Plus One Computer Science Micro Full
Plus One Computer Science Micro Full
Has the advantage of ‘drawing’ directly onto 3. Printer: Used to produce hardcopy output. The Utility software: complex problem into smaller sub tasks and solving
the screen. output printed on paper is known as hardcopy. each task from sub to main.
1. Compression utility: Large files can be
Classified as Impact or Non-impact printers.
4. Touch screen: Allows the user to compressed sothat they take less storage Stages of problem solving:
operate/make selections by simply touching Dot-matrix uses impact mechanism. It can area.
(i) Problem identification
on the display screen. print carbon copies with less printing cost. These
2. Disk defragmenter: A program that rearranges (ii) Preparing algorithms and flowcharts
printers are slow and noisy.
5. Graphic tablet: Consists of an electronic files on a computer hard disk. (iii) Coding the program using programming language
writing area and a special ‘pen’ that works with Inkjet printers, Laser printers and thermal (iv) Translation
3. Backup utility: These programs facilitate the
it. Allows artists to create graphical images printers are non-impact printers (v) Debugging
backing up of disk.
with actions similar to traditional drawing tools. (vi)Execution and Testing and
4. Plotter: A plotter is an output device used to
4. Antivirus programs: A utility program that (vii) Documentation
6. Joystick: Used to play video games, control produce hardcopies of graphs and designs on the
scans the computer system for viruses.
training simulators and robots. paper.
Algorithm: It is a step-by-step procedure to solve a
General purpose software: These are used
7. Microphone: Accepts sound in analogue 5. 3D printer: A 3D printer is an output device used problem, where each step represents a specific task
to perform tasks in a particular application area.
nature as input and converts it to digital to print 3D objects. It can produce different kinds of to be carried out.
format. objects, in different materials, using the same 1. Word processing software: It is designed for
Flowchart: The pictorial representation of an algorithm
printer. creating and modifying documents. Eg: MS
8. Scanner: Allows capturing of information, like with specific symbols for instructions and arrows
Word, Open Office Writer, Apple iWork Pages,
pictures or text and converting it into a digital e-Waste: Electronic waste may be defined as discarded showing the sequence of operations.
etc.
format that can be edited using a computer. computers, office electronic equipment, entertainment Process
devices, mobile phones, television sets and 2. Spreadsheet software: This software allows Chapter 5: Introduction to C++ Programming
9. OMR: Scanning device that reads predefined
refrigerators. users to perform calculations. Eg: Microsoft
positions and records where marks are made
Excel, Open Office Calc, Lotus 1-2-3 and Apple Character set: The fundamental unit of C++
on the printed form. Useful for applications such e-Waste disposal methods: Re-use, incineration
iWork Numbers. language. The character set of C++ is categorized
as objective type tests and questionnaires. (combustion process in which the waste is burned in
incinerators at a high temperature), recycling, (the 3. Presentation software: The software is used as (i) Letters (A – Z, a – z), (ii) Digits (0 – 9), (iii)
10. Bar Code Reader: A bar code is a set of Special characters (iv)White spaces.
process of making new products from a product that has to display information in the form of a slide
vertical lines of different thicknesses and Tokens: The fundamental building blocks of the
originally served its purpose) and land filling. show. Eg: Microsoft PowerPoint, Apple iWork
spacing that represent a number. Barcode
Keynote and Open Office Impress. program. C++ has five types of tokens – Keywords,
readers are used to input data from such set of Software: A general term used to denote a set of Identifiers, Literals, Punctuators and Operators.
barcodes. programs that help us to use the computer system. Two 4. Database software: Database is an organised Keywords: The words (tokens) that convey a
types - system software, application software. collection of data arranged in tabular form. Eg: specific meaning to the language compiler. These
11. QR (Quick Response) code is similar to
System software: A set of programs which aids in Microsoft Access, Oracle, Postgres SQL, My are also known as reserved words.
barcodes.
Barcodes are single dimensional where as QR the execution of a general user’s computational SQL, etc. Identifiers: These are the user-defined words used to
codes are two dimensional. requirements on a computer system. 5. Multimedia software: Multimedia is the name different program elements such as memory
integration of multiple forms of media. Eg: VLC locations, statements, functions, objects, classes etc.
12. Biometric sensor: Identifies unique human The components of system softwareare Operating
Player, Adobe Flash, Real Player, Media The identifiers of
physical features like fingerprints, retina, iris system, Language processors and Utility software.
Player, etc. memory locations are called variables.
patterns, etc. to identify, verify and authenticate Operating system (OS): A set of programs that acts Rules for naming identifiers: An arbitrary long
the identity of the user. as an interface between the user and computer The Free Software Foundation (FSF) defines sequence of letters, digits and underscores.
hardware. the four freedoms for free and open source The first character must be a letter or underscore
13. Smart card reader: These are used to access
software: ( _ ). White space and special characters are not
data in a smart card. Smart card is a plastic card Function of OS: Process management,
that stores and transacts data. Used in banking, memory management, file management, Freedom 0 : The freedom to run program. allowed.
healthcare, telephone calling, electronic cash device management, security management and Freedom 1 : The freedom to study Keywords cannot be used. Upper and lower case
payments and other applications. command interpretation. Freedom 2 : The freedom to distribute letters are treated
copies Freedom 3 : The freedom to improve differently.
14. Digital camera: Takes pictures and videos and Computer languages: Machine language, Literals: Data items that never change their value
the program
converts it to the digital format. Web camera is a assembly language and High Level Languages during the program run. They are often referred to
compact and less expensive version of a digital
camera. Language processors: These are the system Chapter 4 – Principles of Programming as constants.
programs that translate programs written in high level and Problem Solving Literals are of four types – Integer literals,
Output devices: These devices present information language or assembly language into its equivalent Computer program: A sequence of instructions Floating point literals, Character literals(‘) and
from a computer system to the user. machine language. given to a computer to solve a problem. String literals.(“)
Escape sequences: These special character
1. Monitor: Display devices include CRT monitors, Types of language processors: Program instruction: It is an action oriented constants that represent non-graphic symbols. It
LCD monitors, TFT monitors, LED monitors, gas statement and it tells the computer what operation it consists of a backslash (\) followed by one or more
plasma monitors, Organic Light Emitting Diode 1. Assembler (translates the program code
should perform. specific characters.
(OLED) Monitors, etc. written in assembly language to machine language),
2. Interpreter (converts a HLL program into machine Top down design: It is the process of solving a .
2. LCD projector: An LCD projector is a type of language line by line) and 3. Compiler (translates a complex problem by breaking it down into different
video projector for displaying video, images or program written in high level language into machine tasks and solving each task from main to sub.
computer data on a large screen or other flat language).
surface. Bottom up design: It is the process of breaking a
Flow line
on Type conversion: Conversion of the data type of an This selection statement successively tests the three loop elements (initialisation, test expression
Advantages of flowcharts: Better communication, operand into another type. Done in two ways: implicitly value of a variable or an expression against a list and update statement) are placed together in for
Effective analysis, Effective synthesis, Efficient coding. and explicitly. of integers or character constants. statement.
Translation: It is the process of converting a program Type promotion: It is the implicit type conversion is switch(expression) do...while statement
written in high level language into its equivalent version performed by C++ compiler internally.
in machine language. It is also an exit-controlled loop. The body of the loop will
Type casting: It is the explicit type conversion and is execute at least once.
Debugging: It is the process of detecting and done by the programmer by specifying the data type within
correcting the errors in a program. parentheses to the left of the operand.
Nesting of a loop: Placing a loop inside the body of
Syntax errors: The errors occur when the rules or Variable declaration: data_type <variable1>,<variable2>; another loop. When we nest two loops, the outer loop
syntax of the programming language are not followed. counts the number of completed repetitions of the
Variable initialisation: Supplying value to a variable at
Logical error: It is due to improper planning of the the time of its declaration. inner loop.
program's logic and revealed during the execution of {case constant_1 : statement
the program. Pre-processors: These are the compiler directive block 1; break;
statements which give instruction to the compiler to case constant_2 : statement
Run time error: These errors occur unexpectedly process the information provided before actual
Chapter 8: Arrays
block 2; break;
when computer becomes unable to process some compilation starts. These lines always start with a # (hash) default : statement block n;} An array is a collection of elements of the same type
improper data. symbol. placed in contiguous memory locations. Arrays are used
Documentation: 1. Internal documentation is to store a set of values of the same type under a single
Header files: Files available along with compiler
done through comments in programs. 2. Various variable name. Each element in an array can be
manuals provide external documentation. using namespace statement: It tells the compiler about accessed using its position in the list called index
a namespace where it should search for the elements number or subscript.
used in the program.
Chapter 6: Data Types and Operators Syntax: data_type array_name[size];
main() function: An essential function in every C++
Eg: int num[10];
program. The execution starts at main() and ends
within main(). int score[5] = {98, 87, 92, 79, 85};
Data types: These are the means to identify the
total_bytes = sizeof(array_type) × size_of_array
nature of the data and the set of operations that can
be performed on the data. Chapter 7: Control Statements Array Operations:
The conditional operator (?:)
Fundamental data types: The five fundamental Decision making statements or Selection 1. Traversal
C++ has a ternary operator. It is the conditional 2. Searching
data types in C++ are char (1byte), int (4byte), float statements. if and switch are the two types of selection
operator (?:) consisting of the symbols ? and : (a a. Linear Serach b. Binary Search
(4byte), double (8byte) and void (0byte). statements in C++. The selection will be based on
question mark and a colon). It requires three 3. Sorting
conditions.
Data type modifiers: The keywords used to alter operands. a. Selection Sort b. Bubble Sort
the size, range or precision of data supported by the if statement
Looping (Iteration) Statements
basic data types. Important modifiers are signed,
The if statement is used to select a set of statements
unsigned, long and short. Four elements of a loop:
for execution based on a condition.
Variables: The names given to memory locations. 1. Initialisation: The loop control variable
if – else statement
(Variable used in the condition) gets its first
Operators: The tokens or symbols that trigger
The syntax is: value..
computer to carry out operations. The data on which Two dimensional (2D) arrays
an operation are called operands. An operand may if (test expression) 2. Test expression: It is a relational or
be either a constant or a variable. Classified into statement block 1; logical expression whose value is either A two dimensional array is an array in which each element
three –unary, binary and ternary. else True or False. itself is an array. For instance, an array AR[m][n] is a 2D
statement block 2; array containing m rows and n columns.
Arithmetic operators: Used to perform basic 3. Update statement: The update statement
When we write an if statement inside another if block, it is data_type array_name[rows][columns];
arithmetic operations. modifies the loop control variable by changing
called nesting.
its value.. The indices (subscripts) of rows and columns, start at 0
Modulus operator (%): Also called as mod
The else if ladder and ends at (rows–1) and (columns–1) respectively.
operator. It gives the remainder value during 4. Body of the loop: The statements that
arithmetic division. When we want to select one action from more than two need to be executed repeatedly constitute the int marks[5][4];
actions, different conditions will be given and each body of the loop.
Relational operators: Used for comparing numeric condition will decide which statement is to be selected for
while statement
data. These are binary operators. The result of any execution. Chapter 9: String Handling and I/O Functions
relational operation will be either True or False. if (test expression 1) It is an entry-controlled loop. The condition is
statement block 1; checked first and if it is True the body of the loop will A character array can be used to store a string, since it
Expression: Composed of operators and be executed. is a sequence of characters. The array char
else if (test expression 2)
operands. Classified into arithmetic my_name[10]; can store a string of 9 characters. One
statement block 2; for statement
expressions, relational expressions and logical location will be used to store ‘\0’ (null character) as
expressions. switch statement It is also an entry-controlled loop in C++. All the string terminator.
function, getline() function or get() function. strcmp() strcmp(string To compare two strings.
String
Functions
data (stdio.h h)
(math.h)
Character getchar( cin.get() Character input pow() pow(double, int) To find the power of a number. It takes two arguments x
functions )
putchar( cout.put() Character and y. Returns the value of xy.
) output
gets() cin.getline( String input isupper() isupper(char) To check whether a character is in upper case or not. The
String
Function ) function returns non-zero if the given character is in uppercase,
s puts() out.write() String output and 0 otherwise.
islower() islower(char) To check whether a character is in lower case or not. The
function returns non-zero if the given character is in lowercase,
and 0 otherwise.
Chapter 10: Functions
Character Functions (ctype.h)
them require data for performing the task converted. The second argument is the character array where
Conversion
Types of social media: Internet forums, social Denial of Service (DoS): It is a network attack is
blogs, micro blogs, wikis, social networks, usually aimed at a web server. Such an attack forces
content communities and a lot more. the server/computer to restart.
Internet forums: It is an online discussion Phishing:Phishing websites have URLs and home
website where people can engage in pages similar to their original ones. The act of creating
conversations in the form of posted messages. such a misleading website is called spoofing.
Eg: Ubuntu Forum Man-in-the-middle attack: It refers to an attack in
Social blogs: It is a discussion or informational which an attacker secretly intercepts electronic
website consisting of entries or posts displayed in messages between the sender and the receiver and
the reverse chronological order i.e., the most recent then captures, inserts and modifies messages
post appears first. Eg: Blogger.com, Wordpress.com. during message transmission.
Microblogs: They allow users to exchange short Firewall: It is a system of computer hardware and
sentences, individual images or video links. It software that provides security to the computer
offers a communication mode that is spontaneous network in an organisation. It denies malicious data
and can influence public opinion. Twitter.com is a from entering into the computer networks.
popular micro blogging site.
Antivirus programs: These tools are used to
Wikis: Wikis allow people to add content or edit detect viruses and cure the infected system. It
existing information in a web page, to form a scans files in the computer system for known
community document. Wiki is a type of content viruses and removes them if found.
management system. Eg: wikipedia.org.
Cookies: These are small text files that are created
Social networks: These sites allow people to when we use a browser to visit a website.
build personal web pages and then connect
Mobile computing: It is a technology that has
with friends to communicate and share content.
computing capability and can transmit/receive data
We can share text, pictures, videos, etc. and
while in motion..
comment to the posts. Eg: facebook.com,
linkedin.com. Generations of mobile communication: 1G
mobile phones were based on the analog system
Content communities: These are websites that
and provided basic voice facility only. 2G networks
organise and share contents like photos, videos,
follow digital system for communication. Picture
etc. Eg: Youtube.com, flickr.com.
messages and MMS (Multimedia Messaging
Advantages of social media: Bring people Service) were introduced in 2G. 3Gnetworks
together, help to plan and organise events, offered multimedia services combining voice and
promoting business, enhance social skills. data. It has the facility to send and receive large
amounts of data using a mobile phone. 4G system,
Limitation of social media: Intrusion to
also called Long Term Evolution (L.T.E.), provides
privacy, addiction, spread rumours.
mobile ultra-broadband Internet access to mobile
Computer virus: It is a program that attaches itself devices.
to another program or file enabling it to spread from
Mobile communication technologies: SMS,
one computer to another without our knowledge and
MMS, GPS and smart cards. Short Message Service
interferes with the normal operation of a computer.
Mobile Operating System: The software that
Computer worm: It is a stand-alone malware
manages the hardware, multimedia functions,
(malicious software) program that replicates itself in
Internet connectivity, etc. in a mobile device. Eg:
order to spread to other computers.
Android from Google, iOS from Apple, BlackBerry
Trojan horse: It will appear to be a useful OS from BlackBerry and Windows Phone from
software but will actually do damage once installed Microsoft
or run on your computer.
Spams or junk mails: These are unsolicited e-
. JOIN OUR GROUP FOR MORE STUFF:
mails sent indiscriminately to persons to promote a
product or service.
Hacking: It is a technical effort to manipulate the
normal behaviour of network connections and
connected systems. Computer experts perform
hacking to test the security and find the
vulnerabilities in computer networks and computer
systems. ‘white hats’, ‘black hats’. and‘grey hat
hackers’,.
Character functions in C++ are pivotal for input validation and data processing by ensuring that text-based inputs adhere to expected formats and content types. Functions like isupper(), islower(), isalpha(), and isdigit() validate the nature of individual characters, determining if they are uppercase, lowercase, alphabetic, or numeric respectively. Other functions such as toupper() and tolower() assist in standardizing text data by converting characters between cases. This functionality is crucial in the development of robust applications that require strict control over user inputs and processing of textual data .
Cookies, while integral to enhancing user experience by storing session information, have significant security implications. They can be exploited in session hijacking attacks where an attacker captures unencrypted cookies to impersonate a user's session. Cookies also contribute to privacy concerns, as they track user behavior across multiple sites, compiling browsing histories that can be used for profiling without user's explicit consent. To mitigate these risks, secure cookies employing encryption and setting appropriate flags such as 'HttpOnly' and 'Secure' are recommended to ensure they are only transmitted over secure connections and cannot be accessed via client-side scripts .
In C++, data type modifiers such as 'signed', 'unsigned', 'long', and 'short' adjust the behavior of fundamental data types by altering their size, range, or precision. For instance, applying 'unsigned' to an int type will change its range by allowing only non-negative numbers, effectively doubling the range of positive values. Similarly, 'long' can be used to increase the storage capacity of an int type, allowing it to hold larger values. These modifiers enable more efficient memory usage and precise control over the data's representation, which is crucial for specific applications that require manipulation of large numbers or unsigned values .
Proper syntax in programming is critical for avoiding syntax errors, which occur when the programming language's rules are not adhered to. Such errors prevent the program from being compiled or executed. By ensuring proper syntax, programmers can avoid runtime errors that occur unexpectedly due to improper data handling and are only revealed during program execution. Moreover, logical errors can be mitigated by thorough planning, which is not directly related to syntax but can cause undesired behavior during execution if the program's logic is flawed .
The primary differentiation between 3G and 4G mobile communication systems lies in data speed and the range of services offered. 3G technology introduced multimedia services that combined voice, data, and video facilities, allowing users to handle larger data transfers compared to its predecessors. In contrast, 4G, also known as Long Term Evolution (LTE), offers significantly faster data rates, providing mobile broadband Internet access close to what is typically achieved with wired broadband connections. It greatly enhances application and service performance with less latency, supporting more intensive applications such as high-definition mobile streaming and video conferencing .
Search engines employ 'web crawlers', also known as 'spiders' or 'robots', to systematically scan and index the web. These specialized programs crawl through web pages, following links and capturing data from each site they visit. By storing this data in a searchable index, web crawlers enable users to find the most relevant and up-to-date information based on their search queries. This automated process makes navigating the vast resources of the World Wide Web feasible, allowing search engines to provide efficient and comprehensive search results to users .
Guided media, such as coaxial cables, twisted pair cables, and optical fibers, provide a more secure and reliable data transmission path in network environments. These physical connections are less susceptible to interference and eavesdropping, making them suitable for high-security and performance-sensitive applications. On the other hand, unguided media, involving the use of radio waves or microwaves, offer greater flexibility and mobility, enabling connectivity without fixed infrastructure and over long distances. This makes unguided media ideal for less restrained applications like mobile networks and wide-area coverage where installation of physical media is impracticable .
Modularisation, the process of breaking down large programs into smaller sub-programs or functions, significantly enhances both efficiency and reliability in programming. This approach reduces the size and complexity of the program, making it easier to manage and understand. It decreases the likelihood of errors and improves reusability, as functions can be tested individually and reused across different parts of the project. Modular programming also facilitates maintenance and scaling of the codebase and allows multiple developers to work on different modules simultaneously without interference .
Pre-processors in C++ play a critical role before the actual compilation process by handling directives that start with a '#' symbol. They instruct the compiler on how to process and transform the source code before it is compiled. For example, including header files with #include enables incorporation of necessary code libraries, defining macros with #define allows for constant replacements throughout the code, and conditional compilations with #if can include or exclude parts of code based on conditions. This step optimizes the code, handles code modularity, and reduces compilation time by organizing code logically before the main compilation takes place .
Type casting in C++ enhances flexibility by allowing programmers to explicitly convert an operand's data type to another type within a program. This enables precise control over computations and storage, accommodating scenarios that involve arithmetic operations between different data types or when a specific data type is required by a certain function. Type casting helps in preventing data loss, ensuring efficiency, and optimizing the use of memory resources, particularly in operations requiring precision and performance .