The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

PLUS ONE COMPUTER APPLICATION PREVIOUS QUESTIONS CHAPTER WISE

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by Cods-tech, 2019-11-03 02:45:24

PLUS ONE COMPUTER APPLICATION PREVIOUS QUESTIONS CHAPTER WISE

PLUS ONE COMPUTER APPLICATION PREVIOUS QUESTIONS CHAPTER WISE

Keywords: PLUS ONE COMPUTER APPLICATION PREVIOUS QUESTIONS CHAPTER WISE

}
return 0;
}

Output

First Run:
Enter the number :1005
One thousand five

Second Run:
Enter the number :01500
One thousand five hundred
Third Run:
Enter the number :1234
one thousand two hundred thirty four

15. . Rewrite the following C++ statement using if .. … …. Else statement
cout<<result = mark > 30 ? “Passed” : “Failed”;

Ans.

if(mark>30)

{

cout<<result="Passed";

else

cout<<result="Failed";

}

16. . a) Correct the errors in the following program code to display numbers from 1 to 10.

for (i=1; i>-10; i++)

cout>>i;

Ans.
for(int 1=1;i<=10;++i)

{

cout<<i;
b) Explain the different types of programming errors with the help of the above code
17. Write the syntax of switch statement. Explain using an example of switch its working

Switch statement is a multiple selection statement.
Syntax

switch
(expression)
{
case constant 1 : statement block 1;

Break;
case constant 1 : statement block 1;

Break;
case constant 1 : statement block 1;

Break;
… .. … .. ..
default : statement block n;
}
Unlike in else if ladder here the case value should be a constant value (not a range of values). If
any case value is matched corresponding statement block will be executed and then the break
statement to exit from the switch statement. If no match is found , then the default block get
executed.
Eg.
switch (day)
{

case 1: cout << “Sunday”;
break;

case 2: cout <<”Monday”;
break;
.. .. ……

default: cout<<”Wrong input”;
}
18. Compare the working of “do….. while” loop and “while” loop using an example.

do--while loop:
Syntax
Initialization of loop control variable;

do
{
body of the loop;
updating of loop control variable;
}
( test expression);
eg.

n=1;
do
{

cout << n ;

++n;
}

while(n<= 10);
At first initialization takes place n=1 Then test expression evaluated n<=10 If it is true
body of the loop executed, otherwise the program control goes out of the while loop. After
execution of update expression ++n . repetition takes place until test expression become false.

while loop:
Syntax

Initialization of loop control variable
while ( test expression)
{
body of the loop;
updating of loop control variable;
}

eg.
n=1;
while( n< = 10)
{
cout << n ;
++n;

}
At first initialization takes place n=1 Then test expression evaluated n<=10 If it is true
body of the loop executed, otherwise the program control goes out of the while loop. After
execution of update expression ++n . repetition takes place until test expression become false.
19. There are three looping statements in C++.

a) Which is the exit-controlled loop?
Ans. do--while loop

b) How does it differ from an entry controlled loop?
If the evaluation of test expression takes place only at the end of looping statements ,

such loops are known as exit control loop. Here minimum one iteration takes place.

20. Rewrite the following switch statement using if – else if statement :
switch (n)
{
case 4 : cout<<"Excellent";
break;

case 3 : cout<<"Good";
break;
case 2 : cout<<"Average";
break:
case 1 : cout<<"Poor";
break;
default : cout<<"Invalid";
}
Ans.

if(n==4)
{

cout<<"Excellent";
else if(n==3)

cout<<"Good";
else if(n==2)

cout<<"Average";
else if(n==1)

cout<<"Poor";
else

cout<<"Invalid";
}
21. State whether the following statements are true or false. If false give reason.
a). Break statement is essential in Switch.-----------True
b). For loop is an entry controlled loop. ---------- True
c). Do .. .. while loop is an entry controlled loop.--------- False

do---while loop is a exit contolled loop.
d). Switch is a selection statement.----------- True
22. Write a program to find the biggest from 3 given numbers

1. #include <iostream>
2. using namespace std;
3.
4. int main()
5. {
6. float n1, n2, n3;

7.
8. cout << "Enter three numbers: ";
9. cin >> n1 >> n2 >> n3;
10.
11. if(n1 >= n2 && n1 >= n3)
12. {
13. cout << "Largest number: " << n1;
14. }
15.
16. if(n2 >= n1 && n2 >= n3)
17. {
18. cout << "Largest number: " << n2;
19. }
20.
21. if(n3 >= n1 && n3 >= n2) {
22. cout << "Largest number: " << n3;
23. }
24.
25. return 0;
26. }

23. Rewrite the following code using if … .. else ladder.
#include<iostream>
using namespace std;
int main( )
{
int colour;
cout <<” Enter number between 1 and 4 : “;
cin>> colour;
switch(colour)
{

case 1 :
cout<< “Red”;

break;
case 2 :
cout<<”Green”;

break;
case 3 :
cout<<”Blue”;

break;
default :
cout<<”Wrong input”;
}
}

Ans.

#include<iostream>
using namespace std;
int main( )

{
int colour;
cout <<” Enter number between 1 and 4 : “;
cin>> colour;

if(colour==1)
{

cout<< “Red”;
else if(colour==2)
cout<< "Green";
else if(colour=="Blue";
cout<<"Blue";
else

cout<<”Wrong input”;
}
}

24. Rewrite the following code using switch case statement.
if (Lan=='M')
cout<< " I prefer Malayalam”;
else if (Lan = 'E’)
cout "I prefer English";

else
cout<<” I prefer neither Malayalam nor English” ;
Ans

switch(Lan)
{
case M:

cout<<" I prefer Malayalam”;
break;
case E:
cout <<"I prefer English";
break;
default:

cout<<” I prefer neither Malayalam nor English” ;
}

25. Write a C++ program to find the simple interest of an amount (P) deposited with a rate of
interest (R) for a period of Years (N).
Rate of interest = 7% If deposit amount P is less than 1 lakh.
Rate of interest = 8% if. Deposit amount P is between 1 lakh and 5 lakhs.
Rate of interest = 9o/o if deposit amount P is above 5 lakhs,
(Hint : Simple interest = P x N x R/100)

#include<iostream.h>
#include<conio.h>

int main()
{

float amount, rate, time, si;
cout<<"Enter Principal Amount: ";
cin>>amount;

cout<<"Enter Rate of Interest: ";
cin>>rate;

cout<<"Enter Period of Time: ";
cin>>time;

si = (amount * rate * time) / 100;
cout<<"Simple Interest: "<<si;

return 0;
}

Download Code

PLUS ONE COMPUTER APPLICATION

First Year Computer Application(Commerce) Previous Questions Chapter wise ..
Chapter 8. Computer Networks

1. A device that regenerates the incoming signals and retransmit them to their destination is
called ….. …..
Ans. Repeater
2. In communication system the term source refers to …….. …
Ans. Sender
3. If all devices are connected to a central switch/hub, the topology is known as… … ..
Ans. Star
4. "Client-server architecture is an example of centralized software management." Justify.

Client-server architecture is an example for centralised software management. When
software is loaded on the server and shared among the clients, changes made to the software in
the server will reflect in the clients also. So there is no need to spend time and energy for
installing updates and tracking files independently on the clients.
5. Which among the following communication technologies is the slowest?
a) Bluetooth

b) Wi-Fi

c) Wi-MAX

d) Satellite link

Ans. Bluetooth
6. Choose a data terminal equipment (DTE) from the following options.

a) Bridge

b) Modem

c) Router

d) Gateway

Ans. Modem
7. A … … is a computer peripheral that allow you to connect and communicate with other
computer via telephone lines.

Ans. Modem
8. Find the odd one from the following.

a). DOS

b). DSL

c). ISDL

d). FTTH

9. What is the importance of TCP / IP protocol in computer networks?

TCP/IP: Transfer Control Protocol/Internet Protocol used to interconnect network devices on
local network and internet. When data is send from one device to another, the data is broken in to
small packets by TCP and send through transmission medium. Delivery of each of these packets
to the right destination is done by IP. When the packets are received by the receiving computer,
TCP checks packets for error and assemble in to original message.

10. Write any two advantages of Network.

Data communication is possible : Computer network helps user to communicate with any
other user of the network through its services like e-mail chatting etc..

Resource Sharing: The sharing of available hardware and software resources ( like
programs, printers , hard disk etc..)in a computer network is called resource sharing

11. What are the advantages of Wi-Fi network?

Data transmission speed is up to 54 Mbps
Wi-Fi can connect more number of devices simultaneously

12. List any four advantages of forming computer networks.

Data communication is possible : Computer network helps user to communicate with any
other user of the network through its services like e-mail chatting etc..

Resource Sharing: The sharing of available hardware and software resources ( like programs,
printers , hard disk etc..)in a computer network is called resource sharing.

Reliability: A file can have copies in different computers . So breaking down of one system
does not cause data loss.

Scalability: Computing and storage capacity can be increased or decreased easily by
adding/removing computer or storage devises to the network..

13. Differentiate between HUB and SWITCH.

Hub: Hub is used in wired network to connect devices of the same network. It transmit
data to all the devises connected to it. Only the device to which data is assigned is responds to it.
Large network traffic due to this reduces its bandwidth.

Switch: Switch can be considered as an intelligent hub. It store addresses of all the device
connected to it. Switch read the destination address of the data from the packet and send data to
the particular destination device only. So network traffic can be reduced.

14. Explain the following terms in computer networking

a). Node

b). Bandwidth

c). Noise

Ans. a) Node: Any device that is directly connected to a computer network is called a node

b) Bandwidth: it is the amount of data transfer through a communication medium in
a unit time.

c) Noise: It is the unwanted electrical or electromagnetic energy that lowers the

quality of the data signals.

15. How is a WAN differ from a LAN?

WAN can span a geographically wide area like 1000 or more kilometers and may
include many small networks. It may use transmission media like microwave. The largest WAN
in the world is internet. In LAN Networking of communication devices within a limited area
like a building , room or a campus. It can setup using wired media(UTP/STP cable) or wireless
media( infrared, radio waves etc) and can cover up to a few kilometers.

16. Identify the name given to the physical arrangement of computers in a network?

Explain two types with block diagrams.

17. Compare ring topology and mesh topology

Ring Topology: All node computers are connected to a circular cable. All data is passing
through this cable.

Advantages: i). No signal amplification required because each node do this.

ii). Requires less cable, so cost effective

Disadvantages: i). If a node fails, entire network will fail.

ii). Addition of nodes is difficult.

Mesh Topology: In this Topology each node is connected to other nodes. So there is more
than one path between two nodes. So failure of one node may not affect the data
communication.

Advantages: i). If one workstation or a path fails, it does not affect the whole network.

Disadvantages: i). Requires more cables so very expensive.

ii). Very complex and difficult to manage.
18. Communication media is generally divided into two – wired and wireless media.

a) Give an example for wireless medium.

b) Compare the characteristics of three types of wired media.

Ans. a). WI-FI,WI-MAX,Satellite link

b). Twisted pair cable:
Unshielded Twisted pair cable(UTP)

Characteristics: Low cost, thin and flexible, ease of installation and carries data up to a length
of 100m.

Shielded Twisted pair cable(STP)

Characteristics: protection from electromagnetic noise, difficult to install and expensive.

b). Coaxial cables:

Characteristics: Expensive high band width, less flexible, difficult to install and carries data
up to a length of 500m.

c) Optical fibre:

Characteristics: High bandwidth, carries data over a long distance, expensive but effective
and difficult to install.

19. Consider that your teacher is planning to connect the computers in the computer lab of your
school to form network.

a) He has a switch and a hub to connect these computers. Which one would you prefer? Why?

b) Name a topology that you will suggest for this network. Give reasons for your suggestion.

Ans. Hub.

Bus topology.There is a main cable called bus from the server to which every node
computers are connected by short drop cables. A small device called terminator is attached at the
end of the bus. When a data signal reaches the terminator at the end, it is absorbed and the bus is
free to carry new signal.

20. Computer network has an important in the modern communication.

a). What is data communication?

b). Explain any two guided media?

c). List any four data communication devices.

Ans. a) Data communication is the exchange of digital data between any two devices through
a transmission medium.

b). Guided Media: Here data is transmitted through some physical media such as metal
wire or optical cable.

1. Twisted Pair cables: There are two types of twisted pair cables

a). Unshielded twisted pair(UTP): It is commonly used It is cheap and flexible. It consists of two
insulated conductors twisted together to avoid noise. Characteristics: Low cost, thin and flexible,
ease of installation and carries data up to a length of 100m.

b). Shielded Twisted pair(STP): Here the twisted pair itself is shielded again. Characteristics:
protection from electromagnetic noise, difficult to install and expensive.

2. Coaxial cables: It has an inner central metallic core surrounded by an insulating sheath. It is
then surrounded with a conducting outer cover and is again covered with a protecting insulation .
Characteristics: Expensive high band width, less flexible, difficult to install and carries data up to
a length of 500m.

c). a). Network Interface Card(NIC): It enables a computer to connect a network and
communicate. It can breaks up data into small units, translate the protocols , send and receive
data. It may be wired(Ethernet) or wireless(Wi-Fi).

b). Hub: Hub is used in wired network to connect devices of the same network. It
transmit data to all the devises connected to it. Only the device to which data is assigned is
responds to it. Large network traffic due to this reduces its bandwidth.

c). Switch: Switch can be considered as an intelligent hub. It store addresses of all the
device connected to it. Switch read the destination address of the data from the packet and send
data to the particular destination device only. So network traffic can be reduced.

d). Repeater: They are used to receive the incoming signal , amplify it to their original
strength and retransmit it

PLUS ONE COMPUTER APPLICATION

First Year Computer Application(Commerce) Previous Questions
Chapter wise ..

Chapter 9. Internet

1. Which one of the following is not a web browser?
a). Mozilla Firefox
b). Google
c). Internet explorer
d). Opera
Ans.b
2. Which one of the following statement is not true about e-mail
a). e-mail is environment friendly as it is not using paper

b). e-mail provide provision to attach audio, video and graphics
c). e-mail will not spread any kind of viruses
d).e-mail can be used to send same messages to many recipients simultaneously.
Ans. c
3. Pick the odd one out.
a) Virus
b) Trojan horse
c) Wikis
d) Worm

Ans. c
4. HTTP stands for … … .. …
Ans. Hyper text transfer protocol
5. .. … .. is a software used for removing worms and Trojans.

Ans. Anti-virus
6. Who introduced the term WWW?

Ans. Tim Berners Lee
7. Give an example of search engine

 Google.
 Bing.
 Yahoo.
 Ask.com.
 AOL.com.
 Baidu.

 Wolframalpha.
 DuckDuckGo.

8. Consider the relation given below Social network : facebook.com Which among
the following share a similar relationship as the above?

a) micro blog : blogger.com

b) social blog : twitter.com

c) content community : youtube.com

d) internet forum : linkedin.com

9. The small text files used by browsers to remember e-mail id, user name, etc. are
known as ..........

10. List the hardware and software requirements for connecting computer to internet.

A minimum of 20 GB of available space on the hard disk. Internet Connection
Broadband (high-speed) Internet connection with a speed of 4 Mbps or higher.
Keyboard and a Microsoft Mouse or some other compatible pointing device. Sound
card.

11. Write any two drawbacks in using social media?

 Lacks Emotional Connection. ...
 Gives People a License to be Hurtful. ...
 Decreases Face-to-Face Communication Skills. ...
 Conveys Inauthentic Expression of Feelings. ..

12. URL string consists of protocol,domain name and file name. Write the name of a
URL and mark these three parts in it.

 Transfer Protocol: this element of a URL can take on many forms which represent the protocol for how data from a webpage will be

transferred to a browser or client. Examples include http, https, and ftp. Most ordinary websites use http or https, and any vital
information should be transferred via https. Common transfer protocols include:

http Hypertext transfer protocol
https HTTP Secure protocol

ftp File Transfer Protocol

 Domain Name: also known as website name or host name, the domain name element of a URL is often three parts: www (optional),

second level name (eg algosome in www.algosome.com), and top level name(.com, .org, .edu, .net). The domain name is an instruction:
telling your browser where to go to download the requested webpage. The 'www' portion is optional, and in many cases one can load a
website with or without the www and receive the same content. This is not always the case however: in many cases using one may
redirect a browser to the other format (eg algosome.com redirects to www.algosome.com). The top level domain often defines the type of
website, some of the more regulated names include:

.edu academic/educational site, typically a college or university.

.gov A website owned and operated by the government.

.org An organization

 Port: The port is often omitted from a URL, and when omitted assumed to be port 80. When present the port occurs after the domain

name, delimited from the domain name by a colon (for example, www.mydomain.com:8080). A port is a communication point through
which two computers communicate, the designation in the context of a URL defines which port to access on a website host.

 File name: the file name element of a URL is everything after the domain name, but before the file name ending (below). This is typically

(though not always) just a path to a file located on the web server.

 File Format: often .html, but in many other cases can be .php, .cgi, .html. The file format often (but not always) depicts how the web

server provides the content. For example, a .php ending is indicative that the webpage is being served by a php 'engine' - a scripting
language which facilitates 'dynamic' webpages (pages which are physically one file but present different information depending upon given
options). Common formats include:

.html Hypertext markup language

.php PHP hypertext processor

.cgi Common Gateway Interface

.jpg/jpeg jpg (pronounced 'jpeg') is an image file format, perhaps the most common on the
internet today.

 Query String: optional, the query string portion of a URL defines values sent to a website such that the website feeds the correct

information. The query string is found after the first question mark in the URL, and is represented by key/value pairs separated by an
ampersand (&). Query strings are used to send dynamic content - content which is created by the same file on the server but provides
different content based upon parameters in the query string.

 Fragment: A fragment is defined as a number sign followed by a name. The fragment instructs a browser where to focus its attention,

often by scrolling to the desired component. As an example, append '#webpage-fragment' to the end of this URL and a browser will scroll

down to this section.

 Hidden values: although not physically part of a URL, browsers can send information to a web server - worth noting as they can be

important players in internet navigation. These pieces of information include the browser name and version as well as 'cookies' - files

downloaded previously from a website used to customize appearance (for instance, login information, shopping cart items, etc...).

13. URL stands for Uniform Resource Locator. Every resource in internet has a
unique URL. Classify the following URL on the basis of,
http://www.dhsekerala.gov.in/index.html 8

a). Network protocol

b). Domain name

c). File Name

Ans. a) http
b) dhsekerala.gov.in
c) index.html8

14. Mr. Prasanth has bought a new laptop. He wants to take an Internet connection.
a) Explain him various types of broadband connectivity available in the market.
b) Suggest a web browser for him.

Ans. a) Internet connectivity is based on speed of the connection and technology used.
They can broadly classify in to dial up, wired broad band, and wireless broad band.
a). Dial Up connection: It uses telephone line and dial up modem connection is made
by dialing . It has a speed of 56kbps.
b). Wired Broadband connection: It is “always on” type connectivity with high band
width.
Common types of Wired Broadband connection are,
1). Integrated Service Digital Network(ISDN): It has a transfer rate It is capable of
transferring voice and digital data
). Cable Internet: It uses co-axial cables of cable TV network for data transfer. A
cable modem is used to connect cable network and computer. Its band width is about
10Mbps.
3). Digital Subscriber Line( DSL): It uses telephone line to transfer data and
voice. Commonly it uses Asymmetric Digital Subscriber Line(ADSL) technology
to allow a speed up to 24 Mbps.

4). Leased Line: It is a dedicated line used to transfer data with speed up to 100
Mbps.
5). Fibre To The Home(FTTH): It uses optical fiber from ISP to users home. By
using light signals , it has a very high band width.
A Network Terminal Unit(NTU) is installed at homes which connect
computers through FTTH Modem.
c). Wireless Broadband connectivity:
1). Mobile Broadband: It used in mobile devices like mobile phone, tablets etc in
which modem is built in or USB dongle is used. It allows freedom to use internet
on move. It uses cellular network to data transfer. Its speed increases with
generations like 2G, 3G, and 4G.
2).Wi-MAX:Worldwide interoperability for MicrowaveAccess combines the benefits
of
wireless and broadband. It has a bandwidth up to 70 Mbps to a range of 45 KM.
3). Satellite Broadband: Very Small Aperture Terminal(VSAT) dishes and transceiver
are used to communicate with satellite. A modem links the transceiver to
computer. Its speed is up to 1Gbps and is more expensive one
b) Mozilla firefox
15.What are the guidelines one must follow for using computers over the Internet?

a). Use antivirus, firewall and spam blocking s/w on your PC and update them
frequently

b).Download files only from reputed sites.

c).Do not respond or act on email sent from unknown sources.

d). Use complex passwords and change it frequently.

e). Do not select check boxes or click Ok buttons before reading the contents
of any agreement

f). Do not hide your identity to fool others.

g). Do not click on pop-ups and advertisements..

h).Always scan your USB drive for virus before use.

i). Use strong passwords.

j). Do not force the sites to remember your passwords.

k). Keep backup of your important files.

16. What is web browsing? Write the names of four web browsers.

To browse something to use search engines.

1.Internet Explorer. Internet Explorer (IE) is a product from software giant Microsoft.
...
2. Google Chrome. This web browser is developed by Google and its beta version was
first released on September 2, 2008 for Microsoft Windows. ...
3. Mozilla Firefox. Firefox is a new browser derived from Mozilla. ...
4. Safari. ...
5. Opera. ...
6. Konqueror. ...
7. Lynx.
17. List bad effects if any in using social media.

i).Intrusion to Privacy ii).Misuse of private information iii).Addiction iv). Spread
rumors.

18. George needs to prepare for a seminar on Backwaters in Kerala

a) Name any search engine through which George can get information about the
topic.

b) Explain the working behind the search engines to display the information about the
seminar topic.

Ans. a) Google

b) search engines websites are special programs to help people to find
information available on WWW. It searches WWW for possible key words by using
programs like crawler/spider or robots and make indexes of web pages containing that
keywords and saved in its server. When a user search with a key word, the search
engine software searches its server and show a list of URLs matching the search to the
user.

19. Internet offers a variety of services and they are used widely around the world.

a) One of these services requires an address [email protected]. Name this
service and write the reasons for the wide use of this service.

b) Name the service which provides a list of websites containing information about a
word or a phrase.

Ans. a) Email service. E-mails can access using websites like gmail, yahoo etc..or by
using e-mail client softwares like Microsoft outlook, Mozilla Thunderbird etc..which
allows send, receive and organize e. mails. For this they uses either Post Office
Protocol(POP) or Internet Message Access Protocol (IMAP)

disadvantages: i). e-mails may carry viruses
ii). Unwanted messages may consume a lot of space and time

PLUS ONE COMPUTER APPLICATION

First Year Computer Application(Commerce) Previous Questions
Chapter wise ..

Chapter 10. IT Applications

1. In ICT, BPO stands for .. …. …. … ….
Ans. Business Process Outsourcing

2. Which of the following not an e-business website?
a). www.amazon.com
b).www.dhsekerala.gov.in
c). www.keralartc.com
d). www.irtc.com

Ans. b

3. Application of ICT for delivering Government services to citizens in a
convenient efficient and transparent manner is called ………

Ans. E-Governance

4. Explain any three e-learning tools.

e-Text: Textual information available in electronic format is called e-Text. This text
can be read and interacted with an electronic device like computer, e-Book reader, etc.
e-Text can be converted to various formats to our liking using softwares. e-Text can
be automatically read aloud with the help of a computer or an e-Text reader device.
This is quite helpful for visually challenged people.

Online chat: It is a real-time exchange of text messages between two or more
persons over the Internet. In the virtual class environment, online chatting is used to
discuss the topics with teachers and other students. Chatting can be performed even
with a low speed Internet connection. Video chatting facility is also available. It
however requires fairly high speed Internet connection and supporting devices such as
web camera and speakers.

Educational TV channels: There are many telecasting/webcasting channels which
are dedicated for the e-Learning purpose. These channels broadcast recorded classes
on various subjects, interviews with experts, lab experiments, etc. Some of these
channels can be watched in the Internet also. Dooradarshan’s ‘VYAS’ and Kerala
Government’s ‘VICTERS’ channel are examples of educational television channels.

5. Explain any three e-Business services.

6. Remya has got a job at a call centre. What is a call centre? What type of job does a
call centre provide?

A call centre( also called service centre, sales centre, contact centre etc..) is a
telephone service facility set up to handle a large number of incoming and outgoing
calls for supporting various responsibilities of an organization.

A call centre (British English) or call center (American English) is a centralised office
used for receiving or transmitting a large volume of enquiries by telephone.

7. The system used for financial exchange between buyers and sellers in an online
Business is………

a) electronic business online

b) electronic payment system

c) business process outsourcing

d) online payment system

Ans. d

8. Compare the advantages and disadvantages of implementing e-business.

1. Easy to Set Up: It is easy to set up an electronic business. You can set up an online
business even by sitting at home if you have the required software, a device, and the
internet.
2. Cheaper than Traditional Business: Electronic business is much cheaper
than traditional business. The cost taken to set up an e-business is much higher than
the cost required to set up a traditional business. Also, the transaction cost is
effectively less.
3. No Geographical Boundaries: There are no geographical boundaries for e-
business. Anyone can order anything from anywhere at any time. This is one of the
benefits of e-business.
4. Government Subsidies: Online businesses get benefits from the government as the
government is trying to promote digitalization.
5. Flexible Business Hours: Since the internet is always available. E-business breaks
down the time barriers that location-based businesses encounter. As long as someone
has an Internet connection, you may be able to reach and sell your product or service
to these visitors to your business website.

Limitations

1. Lack of Personal Touch: E-business lacks the personal touch. One cannot touch
or feel the product. So it is difficult for the consumers to check the quality of a
product. Also, the human touch is missing as well. In the traditional model, we have
contact with the salesperson. This lends it a touch of humanity and credibility. It also
builds trust with the customer. An e-Business model will always miss out on such
attributes.

2. Delivery Time: The delivery of the products takes time. In traditional business, you
get the product as soon as you buy it. But that doesn’t happen in online business. This
lag time often discourages customers. However, e-businesses are trying to resolve
such issues by promising very limited delivery times. For example, Amazon now
assures one-day delivery. This is an improvement but does not resolve the issue
completely
3. Security Issues: There are a lot of people who scam through online business. Also,
it is easier for hackers to get your financial details. It has a few security and integrity
issues. This also causes distrust among potential customers.
9. Define e-Governance. Write any four advantages of e-Governance.

e-Governance is the application of ICT for delivering Government services to
citizens in a convenient, efficient and transparent manner.

a). Government to Government (G2G) : It is the sharing of data/ information
among government agencies, department or organizations.

b). Government to Citizen (G2C): It create interface between the government and
citizen to increase the availability and accessibility of public services. Its primary
purpose is to make the Government citizen – friendly.

c). Government to Business: It is used to aid the business community to interact
with the Government . Its objectives are to cut red-tapism, save time and cost and
create more transparent business environment.

d). Government to Employee: The Government policies and guidelines for
implementing various government programs are made available to employees as
orders and circulars. Employees salary and personal details are also managed through
it.

10. a). Expand the term ICT.

b). Briefly explain the advantages of implementing e-commerce.

Ans. a) Information and communications technology

b) a). It overcomes the geographical limitations of business

b). It minimize the operational cost, travel time etc.

c). It remains open all the time.

d). We can find a product quickly from a wide range of choices

11.Almost all services and business are available online now.

a) Name the system that facilitates money transaction between buyers and sellers in
such cases.

b) Explain the infrastructure of e-Governance

Ans. a) E- Commerce

b) Infrastructure for E-government

 Interoperability Framework for E-Government
 Government Backbone Network
 Central Computer Centre
 Central Internet Services
 E-Government Infrastructure Services
 Government Communication Network
 Central Cyber Government Office

TRUE IQ COMPUTER ONLINE ACADENY

SOLVED QUESTIONS

+1 COMPUTER
APPLICATION

SOLVED QUESTIONS
FROM

PREVIOUS QUESTION PAPERS

HTTPS://TRUEIQ1.BLOGSPOT.COM


Click to View FlipBook Version