You are on page 1of 14

1 The application from for Plus ONE admission contains your bio data.

The filled
application forms from the applicants are used to prepare the rank list for admission.

(a) Identify the data and information in this context.


(b) Explain how the information helps the authorities to admit the students.
(c) If an applicant fails to submit his/her application form, which quality factor of
information is affected and how?

2 News papers give you information regarding the events happening in the world.
Explain how news paper maintains the three important qualities of information.
(3 scores)

3 (a) Compare manual data processing with electronic data processing on the basis
of different stages and devices or tools used in each stage. (3 scores)
• (b) List down the advantages of electronic data processing over Manuel
data processing. (2
scores)

4. Computer is a data processing machine. Justify the validity of this statement with
your comments. (5 scores)

Self Check Questions: 1

1. What is data? Give any three examples.


2. Define qualitative data. Give three examples.
3. Define qualitative data. Give three examples.

Points to Remember

1. Data are isolated, un-interpreted, unrelated raw facts, figures, objects, ideas etc.
2. Data can be broadly classified into two- Qualitative and quantitative.
3. Qualitative data are those which are difficult to measure, count or express in
Numerical form.
4. Quantitative data are those that can be measured, expressed in numeric terms,
Counted or compared on a scale.
5. Information refers to meaningful data that we get after processing data.
6 .Knowledge is the act of applying information in the related context.
7. Data and information cannot be put in watertight compartments. Data can be
Information and information can be Data. Only considering the context in which the
Are used, one can differentiate data and information.
8. Information adds to knowledge, is a good decision making toll, plays a key
role
In mounding the society and helps to increase productivity.
9. Qualty of information is measured in terms of its validity. Meaningfulness, precision
And accuracy.
10. Value of info rmationsmeasured in term of its form, time, place and usage utilities.
11. Data processing is a series of actions or operations performed on raw data to make
It a finished product.
12. Data processing is of two types-Scientific and Commercial.
13. In scientific data processing, a great deal of computation takes upon a relatively
Small amount of data to provide a small volume of putout.
14. In commercial data processing, a few computational operations take place upon
a large volume of data to produce a large volume of output.
15. Computer is an electronic device that performs various kinds of operations such
as sorting, classification, storage, retrieval ets.Upon data and can process data
According to a set of instructions called program, to get the desired information.
16. The main characteristics of a computer are speed, accuracy, diligence, veracity and
Lack of IQ and emotions. s

Points to Remember
1. Computer is a device made up of combination of electronic and
electromechanically Components

2. The functional units of a computer are CPU, memory, input unit and output unit
3. CPU controls the overall functioning of the computer. It contains three parts
ALU,
Control Unit and memory.
4. Memory can be classified into primary memory and secondary memory.
5. Primary memory is classified into RAM and ROM.
6. RAM is of temporary nature and Rom is of permanent nature
7 ROM exists in forms like PROM, EPROM, and EEPROM etc.
8 Floppy disk and hard disk like are two commonly used magnetic disks
9 Registers are special purpose storage location within the CPU
10 A machine that feeds data into the computer is called an in put device
11. A mouse is a pointing input device that controls the movement of the curser on
the display screen
12 OMR uses a high density beam to scan and detect the location of pencil mark
13 MICR allows the computer to recognize character printed on cheques, demand
draft etc.
14 Bar codes or vertical zebra striped mark printed on product containers
Are read using photoelectric scanner called bar code readers
15 Light pen uses a light sensitive detector to select objects directly on a display
screen
16 scanners can read text or pictures printed on paper and translate the information
into computer usable form
17. Printers produce hard copy of output data
18. Line printers print a complete line at a time
19. Character printer or serial printer print one character at a time
20. A set of programs that governs operations of a computer system is called software
21. Programs which are developed in order to serve a particular application is called
Application software.
22. Program converts high level language into machine language in a single step is
Called computer.
23. Interpreter is a program converts H L I into machine language line by line
24. Word processor is used to create and modify documents.
25. In spreadsheet data and information are arranges in tabular form
26. Database Management System is a set of programs that manages the database.
27. Utilities are programs used to assist computers in its routine functioning
28. Backup software are used for copying data or a group of data from one location
Into another.
29. Customized software is programs developed for meeting user requirement to
serve a particular application.

2nd Chapter
1. The decimal number system (base 10) is comprised of 10 unique symbols 0, 1, 2,
9.
2. The binary number (base 2) is comprised of 2 unique symbols

3rd Chapter
1. Software is divided into system software and application software.
2. System software operates the computer.
3. Application software is developed for specific applications.
4. The memory unit stores program and data.
5. Memory can be classified into two: primary and secondary.
6. Primary (main) memory is the high speed memory.
7. RAM is volatile in nature.
8. SRAM stores information as long as power is turned on.
9. Frequent refreshing is required in DRAM
10. The various registers used during the processing of an instruction are IR, MAR,
MDR, PC.
11. Standard keyboard consists of 108 keys.
12. Mouse is the oldest pointing device.
13. OCR reads character written using a special type of font.
14. OMR sheets are best suited for conducting objective type tests.
15. MICR is widely used in bank cheques.
16. Scanner is an input device that can read from printed paper.
17. In digital camera, no film is used to take photographs.
18. Printers are broadly classified into impact printers and non-impact printers.
19. Character printers and line printers are the two types of impact printers.
20. Inkjet printers and thermal printers are examples of non impact printers.
21. Multiprogramming is the capability of a CPU to execute two or more programs
concurrently.
22. Multiprocessing systems allows a single program to be processed by two or more
CPUs.

4th Chapter
1. Interconnection of two or more computers forms a network.
2. LAN, WAN, and MAN are the important types of network.
3. The rule which describes the arrangement of resources is called topology.
4. Intranet lies within an organization.
5. Browsing is the process of visiting a website.

th
5 Chapter
Principles Of
Programming
1. A programming
language is a set of
written symbols that
instructs the
computer Hardware
to perform specified
tasks.
2. The initial step in
programming is
problem
identification.
3. An algorithm is
the step-by- step
method to solve a
problem.
4. A flow chart is a
pictorial
representation to
solve a problem.
5. The three types of
errors that can occur
in a program are
syntax erroes, logic
errors run-time
errors.
6. The process of
identifying errors is
known as
debugging.
7. After removing
syntax errors, we
can execute the
program.
8. For others to get
an overview of the
program, it should
be properly
documented.
9. Copyright
encourages the
creative works of
authors to get
reproduced.
10. Unauthorized
copying of software
is illegal
11. Free software is a
matter of liberty,
not price.
6th Chapter
1. Based upon the requirements, the system specification should be mentioned.
2. The two types of user interfaces are CUI and GUI.
3. MS-DOS uses CUI.
4. MS-Windows 3.1 is a GUI that works in DOS.
5. In client/ server computing, programs are broken into ‘client’ part programs and
‘Server’ part program.
6. MS-Windows 95 is a true operating system.

7th Chapter
1. e-commerce applies new technologies through internet to do business.
2. Telemedicine is the use of computers and internet to make healthcare available to
people living in rural and remote areas.
3. A computer network makes data communication faster and reliable.
4. Image processing and analysis are done with the help of computer in Forensics.
5. Expert system such as PROSPECTOR is helpful for geologists.
6. A call centre is the central point for clients/customers to make enquiries/
complaints about a product or service round the clock.
7. Close observation of a person or place by electronic appliances connected via
internet and web camera from a distance is remote surveillance.
8. Morphing is a technique in animation by which one image transforms itself into
another.
9. Teaching with the help of a computer is called CAI.
10. e-governance is the delivery of government services to the public.

8th Chapter
1. Office automation system performs functions of an ordinary office by means of a
computer system.
2 Office automation uses technology to improve office factions
3 Office automation reduces office expense, increases office productivity and
efficiency.
4 Document preparation and business communication are two main areas of Office
automation.
5 Modern equipment used for document preparation is ward processors, electronic
typewriters and photocopying machines.
6 PCs and LANs play a very important role in office automation.
7 Integrated office automation provides multifunction devices with all the facilities
of office automation

‘Plus II CA Hashir
1. Visual Basic Integrates a programming paradigm based on graphical user
interface and event driven programming concepts.
2. Event driven programs differ from traditional programs in that they have non
sequence execution pattern .these programs consist of event procedures. An event
driven program responds to various events
3 The visual basic IDE (Integrated Development environment)is a collection of
tools that help a developer to design, code , compile and test applications.
4 Each application is opened as a project in visual basic. The project comprises of
all files (or components) of an application such as forms and standard modules.
The project explorer window shows the components of a project.
5 A form is the basic building block of an application. It becomes the programs
window at runtime. All user interface objects are contained in the form.
6 The two steps in developing a visual Basic application are designing the user
interface and writing the code for various event procedures.
7 The various object that make up the graphical interface of an application are
called controls .Each control has a set of properties, methods and events. The
controls are available in the tool box
8 properties describe characteristics such as colour, width, height, style, properties
of a control can be set using the property window.
9 Methods are functions performed by a control.
10 User activities like clicking a mouse button or typing a key produces events.

4th Chapter
1. Interconnection of two or more computers forms a network.
2. LAN, WAN, and MAN are the important types of network.
3. The rule which describes the arrangement of resources is called topology.
4. Intranet lies within an organization.
5. Browsing is the process of visiting a website.

Score 1 questions
1. I want to use a printer as a node in the net
work. Is it possible? How?
Scoring Indicaters:

Ans:Yes
Explanation on NIU
2.Two protocols are given below:
(a)POP,(b)SMTP
which will be preferred while sending an email?
Why?
Scoring indicators:
Ans.SMTP
Explanation
3.Certain systems in our computer lab are called
stand- alone systems.why?
scoring indicator:
explanation
4.NIcs and IITs want to exchange their
information. Which type of network can they use?
Ans:WAN
Score2 questions
1.Mr.Prasanth has a PCwith minimum
configuration. and windows98 is installed He
wished to chat with his friend aboard.what are
the hardware and soft ware required to ful fill his
wish?
`scoring indicators;
write about telephone connection. Modem.
Necessary softwares, account with an ISP
2. what do you mean by network topology?
which are they?
Scoring indicators:
Definition
Name of topologies
3. what do you mean by a protocol? Give
examples.
Scoring indicators:
Defination
Examples
4. You have a computer at home and wanted to
establish an internet connection
What type of connection will you prefer?
Justify .
Ans. Dial-up connection will be preferred.
Because, we can connect to the
Internet Service Provider’s computer by
using a telephone line and moderm for which we
should have an account with the ISP.
5. Your friend is working in UAE. He nedds
your recent photograph urgently to get a
Visa.What is the fastest way to send it?
Ans. The file which contain the photograbh
will be made as an attachment file
In the e-mail to my friend.
6, Differentiate Internet with Intranet
Scoring indications
Definition
7. What is the need for a computer network?
Scoring indications
Explanation
Advantage
Scoring 3 questions
1. Your school plans to connect all the
computers to form a network. List the
additional hardware requirements needed for
this task and their use.
Explain about hub or switch, communication
media like cable and its use.
2. Your brother is working aboard and is unable
to attend first birthday of this
child. You need to send a phograph of the
function to your brother.
(a) Which internet service can be used for this
purpose?
(b) List out the advantages of this service over
conventional methods
Scoring indicators.
Ans. (a) e-mail
(b) Ant 4 advantages
Score 4 questions

1. How an Internet becomes an Extranet?


Ans. An Extranet is a private network that
Internet techonology and the
Public telecommunication system to securely
share part of a business
Information on operations with suppliers,
vendors, partners, customers or
Other businesses. An Extranet can be viewed
as a part of a company’s Intranet
That is extended to users outside the
company. It can also be desicribedas a “
State of mind’.In which the Internet is
perceived as a way to do business with
Other companies as well as to sell products to
ofhter customers.
An extranet require security and privacy.s
Companies can use an extranet to:
(1) Exchange large volume of data using EDI

You might also like