0% found this document useful (0 votes)
13 views10 pages

CA Answer Key

The document is an answer key for a Computer Applications exam for Grade XII, covering various topics such as animation, SQL, PHP validation, DNS components, and mobile networks. It includes multiple-choice questions, short notes, and detailed explanations of concepts like UPI, OSI model, and registered jacks. The exam is structured into four parts, with a total of 70 marks allocated for the questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views10 pages

CA Answer Key

The document is an answer key for a Computer Applications exam for Grade XII, covering various topics such as animation, SQL, PHP validation, DNS components, and mobile networks. It includes multiple-choice questions, short notes, and detailed explanations of concepts like UPI, OSI model, and registered jacks. The exam is structured into four parts, with a total of 70 marks allocated for the questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

Common First Revision – 2025

Answer Key
STD : XII TIME : 3.00 Hrs
SUB : COMPUTER APPLICATION MARKS : 70

PART - I

I Answer the Questions: 15x 1 = 15

1. c) EPS
2. b) Pagemaker
3. a) Function
4. d) Break
5. a) Enter check loop
6. c) F Close( )
7. d) Version 5.0
8. d) Vint Cerf
9. Mere attempt
10. d) SMTP
11. d) Hackers demand
ransomware from the
victim.
12. d) RJ45
13. a) 1999
14. a) Electronic clearing
Service
15. a) TDCC

PART - II

II Answer questions.

16. Animation:
Animation is the process of displaying still images so quickly so that they give the
impression of continuous movements.

17. Write the difference between SQL and MySQL:

SQL MySQL

It is a standardized language used to access MySQL is open-source software that


the database. allows managing relational database.
The data’s are processed to turn into It also provides the flexibility of changing
efficient information. the source code as per the needs.

18. What is Validation in PHP:


Validation is a process of checking the input data submitted by the user from client
machine.
19. Mention the components of DNS:
There are four important components in the Domain Name system. They are,
1. Namespace 3. Zone
2. Name Server 4. Resolver

20. What is meant by champ connector:


The RJ -21 connector is called as champ connector. The RJ-21 connector has 50 pins
with 25 pins at one end and 25 pins at the other end. i

21. Write short notes on NS2:


NS2 is the abbreviation of NETWORK SIMULATOR version 2. It was considered
explicitly for exploration in network communication and event – Driven open – source
simulator in computer

22. Write a short note on out – souring


If a company’s work is hired to another company, it would be termed as out -
souring.

23. Write a short note on typo piracy:


Typo piracy is a variant of Cyber Squatting. Some fake website try to take advantage
of user’s common typographical errors in typing a website address and direct users to
a different website.

24. Structural tags:


for ($i = 5; $i>=1; $i --)
{

echo $i . “<br>”;

PART- III

25.List out image file formats.


❖ TIFF (Tagged Image File format)
❖ DIB (Device Independent Bitmap)
❖ JPEG (Joint Photographic Experts Group)
❖ PNG (Portable Network Graphics)
❖ BMP (Bitmap)
❖ GIF (Graphics Interchange Format)
❖ TGA (Tagra)
26. How to you insert page numbers in Master pages?
1. Click on Master Pages icon.
2. Then click on Text Tool. Now the cursor changes to I-beam.
3. Then Click on the left Master page where you want to put the page number.
4. Press Ctrl + Alt + P.
5. The page number displays as 'LM' on the left master page.
6. Similarly click on the right Master page where you want to put the page number.
7. Press Ctrl + Alt + P.
8. The page number displays as 'RM' on the right master page, but will appear correctly
on the actual pages. The element which comes under the respective domain is called
sub domain. And in other words, the sub domain in the topic if the study.

27. Write short notes on an Associative array.


➢ An associative array is a data structure that stores a collection of key-value pairs. The
keys are used to identify the values, and the values can be of any data type.
➢ The keys in an associative array are often called "labels" because they label or
identify the corresponding values.
Example:
$student = [ "Name" => "Ram", "Age" => 25, "Place" => "Trichy" ]

28. Write MySQL Connection Syntax with example.


Syntax:
mysqli-connect ("Server Name", "User Name", "Pass Word", "DB Name");
Example:
<?php
$servername = "localhost";
$username = "username";
$password = "password";
$DB_name = "School_DB";
$conn = mysqli_connect($servername, $username, $password,$DB_name);
?>

29. Write a note on Mobile networks.


➢ Mobile network is the network connecting devices without cable (wireless).
➢ Mobile computers, such as laptop, tablet, and hand-held computers, were fastest
growing segments.
➢ At land areas network was distributed as cells, each will be served by single location
transceiver, but generally three cell sites or a base transceiver station.

30. Write a note on name-your-own-price websites.


➢ Name-your-own-price website are just like normal retail sites. These websites
generate revenue through affiliate links, sponsored advertisement or even a small
commission in every booking.

➢ The buyer negotiates with the retailer for a particular product or service.

Example: https://in.hotels.com/

31. Compare and contrast the credit card and debit card.
Similarity of credit card and debit card
❖ The way of using debit cards and credit cards is generally the same.
❖ The debit card and credit card are identical in their physical properties.
Difference between credit card and debit card:
❖ Credit card:
o Normally used for retail transactions.
o The credit card issuer allows you to spend the money.
o The card issuer to payback the value later with an agreed interest.

❖ Debit card:
o Debit Card is an electronic payment card where the transaction amount is
deducted directly from the card holder's bank account upon authorization.
o Generally, debit cards function as ATM cards and act as a substitute for cash.

32. Write a note on UN/EDIFACT.


➢ United Nations / Electronic Data Interchange for Administration, Commerce and
Transport (UN EDIFACT) is an international EDI - standard developed under the
supervision of the United Nations.

➢ In 1987, the UN / EDIFACT syntax rules were approved as ISO: ISO9735 standard
by the International Organization for Standardization.

➢ EDIFACT includes a set of internationally agreed standards, catalogues and


guidelines for electronic exchange of structured data between independent computer
systems.

33. Write a note on Mobile networks.


➢ Mobile network is the network connecting devices without cable (wireless).
➢ Mobile computers, such as laptop, tablet, and hand-held computers, were fastest
growing segments.
➢ At land areas network was distributed as cells, each will be served by single location
transceiver, but generally three cell sites or a base transceiver station.

Part IV

34 a. Write the steps to draw a star using polygon tool?


1. Click on the Polygon tool from the toolbox. The cursor changes to a crosshair.
2. Click and drag anywhere on the screen. As you drag, a Polygon appears.
3. Release the mouse button when the Polygon is of the desired size.
4. Choose Element > Polygon Settings in the menu bar. Now Polygon Settings dialogue
box appears.
5. Type 5 in the Number of sides text box.
6. Type 50% in Star inset textbox.
7. Click OK. Now the required star appears on the screen.

34 b. Discuss in detail on various types of attributes in DBMS.


❖ Key Attribute:

✓ Generally, a key attribute describes a unique characteristic of an entity.

❖ Simple Attribute:

✓ The simple attributes cannot be separated. It will have a single value for that entity.
✓ For Example: Let us consider the name as the attribute for the entity employee and
here the value for that attribute is a single value.

❖ Composite Attributes:

✓ The composite attributes can be sub-divided into simple attributes without change in
the meaning of that attribute.
✓ For Example: In the above diagram the employee is the entity with the composite
attribute Name which are sub-divided into two simple attributes first and last name.

❖ Single Valued Attributes:

✓ A single valued attribute contains only one value for the attribute and they don't have
multiple number of values.
✓ For Example: Age - It is a single value for a person as we cannot give 'n' number of
ages for a single person, therefore it is a single valued attribute.

❖ Multi Valued Attributes:


✓ A multi valued attribute has more than one value for that particular attribute.
✓ For Example: Degree - A person can hold n number of degrees so it is a multi-valued
✓ attribute.

35 a. What are the datatypes in PHP? Explain.


Values assigned to variables in PHP will be of a set data type. The following are the eight
data types:
1. Integer: Integer is a data type which contains whole numbers. It can be positive,
negative,
or zero.
Example: $age = 30;
2. Float: Float is a data type which contains decimal numbers.
Example: $price = 19.99;
3. String: String is a data type which contains a sequence of characters enclosed in
single quotes (") or double quotes ("").
Example: $name = "Vijay Akash";
4. Boolean: Boolean is a data type which contains the value True or False. Example:
$is_admin = true;
5. Array: An array is a data type which has multiple values in a single variable.
Example: $prices = array(10, 20, 30);
6. Object: An object is a data type that represents an instance of a class. Example:
$user = new User();
7. Resource: A resource is a special type of data that represents a connection to an
external resource, such as a file or a database.
Example: $fp = fopen("file.txt", "r");
8. NULL: NULL is a special data type which contains NULL value. A null value
simply means no value. The keyword NULL is not case sensitive.
Example: $x = null;

35 b. Write a note on UN/EDIFACT.

Indexed array:
❖ An indexed array is an array that uses a numeric index to access its elements. The
index is a number that starts at 0 for the first element and increases by 1 for each
subsequent element.
❖ We can create an indexed array in PHP, by enclosing a comma-separated list of
values in square brackets (or) by using the array() function.

Syntax:
$arrayVariable = [ element1, element2, element3, ... elementN];
(or)
$arrayVariable = array( element1, element2, element3, ... elementN);
Examples:
(a) $fruits = ['apple', 'banana', 'orange'];
(b) $fruits = array('apple', 'banana', 'orange');

36 a. Explain 'foreach' loop with examples.


The foreach loop is used to iterate over elements of an array.
Syntax:
foreach ($array as $value)
{
//code to be executed;
}
Example:
To print the elements of an array:
$array = array(1, 2, 3, 4, 5);
foreach ($array as $value)
{
echo $value. "<br>";
Output:
12345

36 b. Explain in detail : Unified payments interface.


➢ Unified Payments Interface (UPI) is a real-time payment system developed by
National Payments Corporation of India (NCPI) to facilitate inter-bank transactions. It
is simple, secure and instant payment facility.
➢ This interface is regulated by the Reserve Bank of India and used for transferring
funds instantly between two bank accounts through mobile (platform) devices.
➢ UPI withdraws and deposits funds directly from requested. It also provides the "peer
to peer" collect request which can be scheduled and paid as per requirement and
convenience.
✓ UPI applications use two types of address - global and local.
❖ Global address includes bank account numbers and IFSC.
❖ Local address is a virtual payment address
➢ Virtual payment address (VPA) also called as UPI-ID, is a unique ID similar to email
id
➢ (e.g. name@bankname).
➢ VPA replaces bank account details thereby completely hides critical information.
➢ The MPIN (Mobile banking Personal Identification number) is required to confirm
each payment.
➢ UPI allows operating multiple bank accounts in a single mobile application.

37 a. Explain how the DNS is working.


➢ When the user enters the URL in the browser, the system first checks its DNS cache
for the corresponding IP address.
➢ If the IP address is found in the cache, then the information is retrieved from cache. If
not, the system needs to query the resolver about the IP address from Internet Service
Provider (ISP).
➢ Each resolver has its own cache and if it is found in that then that information is
retrieved. If not, then the query is passed to next domain server i.e., TLD (Top Level
Domain) which reviews the request and direct the query to name servers associated
with that specific domain.
➢ Until the query is solved it is passed to next level domains. Finally, the IP address is
detected and the corresponding record is sent to the resolver.

➢ Then the resolver returns the record back to the computer browser Now the user can
view the webpages for the detected IP address.

37 b. Discuss about OSI model with its layers.

OSI Layers:
1. Physical Layer:
➢ This is the 1st layer, it defines the electrical and physical specifications for
devices.

2. Data Link Layer:


➢ It is the 2nd layer and it guarantees that the data transmitted are free of
errors.
➢ This layer has simple protocols like "802.3 for Ethernet" and "802.11 for
Wi-Fi"

3. Network Layer:
➢ It is the 3rd layer determining the path of the data packets.
➢ This layer is responsible for routing of data packets using IP Addressing.
4. Transport Layer:
➢ It is the 4th layer that guarantees the transportation/sending of data
successfully.
➢ It includes the error checking operation.

5. Session Layer:
➢ It is the 5th layer, identifies the established system session between
different network entities.
➢ It controls dialogues between computers.

6. Presentation Layer:
➢ It is the 6th layer that does the translation of data to the next layer.
➢ Encryption and decryption protocols occur in this layer such as, SSL
(Secure Socket Layer).

7. Application Layer:
➢ It is the 7th layer, which acts as the user interface platform comprising of
software within the system.

38 a.What is meant by Registered Jack? Explain briefly the types Jacks.


A Registered Jack commonly known as RJ is a network interface used for network
cabling, wiring and jack construction. The primary function of the registered jack is to
connect different data equipment and telecommunication devices.
The commonly used registered jacks are:
❖ RJ-11:
➢ It is the most popular modern form of registered jack.
➢ It is found in home and office used for landline phones.
➢ There are 6 pins where the two pins give the transmission configuration, the two
pins give the receiver configuration and the other two pins will be kept for
reserved.
❖ RJ-14 and RJ-61:

➢ The RJ-14 is also used in telephone lines like RJ-11.


➢ It has 6 pins whereas the RJ-61 has 8 pins. RJ-61 uses the twisted pair cable to
connect the network devices.
❖ RJ-21:
➢ The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other
end. It is also called as champ connector or Amphenol connector. The Amphenol
is a connector manufacturer.
➢ The RJ-21 interface is typically used for data communication trucking
applications.

38 b.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy