Plus One Computer Application Notes Chapter 10 IT Applications

Students can Download Chapter 10 IT Applications Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 10 IT Applications

E-Governance
The integration of computers and communication technology for the benefit of government functions to the public is termed as E-Governance by this Govt can serve the public in a convenient, efficient, and transparent manner.

Types of interactions in e-Governance facilitate interaction between different Stakeholders in governance

  • Government to Government(G2G): Electronically exchanging data or information among Government agencies, departments, or organizations.
  • Government to Citizens(G2C): Exchange information between Government and Citizens
  • Government to Business(G2B): Interaction between the Government and Businessmen.
  • Government to Employees(G2E): The exchange of information between the Government and its employees

E-Government infrastructure
a) State Data Centre(SDC): It is used for providing e-Governance to Government agencies(G2G), Citizens(G2C), Business persons(G2B) by National e-Governance Plan(NeGP). The services are

b) Kerala State Wide Area Network(KSWAN)
It is envisaged to be the core common network infrastructure for e-Governance and the State Information Infrastructure(SII), connecting Thiruvananthapuram, Kochi, and Calicut. It acts as the backbone of SII.

c) Common Service Centre(CSC): These are the web-enabled points of the government, private, and social sector services. They provide services such as Agriculture, Health, Banking, Educational, Entertainment, Commercial, Transport services for the rural citizens of India. In Kerala, Akshaya centers are working as CSC.

Akshaya centers: These were launched in 2002 in the Malappuram Dist. In Kerala by the project of Kerala State Information Technology Mission(KSITM). Its aim is to provide services such as e-grants, e filing, e district, e-ticketing, ration card application, voter Id application, insurance, and Banking to the peoples of Kerala.

Benefits of E-governance: Its main aim is to provide better service to the people at any time and place with high speed. In the modern world, it is very helpful and convenient for people.

  • It enables automation of Govt, services
  • It ensures the participation of citizens hence strengthen the democracy
  • It ensures more transparency hence eliminates corruption
  • It enhances the responsibilities of various Govt. Departments
  • Its proper implementation saves time and money of the people by avoiding unnecessary visits to offices.

Challenges to E-Governance

  • Due to lack of e-Literacy, there is difficulty to access the service of E-Governance.
  • High-security measures are required because of the possibility of cyberattacks.
  • Implementation and maintenance requires a huge amount and planning
  • Some people refuse to give personal information due to anxiety
  • Various Departments’ integration is needed for the efficiency and effectiveness of e- Governance

Useful E Governance websites
Plus One Computer Application Notes Chapter 10 IT Applications 1

E-business(electronic Business): Providing services or running a business through the internet is called E-business.

e-commerce and e-business: Both are different. E-commerce means Electronic commerce. It includes the exchange of goods or services through the internet that involves the exchange of money whereas e-Business includes activities to run a business.

Electronic Payment System(EPS): It is also called plastic money that is electronically exchanging money between two individuals or firms(buyers and sellers) in, an online environment.

E-banking (Electronic Banking): Through electronic channels doing all the banking activities at any time and place through the internet.

Advantages of e-business:

  • It overcomes geographical limitations
  • It reduces the operational cost
  • It minimizes the time and cost
  • It remains open all the time
  • We can locate the product faster from a wider range of choices

Challenges to E-business

  • Peoples are unaware of IT applications and its uses
  • Most peoples don’t have plastic money(credit/debit card) and net banking
  • It requires high-security measurements otherwise you may lose money
  • We can’t touch or smell products through online
  • Some companies may not have proper Goods delivery service.

Useful e-Business websites
Plus One Computer Application Notes Chapter 10 IT Applications 2

Learning: It is the use of electronic media(lt includes text, audio, video, image, animation, etc), educational technology(lt includes Satellite TV, CD ROM, Computer Based Learning, etc) and information and communication technologies(ICT- it uses intranet/extranet and web-based learning) in education.

e-Learning tools

  • Electronic books reader(eBooks): With the help of a tablet or portable computer or any other device we can read digital files by using an s/w is called electronic books reader.
  • e-text: The electronic format of textual data is called e-Text.
  • Online chat: Real-time exchange of text or audio or video messages between two or more people over the Internet.
  • e-Content: The data or information such as text, audio, video, presentations, images, animations etc, are stored in electronic format.
  • Educational TV channels: TV channels dedicated only for the e-Learning purpose.
    Eg. VICTERS (Virtual Classroom Technology on Edusat for Rural Schools OR Versatile ICT Enabled Resources for Students)

Advantages of E-Learning :

  • It can offer a variety of courses to a large number of students from distant locations.
  • It saves journey time and money, instructor fees, etc.
  • People can enjoy e-Learning at a lower cost
  • It enables people to do courses conducted by national or international institutions.

Challenges to e-Learning

  • Face to face contact between student and teachers is not possible
  • Proper interaction is limited lack of infrastructure facilities
  • Its implementation requires a computer and high-speed Internet
  • The pupil may not get the proper motivation
  • It does not provide a real lab facility

Useful e-Learning websites
Plus One Computer Application Notes Chapter 10 IT Applications 3

ICT applications in health care
In the field of medicine and healthcare computers play a very important role. Such as diagnosing diseases, monitoring patients during surgery etc.

Medical equipment: Most of the medical equipment such as CT scanner, MRI scanner, Ultra Sound scanner, ECG, ECHO test, TMT, etc work with the help of computers

Electronic Medical Record(EMR): It is a digital version of a paper chart that contains all of a patient’s medical history from one practice. An EMR is mostly used by doctors for diagnosis and treatment.

Web-based support/diagnosis
Internet is used by the doctors to acquire information to diagnose and give treatment to the patients who are suffering from diseases,

Telemedicine:
With the help of Tele-Medicine, equipment doctors and nurses can examine patients in remote locations by monitoring the patient conditions such as BP, temperature etc., and give the correct medical treatment. Telemedicine is implemented with a telephone line and a computer.

Research and development:
Computers play an inevitable role in almost every branch of science and engineering. The role of computers in different fields of research and development is unavoidable. The most complex genetic problem may be evaluated with the help of computers easily and can simulate the actual systems using a computer. The computers help in diagnosis, treatment of patients and better running of hospitals

ICT enabled services:
Business Process Outsourcing(BPO): A business firm’s main aim is to increase the profit by reducing the expenditure for this some works are transferred to other contractors(manpower supply company common in other countries). The parent company is not responsible to such employees but the work will be carried out smoothly.

Knowledge Process Outsourcing(KPO): It is a form of outsourcing. Here the main job is knowledge and information related that is carried out by a third party company.

Call center: It is a third party company and its main aim is to serve the public for the payment of bills, purchase of goods, doubt clearance, etc. Here Telephone facility is set up to handle incoming and outgoing calls about goods or services for an organization.

Teleconferencing: It is a way of conferring, discussing or communicating by audio and video circuits, by a group of people located in geographically distributed areas. There are two types of conferencing video and audio. In audio conferencing, the participants can’t see each other but only hear the voices of one another.

Video conferencing: It is a type of Teleconferencing. The participants can see each other live on-screen and can speak to each other with the help of teleconferencing. They must.be sit in conference rooms connected through a teleconference system(A video camera and a speakerphone are connected to a computer with an Internet connection).

Plus One Computer Application Notes Chapter 9 Internet

Students can Download Chapter 9 Internet Notes, Plus One Computer Application Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Notes Chapter 9 Internet

History of the Internet: the Internet means an international network of networks. The first form of Internet is ARPANET(Advanced Research Project Agency Network) started by the US Department of Defence for their military during 1970’s. In 1989 a team lead by Tim Berners Lee introduced WWW(World Wide Web) by using the protocol HTTP. In 1998, the Internet Corporation for Assigned Names and Numbers (ICANN) was established.

Internet: It is a network of networks. It means that the international network. We can transfer information between computers within nations very cheaply and speedily.

Intranet: A private network inside a company or organisation is called an intranet.
Extranet: It allows vendors and business partners to access the company resources.

The hardware and software requirements for the internet.

  • A computer with a modem (internal/external)
  • A telephone connection
  • An account with an ISP
  • A browser S/W eg: Internet ExplorerorMozilla…

Types of connectivity
There are two ways to connect to the internet. First one dialing to an ISP’s computer or with a direct connection to an ISP.

Dial-up Connection: Here the internet connection is established by dialing into an ISP’s computer. If ISP is not busy they verify the user name and password if it is valid they will connect our computer to the internet.lt uses Serial Line Internet Protocol (SLIP) or Point to Point Protocol (PPP). It is slower and has a higher error rate.

Direct connection: In direct connection, there is a fixed cable or dedicated phone line to the ISP. Here it uses ISDN (Integrated Services Digital Network) a high-speed version of a standard phone line. Another method is leased lines that uses fibre optic cables. Digital Subscribers Line (DSL) is another direct connection, this uses copper wires instead of fibre, optic for data transfer. Direct connection provides high-speed internet connection and error rate is less. Fibre To The Home(FTTH) uses optical fibers for data transmission.

Wireless broadband connectivity
a) Mobile broadband: Accessing the Internet using wireless devices like mobile phones, tablet, USB dongles.

b) Wi-MAX(Wireless Microwave Access): It uses microwaves to transmit information across a network in a range 2 GHz to 11 GHz over very long distance.

c) Satellite broadband: Accessing internet through satellite. A Very Small Aperture Terminal(VSAT) dish antenna and transceiver and modem are required at the user’s location. Expensive and high speed.

Internet access sharing methods:
One Internet connection can be shared among several computers using a LAN, Wi-Fi or Li-Fi
a) Using LAN: The Internet connection in a LAN can be shared among other computers in the network

b) Using Wi-Fi (Wireless Fidelity): It uses radio waves to transmit information across a network in a range of 2.4 GHz to 5 GHz in short distance. Nowadays this technology is used to access the internet in campuses, hypermarkets, hotels by using Laptops, Desktops, tablet, mobile phones etc

c) Using Li-Fi(Light Fidelity) network: It is a fast optical(uses visible light for data transmission) version of Wi Fi. Its main component is a LED. lamp that can transmit data and a photodiode that acts as a receiver.

Services on the Internet
a) www – World Wide Web – This means this website address is unique and can be accessed each nook and corner of the world.

b) A browser is a piece of software that acts as an interface between the user and the internal working of the. internet. With the help of a browser the user can search information on the internet and it allows user to navigate through the web pages. The different browsers are

  • Microsoft internet explorer
  • Mozilla Firefox
  • Netscape Navigator
  • Google Chrome
  • Opera

c. Web Browsing:

  1. The browser determines the URL entered.
  2. The browser asks the DNS for URLS corresponding IP address (Numeric address)
  3. The DNS returns tne address to the browser.
  4. The browser makes a TCP connection using the IP address.
  5. then it sends a GET request for the required file to the server.
  6. The server collects the file and send it back to the browser.
  7. The TCP connection is released.
  8. The text and the images in the web pages are displayed in the browser.

Search engines
By using search engines we will get a variety of information. It is a newly developed tool that helped to search the information on the internet more effectively and easily. Search engines are programs that help people to locate information from crores of website on internet using a database that consists of references. Users can interact with the search engine through the home page of the search engine. To get the information about artificial intelligence just type this in the box provided for it and click the search button. Search engines searches by using a particular search algorithm then displays the matching documents or web addresses. Search engine use soft wares called spiders or bots to search documents and their web addresses. Spiders search the internet using the directions given by the search engines and prepare an index and stores it in a database. The searching algorithm searched this database when the users submits a request and create a web page displaying the matching results as hyperlinks.
Eg: Google, Yahoo, Rediff etc.

Email(Electronic mail) : It is used to send text, multimedia messages between computers over internet. An example of an email id is jobi_cg@rediffmail.com. Here jobi_cg is the user name, rediffmail is the website address and .com is the top-level domain which identifies the types of the organisation. To send an email we require an email address. Some websites provide free email facility. To send an email first type the recipient’s address and type the message then click the send button. The website’s server first check the email address is valid, if it is valid it will be sent otherwise the message will not be sent and the sender will get an email that it could not deliver the message. This message will be received by the recipient’s server and will be delivered to the recipient’s mailbox. He can read it and it will remain in his mailbox as long as he will be deleted. Simple Mail Transfer Protocol(SMTP) is used.

The email message contains the following fields.

  1. To: Recipient’s address will be entered here. Multiple recipients are also allowed by using coma.
  2. CC: Enter the address of other recipients to get a carbon copy of the message.
  3. bcc: The address to whom blind carbon copies are to be sent. This feature allows people to send copies to third recipient without the knowledge of primary and secondary recipients.
  4. From: Address of the sender
  5. Reply to: The email address to which replies are to be sent.
  6. Subject: Short summary of the message.
  7. Body: Here the actual message is to be typed.

The advantages of email are given below:

  • Speed is high
  • It is cheap
  • We can send email to multiple recipients
  • Incoming messages can be saved locally
  • It reduces the usage of paper
  • We can access the mailbox anytime and from anywhere.

The disadvantages are:

  • It requires a computer, a modem, software, and an internet connection to check the mail.
  • Some mails may contain viruses
  • Mailboxes are filled with junk mail. So very difficult to find the relevant mail.

a. Social media: Various social media are Internet forums, social blogs, microblogs etc.

  1. Internet forums: It is an online discussion site where people can exchange information about various issues like social, political, educational, etc in text form.
  2. Social blogs: Conducting discussions about particular subjects by entries or posts.
    Eg. Blogger.com
  3. Microblogs: It allows users to exchange short messages, multimedia files etc.
    Eg. www.twitter.com
  4. Wikis: In this, we can give our contributions regarding various topics.
    Eg. www.wikipedia.org
  5. Social networks: By using these websites we can post our data and view others’ data.
    Eg. www.facebook.com
  6. Content communities. By using these websites we can share multi-media files.
    Eg. www.youtube.com

b. Advantages of social media.

  • Bring people together: It allows people to maintain the friendship
  • Plan and organize events: It allows users to plan and organize events.
  • Business promotion: It helps the firms to promote their sales.
  • Social skills: There is a key role of the formation of society.

c. Disadvantages.

  • Intrusion to privacy: Some people may misuse personal information.
  • Addiction: sometimes it may waste time and money.
  • Spread rumours: The news will spread very quickly and negatively.

Cyber Security: It is used to provide protection of valuable information such as credit card information from unauthorized access, intentional access, deletion etc. while shopping on the internet.

Computer virus: A virus is a bad program or harmful program to damage the routine working of a computer system. It reduces the speed of a computer. It may delete the useful system files and make the computer useless.

Worm: It is a stand-alone malware program that replicates itself in order to spread to other computers. It slows down the traffic by consuming the bandwidth. In 2000 a worm called “ILOVEYOU” is affected by many computers.

Trojan horse: It appears as useful software but it is harmful software and it will delete useful software or files.

Spams: Sending an email without the recipient’s consent to promote a product or service is called spamming. Such an email is called spam.

Hacking: It is a process of trespassing computer networks. Two types of white hats and black hats. White hats hack the computer networks to test the security but black hats intentionally stealing valuable data or destroying data.

Phishing (Fishing): It is an attempt to get other information such as usernames, passwords, bank a/c details etc by acting as the authorized website. Phishing websites have URLs and home pages similar to their original ones and mislead others it is called spoofing.

Denial of Service(DoS) attack: Its main target is a Web server. Due to this attack, the Web server/computer forced to restart and this results in refusal of service to the genuine users. If we want to access a website first you have to type the website address in the URL and press the Enter key, the browser requests that page from the webserver. Dos attacks send a huge number of requests to the web server until it collapses due to the load and stop functioning.

Man in the Middle attacks: It is an attack in which an attacker secretly intercepts electronic messages sent by the sender to the receiver and then modifies the message and retransmit it to the receiver. To prevent this type, of attack encrypted connections such as HTTPS(HTTP Secure), SFTP(Secure FTP), etc, must be used, which will be displayed in the URL.

Preventing network attacks
Firewall: It is a system that controls the incoming and outgoing network traffic by analyzing the data and then provides security to the computer network in an organization from another network (internet)

Antivirus scanners: It is a tool used to scan computer files for viruses, worms, and Trojan horses and cure the infected system. If any fault found it stops the file from running and stores the file in a special area called Quarantine(isolated area) and can be deleted later.

Cookies: Cookies are small text files that are created when we visit a website that keeps track of our details. This information will help the hacker to use it for malicious purposes. It acts like spyware.

Guidelines for using computers over the internet

  • Emails may contain Viruses so do not open any unwanted emails
  • Download files from reputed sources(sites)
  • Avoid clicking on pop-up Advt.
  • Most of the Viruses spread due to the use of USB drives so use cautiously.
  • Use a firewall in your computer
  • Use anti-virus and update regularly
  • Take backups in regular time intervals

Plus One Economics Notes Chapter 19 Uses of Statistical Methods

Students can Download Chapter 19 Uses of Statistical Methods Notes, Plus One Economics Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Economics Notes Chapter 19 Uses of Statistical Methods

Project and Project Report
Project means a plan or programme, capable of analysis, planning and implementation. There are professional and academic projects. A professional project will have definite objectives, an area of implementation, and a time period within which it will be executed.

An academic project is purely an academic exercise to study a problem. It may or may not have practical application. Developing a project by conducting a survey and preparing a report will help in analyzing relevant information and suggesting improvements in a product or system. Students, researchers, marketing groups, etc., undertake such projects. Reports of such studies are called project reports.

Steps Towards Making a Project
The steps towards making a project are discussed below:
Identifying a problem or an area of study: You should be clear about what you want to study. The objective of the project has to be clearly stated. For instance, you may like to study consumer spending among households, water or electricity problems relating to households in an area and the like.

Choice of the target group: After that, you must identify the target group. If your project relates to books, then your target group will mainly be students. For the project studies of consumer projects like toothpaste, soap etc. all rural and urban populations form the target group. So the choice of target group is very important while undertaking a project.

Collection of data: Next comes the data collection. Data for the study may be collected from primary sources or secondary sources. If the data are primary a questionnaire or an interview schedule should be prepared. Telephone, postal method, e-mail, etc. may also be adopted. Secondary data are available from published and unpublished sources. Which type of data are to be used depends on the nature of your project study.

Organisation and presentation of data: After collecting the data by using various methods, the next step is to present them in a systematic manner. This is done with the help of tabulation and suitable diagrams, eg: bar diagrams, pie diagrams, graphs, etc.

Analysis and Interpretation: Measures of central tendency, measures of dispersion, correlation, etc. will enable you to calculate average, variation and relationship that exist among the variables. These help us in analysing and interpreting the results.

Conclusion: The last step is to draw meaningful conclusions after the analysis and interpretation of the results. Based on the results, you can predict the future and give suggestions for government policy implications.

Bibliography: This section is meant for mentioning details of all secondary sources of data used in the study. These include magazines, newspapers, research reports etc.

Structure of the Project Report
The essential elements of Project Reports, briefly.
1. Introduction: In the section of the introduction, the project is introduced. The need and significance of the project are highlighted. The relevance of the project is explained. This section gives the reader of the report an idea about the need, importance and relevance of the project.

2. Statement of the problem: Most projects in economics deal with an economic problem and attempt to find ways to solve the problem. There can be exceptions where a Project need not be related to any problem at all. Even then, the issue that is studied has to be properly and clearly defined. This is called the statement of the problem.

3. Objectives: The objectives of the project have to be clearly stated. Without being too descriptive, the objectives have to be listed and numbered.

4. Methodology: Methodology refers to the techniques and methods used in the analysis. The nature of data, sources of data, and techniques of analysis have to be clearly stated.

5. Analysis: This is the most important part of any project report. This forms the body of the project report.

6. Limitations/Constraints: No study is 100 percent perfect. Many imperfections can creep into the report due to the limitations of the study. Limitations may arise due to problems of sampling, inaccurate answers to questions, subjective factors, lack of professionalism of enumerators, lack of adaptability of secondary data, etc.

7. Conclusion: Analysis of data will facilitate the derivation of conclusion. In this section of the report, the findings and conclusion of the study are numbered and listed.

Plus One Economics Notes Chapter 18 Index Numbers

Students can Download Chapter 18 Index Numbers Notes, Plus One Economics Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Economics Notes Chapter 18 Index Numbers

Index Numbers
An index number is a statistical device for measuring changes in the magnitude of a group of related variables. It represents the general trend of diverging ratios, from which it is calculated. It is a measure of the average change in a group of related variables over two different situations. An index number also measures changes in the value of the variables such as prices of a specified list of commodities, the volume of production in different sectors of industry, production of various agricultural crops, cost of living, etc.

Uses of Index Numbers:

  • help in the study of trends.
  • help in policy formulation.
  • useful in measuring the purchasing power of money.
  • help in deflating various values.
  • act as economic barometers.

Some Important Index Numbers
1. Consumer price index: Consumer price index (CPI), also known as the cost of living index, measures the average change in retail prices. The CPI for industrial workers is increasingly considered the appropriate indicator of general inflation, which shows the most accurate impact of price rise on the cost of living of common people.

2. Wholesale price index: The wholesale price index number indicates the change in the general price level. Unlike the CPI, it does not have any reference consumer category. It does not include items pertaining to services like barber charges, repairing, etc.

3. Industrial production index: The index number of industrial production measures changes in the level of industrial production comprising many industries. It includes the production of the public and the private sector. It is a weighted average of quantity relatives. In India, it is currently calculated every month with 1993 – 94 as the base.

4. Index number of agricultural production: Index number of agricultural production is a weighted average of quantity relatives. Its base period is the triennium ending 1981-82. In 2003-04 the index number of agricultural production was 179.5. It means that agricultural production has increased by 79.5 percent over the average of the three years 1979-80, 1980-81 and1981-82. Foodgrains have a weight of 62.92 percent in this index.

5. Producer Price Index: The producer price index number measures price changes from the producers’ perspective. It uses only basic prices including taxes, trade margins and transport costs.

Issues in the Construction of an Index Number
You should keep certain important issues in mind, while constructing an index number.
1. You need to be clear about the purpose of the index. Calculation of a volume index will be inappropriate when one needs a value index.

2. Besides this, the items are not equally important for different groups of consumers when a consumer price index is constructed.

3. Every index should have a base. This base should be as normal as possible. Extreme values should I not be selected as the base period. The period should be also not belong to too far in the past. The comparison between 1993 and 2005 is much more meaningful than a comparison between 1960 and 2005. Many items in a 1960 typical consumption basket have disappeared at present. Therefore, the base year for any index number is routinely updated.

4. Another issue is the choice of the formula, which depends on the nature of the question to be studied. The only difference between Laspeyres’ index and Paasche’s index is the weights used in these formulae.

5. Besides, there are many sources of data with different degrees of reliability. Data for poor reliability will give misleading results. Hence, due care should be taken in the collection of data. If primary data are not being used, then the most reliable source of secondary data should be chosen.

Plus One Economics Notes Chapter 17 Correlation

Students can Download Chapter 17 Correlation Notes, Plus One Economics Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Economics Notes Chapter 17 Correlation

Correlation
The relationship between any two or more variables is referred to as correlation. Correlation studies and measures the intensity of relationships among variables.

Positive and Negative Correlation
When the values of two variables move in the same direction, the correlation is said to be positive; and when the values of two variables move in the opposite direction, the correlation is said to be negative. That is, if the value of one variable increases with an increase (and decreases with a decrease) of the value of the other variables, they are said to be in positive correlation. Likewise, if the value of one variable increases with a decrease (and decreases with an increase) of the value of the other variable, they are said to be in negative correlation.

Techniques of measuring correlation
Scatter Diagram: A scatter diagram is a useful technique for visually examining the form of relationship, without calculating any numerical value. In this technique, the values of the two variables are plotted as points on a graph paper. The cluster of points, so plotted, is referred to as a scatter diagram. From a scatter diagram, one can get a fairly good idea of the nature of the relationship. In a scatter diagram the degree of closeness of the scatter points and their overall direction enable us to examine the relationship. If all the points lie on a line, the correlation is perfect and is said to be unity. If the scatter points are widely dispersed around the line, the correlation is low. The correlation is said to be linear if the scatter points lie near a line or on a line.

Karl Pearson’s Coefficient of Correlation: This is also known as the product-moment correlation and simple correlation coefficient. It gives a precise numerical value of the degree of linear relationship between two variables X and Y. The linear relationship may be given by Y = a + bX.

This type of relationship may be described by a straight line. The intercept that the line makes on the Y-axis is given by a and the slope of the line is given by b. It gives the change in the value of Y for very small change in the value of X. On the other hand, if the relation cannot be represented by a straight line as in Y = X2 the value of the coefficient will be zero.
It clearly shows that zero correlation need not mean absence of any type of relation between the two variables.

Spearman’s Rank Correlation: Spearman’s rank correlation was developed by the British psychologist C.E. Spearman. It is used when the variables cannot be measured meaningfully as in the case of price, income, weight etc. Ranking may be more meaningful when the measurements of the variables are suspect. Consider the situation where we are required to calculate the correlation between height and weight of students in a remote village. Neither measuring rods nor weighing scales are available. The students can be easily ranked in terms of height and weight without using measuring rods and weighing scales.

Rank correlation coefficient and simple correlation coefficient have the same interpretation. Its formula has been derived from simple correlation coefficient where individual values have been replaced by ranks. These ranks are used for the calculation of correlation. This coefficient provides a measure of linear association between ranks assigned to these units, not their values. It is the Product Moment Correlation between the ranks.

Plus One Economics Notes Chapter 16 Measures of Dispersion

Students can Download Chapter 16 Measures of Dispersion Notes, Plus One Economics Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Economics Notes Chapter 16 Measures of Dispersion

Dispersion
A measure of dispersion can tell you about income inequalities, thereby improving the understanding of the relative standards of living enjoyed by different strata of society. Dispersion is the extent to which values in a distribution differ from the average of the distribution.
To quantify the extent of the variation, there are certain measures namely:

  1. Range
  2. Quartile Deviation
  3. Mean Deviation
  4. Standard Deviation
  5. Lorenz Curve

Range
Range (R) is the difference between the largest (L) and the smallest value (S) in a distribution.
Thus, R = L – S
A higher value of Range implies higher dispersion and vice-versa.

Quartile Deviation
The presence of even one extremely high or low value in distribution can reduce the utility of range as a measure of dispersion. Thus, you may need a measure which is not unduly affected by the outliers. In such a situation, if the entire data is divided into four equal parts, each containing 25% of the values, we get the values of Quartiles and Median. The upper and lower quartiles (Q3 and Q1 respectively) are used to calculate Inter Quartile Range which is Q3 – Q1.

Mean Deviation
Mean deviation of a series is the arithmetic average of the deviations of various items from a measure of central tendency. In aggregating the deviations, algebraic signs of the deviations are not taken into account. It is because, if the algebraic signs were taken into account, the sum of deviations from the mean should be zero and that from the median is nearly zero. Theoretically, the deviations can be taken from any of the three averages, namely, arithmetic mean, median, or mode; but, the mode is usually not considered as it is less stable. Between mean and median, the latter is supposed to be better because the sum of the deviations from the median is less than the sum of the deviations from the mean,
Co-efficient of MD = \(\frac{\mathrm{MD}}{\text { Average }}\)

Standard Deviation
Standard deviation is defined as the square root of the arithmetic average of the squares of deviations taken from the arithmetic average of a series. It is also known as the root-mean-square deviation for the reason that it is the square root of the mean of the squared deviations from AM.

Standard deviation is denoted by the Greek letter a (small letter ‘sigma’). The term variance is used to describe the square of the standard deviation. Standard deviation is an absolute measure of dispersion. The corresponding relative measure is called the coefficient of SD. The coefficient of variation is also a relative measure. A series with more coefficient of variation is regarded as less consistent or less stable than a series with less coefficient of variation.
Symbolically, Standard deviation = σ
Variance = σ2
Coefficient of SD = \(\frac{\sigma}{\bar{x}}\)
Coefficient of variation = \(\frac{\sigma}{\bar{x}} \times 100\)

Lorenz Curve
The measures of dispersion discussed so far give a numerical value of dispersion. A graphical measure called the Lorenz Curve is available for estimating dispersion.

Lorenz Curve uses the information expressed in a cumulative manner to indicate the degree of variability. It is especially useful in comparing the variability of two or more distributions.

Construction of the Lorenz Curve
Following steps are required for the Construction of the Lorenz Curve

  1. Calculate class mid-points and find cumulative totals
  2. Calculate cumulative frequencies
  3. Express the grand totals and convert the cumulative totals into percentages,
  4. Now, on the graph paper, take the cumulative percentages of the variable (incomes) on the Y-axis and cumulative percentages of frequencies (number of employees) on the X-axis.
  5. Draw a line joining Co-ordinate (0, 0) with (100, 100). This is called the line of equal distribution.
  6. Plot the cumulative percentages of the variable with corresponding cumulative percentages of frequency. Join these points to get the curve.

Plus One Economics Notes Chapter 15 Measures of Central Tendency

Students can Download Chapter 15 Measures of Central Tendency Notes, Plus One Economics Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Economics Notes Chapter 15 Measures of Central Tendency

Measures of Central Tendency
The measuring of central tendency is a way of summarizing the data in the form of a typical or representative value. There are several statistical measures of central tendency or “averages”.
The three most commonly used averages are:

  • Arithmetic Mean
  • Median
  • Mode

Arithmetic Mean
Arithmetic mean is the most commonly used measure of central tendency. It is defined as the sum of the values of all observations divided by the number of observations and is usually denoted by x. In general, if there are N observations as x1, x2, x3,……, xN, then the Arithmetic Mean is given by
Plus One Economics Notes Chapter 15 Measures of Central Tendency 1

Individual Series
In individual series, values of the variables are given individually without any group, classes, or frequency.
In this case, as stated above, finding the arithmetic mean is to add all the individual values and then divide the sum by the total number of observations and is known as the direct method.

Discrete Series
Here, the data are in the grouped form and frequency for each observation is given. But it is not in the form of classes. Here also we use direct method or assumed mean method or step deviation method to find the arithmetic mean. If a particular method is not insisted, you can follow any method which is suitable for the problem.
In this method, mean \(\bar{x}=\frac{\varepsilon f x}{N}\)

Continuous Series: In continuous series, data are given in frequency classes. The mid-value (m) of the class has to be found out first.
Mean \(\bar{x}=\frac{\varepsilon f x}{N}\)

Median
Median is that positional value of the variable which divides the distribution into two equal parts, one part comprises all values greater than or equal to the median value and the other comprises all values less than or equal to it. The Median is the “middle” element when the data set is arranged in order of magnitude.

Individual Series: For finding the median of an individual series, first arrange it in ascending or descending order and then locate the middlemost item. The value of the middlemost item will be the median.
Median = value of \(\left(\frac{N+1}{2}\right)\)th item

Discrete Series: In discrete series items are grouped and frequencies are given. There will not be any classes. For finding the median of a discrete series, first we arrange the items in ascending or descending order as before. Then, we find less than cumulative frequencies. Now, it is easy to locate the value of \(\left(\frac{N+1}{2}\right)\)th item.

Continuous Series: In Continuous series, data is given in frequency classes. For finding the median, first we identify the median class. Median class is the class in which the value corresponding to the frequency (N/2)th item may lie. After identifying the median class, we use the following formula for finding the median:
Plus One Economics Notes Chapter 15 Measures of Central Tendency 2
Where,
L = lower limit of the median class
N = total frequency
cf = cumulative frequency of the class preceding the median class
f = frequency of the median class
c = class width of the median class

Mode
Mode is the value around which there is the greatest concentration of values. In other words, it is the item having the largest frequency. In some cases, there may be more than one point of concentration of values and the series may be bi-modal or multi-modal. When one value occurs more frequently than any other value, the distribution is called uni-modal.

The word mode is derived from the French word ‘la mode’ which means fashion or the most popular phenomenon. Mode is thus the most popular item of a series around which there is the highest frequency density. It is denoted by Mo.

i) Individual Series: Comparing to mean and median, computation of mode is easy. In individual series, the mode is that value which repeats the highest number of times. It is often found by mere inspection.

ii) Discrete Series: In discrete series, the mode is determined just by inspection. The item having the highest frequency is taken as mode.

iii) Continuous Series: In continuous series, mode lies in the class having the highest frequency. Hence the modal class may be determined either by inspection or by grouping table. Then mode is determined using the formula:
Plus One Economics Notes Chapter 15 Measures of Central Tendency 3
where,
L0 = lower limit of the modal class
D1 = difference between the frequencies of the modal class and the class preceding it (ignoring the sign)
D2 = difference between the frequencies of the modal class and the class succeeding it (ignoring the sign); and
c = class interval of the modal class

Quartiles
Quartiles are the measures which divide the data into four equal parts; each portion contains an equal number of observations. Thus, there are three quartiles. The first Quartile (denoted by Q1) or lower quartile has 25% of the items of the distribution below it and 75% of the items are greater than it. The second Quartile (denoted by Q2) or median has 50% of items below it and 50% of the observations above it. The third Quartile (denoted by Q3) or upper Quartile has 75% of the items of the distribution below it and 25%of the items above it. Thus, Q1 and Q3 denote the two limits within which central 50% of the data lies.

Plus One Economics Notes Chapter 14 Presentation of Data

Students can Download Chapter 14 Presentation of Data Notes, Plus One Economics Notes helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Economics Notes Chapter 14 Presentation of Data

Presentation of Data
The most common form of presenting the data are textual or descriptive presentation, tabular presentation and diagrammatic presentation.

Textual Presentation of Data: This is the method of presenting data in text form. This method of presentation is possible only when the quantity of data is not too large. Following are the two examples of presenting the data in a textual format appeared in news papers.

Tabular Presentation of Data: Tabular presentation is the systematic arrangement of data in rows and columns. In other words, tabulation is a layout of figures in rectangular form with appropriate heading to explain different rows and columns.

Diagrammatic and Graphical Representation of Data: It is the more attractive and eye-catching method of presenting data. This provides the quickest understanding of the actual situation to be explained by data in comparison to tabular or textual presentations. The diagrams are broadly divided into three namely geometric diagrams, frequency diagram and arithmetic line graph. Again, geometric diagrams are classified into bar diagram and pie diagram.

Parts of a Table
A good table should have the following parts.
i) Table Number: Table number is essential for identifying the table; especially when more than one table is presented. It is the table numberthat distinguishes one table from the other. For easy reference, they are numbered according to their order of appearance in the text. It may be placed at the top or at the bottom)

ii) Title: Every table should contain a title, because it narrates about the contents of the table. Just like the table number, the title can also be placed at the top or bottom of the table. The title should be clear, brief, carefully worded, unambiguous and complete. It should be capable of giving the clear idea about the table.

iii) Captions: It is also called the column heading, which gives a designation to the column. It is given as the top row. Under each column head, there may be subheads. In table-14.4 above, there are three captions: rank, name of country and production of wheat.

iv) Stubs: It is also called the row heading, which gives a designation to the row. It is given as the left column and that column is called the stub column.

v) Body of the Table: It is the most important part of the table. It contains the actual data. The body is arranged generally from left to right in rows and from top to bottom in columns.

vi) Unit of Measurement: The units of measurement of the figures in the data should always be given in the table. It can be given with the title if the same unit is used in the whole table. If different units are used for different columns, they should be given with the respective column headings; and if different units are used for different rows, they should be given with the respective row headings.

vii) Source: It is a brief statement indicating the source from where the data is taken. If more than one source, all of them should be written there. This will help the reader to check the figures and gather more information if required. It also helps in indicating the authenticity of data. Generally, source is written in the bottom of the table.

Various Kinds of Diagrams
There are various kinds of diagrams in common use. Amongst them the important ones are the following:
1. Geometric diagram
2. Frequency diagram
3. Arithmetic line graph

Geometric Diagram: Bardiagram and pie diagram come in the category of geometric diagram for the presentation of data. The bar diagrams are of three types- simple, multiple and component bar diagrams.

i) Bar Diagram
Simple Bar Diagram: Bardiagram comprises a group of Equi-spaced and equi-width rectangular bars for each class or category of data. The height or length of the bar reads the magnitude of data.

Multiple Bar Diagram: Multiple bar diagrams are used for comparing two or more sets of data, for example, import and export for different years, marks obtained in different subjects in different classes, etc.

Component Bar Diagram: Component bar diagrams or charts also called sub-diagrams are very useful in comparing the sizes of different component parts and also for throwing light on the relationship among these integral parts.

ii) Pie Diagram
A pie diagram is also a component diagram, but unlike a component bar diagram, a circle whose area is proportionally divided among the components it represents. It is also called a pie chart. The circle is divided into as many parts as there are components by drawing straight lines from the centre to the circumference. Pie charts usually are not drawn with absolute values of a category. The values of each category are first
expressed as a percentage of the total value of all the categories.

It may be interesting to note that data represented by a component^bar diagram can also be represented equally well by a pie chart, the only requirement being that absolute values of the components have to be converted into percentages before they can be used for a pie diagram.

Graphical Presentation
Data in the form of grouped frequency distributions are generally represented by frequency diagrams like histogram, frequency polygon, frequency curve and ogive.

a) Histogram: A histogram is a two-dimensional diagram. It is a set of rectangles with bases as the intervals between class boundaries (along X- axis) and with areas proportional to the class frequency. If the class intervals are of equal width, which they generally are, the area of the rectangles are proportional to their respective frequencies. However, in some type of data, it is convenient, at times necessary, to use varying width of class intervals. The width in a histogram is as important as its height. We can have a bar diagram both for discrete and continuous variables, but histogram is drawn only for a continuous variable. Histogram also gives value of mode of the frequency distribution graphically.

b) Frequency Polygon: A frequency polygon is a plane bounded by straight lines, usually four or more lines. Frequency polygon is an alternative to histogram and is also derived from histogram itself. A frequency polygon can be fitted to a histogram for studying the shape of the curve. The simplest method of drawing a frequency polygon is to join the midpoints of the topside of the consecutive rectangles of the histogram.

c) Frequency Curve: The frequency curve is obtained by drawing a smooth freehand curve passing through the points of the frequency polygon as closely as possible. It may not necessarily pass through all the points of the frequency polygon but it passes through them as closely as possible.

d) Ogive: Ogive is also called cumulative frequency curve. As there are two types of cumulative frequencies, for example less than type and more than type, accordingly there are two ogives for any grouped frequency distribution data. Here in place of simple frequencies as in the case of frequency polygon, cumulative frequencies are plotted along y-axis against class limits of the frequency distribution. For less than give the cumulative frequencies are plotted against the respective upper limits of the class intervals whereas for more than ogives the cumulative frequencies are plotted against the respective lower limits of the class interval. An interesting feature of the two ogives together is that their intersection point gives the median.

Plus One Computer Application Chapter Wise Questions Chapter 10 IT Applications

Students can Download Chapter 10 IT Applications Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions Chapter 10 IT Applications

Plus One Computer Application IT Applications 1 Mark Questions and Answers

Question 1.
Name the application of Information and Communication Technology (ICT) for delivering government services to the citizens in a convenient, efficient, and transparent manner.
Answer:
e-Governance

Question 2.
“e-Governance facilitates interaction between different stakeholders in governance”. Say whether the statement is True or False.
Answer:
It is true.

Question 3.
The system of financial exchange between buyers and sellers in an online environment is known as _________.

Answer:
Electronic Payment System(EPS)

Question 4.
Check whether the following statement is True or False.
“e-Business is an extension of e-Commerce”
Answer:
Yes It is True.

Question 5.
Real time exchange of text messages between two or more persons over Internet is termed as _____.
Answer:
Online chat

Question 6.
Pick the odd one out
a) e- Book Reader
b) e-Text
c) Television channels
d) e-Business
Answer:
c) e-Business, the others are e-Learning tools

Question 7.
Define e-Text.
Answer:
The electronic form&t of textual data is called e- Text. It can be read aloud by an e-Text reader device that will help the visually challenged people.

Question 8.
Give an example for e-Learning tool.
Answer:
Electronic Books Reader

Question 9.
Name an electronic device using which we can easily read e-Text.
Answer:
e-Book reader

Question 10.
Write the full forms of BPO and KPO.
Answer:
BPO is Business Process Outsourcing KPO is Knowledge Process Outsourcing

Question 11.
Name any two e-Learning tools.
Answer:
1) e-Book Reader
2) Online chat

Question 12.
The system used for financial exchange between buyers and sellers in a online business is _____
a) electronic business online
b) electronic payment system
c) business process outsourcing
d) online payment system
Answer:
b) Electronic Payment System

Question 13.
Online railway reservation is an example of _____.
a) e-Business
b) e-Rail
c) e-Governance
d) e-Leaming
Answer:
e-Governance

Question 14.
Which one of the following is NOT an e-business website?
a) www.amazon.com
b) www.dhsekerala.gov.in
c) www.keralartc.com
d) www.irtc.com
Answer:
b) www.dhsekprala.gov.in

Question 15.
In ICT enabled services BPO stands for _____.
Answer:
Business Process Outsourcing

Question 16.
Application of ICT for delivering government services to citizens in a convenient and transparent manner is called_______.
Answer:
e- Governance

Plus One Computer Application IT Applications 2 Marks Questions and Answers

Question 1.
Define the term e-Governance.
Answer:
The integration of computers and communication technology for the benefit of government functions to#the public is termed as E-Governance by this Govt can serve the public in a convenient, efficient and transparent manner.

Question 2.
Give an example for e-Governance website.
Answer:
m www.hscap.kerala.gov.in, This site is used to manage +2 admission (Ekajalakam or Single Window System)

Question 3.
What is KSWAN?
Answer:
It is envisaged to be the core common network infrastructure for e-Governance and the State Information Infrastructure(SII), connecting Thiruvananthapuram, Kochi and Calicut. It acts as backbone of SII.

Question 4.
Define e-Business
Answer:
It is Electronic business. It provides services or running business through internet is called E business

Question 5.
Define e-Banking.
Answer:
Doing all the banking activities at any time and place through internet. We can check the balance amount, transfer money from our a/c to another a/c at any time and location. We can sit our home or any place and conduct banking activities hence it is very convenient to the public.

Question 6.
Write down the functions of call centres.
Answer:
Call centre is a third party company and its main aim is to serve the public for the payment of bills, purchase of goods, doubt clearance, etc. Here Telephone facility is set up to handle incoming and out going calls about goods or service for an organisation.

Plus One Computer Application IT Applications 3 Marks Questions and Answers

Question 1.
List out different types of interactions in e-Governance.
Answer:
The integration of computers and communication technology for the benefit of government functions to the public is termed as E-Govemance.
Types of interactions in e-Governance is given below

  • Government to Government(G2G): Electronically exchanging data or information among Government agencies, departments or organizations. Government to Citizens(G2C): Exchange of information between
  • Government and Citizens Government to Business(G2B) : Interaction between the Government and
  • Business men. Government to Employees(G2E) : The exchange of information between Government and its employees

Question 2.
Differentiate between BPO and KPO.
Answer:
BPO means Business Process Outsourcing: A business firm’s main aim is to increase the profit by reduce the expenditure for this some works are transferred to other contractors(man power supply company common in other countries). The parent company is not responsible to such employees but the work will be carried out smoothly. Knowledge Process Outsourcing(KPO): It is similar as BPO but the main job in KPO is knowledge and information related that is carried out by a third party company

Question 3.
What are the advantages of e-Governance?
Answer:
The advantages of e-Governance is given below Its main aim is to provide better service to the people at any time and place with high speed. In the modern world it is very helpful and convenient to the people.

  • It enables automation of Govt, services .
  • It ensures the participation of citizens hence strengthen the democracy
  • It ensures more transparency hence eliminates corruption
  • It enhances responsibilities of various Govt. Departments
  • Its proper implementation saves time and money of the people by avoiding unnecessary visits to offices,

Question 4.
What are the duties of Akshaya?
Answer:
These were launched in 2002 in the Malappuram Dist.ln Kerala by the project of Kerala State Information Technology Mission(KSITM). Its aim is to provide services such as e-grants, e filing, e district, e ticketing,/ation card application, Voters Id application,New Vehicles Registration application, insurance and Banking to the peoples of Kerala.

Question 5.
What is Common Service Center(CSC)? List some of the services offered through CSC.
Answer:
Common Service Centres are the web enabled points of the government, private and social sector services. They provide services such as Agriculture, Health, Banking, Educational, Entertainment, Commercial, Transport services for the rural citizens of India. In Kerala Akshaya centers are working as CSC.

Question 6.
What are the major challenges faced in the implementation of e-Learning?
Answer:
Following are the challenges to e Learning

  • Face to face contact between student and teachers is not possible
  • Proper interaction is limited lack of infrastructure facilities
  • Its implementation requires computer and high speed Internet
  • Pupil may not get proper motivation
  • It does not provide a real lab facility

Question 7.
a) Explain the term, ICT.
b) Briefly explain the advantages of implementing e-Governance.
Answer:
a) Information and Communication Technology .
b) The advantages of e-Govemance is given below Its main aim is to provide better service to the people at any time and place with high speed. In the modern world it is very helpful and convenient to the people.

  • It enables automation of Govt, services.
  • It ensures the participation of citizens hence strengthen the, democracy
  • It ensures more transparency hence eliminates corruption
  • It enhances responsibilities of various Govt. Departments
  • Its proper implementation saves time and money of the people by avoiding unnecessary visits to offices.

Question 8.
Remya has got a job at a call center. What is a call center? What kind of job does a call center provide?
Answer:
Call centre is a third party company and its main aim is to serve the public for the payment of bills, purchase’of goods, doubt clearance, etc. Here Telephone facility is set up to handle incoming and out going calls about goods or service for an organisation

Question 9.
Explain any three e-learning tools,
Answer:
e Learning tools

  • Electronic books reader(e Books): With the help of a tablet or portable computer or any other device we can read digital files by using a s/w is called electronic books reader.
  • e text: The electronic format of textual data is called e-Text.
  • Online chat: Real time exchange of text or audio or video messages between two or more person over the Internet.
  • e Content : The data or information such as text, audio, video , presentations, images, animations etc, are stored in electronic format.
  • Educational TV channels : TV channels dedicated only for the e-Learning purpose :
    Eg-. VICTERS (Virtual Class room Technology on Edusat for Rural Schools OR Versatile ICT Enabled Resources for Students)

Question 10.
Define e-Governance. Write any four advantages of e-Governance.
Answer:
E-Governance
The integration of computers and communication technology for the benefit of government functions to the public is termed as E-Governance by this Govt can serve the public in a convenient, efficient and transparent manner.

Benefits of E-Governance : Its main aim is to provide better service to the people at any time and place with high speed. In the modern world it is very helpful and convenient to the people.

  • It enables automation of Govt.services.
  • It ensures the participation of citizens hence strengthen the democracy.
  • It ensures more transparency hence eliminates corruption.
  • It enhances responsibilities of various Govt Departments.
  • Its proper implementation saves time and money of the people by avoiding unnecessary visits to offices.

Question 11.
i) Which of the following system in e-Business . exchanges money between buyer and seller?
a) Automatic Teller Machine
b) Electronic Payment System
c) Payment Service System
d) Financial Data Center.
ii) e-Governance provide a lot of government services to citizens through ICT. What are the different categories of e-Governance interactions?
Answer:
i) b) Electronic Payment System
ii) Types of interactions in e-Governance e-Governance facilitates interaction between different stakeholders in governance .
Government to Government(G2G): Electronically exchanging data or information among Government agencies, departments or organizations.
Government to Citizens(G2C): Exchange information between Government and Citizens .
Government to Business(G2B) : Interaction’ between the Government and Business men.
Government to Employees(G2E) : The exchange of information between Government and its employees

Question 12.
Explain any three tools that enhance e-Learning process.
Answer:
e Learning tools

  • Electronic books reader(e Books): With the help of a tablet or portable computer or any other device we can read digital files by using a s/w is called electronic books reader.
  • e text: The electronic format of textual data is called e-Text.
  • Online chat: Real time exchange of text or audio or video messages between two or more person over the Internet.
  • e Content : The data or information such as text, audio, video , presentations, images, animations etc, are stored in electronic format.
  • Educational TV channels : TV channels dedicated only for the e-Learning purpose : Eg. VICTERS (Virtual Class.room Technology on Edusat for Rural Schools OR Versatile ICT Enabled Resources for Students).

Question 13.
Compare the advantages and disadvantages of implementing e-Business.
Answer:
Advantages of E-business is given below

  • It overcomes geographical limitations
  • It reduces the operational cost
  • It minimizes the time and cost
  • It remains open all the time
  • We can locate the product faster from a wider range of choices

Disadvantages of E-business is given below

  • Peoples are unaware of IT applications and its uses
  • Most peoples don’t have plastic money(credit / debit card) and net banking
  • It requires high security measurements otherwise you may lose money
  • We can’t touch or smell products through online
  • Some companies may not have proper Goods delivery service.

Plus One Computer Application IT Applications 5 Marks Questions and Answers

Question 1.
Compare the advantages and disadvantages of implementing e-Business?
Answer:
Advantages of e business is given below

  • It overcomes geographical limitations
  • It reduces the operational cost
  • It minimizes the time and cost
  • It remains open all the time
  • We can locate the product faster from a wider range of choices

Disadvantages of E business is given below:

  • Peoples are unaware of IT applications and its uses
  • Most peoples don’t have plastic money(credit / debit card) and net banking
  • It requires high security measurements otherwise you may lose money
  • We can’t touch or smell products through online
  • Some companies may not have proper Goods delivery service

Question 2.
Explain any three IT enabled services in detail.
Answer:
1) Call centre : It is a third party company and its main aim is to serve the public for the payment of bills, purchase of goods, doubt clearance, etc. Here Telephone facility is set up to handle incoming and out going calls about goods or service for an organisation.
2) Teleconferencing : It is a Way of conferring, discussing or communicating by audio and video circuits, by a group of people located in geographically distributed areas. There are two types of conferencing video and audio. In audio conferencing the participants can’t see each other but only hear voices of one another.
3) Video conferencing : It is a type of Teleconferencing. The participants can see each other live on screen and can speak to each other with the help of teleconferencing. They must be sit in conference rooms connected through a teleconference system(A video camera and a speaker phone are connected to a computer with Internet connection)

Question 3.
Discuss in detail various uses of IT in health care field.
Answer:
In the field of medicine and health care computers play very important role. Such as diagnosing diseases, monitoring patients during surgery etc.

1) Medical equipments : Most of the medical equipments such as CT scanner, MRI scanner, Ultra Sound scanner, ECG, ECHO test, TMT, etc work with the help of computers

2) Electronic Medical Record(EMR): It is a digital version of a paper chart that contains all of a patient’s medical history from one practice. An EMR is mostly used by doctors fordiagnosis and treatment.

3) Web based support / diagnosis : Internet is used by the doctors to acquire information to diagnose and give treatment to the patients who are suffering from diseases.

4) Telemedicine : With the help of TeleMedicine equipment doctors and nurses can examine patients in remote locations by monitoring the patient conditions such as BP, temperature etc. and give the correct medical treatment. Tele medicine is implemented with a telephone line and a computer.

5) Research and development: Computers play inevitable role in almost every branch of science and engineering. The role of computers in different fields of research and development is unavoidable. The most complex genetic problem may evaluated with the help of computers easily and can simulate actual system using a computer. The computers help in diagnosis, treatment of patients and better running of hospitals.

Plus One Computer Application Chapter Wise Questions Chapter 9 Internet

Students can Download Chapter 9 Internet Questions and Answers, Plus One Computer Application Chapter Wise Questions and Answers helps you to revise the complete Kerala State Syllabus and score more marks in your examinations.

Kerala Plus One Computer Application Chapter Wise Questions Chapter 9 Internet

Plus One Computer Application Internet 1 Mark Questions and Answers

Question 1.
A network of smaller networks that exists all over the world is called _______.
Answer:
Internet

Question 2.
ARPANET means ______.
Answer:
Advanced Research Projects Agency Network.

Question 3.
Odd one out.
a) Internet explorer
b) Mozilla
c) Netscape navigator
d) Windows explorer
Answer:
d) Windows explorer, the others are browsers.

Question 4.
Odd man out.
a) Word
b) Excel
c) Power Point
d) Mosaic
Answer:
d) Mosaic. It is a browser, others are MS Office packages.

Question 5.
The interface between user and computer hardware is called operating system then what about the interface between user and internet (www)?
Answer:
Browser.

Question 6.
With the help of this the user can search informations provided on the internet. What is it ?
Answer:
Browser .

Question 7.
Benhur wants to navigate through the web pages from the following which will help him?
a) A browser
b) MS Word
c) Tally
d) Paint
Answer:
a) A browser.

Question 8.
I am a piece of software. With the help of me a user can search information from the internet and navigate through the web pages. Who am I ?
Answer:
Browser.

Question 9.
Anil told you that he was browsing at that time. From the following choose the right one.
a) He was visiting a website
b) He was reading a book
c) He was watching TV
d) He was sleeping.
Answer:
a) He was visiting a website. The process of visiting a website is called browsing.

Question 10.
_____ is a popular browser commonly used in windows operating system.
a) Mozilla
b) Netscape navigator
c) Mosaic
d) Internet explorer
Answer:
d) Internet Explorer.

Question 11.
_____ browser is commonly used in Linux.
a) Internet explorer
b) Moziila
c) Netscape navigator
d) Mosaic
Answer:
b) Moziila.

Question 12.
Mr. Asokan wants to go the previous page. From the following which option will help him?
a) Back button
b) Refresh
c) Favorites
d) Stop
Answer:
a) Back button.

Question 13.
While navigating through a website, sita wants to go back to the home page. From the following which will heip her ?
a) Refresh
b) Search
c) Home
d) Mail
Answer:
c) Home.

Question 14.
While surfing a website, Joyson.wants to play music or video. Which button will help him?
a) Home
b) Search
c) Media
d) Mail
Answer:
c) Media.

Question 15.
Aumima wants to know the websites that her brother had visited last week? From the following which will help her?
а) Media
b) History
c) Mail
d) Search
Answer:
b) History .

Question 16.
While browsing, the internet connection is lost so you want to reload the web page. Which will help for this?
a) Refresh
b) Stop
c) Media
d) Edit
Answer:
a) Refresh.

Question 17.
The address bar is also known as ______.
а) URL
b) UDL
c) KRL d)
None of these
Answer:
a)URL.

Question 18.
You want to add and organize a website to a list. Which will help for this?
a) Favorites
b) search
c) Back
d) mail
Answer:
a) Favorites.

Question 19.
How can it possible to understand that the browser is retrieving data?
a) Access indicator icon animates
b) From the refresh button
c) From the back button
d) None of these
Answer:
a) Access indicator icon animates.

Question 20.
The progress of the data being downloaded indicates by the _______.
a) Address bar
b) Progression bar
c) Status bar
d) None of these
Answer:
c) Status Bar.

Question 21.
Baby wants to download a file. The time needed for that depends on the _______ of the file.
a) Size
b) Place
c) Type
d) None of these
Answer:
a) Size.

Question 22.
the following which option will help him for that?
a) Copy
b) Page setup
c) Search
d) Media
Answer:
Page setup.

Question 23.
Mr. Franco’s e-mail id is franco@rediffmail.com. He wants to connect this page fastly. From the following which will help him.
a) Favorite
b) Search
c) Refresh
d) Media
Answer:
a) Favorite.

Question 24.
Mrs. Janaki purchased a product through online and payment was given by credit card. She wants to protect the information about the credit card. How can it be possible from the following?
а) Security
b) Favorite
c) Media
d) Content
Answer:
a) Security.

Question 25.
Odd man out.
a) www.google.com
b) www.yahoo.com
c) www.altavista.com
d) www.stmaryshss.com
Answer:
d) www.stmaryshss.com, the others are search engines.

Question 26.
Alvis got email about some products without his consent. Which type of email is this ?
Answer:
Spam.

Question 27.
What is the primary thing you have needed to sent an email to your friend?
Answer:
You have need an email id (address).

Question 28.
There is a PTA meeting in your school in the next month. The school authorities want to send the in-vitation to the parents. Which field of the message structure will help for this?
Answer:
CC or bcc.

Question 29.
You want to send an invitation to your friends. But the friends should not know that the same invitation is send by you to others also. Which field of the message structure will help you?
Answer:
bcc.

Question 30.
Mr. Lijo wants to send his photograph to his friend by email. Which feature will help him for this?
Answer:
Attachment feature.

Question 31.
You got some pictures pf Jesus Christ through email from one of your friends. You want to send this pic-tures to your brother. What button will help you for this?
Answer:
Forward button .

Question 32.
You got an email from your father working abroad. You want to send an email without typing his email id. Which button will help you for this?
Answer:
Reply button.

Question 33.
You got an email from an Insurance Company you want to store their email id which feature will help you for this?
Answer:
We can add address to Address Book.

Question 34.
Who proposed the idea of www.
Answer:
Tim Berners Lee.

Question 35.
The protocol for internet communication is
Answer:
TCP/IP protocol.

Question 36.
A short distance wireless Internet access method is
Answer:
Wi-Fi.

Question 37.
Give an example for an e-mail address.
Answer:
jobi_cg@rediffmail.com.

Question 38.
Which of the following is not a search engine ? (roses a<6)3S3(oro)1§36ffi(0)1(o8 search engine ©ragpero®”nflxra?
a) Google
b) Bing
c) Facebook
d) Ask
Answer:
c) Facebook

Question 39.
Name the protocol used for e-mail transmission across Internet.
Answer:
Simple Mail Transfer Protocol(SMTP).

Question 40
Name three services over Internet.
Answer:
1 www, search engine, E-mail.

Question 41.
Each document on the web is referred using ______.
Answer:
Uniform Resource Locator(URL).

Question 42.
The small text files used by browsers to remember our email id’s, user names, etc are known as _______.
Answer:
Cookies.

Question 43.
The act of breaking into secure networks to destroy data is called hacking.
Answer:
Black hats.

Question 44.
Who introduced the term, www?
Answer:
Tim Berners Lee.

Question 45.
_________ is a software used for removing worms and trojans.
Answer:
Anti virus.

Question 46.
Which among the following communication technologies is the slowest ?
a) Bluetooth
b) Wi-Fi
c) Wi-MAX
d) Satellite link
Answer:
a) Bluetooth (upto 1 Mbps).

Question 47.
Consider the relation given below.
Social network : facebook.com. Which among the following share a similar relationship as the above?
a) micro blog : blogger.com
b) social blog : twitter.com
c) Content community: youtube.com
d) internet forum : linkedin.com
Answer:
c) content community : youtube.com.
OR
b) Social blog : twitter.com .

Question 48.
Pick the odd one out
a) Virus
b) Trojan horse
c) Wikis
d) Worm
Answer:
c) Wikis.

Question 49.
Pick the odd one out.
a) Wikis
b) Face book
c) Twitter
d) e-mail
Answer:
d) e-mail.

Question 50.
Who is known as the father of Internet?
a) Vint cerf
b) Charles Babbage
c) Tim Berners Lee
d) Alan Turing
Answer:
a) Vint cerf.

Question 51.
Who proposed the idea of World Wide Web?
Answer:
Tim Berners Lee.

Question 52.
Which one of the following is NOT a web browser?
a) Mozilla Firefox
b) Google
c) Internet Explorer
d) Opera
Answer:
b) Google. It is a search engine.

Question 53.
Which one of the following is NOT a search engine?
a) Google
b) Bing
c) Face Book
d) Ask
Answer:
c) Face book.

Question 54.
Which one of the following statement is NOT true about e-mail?
a) E-mail is environment friendly as it do not use paper.
b) E-mail provides provision to attach text, audio, video and graphics.
c) E-mail will not spread any kind of viruses.
d) E-mail can be used to send same message to many recipients simultaneously.
Answer:
c) E-mail will not spread any kind of viruses.

Plus One Computer Application Internet 2 Marks Questions and Answers

Question 1.
What is a browser ?
Answer:
A browser is a piece of software that acts as an interface between the user and the internal working of the internet. With the help of a browser the user can search information on the internet and it allows user to navigate through the web pages. The different browsers are

  • Microsoft internet explorer
  • Mozilla
  • Netscape Navigator
  • Mosaic
  • Opera

Question 2.
While walking on the road, Simran saw a notice board contains a text “Browsing” in front of a shop. What is Browsing?
OR
Roopa’s mother told you that Roopa is browsing in her room. What is browsing?
Answer:
The process of visiting the websites of various companies, organization, government, individuals etc is called internet browsing or surfing with the help of a browser software we can browse websites.

Question 3.
How can we know that the browser is working or not ?
Answer:
The access indicator icon on the right corner of menu bar animates (rotates), when the browser is retrieving data or working. It is static when the browser is not working.

Question 4.
Mr. Anirudhan wants to visit the website of Manorama. Their website address is www. manoramaonline.com. How can it be possible?
Answer:
To visit the website of manorama. Anirudhan has to type “www.manoramaonline.com” in the address bar and press the enter key or use the go button. Then the home page of manorama will display. Sometimes while typing the website address on the browser automatically searches and display the home page.

Question 5.
The education Dept, of Govt, of Kerala declared SSLC results and it is available on the internet your friend wants to save the result in his computer. Help him to do so.
Answer:
To save the result in his computer to a file by using the ‘save’ or’ save as’ option of the file menu. When click this option a dialog box will appear then specify the folder whereas the file has to be saved using the dialog box and click OK. To save an image right click on the image, a pop up menu will appear then choose the save option give a name and press OK.

Question 6.
Discuss the steps to download a file from the website.
Answer:
To download a file from the website click on the link or button provided in the web page, then a dialog box will display. Enter the file name and specify the folder to which the file is to be saved. Then click save button then a window showing the progress of the downloading.

Question 7.
What is a Spamming?
Answer:
Sending an email without recipient’s consent to pro-mote a product or service is called spamming. Such an email is called a spam.

Question 8.
What do you mean by an ‘always on’ connection?
Answer:
Wired broadband connection is called ‘always on’ connection because it does not need to dial and connect

Question 9.
What is a blog?
Answer:
Conducting discussions about particular subjects by entries or posts. The posts appeared in the reverse chronological order means the most recent post appears first.
Eg. Blogger.com, WordPress.com, hsslive.com etc,

Question 10.
What do you mean by phishing..
Answer:
It is an attempt to get others information such as usenames, passwords, bank a/c details etc by acting as the authorized website. Phishing websites have URLs and home pages similarto their original ones • and mislead others , it is called spoofing.

Question 11.
What is quarantine?
Answer:
When you start an anti virus program and if any fault found it stops the file from running and stores the file in a special area called Quarantine (isolated area) and can be deleted later.

Question 12.
Compare intranet and extranet.
Answer:
A private network inside a company or organisation is called intranet and can be accessed by the company’s personnel. But Extranet allows vendors and business partners to access the company resources.

Question 13.
What are wikis?
Answer:
In this we can give our contributions regarding various topics and others can watch and edit the content. So incorrect information, advt., etc. are removed quickly.
Eg. www.wikipedia.org.

Question 14.
What is fire wall?
Answer:
It is a system that controls the incoming and out going network traffic by analyzing the data and then provides security to the computer network in an organization from other network(internet)

Question 15.
What are the advantages of Wi-Fi network?
Answer:
Line of sight between device is not required
Data transmission speed up to 57 Mbps
It can connect more number of devices
Used for communication up to 375 ft.
Nowadays this technology is used to access internet in Laptops, Desktops, tablets, Mobile phones etc.

Plus One Computer Application Internet 3 Marks Questions and Answers

Question 1.
The application form of Kerala entrance exam can be downloaded from the official website of Kerala govt. What do you mean by downloading?
Answer:
Downloading is the transfer of files or data from one computer to another usually from a server computer to a client computer. The time required to download the file depends on the size of the file.
The files may be text, graphics, program, movies, music etc. To download a file click on the link or button provided in the web page and specify the folder and filename and there is a window that shows the progress of the file being downloaded.

Question 2.
To apply minority scholarship, a student has to enter his details online, take a printout of this web page then send the application form with this printout to the authorities. Explain how to take a printout of a web page ?
Answer:
To print a web page either select the print command from file menu or use the print button on the standard tool bar. Page setup option is provided in the file menu. It helps to specify the paper size, margins header and footer and also the page orientation. The print preview option helps .to view how the page will look after printing.

Question 3.
Mr. Franco’s e-mail id is franco@rediffmail.com. He wants to connect this page fastly and he visited regularly. How can it possible?
Answer:
Mr. Franco regularly visited this site to visit this site he has to type the address repeatedly every time. It is a laborious work and it can be avoided if he marks the particular address as favorite. A favorite is a link to a web page. So that he can access that page faster. To do this click add to favorite option then a dialog box appears that asks for a name for the favorite. To make the web page available offline, then ‘Make available offline’ option has to be checked.

Question 4.
Match the following
Plus One Computer Application Chapter Wise Questions Chapter 9 Internet 1
Answer:
1) f
2) a
3) e
4) b
5) d
6) c

Question 5.
Noby accessing internet by using a dial up connection and manu using a direct connection. What is the difference between these two?
Answer:
There are two ways to connect to the internet. First one dialing to an ISP’s computer or with a direct connection to an ISP.

1) Dial up Connection : Here the internet connection is established by dialing into an ISP’s computer and they will connect our computer to the internet. It uses Serial Line Internet Protocol (SLIP) or Point to Point Protocol (PPP). It is slower and has a higher error rate.

2) Direct connection : In direct connection there is a fixed cable or dedicated phone line to the ISP. Here it uses ISDN (Integrated Services Digital Network) a high speed version of a standard phone line. Another method is leased lines that. uses fibre optic cables. Digital Subscribers Line (DSL) is another direct connection, this uses copperwires instead of fibre optic for data transfer. Direct connection provides high speed internet connection and error rate is less.

Question 6.
Explain the different steps happened in between user’s click and the page being displayed.
Answer:
1) The browser determines the URL selected.
2) The browser asks the DNS for URLS corresponding IP address (Numeric address)
3) The DNS returns the address to the browser.
4) The browser makes a TCP connection using the IP address.
5) Then it sends a GET request for the required file to the server.
6) The server collects the file and send it back to the browser.
7) The TCP connection is released.
8) The text and the images in the web pages are displayed in the browser.

Question 7.
You wish to visit the website of your school. Name the software required. Which software is available with Windows for this purpose ? Give names of other such software.
Answer:
Browsing software or Browser. The browsers are:

  •  Netscape Navigator
  • Internet Explorer
  • Mozilla
  • Opera
  • Mosaic etc.

Question 8.
You want to send a picture drawn using MS paint immediately to your friend. What method will you adopt for this, so that your friend receives it within seconds? Explain the steps to perform this operation.
Answer:
E-mail (Electronic mail) can be used. There is a facility called attachment will help you to send files with E-mail to your friend.
First open your mail box, then take the option to write mail. Fill the email id and subject in the text boxes namely To and Sub respectively. You can type text in the area, given below. Then press the option attachments then select the picture file then press done and press send button.

Question 9.
Suppose you want to collect information regarding ‘Tsunami’ using Internet.
a) Suggest a method for this purpose
b) Explain one method adopted.
Answer:
A browser is a piece of software that acts as an interface between the user and the internal working of the internet. With the help of a browser the user can search information oh the internet and it allows user to navigate through the web pages. The different browsers are

  • Microsoft internet explorer
  • Mozilla
  • Netscape Navigator
  • Mosaic.
  • Opera

Question 10.
Write short notes on
a) mobile broadband
b) Wi-MAX
Answer:
a) Mobile broadband : Accessing Internet using wireless devices like mobile phones, tablet, USB dongles, etc.
b) Wi MAX (Wireless Microwave Access): It uses micro waves to transmit information across a network in a range 2 GHz to 11 GHz over very long distance.

Question 11.
Compare blogs and microblogs.
Answer:
Blogs: Conducting discussions about particular subjects by entries or posts. The posts appeared in the reverse chronological order means the most recent post appears first.
Eg. Blogger.com, hsslive.com etc.
Microblogs : It allows users to exchange short messages, multi media files etc.
Eg. www.twitter.com

Question 12.
XYZ engineering college has advertised that its campus is Wi-Fi enabled. What is Wi-Fi? How is the Wi-Fi facility implemented in the campus.
Answer:
Wi-Fi means Wireless Fidelity. It is a wireless technology. Some organisation offers Wi-Fi facility. Here we can connect internet wirelessly over short distance, using Wi-Fi enabled devices.
It uses radio waves to. transmit information across a network in a range 2.4 GHz to 5 GHz in short distance. Nowadays this technology is used to access internet in campuses, hyper markets, hotels by using Laptops, Desktops, tablet, mobile phones etc.

Question 13.
Hoyv does a Trojan horse affect a computer?
Answer:
It appears as a useful software but it is a harmful software and it will delete useful softwares or files in a computer.

Question 14.
What are the guidelines one must follow for using computers over the Internet?
Answer:
Guidelines for using computers over internet

  • Emails may contain Viruses so do not open any unwanted emails
  • Download files from reputed sources(sites)
  • Avoid clicking on pop up Advt.
  • Most of the Viruses spread due to the use of USB drives so use cautiously.
  • Use firewall in your computer
  • Use anti virus and update regularly
  • Take backups in a regular time intervals

Question 15.
George needs to prepare for a seminar on ‘Backwaters in Kerala’.
a) Name any search engine through which George can get information about the topic.
b) Explain the working behind the search engines to display the information about the seminar topic.
Answer:
a) Google or Yahoo or Bing or Ask etc…
b) Search engines
By using search engines we will get a variety of information. It is a newly developed tool that helped to search the information on the internet more effectively and easily. Search engines are programs that help people to locate information from crores of website on internet using a database that consists of-references. Users can interact with the search engine through the home page of the search engine. To get the information about artificial intelligence just type this in the box provided for it and click the search button.
Search engines searches by using a particular siearch algorithm then displays the matching documents or web addresses. Search engine use soft wares called spiders or bots to search documents and theirweb addresses. Spiders search the internet using the directions given by the search engines and prepare an index and stores it in a database. The searching algorithm searched this database when the users submits a request and create a web page displaying the matching results as hyperlinks.
Eg: Google, Yahoo, Rediff etc.

Question 16.
Mr. Prasanth has bought a new laptop. He wants to take an Internet connection.
a) Explain him various types of broadband connectivity available in the market.
b) Suggest a web browser for him.
Answer:
a) Different types of Broad band connection are given below.
ISDN, Cable Internet (Asianet), DSL, FTTH, Wi- Max, etc.
b) Micro Soft Internet Explorer, Google Chrome, Netscape Navigator, Mozilla Firefox etc.

Question 17.
We want to connect our computer to the Internet for downloading some image. Explain any two connectivity methods?
Answer:
Types of connectivity
There are two ways to connect to the internet. First one dialing to an ISPls computer or with a direct connection to an ISP.

Question 18.
Today social media over the Internet is very popular.
a) In your opinion, what are the best practices to avoid the issues related to its use?
b) Suppose we need a quick response from the public about the ban of smoking in our state. Which type of social media is the best suited for this purpose?
Answer:
a) Following are the best practices to avoid issues related to social media use.
Avoid uploading personal information like Email address, Telephone number, Address, photos,’ videos etc.
Follow a time table for using this websites hence avoid wasting precious time.
If you upload any files in, Wikis, blogs, etc. can be viewed by all members and also can be downloaded. Avoid posting content that you may regret later.
Set your privacy levels such that who can see your posts and who can share them. The 3 privacy levels are private, friends and public.
b) Microblog (Twitter)

Question 19.
List bad effects if any in using social media.
Answer:
Disadvantages

  • Intrusion to privacy : Some people may misuse the personal information.
  • Addiction : sometimes it may waste time and money.
  • Spread rumours : The news will spread very quickly and negatively.

Plus One Computer Application Internet 5 Marks Questions and Answers

Question 1.
Your younger brother does not know the structure of an email message. Explain the structure of an email message.
Answer:
The email message contains the following fields.

  1. To : Recipient’s address will be enter here. Multiple recipients are also allowed by using coma.
  2. CG : Enter the address of other recipients to get a carbon copy of the message.
  3. bcc : The address to whom blind carbon copies are to be sent. This feature allows people to send copies to third recipient without the knowledge of primary and secondary recipients.
  4. From : Address of the sender
  5. Reply to : The email address to which replies are to be sent.
  6. Subject : Short summary of the message.
  7. Body : Here the actual message is to be typed.

Question 2.
Email is the most popular, but most misused service of the internet. Justify your answer.
Answer:
The advantages of email are given below:

  1. Speed is high
  2. It is cheap
  3. We can send email to multiple recipients
  4. Incoming messages can be saved locally
  5. It reduces the usage of paper
  6. We can access mail box anytime and from any-where.

The disadvantages are:

  1. It requires a computer, a modem, software and internet connection to check mail.
  2. Some mails may contain viruses .
  3. Mail boxes are filled with junk mail. So very difficult to find the relevant mail.