By QB365 on 31 Dec, 2022
QB365 provides a detailed and simple solution for every Possible Questions in Class 12 Computer Application Subject - Important 5 Mark English Medium. It will help Students to get more practice questions, Students can Practice these question papers in addition to score best marks.
12th Standard
Computer Applications
Answer All Questions
Explain in detail Techniques of Animation.
Write the steps to place the text in a frame.
Discuss on various database models available in DBMS.
Discuss in detail about Website development activities.
Discuss in detail about User define Functions with a suitable example.
Explain the Function of Conditional Statements in PHP.
Discuss in detail about For each loop.
Discuss in detail about HTML form controls.
Explain MySQLi Queries with examples.
Mention some uses of network at business, home, mobile, social application
Explain about Internet, Intranet and Extranet
Classify and Explain the IP address and its classification.
What is meant by Registered Jack? Explain briefly the types of Jacks.
List out the Benefits of Open Source Software
Write a note on
a. Internet banking
b. Mobile banking
Write about dimensions of E-Commerce Security.
How Multimedia used in Libraries, Information centers and Archives? Explain
Write the steps to place text in a frame
Write the steps to place (Import) text from other software program in the pagemaker documents.
Differentiate Associative array and Indexed array?
Write a PHP program to display week days using switch case statement.
Explain detail about while loop in looping structure with example, Write the uses of while loop.
Write the program for Login module using PHP and HTML form handling mechanism and get the output for it.
Explain the Database error handling and management process in PHP?
Write in detail about The Interner Explosion?
Explain in detailed about Third Generation of Mobile Networks.
List the basic rules of Domain Name?
Explain about pins details of Ethernet connector.
Explain in detail about network simulation tool - NS2
What are the Limitations of E-Commerce
Answers
1. Animation is the process of displaying images with continuous movement.
2. In animation, the screen object is a vector image in animation.
3. Using numerical transformations the movement of that image along its path is calculated for their defining coordinates.
4. The least frame rate of atleast 16 frame/sec gives the impression of smoothness and for natural looking it should be atleast 25 frame/sec.
5. Animations may be in two or three dimensional.
6. The two dimensional animation, bring an image alive, that occur on the flat X and Y axis of the screen, while in three dimensional animation it occurs along the three axis X, Y and Z.
7. The two basic types of animations are (1) Path animation and (2) Frame animation.
(1) Path Animation
It involves moving an object on a screen that has a constant background.
E.g. A cartoon character may move across the screen regardless of any change in the background or the character.
(2) Frame Animation
In frame animations, multiple objects are allowed to travel simultaneously and the background also changes.
To place text in a Frame
(i) Click on any one Frame tool from the Toolbox.
(ii) Draw a frame with one of PageMaker's Frame tools (Rectangle frame tool (or) Ellipse Frame Tool (or) Polygon frame Tool). Make sure the objects remains selected.
(iii) Click on File > Place. The Place dialog box will appears.
(iv) Locate the document that contains the text you want to place, select it.
(v) Click on Open.
(vi) Click in a frame to place the text in it.The text will be placed in the frame.
The database technology came into existence in terms of models with relational and object- relational behavior. The major database models are listed below:
1. Hierarchical Database Model:
(i). The famous Hierarchical database model was IMS (Information Management System), IBM's first DBMS.
(ii). In this model each record has information in parent/child relationship like a tree structure.
(iii). The collection of records was called as record types. This individual records are equal to rows.
Advantages: Less redundant data, efficient search, data-integrity and security.
Limitations: Complex to implement and difficulty in handling many to many relationship.
2. Network model:
(i). The first developed network data model was IDS (Integrated Data Store) at Honeywell.
(ii). Network model is similar to Hierarchical model except that in this model each member can have more than one owner.
(iii). The Many to Many relationships are handled in a better way.
(iv). This model identified by the three database components Network schema, Sub schema and Language for data management.
Network schema: schema defines all about the structure of the data base.
Sub schema: controls on views of the database for the user.
Language: basic procedural for accessing the database.
3. Relational model:
Oracle and DB2 are few commercial relational models in use Relational model is defined with two terminologies: Instance and Schema.
Instance: A table consisting of rows and columns.
Schema: Specifies the structure including name and type of each column.
4. Object oriented database model:
(i). This model incorporates the combination of Object Oriented Programming (OOP's) concepts and database technologies.
(ii). Practically, this model serves as the base of Relational model. Object oriented model uses small, reusable software known as Objects.
(iii). These are stored in object oriented database.
Website development has done by the following activities.
1. Website or webpage is developed by the programmer using PHP script.
2. Entire website codes are moved to web server path in a remote server machine.
3. From the client side, the end user open a browser, types the URL of the website (or) webpage and initiates the request to remote server machine over the network.
4. After receiving the request from client machine the web server tries to compile and interpret the PHP code which is available in remote machine.
5. Response will be generated and sent back to the client machine over the network from webserver.
6. Finally the browser is installed in the client machine receives the response and displays the output to user, as shown in fig.
1. User Defined Function (UDF) in PHP givesa privilege to user to write own specific operation inside of existing program module.
2. Two important steps the Programmer has to create for users define Functions are:
Function Declaration
1. User-defined Function declaration begins with the keyword "function".
2. User can write any custom logic inside the function block.
Syntax:
function functionName()
{
Custom Logic code to be executed;
}
Function Calling:
1. A function declaration part will be executed by a call to the function.
2. Programmer has to create Function Calling part inside the respective program.
Syntax:
functionName();
Example:
function insertMsg() {
echo "Student Details Inserted Successfully!";
}
insertMsg(); // call the function
?>
(i) If statement in PHP: If statement executes a statement or a group of statements if a specific condition is satisfied as per the users expectation. This is the simplest PHP's conditional statement and can be written in the following form.
Syntax:
if (condition)
{
// code to be executed if condition is true;
}
(ii) If else statement in PHP: The if statement evaluates a condition and executes a set of code if the condition is true and another set of code if the condition is false.
Syntax:
if(condition)
{
//True-block;
}
else
{
//False-block;
}
(iii) If-elseif-else statement in PHP: If-elseif-else statement is a combination of if-else statement. Here multiple conditions can be checked and action is based on the result of the condition.
Syntax:
if (Condition 1)
{
//code to be executed if condition 1 is true;
}
elseif (condition2)
{
//code to be executed if condition1 is false and condition2 is true;
}
elseif (condition3)
{
// code to be executed if condition1 and condition2 are false and condition3 is true;
}
else
{
//code to be executed if all conditions are false;
}
Switch case: The switch case is an alternative to the if.. elseif.. else statement which executes a block of code corresponding to the match.
Syntax:
switch (expression)
case value1:
//code to be executed if expression= value1; break;
case value2;
//code to beexecuted if expression = value2; break;
...
default:
//code to be executed if cexpression is not equal to any of the values;
}
1. The foreach statement is used to loop through arrays.
2. The loop iteration depends on KEY value pair in the array.
3. In the loop iteration, the value of the current array element is assigned to $value and the array pointer is shifted by one until it reaches the end of the array element.
Syntax
for each ($array as $value)
{
code to be ex
}
Examples:
for each ($student_name as $value)
{
echo $value
";
}
?>
Output:
Sriakshaya
Sriram
Srisai
Srivatchan
The following control are available in HTML forms:
(i) Text inputs
(ii) Buttons
(iii) Checkbox
(iv) Radio box
(v) File Select
(vi) Form Tag
(i) Text inputs contain textbox and text area controls.
(ii) Buttons may contain Submit button, Reset button and Cancel Button.
(iii) Checkbox is a important feature which selects more than one value from the HTML form.
(iv) Radio box is similar to checkbox but one value can be chosen at a time.
(v) File select is the best feature to select one file from the local machine to server machine at a time.
(vi) Form tag is used to mention a method (POST or GET) and control the entire form controls in the HTML document.
Performing Queries: The main goal of MySQL and PHP connectivity is to retrieve and manipulate the data from MySQL database server. The SQL query statements are help in PHP MySQL extension to achieve the objective of MySQL and PHP connection. “mysqli_query” is a function, that helps to execute the SQL query statements in PHP scripting language.
Syntax:
mysqli_query(“Connection Object”,“SQL Query”)
Example:
$con=mysqli_connect(“localhost”,“my_user”,“my_password”,“Student_DB”);
$sql=“SELECT student_name,student_age FROM student”;mysqli_query($con,$sql);
Network in Business:
(i) Communication is very important factor for successful business operations. There by with the growth of computer network and speedy Internet services, business also developed drastically.
(ii) Internet conversation made conversation faster, quick decision making and money saving e-banking paying methods for easy transactions.
(iii) Cheap marketing price and easy selection of products through internet with customers satisfaction can also be done. Company license, renewals, other certificates, bill payments, receipts, invoice, stock maintenance, can be done without any geographical boundaries via Internet and computer networks.
(iv) Government subsidies are available for their business to promote their business by digitization.
Network at Home:
(i) Network has become common as it facilitates communication among devices with in the close vivinity of a home.
(ii) Devices in this network can be smart devices, mobile computers, network printers which are caable of interacting and there by increase the quality of life inside home in a variety of ways like automation of repetitive tasks, increased personal productivity, enhanced home security and easier access to entertainment.
(iii) Network at home helps us to perform e-banking, e-learning, e-goverance, e-health, telemedicine, call centers, video conferencing, digitalization of memories, etc.
Network at Social Application:
(i) To get connected to with people around the world through social network media, applications like Whatsapp, Facebook, Twitter, Blogs, Pinterest, Classmate and so on are in full fledge use.
(ii) Through the social meida we share our thoughts, ideas, files and also chats.
INTERNET:
(i) The Internet is a worldwide system of computer networks- A network of networks where the users at any one computer can get information from any other computer.
(ii) The Internet is a network of global connections - comprising private, public, business, academic and government networks connected by guided, wireless and fiber-optic technologies.
(iii) The unique aim was to generate a network that would permit users of a research computer from one university to "talk to" research computers on other universities.
(iv) The Internet denotes to the global communication system, including infrastructure and hardware, whereas the web is one of the services interconnected over the Internet.
INTRANET:
(i) Intranet is a private network within an enterprise to share company data and computing resources between the employees.
(ii) It may consist of many interlinked local area networks.
(iii) It includes connections through one or more gateway (connects two networks using different protocols together known as protocol convertor) computers to outside Internet.
EXTRANET: Extranet is a private network that uses Internet technology and the public telecommunication system to securely share business information with suppliers, vendors, partners, customers, or other business.
IP Address:
(i) Internet Protocol (IP) address is simply the logical address in the network layer.
(ii) IP address is used to find the host system in the whole network. Due to increasing the number of systems in a network there is a need of more addresses. It leads to two addressing methods i.e., IPv4 and IPv6.
IPv4 address:
(i) The IPv4 address is a 32-bit unique address given to a computer on the network. So no two systems on the network can have the same IP address.
(ii) If the network has p connactions, then 'p' addresses should be there. An address space is the total number of addresses that can be made by that protocol (IP).
(iii) It is determined by the number of bits that the protocol use. If the protocol uses 'n' bits then the address space of that protocol would be '2nd' addresses.
(iv) So, the number of addresses that can be formed in IPv4 is 232. there are two ways to represent the IP address
(v) In binary notation the address is expressed as 32-bit binary values. For E.g. 0011100110001001 00111000 00000111
(vi) In dotted-decimal notation the address is written in decimal format separated by dots(.). For Eg: 128.143.137.144
IPv6 Address:
(i) The IPv6 address is a 128-bit unique address given to a computer system. The number of addresses that can be formed IPv6 is 2128.
(ii) In IPv6 address, the 128 bits are divide into eight 16-bits blocks. Each block then changed ito 4-digit Hexadecimal numbers separated by colon symbols.
(iii) E.g. 2001:0000:3231:DFE1:0063:0000:0000:FEFB.
Registered Jacks: A Registered Jack commonly known as RJ is a network interface used for network cabling, wiring and jack construction. The primary function of the registered jack is to connect different data equipment and telecommunication devices. The commonly known registered jacks are RJ-11, RJ-45, RJ-21,and RJ-28. The registered jack refers to the male physical connector (Plug), a female physical connector (Jack) and it's wiring.
Types of Registered Jacks:
(i) RJ-11 :
It is the most popular modern form of registered jack. It is found in home and used for landline phones. There are 6 pins where the two pins give the transmission configuration, the two pins give the receiver configuration and the other two pins will be kept for reserved.
(ii) RJ-14 and RJ-61:
The RJ-14 is also used in telephone lines like RJ-11. It has 6 pins whereas the RJ-61 has 8 pins. RJ-61 uses the twisted pair cable to connect the network devices.
(iii) RJ-21:
The RJ-21 connector has 50 pins with 25 pins at one end and 25 pins at the other end. It is also called as champ connector or Amphenol connector. The Amphenol is a connector manufacturer.The RJ-21 interface is typically used for data-communication trucking applications.
OSS projects are collaboration opportunities that improve skills and build connections in the field.
Domains that developers can contribute to the open source community include:
1. Communication tools.
2. Distributed revision control systems.
3. Bug trackers and task lists.
4. Testing and debugging tools.
(i) There are many open source softwares. So, we can select and use any software that suits our needs.
(ii) The complete options of the software can be used without any cost and restrictions.
(iii) We can share our ideas with the team. write the required code and share it with many.
(iv) As we can identify the programming techniques of group members, we can learn many ideas and make our program writing skills more efficient.
(v) The coding in open source software are being groomed by many enthusiastical members of the groups. So, if we report problems that we have in the program they are quickly mended by the group's effort.
(vi) As we can make changes to the open source software, we can add the most required features in the software.
(vii) Many open source software are very user friendly.
(a) Internet banking:
(i) Internet banking is a collective term for E-banking, online banking, virtual banking (operates only on the Internet with no physical branches), direct banks, web banking and remote banking.
(ii) Internet banking allows customers of a financial institution to conduct various financial transactions on a secure website operated by the banking institutions.
(iii) This is a very fast and convenient way of performing any banking transactions.
(iv) It enables customers of a bank to conduct a wide range of financial transactions through its website. In fact, it is like a branch exclusively operating of an individual customer.
(v) The online banking system will typically connect to the core banking system operated by customers themselves (Self-service banking).
(b) Mobile banking:
(i) Mobile banking is another form of net banking.
(ii) The term mobile banking (also called m-banking) refers to the services provided by the bank to the customer to conduct banking transactions with the aid of mobile phones.
(iii) These transactions include balance checking, account transfers, payments, purchases, etc. Transactions can be done at anytime and anywhere.
(iv) The WAP protocol installed on a mobile phone qualifies the device through an appropriate application for mobile session establishment with the bank's website.
(v) In this way, the user has the option of permanent control over the account and remote management of his own finances.
(vi) Mobile Banking operations can be implemented in the following ways:
As the security issue is the most worrying issue for E-Business, ensuring the security of E-Commerce activities has become the core research field of E-Commerce. The following are some of the security elements involved in E-Commerce.
(i) Authenticity:( conforming genuineness of data shared.
(ii) Availability:prevention against data delay or removal.
(iii) Completeness: unification of all business information.
(iv) Confidentiality: protecting data against unauthorized disclosure.
(v) Effectiveness: effective handling of hardware, software and data.
(vi) Integrity: prevention of the data being unaltered.
(vii) Non-repudiation: prevention against violation agreement after the deal.
(viii) Privacy:prevention of customers personal data being used by others.
(ix) Reliability: providing a reliable identification of the individuals or businesses.
(x) Review ability: capability of monitoring activities to audit and track the operations.
Multimedia technologyis adopted by the libraries in various functions like multimedia kiosks, user orientation programs etc. Following is the brief account of multimedia technology applications in libraries.
1. Multimedia Kiosk
(i) Kiosk is a free-standing furnished equipped multimedia computer that allows users to retrieve information via a touch screen. It is commonly used in airports and other public locations to provide directions and few mandatory information's.
(ii) In an library, Kiosk is usually located nearthe entrance of the library, used for displaying announcements, reading lists, comments and suggestions from library users and other information's about operations and programs of the library.
2. Webcasting and Video Conferencing
(i) The live telecast of real time programs through internet is known as Webcasting.
(ii) Video conferencing isthe process of conducting conference between more than two participants at different sites by using computer networks to transmit audio and video data.
3. User Orientation Program
(i) The role of multimedia plays anvital role in training the librarians in schools, colleges and universities due to its interactivity. Hence, it is used in depth subject training to their faculties .
4. In-house Production of Multimedia Resources and E-publishing
(i) Many libraries produce multimedia resources in-house, to serve the parent organization.Introduction of CD/DVD and their writershas solved few of the problem of libraries in storing or achieving the materials.
(ii) Multimedia tools along with CD-writers is made possible to publish information from dlfferent sources in a most easy to use and acceptable form tolibrary users.
5. Digital Multimedia Libraries
(i) Information's are available indigital formats that include digital books, scann ed images, graphics and digitized audlo-visuat clips etc
(ii) Initially digital library projects were based only on textual data, later it was on all other media elements like images, audio and video recordings were also integrated under the collection of digital library.
1. Click on one of a Frame tool from the Toolbox
2. Draw a frame with one of PageMaker's Frame tools (Rectangle frame tool or Ellipse Frame Tool or Polygon frame Tool). Make sure the object remains selected.
3. Click on File. The File menu will appear.
4. Click on Place. The Place dialog box will appear.
5. Locate the document that contains the text you want to place, select it.
6. Click on Open.
7. Click in a frame to place the text in it. The text will be placed in the frame.
(i) Choose FiIe > Place. The Place dialog box will appear.
(ii) Locate the document that contains the text you want to place and select it.
(iii) Click on Open in the Place dialog box. The pointer changes to the loaded text icon
(iv) Make a text block to place the text. (Or) Click in the page to place the text. The text will be placed in the page.
Associative Array | Indexed Array |
(i) Associative arrays have strings as keys and behave like two-column tables (like array) (ie, (0, 0), (0, 1), etc. | (i) Keys of an indexed array are integers and beginning at 0 (zero). (ie, 0, 1,2, etc) |
(ii) First column is the key which is used to access the value | (ii) Indexed arrays are used when you identify things by their position. |
(iii) They have key-value pairs | (iii) Value is accessed using indexes |
(iv) Syntax array (key => value, key => value, key => value, etc.); key = Specifies the key (numeric or string) value = Specifies the value |
(iv) Syntax \(\$\)student = array ("SName1", "SName2", "SName3"); |
(v) Example \(\$\)Marks =array("Student1" => "35", "Student2" => "17", "Student3" => "43") echo "studentl mark is" . \(\$\)Marks['student1']. "is eligible for qualification"; echo "student2 mark is" . \(\$\)Marks['Student2'] . "is not eligible for qualification'; ?> |
(v) Example \(\$\)teacher_name= array(" Iniyan", "Kavin","Nilani"); echo "The students name are " . \(\$\)teacher_ name[0] . ", " . \(\$\)\(\$\)teacher_narnel1] . " and " . \(\$\)teacher_name[2] . "."; |
< ?php
$n = "February";
switch($n) {
case "January":
echo "Its January";
break;
case "February":
echo "Its February";
break;
case "March":
echo "Its- March";
break;
case "April":
echo "Its April";
break;
case "May":
echo "Its May";
break;
case "June":
echo "Its June";
break;
case "July":
echo "Its July";
break;
case "August":
echo "Its August";
break;
case "September":
echo "Its September";
break;
case "October":
echo "Its October";
break;
case "November":
echo "Its November";
break;
case "December":
echo "Its December";
break;
default:
echo "Doesn't exist";
}
? >
(i) While loop is an important feature which is used for simple iteration logics.
(ii) While loop executes a block of code while a condition is true.
Syntax
while (condition io true)
{
code to be executed;
}
Example:
$i=1;
while (\(\$\)i<=5)
{
echo "The number is". \(\$\)i. "
i++;
}
?>
Uses:
We can use a while loop to read records returned from a database query.
Output:
The number is 1
The number is 2
The number is 3
The number is 4
The number is 5
Test.html
< html >
< body >
< form action = "welcome.php" method = "post" >
Name: < input type = "text" name = "name" > < br >
Email < input type = "text" name = "email" > < br >
< input type = "submit" >
< /form >
< /body >
< /html >
Welcome,php
< html >
< bodp >
Welcome <?php echo $_POST["name"]:
?> <br>
Your email address is: <?php echo $_POST ["email"];
?>
</body>
</html>
Output:
Explanation:
(i) HTML file contains two text boxes such as Name and Email, one Submit button and one form tag. The remote server PHP file (welcome.php) is mentioned in form tag under the action attribute.
(ii) In "Welcome.php" file, PHP variables such as $_POST and $_GET collect the data and prepares the response accordingly. The user will receive the output response in the client machine's browser screen.
Error handling is the process of catching errors raised by our program and then taking appropriate action.
Different error handling methods are
Simple "die ()" statements;
Custom error and error triggers;
Error reporting.
(i) Using the die () function:-
Example:
$file = fopen("Welcome.txt", "r");
?>
Above example shows a simple script that opens a text file. If the file does not exists you might get an error like this.
Warning:
fopen (welcome.txt) [function.fopen]: failed to open stream: No such file or directory in
C:\webfolder\test.php on line 2
To prevent the user from getting an error message like the one above, test whether the file before we
try to access it.
if (!file_exists ("welcome.txt"))
{
die ("File not found");
} else
{
file = fopen ("Welcome.txt", "r");
}
Now if the file does not exists you get an error like this
File not found
The code above is more efficient than the earlier code, because it uses a simple error handling mechanism to stop the script after the error.
However, simply stopping the script is not always the right way to go. Let's take a look at alternative php functions for handling errors.
(ii) Creating a custom Error Handler
Creating a custom error handler is quite simple. Simply create a special function that can be called when an error occurs in PHP.
This function must be able to handle a minimum of two parameters (error level and error message) but can accept up to five parameters.
Syntax:
error_function (error_level, error_message, error_file, error_line, error_context)
(iii) Error report levels:
These error report levels are the different types of error the user defined error handler can be used for:
E_WARNING, E_NOTICE, E_USER_ERROR, E_USER_WARNING, E_USER_NOTICE,... etc.
Set Error Handler:
The default error handling for PHP is the built-in error handle;
Example:
To use our custom error handle for all errors:
set_error_handler("Custom Error");
The Internet Explosion
(i) Internet is simply defined as the World Wide Web connection of individual networks which operated by academic, industry, government, and private parties.
(ii) The Internet served to interconnect with laboratories engaged at government research, and from 1994 it is expanded to serve millions of user and a multiple purpose in all parts of this universe.
(iii) In few years, the Internet built itself as a highly powerful platform that changed their way we do business and the way we communicate. Internet promotes as the universal source of information of billions of people, at work, at home, at school. Internet gave high communication medium, has given an international, "Globalised" at all dimension of the world.
(iv) Internet is growing all the time. By two things, have marked its evolution nowadays the mobile technology and social web. These two innovations have been changed the people life style to use Internet. We may find many communities in social web. Facebook was created in 2004 but gowned into world wide network all over more than 2,230 million active users.
(v) Mobile technology on hand made possible to great reach of Internet and increase the Internet user all over the world.
(vi) The Internet allows all to be democratic in mass media. Anyone can have a webpage in
(vii) Internet with very low investment. Similarly any business can reach a very large market directly, economically and fast, no matter of location or size of their business. Almost anyone that who san read and write can have a access and a presence in World Wide Web with very low investment. People everywhere can express and publish their ideas and opinions via blogging.
(i) Third generation of mobile systems merges different mobile technology standards, and uses higher frequency bands for transmission and Code Division Multiple Access to delivery data rates of up to 2Mbit/s supports multimedia services (MMS: voice, video and data) .
(ii) European standard is UMTS(Universal Mobile Telecommunication Systems).
(iii) Mobile phones systems continue to use digital transmission with SIM authentication for billing systems and for data incorruption.
(iv) Data transmission used a WCDMA. WCDMA stands for (Wideband Code Division Multiple Access).
(v) One technique to obtain data rates between 384kbit/s and 2048kbit/s. Few 3G suppliers use ATM (Asynchronous Transfer Mode) for their 'over the air' network with in MPLS(Multiprotocol Label Switching) or IP for theirs backbone network.
(vi) Mobility still supported at layer2, and hence like 2G it still prohibits seamless roaming beyond heterogeneous access networks and routing domains.
(vii) The transmission were band frequencies are between 1900 and 2200 MHz. All UMTS license holders at the UK holds a 20-year license with the condition that 80% population coverage is achieved by 31 December 2007.
(viii) The present third generation licensed operators in the UK can be seen below as at August 2004.
(i) Domain can consist of Alphabets a through z, and the digits 0 through 9.
(ii) Hyphens are allowed, but hyphens can not be used as first character of a domain name.
(iii) Spaces are not allowed
(iv) Special symbols (such as !, $, &, _ and so on) are not permitted .
(v) Domain names have the minimum length of 2, and the maximum length of 63 characters. The entire name may be at most 253 characters long.
(vi) Domain names are not case-sensitive. (It may be upper, lower or mixing of both case letters).
Figure shows Ethernet wiring schemes T568A and T568B. The pin 1 shows the transmission positive, the pin 2 shows the transmission negative, the pin 3 shows the receiver positive. The pin 4 shows the reserved position it is nothing but tells the connection for some other use.
(i) The pin 5, 7, 8 show the reserved position it is nothing but tells the connection for reserved position.
(ii) The pin 6 shows the receiver negative.
(iii) The two main signals of the pins: The one is the Tx which is transmission of data and Rx which is receiver of data.
From the figure
1. The position, of Pin 1 describes the transmit data or bidirectional, the bidirectional means it can be sent io both connections with the Tx (positive), the Tx+ has a positive terminal and the color used in this position is white-green.
2. In this position of pin no. 2 describes the transmit data (or) bidirectional with the Tx (negative). The Tx- has a negative terminal and the color is used in this position is Green.
3. In this position of pin no. 3 describes the received data (or) bidirectional with the Rx (positive). The Rx is compatible to receive the data which has positive terminal and the color is used in this position is white orange.
4. In this position of pin no. 4 describes that it is not connected or bidirectional. It means there will be no transmitting (or) receiving will exist But it can be used later for some other connection and the color used is blue.
5. In this position of pin no. 5 describes that it is not connected (or) bidirectional and the color is white blue.
6. In this position of pin no. 6 describes the receive data (or) bidirectional with the Pd (negative) which has a negative terminal and the color used is orange.
7. In this position of pin no. 7 describes that it is not connected or bidirectional and the color is white brown.
8. In this position o fpin no 8 describes that it is not connected or bidirectional and the color is brown.
Network simulation
In a computer network, network simulation is a method whereby a software program models the activities of a network by calculating the communication between the different network objects such as(routers, nodes, switches, access points, links, etc.).
Network simulator
(i) A network simulator is a software program that replicates the functioning of a computer network.
(ii) In simulators, the computer network is typically demonstrated with devices, traffic, etc. and the performance is evaluated.
Normally, users can then adapt the simulator to accomplish their precise analysis needs.
Network Parameters:
The network parameters define the state of the network (node placement, existing links) and the events (data transmissions, link failures, etc.).
Trace files:
A significant output of the simulation is the trace files. Trace files can document every incident that happened in the simulation and are used for examination.
NS2: NETWORK SIMULATOR version 2.
(i) It was considered explicitly for exploration in network communication and event-driven opensource simulator in computer.
(ii) OTCL and C++ used to create and run NS2.
(iii) NS2 works on Windows and Linux platforms that support wired or wireless network and also use the command line interface as a user interface.
API:
(i) API a pure event base software tool with super simulation design, it has more models which help the user to get desired output easily.
(i) E-Commerce also has some limitations. The following are the major drawbacks of E-Commerce for a business organization.
(ii) In E-Commerce, the customer should wait between placing the order and having the product in hand.
(iii) The doubts about the period of returning, will the returned goods reach source in time, refunds, exchange, and postage make one tiresome.
(iv) Privacy issues are serious in E-Commerce.
(v) In E-Commerce generating consumer information is inevitable. Not all the companies use the personal information they obtained to improve services to consumers.
(vi) Many companies misuse the information and make money out of it.
(vii) It is true that privacy concerns are a critical reason why people get cold feet about online shopping Physical product disputes are a major disadvantage in E-Commerce.
(viii) In online shopping, we would see only the pictures the seller had chosen for us.
(ix) The Internet needs to survive the trip from the supplier to the consumer. This makes the customers turn back towards traditional supply chain arrangements.
(x) It is pretty hard to knock on their door to complain or seek legal recourse. Further, even if the item is sent, it is easy to. start bothering whether or not it will ever arrive on time.