66
1 SLOW LEARNER 1. Introduction to Computers 1. Demerits of Artificial Intelligence Demerits of Artificial Intelligence High Cost: Creating of AI No Replicating Humans: Intelligence believed to be gift of nature. No Improvement with Experience No original creativity Unemployment Able to solve high complex problems including decision making and logical reasoning Computers have become smarter, faster and smaller Development of robotics Natural Language Processing Development of Voice Recognition Software 2. What is the function of an ALU? The ALU performs arithmetic operations such as addition, subtraction, multiplication, division and logical operations. The result of an operation is stored in internal memory of CPU. 3. Differentiate Input and output unit. Input Devices Output Devices Input unit is used to feed any form of data to the computer, which can be stored in the memory unit for further processing. An Output Unit is any hardware component that conveys information to users in an understandable form. Example: Keyboard, mouse,etc. Example: Monitor, Printer etc. 4.What are the components of a CPU? The CPU has three components which are Control unit, Arithmetic and logic unit (ALU) and Memory unit. 5. Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store the programs and data when the instructions are ready to execute. The secondary memory is used to store the data permanently. The Primary Memory is volatile, that is, the content is lost when the power supply is switched off. The Secondary memory is non volatile, that is, the content is available even after the power supply is switched off. EG: The Random Access Memory (RAM) EG:Hard disk, CD-ROM and DVD ROM 6. Distinguish between data and information. Data Information Data is defined as an unprocessed collection of raw facts, suitable for communication, interpretation or processing. Information is a collection of facts from which conclusions may be drawn. Example, 134, 16 ‘Kavitha’, ‘C’ are data. This will not give any meaningful message. Example: Kavitha is 16 years old. Namma Kalvi www.nammakalvi.org

Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

  • Upload
    others

  • View
    14

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

1

SLOW LEARNER 1. Introduction to Computers

1. Demerits of Artificial Intelligence Demerits of Artificial Intelligence High Cost: Creating of AI No Replicating Humans: Intelligence believed to be gift of nature. No Improvement with Experience No original creativity Unemployment Able to solve high complex problems including decision making and logical reasoning Computers have become smarter, faster and smaller Development of robotics Natural Language Processing Development of Voice Recognition Software

2. What is the function of an ALU?

The ALU performs arithmetic operations such as addition, subtraction, multiplication, division and logical operations. The result of an operation is stored in internal memory of CPU. 3. Differentiate Input and output unit.

Input Devices Output Devices Input unit is used to feed any form of data to the computer, which can be stored in the memory unit for further processing.

An Output Unit is any hardware component that conveys information to users in an understandable form.

Example: Keyboard, mouse,etc. Example: Monitor, Printer etc.

4.What are the components of a CPU?

The CPU has three components which are Control unit, Arithmetic and logic unit (ALU) and Memory unit. 5. Distinguish Primary and Secondary memory.

primary memory secondary memory

The primary memory is used to temporarily store the programs and data when the instructions are ready to execute.

The secondary memory is used to store the data permanently.

The Primary Memory is volatile, that is, the content is lost when the power supply is switched off.

The Secondary memory is non volatile, that is, the content is available even after the power supply is switched off.

EG: The Random Access Memory (RAM) EG:Hard disk, CD-ROM and DVD ROM

6. Distinguish between data and information.

Data Information Data is defined as an unprocessed collection of raw facts, suitable for communication, interpretation or processing.

Information is a collection of facts from which conclusions may be drawn.

Example, 134, 16 ‘Kavitha’, ‘C’ are data. This will not give any meaningful message.

Example: Kavitha is 16 years old.

Namma Kalvi

www.nammakalvi.org

Page 2: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

2

7. Write the functions of control unit.

Control Unit:The control unit controls the flow of data between the CPU, memory and I/O devices. It also controls the entire operation of a computer. 8. Write the Finger print scanner

Finger print Scanner is a fingerprint recognition device used for computer security, equipped with the fingerprint recognition feature that uses biometric technology.

Fingerprint Reader / Scanner is a very safe and convenient device for security instead of using passwords, which is vulnerable to fraud and is hard to remember.

9. What is a track ball? Track ball is similar to the upside – down design of the mouse. The user moves the ball directly, while the device itself remains stationery. The user spins the ball in various directions to effect the screen movements.

10.what is Machine Language? Machine language is a collection of binary digits or bits that the computer reads and interprets.

3-marks 1. Write the applications of computer.

1.Business 2.Education 3.Insurance 4.Marketing 5.Banking

6.Communication

7.Communication Robotics,Nano technology,BioEngineering

2. Write short note on impact printer? Impact Printers

These printers print with striking of hammers or pins on ribbon. These printerscan print on multi-part (using carbon papers) by using mechanical

pressure. Forexample, Dot Matrix printers and Line matrix printers are impact printers. A Dot matrix printer that prints using a fixed number of pins or wires. The printing speed of these printers varies from 30 to 1550 CPS (Character Per

Second). Line matrix printers use a fixed print head for printing.

3. Write the characteristics of sixth generation. • Parallel and Distributed computing • Computers have become smarter, faster and smaller • Development of robotics • Natural Language Processing • Development of Voice Recognition Software 4. Write the significant features of monitor.

Monitor is the most commonly used output device to display the information. It looks like a TV.

Pictures on a monitor are formed with picture elements called PIXELS. Monitors may either be Monochrome which display text or images in Black and White or can be color, which display results in multiple colors.

There are many types of monitors available such as CRT (Cathode Ray Tube), LCD (Liquid Crystal Display) and LED (Light Emitting Diodes).

www.nammakalvi.org

Page 3: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

3

5. Type of Mouse

s.n Type of Mouse Mechanism Developed and Introduced

1 Mechanical Mouse

• A small ball is kept inside and touches the pad through a hole at the bottom of the mouse. •When the mouse is moved,the ball rolls. • This movement of the ball is converted into signals and sent to the computer.

Telefunken, German Company, 02/10/1968

2 Optical Mouse

• Measures the motion and acceleration of pointer. • It uses light source instead of ball to judge the motion of the pointer. • Optical mouse has three buttons. • Optical mouse is less sensitive towards surface.

• In 1988, Richard Lyon, Steve Krish independently invented different versions of Optical Mouse.

3 Laser Mouse

• Measures the motion and acceleration of pointer. • Laser Mouse uses Laser Light • Laser Mouse is highly sensitive and able to work on any hard surface.

4. DEFINE ISCII. Indian Standard Code for Information Interchange (ISCII) ISCII is the system of handling the character of Indian local languages. This as a 8-bit coding system. Therefore it can handle 256 (28) characters. This system is formulated by the department of Electronics in India in the year 1986- 88 and

recognized by Bureau of Indian Standards (BIS). Now this coding system is integrated with Unicode.

5. Extended Binary Coded Decimal Interchange Code (EBCDIC) This is similar to ASCII Code with 8 bit representation. This coding system is formulated by International Business Machine(IBM). The coding system can handle 256 characters. The input code in ASCII can be converted to EBCDIC system and vice - versa.

5-marks Explain in detail

1. Explain the basic components of a computer with a neat diagram. Components of a Computer

The computer is the combination of hardware and software. Hardware is the physical component of a computer like motherboard, memory devices,

monitor, keyboard etc., while software is the set of programs or instructions. Both hardware and software together make the computer system to function.

Page 4: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

4

Components of a computer

Input Unit

Input unit is used to feed any form of data to the computer, which can be stored in the memory unit for further processing. Example: Keyboard, mouse, etc. Central Processing Unit CPU is the major component which interprets and executes software instructions. It also control the operation of all other components such as memory, input and output units.

Arithmetic and Logic Unit The ALU is a part of the CPU where various computing functions are performed on data. The ALU performs arithmetic operations such as addition, subtraction, multiplication,

division and logical operations. Control Unit The control unit controls the flow of data between the CPU, memory and I/O devices. It also controls the entire operation of a computer. Output Unit An Output Unit is any hardware component that conveys information to users in an understandable form. Example: Monitor, Printer etc. Memory Unit

The Memory Unit is of two types which are primary memory and secondary memory. The primary memory is used to temporarily store the programs and data when the instructions are ready to execute.The secondary memory is used to store the data permanently.

The Primary Memory is volatile,that is, the content is lost when the power supply is switched off. The Random Access Memory (RAM) is an example of a main memory.

The Secondary memory is non volatile, that is, the content is available even after the power supply is switched off. Hard disk, CD-ROM and DVD ROM are examples of secondary memory.

Page 5: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

5

2. Discuss the various generations of computers.

Generation & Period

Main Component used Merits/Demerits

First Generation 1942-1955

Vacuum tubes

• Big in size • Consumed more power • Malfunction due to overheat • Machine Language was used

First Generation Computers - ENIAC , EDVAC , UNIVAC 1 ENIAC weighed about 27 tons,size 8 feet × 100 feet × 3 feet and consumed around 150watts of power

Second Generation 1955-1964

Transistors

• Smaller compared to First Generation • Generated Less Heat • Consumed less power compared to first generation • Punched cards were used • First operating system was developed - Batch Processing & Multiprogramming Operating System • Machine language as well as Assembly language was used.

Second Generation Computers IBM 1401, IBM 1620, UNIVAC 1108

Third Generation 1964-1975

Integrated Circuits (IC)

• Computers were smaller, faster and more reliable. • Consumed less power • High Level Languages wereUsed

Third Generation Computers IBM 360 series, Honeywell 6000 series

Fourth Generation 1975-1980

Microprocessor Very Large Scale Integrated Circuits (VLSI)

• Smaller and Faster • Microcomputer series such as IBM and APPLE were developed • Portable Computers were introduced.

Fifth Generation 1980 – till date

Ultra LargeScale Integration (ULSI)

• Parallel Processing • Super conductors • Computers size was drastically reduced. • Can recognize Images and Graphics • Introduction of Artificial Intelligence and Expert Systems • Able to solve high complex problems including decision making and logical reasoning

Sixth Generation In future

• Parallel and Distributed computing • Computers have become smarter, faster and smaller • Development of robotics • Natural Language Processing • Development of Voice Recognition Software

Page 6: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

6

3. Explain booting of computer and its types? Booting of computer

An Operating system (OS) is a basic software that makes the computer to work. When a computer is switched on, there is no information in its RAM.

At the same time, in ROM, the pre-written program called POST (Power on Self Test) will be executed first. This program checks if the devices like RAM, keyboard, etc., are connected properly and ready to operate. If these devices are ready, then the BIOS (Basic Input Output System) gets executed. This process is called Booting.

Thereafter, a program called “Bootstrap Loader” transfers OS from hard disk into main memory. Now the OS gets loaded (Windows/Linux, etc.,) and will get executed.

Booting process is of two types. Cold Booting Warm Booting

Cold Booting: When the system starts from initial state i.e. it is switched on, we call it cold booting or Hard Booting. When the user presses the Power button, the instructions are read from the ROM to initiate the booting process. Warm Booting: When the system restarts or when Reset button is pressed, we call it Warm Booting or Soft Booting. The system does not start from initial state and so all diagnostic tests need not be carried out in this case. There are chances of data loss and system damage as the data might not have been stored properly. 3. Explain the following a. Inkjet Printer b. Multimedia projector c. Bar code / QR code Reader Inkjet Printers: Inkjet Printers use colour cartridges which combined Magenta, Yellow and Cyan inks

to create color tones. A black cartridge is also used for monochrome output. Inkjet printers work by spraying ionized ink at a sheet of paper. The speed of Inkjet printers generally range from 1-20 PPM (Page Per Minute). They use the technology of firing ink by heating it so that it explodes towards the paper

in bubbles or by using piezoelectricity in which tiny electric currents controlled by electronic circuits are used inside the printer to spread ink in jet speed.

B. Multimedia Projectors: Multimedia projectors are used to produce computer output on a big screen. These are used to display presentations in meeting halls or in classrooms.

C. Bar Code / QR Code Reader: A Bar code is a pattern printed in lines of different thickness. The Bar code reader scans

the information on the bar codes transmits to the Computer for further processing. The system gives fast and error free entry of information into the computer.

QR (Quick response) Code: The QR code is the two dimension bar code which can be read by a camera and rocessed to interpret the image.

www.nammakalvi.org

Page 7: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

7

2.Number Systems

1. Write the 1’s complement procedure. The steps to be followed to find 1’s complement of a number: Step 1: Convert given Decimal number into Binary. Step 2: Check if the binary number contains 8 bits , if less add 0 at the left most bit, to make it as 8 bits. Step 3: Invert all bits (i.e. Change 1 as 0 and 0 as 1) 2. . List the encoding systems for characters in memory. • BCD – Binary Coded Decimal • EBCDIC – Extended Binary Coded Decimal Interchange Code • ASCII – American Standard Code for Information Interchange • Unicode • ISCII - Indian Standard Code for Information Interchange 3. Define Signed Magnitude ? Computers can handle both positive (unsigned) and negative (signed) numbers. The simplest method to represent negative binary numbers is called Signed Magnitude..

4.write the size for the following.

Bit (0 or 1)

Nibble (4 bits)

Byte (8 bits)

KiloByte (1024 bytes)

MegaByte (1024 KB)

GigaByte (1024 MB)

TeraByte (1024 GB)

2. Sums Decimal numbers

Convert the decimal numbers into octal numbers:160

Quotient Remainder 160/8 20 0 20/8 2 0 2/8 0 2

16010 =2408

Convert the decimal numbers into hexadecimal numbers: 160

Quotient Remainder 160/16 10 0 10/16 0 0

16010 =A016

Page 8: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

8

convert 2310 into binary number.

Quotent Remainder 23/2 11 1(LSB) 11/2 5 1 5/2 2 1 2/2 1 0 1/2 0 1(MSB) 2310=101112

Convert (31)10 into its equivalent hexadecimal number.

Octal

The Octal sequence (547)8 has the decimal equivalent:

Convert (6213)8 to equivalent Binary number

Binary number

Convert binary to hexa decimal 1100100111012=16

1100 1001 1101 =C9D16 C 9 D

Page 9: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

9

The binary sequence (1101)2 has the decimal equivalent:

Convert (1111010110)2 into Hexadecimal number

Hexadecimal

The hexadecimal sequence (25)16 has the decimal equivalent:

Convert (8BC)16 into equivalent Binary number

Complement

Find 1’s complement for (–24)10

2’s Complement represent of (-24)10

Page 10: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

10

Find 1’s Complement and 2’s Complement for the following Decimal number a) -98 b) -135

Add & Subtract

3. a) Add 11010102+1011012

b) Subtract 11010112 – 1110102

4. Draw the truth table for XOR gate. The truth table for XOR gate is

Input Output

A B C

0 0 0 0 1 1 1 0 1 1 1 0

5. What are derived gates? Derived gates are the gates which are derived from the fundamental logical gates. 6. what is bit?

A bit is the short form of Binary digit which can be ‘0’ or ‘1’. It is the basic unit of data in computers.

Page 11: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

11

7.what is byte?

A collection of 8 bits is called Byte. A byte is considered as the basic unit of measuring the memory size in the computer.

8. . Write a short note on XNOR gate.

The XNOR (exclusive - NOR) gate is a combination XOR gate followed by an inverter. Its output is “true” if the inputs are the same, and “false” if the inputs are different. In simple words, the output is 1 if the input are the same, otherwise the output is 0.

9. what is logic gates?list the fundamental logic gates. A gate is a basic electronic circuit which operates on one or more signals to produce an

output signal. There are three fundamental gates namely AND, OR and NOT.

10.What is Word length ? Word length refers to the number of bits processed by a Computer’s CPU. example, a word length can have 8 bits, 16 bits, 32 bits and 64 bits

11. Draw the logical symbol of AND ,OR gate.

AND Gate OR Gate

3-MARKS

1. What is Boolean Algebra? Boolean algebra is a mathematical discipline that is used for designing digital circuits in a

digital computer. It describes the relation between inputs and outputs of a digital circuit. The name Boolean algebra has been given in honor of an English mathematician George

Boole who proposed the basic principles of this algebra.

www.nammakalvi.org

Page 12: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

12

5-MARKS

1.Explain Gates

3. Explain Unicode? Unicode

This coding system is used in most of the modern computers. The popular coding scheme after ASCII is Unicode. ASCII can represent only 256 characters. Therefore English and European Languages alone can be handled by ASCII.

Particularly there was a situation, when the languages like Tamil, Malayalam, Kannada and Telugu could not be represented by ASCII.

Hence, the Unicode was generated to handle all the coding system of Universal languages.

This is 16 bit code and can handle 65536 characters. Unicode scheme is denoted by hexadecimal numbers. The Unicode table of Tamil, Malayalam, Telugu and Kannada

Page 13: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

13

3-Computer Organization 1. What is a program counter? The Program Counter (PC) is a special register in the CPU which always keeps the address of the next instruction to be executed. 2. What is HDMI? High Definition Multimedia Interface (HDMI) High-Definition Multimedia Interface is an audio/video interface which transfers the uncompressed video and audio data from a video controller, to a compatible computer monitor, LCD projector, digital television etc.

3. Draw the block diagram of a microprocessor based system?

4. What is bus? A bus is a collection of wires used for communication between the internal component of the computer. 5. What is word size? The number of bit that can be processed by a processor in a single instruction is called its word size. 6. Define decoder. A decoder, a digital circuit is used to point to the specific memory location where the word can be located. 7. What is a computer organization? Computer organization deals with the hardware components of a computer system. It includes Input / output devices, the central processing unit, storage devices and primary

memory. It is concerned with how the various components of computer hardware operate.

8. What is computer architecture? Computer architecture deals with the engineering considerations involved in designing a computer. 9. Write down the classifications of microprocessors based on the instruction set. The two types of microprocessors based on their instruction sets. Reduced Instruction Set Computers (RISC) Complex Instruction Set Computers (CISC) 10. what is meant by access time? The time taken to read or write a character in memory is called access time.

www.nammakalvi.org

Page 14: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

14

3 -MARKS 1) Differentiate Computer Organization from Computer Architecture. Computer organization deals with the hardware components of a computer system. Computer Organization deals with the hardware components that are transparent to

the programmer.

2. 3.Differentiate RAM and ROM

RAM ROM

The data or instructions can randomly be read as well as written on it.

The information can only be read but cannot be written on it.

Any information stored in it is lost when power supply is switched off.

The information remain stored even if the power supply is switched off.

It is volatile memory. It is non volatile memory. Types are SRAM and DRAM. Types are PROM, EPROM,EEPROM. 4. Why Bly-Ray disc is developed?

The format was developed to enable recording, rewriting and playback of high-definition video, as well as storing large amount of data. DVD uses a red laser to read and write data. But, Blu-ray uses a blue-violet laser to write. Hence, it is called as Blu-Ray. 5. ) Differentiate CD and DVD

CD DVD

Expansion is compact Disk Expansion is Digital Versatile Disk A standard CD can store about 700 MB of Data.

A standard DVD can hold 4.7 GB of Data.

CD players cannot play DVDs DVD players can play CDs It stores upto 80 min of audio. It can range from 4.7 GB to 17.08 GB.

Page 15: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

15

5-marks (1) Explain the characteristics of a microprocessor.

Characteristics of Microprocessors A Microprocessor’s performance depends on the following characteristics: a) Clock speed b) Instruction set c) Word size

a) Clock Speed Every microprocessor has an internal clock that regulates the speed at which it executes instructions. The speed at which the microprocessor executes instructions is called the clock speed. Clock speed is measured in MHz (Mega Hertz) or in GHz (Giga Hertz). b) Instruction Set A command which is given to a computer to perform an operation on data is called an instruction. Basic set of machine level instructions that a microprocessor is designed to execute is called as an instruction set. This instruction set carries out the following types of operations: • Data transfer • Arithmetic operations • Logical operations

• Control flow • Input/output

c) Word Size • The number of bits that can be processed by a processor in a single instruction is called its word size. Word size determines the amount of RAM that can be accessed by a microprocessor at one time and the total number of pins on the microprocessor. Total number of input and output pins in turn determines the architecture of the microprocessor. 2. Explain different types of memory? They are There are different types of memory. They are

1. Random Access Memory (RAM) 2. Read Only Memory (ROM) 3. Programmable Read-Only Memory (PROM) 4. Erasable Programmable Read-Only Memory (EPROM) 5. Electrically Erasable Programmable Read-Only Memory (EEPROM).

Random Access Memory - RAM

RAM is the most common type of memory found in the modern computers. This is really the main store and is the place where the program gets stored. When the CPU runs a program, it fetches the program instructions from the

RAM and carries them out. If the CPU needs to store the results of the calculations it can store them in RAM. When we switch off a computer, whatever is stored in the RAM gets erased. It is a volatile form of memory.

Read Only Memory - ROM In ROM, the information is burnt (pre-recorded) into the ROM chip at manufacturing time. Once data has been written into a ROM chip, it cannot be erased but you can read it. When we switch off the computer, the contents of the ROM are not erased but remain

stored permanently.

Page 16: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

16

ROM is a non-volatile memory. ROM stores critical programs such as the program that boots the computer.

Programmable Read Only Memory - PROM

PROM is a memory on which data can be written only once. A variation of the PROM chip is that it is not burnt at the manufacturing time but can

be programmed using PROM programmer or a PROM burner. PROM is also a non-volatile memory.

Erasable Programmable Read Only Memory - EPROM In EPROM, the information can be erased and reprogrammed using a special PROM –

programmer. EPROM is non-volatile memory. A EPROM differs from a PROM in that a PROM can be written to only once and cannot

be erased. But an ultraviolet light is used to erase the contents of the EPROM.

Electrically Erasable Programmable Read Only Memory - EEPROM EEPROM is a recently developed type of memory. This is equivalent to EPROM, but does not require ultraviolet light to erase its content. It can be erased by exposing it to an electrical charge. It is also non-volatile in nature. EEPROM is not as fast as RAM or other types of ROM. A flash memory is a special type of EEPROM that can be erased and reprogrammed.

3. What are the various ports and interfaces found on a computer?

The external devices can be connected to the ports and interfaces. The various types of ports are given below: Serial Port: To connect the external devices, found in old computers. Parallel Port: To connect the printers, found in old computers. USB Ports: To connect external devices like cameras, scanners, mobile phones, external hard disks and printers to the computer. VGA Connector: To connect a monitor or any display device like LCD projector. Audio Plugs: To connect sound speakers, microphone and headphones. PS/2 Port: To connect mouse and keyboard to PC. SCSI Port: To connect the hard disk drives and network connectors. High Definition Multimedia Interface (HDMI) High-Definition Multimedia Interface is an audio/video interface which transfers the uncompressed video and audio data from a video controller, to a compatible computer monitor, LCD projector, digital television etc.

Page 17: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

17

4. Explain any three secondary Storage Devices ? Secondary Storage Devices A computer generally has limited amount of main memory which is expensive and volatile. To store data and programs permanently, secondary storage devices are used. Secondary storage devices serve as a supportive storage to main memory and they are

non-volatile in nature, secondary storage is also called as Backup storage Hard Disks Hard disk is a magnetic disk on which you can store data. The hard disk has the stacked arrangement of disks accessed by a pair of heads for

each of the disks. The hard disks come with a single or double sided disk.

Compact Disc (CD) A CD or CD-ROM is made from 1.2 millimeters thick, polycarbonate plastic material. A thin layer of aluminum or gold is applied to the surface. CD data is represented as tiny indentations known as "pits", encoded in a spiral track

moulded into the top of the polycarbonate layer. The areas between pits are known as "lands". A motor within the CD player rotates the disk. The capacity of an ordinary CDROM is 700MB.

Digital Versatile Disc (DVD) A DVD (Digital Versatile Disc or Digital Video Disc) is an optical disc capable of storing

up to 4.7 GB of data, more than six times what a CD can hold. DVDs are often used to store movies at a better quality.

Like CDs, DVDs are read with a laser. The disc can have one or two sides, and one or two layers of data per side; the number of

sides and layers determines how much it can hold. A 12 cm diameter disc with single sided, single layer has 4.7 GB capacity, whereas

the single sided, double layer has 8.5 GB capacity. The 8 cm DVD has 1.5 GB capacity.

The capacity of a DVD-ROM can be visually determined by noting the number of data sides of the disc.

Double-layered sides are usually gold-coloured, while single-layered sides are usually silver-coloured, like a CD.

Flash Memory Devices Flash memory is an electronic (solid-state) non-volatile computer storage medium that can

be electrically erased and reprogrammed. They are either EEPROM or EPROM. Examples for Flash memories are pendrives, memory cards etc. Flash memories can be used in personal computers, Personal Digital Assistants (PDA),

digital audio players, digital cameras and mobile phones. Flash memory offers fast access times. The time taken to read or write a character in memory is called access time. The capacity of the flash memories vary from 1 Gigabytes (GB) to 2 Terabytes (TB).

Page 18: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

18

4- Operating System 1. What is the multi-user Operating system?

It is used in computers and laptops that allow same data and applications to be accessed by multiple users at the same time.

The users can also communicate with each other. Windows, Linux and UNIX are examples for multi-user Operating System.

2. List out different distributions of Linux operating system. There are a few different distributions of Linux, like Ubuntu, Mint, Fedora, RedHat, Debian, Google's Android, Chrome OS, and Chromium OS 3. What are the different Operating Systems used in computer?

Single user and single Task operating system. Multi-user Operating Systems

Multi-processing Operating Systems

Distributed operating system prominent operating system 4. What is open source software? Open source software refers to those categories of software/ program whose licenses do not impose much condition. 5. Write the types of operating system?

Single user operating system Multi-user operating system Distributed operating system Operating system Mobile operating system

6.What are the different Operating Systems used in computer?

Single user and single Task operating system. Multi-user Operating Systems

Multi-processing Operating Systems

Distributed operating system prominent operating system 7. what is parallel processing.? Multi-Processing :This is a one of the features of Operating System. It has two or more processors for a single running process (job). Processing takes place in parallel is known as parallel processing.

8. What is multi-processing? This is a one of the features of Operating System. It has two or more processors for a single running process (job).

www.nammakalvi.org

Page 19: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

19

9. What is a GUI? The GUI is a window based system with a pointing device to direct I/O, choose from

menus, make selections and a keyboard to enter text. Its vibrant colours attract the user very easily.

10. what is advantage of memory management? Memory management:

Keeping track of which portion of memory are currently being used and who is using them. Determining which processes (or parts of processes) and data to move in and out of

memory. Allocation and de-allocation of memory blocks as needed by the program in main memory.

(Garbage Collection) 11. What are prominent operating system? Prominent OS are as follows:

UNIX Microsoft Windows Linux iOS Android

12what is Fault Tolerance? Fault Tolerance The Operating Systems should be robust. When there is a fault, the Operating System should not crash, instead the Operating System

have fault tolerance capabilities and retain the existing state of system.

3-marks

1) What are the advantages and disadvantages of Time-sharing features?

Time –sharing operating system

Advantages disadvantages

Provides the Advantages of quick response.

Problem of reliability.

Avoids duplication of software. Question of security and integrity of uses program and data.

Reduce CPU idle time Problem of data communication. 2. Differentiate internet and intranet?

The internet is the global system of interconnected computer networks that use the internet protocol suite (TCP/IP) to link devices worldwide.

A local or restricted communications networks, especially a private networks created using world wide web software.

Page 20: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

20

3. Differentiate Application Software and System Software ?

Types of Software[Software is classified into two types:]

Application Software System Software

Application software is a set of programs to perform specific task.

System software is a type of computer program that is designed to run the computer’s hardware and application programs.

example MS-word is an application software to create text document and VLC player is familiar application software to play audio, video files and many more

example Operating System and Language Processor

3. Short notes on User Interface (UI) User interface is one of the significant feature in Operating System. The only way that user can make interaction with a computer. If the computer interface is not user-friendly, the user slowly reduces the computer

usage from their normal life. This is the main reason for the key success of GUI (Graphical User Interface) based

Operating System. The GUI is a window based system with a pointing device to direct I/O, choose from

menus, make selections and a keyboard to enter text. Its vibrant colours attract the user very easily. Beginners are impressed by the help and pop up window message boxes. Icons are playing vital role of the particular application.

4.what is advantage of memory management? Memory management:

Keeping track of which portion of memory are currently being used and who is using them.

Determining which processes (or parts of processes) and data to move in and out of memory.

Allocation and de-allocation of memory blocks as needed by the Program in main memory. (Garbage Collection)

5.write a short notes Security Management? Security Management The major challenge in computer and software industry is to protect user’s legitimate data

from hackers. The Operating System provides three levels of securities to the user end. They are

(1) File access level (2) System level (3) Network level

Page 21: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

21

5-marks

1.Explain advantages and disadvantages of open source operating systems. Advantages:

It is generally free.

It is continually evolving in real time as developers add to it which means it can be better quality and more secure and less prone to bugs.

Using open source software also means the users are not locked into using a particular vendors system that only work with their other system.

The user can modify and adapt open source software for own business requirements.

More reliable and flexible. Disadvantages:

Open source software might not be as user friendly as commercial versions because less attention is paid to developing the user interface.

Open source software do not come with extensive support when things go wrong-open source software tends to rely on its community of users to respond to and fix problems.

Open source software may still be involved in collecting indirect costs for external support.

Vulnerable to malicious users. 2. Explain the concept of a Distributed Operating System. The Distributed Operating System is used to access shared data and files that reside in any machine around the world. The user can handle the data from different locations. The users can access as if it is available on their own computer. The advantages of distributed Operating System are as follows: • A user at one location can make use of all the resources available at another location over the network. • Many computer resources can be added easily in the network. • Improves the interaction with the customers and clients. • Reduces the load on the host computer.

3. Explain the process management algorithms in Operating System.

This algorithm is based on queuing technique. This is the basic logic of the FIFO algorithm.

Technically, the process that enters the queue first is executed first by the CPU followed by the next and so on.

The processes are executed in the order of the queue [row].

Page 22: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

22

1. FIFO 2. SJF 3. Round Robin 4. Based on Priority FIFO (First In First Out)Scheduling: This algorithm is based on queuing technique. Assume that a student is standing in a queue to get grade sheet from his/her teacher. The other student who stands first in the queue gets his/ her grade sheet first and leaves

from the queue. Followed by the next student in the queue gets it collected and so on. This is the basic logic of the FIFO algorithm. Technically, the process that enters the queue first is executed first by the CPU, followed by

the next and so on. The processes are executed in the order of the queue.

SJF (Shortest Job First)Scheduling: This algorithm works based on the size of the job being executed by the CPU. Consider two jobs A and B.

1) A = 6 kilo bytes 2) B = 9 kilo bytes First the job “A” will be assigned and then job “B” gets its turn.

Round RobinScheduling The Round Robin (RR) scheduling algorithm is designed especially for time sharing

systems. Jobs (processes) are assigned and processor time in a circular method. For example take three jobs A, B, C. First the job A is assigned to CPU then job B and job C and then again A, B and C and so

on. Based On Priority The given job (process) is assigned based on a Priority. The job which has higher priority is more important than other jobs. Take two jobs A and B. Let the priority of A be 5 and priority B be 7. Job B is assigned to the processor before job A.

5.Working with typical operating systems Part - I : Working with Windows Part-2: Working with Linux

2-marks 1. Differentiate cut and copy options.

cut copy

It is the process of moving a block from one place to another.

It is the process of making duplicate copies of the block of a worksheet.

2. Differentiate Files and Folders.

Files Folders

Files is the collection of records. Folder is a collections of files. 3. List Popular versions of Linux

Popular versions of Linux Ubuntu Linux Linux Mint Arch Linux Deepin

Fedora Debian CentOS

Page 23: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

23

8. What is Launcher? i. The vertical bar of icons on the left side of the desktop is called launcher. ii. The launcher provides easy access to applications, mounted devices, and the

Trash

9. What is Multi-Tasking? Multiple applications which can execute simultaneously in windows. 10. What is the use of a file extension? File extension is used to know that in which the file is associated with.

11. What is ReactOS? ReactOS is a Windowsalternative open source operating system, which is being developed on the principles of Windows - without using any of Microsoft's code. 11. Mention the different server distributions in Linux OS. The server distributions in Linux OS

1.ubuntu 2.cent OS 3.Rent Hat 4.SUSE 5.Fedora

3 marks 1.Write the specific use of Cortana. Use of Cortana:

1. Gives remainders based on time, places or people. 2. Track package, teams,interests and flights. 3. Send emails and texts. 4. Find facts, files places and information. 5. Open any application on your system.

2. . List out the major differences between Windows and Ubuntu OS.

Ubuntu OS. Windows Open source[Linensing freedom] Closed source[Licensing Restriction] Online peer support Paid-help-desk support Full hardare support Partial hardware support Support CUI No CUI support flexibility Rigidity 3. What is OS (Operating System)?

An Operating System is a software program that enables the computer hardware to communicate and operate with the computer software.

It also acts as an interface between the user and the computer hardware and controls the execution of all kinds of programs 4. Explain Android OS Android OS:Android is a mobile operating system developed by Google, based on Linux and designed primarily for touch screen mobile devices such as smart phones and tablets. Versions of Android OS: Alpha, Beta, Cupcake, Donut, Eclair, Froyo, Gingerbread , Honeycomb Beta, Ice Cream Sandwich Jelly Bean , Kitkat, Lollipop, Marshmallow , Nougat

Page 24: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

24

5. Define Recycle bin Recycle bin is a special folder to keep the files or folders deleted by the user, which means

you still have an opportunity to recover them. Te user cannot access the files or folders available in the Recycle bin without restoring it.

6. Write a short note on text entry settings? Text entry settings - This shows the current keyboard layout (such as En, Fr,Ku, and so on) . If more than one keyboard layout is shown, it allows you to select a keyboard layout out of those choices. The keyboard indicator menu contains the following menu items: Character Map, Keyboard Layout Chart, and Text Entry Settings. 7. What is Session indicator? Session indicator - This is a link to the system settings, Ubuntu Help, and session options (like locking your computer, user/guest session, logging out of a session, restarting the computer, or shutting down completely).

5-marks 1. Draw and compare the icon equivalence in Windows and Ubuntu.

icon Windows icon Ubuntu.

Search

Search your computer

My Computer

Files

MS-Word

LibreOffice Writer

MS-Excel

Libre Office Calc

MS-PowerPoint

Libre Office Impress

Control Panel

System Settings

Recycle bin

Trash

www.nammakalvi.org

Page 25: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

25

3. Explain the versions of Windows Operating System. [2-mark]

Page 26: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

26

Lesson 6 Specification and Abstraction

1. Initially,Farmer, goat, grass, wolf = L,L,L,L and the framer crosses the river with goat. Model the action with an assignment statement. 1. -- farmer, goat, grass, wolf = L, L, L, L 2. farmer, goat := R, R 3. -- farmer , goat , grass , wolf = R, R, L, L 4. farmer := L 5. farmer, goat, grass, wolf = L, R, L, L 6. farmer, grass := R, R 7. -- farmer , goat , grass , wolf = R, R, R, L 8. farmer, goat := L, L 9. -- farmer, goat, grass, wolf = L, L, R, L 10. farmer, wolf := R, R 11. -- farmer , goat , grass , wolf = R, L, R, R 12. farmer : = L 13. -- farmer , goat , grass , wolf = L, L, R, R 14. farmer , goat : = R, R 15. -- farmer , goat , grass , wolf = R, R, R, R

2.Define an algorithm. An algorithm is a step by step sequence of statements intended to solve a problem. 3.Distinguish between an algorithm and a process.

An algorithm is a sequence of instructions to accomplish a task or solve a problem. An instruction describes an action. When the instructions are executed, a process evolves, which accomplishes the intended

task or solves the given problem. We can compare an algorithm to a recipe, and the resulting process to cooking.

Page 27: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

27

4. Specify a function to find the minimum of two numbers. 1. Minimum (A, B) 2. -- inputs : A an B are integers or real numbers. 3. -- outputs : A is minimum, A < B B is minimum, B < A

3mark 1..What is the format of the specification of an algorithm? Let P be the required property of the inputs and Q the property of the desired outputs. Then the algorithm S is specified as 1. algorithm_name (inputs) 2. --inputs : P 3. --outputs: Q 2.What is abstraction? A problem can involve a lot of details. Several of these details are unnecessary for solving the problem. Only a few details are essential. Ignoring or hiding unnecessary details and modeling an entity only by its essential properties is known as abstraction. 3 . What is abstraction? A problem can involve a lot of details. Several of these details are unnecessary for solving the problem. Only a few details are essential. Ignoring or hiding unnecessary details and modeling an entity only by its essential properties

is known as abstraction. 4.write the disadvantage of flow charts? Flowcharts also have disadvantages. (1) Flowcharts are less compact than representation of algorithms in programming language or pseudo code. (2) They obscure the basic hierarchical structure of the algorithms. (3) Alternative statements and loops are disciplined control flow structures. Flowcharts do not restrict us to disciplined control flow structures. 5. what is composition? Composition: An algorithm is composed of assignment and control flow statements. A control flow statement tests a condition of the state and, depending on the value of the condition, decides the next statement to be executed.

5-marks

1. Suppose you want to solve the quadratic equation ax2 + bx + c = 0 by an algorithm. quadratic_solve (a, b, c) -- inputs : ? -- outputs: ?

Page 28: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

28

2. Explain how you will design algorithms. There are a few basic principles and techniques for designing algorithms. Specification:The first step in problem solving is to state the problem precisely. A problem is specified in terms of the input given and the output desired. The specification must also state the properties of the given input, and the relation between the input and the output. Abstraction:A problem can involve a lot of details. Several of these details are unnecessary for solving the problem. Only a few details are essential. Ignoring or hiding unnecessary details and modeling an entity only by its essential properties is known as abstraction. Composition:An algorithm is composed of assignment and control flow statements. A control flow statement tests a condition of the state and, depending on the value of the condition, decides the next statement to be executed. Decomposition:We divide the main algorithm into functions. We construct each function independently of the main algorithm and other functions. Finally, construct the main algorithm using the functions. When we use the functions, it is enough to know the specification of the function. It is not necessary to know how the function is implemented.

Lesson 7 composition and decomposition

1.Distinguish between a condition and a statement. A condition is a phrase that describes a test of the state. A statement is a phrase that commands the computer to do an action. 2.Draw a flowchart for conditional statement.

3. Define iteration. Testing the loop condition and executing the loop body once is called an iteration. 4. Define Pseudo code Pseudo code is a mix of programming language-like constructs and plain English. This notation is not formal nor exact. It uses the same building blocks as programs,such as variables and control flow.

Page 29: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

29

3-marks 1.What is case analysis? Case analysis statement generalizes it to multiple cases. Case analysis splits the problem into an exhaustive set of disjoint cases. 2.Draw a flowchart for -3case analysis using alternative statements.

3. Define Iterative control flow? Iterative control flow is depicted in the flowchart . Condition C has two outgoing arrows, true and false. The true arrow points to S box. If C is true,S box is executed and control flows back to C box. The false arrow points to the box after the iterative statement (dotted box). If C is false, the loop ends and the control flows to the next box after the loop.

4. writes note on Decomposition? Decomposition: We divide the main algorithm into functions. We construct each function independently of the main algorithm and other functions. Finally, we construct the main algorithm using the functions. When we use the functions, it is enough to know the specification of the function. It is not necessary to know how the function is implemented.

Lesson 8 -Iteration and recursionTwo mark

1.What is an invariant?

www.nammakalvi.org

Page 30: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

30

An expression involving variables, which remains unchanged by an assignment to one of these variables, is called an invariant of the assignment. 2.Define a loop invariant. An invariant the loop body is known as a loop invariant. 3.What is recursive problem solving? Recursion step breaks the problem into sub-problems of smaller size, assumes solutions for sub-problems are given by recursive calls, and constructs solution to the given problem. 4. Does testing the loop condition affect the loop invariant? Why? Yes, it affects. The loop invariants will be true on entry into a loop and following each iteration, so that on exit from the loop both the loop invariants and the loop termination condition can be guaranteed.

3-marks

1. Define :Recursion Recursion is another algorithm design technique, closely related to iteration, but more

powerful. Using recursion, we solve a problem with a given input, by solving the same problem with a

part of the input, and constructing a solution to the original problem from the solution to the partial input. 2. Write the recursive process with solvers for calculating power(2, 5) power (2,5) = 2 × power (2,4) = 2 × 2 × power(2,3) = 2 × 2 × 2 × power(2, 2) = 2 × 2 × 2 × 2 × power (2,1) = 2 × 2 × 2 × 2 × 2 × power (2,0) = 2 × 2 × 2 × 2 × 2 × 1 = 2 × 2 × 2 × 2 × 2 = 2 × 2 × 2 × 4 = 2 × 2 × 8 = 2 × 16 = 32

Five mark

1.Power can also be defined recursively as

Construct a recursive algorithm using this definition. How many multiplications are needed to calculate a10? Power (a,n) -- inputs n is an integer, n ≥ 0 -- outputs : an if n = 0 -- base case 1 else

if (n%2! = 0) -- recursion step in case of odd a × power (a, n - 1)

else a × power (a, n/2) --- recursion step in case of even.

Page 31: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

31

Vol-2 9-Introduction to C++

1. What is meant by a token? Name the token available in C++. The smallest individual unit in a program is known as a “Token” or “Lexical unit.” C++ has the following tokens: Keywords, Identifiers, Constants, Operators, Punctuators. 2. 1. Write a short note const keyword with an example. Constant Arguments The constant variable can be declared using const keyword. The const keyword makes variable value stable. The constant variable should be initialized while declaring. The const modifier enables to assign an initial value to a variable that cannot be

changed later inside the body of the function. Syntax : <returntype><functionname> (const <datatype variable=value>) 2. What is the use of setw( ) format manipulator? setw ( ) setw manipulator sets the width of the field assigned for the output. The field width determines the minimum number of characters to be written in output.

Syntax: setw(number of characters) 3. Define void data type? void data type: The literal meaning for void is ‘empty space’. Here, in C++, the void data type specifies an empty set of values. It is used as a return type for functions that do not return any value. 4. Define Pointer Expression

5. Define compound statement?

Page 32: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

32

7.differentiate c and c++.

c C++

C is a subset of c++ C++ is a superset of c No data hiding Encapsulation hides data Function driven language Object driven language Not support virtual and friend functions support virtual and friend functions Not support reference variable support reference variable No exception handling Support exception handling

9.

.

C++ also provides the facility to create new functions for specific task as per user requirement.

The name of the task and data required (arguments) are decided by the user and hence they are known as User-defined functions.

11.give the syntax

C++ provides << operator to perform output operation. The operator << is called the “Stream insertion” or “put to” operator. It is used to send the strings or values of the variables on its right to the object on its left. << is a binary operator.

www.nammakalvi.org

Page 33: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

33

13.

sum = num1 + num2;

3-marks

1. Describe the differences between keywords and identifiers?

keywords identifiers Keywords are the reserved words which convey specific meaning to the C++ compiler.

Identifiers are the user-defined names given to different parts of the C++ program. identifiers are not the reserved.

EX: int , void , break , do , if etc.. EX: Name, age, class -12B etc.. 2.Differentiate “=” and “==”.

= = =

It is assignment operator. It is a relational operator. It is used to assign a value to a variable which is on the left hand side of an assignment statement.

It is used to compare two values and the result will be either true or false.

Eg: a= b Eg: a= = b 3. What is a reference variable? What is its use? References: A reference provides an alias for a previously defined variable. Declaration of a reference consists of base type and an & (ampersand) symbol; reference variable name is assigned the value of a previously declared variable. Syntax: <type> <& reference_variable> = <original_variable> 4. . Evaluate x+= x + ++x; Let x=5;

x+= 5 + (++x) x+= 5 + 6 x+=11 x = x+11 x = 16

5. Define destructor?

When a class object goes out of scope, a special function called the destructor gets executed.

The destructor has the same name as the class tag but prefixed with a ~(tilde). Destructor function also return nothing and it does not associated with anydata type.

Page 34: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

34

>>

5-marksAnswer to all the questions 1. Write about Binary operators used in C++.

C++ Operators are classified as: (1) Arithmetic Operators (2) Relational Operators (3) Logical Operators (4) Bitwise Operators (5) Assignment Operators (6) Conditional Operator

(7) Other Operators (1) Arithmetic Operators Arithmetic operators perform simple arithmetic operations like addition, subtraction, multiplication, division etc.,

(2) Relational Operators Relational operators are used to determine the relationship between its

operands. When the relational operators are applied on two operands, the result will be a

Boolean value i.e 1 or 0 to represents True or False respectively. C++ provides six relational operators. They are,

(3)Logical Operators A logical operator is used to evaluate logical and relational expressions. The logical operators act upon the operands that are themselves called as logical expressions. C++ provides three logical operators.

Page 35: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

35

(4)Bitwise Operators Bitwise operators work on each bit of data and perform bit-by-bit operation. In C++, there are three kinds of bitwise operators, which are:

(i) Logical bitwise operators (ii) Bitwise shift operators (iii) One’s compliment operators (5)Assignment Operator: Assignment operator is used to assign a value to a variable which is on the left hand side of

an assignment statement. = (equal to) is commonly used as the assignment operator in all computer programming

languages. This operator copies the value at the right side of the operator to the left side variable. It is also a binary operator.

(6) Conditional Operator: In C++, there is only one conditional operator is used. ?: is a conditional Operator. This is a Ternary Operator. This operator is used as analternate to if … else control statement. We will learn more about this operator in later chapters along with if …. else structure.

3. What are the types of Errors?

Type of Error

Description

Syntax Error

Syntax is a set of grammatical rules to construct a program. Every programming language has unique rules for constructing the sourcecode.

Syntax errors occur when grammatical rules of C++ are violated. Example: if you type as follows, C++ will throw an error. cout << “Welcome to Programming in C++” As per grammatical rules of C++, every executable statement should terminate with a semicolon. But, this statement does not end with a semicolon.

Semantic Error

A Program has not produced expected result even though the program is grammatically correct.

www.nammakalvi.org

Page 36: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

36

3. Explain Type Conversion ?

For example:

}

Syntax:

It may be happened by wrong use of variable / operator / order of execution etc.

This means, program is grammatically correct, but it contains some logical error.

So, Semantic error is also called as “Logic Error”.

Run-time error

A run time error occurs during the execution of a program. It is occurs because of some illegal operation that takes place.

For example, if a program tries to open a file which does not exist, it results in a run-time error

Page 37: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

37

Example:

}

10-Introduction to C++ Flow of Control (2 Marks): 1. What is a null statement and compound statement?

The "null or empty statement" is a statement containing only a semicolon (;) C++ allows a group of statements enclosed by pair of braces {}. This group of statements is called as a compound statement or a block.

2. What is selection statement? Write it's types?

The selection statement means the statement (s) are executed depends upon a condition. If a condition is true, a true block (a set of statements) is executed otherwise a false block

is executed. This statement is also called decision statement or selection statement

Types: If, if else, Nest if, if -else-if ladder, The ?: Alternative to if- else, Switch statement 3.

3-marks 1. Compare an if and a ? : operator.

if ? : Operator

www.nammakalvi.org

Page 38: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

38

if the condition is true then a true-block executed, otherwise the true-block is skipped

The conditional operator (or) Ternary operator is an alternative for ‘if else statement’.

Syntax: if (expression) true-block; statement-x;

Syntax:

expression 1? expression 2 : expression 3

2. Difference between Break and Continue

3. what is Empty for loop?

4.what

5.

5 Marks 1. Explain control statement with suitable example.

Control statements are statements that alter the sequence of flow of instructions.

Page 39: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

39

In a program, statements may be executed sequentially, selectively or iteratively. Every programming languages provides statements to support sequence, selection (branching) and

iteration. If the Statements are executed sequentially, the flow is called as sequential flow. In some situations, if the statements alter the flow of execution like branching, iteration, jumping and

function calls, this flow is called as control flow. The sequential statement are the statements, that are executed one after another only once from

top to bottom. These statements do not alter the flow of execution. These statements are called as sequential flow

statements. They are always end with a semicolon (;).

1) The selection statement means the statement (s) are executed depends upon a condition. If a condition is true, a true block (a set of statements) is executed otherwise a false block is executed. This statement is also called decision statement or selection statement. 2) Iteration Statement (looping) is use to execute a set of statements repeatedly until a condition is satisfied.

If a condition evaluates to true, the set of statements (true block) is executed again and again. This is also known as looping statement or iteration statement.

3) Jump Statement are used (1) goto (2) Break

(3) Continue 2. What entry control loop? Explain any one of the entry control loop with suitable example. Loop body will be executed first, and then condition is checked. ... If Test condition is false, loop body will be executed once. Examples of Entry Controlled Loop:

for loop while loop

for loop:

The for-loop is the easiest looping statement which allows code to be executed repeatedly.The general syntax is:

syntax Flow chart:

Page 40: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

40

for (initialization(s); test-expression; update expression(s)) { Statement 1; Statement 2; …………. } Statement-x;

Example Program: #include <iostream> using namespace std; int main () { int i; for(i = 0; i< 5; i ++ ) cout<< "value of i : " <<i<<endl; return 0; }

3.Explain switch case statement with example program? The switch statement is a multi-way branch statement. It provides an easy way to dispatch execution to different parts of code based on the value of the expression. Syntax: switch(expression) { case constant 1: statement(s); break; case constant 2: statement(s); break; . . . .

default: statement(s); } Rules: 1. The expression provided in the switch should result in a constant value otherwise it would not be valid. 2. Duplicate case values are not allowed. 3. The default statement is optional. 4. The break statement is used inside the switch to terminate a statement sequence. When a break statement is reached, the switch terminates, and the flow of control jumps to the next line following the switch statement. 5. The break statement is optional. If omitted, execution will continue on into the next case. The flow of control will fall through to subsequent cases until a break is reached.

Page 41: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

41

6. Nesting of switch statements is also allowed. Example: #include <iostream> using namespace std; int main() { int num; cout << "\n Enter week day number: "; cin >> num; switch (num) { case 1 : cout << "\n Sunday"; break; case 2 : cout << "\n Monday"; break; case 3 : cout << "\n Tuesday"; break; case 4 : cout << "\n Wednessday"; break; case 5 : cout << "\n Thursday"; break; case 6 : cout << "\n Friday"; break; case 7 : cout << "\n Saturday"; break; default: cout << "\n Wrong input...."; } getch(); }

explain

www.nammakalvi.org

Page 42: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

42

2. By declaring an object of a class as a member to another class

Page 43: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

43

When a class is declared with in another class, the inner class is called as Nested class (ie the inner class) and the outer class is known as Enclosing class. Nested class can be defined in private as well as in the public section of the Enclosing class.

Page 44: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

44

11-Functions in C++ 1. Define Functions. A large program can typically be split into smaller sized blocks called as functions. Where each subprogram can perform some specific functionality.

2. Write a note on Local Scope.

A local variable is defined within a block. A block of code begins and ends with curly braces { }.

A local variable cannot be accessed from outside the block of its declaration. 3. What is Recursion? A function that calls itself is known as recursive function. And, this technique is known as recursion.

3-marks 1.what is the propose of string function?

Function Syntax Purpose & value returned strlen ( ) strlen (char *) Returns the number of characters stored in the

array.For example, name = strcpy ( ) strcpy (char

*,char*)

Copies source string to target string. For example,strcpy

strcmp ( ) strcmp ( char*,char)

Compares the two given strings,and returns 0 if strings are equal,value >0, if string 1 is greater than string 2. Otherwise value less than 0. For example, strcmp (“Abc”, “Abc”) returns 0strcmp (“Abc”, “abc”) returns a value less than 0strcmp

2. What is the difference between isuppr() and toupper() functions ?

isuppr() toupper() This function is used to check the given character is uppercase.

This function is used to convert the given character into its uppercase.

This function will return 1 if true otherwise 0. This function will return the upper case equivalent of the given character.

Ex: int n=isupper(‘A’); Ex: char c = toupper('k’); -- K 3.What is default arguments? Give example. In C++, one can assign default values to the formal parameters of a function prototype. The Default arguments allows to omit some arguments when calling the function. When calling a function,

Page 45: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

45

For any missing arguments, complier uses the values in default arguments for the called function.

The default value is given in the form of variable initialization. Example : defaultvalue(x,y); defaultvalue(200,150); defaultvalue(150);

5 Marks

1. Explain Call by value method with suitable example. Call by value method copies the value of an actual parameter into the formal parameter of

the function. I n this case, changes made to formal parameter within the function will have no effect on the

actual parameter. Any change in the formal parameter is not reflected back to the actual parameter.

Example Program: #include<iostream> using namespace std; void display(int x) { int a=x*x; cout<<"\n\n The Value inside display function (a * a):"<<a; } int main() { int a; cout<<"\n\n Enter the Value for A :"; cin>>a; display(a); cout<<"\n\n The Value inside main function "<<a;

www.nammakalvi.org

Page 46: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

46

return(0); } 2.Explain scope of variable with example. Scope refers to the accessibility of a variable. There are four types of scopes in C++.

1. Local scope 2. Function scope 3. File scope 4. Class scope 1. Local scope Inside a block which is called local variables. Example: #include<iostream>s using namespace std; int main ( ) { int a, b ; a = 10; b = 20; if (a > b) { int temp; temp = a; a = b; b = temp; } cout <<"\n Descending order .... \n"; cout <<a <<"\t"<<b; return(0); } Output: Descending order …. 10 20 2. Function scope Inside a function is called function variables. Example: #include<iostream> using namespace std; void add(int x, int y) { int m=x+y; //'m' declared within function add()// cout<<"\nThe Sum = "<<m; } int main ( ) { int a, b ; a = 10; b = 20; add(a,b); return(0);

Page 47: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

47

} 3. File scope Outside of all functions which is called global variables. Example: #include<iostream> using namespace std; int file_var=20; //Declared within File// void add(int x, int y) { int m=x+y+file_var; cout<<"\n The Sum = "<<m; } int main ( ) { int a, b ; a = 10; b = 20; add(a,b); cout<<”\nThe File Variable = “<<file_var; return(0); } Output: The Sum = 50 The File Variable =20 4. Class scope Inside a class is called class variable or data members.

Page 48: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

48

}

}

Page 49: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

49

ARRAYS -13 2marks Answers to all the questions (2 Marks): 1. What is Traversal in an Array? Accessing each element of an array at least once to perform any operation is known as “Traversal”. Displaying all the elements in an array is an example of “traversal”. 2. What is Strings?

A string is defined as a sequence of characters where each character may be a letter, number or a symbol.

Each element occupies one byte of memory. Every string is terminated by a null (‘\0’, ASCII code 0) character

3. What is the syntax to declare two – dimensional array.

Two-dimensional (2D) arrays are collection of similar elements where the elements are stored in certain number of rows and columns.

An example m × n matrix where m denotes the number of rows and n denotes the number of

columns. Example: int arr[3][3]; 4.what is

3 Marks

Answers to all the questions 1. Define an Array? What are the types? “An array is a collection of variables of the same type that are referenced by a common name”. There are different types of arrays used in C++. They are: 1. One-dimensional arrays 2. Two-dimensional arrays 3. Multi-dimensional arrays 2. With note an Array of strings. An array of strings is a two-dimensional character array. The size of the first index (rows) denotes the number of strings and the size of the second index (columns) denotes the maximum length of each string. Declaration of 2D Array: char Name[6][10]; Initialization: char Name[6][10] = {"Vijay", "Raji", "Suji", "Joshini", "Murugan", "Mani"}; 3.What is

Each element (Memory box) has a unique index number starting from 0 .

Page 50: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

50

5-marks

www.nammakalvi.org

Page 51: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

51

STRUCTURES

1. Define structure .What is its use?

Structure is a user-defined which has the combination of data items with different data types. Use: This allows to group of variables of mixed data types together into a single unit. 2. Write the syntax and an example for structure.

An optional field reference_name can be used to declare objects of the structure type directly.

3-marks

1. Differentiate array and structure.

ARRAY STRUCTURE Array is a user-defined which has the sequence of data items with same data types.

Structure is a user-defined which has the combination of data items with different data types.

Syntax: data_type array_name[array_size];

Syntax: struct structure_name{data_items;}obj;

Example: int a[5]; Example: struct sum1{ int n1,n2;}s1; 2. How will you pass a structure to a function?

A structure variable can be passed to a function in a similar way of passing any argument that is of built-in data type.

If the structure itself is an argument, then it is called “call by value”. If the reference of the structure is passed as an argument then it is called, “call by

reference”.

5 Marks Answer to all the questions

Page 52: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

52

1. Explain array of structures with example A class may contain many students. So, the definition of structure for one student can also be extended to all the students. If the class has 5 students, then 5 individual structures are required. For this purpose, an array of structures can be used. An array of structures is declared in the same way as declaring an array with built-in data types like int or char. The following program reads the details of 5 students and prints the same. #include <iostream> using namespace std; struct Student { int age; float height; }; void main( ) { Student std[5]; int i; cout<< “ Enter the details for 5 students”<<endl; for(i=0;i<20;i++) { cout<< “ Enter the details of student”<<i+1<<endl; cout<< “ Enter the age:”<<endl; cin>>std[i].age; cout<< “Enter the height:”<<endl; cin>>std[i].height; } cout<< “The values entered for Age and height are”<<endl; for(i=0;i<20;i++) cout<<”Student ”<<i+1<< “\t”<<std[i].age<< “\t”<<std[i].height; }

13,14-INTRODUCTION TO OOP WITH C++ 2-marks 1.What is polymorphism? Polymorphism is the ability of a message or function to be displayed in more than one form. Example:

2. Write the disadvantages of OOP. Size: Object Oriented Programs are much larger than other programs. Effort: Object Oriented Programs require a lot of work to create. Speed: Object Oriented Programs are slower than other programs, because of their size.

3-marks

1. Differentiate classes and objects.

CLASS OBJECT

Page 53: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

53

Class is a user defined data type. Class represents a group of similar objects.

Objects are the basic unit of OOP. It represents data and associated function together in to a single unit.

Objects are share common properties and relationship.

An identifiable entity with some characteristics and behavior.

2. write general form of class declaraction

3. what do you mean by inline member function?

When a member function is defined inside a class, it behaves like inline functions. These are called Inline member functions.

5 Marks

1.Write the differences between Object Oriented Programming and procedural programming.

Object Oriented Programming procedural programming

In OOP where the program can be decomposed into modules.

Programs are organized in the form of subroutines or sub programs

Data items are global as well as local (public, private, protected are used). Data and its associated operations are grouped in to single unit.

All data items are global

Programs are designed around the data being operated.

Suitable for small sized software application

Relationships can be created between similar, yet distinct data types.

Difficult to maintain and enhance the program code as any change in data type needs to be propagated to all subroutines that use the same data type. This is time consuming.

Example: C++, Java, VB.Net, Python etc. Example: FORTRAN and COBOL 2. What are the advantages of OOPs? Advantages of OOP:

1. Re-usability 3. Easy Maintenance

2. Redundancy 4. Security

1. Re-usability:“Write once and use it multiple times” you can achieve this by using class. 2. Redundancy:Inheritance is the good feature for data redundancy. If you need a same functionality in multiple class you can write a common class for the same functionality and inherit that class to sub class.

www.nammakalvi.org

Page 54: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

54

3. Easy Maintenance:It is easy to maintain and modify existing code as new objects can be created with small differences to existing ones. 4. Security:Using data hiding and abstraction only necessary data will be provided thus maintains the security of data. Disadvantages of OOP:

I. Size: Object Oriented Programs are much larger than other programs. II. Effort: Object Oriented Programs require a lot of work to create.

III. Speed: Object Oriented Programs are slower than other programs, because of their size.

14-Polymorphism (2 Marks):

1. What is function overloading? The ability of the function to process the message or data in more than one form is called as function overloading.

2. List the operators that cannot be overloaded. One cannot overload C++ specific operators like

1. Membership operator (.) 2. Scope resolution operator (::)

3. size of operator 4. Conditional operator.(?:)

3-marks 1. What is the use of overloading a function? Function overloading user in impliementing polymorphism and also reduce the number of comparisons in a program and makes programs to execute faster. It also helps the programmer by reducing the number of function names to be remembered. 2.What are the rules for function overloading? Rules for function overloading 1. The overloaded function must differ in the number of its arguments or data types 2. The return type of overloaded functions are not considered for overloading same data type 3. The default arguments of overloaded functions are not considered as part of the parameter list

in function overloading. 3. Discuss the benefit of constructor overloading ?

Constructor overloading provides flexibility of creating multiple type of objects for a class. Since, there are multiple constructors present, argument to the constructor should also be

passed while creating an object. (5 Marks):

1. What are the rules for operator overloading? 1. Precedence and Associativity of an operator cannot be changed. 2. No new operators can be created, only existing operators can be overloaded. 3. Cannot redefine the meaning of an operator’s procedure. You cannot change how integers are

added.Only additional functions can be to an operator 4. Overloaded operators cannot have default arguments. 5. When binary operators are overloaded, the left hand object must be an object of the relevant class. 2. Differentiate constructor and destructor

1) The name of the constructor must be same as that of the class 2) A constructor can have parameter list 3) The constructor function can be overloaded

Page 55: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

55

4) The compiler generates a constructor, in the absence of a user defined constructor 5) The constructor is executed automatically Destructor

1) The destructor has the same name as that of the class prefixed by the tilde character ‘~’. 2) The destructor cannot have arguments 3) It has no return type 4) Destructors cannot be overloaded i.e., there can be only one destructor in a class 5) In the absence of user defined destructor, it is generated by the compiler 6) The destructor is executed automatically when the control reaches the end of class scope

Inheritance

1.What is Inheritance? The mechanism of deriving new class from an existing class is called Inheritance. 2. What is base class? A class that is used as the basis for inheritance is called a superclass or base class.

3.

2) To initialize the data member of the class object

4.

(3 Marks): 1.What are the points to be noted while deriving a new class?

Derived Class and Base class

While defining a derived class, the derived class should identify the class from which it is derived. The following points should be observed for defining the derived class. i The keyword class has to be used ii The name of the derived class is to be given after the keyword class iii A single colon iv The type of derivation (the visibility mode ), namely private, public or protected. If no visibility

mode is specified ,then by default the visibility mode is considered as private. v The names of all base classes(parent classes) separated by comma. 2. What do you mean by overriding?

When a derived class member function has the same name as that of its base class member function ,the derived class member function shadows/hides the base class’s inherited function .This situation is called function overriding

Page 56: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

56

3. Write some facts about the execution of constructors and destructors in inheritance Some Facts About the execution of constructor in inheritance Base class constructors are executed first ,before the derived class constructors execution Derived class can not inherit the base class constructor but it can call the base class constructor by using Base_class name::base_class_constructor() in derived class definition If there are multiple base classes ,then its start executing from the left most base class In multilevel inheritance, the constructors will be executed in the order of inheritance.

5-Marks

1.Explain the different types of inheritance Types of Inheritance

There are different types of inheritance viz., Single Inheritance, Multiple inheritance, Multilevel inheritance, hybrid inheritance and hierarchical inheritance.

1. Single Inheritance When a derived class inherits only from one base class, it is known as single inheritance

2. Multiple Inheritance When a derived class inherits from multiple base classes it is known as multiple inheritance

3. Hierarchical inheritance When more than one derived classes are created from a single base class , it is known as Hierarchical inheritance. 4. Multilevel Inheritance The transitive nature of inheritance is itself reflected by this form of inheritance. When a class is derived from a class which is a derived class – then it is referred to as multilevel inheritance. 5. Hybrid inheritance When there is a combination of more than one type of inheritance, it is known as hybrid inheritance. Hence, it may be a combination of Multilevel and Multiple inheritance or Hierarchical and Multilevel inheritance or Hierarchical, Multilevel and Multiple inheritance.

www.nammakalvi.org

Page 57: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

57

2.Explain the different visibility mode through pictorial representation. VISIBILITY MODES An important feature of Inheritance is to know which member of the base class will be acquired by the derived class. This is done by using visibility modes.

The accessibility of base class by the derived class is controlled by visibility modes. The three visibility modes are private, protected and public. The default visibility mode is private. Though visibility modes and access specifiers look similar, the main difference between them is Access specifiers control the accessibility of the members with in the class where as visibility modes control the access of inherited members with in the class.

Private visibility mode When a base class is inherited with private visibility mode the public and protected members of the base class become ‘private’ members of the derived class

protected visibility mode When a base class is inherited with protected visibility mode the protected and public members of the base class become ‘protected members ‘ of the derived class.

Page 58: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

58

public visibility mode When a base class is inherited with public visibility mode , the protected members of the base class will be inherited as protected members of the derived class and the public members of the base class will be inherited as public members of the derived class.

17-Computer Ethics and Cyber Security

(2 Marks): 1. What is harvesting? A person or program collects login and passwordinformation from a legitimate user to illegally gainaccess to others’ account(s).

2. What are Warez?

Commercial programs that are made available to the public illegally are often called warez.

3. Write a short note on cracking.

“Cracking” means trying to get into computer systems in order to steal, corrupt, or illegitimately view data. 4.Write two types of cyber attacks.

Virus Worms

5. What is a Cookie? A cookie (also called HTTP cookie, web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user's computer memory (Hard drive) by the user's web browser while the user is browsing internet.

(3 Marks):

Page 59: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

59

1. What is the role of firewalls? A firewall is a network security system that monitors and controls incoming and outgoing network traffic based on predetermined security rules.

2.Write about encryption and decryption.

3.Explain symmetric key encryption.

SYMMETRIC KEY ENCRYPTION Symmetric encryption is a technique to use the same key for both encryption and

decryption. The main disadvantage of the symmetric key encryption is that all authorized persons

involved, have to exchange the key used to encrypt the data before they can decrypt it. If anybody intercepts the key information, they may read all message.

4. What are ethical issues? Name some.

Some of the common ethical issues are listed below: Cyber crime Software Piracy Unauthorized Access Hacking Use of computers to commit fraud Sabotage in the form of viruses Making false claims using computers

5.

5 Marks): 1.What is piracy? Mention the types of piracy? How can it be prevented? SOFTWARE PIRACY

Page 60: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

60

Software Piracy is about the copyright violation of software created originally by an individual or an institution.

It includes stealing of codes / programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.

In simple words,Software Piracy is “unauthorized copying of software”. Most of the commercial software is licensed for use at a single computer site or for use by

only one user at any time. When a user buys any software, he becomes a licensed user for that software. He is allowed to make copies of the program for backup purposes, but it is against the law to

distribute duplicate copies to others. Such illegal copying and distribution of commercial software should not be practiced. An entirely different approach to software piracy is called shareware, acknowledges the

futility of trying to stop people from copying software and instead relies on people’s honesty. Shareware publishers encourage users to give copies of programs to friends and colleagues

but ask everyone who uses that program regularly to pay a registration fee to the program’s author directly.

Commercial programs that are made available to the public illegally are often called warez.

2.Write the different types of cyber attacks.

www.nammakalvi.org

Page 61: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

61

2. explain

Page 62: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

62

4.

Page 63: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

63

5. Explain Man In The Middle (MITM)

Man In The Middle (MITM)

Man-in-the-middle attack (MITM; also Janus attack) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

Example: Suppose Alice wishes to communicate with Bob. Meanwhile, Mallory wishes to intercept the conversation to overhear and optionally to deliver a false message to Bob.

6. Explain Madurai Project ? Madurai Project Project Madurai is an open and voluntary initiative to collect and publish free electronic

editions of ancient tamil literary classics. This means either typing-in or scanning old books and archiving the text in one of the

most readily accessible formats for use on all popular computer platforms. Since its launch in 1998, Project Madurai released in Tamil script form as per TSCII

encoding. Since 2004 they started releasing ebooks in Tamil unicode as well. Web Site: http://www.projectmadurai.org/

7.Define Ransomware?

Ransomware is a type of malicious program that demands payment after launching a cyber-attack on a computer system.

This type of malware has become increasingly popular among criminals and costs the organizations millions each year.

8. Explain aboutTamil Office Automation Applications Famous Office automation software like Microsoft Office, Open Office etc., provides

complete Tamil interface facility.

Page 64: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

64

These softwares are downloadable and installed in your computer. After installation, your office automation software environment will completely changed to

Tamil. Menu bars, names of icons, dialog boxes will be shown in Tamil. Moreover, you can save files with Tamil names and create folders with Tamil names. Apart from that Tamil Libra Office, Tamil Open Office, Azhagi Unicode Editor, Ponmozhi,

Menthamiz, Kamban, Vani are office automation software working exclusively for Tamil. You can these applications are designed to work completely in Tamil.

9.Explain Cookies ?

A cookie (also called HTTP cookie, web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user's computer memory (Hard drive) by the user's web browser while the user is browsing internet.

Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items added in the shopping cart in an online store) or to record the user's browsing activity (including clicking particular buttons, logging in etc.).

They can also be used to remember arbitrary pieces of information that the user previously entered into form fields such as names, addresses, passwords, and credit card numbers.

From the security point of view, if cookie data is not encrypted, any anonymous user (hacker) can access the cookie information and misuse it.

Web sites typically use cookies for the following reasons: To collect demographic information about who has visited the Web site.

Sites often use this information to track how often visitors come to the site and how long they remain on the site.

It helps to personalize the user's experience on the Web site.

Cookies can help store personal information about users so that when a usersubsequently returns to the site, a more personalized experience is provided.

18-Tamil Computing

1. List of the search engines supporting Tamil. Google, Bing and Yahoo 2.. Write a short note about Tamil Programming Language.

Tamil Programming Language Programming languages to develop software to computers and smart phones are

available only in English. Now, efforts are taken to develop programming languages in Tamil. Based on Python programming language, the first Tamil programming language “Ezhil” is

designed. With the help of this programming language, you can write simple programs in Tamil.

3.What TSCII?

www.nammakalvi.org

Page 65: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

65

TSCII (Tamil Script Code for Information Interchange) is the first coding system to handle our Tamil language in an analysis of an encoding scheme that is easily handled in electronic devices, including non-English computers.

This encoding scheme was registered in IANA (Internet Assigned Numbers Authority) unit of ICANN.

4. Write a short note on Tamil Virtual Academy. Tamil Virtual Academy:

With the objectives of spreading Tamil to the entire world through internet, Tamil Virtual University was established on 17th February 2001 by the Govt. of Tamilnadu.

Now, this organisation functioning with the name “Tamil Virtual Academy”. This organisation offers different courses regarding Tamil language, Culture, heritage

etc., from kindergarten to under graduation level. 5. Name some Familiar Tamil Keyboard Interface? Familiar Tamil Keyboard Interface: NHM Writer, E-Kalappai and Lippikar – are familiar Tamil keyboard interfaces software that is used for Tamil typing which works on Tamil Unicode, using phonetics. Sellinam and Ponmadal – are familiar Tamil keyboard layouts that works on Android operating system in Smart phone using phonetics. 6. write short notes e – Governance? e – Governance: Getting Government services through internet is known as e-Governance. Govt. of Tamilnadu has been giving its services through Internet. One can communicate with Govt. of Tamilnadu from any corner of the state. One can get important announcements, government orders, and government welfare

schemes from the web portal of Govt. of. Tamilnadu. 7. write short notes e-Library e-Library E-Libraries are portal or website of collection of e-books. Tamil e-Library services provide thousands of Tamil Books as ebooks mostly at free of cost.

8. what is Phishing? Phishing is a term used to describe a malicious individual or group of individuals who scam users by sending e-mails or creating web pages that are designed to collect an individual's online bank, credit card, or other login information. 9.differeanate Encryption and Decryption.

Page 66: Namma Kalvi SLOW LEARNER 1. Introduction to Computers...5 . Distinguish Primary and Secondary memory. primary memory secondary memory The primary memory is used to temporarily store

66

5-mark

1.Explain Tamil Information Interchange Coding Systems TSCII (Tamil Script Code for Information Interchange) Computers are handle data and information as binary system. Every data should be converted into binary while it is feed into a computer system. You learnt about all these things in the first unit of this text book. Computers use ASCII encoding system to handle data and information. The ASCII encoding system is applicable only for handling English language. Therefore, TSCII (Tamil Script Code for Information Interchange) is the first coding system

to handle our Tamil language in an analysis of an encoding scheme that is easily handled in electronic devices, including non-English computers.

This encoding scheme was registered in IANA (Internet Assigned Numbers Authority) unit of ICANN.

ISCII (Indian Script Code for Information Interchange)

This is one of the encoding schemes specially designed for Indian languages including Tamil. It was unified with Unicode.

Unicode: Unicode is an encoding system, designed to handle various world languages, including Tamil. Its first version 1.0.0 was introduced on October 1991. While introduction of this scheme, can be able to handle nearly 23 languages including Tamil. Among the various encoding scheme, Unicode is the suitable to handle Tamil.

N.HARIKUMAR,M,Sc,M.Phil,M.Ed,M.A[Edu],M.A[Tamil],P.G.D.C.A,

SRI NAVADURGA ENGLISH HIGHER SECONDARY SCHOOL Lecturer in Computer Science

www.nammakalvi.org