1 The application from for Plus ONE admission contains your bio data. The filled application forms from the applicants are used to prepare the rank list for admission.
(a) Identify the data and information in this context.
(b) Explain how the information helps the authorities to admit the students.
(c) If an applicant fails to submit his/her application form, which quality factor of information is affected and how?
2 News papers give you information regarding the events happening in the world. Explain how news paper maintains the three important qualities of information.
(3 scores)
3 (a) Compare manual data processing with electronic data processing on the basis of different stages and devices or tools used in each stage. (3 scores)
· (b) List down the advantages of electronic data processing over Manuel data processing. (2 scores)
4. Computer is a data processing machine. Justify the validity of this statement with your comments. (5 scores)
Self Check Questions: 1
1. What is data? Give any three examples.
2. Define qualitative data. Give three examples.
3. Define qualitative data. Give three examples.
Points to Remember
1. Data are isolated, un-interpreted, unrelated raw facts, figures, objects, ideas etc.
2. Data can be broadly classified into two- Qualitative and quantitative.
3. Qualitative data are those which are difficult to measure, count or express in
Numerical form.
4. Quantitative data are those that can be measured, expressed in numeric terms,
Counted or compared on a scale.
5. Information refers to meaningful data that we get after processing data.
6 .Knowledge is the act of applying information in the related context.
7. Data and information cannot be put in watertight compartments. Data can be
Information and information can be Data. Only considering the context in which the
Are used, one can differentiate data and information.
8. Information adds to knowledge, is a good decision making toll, plays a key role
In mounding the society and helps to increase productivity.
9. Qualty of information is measured in terms of its validity. Meaningfulness, precision
And accuracy.
10. Value of info rmationsmeasured in term of its form, time, place and usage utilities.
11. Data processing is a series of actions or operations performed on raw data to make
It a finished product.
12. Data processing is of two types-Scientific and Commercial.
13. In scientific data processing, a great deal of computation takes upon a relatively
Small amount of data to provide a small volume of putout.
14. In commercial data processing, a few computational operations take place upon
a large volume of data to produce a large volume of output.
15. Computer is an electronic device that performs various kinds of operations such
as sorting, classification, storage, retrieval ets.Upon data and can process data
According to a set of instructions called program, to get the desired information.
16. The main characteristics of a computer are speed, accuracy, diligence, veracity and
Lack of IQ and emotions. s
Points to Remember
1. Computer is a device made up of combination of electronic and electromechanically Components
2. The functional units of a computer are CPU, memory, input unit and output unit
3. CPU controls the overall functioning of the computer. It contains three parts ALU,
Control Unit and memory.
4. Memory can be classified into primary memory and secondary memory.
5. Primary memory is classified into RAM and ROM.
6. RAM is of temporary nature and Rom is of permanent nature
7 ROM exists in forms like PROM, EPROM, and EEPROM etc.
8 Floppy disk and hard disk like are two commonly used magnetic disks
9 Registers are special purpose storage location within the CPU
10 A machine that feeds data into the computer is called an in put device
11. A mouse is a pointing input device that controls the movement of the curser on the display screen
12 OMR uses a high density beam to scan and detect the location of pencil mark
13 MICR allows the computer to recognize character printed on cheques, demand draft etc.
14 Bar codes or vertical zebra striped mark printed on product containers
Are read using photoelectric scanner called bar code readers
15 Light pen uses a light sensitive detector to select objects directly on a display screen
16 scanners can read text or pictures printed on paper and translate the information into computer usable form
17. Printers produce hard copy of output data
18. Line printers print a complete line at a time
19. Character printer or serial printer print one character at a time
20. A set of programs that governs operations of a computer system is called software
21. Programs which are developed in order to serve a particular application is called
Application software.
22. Program converts high level language into machine language in a single step is
Called computer.
23. Interpreter is a program converts H L I into machine language line by line
24. Word processor is used to create and modify documents.
25. In spreadsheet data and information are arranges in tabular form
26. Database Management System is a set of programs that manages the database.
27. Utilities are programs used to assist computers in its routine functioning
28. Backup software are used for copying data or a group of data from one location
Into another.
29. Customized software is programs developed for meeting user requirement to serve a particular application.
2nd Chapter
1. The decimal number system (base 10) is comprised of 10 unique symbols 0, 1, 2, 9.
2. The binary number (base 2) is comprised of 2 unique symbols
3rd Chapter
1. Software is divided into system software and application software.
2. System software operates the computer.
3. Application software is developed for specific applications.
4. The memory unit stores program and data.
5. Memory can be classified into two: primary and secondary.
6. Primary (main) memory is the high speed memory.
7. RAM is volatile in nature.
8. SRAM stores information as long as power is turned on.
9. Frequent refreshing is required in DRAM
10. The various registers used during the processing of an instruction are IR, MAR, MDR, PC.
11. Standard keyboard consists of 108 keys.
12. Mouse is the oldest pointing device.
13. OCR reads character written using a special type of font.
14. OMR sheets are best suited for conducting objective type tests.
15. MICR is widely used in bank cheques.
16. Scanner is an input device that can read from printed paper.
17. In digital camera, no film is used to take photographs.
18. Printers are broadly classified into impact printers and non-impact printers.
19. Character printers and line printers are the two types of impact printers.
20. Inkjet printers and thermal printers are examples of non impact printers.
21. Multiprogramming is the capability of a CPU to execute two or more programs concurrently.
22. Multiprocessing systems allows a single program to be processed by two or more CPUs.
4th Chapter
1. Interconnection of two or more computers forms a network.
2. LAN, WAN, and MAN are the important types of network.
3. The rule which describes the arrangement of resources is called topology.
4. Intranet lies within an organization.
5. Browsing is the process of visiting a website.
5th Chapter
Principles Of Programming
1. A programming language is a set of written symbols that instructs the computer Hardware to perform specified tasks.
2. The initial step in programming is problem identification.
3. An algorithm is the step-by- step method to solve a problem.
4. A flow chart is a pictorial representation to solve a problem.
5. The three types of errors that can occur in a program are syntax erroes, logic errors run-time errors.
6. The process of identifying errors is known as debugging.
7. After removing syntax errors, we can execute the program.
8. For others to get an overview of the program, it should be properly documented.
9. Copyright encourages the creative works of authors to get reproduced.
10. Unauthorized copying of software is illegal
11. Free software is a matter of liberty, not price.
6th Chapter
1. Based upon the requirements, the system specification should be mentioned.
2. The two types of user interfaces are CUI and GUI.
3. MS-DOS uses CUI.
4. MS-Windows 3.1 is a GUI that works in DOS.
5. In client/ server computing, programs are broken into ‘client’ part programs and
‘Server’ part program.
6. MS-Windows 95 is a true operating system.
7th Chapter
1. e-commerce applies new technologies through internet to do business.
2. Telemedicine is the use of computers and internet to make healthcare available to people living in rural and remote areas.
3. A computer network makes data communication faster and reliable.
4. Image processing and analysis are done with the help of computer in Forensics.
5. Expert system such as PROSPECTOR is helpful for geologists.
6. A call centre is the central point for clients/customers to make enquiries/ complaints about a product or service round the clock.
7. Close observation of a person or place by electronic appliances connected via internet and web camera from a distance is remote surveillance.
8. Morphing is a technique in animation by which one image transforms itself into another.
9. Teaching with the help of a computer is called CAI.
10. e-governance is the delivery of government services to the public.
8th Chapter
1. Office automation system performs functions of an ordinary office by means of a computer system.
2 Office automation uses technology to improve office factions
3 Office automation reduces office expense, increases office productivity and efficiency.
4 Document preparation and business communication are two main areas of Office automation.
5 Modern equipment used for document preparation is ward processors, electronic typewriters and photocopying machines.
6 PCs and LANs play a very important role in office automation.
7 Integrated office automation provides multifunction devices with all the facilities of office automation
‘Plus II CA Hashir
1. Visual Basic Integrates a programming paradigm based on graphical user interface and event driven programming concepts.
2. Event driven programs differ from traditional programs in that they have non sequence execution pattern .these programs consist of event procedures. An event driven program responds to various events
3 The visual basic IDE (Integrated Development environment)is a collection of tools that help a developer to design, code , compile and test applications.
4 Each application is opened as a project in visual basic. The project comprises of all files (or components) of an application such as forms and standard modules. The project explorer window shows the components of a project.
5 A form is the basic building block of an application. It becomes the programs window at runtime. All user interface objects are contained in the form.
6 The two steps in developing a visual Basic application are designing the user interface and writing the code for various event procedures.
7 The various object that make up the graphical interface of an application are called controls .Each control has a set of properties, methods and events. The controls are available in the tool box
8 properties describe characteristics such as colour, width, height, style, properties of a control can be set using the property window.
9 Methods are functions performed by a control.
10 User activities like clicking a mouse button or typing a key produces events.
4th Chapter
1. Interconnection of two or more computers forms a network.
2. LAN, WAN, and MAN are the important types of network.
3. The rule which describes the arrangement of resources is called topology.
4. Intranet lies within an organization.
5. Browsing is the process of visiting a website.
Score 1 questions
1. I want to use a printer as a node in the net work. Is it possible? How?
Scoring Indicaters:
Ans:Yes
Explanation on NIU
2.Two protocols are given below:
(a)POP,(b)SMTP
which will be preferred while sending an email? Why?
Scoring indicators:
Ans.SMTP
Explanation
3.Certain systems in our computer lab are called stand- alone systems.why?
scoring indicator:
explanation
4.NIcs and IITs want to exchange their information. Which type of network can they use?
Ans:WAN
Score2 questions
1.Mr.Prasanth has a PCwith minimum configuration. and windows98 is installed He wished to chat with his friend aboard.what are the hardware and soft ware required to ful fill his wish?
`scoring indicators;
write about telephone connection. Modem. Necessary softwares, account with an ISP
2. what do you mean by network topology?which are they?
Scoring indicators:
Definition
Name of topologies
3. what do you mean by a protocol? Give examples.
Scoring indicators:
Defination
Examples
4. You have a computer at home and wanted to establish an internet connection
What type of connection will you prefer?Justify .
Ans. Dial-up connection will be preferred. Because, we can connect to the
Internet Service Provider’s computer by using a telephone line and moderm for which we should have an account with the ISP.
5. Your friend is working in UAE. He nedds your recent photograph urgently to get a Visa.What is the fastest way to send it?
Ans. The file which contain the photograbh will be made as an attachment file
In the e-mail to my friend.
6, Differentiate Internet with Intranet
Scoring indications
Definition
7. What is the need for a computer network?
Scoring indications
Explanation
Advantage
Scoring 3 questions
1. Your school plans to connect all the computers to form a network. List the
additional hardware requirements needed for this task and their use.
Explain about hub or switch, communication media like cable and its use.
2. Your brother is working aboard and is unable to attend first birthday of this
child. You need to send a phograph of the function to your brother.
(a) Which internet service can be used for this purpose?
(b) List out the advantages of this service over conventional methods
Scoring indicators.
Ans. (a) e-mail
(b) Ant 4 advantages
Score 4 questions
1. How an Internet becomes an Extranet?
Ans. An Extranet is a private network that Internet techonology and the
Public telecommunication system to securely share part of a business
Information on operations with suppliers, vendors, partners, customers or
Other businesses. An Extranet can be viewed as a part of a company’s Intranet
That is extended to users outside the company. It can also be desicribedas a “
State of mind’.In which the Internet is perceived as a way to do business with
Other companies as well as to sell products to ofhter customers.
An extranet require security and privacy.s
Companies can use an extranet to:
(1) Exchange large volume of data using EDI
0 comments:
Post a Comment