CA Answer Key
CA Answer Key
Answer Key
STD : XII TIME : 3.00 Hrs
SUB : COMPUTER APPLICATION MARKS : 70
PART - I
1. c) EPS
2. b) Pagemaker
3. a) Function
4. d) Break
5. a) Enter check loop
6. c) F Close( )
7. d) Version 5.0
8. d) Vint Cerf
9. Mere attempt
10. d) SMTP
11. d) Hackers demand
ransomware from the
victim.
12. d) RJ45
13. a) 1999
14. a) Electronic clearing
Service
15. a) TDCC
PART - II
II Answer questions.
16. Animation:
Animation is the process of displaying still images so quickly so that they give the
impression of continuous movements.
SQL MySQL
echo $i . “<br>”;
PART- III
➢ The buyer negotiates with the retailer for a particular product or service.
Example: https://in.hotels.com/
31. Compare and contrast the credit card and debit card.
Similarity of credit card and debit card
❖ The way of using debit cards and credit cards is generally the same.
❖ The debit card and credit card are identical in their physical properties.
Difference between credit card and debit card:
❖ Credit card:
o Normally used for retail transactions.
o The credit card issuer allows you to spend the money.
o The card issuer to payback the value later with an agreed interest.
❖ Debit card:
o Debit Card is an electronic payment card where the transaction amount is
deducted directly from the card holder's bank account upon authorization.
o Generally, debit cards function as ATM cards and act as a substitute for cash.
➢ In 1987, the UN / EDIFACT syntax rules were approved as ISO: ISO9735 standard
by the International Organization for Standardization.
Part IV
❖ Simple Attribute:
✓ The simple attributes cannot be separated. It will have a single value for that entity.
✓ For Example: Let us consider the name as the attribute for the entity employee and
here the value for that attribute is a single value.
❖ Composite Attributes:
✓ The composite attributes can be sub-divided into simple attributes without change in
the meaning of that attribute.
✓ For Example: In the above diagram the employee is the entity with the composite
attribute Name which are sub-divided into two simple attributes first and last name.
✓ A single valued attribute contains only one value for the attribute and they don't have
multiple number of values.
✓ For Example: Age - It is a single value for a person as we cannot give 'n' number of
ages for a single person, therefore it is a single valued attribute.
Indexed array:
❖ An indexed array is an array that uses a numeric index to access its elements. The
index is a number that starts at 0 for the first element and increases by 1 for each
subsequent element.
❖ We can create an indexed array in PHP, by enclosing a comma-separated list of
values in square brackets (or) by using the array() function.
Syntax:
$arrayVariable = [ element1, element2, element3, ... elementN];
(or)
$arrayVariable = array( element1, element2, element3, ... elementN);
Examples:
(a) $fruits = ['apple', 'banana', 'orange'];
(b) $fruits = array('apple', 'banana', 'orange');
➢ Then the resolver returns the record back to the computer browser Now the user can
view the webpages for the detected IP address.
OSI Layers:
1. Physical Layer:
➢ This is the 1st layer, it defines the electrical and physical specifications for
devices.
3. Network Layer:
➢ It is the 3rd layer determining the path of the data packets.
➢ This layer is responsible for routing of data packets using IP Addressing.
4. Transport Layer:
➢ It is the 4th layer that guarantees the transportation/sending of data
successfully.
➢ It includes the error checking operation.
5. Session Layer:
➢ It is the 5th layer, identifies the established system session between
different network entities.
➢ It controls dialogues between computers.
6. Presentation Layer:
➢ It is the 6th layer that does the translation of data to the next layer.
➢ Encryption and decryption protocols occur in this layer such as, SSL
(Secure Socket Layer).
7. Application Layer:
➢ It is the 7th layer, which acts as the user interface platform comprising of
software within the system.
38 b.