Notes XI CA 2008 - 2009

download Notes XI CA 2008 - 2009

of 14

Transcript of Notes XI CA 2008 - 2009

  • 8/9/2019 Notes XI CA 2008 - 2009

    1/14

    1 The application from for Plus ONE admission contains your bio data. The filled

    application forms from the applicants are used to prepare the rank list for admission.

    (a) Identify the data and information in this context.

    (b) Explain how the information helps the authorities to admit the students.

    (c) If an applicant fails to submit his/her application form, which quality factor ofinformation is affected and how?

    2 News papers give you information regarding the events happening in the world.Explain how news paper maintains the three important qualities of information.

    (3 scores)

    3 (a) Compare manual data processing with electronic data processing on the basisof different stages and devices or tools used in each stage. (3 scores)

    (b) List down the advantages of electronic data processing over Manuel

    data processing. (2

    scores)

    4. Computer is a data processing machine. Justify the validity of this statement withyour comments. (5 scores)

    Self Check Questions: 1

    1. What is data? Give any three examples.

    2. Define qualitative data. Give three examples.3. Define qualitative data. Give three examples.

    Points to Remember

    1. Data are isolated, un-interpreted, unrelated raw facts, figures, objects, ideas etc.

    2. Data can be broadly classified into two- Qualitative and quantitative.

    3. Qualitative data are those which are difficult to measure, count or express inNumerical form.

    4. Quantitative data are those that can be measured, expressed in numeric terms,

    Counted or compared on a scale.5. Information refers to meaningful data that we get after processing data.

    6 .Knowledge is the act of applying information in the related context.

    7. Data and information cannot be put in watertight compartments. Data can be

    Information and information can be Data. Only considering the context in which theAre used, one can differentiate data and information.

    8. Information adds to knowledge, is a good decision making toll, plays a key

    roleIn mounding the society and helps to increase productivity.

    9. Qualty of information is measured in terms of its validity. Meaningfulness, precision

    And accuracy.10. Value of info rmationsmeasured in term of its form, time, place and usage utilities.

  • 8/9/2019 Notes XI CA 2008 - 2009

    2/14

    11. Data processing is a series of actions or operations performed on raw data to make

    It a finished product.

    12. Data processing is of two types-Scientific and Commercial.13. In scientific data processing, a great deal of computation takes upon a relatively

    Small amount of data to provide a small volume of putout.

    14. In commercial data processing, a few computational operations take place upona large volume of data to produce a large volume of output.

    15. Computer is an electronic device that performs various kinds of operations such

    as sorting, classification, storage, retrieval ets.Upon data and can process dataAccording to a set of instructions called program, to get the desired information.

    16. The main characteristics of a computer are speed, accuracy, diligence, veracity and

    Lack of IQ and emotions. s

    Points to Remember

    1. Computer is a device made up of combination of electronic and

    electromechanically Components

    2. The functional units of a computer are CPU, memory, input unit and output unit3. CPU controls the overall functioning of the computer. It contains three parts

    ALU,

    Control Unit and memory.

    4. Memory can be classified into primary memory and secondary memory.5. Primary memory is classified into RAM and ROM.

    6. RAM is of temporary nature and Rom is of permanent nature

    7 ROM exists in forms like PROM, EPROM, and EEPROM etc.8 Floppy disk and hard disk like are two commonly used magnetic disks

    9 Registers are special purpose storage location within the CPU

    10 A machine that feeds data into the computer is called an in put device11. A mouse is a pointing input device that controls the movement of the curser on

    the display screen

    12 OMR uses a high density beam to scan and detect the location of pencil mark13 MICR allows the computer to recognize character printed on cheques, demand

    draft etc.

    14 Bar codes or vertical zebra striped mark printed on product containers

    Are read using photoelectric scanner called bar code readers15 Light pen uses a light sensitive detector to select objects directly on a display

    screen

    16 scanners can read text or pictures printed on paper and translate the informationinto computer usable form

    17. Printers produce hard copy of output data

    18. Line printers print a complete line at a time19. Character printer or serial printer print one character at a time

    20. A set of programs that governs operations of a computer system is called software

    21. Programs which are developed in order to serve a particular application is called

    Application software.

  • 8/9/2019 Notes XI CA 2008 - 2009

    3/14

    22. Program converts high level language into machine language in a single step is

    Called computer.

    23. Interpreter is a program converts H L I into machine language line by line24. Word processor is used to create and modify documents.

    25. In spreadsheet data and information are arranges in tabular form

    26. Database Management System is a set of programs that manages the database.27. Utilities are programs used to assist computers in its routine functioning

    28. Backup software are used for copying data or a group of data from one location

    Into another.29. Customized software is programs developed for meeting user requirement to

    serve a particular application.

    2nd Chapter1. The decimal number system (base 10) is comprised of 10 unique symbols 0, 1, 2,

    9.

    2. The binary number (base 2) is comprised of 2 unique symbols

    3rd Chapter

    1. Software is divided into system software and application software.2. System software operates the computer.

    3. Application software is developed for specific applications.

    4. The memory unit stores program and data.

    5. Memory can be classified into two: primary and secondary.6. Primary (main) memory is the high speed memory.

    7. RAM is volatile in nature.

    8. SRAM stores information as long as power is turned on.9. Frequent refreshing is required in DRAM

    10. The various registers used during the processing of an instruction are IR, MAR,

    MDR, PC.11. Standard keyboard consists of 108 keys.

    12. Mouse is the oldest pointing device.

    13. OCR reads character written using a special type of font.14. OMR sheets are best suited for conducting objective type tests.

    15. MICR is widely used in bank cheques.

    16. Scanner is an input device that can read from printed paper.

    17. In digital camera, no film is used to take photographs.18. Printers are broadly classified into impact printers and non-impact printers.

    19. Character printers and line printers are the two types of impact printers.

    20. Inkjet printers and thermal printers are examples of non impact printers.21. Multiprogramming is the capability of a CPU to execute two or more programs

    concurrently.

    22. Multiprocessing systems allows a single program to be processed by two or moreCPUs.

    4th Chapter1. Interconnection of two or more computers forms a network.

  • 8/9/2019 Notes XI CA 2008 - 2009

    4/14

    2. LAN, WAN, and MAN are the important types of network.

    3. The rule which describes the arrangement of resources is called topology.

    4. Intranet lies within an organization.5. Browsing is the process of visiting a website.

    5th Chapter

    Principles Of

    Programming1. A programming

    language is a set of

    written symbols thatinstructs the

    computer Hardware

    to perform specifiedtasks.

  • 8/9/2019 Notes XI CA 2008 - 2009

    5/14

    2. The initial step in

    programming isproblem

    identification.

    3. An algorithm isthe step-by- step

    method to solve a

    problem.

    4. A flow chart is a

    pictorial

  • 8/9/2019 Notes XI CA 2008 - 2009

    6/14

    representation to

    solve a problem.5. The three types of

    errors that can occur

    in a program aresyntax erroes, logic

    errors run-time

    errors.

    6. The process of

    identifying errors is

  • 8/9/2019 Notes XI CA 2008 - 2009

    7/14

    known as

    debugging.7. After removing

    syntax errors, we

    can execute theprogram.

    8. For others to get

    an overview of the

    program, it should

    be properldocumented.

  • 8/9/2019 Notes XI CA 2008 - 2009

    8/14

    9. Copyright

    encourages thecreative works of

    authors to get

    reproduced.10. Unauthorized

    copying of software

    is illegal

    11. Free software is a

    matter of liberty,not price.

  • 8/9/2019 Notes XI CA 2008 - 2009

    9/14

    6th Chapter

    1. Based upon the requirements, the system specification should be mentioned.2. The two types of user interfaces are CUI and GUI.

    3. MS-DOS uses CUI.

    4. MS-Windows 3.1 is a GUI that works in DOS.5. In client/ server computing, programs are broken into client part programs and

    Server part program.

    6. MS-Windows 95 is a true operating system.

    7th Chapter

    1. e-commerce applies new technologies through internet to do business.

    2. Telemedicine is the use of computers and internet to make healthcare available to

    people living in rural and remote areas.3. A computer network makes data communication faster and reliable.

    4. Image processing and analysis are done with the help of computer in Forensics.5. Expert system such as PROSPECTOR is helpful for geologists.

    6. A call centre is the central point for clients/customers to make enquiries/

    complaints about a product or service round the clock.

    7. Close observation of a person or place by electronic appliances connected viainternet and web camera from a distance is remote surveillance.

    8. Morphing is a technique in animation by which one image transforms itself into

    another.9. Teaching with the help of a computer is called CAI.

    10. e-governance is the delivery of government services to the public.

    8th Chapter

    1. Office automation system performs functions of an ordinary office by means of a

    computer system.2 Office automation uses technology to improve office factions

    3 Office automation reduces office expense, increases office productivity and

    efficiency.

    4 Document preparation and business communication are two main areas of Officeautomation.

    5 Modern equipment used for document preparation is ward processors, electronic

    typewriters and photocopying machines.6 PCs and LANs play a very important role in office automation.

    7 Integrated office automation provides multifunction devices with all the facilities

    of office automation

    Plus II CA Hashir

  • 8/9/2019 Notes XI CA 2008 - 2009

    10/14

    1. Visual Basic Integrates a programming paradigm based on graphical user

    interface and event driven programming concepts.

    2. Event driven programs differ from traditional programs in that they have nonsequence execution pattern .these programs consist of event procedures. An event

    driven program responds to various events

    3 The visual basic IDE (Integrated Development environment)is a collection oftools that help a developer to design, code , compile and test applications.

    4 Each application is opened as a project in visual basic. The project comprises of

    all files (or components) of an application such as forms and standard modules.The project explorer window shows the components of a project.

    5 A form is the basic building block of an application. It becomes the programs

    window at runtime. All user interface objects are contained in the form.

    6 The two steps in developing a visual Basic application are designing the userinterface and writing the code for various event procedures.

    7 The various object that make up the graphical interface of an application are

    called controls .Each control has a set of properties, methods and events. The

    controls are available in the tool box8 properties describe characteristics such as colour, width, height, style, properties

    of a control can be set using the property window.9 Methods are functions performed by a control.

    10 User activities like clicking a mouse button or typing a key produces events.

    4th Chapter1. Interconnection of two or more computers forms a network.

    2. LAN, WAN, and MAN are the important types of network.3. The rule which describes the arrangement of resources is called topology.4. Intranet lies within an organization.

    5. Browsing is the process of visiting a website.

    Score 1 questions

    1. I want to use a printer as a node in the net

    work. Is it possible? How?

    Scoring Indicaters:

    Ans:Yes

    Explanation on NIU

    2.Two protocols are given below:

  • 8/9/2019 Notes XI CA 2008 - 2009

    11/14

    (a)POP,(b)SMTP

    which will be preferred while sending an email?

    Why?

    Scoring indicators:Ans.SMTP

    Explanation

    3.Certain systems in our computer lab are called

    stand- alone systems.why?

    scoring indicator:

    explanation

    4.NIcs and IITs want to exchange their

    information. Which type of network can they use?

    Ans:WAN

    Score2 questions

    1.Mr.Prasanth has a PCwith minimum

    configuration. and windows98 is installed He

    wished to chat with his friend aboard.what arethe hardware and soft ware required to ful fill his

    wish?

    `scoring indicators;

    write about telephone connection. Modem.

    Necessary softwares, account with an ISP

    2. what do you mean by network topology?

    which are they?Scoring indicators:

    Definition

    Name of topologies

  • 8/9/2019 Notes XI CA 2008 - 2009

    12/14

    3. what do you mean by a protocol? Give

    examples.

    Scoring indicators:

    DefinationExamples

    4. You have a computer at home and wanted to

    establish an internet connection

    What type of connection will you prefer?

    Justify .

    Ans. Dial-up connection will be preferred.

    Because, we can connect to the

    Internet Service Providers computer by

    using a telephone line and moderm for which we

    should have an account with the ISP.

    5. Your friend is working in UAE. He nedds

    your recent photograph urgently to get a

    Visa.What is the fastest way to send it?Ans. The file which contain the photograbh

    will be made as an attachment file

    In the e-mail to my friend.

    6, Differentiate Internet with Intranet

    Scoring indications

    Definition

    7. What is the need for a computer network?Scoring indications

    Explanation

    Advantage

    Scoring 3 questions

  • 8/9/2019 Notes XI CA 2008 - 2009

    13/14

    1. Your school plans to connect all the

    computers to form a network. List the

    additional hardware requirements needed for

    this task and their use.Explain about hub or switch, communication

    media like cable and its use.

    2. Your brother is working aboard and is unable

    to attend first birthday of this

    child. You need to send a phograph of the

    function to your brother.

    (a) Which internet service can be used for this

    purpose?

    (b) List out the advantages of this service over

    conventional methods

    Scoring indicators.

    Ans. (a) e-mail

    (b) Ant 4 advantagesScore 4 questions

    1. How an Internet becomes an Extranet?

    Ans. An Extranet is a private network that

    Internet techonology and the

    Public telecommunication system to securely

    share part of a businessInformation on operations with suppliers,

    vendors, partners, customers or

    Other businesses. An Extranet can be viewed

    as a part of a companys Intranet

  • 8/9/2019 Notes XI CA 2008 - 2009

    14/14

    That is extended to users outside the

    company. It can also be desicribedas a

    State of mind.In which the Internet is

    perceived as a way to do business withOther companies as well as to sell products to

    ofhter customers.

    An extranet require security and privacy.s

    Companies can use an extranet to:

    (1) Exchange large volume of data using EDI