across the paper, the selected pins fire against an inked ribbon to form characters by dot. They are capable of faster printing, but their quality is not good.

Non-impact Printers : There is no mechanical contact between print head and paper so carbon copies cannot be possible to take. They are inkjet, laser, thermal printers etc. .

a) Ink jet Printer: It works in the same fashion asdot matrix printers, but the dots are formed with tiny droplets of ink to be fired from a bottle through a nozzle. These droplets are deflected by an electric field using horizontal and vertical deflection plates to form characters and images. It is possible to generate colour output. They produce less noise1 and produce high quality printing output. The printing cost is higher. Here liquid ink is used.

b) Laser Printer: It uses photo copying technology. Here instead of liquid ink dry ink powder called toner is used. A drum coated with positively charged photo conductive material is scanned by a laser beam. The positive charges that are illuminated by the beam are dissipated. The drum is then rolled through a reservoir of negatively charged toner which is picked up by the charged portions of the drum. It adheres to the positive charges and hence creating a page image on the drum. Monochrome laser printer uses a single toner whereas the colour, laser printer uses four toners. Its print quality is good less noise and printing cost is higher.

c) Thermal Printers: It is same as dot matrix printer but it needs heat sensitive paper. It produces images by pushing electrically heated pins to the special paper. It does not make an.impact on the paper so we cannot produce carbon copies, ft produce less noise, low quality print and inexpensive. It is used in fax machine.

3. Plotter
A plotter is a device that draws pictures or diagrams on paper based on commands from a computer. Plotters draw lines using a pen. Pen plotters generally use drum or flat bed paper holders. In a drum plotter the paper is mounted on the surface of a drum. Here the paper is rotated. But in a flat bed plotter the paper does not move and the pea holding mechanism provides the motion that draws pictures. Plotters are used in engineering applications where precision is needed.

4. Three Dimensional (3D) printer: This device is used to print 3D objects.

5. Audio output devices: Speakers are used to produce sound by the backward and forward movement of the diaphragm in the speaker according to the electrical signals from the computer through the audio port.

e-Waste(electronic waste): It refers to the mal functioning electronic products such -as faulty computers, mobile phones, tv sets, toys, CFL etc.

Why should we concern about e Waste?
It contains poisonous substances such as lead, mercury, cadmium etc and may cause diseases if not properly managed.

What happens to e-Waste?
A small amount is recycled. Due to this our natural resources are contaminated(poisoned). Some of them can recycle properly. But it is a very big problem in front of the Government to collect segregate, recycle and disposal of e-Waste.

e-Waste disposal methods

  • Reuse: Reusability has an important role in e-Waste management and can reduce the volume of e-Waste
  • Incineration: It is the process of burning Waste at high temperature in a chimney
  • Recycling of e-Waste: It is the process of making new products from this e-Waste.
  • Landfilling: It is used to level pits and cover by a thick layer of soil.

Students role in e-Waste disposal

  • Stop buying unnecessary electronic equipment
  • Repair Faulty electronic equipment instead of buying a new one.
  • Give electronic equipment to recycle
  • Buy durable, efficient, quality, toxic-free, good warranty products
  • check the website or call the dealer if there is any exchange scheme
  • Buy rechargeable battery products

Green computing or Green IT: It is the study and practice of eco-friendly computing or IT such as designing, manufacturing, using and disposal of .computers and components (monitors, printers, storage devices etc.)
Following are some steps to follow to reduce the adverse impact on the global environment
Turn off computer and other devices when not in use ‘

  • Use power saver mode
  • Use laptops instead of desktops
  • Avoid print outs if not needed
  • Use LCD s instead of CRT s to save power
  • Use Energy Star rated HA/V or S/w and Solar energy(Hybrid Energy)
  • Dispose e Waste properly as per norms

Following are the steps to promote green computing
Green design: Design energy-efficient and eco-friendly devices
Green manufacturing: reduce non-eco-friendly parts while manufacturing
Green use: Use energy saver devices
Green disposal: Use easily disposable devices

Software: The set of instructions that tell the hardware how to perform a task is called software. Without software, computers cannot do anything. Two types of System s/w and Application s/w
System software:
It is a collection of programs used to manage system resources and control its operations. It is further classified into two.

  • Operating System
  • Language Processor

a) Operating System: It is a collection of programs which acts as an interface between user and computer. Without an operating system computer cannot do anything. Its main function is make the computer usable and use hardware in an efficient manner.
eg: Windows XP, Windows Vista, Linux, Windows 7, etc.

Major functions of an operating System
i) Process management: It includes allocation and deallocation of processes(program in execution) as well as scheduling system resources in efficient manner
ii) Memory management: It takes care of allocation and de allocation of memory in efficient manner
iii) File management: This includes organizing, naming , storing, retrieving, sharing , protecting and recovery of files.
iv) Device management: Many devices are connected to a computer so it must be handled efficiently.

b) Language Processes: We know that a program is a set of instructions. The instructions to the computer are written in different languages. They are high-level language (HLL) andjow level language. In HLL English like statements are used to. write programs. They are C, C++, COBOL, PASCAL, VB, Java etc. HLL is very easy and can be easily understood by the human being.
Low level language are classified into Assembly Language and Machine Language.
In assembly language mnemonics (codes) are used to write programs
ADD A, B A = A + B
SUB A, B A = A – B
INC A A = A + 1

In Machine Language 0’s and 1’s are used to write program. It is very difficult but this is the only language which is understood by the computer. Usually programmers prefer HLL to write programs because of its simplicity. But computer understands only machine language. So there is a translation needed. The program which perform this job are language processors.
The different language processors are given below:
1) Assembler: This converts programs written in assembly language into machine language.
2) Interpreter: This converts a HLL program into machine language by converting and executing it line by line. The first line is converted if there is no error it will be executed otherwise you have to correct it and the second line and so on.
3) Compiler: It is same as interpreter but there is a difference it translates HLL program into machine language by converting all the lines at
a time. If there is no error then only it will be executed.

II. Application Software
Programs developed to serve a particular application is known as application software.
eg: MS Office, Compression Utility, Tally etc.
Application software can further be subdivided into
three categories.

  • Packages
  • Utilities
  • Customized Software

a) Packages: Application software that makes the computer useful for people to do every task. Packages are used to do general-purpose applications.
They are given below:
1) Word Processes : This is used for creation and modification of text documents. That means a word processor helps the people to create, edit and format a textual data with less effort and maximum efficiency. By using word processor we can change font and font size of character, change alignment (left, right, center and justify), check spelling and grammar of the whole document etc. eg: MS Word.

2) Spread Sheets: It contains data or information in rows and columns and can perform calculation (Arithmetic, Relational and logical Operation). It helps to calculate results of a particular formula and the formula can apply different cells (A cell is the intersection of a row and column. Each column carries an alphabet for its name and row is numbered). It is used to prepare budgets, balance sheets, P & L account, Payroll etc. We can easily prepare graphs and charts using data entered in a worksheet. A file is a work.book that contains one or more work sheets, eg: MS Excel is spreadsheet software.

3. Presentation and Graphics: You can present your idea with sound and visual effects with the help of presentation software by preparing slides. The application software that manipulate visual images is known as graphics software.
Eg: MS PowerPoint is a presentation package.

4. Data base package: Database is a collection of large volume of data. DBMS is a set of programs that manages the datas are for the centralized control of data such that creating new fecords to the database, deleting, records whenever not wanted from the database and modification of the existing database. Example for a DBMS is MS Access.

DTP Packages: DTP means Desk Top Publishing. By using this we can create books, periodicals, magazines etc. easily and fastly. Now DTP packages are used to create in Malayalam also, eg:-PageMaker.

b) Utilities: Utilities are programs which are designed to assist computer for its smooth functioning. The utilities are given below:

  1. Text editor: It is used for creating and editing text files.
  2. Backup utility: Creating a copy of files in another location to protect them against loss, if your hard disk fails or you accidentally overwrite or delete data.
  3. Compression Utility: It is used to reduce the , size of a file by using a program and can be restored to its original form when needed.
  4. Disk Defragmenter: It is used to speeds up disk access by rearranging the files that are stored in different locations as fragments to contiguous memory and free space is consolidated in one contiguous block.
  5. Virus Scanner: It is a program called antivirus software scans the disk for viruses and removes them if any virus is found.

c) Specific purpose software (Customized software): It is a collection of programs which are developed to meet user needs to serve a particular application. It is also called tailor-made software.

Free and open source software: Here “free” means there is no copy right or licensing. That is we can make copies of the s/w or modify the source code without legal permission of its vendor (creator) we can use and distribute its copy to our friends without permission. That is Freedom to use ,to modify and redistribute.
The Four freedoms are

  • Freedom 0: To run program for any purpose
  • Freedom 1: To study how it works and allows you to adapt according to your needs. Also allows accessing source code.
  • Freedom 2: Allows to take copies and distribute
  • Freedom 3: Allows you to change source code and release the program.

Examples for Free and open source software are given below
Linux: it is a free s/w. If was written by Linux Trovalds at the University of Helsinki. It is a GUI and multi-user, multi-tasking O.S. with many more other features. It is also independent of the hardware. It is used by ISP’s, programmers who uses Java to Write program, etc. The main Linux distributors are. Open Linux Red hat, Debian, Gnu Linux, etc…

GNU/Linux: It was organized by Richard Stallman in 1983

GIMP (GNU Image Manipulation Program): It is a very helpful software to perform all the activities to an image.

Mozilla Firefox: This web browser helps users to browse safely.

OpenOffice.org: This package contains different s/w s that help the users to draft letters neatly by using “Writer”, perform calculations by using “Calc” and prepare presentations by using “Impress”. It is platform-independent (That means it works on both Linux and Windows platfprms.

Freeware: A s/w with Copy right is available free of cost for unlimited use.

Shareware: It is an introductory pack distributed on a trial basis with limited functionality and period.

Plus One Computer Application Notes Chapter 1 Fundamentals of Computer

Students can Download Chapter 1 Fundamentals of Computer Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 1 Fundamentals of Computer

Data and Information
Data: It represents raw facts and figures. It may be a number, string(combination of characters), etc.
Eg: Alvis, 6, First
Information: It is meaningful and processed form of data
Eg: Alvis aged 6 years is in first standard.

Data Processing: Data processing is defined as a series of actions or operations that converts data into useful information.
Data processing phases (6)

  1. Capturing data – In this step acquire or collect data from the user to input into the computer.
  2. Input – It is the next step. In this step appropriate data is extracted and feed into the computer.
  3. Storage – The data entered into the computer must be stored before starting the processing.
  4. Processing/Manipulating data – It is a laborious work. It consists of various steps like computations, classification, comparison, summarization, etc. that converts input into output.
  5. Output of information – In this stage, we will get the results as information after processing the data.
  6. Distribution of information – In this phase the information(result) will be given to the concerned persons/computers.

Functional units of computer
A computer is not a single unit but it consists of many functional units(lntended to perform jobs) such as Input unit, Central Processing Unit(ALU and Control Unit), Storage (Memory) Unit and Output Unit.
1. Input Unit: Its aim is to supply data (Alphanumeric, image , audio, video, etc.) to the computer for processing. The Input devices are keyboard, mouse, scanner, mic, camera, etc

2. Central Processing Unit (CPU): It is the brain of the computer and consists of three components
Arithmetic Logic Unit(ALU) – As the name implies it performs all calculations and comparison operations.
Control Unit(CU) – It controls the overall functions of a computer.
Registers – It stores the intermediate results temporarily.

3. Storage Unit(Memory Unit): A computer has huge storage capacity. It is used to store data and instructions before starts processing. Secondly, it stores the intermediate results and thirdly it stores information(processed data), that is the final results before send to the output unit(Visual Display Unit, Printer, etc)

Two Types of the storage unit
i. Primary Storage alias Main Memory: It is further be classified into Two- Random Access Memory(RAM) and Read-Only Memory(ROM). The one and only memory that the CPU can directly access is the main memory at a very high speed. It is expensive hence storage Capacity is less. RAM is volatile (when the power is switched off the content will be erased) in nature but ROM is non-volatile (It is permanent)

ii. Secondary Storage alias Auxiliary Memory: Because of the limited storage capacity of primary memory its need arises. When a user saves a file, it will be stored in this memory hence it is permanent in nature and its, capacity is huge.
Eg: Hand Disc Drive(HDD), Compact Disc(CD), DVD, Pen Drive, Blu Ray Disc etc.

4. Output Unit: After processing the data we will get information as result, that will be given to the end user through the output unit in a human-readable form. Normally monitor and printer are used.

Computer: It is an electronic machine used to perform tasks based upon set of instructions and produce results at a high degree of accuracy and speed.
Advantages of computer:

  1. Speed – It can perform operations at a high speed.
  2. Accuracy – It produces result at a high degree of accuracy.
  3. Diligence – Unlike human beings, a computer is free from monotony, tiredness, Jack of concentration etc. We know that it is an electronic machine. Hence it can work hours without making any errors.
  4. Versatility – It is capable of performing many tasks. It is useful in many fields.
  5. Power of Remembering – A computer consists of huge amount of memory. So it can store and recall any amount of information without delay. Unlike human beings it can store huge amount of data and can be retrieved whenever the need arises.

Disadvantages of computer

  1. No. IQ: It has no intelligent quotient. Hence they are slaves and human beings are the masters. It can’t make its own decisions.
  2. No feelings: Since they are machines they have no feelings and instincts. They can perform tasks based upon the instructions given by the humans (programmers).

Number System: It is a systematic way to represent numbers in different ways. Each number system has its own Base, that is a number and that number of symbols or digits used.
The various number systems are given below:
Most Significant Digit (MSD): The digit with the most weight is called MSD. MSD is also called Left Most Digit(LMD)
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 1
Least Significant Digit (LSD): The digit with the least weight is called LSD. LSD is also called Right Most Digit(RMD)
Eg:
1) 106 : Here MSD : 1 and LSD : 6
2) 345.78: Here MSD : 3 and LSD : 8
A Binary Digit is also called a bit.
The weight of each digit of a number can be represented by the power of its base.

Number conversions
In general, to convert a decimal number into another number system(binary or octal or hexadecimal) do the following
Divide the number successively by the base of the number system do you want to convert and write down the remainders from bottom to top.
To convert a decimal fraction into another number system .multiply the number by the base of the number system do you want to convert then integer part and fractional part are separated again multiply the fractional part by the base and do the steps repeatedly until the fractional part becomes zero. Finally, write down the integer part from top to bottom.

Decimal to Binary: Divide the number by the base 2 successively and write down the remainders from bottom to top.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 2
Decimal fraction to binary
multiply the number by the base 2 then the integer part and fractional part are separated again multiply the fractional part by the base 2 and do the steps repeatedly until the fractional part becomes zero.
Finally, write down the integer part from top to bottom.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 3
Decimal to Octal: Divide the number by the base 8 successively and write down the remainders from bottom to top.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 4
Decimal fraction to octal
multiply the number by the base 8 then integer part and fractional part are separated again multiply the fractional part by the base 8 and do the steps repeatedly until the fractional part becomes zero.
Finally write down the integer part from top to bottom.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 5
Decimal to Hexadecimal: Divide the number by the base 16 successively and write down the remainders from bottom to top.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 6
Decimal fraction to hexadecimal
multiply the number by the base 16 then integer part and fractional part are separated again multiply- the fractional part by the base 16 and do the steps repeatedly until the fractional part becomes zero. Finally write down the integer part from top to bottom.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 7
Converting a number from any number system into decimal: For this multiply each digit by its corresponding weight and sum it up.

Binary to decimal conversion: For this multiply each bit by its corresponding weight and sum it up. The weights are power of 2.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 8
Octal to decimal conversion: For this multiply each bit by its corresponding weight and sum it up. The weights are the power of 8.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 9

Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 10

Hexadecimal to decimal conversion: For this multiply each bit by its corresponding weight and sum it up. The weights are the power of 16.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 11

Octal to binary conversion: Convert each octal digit into its 3-bit binary equivalent.
Consider the following table
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 12

Hexadecimal to binary conversion: Convert each Hexadecimal digit into its 4-bit binary equivalent.
Consider the following table
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 13

Binary to octal conversion
Divide the binary number into groups of 3 bits starting from the right to left(But in the fractional part start dividing from left to right). Insert necessary zeros in the left side(or right side in the case of fractional part)if needed and write down the corresponding octal equivalent.
Eg: (10100110)2= ()8?
Insert one zero in the left side to form 3 bits group
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 14

Binary to Hexadecimal conversion
Divide the binary number into groups of 4 bits starting from the right to left (But in the fractional part start dividing from left to right). Insert necessary zeros in the left side(or right side in the case of fractional part) if needed and write down the corresponding Hexadecimal equivalent.
Eg: (100100110)2 = ()16?
Insert 3 zeros in the left side to form 4 bits group
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 15

Octal to Hexadecimal conversion
First, convert an octal number into binary, then convert this binary into hexadecimal
Eg: Convert (67)8 = ( )16
Step I. First, convert this number into the binary equivalent for this do the following:
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 16
Step II. Next, convert this number into the hexadecimal equivalent for this do the following.
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 17
So the answer is (67)8 = (37)16

Hexadecimal to octal conversion
First convert Hexadecimal to binary, then convert this binary into 0ctal
Eg: Convert (A1)16 = ()8?
Step I. First convert this number into the binary equivalent. For this do the following
Plus One Computer Application Notes Chapter 1 Fundamentals of Computer 18
Step II. Next convert this number into octal equivalent. For this do the following.
So the answer is (A1)16 = (241)8

Data representation: The data stored in the computer memory is in the form of binary.

Representation of integers
There are three ways to represent integers on computers. They are as follows:

  1. Sign and Magnitude-Representation (SMR)
  2. 1’s Complement Representation
  3. 2’s Complement Representation

1) SMR: Normally a number has two parts sign and magnitude.
eg: Consider a number +5. Here + is the sign and 5 is the magnitude. In SMR the Most Significant Bit (MSB) js used to represent the sign. If MSB is 0 sign is +ve and MSB is 1 sign is -ve.
eg: If a computer has word size is 1 byte then +5 is represented as 0 0 0 0 0 1 0 1
-5 is represented as 1 0 0 0 0 1 0 1
Here MSB is used for a sign then the remaining 7 bits are used to represent magnitude. So we can represent 27 = 128 numbers. But there are negative and positive numbers. So 128 + 128 = 256 number. The numbers are 0 to +127 and 0 to -127. Here zero is repeated. So we can represent 256 – 1 = 255 numbers.

2) 1’s Complement Representation: To get the 1’s complement of a binary number, just replace every 0 with 1 and every 1 with 0. Negative numbers are represented using 1’s complement but +ve number has no 1’s complement.
eg: To find the 1 ’s complement of -21 + 21 = 0 0 0 1 0 1 0 1
To get the 1’s complement change all 0 to 1 and all 1 to 0.
-21 = 11101010
1’s complement of -21 is 1 1 1 0 1 0 1 0
Eg: 2) Find the 1’s complement of +21
Positive numbers are represented by using SMR.
+21 = 0 0 0 1 0 1 0 1 (No need to take the 1’s complement)

3) 2’s Complement Representation: To get the 2’s complement of a binary number, just add 1 to its 1’s complement +ve number has no 2’s complement.
eg:- To find the 2’s complement of -21
+21 = 0 0 0 1 0 1 0 1
First take the 1 ’s complement for this change all 1 to 0 and all 0 to 1
-21 = 1 1 1 0 1 0 1 0
Then add 1 = 1 1 1 0 1 0 1 1
2’s complement of -21 is 1 1 1 0 1 0 1 1

b) Representation of floating point numbers.
A real number consists of an integer part and fractional part and represent by using Exponent and Mantissa method. This method is also used to represent too big numbers as well as too small numbers.
Eg: .0000000000000000000000001 can be represented easily as 1 × 10-25. Here 1 is the Mantissa and -25 is the exponent.
A computer with 32 bit word length is used 24 bits for mantissa and the remaining 8 bits used to store exponent.
1. Representation of characters,
a) ASCII(American Standard Code for Information Interchange): It is 7 bits code used to represent alphanumeric and some special characters in computer memory. It is introduced by the U.S. government. Each character in the keyboard has a unique number.
Eg: ASCII code of ‘a’ is 97, when you press ‘a’ on the keyboard, a signal equivalent to 1100001 (Binary equivalent of 97 is 1100001) is passed to the computer memory. 27 = 128, hence we can represent only 128 characters by using ASCII. It is not enough to represent all the characters of a standard keyboard.

b) EBCDIC(Extended Binary Coded Decimal Interchange Code): It is an 8 bit code introduced by IBM(International Business Machine). 28 = 256 characters can be represented by using this.

c) ISCII(Indian Standard Code for Information Interchange): It uses 8 bits to represent data and introduced by the standardization committee and adopted by the Bureau of Indian Standards(BIS).

d) Unicode: The limitations to store more characters is solved by the introduction of Unicode. It uses 16 bits so 216 = 65536 characters (i.e, world’s all written language characters) can store by using this.

Representation of audio, image, and video: Various methods are used to represent an image, audio and video data. A file (image or audio or video) consists of two parts header information (such as file name, its size, format etc.) and image data(a compressed form of value pixels intensity). Image file formats are JPEG (Joint Picture Experts Group) Format, BMP (Bitmap), TIFF (Tagged Image File Format), GIF(Graphics Interchange Format), PNG (Portable Network Graphic).
Audio File formats are WAV,MP3,MIDI,AIFF etc.
Video File formats AVI, JPEG2, WMV etc.

Plus One Computer Application Chapter Wise Questions Chapter 10 IT Applications

Students can Download Chapter 10 IT Applications Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions Chapter 10 IT Applications

Plus One Computer Application IT Applications 1 Mark Questions and Answers

Question 1.
Name the application of Information and Communication Technology (ICT) for delivering government services to the citizens in a convenient, efficient, and transparent manner.
Answer:
e-Governance

Question 2.
“e-Governance facilitates interaction between different stakeholders in governance”. Say whether the statement is True or False.
Answer:
It is true.

Question 3.
The system of financial exchange between buyers and sellers in an online environment is known as _________.

Answer:
Electronic Payment System(EPS)

Question 4.
Check whether the following statement is True or False.
“e-Business is an extension of e-Commerce”
Answer:
Yes It is True.

Question 5.
Real time exchange of text messages between two or more persons over Internet is termed as _____.
Answer:
Online chat

Question 6.
Pick the odd one out
a) e- Book Reader
b) e-Text
c) Television channels
d) e-Business
Answer:
c) e-Business, the others are e-Learning tools

Question 7.
Define e-Text.
Answer:
The electronic form&t of textual data is called e- Text. It can be read aloud by an e-Text reader device that will help the visually challenged people.

Question 8.
Give an example for e-Learning tool.
Answer:
Electronic Books Reader

Question 9.
Name an electronic device using which we can easily read e-Text.
Answer:
e-Book reader

Question 10.
Write the full forms of BPO and KPO.
Answer:
BPO is Business Process Outsourcing KPO is Knowledge Process Outsourcing

Question 11.
Name any two e-Learning tools.
Answer:
1) e-Book Reader
2) Online chat

Question 12.
The system used for financial exchange between buyers and sellers in a online business is _____
a) electronic business online
b) electronic payment system
c) business process outsourcing
d) online payment system
Answer:
b) Electronic Payment System

Question 13.
Online railway reservation is an example of _____.
a) e-Business
b) e-Rail
c) e-Governance
d) e-Leaming
Answer:
e-Governance

Question 14.
Which one of the following is NOT an e-business website?
a) www.amazon.com
b) www.dhsekerala.gov.in
c) www.keralartc.com
d) www.irtc.com
Answer:
b) www.dhsekprala.gov.in

Question 15.
In ICT enabled services BPO stands for _____.
Answer:
Business Process Outsourcing

Question 16.
Application of ICT for delivering government services to citizens in a convenient and transparent manner is called_______.
Answer:
e- Governance

Plus One Computer Application IT Applications 2 Marks Questions and Answers

Question 1.
Define the term e-Governance.
Answer:
The integration of computers and communication technology for the benefit of government functions to#the public is termed as E-Governance by this Govt can serve the public in a convenient, efficient and transparent manner.

Question 2.
Give an example for e-Governance website.
Answer:
m www.hscap.kerala.gov.in, This site is used to manage +2 admission (Ekajalakam or Single Window System)

Question 3.
What is KSWAN?
Answer:
It is envisaged to be the core common network infrastructure for e-Governance and the State Information Infrastructure(SII), connecting Thiruvananthapuram, Kochi and Calicut. It acts as backbone of SII.

Question 4.
Define e-Business
Answer:
It is Electronic business. It provides services or running business through internet is called E business

Question 5.
Define e-Banking.
Answer:
Doing all the banking activities at any time and place through internet. We can check the balance amount, transfer money from our a/c to another a/c at any time and location. We can sit our home or any place and conduct banking activities hence it is very convenient to the public.

Question 6.
Write down the functions of call centres.
Answer:
Call centre is a third party company and its main aim is to serve the public for the payment of bills, purchase of goods, doubt clearance, etc. Here Telephone facility is set up to handle incoming and out going calls about goods or service for an organisation.

Plus One Computer Application IT Applications 3 Marks Questions and Answers

Question 1.
List out different types of interactions in e-Governance.
Answer:
The integration of computers and communication technology for the benefit of government functions to the public is termed as E-Govemance.
Types of interactions in e-Governance is given below

  • Government to Government(G2G): Electronically exchanging data or information among Government agencies, departments or organizations. Government to Citizens(G2C): Exchange of information between
  • Government and Citizens Government to Business(G2B) : Interaction between the Government and
  • Business men. Government to Employees(G2E) : The exchange of information between Government and its employees

Question 2.
Differentiate between BPO and KPO.
Answer:
BPO means Business Process Outsourcing: A business firm’s main aim is to increase the profit by reduce the expenditure for this some works are transferred to other contractors(man power supply company common in other countries). The parent company is not responsible to such employees but the work will be carried out smoothly. Knowledge Process Outsourcing(KPO): It is similar as BPO but the main job in KPO is knowledge and information related that is carried out by a third party company

Question 3.
What are the advantages of e-Governance?
Answer:
The advantages of e-Governance is given below Its main aim is to provide better service to the people at any time and place with high speed. In the modern world it is very helpful and convenient to the people.

  • It enables automation of Govt, services .
  • It ensures the participation of citizens hence strengthen the democracy
  • It ensures more transparency hence eliminates corruption
  • It enhances responsibilities of various Govt. Departments
  • Its proper implementation saves time and money of the people by avoiding unnecessary visits to offices,

Question 4.
What are the duties of Akshaya?
Answer:
These were launched in 2002 in the Malappuram Dist.ln Kerala by the project of Kerala State Information Technology Mission(KSITM). Its aim is to provide services such as e-grants, e filing, e district, e ticketing,/ation card application, Voters Id application,New Vehicles Registration application, insurance and Banking to the peoples of Kerala.

Question 5.
What is Common Service Center(CSC)? List some of the services offered through CSC.
Answer:
Common Service Centres are the web enabled points of the government, private and social sector services. They provide services such as Agriculture, Health, Banking, Educational, Entertainment, Commercial, Transport services for the rural citizens of India. In Kerala Akshaya centers are working as CSC.

Question 6.
What are the major challenges faced in the implementation of e-Learning?
Answer:
Following are the challenges to e Learning

  • Face to face contact between student and teachers is not possible
  • Proper interaction is limited lack of infrastructure facilities
  • Its implementation requires computer and high speed Internet
  • Pupil may not get proper motivation
  • It does not provide a real lab facility

Question 7.
a) Explain the term, ICT.
b) Briefly explain the advantages of implementing e-Governance.
Answer:
a) Information and Communication Technology .
b) The advantages of e-Govemance is given below Its main aim is to provide better service to the people at any time and place with high speed. In the modern world it is very helpful and convenient to the people.

  • It enables automation of Govt, services.
  • It ensures the participation of citizens hence strengthen the, democracy
  • It ensures more transparency hence eliminates corruption
  • It enhances responsibilities of various Govt. Departments
  • Its proper implementation saves time and money of the people by avoiding unnecessary visits to offices.

Question 8.
Remya has got a job at a call center. What is a call center? What kind of job does a call center provide?
Answer:
Call centre is a third party company and its main aim is to serve the public for the payment of bills, purchase’of goods, doubt clearance, etc. Here Telephone facility is set up to handle incoming and out going calls about goods or service for an organisation

Question 9.
Explain any three e-learning tools,
Answer:
e Learning tools

  • Electronic books reader(e Books): With the help of a tablet or portable computer or any other device we can read digital files by using a s/w is called electronic books reader.
  • e text: The electronic format of textual data is called e-Text.
  • Online chat: Real time exchange of text or audio or video messages between two or more person over the Internet.
  • e Content : The data or information such as text, audio, video , presentations, images, animations etc, are stored in electronic format.
  • Educational TV channels : TV channels dedicated only for the e-Learning purpose :
    Eg-. VICTERS (Virtual Class room Technology on Edusat for Rural Schools OR Versatile ICT Enabled Resources for Students)

Question 10.
Define e-Governance. Write any four advantages of e-Governance.
Answer:
E-Governance
The integration of computers and communication technology for the benefit of government functions to the public is termed as E-Governance by this Govt can serve the public in a convenient, efficient and transparent manner.

Benefits of E-Governance : Its main aim is to provide better service to the people at any time and place with high speed. In the modern world it is very helpful and convenient to the people.

  • It enables automation of Govt.services.
  • It ensures the participation of citizens hence strengthen the democracy.
  • It ensures more transparency hence eliminates corruption.
  • It enhances responsibilities of various Govt Departments.
  • Its proper implementation saves time and money of the people by avoiding unnecessary visits to offices.

Question 11.
i) Which of the following system in e-Business . exchanges money between buyer and seller?
a) Automatic Teller Machine
b) Electronic Payment System
c) Payment Service System
d) Financial Data Center.
ii) e-Governance provide a lot of government services to citizens through ICT. What are the different categories of e-Governance interactions?
Answer:
i) b) Electronic Payment System
ii) Types of interactions in e-Governance e-Governance facilitates interaction between different stakeholders in governance .
Government to Government(G2G): Electronically exchanging data or information among Government agencies, departments or organizations.
Government to Citizens(G2C): Exchange information between Government and Citizens .
Government to Business(G2B) : Interaction’ between the Government and Business men.
Government to Employees(G2E) : The exchange of information between Government and its employees

Question 12.
Explain any three tools that enhance e-Learning process.
Answer:
e Learning tools

  • Electronic books reader(e Books): With the help of a tablet or portable computer or any other device we can read digital files by using a s/w is called electronic books reader.
  • e text: The electronic format of textual data is called e-Text.
  • Online chat: Real time exchange of text or audio or video messages between two or more person over the Internet.
  • e Content : The data or information such as text, audio, video , presentations, images, animations etc, are stored in electronic format.
  • Educational TV channels : TV channels dedicated only for the e-Learning purpose : Eg. VICTERS (Virtual Class.room Technology on Edusat for Rural Schools OR Versatile ICT Enabled Resources for Students).

Question 13.
Compare the advantages and disadvantages of implementing e-Business.
Answer:
Advantages of E-business is given below

  • It overcomes geographical limitations
  • It reduces the operational cost
  • It minimizes the time and cost
  • It remains open all the time
  • We can locate the product faster from a wider range of choices

Disadvantages of E-business is given below

  • Peoples are unaware of IT applications and its uses
  • Most peoples don’t have plastic money(credit / debit card) and net banking
  • It requires high security measurements otherwise you may lose money
  • We can’t touch or smell products through online
  • Some companies may not have proper Goods delivery service.

Plus One Computer Application IT Applications 5 Marks Questions and Answers

Question 1.
Compare the advantages and disadvantages of implementing e-Business?
Answer:
Advantages of e business is given below

  • It overcomes geographical limitations
  • It reduces the operational cost
  • It minimizes the time and cost
  • It remains open all the time
  • We can locate the product faster from a wider range of choices

Disadvantages of E business is given below:

  • Peoples are unaware of IT applications and its uses
  • Most peoples don’t have plastic money(credit / debit card) and net banking
  • It requires high security measurements otherwise you may lose money
  • We can’t touch or smell products through online
  • Some companies may not have proper Goods delivery service

Question 2.
Explain any three IT enabled services in detail.
Answer:
1) Call centre : It is a third party company and its main aim is to serve the public for the payment of bills, purchase of goods, doubt clearance, etc. Here Telephone facility is set up to handle incoming and out going calls about goods or service for an organisation.
2) Teleconferencing : It is a Way of conferring, discussing or communicating by audio and video circuits, by a group of people located in geographically distributed areas. There are two types of conferencing video and audio. In audio conferencing the participants can’t see each other but only hear voices of one another.
3) Video conferencing : It is a type of Teleconferencing. The participants can see each other live on screen and can speak to each other with the help of teleconferencing. They must be sit in conference rooms connected through a teleconference system(A video camera and a speaker phone are connected to a computer with Internet connection)

Question 3.
Discuss in detail various uses of IT in health care field.
Answer:
In the field of medicine and health care computers play very important role. Such as diagnosing diseases, monitoring patients during surgery etc.

1) Medical equipments : Most of the medical equipments such as CT scanner, MRI scanner, Ultra Sound scanner, ECG, ECHO test, TMT, etc work with the help of computers

2) Electronic Medical Record(EMR): It is a digital version of a paper chart that contains all of a patient’s medical history from one practice. An EMR is mostly used by doctors fordiagnosis and treatment.

3) Web based support / diagnosis : Internet is used by the doctors to acquire information to diagnose and give treatment to the patients who are suffering from diseases.

4) Telemedicine : With the help of TeleMedicine equipment doctors and nurses can examine patients in remote locations by monitoring the patient conditions such as BP, temperature etc. and give the correct medical treatment. Tele medicine is implemented with a telephone line and a computer.

5) Research and development: Computers play inevitable role in almost every branch of science and engineering. The role of computers in different fields of research and development is unavoidable. The most complex genetic problem may evaluated with the help of computers easily and can simulate actual system using a computer. The computers help in diagnosis, treatment of patients and better running of hospitals.

Plus One Computer Application Chapter Wise Questions Chapter 9 Internet

Students can Download Chapter 9 Internet Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions Chapter 9 Internet

Plus One Computer Application Internet 1 Mark Questions and Answers

Question 1.
A network of smaller networks that exists all over the world is called _______.
Answer:
Internet

Question 2.
ARPANET means ______.
Answer:
Advanced Research Projects Agency Network.

Question 3.
Odd one out.
a) Internet explorer
b) Mozilla
c) Netscape navigator
d) Windows explorer
Answer:
d) Windows explorer, the others are browsers.

Question 4.
Odd man out.
a) Word
b) Excel
c) Power Point
d) Mosaic
Answer:
d) Mosaic. It is a browser, others are MS Office packages.

Question 5.
The interface between user and computer hardware is called operating system then what about the interface between user and internet (www)?
Answer:
Browser.

Question 6.
With the help of this the user can search informations provided on the internet. What is it ?
Answer:
Browser .

Question 7.
Benhur wants to navigate through the web pages from the following which will help him?
a) A browser
b) MS Word
c) Tally
d) Paint
Answer:
a) A browser.

Question 8.
I am a piece of software. With the help of me a user can search information from the internet and navigate through the web pages. Who am I ?
Answer:
Browser.

Question 9.
Anil told you that he was browsing at that time. From the following choose the right one.
a) He was visiting a website
b) He was reading a book
c) He was watching TV
d) He was sleeping.
Answer:
a) He was visiting a website. The process of visiting a website is called browsing.

Question 10.
_____ is a popular browser commonly used in windows operating system.
a) Mozilla
b) Netscape navigator
c) Mosaic
d) Internet explorer
Answer:
d) Internet Explorer.

Question 11.
_____ browser is commonly used in Linux.
a) Internet explorer
b) Moziila
c) Netscape navigator
d) Mosaic
Answer:
b) Moziila.

Question 12.
Mr. Asokan wants to go the previous page. From the following which option will help him?
a) Back button
b) Refresh
c) Favorites
d) Stop
Answer:
a) Back button.

Question 13.
While navigating through a website, sita wants to go back to the home page. From the following which will heip her ?
a) Refresh
b) Search
c) Home
d) Mail
Answer:
c) Home.

Question 14.
While surfing a website, Joyson.wants to play music or video. Which button will help him?
a) Home
b) Search
c) Media
d) Mail
Answer:
c) Media.

Question 15.
Aumima wants to know the websites that her brother had visited last week? From the following which will help her?
а) Media
b) History
c) Mail
d) Search
Answer:
b) History .

Question 16.
While browsing, the internet connection is lost so you want to reload the web page. Which will help for this?
a) Refresh
b) Stop
c) Media
d) Edit
Answer:
a) Refresh.

Question 17.
The address bar is also known as ______.
а) URL
b) UDL
c) KRL d)
None of these
Answer:
a)URL.

Question 18.
You want to add and organize a website to a list. Which will help for this?
a) Favorites
b) search
c) Back
d) mail
Answer:
a) Favorites.

Question 19.
How can it possible to understand that the browser is retrieving data?
a) Access indicator icon animates
b) From the refresh button
c) From the back button
d) None of these
Answer:
a) Access indicator icon animates.

Question 20.
The progress of the data being downloaded indicates by the _______.
a) Address bar
b) Progression bar
c) Status bar
d) None of these
Answer:
c) Status Bar.

Question 21.
Baby wants to download a file. The time needed for that depends on the _______ of the file.
a) Size
b) Place
c) Type
d) None of these
Answer:
a) Size.

Question 22.
the following which option will help him for that?
a) Copy
b) Page setup
c) Search
d) Media
Answer:
Page setup.

Question 23.
Mr. Franco’s e-mail id is [email protected]. He wants to connect this page fastly. From the following which will help him.
a) Favorite
b) Search
c) Refresh
d) Media
Answer:
a) Favorite.

Question 24.
Mrs. Janaki purchased a product through online and payment was given by credit card. She wants to protect the information about the credit card. How can it be possible from the following?
а) Security
b) Favorite
c) Media
d) Content
Answer:
a) Security.

Question 25.
Odd man out.
a) www.google.com
b) www.yahoo.com
c) www.altavista.com
d) www.stmaryshss.com
Answer:
d) www.stmaryshss.com, the others are search engines.

Question 26.
Alvis got email about some products without his consent. Which type of email is this ?
Answer:
Spam.

Question 27.
What is the primary thing you have needed to sent an email to your friend?
Answer:
You have need an email id (address).

Question 28.
There is a PTA meeting in your school in the next month. The school authorities want to send the in-vitation to the parents. Which field of the message structure will help for this?
Answer:
CC or bcc.

Question 29.
You want to send an invitation to your friends. But the friends should not know that the same invitation is send by you to others also. Which field of the message structure will help you?
Answer:
bcc.

Question 30.
Mr. Lijo wants to send his photograph to his friend by email. Which feature will help him for this?
Answer:
Attachment feature.

Question 31.
You got some pictures pf Jesus Christ through email from one of your friends. You want to send this pic-tures to your brother. What button will help you for this?
Answer:
Forward button .

Question 32.
You got an email from your father working abroad. You want to send an email without typing his email id. Which button will help you for this?
Answer:
Reply button.

Question 33.
You got an email from an Insurance Company you want to store their email id which feature will help you for this?
Answer:
We can add address to Address Book.

Question 34.
Who proposed the idea of www.
Answer:
Tim Berners Lee.

Question 35.
The protocol for internet communication is
Answer:
TCP/IP protocol.

Question 36.
A short distance wireless Internet access method is
Answer:
Wi-Fi.

Question 37.
Give an example for an e-mail address.
Answer:
[email protected].

Question 38.
Which of the following is not a search engine ? (roses a<6)3S3(oro)1§36ffi(0)1(o8 search engine ©ragpero®”nflxra?
a) Google
b) Bing
c) Facebook
d) Ask
Answer:
c) Facebook

Question 39.
Name the protocol used for e-mail transmission across Internet.
Answer:
Simple Mail Transfer Protocol(SMTP).

Question 40
Name three services over Internet.
Answer:
1 www, search engine, E-mail.

Question 41.
Each document on the web is referred using ______.
Answer:
Uniform Resource Locator(URL).

Question 42.
The small text files used by browsers to remember our email id’s, user names, etc are known as _______.
Answer:
Cookies.

Question 43.
The act of breaking into secure networks to destroy data is called hacking.
Answer:
Black hats.

Question 44.
Who introduced the term, www?
Answer:
Tim Berners Lee.

Question 45.
_________ is a software used for removing worms and trojans.
Answer:
Anti virus.

Question 46.
Which among the following communication technologies is the slowest ?
a) Bluetooth
b) Wi-Fi
c) Wi-MAX
d) Satellite link
Answer:
a) Bluetooth (upto 1 Mbps).

Question 47.
Consider the relation given below.
Social network : facebook.com. Which among the following share a similar relationship as the above?
a) micro blog : blogger.com
b) social blog : twitter.com
c) Content community: youtube.com
d) internet forum : linkedin.com
Answer:
c) content community : youtube.com.
OR
b) Social blog : twitter.com .

Question 48.
Pick the odd one out
a) Virus
b) Trojan horse
c) Wikis
d) Worm
Answer:
c) Wikis.

Question 49.
Pick the odd one out.
a) Wikis
b) Face book
c) Twitter
d) e-mail
Answer:
d) e-mail.

Question 50.
Who is known as the father of Internet?
a) Vint cerf
b) Charles Babbage
c) Tim Berners Lee
d) Alan Turing
Answer:
a) Vint cerf.

Question 51.
Who proposed the idea of World Wide Web?
Answer:
Tim Berners Lee.

Question 52.
Which one of the following is NOT a web browser?
a) Mozilla Firefox
b) Google
c) Internet Explorer
d) Opera
Answer:
b) Google. It is a search engine.

Question 53.
Which one of the following is NOT a search engine?
a) Google
b) Bing
c) Face Book
d) Ask
Answer:
c) Face book.

Question 54.
Which one of the following statement is NOT true about e-mail?
a) E-mail is environment friendly as it do not use paper.
b) E-mail provides provision to attach text, audio, video and graphics.
c) E-mail will not spread any kind of viruses.
d) E-mail can be used to send same message to many recipients simultaneously.
Answer:
c) E-mail will not spread any kind of viruses.

Plus One Computer Application Internet 2 Marks Questions and Answers

Question 1.
What is a browser ?
Answer:
A browser is a piece of software that acts as an interface between the user and the internal working of the internet. With the help of a browser the user can search information on the internet and it allows user to navigate through the web pages. The different browsers are

  • Microsoft internet explorer
  • Mozilla
  • Netscape Navigator
  • Mosaic
  • Opera

Question 2.
While walking on the road, Simran saw a notice board contains a text “Browsing” in front of a shop. What is Browsing?
OR
Roopa’s mother told you that Roopa is browsing in her room. What is browsing?
Answer:
The process of visiting the websites of various companies, organization, government, individuals etc is called internet browsing or surfing with the help of a browser software we can browse websites.

Question 3.
How can we know that the browser is working or not ?
Answer:
The access indicator icon on the right corner of menu bar animates (rotates), when the browser is retrieving data or working. It is static when the browser is not working.

Question 4.
Mr. Anirudhan wants to visit the website of Manorama. Their website address is www. manoramaonline.com. How can it be possible?
Answer:
To visit the website of manorama. Anirudhan has to type “www.manoramaonline.com” in the address bar and press the enter key or use the go button. Then the home page of manorama will display. Sometimes while typing the website address on the browser automatically searches and display the home page.

Question 5.
The education Dept, of Govt, of Kerala declared SSLC results and it is available on the internet your friend wants to save the result in his computer. Help him to do so.
Answer:
To save the result in his computer to a file by using the ‘save’ or’ save as’ option of the file menu. When click this option a dialog box will appear then specify the folder whereas the file has to be saved using the dialog box and click OK. To save an image right click on the image, a pop up menu will appear then choose the save option give a name and press OK.

Question 6.
Discuss the steps to download a file from the website.
Answer:
To download a file from the website click on the link or button provided in the web page, then a dialog box will display. Enter the file name and specify the folder to which the file is to be saved. Then click save button then a window showing the progress of the downloading.

Question 7.
What is a Spamming?
Answer:
Sending an email without recipient’s consent to pro-mote a product or service is called spamming. Such an email is called a spam.

Question 8.
What do you mean by an ‘always on’ connection?
Answer:
Wired broadband connection is called ‘always on’ connection because it does not need to dial and connect

Question 9.
What is a blog?
Answer:
Conducting discussions about particular subjects by entries or posts. The posts appeared in the reverse chronological order means the most recent post appears first.
Eg. Blogger.com, WordPress.com, hsslive.com etc,

Question 10.
What do you mean by phishing..
Answer:
It is an attempt to get others information such as usenames, passwords, bank a/c details etc by acting as the authorized website. Phishing websites have URLs and home pages similarto their original ones • and mislead others , it is called spoofing.

Question 11.
What is quarantine?
Answer:
When you start an anti virus program and if any fault found it stops the file from running and stores the file in a special area called Quarantine (isolated area) and can be deleted later.

Question 12.
Compare intranet and extranet.
Answer:
A private network inside a company or organisation is called intranet and can be accessed by the company’s personnel. But Extranet allows vendors and business partners to access the company resources.

Question 13.
What are wikis?
Answer:
In this we can give our contributions regarding various topics and others can watch and edit the content. So incorrect information, advt., etc. are removed quickly.
Eg. www.wikipedia.org.

Question 14.
What is fire wall?
Answer:
It is a system that controls the incoming and out going network traffic by analyzing the data and then provides security to the computer network in an organization from other network(internet)

Question 15.
What are the advantages of Wi-Fi network?
Answer:
Line of sight between device is not required
Data transmission speed up to 57 Mbps
It can connect more number of devices
Used for communication up to 375 ft.
Nowadays this technology is used to access internet in Laptops, Desktops, tablets, Mobile phones etc.

Plus One Computer Application Internet 3 Marks Questions and Answers

Question 1.
The application form of Kerala entrance exam can be downloaded from the official website of Kerala govt. What do you mean by downloading?
Answer:
Downloading is the transfer of files or data from one computer to another usually from a server computer to a client computer. The time required to download the file depends on the size of the file.
The files may be text, graphics, program, movies, music etc. To download a file click on the link or button provided in the web page and specify the folder and filename and there is a window that shows the progress of the file being downloaded.

Question 2.
To apply minority scholarship, a student has to enter his details online, take a printout of this web page then send the application form with this printout to the authorities. Explain how to take a printout of a web page ?
Answer:
To print a web page either select the print command from file menu or use the print button on the standard tool bar. Page setup option is provided in the file menu. It helps to specify the paper size, margins header and footer and also the page orientation. The print preview option helps .to view how the page will look after printing.

Question 3.
Mr. Franco’s e-mail id is [email protected]. He wants to connect this page fastly and he visited regularly. How can it possible?
Answer:
Mr. Franco regularly visited this site to visit this site he has to type the address repeatedly every time. It is a laborious work and it can be avoided if he marks the particular address as favorite. A favorite is a link to a web page. So that he can access that page faster. To do this click add to favorite option then a dialog box appears that asks for a name for the favorite. To make the web page available offline, then ‘Make available offline’ option has to be checked.

Question 4.
Match the following
Plus One Computer Application Chapter Wise Questions Chapter 9 Internet 1
Answer:
1) f
2) a
3) e
4) b
5) d
6) c

Question 5.
Noby accessing internet by using a dial up connection and manu using a direct connection. What is the difference between these two?
Answer:
There are two ways to connect to the internet. First one dialing to an ISP’s computer or with a direct connection to an ISP.

1) Dial up Connection : Here the internet connection is established by dialing into an ISP’s computer and they will connect our computer to the internet. It uses Serial Line Internet Protocol (SLIP) or Point to Point Protocol (PPP). It is slower and has a higher error rate.

2) Direct connection : In direct connection there is a fixed cable or dedicated phone line to the ISP. Here it uses ISDN (Integrated Services Digital Network) a high speed version of a standard phone line. Another method is leased lines that. uses fibre optic cables. Digital Subscribers Line (DSL) is another direct connection, this uses copperwires instead of fibre optic for data transfer. Direct connection provides high speed internet connection and error rate is less.

Question 6.
Explain the different steps happened in between user’s click and the page being displayed.
Answer:
1) The browser determines the URL selected.
2) The browser asks the DNS for URLS corresponding IP address (Numeric address)
3) The DNS returns the address to the browser.
4) The browser makes a TCP connection using the IP address.
5) Then it sends a GET request for the required file to the server.
6) The server collects the file and send it back to the browser.
7) The TCP connection is released.
8) The text and the images in the web pages are displayed in the browser.

Question 7.
You wish to visit the website of your school. Name the software required. Which software is available with Windows for this purpose ? Give names of other such software.
Answer:
Browsing software or Browser. The browsers are:

  •  Netscape Navigator
  • Internet Explorer
  • Mozilla
  • Opera
  • Mosaic etc.

Question 8.
You want to send a picture drawn using MS paint immediately to your friend. What method will you adopt for this, so that your friend receives it within seconds? Explain the steps to perform this operation.
Answer:
E-mail (Electronic mail) can be used. There is a facility called attachment will help you to send files with E-mail to your friend.
First open your mail box, then take the option to write mail. Fill the email id and subject in the text boxes namely To and Sub respectively. You can type text in the area, given below. Then press the option attachments then select the picture file then press done and press send button.

Question 9.
Suppose you want to collect information regarding ‘Tsunami’ using Internet.
a) Suggest a method for this purpose
b) Explain one method adopted.
Answer:
A browser is a piece of software that acts as an interface between the user and the internal working of the internet. With the help of a browser the user can search information oh the internet and it allows user to navigate through the web pages. The different browsers are

  • Microsoft internet explorer
  • Mozilla
  • Netscape Navigator
  • Mosaic.
  • Opera

Question 10.
Write short notes on
a) mobile broadband
b) Wi-MAX
Answer:
a) Mobile broadband : Accessing Internet using wireless devices like mobile phones, tablet, USB dongles, etc.
b) Wi MAX (Wireless Microwave Access): It uses micro waves to transmit information across a network in a range 2 GHz to 11 GHz over very long distance.

Question 11.
Compare blogs and microblogs.
Answer:
Blogs: Conducting discussions about particular subjects by entries or posts. The posts appeared in the reverse chronological order means the most recent post appears first.
Eg. Blogger.com, hsslive.com etc.
Microblogs : It allows users to exchange short messages, multi media files etc.
Eg. www.twitter.com

Question 12.
XYZ engineering college has advertised that its campus is Wi-Fi enabled. What is Wi-Fi? How is the Wi-Fi facility implemented in the campus.
Answer:
Wi-Fi means Wireless Fidelity. It is a wireless technology. Some organisation offers Wi-Fi facility. Here we can connect internet wirelessly over short distance, using Wi-Fi enabled devices.
It uses radio waves to. transmit information across a network in a range 2.4 GHz to 5 GHz in short distance. Nowadays this technology is used to access internet in campuses, hyper markets, hotels by using Laptops, Desktops, tablet, mobile phones etc.

Question 13.
Hoyv does a Trojan horse affect a computer?
Answer:
It appears as a useful software but it is a harmful software and it will delete useful softwares or files in a computer.

Question 14.
What are the guidelines one must follow for using computers over the Internet?
Answer:
Guidelines for using computers over internet

  • Emails may contain Viruses so do not open any unwanted emails
  • Download files from reputed sources(sites)
  • Avoid clicking on pop up Advt.
  • Most of the Viruses spread due to the use of USB drives so use cautiously.
  • Use firewall in your computer
  • Use anti virus and update regularly
  • Take backups in a regular time intervals

Question 15.
George needs to prepare for a seminar on ‘Backwaters in Kerala’.
a) Name any search engine through which George can get information about the topic.
b) Explain the working behind the search engines to display the information about the seminar topic.
Answer:
a) Google or Yahoo or Bing or Ask etc…
b) Search engines
By using search engines we will get a variety of information. It is a newly developed tool that helped to search the information on the internet more effectively and easily. Search engines are programs that help people to locate information from crores of website on internet using a database that consists of-references. Users can interact with the search engine through the home page of the search engine. To get the information about artificial intelligence just type this in the box provided for it and click the search button.
Search engines searches by using a particular siearch algorithm then displays the matching documents or web addresses. Search engine use soft wares called spiders or bots to search documents and theirweb addresses. Spiders search the internet using the directions given by the search engines and prepare an index and stores it in a database. The searching algorithm searched this database when the users submits a request and create a web page displaying the matching results as hyperlinks.
Eg: Google, Yahoo, Rediff etc.

Question 16.
Mr. Prasanth has bought a new laptop. He wants to take an Internet connection.
a) Explain him various types of broadband connectivity available in the market.
b) Suggest a web browser for him.
Answer:
a) Different types of Broad band connection are given below.
ISDN, Cable Internet (Asianet), DSL, FTTH, Wi- Max, etc.
b) Micro Soft Internet Explorer, Google Chrome, Netscape Navigator, Mozilla Firefox etc.

Question 17.
We want to connect our computer to the Internet for downloading some image. Explain any two connectivity methods?
Answer:
Types of connectivity
There are two ways to connect to the internet. First one dialing to an ISPls computer or with a direct connection to an ISP.

Question 18.
Today social media over the Internet is very popular.
a) In your opinion, what are the best practices to avoid the issues related to its use?
b) Suppose we need a quick response from the public about the ban of smoking in our state. Which type of social media is the best suited for this purpose?
Answer:
a) Following are the best practices to avoid issues related to social media use.
Avoid uploading personal information like Email address, Telephone number, Address, photos,’ videos etc.
Follow a time table for using this websites hence avoid wasting precious time.
If you upload any files in, Wikis, blogs, etc. can be viewed by all members and also can be downloaded. Avoid posting content that you may regret later.
Set your privacy levels such that who can see your posts and who can share them. The 3 privacy levels are private, friends and public.
b) Microblog (Twitter)

Question 19.
List bad effects if any in using social media.
Answer:
Disadvantages

  • Intrusion to privacy : Some people may misuse the personal information.
  • Addiction : sometimes it may waste time and money.
  • Spread rumours : The news will spread very quickly and negatively.

Plus One Computer Application Internet 5 Marks Questions and Answers

Question 1.
Your younger brother does not know the structure of an email message. Explain the structure of an email message.
Answer:
The email message contains the following fields.

  1. To : Recipient’s address will be enter here. Multiple recipients are also allowed by using coma.
  2. CG : Enter the address of other recipients to get a carbon copy of the message.
  3. bcc : The address to whom blind carbon copies are to be sent. This feature allows people to send copies to third recipient without the knowledge of primary and secondary recipients.
  4. From : Address of the sender
  5. Reply to : The email address to which replies are to be sent.
  6. Subject : Short summary of the message.
  7. Body : Here the actual message is to be typed.

Question 2.
Email is the most popular, but most misused service of the internet. Justify your answer.
Answer:
The advantages of email are given below:

  1. Speed is high
  2. It is cheap
  3. We can send email to multiple recipients
  4. Incoming messages can be saved locally
  5. It reduces the usage of paper
  6. We can access mail box anytime and from any-where.

The disadvantages are:

  1. It requires a computer, a modem, software and internet connection to check mail.
  2. Some mails may contain viruses .
  3. Mail boxes are filled with junk mail. So very difficult to find the relevant mail.

Plus One Computer Application Chapter Wise Questions Chapter 8 Computer Networks

Students can Download Chapter 8 Computer Networks Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions Chapter 8 Computer Networks

Plus One Computer Application Computer Networks 1 Mark Questions and Answers

Question 1.
An interconnected collection of autonomous computers is called _______.
Answer:
Computer Networks

Question 2.
State true/false
A computer connected to a network is called work station.
Answer:
True

Question 3.
A work station is also called _______.
Answer:
Node

Question 4.
Which hardware is used to connect a work station to a network?
Answer:
Network Interface Card (NIC)

Question 5.
Rules and convention to transmit data on a network is called ______.
Answer:
Protocol.

Question 6.
In your computer lab sometimes you can see that cable from some computers are connected to a small box. What is it ?
Answer:
It is a Hub/Switch

Question 7.
The computers connected in your school lab is a ________ type network.
Answer:
Local Area Network

Question 8.
A Cable TV Network that spread over the city is a _________ type network.
Answer:
Metropolitan Area Network

Question 9.
Internet is a _____ type network.
Answer:
Wide Area Network

Question 10.
The school management is decided to connect computers in your HSS lab and high school lab located adjacent buildings. Which type of network is this?
Answer:
Local Area Network

Question 11.
A company decided to connect the computers of their branch located in another city away from 10 km. Name this network.
Answer:
metropolitan area network.

Question 12.
Geometrical arrangement of computers in a network is called _______.
Answer:
Topology

Question 13.
From the following select an ISP.
a) KSEB
b) KSRTC
c) BSNL
d) PWD
Answer:
c) BSNL

Question 14.
ISP means ______.
Answer:
Internet service provider

Question 15.
ISDN means _______.
Answer:
Integrated services digital network

Question 16.
State true/false.
In peer to peer configuration all the computers are with equal configuration.
Answer:
True

Question 17.
State true/false.
In client server configuration, a computer is powerful than others.
Answer:
True

Question 18.
Consider the following address.
http://www.nic.kerala.gov.in “in” is used to represent what ?
Answer:
“in” is used to represent the country “India”.

Question 19.
Which top level domain is used for non commercial organisation?
Answer:
org

Question 20.
Which geographical top level domain is used for the country “France”?
Answer:
fr

Question 21.
DNS stands for ________.
Answer:
Domain Name System

Question 22.
An IP address consists of ______ bits long.
(a) 4
(b) 16
(c) 32
(d) 64
Answer:
32 bits

Question 23.
An IP address consists of ______ bytes long.
(a) 4
(b) 16
(c) 32
(d) 64
Answer:
4 Bytes

Question 24.
From the following which media is using light rays for data transfer.
(a) Twisted pair cable
(b) Optical fibre
(c) Coanial cable
(d) Micro wave station
Answer:
b) Optical fibre

Question 25.
The wiring is not shared in a topology. Which is that topology.
Answer:
Star

Question 26.
______ is a combination of any two or more network topologies.
Answer:
Hybrid Topology

Question 27.
The nodes in a topology with two or more paths. Which topology is this?
Answer:
Mesh topology

Question 28.
Copying the signals from the earth to satellite is called ________.
Answer:
Uplink

Question 29.
Copying the signals from the satellite to earth is called _______.
Answer:
Downlink , Mesh topology

Question 30.
In very short distance networks, which communication media is used ?
Answer:
Twisted pair cables or coaxial cables.

Question 31.
In long distance networks, which communication medias are used?
Answer:
Optical fibre, microwave station, satellites, etc.

Question 32.
From the following which connector is used to connect UTP/STP twisted pair cable to a computer.
a) RJ-45
b) RS-1
c) CG-1
d) None of these.
Answer:
a) RJ-45

Question 33.
The cable media that use light to transmit data signals to very long distance is _______.
Answer:
Optical fibre cable

Question 34.
AM and FM radio broadcast and mobile phones make use of ______ medium for transmission.
Answer:
Radio waves

Question 35.
A short range communication technology that does not require line of sight between communicating device is ______.
Answer:
Wi-Fi

Question 36.
A communication system that is very expensive, but has a large coverage area when compared to other wireless communication system is ______.
Answer:
Satellite link

Question 37.
In which topology is every node connected to other nodes?
Answer:
Mesh topology

Question 38.
Any device which is directly connected to a network is generally known as ______.
Answer:
Node or Work station or Client or Terminal

Question 39.
In _____ topology all the nodes are connected to a main cable.
Answer:
Bus topology

Question 40
Write the full from of FTTH.
Answer:
Fibre To The Home

Question 41.
Which one of the following statements is TRUE in relation with Wi-MAX Internet connectivity?
a) make use of satellite connection
b) Uses cable connection
c) Uses laser beam for connection
d) Microwave is used for connectivity
Answer:
d) microwave is used for connectivity

Question 42.
Identify the type of LAN topology in which there are more than one path between nodes
a) Star
b) Ring
c) Mesh
d) Bus
Answer:
c) Mesh topology

Question 43.
a) To make data transfer faster, a switch stores two different addresses of all the devices connected to it. Which are they?
b) Name the device that can interconnect two different networks having different protocols.
Answer:
a) IP and MAC address
b) Gateway

Question 44.
a) Different networks with different protocols are connected by a device called….
i) Router
ii) Bridge
iii) Switch
iv) Gateway
b) Define protocol?
Answer:
iv) gateway
b) Protocol : The rules and conventions for transmitting data.

Plus One Computer Application Computer Networks 2 Marks Questions and Answers

Question 1.
Is it possible to connect all the computers to a network? Justify your answer.
Answer:
No. It is not possible to connect all the computers to a network. A computer, with a hardware called Network Interface Card (NIC), can only conect to a network.

Question 2.
Define Computer Networks?
Answer:
Two or more computers connected through a communication media that allows exchange of information between computers is called a Computer Network.
eg:- LAN, MAN, WAN

Question 3.
Do you heard about work station / Node. What is it?
Answer:
A personal computer connected to a network is called work station / Node.

Question 4.
Define a protocol.
Answer:
A protocol is the collection of rules and conventions used to exchange information between computer as a network.

Question 5.
Is the following a valid IP address?
258.1001.10.1.
Justify your answer?.
Answer:
No. It is not a valid IP address. An IP address has 4 parts numeric address. Each parts contains 8 bits. By using 8 bits we can represent a decimal number between 0 to 255. Here 258 and 1001 are greater than 255. So it is not valid.

Question 6.
Mr. Dixon purchased a Laptop with bluetooth technology.
Answer:
It is a specification that allows mobile phones, computers and PDAS to be connected wirelessly over short distance.

Question 7.
Some Airport or college campus offers Wi-Fi facility. What is Wi-Fi?
Answer:
Wi-Fi means Wireless Fidelity. It is a wireless tech-nology. Some organisation offers Wi-Fi facility. Here we can connect internet wirelessly over short distance, using Wi-Fi enabled devices.

Question 8.
What is a protocol ?
Answer:
A protocol is a collection of rules and regulations to transmit data from one computer to another on a network. ”
eg:- http, ftp, TCP/IP, etc.

Question 9.
Explain Infrared waves in detail?
Answer:
These waves are used for transmitting data in short distance and its frequency range is 300 GHz to 400 GHz. Tv’s remote control, wireless mouse and intrusion detectors etc are the devices that used infrared.

Question 10.
Define resource sharing.
Answer:
Resource sharing means the computers on a network can share resources like software
(programs, data ) and hardware (printer,scanner, CD drive etc.).

Question 11.
Name two classification of communication channels between computers in a network.
Answer:
The two classification of communication channels are guided media and unguided media.

Question 12.
What is the use of a Repeater ?
Answer:
A Repeater is a device used to strengthen weak signals on the network and retransmits them to the destination.

Question 13.
Differentiate between router and Bridge.
Answer:
Bridge is a device used to link same type of networks while Router is similar to a bridge, but it can connect two networks with different protocols.

Question 14.
Categorise and classify the different types of network given below.
ATM network, Cable television network, Network within the school, Network at home using Bluetooth, Telephone network, Railway network
Answer:
PAN: Network at home using Bluetooth
LAN: Network within the school
MAN: Cable television network
WAN: ATM network, Telephone network, Railway network

Question 15.
What is PAN?
Answer:
PAN means Personal Area Network. It is used to connect devices situated in a small radius by using guided media(USB cable)or unguided media (Bluetooth, infra red, etc).

Plus One Computer Application Computer Networks 3 Marks Questions and Answers

Question 1.
What are the advantages of Networks?
OR
In a school lab all the 10 computers are connected to a network. We know that there is no need of 10 printers or 10 scanners why? Explain the advantages of Networks?
Answer:
The advantages of Networks are given below.
1) Resource sharing : All the computers in a network can share software (programs, data …..) and hardware (printer, scanner, CD drive etc ).
2) Reliability : If one computer fails, the other computer can perform the work without any delay. This is very important for banking air traffic control and other application.
3) Price Vs Performance : A main frame computer can be 10 times faster than a PC but it costs thousand times 9 PC. Therefore instead of a main frame 10 personal computers are used with less cost and same performance.
4) Communication Medium : It is a powerful communication medium. We can exchange information between computers in a network.
5) Scalable : This means, System performance can be increased by adding computers to a network.

Question 2.
Match the following.
Plus One Computer Application Chapter Wise Questions Chapter 8 Computer Networks 1
Answer:
1) c
2) a
3) b
4) f
5) d
6) e

Question 3.
Your friend told you that a workstation and server are same. What is your opinion ? Is it true?
Answer:
No it is not true. A work station is a ordinary computer connected to a network. But a server is a powerful computer connected to a network. Its main aim is to serve the needs of workstation. Server is the master and workstations are the slaves.

Question 4.
Your friend told you that there are different types of servers. Do you agree with that ? Justify your answer?
Answer:
Yes, there are different types of servers, dedicated and non dedicated servers.
1) Dedicated Server : In large networks, a computer is reserved only for doing server function like sharing software and hardware resources and it is unavailable for running user applications and therefore increases system cost,
eg:- File server, Printer server etc.
2) Non dedicated Server : In smaller networks, a computer is doing the function of a server as well as it also act as a workstation.

Question 5.
Your friend asked you that a Hub or switch is better. What is your opinion ?
Answer:
A Hub is a device that receives data from a PC and transmit it to all other PC’s on the network. If two or more PC’s transmit data at the same time, there is a chance for collision. Hub is a cheap device and data transfer through a Hub is slow.
A switch is also a device and it transmits data to the right; recipient. There fore collision rate is low. A switch is faster but It is expensive.

Question 6.
ALAN is classified by their configuration. What are they?
Answer:
They are, peer to peer or client-server.
1) Peer to peer: In this configuration all the computers have equal priority. That means each computer can function as both a workstation and a server. There is no dedicated server.
2) Client-Server: In this configuration a computer is powerful which acts as a dedicated server and all others are clients (work stations). Server is the master and others are slaves.

Question 7.
Your friend told you that internet and intranet are same. Do you agree with that. Justify your answer.
Answer:
No. Internet and; intranet are not same. They are different.
Internet: It is a network of networks. It means that international network. We can transfer information between computers within nations very cheaply and speedily.
Intranet: A private network inside a company or organisation is called intranet.

Question 8.
Your friend decides to start an internet cafe in his shop. What are the requirements for this? Help him.
Answer:
1) Computer with a built in Modem or a facility to connect an external modem.
2) A telephone connection
3) An account with an ISP
4) Install respective software
eg:- Internet explorer or mozilla or netscape Navigator etc.

Question 9.
Considerthe following URLand explain each parts.
http://www.nic.kerala.gov.in / results.html.
Answer:
http:- http means hyper text transfer protocol. It is a protocol used to transfer hyper text.
www :- World Wide Web, With an email address
we can open our mail box from anywhere in the world.
nic.kerala :- It is a unique name. It is the official website name of National Informatic Centre
gov:- It is the top level domain. It means that it is a government organisation’s website.
resents the country, in is used for India.
results.html :- It represents the file name

Question 10.
Write any valid email and explain the working of an email.
Answer:
An example of an email id is jobi_cg @ rediffmail. com. Here jobi_cg is the user name, rediffmail is the website address and .com is the top level domain which identifies the types of the organisation. To send an email we require an email address. Some websites provide free email facility. To send an email first type the recipients address and type the message then click the send button.
The website’s server first check the email address is valid, if it is valid it will be sent otherwise the message will not ’ be sent and the sender will get an email that it could not deliver the message. This message will be received by the recipient’s server and will be delivered to recipient’s mail box. He can read it and it will remain in his mail box as long as he will be deleted.

Question 11.
Is it possible to give numeric address (IP address) to URL instead of string address of a website just like the following, http://210.212.239.70/
Answer:
Our Post Office has two addresses one string address (Irinjalakuda) and one numeric code (680121). Just like this the website has also two addresses a string address www.agker.cag.gov.in and a numeric address (htpt://210.212.239.70/).

Numeric Address (IP address) :- It has 4 parts one byte (8 bits) each separated by dots. One byte can represent a number in between 0 to 255. So we can use a number in between 0 to 255 separated by dots. It is a fastest method to access a website. To remember this number is not easy to humans. So a string address is used by humans,
eg:- http://203.127.54.1/.

String Address :- It uses a string to represent a website, it is familiar to the humans. The string ad-dress is mapped back to the numeric address using a Domain Name System (DNS). It may consists of 3 or 4 parts. The first part is www., the second part is website name, the third top level domain and the fourth geographical top level domain,
eg:-www.kerala.gov.in

Question 12.
Arun is in charge of networking the computers in your newly built computer lab.
a) Suggest any two options for communication media that can be used for connecting computers in your school lab.
b) Explain the structure and features of both.
Answer:
a) Twisted pair cables and coaxial cables.
b) Twisted Pair Wire : Two copper wires individually insulated, twisted around each other and covered by a PVC. There are two types of twisted pair wire. They are UTP and STP. It is very cheap and easy to install.
Coaxial Cable: A sturdy copper wire(conductor) is insulated by plastic. This is covered just like a mesh by a conductor , which in turn is enclosed in an protective plastic coating.
Compared to twisted pair wire it is more expensive, less flexible and more difficult to install. But it is more reliable and carry far higher data rates.

Question 13.
The computer uses digital signals and this signal is transmitted through telephone lines to computers at distant locations. Discuss how this is made possible.
Computer digital signals
Answer:
a) Modem
b) A Modem is a two in one device. That is it performs two functions. It is used to convert Digital signals to Analog, the process is Modulation(DAM) and the reverse process is converting Analog to Digital known as Demodulation (ADD).

Question 14.
Explain the structure of the television cable in your house. (3 Scores)
Answer:
Coaxial Cable: A sturdy copper wire(conductor) is insulated by plastic. This is covered just like a mesh by a conductor , which in turn is enclosed in an protective plastic coating.
Compared to twisted pair wire it is more expensive, less flexible and more difficult to install. But it is more reliable and carry far higher data rates. The various coaxial cables are RG-8,RG-9,RG-11,….

Question 15.
Answer the following questions from the list given below.
a) Device used to connect a network using TCP/IP protocol and a network using IPX/SPX protocol
b) Device that can convert a message from one code to another and transfer from one network to a network of another type.
(c) Device used to link two networks of the same type.
Answer:
a) Router
(b) Gateway
(c) Bridge

Question 16.
Find the most suitable match.
Plus One Computer Application Chapter Wise Questions Chapter 8 Computer Networks 2
Answer:
i) www.keralapsc.org
ii) first page of a web site
ii) file with extension.htm
iv) www.yahoo.com

Question 17.
What do you mean by line of sight method of propagation.
OR
Why Micro wave station use tall towers instead of short one?
Answer:
Micro Wave signals can travel only in straight line. It cannot bend when the obstacles in between. There fore it uses tall towers instead of short one. The dish like antenna mounted on the top of the tower. Hence the two antennas must be in a straight line, able to look at each other without any obstacle in between.

Question 18.
Mr. Alvis took a photograph by using his mobile phone and he sends that photograph to his friend by using blue tooth. What is Blue tooth? Explain,
Answer:
This technology uses radio waves in the frequency * range of 2.402 GHz to 2.480 GHz. And transmit data in short distance. Mobile phones, Laptops, tablets etc use Bluetooth technology to transmit data. By using Bluetooth Dongle(a small device that can be buy from the shop) we can convert non Bluetooth PC into Bluetooth enabled and transmits data with data transmission rate of 3 Mbps onwards.

Question 19.
Differentiate Wi-Fi and Wi-Max in detail.
Answer:
Wi Fi(Wireless Fidelity) uses radio waves to transmit information across a network in a range 2,4 GHz to 5 GHz in short distance. Nowadays this technology is used to access internet in Laptops, Desktops, tablets, Mobile phones etc. But Wi MAX(Wireless Microwave Access) uses micro waves to transmit information across a network in a range 2 GHz to 11 GHz over very long distance

Question 20.
What is MAC address? What is the difference between a MAC address and an IP address?
Answer:
MAC means Media Access Control address. It is a unique 12 digit hexadecimal number(IMEI for mobile phones, it is a 15 digit decimal number) assigned to each NIC by its manufacturer. This address is known as MAC address and it is permanent., it is of the form. MM:MM: MM:SS:SS:SS.The first MM:MM:MM contains the ID number of the adapter company and the second SS:SS:SS represents the serial number assigned to the adapter by the company.
IP address means Internet Protocol address. It has 4 parts numeric address. Each parts contains 8 bits. By using 8 bits we can represent a decimal number between 0 to 255(28=256 numbers). Each part is separated by dot. A total of 4*8=32 bits used. But nowadays 128 bits are used for IP address.

Question 21.
What is the limitation of microwave transmission? How is it eliminated?
Answer:
Micro Wave signals can travel only in straight line. It cannot bend when the obstacles in between. There fore it uses tall towers instead of short one. The dish like antenna mounted on the top of the tower. Hence the two antennas must be in a straight line; able to look at each other without any obstacle in between.

Question 22.
Explain the different types of networks,
Answer:
The networks are classified into the following.
i) Local Area Network (LAN)
This is used to connect computers in a single room, rooms within a building or buildings of one location by using twisted pair wire or coaxial cable. Here the computers can share Hardware and software. Data transfer rate is high and , error rate is less,
eg:- The computers connected in a school lab.
ii) Metropolitan Area Network (MAN)
A Metropolitan Area Network is a network spread over a city. For example a Cable TV network. MAN have lesser speed than LAN and the error rate is less. Here optical fibre cable is used.
iii) Wide Area Network (WAN)
This is used to connect computers over a large geographical area. It is a network of networks. Here the computers are connected using telephone lines or Micro Wave station or Satellites. Internet is an example for this. LAN and MAN are owned by a single organisation but WAN is owned by multiple organisation. The error rate in data transmission is high.

Question 23.
a) To make data transfer faster, a switch stores two
different addresses of all the devices connected to it. What are they?
b) There are 5 computers in your computer lab.
Write short notes on any three possible methods to interconnect these computers. Draw the diagram of each method.
Answer:
a) Identification of computers over a network : A computer gets a data packet on a network, it can identify the sender’s address easily. It is similar to our snails mail, each letter is stamped in sender’s post office as well as receiver’s post office.
1. Media Access Control(MAC) address : It is a unique 12 digit hexadecimal number(IMEI for mobile phones, it is a 15 digit decimal number) assigned to each NIC by its manufacturer. This address is known as MAC address and its permanent.
It is of the form. MM:MM:MM:SS:SS:SS.
The first MM:MM:MM contains the ID number of the adapter company and the second SS:SS:SS represents the serial number assigned to the adapter by the company.

2. Internet Protocol (IP) address : An IP address has 4 parts numeric address. Each parts contains 8 bits. By using 8 bits we can represent a decimal number between 0 to 255(2°=256 numbers). Each part is separated by dot. A total of 4*8=32 bits used. But nowadays 128 bits are used for IP address.

b) Network topologies : Physical or logical arrangement of computers on a network is called structure or topology. It is the geometrical arrangement of computers in a network. The major topologies developed are star, bus, ring, tree and mesh.

1) Star Topology : A star topology has a server all other computers are connected to it. If computer A wants to transmit a message to computer B.
Then computer A first transmit the message to the server then the server retransmits the message to the computer B. That means all the messages are transmitted through the server, advantages are add or remove workstations to a star network is. easy and the failure of a workstation will not effect the other. The disadvantage is that if the server fails the entire network will fail.

2) Bus Topology : Here all the computers are attached to a single cable called bus. Here one computer transmits all other computers listen. Therefore it is called broadcast bus. The transmission from any station will travel in both the direction. The connected computers can hear the message and check whether it is for them or not.
Advantages are add or remove computer is very easy. It requires less cable length and the installation cost is less. Disadvantage is fault detection is very difficult because of no central computer.

3) Ring Topology : Here ail the computers are connected in the shape of a ring and it is a closed loop. Here also there is no central computer. Here a computer transmits a message, which is tagged along with its destination computer’s address. The message travels in one direction and each node check whether the message is for them. If not, it passes to the next node.
It requires only short cable length. If a single node fails, at least a portion of the network will fail. To add a node is very difficult.

4) Hybrid Topology : It is a combination of any two or more network topologies. Tree topology and mesh topology can be considered as hybrid topology.
a) Tree Topology : The structure of a tree topology is the shape of an inverted tree with a central node and branches as nodes. It is a variation of bus topology. The data transmission takes place in the way as in bus topology. The disadvantage is that if one node fails, the entire portion will fail.
b) Mesh Topology : In this topology each node is connected to more than one node. It is just like a mesh (net). There are multiple paths between computers. If one path fails, we can transmit data through another path.

Question 24.
ABC Ltd., required to connect their computers in their company without using wires. Suggest suitable medium to connect the computers. Explain.
Answer:
Unguided Media
1. Radio waves – It transmits data at different frequencies ranging from 3 KHz. to 300 GHz.
2. Microwaves – Microwave signals can travel in straight line if there is any obstacle in its path, it can’t bend. So it uses tall towers instead of short one.
3. Infrared waves – These waves are used for transmitting data in short distance and its frequency range is 300 GHz to 400 GHz.

Question 25.
It is needed to set up a PAN, interconnecting one tablet, two mobile phones and one laptop. Suggest a suitable communication technology and list its features for the following situations:
i) the devices are in a room at distance of 5 to 10 meters.
ii) the devices are in different rooms at a distance of 25 to 50 meters.
Answer:
i) Wireless communication technologies using radio waves
1. Bluetooth : This technology uses radio waves in the frequency range of 2.402 GHz to 2.480 GHz. And transmit data in short distance. Mobile phones, Laptops, tablets etc use Bluetooth technology to transmit data.
ii) Wi Fi(Wireless Fidelity) : It uses radio waves to transmit information across a network in a range 2.4 GHz to 5 GHz in short distance. Nowadays this technology is used to access internet in Laptops, Desktops, tablets, Mobile phones etc.

Question 26.
Computers and other communication devices can be connected a network using wireless technology.
a) A song is transferred from mobile phone to a laptop using this technology. Name the transmission medium used here.
b) Explain any other three communication media which use this technology
Answer:
a) Blue tooth or Radio waves
b) Wireless communication technologies using radio waves

1) Bluetooth : This technology uses radio waves in the frequency range of 2.402 GHz to 2.480 GHz. And transmit data in short distance. Mobile phones, Laptops, tablets etc use Bluetooth technology to transmit data.

2) Wi Fi(Wireless Fidelity) : It uses radio waves to transmit information across a network in a range 2.4 GHz to 5 GHz in short distance. Nowadays this technology is used to access internet in Laptops, Desktops, tablets, Mobile phones etc.

3) Wi MAX(Wireless Microwave Access) : It uses micro waves to transmit information across a network in a range 2 GHz to 11 GHz over very long distance.

4) Satellites : By using satellite we can communicate from any part of the world to any other. The ground stations are connected via the satellite. The data signals transmitted from earth to satellite (uplink) and from the satellite to the earth (downlink).

Question 27.
Find the correct match for each item in column A from columns B and C.
Plus One Computer Application Chapter Wise Questions Chapter 8 Computer Networks 3
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 8 Computer Networks 4

Question 28.
Write notes on the following:
a) IP address
b) MAC address
c) Modem
Answer:
a) Internet Protocol (IP) address : An IP address has 4 parts numeric address. Each parts contains 8 bits. By using 8 bits we can represent a decimal number between 0 to 255(28=256 numbers). Each part is separated by dot. A total of 4*8=32 bits used. But nowadays 128 bits are used for IP address.

b) Media Access Control(MAC) address: It is a unique 12 digit hexadecimal number(IMEI for mobile phones, it is a 15 digit decimal number) assigned to each NIC by its manufacturer. This address is known as MAC address.
It is of the form. MM:MM:MM:SS:SS:SS.

c) Modem : It is a device used to connect the computer to the internet. It converts digital signal into analog signal (modulation) and vice versa (De modulation)

Question 29.
Compare any three types of networks based on span of geographical area.
Answer:
Types of networks.
The networks are classified into the following based upon the amount of geographical area that covers.
i) Personal Area Network(PAN) : It is used to connect devices situated in a small radius by using guided media or unguided media
ii) Local Area Network (LAN): This is used to connect computers in a single room, rooms within a building or buildings of one location by using twisted pair wire or coaxial cable. Here the Computers can share Hardware and software. Data transfer rate is high and error rate is less,
eg:- The computers connected in a school lab.
iii) Metropolitan Area Network (MAN): A Metropolitan Area Network is a network spread over a city. For example a Cable TV network. MAN have lesser speed than LAN and the error rate is less. Here optical fiber cable is used.
iv) Wide Area Network (WAN): This is used to connect computers over a large geographical area. It is a network of networks. Here the computers are connected using telephone lines or Micro Wave station or Satellites. Internet is an example for this. LAN and MAN are owned by a single organization but WAN is owned by multiple organization. The error rate in data transmission is high.
Plus One Computer Application Chapter Wise Questions Chapter 8 Computer Networks 5

Plus One Computer Application Computer Networks 5 Marks Questions and Answers

Question 1.
Explain the different network topologies,
Answer:
Physical or logical arrangement of computers of a network is called structure or topology. It is the geometrical arrangement of computers in a network. The major topologies developed are star, bus, ring, tree and mesh.

1) Star Topology : A star topology has a server all . other computers are connected to it. If computer A wants to transmit a message to computer B. . Then computer A first transmits the message to the server then the server retransmits the message to the computer B. That means all the messages are transmitted through the server. Advantages are add or remove workstations to a star network is easy and the failure of a workstation will not effect the other. The disadvantage is that if the server fails the entire network will fail.

2) Bus Topology : Here all the computers are attached to a single cable called bus. Here one computer transmits all other computers listen. Therefore it is called broadcast bus. The trans-mission from any station will travel in both the direction. The connected computers can hear the message and check whether it is for them or not.
Advantages are add or remove computer is very easy. It requires less cable length and the installation cost is less. Disadvantage is fault detection is very difficult because of no central computer.

3) Ring Topology : Here all the computers are connected in the shape of a ring and it is a closed loop. Here also there is no central computer. Here a computer transmits a message, which is tagged along with its destination computer’s address. The message travels in one direction and each node check whether the message is for them. IF not, it passes to the next node.It require only short cable length. If a single node fails, atleast a portion of the network will fail. To add a node is very difficult.

4) Hybrid Topology : It is a combination of any two or more network topologies. Tree topology and mesh topology can be considered as hybrid topology.
a) Tree Topology: The structure of a tree topology is the shape of an inverted tree with a central node and branches as nodes. It is a variation of bus topology. The data transmission takes place in the way as in bus topology. The disadvantage is that if one node fails, the entire portion will fail.
b) Mesh Topology : In this topology each node is connected to more than one node. It is just like a mesh (net). There are multiple paths between computers. If one path fails, we can transmit data through another path.

Question 2.
What are the different data communication equipments?
Answer:
1) Modem : A Modem is a two in one device. That is it performs two functions. It is used to convert Digital signals to Analog, the process is Modulation (DAM) and the reverse process is converting Ana-log to Digital known as Demodulation (ADD).

2) Multiplexer (Many to One): A multiplexer is a device that combines the inputs from different sources and produces one output. A demultiplexer does the reverse process.

3) Bridge : It is a device used to link two same type of networks.

4) Router : It is a device used to link two networks with different protocols.

5) Gateway : It is a device used to link two networks of different types. lt can convert a message from one code to another.

Question 3.
Explain the protocol TCP/IP
Answer:
TCP – (Transmission Control Protocol) is a connection oriented protocol. It is responsible for sending the data from one PC to another and also verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received.

IP – is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world.
In short TCP handle the flow control and error free packet delivery and IP provides basic addressing and data packets forwarding services.
Eg: 101.65.105.255

Question 4.
What is a protocol. Explain any four.
OR
Why protocol is necessary for communication? Ex-plain any two of them.
Answer:
A protocol is a collection of rules and regulations.to transfer data from one location to another. Transmission Control Protocol (TCP), which uses a set of rules to exchange messages with other Internet points at the information packet level. Internet Protocol (IP), which uses a set of rules to send and receive messages at the Internet address level. .
FTP – File Transfer Protocol which is used for transferring files between computers connected to local network or internet.
HTTP – is a protocol used for WWW for enabling the web browse to access web server and request HTML documents.

Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements

Students can Download Chapter 7 Control Statements Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements

Plus One Computer Application Control Statements 1 Mark Questions and Answers

Question 1.
An if statement contains another if statement completely. Then it is known as _______.
Answer:
Nested if

Question 2.
From the following which is not optional with switch statement.
a) break
b) default
c) case
d) none of these
Answer:
c) case.

Question 3.
To exit from a switch statement ____ is used
a) quit
b)exit
c) break
d) none of these
Answer:
c) break

Question 4.
From the following which statement is true for switch statement
a) switch is used to test the equality
b) switch is used to test relational or logical expression
c) switch can handle real numbers case data
d) none of these
Answer:
a) switch is used to test the equality

Question 5.
Sonet wants to execute a statement more than once. From the following which is exactly suitable.
a) if
b) loop
c) switch
d) if -else if ladder
Answer:
b) loop

Question 6.
Odd one out
a) for
b) if
c) switch
d) if else if ladder
Answer:
а) for
It is a loop the others are branching statement

Question 7.
a) for
b) if
c) while
d) do while
Answer:
b) if.
It is a branching statement and the others are loops

Question 8.
From the following which loop does the three things, initialisation, checking and updation.
a) while
b) do while
c) for
d) none of these
Answer:
c) for

Question 9.
Predict the output
for(i=1;i<=10;i++);
cout << i;
a) 10
b) 1 to 10
c) 11
d) none of these
Answer:
c) 11

Question 10.
From the following which is exit controlled loop
a) for
b) while
c) do while
d) None of these
Answer:
do while

Question 11.
_______ statement is used for unconditional jump from one location to another.
Answer:
goto

Question 12.
Sunitha wants to skip one iteration. From the fol-lowing which will help her?
a) continue
b) break
c) for
d) case
Answer:
a) continue

Question 13.
To terminate a program, from the following which is used ?
a) break
b) continue
c) end( )
d) exit( )
Answer:
exit( )

Question 14.
Which header file is needed to use exit( ) function in a program?
a) iostream
b) cstdlib
c) math
d) iomanip
Answer:
b) cstdlib

Question 15.
In while loop, the loop variable should be updated?
a) along with while statement
b) after the while statement
c) before the while statement
d) inside the body of while
Answer:
d) Inside the body of while

Question 16.
How many times the following loop will execute?
int S = 0, i =0;
do
{
S+= i;
i++;
}
while(i<5);
Answer:
5 times

Question 17.
a) _____ statement takes the program control out of the loop even though the test expression is true.
b) Consider the following code fragment. How many times will the character ‘ * ’ be printed on the screen?
for (1=0; i< 10; i =i+2);
{
cout << “*”;
}
Answer:
a) break or goto
b) Only one time because of semicolon(;) in the end of the for(i=0;i<10;i=i+2);

Question 18.
Which selection statement tests the value of a variable or an expression against a list of integers or character constants?
a) For
b) If
c) Switch
d) Conditional expression
Answer:
c) switch

Question 19.
How many times the following loop will execute?
int m = 2
do
{
cout << “Welcome”;
m++ ;
} while (m>10);
Answer:
Only one time.

Question 20.
statement takes the program control outside a loop even though the test expression is true.
Answer:
break

Question 21.
Read the following C++ statement
for (int n = 1; n<10; n+=2);
cout << n
Now, choose the correct output from the following options.
a) 1
b) 13579
c) 11
d) 10
Answer:
c) 11.
This is because of for statement is end with: (semi colon).
Here cout << n; executes only once.

Question 22.
______ search method is an example for ‘divide and conquer method’.
Answer:
goto

Question 23.
a) Name the type or loop which can be used to ensure that the body of the loop will surely be executed at least once.
b) Consider the code given below and predict the output;
for (int i=1; i<=9;i=i+2)
{
if (i==5) continue;
cout << i << ” ”
}
Answer:
a) do while loop(Exit controlled loop)
b) 1 3 7 9. It bypasses one iteration of the loop when i=5.

Plus One Computer Application Control Statements 2 Marks Questions and Answers

Question 1.
Your friend Arun asked you that is there any loop that will do three things, initialization, testing and updation. What is your answer. Explain ?
Answer:
Yes,
There is only one loop namely for loop that will do this three things. The other loops will do the . checking only, initialisation must be do before the 1 loop and updation must be inside the loop.
The syntax of for toop is given below
For(initialisation; testing; updation)
{
Body of the for loop;
}

Question 2.
While writing a program Geo uses while loop but forgets to update the loop variable. What will happen?
Answer:
The loop variable inside the while loop must be updated otherwise the loop will not be terminated The loop will be work infinitely.

Question 3.
Draw the flow chart of if statement.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 1

Question 4.
Draw the flow chart of if else statement .
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 2

Question 5.
Write a while loop that display numbers from 500 to 550.
Answer:
int i=500
while (i<=550)
{
cout << i;
i=i+1;
}

Question 6.
Distinguish between exit(O) function and return statement.
Answer:
Both are used to terminate the program but both are different. Return is a keyword and exit(0) is a function.The difference is, we can use more than one exit(0) function but we can use only one return statement in a scope. To use exit(0), the header file cstdlib should be used.

Question 7.
Draw the flow chart of for loop.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 3

Question 8.
How many time the following for loop will execute? Justify.
for(i = 0; ; i ++)
{
if(i > 5)
cout << “continue”;
else
cout << “over”;
}
Answer:
Here the loop becomes infinite because the check condition is missing.

Question 9.
Predict the output.
#inctude<iostream.h>
int main( )
{
int a = 0;
start:
cout << endl << ++a;
if(a < 5)
goto start;
}
Answer:
1
2
3
4
5

Question 10.
for(int i=2, sum=0; i <= 20; i=i+2) sum += i;
Answer:
Rewrite the above code using while loop.
int i = 2;
sum=0;
while (i<=20)
{
sum +=i;
i = i +2;
}

Question 11.
Rewrite the following code using switch case statement.
if(day == 1)
cout << “Sunday”;
eise if(day == 2)
cout << “Monday”;
else if(day == 7)
cout << “Saturday”;
else
cout << “Wednesday”; (2 Scores)
Answer:
switch (day)
{
case 1:cout << “Sunday”;break;
case 2:cout << “Monday”;break;
case 7:cout << “Saturday”;break;
default:cout << “Wednesday”;
}

Question 12.
Pick the odd one out from the following. Give reason
1) a) for
b) while
c) do while
2) a) if
b) switch
c) for
Answer:
1) do ______ while It is an exit controlled loop while
others are entry controlled loop
2) for. It is a loop while others are branching statements.

Question 13.
State whether the following statements are True or False. In either case Justify your answer
a) Break statement is essential in switch
b) For loop is an entry controlled loop
c) Do… while loop is an entry controlled loop
d) Switch is a selection statement
Answer:
a) False. It is not essential in single case statement
b) True. Because it will first .check the condition. If it is true then only the body will be executed.
c) False. It is an exit controlled loop.
d) True.

Question 14.
Write the equivalent code for the following statement
R=(P<Q?P:Q)
Answer:
if(P<Q)
R=P;
else
R=Q;

Question 15.
Examine the following code snippet and find out the output? What will happen if the statement int ch; is replaced by char ch;
int ch;
for(ch=,A,;ch<-Z,;++ch)
cout << ch << ”;
Answer:
This code snippet will print 65,66,67 90. If
the statement int ch; is replaced by char ch; it prints A,B,C,………..,Z.

Question 16.
a) ______ is an entry control loop.
b) Explain the memory allocation for the following
int A[10] [10];
Answer:
a) while or for loop
b) To store On integer 4 bytes is used in Geany Editor
int A[10] [10]; .-> It needs 10*10*4 = 400 bytes7

Question 17.
Differentiate between break and continue statements in C++.
Answer:
break statement: It is used to skip over a part of the code i.e. we can premature exit from a loop such as while, do-while, for or switch.
Syntax:
while (expression)
{
if (condition)
break;
}
continue statement : It bypasses one iteration of the loop. That is it skips one iteration and continue the loop with next iteration value.
Syntax:
while (expression)
{
if (condition)
continue;
}

Plus One Computer Application Control Statements 3 Marks Questions and Answers

Question 1.
Compare if else and conditional operator?
Answer:
We can use conditional operator as an alternative of if-else statement. The conditional operator is a ternary operator.
The syntax of if- else
if (expression 1)
expression 2;
else
expression 3;
First expression 1 is evaluated if it is true expression 2 will be executed ptherwise expression 3 will be executed. Instead of this, we can be written as follows using conditional operator Expression 1 ? expression 2: expression3;

Question 2.
#include<iostream>
using namespace std;
int main( )
{
int n;
cout << “Enter a number in between 1-7”;
cin << n;
switch (n)
{
case 1: cout << “Sunday”;
break;
case 2: cout << “Monday”;
break;
case 3: cout << “Tuesday”;
break;
case 4: cout << “Wedesday”;
break;
case 5: cout << “Thursday”;
break;
case 6: cout << “Friday”;
break;
case 7: cout << “Saturday”;
break;
default : cout << “lnvalid”,
}
}
Rewrite the above code using if else if ladder.
Answer:
#include<iostream>
using namespace std;
int main( )
{
int n;
cout << “Enter a number in between 1-7:”;
cin << n;
if(n==1)
cout << “Sunday”;
else if(n=5=2)
cout << “Monday”;
else if(n==3)
cout << “Tuesday”;
else if(n==4)
cout << “Wedesday”;
else if(n==5)
cout << “Thursday”;
else if(n==6)
cout << “Friday”;
else if(n==7)
oout << “Saturday”; ‘
else
cout << “lnvalid”;
}

Question 3.
Rewrite the program following program using if else
#include<iostream>
using namespace std;
int main( )
{
int a,b,big;
cout << “Enter two integers”;
cin << a << b;
big=(a>b)?a:b;
cout << “Biggest number is ” << big << endl;
return 0;
}
Answer:
#include<iostream>
using namespace std;
intmain( )
{
int a,b,big;
clrscr( );
cout << “Enter two integers”;
cin << a << b;
if (a>b) big=a;
else big=b;
cout << “Biggest number is ” << big << endl;
return;
}

Question 4.
Consider the following code
#include<iostream>
using namespace std;
intmain( )
{ int mark;
clrscr( );
cout << “Enter a mark”; cin << mark;
if(mark>=75)
cout << “Distinction”;
else if (mark>=60) .
cout << “First class”;
else if (mark>=50)
cout << “Second class”;
else if (mark>=40) cout << “Passed”;
else
cout << “Failed”; .
}
Is it possible to rewrite the above program using switch statement? Distinguish between switch and if else if ladder.
Answer:
No. It is not possible to write the above code using switch statement. Following are the difference between switch and if else if ladder.
1) Switch can test only for equality but if can evaluate a relational or logical expression
2) If else is more versatile
3) If else can handle floating values but switch cannot .
4) If the test expression contains more variable if else is used
5) Testing a value against a set of constants switch is more efficient than if else.

Question 5.
Rewrite the following using nested switch construct
#include<iostream>
using namespace std;
int main( )
{
int a,b; .
cout << “Enter values for a and b”;
cin << a << b;
if(b==0)
cout << “Divide by zero error”;
else
if (a==0) .
cout << “The result is zero”;
else
cout << “The result is ” << (float)a/b;
}
Answer:
#include<iostream>
using namespace std;
int main( )
{
inta.b;
cout << “Enter values for a and b”;
cin << a << b;
switch (b)
{
case 0:cout << “Divide by zero error”;
break;
default:
switch(a)
{
case 0:cout << “The result is zero”;
break; .
default:
cout << “The result is” << (float)a/b;
}
}
}

Question 6.
Consider the following output and write down the code for the same.
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 4
Answer:
#include<iostream>
using namespace std;
int main( )
{
int i j;
for(i=1;i<5;i++)
{
for(j=1;j<=i;j++)
cout << “*”;
cout << endl;
}
}

Question 7.
Consider the following output and write down the code for the same:
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 5
Answer:
#include<iostream>
using namespace std;
int main( )
{
int i,j;
for(i=1;i<5;i++)
{
forG=1;j<=i;j++) cout << j << “”; cout << endl;
}
}

Question 8.
code for the same.
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 6
Answer:
#include<iostream>
using namespace std;
int main( )
{
int i, j;
for(i=1;i<5;i++)
{
forG=1;j<=i;j++)
cout << i << ” “;
cout << endl;
}
}

Question 9.
Consider the following output and write down the code for the same.
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 7
Answer:
#include<iostream>
using namespace std;
int main( )
{
int i, j, k=0;
for(i=1;i<5;i++)
{
for j=1;j<=i;j++)
cout << ++k << ” “;
cout << endl;
}
}

Question 10.
Consider the following output and write down the code for the same.
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 8
Answer:
#include<iostream>
using namespace std;
int main( )
{
int i,j;
for(i=1;i<5;i++)
{
for(j=1;j<=i;j++)
cout << ++k << ” “;
cout << endl;
}
}

Question 11.
Consider the following output and write dowri the code for the same.
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 9
Answer:
#include<iostream>
using namespace std;
int main( )
{
int i, j;
for(i=1 ;i<5;i++)
{
for(j=i ;j<=i;j++) cout << i*2 << ” “;
cout << endl;
}
}

Question 12.
Write a program to print the sum of first n natural numbers
Answer:
#include<iostream>
using namespace std;
int main( )
{
int n,i,sum=0;
cout << :”Enter a value for n”;
cin << n;
for(i=1;i<=n;i++)
{
sum=sum+i;
}
cout << “The sum of first ” << n << ” numbers is ” << sum;
}

Question 13.
Write a program to read a number and check whether it is palindrome or not.
Answer:
#include<iostream>
using namespace std;
int main( )
{
int n,m,rem,rev=0;
cout << “Enter a number”;
cin << n;
m=n;
while(n)
{
rem=n%10;
rev=rev*10+rem;
n=n/10;
}
if(rev==m)
cout << “The number ” << m << ” is palindrome”;
else
cout << “The number ” << m << ” is not palindrome”;
}

Question 14.
Write a program to print the factorial of a number .
Answer:
#include<iostream>
using namespace std;
int main( )
{
int n,i;
longfact=1; .
cout << “Enter a number”;
cin << n;
for(i=1 ;i<=n;i++) fact=fact*i;
cout << “The factorial of “<;
<n << ” is ” << fact;
}

Question 15.
Write a program to print the Fibonacci series
Answer:
#include<iostream>
using namespace std;
int main( )
{
int n, fib1=0,fib2=1,fib3;
cout << “Enter the limit”;
cin << n;
cout << “The fibonacci series is ”
if(n==1)
cout << fib1 << “,”;
else if(n==2)
cout << fib1 << “,” << fib2 << “,”;
else if (n>2)
{
cout << fib1 << “,” << fib2 << “,”;
fib3=fib1+fib2;
while(fib3<=n)
{
cout << fib3 << “,”;
fib1=fib2;
fib2=fib3; ,
fib3=fib1+fib2;
}
}
else
cout << “lnvalid”;
}

Question 16.
Write a program to read a number and check whether the given number is Armstrong or not
Answer:
#include<iostream>
using namespace std;
int main( )
{
int n,m,rem,cube=0;
cout << “Enter a number”;
cin >> n;
m=n;
while(n)
{
rem=n%10;
cube=cube+rem*rem*rem;
n=n/10;
}
if(cube == m)
cout << “The number ” << m << ” is Armstrong”;
else
cout << “The number ” << m << ” is not Armstrong”;
}

Question 17.
Write down the code for the following output using while loop.
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 10
Answer:
#include<iostream>
using namespace std;
int main( )
{
int i,j;
i=1
while(i<=4)
{
j=1;
while(j<=i)
{
cout << “*”;
j++;
}
i++;
cout << endl;
}
}

Question 18.
Distinguish between entry controlled loop and exit controlled loop.
Answer:
An entry controlled loop first checks the condition and execute(or enters in to) the body of loop only if it is true. But exit control loop first execute the body of the loop once even if the condition is false then check the condition. The for loop and while loop are entry, controlled loops but do- while loop is an exit controlled loop.

Question 19.
Write a program to find the largest of 3 numbers.
Answer:
#include<iostream>
using namespace std;
int main( )
{
int a,b,c;
cout << “Enter three numbers”;
cin << a << b << c;
if (a > b && a > c)
cout << a << ” is large”;
else if (b>a && b>c) cout << b << ” is large”;
else
cout << c << ” is large”;
}

Question 20.
Check whether a given number is prime or not
Answer:
#include<iostream>
using namespace std;
int main( )
{
int n,i;
cout << “Enter a number”;
cin << n;
for(i=2;i<=n/2;i++)
{
if(n%i==0)
{
cout << n << “ is not a prime no.”;
return 0;
}
}
cout << n << “ is a prime”;
}

Question 21.
Write a program to print the prime numbers less than 100
Answer:
#include<iostream>
using namespace std;
int main( )
{
int i,j=4;
cout << “The prime numbers less than 100 is given below\n2,3,”;
while(j<=100)
{
for(i=2;i<=j/2;i++)
if(j%i==0)
break;
if(i==j/2+1)
cout << j << “,H;
j++;
}
}

Question 22.
Write a program to read number and display its factors.
Answer:
#include<iostream>
using namespace std;
int main( )
int n,i;
cout << “Enter a number greater than zero”;
cin << n;
cout << ‘The factors are”;
for(i=1;i<=n;i++)
if(n%i==0)
cout << i << “,”;
}

Question 23.
Write a program to print the Armstrong numbers less than 1000
Answer:
#include<iostream>
using namespace std;
int main( )
{
int n,i,rem,cube; for(i=1;i<=1000;i++)
{
n=i;
cpbe=0;
while(n)
{
rem=n%10;
cube=cube+rem*rem*rem;
n=n/10;
}
if(cube==i)
cout << i << “,”;
}
}

Question 24.
Char result;
float marks;
cin << marks;
if (marks >=50)
result = ‘P’;
else
result = ‘F’;
cout << result;
Rewrite the above code without using if statement.
Answer:
result=(marks>=50) ?’P’:’F’;

Question 25.
The output of a program is given below.
1
3
5
7
9
The sum is 25
Write a C++ program for obtaining the above output.
Answer:
#include<iostream>
using namespace std;
int main( )
{
int sum=0,i;
for (i=*1; i<=9; i+=2)
{
cout << i << endl;
sum=sum+i;
}
cout << ‘The sum is” << sum;
}

Question 26.
Find out the error in syntax if any and correct it?
a) while (test condition);
{
}
b) do (condition)
{
}
while
c) switch(condition)
{
Case 1:
Case 2:
Case 3:
Case 4:
}
Answer:
a) No need of semi colon. The corrected loop is given below
While (test condition)
{
}
b) In do … while loop the while must be end with semicolon.
do (condition)
{
}
while;
c) switch contains expression instead of condition switch(expression)
{
Case 1:
Case 2:
Case 3:
Case 4:
}

Question 27.
Given the total mark of each student in SSLC examination. Write a C++ code fragment to find the grades.
Answer:
#include<iostream>
using namespace std;
int main( )
{
int mark;
cout << “Enter total mark”;
cin << mark;
if (mark>100 || mark<0) cout << “lnvalid mark”;
else
{
If (mark>=90)
cout << “Your grade is A+”;
else if (mark>=80)
cout << “Your grade is A”;
else if (mark>=70)
cout << “Your grade is B+”;
else if (mark>=60)
cout << “Your grade is B”;
else if (mark>=50)
cout << “Your grade is C+”;
else if (mark>=40)
cout<£”Your grade is C”;
else if (mark>=30)
cout << “Your grade is D+”;
else
cout << “Your grade is D”;
}
}

Question 28.
You are given the heights of 3 students. Write the relevant code segment to find the maximum height?
Answer:
#include<iostream>
using namespace std;
int main( )
{
int h1,h2,h3,max;
cout << “Enter heightl cin << h1;
cout << “Enter height2:”;
cin << h2;
cout << “Enter height3:’f;
cin << h3;
if(h1>h2 && h1>h3)
max=h1;
else if(h2>h1 && h2>h3)
maxih2; .
else
max=h3;
cout << “The maximum height is “ << max;
}

Question 29.
Write the easiest code snippet for printing your name 1000 times. Explain
Answer:
#include<iostream>
using namespace std;
int main( )
{
int i;
char name[20];
cout << “Enter your name: cin << ‘name;
for(i=0;i<1000;i++)
cout << name << endl;
}

Question 30.
Given a code segment for(i=1; i<10; i++)
cout << i;
a) Rewrite the code using do while loop
b) What will be the output when i=0? Give reason.
Answer:
a) i=1;
do{
cout << i;
i++; .
}
while(i<10);
b) When i=0, it will execute one more time. ie. the for loop execute 9 times but here this loop executes 10 times.

Question 31.
Whenever a string is entered the inverse of that string is displayed( eg: if we enter-‘CAR’ the output is ‘RAC’). Write a suitable programme for the output.
Answer:
#include<cstdio>
#include<iostream>
#include<cstring>
using namespace std;
int main( )
{
int i, len;
char str[80];
puts(Enter a string :”);
gets(str);
len=strlen(str);
for(i=len-1;i>=0;i–)
putchar(str[i]).;
}

Question 32.
Qn. 32
Write a C++ program to display as follows
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 11
Answer:
#include<iostream>
using namespace std;
int main( )
{
char i,j;
for(i=’A’.;i<‘F’;i++)
{
for(j=’A’;j<=i;j++)
cout << j << “\t”;
cout << endl;
}
}
OR
#include<iostream>
using namespace std;
int main( )
{
int i,j;
for(i=65;i<70;i++)
{
‘ for(j=65;j<=i;j++)
cout << (char)j << “\t”;
cout << endl;
}
}

Question 33.
Write C++ program forgetting the following output.
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 12
OR
Consider the following C++ program and answer the following questions.
#include<iostream.h>
int main( )
{
int a, p=1;
for(a=1;a<=5;a+=2)
P = P*a;
cout << p;
}
a) Predict the output of the above code.
b) Rewrite the above program using while loop.
Answer:
#include<iostream>
using namespace std;
int main( )
{
int i, j;
for(i=1;i<=4;i++)
{
for j=1;j<=i;j++)
cout << j << “\t”;
cout << “\n”; ‘
}
}
OR
a) The output is 15.
b) #include<iostream>
using namespace std;
int main( )
{
inta=1,p=1;
while(a<=5)
{
p=p*a;
a+=2;
}
cout << p;
}

Plus One Computer Application Control Statements 5 Marks Questions and Answers

Question 1.
We know that the execution of a program is sequential”. Is it possible to change this sequential manner and explain different jump statements in detail. .
Answer:
The execution of a program is sequential but we can change this sequential manner by using jump statements. The jump statements are

1. goto statement: By using goto we can transfer the control anywhere in the program without any condition. The syntax is goto label;
Eg.
#include<iostream>
using namespace std; int main( )
{
float a,b;
cout << “Enter 2 numbers”;
cin << a << b; . .
if(b==0)
goto end;
cout << “The quotient is ” << a/b;
return 0;
end:
cout << “Division by zero error”;
}

2. break statement: It is used to skip over a part of the code i.e. we can premature exit from a loop such as while, do-while, for or switch.
Syntax :
while (expression)
{
if (condition)
break;
}
Eg.
#include<iostream>
using namespace std;
main( )
{
int i=1;
while(i<10)
{
cout << i << endl;
if(i==5) break;
i++;
}
}
The output is
1
2
3
4
5

3. continue statement : lt bypasses one iteration of the loop.
Syntax :
while (expression)
{
if (condition)
break;
}
Eg:
#include<iostream>
using namespace std;
main( )
{
int i=0;
while(i<10)
{
i++; .
if(i==5) continue;
cout << i << endl;
}
}
The output is
1
2
3
4
5
6
7
8
9
10
4. exit(0) function: It is used to terminate the pro-gram. For this the header file cstdlib must be included.

Question 2.
Mr. X wants to get an output 9 when inputting 342 and he also wants to get 12 when inputting 651. Write the program and draw a suitable flowchart forX?
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 7 Control Statements 13
#include<iostream>
using namespace std;
int main( )
{
int n,rem,sum=0;
cout << “Enter a number”;
cin << n;
while(n)
{
rem=n%10;
sum=sum+rem;
n= n /10;
}
cout << “The sum of digits is ” << sum;
}

Question 3.
Explain conditional statements in detail?

Answer:
1. Simple if:- The syntax is given below
if(expression)
statement;
or
if(expression)
{
Block of statements
}
First expression evaluates if it is true then only statement will be executed.
Eg. if (n>0)
cout << n << ” is positive”;

2. if else :-The syntax is given below,
if (expression)
statement 1;
else
statement 2;
or
if (expression)
{
statement block 1;
}
Else
{
statement block 2;
}
First expression evaluates if it is true statement block 1 will be executed otherwise statement block 2 will be executed. Only one block will be executed at a time so it is called branching statement.
Eg.
if (n>0)
cout << n << ” is positive”;
else
cout << n << ” is negative”;

3. if else if ladder:- The syntax will be given below
if (expression 1)
{
statement block 1;
else if (expression 2)
{
statement block 2;
}
else if (expression 3)
{
statement block 3;
}
else
{
statement block n;
}
Here first expression 1 will be evaluated if it is true only the statement block 1 will be executed otherwise expression 2 will be executed if it is true only the statement block2 will be executed and so on. If all the expression evaluated is false then only statement block n will be evaluated .
Eg.
If (mark>=90)
cout << “Your grade is A+”;
else if (mark>=80)
cout << “Your grade is A”;
else if (mark>=70)
cout << “Your grade is B+”;
else if (mark>=60)
cout << “Your grade is B”;
else if (mark>=50)
cout << “Your grade is C+”;
else if (mark>=40)
cout << “Your grade is C”;
else if (mark>=30)
cout << “Your grade is D+”;
else
cout << “Your grade is D”;

4. conditional operator:- It is a ternary operator and it is an alternative for if else construct.
The syntax is given below.
expression 1? expression 2: expression 3;
OR
expression 1? Value if true : value if false;
Here expression 1 will be evaluated if it true expression 2 will be executed otherwise expression 3 will be executed.
Eg.
n>0?cout << n << ” is positive”:cout << n << ” is negative”;

5. Switch It is a multiple branch statement. Its syntax is given below.
switch(expression)
{
case value: statements;break;
case value: statements;break;
case value: statemerits;break;
case value: statements;break;
case value: statements;break;
………….
default : statements;
}
First expression evaluated and selects the statements with matched case value.
Eg.
switch(n)
{
case 1: cout << “Sunday”;break;
case 2: cout << “Monday”;break;
case 3: cout << “Tuesday”;break;
case 4: cout << “Wedesday”;break;
case 5: cout << “Thursday”;break;
case 6: cout << “Friday”;break;
case 7: cout << “Saturday”;
break;
default : cout << “lnvalid”
}

Question 4.
Explain different loops in detail?
Answer:
1. For loop: The syntax of fbr loop is for(initialization; checking ; update loop variable)
{
Body of loop;
}
First part, initialization is executed once, then checking is carried out if it is true the body of the for loop is executed. Then loop variable is updated and again checking is carried out this process continues until the checking becomes false. It is an entry controlled loop.
Eg. for(i=1,j=1;i<=10;i++,j++)
cout << i << ” * ” << j << ” = ” << i*j;

2. While loop : It is also an entry controlled loop The syntax is given below
Loop variable initialised
while(expression)
{
Body of the loop;
Update loop variable;
}
Here the loop variable must be initialised out side the while loop. Then the expression is evaluated if it is true then only the body of the loop will be executed and the loop variable must be updated inside the body. The body of the loop will be executed until the expression becomes false.
Eg.
i=1;
j=1;
while(i<=10)
{
cout << i << ” * ” << j << ” = ” << i*j;
i++;
j++;
}

3. do While loop: It is an exit controlled loop. The syntax is given below do
{
Statements
}while(expression);
Here the body executes atleast once even if the condition is false. After executing the body it checks the expression if it false it quits the body otherwise the process will be continue.

Question 5.
Write a program to do the following:
a) Inputs the values for variables ‘n’ and’m’.
b) Prints the numbers between ‘1 ’ and ‘n’which are exactly divisible by ‘m’.
c) Checks whether the numbers divisible by ‘m’ are odd or even.
OR
Write a program using nested loop that inputs a number ‘n’ which generates an output as follows. Hint: if the value of ‘n’ is 5, the output will be as ‘n’.
—–
Answer:
b) #include<iostream.h>
#include<conio.h>
void main( )
{
clrscr( );
int i,n,m;
cout << “Enter values for n and m”;
cin << n << m;
for(i=1;i<=n;i++)
if(i%m==0)
cout << i << “,”;
getch( );
}

c) #include<iostneam.h>
#include<conio.h>
void main( )
{
clrScr( );
int i,n,m;
cout << “Enter values for n and m”;
cin << n << m;
for(i=1;i<=n;i++)
if(i%m==0)
{
cout << i << “\t”;
if(i%2==0)
cout << “even” << endl;
else
cout << “odd” << endl;
}
getch( ):
}
OR
#include<iostream.h>
#include<conio.h>
#include<string.h>//forstrlen( )
main( )
{
clrscr( );
int n,i,j;
cout << “enter a value for n:“;
cin >> n;
for(i=n;i>0;i–)
{
for(j – n;j > =i;j—) .
cout << j*j << “\t”;
cout << endl;
}
getch( );
}

Question 6.
Write a C++ program to display Fibonacci series.
Answer:
#include<iostream>
using namespace std;
int main( )
{
int n,fib1=0,Fib2=1,fib3;
cout << “Enter the limit”;
cin << n;
cout << “The fibonacci series is”;
if(n==1)
cout << fib1 << “,”;
else if(n==2)
cout << fib1 << “,” << fib2 << “,”;
else if (n>2)
{
cout << fib1 << “,” << fib2 << “,”;
fib3=fib1 +fib2; while(fib3<=n)
{
cout << fib3 << “,”;
fib1=fib2;
fib2=fib3;
fib3=fib1+fib2;
}
}
else
cout << “lnvalid”;
}

Question 7.
Write a C++ program to aocept an integer number and check whether it is an Armstrong number or not.
(Hint: Sum of the cubes of the digits of an Armstrong number is equal to that number itself)
OR
Write a C++ program to accept an integer number and print its reverse
(Hint: If 234 is given, the output must be 432).
Answer:
#include<iostream>
using namespace std;
int main( )
{
int n,m,rem,cube=0;
cout << “Enter a number”;
cin << n;
m=n;
while(n)
{
rem=n%10;
cube=cube+rem*rem*rem;
n=n/10;
}
if(cube==m)
cout << “The number ” << m << ” is Armstrong”;
else
cout << “The number ” << m << ” is not Armstrong”;
}
OR
(b) # include<iostream>
void main ( )
{
int n, rem, rev = 0;
cout << “Enter a number:”;
cin << n;
while (n)
{
rem = n%10;
rev = rev*10+rem;
n = n/10;
}
cout << “The reverse is” << rev;
}

Question 8.
Write a menu driven program which accepts 3 numbers and show options to find and display.
a) (i) the biggest number
(ii) the smallest number
(iii) the sun of the numbers
(iv) the product of the numbers
OR
b) Write a C++ program to check whether a number is palindrome or not.
Answer:
#include<iostream>
using namespace std;
int big (int n1, int n2, int n3)
{
if (n1>n2 && n1>n3)
return n1;
else if (n2>n1 && n2>n3)
return n2;
else
return n3;
}
int small (int n1, int n2; int n3)
{
if (n1<n2 && n1 < n3) return n1;
else if (n2<n1 && n2<n3)
return n2;
else
return n3;
}
int sum (int n1, int n2, int n3)
{
return (n1+n2+n3);
}
int prod (int n1, int n2, int n3)
{
return (n1*n2*n3);
}
void main ( )
{
\ intx,y,z,ch;
cout << “Enter 3 nos”;
cin << x << y << z;
cout << “Enter 1 for the biggest numebr”;
cout << “\n 2 for the smallest number”;
cout << “\n 3 for the sum of numbers”;
cout << “\n4 for the product of numbers”;
cout << “\n Enter your choice:”;
cin << ch;
switch (ch)
{
case 1 : cout << “The biggest number is” << big(x,y,z);
break; .
case 2 : cout << “The smallest number is” << small(x,y,z);
break;
case 3: cout << “The sum of number is” << big(x,y,z);
break;
case 4 : cout << “The product is” << prod(x,y,z);
break;
default: cout << “lnvalid choice”;
}
}
OR
b) #include<iostream>
using namespace std;
int main( )
{
int n,m,rem,rev=0;
cout << “Enter a number”;
cin << n;
m=n;
while(n)
{
rem=n%10;
rev=rev*10+rem;
n=n/10;
}
if(rev==m)
cout << “The number ” << m << ” is palindrome”;
else
cout << ”The number ” << m << ” is not palindrome”;
}

Question 9.
Answer any one question from (a) and (b).
a) Write a C++ program to display all leap years between 1000 and 2000 excluding all century years.
OR
b) Write a C++ program to find the sum of the first 10 numbers of Fibonacci series. (Fibonacci series is 0, 1, 1, 2, 3, 5, 8, 15 where 0 and,1 are the first two terms-and remaining terms are obtained by the sum of the two preceding terms.)
Answer:
a) # include < iostream>
using namespace std;
int main ( )
{
int i;
cout << “Leap years between 1000 and 2000 is given below \n”;
for (i= 1000; i<= 2000; i++)
{
if (i % 100 = = 0)
{
if (i % 400 == 0) cout << i << “, ”;
} else if (i % 4 = = 0) cout << i << “, ”;
}
}
OR
b) # include < iostream>
using namespace std;
void main ( )
{
int i, fib1 = 0, fib2 = 1, fib3, S ;
S = fib1+fib2;
for (i = 1; i <= 8; i + +)
{
fib3 = fib1 + fib2;
S = S + fib3;
fib1 = fib2; fib2 = fib3;
}
cout << “The sum of first 10 numbers of Fibonacii series is” << s;
}

Question 10.
Write a program to check whether the given number is palindrome or not.
OR
Write a program to print the leap years between 2000 and 3000.
(A century year is leap year only if it is divided by 400 and a noncentury year is leap year only if it is divided by 4.
Answer:
#include<iostream>
using namespace std;
int main( ) ‘{
int n,m,rem,rev=0; cout << “Enter a number”; cin << n;
m=n; while(n)
{
rem=n%10;
rev? rev*10+rem;
n=n/10;
}
if(rev==m)
cout << “The number “ << m << “ is palindrome”;
else
cout << “The number “ << m << “ is, not palindrome”; .
}
OR
#include<iostream>
using namespace std;
int main( )
{
int year;
for(year=2000;year<=3000;year++)
{
if(year%100==0)
{
if(year%400==0)
cout << year << endl;
}
else
{
if(year%4==0)
cout << year << endl;
}
}
}

Plus One Computer Application Chapter Wise Questions Chapter 6 Introduction to Programming

Students can Download Chapter 6 Introduction to Programming Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions Chapter 6 Introduction to Programming

Plus One Computer Application Introduction to Programming 1 Mark Questions and Answers

Question 1.
From the following which is ignored by the compiler
a) statement
b) comments
c) loops
d) None of these
Answer:
b) comments

Question 2.
Multi line comment starts with ____ and ends with
a) /’ and’/
b)*/and/*
c) /* and*/
d)’/ and /’
Answer:
c) /* and*/

Question 3.
Single line comment starts with _____.
a) **
b)@@
c) */
d) //
Answer:
d) //

Question 4.
Alvin wants to store the value of π From the following which is correct declaration
a) char pi=3.14157
b) const int pi=3.14157
c) const float pi=3.14157
d) long pi=3.14157
Answer:
c) const float pi=3.14157

Question 5.
To store 70000 which modifier is used with int.
a) long
b) short
c) big
d) none of these
Answer:
a) long

Question 6.
To store 60000 which modifier is used with int.
a) unsigned
b) short
c) big
d) none of these
Answer:
a) unsigned

Question 7.
Consider x++(post fix form). Select the correct definition from the following
a) The operation is performed after the value is . used
b) The operation is performed before the value is used
c) First change then use
d) None of these
Answer:
a) The operation is performed after the value is used

Question 8.
Consider ++x(pre fix form). Select the correct definition from the following
a) The operation is performed after the value is used
b) The operation is performed before the value is used
c) First use then change
d) None of these
Answer:
b) The operation is performed before the value is used

Question 9.
Consider the following
int a=10;
float b=4;
cout<<a/b;
We know that the result is 2.5 a float. What type of conversion is this ?
a) type promotion
b) type casting
c) explicit conversion
d) None of these
Answer:
a) type promotion(implicit conversion)

Question 10.
From the following which has the major priority?
a) ++
b) =
c) ==
d) &&
Answer:
++

Question 11.
From the following which has the major priority?
a) ++
b) =
c) ==
d) &&
Answer:
++

Qn. 11
One of your friend told you that post increment (eg:x++) has more priority than, pre increment (eg: ++x).
State True / False
Answer:
It is true.

Question 12.
Emerin wants to store a constant value. Which key word is used for this?
Answer:
constant.

Question 13.
Suppose x= 5. Then cout<<x++ displays _____.
Answer:
Here post increment first use the value then incremented

Question 14.
Suppose x= 5. Then cout<<++x displays _____.
Answer:
6. Here pre increment first incremented and then use the value.

Question 15.
Pick the odd one out :
a) long
b) short
c) unsigned
d) int
Answer:
d) int. it is fundamental data type and the others are type modifiers

Question 16.
Memory size and sign can be changed using ______ with fundamental data types.
Answer:
Type modifiers

Question 17.
“Its value does not change during execution”. What is it?
Answer:
constant.

Question 18.
“BVM HSS” is called ______.
а) integer constant
b) float constant
c) string constant
d) None of these
Answer:
c) string constant

Question 19.
he address of a variable is called ______.
Answer:
L-value (Location value) of a variable

Question 20.
The content of a variable, is called _____.
Answer:
R-value (Read value) of a variable

Question 21.
Suppose the address of a variable age is 1001 and the content i.e. age = 33. Then what is R-value and L-value?
Answer:
R-value is 33 and L-value is 1001

Question 22.
is it possible to declare a variable as and when a need arise . What kind of declaration is this ?
Answer:
Yes.lt is known as Dynamic declaration

Question 23.
In the following program, some lines are missing. Fill the missing lines and complete it.
#include<iostream.h>
{
4 int num1, num2, sum;
Cout<<“Enter two numbers:”;
…………..
…………
Cout<<“sum of numbers are=”<<sum;
}
Answer:
The correct program is given below.
#include<iostream>
using namespace std;
int main( )
{
int num1,num2,sum;
cout<<“Enter two numbers:”;
cin>>num1>>num2;
sum=num1+num2;
cout<<“Sum of numbers are=”<<sum;
}

Question 24.
The following program finds the sum of three numbers. Modify the program to find the average. . (Average should display fractional part also.)
#include<iostream>
using namespace std;
int main ( )
{
int x, y, z, result;
cout<<“Enter values for x, y, z”;
cin>>x>>y>>z;
result=x+y+z;
cout<<“The answer is =”<<result;
return 0;
}
Answer:
float result
result = (x + y + z) / 3.0;

Question 25.
Some of the C++ statements given below are invalid. ,
i) cin>>m, n;
ii) a + b = c;
iii) void p;
iv) cout<<28;
Identify them from the following alternatives:
a) Statement (i) and (ii) only
b) Statement (Ii) and (iii) only
c) Statement (i), (ii) and (iii) only
d) All the statements
Answer:
c) Statement (i); (ii) and (iii) only

Question 26.
Which one of the following is NOT a valid C++ statement?
a) x = x+ 10;
b) x + = 10;
c)x+10 = x;
d) x=10 + x;
Answer:
c)x+10 = x;

Plus One Computer Application Introduction to Programming 2 Marks Questions and Answers

Question 1.
What do you mean by pre processor directive?
Answer:
A C++ program starts with the pre processor directive i.e., # include, #define, #undef, etc, are such a pre processor directives. By using #include we can link the header files.that are needed to use the functions. By using #define we can define some constants.
Eg: #define x 100.
Here the value of x becomes 100 and cannot be changed in the program.

Plus One Computer Application Introduction to Programming 3 Marks Questions and Answers

Question 1.
We know that a program has a structure. Explain the structure of C++program.
Answer:
A typical C++ program would contain four sections as shown below.
Include files
Function declarations
Function definitions
Main function programs
Eg:
#include<iostream>
using namespace std;
int sum(int x, int y)
{
return (x+y);
}
int main( )
{
cout<<sum(2,3);
}

Question 2.
Write a program to print a message as” Hello, Welcome to C++”.
Answer:
#include<iostream>
using namespace std;
int main( )
{
cout<<” Hello, Welcome to C++”;
}

Question 3.
Following is a sample C++ program. Identify the errors if any in the structure. Correct the program..
#include<iostream>
using namespace std;
int main [ ]
{
*/ It is a simple program */
Cout<< “Welcome to C++”
Cout<< “The End” .
}
Answer:
The multi line comment used in this program is wrong. So the correct code is as follows
#include<iostream>
using namespace std;
int main ( )
{
/* It is a simple program */
cout<< “Welcome to C++”
cout<< “\nThe End”
}

Question 4.
Write a program to read two numbers and find its sum.
Answer:
#include<iostream>
using namespace std;
int main( )
{
int n1,n2,sum;
cout<<“Enter two numbers”;
cin>>n1>>n2;
sum=n1+n2;
cout<<“The sum of “<<n1<<” and “<<n2<<” is “<<sum;
}

Question 5.
Write a program to read three scores and find the average.
Answer:
#include<iostream>
using namespace std;

int main( )
{
ints1,s2,s3;
float avg;
cout<<“Enter the three scores”;
cin>>s1>>s2>>s3;
avg=(s1 +s2+s3)/3.0;
cout<<“The average CE score is “<<avg;
}

Question 6.
Write a program to find the area and perimeter of a circle.
Answer:
#include<iostream>
using namespace std;
int main( )
{
const float pi=3.14157;
float r,area,perimeter;.
cout<<“Enter the radius of a circle”;
cin>>r;
area=pi*r*r;
perimeter= 2*pi*r;
cout<<“Area of the circle is”<<area<<“\nPerimeter of the circle is “<<perimeter;
}

Question 7.
Write a program to find the simple interest.
Answer:
#include<iostream>
using namespace std; ,
int main( )
{
float p,n,r,si;
cout<<“Enter the Principal amount”;
cin>>p;
cout<<“Enter the number of years”;
cin>>n;
cout<<“Enter the rate of interest”;
Cin>>r;
si=p*n*r/100;
cout<<“Simple interest is “<<si;

Question 8.
Write a program to convert temperature from Celsius to Fahrenheit.
Answer:
#include<iostream>
using namespace std;
int main( )
{
float c,f;
cout<<“Enter the Temperature in Celsius:”;
cin>>c;
f=1,8*c+32;
cout<<c<<” Degree Celsius = “<<f<<” Degree Fahrenheit”;
}

Question 9.
Write a program to read weight in grams and convert it into Kilogram.
Answer:
#include<iostream>
using namespace std;
int main( )
{
float gm.kg;
cout<<“Enter the weight in grams:”;
cin>>gm; kg=gm/1000;
cout<<gm<<” grams = “<<kg<<” Kilograms”;
}

Question 10.
Write a program to generate the following table.
Plus One Computer Application Chapter Wise Questions Chapter 6 Introduction to Programming 3
Use a single cout statement for output
Answer:
#include<iostream>
using namespace std;
int main( )
{
cout<<“2013\t100%\n2012\t99.9%\n2011 \t95.5%\n2010\ t90.81 %\n2009\t85%”;
getch( );
}

Question 11.
Write a program to read your height in meter and cm convert it into Feet and inches
Answer:
#include<iostream>
using namespace std;
int main( )
{
int m,cm;
float inch;
int feet;
cout<<“Enter your height in Centimeter:”;
cin>>cm;
cout<<” Your height is “<<cm/100<<” Meters and “<<cm%100<<” cm \n”;
inch=cm/2.54;
feet=inch/12;
inch=(int)inch%12;
cout<<feet<<“feet and”<<inch<<” inch”;
}

Question 12.
Write a program to find the area of a triangle Triangle .
Answer:
#include<iostream>
using namespace std;
int main( )
{
intb,h;
float area;
cout<<“Enter values for b and h”;
cin>>b>>h;
area=0.5*b*h;
cout<<“The area of the triangle is “<<area;
}

Question 13.
Write a program to find simple interest and compound interest.
Answer:
#include<iostream>
using namespace std;
#include<cmath>
int main( )
{
float p,n,r,si,ci;
cout<<“Enter the Principal amount”;
cin>>p;
cout<<“Enter the number of years”;
cin>>n;
cout<<“Enter the rate of interest”;
cin>>r;
si=p*n*r/100;
ci=p*pow((1+r/100),n)-p;
cout<<“Simple interest is “<<si;
cout<<“\nThe compound interest is “<<ci;
}

Question 14.
Write a program to
i) print ASCII for a given digit
ii) print ASCII for backspace.
Answer:
#include<iostream>
using namespace std;
int main( )
{
char ch;
intasc.bak;
cout<<“Enter a digit:”;
cin>>ch;
asc=ch;
cout<<“ASCII for “<<ch<<” is “<<asc;
bak=’\b’;
cout<<“\nASCII for backspace is “<<bak;
}

Question 15.
Write a program to read time in seconds and convert it into hours, minutes and seconds .
Answer:
#include<iostream>
using namespace std;
int main( )
{
long h,m,s;
cout<<“Enter the time in seconds:”;
cin>>s;
h=s/3600;
s=s%3600;
m=s/60.;
s=s%60;
cout<<h<<” hr:”<<m<<” min:”<<s<<” secs”;
}

Question 16.
Consider the following ‘
int a=45.65;
cout<<a;
What is the output of the above. Is it possible to convert a data type to another type? Explain.
Answer:
The output of the code is 45, the floating point number is converted into integer. It is possible to convert a data type into another data type. Type conversions are two types.
1) Implicit type conversion : This is performed by C++ compiler internally. C++ converts all the lower sized data type to the highest sized operand. It is known as type promotion. Data types are arranged lower size to higher size is as follows, unsigned int(2 bytes) ,int(4 bytes),long(4 bytes) , unsigned long(4 bytes), float(4 bytes), double(8 bytes), long double(10 bytes)

2) Explicit type conversion : It is known as type casting. This is done by the programmer. The syntax is given below.
(data type to be converted) expression
Eg. intx=10;
(float)’x; This expression converts the data type of the variable from integer to float.

Question 17.
Match the following numbers and data types in C++ to form the most suitable pairs.

1)142789a)Signed
2)240b)Double
3)-150c)Long int
4)8.4×10-4000d)Float
5)0e)Long double
6)0.0008f)Unsigned short
7)-127g)Short int
8)2.8×10308h)Signed char

Answer:

1)142789a)Long int
2)240b)Short int
3)-150c)Signed
4)8.4×10-4000d)Long double
5)0e)Unsigned short
6)0.0008f)Float
7)-127g)Signed char
8)2.8×10308h)Double

Question 18.
Determine the data type of the following expression.
If a is an int, b is a float, c is a long int and d is a double
\(\frac{(1-a c)^{25}}{(c-d)}+\frac{(b+a) / c}{(l o n g)(a+d)}\)
Answer:
In type promotion the operands with lower data type will be converted to the highest data type in the expression. So consider the following,
Plus One Computer Application Chapter Wise Questions Chapter 6 Introduction to Programming 2
=double + long
= double (Which is the highest data type)

Question 19.
What is implicit type conversation? Why it is called type promotion?
Answer:
Type conversion : Type conversions are of two types.
1) Implicit type conversion: This is performed by C++ compiler internally. C++ converts all the lower sized data type to the highest sized operand. It is known as type promotion. Data types are arranged lower size to higher size is as follows, unsigned int(2 bytes), int(4 bytes),long (4 bytes) , unsigned long (4 bytes), float(4 bytes), double(8 bytes), long double(10 bytes)

Question 20.
Area of a circle is calculated using the formula πr², where π =3.14 and r is the radius of the circle. Fill in the blanks in the following program which finds the area of a circle.
void main ( )
{
int area,‘rad;
cout<<“Enter the radius”;
cin ………..
area = …………
cout …………
}
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 6 Introduction to Programming 1

Question 21.
With the help of an example, explain type casting in C++ programs?
Answer:
The output of the code is 45, the floating point number is converted into integer. It is possible to convert a data type into another data type. Type conversions are two types.
1) Implicit type conversion : This is performed by C++ compiler internally. C++ converts all the lower sized data type to the highest sized operand. It is known as type promotion. Data types are arranged lower size to higher size is as follows.
unsigned int(2 bytes) ,int(4 bytes),long(4 bytes) , unsigned long(4 bytes), float(4 bytes), double(8 bytes), long double(10 bytes)

2) Explicit type conversion : It is known as type casting. This is done by the programmer. The syntax is given below.
(data type to be converted) expression .
Eg. int x=10;
(float) x; This expression converts the data type of the variable from integer to float.

Question 22.
Comments in a program are ignored by the complier. Then why should we include comments? Write the methods of writing comments in a C++ program.
Answer:
To give tips in between the program comments are used. A comment is not considered as the part of program and cannot be executed. There are 2 types of comments single line and multiline.
Single line comment starts with //(2 slashes) but multi line comment starts with /* and ends with */

Question 23.
if A = 5, B = 4, C = 3, D = 4, then what is the result in X after the following operation?
X=A+B-C*D
OR
Is there any difference between (a) and (b) by considering the following statement?
char Gender;
a) Gender = ‘M’;
b) Gender = “M”;
Answer:
X=A+B-C*D
=5+4-3*4
=5+4-12(Reason :Multiplication has more priority than addition and subtraction).
=9-12
= – 3
OR
a) character constant ‘M’ is stored in the variable Gender.
b)“M” is a string constant hence it cannot be assigned by using an assignment operator. Use string function as follows strcpy(Gender,”Mn);

Plus One Computer Application Introduction to Programming 5 Marks Questions and Answers

Question 1.
Two pairs C++ expressions are given below.
i) a=10 a==10
ii) b=a++, b=++a
a) How do they differ?
b) What will be the effect of the expression ?
Answer:
i) = is an assignment operator that assigns a value 10 to the LHS (Left Hand Side)variable a But == is equality operator that checks whether the LHS and RHS are equal or not. If it is equal it returns a true value otherwise false .
ii) In a++ , ++ is a post(means after the operand) increment operator and in ++a, ++ is a pre(means before the operand) increment operator. They are entirely different.
Post increment
Here first use the value of ‘a’ and then change the value of ‘a’.
Eg: if a=10 then b=a++. After this statement b=10 and a=11
Pre increment
Here first change the value of a and then use the value of a.
Eg: if a=10 then b=++a. After this statement b=11 anda=11

Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators

Students can Download Chapter 5 Data Types and Operators Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions  Chapter 5 Data Types and Operators

Plus One Computer Application Data Types and Operators 1 Mark Questions and Answers

Question 1.
________ is the main activity carried out in computers
Answer:
Data processing

Question 2.
The data used in computers are different. To differentiate the nature and size of data _____is used.
Answer:
Data types

Question 3.
Classify the following data types.
int
array
function
char
pointer
void
float
double
structure
Answer:
Fundamental data types
int
float
double
void
char
Derived data types
array
function
pointer
structure

Question 4.
Sheela wants to store her age. From the following which is the exact data type.
a) void
b) char
c) int
d) double
Answer:
c) int

Question 5.
Integer data type uses Integer data type ;
a) 5
b) 2
c) 3
d)4
Answer:
d)4

Question 6.
char data type uses ______ bytes of memory
a) 1
b) 3
c) 7
d) 8
Answer:
a)1

Question 7.
From the following which data type uses 4 bytes of memory
a) float
b) short
c) char
d) double
Answer:
a) float

Question 8.
Expand ASCII _______.
Answer:
American Standard Code for Information Inter-change

Question 9.
Ramu wants to store the value of From the fol-lowing which is correct declaration
a) char pi=3.14157
b) int pi=3.14157
c) float pi=3.14157
d) long pi=3.14157
Answer:
c) float pi=3.14157

Question 10.
From the following which is not true , to give a variable name.
a) Starting letter must be an alphabet
b) contains digits
c) Cannot be a key word
d) special characters can be used
Answer:
d) special characters can be used

Question 11.
Pick a valid variable name from the following
a) 9a
b) float
c)age
d) date of birth
Answer:
c)age

Question 12.
To perform a unary operation how many number of operands needed?
a) 2
b)3
c) 1
d) None of these
Answer:
c) 1 (Unary means one)

Question 13.
To perform a binary operation how many number of operands needed?
a) 2
b) 3
c) 1
d) None of these.
Answer:
a) 2 (binary means two)

Question 14.
To perform a ternary operation how many number of operands needed?
a) 2
b) 3
c) 1
d) None of these.
Answer:
b) 3 (eg: ternary means three)

Question 15.
In C++ 13% 26 =
a) 26
b) 13
c) 0
d) None of these
Answer:
% is a mod operator i.e, it gives the remainder. Here the remainder is 13.

Question 16.
In C++ 41/2 =
a) 20.5
b) 20
c) 1
d) None of these
Answer:
b) 20. (The actual result is 20.5 but both 41 and 2 are integers so .5 must be truncated)

Question 17.
++ is a ______ operator
a) Unary
b) Binary
c) Ternary
d) None of these
Answer:
a) Unary.

Question 18.
Conditional operator is ______ operator
a) Unary
b) Binary
c) Ternary
d)None of these
Answer:
c) Ternary

Question 19.
% is a operator ______.
a) Unary
b) Binary
c) Ternary
d) None of these
Answer:
b) Binary

Question 20.
State true or false:
a) Multiplication, division, modulus have equal priority.
b) Logical and (&&) has less priority than logical or ( )
Answer:
a) True
b) False

Question 21.
_____ is composed of operators and operands.
a) expression
b) Key words
Identifier
d) Punctuators
Answer:
a) expression

Question 22.
Supply value to a variable at the time of declaration is known as _____.
Answer:
Initialisation

Question 23.
From the following which is initialisation
a) int k;
b)int k=100;
c) int k[10];
d) None of these
Answer:
b) int k=100;

Question 24.
State True / False
In an expression all the operands having lower size are converted(promoted) to the data type of the highest sized operand.
Answer:
True

Question 25.
Classify the following as arithmetic / Logical expression
a) x+y*z
b) xz
c) x/y
d) x>89 || y<80
Answer:
a) and c) are Arithmetic
b) and d) are Logical

Question 26.
Suppose x=5 and y=2 then what will be cout<<(float) x/y
Answer:
2.5 The integer x is converted to float hence the result.

Question 27.
Consider the following.
a = 10;
a =100;
Then a =
a) a = 100
b) a = 50
c)a = 10
d) a = 20
Answer:
a) a = 100. This short hand means a = a*10

Question 28.
Consider the following.
a=10 ;
a+=10;
Then a=
a) a= 30
b) a= 50
c)a=10
d) a=20
Answer:
d) a=20. This short hand means a=a+10

Question 29.
Pick the odd one out
a) structure
b) Array
c) Pointer
d) int
Answer:
d) int, it is fundamental data type the others are derived data types

Question 30.
From the following select not a character of C++ language
a) A
b) 9
c)\
d)@
Answer:
d)@

Question 31.
Consider the following
float x=25.56; cout<<(int)x; Here the data type of the variable is converted. What type of conversion is this?
a) type promotion
b) type” casting
c) implicit conversion
d) None of these
Answer:
b) type casting (explicit conversion)

Question 32.
Identify the error in the following C++ statement and correct it.
Answer:
The maximum number that can store in short type is less than 32767. So to store 68000 we have to use long data type.

Question 33.
Consider the following statements in C++ if(mark>=18)
cout<<“Passed”; ’
else ,
cout<<“Failed”;
Suggest an operator in C++ using which the same , output can be produced.
Answer:
Conditional operator (?:)

Plus One Computer Application Data Types and Operators 2 Marks Questions and Answers

Question 1.
Analyses the following .statements and write True or False. Justify
i) There* is an Operator in C++ having no special character in it
ii) An operator cannot have more than 2 operands
iii) Comma operator has the lowest precedence
iv) All logical operators are binary in nature
v) It is not possible to assign the constant 5 to 10 different variables using a single C++ expression
vi) In type promotion the operands with lower data , type will be converted to the highest data type in expression.
Answer:
i) True (size of operator)
ii) False( conditional operator can have 3 operands
iii) True
iv) False
v) False(Multiple assignment is possible,
eg: a=b=c=…..= 5
vi) True

Question 2.
Consider the following declaration.
const int bp;
bp = 100;
Is it valid? Explain it?
Answer:
This is not valid. This is an error. A constant variable cannot be modified. That is the error and a constant variable must be initialised. So the correct declaration js as follows, const int bp=100;

Question 3.
Consider the following statements in C++
1) cout<<41/2;
2) cout<<41/2.0; Are this two statements give same result? Explain?
Answer:
This two statements do not give same results. The first statement 41/2 gives 20 instead of 20.5. The reason is 41 and 2 are integers. If two operands are integers the result must be integer, the real part must be truncated. To get floating result either one of the operand must be float. So the second statement gives 20.5. The reason is 41 is integer but 2.0 is a float.

Question 4.
If mark = 70 then what will be the value of variable result in the following result = mark > 50 ? ’P’: ‘F’;
Answer:
The syntax of the conditional operator is given below Condition? Value if true: Value if false;
Here the conditional operator first checks the condition i.e.,70>50 it is true. So ‘P’ is assigned to the variable result.
So the result is ‘P’

Question 5.
Is it possible to initialise a variable at the time of execution. What kind of initialisation is this? Give an example
Answer:
Yes it is possible. This is known as Dynamic initialisation.. The example is given below
Eg: int a=10,b=5;
int c=a*b;
here the variable c is declared and initialised with the value 10*5.

Question 6.
Boolean data type is used to store True / False in C++. Is it true? Is there any data type Called Boolean in C++?
Answer:
No there is no data type for storing boolean value true / false.
But in C++ non -zero (either negative or positive) is treated as true and zero is treated as false.

Question 7.
Consider the following
n=-15;
if (n)
cout<<“Hello”;
else
cout<<“hai”;
What will be the output of the above code?
Answer:
The Output is Hello, because n = – 15 a non zero number and it is treated as true hence the result.

Question 8.
Is it possible to declare a variable in between the program as and when the need arise.? Then what is it?
Answer:
Yes it is possible to declare a variable in between the program as and when the need arise. It is known as dynamic initialisation.
Eg. int x=10,y=20;
…………..;
…………
int z=x*y

Question 9.
char ch;
cout<<“Enter a character”; cin>>ch;
Consider the above code, a user gives 9 to the variable ‘ch’. Is there any problem? Is it valid?
Answer:
There is no problem and it is valid since 9 is a character. Any symbol from the key board is treated as a character.

Question 10.
“With the same size we can change the sign and range of data”. Comment on this statement.
Answer:
With the help of type modifiers we can change the sign and range of data with same size. The important modifiers are signed, unsigned, long and short.

Question 11.
Write short notes about C++ short hands?
Answer:
x=x + 10 can be represented as x+=10, It is called short hands in C++. It is faster.
This is used with all the arithmetic operators as follows.
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 1

Question 12.
What is the role of ‘const’ modifier? ‘
Answer:
This ‘const’ key word is used to declare a constant, Eg. const int bp=100;
By this the variable bp is treated as constant and cannot be possible to change its value during execution.

Question 13.
Specify the most appropriate data type for handling the following data.
i) Rollno. of a student.
ii) Name of an employee.
iii) Price of an article.
iv) Marks of 12 subjects
Answer:
i) short Rollno;
ii) char name[20];
iii) float price;
iv) short marks[12j;

Question 14.
Write C++ statement for the following.
a) The result obtained when 5 is divided by 2.
b) The. remainder obtained when 5 is divided by 2.
Answer:
a) 5/2
b) 5%2

Question 15.
Predict the output.justify
int k = 5,
b = 0;
b = k++ + ++k;
cout<<b;
Answer:
Output is 12. In this statement first it take the value of k in 5 then increment it K++. So first operand for + is 5. Then it becomes 6. Then ++k makes it 7. This is the second operand. Hence the result is 12.

Question 16.
Predict the output.
a) int sum = 10, ctr = 5;
sum = sum + ctr –;
pout<< sum;
b) int sum = 10, ctr = 5;
sum = sum + ++ctr; cout<<sum;
Answer:
a)15
b) 16

Question 17.
Predict the output.
int a; .
float b; .
a = 5;
cout << sizeof(a + b/2);
Answer:
Output is 4. Result will be the memory size of floating point number

Question 18.
Predict the output.
int a, b, c;
a = 5; b = 2;
c = a/b;
cout<<c; Answer: Output is 2. Both operands are integers. So the result will be an integer.

Question 19.
Explain cascading of i/o operations
Answer:
The multiple use of input or output operators in a single statement is called cascading of i/o operators.
Eg: To fake three numbers by using one statement is as follows cin>>x>>y>>z;
To print three numbers by using one statement is
as follows
cout<<x<<y<<z;

Question 20.
Trace out and correct the errors in the following code fragments
i) cout<<“Mark=”45;
ii) cin <<“Hellow World!”; iii) cout>>”X + Y;
iv) Cout<<‘Good'<<‘Moming’
Answer:
i) cout<<“Mark=45”;
ii) cout <<“Hellow World!”;
iii) cout< iv) Cout<<“Good Morning”;

Question 21.
Raju wants to add value 1 to the variable ‘p’ and store the new value in ‘p’ itself. Write four different statements in C++ to do the task.
Answer:
1) P=P+1; 2) p++;(post increment) 3) ++p; (pre increment) 4) p+=1; (short hand in C++)

Question 22.
Read the following code: charstr[30]; cin>>str;
cout<<str; . If we give the input “Green Computing”, we get the . output “Green”. Why is it so? How can you correct that?
Answer:
The input statement cin>> cannot read the space. It reads the text up to the space, i.e. the delimiter is space. To read the text up to the enter key gets( ) or getline( ) is used

Question 23.
Match the following :
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 2
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 3

Question 24.
Write a C++ expression to calculate the value of the following equation.
\(x=\frac{-b+\sqrt{b^{2}-4 a c}}{2 a}\)
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 13

Question 25.
A student wants to insert his name and school address in the C++ program that he has written. But this should not affect the compilation or execution of the program. How is it possible? Give an example.
Answer:
He can use comments to write this information. In C++ comments are used to write information such as programmer’s name, address, objective of the codes etc. in between the actual codes. This is not the part of the programme.
There are two types of comments.
i) Single line (//) and ii) Multi line (/* and */)
i) Single line (//) : Comment is used to make a single line as a comment. It starts with //.
Eg : //programme starts here.
ii) Multi line (/* and */): To make multiple lines as a comment. It starts with /* and ends with */.
Eg : !* this programme is used to find sum of two numbers.*/

Question 26.
Consider the following C++ statements :
char word (20]
cin>>word;
coUt<<word; gets(word); puts(word); If the string entered is “HAPPY NEW YEAR”, predict the output and justify your answer.
Answer:
cin>>word;
cout<<word;
It displays “HAPPY” because cin takes characters upto the space. That is space is the delimiter for cin. The string after space is truncated. To resolve this use gets ( ) function. Because gets ( ) function reads character upto the enter key.
Hence gets (word);
puts (word);
Displays “HAPPY NEW YEAR”

Question 27.
Write the difference between x = 5 and x ==5 in C++.
Answer:
x = 5 means the value 5 of the RHs is assigned to the LHS variable x . Here = is the assignment operator. But x ==5, ==this is the relational (comparison) operator. Here it checks whether the value of RHS is equal to the value of LHS and this expression returns a boolean value as a result. It is the equality operation.

Question 28.
a) What is the output of the following program?
# include
void main ( )
{
int a;
a = 5+3*5;
cout << a;
}
b) How do 9, ‘9’ and “9” differ in C++ program?
Answer:
Here multiplication operation has more priority than addition.
hence a = 5 + 15 = 20
b) Here
9 is an interger
‘9’ is an character
“9” is a string

Question 29.
Read the following C++ program and predict the output by explaining the operations performed.
#include
void main ( )
{
int a=5, b=3;
cout<<a++ /–b;
cout<<a/ (float) b; . . }
Answer:
Here a = 5 and b = 3 a++ / – – b = 5/2 = 2 That is a++ uses the value 5 and next it changes its value to 6 So a/(float) b = 6/(float)2 = 6/2.0 = 3 So the output, is 2 and 3

Question 30.
What is preprocessor directive statement? Explain. with an example.
Answer:
A C++ program starts with the pre processor directive i.e., # include, #define, #undef, etc, are such a pre processor directives. By using #include we can link the header files that are needed to use the functions. By using #define we can define some constants.
Eg. #define x 100. Here the value of x becomes 100 and cannot be changed in the program. No semicolon is needed.

Question 31.
The following C++ code segment is a part of a program written by Smitha to find the average of 3 numbers. int a, b, c; float avg; cin>>a>>b>>c;
avg=(a+b+c)/3; ‘
cout<<avg; , What will be the output if she inputs 1, 4 and 5? How can you correct it?
Answer:
=(1 +4+5)/3 =10/3 =3.3333 Instead of this 3.3333 the output will be 3. This is because if both operands are integers an integer division will be occurred, that is the fractional part will be truncated. To get the correct out put do as follows
case 1: int a,b,c; is replaced by float a,b,c;
OR
case 2: Replace (a+b+c)/3 by (a+b+c)/3.0;
OR
case 3:Type casting. Replace avg=(a+b+c)/3; by avg=(float)(a+b+c)/3;

Plus One Computer Application Data Types and Operators 3 Marks Questions and Answers

Question 1.
In a panchayath or municipality all the houses have a house number, house name and members. Similar situation is in the case of memory.Explain Answer: The named memory locations are called variable. A variable has three important things 1) variable name : A variable should have a name 2) Memory address : Each and every byte of memory has an address, it is also called location (L) value 3) Content: The value stored in a variable is called content. It is also called Read(R) value.

Question 2.
Briefly explain constants
Answer:
A constant or a literal is a data item its value doe not change during execution. The keyword const is used to declare a constant. Its declaration is as follows , const data type variable name=value; eg.const int bp=100; const float pi=3.14157; const char ch=’a’; const ehar[]=”Alvis”; .
1) Integer literals : Whole numbers withbut fractional parts are known as integer literals, its value does not change during execution. There are 3 types decimal, octal and hexadecimal. Eg. For decimal 100,150,etc For octal 0100,0240, etc For hexadecimal 0x100, 0x1 A,etc
2) Float literals : A number with fractional parts and its value does not change during execution is called floating point literals. Eg. 3.14157,79.78, etc
3) Character literal: A valid C++ character enclosed in single quotes, its value does not change during execution. Eg. ‘m’, ‘f’, etc
4) String literal One or more characters enclosed in double quotes is called string constant. A string is automatically appended by a null character(‘\0’) . Eg. “Mary’s”,”India”,etc

Question 3.
Consider the following statements int a=10,x=20; float b=49000.34,y=56.78; i) a=b; ii) y=x; Is there any problem for the above statements? What do you mean by type compatibility?
Answer:
Assignment operator is used to assign the value of RHS to LHS. Following are the two chances

1) The size of RHS is less than LHS. So there is no problem and RHS data type is promoted to LHS. Here it is compatible.
2) The size of RHS is higher than LHS. Here comes the problem sometimes LHS cannot possible to assign RHS. There may be a chance of wrong answer. Here it is not compatible.
Here
i) a=b; There is an error since the size of . LHS is 2 but the size of RHS is 4.
ii) y=x; There is no problem because the size of LHS is 4 and RHS is 2.

Question 4.
A company has decided to give incentives to their salesman as per the sales. The criteria is given below. If the total sales exceeds 10,000 the incentive is 10% .
i) If the total sales >=5,000 and total sales <10,000, the incentive is 6 % ii) If the total sales >=1,000 and total sales <5,000, the incentive is 3 %
Write a C++ program to solve the above prob-lem and print the incentive after accepting the total sales of a salesman. The program code should not make use of ‘if statement. )
Answer:
#include
using namespace std;
int main( )
{
float sales,incentive;
cout<<“enter the sales”; cin>>sales;
incentive=(sales>10000 ? salesMO: (sales > =5000 ? sales * .06 : (sales >= 1000 ? sales * .03: 0)>>;
cout<<“\nThe incentive is ” << incentive;
}

Question 5.
A C++ program code is given below to find the value of X using the expression
\(x=\frac{a^{2}+b^{2}}{2 a}\)
where a and b are variables
#include
using namespace std;
intmain( )
{
int a;b;
float x ’
cout<<“Enter the values of a and b; cin>a>b;
x=a*a+b*b/2*a;
cout>>x;
}

Predict the type of errors during compilation, execution and verification of the output. Also write the output of two sets of input values
i) a=4 b=8
ii) a=0 b=2
Answer:
This program contains sortie errors and the correct program is as follows.
#include
using namespace std;
int main( )
{
int a,b; . . .
float x;
cout<<“Enter the values of a and b”; cin>>a>>b;
x=(a*a+b*b)/(2*a);
cout<<x;
}
The output is as follows
i) a=4 and b= 8 then the output is 10
a=0 and b= 2 then the output is an error divide by zero error(run time error)

Question 6.
A list of data items are given below
45,8.432, M, 0.124,8 , 0, 8.1X 1031, 1010, a, 0.00025, 9.2 X1012O, 0471 ,-846, 342.123E03
a) Categorise the given data under proper headings of fundamental data types in C++
b) Explain the specific features of each data type. Also mention any other fundamental data type for which sample data is not given.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 4
b) i) int data type:- It is used to store whole numbers without fractional (decimal point) part. It can be either negative or positive. It consumes 4 bytes (32 bits) of memory.i.e.- 232 . numbers. That is 231 negative numbers and 231 positive numbers (0 is considered as +ve ) So a total of 232 numbers. We can store a number in between -231 to + 231-1.

ii) char data type :- Any symbol from the key board, eg. ‘A’ , ‘?’, ‘9’, It consumes one byte( 8 bits) of memory. It is internally treated as integers, i.e. 28 = 256 characters. Each character is having a ASCII code, ‘a’ is having ASCII code 97 and zero is having ASCII code 48.

iii) float data type:- It is used to store real numbers i.e. the numbers with decimal point. It uses 4 bytes(32 bits) of memory. Eg. 67.89, 89.9 E-15.

iv) double data type:- It is used to store very large real numbers. It uses 8 bytes(64 bits) of memory.

v) void data type :- void means nothing. It is used to represent a function returns nothing.

Question 7.
Write valid reasons after reading the following statements in C++ arid comment on their correctness by give reasons.
i) char num=66;
char num =’B’;
ii) 35 and 35L are different
iii) The number 14,016 and OxE are one and the same
iv) Char data type is often said to be an integer type.
v) To store the value 4.15 float data type is preferred over double
Answer:
i) The ASCII number of B is 66. So it is equivalent.
ii) 35 is of integer type but 35L is Long
iii) The decimal number 14 is represented in octal is 016 and in hexadecimal is OxE.
iv) Internally char data type stores ASCII numbers.
v) To store the value 4.15 float data type is better because float requires only 4 bytes while double needs 8 bytes hence we can save the memory.

Question 8.
Suggest most suitable derived data types in C++ for storing the following data items or statements :
rived data type
i) Age of 50 students in a class
ii) Address of a memory variable’
iii) A set of instructions to find out the factorial of a number
iv) An alternate name of a previously defined variable
v) Price of 100 products in a consumer store
vi) Name of a student
Answer:
i) Integer array of size 50
ii) Pointer variable
iii) Function
iv) Reference
v) Float array of size 100
vi) Character array

Question 9.
Considering the following C++ statements.
Fill up the blanks
i) If p=5 and q=3 then q%p is
ii) If E1 is true and E2 is False then E1 && E2 will be
iii) If k=8, ++k <= 8 will be = ______.
iv) If x=2 then (10* ++x) % 7 will be ______.
v) If t=8 and m=(n=3,t-n), the value of m will be ______.
vi) If i=12 the value i after execution of the expression i+=i– + –i will be _____.
Answer:
i) 3
ii) False
iii) False(++k makes k=9. So 9<=8 is false) ‘
iv) 2(++x becomes 3 ,so 10 * 3 =30%7 =2)
v) 5( here m=(n=3,8-3)=(n=3,5), so m=5, The maximum value will take)
vi) Herei=12
i + = i– + -i
here post decrement has more priority than pre decrement. .
So i– will be evaluated first. Here first uses the value then change so it uses the value 12 and i becomes 11
i + =12 + –i
now i =11.
Here the value of i will be changed and used so i~ becomes 10.
i — = 12 + 10
= 22
So i =22+10
i =32
So the result is 32.

Question 10.
The Maths teacher gives the following problem to Riya and Raju.
X=5 + 3*6. Riya got x=48 and Raju got x=23. Who is right and why it is happened ? Write down the operator precedence in detail?
Answer:
Here the answer is x=23. It is because of precedence of operators. The order of precedence of operators are given below.
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 5
Here multiplication has more priority than addition.

Question 11.
b) Explain the data types in C++
Answer:
Fundamental data types: It is also called built in data type. They are int, char, float, double and void
i) int data type: It is-used to store whole numbers without fractional (decimal point) part. It can be either negative or positive. It consumes 4 bytes (32 bits) of memory.i.e. 232 numbers. That is 231 negative numbers and 231 positive numbers (0 is considered as +ve) So a total of 2 numbers. We can store a number in between -231 to + 2311.

ii) char data type: Any symbol from the key board,
eg. ‘A’,’?’, ‘9’ It consumes one byte(8 bits) of memory. If is internally treated as integers, i.e. 28 = 256 characters. Each character is having a ASCII code, ‘a’ is having ASCII code 97 and zero is having ASCII code,48.

iii) float data type: It is used to store real numbers i.e. the numbers with decimal point. It uses 4 bytes(32 bits) of memory. Eg. 67.89, 89.9 E-15.

iv) double data type: It is used to store very large real numbers. It uses 8 bytes(64 bits) of memory.

v) void data type: void means nothing. It is used to represent a function returns nothing.
User defined Data types : C++ allows programmers to define their own data type. They are Structure(struct), enumeration (enum), union, class, etc.
Derived data types : The data types derived from fundamental data types are called Derived data types. They are Arrays, pointers, functions, etc

Question 12.
Predict the output of the following C++ statements:
int a = -5, b = 3, c = 4;
C+ = a+++ — b; .
cout<<a<<b<<c;
Answer:
a = -4, b = 2 and c = 1

Question 13.
Match the following
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 6
Answer:
1. (vi) *
2. (v) &&
3. (ii) >=
4. (iii) >>
5. (i) ++
6. (iv) ?:

Question 14.
Write any five unary operators of C++. Why are they called so?
Answer:
A unary operator is an operator that need only one operand to perform the operation. The five unary operators of C++ are given below.
Unary +, Unary -, ++, – – and ! (not)

Question 15.
Write C++ examples for the following:
a) Declaration statement
b) Assignment statement
c) Type casting
Answer:
a) int age;
b) age= 16;
c) avg=(float)a+b+c/3;

Plus One Computer Application Data Types and Operators 5 Marks Questions and Answers

Question 1.
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 7
Consider the above data, we know that there are different types of data are used in the computer. Explain different data types used in C++.
Answer:
i) int data type: It is used to store whole numbers without fractional (decimal point) part. It can be either negative or positive. It consumes 4 bytes (32 bits) of memory.i.e. 232 numbers. That is 231 negative numbers and 231 positive numbers (0 is considered as +ve) So a total of 232 numbers. We can store a number in between -231 to + 2311.

ii) char data type: Any symbol from the key board,
eg; ’A’.,’?’, ‘9’,…. It consumes one byte( 8 bits) of memory. It is internally treated as integers, i.e. 28 = 256 characters. Each character is having a ASCII code, ‘a’ is having ASCII code 97 and zero is having ASCII code 48.

iii) float data type: It is used to store real numbers i.e. the numbers with decimal point. It uses 4 bytes(32 bit?) of memory.
Eg. 67.89,89.9 E-15.

iv) double data type: It is used to store very large real numbers. It uses 8 bytes(64 bits) of memory.

v) void data type : void means nothing. It is used to represent a function returns nothing.

Question 2.
Define an operator and explain operator in detail.
Answer:
An operator is a symbol that performs an operation. The data on which operations are carried out are called operands. Following are the operators
1) lnput(>>) and output(<<) operators are used to perform input and output operation. Eg. cin>>n;
cout<<n;
2) Arithmetic operators: It is a binary operator. It is used to perform addition(+), subtractionf-), division (/), multiplication (*) and modulus (%- gives the remainder) operations.
Eg. If x=10 and y=3 then
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 8

x/y = 3, because both operands are integer, “to get the floating point result one of the operand must be float.
3) Relational operator: It is also a binary opera- tor. It is used to perform comparison or relational operation between two values and it gives either true(1) px false(O). The operators are <,<=,>,>=,== (equallty)and !=(not equal to)
Eg. If x-10 and y=3 then
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 9
4) Logical operators : Here AND(&&), OR(||) are binary operators and NOT(!) is a unary operator. It is used to combine relational operation? and it gives either true(1) or false(O).
If x=True and y=False then
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 10
Both operands must be true to get a true value in the case of AND(&&) operation If x=True and y=False then
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 11
Either one of the operands must be true to get a true value in the case of OR(||) operation If x=True and y=False then
Plus One Computer Application Chapter Wise Questions Chapter 5 Data Types and Operators 12
5) Conditional operator: It is a ternary operator hence it needs three operands. The operator is?:. Syntax: expression ? value if true : value if false. First evaluates the expression if it is true the second part wilt be executed otherwise the third part will be executed.
Eg. If x=10 and y=3 then x>y ? cout< Here the output is 10.

6) sizeof( ): This operator is used to find the size used by each data type.
Eg. sizeof(int) gives 2.

7) Increment and decrement operator:  These are unary operators.

a) Increment operator (++): It is used to increment the value of a variable by one i.e., x++ is equivalent to x=x+1;
b) Decrement operator (–) : It is used to decrement the value of a variable by one i.e., x-is equivalent to x = x-1.

8) Assignment operator (=) : lt is used to assign the value of a right side to the left side variable.eg. x=5; Here the value 5 is assigned, to the variable x.

Plus One Computer Application Chapter Wise Questions Chapter 4 Getting Started with C++

Students can Download Chapter 4 Getting Started with C++ Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions Chapter 4 Getting Started with C++

Plus One Computer Application Getting Started with C++ 1 Mark Questions and Answers

Question 1.
IDE means _______.
Answer:
Integrated Development Environment

Question 2.
We know that C++ is a high level language. From the following which statement is true.
a) C++ contains English like statements.
b) C++ contains mnemonics
c) C++ contains only 0 and 1
d) None of these
Answer:
a) C++ contains English like statements.

Question 3.
C++ is a language ______.
a) High level
b) Low level
c) Middle level
d) None of these
Answer:
a) High level

Question 4.
C++ was developed at ______.
a) AT & T Bell Laboratory
b) Sanjose Laboratory
c) Kansas University Lab
d) None of these
Answer:
a) At & T Bell Laboratory

Question 5.
C ++ is a successor of ______ language.
a) C#
b) C c
c) Java
d) None of these
Answer:
b) C c

Question 6.
The most adopted and popular approach to write programs is ______.
Answer:
Structured programming

Question 7.
From the following which uses OOP concept _____.
a) C
b) C++
c) Pascal
d) Fortran
Answer:
b) C++

Question 8.
______ is the smallest individual unit
Answer:
Token

Question 9.
Pick the odd one out:
a) float
b) void
c) break
d) Alvis
Answer:
d) Alvis, the others are keywords.

Question 10.
Reserved words for the compiler is _______.
a) Literals
b) Identifier
c) Key words
d) None of these
Answer:
c) Key words

Question 11.
Pick an identifier from the following
a) auto
b) age
c) float
d) double
Answer:
b) age

Question 12.
Pick the invalid identifier
a) name
b) Date of birth
c) age
d) joining time
Answer:
b) Date of birth, because it contains space.

Question 13.
Pick the octal integer from the following
a) 217
b) 0x217
c) 0217
d) None of these
Answer:
c) 0217, an octal integer precedes

Question 14.
Pick the hexa decimal integer from the following
a) 217
b) 0x217
c)0217
d) None of these
Answer:
b) 0x217, an hexa decimal integer precedes Ox

Question 15.
From the following pick a character constant
a)’A’
b)’ALL’
c)’AIM’
d) None of these
Answer:
a) ‘A’, a character enclosed between single quote

Question 16.
Non graphic symbol can be represented by using ______.
Answer:
Escape Sequence

Question 17.
Manish wants to write a program to produce a beep sound. Which escape sequence is used to get an alert (sound)
a) \a
b) \d
c) \s
d)None of these
Answer:
a)\a

Question 18.
Ajo wants to print a matter in a new line. Which escape sequence is used for this?
a) \a
b) \n
c) \s
d)None of these
Answer:
b)\n

Question 19.
To represent null character ____ is used.
a) \n
b) \0
c) \f
d) \s
Answer:
b)\0

Question 20.
State True/ False a string is automatically appended by a null-character.
Answer:
True

Question 21.
From the following pick a string constant .
a) ‘a’
b) “abc”
c) ‘abc’
d) None of these
Answer:
“abc”, a character constant must be enclosed between double quotes.

Question 22.
C++ was developed by ______.
a) Bjarne stroustrup
b) James Gosling
c) Pascal
d) None of these
Answer:
a) Bjarne stroustrup

Question 23.
From the following which is not a character constant.
а) ‘c’
b) ‘e’
c) ‘d’
d) “c”
Answer:
d) “c”, It is a string constant the others are character constant.

Question 24.
From the following which is a valid declaration.
а) int 91;
b) int x;
c) int 9x;
d) int “x”;
Answer:
b) intx

Question 25.
Symbols used to perform an operation is called _____.
a) Operand
b) Operator
c) Variable
d) None of these
Answer:
b) Operator

Question 26.
Consider the following
C = A + B. Here A and B are called ______.
a) Operand
b) Operator
c) Variable
d) None of these
Answer:
b) Operand

Question 27.
The execution of a program starts at ______ function.
Answer:
main( )

Question 28.
The execution of a program ends with ______ function.
Answer:
main( )

Question 29.
______ is used to write single line comment.
a) //
b) P
c) */
d) None of these
Answer:
a) //

Question 30.
const k=100 means
a) const float k=100
b) const double k=100
c) const int k=100
d)const char k=100
Answer:
c) const int k=100

Question 31.
Qn. 31 ,
Each and every statement in C++ must be end with ______.
a) Semi colon
b) Colon
c) full stop
d) None of these
Answer:
a) Semi colon

Question 32.
From the following select the input operator.
a)>>
b)<< c) >
d) <
Answer:
a)>>

Question 33.
From the following select the output operator.
a)>>
b)<<
c) >
d) <
Answer:
b)<<

Question 34.
From the following which is known as string terminator.
a) ‘\0’
b) ‘\a’
c) ‘\s’
d) ‘\t’
Answer:
a) ‘\0’

Question 35.
Adeline wrote a C++ program namely sum.cpp and she compiled the program successfully with no error. Some files are generated. From the following which file is a must to run the program .
a) sum.exe
b) sum.obj
c) sum.vbp
d) sum.htm
Answer:
a) sum.exe

Question 36.
Adeline wrote a C++ program namely sum.cpp and she compiled the program successfully with no error. Some files are generated namely sum.obj and sum.exe. From this which file is not needed to run the program.
Answer:
sum.obj is not needed and can be deleted.

Question 37.
From the following which is ignored by the compiler.
а) statement
b) comments
c) loops
d) None of these
Answer:
b) comments

Question 38.
To write a C++ program, from the following which statement is a must _____.
a) sum( )
b) main( )
c) #include
d) #include
Answer:
b) main( ).
A C++ program must contains at least one main( ) function.

Question 39.
State True / False .
Comment statements are ignored by the compiler.
Answer:
True .

Question 40
More-than one input / output operator in a single statement is called ________.
Answer:
Cascading of I/O operator

Question 41.
Is 0x85B a valid integer constant in C++? If yes why ?
Answer:
Yes. It is a hexa decimal number

Plus One Computer Application Getting Started with C++ 2 Marks Questions and Answers

Question 1.
Mr. Dixon declared a variable as follows int 9age. Is it a valid identifier. If not briefly explain the rules for naming an identifier.
Answer:
It is not a valid identifier because it violates the rule
1. The rules for naming an identifier is as follows.
1) It must be start with a letter(alphabet)
2) Under score can be considered as a letter
3) White spaces and-special characters cannot be used.
4) Key words cannot be considered as an identi-fier

Question 2.
How many bytes used to store ‘\a’.
Answer:
To store ‘\a’ one byte is used because it is an escape sequence. An escape sequence is treated as one character. To store one character one byte is used.

Question 3.
How many bytes used to store “\abc”.
Answer:
A string is automatically appended by a null character.
Here one byte for \a (escape sequence).
One byte for character b.
One byte for character c.
And one byte for null character.
So a total of 4 bytes needed to store this string.

Question 4.
How many bytes used to store “abc”.
Answer:
A string is automatically appended by a null character.
Here one byte for a.
One byte for character b.
One byte for character c.
And one byte for null character.
So a total of 4 bytes needed to store this string.

Question 5.
Consider the following code
{
cout<<“welcome to C++”;
}
After you compile this program there is an error called prototype error. Why it is happened? Explain
Answer:
Here we used the output operator cout<<. It is used to display a message “welcome to C++” to use this operator the corresponding header file must be included. We didn’t included the header file hence the error. .

Question 6.
In C++ the size of the string “book” is 5 and that of “book\n” is 6. Check the validity of the above statement. Justify your answer.
Answer:
A string is automatically added by a null character). The null character is treated as one character. So the size of string “book” is 5. Similarly a null character (\0) is also added to “book\n”. \n and \0 is treated as single characters. Hence the size of the string “book\n” is 6.

Question 7.
Pick the odd man out. Justify
TOTSAL, TOT_SAL, totsal5, Tot5_sal, SALTOT, tot.sal,
Answer:
tot.sal. Because it contains a special character dot(,). An identifier cannot contain a special character. So it is not an identifier. The remaining satisfies the rules of naming identifier. So they are valid identifier.

Question 8.
Write a C++ statement to print the following sentence. Justify.
“\ is a special character”
Answer:
cout<<“\\ is a special character” \\ is treated as an escape sequence.

Question 9.
A student type a C++ program and saves it in his personal folder as Sample.cpp. After getting the output of the program, he checks the folder and finds three files namely Sample.cpp, Sample.obj and Sample.exe. Write the reasons for the generation of the two files in the folder.
Answer:
After the compilation of the program sample.cpp, the operating system creates two files if there is no error. The files are one object file (sample.obj) and one executable file(sample.exe). Now the source file(sample.cpp) and object file(sample.obj) are hot needed and can be deleted. To run the program sample.exe is only needed.

Question 10. Mention the purpose of tokens in C++. Write names of any four tokens in C++.
Answer:
Token : It is the smallest individual units similar to a word in English orMalayalam language. C++ has 5 tokens.
1) Keywords
2) Identifier
3) Literals (Constants)
4) Punctuators
5) Operators

Question 11. The following are some invalid identifiers. Specify its reason.
a) Sum of digits
b) 1 year
c) First jan
d) For
Answer:
a) Sum of digits —> space not allowed hence it is invalid
b) 1 year —> First character must be an alphabet hence it is invalid
c) First.jan —> special characters such as dot (.) not allowed hence it is invalid.
d) For —> It is valid. That is it is not the key word for

Question 12.
Some of the literals in C++ are given below. How do they differ? (5, ‘5’, 5.0, “5”)
Answer:
5 – integer literal
‘5’ – Character literal
5.0- floating point literal
“5”- string literal

Question 13.
Identify the invalid literals from the following and write reason for each:
a) 2E3.5
b) “9”
c) ‘hello’
d) 55450
Answer:
a) 2 C 3.5 – The mantissa part (3.5) will not be a floating point number. Hence it is invalid
c) ‘hello’ -> It is a string hence it must be enclosed in double quotes instead of single quotes. It is invalid.

Question 14.
Which one of the following is a user-defined name?
a) Key-word
b) Identifier
c) Escape sequences
d) All of these
Answer:
b) Identifier

Question 15.
Identify whether the following are valid identifiers or not? If not give the reason.
a) Break
b) Simple.interest
Answer:
a) Break – It is valid( break is the keyword, not Break);
b) Simple.interest – It is not valid, because dot(.) is used.

Question 16.
Identify the invalid literals from the following and write a reason for each:
a) 2E3.5
b) “9”
c) ‘hello’
d) 55450
Answer:
a) Invalid, because exponent part should not be a floating point number
b) valid

Plus One Computer Application Getting Started with C++ 3 Marks Questions and Answers

Question 1.
Rose wants to print as follows
\n is used for New Line
Write down the C++ statement for the same.
Answer:
#include
using namespace std;
int main( )
{
cout<<“\\n is used for New Line”;
}

Question 2.
Alvis wants to give some space using escape sequence as follows
Welcome to C++
Write down the C++ statement for the same .
Answer:
#include
using namespace std;
int main( )
{
cout<<“Welcome to \t C++”;
}

Question 3.
We know that the value of pi=3.14157, a constant (literal). What is a constant? Explain it?
Answer:
A constant or a literal is a data item its value doe not change during execution.
1) Integer literals Whole numbers without fractional parts are known as integer literals, its value does not change during execution. There are 3 types decimal, octal and hexadecimal.
Eg. For decimal 100,150,etc
For octal 0100,(5240, etc
For hexadecimal 0x100, 0x1A,etc
2) Float literals A number with fractional parts and its value does not change during execution is called floating point literals.
Eg. 3,14157,79.78,etc
3) Character literal: A valid C++ character enclosed in single

Question 4.
Write a program to print the message “TOBACCO CAUSES CANCER” on screen,
Answer:
#include using namespace std; int main( )
{
cout<<” TOBACCO CAUSES CANCER”;
}

Question 5.
You are supplied with a list of tokens in C++ pro-gram, Classify and Categorise them under proper headings.
Explain each category with its features. tot_mark, age, M5,. …, break,( ), int, _pay, ; , cin
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 4 Getting Started with C++ 1

Question 6.
Write a program to print the message “SMOKING IS INJURIOUS TO HEALTH” on screen. “SMOKING IS INJURIOUS TO HEALTH”
Answer:
#include
using namespace std;
int main( )
{
cout<<“SMOKING IS INJURIOUS TO HEALTH”;
}

Plus One Computer Application Getting Started with C++ 5 Marks Questions and Answers

Question 1.
Consider the following code
The new line character is \n.
The output of the following code does not contain the \n. Why it is happened? Explain.
Answer:
\n is a character constant and it is also known as escape sequence. This is used to represent the non graphic symbols such as carriage return key(enter key), tab key, back space, space bar etc. It consists of a back slash symbol and one more characters.
Plus One Computer Application Chapter Wise Questions Chapter 4 Getting Started with C++ 2

Question 2.
You are about to study the fundamentals of C++ programming Language. Do a comparative study of the basics of the new language with that of a formal language like English or Malayalam to familiarize C++?. Provide sufficient explanations for the compared items in C++ Language,
Answer:
Character set: To study a language first we have to familiarize the character set. For example to study English language first we have to study the alphabets. Similarly here the character set includes letters(A to Z & a to z), digits(0 to 9), special characters+,-,?,*,/, ) white spaces(non printable)
etc..
Token: It is the smallest individual units similar to a word in English or Malayalam language. C++ has 5 tokens
1) Keywords
Eg: float is used to declare variable to store numbers with decimal point. We can’t use this for any other purpose

2) identifier: These are user defined words. Eg: variable name, function name, class name, object name etc…

3) Literals (Constants): Its value does not change during execution
Eg: In maths π = 3.14157 and boiling point of water is 100.

4) Punctuators: In English or Malayalam language punctuation mark are used to increase the read-ability but here it is used to separate the tokens. Eg:{,},(,)……….

5) Operators: These are symbols used to perform an operation(Arithmetic, relational, logical, etc…)
These are reserved words for the compiler. We can’t use for any other purposes.

Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving

Students can Download Chapter 3 Principles of Programming and Problem Solving Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving

Plus One Computer Application Principles of Programming and Problem Solving 1 Mark Questions and Answers

Question 1.
The process of writing program is called _______.
Answer:
programming or coding.

Question 2.
One who writes program is called ______.
Answer:
Programmer.

Question 3.
The step by step procedure to solve a problem is known as ______.
Answer:
Algorithm.

Question 4.
Diagrammatic representation of an algorithm is known as ______.
Answer:
Flow .

Question 5.
Program errors are known as ______.
Answer:
bugs.

Question 6.
Process of detecting and correcting errors is called ________.
Answer:
debugging .

Question 7.
Mr. Ramu represents an algorithm by using some symbols. This representation is called ______.
Answer:
Flow Chart.

Question 8.
Your computer teacher asked you that which symbol is used to indicate beginning or ending flow chart? What is your answer?
a) Parallelogram
b) Rectangle
c) Oval
d) Rhombus
Answer:
c) Oval.

Question 9.
You are suffering from stomach ache. The doctor prescribes you for a scanning. This process is related in a phase in programming. Which phase is this ?
Answer:
Problem identification.

Question 10.
Your friend asked you a doubt that to draw a flow chart parallelogram is used for what purpose?
Answer:
input /output.

Question 11.
Mr. Anil wants to perform a multiplication which symbol is used to represent in a flow chart.
Answer:
It is a processing so rectangle is used.

Question 12.
Mr. George wants to check a number is greater than zero and to perform an operation while drawing a flow chart which symbol is used for this?
Answer:
Rhombus

Question 13.
ANSI means ______.
Answer:
American National Standards Institute.

Question 14.
To indicate the flow of an operation which symbol is used to draw a flow chart.
Answer:
Flow lines with arrow heads .

Question 15.
Mr. Johnson is drawing a flow chart but it is not fit in a single page. Which symbol will help him to complete the flow chart?
Answer:
Connectors.

Question 16.
Mr. Ravi developed a S/W student information system, He wants to protect the s/w from unauthorized copying. There is an act what is it?
Answer:
Copy right act.

Question 17.
Odd man out.
a) Parallelogram
b) Oval
c) Rectangle
d) Star
Answer:
d) Star, others are flowchart symbols.

Question 18.
Odd man out.
(a) Oval
(b) Rhombus
(c) Connector
(d) Triangle
Answer:
Triangle, Others are flowchart symbols.

Question 19.
Raju wrote a program and he wants to check the errors and correct if any? What process he has to do for this?
Answer:
process, debugging.

Question 20.
Odd one out.
a) Problem identification
b) Translation
c) debugging
d) copy right
Answer:
d) Copy right, others are phases in programming.

Question 21.
Odd man out.
a) syntax error
b) logical error
c) Runtime error
d) printer error
Answer:
d) Printer error, Others are different types of errors.

Question 22.
A computerized system is not complete after the execution and testing phase? What is the next phase to complete the system?
Answer:
Documentation.

Question 23.
Mr. Sathian takes a movie DVD from a CD library and he copies this into another DVD without per-mission. This process is called ______.
Answer:
Piracy.

Question 24.
Mr. Santhosh purchased a movie DVD and he takes several copies without permission. He is a _______.
a) Programmer
(b) Administrator
c) Pirate
(d) Organizer
Answer:
c) Pirate.

Question 25.
The symbol used for copy right is a _____.
a) &
(b) Copy
(c) #
(d) ©
Answer:
d)©

Question 26.
Following are the advantages of flowcharts one among them is wrong. Find it.
a) Better communication
b) Effective analysis
c) proper program documentation
d) Modification easy
Answer:
d) Modification easy, It is a disadvantage.

Question 27.
Which flow chart symbol has one entry flow and two exit flows?
Answer:
Diamond.

Question 28.
Which flow chart.symbol is always used in pair?
Answer:
connector.

Question 29.
Program written in HLL is called ______.
Answer:
Source code.

Question 30.
Some of the components in the phases of programming are given below. Write them in order of their occurrence.
a) Translation
b) Documentation
c) Problem identification
d)Coding of a program
Answer:
The chronological order is as follows
1) c) Problem Identification
2) d) Coding of a program
3) a) Translation
4) b) Documentation

Question 31.
a) ________ is the stage where programming errors are discovered and corrected.
Answer:
Debugging or compiling.

Question 32.
compilation and execution there were no errors. But he got a wrong output. Name the type of error he faced.
Answer:
Logical Error.

Question 33.
Pick out the software which rearranges the scattered files in the hard disk and improves the performance of the system.
a) Backup software
b) File compression software
c) Disk defragmenter 1
d) Anti virus software
Answer:
Disk defragmenter.

Question 34.
Some phases in programming are given below.
1) Source coding
2) Execution
3) Translation
4) Problem study
These phases should follow a proper order.
Choose the correct order from the following:
a) 4 —> 2 —> 3 —> 1
b) 1 —> 3 —> 2 —> 4
c) 1 —> 3 —> 4 —> 2
d) 4 —> 1 —> 3 —> 2
Answer:
d)4 —> 1 —> 3 —> 2

Question 35.
Which one of the following errors is identified at the time of compilation?
a) Syntax error
b) Logical error
c) Run-time error
d) All of these
Answer:
a) Syntax error.

Question 36.
Pick the odd one out and give a reason for your finding:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 1
Answer:
c) This has one entry flow and more than one exit flow
OR
b) Used for both input and output..

Plus One Computer Application Principles of Programming and Problem Solving 2 Marks Questions and Answers

Question 1.
A debate on ‘Whether Free Software is to be promoted’ is planned in your class. You are asked to present points in support of Free Software. What would be your arguments, (at least three)?
Answer:
Freedom to use Comparatively cheap Freedom to modify and redistribute.

Question 2.
Mr. Roy purchased a DVD of a movie and he found that on the cover there is a sentence copy right reserved and a mark ©. What is it? Briefly explain?
Answer:
It is under the act of copy right and the trade mark is © copy right is the property right that arises automatically when a person creates a new work by his own and by Law it prevents the others from the unauthorized or intentional copying of this without the permission of the creator.

Question 3.
Can a person who knows only Malayalam talk to a person who knows only Sanskrit normally consider the corresponding situation in a computer program and justify your answer?
Answer:
Normally it is very difficult to communicate. But it is possible with the help of a translator. Translation is the process of converting programs written in High Level Language into Low Level Language (machine Language). The compiler or interpreter is used for this purpose. It is a program.

Question 4.
Define the term, debugging. Write the names of two phases that are included in debugging.
OR
Define the different types of errors that are encountered during the compilation and running of a program
Answer:
Debugging :- The program errors are called ‘bugs’ and the process of detecting and correcting errors is called debugging.
Compilation and running are the two phases.
OR
In general there are two types of errors syntax errors and logical errors. When the rules or syntax of the language are not followed then- syntax errors occurred and it is displayed after compilation. When the logic of a program is wrong then logical errors occurred and it is not displayed after compilation but it is displayed in the execution and testing phase.

Question 5.
Write an algorithm to input the scores obtained in three unit tests and find the average score.
OR
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 2
Explain the flow chart and predict the output.
Answer:
Step 1 : Start
Step 2 : Read S1, S2, S3
Step 3 : avg = S1 + S2 + S3/3
Step 4 : Print avg
Step 5 : Stop.
OR
This flowchart is used to print the numbers as 1,2,3, ……… 30

Question 6.
Differentiate between top down design and bottom up design in problem solving
Answer:
Bottom up design : Here also larger programs are divided into smaller ones and the smaller ones are again subdivided until the lowest level of detail has been reached. We start solving from the lowest module onwards. This approach is called Bottom up design.

Question 7.
Answer any one question from 5 (a) and 5 (b).
Draw a flowchart for the following algorithm.
Step 1 : Start
Step 2 : Input N
Step 3 : S=0, K=1
Step 4 : S = S +K
Step 5 : K = K +1
Step 6 : If K < = N Then Go to Step 4
Step 7 : Print s
Step 8 : Stop
OR
Name the two stages in programming where debugging process is involved. What kinds of errors are removed in each of these stages?
Answer:
a)
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 3
b) The two stages are compile time and run time. In the debugging process can remove syntax . error, logical error and runtime error.

Question 8.
Answer any one question from 7(a) and 7(b) .
a) Observe the following portion of a flowchart. Fill in the blank symbols with proper instructions to get 321 as the output.
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 4
b) The following flowchart can be used to print the numbers from 1 to 100. Identify another problem that can be solved using this flowchart and write the required instructions in the symbols.
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 5
Answer:
The following flowchart can be used to store another problem such as used to print odd numbers less than 200.
a)
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 6
b) The following flowchart can be used to store another problem such as used to print odd numbers less than 200.
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 7

Question 9.
Write an alogorithm to print the numbers upto 100 in reverse order, That is the output should be as 100, 99, 98, 97,… .1
OR
Draw a flow chart to check whether the given number is positive, negative or zero.
Answer:
Step 1 : Start
Step 2 : Set i < — 100
Step 3 : if i<=0 then go to step 6
Step 4 : Print i.
Step 5 : Set i < — i – 1 go to step 3
Step 6 : Stop
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 8

Plus One Computer Application Principles of Programming and Problem Solving 3 Marks Questions and Answers

Question 1.
When you try to execute a program, there are chances of errors at various stages, Mention the types of errors and explain.
Answer:
1) syntax error :
eg : 5=x
2) Logic error. If the programmer makes any logical mistakes, it is known as logical error.
Eg: To find the sum of values A and B and store it in a variable C you have to write C=A+B. Instead of this if you write C=A*B, it is called logic error.
3) Runtime error : An error occured at run time due to inappropriate data.
Eg: To calculate A/B a person gives zero to B. There is an error called division by zero error during run time.

Question 2.
Following is a flow chart to find and display the largest among three numbers. Some steps are missing in the flowchart. Redraw the flow chart by adding necessary.steps and specify its purpose. How can this flow chart be modified without using a fourth variable?
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 9
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 10

Question 3.
A flow chart is given below.
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 11
a) What will be the output of the above flow chart ?
b) How can you modify the above flow chart to display the even numbers upto 20, starting from 2.
Answer:
a) 1,2,3,4,5.
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 12

Question 4.
Write an algorithm to check whether the given number is even or odd.
Answer:
step 1 : Start
Step 2 : Read a number to N
Step 3 : Divide the number by 2 and store the remainder in R.
Step 4 : If R = O Then go to Step 6
Step 5 : Print “N is odd” go to step 7
Step 6 : Print “N is even”
Step 7 : Stop

Question 5.
Write an algorithm to find the largest of 2 numbers?
Answer:
Step 1 : Start
Step 2 : Input the values of A, B
Step 3 : Compare A and B. If A> B then go to step 5
Step 4 : Print” B is largest” go to Step 6.
Step 5 : Print “A is largest”
Step 6 : Stop

Question 6.
Write an algorithm to find the sum of n natural numbers and average?
Answer:
Step 1 : Start
Step 2 : Set i 1, S 0
Step 3 : Read a number and set to n
Step 4 : Computer i and n if i>n then go to step 7.
Step 5 : Set S <— S+ i
Step 6 : i <— i+1 go to step 4
Step 7 : avg 4<— S/n Step 8 : Print “Sum = S and average = avg” Step 9 : Stop Question 7. Write an algorithm to find the largest of 3 numbers.
Answer:
step 1 : Start
Step 2 : Read 3 numbers and store in A,B,C
Step 3 : Compare A and B. lfA>B then go to Step 6
Step 4 : Compare B and C if C>B then go to Step 8
Step 5 : print “B is largest” go to Step 9
Step 6 : Compare A and C if Q>A then go to Step 8
Step 7 : Print” A is largest” go to Step 9
Step 8 : Print “C is largest”
Step 9 : Stop

Question 8.
Write an algorithm to calculate the simple interest (I =P*N*R/100)
Answer:
Step 1 : Start
Step 2 : Read 3 values for P,N,R
Step 3 : Calculate I <— P*N*R/100
Step 4 : Print “The simple interest = I
Step 5  : Stop

Question 9.
Write an algorithm to calculate the compound interest (C. I = Px(1 +r/100)n – P)
Answer:
Step 1 : Start
Step 2 : Read 3 number for p,n,r
Step 3 : Calculate Cl = p x(1+r/100)n – p
Step 4 : Print “The compound Interest = C.I”
Step 5 : Stop

Question 10.
Write an algorithm to find the cube of first n natural numbers .(eg:1,8,27 …….. n3)
Answer:
Step 1 : Start
Step 2 : Set i <— 1
Step 3 : Read a number and store in n
Step 4 : Compare rand n if i>n then go to step 7
Step 5 : Print i*i*i
Step 6 : i <— i+1 go to step 4
Step 7 : Stop

Question 11.
Write an algorithm to read a number and find its factorial (n!=n*(n-1)*(n-2) * …..3*2*1)
Answer:
Step 1 : Start
Step 2 : Fact <—1
Step 3 : Read a number and store in n
Step 4 : If n=0 then go to step 7
Step 5 : Fact <— Fact *n
Step 6 : n <— n-1 go to step 4
Step 7 : Print “Factorial is fact”
Step 8 : Stop.

Question 12.
Draw a flow chart to find the sum of n natural numbers and average.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 13

Question 13.
Draw a flow chart to find the largest of three numbers.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 14

Question 14.
Draw a flow chart to find the largest of two numbers.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 15

Question 15.
Draw a flow chart to check whether the given number is even or odd.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 16

Question 16.
Draw a flow chart to calculate the simple interest.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 17

Question 17.
Draw a flow chart to calculate compound interest.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 18

Question 18.
Draw a flow chart to find the cube of n natural numbers (1,8,27 …….n3)
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 19

Question 19.
Draw a flow chart to read a number and find its factorial.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 20

Question 20.
Mr. Vimal wants to represent a problem by using a flowchart, which symbols are used for this. Explain.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 21
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 22
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 23
These symbols will help us to complete the flow chart, which is not fit in a single page. A connector symbol is represented by a circle and a letter or digit is placed within the circle to indicate the link.

Question 21.
Jeena uses algorithm to represent a problem while Neena uses flowchart which is better? Justify your answer?
Answer:
Flow chart is better. The advantages of flow chart is given below.
1. Better communication:- A flow chart is a pictorial representation while an algorithm is a step By step procedure to solve a program. A programmer can easily explain the program logic using a flow chart.
2. Effective analysis :- The program can be analyzed effectively through the flow chart.
3. Effective synthesis :- If a problem is big it can be divided into small modules and the solution for each module is represented in flow chart separately and can be joined together to get the final system design.
4. Proper program documentation :- A flow chart will help to create a document that will help the company in the absence of a programmer.
5. Efficient coding :- With the help of a flow chart it is easy to write program by using a computer language.

Question 22.
A flow chart is a better method to represent a program. But it has some limitation what are they?
Answer:
The limitations are given below
1) To draw a flowchart, it is time consuming and laborious work.
2) If any change or modification in the logic we . may have to redraw a new flow chart.
3) No standards to determine how much detail can include in a flow chart.

Question 23.
Match the following,
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 24
Answer:
1 – e
2 – a
3 – d
4 – f
5 – b
6 – c

Question 24.
Alvis executes an error – free program but he got an error. Explain different types of error in detail.
Answer:
There are two types of errors in a program before execution and testing phase.They are syntax error and logical error. When the programmer violates the rules or syntax of the programming language then the syntax error occurred.
Eg: It involves incorrect punctuation. Key words are used for other purposes, violates the structure etc. It detects the compiler and displays an error message that include the line number and give a clue of the nature of the error. When the programmer makes any mistakes in the logic, that types of errors are called logical error. It does not detect by the compiler but we will get a wrong output.
The program must be tested to check whether it is error free or not. The program must be tested by giving input test data and check whether it is right or wring with the known results. The third type of errors are Runtime errors, this may be due to the in appropriate data while execution. For example consider B/C. If the end user gives a value zero for c, the execution will be interrupted because division by zero is not possible. These situation must be anticipated and must be handled.

Question 25.
The following are the phases in programming. The order is wrong rearrange them in correct order.
1. Debugging
2. Coding
3. Derive the steps to obtain the solution
4. Documentation
5. Translation
6. Problem identification
7. Execution and testing
Answer:
The correct order is given below.
1. Problem identification
2. Derive the steps to obtain the solution
3. Coding
4. Translation
5. Debugging
6. Execution and testing
7. Documentation

Question 26.
Draw a flow chart to input ten different numbers and find their average. ‘
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 25

Question 27.
Draw the flow chart to find the sum of first N natural numbers.
Answer:
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 26

Question 28.
Make a flow chart using the given labelled symbols, for finding the sum of all even numbers upto ‘N’
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 27
Answer:
Draw flowchart in any of the following order
e, c, d, f, i, h, a, b, g
e, d,c, f, i, h, a, b, g
e, c, d, a, f, i, h, b, g
e, d, c, a, f, i, h, b, g
Step 1 : Start
Step 2 : Input n
Step 3 : i = I
Step 4 : if i<=n/2 then repeat step 5 & 6
Step 5 : if n%i = = 0 print i
Step 6 : i = i + I
Step 7 : Stop

Question 29.
List the two approaches followed in problem solving or programming. How do they differ?
Answer:
Approaches in problem solving Top down design : Larger programs are divided into smaller ones and solve each tasks by performing simpler activities. This concept is known as top down design in problem solving Bottom up design : Here also larger programs are divided into smaller ones and the smaller ones are again subdivided until the lowest level of detail has been reached: We start solving from the lowest module onwards. This approach is called Bottom up design. Phases in Programming

1) Problem identification : This is the first phase in programming. The problem must be identified then only it- can be solved, for this we may have to answer some questions. During this phase we have to identify the data, its type, quantity and formula to be used as well as what activities are involved to get the desired out put is also identified for example if you are suffering from stomach ache and consult a Doctor. To diagnose the disease the Doctor may ask you some question regarding the diet, duration of pain, previous occurrences etc, and examine some parts of your body by using stethoscope X-ray, scanning etc.

2) Deriving the steps to obtain the solution: There are two methods, Algorithm and flowchart, are used for this.
a) Algorithm :- The step-by-step procedure to solve a problem is known as algorithm. It comes from the name of a famous Arab mathematician Abu Jafer Mohammed Ibn Musaa Ai-Khowarizmi, The last part of his name Al-Khowarizmi was corrected to algorithm.
b) Flowchart :- The pictorial or graphical representation of an algorithm is called flowchart.

Question 30.
Write an algorithm to find the sum of the squares of the digits of a number. (For example, if 235 is the input, the output should be 22+32+52=38)
Answer:
Step 1 : Start
Step 2 : Set S = O
Step 3 : Read N
Step 4 : if N > O repeat step 5, 6 and 7
Step 5 : Find the remainder. That is rem =N%10
Step 6 : S = S + rem * rem
Step 7 : N = N/10
Step 8 : Print S
Step 9 : Stop

Question 31.
Consider the following algorithm and answer the following questions:
Step 1 : Start
Step 2 : N=2, S=0
Step 3 : Repeat Step 4, Step 5 while N<=10
Step 4 : S=S+N
Step 5 : N=N+2
Step 6 : Print S
Step 7 : Stop
a) Predict the output of the above algorithm.
b) Draw a flowchart for the above algorithm
Answer:
a) The output is 30
Plus One Computer Application Chapter Wise Questions Chapter 3 Principles of Programming and Problem Solving 28

Question 32.
“It is better to give proper documentation within the program”. Give a reason.
Answer:
It is the last phase in programming. A computerized system must be documented properly and it is an ongoing process that starts, in the first phase and continues till its implementation. It is helpful for the modification of the program later.

Plus One Computer Application Principles of Programming and Problem Solving 5 Marks Questions and Answers

Question 1.
Mr. Arun wants to develop a program to computerize the functions of super market. Explain different phases he has to under go is detail.
OR
Briefly explain different phases in programming.
Answer:
The different phases in programming is given below:
1) Problem identification : This is the first phase in programming. The problem must be identified then only it can be solved, for this we may have to answer some questions.
During this phase we have to identify the data, its type, quantity and formula to be used as well as what activities are involved to get the desired out put is also identified for example if you are suffering from stomach ache and consult a Doctor. To diagnose the disease the Doctor may ask you some question regarding the diet, duration of pain, previous occurrences etc, and examine some parts of your body by using stethoscope X-ray, scanning etc.

2) Deriving the steps to obtain the solution. There are two methods, Algorithm and flowchart, are used for this.
a) Algorithm :- The step-by-step procedure to solve a problem is known as algorithm. It comes from the name of a famous Arab mathematician Abu Jafer Mohammed Ibu Musaa Al-Khowarizmi, The last part of his name Al-Khowarizmi was corrected to algorithm.
b) Flowchart:- The pictorial or graphical representation of an algorithm is called flow-chart.

3) Coding The dummy codes (algorithm)or flow-chart is converted into program by using a computer language such s Cobol, Pascal, C++, VB, Java etc.

4) Translation The computer only knows ma-chine language. It does not know HLL, but the human beings HLL is very easy to write pro. grams. Therefore a translation is needed to convert a program written in HLL into machine code. (object code). During this step, the syntax errors of the program will be displayed. These errors are to be corrected and this process will be continued till we get “No errors” message. Then
it is ready for execution.

5) Debugging The program errors are called ‘bugs’ and the process of detecting and correcting errors is called debugging. In general there are two types of errors syntax errors and logical errors. When the Riles or syntax of the language are not followed then syntax errors occurred and it is displayed after compilation. When the logic of a program is wrong then logical errors occurred and it is not displayed after compilation but it is displayed in the execution and testing phase.

6) Execution and Testing In this phase the program will be executed and give test data for testing the purpose of this is to determine whether the result produced by the program is correct or not. There is a chance of another type of error, Run time error, this may be due to in-appropriate data.

7) Documentation It is the last phase in programming. A computerized system must be documented properly and it is an ongoing process that starts in the first phase and continues till its implementation. It is helpful for the modification of the program later.

Question 2.
Briefly explain the characteristic of an algorithm.
Answer:
The following are the characteristics of an algorithm
1) It must starts with ‘start’ statement and ends with ‘stop’ statement.
2) it should contains instructions to accept input and these are processed by the subsequent instructions.
3) Each and every instruction should be precise and must be clear. The instructions must be possible to carry out, for example consider the examples the instruction “Go to market” is precise and possible to carried out but the instruction “Go to hell” is also precise and can not be carried out.
4) Each instruction must be carried out in finite time by a person with paper and pencil.
5) The number of repetition of instructions must be finite.
6) The desired results must be obtained after the algorithm ends.

Plus One Computer Application Chapter Wise Questions Chapter 2 Components of the Computer System

Students can Download Chapter 2 Components of the Computer System Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions Chapter 2 Components of the Computer System

Plus One Computer Application Components of the Computer System 1 Mark Questions and Answers

Question 1.
The Tangible parts of a computer is ______.
Answer:
Hardware

Question 2.
The instructions that tell the hardware to perform a task is ______.
Answer:
Software

Question 3.
The brain of the computer is ______.
Answer:
CPU

Question 4.
CPU means _____.
Answer:
Central Processing Unit

Question 5.
ALU is ______.
Answer:
Arithmetic Logic Unit

Question 6.
I am an input device. I can read text or picture on paper and translate into computer usable form. Who am i?
Answer:
Scanner

Question 7.
Odd man out.
Answer:
a) Track ball
b) Joy Stick
c) Scanner
d) LCD
LCD. It is an output device. Others are input device

Question 8.
Odd man out.
a) Inkjet
b) Laser
c) Dot Matrix Printer
d) Thermal
Answer:
Dot Matrix Printer.
It is impact printer others are non impact printers.

Question 9.
The storage capacity of a CD is ______
(a) 1.44 MB
(b) 700 GB
(c) 700 MB
(d) 650 GB IIP
Answer:
700 MB

Question 10.
_______ sheet is used to write answers in Kerala Entrance Exam.
Answer:
OMR Sheet

Question 11.
ABC textile uses ____ reader to input the item and its price.
Answer:
Bar code reader.

Question 12.
________ device senses the presence or absence of a pencil mark.
Answer:
OMR

Question 13.
Name any two printing devices.
Answer:
Mouse and touchpad.

Question 14.
______ is a device that draws pictures on a paper.
Answer:
Plotter.

Question 15.
Primary memory is classified into two What are they?
Answer:
RAM and ROM.

Question 16.
The storage capacity of a DVD is ______.
Answer:
4.7 GB.

Question 17.
Winzip is a ______ utility
Answer:
Compression utility.

Question 18.
Win Rar is a ______ utility
Answer:
Compression utility.

Question 19.
Most commonly used input device is ______.
Answer:
Keyboard or mouse.

Question 20.
Govt decided to conduct a test that contains all objective type questions. Which device is most suitable for evaluation.
Answer:
OMR

Question 21.
______ is used mostly for computer games.
Answer:
Joy stick.

Question 22.
I am an input device. I have a stick with two but-tons called triggers on the top. Who am I?
Answer:
Joy stick.

Question 23.
I am a pointing device. I am a stationary device. Who am I?
Answer:
Touchpad.

Question 24.
In portable computers which pointing device is suitable?
Answer:
Touchpad.

Question 25.
State true or false.
Hard copy devices are very slow compared to soft copy devices.
Answer:
True.

Question 26.
_______ is also called firm ware.
Answer:
ROM.

Question 27.
_______ is acts as an interface between user and computer.
Answer:
Operating system.

Question 28.
is used to create and modify any type of document.
Answer:
Word Processor.

Question 29.
_____ is a set of programs that manage the data base.
Answer:
DBMS.

Question 30.
package contains rows & columns.
Answer:
Spread sheet.

Question 31.
_____ is a presentation package.
Answer:
Power Point.

Question 32.
Your computer teacher asked you to explain the project work done by your group. Which package will help you to do so?
Answer:
Power Point.

Question 33.
_____ is a DTP Package.
(a) Excel
(b) PowerPoint
(c) PageMaker
(d) None of these
Answer:
PageMaker.

Question 34.
DTP is _______.
Answer:
Desk Top Publishing.

Question 35.
______ is designed to help computer for its smooth functioning.
Answer:
Utilities

Question 36.
Customised software is also called ________.
Answer:
Tailor made software.

Question 37.
_______ S/W is used to remove virus from a computer.
Answer:
Anti Virus S/W

Question 38.
Name any anti virus S/W.
Answer:
Norton Anti virus,.McAfee, Avira, AVG

Question 39.
Name the two classifications of output devices.
Answer:
Hard copy and soft copy.

Question 40
Name, the two classification of printers.
Answer:
Impact printer and non-impact printer.

Question 41.
________ gas is used in plasma panels
(a) Oxygen
(b) Neon
(c) Mercury
(d) helium
Answer:
Neon

Question 42.
_______ printers are used in fax machine.
Answer:
Thermal Printers

Question 43.
________ is read / write memory.
Answer:
RAM

Question 44.
______ is of volatile memory
(a) ROM
(b) RAM
(c) CD
(d) DVD
Answer:
RAM

Question 45.
From the following which is expensive?
(a) CD
(b) DVD
(c) HDD
(d) RAM
Answer:
RAM

Question 46.
You want to input your photograph into computer. Which device is used for this?
(a) Scanner
(b) Mouse
(c) OMR
(d) OCR
Answer:
Scanner

Question 47.
The primary memory which is commonly used in electronic billing machines to store price of products is
a) PROM
b) E P R O M
c)E EPROM
d) None of these
Answer:
EPROM

Question 48.
Name any three pointing devices.
Answer:
Mouse, Touchpad and light pen.

Question 49.
You want to print your brother’s resume which printer will you choose. Why ?
Answer:
I will choose either Ink-jet or Laser printer. Because these produce less noise and produce high quality printing output. They are used to print characters as well as graphics (Photos) with very high quality.

Question 50.
The fastest memory in a computer is
Answer:
Registers

Question 51.
The storage capacity of a single layer DVD is ______.
Answer:
4.7 GB

Question 52.
Give two examples for OS.
Answer:
Windows 7, Windows Vista.

Question 53.
A program in execution is called ______.
Answer:
Process.

Question 54.
Name the software that translates assembly language
Answer:
assembler.

Question 55.
DBMS stands for _____.
Answer:
Data Base Management System.

Question 56.
Duplicating disc information is called ______.
Answer:
Backup.

Question 57.
An example of free and open source software is _______.
Answer:
Linux.

Question 58.
The software that gives users a chance to try it before buying is ______.
Answer:
Shareware.

Question 59.
An example of proprietary software is ______.
Answer:
Tally.

Question 60.
Which software is used for calculation?
a) Word processor
b) Spreadsheet
c) Presentation
d) Multimedia
Answer:
b) Spread sheet.

Question 61.
Accumulator stores
a) address of data
b) instruction to be executed
c) address of next instruction to be executed
d) intermediate result
Answer:
d) intermediate result.

Question 62.
If Tracks and Sectors: Hard disk, then _______ Compact disk
Answer:
Pits and Lands (OR) 0 and 1

Question 63.
Which one of the following file extensions is different from others? ,
a) WAV
b) MP3
C) PNG
d) MIDI
Answer:
PNG, the others are audio files.

Question 64.
Which register holds the memory address of next instruction to the executed?
a) Accumulator
b) PC
c) MBR
d) MAR
Answer:
PC

Question 65.
a) Write the following memory devices in the order of their speed, (fastest to slowest order)
i) Cache
ii) RAM
iii) Hard Disk
iv) Registers
b) What do you mean by Freeware and Shareware?
Answer:
a) i) Registers
ii) Cache
iii) RAM
iv) Hard Disk
b) Freeware : A s/w with Copy right is available free of cost for unlimited use.
Shareware : It is an introductory pack distributed on a trial basis with limited functionality and period.

Plus One Computer Application Components of the Computer System 2 Marks Questions and Answers

Question 1.
The Higher Secondary Department wishes to conduct an examination for +1 students with multiple choice questions and publish results as soon as possible. Suggest a method to evaluate the answer scripts and publish the results quickily & correctly with the help of computers.
Answer:
OMR has to be used, it senses the presence or absence of a mark (bubbles) using a high density beam then converted into electric signals for computer. It needs good quality expensive paper and accurate alignment of printing on forms.

Question 2.
Remesh is a graphic designer who prepares his drawing using a computer. He desires for an alternative device by which he can draw directly on the screen. Suggest a device for this and explain it working.
Answer:
Light pens are used for this. It consists for a photocell placed in a small tube, it is able to detect the light coming from the screen. Hence locate the exact position on the screen. It is used by graphic designers, illustrators and drafting engineers, with the help of.CAD to draw directly on the screen.

Question 3.
You might have noticed that in some shops billing is done using computers without typing the item name, price, quantity, etc. Mention the device used for entering data and explain its working.
Answer:
A device called Bar Code Reader is used for this. It contains photoelectric scanner that read the bar code and input the information to the computer attached to it. It helps to reduce the errors and process the bills quickly.

Question 4.
Your school has arranged an excursion. You are having an ordinary camera whereas your friend has a digital camera. List the benefits your friend enjoys by using digital camera.
Answer:
1) Digital camera does not need film.
2) More number of shots can take
3) Operational cost is less
4) Very easy to manipulate images in digital form using computers.

Question 5.
A medical shop in your locality wishes to purchase a printer for their billing purpose. Which type of printer will you recommend if carbon copies are to be taken. Justify.
Answer:
Dot Matrix Printer.
To take carbon copies impact printer is a must, operational cost is less and it can print bills in a moderate speed.

Question 6.
Find the exact match.

1Laser PrinterAHeat Sensitive Paper
2Dot Matrix PrinterBCartridge
3Inkjet PrinterCRibbon
4Thermal PrinterDToner

Answer:
1-D
2-C
3-B
4-A

Question 7.
Your friend wishes to start § DTP centre with facilities to design posters and notices, to scan pictures and modify them and to print them. What would be your suggestions regarding the computer and peripherals?
Answer:
The requirements are computer, scanner, printer and software.

Question 8.
Find the most appropriate match.

11 GBA230 bytes
2220 bytesB230 KB
3220 KBC1 MB
41 TeraByteD210 MB

Answer:
a) 1-D
b) 2-C
c) 3-A
d) 4 – B

Question 9.
Suggest a suitable device for the following.
a) High quality printing
b) High quality drawing
c) Printing with carbon copies
c) Economical printing of small quantities of data
d) data economically
Answer:
a) Non impact – Laser printers, Inkjet
b) Plotter
c) Impact (DMP(Dot Matrix Printer))
d) Dot Matrix Printers

Question 10.
“Not all primary memory is volatile”. Justify this statement.
Answer:
Primary Memory (Main memory) is classified into two RAM and ROM. Out of this RAM is volatile but ROM is non volatile.

Question 11.
Categorise the softwares in the list according to the appropriate classifications given below.’
Answer:
Classification : OS, Compiler, DTP Software, Com-pression software, Word processor
List : Open Office Writer, Photoshop, 7 Zip, MS Word, Unix, C++, PageMaker, Winzip, C, Windows 98,
OS – Unix, Windows 98
Compiler – C, C++
DTP Software – Photoshop, PageMaker
Compression – 7 Zip, Winzip ;
Word Processor – Open Office Writer, MS word

Question 12.
Your friend has just assembled a computer. Now he is provided with installation CD’s of MS Word and Microsoft Windows XP. In what order will he install them? Justify your answer.
Answer:
First he has to install the Microsoft Windows XP because it is the OS, it makes the computer to work other programmes. After that only he can install . MS Word it is a package.

Question 13.
A group of 20 students is given a test in 6 subjects. The examiner wishes to prepare a neatly formatted marklist with total and Rank. Suggest a suitable software to serve this purpose. Give reasons.
Answer:
The spread sheet Excel is a suitable software to serve this purpose. It consists of inbuilt functions, that facilitates to find total and rank easily

Question 14.
A program is written in BASIC, C and assembly language. Mention the difference in converting these programs to machine language.
Answer:
a) C – Compiler
b) BASIC – Interpreter
c) Assembly Language – Assembler

Question 15.
Your friend told you that he has a system. What is a system ? Explain..
Answer:
A computer is also called a system. A computer is not a single unit. It consists of more than one unit such as input unit, output unit, memory unit, ALU and control unit. Therefore a computer is called a system.

Question 16.
What is cache memory?
Answer:
A cache (pronounced cash) memory is a high speed memory placed in between the processor and pri-mary memory to reduce the speed mismatch be-tween these two.

Question 17.
What is the use of program counter register?
Answer:
This register stores the memory address of the next instruction to be executed by the CPU.

Question 18.
What is HDMI?
Answer:
Its full form is High Definition Multimedia Interface. Through this port we can connect high definition quality video and multi channel audio over a single cable.

Question 19.
Give two examples for customized software.
Answer:
1) Pay roll System : It keeps track of details of employee and their salary details-in an organisation
2) Inventory Management System : It keeps tack of all about inventory in a company

Question 20.
What do you mean by free and open source s/w?
Answer:
Here “free” means there is no copy right or licensing. That is we can take copies of the s/w or modify the source code without legal permission of its vendor (creator) we can use and distribute its copy to our friends without permission. That is Freedom to use, to modify and redistribute.

Question 21.
a) What do you mean by cache memory?
b) Write the names of the figures given below.
Answer:
a) It is a high speed memory placed in between . the CPU and RAM. CPU is a high speed memory compared to RAM. There is a speed mismatch between the CPU and RAM to resolve this problem a high speed memory called cache memory is placed in between the CPU and RAM
b) QR code and Bar Code such as input unit, output unit, memory unit, ALU and control unit. Therefore a computer is called a system.

Question 22.
What is the role of students in e-Waste disposal?
Answer:
Students’ role in e-Waste disposal

  1. Stop buying unnecessary electronic equipments
  2. Repair Faulty electronic equipments instead of buying a new one.
  3. Give electronic equipments to recycle
  4. Buy durable, efficient, quality, tbxic free, good warranty products
  5. check the website or call the dealer if there is any exchange scheme
  6. Buy rechargeable battery products

Plus One Computer Application Components of the Computer System 3 Marks Questions and Answers

Question 1.
Why is the paper coming from the laser printer hot? Explain.
Answer:
Laser printer uses photocopying technology. It uses a positively charged drum and negatively charged toner (dry powder). A laser beam is used to scan the page to be printed on the drum with positive charge and then rolled through a reservoir of negatively charged toner. It uses a combination of heat and pressure to adhere the dry powder to the paper. That is why, the paper coming from the laser printer is hot.

Question 2.
Explain the process how data from the hard disk is taken to the processor for processing.
Answer:
A processor is a high speed device. It can access data only from the Primary Memory (RAM). So we have to transfer data from hard disk to RAM. We know that a hard disk is a slow device also. So data is first transferred to RAM. A RAM is comparatively slower than processor. To reduce the speed mis-match between the RAM and processor, the data has to transfer to CPU registers. Then the processor takes the data from the CPU register because CPU register has almost equal speed as processor.

Question 3.
Why computer is called as a system?
Answer:
A computer is also called a system. A computer is not a single unit. It consists of more than one unit such as input unit, output unit, memory unit, ALU and control unit. Therefore a computer is called a system.

Question 4.
Differentiate hardware and software.
Answer:
The tangible parts of a computer is called hardware. We can see, touch and feel the hardware in a computer.’
The set of instructions that tell the hardware how to perform a task is called software. Without software computer cannot do anything

Question 5.
We all have a brain. Just like this, is the computer has a brain? Explain it?
Answer:
Yes. CPU is the brain of a computer. The CPU comprises three parts ALU, Control Unit and Memory. The control unit control the overall functioning of a system. ALU performs all the arithmetic calculations and takes logical decisions. Memory is used for storage of data for future reference.

Question 6.
Explain the various functions of a control unit.
Answer:
The control unit performs the following functions.
1) It controls data flow between input device. ALU, memory and output devices.
2) Normal execution of a program is line by line. The control unit controls this sequence with the help of ALU and memory.
3) It controls the decoding and interpretation of instructions.

Question 7.
Match the following
Plus One Computer Application Chapter Wise Questions Chapter 2 Components of the Computer System 1
Answer:
1-c
2-d
3-f
4-a
5-b
6-e

Question 8.
Write down the full form of the following.
a) VDU
b) OMR
Answer:
a) VDU – Visual, Display Unit
b) OMR – Optical Mark Reader.

Question 9.
We know that a scanner is a hardware. What do you think of a virus scanner ? Explain.
Answer:
We know that a scanner is a hardware but a virus scanner is not a hardware. It is a program. That is a virus scanner is an antivirus software. That scans your disk (HDD, CD, DVD, Pen Drive ) for viruses and removes .them (if it can), if any virus is found.

Question 10.
Your friend told you that a compiler is a hardware. Is it true ? Justify your answer.
Answer:
It- is not true. A compiler is not a hardware but it is a software. A compiler is a collection of programs that translates program written in HLL into machine language

Question 11.
Anil purchased a product from a super market and he found that its wrapper contains light and dark bars. What is the purpose of this ?
Answer:
This light and dark bars are called bar code. It is used to record some details about the product such as item code, name, price etc…. A device called Bar Code Reader contains photo electric scanner that read the bar code and input the information to the computer attached to it. It helps to reduce error arid process the bills quickly.

Question 12.
What are the disadvantages of OMR ?
Answer:
The disadvantages are:
1) It heeds accurate alignment of printing on forms.
2) It needs good quality expensive paper.

Question 13.
Differentiate CRT and LCD (OR) Your friend going to purchase a computer. He asked you which is better, CRT or LCD ? What is your opinion ?
Answer:
The difference between CRT and LCD is given below:

CRTLCD
It is heavy and bulkyIt is neither heavy nor bulky
It consumes more power and emits heatIt consumes less power and’ does not emit heat
It is used in desk top computerIt is used with laptop and desktop
It is cheaperIt is expensive.

So LCD is more better than CRT

Question 14.
While you pressing “A” on the keyboard what is actually stored in the memory ?
Answer:
The keyboard is an electro mechanical device that is designed to Greate electronic codes when a key is pressed and this code is transmitted to the memory through the cable. Here while you pressing “A” on the keyboard, the electronic codes corresponding to the ASCII value 01000001 is transmitting to the memory.

Question 15.
Your family friend started a super market. He asked you, which printer is suitable to print bills. Give your suggestion.
Answer:
According to my opinion, dot matrix printer is most suitable. Because they are capable of faster printing as well as it is cheap also. It’s printing quality is not good but cost per copy is very cheap. Dot matrix printer consists of a ribbon catridge that is cheap and can be changed easily. Here we have to print more copies at a time. So dot matrix is suitable.

Question 16.
Suppose your brother is an engineer. He wants to draw some drawings. Which output device is suitable? Explain.
Answer:
Plotter is suitable for him. A plotter is a device that draws pictures or diagrams on paper based on commands from a computer. Plotters draw lines using a pen. Pen plotters generally use drum or flat bed paper holders. In a drum plotter the paper is mounted on the surface of a drum. Here the paper is rotated. But in a flat bed plotter the paper does not move and the pen holding mechanism provides the motion that draws pictures. Plotters are used in engineering applications where precision is needed.

Question 17.
Match the following.
Plus One Computer Application Chapter Wise Questions Chapter 2 Components of the Computer System 2
Answer:
1-b
2-a
3-d
4-e
5-c

Question 18.
There are special purpose storage locations within  the CPU. What are they explain ?
Answer:
Registers are special purpose storage locations within the CPU. They are temporary storage locations. The processing power of a CPU depends on register. Registers appears with storage capacity of 8 bits, 16 bits, 32 bits an 64 bits. They accept, store and transfer data from the CPU at a very high speed.
Program Counter : This register stores the memory address of the next instruction to be executed by the CPU.
Instruction Register : The instruction to be executed is stored in this register.
Memory Address Register : The address on the memory location from which data has to be read is stored here.
Memory Buffer Register : The data read from the location specified by the MAR is stored in this register.
General Purpose Registers : These are used to store the result and interrpediate results during a processing.

Question 19.
What is an operating system? flag operating system
Answer:
An operating system acts as an interface between user and computer without an operating system computer is a bare machine. That is without an OS computer cannot do anything. The OS not only makes the system convenient to use but also use hardware in an efficient manner,
eg:- Windows XP, Vista, Linux* MS Dos, Windows 7.

Question 20.
We know that a computer only knows low level Ianguage and human beings use high level language.
So how is it possible to communicate? Explain.
Answer:
The language processors translate the programs written in HLL into machine language which is understood by the computer, The different language processors are given below:
i) Assembler : This language processor translates programs written in assembly language into ma-chine language.
ii) Interpreter : This language processor translates < programs written in HLL into machine language by converting and executing it line by line. If there is any error, the execution is stopped we can continue after the correction of the program.
iii) Compiler : This language processor is same as interpreter. But it translates HLL into machine language by converting whole lines at a time. If there is any error, correcting all the errors then only it will execute.

Question 21.
Normally a CD contains 700 MB. Is it possible to store a file with size 1 GB? Explain.
OR
Normally a Car has a seating capacity of 5 persons including the driver. But some adjustments more persons can be accommodated in Car. This is connected with a utility. Which is the utility? Explain.
Answer:
Compression utility is used for this. By using compression utility programs we can reduce the file size upto the one third of the file size. So by using this we can reduce 1GB file and store in a CD. It is provided by the OS. The other compression utility programs are Winzip, WinRar etc. It is possible to compress the files and when needed, these com-pressed files can be uncompressed and it is restored to their original form.

Question 22.
What is a Virus?
Answer:
A virus is a bad program or harmful program to damage routine working of a computer system. It reduces the speed of a computer. It may be delete the useful system files and make the computer useless.

Question 23.
What do you mean by Utilities?
Answer:
Utilities are useful programs which are designed to help computer for its smooth functioning. Some utilities are back up utility, Disk defragmentation. Virus scanner, etc. It is provided by the O.S.

Question 24.
Differentiate RAM and ROM.
Answer:
The difference between RAM and ROM is given below.

RAMROM
1. It is Random Access Memory1. It is Read only Memory
2. It is Read/Write memory2. We can’t write but we can only read memory.
3. It is temporary3. It is permanently stored.
4. It is volatile4. It is non volatile
5. RAM is faster5. It is slower
6. It is used to store data and instructions needed by CPU for processing6. It contains instructions to check the hardware components, BIOS operations etc.
7. It is also called firmware.

Question 25.
Mention any two functions of OS.
Answer:
Major functions of an operating System
i) Process management: It includes allocation and de allocation of processes(program in execution) as well as scheduling system resources in efficient manner
ii) Memory management: It takes care of allocation and de allocation of memory in efficient manner
iii) File management : This includes organizing, naming , storing, retrieving, sharing , protecting and recovery of files.
iv) Device management : Many devices are connected to a computer so it must be handled efficiently.

Question 26.
Give two examples of human ware.
Answer:
(Write any two from the following)
The term refers the persons who use computer System Administrator: It is a person who has central control over the computer systems.
System Managers: He is responsible for all business transactions with all vendors and contractors.
System Analysts: He is responsible to improve the productivity and efficiency.
Database Administrator – It is a person who has a central control over the DBMS.
Computer Engineer: The person design either h/w or s/w of a computer system.
Application Programmer- These are computer professionals who interact with the DBMS through programs.
Computer operators : He is an end user and does not know computer in detail.

Question 27.
Explain how e-waste creates environmental and health problems. What are the different methods for e-waste disposal? Which one is the most effective in your point of view? Why?
Answer:
e-Waste(electronic waste) : It refers to the mal functioning electronic products such as faulty computers, mobile phones, tv sets, toys, CFL, batteries etc.
It contains poisonous substances such as lead, mercury, cadmium etc and may cause diseases if not properly managed.
A small amount is recycled. Due to this our natural resources are contaminated(poisoned). Some of them can recycle properly. But it is a very big problem in front of the Government to collect segregate, recycle and disposal of e-Waste.

e-Waste disposal methods

a) Reuse : Reusability has an important role of e – Waste management and can reduce the volume of e-Waste.
b) Incineration: It is the process of burning e Waste at high temperature in a chimney.
c) Recycling of e-Waste : It is the process of making new products from this e-Waste.
d) Land filling : It is used to level pits and cover b thick layer of soil.

Question 28.
What do you mean by e-waste? Explain the role of students in e-waste disposal.
Answer:
e-Waste(electronic waste) : It refers to the mal functioning electronic products such as faulty computers, mobile phones, tv sets, toys, CFL etc. It contains poisonous substances such as lead, mercury, cadmium etc and may cause diseases if not properly managed.

Students’ role in e-Waste disposal

  1. Stop buying unnecessary electronic equipments
  2. Repair Faulty electronic equipments instead of buying a new one.
  3. Give electronic equipments to recycle
  4. Buy durable, efficient, quality, toxic free, good warranty products
  5. check the website or call the dealer if there is any exchange scheme
  6. Buy rechargeable battery products

Plus One Computer Application Components of the Computer System 5 Marks Questions and Answers

Question 1.
Write short notes about input devices.
Answer:
An input device is used to supply data to the computer. They are given below:
1) Key board : It is the most widely used device to input information in the form of words, numbers etc. There are 101 keys on a standard key board. The keys on the key board are often classified into alpha numeric keys (A to Z, 0 to 9), function keys (F1 to F12), special purpose keys (Special characters), cursor movement keys (arrow keys). While pressing a key, the corresponding code’s signal is transmitted to the computer.

2) Mouse : It is a pointing device, that controls the movement of the cursor, or pointer as a display screen. A mouse has two or three buttons, it is often used in GUI oriented computers. Under the mouse there is a ball, when the mouse moves on a flat surface this ball also moves. This mechanical motion is converted into digital values that represents x and y values of the mouse movement.

3) Optical Mark Reader (OMR): This device identifies the presence or absence of a pen or pen-cil mark. It is used to evaluate objective {ype exams. In this method special preprinted forms are designed with circles can be marked with dark pencil or ink. A high intensity beam in the OMR converts this into computer usable form and detects the number and location of the pencil marks. By using this we can evaluate easily and reduce the errors.

4) Bar code / Quick Response (QR) code reader: Light and dark bars are used to record item name, code and price is called Bar Code. This information can be read and input into a com-puter quickly without errors using Bar Code Readers. It consists of a photo electric scanner and it is used in super market, jewellery, textiles etc.
QR codes are similar to barcodes but it uses two dimensional instead of single dimensional used in Barcode.

5) Joy Stick: It is a device that lets the user move an object quickly on the screen. It has a liver that moves in all directions and controls the pointer or object. It is used for computer games v and CAD / CAM systems.

6) Light Pen : It is an input device that use a light sensitive detector to select objects directly on a display screen using a pen. Light pen has a photocell placed in a small tube. By using light pen, we can locate the exact position on the screen.

7) Scanner : It is used to read text or pictures . printed on paper and translate the information into computer usable form. It is just like a photostat machine but it gives information to the computer.

8) Digital Camera : By using digital camera, we can take photographs and store in a computer. Therefore we can reduce the use of film. Hence it is economical.

9) Touchpad: It is a pointing device found on the portable computers(lap top). Just like a mouse it consists of two buttons below the touch surface to do the operations like left click and right click. By using our fingers we can easily operate.

10) Microphone :“By using this device we can convert voice signals into digital form.

11) Biometric sensor: It is used to read unique human physical features like finger prints,retina, iris pattern, facial expressions etc. Most of you give these data to the Government for Aadhaar.

12) Smart card, reader: A plastic card(may be Iik6 your ATM. card) stores and transmit data with the help of a reader.

13) Digital Camera : By using digital camera, we can take photographs and store in a computer. Therefore we can reduce the use of film. Hence it is economical.

Question 2.
Briefly explain the various visual display units.
Answer:
The visual display units are given below:

1) Cathode Ray Tube (CRT) : There are two types of CRT’s, monochrome (Black and white) and colour. Monochrome CRT consists of one electron gun but colour CRT consists of 3 electron guns (Red, Green and Blue) at one end and the other end coated with phosphor. It is a vacuum tube. The phosphor coated screen can glow when electron beams produced by electron guns hit. It is possible to create all the colours using Reef, Green and Blue. The images produced by this is refreshed at the rate of 50 or 60 times each second. Its disadvantage is it is heavy and bulky. It consumes more power and emits heat. But it is cheap. Nowadays its production is stopped by the company.

2) Liquid Crystal Display (LCD): It consists of two electrically conducting plates filled with liquid crystal. The front plate has transparent electrodes and the back plate is a mirror. By applying proper electrical signals across the plates, the liquid crystals either transmit or block the light and then reflecting it back from the mirror to the viewer afrid hence produce images. It is used in where small sized displays are required.

3) Light Emitting Diode(LED): It uses LED behind the liquid crystals in order to light up the screen.
It gives a better quality and clear image with wider viewing angle. Its power consumption is less.

4) Plasma Panels : It consists of two glass plates filled with neon gas. Each plate has several parallel electrodes, right angles to each other. When low voltage is applied between two electrodes, one on each plate, a small portion of gas is glow and hence produce images. Plasma displays provide high resolution but are expensive. It is used in, where quality and size is a matter of concern.

5) Organic Light Emitting Diode(OLED) Monitors: It is made up of millions of tiny LEDs. OLED monitors are thinner and lighter than LCDs and LEDs. It consumes less power and produce better quality images but it is very expensive.

Question 3.
Your friend wants to buy a printer. He wants to know more about printers. Explain different types of printers.
Answer:
Printer: There are two types of printers impact and non impact printers. Printers are used to produce hard copy.
Impact Printers: There is a mechanical contact be-tween print head and the paper.

1) Dot Matrix Printer: Here characters are formed by using dots. The printing head contains a vertical array of pins. The letters are formed by using 5 dot rows and 7 dot columns. Such a pattern is called 5 x 7 matrix. This head moves across the paper, the selected pins fire against an inked ribbon to form characters by dot. They are capable of faster printing, but their quality is not good.

2) Non-impact Printers : There is no mechanical contact between print head and paper so Carbon copies cannot be possible to take. They are inkjet, laser, thermal printers etc.

a) Ink jet Printer: It works in the same fashion as dot matrix printers, but the dots are formed with tiny droplets of ink to be fired from a bottle through a nozzle. These droplets are deflected by an electric field using horizontal and vertical deflection plates to form Characters and images. It is possible to generate colour output. They produce less noise and produce high quality printing output. The printing cost is higher. Here liquid ink is used.

b) Laser Printer: It uses photo copying technology. Here instead of liquid ink dry ink powder called toner is used. A drum coated with positively charged photo conductive material is scanned by a laser beam. The positive charges that are illuminated by the beam are dissipated. The drum is then rolled through a reservoir of negatively charged toner which is picked up by the charged portions of the drum. It adheres to the positive charges and hence creating a page image on the drum. Monochrome laser printer uses a single toner. whereas the colour, laser printer uses four toners. Its print quality is good less noise and printing cost is higher.

c) Thermal Printers : It is same as dot matrix printer but it needs heat sensitive paper. It produces images by pushing electrically heated pins to the special paper. It does not make an impact on the paper so we cannot produce carbon copies. It produce less noise, low quality print and inexpensive. It is used in fax machine.

3) Plotter: A plotter is a device that draws pictures or diagrams on paper based on commands from a computer. Plotters draw lines using a pen. Pen plotters generally use drum or flat bed paper holders. In a drum plotter the paper is mounted on the surface of a drum. Here the paper is rotated. But in a flat bed plotter the paper does not move and the pen holding mechanism provides the motion that draws pictures. Plotters are used in engineering applications where precision is needed.

4) Three Dimensional (3D) printer: This device is used to print 3D objects.

Question 4.
Your school got two printers. One dot matrix and one Laser printer through ICT scheme of Central Govt. What is the difference between these two printers? Explain. .
Answer:

Laser PrinterDot Matrix Printer
It is non-impact printerIt is impact printer
Speed is highSpeed is less
Good quality text andLow quality text and very
picturepoor quality picture
Less noiseMore noise
Printing cost is highPrinting cost is low
Not possible to takePossible to take carbon
carbon copycopy
Toner is usedRibbon is used

Question 5.
Explain Primary Memory in detail.
Answer:
Primary memory is classified into two, Random Access Memory (RAM) and Read Only Memory (ROM). The primary memory hold? the data which is to be processed by the CPU and the set of instructions to be executed next. The CPU can access the instructions in the primary memory only.

Random Access Memory (RAM): RAM is used to store data and instructions needed by the CPU for processing. RAM can be used for both reading and writing of data so it is called Read and Write memory. It is a volatile memory, that is contents of the RAM will be lost when the power is turned off. The invention of integrated circuits (chips) increased the memory capacity and redi/ced the size and cost. Static RAM, Dynamic RAM, Synchronous Dynamic RAM (SDRAM) are the various types of RAM.

Read Only Memory (ROM) : We can read this memory but we cannot write into this memory. It is a nonvolatile memory, that is its contents will not lost when the power is turned off. This memory is stored in the ROM chip at the time of manufacturing itself hence it is called firmware. ROM contains instructions to check the hardware components connected to the system, perform some basic input/ output operations (BlbS), initiates loading of essential software. The different categories are PROM, EPROM and EE PROM.

PROM (Programmable Read Only Memory) : It is just like WORM. That meaiis the instructions are write once but read many. But we cannot change the instructions.

EPROM (Erasable Programmable Read Only Memory) : It functions just like PROM. But by using ultraviolet light we can erase the old data and can write new data.

EEPROM (Electrically Erasable Programmable Read Only Memory) : Here instead of ultraviolet light electric signals are used to erase old data ‘and write new data under software control. It is highly expensive than regular ROM chips.

Question 6.
Explain secondary memory in detail.
OR
To store large volume of data permanently. Which memory is used? Explain.
Answer:
Primary memory has a limited storage capacity and it is not permanent that is why to store large volume of data permanently secondary memory or storage devices are used. They are of many types . and they vary in the capacity of storage, speed of data access and media of storage. Nowadays magnetic disks and optical disks are commonly used.

1) Magnetic Disk : Magnetic disk allows the storage and retrieval for contents of the disk from anywhere at a moderate speed. Magnetic Disks available in various size and storage capacity but the storage media and data access mechanism are similar. The storage media is circular platters or disks coated with magnetic material.

It consists of a spindle capable of rotating with .the help of an electrical motor and a read/write head,
a) Floppy disk : Floppy means flexible or soft, it uses flexible disk. Its storage capacity is 1.44MB and slower in data transfer rate.
b) Hard Disk : Instead of flexible or soft disk it uses rigid material hence the name hard disk. Its storage capacity and data transfer rate are high and low access time. These are more lasting and less error prone. The accessing mechanism and storage media are combined together in a single unit and connect to the mother board via cable.
Therefore we call it as hard disk drive (HDD). It contains one or more rigid platters coated both sides with a special magnetic material and a spindle. Datas are recorded on either surface of the disk except the outer side of last and first disk. Each surface will have one or more read/write heads (fixed head or movable head). The spindle is attached to a motor that rotates at high speed typically 7200 rotation per minute (rpm). A floppy disk rotates only at 300 rpm.

2) Optical Disk: The high power laser uses a concentrated, narrow beam of light, which is focuses and directed with lenses, prisms and mirrors for recording data. The optical disks are given below:

a) Compact Disk Read Only Memory (CDROM): The data in CDROM is imprinted by the manufacturers. The user cannot erase or write on the disk but user can only read its contents. CDROM is written in a single continuous spiral unlike magnetic disks that uses concentric qrcles. Its storage capacity is 700MB.

b) Erasable Optical Disk: The disadvantage of CDROM is that we cannot change or erase the contents. But erasable disks can be changed and erased.

c) Digital Versatile Disk: It is capable of storing upto 4.7GB and more faster.

d) Blu-ray Disc: It is used to read and write High Definition video data as well as to store very huge amount of data. While Cd and DVD uses red laser to read and write but it uses Blue- Violet laser, hence the name Blu ray disc. The blue violet laser has shorter wave length than a red laser so it can pack more data tightly.

3) Semiconductor storage (Flash memory): It uses EEPROM chips. It is faster and long lasting.

a) USB flash drive: It is also called thumb drive or pen drive. Its capacity varies from 2 GB to 32 GB.
b) Flash memory cards : It is used in Camera, Mobile phones, tablets etc to store all types of data.

Question 7.
What do you mean by a computer software? Mention its different classification.
OR
Your friend wants to know more about software. Explain more about different classification.
OR
Your friend told you that COBOL and MS Word are same softwares. Do you agree with him. Explain. What is a software and its classification ?
Answer:
A Software is a collection of programs to perform a task. The softwares can be classified into two major groups,
1) System software
2) Application software

I. System Software

It is a collection of programs used to manage system resources and control its operations. It is further classified into two.
a) Operating System
b) Language Processor

a) Operating System: It is collection of programs which acts as an interface between user and computer. Without an operating system computer cannot do anything. Its main function is make the computer usable and use hardware in an efficient manner, eg:- Windows XP, Windows Vista, Linux, Windows 7, etc.

b) Language Processes : We know that a program is a set of instructions. The instructions to the computer are written in different languages. They are high level language (HLL) and low level language. In HLL english like statements are used to write programs. They are C, COBOL, PASCAL, VB, Java etc. HLL is very easy and can be easily understood by the human being.
Plus One Computer Application Chapter Wise Questions Chapter 2 Components of the Computer System 3
Low level language are classifed into Assembly Language and Machine Language.
In assembly language mnemonics (codes) are used to write programs
Plus One Computer Application Chapter Wise Questions Chapter 2 Components of the Computer System 4
In Machine Language 0’s and 1’s are used to write program. It is very difficult but this is the only language which is understood by the computer. Usually programmers prefer HLL to write programs because of its simplicity. But computer understands only machine language. So there is a translation needed. The program which perform this job are language processors. The different language processors are given below:

1. Assembler: This converts programs written in assembly language into machine language.
2. Interpreter: This converts a HLL program into machine language by converting and executing it line by line. The first line is converted if there is no error it will be executed otherwise you have to correct it and the second line and so on.
3. Compiler: It is same as interpreter but there is a difference, it translate HLL program into machine language by converting all the lines at a time. if there is no error then only it will executed.

II. Application Software

Programs developed to serve a particular application is known as application software,
eg:– MS Office, Compression Utility, Tally etc.
Application software can further be sub divided into three categories.
a) Packages
b) Utilities
c) Customized Software
a) Packages: Application software that makes the computer useful for people to do every task. Pack-ages are used to do general purpose application.
They are given below:

1) Word Processes : This is used for creation and modification of text document. That means a word processor helps the people to create, edit and format a textual data with less effort and maximum efficiency. By using word processor we can change font and font size of character, change alignment (left, right, center and justify), check spelling and grammar of the whole document etc.
eg:- MS Word.

2) Spread Sheets : It contains data or information in rows and columns and can perform calculation (Arithmetic, Relational and logical operation). It helps to calculate results of a particular formula and the formula can apply different cells (A cell is the intersection of a row and column. Each column carries an alphabet for its name and row is numbered). It is used to prepare budgets, balance sheets, P & L account, Pay roll etc. We can easily prepare graphs and charts using data entered in a worksheet. A file is a work book that contains one or more work sheets,
eg :- MS Excel is a spread sheet software.

3) Presentation and Graphics: You can present your idea with sound and visual effects with the help of presentation software by preparing slides. The application software that manipulate visual images is known as graphics software.
Eg:- MS Power Point is a presentation package.

4) Data base package : Data base is a collection of large volume of data. DBMS is a set of programs that manages the datas are for the centralised control of data such that creating new records to the database, deleting, records whenever not wanted from the database and modification of the existing database.
Example for a DBMS is MS Access.

5) Utilities : Utilities are programs which are designed to assist computer for its smooth functioning.
The utilities are given below:

1) Text editor: It is used for creating and editing text files.
2) Backup utility : Creating a copy of files in another location to protect them against loss, if your hard disk fails or you accidently overwrite or delete data.
3) Compression Utility : It is used to reduce the size of a file by using a program and can be restored to its original form when needed.
4) Disk Defragmenter: It is used to speeds up disk access by rearranging the files that are stored in different locations as fragments to contiguous memory and free space is consolidated in one contiguous block
5) Vims Scanner: It is a program called antivirus ” software scans the disk for viruses and removes them if any virus is found.

c) Customised software: It is collection of programs which are developed to meet user needs to serve a particular application. It is also called tailor made software

Question 8.
To use a computer not only the hardware but also software are required. Explain the classification of software.
Answer:
Software : The set of instructions that tell the hardware how to perform a task is called software. Without software computer cannot do anything.
Two types System s/w and Application s/w System software :
It is a collection of programs used to manage system resources and control its operations.
It is further classified into two.
a) Operating System
b) Language Processor
a) Operating System : It is collection of programs which acts as an interface between user and computer. Without an operating system computer cannot do anything: Its main function is make the computer usable and use hardware in an efficient manner
eg:- Windows XP, Windows Vista,.Linux, Windows 7, etc.

Major functions of an operating System

i) Process management: It includes allocation and de allocation of processes(program in execution) as well as scheduling system resources in efficient manner
ii) Memory management : It takes care of allocation and de allocation of memory in efficient manner
iii) File management : This includes organizing, naming , storing, retrieving, sharing, protecting and recovery of files.
iv) Device management : Many devices are connected to a computer so it must be handled efficiently.

b) Language Processes : We know that a program is a set of instructions. The instructions to the computer are written in different languages. They are high level language (HLL) and low level language. In HLL English like statements are used to write programs. They are C, C++, COBOL, PASCAL, VB, Java etc. HLL is very easy and can be easily understood by the human being.
Low level language are classified into Assembly Language and Machine Language.
In assembly language mnemonics (codes) are used to write programs
Plus One Computer Application Chapter Wise Questions Chapter 2 Components of the Computer System 5
In Machine Language 0’s and 1 ’s are used to write program. It is very difficult but this is the only language which is understood by the computer. Usually programmers prefer HLL to write programs because of its simplicity. But computer understands only machine language. So there is a translation needed. The program which perform this job are language processors. The different language processors are given below :

1) Assembler: This converts programs written in assembly language into machine language.
2) Interpreter: This converts a HLL program into machine language by converting and executing it line by line. The first line is converted if there is no error it will be executed otherwise you have to correct it and the second line and so on.
3) Compiler: It is same as interpreter.but there is a difference it translate HLL program into machine language by converting all the lines at a time. If there is no error then only it will executed.

II. Application Software

Programs developed to serve a particular application is known as application software. eg:- MS Office, Compression Utility, Tally etc. Application software can further be sub divided into three categories.
a) Packages
b) Utilities
c) Customized Software

a) Packages: Application software that makes the computer useful for people to do every task. Packages are used to do general purpose application.
They are given below:

1) Word Processes : This is used for creation and . modification of text document. That means a word processor helps the people to create,, edit and format a textual data with less effort and maximum efficiency. By using word processor we can change font and font size of character, change alignment (left, right, center and justify), check spelling and grammar of the whole document etc.
eg:-MS Word.

2) Spread Sheets : It contains data or information in rows and columns and can perform calculation (Arithmetic, Relational and logical operation). It helps to calculate results of a particular formula and the formula can apply different cells (A cell is the intersection of a row and column. Each column carries an alphabet for its name and row is numbered). It is used to prepare budgets, balance sheets, P & L account, Pay rolj etc. We can easily prepare graphs and charts using data entered in a worksheet. A file is a work book that contains one or more work sheets,
eg :- MS Excel is a spread sheet software.

3) Presentation and Graphics : You can present your idea with sound and visual effects with the help of presentation software by preparing slides. The application software that manipulate visual images is known as graphics softvyare,
Eg: MS Power Point is’a presentation package.

4) Data base package: Data base is a collection of large volume of data. DBMS is a set of programs that manages the datas are for the centralized control of data such that creating new, records to the database, deleting, records whenever not wanted from the database and modification of the. existing database.
Example for a DBMS is MS Access.

5) DTP Packages : DTP means Desk Top Publishing. By using this we can create books, periodicals, magazines etc. easily and fastly. Now DTP packages are used to create in Malayalam also,
eg:- PageMaker.

6) Utilities : Utilities are programs which are designed to assist computer for its smooth functioning.
The utilities are given below:

1) Text editor: It is used for creating and editing text files.
2) Backup utility : Creating a copy of files in another location to protect them against loss, if your hard disk fails or you accidentally overwrite or delete data.
3) Compression Utility: It is used to reduce the size of a file by using a program and can be restored to.its original form when needed.
4) Disk Defragmenter: It is used to speeds up disk access by rearranging the files that are stored in different locations as fragments to contiguous memory and free space is consolidated in one contiguous block.
5) Virus Scanner: It is a program called antivirus software scans the disk for viruses and removes them if any virus is found.
c) Specific purpose software (Customized software): It is collection of programs which are developed to meet user needs to serve a particular application. It is also called tailor made software.

Question 9.
Describe the different types of memories and memory devices in computer with features and examples.
Answer:
Storage Unit(Memory Unit): A computer has huge storage capacity. It is used to store data and instructions before starts the processing. Secondly it stores the intermediate results and thirdly it stores information(processed data), that is the final results before send to the output unit(Visual Display Unit, Printer, etc)
Plus One Computer Application Chapter Wise Questions Chapter 2 Components of the Computer System 6
Two Types of storage unit
i) Primary Storage alias Main Memory: It is further be classified into Two – Random Access Memory (RAM) and Read Only Memory(ROM). The one and only memory that the CPU can directly access is the main memory at a very high speed. It is expensive hence storage capacity is less. RAM is volatile(when the power is switched off the content will be erased) in nature but ROM is non volatile(lt is permanent). In ROM a “boot up” program called BIOS(Basic Input Output System) is stored to “boots up” the computer when it switched on. Some ROMs are given below.

1) PROM(Programmable ROM) : It is programmed at the time of manufacturing and cannot be erased
2) EPROM (Erasable PROM): It can be erased and can be reprogrammed using special electronic circuit.
3) EEPROM (Electrically EPROM) : It can be . erased and rewritten electrically

Cache Memory : The processor is a very high speed memory but comparatively RAM is slower than Processor. So there is a speed mismatch between the RAM and Processor, to resolve this a highspeed memory is placed in between these two this memory is called cache memory. Commonly used cache memories are Level(L1) Cache(128 KB), L2(1 MB),L3(8 MB), L4(128MB).

ii) Secondary Storage alias Auxiliary Memory : Because of limited storage capacity of primary memory its need arises. When a user saves a file, it will be stored in this memory hence it is permanent in nature and its capacity is huge. Eg: Hard Disc Drive(HQD), Compact Disc(CD), DVD, Pen Drive, Blu Ray Disc etc.

i) Magnetic storage device: It uses plastic tape or metal/plastic discs coated with magnetic material.
Hard Disk : Instead of flexible or soft disk it uses rigid material hence the name hard disk. Its storage capacity and data transfer rate are high and low access time. These are more lasting and less error prone. The accessing mechanism and storage media are combined together in a single unit and connect to the mother board via cable.

ii) Optical storage device.
Optical Disk : The high power laser uses a concentrated, narrow beam of light, which is focuses and directed with lenses, prisms and mirrors for recording data. This beams burns very very small spots in master disk, which is used for making molds and these molds are used for making copies on plastic disks. A thin layer of aluminium followed by a transparent plastic layer is deposited on it. The holes made by the laser beam are called pits, interpreted as bit 0 and unburned areas are called lands interpreted as bit 1. Lower power laser beam is used to retrieve the data.

DVD(Digital Versatile Disc) : It is similar to CD but its storage capacity is much higher. The capacity of a DVD starts from 4.7 GB

Blu-ray Disc : It is used to read and write High Definition video data as well as to store very huge amount of data. While Cd and DVD uses red laserto read and write but it uses Blue-Violet laser, hence the name Blu ray disc. The blue violet laser has shorter wave length than a red laser so it can pack more data tightly.

iii) Semiconductor storage (Flash memory): It uses EEPROM chips. It is faster and long lasting.
USB flash drive: It is also called thumb drive or pen drive. Its capacity varies from 2 GB to 32 GB.
Flash memory cards: It is used in Camera, Mobile phones, tablets etc to store all types of data.

Question 10.
Explain how e-Waste creates environmental issues. Usually there are four methods for e-Waste dispoal.
Which one is the most effective? Why? Write a slogan to aware the public about e-Waste hazards.
Answer:
e-Waste disposal methods

a) Reuse : Reusability has an important role of e – Waste management and can reduce the volume of e-Waste
b) Incineration: It is the process of burning e Waste at high temperature in Q chimney
c) Recycling of e-Waste : It is the process of making new products from this e-Waste.
d) Land filling : It is used to level pits and cover by thick layer of soil.

Question 11.
With the help of a block diagram, explain the functional units of a computer.
Answer:
Functional units of computer
A computer is not a single unit but it consists of many functional units(intended to perform jobs) such as Input unit,Central Processing Unit(ALU and Control Unit), Storage (Memory) Unit and Output Unit.

1) Input Unit : Its aim is to supply data (Alphanumeric, image , audio, video, etc.) to the computer for processing. The Input devices are keyboard, mouse, scanner,mic, camera,etc

2) Central Processing Unit (CPU): It is the brain of the computer and consists of three components
Arithmetic Logic Unit(ALU) – As the name implies it performs all calculations and comparison operations.
Control Unit(CU)- It controls over all functions of a computer
Registers- it stores the intermediate results temporarily.

3. Storage Unit(Memory Unit): A computer has huge storage capacity. It is used to store data and instructions before starts the processing. Secondly it stores the intermediate results and thirdly it stores information(processed data), that is the final results before send to the output unit(Visual Display Unit, Printer, etc) .

Two Types of storage unit

i. Primary Storage alias Main Memory : It is further be classified into Two- Random Access Memory(RAM) and Read Only Memory(ROM). The one and only memory that the CPU can directly access is the main memory at a very high speed. It is expensive hence storage capacity is less. RAM is volatile (when the power is switched off the content will be erased) in nature but ROM is non volatile(It is permanent).

ii. Secondary Storage alias Auxiliary Memory: Because of limited storage capacity of primary memory its need arises. When a user saves a file, it will be stored in this memory hence it is permanent in nature and its capacity is huge.
Eg: Hard Disc Drive(HDD), Compact Disc(CD), DVD, Pen Drive,Blu Ray Disc etc.

4. Output Unit: After processing the data we will get information as result, that will be given to the end user through the output unit in a human readable form. Normally monitor and printer are used.