11th Computer Science Study Materials English Medium
11th Computer Science Study Materials English Medium
www.Padasalai.Net www.TrbTnpsc.com
www.Padasalai.Net
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 1|Page
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
UNIT I - FUNDAMENTALS OF COMPUTER AND WORKING WITH A
TYPICAL OPERATING SYSTEMS (WINDOWS & LINUX)
www.Padasalai.Net
10.
11.
12.
Which generation of computer used IC’s?
a. First b. Second
__________ Example of First Generation Computer.
a. IBM 1401 b. VLSI
c. Third
d. ENIAC
Which of the following led us today to extremely high speed calculating device?
a. Laptop b. Tabulating machine c. Abacus d. ENIAC
13. _______ Languages used in Third generation Computer.
a. Machine Level b. Object Code
c. High Level d. Assembly Level
14. __________ Example is not in First Generation Computer.
a. IBM 1401 b. EDVAC c. UNVAC1 d. ENIAC
15. In second generation _________ component is used.
a. IC’s b. Microprocessor c. Transistor d. Vacuum tubes
16. _________ Example of Second Generation Computer.
a. IBM 1401 b. EDVAC c. UNVAC d. ENIAC
17. ___________ is defined as an unprocessed collection.
a. Datum b. Data c. Process d. Project
18. __________ Example is not in Second Generation Computer.
a. IBM 1401 b. UNVAC1108 c. IBM 360 Series d. UNIVA1
19. The CPU has ___________ components in Computer.
a. 2 b. 4 c. 3 d. 5
20. __________ Device is used to insert the Alpha-Numeric data into Computer.
a. Mouse b. Printer c. Monitor d. Keyboard
21. Which of the following is a Third generation of computer?
a. IBM1620 b. ENIAC
c. UNIVAC1 d. Honeywell 6000 series
22. ________ memory is a Volatile.
a. Primary b. PROM c. Secondary d. ROM
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 2|Page
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
23. The __________ converts any type of printed or written information including photographs
into a digital format.
a. Monitor b. Scanner
c. Printer d. Digital Camera
24. A _______ is a device for signaling by hand, by way of pressing one or more switches.
a. Keyboard b. Printer c. Keyer d. Touch Screen
25. Pictures on a monitor are formed with picture elements called _______.
a. Points b. Dots c. inches d. Pixels
26. A ________ printer that prints using a fixed number of pins or wires.
a. Laser b. Ink Jet c. Plotter d. Dot-matrix
27. _________ are used to produce computer output on a big screen.
a. Monitors b. Touch Screen
c. Plotter d. Multimedia Projector
28. An __________ is a basic software that makes the computer to work.
a. Ms-Office b. Ms-Paint c. Operation System d. Note Pad
29. Booting process has __________ Types.
a. 3 b. 2 c. 5 d. 1
30. __________ is the physical component of a computer.
a. Software b. Application c. Hardware d. Power
31. “An act of Calculating” means __________.
a. Computing b. Arithmetic c. numbers d. calculations
32. _____ is the first known calculating machine counting.
a. Analytical Engine b. Abacus
c. Calculator d. Computer
33. Super Conductors are used in __________ generation.
a. Fourth b. Second c. Fifth d. Third
34. Which software used in fifth generation computer?
www.Padasalai.Net
35.
36.
a. Artificial Neural Network
c. Robotics
b. Artificial Intelligence
d. Machine language
The first generation computers were used between ________.
a.1940 – 1955 b. 1941 – 1956 c. 1942 – 1955
The first generation computers used _______ for memory.
d. 1941- 1955
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 3|Page
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
47. ________is the physical component of a computer.
a. Hardware b. Software c. Application d. Picture
48. The speed of Inkjet printers generally range from __________ Page Per Minute.
a. 1-10 b. 1-15 c. 15-20 d.1-20
49. _______ serves as a voice Input device.
a. Speakers b. Scanner c. Printer d. Microphone
50. ________ is the set of programs or instructions.
a. Hardware b. Software c. Application d. Picture
51. The computer mouse as we know it today was invented and developed by ________.
a. Douglas Engelbart b. Douglas Lee c. Charles Babbage d. Napier
52. Third generation computers, used________
a. Vacuum Tube b. Transistor
c. Integrated Circuit d. Micro Processor
53. When the system starts from initial state _______
a. Computing b. Cold Booting c. Warm Booting d. BIOS
54. When the system restarts or when reset button is pressed, we call it ________.
a. Computing b. Cold Booting c. Warm Booting d. BIOS
55. The _________ is the combination of hardware and software.
a. Calculator b. Computer c. ALU d. CPU
56. CPU interprets and executes software instructions.
a. CPU b. ALU c. monitor d. mouse
57. The processing is performed by the__________
a. software b. information c. data d. hardware
58. Which of the following is not a input device?
a. Keyboard b. Mouse c. Scanners d. Printers
59. __________ Printers use color cartridges.
a. Laser b. Dot Matrix c. Thermal d. Inkjet
www.Padasalai.Net
60.
61.
62.
_________ is used to feed any form of data to the computer.
a. Output Unit b. Processing
_________unit is used to Display the data.
a. Output Unit b. Processing
c. Memory Unit
c. Memory Unit
_________ is used to Store the data into to the computer.
d. Input Unit
d. Input Unit
ABBREVIATION:
www.Padasalai.Net
GUI -
VLSI -
ULSI –
ENIAC-
NLP -
Graphical User Interface
Very Large Scale Integrated Circuits.
Ultra Large Scale Integration
Electronic Numerical Integrator And Calculator
Natural Language Processing
AI - Artificial Intelligence
RAM – Random Access Memory
ROM – Read Only Memory
QR – Quick Response
OCR – Optical Character Reader
CCD - Charge Coupled Device
CRT - Cathode Ray Tube
LCD - Liquid Crystal Display
LED - Light Emitting Diode
VGA - Video Graphics Array
CPS - Character Per Second
PIXEL – Picture Element
CPS - Character Per Second
DPI - Dots Per Inch
PPM - Page Per Minute
POST - Power on Self Test
BIOS - Basic Input Output System
OS - Operating system
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 5|Page
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
1. What is a Computer?
A computer is an electronic device that manipulates information, or data. It has the ability
to store, retrieve, and process data.
Computer works faster than human being and given the values more accuracy and reliable.
www.Padasalai.Net
Fifth Generation
Sixth Generation In future
The ENIAC (Electronic Numerical Integrator And Calculator) was invented by J. Presper Eckert
and John Mauchly.
It occupied about 1,800 square feet and used about 18,000 vacuum tubes, weighing almost 50 tons.
ENIAC was the first digital computer because it was fully functional.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 6|Page
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
There are many types of monitors available such as CRT (Cathode Ray Tube), LCD (Liquid
Crystal Display) and LED (Light Emitting Diodes). The monitor works with the VGA (Video
Graphics Array) card.
The video graphics card helps the keyboard to communicate with the screen. It acts as an
interface between the computer and display monitor. Usually the recent motherboards incorporate
built-in video card.
www.Padasalai.Net
Output Unit
An Output Unit is any hardware component that conveys information to users in an
understandable form. Example: Monitor, Printer etc.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 7|Page
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
16. Distinguish between Primary memory and Secondary Memory.
The Primary Memory is volatile, that is, the content is lost when the power
supply is switched off.
The Random Access Memory (RAM) is an example of a main memory.
The Secondary memory is non volatile, that is, the content is
available even after the power supply is switched off.
Hard disk, CD-ROM and DVD ROM are examples of secondary memory.
17. List out the Types of Input Devices.
Keyboard, Mouse, Scanners, Track Ball, Optical Character Reader, Input Voice System,
Light Pen, Bar Code / QR Code Reader, Digital Camera, Touch Screen, Keyer are the Input
Devices.
www.Padasalai.Net
20. Write about Sixth Generation Computer.
Main Component
Generation Period Merits/Demerits
used
• Big in size
First 1942- • Consumed more power
Vacuum tubes
Generation 1955 • Malfunction due to overheat
• Machine Language was used
First Generation Computers - ENIAC , EDVAC , UNIVAC 1 ENIAC weighed about 27 tons,
size 8 feet × 100 feet × 3 feet and consumed around 150 watts of power
• Smaller compared to First Generation
• Generated Less Heat
• Consumed less power compared to first
Second 1955- generation
Transistors
Generation 1964 • Punched cards were used
• First operating system was developed - Batch
Processing and Multiprogramming
Operating System
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 8|Page
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
• Machine language as well as Assembly
language was used.
Second Generation Computers IBM 1401, IBM 1620, UNIVAC 1108
• Computers were smaller, faster and more
reliable
Third 1964 Integrated
• Consumed less power
Generation -1975 Circuits (IC)
• High Level Languages were
used
Third Generation Computers IBM 360 series, Honeywell 6000 series
Microprocessor • Smaller and Faster
Fourth 1975- Very Large Scale • Microcomputer series such as IBM and
Generation 1980 Integrated Circuits APPLE were developed
(VLSI) • Portable Computers were introduced.
• Parallel Processing
• Super conductors
• Computers size was drastically reduced.
1980 - Ultra Large • Can recognize Images and Graphics
Fifth
till Scale Integration • Introduction of Artificial Intelligence and
Generation
date (ULSI) Expert Systems
• Able to solve high complex problems
including decision making and logical
reasoning
• Parallel and Distributed computing
• Computers have become smarter, faster and
Sixth In smaller
Generation future • Development of robotics
www.Padasalai.Net
• Natural Language Processing
• Development of Voice Recognition Software
(1) Keyboard:
Keyboard (wired / wireless, virtual) is the most common input device used today. The
individual keys for letters, numbers and special characters are collectively known as character keys.
This keyboard layout is derived from the keyboard of original typewriter. The data and instructions
are given as input to the computer by typing on the keyboard. Apart from alphabet and numeric
keys, it also has Function keys for performing different functions. There are different set of keys
available in the keyboard such as character keys, modifier keys, system and GUI keys, enter and
editing keys, function keys, navigation keys, numeric keypad and lock-keys.
(2) Mouse:
Mouse (wired/wireless) is a pointing device used to control the movement of the cursor on
the display screen. It can be used to select icons, menus, command buttons or activate something on
a computer. Some mouse actions are move, click, double click, right click, drag and drop.
(3) Scanner:
Scanners are used to enter the information directly into the computer’s memory. This device
works like a Xerox machine. The scanner converts any type of printed or written information
including photographs into a digital format, which can be manipulated by the computer.
(4)Fingerprint Scanner:
Finger print Scanner is a fingerprint recognition device used for computer security,
equipped with the fingerprint recognition feature that uses biometric technology. Fingerprint
Reader / Scanner is a very safe and convenient device for security instead of using passwords,
which is vulnerable to fraud and is hard to remember.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 9|Page
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
(5) Track Ball:
Track ball is similar to the upside- down design of the mouse.
The user moves the ball directly, while the device itself remains stationary. The user spins the ball
in various directions to navigate the screen movements.
(6) Retinal Scanner:
This performs a retinal scan which is a biometric technique that uses unique patterns on a
person's retinal blood vessels.
(7) Light Pen:
A light pen is a pointing device shaped like a pen and is connected to a monitor. Te tip of
the light pen contains a light-sensitive element which detects the light from the screen enabling the
computer to identify the location of the pen on the screen. Light pens have the advantage of
‘drawing’ directly onto the screen, but this becomes hard to use, and is also not accurate.
(8) Optical Character Reader:
It is a device which detects characters printed or written on a paper with OCR, a user can
scan a page from a book. The Computer will recognize the characters in the page as letters and
punctuation marks and stores. The Scanned document can be edited using a word processor.
(9) Bar Code / QR Code Reader:
A Bar code is a pattern printed in lines of different thickness. Te Bar code reader scans the
information on the bar codes transmits to the Computer for further processing. Te system gives fast
and error free entry of information into the computer. QR (Quick response) Code: The QR code is
the two dimension bar code which can be read by a camera and processed to interpreter the image
(10) Voice Input Systems:
Microphone serves as a voice Input device. It captures the voice data and sends it to the
Computer. Using the microphone along with speech recognition software can offer a completely
new approach to input information into the Computer.
(11) Digital Camera:
It captures images / videos directly in the digital form. It uses a CCD (Charge Coupled
www.Padasalai.Net
Device) electronic chip. When light falls on the chip through the lens, it converts light rays into
digital format.
(12) Touch Screen:
A touch screen is a display device that allows the user to interact with a computer by using
the finger. It can be quite useful as an alternative to a mouse or keyboard for navigating a Graphical
User Interface (GUI). Touch screens are used on a wide variety of devices such as computers,
laptops, monitors, smart phones, tablets, cash registers and information kiosks. Some touch screens
use a grid of infrared beams to sense the presence of a finger instead of utilizing touch-sensitive
input.
(13) Keyer:
A Keyer is a device for signaling by hand, by way of pressing one or more switches.
Modern keyers have a large number of switches but not as many as a full size keyboard. Typically,
this number is between 4 and 50. A keyer differs from a keyboard, which has "no board", but the
keys are arranged in a cluster.
Output Devices:
(1) Monitor:
Monitor is the most commonly used output device to display the information. It looks like a
TV. Pictures on a monitor are formed with picture elements called PIXELS. Monitors may either
be Monochrome which display text or images in Black and White or can be color, which display
results in multiple colors. There are many types of monitors available such as CRT (Cathode Ray
Tube), LCD (Liquid Crystal Display) and LED (Light Emitting Diodes). The monitor works with
the VGA (Video Graphics Array) card. The video graphics card helps the keyboard to
communicate with the screen. It acts as an interface between the computer and display monitor.
Usually the recent motherboards incorporate built-in video card.
The first computer monitor was part of the Xerox Alto computer system, which was
released on March 1, 1973.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 10 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
(2) Plotter:
Plotter is an output device that is used to produce graphical output on papers. It uses single
color or multi color pens to draw pictures.
(3) Printers:
Printers are used to print the information on papers. Printers are divided into two main
categories:
• Impact Printers
• Non Impact printers
Impact Printers
These printers print with striking of hammers or pins on ribbon. These printers
can print on multi-part (using carbon papers) by using mechanical pressure. For
example, Dot Matrix printers and Line matrix printers are impact printers.
A Dot matrix printer that prints using a fixed number of pins or wires. Each dot is produced by a
tiny metal rod, also called a “wire” or “pin”, which works by the power of a tiny electromagnet or
solenoid, either directly or through a set of small levers. It generally prints one line of text at a time.
Te printing speed of these printers varies from 30 to 1550 CPS (Character Per Second).
Line matrix printers use a fixed print head for printing. Basically, it prints
a page-wide line of dots. But it builds up a line of text by printing lines of dots. Line
printers are capable of printing much more than 1000 Lines Per Minute, resulting
in thousands of pages per hour. These printers also uses mechanical pressure to print on multi-part
(using carbon papers).
Non-Impact Printers
These printers do not use striking mechanism for printing. They use
electrostatic or laser technology. Quality and speed of these printers are better than
www.Padasalai.Net
Impact printers. For example, Laser printers and Inkjet printers are non-impact printers.
Laser Printers
beam
Laser printers mostly work with similar technology used by photocopiers. It makes a laser
scan back and forth across a drum inside the printer,
building up a pattern. It can produce very good quality of graphic images. One of the chief
characteristics of laser printer is their resolution – how many Dots per inch(DPI). The available
resolution range around 1200 dpi. Approximately it can print 100 pages per minute(PPM).
Inkjet Printers:
Inkjet Printers use colour cartridges which combined Magenta, Yellow and Cyan inks to
create color tones. A black cartridge is also used for monochrome output. Inkjet
printers work by spraying ionized ink at a sheet of paper. Te speed of Inkjet printers generally
range from 1-20 PPM (Page Per Minute).
They use the technology of firing ink by heating it so that it explodes
towards the paper in bubbles or by using piezoelectricity in which tiny electric
currents controlled by electronic circuits are used inside the printer to spread ink
in jet speed. An Inkjet printer can spread millions of dots of ink at the paper every single second.
Speakers:
Speakers produce voice output (audio) . Using speaker along with speech synthesize
software, the computer can provide voice output. This has become very common in places like
airlines, schools, banks, railway stations, etc..
Multimedia Projectors:
Multimedia projectors are used to produce computer output on a big screen.
These are used to display presentations in meeting halls or in classrooms.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 11 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
3. Explain the Components of a Computer
The computer is the combination of hardware and software. Hardware is the physical
component of a computer like motherboard, memory devices, monitor, keyboard etc., while
software is the set of programs or instructions. Both hardware and software together make the
computer system to function.
Let us first have a look at the functional components of a computer.
Every task given to a computer follows an Input- Process- Output Cycle (IPO cycle). It needs
certain input, processes that input and produces the desired output. The input unit takes the input,
the central processing unit does the processing of data and the output unit produces the output. The
memory unit holds the data and instructions during the processing.
www.Padasalai.Net
Input unit is used to feed any form of data to the computer, which can be stored in the
memory unit for further processing. Example: Keyboard, mouse, etc.
Central Processing Unit
CPU is the major component which interprets and executes software
instructions. It also controls the operation of all other components such as memory, input and
output units. It accepts binary data as input, process the data according to the instructions and
provide the result as output. The CPU has three components which are Control unit, Arithmetic and
logic unit (ALU) and Memory unit.
Arithmetic and Logic Unit
The ALU is a part of the CPU where various computing functions are
performed on data. The ALU performs arithmetic operations such as addition, subtraction,
multiplication, division and logical operations. The result of an operation is stored in internal
memory of CPU. The logical operations of ALU promote the decision-making ability of a
computer.
Control Unit
The control unit controls the flow of data between the CPU, memory and
I/O devices. It also controls the entire operation of a computer.
Output Unit
An Output Unit is any hardware component that conveys information to
users in an understandable form. Example: Monitor, Printer etc.
Memory Unit
The Memory Unit is of two types which are primary memory and secondary
memory. The primary memory is used to temporarily store the programs and data when the
instructions are ready to execute. The secondary memory is used to store the data permanently. The
Primary Memory is volatile, that is, the content is lost when the power supply is switched off. The
Random Access Memory (RAM) is an example of a main memory. The Secondary memory is non
volatile, that is, the content is available even after the power supply is switched off. Hard disk, CD-
ROM and DVD ROM are examples of secondary memory.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 12 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
CHAPTER -2 NUMBER SYSTEM
PART - I
Choose the Correct Answer:
www.Padasalai.Net
10.
11.
12.
A _______ is a collection of 4 bits.
A) Byte B) Boolean C) MB
The most commonly used numbering system is the __________ system.
A) Binary B) Decimal C) Octal
D) Nibble
D) Hexadecimal
A _____ is small piece of data that is derived from the words “BInary DigiT”.
A) Byte B) BIT C) Kilo Byte D) Mega Byte
13. A collection of 8 bits is called as a __________.
A) Byte B) KB C) Bit D) MB
14. ____ have only two possible values, 0 and 1.
A) Byte B) KB C) BIT D) MB
15. The most commonly used coding scheme __________.
A) BCD B) ASCII C) EBCID D) ISCII
16. The left most bit in the binary number is called as _________.
A) LSB B) SLB C) MSB D) LMB
17. The right most bit in the binary number is called as _________.
A) LSB B) SLB C) MSB D) LMB
18. The ASCII value for a Blank character is ___________.
A) 8 B) 16 C) 32 D) 64
19. The ASCII value range for the upper case alphabets is ____________.
A) 0 – 48 B) 97 to 122 C) 0 – 127 D) 65 to 90
20. The radix of an Binary number is _____________.
A) 2 B) 8 C) 4 D) 16
21. The radix of an octal number is _____________.
A) 2 B) 8 C) 4 D) 16
22. The radix of an Decimal number is _____________.
A) 2 B) 8 C) 10 D) 16
23. The radix of an Hexadecimal number is _____________.
A) 2 B) 8 C) 4 D) 16
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 13 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
24. How the information entered into computer?
A) knowledge B) Data C) ASCII value D) BCD
25. Data means a ________.
A) Set of Information B) Set of Record C) Set of Values D) Set of Files
26. Singular form of Data __________.
A) Record B) File C) Values D) Datum
27. How the messages represented in computers?
A) Information B) Data C) Knowledge D) All of these
28. In a computer, a data is converted into __________.
A) ASCII form B) BCD form C) Binary form D) Octal form
29. 4 Bits = _______.
A) Bit B) Byte C) Word D) Nibble
30. Which is used to measure the number of bits in each word?
A) Word Length B) Length C) Size D) Word Size
31. A word can have a length of _________.
A) 2,5,10 bits B) 15,25,50 bits C) 16,32,64 bits D) 12,24,48 bits
32. Who coined the term byte?
A) Charles Babbage B) John Von Newmann
C) Werner Buchholz D) Herman Helirith
33. A number system can be derived from a _________.
A) bit B) byte C) base or radix D)nibble or word
34. How many standard number system are there to use?
A) 2 B) 4 C) 8 D) 16
35. Which of the following is not a standard number system?
A) Pentagon B) Hexadecimal C) Decimal D) Binary
36. The Radix of Hexadecimal is _________.
A) 6 B) 10 C) 16 D) 8
www.Padasalai.Net
37.
38.
39.
Which digit is not allowed in Hexadecimal number system?
A) G B) B
The decimal value of 1010.012 is _______.
A) 10.5 B) 10.25
C) E
C) 10.05
In binary numbers, the signed positive number has a prefix?
D) D
D) 10.025
A) + B) 0 C) 1 D) –
40. In binary numbers, the signed negative number has a prefix?
A) + B) 0 C) 1 D) –
41. The 4 bit binary equivalent of -5 is ________.
A) 1101 B) 0101 C) 1100 D) -101
42. A Latin prefix Deci means ______.
A) 2 B) 8 C) 16 D) 10
43. How many procedures are there to convert from decimal to binary?
A) 2 B) 4 C) 8 D) 3
44. The most commonly used number system is _________.
A) Binary B) Hexadecimal C) Decimal D) Octal
45. BCD is ____ bit code.
A) 16 B) 8 C) 4 D) 2
46. Which coding scheme is used to LCD?
A) Unicode B) ASCII C) EBCDIC D) BCD
47. Enhanced BCD is _____ bit code.
A) 2 B) 4 C) 6 D) 8
48. EBCDIC primarily used in ____ Computers.
A) IBM B) APPLE C) PENTUM D) LAPTOP
49. EBCDIC uses ____ bit coding scheme.
A) 16 B) 8 C) 4 D) 2
50. The Total number of characters coded using EBCDIC is ________.
A) 32 B) 64 C) 128 D) 256
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 14 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
51. Which of the following the newest concept in digital coding?
A) ASCII B) Unicode C) EBCDIC D) Byte Code
52. Unicode is a ______ bit code.
A) 8 B) 4 C) 16 D) 32
53. Which coding schemes have 65000 representations?
A) Byte code B) Binary code C) EBCDIC D) Unicode
54. Which coding schemes used by Asian Languages?
A) Unicode B) ASCII C) EBCDIC D) BCD
55. Which of the program used Unicode?
A) C B) C++ C) Java D) None of these
56. The decimal equivalent of 0.0112 is _______.
A) 0.6875 B) 0.1875 C) 0.1785 D) 0.5
57. 1’s complement of 10012 is __________.
A) 10012 B) 01112 C) 01102 D) 10102
58. The most popular way of representing negative numbers in computer system is ______.
A) 1’s Complement B) Signed Bit C) 2’s Complement D) All of these
59. Which complement performs the logical negation on each individual bit?
A) Signed B) Unsigned C) 2’s D) 1’s
60. The 2’s complement of 11012 is _______.
A) 11002 B) 10102 C) 01012 D) 00112
61. The 2’s complement of 11002 is _______.
A) 11102 B) 01002 C) 01012 D) 00112
62. 102 + 102 = _________.
A) 1002 B) 202 C) 1102 D) 102
63. The ASCII value of put Zero ( 0 ) is _____.
A) 48 B) 58 C) 65 D) 30
63. ISCII has been used by ________.
www.Padasalai.Net
64.
65.
A) IBM
A) IWG – TSC
B) Apple
TSCII is Proposed by ______.
B) Apple
C) Microsoft
C) IBM
Entire Tamil alphabets handled by the coding Schemes _____.
A) EBCDIC B) ASCII C) ISCII
D) A & B
D) Microsoft
D) TSCII
66. The Tamil alphabets have _______.
A) Soup B) Grantha C) Numerals D) All of those
67. The number of Tamil glyphs is about _____.
A) 255 B) 128 C) 170 D) 256
68. Which indicates whether the given value is positive or negative ?
A) Signed bit B) Unsigned bit
C) 1’s Complement D) 2’s Complement
69. 160 is equivalent to ____ value.
A) 0 B) 1 C) 16 D) A & B
70. In Hexadecimal number system B represents the digit.
A) 11 B) 12 C) 14 D) 13
71. The Binary equivalent of Hexadecimal value C is repressed by ________.
A) 1010 B) 1011 C) 1101 D) 1100
72. The Hexadecimal equivalent of 1011 is _____.
A) 14 B) 13 C) 11 D) 15
73. Which of the following is not a parameter to find the magnitude of a number?
A) Absolute Value B) Positional Value
C) Base Value D) Number System
74. How many parameters are considered to find the magnitude of a number?
A) 3 B) 4 C) 2 D) 5
75. Which of the following idea behind positional numbering system?
A) Absolute Value B) Place volume C) Radix D) All of these
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 15 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
ABBREVIATION :
1. What is Data?
The term data comes from the word datum, which means a raw fact. The data is a fact
about people, places or some objects.
www.Padasalai.Net
It’s a positive number. 1’s complements apply only with negative number.
46 / 2 = 23 =0 MSB
23 / 2 = 11= 1
11 / 2 = 5 = 1
(46)10 = (101110)2
5/2=2 =1
2/2=1 =0
LSB
7. Convert (150)10 into Binary, then convert that Binary number to Octal.
(150)10 = ( ? )2 (10010110)2 = ( ? )8
150 / 2 = 75 =0 MSB
75 / 2 = 37 =1 = 010 010 110
37 / 2 = 18 =1
18 / 2 = 9 =0 = 2 2 6
9/2 =4 =1
4/2 =2 =0 (10010110)2 = (226)8
2/2 =1 =0
LSB
(150)10 = (10010110)2
ISCII is the system of handling the character of Indian local languages. This as a 8-bit
www.Padasalai.Net
coding system. Therefore it can handle 256 (28) characters. This system is formulated by the
department of Electronics in India in the year 1986 - 88 and recognized by Bureau of Indian
Standards (BIS). Now this coding system is integrated with Unicode.
a) -2210+1510
+15’s binary value = 1111 as 8 bit format is 0000 1111 ans of (+15)
22’s binary value = 10110
8 bit format = 0001 0110
1110 1010
+ 0000 1111
= 1111 1001 final answer
b) 2010+2510
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 17 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
The method of repeated multiplication by 2 has to be used to convert such kind of decimal
fractions.
Step 1: Multiply the decimal fraction by 2 and note the integer part. The integer part is
either 0 or 1.
Step 2: Discard the integer part of the previous product. Multiply the fractional part of
the previous product by 2. Repeat Step 1 until the same fraction repeats or terminates (0).
Step 3: The resulting integer part forms a sequence of 0s and 1s that become the binary
equivalent of decimal fraction.
Step 4: The final answer is to be written from first integer part obtained till the last
integer part obtained.
www.Padasalai.Net
03 / 2
01 / 2
=
=
= (1100010)2
1
0
=1
=1 LSB
.44x2=.88 = 0
.88x2=.76 = 1
.76x2=.52 = 1
.52x2=.04 = 1
.04x2=.08 = 0 MSB
Final Answer is
= (1100010 + 0.01110101110)2 = (01110101110)2
(98.46)10 =(1100010.0111010101110)2
12. Find 1’s Complement and 2’s Complement for the following Decimal number
a) -98 b) -135
a) -98 b) -135
98’s Binary value is 1100010 [find the value 135’s Binary value is 10000111 [find the value
through divide by 2] through divide by 2]
8 bit format is 0110 0010 8 bit format is 1000 0111
1’s Complement 10011101 1’s Complement 0111 1000
2’s Complement +1 2’s Complement +1
1001 1110 (-98) 0111 1001 (-135)
1101010 1101011
(+) 0101101 (-) 0111010
10010111 = (10010111)2 0110001 = (0110001)2
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 18 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
PART - II
BOOLEAN ALGEBRA
www.Padasalai.Net
Boolean algebra has been given in honor of an English mathematician George Boole who
proposed the basic principles of this algebra.
Associative Law
A+(B+C) = (A+B)+C
A.(B.C) = (A.B).C
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 19 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
5. What are derived gates?
The logic gates like NAND, NOR, XOR and XNOR are derived gates which are derived
from the fundamental gates.
www.Padasalai.Net
output is "true" if the inputs are the same, and
"false" if the inputs are different.. In simple words,
the output is 1 if the input are the same, otherwise
the output is 0.
8. Reason out why the NAND an NOR are called universal gates?
NAND and NOR gates are called Universal gates, because the fundamental logical gates
can be realized through them.
Explain in Detail:
1. Explain the fundamental gates with expression and truth table.
AND Gate
The AND gate can have two or more input signals and produce an output signal. The output
is "true" only when both inputs are "true", otherwise, the output is "false". In other words the
output will be 1 if and only if both inputs are 1; otherwise the output is 0. The output of the AND
gate is represented by available say C, where A and B are two and if input Boolean variables. In
Boolean algebra, a variable can take either of the values '0' or '1'.
The logical symbol of the AND gate is
One way to symbolize the action of an AND gate is by writing the Boolean function.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 20 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
C = A AND B
In Boolean algebra the multiplication sign stands for the AND operation. Therefore, the output of
the AND gate is
C = A . B or simply C = AB
Read this as "C equals A AND B".
Since there are two input variables here, the truth table has four entries, because there
are four possible inputs : 00, 01, 10 and 11.
OR Gate
The OR gate gets its name from its behavior like the logical inclusive "OR". The output is
"true" if either or both of the inputs are "true". If both inputs are "false" then the output is "false".
In other words the output will be 1 if and only if one or both inputs are 1; otherwise, the output is
0.
The Logical symbol of the OR gate is The Truth Table for OR gate is
www.Padasalai.Net
C = A OR B
We use the + sign to denote the OR function.
Therefore,
For instance,
C=A+B
C=A+B=1+1=1
NOT Gate
The NOT gate, called a logical inverter, has only one input. It reverses the
logical state. In other words the output C is always the complement of the input.
The Logical Symbol of the NOT gate is
The Boolean function of NOT gate is
C = NOT A
In Boolean Algebra, the Over bar stands for
NOT operation. Therefore,
C=A
The Truth Table of NOT gate is Read this as "C equals NOT A" or "C equals
The complement of A".
If A is 0,
C=0=1
On the other hand, if A is 1,
C=1=0
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 21 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
2. How AND and OR can be realized using NAND and NOR gates.
AND operation
A
NAND A.B NAND A.B
B
OR operation
A.A
A NAND
NAND A+B
B.B
B NAND
AND operation
www.Padasalai.Net
A.B = (A NOR A) NOR (B NOR B)
OR operation
NOR Gate
The NOR gate circuit is an OR gate followed by an an inverter. Its output is
"true" if both inputs are "false" Otherwise, the output is "false". In other words, the
only way to get '1' as output is to have both inputs '0'. Otherwise the output is 0.
The logic circuit of the NOR gate is The Logic Symbol of NOR Gate
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 22 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
C = ( 0 + 0) = 0 = 1.
NAND Gate
The NAND gate operates an AND gate followed by a NOT gate. It acts in the
manner of the logical operation "AND" followed by inversion. The output is "false"
if both inputs are "true", otherwise, the output is "true". In other words the output of the NAND
gate is 0 if and only if both the inputs are 1, otherwise the output is 1.
The output of the NAND gate is The truth table for NAND gate is
www.Padasalai.Net
C = (A . B)
Read this as "C" equals NOT of A AND B" or
"C" equals the complement of A AND B".
For example if both the inputs are 1
C = (1 . 1)= 1 = 0
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 23 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
5. Draw the Logic Gates with Corresponding Truth Tables.
www.Padasalai.Net
Extra Question and Answers:
3. Write the Types of Number System and its radix (basic value).
There are Four types of Number System.
Types Radix (basic value)
Binary Number 2
Octal Numbers 8
Decimal Numbers 10
Hexadecimal Numbers 16
The above number systems are also called as Positional value System.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 24 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
5. What is Information?
The Information is a set of processed data.
8. What is Bit?
The most basic unit of information in a digital computer is called as a Bit. A bit is Binary
digit which can be 0 or 1.
9. What is Byte?
Byte is a group of 8 bits which is used to represent a character. A byte is considered as the
basic unit of measuring the memory size in the computer.
12. Which parameters are used to determine the magnitude of a number or the value of
each digit in a number?
www.Padasalai.Net
o Absolute value
o Place Value or positional value
o Base value
13. How many procedures for converting from decimal to binary? What are they?
There are two procedures for converting from decimal to binary.
They are: a) Expansion Method b) Repeated division by 2.
15. Convert 1011012 to its decimal equivalents using double dabble method.
16. How the binary number represented by signed and unsigned bit?
In Binary, a negative number may be represented by prefixing a digit 1 to the number while
number while a positive number may be represented by prefixing a digit 0.
20. If a user types 256 (in Decimal) using BCD coding. What is the number stored in
memory of the computer?
The number stored as 0010010110.
1010100.0112
= 1 x 26 + 0 x 25 + 1 x 24 + 0 x 23 + 1 x 22 + 0 x 21 + 0 x 20 + 0 x 2-1 + 1 x 2-2 + 1 x 2-3
= 64 + 0 + 16 + 0 + 4 + 0 + 0 + 0 + 0.25 + 0`125
= 84.32510.
= 10110.012
www.Padasalai.Net
23. Convert 110111101011102 to Hexadecimal number.
110111101011102
Group in fours 0011 0111 1010 1110
Convert each number 3 7 A E
= 37AE16.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 26 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
Explain in Detail:
www.Padasalai.Net
The places to left of the octal point are positive powers of 8 and places to right are
negative powers of 8.
Hexadecimal Number System
o A hexadecimal number is represented using base 16.
o Hexadecimal or Hex numbers are used as a shorthand form of binary sequence.
o This system is used to represent data in a more compact manner.
o It has 16 symbols are used, 0 to F, the notation is called hexadecimal.
o The first 10 symbols are the same as in the decimal system, 0 to 9 and the remaining
6 symbols are taken from the first 6 letters of the alphabet sequence, A to F, where
A represents 10, B is 11, C is 12, D is 13, E is 14 and F is 15.
v) Unicode
This coding system is used in most of the modern computers. The popular coding
scheme after ASCII is Unicode. ASCII can represent only 256 characters. Therefore
English and European Languages alone can be handled by ASCII. Particularly there was
a situation, when the languages like Tamil, Malayalam, Kannada and Telugu could
not be represented by ASCII. Hence, the Unicode was generated to handle all the coding
system of Universal languages. This is 16 bit code and can handle 65536 characters.
Unicode scheme is denoted by hexadecimal numbers.
www.Padasalai.Net
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 28 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
CHAPTER – 3 COMPUTER ORGANIZATIONS
www.Padasalai.Net
a) I / O devices b) Software c) CPU d) Main memory
12. Which of the following deals with the hardware components of a computer system?
a) Application software
c) Computer Organization
b) Computer architecture
d) System software
13. Which of the following involved in designing a computer?
a) Computer Architecture b) Computer Organization
c) Computer Software d) Memory
14. Which of the following performs all tasks in the computer?
a) Chips b) Bus c) CPU d) I / O devices
15. Microprocessors were first introduced in the early?
a) 1956 b) 1958 c) 1960 d) 1970
16. The first general purpose Microprocessor developed by ________.
a) IBM b) Intel c) Apple d) Microsoft
17. Microprocessor is driven by _______.
a) Clock pulses b) ALU c) Control unit d) Register
18. The first general purpose Microprocessor was ______.
a) 5005 b) 4004 c) 8085 d) 8086
19. Which of the following is an integrated circuit?
a) Personal computer b) Microprocessor
c) INTEL d) Transistor
20. Which of the following is a programmable multipurpose silicon chip that is based on a
register?
a) Microprocessor b) Clock c) Address Bus d) Data bus
21. How many units the Microprocessor is made?
a) 1 b) 2 c) 3 d) 4
22. Which of the following process computer instructions?
a) ALU b) Control Unit c) Register d) Microprocessor
23. Which of the following control the operations through signals?
a) Register b) Control Unit c) Intel d) ALU
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 29 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
24. Which holds the instruction and data for the execution of the processor?
a) ALU b) Control Unit c) Register d) System Bus
25. System Bus is the collection of ______ buses.
a) 2 b) 3 c) 4 d) 6
26. System Bus is the collection of _________.
a) Address Bus b) Data Bus c) Control Bus d) All of these
27. Which of the following act as a communication channels between the microprocessor and
devices?
a) ALU b) Control Unit c) Register d) System Bus
28. How many characteristics the microprocessor depends on?
a) 2 b) 3 c) 4 d) 8
29. Which of the following is not the characteristics of Microprocessor?
a) Clock Speed b) Instruction set c) Word size d) System Bus
30. Which of the following is not the unit of Microprocessor?
a) ALU b) Clock speed c) Control unit d) Register
31. The speed at which the microprocessor executes instructions is called?
a) Clock speed b) Clock rate c) Clock bus d) Clock size
32. Clock speed is measured in _______.
a) MHz b) GHz c) a & b d) BPS
33. Which of the following regulates the speed of the microprocessor?
a) Program counter b) Instruction set c) ALU d) Clock
34. One Hertz = ______ cycle per second.
a) 0 b) 1 c) 2 d) 3
35. Which of the following used to measure the speed of computer processors?
a) Clock rate b) Clock speed c) Word size d) Hertz
36. Expansion of MHz is _________.
a) Memory Hertz b) Mega Hertz c) Micro Hertz d) Main Hertz
www.Padasalai.Net
37. How many types of operations carried out of instruction set?
a) 5 b) 4 c) 3 d) 2
38. Which of the following in turn determines architecture of the microprocessor?
a) I / O pins b) Control flow c) Data transfer d) Operations
39. Which of the following determines the amount of RAM accessed at the time?
a) Clock speed b) Word size c) Hertz d) Data bus
40. Which of the following accessed the total number of pins on the microprocessor?
a) Hertz b) Clock speed c) System Bus d) Word Size
41. The first commercial microprocessor is a _____ bit.
a) 8 b) 16 c) 3 d) 2
42. In Microprocessor, the total output pins is always _______ to the total input pins.
a) equal b) greater than c) less than d) not equal
43. The present microprocessor use ____ bit architecture.
a) 8 or 16 b) 4 or 8 c) 32 or 64 d) 64 or 128
44. How many types of Register the CPU has?
a) 4 b) 2 c) 8 d) 16
45. Expansion of MDR is ____.
a) Mega Data Register b) Micro Data Register
c) Memory Data Register d) Machine Data Register
46. Expansion of MAR is _____.
a) Memory Address Register b) Micro Address Register
c) Memory Add Register d) Microprocessor Address Recognition
47. Which of the following bus is used to point a memory location?
a) System Bus b) Data Bus c) Address Bus d) Control Bus
48. Which of the following bus is used to transfer information between CPU and the memory?
a) System Bus b) Data Bus c) Control Bus d) Address Bus
49. Which bus in unidirectional?
a) System Bus b) Data Bus c) Control Bus d) Address Bus
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 30 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
50. Which has controls read or write operations?
a) System Bus b) Data Bus c) Control Bus d) Address Bus
51. The read operation transfer data from memory to ______.
a) MAR b) MDR c) PC d) Instruction set
52. Which operation transfers data from the MDR to memory?
a) Read b) Copy c) Move d) Write
53. In 8 bit processor, its MDR and the word in the memory have ________ bit.
a) 16 b) 8 c) 256 d) 64
54. How many types of Microprocessor are there?
a) 2 b) 4 c) 3 d) 8
55. How many classification of Microprocessor are there based on the Data Width?
a) 4 b) 8 c) 16 d) 64
56. Which of the following microprocessor is not the classification based on data size?
a) 8 b) 16 c) 32 d) 128
57. How many types of Microprocessor are there based on Instruction set?
a) 8 b) 16 c) 4 d) 2
58. Expansion of RISC is _________.
a) Reduced Information Set Computers b) Reduced Instruction Set Computers
c) Reading Information Set Computers d) Reader Inclusion System Computers
59. Expansion of CISC is _______.
a) Communication information Set Computers
b) Complex Information Set Computers
c) Classified Instruction Set Computers
d) Complex Instruction Set Computers
60. Which of the following is not an example of RISC processor?
a) Intel P6 b) Pentium IV c) Pentium II d) AMD K6
61. Which of the following is not an example of CISC processor?
www.Padasalai.Net
a) Intel P6 b) Pentium IV
62. Expansion of DVD is _________.
a) Digital Versatile Disc
c) Digital Versatile Digital
63. The color of double-layered DVD is _____.
c) Pentium II d) AMD K6
www.Padasalai.Net
Answer the following:
1. What are the parameters which influence the characteristics of microprocessor?
A microprocessor’s performance depends on the following characteristics:
a. Clock speed
b. Instruction set
c. Word size
2. What is an instruction?
A command which is given to a computer to perform an operation on data is called
an instruction.
4. What is HDMI?
High-Definition Multimedia Interface is an audio/video interface which transfers the
compressed video and audio data from video controller, to a compatible computer monitor,
LCD projector, digital television etc..
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 32 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
7. Classify the microprocessor based on the size of the data.
Microprocessors can process instructions. The microprocessor can be classified as
follows based on the size of the data.
i. 8-bit microprocessor.
ii. 16-bit microprocessor.
iii. 32-bit microprocessor.
iv. 64-bit microprocessor.
www.Padasalai.Net
CD
Expansion is Compact-Disc.
A standard CD can store about 700 MB
of Data.
CD players cannot play DVDs.
Disc.
DVD
Expansion is Digital Versatile
a) Clock Speed
Every microprocessor has an internal clock that regulates the speed at which it
executes instructions. The speed at which the microprocessor executes instructions is called
the clock speed. Clock speed is measured in MHz (Mega Hertz) or in GHz (Giga Hertz).
b) Instruction Set
A command which is given to a computer to perform an operation
on data is called an instruction. Basic set of machine level instructions that a
microprocessor is designed to execute is called as an instruction set. This instruction set
carries out the following types of operations:
• Data transfer
• Arithmetic operations
• Logical operations
• Control flow
• Input/output
c) Word Size
The number of bits that can be processed by a processor in a single instruction
is called its word size.
Word size determines the amount of RAM that can be accessed by a microprocessor
at one time and the total number of pins on the microprocessor.
Total number of input and output pins in turn determines the architecture of the
microprocessor.
2. How the read and write operations are performed by a processor? Explain.
www.Padasalai.Net
i.
ii.
The Central Processing Unit (CPU) has a Memory Data Register (MDR) and a
Memory Address Register (MAR).
The Memory Data Register (MDR) keeps the data which is transferred between the
Memory and the CPU. The Program Counter (PC) is a special register in the CPU
which always keeps the address of the next instruction to be executed.
iii. The Arithmetic and Logic unit of CPU places the address of the memory to be
fetched,
into the Memory Address Register.
iv. A bus is a collection of wires used for communication between the internal
components of a computer.
v. The address bus is used to point a memory location. A decoder, a digital circuit is
used to point to the specific memory location where the word can be located.
vi. The address register is connected with the address bus, which provides the address
of the instruction. A data bus is used to transfer data between the memory and the
CPU.
vii. The data bus is bidirectional and the address bus is unidirectional. The control bus
controls both read and write operations.
viii. The read operation fetches data from memory and transfers to MDR. A single
control line performs two operations like Read/Write using 1or 0.
ix. Also, the write operation transfers data from the MDR to memory. This
organization is shown in Figure
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 34 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
i. The word in the RAM has the same size (no. of bits) as the Memory Data Register
(MDR). If the processor is an 8-bit processor like Intel 8085, its MDR and the word in
the RAM both have 8 bits.
ii. If the size of the MDR is eight bits, which can be connected with a word in the memory
which is also eight bits size. The data bus has eight parallel wires to transfer data either
from MDR to word or word to MDR based on the control(Read or write).
www.Padasalai.Net
iii. This control line is labeled as R/W, which becomes 1 means READ operation and 0
means WRITE operation. Figure shows the content of MDR and the word before the
READ operation. Also, Figure shows the content of MDR and the word after the READ
operation.
iv. The read operation transfers the data (bits) from word to Memory Data Register. The
write operation transfers the data (bits) from Memory Data Register to word.
3. Arrange the memory devices in ascending order based on the access time. – Explain
(or) Explain the types of Secondary Storage devices.
a) CD / DVD Blu-Ray
b) Hard disk (Main memory)
c) Flash Drives
d) Cache Memory
Compact Disc (CD)
A CD or CD-ROM is made from 1.2 millimeters thick, polycarbonate plastic
material. A thin layer of aluminum or gold is applied to the surface. CD data is
represented as tiny indentations known as "pits", encoded in a spiral track molded
into the top of the polycarbonate layer. The areas between pits are known as "lands". A
motor within the CD player rotates the disk. The capacity of an ordinary CDROM is
700MB.
DVD (Digital Versatile Disc or Digital Video Disc)
A DVD is an optical disc capable of storing up to 4.7 GB of data, more than six
times what a CD can hold. DVDs are often used to store movies at a better quality. Like
CDs, DVDs are read with a laser.
The disc can have one or two sides, and one or two layers of data per side; the number of
sides and layers determines how much it can hold. A 12 cm diameter disc with single sided,
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 35 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
single layer has 4.7 GB capacity, whereas the single sided, double layer has 8.5 GB
capacity. The 8 cm DVD has 1.5 GB capacity. The capacity of a DVD-ROM can be
visually determined by noting the number of data sides of the disc. Double-layered sides are
usually gold-colored, while single-layered sides are usually silver-colored, like a CD.
Blu-Ray Disc
Blu-Ray Disc is a high-density optical disc similar to DVD. Blu-ray is the type of
disc used for PlayStation games and for playing High-Definition (HD) movies. A double
layer Blu-Ray disc can store up to 50GB (gigabytes) of data. This is more than 5 times the
capacity of a DVD, and above 70 times of a CD. The format was developed to enable
recording, rewriting and playback of high-definition video, as well as storing large amount
of data. DVD uses a red laser to read and write data. But, Blu-ray uses a blue-violet laser to
write. Hence, it is called as Blu-Ray.
Hard Disk
Hard disk is a magnetic disk on which you can store data. The hard disk has the
stacked arrangement of disks accessed by a pair of heads for each of the disks. The hard
disks come with a single or double sided disk.
Flash Memory
Flash memory is an electronic (solid-state) non-volatile computer storage medium
that can be electrically erased and reprogrammed. They are either EEPROM or EPROM.
Examples for Flash memories are pen-drives, memory cards etc. Flash memories can be
used in personal computers, Personal Digital Assistants (PDA), digital audio players, digital
cameras and mobile phones.
Flash memory offers fast access times. The time taken to read or write a character in
memory is called access time. The capacity of the flash memories vary from 1 Gigabytes
www.Padasalai.Net
(GB) to 2 Terabytes (TB).
Cache Memory
The cache memory is a very high speed and expensive memory, which is used to
speed up the memory retrieval process. Due to its higher cost, the CPU comes with a
smaller size of cache memory compared with the size of the main memory. Without cache
memory, every time the CPU requests the data, it has to be fetched from the main memory
which will consume more time. The idea of introducing a cache is that, this extremely fast
memory would store data that is frequently accessed and if possible, the data that is closer
to it. This helps to achieve the fast response time. Where response Time, (Access Time)
refers to how quickly the memory can respond to a read / write request.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 36 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
Programmable Read-only Memory (PROM)
Programmable read only memory is also a non-volatile memory on which data can be
written only once. Once a program has been written onto a PROM, it remains there
forever.
Unlike the main memory, PROMs retain their contents even when the computer is
turned off.
The PROM differs from ROM. PROM is manufactured as a blank
memory, whereas a ROM is programmed during the manufacturing process itself.
PROM programmer or a PROM burner is used to write data to a PROM chip. The
process of programming a PROM is called burning the PROM.
www.Padasalai.Net
Extra Question and Answer:
1. Name the communication channels between the microprocessor and other devices in
the computer. (OR) What are the collections of System Bus?
Address Bus
Control Bus
Data Bus
2. Name the measurement of clock speed of the computer.
MHz (Mega Hertz)
GHz (Giga Hertz)
3. Draw the block diagram of a microprocessor based system.
7. What is Bus?
A bus is a collection of wires used for communication between the internal
components of a computer.
www.Padasalai.NetA decoder, a digital circuit is used to point to the specific memory location where
the word can be located.
The size of the instruction set is another important consideration while categorizing
microprocessors. Initially, microprocessors had very small instruction sets because
complex hardware was expensive as well as difficult to build.
As technology had developed to overcome these issues, more and more complex
instructions were added to increase the functionality of microprocessors.
Let us learn more about the two types of microprocessors based on their instruction
sets.
RISC stands for Reduced Instruction Set Computers. They have a small set of
highly optimized instructions.
Complex instructions are also implemented using simple instructions, thus reducing
the size of the instruction set.
Examples of RISC processors are Pentium IV, Intel P6, AMD K6 and K7.
CISC stands for Complex Instruction Set Computers. They support hundreds of
instructions. Computers supporting CISC can accomplish a wide variety of tasks,
making them ideal for personal computers.
Examples of CISC processors are Intel 386 & 486, Pentium, Pentium II and III, and
Motorola 68000.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 38 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
2. Explain about Random-Access Memory (RAM).
The Motherboard of a computer has many I/O sockets that are connected to the ports and
interfaces found on the rear side of a computer (Figure 3.13). The external devices can be
www.Padasalai.Net
connected to the ports and interfaces. The various types of ports are given below:
Serial Port: To connect the external devices, found in old computers.
Parallel Port: To connect the printers, found in old computers.
USB Ports: To connect external devices like cameras, scanners, mobile phones, external
hard disks and printers to the computer.
USB 3.0 is the third major version of the Universal Serial Bus (USB) standard to connect
computers with other electronic gadgets. USB 3.0 can transfer data up to 5 Giga
byte/second. USB3.1 and USB 3.2 are also released.
VGA Connector: To connect a monitor or any display device like LCD projector.
Audio Plugs: To connect sound speakers, microphone and headphones.
PS/2 Port: To connect mouse and keyboard to PC.
SCSI Port: To connect the hard disk drives and network connectors.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 39 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
www.Padasalai.Net
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 40 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
4. THEORETICAL CONCEPT OF OPERATING SYSTEM
www.Padasalai.Net
c. Development by Google
www.Padasalai.Net
ABBREVIATION :
FAT
NTFS
BOSS
-
-
-
File Allocated Table.
Next Generation File System.
Bharat Operating System Solution.
MS-DOS - Micro Soft Disk Operating System.
GUI - Graphical User Interface.
CUI - Command User Interface.
FIFO - First In First Out.
SJF - Shortest Job First.
NRCFOSS - National Resource Center for Free / Open Source Software.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 42 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
3. What is GUI?
The GUI is a window based system with a pointing device to direct I/O,
choose from menus, make selections and a keyboard to enter text. Its vibrant colors
attract the user very easily.
10. What are the differences between Windows and Linux Operating System?
Windows OS Linux OS
It is a commercial licensed OS. It is a open source OS.
Only one distributor. Many distributors.
It uses GUI. It uses Kernal
It boot only from primary partition. It boot either from a primary or from a
logical partition.
Secure. Insecure.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 43 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
Technically, the process that enters the queue first is executed first by the CPU,
followed by the next and so on.
The processes are executed in the order of the queue.
www.Padasalai.Net
17.
interface between the user and hardware.
www.Padasalai.Net
28.
electronic gadgets.
Define Robotics.
The branch of technology that deals with the design, construction, operation and
application of robots.
Internet Intranet
The Internet is the global system of A local or restricted communications
interconnected computer networks that use network, especially a private created using
the internet protocol suite (TCP/ IP) to link World Wide Web software.
devices worldwide.
www.Padasalai.Net
38.
using a combination of graphics and text elements.
Operating System works as translator, while it translates the user request into
machine language (Binary language), processes it and then sends
it back to Operating System.
The main use of Operating System is to ensure that a computer can be used to
extract what the user wants it do.
Easy interaction between the users and computers.
Starting computer operation automatically when power is turned on (Booting).
Controlling Input and Output Devices.
Manage the utilization of main memory.
Providing security to user programs.
www.Padasalai.Net
3. Explain advantages and disadvantages of open source operation system.
Advantages:
It’s cheaper.
It is generally free.
It is high quality.
Open source operating system is very reliable.
Help s become more flexible.
Creativity.
Disadvantages:
Vulnerable to malicious users.
It is not always user-friendly.
Personalized support is rarely available.
Institutional and organizational procurement process affecting the decision making
process.
The Operating System is responsible for the following activities in connection with
memory management:
• Keeping track of which portion of memory are currently being used and who is
using them.
• Determining which processes (or parts of processes) and data to move in and out of
memory.
• Allocation and de-allocation of memory blocks as needed by the program in main
memory. (Garbage Collection).
The Operating System is responsible for the following activities associated with the
process management:
Scheduling processes and threads on the CPUs.
Creating and deleting both user and system processes.
Providing mechanisms for process synchronization.
Providing mechanisms for process communication.
www.Padasalai.Net
This algorithm is based on queuing technique. Assume that a student is standing in a
queue to get grade sheet from his/her teacher.
The other student who stands first in the queue gets his/ her grade sheet first and
leaves from the queue. Followed by the next student in the queue gets it collected
and so on. This is the basic logic of the FIFO algorithm.
Technically, the process that enters the queue first is executed first by the CPU,
followed by the next and so on. The processes are executed in the order of the
queue.
SJF (Shortest Job First) Scheduling:
This algorithm works based on the size of the job being executed by the CPU.
Consider two jobs A and B.
A = 6 kilo bytes
B = 9 kilo bytes.
First the job “A” will be assigned and then job “B” gets its turn.
Round Robin Scheduling:
The Round Robin (RR) scheduling algorithm is designed especially for time
sharing systems.
Jobs (processes) are assigned and processor time in a circular method. For example
take three jobs A, B, C.
First the job A is assigned to CPU then job B and job C and then again A, B and C
and so on.
Based On Priority:
The given job (process) is assigned based on a Priority.
The job which has higher priority is more important than other jobs.
Take two jobs A and B.
Let the priority of A be 5 and priority B be 7.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 48 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
Job B is assigned to the processor before job A.
Modern operating systems use a Graphical User Interface(GUI). A GUI lets you use
your mouse to click icons, buttons, menus and everything is clearly displayed on the screen
using a combination of graphics and text elements. OS can be either proprietary with a
commercial license or can be open source. Each Operating System's GUI has a different
www.Padasalai.Net
look and feel, so if you switch to a different Operating System, it may seem unfamiliar at
first. However, modern Operating Systems are designed to be ease of use and most of the
basic principles are the same.
Open source Free Licence:
UNIX
UNIX is a family of multitasking, multi-user operating systems that derive originally
from AT&T Bell Labs, where the development began in the 1970s by Ken Thompson and
Dennis Ritchie.
Linux
Linux is a family of open-source operating systems. It can be modified and
distributed by anyone around the world. This is different from proprietary software like
Windows, which can only be modified by the company that owns it. The main advantage of
Linux operating system is that it is open source. There are many versions and their updates.
Most of the servers run on Linux because it is easy to customize.
There are a few different distributions of Linux, like Ubuntu, Mint, Fedora, RedHat,
Debian, Google's Android, Chrome OS, and Chromium OS which are popular among users.
The Linux operating system was originated in 1991, as a project of “Linus Torvalds”
from a university student of Finland. He posted information about his project on a news
group for computer students and programmers. He received support and assistance from a
large pool of volunteers who succeeded in creating a complete and functional Operating
System. Linux is similar to the UNIX operating system.
Android
Android is a mobile operating system developed by Google, based on Linux and
designed primarily for touch screen mobile devices such as smart phones and tablets.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 49 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
Google has further developed Android TV for televisions, Android Auto for cars
and Android Wear for wrist watches, each with a specialized user interface. Variants of
Android are also used on game consoles, digital cameras, PCs and other electronic gadgets.
Proprietary Licence
Microsoft Windows
Microsoft Windows is a family of proprietary operating systems designed by
Microsoft Corporation and primarily targeted to Intel and AMD architecture based
computers.
iOS - iPhone OS
iOS (formerly iPhone OS) is a mobile Operating System created and
developed by Apple Inc., exclusively for its hardware. It is the Operating System that
presently powers many of the company's mobile devices, including the iPhone, iPad and
iPod Touch. It is the second most popular mobile Operating System globally after
Android.aps Weather
Types of Software
Software is classified into two types:
1) Application Software
2) System Software
www.Padasalai.Net
Application Software:
Application software is a set of programs to perform specific task. For example
MS-word is application software to create text document and VLC player is familiar
application software to play audio, video files and many more.
System Software:
System software is a type of computer program that is designed to run
the computer’s hardware and application programs. For example Operating System and
Language Processor.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 50 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
5.WORKING WITH TYPICAL OPERATING SYSTEM
(WINDOWS & LINUX)
1. From the options given below, choose the operations managed by the operating system.
a. Memory b. Processes
c. Disks and I/O devices d. All of these
2. Which is the default folder for many Windows Application to save your file?
a. My Document b. My Picture
c. Documents and Settings d. My Computer
3. Under which of the following OS the option Shift+Delete – permanently deletes a file or
folder?
a. Windows 7 b. Windows 8 c. Windows 10 d. All of the OS
4. What the meaning of “Hibernate” in Windows XP/ Windows7?
a. Restart the Computer in safe mode
b. Restart the Computer in Hibernate mode
c. Shutdown the Computer terminating all the running applications.
d. Shutdown the Computer without closing the running application.
5. Which of the following OS is not based on Linux?
a. Ubuntu b. BSD c. CentOS d. Redhat
6. Which of the following in Ubuntu OS is used to view the options for the devices installed?
a. Settings b. Files c. Dash d. VBox_Gas_5.2.2
7. Identify the default email client in Ubuntu?
a. Thunderbird b. Firefox c. Internet Explorer d. Chrome
8. Which is the default application for spreadsheets in Ubuntu? This is available in the
software launcher?
www.Padasalai.Net
a. LibreOffice Writer b. LibreOffice Calc
c. LibreOffice Impress d. LibreOffice Spreasheet
9. Which is default browser for Ubuntu?
a. Firefox b. Internet Explorer c. Chrome d. Thunderbird
10. Where will you select the option to log out, suspend, restart, or shut down from the desktop
of Ubuntu OS?
a. Session Indicator b. Launcher c. Files d. Search
11. Which OS used on web servers and super computers?
a. Unix b. Windows c. Linux d. iOS
12. Multiple applications execute simultaneous in windows is known as.
a. Multiprocessing b. Multitasking c. Multiprogramming d. None of these
13. Which of the following input devices used in Windows OS?
a. Keyboard, Mouse b. Keyboard, Microphone
c. Mouse, Joystick d. Keyboard, Scanner
14. Which of the following is not an access applications?
a. Word processing b. Games c. Spreadsheets d. C++
15. In which version of windows the mouse was introduced?
a. 1 b. 2 c. 3 d. 95
16. Which windows version focused on multitasking?
a. 95 b. 98 c. XP d. windows 7
17. In which version of windows, DOS gaming disappear?
a. 95 b. ME c. 98 d. W2K
18. How many versions of Windows 2000 were released?
a. 3 b. 1 c. 4 d. 2
19. Which was the last windows based MS-DOS? (or) Which version removed the option “Boot
in DOS”?
a. Windows 98 b. Windows ME c. W2K d. Windows XP
20. Which of the following is not a version of windows 2000?
a. Data center server b. Professional c. DOS d. Server
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 51 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
21. Which Windows operating system introduced IE8?
a. XP b. W2K c. Vista d. 7
22. Which version of Windows takes better advantage of multi-core processing?
a. 8 b. 7 c. 10 d. 3
23. Which windows versions introduced multiple desktop?
a. 8 b. 7 c. 10 d. XP
24. How many mouse actions are there while using Windows OS?
a. 5 b. 6 c. 7 d. 8
25. The basic working platform of Windows is called ______.
a. OS b. Version c. Icons d. Desktop
26. The opening screen of Windows is called ______.
a. Windows b. Workspace c. taskbar d. Desktop
27. The desktop consists of ______.
a. Icons b. Start Button c. Documents d. All of these
28. Which key display the windows desktop?
a. Winkey + E b. Winkey + D c. Winkey + C d. Winkey + T
29. Which button is used to get the Windows desktop?
a. Aerotop b. Aeroseek c. Aeropeck d. Aerodesk
30. The graphical representation of Windows elements are called _______.
a. Desktop b. Icons c. Task box d. Folders
31. Which plays vital role in GUI?
a. Icons b. Windows c. Desktop d. Task bar
32. How many disk drive options are there in Windows?
a. 4 b. 3 c. 5 d. 6
33. A rectangular area in an application is called _________.
a. Desktop b. Start Menu c. Icons d. Window
34. Window is typical rectangular area in ____.
www.Padasalai.Net
a. Application
a. Application
b. Documents
b. Only two
36. Which window display the contents of a document?
b. Document
c. Dialog
35. How many windows active when multiple windows open at a time?
a. Only one c. 3
c. Explorer
d. All of these
d. 0
d. None of these
37. Which is used for formatting the text and graphics?
a. Icons b. Desktop c. Window d. Notepad
38. Which of the following element will display the name of the currently opened document?
a. Title Bar b. Tool Bar c. Workspace d. Menu Bar
39. How many control buttons are there in title bar of the windows?
a. 2 b. 3 c. 4 d. 1
40. Which key brings the focus on the first menu of the menu bar?
a. Alt + F10 b. Alt + F9 c. Ctrl + F10 d. Ctrl + F9
41. How many direction the document can be scrolled?
a. 3 b. 2 c. 1 d. 4
42. Which of the following window element help to resize the window?
a. Corners b. Borders c. a and b d. scroll bar
43. A directory contains information about the ________.
a. Data b. Records c. Icons d. Files
44. The alternate name of the directory called _____
a. Files b. Folders c. Information d. Data
45. The organized file structure is referred to ________
a. Multilevel directory system b. Hierarchical directory system
c. Multitasking directory system d. a and b
46. The first level in a hierarchical directory system is _____.
a. Root directory b. Sub directory c. Directory d. Folder
47. Which level in the Multi-level directory system is root directory?
a. Fourth b. Third c. Second d. First
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 52 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
48. Root
A B
C D E
www.Padasalai.Net
57. How many ways are there to create a new folder?
a. 4 b. 3
58. The default name of folder created is _____.
a. New b. Folder
59. Which key is used to change the folder name?
c. 2
c. Folder New
d. many
d. New Folder
www.Padasalai.Net
84. Which of the following is not the icon in the Ubuntu OS?
a. Amazon b. FlipKart c. Files
85. How many common indicators are there in Ubuntu OS menubar?
a. 3 b. 4
86. The default Ubuntu 16.04 theme known as _______.
c. 6
d. Trash
d. 5
www.Padasalai.Net
a. Icons
a. Root
a. 2
b. Windows
b. Only One
c. Directory
103. Which directory is created automatically at the time of disk formatting?
b. Sub directory c. Bin
104. How many parent directory is allowed for the child directory?
c. More than 2
d. Document
d. Drive Directories
d. Less than 6
105. The sequence of directory names which leads to access a particular file name is called
a. Sub directory b. Root directory c. Tree d. Path
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 55 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
5. What is Open Source?
Open Source refers to a program or software in which the source code is available in
the web to the general public free of cost.
www.Padasalai.Net
9. Name any four icons in Ubuntu OS desktop
Amazon, Trash, Files, System Settings..
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 56 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
16. Write the prominent feature of Windows 95 OS.
Introduced Start button and Start menu.
Introduced a 32 bit environment, the task bar and forced on multitasking.
www.Padasalai.Net
Referred to as logoff, logout, disconnecting, and sign out, sign off process of
disconnecting from network or what occur
34. What is meant by Title Bar? (Or) What will displayed on the Windows title bar?
The title bar will display the name of the application and the name of the document
opened. It will also contain minimize, maximize and close button.
www.Padasalai.Net
37. What is the use of Corners and Borders?
The corners and borders of the windows help to drag and resize the windows. The
mouse pointer changes to a double headed arrow when positioned over a border or a corner.
Drag the border or corner in the direction indicated by the double headed arrow to the
desired size. The window can be resized by dragging the corners diagonally across the
screen.
39. What the use of Task bar? Or what are all available on Taskbar?
At the bottom of the screen is a horizontal bar called as Taskbar. This bar contains
(from left to right) the Start button, shortcuts to various programs, minimized programs and
in the extreme right corner you can see the system tray which consist of volume control,
network, date and time etc. Next to the Start button is the quick Launch Toolbar which
contains task for frequently used applications.
42. What is the use of wild card character (?) Question mark?
The use of question mark as a substitute for a single character in a name.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 58 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
43. Observe the following and answer the following.
a) Name of the Root directory.
b) Name of the Sub-directory.
c) Name of the Files.
Y A
Z B C
Ans:
(a) X
(b) Y, A
(c) Z, B, C
www.Padasalai.Net
S.No UNIX LINUX
1 Unix is a proprietary operation system. Linux is a open source Operating system.
2 Unix OS primarily uses a command line Linux OS primarily uses GUI Interface.
Interface.
46. List down the differences in security for Windows7 , Windows8 and Windows10
Operating system.
Windows 7 - Ordinary password security while logging.
Windows 8 - Ordinary password security while logging.
Windows 10 - Windows Hello, one of the security which lets you log-in
using a fingerprint, face or iris scan instead of a password.
Windows 7 Windows 8
Faster boot times, introduced new user It was faster than previous versions of
interface and Internet Explorer 8. Windows.
Most used operating system on the Windows 8 takes better advantage of
internet and also the most used for PC multi-core processing, solid state
gaming. drives (SSD), touch screens and other
alternative input methods.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 59 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
49. Write a note on Windows Scroll bars.
A scrollbar is an interaction technique in which continuous text, pictures, or any
other content can be scrolled in a predetermined direction ( up, down, left or right) on a
computer display so that all contents can be viewed, even if only fraction of the content
cab be seen on a device's screen at a time.
50. How will you delete files and folders using file menu?
Select the file or folder you wish to delete.
Click on the File menu and select Delete.
The file will be moved to recycle bin.
51. Write a note on Ubuntu OS.
Ubuntu is a Linux - based operating system. It is designed for computers, smart
phones, and network servers.
The system is developed by a UK based company called Canonical Ltd.
All the principles used to develop the Ubuntu software are based on the principles of
Open Source software development.
52. What is the purpose of windows store design?
Windows store is designed to unify all windows platforms across multiple devices,
including Windows Phone and tablets, with universal apps that can be downloaded from
the Windows Store and run on all Windows devices.
53. Analyse: Why the drives are segregated?
The drives are segregated because
Save space and increase performance.
To include other Operating systems, isolate programs and keep files tidy.
www.Padasalai.Net
It might help to isolate operating systems or programs from other user.
54. If you are working on multiple files at a time, sometimes the system may hang. What
is the reason behind it? How can you reduce it?
Due to low capacity of main memory (RAM) the system many hang while working
with multiple files.
To reduce it increase the size of main memory and other reasons for hanging is
overheating, driver corruption or errors, software errors and computer virus.
55. Are drives such as hard drive and floppy drives represented with drive letters?
Yes, hard drives and floppy drives represented with drive letters.
56. Write the specific use of Cortana.
Use of Cortana
Gives reminders based on time, places or people.
Track packages, teams, interests and flights.
Send emails and texts.
Find facts, files, places and information.
Open any application on your system.
57. List out the major differences between Windows and Ubuntu OS.
S.No UBUNTU OS WINDOWS OS
1 Open source (Licensing Closed source (Licensing
Freedom) Restriction)
2 Online peer support Paid - help desk support
3 Full hardware support Partial hardware support
4 Support CUI No CUI Support
5 Flexibility Rigidity
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 60 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
58. Are there any difficulties you face while using Ubuntu? If so, mention it with
reasons.
Different desktop manages lead to a fragmented experience.
Too many package Managers makes Ubuntu hard to learn and master.
Lack of software.
Hardware compatibility.
www.Padasalai.Net
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 61 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
www.Padasalai.Net
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 62 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
62. Draw and compare the icon equivalence in Windows and Ubuntu.
www.Padasalai.Net
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 63 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
S.No Windows Ubuntu
1 Recycle Bin Trash
2 My Computer Files
3 Ms- Word Libre Office Writer
64. Observe the figure and mark all the window elements, Identify the versions of the Windows
OS.
Title Bar
Close Button
Restore Button
Maximize Button
DVD RW Drive
External Drive
Left Panel
Right Panel
Folders icons
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 64 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
65. Write the procedure to create, rename, delete and save a file in Ubuntu OS. Compare
it with Windows OS.
In Ubuntu OS :
Create a file : By right clicking in the desktop and also files be created by using file menu.
Delete a file : By using right click and choosing move to trash or by using menu.
Rename a file : By using right click and choosing rename option.
Save a file : Press Ctrl + X or F2 to exit. You will then be asked if you want to save. (or)
Press Ctrl + O or F3 and Ctrl + X or f2 for save the file and exit.
InWindows OS :
Create a file : Open an application and created by using file menu.
Delete a file : By right click on the file and choose rename option to rename a file.
Save a file : Press Ctrl + S or File Save to save the file.
66. Write the important functions of an operating system?
The important functions of an operating system.
Memory management
Processor management
Device management
File management
Security management
Control over system performance
Job accounting
Error accounting
Coordination between other software and users.
www.Padasalai.Net
67. Write the functions of Windows OS.
The functions of Windows operating system which allows you to do are:
Access application (programs) on computer (Word processing, games, Spreadsheets,
Calculators and so on).
Load any were new programs on to the computer.
Manage hardware such as printers, scanners, mouse, digital cameras etc.
Manage how files are stores on your computer.
Change computer settings such as color schemes, screen savers and the resolution of
monitor.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 65 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
69. Explain the different types of icons in Windows desktop.
Icons:
Icon is a graphic symbol representing the window elements like files, folders, shortcuts etc.,
Icons play a vital role in GUI based applications.
Application Icons:
These icons are representing software package’s logo. Double click over this icon, the
related application gets invoked.
Standard Icons:
The icons which are available on desktop by default while installing Windows OS are called
standard icons. The standard icons available in all Windows OS are My Computer,
Documents and Recycle Bin.
Shortcut Icons:
Shortcut icons can be created for any application or file or folder. By double clicking
the icon, the related application or file or folder will open. This represents the
shortcut to open a particular application.
Menu Bar - The menu bar is seen under the title bar. Menus in the menu bar can be
accessed by pressing Alt key and the letter that appears underlined in the menu title.
Additionally, pressing Alt or F10 brings the focus on the first menu of the menu bar.
In Windows 7, in the absence of the menu bar, click Organize and from the drop
down menu, click the Layout option and select the desired item from that list.
www.Padasalai.Net
The Workspace - The workspace is the area in the document window to enter or
type the text of your document. The workspace area in the document window.
Scroll bars - The scroll bars are used to scroll the workspace horizontally or
vertically moving bar.
Corners and borders - The corners and borders of the window helps to drag and
resize the windows. The mouse pointer changes to a double headed arrow when
positioned over a border or a corner. Drag the border or corner in the direction
indicated by the double headed arrow to the desired size . The window can be resized
by dragging the corners diagonally across the screen.
71. Explain different ways of creating a new folder. ( Ans : Book Page No : 90 – 92)
72. Explain how will you find a file or folder in Windows. ( Ans : Book Page No : 93 – 95)
73. Explain the different methods of renaming files and folders in Windows.
( Ans : Book Page No : 95 – 97)
74. Explain the different methods of moving files and folders in Windows.
( Ans : Book Page No : 98)
75. Explain how will you copy files and folders in Windows.
( Ans : Book Page No : 98 - 99)
76. Explain the methods followed while copying files and folders to removable disk in Windows.
( Ans : Book Page No : 99 - 100)
77. Explain the procedure of shutting down or log off computer.(Ans: Book Page No:102 –103 )
78. Write the significant features of Ubuntu OS. (Ans: Book Page No:105)
79. Explain the most common indicators in Ubuntu OS menu bar. (Ans: Book Page No:106)
80. Explain the Element of Ubuntu OS. (Ans: Book Page No:107 - 110 )
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 66 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
UNIT - II ALGORITHMIC PROBLEM SOLVING
6. SPECIFICATION AND ABSTRACTION
1. Which of the following activities is algorithmic in nature?
a. Assemble a bicycle b. Describe a bicycle
c. Label the parts of a bicycle d. Explain how a bicycle works
2. Which of the following activities is not algorithmic in nature?
a. Multiply two numbers b. Draw a kolam
c. Walk in the park d. Braid the hair
3. Omitting details inessential to the task and representing only the essential features of the
task is known as
a. Specification b. Abstraction c. Composition d. Decomposition
4. Starting the input property and the as : - output relation a problem is known as
a. Specification b. Abstraction c. Algorithm d. Definition
5. Ensuring the input-output relation is
a. the responsibility of the algorithm and the right of the user.
b. the responsibility of the user and the right of the algorithm.
c. the responsibility of the algorithm but not the right of the user.
d. the responsibility of both the user and the algorithm.
6. If i=5 before the assignment i:=i-1 after the assignment, the value of I is
a. 5 b. 4 c. 3 d. 2
7. If i < 0 before the assignment i:=i-1 after the assignment, we can conclude that
a. 0 < i b. 0 ≤ i c. i = 0 d. 0 ≥ i
8. Which of the following are an examples of process?
a. adding two numbers b. Draw a kolam
c. Walk in the park d. All of these
www.Padasalai.Net
9.
10.
11.
Instructions are also known as?
a. Programs b. Input c. Statement
Which must be expressed using statement of a programming language?
a. Process b. Instruction
Which is intended to solve a problem?
c. Algorithm
d. Process
d. Specification
www.Padasalai.Net
35. Which is the most effective tool used for managing program complexity?
a. Specification b. Control flow c. Composition d. none of these
36. Which of the following is a basic and important abstraction?
a. State b. Variable c. Control flow d. Functions
37. The right side of assignment can be?
a. A value b. A variable c. An expression d. Any one of these
3. Initially,
Farmer, goat, grass, wolf = L,L,L,L and the framer crosses the river with goat.
Model the action with an assignment statement.
1. Minimum (A,B)
2. -- inputs : A and B are integers or real numbers.
3. – outputs: A minimum, A< B
B minimum, B< A
5. If = 1.414, and the square_root( ) function returns -1.414, does it violate the
following specification?
-- square_root( )
-- inputs : x is a real number, n>0
-- outputs: y is a real number such that y2=x.
Yes, if violate the specification.
www.Padasalai.Net
7.
algorithmic.
8. What is abstraction?
A problem can involve a lot of details. Several of these details are unnecessary for solving
the problem. Only a few details are essential. Ignoring or hiding unnecessary details and
modeling an entity only by its essential properties is known as abstraction.
11. What is the difference between Assignment operator and equality operator?
Assignment operator is used to assign the right hand side value to left hand side
variable.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 69 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
Equality operator is used to compare the values of both right hand side variable and
left hand side variable and results in either true or false.
16. Name the basic principles and techniques for designing algorithms.
www.Padasalai.Net
o Specifications
o Abstractions
o Composition
o Decomposition.
18. Write the specification of an algorithm to compute the quotient and remainder after
dividing two integers.
1. divide(A, B)
2. -- inputs : A is an integer and B ≠ 0
3. -- outputs : A = q x B + r and 0 < r < B
21. Write the specification of an algorithm for computing the square root of a number.
1. Let us name the algorithm square_root.
2. It takes the number as the input. Let us name the input n. n should not be negative.
3. It produces the square root of n as the output. Let us name the output y. Then n should be
the square of y.
Now the specification of the algorithm is
square_root(n)
-- inputs: n is a real number, n ≥ 0.
-- outputs: y is a real number such that y2 = n.
22. Which defines the rights and responsibilities of the designer and user of the algorithm.
Specification of an algorithm serves as a contract between the designer of the
algorithm and the users of the algorithm, because it defines the rights and responsibilities of
the designer and the user.
23. Define the input – output relationship between the designer and user of the algorithm.
www.Padasalai.Net
1. Write the specification of an algorithm hypotenuse whose inputs are the lengths of the
two shorter sides of a right angled triangle, and the output is the length of the third
side.
1. Let us name the algorithm Hypotenuse
2. It takes the number as the input. Let us name the input S1, S2. should not be negative.
3. It produces the Hypotenuse of S1,S2 as the output. Let us name the output l. Then S1,S2
www.Padasalai.Net
should be the square of l.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 72 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
--output: x is a real number, the quadratic equation ax2+bx+c = 0 is
satisfied by exactly two values fx, namely
3. Exchange the contents: Given two glasses marked A and B. Glass A is full of apple
drink and glass B is full of grape drink. For exchanging the contents of glasses A and
B, the state by suitable variables, and write the specification of the algorithm.
4. Explain the detail how will you construct an algorithm. (Or) Explain the Building
www.Padasalai.Net
Blocks of Algorithms.
We construct algorithms using basic building blocks such as
• Data
• Variables
• Control flow
• Functions
Data
Algorithms take input data, process the data, and produce output data. Computers
provide instructions to perform operations on data. For example, there are instructions for
doing arithmetic operations on numbers, such as add, subtract, multiply and divide. There
are different kinds of data such as numbers and text.
Variables
Variables are named boxes for storing data. When we do operations on data, we
need to store the results in variables. The data stored in a variable is also known as the value
of the variable. We can store a value in a variable or change the value of variable, using an
assignment statement.
Control flow
An algorithm is a sequence of statements. However, after executing a statement, the
next statement executed need not be the next statement in the algorithm. The statement to be
executed next may depend on the state of the process. Thus, the order in which the
statements are executed may differ from the order in which they are written in the
algorithm. This order of execution of statements is known as the control flow.
Functions
Algorithms can become very complex. The variables of an algorithm and
dependencies among the variables may be too many. Then, it is difficult to build algorithms
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 73 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
correctly. In such situations, we break an algorithm into parts, construct each part
separately, and then integrate the parts to the complete algorithm.
The parts of an algorithm are known as functions. A function is like a sub algorithm.
It takes an input, and produces an output, satisfying a desired input output relation.
www.Padasalai.Net
Abstraction:
A problem can involve a lot of details. Several of these details are unnecessary for
solving the problem. Only a few details are essential. Ignoring or hiding unnecessary details
and modeling an entity only by its essential properties is known as abstraction.
Composition:
An algorithm is composed of assignment and control
flow statements. A control flow statement tests a condition of the state
and, depending on the value of the condition, decides the next statement
to be executed.
Decomposition:
We divide the main algorithm into functions. We construct each function
independently of the main algorithm and other functions.
Finally, we construct the main algorithm using the functions. When we use the functions, it
is enough to know the specification of the function. It is not necessary to know how the
function is implemented.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 74 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
7. COMPOSITION AND DECOMPOSITION
1. Suppose u, v = 10 ,5 before the assignment. What are the values of u and v after the
sequence of assignments?
1 u := v
2 v := u
a. u, v = 5, 5 b. u, v = 5, 10 c. u, v = 10, 5 d. u, v = 10, 10
2. Which of the following properties is true afer the assignment (at line 3?
1 -- i+j = 0
2 i, j := i+1, j-1
3 -- ?
a. i+j >0 b. i+j < 0 c. i+j =0 d. i = j
3. If C1 is false and C2 is true, the compound statement
1 if C1
2 S1
3 else
4 if C2
5 S2
6 else
7 S3 executes
a. S1 b. S2 c. S3 d. none
4. If C is false just before the loop, the control flows through
1 S1
2 while C
3 S2
www.Padasalai.Net
4 S3
a. S1;S3 b. S1; S2; S3
c. S1; S2; S2; S3 d. S1; S2; S2; S2; S3
5. If C is true, S1 is executed in both the flow charts, but S2 is executed in
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 75 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
7. Which of the following is one of the elementary problem solving Techniques?
a. Decomposition b. Control flow c. Functions d. State
8. How many notations are there for representing algorithms?
a. 1 b. 2 c. 3 d. many
9. Which of the following is not a notation for representing algorithm?
a. Programming language b. Composition
c. Pseudo code d. Flowchart
10. The notation for representing algorithms _________.
a. Pseudo code b. Programming language c. Composition d. Flow chart
11. Which notation is similar to programming languages?
a. Pseudo code b. Flowchart
c. Statements d. Decomposition
12. Which of the following is a diagrammatic notation for representing algorithms?
a. Pseudo code b. Programming language c. Source Code d. Flow chart
13. An algorithm expressed in programming language is called
a. Statement b. program c. information d. function
14. Which of the following is not a programming language?
a. C b. C++ c. Ms-Office d. Python
15. Which translates the program into executable instruction?
a. Complier b. Interpreter c. Linker d. None of these
www.Padasalai.Net
2. Draw a flowchart for conditional statement.
3. Both conditional statement and iterative statement have a condition and statement.
How do they differ?
Conditional statement is executed only if the condition is true. Otherwise, nothing is
done.
Iterative statement repeatedly evaluates a condition and executes a statement as long
as the condition is true.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 76 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
6. How do we refine a statement?
In refinement, starting at a high level, each statement is repeatedly expanded into
more detailed statements in the subsequent levels.
www.Padasalai.Net
such as variables and control flow.
But, it allows the use of natural English for statements and conditions. An algorithm
expressed as pseudo code is not for computers to execute directly, but for human
readers to understand.
Therefore, there is no need to follow the rules of the grammar of a programming
language. However, even pseudo code must be rigorous and correct. Pseudo code is
the most widely used notation to represent algorithms.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 77 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
16. Draw a flowchart for Alternative and Iterative control flow.
www.Padasalai.Net
1. Test whether C is true or false.
2. If C is true, then do S and go back to step 1; otherwise do nothing.
19. We want an algorithm that compares two numbers and produces the result as
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 78 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
20. If C is false in line 2, trace the control flow in this algorithm.
1 S1
2 -- C is false
3 if C
4 S2
5 else
6 S3
7 S4
S1; S2; S4.
Entry
True
C1
S1
False
www.Padasalai.Net C2
True
S2
False
C3 True
S3
False
Exit
25. Circulate the contents: Write the specification and construct an algorithm to circulate
the contents of the variables A, B and C as shown below: The arrows indicate that B
gets the value of A, C gets the value of B and A gets the value of C.
www.Padasalai.Net
1. Let us name the algorithm Circulate.
2. It takes the number as the input. Let us name the input A, B, C. A, B, C should not be
zero.
3. It produces the Exchange of a, B, C by using third variable t1, t2 as the output. Let us
name the output. Then A, B, C, t1, t2 should be the Circulate of the values.
26. Decanting problem. You are given three bottles of capacities 5, 8, and 3 liters. Te 8L
bottle is filled with oil, while the other two are empty. Divide the oil in 8L bottle into
two equal quantities. Represent the state of the process by appropriate variables.
What are the initial and final states of the process? Model the decanting of oil from
one bottle to another by assignment. Write a sequence of assignments to achieve the
final state.
1. A: = 8, b: =0, c: = 0 1. E F T
2. E, F, T: =A, B, C 2. 8 0 0
3. F: = E-3 3. 3 5 0
4. T: = F-3 4. 3 2 3
5. E: = E+T 5. 6(3+3) 2 0
6. T: = F
F: = F-2 6. 6 0 2
7. F: = E-1 7. 1 5 2
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 80 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
8. F: = F-1 8. 1 4 3
T: = T+1
9. E: = E+T 9. 4 4 0
T: = T-3
factorial(4)
i=1, f=1;
=f=1x1
=f=1x2
=f=2x3
=f=6x4
= f = 24.
www.Padasalai.Net
We can also abstract the subproblems. We specify each subproblem by its input
property and the input-output relation. While solving the main problem, we only
need to know the specification of the subproblems. We do not need to know how the
subproblems are solved.
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 81 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
29. Explain the three Notations for representing algorithms.
There are mainly three different notations for representing algorithms.
A programming language is a notation for expressing algorithms to be executed by
computers.
Pseudo code is a notation similar to programming languages. Algorithms expressed
in pseudo code are not intended to be executed by computers, but for
communication among people.
Flowchart is a diagrammatic notation for representing algorithms. They give a visual
intuition of the flow of control, when the algorithm is executed.
A condition is contained in a diamond shaped box with two outgoing arrows, labeled
www.Padasalai.Net true and false. The true arrow points to the box to be executed next if the condition
is true, and the false arrow points to the box to be executed next if the condition is
false.
Special boxes marked Start and the End are used to indicate the start and the end of
an execution:
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 82 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
31. Write the Disadvantages of Flowcharts.
Flowcharts also have disadvantages.
1) Flowcharts are less compact than representation of algorithms in programming
language or pseudo code.
2) They obscure the basic hierarchical structure of the algorithms.
3) Alternative statements and loops are disciplined control flow structures. Flowcharts
do not restrict us to disciplined control flow structures.
4)
32. Explain the case Analysis in detail with example.
Alternative statement analyses the problem into two cases. Case analysis
statement generalizes it to multiple cases. Case analysis splits the problem into an
exhaustive set of disjoint cases. For each case, the problem is solved independently. If C1,
C2, and C3 are conditions, and S1, S2, S3 and S4 are statements, a 4-case analysis
statement has the form,
1. case C1
2. S1
3. case C2
4. S2
5. case C3
6. S3
7. else
8. S4
The conditions C1, C2, and C3 are evaluated in turn. For the first condition
that evaluates to true, the corresponding statement is executed, and the case analysis
statement ends. If none of the conditions evaluates to true, then the default case S4
is executed.
i. The cases are exhaustive: at least one of the cases is true. If all conditions are false,
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 83 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
8. ITERATION AND RECURSION
1. A loop invariant need not be true
(a) at the start of the loop. (b) at the start of each iteration
(c) at the end of each iteration (d) at the start of the algorithm
2. We wish to cover a chessboard with dominoes, the number of black squares and the
number of white squares covered by dominoes, respectively, placing a domino can be
modelled by
(a) b := b + 2 (b) w := w + 2 (c) b, w := b+1, w+1 (d) b := w
3. If m x a + n x b is an invariant for the assignment a, b : = a + 8, b + 7, the values of m and n
are
(a) m = 8, n = 7 (b) m = 7, n = -8 (c) m = 7, n = 8 (d) m = 8, n = -7
4. Which of the following is not an invariant of the assignment?
m, n := m+2, n+3
(a) m mod 2 (b) n mod 3 (c) 3 X m - 2X n (d) 2 X m - 3X n
5. If Fibonacci number is defined recursively as
www.Padasalai.Net
7.
how many multiplications are needed to calculate a10?
(a) 11 (b) 10 (c) 9 (d) 8
Which of the following algorithm design techniques to execute the same action repeatedly?
(a) Assignment (b) Iteration (c) Recursion (d) Both b and c
8. Which statements executed repeatedly as long as the loop condition is true?
(a) Sequential (b) Abstraction (c) Iteration (d) Assignment
9. Which of the following is updated when each time the loop body is executed?
(a) Data (b) Variables (c) Function (d) All of these
10. Which of the following is key to construct iteration algorithms?
(a) Loop invariant (b) Loop updation
(c) Loop variable (d) Loop condition
11. Which of the following is more powerful algorithms design technique closely related to
iteration?
(a) Sequential (b) Iteration (c) Recursion (d) Composition
12. How many cases are there in a recursive solver has?
(a) 2 (b) 3 (c) 4 (d) many
13. Which of the following is a recursive solver case?
(a) Base case (b) Recursive case (c) loop case (d) Both a and b
14. How many important points the loop variant is true?
(a) 1 (b) 2 (c) 3 (d) 4
15. How many base case atleast must be in recursion?
(a) 1 (b) 4 (c) 3 (d) 2
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 84 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
Answer the following:
1. What is an invariant?
An expression involving variables, which remains unchanged by an
assignment to one of these variables, is called an invariant of the assignment.
3. Does testing the loop condition affect the loop invariant? Why?
Yes, it affects.
A loop invariant is true at
• (a) at the start of the loop (just before the loop)
• (b) at the start of each iteration (before loop body)
• (c) at the end of each iteration (after loop body)
• (d) at the end of the loop (just after the loop)
4. What is the relationship between loop invariant, loop condition and the input-output
recursively?
A loop invariant is a condition that is necessarily true immediately before and
immediately after each iteration of a loop.
A loop invariant ia some condition that holds for every iteration of the loop.
www.Padasalai.Net
problem.
(OR)
Each solver should test the size of the input. If the size is small enough, the solver
should output the solution to the problem directly. If the size is not small enough, the solver
should reduce the size of the input and call a sub-solver to solve the problem with the
reduced input.
if n = 0 -- base case
1
else
n * factorial (n-1) --recursion step
7. What is the use of repeating the same action again and again?
Even though the action is the same, the state in which the action is executed is not
the same. Each time we execute the action, the state changes. Therefore, the same action is
repeatedly executed, but in different states. The state changes in such a way that the process
progresses to achieve the desired input-output relation.
Detail Answers:
1. There are 7 tumblers on a table, all standing upside down. You are allowed to turn any
2 tumblers simultaneously in one move. Is it possible to reach a situation when all the
tumblers are right side up? (Hint: Te parity of the number of upside down tumblers is
invariant.)
u is the number of tumblers upside down 3 cases.
1 turn two tumblers right way up ( u:=u+2)
2 turn two tumblers in the wrong way up ( u:=u-2)
3 turn one the right way up and the other wrong way up ( u:=u+1-1)
www.Padasalai.Net
Even u is an invariant of problem.
No matter how many times we turn over pairs of tumbler, the value is even.
So it is not possible to reach the situation when all the tumblers are right side up.
2. A knockout tournament is a series of games. Two players compete in each game; the
loser is knocked out (i.e. does not play any more), the winner carries on. Te winner of
the tournament is the player that is left after all other players have been knocked out.
Suppose there are 1234 players in a tournament. How many games are played before
the tournament winner is decided?
P no.of players
G no.of Games
Initially, P=1234, G=0.
P,G:=P-1, G+1
P+G is invariant
Finally, P=1, G=1233.
3. King Vikramaditya has two magic swords. With one, he can cut off 19 heads of a
dragon, but after that the dragon grows 13 heads. With the other sword, he can cut off
7 heads, but 22 new heads grow. If all heads are cut off, the dragon dies. If the dragon
has originally 1000 heads, can it ever die? (Hint: The number of heads mod 3 is
invariant.)
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 86 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
4. Assume an 8 × 8 chessboard with the usual coloring. "Re-coloring" operation changes
the color of all squares of a row or a column. You can recolor repeatedly. Te goal is to
attain just one black square. Show that you cannot achieve the goal. (Hint: If a row or
column has b black squares, it changes by (|8 - b) - b|).
i. We start with a normal colored chess board with number of black squares B=32 and
number of white squares W=32.
ii. So, W-B = 0 which is divisible by 4 and W+B = 64 W-B = 0 mod 4.
iii. Whenever we change the colors of a row or column, we change the color of 8
squares.
iv. Let this row (or column) have W white squares + B black squares W+B = 8. If this
operation B increases by 2n, then W decreases by 2n so that W+B = 64. But B-W
will change by 4n and if remain divisible by 4.
v. W-B=0 mod 4.
vi. After every operation “B-W mod 4” can have no other values.
vii. But the required state has 63 white square and 1 black square, so it requires.
viii. W-B = 63-1=62 = 2 mod 4.
Construct a recursive algorithm using this definition. How many multiplications are
needed to calculate a10?
www.Padasalai.Net
power (a, n)
-- inputs: n is an integer , n ≥ 0
-- outputs : an
if n = 0 -- base case
1
else
if(n%2!=0)
a × power (a, n-1) --recursion step in case of odd
else
a × power (a, n/2) (or) a × power (a, n%2) --recursion step in case of even.
www.Padasalai.Net
Read All Examples of Algorithms in this Chapter
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 88 | P a g e
11th Computer Science
www.Padasalai.Net www.TrbTnpsc.com
www.Padasalai.Net
http://www.trbtnpsc.com/2018/06/latest-plus-one-11th-study-materials-tamil-medium-english-medium-new-syllabus-based.html
Prepared By T.Thirumalai, M.Sc(CS).,B.Ed., Cell: 9750827717 89 | P a g e