Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Students can Download Computer Science Chapter 17 Computer Ethics and Cyber Security Questions and Answers, Notes Pdf, Samacheer Kalvi 11th Computer Science Book Solutions Guide Pdf helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Samacheer Kalvi 11th Computer Science Computer Ethics and Cyber Security Text Book Back Questions and Answers

PART – 1
I. Choose The Correct Answer

Question 1.
Which of the following deals with procedures, practices and values?
(a) piracy
(b) programs
(c) virus
(d) computer ethics
Answer:
(d) computer ethics

Question 2.
Commercial programs made available to the public illegally are known as ……………….
(a) freeware
(b) warez
(c) free software
(d) software
Answer:
(b) warez

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
Which one of the following are self – repeating and do not require a computer program to attach themselves?
(a) viruses
(b) worms
(c) spyware
(d) Trojans
Answer:
(b) worms

Question 4.
Which one of the following tracks a user visiting a website?
(a) spyware
(b) cookies
(c) worms
(d) Trojans
Answer:
(b) cookies

Question 5.
Which of the following is not a malicious program on computer systems?
(a) worms
(b) Trojans
(c) spyware
(d) cookies
Answer:
(d) cookies

Question 6.
A computer network security that monitors and controls incoming and outgoing traffic is ……………….
(a) cookies
(b) virus
(c) firewall
(d) worms
Answer:
(c) firewall

Question 7.
The process of converting cipher text to plain text is called ……………….
(a) Encryption
(b) Decryption
(c) key
(d) proxy server
Answer:
(b) Decryption

Question 8.
e – commerce means ……………….
(a) electronic commerce
(b) electronic data exchange
(c) electric data exchange
(d) electronic commercialization
Answer:
(a) electronic commerce

Question 9.
Distributing unwanted e-mail to others is called.
(a) scam
(b) spam
(c) fraud
(d) spoofing
Answer:
(b) spam

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 10.
Legal recognition for transactions are carried out by ……………….
(a) Electronic Data Interchange
(b) Electronic Data Exchange
(c) Electronic Data Transfer
(d) Electrical Data Interchange
Answer:
(a) Electronic Data Interchange

PART – 2
II. Answers to all the questions

Question 1.
What is harvesting?
Answer:
A person or program collects login and password information from a legitimate user to illegally gain access to others account(s).

Question 2.
What are Warez?
Answer:
Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses that program regularly to pay a registration fee to the program’s author directly. Commercial programs that are made available to the public illegally are often called warez.

Question 3.
Write a short note on cracking.
Answer:
Cracking is where someone edits a program source so that the code can be exploited or modified. “Cracking” means trying to get into computer systems in order to steal, corrupt, or illegitimately view data.

Question 4.
Write two types of cyber attacks.
Answer:
Cyber Attack:

  1. Virus
  2. Worms

Function:

  1. A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common virus is Trojan.
  2. Worms are self – repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.

Question 5.
What is a Cookie?
Answer:
A cookie (also called HTTP cookie, web cookie, Internet cookie, browser cookie, or simply cookie) is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing internet.

PART – 3
III. Answers to all the questions

Question 1.
What is the role of firewalls?
Answer:
A firewall is a computer network security based system that monitors and controls incoming and outgoing network traffic based on predefined security rules. A firewall commonly establishes a block between a trusted internal computer network and entrusted computer outside the network. They are generally categorized as network – based or host – based. Network based firewalls are positioned on the gateway computers of LANs [local area Network], WANs [Wide Area Network] and intranets.

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
Write about encryption and decryption.
Answer:
Encryption and decryption are processes that ensure confidentiality that only authorized persons can access the information. Encryption is the process of translating the plain text data (plaintext) into random and mangled data (called cipher – text). Decryption is the reverse process of converting the cipher – text back to plaintext. Encryption and decryption are done by cryptography. In cryptography a key is a piece of information (parameter) that determines the functional output of a cryptographic algorithm.

Question 3.
Explain symmetric key encryption.
Answer:
Symmetric encryption is a technique to use the same key for both encryption and decryption. The main disadvantage of the symmetric key encryption is that all authorized persons involved, have to exchange the key used to encrypt the data before they can decrypt it. If anybody intercepts the key information, they may read all messages.

Question 4.
What are the guidelines to be followed by any computer user?
Answer:
Generally, the following guidelines should be observed by computer users:

  1. Honesty : Users should be truthful while using the internet.
  2. Confidentiality : Users should not share any important information with unauthorized people.
  3. Respect : Each user should respect the privacy of other users.
  4. Professionalism : Each user should maintain professional conduct.
  5. Obey The Law : Users should strictly obey the cyber law in computer usage.
  6. Responsibility : Each user should take ownership and responsibility for their actions.

Question 5.
What are ethical issues? Name some.
Answer:
An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as right (ethical) or wrong (unethical). These issues must be addressed and resolved to have a positive influence in society.
Some of the common ethical issues are listed below:

  1. Cyber crime
  2. Software Piracy
  3. Unauthorized Access
  4. Hacking
  5. Use of computers to commit fraud.
  6. Sabotage in the form of viruses.

PART – 4
IV. Answers to all the questions

Question 1.
What are the various crimes happening using computer?
Answer:
Crime:

  1. Crime Function
  2. Cyber stalking
  3. Malware
  4. Harvesting
  5. Identity theft
  6. Intellectual property theft
  7. Salami slicing

Function:

  1. Hacking, threats, and blackmailing towards a business or a person.
  2. Harassing through online.
  3. Malicious programs that can perform a variety of functions including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring user’s computer activity without their permission.
  4. A person or program collects login and password information from a legitimate user to illegally gain access to others’ account(s).
  5. It is a crime where the criminals impersonate individuals, usually for financial gain.
  6. Stealing practical or conceptual information developed by another person or company.
  7. Stealing tiny amounts of money from each transaction.

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
What is piracy? Mention the types of piracy? How can it be prevented?
Answer:
Software Piracy is about the copyright violation of software created originally by an individual or an institution. It includes:
1. stealing of codes / programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.

2. Downloading software from illegal network sources.
An entirely different approach to software piracy is called shareware, acknowledges the futility of trying to stop people from copying software and instead relies on people’s honesty.

Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses that program regularly to pay a registration fee to the program’s author directly. To prevent unauthorized access, Firewalls, Intrusion Detection Systems (IDS), Virus and Content Scanners, Patches and Hot fixes are used.

Question 3.
Write the different types of cyber attacks.
Answer:
Cyber Attack:

  1. Virus
  2. Worms
  3. Spyware
  4. Ransomware

Function:

  1. A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common virus is Trojan.
  2. Worms are self – repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.
  3. Spyware can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software.
  4. Ransomware is a type of malicious program that demands payment after launching a cyber – attack on a computer system. This type of malware has become increasingly popular among criminals and costs the organizations millions each year.

Samacheer kalvi 11th Computer Science Computer Ethics and Cyber Security Additional Questions and Answers

PART – 1
I. Choose the correct answer

Question 1.
A moral code that is evaluated as right is ………………..
(a) piracy
(b) viruses
(c) cracking
(d) ethics
Answer:
(d) ethics

Question 2.
……………….. is a crime where the criminals impersonate individuals for financial gain.
(a) intellectual property theft
(b) Identity theft
(c) Salami slicing
(d) Spoofing
Answer:
(b) Identity theft

Question 3.
Stealing data from a computer system without the knowledge or permission is called ………………..
(a) warez
(b) hacking
(c) cracking
(d) phishing
Answer:
(b) hacking

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 4.
One of the most common virus is ………………..
(a) Ransomware
(b) Spyware
(c) worms
(d) Trojan
Answer:
(d) Trojan

Question 5.
……………….. is the intermediary between the end users and a web browser.
(a) Firewall
(b) Proxy server
(c) Cookies
(d) Warez
Answer:
(b) Proxy server

PART – 2
II. Short Answers

Question 1.
What is hacking?
Answer:
Hacking is intruding into a computer system to steal personal data without the owner’s permission or knowledge (like to steal a password). It is also gaining unauthorized access to a computer system, and altering its contents.

Question 2.
What is proxy server? Explain its working.
Answer:
A proxy server acts as an intermediary between the end users and a web server. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resources available from a different server. The proxy server examines the request, checks authenticity and grants the request based on that. Proxy servers typically keep the frequently visited site addresses in its cache which leads to improved response time.

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
Mention any 2 reasons as to why the websites use cookies?
Answer:

  1. To collect demographic information about who has visited the Web site.
  2. It helps to personalize the user’s experience on the Website.

Question 4.
What is meant by MITM?
Answer:
Man – in – the – middle attack (MITM; also Janus attack) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

Question 5.
Define software piracy.
Answer:
Software Piracy is about the copyright violation of software created originally by an individual or an institution. It includes stealing of codes / programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.

PART – 3
III. Short Answers

Question 1.
What is cyber crime?
Answer:
A cyber – crime is a crime which involves computer and network. This is becoming a growing threat to society and is caused by criminals or irresponsible action of individuals who are exploiting the widespread use of Internet. It presents a major challenge to the ethical use. of information technologies. Cyber – crime also poses threats to the integrity, safety and survival of most business systems.
Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
Write a short note on ethics.
Answer:
Ethics means “What is wrong and What is Right”. It is a set of moral principles that rule the behavior of individuals who use computers. An individual gains knowledge to follow the right behavior, using morals that are also known as ethics. Morals refer to the generally accepted standards of right and wrong in the society. Similarly, in cyber – world, there are certain standards such as

  1. Do not use pirated software.
  2. Do not use unauthorized user accounts.
  3. Do not steal others’ passwords.
  4. Do not hack.

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
Differentiate Spyware and Ransomware.
Answer:
Spyware:
Spyware can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software.

Ransomware:
Ransomware is a type of malicious program that demands payment after launching a cyber-attack on a computer system. This type of malware has become increasingly popular among criminals and costs the organizations millions each year.

Question 4.
What are the types of encryption?
Answer:
There are two types of encryption schemes as listed below:
1. Symmetric Key encryption : Symmetric encryption is a technique to use the same key for both encryption and decryption.
Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security
2. Public Key encryption : Public key encryption is also called Asymmetric encryption. It uses the concept of a key value pair, a different key is used for the encryption and decryption
Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 5.
Write down the points to be noted to be safe from cyber crime.
Answer:
To protect the information the following points to be noted:

  1. Complex password setting can make your surfing secured.
  2. When the internet is not in use, disconnect it.
  3. Do NOT open spam mail or emails that have an unfamiliar sender.
  4. When using anti – virus software, keep it up – to – date.

PART – 4
IV. Explain in Detail

Question 1.
Explain public key encryption and asymetric encryption in digital certificate.
Answer:
Public key encryption is also called Asymmetric encryption. It uses the concept of a key value pair, a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key. The private key is kept secret by the owner and the public key is either shared amongst authorized recipients or made available to the public at large.

The data encrypted with the recipient’s public key can only be decrypted with the corresponding private key. A digital certificate in a client – server model of communication is one of the example of Asymmetric Encryption. A certificate is a package of information that identifies a user and a server.

It contains information such as an organization’s name, the organization that issued the certificate, the users’ email address and country, and user’s public key. When a server and a client require a secure encrypted communication, they send a query over . the network to the other party, which sends back a copy of the certificate. The other party’s public key can be extracted from the certificate. A certificate can also be used to uniquely identify the holder.

Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
Write short notes on:

  1. Spam
  2. Fraud
  3. Cyber stalking
  4. Spoofing
  5. Virus
  6. Worms

Answer:

  1. Spam : Distribute unwanted e – mail to a large number of internet users.
  2. Fraud : Manipulating data, for example changing the banking records to transfer money to an unauthorized account.
  3. Cyber stalking : Harassing through online.
  4. Spoofing : It is a malicious practice in which communication is send from unknown source disguised as a source known to the receiver.
  5. Virus : A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common virus is Trojan.
  6. Worms : Worms are self – repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.

Question 3.
Explain digital signature with a functional diagram.
Answer:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging information given by the signer. To create a digital signature, signing software (email) creates a one – way hash of the electronic data to be signed.

The user’s private key to encrypt the hash, returning a value that is unique to the hashed data. The encrypted hash, along with other information such as the hashing algorithm, forms the digital signature. Any change in the data, even to a single bit, results in a different hash value. This attribute enables others to validate the integrity of the data by using the signer’s public key to decrypt the hash.

If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn’t changed since it was signed. If the two hashes don’t match, the data has either been tampered with in some way (indicating a failure of integrity) or the signature was created with a private key that doesn’t correspond to the public key presented by the signer (indicating a failure of authentication).
Samacheer Kalvi 11th Computer Science Solutions Chapter 17 Computer Ethics and Cyber Security

Samacheer Kalvi 11th Computer Applications Solutions Chapter 18 Tamil Computing

Students can Download Computer Applications Chapter Chapter 18 Tamil Computing Questions and Answers, Notes Pdf, Samacheer Kalvi 11th Computer Applications Book Solutions Guide Pdf helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

Tamilnadu Samacheer Kalvi 11th Computer Applications Solutions Chapter 18 Tamil Computing

Samacheer Kalvi 11th Computer Applications Tamil Computing Text Book Back Questions and Answers

I. Answer To The Following Questions

Question 1.
List of the search engines supporting Tamil?
Answer:
Google, Bing and Yahoo are takes first three places respectively. Google and Bing provide searching facilities in Tamil, which me you can search everything through Tamil. A Google search engine gives you an inbuilt Tamil virtual keyboard.

Question 2.
What are the keyboard layouts used in Android?
Answer:
Sellinam and Ponmadal are familiar Tamil keyboard layouts that works on android operating system in Smart phone using phonetics.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 18 Tamil Computing

Question 3.
Write a short note about Tamil Programming Language?
Answer:
Programming languages to develop software to computers and smart phones are available only in English. Now, efforts are taken to develop programming languages in Tamil.

Based on Python programming language, the first Tamil programming language “Ezhil” (எழில்) is designed. With the help of this programming language, you can write simple programs in Tamil:

Question 4.
What is TSCII?
Answer:
TSCII (Tamil Script Code for Information Interchange) is the first coding system to handle our Tamil language in an analysis of an encoding scheme that is easily handled in electronic devices, including non- English computers. This encoding scheme was registered in IANA (Internet Assigned Numbers Authority) unit of ICANN.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 18 Tamil Computing

Question 5.
Write a short note on Tamil Virtual Academy?
Answer:
With the objectives of spreading Tamil to the entire world through Internet, Tamil Virtual University was established on 17th February 2001 by the Government of Tamilnadu.

Now, this organisation functioning with the name “Tamil Virtual Academy”. This organisation offers different courses regarding Tamil language, Culture, heritage etc… from kindergarten to under graduation level.

Samacheer Kalvi 11th Computer Applications Tamil Computing Additional Important Questions and Answer

I. Choose The Correct Answer

Question 1.
Human civilization developed with the innovation of computer in the …………………….
(a) 11th century
(b) 13th century
(c) 16th century
(d) 20th century
Answer:
(d) 20th century

Samacheer Kalvi 11th Computer Applications Solutions Chapter 18 Tamil Computing

Question 2.
…………………… is not just a language, it is our identity, our life and our source.
(a) English
(b) Sanskrit
(c) Tamil
(d) Hindi
Answer:
(c) Tamil

Question 3.
Getting government services through internet is known as
(a) e-library
(b) e-govemance
(c) Tamil programming language
(d) Tamil translation applications
Answer:
(b) e-govemance

II. Short Answers

Question 1.
What is e-governance?
Answer:
Getting Government services through internet is known as e-Govemance. Govt, of Tamil Nadu has been giving its services through Internet.

One can communicate with Govt, of Tamil Nadu from any comer of the state. One can get important’announcements, government orders, and government welfare schemes from the web portal of Govt. of. Tamil Nadu.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 18 Tamil Computing

Question 2.
Write short notes on e-library?
Answer:
E-Libraries are portal or website of collection of e-books. Tamil e-Library services provide thousands of Tamil Books as ebooks mostly at free of cost. It is the most useful service to Tamil people who live far away from their home land.

Question 3.
Explain Tamil translation applications?
Answer:
Thamizpori (தமிழ்பொறி) is a Tamil translation application having more than 30000 Tamil words equalent to English words. Using this application, we can translate small English sentences into Tamil. Google also gives an online translation facility, using this online facility we can translate from Tamil to any other language and vice versa.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 18 Tamil Computing

Question 4.
Define Tamil office automation application?
Answer:
Famous Office automation software like Microsoft Office, Open Office etc., provides complete Tamil interface facility. These softwares are downloadable and installed in your computer.

After installation, your office automation software environment will be completely changed to Tamil. Menu bars, names of icons, dialog boxes will be shown in Tamil. Moreover, you can save files with Tamil names and create folders with Tamil names.

Question 5.
Explain ISCII?
Answer:
Indian Script Code for Information Interchange (ISCII ), is one of the encoding schemes specially designed for Indian languages including Tamil. It was unified with Unicode.

III. Short Answers

Question 1.
What is Unicode?
Answer:
Unicode is an encoding system, designed to handle various world languages, including Tamil. Its first version 1.0.0 was introduced on October 1991.

While introduction of this scheme, can be able to handle nearly 23 languages including Tamil. Among the various encoding scheme, – Unicode is the suitable to handle Tamil.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 18 Tamil Computing

Question 2.
Define tamil typing and interface software?
Answer:
Tamil is mostly used to type documents in word processors and search information from internet. Typing Tamil using Tamil interface software is the familiar one among the different methods of typing. This is the simplest method of typing Tamil in both Computer and Smart phones.

Question 3.
Write a short note on Tamil in internet?
Answer:
Internet is the best information technological device, through which we get know everything from Internet. In 2017 a study conducted by KPMG a Singapore based organization along with google, reported that, Tamil topped the list, among the most widely used languages in India where 42% are using the Internet in Tamil. Moreover in 2021 onwards, 74% of people in India will access internet using Tamil and it will be in the top usage of Internet in India.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 18 Tamil Computing

Question 4.
Explain Tamil operating system?
Answer:
An operating system is needed to access electronic systems such as computer and smart phone. Microsoft Windows is very popular operating system for personal computers.

Linux is another popular open source operating system. Operating systems are used to access a computer easily. An operating system should be easy to work and its environment should be in understandable form. Thus, all operating systems used in computers and smart phones offered environment in Tamil.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Javascript Functions

Students can Download Computer Applications Chapter Chapter 16 Javascript Functions Questions and Answers, Notes Pdf, Samacheer Kalvi 11th Computer Applications Book Solutions Guide Pdf helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

Tamilnadu Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Javascript Functions

Samacheer Kalvi 11th Computer Applications Javascript Functions Text Book Back Questions and Answers

I. Choose The Correct Answer

Question 1.
The parameters work as:
(a) local variable
(b) global Variable
(c) file variable
(d) block variable
Answer:
(a) local variable

Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Javascript Functions

Question 2.
Predefined functions are also called as:
(a) library functions
(b) storage functions
(c) instructions
(d) commands
Answer:
(a) library functions

Question 3.
Larger programs are divided into smaller are called:
(a) modules
(b) block
(c) sets
(d) group
Answer:
(a) modules

Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Javascript Functions

Question 4.
Which of the following is used to enhance re-usability and program clarity?
(a) Functions
(b) Modules
(c) Sets
(d) Instructions
Answer:
(a) Functions

Question 5.
Which of the following allow the programmer to modularize a program?
(a) Library functions
(b) User defined functions
(c) Normal functions
(d) Ordinary functions
Answer:
(b) User defined functions

II. Answer To The Following Questions

Question 1.
What is a function in JavaScript?
Answer:
A function is a block of JavaScript code that is defined once but may be executed or invoked any number of times. Functions are used to encapsulate code that performs a specific task.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Javascript Functions

Question 2.
What is the use of function?
Answer:
Sometimes functions are defined for commonly required tasks to avoid the repetition entailed in typing the same statements over and over. More generally, they are used to keep code that performs a particular job in one place in order to enhance re-usability and program clarity.

Question 3.
Write a note on Library functions?
Answer:
Pre-defined functions are already defined in the JavaScript library which are also called Library functions. For example isNaN( ), toUpperCase( ), toLowerCase( ), length( ), alert( ), prompt( ),write( ) etc… are pre-defined functions.

Question 4.
Write a note on user defined functions?
Answer:
User-defined functions allow the programmer to modularize a program. Most computer programs that solve real-world problems are much large, occupy more space in the computer memory and takes more time to execute. Hence such large programs are divided into small programs are called modules.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Javascript Functions

Question 5.
Write the syntax of functions?
Answer:
The format of a function definition is –
Function function-name(parameters list)
{
Declaration of variable Executable statements;
}

III. Answer To The Following Questions

Question 1.
Write a program in JavaScript to find the cube of a number using function?
Answer:
<html>
<head>
<title> print the cube number
</title>
</head>
<Title>
Function cube</Title>
<Script type = “text/Javascript”>
<!—
var input = window.prompt (“Enter value : ”, “0”);
var v = parselnt (input); var c = cube (v);
document, write In (“<br><h4><u> cube function </u> </h4>”);
document, write In (“Number *V* “<br> The cube =” *C);
function cube (x)
{
var cube = x* x * x; return c;
}
//–>
</script>
</head>
<body>
</body>
</html>
OUTPUT
Enter value : 5
Cube Function Number : 5
The cube : 125

Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Javascript Functions

Question 2.
Write a program in JavaScript to find the sum of 10 numbers using function?
Answer:
<html>
<head>
<Title> Function sum of 10 Numbers </Title>
<Script type = “text/Javascript”>
<!—
var input 1 = window.prompt (“Enter initial value : ”, “0”);
var input 2 = window.prompt (“Enter final value : ”, “0”);
var v1 = parse Int (input 1);
var v2 = parse Int (input 2);
var r = res (v1 , v2);
document, write In (“<br><h4><u> Function for sum of 10 Numbers </u> </h4>”);
document, write In (“Initial Number : “ +v1+” <br> Final Number : “+v2+”<br>
The result =”+r);
function result (n)
{
var r = n* (n+1)/2
return r;
//–>
</script>
</head>
<body>
</body>
</html>
OUTPUT
Enter initial value : 1
Enterfinal value : 10
Function for sum of 10 numbers
Initial No : 1
FinalNo : 10
The result : 55

Samacheer Kalvi 11th Computer Applications Javascript Functions Additional Questions and Answers

I. Choose The Correct Answer

Question 1.
…………………… often use their argument values to compute a return value that becomes the value of the function invocation expression.
(a) function
(b) parameter
(c) non-parameter
(d) expression
Answer:
(a) function

Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Javascript Functions

Question 2.
…………………… method returns the element that has the ID attribute with the specified value.
(a) elements [o]
(b) getElementByid( )
(c) Nan ( )
(d) NaN (“A”)
Answer:
(b) getElementByid( )

II. Short Answers

Question 1.
What are the types of function?
Answer:
JavaScript supports two types functions. They are:

  1. Pre-defined or Library Functions
  2. User-defined Functions

Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Javascript Functions

Question 2.
Define NaN( )?
Answer:
The is NaN( ) function is used to check whether the given value or variable is valid number. This function returns true if the given value is not a number. For example is NaN(“12”), is NaN(“A”).

Question 3.
What are the different types of predefined functions?
Answer:
Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Java Script Function

III. Explain in Detail

Question 1.
Write a program to find the sum of 2 numbers?
Answer:
<html>
<head>
<title>Function Example</title>
<script type=“text/JavaScript”>
var input1=window.prompt(“Enter Value 1 “0”);
var input2=window.prompt(“Enter Value2 “0”);
var v1=parselnt(input1);
var v2=parselnt(input2);
var s=sum(v1,v2);
document.writeln(“<br><h4><u>Example for Function</u></h4>”);
document.writeln(“First No + v1 + “ <br>Second No + v2 + “<br> The Sum =” + s);
function sum(x, y)
{
var s=x+y;
return s;
}
</script>
</head>
<body>
</body>
</html>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Javascript Functions

Question 2.
Write a program to validate whether the entered value is a number or not?
Answer:
<html>
<head>
<title>Example Program to test isNan( ) Function</title>
</head>
<body>
<h4><u>Example Program to test isNan() Function</u></h4>
<script language=“JavaScript”>
function checknum( )
{
var n=document.form1.text1 .value;
if(isNaN (n)==true)
{
document.form1.text2.value=“Not a Number +n;
}
else
{
document, form 1 ,text2.value=“It is Number : ”+n;
}
}
</script>
<form name=“form1’’>
Enter a Number 1:
<input type=“text” name=“textl” size=3>
<br><br>
<input type= “button” value=“Click to Check” onClick=“checknum( )”>
<input type=“text” name=“text2” size=30>
<br>
</form>
</body>
</html>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 16 Javascript Functions

Question 3.
Write a program using functions to have an online quiz?
Answer:
<html>
<head>
<title>On-line Quiz</title>
<script type= “text/JavaScript”>
function checkAnswer( )
{
//var myQuiz=document.getElementById(“myQuiz”);
if (document.getElementById(“myQuiz”).elements[0],checked)
alert(“Congratulations, Your Answer is correct”);
else
alert(“Your Answer is incorrect, Please try Again”);
}
</script>
</head>
<body>
<form id=“myQuiz” aotion=“JavaScript:checkAnswer( )”>
<p> Which is not a Programming Language: <br>
<input type=“radio” name=“radiobutton” value=“Word” />
<label> MS-Word</label>
<input type=“radio” name=“radiobutton” value=“Cobol” />
<label> COBOL</label>
<input type=“radio” name=“radiobutton” value=“CPP” />
<label> C++</label>
<input type=“radio” name=“radiobutton” value=“VB” />
<label>Visual BASIC</label><br><br>
<input type=“submit” name-“submit” value=“Submit” />
<input type=“reset” name=“reset” value=“Reset” />
</p>
</form>
</body>
</html>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Students can Download Computer Applications Chapter 17 Computer Ethics and Cyber Security Questions and Answers, Notes Pdf, Samacheer Kalvi 11th Computer Applications Book Solutions Guide Pdf helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

Tamilnadu Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Samacheer Kalvi 11th Computer Applications Computer Ethics and Cyber Security Text Book Back Questions and Answers

I. Choose The Correct Answer

Question 1.
Which of the following deals with procedures, practices and values?
(a) Piracy
(b) Programs
(c) Virus
(d) Computer ethics
Answer:
(d) Computer ethics

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
Commercial programs made available to the public illegally are known as:
(a) freeware
(b) warez
(c) free software
(d) software
Answer:
(b) warez

Question 3.
Which one of the following are self-repeating and do not require a computer program to attach themselves?
(a) Cirases
(b) Worms
(c) Spyware
(d) Trojans
Answer:
(b) Worms

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 4.
Which one of the following tracks a user visits a website?
(a) Spyware
(b) Cookies
(c) Worms
(d) Trojans
Answer:
(b) Cookies

Question 5.
Which of the following is not a malicious program on computer systems?
(a) Worms
(b) Trojans
(c) Spyware
(d) Cookies
Answer:
(d) Cookies

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 6.
A computer network security that monitors and controls incoming and outgoing traffic is:
(a) Cookies
(b) Virus
(c) firewall
(d) Worms
Answer:
(c) firewall

Question 7.
The process of converting cipher text to plain text is called:
(a) encryption
(b) decryption
(c) key
(d) proxy server
Answer:
(b) decryption

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 8.
e-commerce means:
(a) electronic commerce
(b) electronic data exchange
(c) electric data exchange
(d) electronic commercialization
Answer:
(a) electronic commerce

Question 9.
Distributing unwanted e-mail to others is called:
(a) scam
(b) spam
(c) fraud
(d) spoofing
Answer:
(b) spam

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 10.
Legal recognition for transactions are carried out by:
(a) Electronic Data Interchange
(b) Electronic Data Exchange
(c) Electronic Data Transfer
(d) Electrical Data Interchange
Answer:
(a) Electronic Data Interchange

II. Answer To The Following Questions

Question 1.
What is harvesting?
Answer:
A person or program collects login and password information from a legitimate user to illegally gain access to other’s account(s).

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
What are Warez?
Answer:
Commercial programs that are made available to the public illegally are often called Warez.

Question 3.
Write a short note on cracking?
Answer:
Cracking is where someone edits a program source so that the code can be exploited or modified. A cracker (also called a black hat or dark side hacker) is a malicious or criminal hacker. “Cracking” meAnswer:trying to get into computer systems in order to steal, corrupt, or illegitimately view data.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 4.
Write two types of cyber attacks?
Answer:

               Cyber Attack                                                   Function
Virus A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common virus is Trojan.
Worms Worms are self- repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.
Spyware Spyware can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software. ‘
Ransomware Ransomware is a type of malicious program that demands payment after launching a cyber-attack on a computer system. This type of malware has become increasingly popular among criminals and costs the organizations millions each year.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 5.
What is a Cookie?
Answer:
A cookie is a small piece of data sent from a website and stored on the user’s computer memory (Hard drive) by the user’s web browser while the user is browsing internet.

III. Answer To The Following Questions

Question 1.
What is the role of firewalls?
Answer:
A firewall is a computer network security based system that monitors and controls incoming and outgoing network traffic based on predefined security rules. A firewall commonly establishes a block between a trusted internal computer network and entrusted computer outside, the network.

They are generally categorized as network- based or host-based. Network based firewalls are positioned on the gateway computers of LAN [Local area Network], WAN [Wide Area Network] and intranets.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
Write about encryption and decryption?
Answer:
Encryption and decryption are processes that ensure confidentiality that only authorized persons can access the information. Encryption is the process of translating the plain text data (plaintext) into random and mangled data (called cipher-text).

Decryption is the reverse process of converting the cipher-text back to plaintext. Encryption and decryption are done by cryptography. In cryptography a key is a piece of information (parameter) that determines the functional output of a cryptographic algorithm.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
Explain symmetric key encryption?
Answer:
Symmetric encryption is a technique to use the same key for both encryption and decryption. The main disadvantage of the symmetric key encryption is that all authorized persons involved, have to exchange the key used to Encrypt the data before they can decrypt it. If anybody intercepts the key information, they may read all message.

Question 4.
What are the guidelines to be followed by any computer user?
Answer:
Generally, the following guidelines should be observed by computer users:

  1. Honesty: Users should be truthful while using the internet.
  2. Confidentiality: Users should not share any important information with unauthorized people.
  3. Respect: Each user should respect the privacy of other users.
  4. Professionalism: Each user should maintain professional conduct.
  5. Obey The Law: Users should strictly obey the cyber law in computer usage.
  6. Responsibility: Each user should take ownership and responsibility for their actions.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 5.
What are ethical issues? Name some?
Answer:
An Ethical issue is a problem or issue that requires a person or organization to choose between alternatives that must be evaluated as ethical) or wrong (unethical). These issues must, be addressed and resolved to have a positive influence in society.
Some of the common ethical issues are listed below:

  1. Cyber crime
  2. Software Piracy
  3. Unauthorized Access
  4. Hacking
  5. Use of computers to commit fraud
  6. Sabotage in the form of viruses

IV. Answer To The Following Questions

Question 1.
What are the various crimes happening using computer?
Answer:

                               Crime                            Function
Crime Function Hacking, threats, and blackmailing towards a business or a person.
Cyber stalking Harassing through online
Malware Malicious programs that can perform a variety of functions including stealing, encrypting or deleting sensitive data, altering or hijacking core computing functions and monitoring user’s computer activity without their permission.
Harvesting A person or program collects login and password information from a legitimate user to illegally gain access to others’ account(s).
Identity theft It is a crime where the criminals impersonate individuals, usually for financial gain.
Intellectual property theft Stealing practical or conceptual information developed by another person or company.                                   _
Salami slicing Stealing tiny amounts of money from each transaction.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
What is piracy? Mention the types of piracy. How can it be prevented?
Answer:
Software Piracy is about the copyright violation of software created originally by an individual or an institution. It includes:

(i) Stealing of codes / programs and other information illegally and creating duplicate copies by unauthorized meAnswer:and utilizing this data either for one’s own benefit or for commercial profit.

(ii) Downloading software from illegal network sources.

  • An entirely different approach to software piracy is called shareware, acknowledges the futility of trying to stop people from copying software and instead relies on people’s honesty. Shareware publishers encourage users to give copies of programs to friends and colleagues but ask everyone who uses that program regularly to pay a registration fee to the program’s author directly.
  • To prevent unauthorized access, Firewalls, Intrusion Detection Systems (IDS), Virus and Cpntent Scanners, Patches and Hot fixes are used.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
Write the different types of cyber attacks?
Answer:

                       Cyber Attack                         Function
Virus A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common virus is Trojan.
Worms Worms are self- repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.
Spyware Spyware can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software.
Ransomware Ransomware is a type of malicious program that demands payment after launching a cyber-attack on a computer system. This type of malware has become increasingly popular among criminals and costs the organizations millions each year.

Samacheer Kalvi 11th Computer Applications Computer Ethics and Cyber Security Additional Questions and Answers

I. Choose The Correct Answer

Question 1.
A moral code that is evaluated as right is …………………..
(b) viruses
(c) cracking
(d) ethics
Answer:
(d) ethics

Question 2.
………………… is a crime where the criminals impersonate individuals for financial gain.
(a) intellectual property theft
(b) Identity theft
(c) Salami slicing
(d) Spoofing
Answer:
(b) Identity theft

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
Stealing data from a computer system without the knowledge or permission is called
(a) warez
(b) hacking
(c) cracking
(d) phishing
Answer:
(b) hacking

Question 4.
One of the most common virus is ……………………..
(a) Ransomware
(b) Spyware
(c) worms
(d) Trojan
Answer:
(d) Trojan

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 5.
…………………….. is the intermediary between the end users and a web browser.
(a) Firewall
(b) Proxy server
(c) Cookies
(d) Warez
Answer:
(b) Proxy serve

II. Short Answers

Question 1.
What is hacking?
Answer:
Hacking is intruding into a computer system to steal personal data without the owner’s permission or knowledge (like to steal a password). It is also gaining unauthorized access to a computer system, and altering its contents.

Question 2.
What is proxy server? Explain its working?
Answer:
A proxy server acts as an intermediary between the end users and a web server. A client connects to the proxy server, requesting some service, such as a file, connection, web page, or other resources available from a different server. The proxy server examines the request, checks authenticity and grants the request based on that. Proxy servers typically keep the frequently visited site addresses in its cache which leads to improved response time.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
Mention any 2 reasons as to why the websites use cookies?
Answer:

  1. To collect demographic information about who has visited the Web site.
  2. It helps to personalize the user’s experience on the Website.

Question 4.
What is meant by MITM?
Answer:
Man-in-the-middle attack (MITM; also Janus attack) is an attack where the attacker secretly relays and possibly alters the communication between two parties who believe they are directly communicating with each other.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 5.
Define software piracy?
Answer:
Software Piracy is about the copyright violation of software created originally by an individual or an institution. It includes stealing of codes / programs and other information illegally and creating duplicate copies by unauthorized means and utilizing this data either for one’s own benefit or for commercial profit.

III. Short Answers

Question 1.
What is cyber crime?
Answer:
A cyber-crime is a crime which involves computer and network. This is becoming a growing threat to society and is caused by criminals or irresponsible action of individuals who are exploiting the widespread use of Internet. It presents a major challenge to the ethical use of information technologies. Cyber-crime also poses threats to the integrity, safety and survival of most business systems.
Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security Q1

Question 2.
Write a short note on ethics?
Answer:
Ethics means “What is wrong and What is Right”. It is a set of moral principles that rule the behavior of individuals who use computers. An individual gains knowledge to follow the right behavior, using morals that are also known as ethics. Morals refer to the generally accepted standards of right and wrong in the society. Similarly, in cyber-world, there are certain standards such as

  1. Do not use pirated software
  2. Do not use unauthorized user accounts
  3. Do not steal others’ passwords
  4. Do not hack

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
Differentiate Spyware and Ransomware?
Answer:

                                      Spyware                          Ransomware
Spyware can be installed on the computer automatically when the attachments are open, by clicking on links or by downloading infected software. Ransomware is a type of malicious program that demands payment after launching a cyber-attack on a computer system. This type of malware has become increasingly popular among criminals and costs the ‘ organizations millions each year.

Question 4.
What are the types of encryption?
Answer:
There are two types of encryption schemes as listed below:

(i) Symmetric Key encryption:
Symmetric encryption is a technique to use the same key for both encryption and decryption.
Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security Q4

(ii) Public key encryption:
Public key encryption is also called Asymmetric function. It uses the concept of a key value pair, a different key is used for the encryption and decryption process.
Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security Q4.1

Question 5.
Write down the points to be noted to be safe from cyber crime?
Answer:
To protect the information the following points to be noted:

  1. Complex password setting can make your surfing secured.
  2. When the internet is not in use, disconnect it.
  3. Do NOT open spam mail or emails that have an unfamiliar sender.
  4. When using anti-virus software, keep it up-to-date.

IV. Explain in Detail

Question 1.
Explain public key encryption and asymetric encryption in digital certificate?
Answer:
1. Public key encryption is also called Asymmetric encryption. It uses the concept of a key value pair, a different key is used for the encryption and decryption process. One of the keys is typically known as the private key and the other is known as the public key.

2. The private key is kept secret by the owner and the public key is either shared amongst authorized recipients or made available to the public at large. The data encrypted with the recipient’s public key can only be decrypted with the corresponding private key.

3. A digital certificate in a client-server model of communication is one of the example of Asymmetric Encryption. A certificate is a package of information that identifies a user and a server. It contains information such as an organization’s name, the organization that issued the certificate, the users’ email address and country, and user’s public key.

4. When, a server and a client require a secure encrypted communication, they send a query over the network to the other party, which sends back a copy of the certificate. The other party’s public key can be extracted from the certificate. A certificate can also be used to uniquely identify the holder.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 2.
Write short notes on:

  1. Spam
  2. Fraud
  3. Cyber stalking
  4. Spoofing
  5. Virus
  6. Worms

Answer:

  1. Spam: Distribute unwanted e-mail to a large number of internet users.
  2. Fraud: Manipulating data, for example changing the banking records to transfer money to an unauthorized account.
  3. Cyber stalking: Harassing through online.
  4. Spoofing: It is a malicious practice in which communication is send from unknown source disguised as a source known to the receiver.
  5. Virus: A virus is a small piece of computer code that can repeat itself and spreads from one computer to another by attaching itself to another computer file. One of the most common virus is Trojan.
  6. Worms: Worms are self- repeating and do not require a computer program to attach themselves. Worms continually look for vulnerabilities and report back to the author of the worm when weaknesses are discovered.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security

Question 3.
Explain digital signature with a functional diagram?
Answer:
Digital signatures are based on asymmetric cryptography and can provide assurances of evidence to origin, identity and status of an electronic document, transaction or message, as well as acknowledging information given by the signer. To create a digital signature, signing software (email) creates a one-way hash of the electronic data to be signed. The user’s private key to encrypt the hash, returning a value that is unique to the hashed data.

The encrypted hash, along with other information such as the hashing algorithm, forms the digital signature. Any change in the data, even to a single bit, results in a different hash value. This attribute enables others to validate the integrity of the data by using the signer’s public key to decrypt the hash. If the decrypted hash matches a second computed hash of the same data, it proves that the data hasn’t changed since it was signed.

If the two hashes don’t match, the data has either been tampered with in some way (indicating a failure of integrity) or the signature was ,created with a private key that doesn’t correspond to the public key presented by the signer (indicating a failure of authentication).
Samacheer Kalvi 11th Computer Applications Solutions Chapter 17 Computer Ethics and Cyber Security Q3

Samacheer Kalvi 11th Computer Science Solutions Chapter 15 Polymorphism

Students can Download Computer Science Chapter 15 Polymorphism Questions and Answers, Notes Pdf, Samacheer Kalvi 11th Computer Science Book Solutions Guide Pdf helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 15 Polymorphism

Samacheer Kalvi 11th Computer Science Polymorphism Text Book Back Questions and Answers

PART – 1
I. Choose The Correct Answer

Question 1.
Which of the following refers to a function having more than one distinct meaning?
(a) Function Overloading
(b) Member overloading
(c) Operator overloading
(d) Operations overloading
Answer:
(a) Function Overloading

Question 2.
Which of the following reduces the number of comparisons in a program?
(a) Operator Overloading
(b) Operations overloading
(c) Function overloading
(d) Member overloading
Answer:
(c) Function overloading

Samacheer Kalvi 11th Computer Science Solutions Chapter 15 Polymorphism

Question 3.
void dispchar(char ch = ‘$\ int size=10)
{

for(int i = 1;i< = size;i ++)
cout << ch;

}
How will you invoke the function dispchar() for the following input?
To print $ for 10 times
(a) dispchar();
(b) dispchar(ch,size);
(c) dispchar($,10);
(d) dispchar(T, 10 times);
Answer:
(c) dispchar($,10);

Question 4.
Which of the following is not true with respect to function overloading?
(a) The overloaded functions must differ in their signature.
(b) The return type is also considered for overloading a function.
(c) The default arguments of overloaded functions are not considered for overloading.
(d) Destructor function cannot be overloaded.
Answer:
(d) Destructor function cannot be overloaded.

Question 5.
Which of the following is invalid prototype for function overloading
(a) void fun (intx);
void fun (char ch);
(b) void fun (intx);
void fun (inty);
(c) void fun (double d);
void fun (char ch);
(d) void fun (double d);
void fun (inty);
Answer:
(a) void fun (intx);
void fun (char ch);

Question 6.
Which of the following function(s) combination cannot be considered as overloaded function(s) in the given snippet?
void print(char A,int B); // F1
void printprint(int A, float B); // F2
void Print(int P=10); // F3
void printQ; // F4
(a) F1, F2, F3, F4
(b) F1, F2, F3
(c) F1, F2, F4
(d) F1, F3, F4
Answer:
(d) F1, F3, F4

Question 7.
Which of the following operator is by default overloaded by the compiler?
(a) *
(b) +
(c) + =
(d) = =
Based on the following program answer the questions (8) to (10)
#include
using namespace std;
class Point {
private:
int x, y; .
public:
Point(int x1,int y1)
{

x=x1;y=y1;

}
void operator+(Point & pt3);
void show() {cout << “x =” << x << “y =” << y; }
};
void Point: :operator + (Point & pt3)
{

x+=pt3.x;
y += pt3.y;

}
int main()
{

Point pt1(3, 2),pt2(5, 4);
pt1+pt2;
pt1.show();
return 0;
}

Answer:
(b) +

Samacheer Kalvi 11th Computer Science Solutions Chapter 12 Arrays and Structures

Question 8.
Which of the following operator is overloaded?
(a) +
(b) Operator
(c) : :
(d) =
Answer:
(a) +

Question 9.
Which of the following statement invoke operator overloading?
(a) pt1 + pt2;
(b) Point pt1(3, 2),pt2(5, 4);
(c) ptl.show();
(d) return 0;
Answer:
(d) return 0;

Question 10.
What is the output for the above program?
(a) x = 8, y = 6
(b) x = 14, y = 14
(c) x = 8, y = 6
(d) x = 5, y = 9
Answer:
(d) x = 5, y = 9

PART – 2
II. Answers to all the questions

Question 1.
What is function overloading?
Answer:
The ability of the function to process the message or data in more than one form is called as function overloading. In other words function overloading means two or more functions in the same scope share the same name but their parameters are different.

Samacheer Kalvi 11th Computer Science Solutions Chapter 12 Arrays and Structures

Question 2.
List the operators that cannot be overloaded.
Answer:
Operator that are not overloaded are follows:

  1. scope operator ::
  2. sizeof
  3. member selector.
  4. member pointer selector *
  5. ternary operator ?:

Question 3.
class add{int x; public: add(int)}; Write an outline definition for the constructor.
Answer:
add (int temp)
{

x = temp;

}

Question 4.
Does the return type of a function help in overloading a function?
Answer:
No. The return type of overloaded functions are not considered for overloading same data type.

Question 5.
What is the use of overloading a function?
Answer:
Function overloading is not only implementing polymorphism but also reduces the number of comparisons in a program and makes the program to execute faster. It also helps the programmer by reducing the number of function names to be remembered.

PART – 3
III. Answers to all the questions

Question 1.
What are the rules for function overloading?
Answer:
Rules for function overloading:

  1. The overloaded function must differ in the number of its arguments or data types.
  2. The return type of overloaded functions are not considered for overloading same data type.
  3. The default arguments of overloaded functions are not considered as part of the parameter list in function overloading.

Question 2.
How does a compiler decide as to which function should be invoked when there are many functions? Give an example.
Answer:
When you call an overloaded function (when there are many functions with same name), the compiler determines the most appropriate definition to use by comparing the argument types used to call the function with the parameter types specified in the definitions. The process of selecting the most appropriate overloaded function or operator is called overload resolution.
Example:
#include using namespace std; void print (int i)
{

cout<< “It is integer” <<i<< endl;

}

void print (string c)

{

cout<< “It is string”<< c << endl;

}
int main ()
{

print (10);
print (“Good”);
return 0;

}
Output:
It is integer 10
It is string Good

Samacheer Kalvi 11th Computer Science Solutions Chapter 12 Arrays and Structures

Question 3.
What is operator overloading? Give some example of operators which can be overloaded.
Answer:
The term operator overloading, refers to giving additional functionality to the normal C++ operators like It is also a type of polymorphism in which an operator is overloaded to give user defined meaning to it.

For example ‘+’ operator can be overloaded to perform addition on various data types, like for Integer, String (concatenation) etc.

Question 4.
Discuss the benefit of constructor overloading?
Answer:
Function overloading can be applied for constructors, as constructors are special functions of classes. A class can have more than one constructor with different signature. Constructor overloading provides flexibility of creating multiple type of objects for a class.

  1. Memory is allocated for the objects.
  2. Initialisation for the objects.

Question 5.
class sale ( int cost, discount ;public: sale(sale &); Write a non inline definition for constructor specified;
Answer:
class sale
{

int cost, discount;
public:
sale (sale&);

};
// non inline constructor
sale: : sale(sale&s)
{

cost = s.cost;
discount = s.discount;

}

PART – 4
IV. Answers to all the questions

Question 1.
What are the rules for operator overloading?
Answer:
Following are some rules to be followed while implementing operator overloading.

  1. Precedence and Associativity of an operator cannot be changed.
  2. No new operators can be created, only existing operators can be overloaded.
  3. Cannot redefine the meaning of an operator’s procedure. You cannot change how integers are added. Only additional functions can be to an operator.
  4. Overloaded operators cannot have default arguments.
  5. When binary operators are overloaded, the left hand object must be an object of the relevant class.

Samacheer Kalvi 11th Computer Science Solutions Chapter 12 Arrays and Structures

Question 2.
Answer the question (i) to (v) after going through the following class.
classBook
{
intBookCode ; char Bookname[20];float fees;
public:
Book() //Function 1
{
fees = 1000;
BookCode = 1;
strcpy (Bookname, “C++”);
}
void display(float C) //Function 2
{
cout << BookCode << “:”<< Bookname << “:”<< fees << endl;
~ Book() //Function 3
{
cout << “End of Book Object”<< endl;
}

Book (intSC, char S[ ], float F); //Function 4

};
1. In the above program, what are Function 1 and Function 4 combined together referred as?
2. Which concept is illustrated by Function3? When is this function called/ invoked?
3. What is the use of Function3?
4. Write the statements in main to invoke functionl and function2
5. Write the definition for Function4.
Answer:

  1. Constructor overloading (function 1 and function 4 are constructors with different signatures in the class book)
  2. Function 3 is destructor of the class. Function 3 is executed when the object of the class book goes out of scope.
  3. Function 3 is destructor of the class.
    • Destructor (function3) will free resources if any that the object may have acquired during its lifetime
    • Destructor function removes the memory of an object which was allocated by the constructor at the time of creating an object. Thus frees the unused memory.
  4. book b;
    b.display (4.5);
  5. Book: :Book (int sc.char.s[], float, F) // Function 4
    {
    Book Code = SC
    strcpy (Book name, S);
    fees = F;
    }

Question 3.
Write the output of the following program.
Answer:
include
using namespace std;
class Seminar
{
int Time;
public:
Seminar()
{

Time = 30; cout << “Seminar starts now” << endl;

}
void Lecture()
{
cout << “Lectures in the seminar on”<< endl;
}
Seminar(int Duration)
{

Time=Duration;cout<< “Welcome to Seminar”<<endl;

}
Seminar(Seminar &D)
{

Time=D.Time;cout<< “Recap of Previous Seminar Content”<<endl;

}
~Seminar()
{
cout<< “Vote of thanks”<<endl;
}
};
int main()
{

Seminar s1, s2(2), s3(s2);
s1.Lecture();
return 0;

}
Output:
Seminar starts now
Welcome to seminar
Recap of previous seminar content
Lectures in the seminar on
Vote of thanks
Vote of thanks
Vote of thanks

Question 4.
Debug the following program.
Answer:
Samacheer Kalvi 11th Computer Science Solutions Chapter 15 Polymorphism 1
Corrected Program
Samacheer Kalvi 11th Computer Science Solutions Chapter 15 Polymorphism 2
Output
Enter string: God
Enter string: Bless
First string is: God
Second string is: Bless
Concatenated string is: God Bless

Question 5.
Answer the questions based on the following program
#include
#include
using namespace std;
class comp
{
public:
char[10];
void getstring(char str[10])
{
strcpy(s,str);
}
void operator = = (comp);
};
void comp::operator = = (comp ob)
{
if(strcmp(s,ob.s) = = 0)
cout << “\nStrings are Equal”;
else
cout<< “\nStrings are not Equal”;
}
int main()
{
comp ob, ob1;
char stringl[10], string2[10];
cout << “Enter First String:”; cin >> string1;
ob.getstring(string1);
cout<< “\n Enter Second String:”; cin >> string2;
ob1.getstring(string2);
ob = = obi;
return 0;
}
(i) Mention the objects which will have the scope till the end of the program.
(ii) Name the object which gets destroyed in between the program.
(iii) Name the operator which is over loaded and write the statement that invokes it.
(iv) Write out the prototype of the overloaded member function.
(v) What types of operands are used for the overloaded operator?
(vi) Which constructor will get executed? Write the output of the program.
Answer:
(i) Objects: ob and obi of main ()
(ii) object ob of void operator = = (comp ob);
(iii) Overloaded operator: = =
Statement that invokes: ob = = ob1;
(v) void operator = = (comp ob):
(v) Operands used are the objects of the class comp
(vi) The default constructor generated by the compiler will be executed.[comp();]

Output 1
Enter first string: hello Enter second string: hello String are equal

Output 2
Enter first string: hello Enter second string: fine String are not equal.

Samacheer kalvi 11th Computer Science Arrays and Structures Additional Questions and Answers

PART – 1
I. Choose the correct answer

Question 1.
The number and types of a function’s parameters are called the …………………
(a) overload resolution
(b) function’s signature
(c) function overloading
(d) operator overloading
Answer:
(b) function’s signature

Question 2.
The process of selecting the most appropriate overloaded function or operator is called …………………
(a) overload resolution
(b) prototype
(c) polymorphism
(d) operator overload
Answer:
(a) overload resolution

Question 3.
The return type of overloaded functions are not considered for overloading same …………………
(a) polymorphism
(b) prototype
(c) data type
(d) overloading
Answer:
(c) data type

Samacheer Kalvi 11th Computer Science Solutions Chapter 12 Arrays and Structures

Question 4.
………………… cannot have default arguments.
(a) Operator overloading
(b) Overloaded operators
(c) Function overloading
(d) prototype
Answer:
(b) Overloaded operators

Question 5.
The mechanism of giving special meaning to an operator is known as …………………
(a) operator overloading
(b) parameter
(c) function overloading
(d) polymorphism
Answer:
(a) operator overloading

Question 6.
Operator overloading provides new definitions for most of the ………………… operators.
(a) *
(b) + = =
(c) +
(d) C++
Answer:
(d) C++

Question 7.
The overloaded operator is given using the keyword ………………… followed by an operator symbol.
(a) operator
(b) data type
(c) object
(d) function
Answer:
(a) operator

PART – 2
II. Very Short Answers

Question 1.
Give the syntax for operator overloading.
Answer:
RetumType classname :: Operator Operator Symbol (argument list)
{

\\ Function body

}
Example: Deposit Deposit: : operator + (Deposit dl);

Samacheer Kalvi 11th Computer Science Solutions Chapter 12 Arrays and Structures

Question 2.
Write a program for function overloading.
C++ Program to demonstrate function overloading
Answer:
#include
using namespace std;
void print(int i)
{cout << “It is integer” << i <<endl;}
void print(double f)
{ cout << “It is float” << f <<endl;}
void print(string c)
{ cout << “It is string” << c <<endl;}
int main() {

print(10);
print(10.10);
print(“Ten”);
return 0;

}
Output:
It is integer 10
It is float 10.1
It is string Ten

PART – 3
III. Short Answers

Question 1.
What is function signature?
Answer:
The ability of the function to process the message or data in more than one form is called as function overloading. It implies that two or more functions in the same scope share the same name but their parameters are different. In this situation, the functions that share the same name are said to be overloaded and the process is called function overloading. The number and types of a function’s parameters are called the function’s signature.

Samacheer Kalvi 11th Computer Science Solutions Chapter 12 Arrays and Structures

Question 2.
Explain overload resolution.
Answer:
When you call an overloaded function, the compiler determines the most appropriate definition . to use, by comparing the argument types you have used to callthe function with the parameter types specified in the definitions. The process of selecting the most appropriate overloaded function or operator is called overload resolution.

PART – 4
IV. Explain in Detail

Question 1.
Give the output of the following program.
Answer:
Samacheer Kalvi 11th Computer Science Solutions Chapter 15 Polymorphism 3
Output:
value of x is 7
value of x is 9.132
value of x and y is 85,64

Question 2.
Write the coding for the following output using constructor overloading.
Output:
Constructor without parameters..
Parameterized constructor…
Copy Constructor…
Enter data… 20 30
Object a:
The numbers are..20 30
The sum of the numbers are.. 50
Object b :
The numbers are..10 20
The sum of the numbers are.. 30
Object c..
The numbers are..10 20
The sum of the numbers are.. 30
Answer:
#include
using namespace std;
class add
{
int num1, num2, sum;
public:
add()
{
cout << “\n Constructor without parameters…”;
num1 = 0;
num2 = 0;
sum = 0;
}
add (int s1, int s2 )
{
cout << “\n Parameterized constructor…”;
num1= s1;
num2=s2;
sum=0;
}
add (add &a)
{
cout << “\n Copy Constructor…”; ‘
num1 = a.num1;
num2 = a.num2;
sum = 0;
}
void getdata()
{
cout << “\n Enter data …”; cin>>num 1 >> num2;
}
void addition()
{
sum=num 1 + num2;
}
void putdata()
{
cout << “\n The numbers are..”;
cout < cout << “\n The sum of the numbers are..” << sum; }
};
int main()
{
add a, b (10, 20), c(b);
a. getdata();
a. addition();
b. addition();
c. addition();
cout << “\n Object a : “;
a. putdata();
cout << “\n Object b : “;
b. putdata();
cout << “\n Object c..”;
c. putdata();
return 0;
}

Question 3.
Write a program to find the area of a rectangle using constructor overloading in a class.
Answer:
Samacheer Kalvi 11th Computer Science Solutions Chapter 15 Polymorphism 4Output:
Enter the value of length and breadth 10 20
Non parameterized constructor
area of Rectangle is 60
Parameterized constructor with one argument
area of Rectangle 8
Parameterized constructor with two argument
area of Rectangle 10
copy constructor
area of Rectangle 10

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Students can Download Computer Applications Chapter 15 Control Structure in JavaScript Questions and Answers, Notes Pdf, Samacheer Kalvi 11th Computer Applications Book Solutions Guide Pdf helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

Tamilnadu Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Samacheer Kalvi 11th Computer Applications Control Structure in JavaScript Text Book Back Questions and Answers

I. Choose The Correct Answer

Question 1.
Which conditional statement is used to transfer control from current statement to another statement? (LOT)
(a) Branching
(b) Sequencing
(c) Looping
(d) Iterating
Answer:
(a) Branching

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 2.
……………………. statement can be used as alterative to multiple if-else statement (LOT)
(a) while
(b) if
(c) else-if
(d) switch
Answer:
(d) switch

Question 3.
Which statement in switch case is used to exit the statement once the appropriate choice is found? (MOT)
(a) exit
(b) default
(c) case
(d) break
Answer:
(d) break

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 4.
Which of the following is not a looping statement? (LOT)
(a) switch
(b) while
(c) do-while
(d) for
Answer:
(a) switch

Question 5.
Which part of the loop statement determines the number of times, the loop will be iterated? (MOT)
(a) First
(b) Second
(c) Third
(d) Final
Answer:
(b) Second

Question 6.
Which of the following is not a branching statement? (LOT)
(a) Loop
(b) If-else
(c) Switch
(d) For
Answer:
(d) For

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 7.
What will be the output for the following snippet? (HOT)
For (var n=0; n<10; n+1)
{
if (n==3)
{
break;
}
document write (n+ “<br>”);
}
(a) 0 1 2
(b) 0 1 2 3 4
(c) 0 1 2 3 4
(d) 0, 1, 3
Answer:
(a) 0 1 2

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 8.
In which loop the condition is evaluated, before executing a statement? (MOT)
(a) while
(b) do while
(c) break
(d) continue
Answer:
(a) while

Question 9.
The …………………… statement is especially useful when testing all the possible results of an expression? (LOT)
(a) while
(b) do while
(c) switch
(d) if
Answer:
(a) while

Question 10.
In the ……………………. loop, body of the loop always executed at least once before the condition is checked? (LOT)
(a) for
(b) while
(c) if
(d) do while
Answer:
(d) do while

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 11.
<script type = “text /javascript”>
x = 6 + “3”;
document Write (x);
<script> what will be the output?
(a) 6
(b) 9
(c) 63
(d) Error
Answer:
(c) 63

II. Answer To The Following Questions

Question 1.
What are the different types of control statement used in JavaScript?
Answer:
There are two types of controls,

  1. Branching / Selection
  2. Looping / repetitive

Question 2.
What is meant by conditional statements in JavaScript?
Answer:
Conditional statements execute or skip one or set of statements depending on the value of a specified conditional expression.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 3.
List out the various branching statements in JavaScript?
Answer:
There are different branching statements. They are,

  1. if statement
  2. if… else statement
  3. else if statement
  4. switch statement

Question 4.
Write the general syntax for switch statement?
Answer:
switch(expression)
{
case label 1:
statements 1;
break;
case label2:
statements 2;
break;
case labeln;
statements – N;
break;
default:
statements;
}

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 5.
Differentiate the break and continue statement?
Answer:
Break Statement:

  1. The break statement will terminate the loop early.
  2. The break statement is executed and the loop is terminated.

Continue Statement:

  1. The continue statement will skip back to the loop condition check.
  2. When the continue statement is executed, the current is iteration of the enclosing loop is terminated.

III. Answer To The Following Questions

Question 1.
What is ‘if’ statement and write its types?
Answer:
The if statement is the fundamental control statement that allows Java Script to make decisions to execute statements conditionally. This statement has two forms:

  1. if form
  2. if else form

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 2.
Write the syntax for else-if statement?
Answer:
if(n== 10)
{
// Execute code block #1
}
else if (n == 20)
{
// Execute code block #2
}
else if (n == 30)
{
// Execute code block #3
else
{
// If all else fails,
execute block #4
}

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 3.
What is a loop and what are its types?
Answer:
In Java Script there are times when the same portion of code needs to be executed many times with slightly different values is called Loops. JavaScript supports three kinds of looping statements. They are:

  1. for loop
  2. while loop
  3. do.. while loop

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 4.
Differentiate between while and do while statements.
Answer:
While:

  1. In Java Script while loop is most basic loop.
  2. First condition will be evaluated and then only based on the result of the condition the body of the loop will be executed or not.
  3. While loop is false not a single statement inside the loop is executed.

Do…while:

  1. The do…..while loop is like a while loop.
  2. The Body of the loop always executed at least once before the condition can be executed.
  3. Do while loop is false then also the body of the loop is executed.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 5.
What message will be displayed, if the input for age is given as 20, for the following snippet?
Answer:
if (age> = 18)
{
alert (“you are eligible to get Driving licence”)
}
else
{
alert (“you are not eligible to get driving licence”);
}
you are eligible to get driving license.

IV. Answer To The Following Questions.

Question 1.
Explain for loop with example?
Answer:
The for loop is a very rigid structure that loops for a pre-set number of times. In JavaScript for structure is very flexible, which makes this type is very useful. The syntax of the for loop . looks like the following: for(initialization; condition; increment/decrement)
{
Body of the loop;
}
The for structure within parenthesis there are three parts each separated by semicolon. They are,

  1. The first part of the loop initialize a variable which is also called as control variable. In most case the control variable is declared as well as initialized.
  2. The second part is the conditional statement that determines how many times the loop will be iterated.
  3. The third and final part determines how the value of control variable is changed . (Incremented/Decremented).

Using for loop
<Html>
<Head>
<Title> Program – To test for statement in JavaScript </Title>
</Head>
<Body>
<script language = “javascript” type = “text/javascript”>
var no1 = prompt(“Please enter Table You want“0”);
document.write(“<h2> Multiplication for your need </h2>”);
for( var no2=0 ;no2<= 10 ;no2++)
{
document.write(no1+ “x” + no2+ “=”+nol*no2+“<br>”);
}
</script>
</Body>
</Html>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 2.
Explain switch case statement with example?
Answer:
Java Scripts offers the switch statement as an alternate to using if…else structure. The switch statement is especially useful when testing all the possible results of an expression. The syntax of a switch structure as the following: switch(expression)
{
case label1:
statements 1;
break;
case label2:
statements2;
break;
case labeln;
statements – N;
break;
default:
statements;
}

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 3.
Write the output for the following program?
Answer:
<Html>
<Head>
<Title> for statement </title>
<Head>
<Body>
<script language= “java Script” type = “text / javaScript”) var nol= prompt (“please enter table you want:”, “0” ); document write (“<h2> multiplication table </h2>”) for (Var no2= 0; no2<=10; no2++)
{
document write (nol+ “x” + no2+ “=” + nol+no2+ “<br>”);
}
</script>
</body>
</Html>
Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript img 1&2
Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript img 3

Question 4.
Write a Java Script program using while statement to display 10 numbers?
Answer:
<Html>
<Head>
<Title> Display 10 Numbers in Javascript</Title>
</Head>
<Body>
<script language = “java script” type = “text / java script”>
document.write (“<h2> using while statement </h2>”)
Var no2= 0;
while (no2<=10)
{
document.write (no2+ “ ”);
no2=no2+1;
}
</script>
</body>
</Html>

Samacheer Kalvi 11th Computer Applications Control Structure in JavaScript Additional Questions and Answers

I. Choose The Correct Answer

Question 1.
The simple if construction, no special processing is performed when the condition evaluates to false?
(a) if else
(b) switch
(c) nested if
(d) if
Answer:
(a) if else

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 2.
The statement begins by evaluating an expression placed between parenthesis, much like the if statement?
(a) break
(b) default
(c) continue
(d) switch
Answer:
(d) switch

Question 3.
……………………… is can be at the end of a switch structure if the result of the expression that do not match any of the case labels?
(a) break statement
(b) switch structure
(c) continue statement
(d) default structure
Answer:
(d) default structure

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 4.
The loop initialize a variable which is also called as control variable ………………………..
(a) Third
(b) First
(c) Second
(d) All the above
Answer:
(b) First

Question 5.
……………………… statement is executed, the current iteration of the enclosig loop is terminated and the next iteration begins?
(a) switch
(b) break
(c) continue
(d) if
Answer:
(c) continue

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 6.
The purpose of a ………………………. is to execute a statement/block of’statement repeatedly as long as an expression is true?
(a) for loop
(b) do while loop
(c) while loop
(d) all the above
Answer:
(c) while loop

II. Short Answers

Question 1.
What is branching statements?
Answer:
Java Script supports branching statements which are used to perform different actions based on different conditions. Branching is a transfer of control from the current statement to another statement or construct in the program unit. A branch alters the execution sequence.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 2.
Write the syntax of the if else statement?
Answer:
if (expression)
{
statements if true
} else
{
statements if false
}

Question 3.
Write a short note on continue statement?
Answer:
The continue statement will skip back to the loop condition check. When the continue statement is executed, the current iteration of the enclosing loop is terminated, and the next iteration begins.

III. Explain in Brief

Question 1.
What is while loop?
Answer:
In Java Script while loop is another most basic loop. The purpose of a while loop is to execute a statement /block of statement repeatedly as long as an expression is true.
The while statement creates a loop that executes a specified statement as long as the test condition evaluates to true. The condition is evaluated before executing the statement.
The syntax is:
while (condition)
{
body of the loop
}

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 2.
Write the example of break statement?
Answer:
The break statement will terminate the loop early. For example, for (var n = 0; n < = 10; n++)
{
if (n == 5)
{
break;
}
document. write(n+”<br>”);
}

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 3.
What are the parts of for loops?
Answer:

  1. The first part of the loop initialize a variable which is also called as control variable. In most case the control variable is declared as well as initialized.
  2. The second part is the conditional statement that determines how many times the loop will be iterated.
  3. The third and final part determines how the value of control variable is changed (Incremented/Decremented).

IV. Explain in Detail

Question 1.
Explain if statement with suitable example?
Answer:
The if statement is the fundamental control statement that allows JavaScript to make decisions to execute statements conditionally. This statement has two forms. The form is for only true condition. The syntax is
if (condition)
{
True block;
}
In the if form, condition contains relational/logical expression is evaluated. If the resulting value is true the true block is executed. True block may contain one or more than one statement. For example.
Demo to Test if command
<Html>
<Head>
<Title>Demo Program – To test if command in JavaScript
</Title>
</Head>
<Body>
<script language = “javascript” type = “text/javascript”>
var age = prompt(“Please enter your Age “0”);
if (age >=16)
{
alert(“You Are Eligible to Vote ….”);
}
</script>
</Body>
</Html>
The output will be
Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript img 4

Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript

Question 2.
Write the output for the following program?
Answer:
Using break statement
<Html>
<Head>
<Title>Demo Program – To test Break command in JavaScript </Title>
</Head>
<Body>
<script language = “javascript” type = “text/javascript”>
document.write(“<h2> Using Break Statement </h2>”);
for( var no2=0;no2<=l 0;no2++)
{
if(no2==5)
{break;}
document.write(no2 + “ ”);
}
</script>
</Body>
</Html>
Samacheer Kalvi 11th Computer Applications Solutions Chapter 15 Control Structure in JavaScript img 5

Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance

Students can Download Computer Science Chapter 16 Inheritance Questions and Answers, Notes Pdf, Samacheer Kalvi 11th Computer Science Book Solutions Guide Pdf helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

Tamilnadu Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance

Samacheer Kalvi 11th Computer Science Inheritance Text Book Back Questions and Answers

PART – 1
I. Choose The Correct Answer

Question 1.
Which of the following is the process of creating new classes from an existing class?
(a) Polymorphism
(b) Inheritance
(c) Encapsulation
(d) super class
Answer:
(b) Inheritance

Question 2.
Which of the following derives a class student from the base class Shool?
(a) school: student
(b) class student: public School
(c) student: public school
(d) class school : public student
Answer:
(b) class student: public – School

Question 3.
The type of inheritance that reflects the transitive nature is ………………
(a) Single Inheritance
(b) Multiple Inheritance
(c) Multilevel Inheritance
(d) Hybrid Inheritance
Answer:
(c) Multilevel Inheritance

Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance

Question 4.
Which visibility mode should be used when you want the features of the base class to be available to the derived class but not to the classes that are derived from the derived class?
(a) Private
(b) Public
(c) Protected
(d) All of these
Answer:
(a) Private

Question 5.
Inheritance is process of creating new class from ………………
(a) Base class
(b) abstract
(c) derived class
(d) Function
Answer:
(a) Base class

Question 6.
A class is derived from a class which is a derived class itself, then this is referred to as ……………….
(a) multiple inheritance
(b) multilevel inheritance
(c) single inheritance
(d) double inheritance
Answer:
(b) multilevel inheritance

Question 7.
Which amongst the following is executed in the order of inheritance?
(a) Destructor
(b) Member function
(c) Constructor
(d) Object
Answer:
(c) Constructor

Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance

Question 8.
Which of the following is true with respect to inheritance?
(a) Private members of base class are inherited to the derived class with private
(b) Private members of base class are not inherited to the derived class with private accessibility
(c) Public members of base class are inherited but not visible to the derived class
(d) Protected members of base class are inherited but not visible to the outside class
Answer:
(b) Private members of base class are not inherited to the derived class with private accessibility

Question 9.
Based on the following class declaration answer the questions (from 9.1 to 9.4)
class vehicle
{ int wheels;
public:
void input_data(float,float);
void output_data();
protected:
int passenger;
};
class heavyvehicle : protected vehicle {
int diesel_petrol;
protected:
int load;
protected:
int load;
public:
voidread_data(float,float)
voidwrite_data(); };
class bus: private heavy vehicle {
charTicket[20];
public:
voidfetch_data(char); voiddisplay_data(); };
};

Question 9.1.
Which is the base class of the class heavy_vehicle?
(a) Bus
(b) heavy_vehicle
(c) vehicle
(d) both (a) and (c)
Answer:
(c) vehicle

Question 9.2.
The data member that can be accessed from the function displaydata()
(a) passenger
(b) load
(c) Ticket
(d) All of these
Answer:
(d) All of these

Question 9.3.
The member function that can be accessed by an objects of bus Class is
(a) input_data()
(b) read_data(), output_data()write_data()
(c) fetch_data()
(d) All of these display_data()
Answer:
(d) All of these display_data()

Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance

Question 9.4.
The member function that is inherited as public by Class Bus
(a) input_data()
(b) read_data(), output_data()write_data()
(c) fetch_data()
(d) All of these display_data()
Answer:
(d) All of these display_data()

Question 10.
class x
{int a;
public :
x()
{}
};
class y
{ x x1;
public :
y()
{}
};
class z : public y, x
{ intb;
public:
z(){}
} z1;
What is the order of constructor for object z1 to be invoked?
(a) z, y, x, x
(b) x, y, z, x
(c) y, x, x, z
(d) x, y, z
Answer:
(c) y, x, x, z

PART – 2
II. Answers to all the questions

Question 1.
What is inheritance?
Answer:
Inheritance is one of the most important features of Object Oriented Programming. In object – oriented programming, inheritance enables new class and its objects to take on the properties of the existing classes.

Question 2.
What is a base class?
Answer:
A class that is used as the basis for inheritance is called a superclass or base class.

Question 3.
Why derived class is called power packed class?
Answer:
Multilevel Inheritance:
In multilevel inheritance, the constructors will be executed in the order of inheritance.

Multiple Inheritance:
If there are multiple base classes, then it starts executing from the left most base class.

Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance

Question 4.
In what multilevel and multiple inheritance differ though both contains many base class?
Answer:
The derived class is a power packed class, as it can add additional attributes and methods and thus enhance its functionality.

Question 5.
What is the difference between public and private visibility mode?
Answer:
Private visibility mode:
When a base class is inherited with private visibility mode the public and protected members of the base class become ‘private’ members of the derived class.

Public visibility mode:
When a base class is inherited with public visibility mode, the protected members of the base class will be inherited as protected members of the derived class and the public members of the base class will be inherited as public members of the derived class.

PART – 3
III. Answers to all the questions

Question 1.
What are the points to be noted while deriving a new class?
Answer:
The following points should be observed for defining the derived class:

  1. The keyword class has to be used.
  2. The name of the derived class is to be given after the keyword class.
  3. A single colon.
  4. The type of derivation (the visibility mode), namely private, public or protected. If no visibility mode is specified, then by default the visibility mode is considered as private.
  5. The names of all base classes (parent classes) separated by comma.

Question 2.
What is difference between the members present in the private visibility mode and the members present in the public visibility mode.
Answer:
Members present in the private visibility mode:

  • Can be accessed only by the class members.
  • By default the members will be in private visibility mode.
  • When classes are inherited, private members are not inherited.

Members present in the public visibility mode:

  • Can be accessed by the outside members also.
  • Members, to be in public visibility mode has to be specified explicitly.
  • When classes are inherited, the public members are inherited as private, protected and public members of the derived class.

Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance

Question 3.
What is the difference between polymorphism and inheritance though both are used for reusability of code?
Answer:
Polymorphism:

  • Reusability of code is implemented through functions (or) methods.
  • Polymorphism is the ability of a function to respond differently to different message.
  • Polymorphism is achieved through overloading.

Inheritance:

  • Reusability of code is implemented through classes.
  • Inheritance is the process of creating derived classes from the base class or classes.
  • Inheritance is achieved by various types of inheritances namely single, multiple, multilevel, hybrid and hierarchical inheritances.

Question 4.
What do you mean by overriding?
Answer:
When a derived class member function has the same name as that of its base class member function, the derived class member function shadows/hides the base class’s inherited function. This situation is called function overriding.

Question 5.
Write some facts about the execution of constructors and destructors in inheritance. Some Facts About the execution of constructor in inheritance
Answer:

  1. Base class constructors are executed first, before the derived class constructors execution.
  2. Derived class cannot inherit the base class constructor but it can call the base class constructor by using Base_class name: :base_class_constructor() in derived class definition
  3. If there are multiple base classes, then its start executing from the left most base class
  4. In multilevel inheritance, the constructors will be executed in the order of inheritance The destructors are executed in the reverse order of inheritance.

PART – 4
IV. Answers to all the questions

Question 1.
Explain the different types of inheritance.
Answer:
Types of Inheritance:
There are different types of inheritance viz., Single inheritance, Multiple inheritance, Multilevel inheritance, hybrid inheritance and hierarchical inheritance.

  1. Single Inheritance : When a derived class inherits only from one base class, it is known as single inheritance.
  2. Multiple Inheritance : When a derived class inherits from multiple base classes it is known as multiple inheritance.
  3. Hierarchical inheritance : When more than one derived classes are created from a single base class, it is known as Hierarchical inheritance.
  4. Multilevel Inheritance : The transitive nature of inheritance is itself reflected by this form of inheritance. When a class is derived from a class which is a derived class then it is referred to as multilevel inheritance.
  5. Hybrid inheritance : When there is a combination of more than one type of inheritance, it is known as hybrid inheritance.
  6. Hence, it may be a combination of Multilevel and Multiple inheritance or Hierarchical and Multilevel inheritance or Hierarchical, Multilevel and Multiple inheritance.

Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance

Question 2.
Explain the different visibility mode through pictorial representation.
Answer:
An important feature of Inheritance is to know which member of the base class will be acquired by the derived class. This is done by using visibility modes. The accessibility of base class by the derived class is controlled by visibility modes. The three visibility modes are private, protected and public.

The default visibility mode is private. Though visibility modes and access specifiers look similar, the main difference between them is Access specifiers control the accessibility of the members within the class where as visibility modes control the access of inherited members within the class.

Private visibility mode:
When a base class is inherited with private visibility mode the public and protected members of the base class become ‘private’ members of the derived class
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 1
Protected visibility mode:
When a base class is inherited with protected visibility mode the protected and public members of the base class become ‘protected members ‘ of the derived class.
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 2
When a base class is inherited with public visibility mode, the protected members of the base class will be inherited as protected members of the derived class and the public members of the base class will be inherited as public members of the derived class.
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 3

Question 3.
#include
#include
#include
using name spacestd;
class publisher
{
char pname[15];
char hoffice[15];
char address[25];
double turnover;
protected:
char phone[3][10];
void register();
public:
publisher();
∼ publisher);
void enter data();
void disp data();
};
class branch
{
charbcity[15];
char baddress[25];
protected:
intnoofemp;
public:
charbphone[2][10];
branch();
∼ branch();
void have data();
void give data();
};
class author: public branch, publisher
{
intaut_code;
charaname[20];
float income;
public:
author();
~author();
voidgetdata();
voidputdata();
};

Answer the following questions based on the above given program:
Question 3.1.
Which type of Inheritance is shown in the program?
Answer:
Multiple inheritance.

Question 3.2.
Specify the visibility mode of base classes.
Answer:
Private for publisher.
Public for branch.

Question 3.3.
Give the sequence of Constructor/Destructor Invocation when object of class author is created.
Answer:
branch(); // constructor of branch class
publisher (); // constructor of publisher class
author (); // constructor of author class
∼author (); // destructor of author class
∼publisher (); // destructor of publisher class
∼branch (); // destructor of branch class

Question 3.4.
Name the base class(/es) and derived class (/es).
Answer:
Base class(/es): branch and publisher
Derived class (/es): author.

Question 3.5.
Give number of bytes to be occupied by the object of the following class:
(a) publisher
(b) branch
(c) author
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 4

Question 3.6.
Write the names of data members accessible from the object of class author.
Answer:
The data members that can be accessed is bphone[2][10].

Question 3.7.
Write the names of all member functions accessible from the object of class author.
Answer:
Member functions that can be accessed are:
1. public member functions of branch have_data();
give_data();

2. public member functions of author:
getdata();
putdata();

Question 3.8.
Write the names of all members accessible from member functions of class author.
Answer:
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 5

Question 4.
Consider the following C++ code and answer the questions
Answer:
class Personal
{
int Class,Rno;
char Section;
protected:
char Name[20];
public:
personal();
void pentry();
voidPdisplay();
};
class Marks:private Personal
{
float M{5};
protected:
char Grade[5];
public:
Marks();
void M entry();
void M display 0;
};
class Result:public Marks
{
float Total, Agg;
public:
char FinalGrade, Commence[20];
Result();
void R calculate();
void R display();
}:

Question 4.1.
Which type of Inheritance is shown in the program?
Answer:
Multilevel inheritance.

Question 4.2.
Specify the visibility mode of base classes.
Answer:
Private for personal public for marks.

Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance

Question 4.3.
Give the sequence of Constructor/Destructor Invocation when object of class Result is created.
Answer:
Personal (); // constructor of class personal
Marks (); // constructor of class marks
Result (); // destructor of class Result
Marks (); // destructor of class marks
Personal (); // destructor of class personal

Question 4.4.
Name the base class(/es) and derived class (/es).
Answer:
Base class of marks: → Personal
Base class of Result: → Marks
Derived classes: → Marks and Results

Question 4.5.
Give number of bytes to be occupied by the object of the following class:
(a) Personal
(b) Marks
(c) Result
Answer:
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 6

Question 4.6.
Write the names of data members accessible from the object of class Result.
Answer:
Data members accessible are:

  1. The private, public and protected data members of personal cannot be accessed.
  2. The public data members of marks: Nil (i/7) Public data members of Result char Final Grade; char commence [20];

Question 4.7.
Write the names of all member functions accessible from the object of class Result. Member functions accessible are:
Answer:
1. The private, public and protected member functions of personal cannot be accessed.

2. The public member functions of marks
void mentry();
void
mdisplay();

3. Public member functions of Result
void Rcalculate();
void RdisplayO;

Question 4.8.
Write the names of all members accessible from member functionsof class Result.
Answer:
Data members accessible
char Grade[5];
float Total;
float Age;
char Final Grade;
char Commence[20];

Member functions accessible
void mentry();
void mdisplay();
void Rcalculate();
void Rdisplay();

Question 5.
Write the output of the following program
Answer:
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 7
Output:
I am class A
I am class B
X = 30 Y = 20
Bye Bye
Bye

Question 6.
Debug the following program.
Answer:
Output:
…………………
15
14
13
Program:
…………………
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 8

Samacheer kalvi 11th Computer Science Arrays and Structures Additional Questions and Answers

PART – 1
I. Choose the correct answer

Question 1.
When a derived class inherits only from one base class, it is known as ………………
(a) multiple inheritance
(b) multilevel inheritance
(c) hierarchical inheritance
(d) single inheritance
Answer:
(d) single inheritance

Question 2.
A class that inherits from a superclass is called ………………
(a) derived class
(b) super class
(c) base class
(d) parent class
Answer:
(a) derived class

Question 3.
When more than one derived classes are created from a single base class, it is called ………………
(a) inheritance
(b) hybrid inheritance
(c) hierarchical inheritance
(d) multiple inheritance
Answer:
(c) hierarchical inheritance

Question 4.
……………… pointer is a constant pointer that holds the memory address of the current object.
(a) member function
(b) this pointer
(c) comma operator
(d) data member
Answer:
(b) this pointer

Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance

Question 5.
The ……………… are invoked in reverse order.
(a) constructor
(b) destructor
(c) pointer
(d) operator
Answer:
(b) destructor

PART – 2
II. Very Short Answers

Question 1.
Write a short note on hierarchical inheritance.
Answer:
When more than one derived classes are created from a single base class, it is known as Hierarchical inheritance.

Question 2.
Write the syntax for derived and base class.
Answer:
class derived class name : visibility_mode baseclassname
{

// members of derivedclass

};

Question 3.
Explain the significance of different visibility modes with a program.
Answer:
Implementation of Single Inheritance using public visibility mode
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 9
Output:
Total area : 35

Question 4.
When a base class is inherited with protected visibility mode the protected and public members of the base class become protected members’ of the derived class.
Answer:
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 10

PART – 3
III. Short Answers

Question 1.
What is inheritance and access control?
Answer:
When you declare a derived class, a visibility mode can precede each base class in the base list of the derived class. This does not alter the access attributes of the individual members of a base class , but allows the derived class to access the members of a base class with restriction. Classes can be derived using any of the three visibility mode:

  1. In a public base class, public and protected members of the base class remain public and protected members of the derived class.
  2. In a protected base class, public and protected members of the base class are protected members of the derived class.
  3. In a private base class, public and protected members of the base class become private members of the derived class.
  4. In all these cases, private members of the base class remain private and cannot be used by the derived class. However it can be indirectly accessed by the derived class using the public or protected member function of the base class since they have the access privilege for the private members of the base class.

Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance

Question 2.
Write the derived class using any of the three visibility mode.
Answer:
Classes can be derived using any of the three visibility mode:

  1. In a public base class, public and protected members of the base class remain public and protected members of the derived class.
  2. In a protected base class, public and protected members of the base class are protected members of the derived class.
  3. In a private base class, public and protected members of the base class become private members of the derived class.

PART – 4
IV. Explain in Detail

Question 1.
Explain single inheritance with example.
Answer:
When a derived class inherits only from one base class, it is known as single inheritance.
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 11
Output
Enter roll no and name .. 1201 KANNAN
Enter lang, eng, phy, ehe, esc,mat marks.. 100 100 100 100 100 100
Roll no :- 1201
Name :- KANNAN
Marks Obtained
Language.. 100
English .. 100
Physics .. 100
Chemistry .. 100
Comp.sci .. 100
Maths .. 100

Question 2.
Explain this pointer.
Answer:
‘this’ pointer is a constant pointer that holds the memory address of the current object. It identifies the currently calling object.lt is useful when the argument variable name in the member function and the data member name are same.
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 12
Output:
5 5
5 5
Process exited after 0.1 seconds with return value 0
Press any key to continue…

Question 3.
Write the output of the following program.
Samacheer Kalvi 11th Computer Science Solutions Chapter 16 Inheritance 13
Answer:
Output:
My profession is: Teacher
My age is: 20
I can walk
I can talk.
I can teach computer.
My profession is: Footballer
My age is: 19
I can walk
I can talk.
I can play football.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Students can Download Computer Applications Chapter 14 Introduction to Java Script Questions and Answers, Notes Pdf, Samacheer Kalvi 11th Computer Applications Book Solutions Guide Pdf helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

Tamilnadu Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Samacheer Kalvi 11th Computer Applications Introduction to Java Script Text Book Back Questions and Answers

I. Choose The Correct Answer

Question 1.
Which provided a common scripting language for web developers to design, test and deploy Internet Application
(a) C
(b) C++
(c) Java
(d) Java Script
Answer:
(d) Java Script

Question 2.
Expand CGI
(a) Common Gateway Interface
(b) Complex Gateway Information
(c) Common Gateway Information
(d) Complex Gateway Interface
Answer:
(a) Common Gateway Interface

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 3.
JavaScript programming language is used to develop the
(a) Dynamic Web Page
(b) Window
(c) Web Page
(d) Home Page
Answer:
(a) Dynamic Web Page

Question 4.
The Dynamic Web Page help to save server’s
(a) Work
(b) Route
(c) Traffic
(d) Pvath
Answer:
(c) Traffic

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 5.
User entered data, is validated before sending it to server is called ………………………
(a) Server traffic
(b) Dynamic Web Page
(c) Server Route
(d) Web server
Answer:
(b) Dynamic Web Page

Question 6.
Java Scripts can be implemented using which statements?
(a) <head>
(b) <Java>
(c) <script>
(d) <text>
Answer:
(c) <script>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 7.
Expand DHTML
(a) Distance Hyper Text Markup language
(b) Dynamic Hyper Text Markup language
(c) Distance High Text Markup language
(d) Dynamic High Text Markup language
Answer:
(b) Dynamic Hyper Text Markup language

Question 8.
How many attributes are used in <script> tag in the scripting
(a) 2
(b) 3
(c) 4
(d) 5
Answer:
(a) 2

Question 9.
Which attribute is used to indicate the scripting language and its value should be sent to “Text/JavaScript”
(a) Language
(b) Text 1
(c) Type
(d) Body
Answer:
(c) Type

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 10.
The shortcut key to reload file in the browser is
(a) F2
(b) F3
(c) F4
(d) F5
Answer:
(d) F5

Question 11.
JavaScript ignores spaces that appear between
(a) Command
(b) Scripts
(c) Tokens
(d) Text
Answer:
(c) Tokens

Question 12.
A Data value for variable that appears directly in a program by using a
(a) Loop
(b) Literal
(c) Statement
(d) Text
Answer:
(b) Literal

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 13.
Which is mostly used to give a warning message to users?
(a) Alert Dialog Box
(b) Confirm box
(c) Prompt box
(d) Display box
Answer:
(a) Alert Dialog Box

Question 14.
In the below snippet, value of x is var x = 250 + 2 – 200;
(a) 50
(b) 52
(c) 48
(d) 42
Answer:
(b) 52

II. Answer To The Following Questions

Question 1.
Write a syntax of <script> tag?
Answer:
<script language = “javascript”
type = “text/javascript”>
JavaScript code
</script>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 2.
What is scope of variables and types of scope variable?
Answer:
The spope of a variable is the life time of a variable of source code in which it is defined.

  1. A global variable has global scope; it can be defined everywhere in the JavaScript code.
  2. Variables declared within a function are defined only within the body of the function. They are local variables and have local scope.

Question 3.
Write a notes on type casting in JavaScript?
Answer:
Type conversion is the act of converting one data type into a different data type which is also called as casting. In JavaScript there are two type of casting:

  1. Implicit casting and
  2. Explicit casting

Question 4.
How many Literals are there in JavaScript and mention its types?
Answer:
There are five Literals in JavaScript. They are Integer, Floating point, Character, String and Boolean.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 5.
What is conditional operator give suitable example?
Answer:
The ?: is the conditional operator in JavaScript, which requires three operands, hence it is called the ternary operator. The syntax is:
var variablename = (condition) ?
value 1 : value2;
In the syntax, condition may be relational expression or logical expression. First condition will be evaluated, if the condition returns true then the value of the left side of the color is assigned to the variable otherwise the value of the right side of the colon will be assigned the variable.
Eg: var result = (10 > 15) ? 100 : 150;

Question 6.
What are the comments in Java Script?
Answer:
A very important aspect of good programming style is to insert remarks and comments directly in source code, making.it more readable to yourself as well as to others. Any comments you include will be ignored by the JavaScript interpreter. There are two types of comments, Single line and Multiple line comments. Single-line comments begin with a double slash (//), causing the interpreter to ignore everything from that point to the end of the line. Multiple line comments begins with /* and ends with */.
Eg:
//JavaScript single line comment//
Multiple line comments begins with /* and ends with */.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 7.
Write note on types of Operator?
Answer:
The type of operator is used to get the data type (returns a string) of its operand. The operand can be either a literal or a data structure such as a variable, a function, or an object. The – operator returns the data type.
Syntax
typeof operand
or
typeof (operand)

typeof returns:
boolean, function, number, string, and undefined. The following table summarizes possible values returned by the typeof operator.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 8.
Write the role of variable in Java Script?
Answer:
JavaScript Variables : Variable is a memory location where value can be stored. Variable is a symbolic name for a value. Variables are declared with the var keyword in JavaScript. Every variable has a name, called identifier.

Question 9.
What is the uses of prompt dialog box?
Answer:
The prompt dialog box is very useful when the user want to pop-up a text box to get user input. Thus, it enables you to interact with the user. The user needs to fill in the text box field and then click OK.

III. Answer To The Following Questions

Question 1.
What are the advantages of programming language?
Answer:

  1. In HTML we have learnt how to develop static web pages. But in real life web pages must be interactive. So to develop such interactive pages (Dynamic Web page ) JavaScript programming language is used.
  2. User entered data in the Dynamic Web page can be validated before sending it to the server. This saves server traffic, which means less load on your server.
  3. JavaScript includes such items as Textboxes, Buttons, drag-and-drop components and sliders to give a Rich Interface to site visitors. For example Creating a New email account in any service provider.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 2.
Brief the basic data types in Java Scripts?
Answer:
The basic data types in JavaScript are Strings, Numbers, and Booleans.

  1. A string is a list of characters, and a string literal is indicated by enclosing the characters in single or double quotes. Strings may contain a single character or multiple characters, including whitespace and special characters such as \n (the newline).
  2. Numbers can be integer or floating-point numerical value and numeric literals are specified in the natural way.
  3. Boolean can be any one of two values: true or false. Boolean literals are indicated by using true or false directly in the source code.

Question 3.
Write note on string Operator?
Answer:
The + operator performs addition on numbers but also serves as the concatenation operator for strings. Because string concatenation has precedence over “numeric addition, + will, be interpreted as string concatenation if any of the operands are strings. + operator which is also called as the string concatenation operator.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 4.
Write about <script> tag?
Answer:
<script language= “javascript”
type= “text / javascript”>
JavaScript code
</script>
The <SCRIPT> tag takes two important attributes

Language:
This attribute specifies that the scripting language. Typically, its value will be javascript. Although recent versions of HTML (Extensible HyperText Markup Language – XHTML, its successor) have phased out the use of this attribute is optional.

Type:
This attribute is used to indicate the scripting language and its value should be set to “text/javascript”.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 5.
What are the uses of Logical Operators?
Answer:
Logical operators perform logical (boolean) operations. Logical operators combine or invert boolean values. Once comparisions are made , the logical operations && (AND),|| (OR) and !(NOT) can be used to create more complex conditions.
Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script img 1

Question 6.
Difference between the Increment and Decrement operator?
Answer:
Increment Operator (++):

  1. The ++ operator increments its single operand.
  2. The operator converts its operand to a number, adds 1 to that number and assigns the incremented value back into the variable.
  3.  When ++ is used before the operand, where it is known as the pre-increment operator. When used after the operand, where it is known as the post-increment operator.
    1. Eg: var m = 1, n= ++m;
    2. var m = 1, n = m++;

Decrement Operator (–):

  1. The – – operator decrement its single operand.
  2. It converts the value of the operand to a number subtracts 1 and assigns the decremented value back to the operand.
  3. When ++ is used before the operand, it decrements the value. When used after the operand, it decrements the operand but returns the undecremented value.
    1. Eg: var m = 2, n = -m;
    2. var m = 2, n= m –;

IV. Answer To The Following Questions

Question 1.
Explain about the popup dialog boxes in Java Script?
Answer:
Java Script supports three important types of dialog boxes. Dialog boxes are also called as Popup Boxes. These dialog boxes can be used to raise an alert, or to get confirmation on any input or to have a kind of input from the users. JavaScript supports three kind of popup boxes: Alert box, Confirm box, and Prompt box.

Alert Dialog Box:
An alert dialog box is mostly used to give a warning message to the users. For example, if one input field requires to enter some text but the user does not provide any input, then as a part of ‘validation, you can use an alert box to give a warning message.

Alert box gives only one button “OK” to select and proceed. The syntax of alert box is Alert (“Message”); (or) Window.alert(“Message”);

Example:
alert (“Name is compulsory entry”);
(or) window.alert (“Name is compulsory entry”);
(or) Window. alert (“Name is compulsory entry”);

Confirm Dialog Box:
A confirmation dialog box is mostly used to take user’s consent on any option. It displays a dialog box with two buttons: OK and Cancel. If the user clicks on the OK button, the confirm( ) will return true. If the user clicks on the Cancel button, then confirm( ) returns false.

The syntax of confirm dialog box is
confirm (“message”);
(or)
window confirm(“message”);
Eg:
confirm (“Hai Do you want to continue:”);

Prompt Dialog Box:
The prompt dialog box is displayed using a method called prompt( ) which takes two parameters:

(i) a label which you want to display in the text box

(ii) a default string to display in the text box. This dialog box has two buttons: OK and the prompt() will return the entered value form the text box. If the user clicks the Cancel button, the prompt() returns null, The Syntax of prompt dialog box is,
Prompt (“Message”, “defaultValue”);
(or)
window.prompt(“sometext”, “defaultText”);

Eg:
prompt (“Enter your Name:”, “Name”);
(or)
window.prompt (“Enter your Name:”, “Name”);

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 2.
Explain about the Arithmetic operator with suitable example?
Answer:
JavaScript supports all the basic arithmetic operators like addition (+), subtraction (-), multiplication (*), division (/), and modulus (%, also known as the remainder operator).
Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script img 2

Samacheer Kalvi 11th Computer Applications Introduction to Java Script Additional Questions and Answers

I.Choose The Correct Answer

Question 1.
JavaScript 1.0 was introduced by:
(a) Java corporation
(b) Netscape and Sun Inc
(c) Oracle corporation
(d) Microsoft corporation
Answer:
(b) Netscape and Sun Inc

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 2.
Which client-side technology provides many advantages over traditional CGI server-side scripts?
Answer:
(a) C
(b) C + +
(c) JavaScript
(d) Java
Answer:
(c) JavaScript

Question 3.
Which tag is normally recommended that JavaScript should be kept it within the tag?
(a) <head>
(b) <title>
(c) <body>
(d) None of these
Answer:
(a) <head>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 4.
Which <script> tag attribute specifies that the scripting language?
(a) Type
(b) Language
(c) Name
(d) Value
Answer:
(b) Language

Question 5.
Which button can be used to reload the file into the browser?
(a) OK
(b) Refresh
(c) Submit
(d) Ignore
Answer:
(b) Refresh

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 6.
JavaScript is a:
(a) Case-sensitive language
(b) Low level language
(c) Machine language
(d) Assembly language
Answer:
(a) Case-sensitive language

Question 7.
What is the JavaScript single line comment?
(a) “/”
(b) “//”
(c) */*
(d) *//*
Answer:
(b) “//”

Question 8.
What is the JavaScript multiline comment?
(a) “/**/”
(b) “*/ /*”
(c) “//”
(d) /* /*
Answer:
(a) “/**/”

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 9.
Which is used to separate the statements in JavaScript?
(a) (:) colon
(b) (;) semicolon
(c) (,) comma
(d) (.) full stop
Answer:
(b) (;) semicolon

Question 10.
Which is a data value for variable that appears directly in a program?
(a) Variable
(b) Constant
(c) Literal
(d) Boolean
Answer:
(c) Literal

Question 11.
An identifier is simply a:
(a) Variable
(b) Name
(c) Value
(d) Boolean
Answer:
(b) Name

Question 12.
In JavaScript certain are used as reserved words?
(a) Keywords
(b) Identifiers
(c) Variable
(d) String
Answer:
(a) Keywords

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 13.
Which is the keyword for declared variable?
(a) Float
(b) Var
(c) Int
(d) Str
Answer:
(b) Var

Question 14.
Variable name is also known as:
(a) Identifier
(b) Constant
(c) String
(d) Float
Answer:
(a) Identifier

Question 15.
…………………. is a list of characters, and a string literal by enclosing single or double quotes?
(a) Numbers
(b) Boolean
(c) String
(d) Constant
Answer:
(c) String

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 16.
Which literals are indicated by any one of two values true or false?
(a) String
(b) Numbers
(c) Boolean
(d) Constants
Answer:
(c) Boolean

Question 17.
Which is the first character for naming a variable?
(a) Letter
(b) An underscore (_)
(c) ($) doller sign
(d) both (a) and (b)
Answer:
(d) both (a) and (b)

Question 18.
Which type of variable can be defined everywhere in the JavaScript?
(a) Global
(b) Local
(c) String
(d) Numeric
Answer:
(a) Global

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 19.
Which type of variable can be defined only within the body of the function?
(a) Global
(b) Local
(c) String
(d) Numeric
Answer:
(b) Local

Question 20.
Which is a fixed value given to a variable in source code?
(a) String
(b) Global
(c) Literal
(d) Numeric
Answer:
(c) Literal

Question 21.
The act of converting one data type into a different data types:
(a) Type conversion
(b) Arithmetic expression
(c) Relational expression
(d) Logical expression
Answer:
(a) Type conversion

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 22.
Which casting occurs automatically in JavaScript when you change the data stored in a variable?
(a) Implicit
(b) Explicit
(c) Internal
(d) External
Answer:
(a) Implicit

Question 23.
Which is the formation of one or more variables and / or constants joined by operators?
(a) Constant
(b) An expression
(c) Variable
(d) String
Answer:
(b) An expression

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 24.
Which is known as the remainder / modulus operator?
(a) I
(b) *
(c) –
(d) %
Answer:
(d) %

Question 25.
Which is an assignment operator?
(a) /
(b) *
(c) =
(d) –
Answer:
(c) =

Question 26.
Relational operators are also called as:
(a) Assignment operators
(b) Arithmetic operators
(c) Comparison operators
(d) Relational operators
Answer:
(a) Assignment operators

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 27.
Which symbol is used as ‘not equal to’ in relational operator?
(a) = =
(b) \ =
(c) !
< (d)\>
Answer:
(b) \ =

Question 28.
Which operator is used as the string concatenation of JavaScript?
(a) &
(b) +
(c) ++
(d) I
Answer:
(b) +

Question 29.
Which operator is used to increment value?
(a) +
(b) + +
(c) ~~
(d) ~
Answer:
(b) + +

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 30.
Which operator is used to decrement value?
(a) +
(b) + +
(c) – –
(d) –
Answer:
(c) – –

Question 31.
Which operator is used to get the data type of its operand?
(a) Numeric
(b) Typeof
(c) String
(d) Float
Answer:
(b) Typeof

Question 32.
Which is the conditional operator?
(a) d
(b) :
(c) ?:
(d) ! :
Answer:
(c) ?:

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 33.
How many dialog boxes are supported by JavaScripts?
(a) 1
(b) 2
(c) 3
(d) 4
Answer:
(c) 3

Question 34.
Dialog boxes are also called as:
(a) Text boxes
(b) Combo boxes
(c) List boxes
(d) Popup boxes
Answer:
(d) Popup boxes

Question 35.
Which is mostly used to give a warning message to the users?
(a) Alert dialog box
(b) Confirm box
(c) Prompt box
(d) Textbox
Answer:
(a) Alert dialog box

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 36.
What is the puipose of prompt dialog box?
(a) User input
(b) User output
(c) Read data
(d) None of these
Answer:
(a) User input

Question 37.
…………………. you include will be ignored by the Java script interpreter.
(a) Constant
(b) Comment
(c) Logical operator
(d) Relational Operator
Answer:
(b) Comment

II. Answer The Following Questions

Question 1.
Define CGI?
Answer:
JavaScript had truly bridged the gap between the simple world of HTML and the more complex Common Gateway Interface (CGI) programs on the Server. It provides a common scripting language for Web developers to design, test and deploy Internet Applications.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 2.
How can you use <script> tag in JavaScript?
Answer:
JavaScript can be implemented using <script>… </script> tags. The <script> tag containing JavaScript can be placed anywhere within in the web page, but it is normally recommended that should be kept it within the <head> tags. The <script> tag alerts the browser program to start interpreting all the text between these tags as a script commands.

Question 3.
What is meant by lexical structure of a programming language?
Answer:
The lexical structure of a programming language is the set of elementary rules that specifies how to write programs in that language. It is the lowest-level syntax of a language. The Lexical structure specifies variable names, the delimiter characters for comments, and how one program statement is separated from the next.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 4.
What are the names used as tokens in JavaScript?
Answer:
Identifiers, operators, punctuator, constants and keywords.

Question 5.
What are the style of comments supported by JavaScript?
Answer:
JavaScript supports two styles of comments. Any text follow a “//” and the end of a line is treated as a single line comment and is ignored by JavaScript. Any text between the characters “ /* */” is also treated as a multiline comment.

Question 6.
What is the role of identifier?
Answer:
An identifier is simply a name. In JavaScript, identifiers are used to name variables, functions and to provide labels for certain loops in JavaScript code.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 7.
What is a variable?
Answer:
Variable is a memory location where value can be stored. Variable is a symbolic name for a value. Variables are declared with the var keyword in JavaScript. Every variable has a name, called identifier.

Question 8.
What are the basic types of data types?
Answer:
Every variable has a data type that indicates what kind of data the variable holds. The basic data types in JavaScript are Strings, Numbers, and Booleans.

Question 9.
What is the purpose of operator?
Answer:
An operator combines the values of its operands in some way and evaluates to a new value. Operators are used for JavaScript’s arithmetic expressions, comparison expressions, logical expressions, assignment expressions.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 10.
What is an expression?
Answer:
An expression is simply one or more variables and/or constants joined by operators. An expression is evaluated and produces a result. The result of all expressions may be either an integer or floating-point value or Boolean value.

Question 11.
What are the types of expression?
Answer:
There are three types of expressions as follows,

  1. Arithmetic expressions
  2. Relational expressions
  3. Logical expressions.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 12.
What is the Use of unary + and – operator?
Answer:
+ has no effect on numbers but causes non¬numbers to be converted into numbers.
– Negation (changes the sign of the number or converts the expression to a number and then changes its sign).

III. Answer The Following Questions

Question 1.
What are the steps to be followed to code JavaScript language?
Answer:

  1. Enter HTML and JavaScript code using any text editor.
  2. Save the latest version of this code.
  3. Use any browser to see the result. Eg: Internet Explorer, Google Chrome, etc…
  4. If this is a new document, open the file via browser’s Open Menu. If the document is already loaded in the Memory, to reload the file into the browser use “Refresh” or press F5 button.

Question 2.
How to assign values to variables in JavaScript?
Answer:
Variables can be assigned initial values when they are declared as follows:
var numericData1 = 522;
var stringData = “JavaScript
has strings\nIt sure does:;
var numericData = 3.14;
var booleanData = true;

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 3.
Explain JavaScript literals with suitable examples?
Answer:
A literal is a fixed value given to a variable in source code. Literals are often used to initialize variables. Values may be Integer, Floating point, Character, String and Boolean.
Eg:
var int_const=250; //Integer constant//
var float_const=250.85; //
Floating point constant//
var char_const=’A’; //
Character constant//
var string_const- “Raman”; //
String constant//
var boolean_const=true; //
Boolean constant//
write statement:
General Syntax:
document write (“string” + var);

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 4.
What is an assignment operator? Give example?
Answer:
An assignment operator is the operator used to assign a new value to a variable, Assignment operator can also be used for logical operations such as bitwise logical operations or operations on integral operands and Boolean operands.

In JavaScript = is an assignment operator, which is used to assign a value to a variable. Often this operator is used to set a variable to a literal value, for example, ..
var number1=10;
var number2=number1;
var name=”Computer Science”;
var booleanvar=true;

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 5.
What are the rules that should be followed to use logical operators?
Answer:
Best practice is to use logical operators on boolean operands. However, operands of any type can be combined. The strict rules are as follows:

  1. For && (AND) the result is false if the first operand is false; otherwise, the result is the Boolean value of the second operand.
  2. For || (OR) the result is true if the first operand is true; otherwise, the result is the Boolean value of the second operand.
  3. For ! (NOT) the result is true if the operand is false; otherwise, the result is true.

IV. Answer The Following Questions

Question 1.
What is the lexical structure of a JavaScript program?
Answer:

  1. Though JavaScript is a case-sensitive language. It is good programming practice to type the command in lowercase.
  2. JavaScript ignores spaces that appear between tokens (identifiers, operators, punctuator, constants and keywords) in programs.
  3. JavaScript supports two styles of comments. Any text follow a “//” and the end of a line is treated as a single line comment and is ignored by JavaScript. Any text between the characters “ /* */” is also treated as a multiline comment.
  4. JavaScript uses the semicolon (;) to separate statements. Many JavaScript programmers use semicolons to explicitly mark the ends of statements.
  5. A literal is a data value for variable that appears directly in a program.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 2.
What are the rules that should be followed for naming variable in JavaScript?
Answer:

  1. The first character must be a letter or an underscore (_). Number cannot be as the first character.
  2. The rest of the variable name can include any letter, any number, or the underscore. You can’t use any other characters, including spaces, symbols, and punctuation marks.
  3. JavaScript variable names are case sensitive. That is, a variable named Register Number is treated as an entirely different variable than one named register number.
  4. There is no limit to the length of the variable name.
  5. JavaScript’s reserved words cannot be used as a variable name. All programming languages have a supply of words that are used internally by the language and that cannot be used for variable names.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 3.
Write the JavaScript program using various variables?
Answer:
<Html>
<Head>
<Title>Declaring Variables in JavaScript </Title>
</Head>
<Body>
<script language=”javascript” var numericData1 = 522;
var stringData = ” JavaScript has strings\n It sure does”;
var numericdata = 3.14;
var booleanData = true;
document.write (“Numeric Data:” +numericData 1);
document.write(“<br> String Data:” +stringData);
document.write(“<br> Floating Data:” +numericData);
</script>
</Body>
</Html>

Question 4.
Write a JavaScript program using all arithmetic operators?
Answer:
<Html>
<Head>
<Title>- To test Arithmetic Operators in JavaScript
</Title>
</Head>
<Body>
<script language=”javascript” type=” “text/javascript”>
var value1 = 522/ value2 = 10;
document.write(“<br>Data1 :” +value1);
document.write(“<br>Data2 :” +value2);
var sum = value1+value2;
var diff = value1-value2;
var prod = value1*value2;
var res = value1/value2;
var rem = value1%value2;
document.write(“<br><br>The Sum of’ Datal and Data! :” +sum);
document.write (“<br>The Difference of Data1 and Data2 :” +diff) ;
document.write(“<br>The Product of Data1 and Data2 :” +prod);
document.write(“<br>The Result after Division of Datal and Data2:” +res);
document.write(“<br>The Remainder after Division of Datal and Data2 :” +rem);
</script>
</Body>
</Html>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 5.
Write the relational / comparison operators using JavaScript?
Answer:
Relational operators are also called as Comparison operators, they compares two values and the result is true or false. JavaScript provides a rich set of relational operators including == (equal to), != (not equal to), < (less than), > (greater than), <= (less than or equal to), and >= (greater than or equal to). Using a relational operator in an expression causes the expression to evaluate as true if the condition holds or false if otherwise.
Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script img 3

Question 6.
Write a JavaScript program using logical operator?
Answer:
<Head>
<Body>
<script language=”javascript’ type=”text/javascript”>
var value1 = 522, value2=10;
document.write(“<br>Data1 + value1);
document.write(“<br>Data2 +value2);
var res1= ( (value1>100) && (value1>601));
var res2= ( (value1>100) || (value1>601) );
var res3=(!(value!!=value2));
document.write(“<br><br>Whether Data!>100.AND Data1>601:”+res1);
document .write (“<brxbr>Whether Data1>600 OR Data1>601:”+ res2) ;
document.write(“<br>Whether!Data!!= Data2 +res3);
</script>
</Body>
</Html>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 7.
Write a JavaScript program using + operator for concatenating string?
Answer:
<Html>
<Head>
<Title>- To Concatenating (+) Operators in JavaScript </Title>
</Head>
<Body>
<script language= “javascript” type=”text/javascript”>
var String1 = “Java”;

var String2 = “Script”;
var String3=String1+String2;
document.write(“<br>String1 :” +String1);
document.write(“<br>String2 :” +String2);
document.write(“<br><br>Concatenated String of String1 and String2:” +String3);
</script>
</Body>
</Html>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 14 Introduction to Java Script

Question 8.
Write a JavaScript program using “typeof operator”?
Answer:
<Html>
<Head>
<Title>- To test typeof Operator in JavaScript </Title> </Head>
<Body>
<script language=”javascript” type= “text/javascript”>
var value1 = 522, value2= “JavaSript”; value3=true;
document.write(“<br>Value1=”+value1+ “and its data Type is ttypeof(value1));
document.write (“<br>Value2=” +value2+”and its data Type is : +typeof(value2));
document.write (“<br>Value3=”+value3+”and its data Type is +typeof(value3));
</script>
</Body>
</Html>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML – Adding Multimedia Elements and Forms

Students can Download Computer Applications Chapter 12 HTML – Adding Multimedia Elements and Forms Questions and Answers, Notes Pdf, Samacheer Kalvi 11th Computer Applications Book Solutions Guide Pdf helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

Tamilnadu Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML – Adding Multimedia Elements and Forms

Samacheer Kalvi 11th Computer Applications HTML – Adding Multimedia Elements and Forms Text Book Back Questions and Answers

I. Choose The Correct Answer

Question 1.
Which image format was standardize by W3C?
(a) JPEG
(b) SVG
(c) GIF
(d) PNG
Answer:
(b) SVG

Question 2.
The tag used to insert an image in HTML:
(a) Image
(b) Picture
(c) Img
(d) Pic
Answer:
(c) Img

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 3.
In HTML, a piece of text or image can be moved horizontally or vertically by using:
(a) <marquee>
(b) <img>
(c) <embed>
(d) <text>
Answer:
(a) <marquee>

Question 4.
Inline sound can be inserted using which of the following tag?
(a) <inline>
(b) <backgroundsound>
(c) <bgsound>
(d) <sound>
Answer:
(c) <bgsound>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 5.
Which value causes the audio play as long as the page is in view?
(a) Stop
(b) Never Stop
(c) Continue
(d) Infinite
Answer:
(d) Infinite

Question 6.
The important attributes used with the <form> tag are:
(a) method and action
(b) name and size
(c) post and get
(d) type and name
Answer:
(a) method and action

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 7.
The tag is used to create dropdown list box in HTML is:
(a) <dropdown>
(b) <select>
(c) <listbox>
(d) <input>
Answer:
(b) <select>

Question 8.
Match the following:
Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms
Answer:
(b) (iii) (iv) (i) (ii)

II. Answer To The Following Questions

Question 1.
List out the popular image formats?
Answer:
Most of the browsers supports, GIF, JPEG and PNG images formats. HTML – 5 introduces SVG images. One format of image can be converted to another format by using Image editing applications such as Photoshop, Picasa, GIMP etc…

Question 2.
Write down the general format of marquee?
Answer:
In HTML, a piece of text or image can be moved horizontally or vertically by using <marquee> tag. This feature makes a web page as more attractive. – General format:
<marquee> Text or image to be scroll </marquee>.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 3.
What is inline sound or movie?
Answer:
The inline refers to audio or video files are handled as part of the page. These media files play the audio or video when the page is visible in the browser window. The external refers, linking external audio or video files as url.

Question 4.
What is the purpose of <input> tag?
Answer:
Most of the form controls are created by using <input> tag. The <input> is an empty tag used to create different form elements or controls such as text box, radio buttons and so on.

Question 5.
Which tag is used to specify the list of items in dropdown list box?
Answer:
The <select> tag is used to create dropdown listbox in HTML. It provides a list of various options as a dropdown list. This element is more helpful when a number of options are to be displayed in a limited space. The <option> tag is used to specify list items.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 6.
What are the major attributes are available in <textarea> tag?
Answer:
The <Textarea> tag used to receive multi line text data as input. It is a container tag. The main attributes of <Textarea> are –
Name:
Used to define name to the control.

Rows:
Specifies the number of rows in the text area control.

Cols:
Specifies the number of columns in the text area, (number of characters in a line).

III. Answer To The Following Questions

Question 1.
Write a short note on familiar images format. GIF (Graphical Interchange Format):
Answer:
This format is one of the popular format for animated images. It was developed by CompuServe. Usually this image format is suitable for presenting tiny animated images, logos, icons, line art etc… It is not suitable for photographic work, because it uses maximum of 256 colours. Animated GIF do not support sound or playback control.

JPEG (Joint Photographic Experts Group):
JPEG is the most popular image format supported by all web browsers. This format is suitable for photographic images. Unlike GIF, JPEG can include any number of colours.

PNG (Portable Network Graphics):
PNG is designed as a replacement for GIF. It is also supported by all browsers.

SVG (Scalable Vector Graphics):
SVG is a graphics format that was developed for web. It was standardized by World Wide Web Consortium (W3C) in 2001. All current web browsers supports basic features of SVG.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 2.
How will you scroll the text in HTML?
Answer:
In HTML, a piece of text or image can be moved horizontally or vertically by using <marquee> tag. This feature makes a web page as more attractive.

General format:
<marquee> Text or image to be scroll </marquee>
Attributes of <marquee>

Height and Width:
These attributes are used to set height and width of the marquee. The values should be either in pixels or in percentage of browser window.

Direction:
This is used to specify the direction of the movement of text or image. The text or image will move towards right to left by default. So, the default direction is left. The Possible values are ‘up’, ‘down’, ‘left’ or ‘right’.

Behaviour:
This attribute is used to specify the type of scrolling. The values are ‘scroll’, ‘slide’ and ‘alternate’.

Scrolldelay:
This attribute is used to define the time delay between each jump. The time unit should be in seconds.

Scrollamount:
This is used to define the speed of the scroll.

Loop:
This is for defining how many times the marquee element should repeat on the screen. The default value is ‘infinite’, which me the marquee element scrolls endlessly.

Bgcolor:
This is used to specify the background color to the marquee elements.

Hspace and Vspace:
This is for defining the horizontal and vertical space around the marquee. The value can be in pixels or percentage.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 3.
Explain the main attributes used with <form> tag?
Answer:
The important attributes used with the <form> tag are method and action attributes.

Method:
The method attribute of the form tag is used to identify how the form element names and values will be sent to the server.

  1. The get method will append the names of the form elements and their values to the URL.
  2. The post method will send the names and values of the form elements as packets.

Action:
The action attribute identifies the server side program or script that will process the form. The action will be the name of a Common Gateway Interface (CGI) program written in programming languages like Perl, JavaScript, PHP or Active Server Pages (ASP).

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 4.
Explain the values of <input> tag’s type attribute?
Answer:
Attributes of <input> tag’s Type:
This attribute is used define the type of control to be created by <input> tag. The values of type attribute is listed below:
Value of type attribute

  1. Text
  2. Password
  3. Checkbox
  4. Reset
  5. Submit
  6. Radio Button
  7. Button

Description:

  • Create a Text Box. The element used to get all kind of text input such as name, address etc…
  • Similar as Text box. But, while entering data, the characters are appearing as coded symbols such as asterisk.
  • Check box is an element appearing like a small square box. When the user click on the square a tiny tick’mark will appear inside the square. This element is used to select multiple options.
  • It is a special command button used to clear all the entries made in the form.
  • It is also a special command button used to submit all the entries made in the form to the backend server.
  • Radio button is used to select any one of the multiple options from the list. This element looks like a small circle, when the user select an item, a tiny dot will appear within the circle. If the user selects another option, previously selected option will be deselected. This means, user can select any one of the given option form a group.
  • This is a standard graphical button on the form used to call functions on click.

Samacheer Kalvi 11th Computer Applications HTML – Adding Multimedia Elements and Forms Additional Questions and Answers

I. Choose The Correct Answer

Question 1.
HTML – 5 introduces ………………….. image.
(a) GIF
(b) JPEG
(c) SVG
(d) PNG
Answer:
(c) SVG

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 2.
The popular format for animated images:
(a) GIF
(b) JPEG
(c) SVG
(d) PNG
Answer:
(a) GIF

Question 3.
GIF was developed by:
(a) google
(b) microsoft
(c) sun
(d) Compuserve
Answer:
(d) Compuserve

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 4.
Which format does not support animated sound and playback control?
(a) GIF
(b) JPEG
(c) SVG
(d) PNG
Answer:
(a) GIF

Question 5.
Which format is suitable for photographic images?
(a) GIF
(b) JPEG
(c) SVG
(d) PNG
Answer:
(b) JPEG

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 6.
The PNG format is designed as a replacement format for:
(a) GIF
(b) JPEG
(c) SVG
(d) PNQ
Answer:
(a) GIF

Question 7.
The <IMG> tag along with the attribute is:
(a) src
(b) width
(c) height
(d) vspace
Answer:
(a) src

Question 8.
The default direction of the <marquee> is:
(a) left
(b) right
(c) top
(d) bottom
Answer:
(a) left

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 9.
The default value of marquee scrolls:
(a) finite
(b) infinite
(c) 1 second
(d) many seconds
Answer:
(b) infinite

Question 10.
Which is referred to audio or video files are handled as part of the page?
(a) inline
(b) embed
(c) src
(d) img
Answer:
(a) inline

Question 11.
…………………. tag is used to attach an audio or video file easily within webpage.
(a) inline
(b) embed
(c) src
(d) no embed
Answer:
(b) embed

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 12.
……………………. tag is may be used as an alternate to display some other media files.
(a) inline
(b) embed
(c) src
(d) no embed
Answer:

Question 13.
What is the primary attribute used with <embed> tag?
(a) inline
(b) embed
(c) src
(d) no embed
Answer:
(d) no embed

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 14.
What is the special element of the form in html?
(a) Name
(b) Submit
(c) Text
(d) Box
Answer:
(b) Submit

Question 15.
What is the method will append the names of the form elements and their values?
(a) Form
(b) Get
(c) Post
(d) Action
Answer:
(b) Get

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 16.
What method will send the names and values of the form elements as packets?
(a) Form
(b) Get
(c) Post
(d) Action
Answer:
(c) Post

Question 17.
What is the special command button used to clear all the entries made in the form?
(a) Reset
(b) Submit
(c) Button
(d) Text
Answer:
(a) Reset

Question 18.
What is the standard graphical button on the form used to call function?
(a) Reset
(b) Submit
(c) Button
(d) Text
Answer:
(c) Button

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 19.
Which tag is used to receive multiline text data as input?
(a) <form>
(b) <submit>
(c) <textarea>
(d) <inline>
Answer:
(c) <textarea>

II. Answer The Following Questions

Question 1.
How can you inserts images with html document?
Answer:
The <IMG> tag along with the attribute src (Source) is used to add images in HTML document.

General format:
<img src = image_name_with_ extension>
(or)
<img src = URL>
Eg:
<img src = imagel.gif>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 2.
How can you use the Alt attribute of <img>?
Answer:
Alt (Alternative Text):
The alt attribute within <img> tag is used to describe the image, so that some text is conveyed even when the image cannot be displayed.
Eg:
<img src = bharathiyar.gif alt = “National Poet of India”>

Question 3.
What is the use of width and height attributes?
Answer:
Width and Height attributes are used to set the width and height of an image. The values of these attributes should be either pixels or percentage of its actual size.

If these attributes are not specified, the browser displays the image in its original size.
Vspace (Vertical space) and
Hspace (Horizontal space)

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 4.
What is the use of <embed> ta| and <no embed> tag?
Answer:
The <embed> tag is used to attach an audio or video file easily within webpage. This tag includes the controls of the multimedia automatically in the browser. The <noembed> tag may be used as an alternate to display some other media file, in the case of the browser does not support <embed> tag.

Question 5.
What is the use of src attribute?
Answer:
Src is the primary attribute used with <embed> tag. The src attribute used to specify the name of the media file with its source location. Other attributes such as alt, height, width and align are used as it is used with <img>.

Question 6.
What is the use of <form> tag?
Answer:
The <form> tag is used to create a form. An HTML from starts with <form> and ends with </form> tag. Forms contain many types of form elements, such as text boxes, radio buttons, check boxes, buttons and drop-down lists.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 7.
What are the different types of form controls?
Answer:
In HTML, there are different types of form controls are used to collect data. They are Text box, Password, Checkbox, Radio buttons, Text area, Select box, Submit and Reset Button.

III. Answer The Following Questions

Question 1.
What are the align attributes used to align the image?
Answer:
The align attribute used to aligns the image with respect to the base line of the text. This attribute has the following values.

  1. Bottom – Aligns the bottom of the image with the baseline of the text. This is the default setting.
  2. Middle – Aligns the middle of the image with the baseline of the text.
  3. Top – Aligns the top of the image with the baseline of the text.

Question 2.
How can you define the background music attribute?
Answer:
Music can be played in the background to a webpage, while the page is viewed. This is known as ‘inline’ sound or movie. The <bgsound> tag is used to attach an inline sound file in HTML.

The src attribute is used to define the location of the media file. Volume attribute used to adjust volume control. The loop attribute defines the duration of play. The ‘infinite’ value causes the audio play as j long as the page is in view.

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 3.
Explain the forms attribute submit and name?
Answer:
The form has a special element, which is submit button, which will submit the entries of a form to a server application to process the entries. Each element in the form is assigned a name using the name attribute.

Users enter values into the text boxes, or make selections from the radio buttons* check boxes, and drop down lists. The values they enter or select are passed with the name of the corresponding form element to the Web server.

Question 4.
Write the html code to insert an inline image?
Answer:
<html>
<head>
<title> Inserting Images </title>
</head>
<body>
<hl align = center>
Bharathiyar </hl>
<img src = bharathiyar.gif>
</body>
</html>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 5.
Write the html code using marquee tag?
Answer:
<html>
<head>
<title> Marquee </title>
</head>
<body>
<marquee> <b> The Government of Tamilnadu </b>,
Directorate of School
Education </marquee>
<marquee direction=right>
Welcome to <b> The State Council of Educational Research and Training </b>, Tamilnadu </marquee>
</body>
</html>

IV. Answer The Following Questions

Question 1.
Write the html code using <img> attributes?
Answer:
<html>
<head>
<title> Inserting Images </title>
</head>
<body>
<h1 align = center> Mahakavi Bharathi </h1>
<img src = bharathiyar.gif alt = “National Poet of India”
Width = 20% Height = 25% vpace = 20 Hspace = 20>
<img src = bharathiyar.gif alt = “National Poet of India”
Width = 20% Height = 25% vpace = 20 Hspace = 20>
<img src = bharathiyar.gif alt = “National Poet of India”
Width = 20% Height = 25% vpace = 20 Hspace = 20> <br>
<img src = bharathiyar.gif alt = “National Poet of India”
Width = 20% Height = 25% vpace = 20 Hspace = 20>
<img src = bharathiyar.gif alt = “National Poet of India”
Width = 20% Height = 25% vpace = 20 Hspace = 20>
<img src = bharathiyar.gif alt = “National Poet of India”
Width =20% Height = 25% vpace = 20 Hspace = 20> <br>
</body>
</html>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 2.
Write the html code to adding audio and video files?
Answer:
<html>
<head>
<title> Adding Multimedia Files </title>
</head>
<body>
<img src=”D:\Images\TN_Logo.png” alt=”Govt. of Tamilnadu Logo” height=25% width=15%>
<marquee> Welcome to <b> The State Council of Educational Research and Training </b>, Tamilnadu </marquee>
<embed src=”D:\CS_Videos\CS_Video.mp4″ width=50% height=50%> </embed> </body>
</html>

Samacheer Kalvi 11th Computer Applications Solutions Chapter 12 HTML - Adding Multimedia Elements and Forms

Question 3.
Write the html code to form and form controls?
Answer:
<html>
<head>
<title> Login Form </title>
<body>
<h3 align=center> TamilNadu State Council of Educational Research
and Training, Chennai </h3>
<Form Action =”mailto:abed.xyz0com” method=post>
<p> User Name:
cinput type = text name=”user_name” size = 20 maxlength = 15> </p>
<p> Password:
<Input type = password name=”pass” size = 20 maxlength = 15> </p>
<Input type = reset value =”Clear”>
<Input type = submit value =”Login”>
</Form>
</body>
</html>

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Students can Download Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium Pdf, Tamil Nadu 11th Accountancy Model Question Papers helps you to revise the complete Tamilnadu State Board New Syllabus and score more marks in your examinations.

TN State Board 11th Accountancy Previous Year Question Paper June 2019 English Medium

General Instructions:

  1. The question paper comprises of four parts.
  2. You are to attempt all the parts. An internal choice of questions is provided wherever applicable.
  3. All questions of Part I, II, III, and IV are to be attempted separately.
  4. Question numbers 1 to 20 in Part I are Multiple Choice Questions of one mark each.
    These are to be answered by choosing the most suitable answer from the given four alternatives and writing the option code and the corresponding answer.
  5. Question numbers 21 to 30 in Part II are two-mark questions. These are to be answered in about one or two sentences.
  6. Question numbers 31 to 40 in Part III are three-mark questions. These are to be answered in above three to five short sentences.
  7. Question numbers 41 to 47 in Part IV are five-mark questions. These are to be answered in detail Draw diagrams wherever necessary.

Time: 2.30 Hours
Maximum Marks: 90

Part – I

Answer all the questions. Choose the correct answer: [20 × 1 = 20]

Question 1.
Financial position of a business is ascertained on the basis of ________.
(a) Journal
(b) Trial balance
(c) Balance Sheet
(d) Ledger
Answer:
(c) Balance Sheet

Question 2.
Who is considered to be the internal user of the financial information?
(a) Creditor
(b) Employee
(c) Customer
(d) Government
Answer:
(b) Employee

Question 3.
“Book-keeping is an art of recording business dealings in a set of books” is said by
(a) R.N.Carter
(b) Menhar
(c) J.R.Batlibai
(d) Kohler
Answer:
(c) J.R.Batlibai

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 4.
In India, Accounting Standards are issued by ______.
(a) Reserve Bank of India
(b) Accountant General of India
(c) The Institute of Chartered Accountants of India
(d) The Cost and Management Accountant of India
Answer:
(d) The Cost and Management Accountant of India

Question 5.
Outstanding wages is a ________.
(a) Nominal account
(b) Personal account
(c) Real account
(d) Representative personal account
Answer:
(d) Representative personal account

Question 6.
The process of finding the net amount from the totals of debit and credit columns in a ledger is known as ______.
(a) Casting
(b) Posting
(c) Journalising
(d) Balancing
Answer:
(d) Balancing

Question 7.
The total of the debit column is short by ₹ 500 in the trial balance. This difference will be _____.
(a) Debited to suspense account
(b) Credited to suspense account
(c) Adjusted to any of the debit balance
(d) Adjusted to any of the credit balance
Answer:
(a) Debited to suspense account

Question 8.
Purchase of fixed assets on credit basis is recorded in:
(a) Purchases book
(b) Sales book
(c) Purchases returns book
(d) Journal proper
Answer:
(d) Journal proper

Question 9.
In Triple column cash book, the balance of bank overdraft brought forward will appear in ______.
(a) Cash column credit side
(b) Cash column debit side
(c) Bank column debit side
(d) Bank column credit side
Answer:
(d) Bank column credit side

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 10.
A bank reconciliation statement is prepared with the help of ______.
(a) Bank statement
(b) Petty Cash book
(c) Cash book
(d) Bank statement and bank column of the cash book
Answer:
(d) Bank statement and bank column of the cash book

Question 11.
The total of purchases book was undercast. Which of the following accounts should be credited in the rectifying journal entry?
(a) Purchases account
(b) Creditors account
(c) Suspense account
(d) Debtors account
Answer:
(c) Suspense account

Question 12.
The difference in trial balance is taken to _______.
(a) The capital account
(b) The trading account
(c) The suspense account
(d) The profit and loss account
Answer:
(c) The suspense account

Question 13.
Under the written down value method of depreciation, the amount of depreciation is ________.
(a) Decreasing every year
(b) Uniform in all the years
(c) Increasing every year
(d) Fluctuating every year
Answer:
(a) Decreasing every year

Question 14.
Advertisement expenses amounted to ₹ 5 crores to introduce a new product is _______.
(a) Capital expenditure
(b) Revenue expenditure
(c) Deferred revenue expenditure
(d) Capital receipt
Answer:
(b) Revenue expenditure

Question 15.
Short term loan is ________.
(a) Liquid liability
(b) Current liability
(c) Fixed liability
(d) Contingent liability
Answer:
(b) Current liability

Question 16.
Bank overdraft should be shown ________.
(a) In the trading account
(b) On the assets side
(c) Profit and Loss account
(d) On the liabilities side
Answer:
(d) On the liabilities side

Question 17.
Closing stock is valued at _______.
(a) Cost price
(b) Market price
(c) Cost price or market price whichever is higher
(d) Cost price or net realisable value whichever is lower
Answer:
(d) Cost price or net realisable value whichever is lower

Question 18.
Prepaid salary will be shown on _______.
(a) Debit side of trading account
(b) Assets side of Balance sheet
(c) Debit side of profit and loss account
(d) Both (b) and (c)
Answer:
(d) Both (b) and (c)

Question 19.
One of the limitations of computerised accounting system is ________.
(a) System failure
(b) Accuracy
(c) Versatility
(d) Storage
Answer:
(a) System failure

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 20.
Accounting software is an example of _______.
(a) Utility software
(b) System software
(c) Application software
(d) Operating software
Answer:
(c) Application software

Part – II

Answer any seven questions in which question No. 30 is compulsory: [7 × 2 = 14]

Question 21.
Complete the accounting equation
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 1
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 2
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 3

Question 22.
Prepare Furniture A/c from the following transactions.

2017
Jan. 1 Furniture in hand 20,000
Jan. 1 Purchased furniture for cash 10,000
Jan. 30 Sold furniture 4,000

Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 4

Question 23.
Prepare a trial balance with the following information:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 5
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 6
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 7

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 24.
Enter the following transactions in the Purchases book of M/s. Subhashree Home Appliances.
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 8
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 9

Question 25.
What is bank reconciliation statement?
Answer:
If every entry in the cash book matches with the bank statement, then bank balance will be the same in both the records. But, practically it may not be possible. When the balances do not agree with each other, the need for preparing a statement to explain the causes arises. This statement is called bank reconciliation statement (BRS).

Question 26.
Rectify the following errors discovered before the preparation of trial balance:
(a) Returns inward book was undercast by ₹ 1,000
(b) Returns outward book was overcash by ₹ 2,000
Answer:
(a) Returns inward book should be debited ₹ 1,000
(b) Returns outward book should be debited ₹ 2,000

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 27.
What is annuity method of calculating depreciation?
Answer:
To calculate the amount of depreciation, annuity factor is used. Annuity factor can be found out from the annuity table or by using formula.
Amount of depreciation is computed as follows:
Amount of depreciation = Annuity factor × Original cost of the asset.

Question 28.
What is meant by deferred revenue expenditure?
Answer:
An expenditure which is revenue expenditure in nature, the benefits of which is to be derived over a subsequent period or periods is known as deferred revenue expenditure.

Question 29.
Write the components of Computerised Accounting System (CAS)?
Answer:
Components of CAS can be classified into six categories, namely,

  • Hardware
  • Software
  • People
  • Procedure
  • Data
  • Connectivity.

Question 30.
The Trial balance as on 31st December 2018 is given below:

Particulars Debit Credit
Loan @ 10% p.a 4,00,000
Interest paid on loan 30,000

Pass adjusting entry for interest on loan outstanding ₹ 10,000
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 10

PART – III

Answer any seven questions in which question No. 40 is compulsory: [7 × 3 = 21]

Question 31.
Write the objectives of Accounting.
Answer:
Following are the objectives of accounting:

  • To keep a systematic record of financial transactions and events
  • To ascertain the profit or loss of the business enterprise
  • To ascertain the financial position or status of the enterprise
  • To provide information to various stakeholders for their requirements
  • To protect the properties of an enterprise and
  • To ascertain the solvency and liquidity position of an enterprise

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 32.
In a Business concern “Only monetary transactions are recorded in accounting”. Why?
Answer:
This concept implies that only those transactions, which can be expressed in terms of money, are recorded in the accounts. Since, money serves as the medium of exchange transactions expressed in money are recorded and the ruling currency of a country is the measuring unit for accounting.

Transactions which do not involve money will not be recorded in the books of accounts.
For example, working conditions in the work place, strike by employees, efficiency of the management, etc. will not be recorded in the books, as they cannot be expressed in terms of money.

Question 33.
Complete the missing information:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 11
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 12

Question 34.
Balan who has a car driving school gives you the following ledger balances. Prepare trial balance as on 31st December, 2016.
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 13
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 14

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 35.
Prepare bank reconciliation statement as on 31st December, 2017 from the following information:
(a) Balance as per bank statement (pass book) is ₹ 25,000
(b) No record has been made in the cash book for a dishonour of a cheque for ₹ 250
(c) Cheques deposited into bank amounting to ₹ 3,500 were not yet collected
(d) Bank charges of ₹ 300 have not been entered in the cash book.
(e) Cheques issued amounting to ₹ 9,000 have not been presented for payment
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 15

Question 36.
Calculate the amount of depreciation and depreciation rate from the following by using ‘straight line method’.

Purchase price of a machinery 2,00,000
Transportation cost 2,000
Installation cost 18,000
Estimated scrap value 10,000
Estimated life 10 years

Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 16
Note:
Cost of the asset = Purchase price + Transportation cost + Installation cost
= 2,00,000 + 2,000 + 18,000 = ₹ 2,20,000

Question 37.
Write any three differences between capital, revenue and deferred revenue expenditure.
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 17

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 38.
From the following details for the year ended 31st March, 2018, prepare trading account:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 18
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 19

Question 39.
The Trial Balance of Mr.Aravind on 31.3.15 shows capital ₹ 15,00,000. During that year he withdrew ₹ 1,00,000 for his personal use.
Adjustment: Charge interest on drawings at 5%
Pass adjusting entry and transfer entry.
Answer:
Interest on drawings = ₹ 1,00,000 × 5/100 = ₹ 5000. The adjusting entry is:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 20

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 40.
Pass Adjusting Entries for the following adjustments in the books of Mr.MuraIi.
(a) Closing stock – ₹ 10,000
(b) Interest received in advance – ₹ 5,000
(c) Depreciation on Machinery – ₹ 8,500
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 21

Part – IV

Answer all the questions: [7 × 5 = 35]

Question 41.
(a) Mrs. Saraswathy is a sole trader dealing in sports items. From the following transactions, pass journal entries for the month of March, 2017.

March

1 Commenced business with cash 5,00,000
2 Cash deposited into bank 2,50,000
3 Purchased goods from Ravi 1,00,000
4 Sales made to Kumar, who deposited the money through CDM 20,000
5 Sold goods to Vivek, on credit 50,000
6 Cash purchases 30,000
7 Dividend directly received by bank 3,000
8 Salaries paid through ECS 6,000
9 Money withdrawn from ATM 9,000
10 Cricket balls donated to a trust 2,500

Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 22
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 23

[OR]

(b) The following errors were located after the preparation of the trial balance. Assume that their exists a suspense account. Rectify them.
(i) Bought goods from Lakshmi on credit for ₹ 500. Credited to her account as ₹ 50.
(ii) Purchased machinery for cash ₹ 2,000 was posted to machinery account.
(iii) Salaries ₹ 2,800 were posted as ₹ 18,000
(iv) The total of sales book ₹ 890 was carried forward as ₹ 980
(v) The total of purchase book was undercast by ₹ 1,000
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 24

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 42.
(a) Show the direct ledger postings for the following transactions:

2015
June 1 Subash commenced business with cash 50,000
June 5 Sold goods for cash 10,000
June 8 Goods purchased for cash 5,000
June 20 Goods purchased from Shankar on credit 6,000

Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 25
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 26
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 27
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 28

[OR]

(b) Enter the following transactions in three column cash book of Mr. Raja.
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 29
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 30

Question 43.
(a) Prepare accounting equation for the following transactions.

(i) Mrs. Rani started business with cash ₹ 50,000
(ii) Opened bank account with a deposit of ₹ 10,000
(iii) Bought goods from Ravi on credit for ₹ 12,000
(iv) Sold goods (costing 10,000) for ₹ 15,000
(v) Salaries paid for ₹ 5,000

Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 31

(b) From the following information, prepare the necessary subsidiary books for Nalanda Book stores.
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 32
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 33
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 34

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 44.
(a) Ram and Co. purchased on 1st April 2014, a plant and machinery for ₹ 6,50,000 and spend ₹ 50,000 on its installation. After having used it for three years, it was sold for ₹ 4,00,000. Depreciation is to be provided every year at the rate of 15% per annum on the fixed instalment method. Accounts are closed on 31st March every year. Prepare plant and machinery account and depreciation account for three years.
Answer:
Workings:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 35
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 36

[OR]

(b) From the following balances obtained from the books of Mr. Ramesh, prepare trading and profit and loss account.
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 37
Closing stock on December 31.12.17 was ₹ 10,000/-
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 38
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 39

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 45.
(a) Enter the following transactions in Rahim’s petty cash book with analytical columns under imprest system:

2017
Jan. 1 Balance on hand 250
Jan. 1 Cash received from chief cashier 1,750
Jan. 2 Purchased pencil, rubber and paper 200
Jan. 4 Sent documents to Head office by Registered post 150
Jan. 5 Travelling expenses paid to salesman 200
Jan. 17 Paid for sundry expenses 80
Jan. 19 Paid for office expenses 100
Jan. 11 Paid for letter pad 175
Jan. 13 Paid to Amutha on account 65
Jan. 15 Paid for repairs to furniture 80
Jan. 18 Carriage paid 90
Jan. 20 Brought postal stamps 50
Jan. 22 Paid for telephone charges 175

Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 40

[OR]

(b) From the following particulars of Meenakshi Traders, prepare a bank reconciliation statement as on 31st March 2018.
(i) Debit balance as per cash book ₹ 10,500.
(ii) Cheque deposited into bank amounting to ₹ 5,500 credited by bank, but entered twice in the Cash book.
(iiii) Cheques issued and presented for payment amounting to ₹ 7,000 omitted in the cash book.
(iv) Cheque book charges debited by the bank ₹ 200 not recorded in the cash book.
(v) Cash of ₹ 1,000 deposited by a customer of the business in cash deposit machine not recorded in the cash book.
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 41

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 46.
(a) The following are the extracts from the trial balance:

Particulars Dr. (₹) Cr.(₹)
Sundry Debtors Bad debts

Provision for doubtful debts

75,000

5,000

2,000

Additional Information:
(i) Additional bad debts ₹ 5,000
(ii) Provision for bad and doubtful debts @ 5% on sundry debtors.
You are required to pass necessary adjusting entries and show how these items will appear in profit and loss account and balance sheet.
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 42
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 43

[OR]

(b) Record the following transactions in the sales book and sales returns book of M/s. Roobini and Co., and post them to ledger.
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 44
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 45
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 46
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 47

Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium

Question 47.
(a) Consider the following balances, extracted from the books of Jain as on 31st December 2016. Prepare the final accounts.
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 48
Adjustments:
(i) Salaries outstanding for December, 2016 amounted to ₹ 600
(ii) Provide depreciation on furniture @ 10% p.a
(iii) Provide Interest on capital for the year @ 5 % p.a
(iv) Stock on 31st December, 2016 ₹ 14,000
Answer:
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 49
Tamil Nadu 11th Accountancy Previous Year Question Paper June 2019 English Medium 50

[OR]

(b) Write the advantages of Computerised Accounting System.
Answer:
Advantages of Computerised Accounting System:
The main advantages of computerised accounting system are as follows:

Faster processing: Computers require far less time than human beings in performing a particular task. Therefore, accounting data are processed faster using a computerised accounting system.

Accurate information: There is less space for error because only one account entry is needed for each transaction unlike repeated posting of the same accounting data in manual system.

Reliability: Computer systems are immune to boredom, tiredness or fatigue. Therefore, these can perform repetitive functions effectively and are highly reliable.

Easy availability of information: The data are easily available and Can be communicated to different users at the same time.

Up-to-date information: Account balances will always be up to date since the records are automatically updated as and when accounting data are entered or stored.

Efficiency: The computer based accounting system ensures better use of time and resources.

Storage and retrieval: Computer based systems require a fractional amount of physical space as compared to the books of accounts in the form of journals, ledgers and accounting registers.

Works as a motivator to employees: Employees using computer systems feel more valued as they are trained and specialised for the job.

Automated document production: Accounting reports like trial balance and financial statements are generated automatically and are easily accessible just by a click of the mouse.

MIS Reports: It is easier to monitor and control the business using the real time management reports generated by the computerised information systems.