Você está na página 1de 50

SUPPLEMENT

Informatics
Practices–XI
Inner Title
Dear Reader

The aim of this Supplement to Informatics Practices with Python


for Class XI is to apprise you of the changes effected in the CBSE
syllabus for 2020-21 and provide them in textbook format.

In fact, the syllabus for 2020-21 has witnessed large-scale changes


with four chapters (Strings, Modules, NumPy and Cyber
Safety) done away with, two refurbished and one new unit/chapter
(Emerging Trends) added, all of which have been duly taken care of
in this Supplement. Besides, chapter-wise Case-based/Source-based
Integrated Questions, which have been introduced for the first time
in the Class XI curriculum, too have been given at the end.

To ensure that your book is complete in all respects once this


Supplement is in your hands, an elaborate Comparative Analysis
of Class XI Old and New CBSE Curriculum has been given
right in the beginning to give you a clear-cut idea about the chapters
modified or fresh topics included in the 2020-21 syllabus vis-à-vis
the old one. This Supplement includes a new chapter – Emerging
Trends – besides additions/changes to the respective chapters as per
the syllabus, including exercises.

Happy learning!
CHANGE IN SYLLABUS OF CLASS 11 INFORMATICS PRACTICES IN A NUTSHELL
Earlier (2019-20 Syllabus) Now (2020-21 Syllabus)
• Total Units: 5 • Total Units: 5

• Unit I : Introduction to Computer System • Unit I : Introduction to Computer System

• Unit II : Introductory Python Programming • Unit II : Introduction to Python

• Unit III : Data Handling • Unit III : Data Handling using NumPy

• Unit IV : Data Management • Unit IV : Database Concepts and Structured


Query Language

• Unit V : Society, Law and Ethics – Cyber Safety • Unit V : Introduction to Emerging Trends

DISTRIBUTION OF MARKS (2020-21)


2019-20 Syllabus – 70 MARKS 2020-21 Syllabus – 70 MARKS

• Total Units: 5 • Total Units: 5

• Unit I : 5 MARKS • Unit I : 5 MARKS (No change)

• Unit II : 30 MARKS • Unit II : 25 MARKS (5 Marks reduced)

• Unit III : 10 MARKS • Unit III : 15 MARKS (5 Marks increased)

• Unit IV : 15 MARKS • Unit IV : 20 MARKS (5 Marks increased)

• Unit V : 10 MARKS • Unit V : 5 MARKS (5 Marks reduced)


COMPARATIVE ANALYSIS OF CLASS XI OLD AND NEW CBSE CURRICULUM
Informatics Practices (065)
UNIT OLD CURRICULUM (2019-20) NEW CURRICULUM (2020-21) CHANGES
5 Marks 5 Marks No change
Basic computer organization:
Description of a computer system Introduction to computer and computing: The entire topic has been
and mobile system, CPU, memory, Evolution of computing devices, components of changed and evolution of
hard disk, I/O, battery, transition a Computer System and their interconnections, computing devices has been
from a calculator to a computer and Input/Output devices. added.
further to smart devices.
I: Introduction to Computer Troubleshooting with parts of
System Computer Memory: Units of memory, types of
computer and basic operations of No change
memory – primary and secondary
operating system

Basic concept of Data representation: Data deletion, its recovery and related security The complete topic has been
Binary, ASCII, Unicode concerns. freshly added.
Software: Purpose and types – system and
The complete topic has been
Concept of Compiler & Interpreter application software, generic and specific purpose
freshly added.
software.
30 Marks 25 Marks 5 Marks reduced
Introduction to Python
Programming: Familiarization with
the basics of Python programming:
a simple “hello world” program,
Process of writing a program,
Introduction to Python: Basics of Python
running it and print statements;
programming, Python interpreter - interactive
simple data types: integer, float,
and script mode, the structure of a program,
string. Introduce the notion of The topics of mutable and
II: Introduction to Python indentation, identifiers, keywords, constants,
variable and methods to manipulate immutable data types,
variables, types of operators, precedence of
it (concept of L-value and R-value data type conversion and
operators, data types, mutable and immutable
even if not taught explicitly). Tokens debugging have been added.
data types, statements, expressions, evaluation
– keywords, identifiers, Literals,
and comments, input and output statements,
Delimiters. Knowledge of data type
data type conversion, debugging.
and operators: accepting input from
the console, assignment statement,
expressions, operators (assignment,
arithmetic, relational and logical) and
their precedence.
Conditional statements: if, if-else,
if-elif-else; simple programs: e.g.,
absolute value, sort 3 numbers, while loop, flow charts
Control Statements: if-else, for loop
divisibility. Notion of iterative sub-topics have been removed
computation and control flow: for
range(), len()), while, flow charts.
Lists: list operations – creating, initializing,
List and dictionary: finding the traversing and manipulating lists, list methods and
maximum, minimum, mean; linear built-in functions.
search on a list of numbers, and Dictionary: concept of key-value pair, creating, No change
counting the frequency of elements in initializing, traversing, updating and deleting
a list using a dictionary. elements, dictionary methods and built-in
functions.
Text handling: compare, concat and
The entire chapter has been
substring operations (without using Strings removed
removed
string module).
Introduction to Python modules:
importing math (sqrt, ceil, floor, pow,
The entire chapter has been
fabs), random (random, randint, Python modules
removed
randrange), statistics (mean, median)
modules.
10 Marks 15 Marks Increase of 5 Marks
Data and its purpose, importance of data,
structured and unstructured data, data processing
cycle, basic Statistical methods for understanding
data – mean, median, mode, standard deviation
Numpy 1D array, 2D array and variance. The concept of Statistical
Arrays: slices, joins and subsets. methods has been added.
Introduction to NumPy library, NumPy arrays
III: Data Handling using NumPy and their advantage, creation of NumPy arrays;
indexing, slicing and iteration; concatenating and
splitting array;
Arithmetic operations on One-dimensional and
Arithmetic operations on 2D arrays. No change
Two-dimensional arrays.
Calculating max, min, count, sum, mean, median,
No Aggregate Functions mode, standard deviation, variance on NumPy Newly added
arrays.
15 Marks 20 Marks
Increase of 5 Marks
(As per 2019–20 Syllabus) (As per 2020–21 Syllabus)
• Relational databases: Concept of Database Concepts: Introduction to database No change
a database, relations, attributes concepts and its need, Database Management
and tuples, keys – candidate System.
key, primary key, alternate
Relational data model: Concept of domain,
key, foreign key; Degree and
tuple, relation, candidate key, primary key,
cardinality of a table.
alternate key, foreign key.
• Use SQL – DDL/DML commands
Advantages of using Structured Query Language,
to CREATE TABLE, INSERT INTO,
IV: Database Concepts and Data Definition Language, Data Query Language
UPDATE TABLE , DELETE FROM,
Structured Query and Data Manipulation Language, Introduction No change
Language ALTER TABLE, MODIFY TABLE,
to MySQL, Creating a database using MySQL,
DROP TABLE, keys and foreign
Data Types
keys;
To view content of a table: Data Definition: CREATE TABLE, DROP TABLE,
SELECT-FROM WHERE-ORDER BY ALTER TABLE. Order by, between, IN, LIKE
along with BETWEEN, IN, LIKE, clauses have been
Data Query: SELECT, FROM, WHERE. removed.
(Queries only on single table)
Data Manipulation: INSERT, UPDATE, DELETE
The entire topic has been
• Aggregate functions – MIN, No aggregate functions removed.
MAX, AVG, COUNT, SUM

10 Marks 5 Marks 5 Marks reduced


V: Introduction to Emerging
Trends Society, Law and Ethics Introduction to the Emerging Trends The entire unit has been
replaced.
GREEN – No change/Few changes              BLUE – Newly-added Topics              RED – Removed Topics
CONTENTS

CHAPTER 1 Computer System (Additions) 1.1 – 1.12

CHAPTER 3 Python Programming Fundamentals (Additions) 3.1 – 3.9

CHAPTER 12 Emerging Trends (Earlier Cyber Safety) 12.1 – 12.16

Case-based/Source-based Integrated Questions C.1 – C.9


Computer System
1 (Additions)

1.9 EVOLUTION OF COMPUTER


Evolution of computers contributes to the developments made in this field in terms of
computing devices being used, technologies used and software used. Let’s begin discussing
these concepts.

1.9.1 Evolution of Computing Devices


Humans have always needed to perform arithmetic operations like counting and adding. During
the prehistoric period, they counted either on their fingers or by making scratch marks on the
walls of the caves, paving the way for counting with the help of stones, pebbles and beads.
The gradual evolution of arithmetic methods led to the evolution of certain machines, further
leading to the evolution of present-day computers.

ABACUS (3003 BC)


Upper Beads
• The abacus was invented in 3000 BC in Babylonia. Deck
Beam
• It consists of beads on rods to count and calculate. Rods
Lower
• It is still widely used in Asia. Deck Frame

SLIDE RULE (1630 BC)


• Slide Rule was invented in 1630 BC.
• It was based on Napier’s rules for logarithms.
• It was used till the 1970s.

PASCAL’S ADDING MACHINE (1642 AD)


• In 1642 AD, Blaise Pascal, a French mathematician, invented
a calculating machine named Adding Machine.
• This machine was capable of doing addition and subtraction.
This device is known as the First Calculator of the
world.
LEIBNITZ’S CALCULATOR (1671 AD)
• In 1671 AD, Gottfried Leibnitz, a German
Mathematician, improved the Adding Machine and
invented a new machine capable of performing
multiplication and division also.

JACQUARD LOOM (1801 AD)


• This machine first gave the concept of stored program using metal
cards.
• It was the first computer manufactured.
• It is still in use today.

BABBAGE’S DIFFERENCE ENGINE


• Charles Babbage was a British mathematician. In
1822, he designed a machine called Difference
Engine. It aimed at calculating mathematical
tables.
• Since technology was not so advanced at that time,
this machine could not be made.
Supplement – Informatics Practices with Python–XI

BABBAGE’S ANALYTICAL ENGINE


• In 1833, Charles Babbage designed a machine called
Analytical Engine. It had almost all the parts of a
modern computer. Unfortunately, this machine could
not be built because of lack of technology. His designs
remained a concept.
• Babbage’s great designs earned him the title of ‘Father of
Computers’.

HOLLERITH’S TABULATING MACHINE


• Hollerith, a mathematician, invented a fast counting
machine named Tabulating Machine in 1880.
• This machine was used by the American
Department of Census to complete their 1880
census data.

1.2
MARK I COMPUTER
• Howard Aiken of Harvard University in USA joined
hands with IBM.
• He developed a computer named Mark I in 1943.
• It could perform mathematical operations very fast.
• It could perform one operation per second.

ENIAC
• The first electronic computer, ENIAC was developed
in 1946 by a team led by Professor Eckert and
Mauchly at the University of Pennsylvania in USA.
• Electronic Numerical Integrator and Computer
(ENIAC) was very huge and very fast.
• It could solve 5000 operations per second.

INTEL 8080 PROCESSOR


• In 1974, the Intel 8080 processor was introduced. It
became the basis for the first personal computers.
• It was based on John von Neumann Architecture, which
is based on “Stored Program Concept”.
What is von Neumann Architecture
According to von Neumann architecture, the
processor executes instructions stored in the
memory of the computer. Since there is only one
communication channel, the processor at a time Communication
Program
+
can either fetch data or an instruction. This means Data
Channel
that at any given point of time, either the data or

Computer System (Additions)


an instruction can be picked (fetched) from the Processor
storage unit for execution by the processor. Hence,
Storage (Memory)
execution takes place in a sequential manner.
This limitation of von Neumann computer is known as von Neumann bottleneck. EDVAC
(Electronic Discrete Variable Automatic Computer) was the first stored program computer
developed in 1952. After the invention of the first electronic computer ENIAC, the computer
technology improved at a very fast pace.

1.10 MECHANISM OF DATA CAPTURE, STORAGE AND RETRIEVAL


It refers to interconnection of the above discussed devices and their working in conjunction
with each other. To process the data, we need to first input or capture the data. This is followed
by its storage in a file or a database so that it can be retrieved in the future. Whenever data
is to be processed, it is first retrieved from the file/database so that we can perform further
actions on it.
1.3
(A) Data Capturing
It involves the process of gathering data from different sources in digital form. Data may be
captured using keyboard, bar code readers (used in offices, business establishments, and
at shopping outlets as shown in Fig. 1.17), remote sensors placed in satellites orbiting the
earth, etc.

Application Mobile Computer/PDA Barcode Scanner/RFID Reader


Scanning Barcodes with Built-in with Modular Head System Bluetooth® Hand-held Scanner &
Camera of your Smartphone or Peripheral Device
Tablet

Fig. 1.17: Ways to Capture Data

(B) Data Storage


It is the process of storing the captured data for processing. Nowadays, data is being
produced at a very high rate and, therefore, data storage has become a challenging task.
However, the decrease in the cost of digital storage devices has helped in simplifying this
task. There are numerous digital storage devices available which we have already discussed.
Data keeps on increasing with time. Hence, the storage devices also need to be upgraded
Supplement – Informatics Practices with Python–XI

periodically. In large organizations, computers with larger and faster storage, called data
servers, are deployed to store vast amount of data. Such dedicated computers help in
processing data efficiently. However, the cost (both hardware and software) of setting up a
data server as well as its maintenance is high, especially for small organizations and start-ups.

(C) Data Retrieval


It involves fetching the data from the storage devices for its processing as per user requirement.
As databases grow, the challenges involved in search and retrieval of the data in acceptable
time also increase. Minimizing data access time is crucial for faster data processing.

1.11 DATA DELETION AND RECOVERY


One of the biggest threats associated with digital data is its deletion.
Storage devices can malfunction or crash resulting in the deletion of
stored data. Users can accidentally erase data from storage devices
or a hacker/malware can delete the digital data intentionally.
Deleting digitally stored data means changing the details of data at
bit level, which can be very time-consuming. Therefore, when any
data is simply deleted, its address entry is marked as free and that
much space is shown as empty to the user without actually deleting
the data. In case data gets deleted accidentally or corrupted, there
arises a need to recover the data. Recovery of data is possible only if the contents/memory

1.4
space marked as deleted have not been overwritten by some other data. Data recovery is a
process of retrieving deleted, corrupted and lost data from secondary storage devices.
 Data Security Concerns
There are usually two security concerns associated with data. One is its deletion by some
unauthorized person or software. These concerns can be avoided by limiting access to
the computer system and using passwords for user accounts and files wherever possible.
There is also an option of encrypting files to protect them from unwanted modification.
The other concern is related to unwanted recovery of data by an unauthorized user/software.
Many times, we discard our old, broken or malfunctioning storage devices without taking
care to delete data. We assume that the contents of deleted files are permanently removed.
However, if these storage devices fall into the hands of mischief-mongers, they can easily
recover data from such devices; this poses a serious threat to data confidentiality. This
concern can be mitigated by using proper tools to delete or shred data before disposing
of any old or faulty storage device.

1.12 SOFTWARE
In our day-to-day life, when we go to the market to buy any electronic gadget like an LED/
LCD or a DVD player, we are actually purchasing hardware. But this hardware is of no use if we
don’t have a DVD or CD to play. Thus, the content of the DVD, which is referred to as software,
is essential to make this hardware device useful. Similarly, in case of a computer system also, all
the peripherals like keyboard, printer, mouse, speakers and the hardware like CPU, RAM, HDD
(Hard-disk drive), etc., are useless if there is no software to work upon this hardware.
Hardware needs to be operated by a set of instructions. These sets of instructions are referred
to as software. It is that component of a computer system which we cannot touch or view
physically. It comprises instructions and data to be processed using computer hardware. This
computer software and hardware together complete any task.
The software comprises the set of instructions which, on execution, deliver the desired outcome.
In other words, each software is written for some computational purpose. Some examples of
software include operating systems like Ubuntu or Windows 7/10, word processing tools like
LibreOffice Writer or Microsoft Word, video players like VLC Player, photo editors like Paint
and LibreOffice Draw. A document or image stored on the hard disk or pen drive is referred to

Computer System (Additions)


as a soft copy. Once printed, the document or an image is called a hard copy.

Need for Software


A computer system has two parts—Hardware and Software. Hardware refers to the physical
or tangible (which can be touched) components while software is the code or, in other words,
a set of instructions necessary to operate/run the computer hardware.

CTM: The physical or tangible components of a computer system are termed as Hardware.

Software is not only the basic requirement of a computer system but also makes a computer
more powerful and useful. Software can be divided into different types depending upon their
uses and application.

CTM: Software is the collection of computer programs, procedures and documentation that performs
different tasks in a computer system.

1.5
The sole purpose of software is to make computer hardware useful and operational. A software
knows how to make different hardware components of a computer work and communicate
with each other as well as with the end-user. We cannot talk to or instruct the hardware of a
computer directly. Hence, software acts as an interface between human users and the hardware.
Depending on the mode of interaction with hardware and functions to be performed, software
can be broadly classified into three categories, viz. (i) System software (ii) Utility Software and
(iii) Application software. The categorization of software is shown in Fig. 1.18.

Software

System Utility Application


Software Software Software

Operating Language General Customized


System Translators Purpose Software

Compiler Interpreter Assembler

Fig. 1.18: Classification of Computer Software

1.12.1 System Software


A computer is an electronic device that cannot work on its own until a certain set of instructions
is given to it to perform any task. Similarly, the functions of all the physical components of
Supplement – Informatics Practices with Python–XI

a computer system are guided by a set of instructions or programs collectively known as


System Software. System software provides the basic functions required to use a computer and
run the programs installed on it. This type of software is required to use the computer efficiently.
System software directs the computer what to do, when to do and how to do. It controls all the
major processes and tasks inside the computer system which are described below:
 It provides a platform for running Application software.
 It reads data and instructions through the input devices.
 It translates all data and instructions into computer-understandable form and vice versa.
 It controls all devices attached to the computer system.
 It processes and generates the result on the output devices.
System software can be further categorized into the following categories:
 BIOS
 Operating System
 Device Drivers
 Language Processors

CTM: System software refers to the programs that make the computer operational. It operates, controls
the components and monitors the basic activities of the computer.

1.6
(A) BIOS
The basic input/output system (BIOS) is also commonly known
as the System BIOS. The BIOS is boot firmware, a small program
that controls various electronic devices attached to the main
computer system. It is designed to be the first set of instructions
run by a computer when powered on. The initial function of the
BIOS is to initialize system devices such as the RAM, hard disk,
CD/DVD drive, video display card and other hardware. Fig. 1.19: BIOS Chip

The BIOS sets the machine hardware into a known state to help the operating system to
configure the hardware components. This process is known as booting or booting up.

(B) Operating System (OS)


Learning Tip: An OS is a program which
An operating system is a program that acts as an automatically gets loaded into the
interface between the user and hardware of computer’s main memory (RAM) at the
the computer as shown in Fig. 1.20. It helps to time a computer gets started. It provides
manage resources of the computer and optimize a platform to run other programs.
its performance. An OS is the first program to be
executed on a computer after the BIOS. It performs all basic tasks such as identifying basic
input/output devices, accepting input from the input devices, sending results to the output
devices, keeping track of files and directories on the disk, and controlling other peripheral
devices such as disk drives and printers.

System
Application Software
Software (Operating
System)

User
Computer Hardware

Fig. 1.20: Operating System as an Interface

Computer System (Additions)


 Need for an Operating System (OS): An
operating system is considered as the most Application
important program of the computer. It
provides a software platform on the basis
of which other programs called application Operating System
programs run. It recognizes an input entered
by the user and controls various peripheral
Hardware
devices (such as printers/scanners) as shown
in Fig. 1.21. It also keeps track of the files and Monitor Keyboard
directories on the disk. The choice of selecting Printer
OS depends to a great extent on the CPU
and other attached devices and applications Drives RAM
we want to run. For PCs, some of the most
popular operating systems are Microsoft
Fig. 1.21: Role of an Operating System
Windows, Linux, Mac OS, Solaris, BOSS, etc. 1.7
(C) Device Driver
Application & User
A device driver is a system software that acts like
an interface between the device and the user or Operating System
the operating system. All computer accessories
like printers, scanners, web cameras, etc., come Device Drivers
with their own driver software. This driver
software helps the operating system and other
application software to communicate with
those devices for optimal use.
Fig. 1.22: Device Drivers
(D) Language Processors
We know that computer understands instructions in machine code, i.e., in the form of
0s and 1s. It is difficult for us to write a computer program directly in machine code.
Programs are written mostly in high-level languages, i.e., BASIC, C++, Python, etc. A program
written in any high-level programming language (or written in assembly language) is called
the Source Program or Source Code.
The source code cannot be executed directly by the computer. It must be converted into
machine language to be executed. The program translated into machine code is known
as Object Program or Object Code. The special translator system software that is used to
translate the program written in high-level language (or Assembly language) into machine
code is called language processor or translator program. Language processors can be
of any of the following three types—Assembler, Compiler and Interpreter.

1.12.2 Application Software


Application software are bought by the user to perform
Supplement – Informatics Practices with Python–XI

specific applications or tasks, for example, making a


document or making a presentation or handling inventory
or managing the employee database.
Application software are classified into three types—General
Purpose Application Software, Customized Application
Software and Proprietary or Free and Open Source Software.

(A) General Purpose (Generic) Application Software


These application software are made for the common users for day-to-day applications and uses.
They are also referred to as Office Tools. The users may use them in the manner they want.
Some of the popular types of general purpose application software are discussed below:
 Word Processor: Word processor is a general purpose application software used to
create, edit and format documents. We can use different types of fonts of various
sizes, underline or make bold a certain part of the text. We can add clipart and
other graphics into the document. Popular examples of word processing software
are writer (Open Office) and Microsoft Word.
Word processing software have various uses from writing a simple document to
designing special art effects. Since we can attach images and different shapes and
use different colours, even a poster can be designed using word processing software.
Features like mail merge, macro have further enhanced the word processing software
and made it very useful.

1.8
 Presentation Tools: A presentation tool is a general purpose application software
that lets us create presentations on any topic. We can not only create a presentation
and add slides to it but also use different types of backgrounds, fonts, animations,
audio, video, etc. We can add clipart and other graphics into our document. Even
audio-video files can be added to the presentations. Popular examples of presentation
tools software are Impress (open office) and Microsoft PowerPoint.
 Spreadsheet Packages: Spreadsheet is a general purpose application software that
allows us to create and store data in tabular form. Both text and numerical values
can be entered in those tables, known as spreadsheets. We can not only create a
document and add data to it but also create different types of charts and graphs
based upon the numerical data stored in that page. All common mathematical
and statistical formulae can be used on the numeric data. Popular examples of
spreadsheet software are Calc (Open Office) and Microsoft Excel.
 Database Management System: Database Management System is a general purpose
application software that lets us create computer programs that control the creation,
maintenance and use of database for an organization and its end users. We can not
only store data but can also manage data in a database. We can also import and
export data to many formats including Excel, Outlook, ASCII, dBase, FoxPro, Oracle,
SQL Server, ODBC, etc. Popular examples of Database Management System are Base
(Open Office) and Microsoft Access.
 Integrated Development Environment (IDE): To create large application programs,
a developer needs to use the requisite tools. The developer needs an environment
(the programming environment) where they can use the tools to create programs
for applications. Various application software provide a programming environment
to develop applications. Such a programming environment is commonly known as
IDE. Thus, an IDE consists of various development tools required for creating or
designing applications. NetBeans IDE is the most popular example of IDE.
(B) Specific Purpose Application Software–Customized Application Software
Customized Software are those which are tailor-made as per the user’s requirement. Such
type of software are customer-specific. They are made keeping in mind the individual
needs of the user and so are also referred to as Domain Specific Tools. Such software
cannot be installed or used by any other user/customer since the requirements may differ.

Computer System (Additions)


Some examples of customized software are discussed below:
 Inventory Management System and Purchasing System: Inventory Management
System is generally used in department stores or other organizations to keep a record
of the stock of all the physical resources. For example, in a computer store, it keeps
a record of the number of computers, printers, printing sheets, printer cartridges
available, etc. It also helps in placing purchase orders, bills, invoices, etc. Various
reports such as position of stock, sales made in a particular period, profit earned,
etc., can also be generated.
 Payroll System: Payroll Management System software is used by all modern
organizations to keep track of employees of the organization who receive wages or
salary. All different payment amounts are calculated by the payroll software and the
record is maintained. The software keeps track of personal records of employees
viz. name, address, date of birth, qualification, date of joining, etc. It also keeps track
of professional record viz. allowances, perks, income tax, insurance, etc. Different
reports, pay slips, etc., can be generated through this software.
1.9
 Financial Accounting: Financial Accounting System is used to prepare accounting
information, maintain different ledger accounts and account books. It also helps an
organization to make a budget.
 Hotel Management: Hotel Management software involves management techniques
used in the hotel sector. These can include hotel administration, accounts, billing,
marketing, housekeeping, front office or front desk, food and beverage management,
catering and maintenance, etc. Even advance bookings can be made through this
software. Customers can have a look at the hotel and the rooms before making
bookings. At any point of time, the room availability, tariff for each type of room
and even booking status can be checked.
 Reservation System: Reservation System is a software used to book (reserve) flight
tickets, railway seats, movie tickets, tables in a restaurant, etc. In the case of a
booking system, the inputs are booking requests. The processing involves checking
if bookings are possible and, if so, making the bookings. The outputs are booking
confirmations/rejections.
(C) Proprietary or Free and Open Source Software
Another important category of software which are being extensively used are proprietary and
Open Source Software (OSS).
Developers of some software allow the public to freely use their software along with source
code with an aim to improve further with each other’s help. Such software are known as Free
and Open Source Software (FOSS). For example, the source code of the operating system Ubuntu
is freely accessible to anyone with the required knowledge to improve/add new functionality.
More examples of FOSS include Python, Libreoffice, Openoffice, Mozilla Firefox, etc. Sometimes,
software are freely available for use but source code may not be available. Such software are
Supplement – Informatics Practices with Python–XI

called freeware. Examples of freeware are Skype, Adobe Reader, etc.


When software to be used has to be purchased from the vendor who has the copyright of the
software, then it is a proprietary software. Examples of proprietary software include Microsoft
Windows, Tally, Quickheal, etc. A software can be freeware or open source or proprietary
software depending upon the terms and conditions of the person or group who has developed
and released that software.

MEMORY BYTES
 A buffer is a data area shared by hardware devices or program processes that operate at different speeds or
with different sets of priorities.
 Software is a set of instructions written to achieve the desired task and are mainly categorized as system
software, programming tools and application software.
 Hardware of a computer cannot function on its own. It needs software to be operational or functional.
 Operating system is an interface between the user and the computer and supervises the working of a computer
system, i.e., it monitors and controls the hardware and software of the computer system.

OBJECTIVE TYPE QUESTIONS


1. Fill in the blanks.
(o) Compiler comes under .............................. .
(p) MS office is an .............................. software.
(q) A .............................. is an integrated set of specialized programs that is used to manage the overall
operations of a computer.
1.10
(r) Data processing is a means of transforming .............................. into information.
Answers: (o) Language Processor (p) Application (q) Software
(r) Raw data
2. State whether the following statements are True or False.
(m) An operating system acts as an interface between the user, computer hardware and software.
(n) Registers are high-speed temporary storage areas found in the CPU.
(o) Cache memory is also known as CPU memory.
(p) The primary memory unit stores the data and instructions permanently.
Answers: (m) True (n) True (o) True (p) False
3. Multiple Choice Questions (MCQs):
(m) Which input device is used to provide audio data to a computer?
(i) Speaker (ii) Webcam (iii) Microphone (iv) All of these
(n) When power is switched OFF and data which is not saved is lost forever, such type of memory is
classified as:
(i) Volatile (ii) Non-volatile (iii) Impact (iv) Non-impact
(o) Which output device is used for producing highly accurate, very large drawings and posters?
(i) Laser Printer (ii) Dot Matrix Printer (iii) Inkjet Printer (iv) Plotter
(p) Which optical media uses blue laser technology to read and write data on the media surface?
(i) DVD (ii) CD (iii) DVD-ROM (iv) Blu-ray Disc
Answers: (m) (iii) (n) (i) (o) (iv) (p) (iv)

SOLVED QUESTIONS
22. Name the part of computer which is responsible for processing. [HOTS]
Ans. The CPU is responsible for processing.
23. Name the primary memory which is volatile.
Ans. RAM (Random Access Memory).
24. Write down the various capabilities of a computer.
Ans. The various capabilities of a computer are speed, reliability, diligence, versatility and large memory.
25. What is booting?
Ans. Booting is the process of starting your computer and loading the operating system.
26. Distinguish between Primary memory and Secondary memory.
Ans.
Primary Memory Secondary Memory

Computer System (Additions)


• Storage is volatile. • Storage is non-volatile.
• There is limited amount of RAM. • Secondary storage that can be accessed by the
CPU is virtually infinite.
• It takes a few seconds for the CPU to access • CPU takes little longer to access secondary
RAM. memory.
• RAM is costlier than secondary storage. • It is cheaper.
27. Expand the following:
(i) ALU (ii) RAM
(iii) GUI (iv) CD-ROM
Ans. (i) ALU: Arithmetic and Logic Unit (ii) RAM: Random Access Memory
(iii) GUI: Graphical User Interface (iv) CD-ROM: Compact Disk Read-only Memory
28. What are the basic components of a computer system?
Ans. The basic components are: ALU, Control Unit, Memory, Input Unit and Output Unit.

1.11
29. Define microprocessors.
Ans. Microprocessor is the other name of CPU. It is a large-scale integrated circuit which contains thousands
of transistors. Microprocessors allow computers to think faster.
30. Why are language processors used? List their types.
Ans. Programs written in a high-level language are required to be converted into a machine language. This task
is accomplished by the language processor. The types of language processors are as follows:
(a) Assembler (b) Interpreter
(c) Compiler
31. Explain briefly the functions of operating system.
Ans. The main functions of OS are:
(a) Memory management (b) Processor management
(c) Device management (d) Information management
32. What types of operations are provided by an operating system?
Ans. The operations provided by an operating system are:
• Provide an interface to allow the user to communicate with the computer.
• Control the various system hardware and software resources, e.g., Keyboard, Visual Display Unit
(VDU), Printer, etc., using special programs called Device Drivers.
• Manage the user’s files, keeping track of their positions on the disk, updating them after user makes
changes to them, etc.
• Provide system facilities, e.g., compilers to translate from high-level programming languages used
by the user to the internal machine language the computer uses.
33. What is an operating system (OS)?
Ans. An operating system (OS) is a group of computer programs that coordinates all the activities among
computer hardware devices. It is the first program loaded into the computer by a boot program and
remains in the memory at all times. OS is the interface between the user and the hardware of the
computer. It makes the computer functional and is responsible for running all the other software.
34. What is the difference between data and information?
Ans. The difference between data and information is as follows:
Supplement – Informatics Practices with Python–XI

Data is defined as raw facts and figures such as “Tejas”, “MBA”, “2013”, “ABC”. This data does not have
any meaning when presented as such. However, this data can be organized or processed to transform
it into useful information.
Information is defined as a collection of data which is organized in a particular manner to generate some
meaning. For example, “Tejas passed MBA in 2013 from ABC” is the information that we have obtained
after processing the data given above.

UNSOLVED QUESTIONS
54. What is an operating system?
55. Explain the types of operating systems with examples.
56. “Hardware is of no use without software and software cannot be used without hardware.” Explain.
57. What is an operating system? Write names of any two popular operating systems.
58. Convert the following into bytes:
(a) 2 MB (b) 3.7 GB (c) 1.2 TB
59. What are the security threats involved when we throw away electronic gadgets that are non-functional?
60. Write down the type of memory needed to do the following:
• To store data permanently,
• To execute a program,
• To store instructions which cannot be overwritten.

1.12
Python Programming
3 Fundamentals
(Additions)

3.13 MUTABLE AND IMMUTABLE TYPES


In certain situations, we may require changing or updating the values of certain variables used
in a program. However, for certain data types, Python does not allow us to change the values
once a variable of that type has been created and assigned values.
Variables whose values can be changed after they are created and assigned values are called
mutable variables.
Variables whose values cannot be changed after they are created and assigned values are called
immutable variables. When an attempt is made to update the value of an immutable variable,
the old variable is destroyed and a new variable is created by the same name in memory.
Python data types can be classified into mutable and immutable as under:
 Examples of mutable objects: list, dictionary, set, etc.
 Examples of immutable objects: int, float, complex, bool, string, tuple, etc.
For example, int is an immutable type which, once created, cannot be modified.
Consider a variable ‘x’ of integer type:
>>> x = 5
Now, we create another variable ‘y’ which is a copy of variable ‘x’.
>>> y = x
The above statement will make y refer to value 5 of x. We are creating an object of type int.
Identifiers x and y point to the same object.
x=5
This statement will create a value 5 referenced by x.
x
5
y

Now, we give another statement as:


>>> x = x + y
The above statement shall result in adding up the value of x and y and assigning to x.
Thus, x gets rebuilt to 10.
x 10
y 5
The object in which x was tagged is changed. Object x = 5 was never modified. An immutable
object doesn’t allow modification after creation. Another example of immutable object
is a string.
>>> str = "strings immutable"
>>> str[0] = 'p'
>>> print(str)
This statement shall result in TypeError on execution.
TypeError: 'str' object does not support item assignment.
This is because of the fact that strings are immutable. On the contrary, a mutable type object
such as a list can be modified even after creation, whenever and wherever required.
new_list = [10, 20, 30]
print(new_list)
Output:
[10, 20,30]
Suppose we need to change the first element in the above list as:
Supplement – Informatics Practices with Python–XI

new_list = [10, 20, 30]


new_list[0] =100
print(new_list) will make the necessary updation in the list new_list and shall display the
output as:
[100, 20,30]
This operation is successful since lists are mutable.
Python handles mutable and immutable objects differently. Immutable objects are quicker to
access than mutable objects. Also, immutable objects are fundamentally expensive to “change”
because doing so involves creating a copy. Changing mutable objects is cheap.

3.14 TYPE CONVERSION (TYPE CASTING)


As and when required, we can change the data type of a variable in Python from one type to
another. Such data type conversion can happen in two ways:
• either explicitly (forced) when the programmer specifies for the interpreter to convert a
data type into another type; or
• implicitly, when the interpreter understands such a need by itself and does the type
conversion automatically.

3.2
 Explicit Conversion
Explicit conversion, also called type casting, happens when data type conversion takes place
deliberately, i.e., the programmer forces it in the program. The general form of an explicit
data type conversion is:
(new_data_type) (expression)
With explicit type conversion, there is a risk of data loss since we are forcing an expression
to be of a specific type.
For example, converting a floating value of x = 50.75 into an integer type, i.e., int(x), will
discard the fractional part .75 and shall return the value as 50.
>>> x = 50.75
>>> print(int(x))
50

Following are some of the functions in Python that are used for explicitly converting an
expression or a variable into a different type:

Table 3.5: Explicit type conversion functions in Python


Function Description
int(x) Converts x into an integer.
float(x) Converts x into a floating-point number.
str(x) Converts x into a string representation.
chr(x) Converts x into a character.

 Implicit Conversion
Implicit conversion, also known as coercion, happens when data type conversion is done
automatically by Python and is not instructed by the programmer.

Python Programming Fundamentals (Additions)


Example 5: Program to illustrate implicit type conversion from int to float.

In the above example, an integer value stored in variable num1 is added to a float value stored in
variable num2, and the result gets automatically converted into a float value stored in variable
sum1 without explicitly telling the system. This is an example of implicit data conversion.
The reason for the float value not converted into an integer instead is due to type promotion
that allows performing operations (whenever possible) by converting data into a wider-sized
data type without any loss of information.

3.3
Example 6: Write a Python code to calculate simple interest and amount payable by inputting
the value of principal amount and rate from the user for a time period of 5 years.
(Formula used: Simple Interest = Principal * Rate * Time/100)

3.15 DEBUGGING
Apart from computer programs that we code, an exception or error or unusual condition can
occur even in our daily life. Consider a real-life scenario—you leave your house for office
by driving a car. On the way, the tyre gets punctured and you are forced to stop the car and
replace the tyre. So, in this scenario, the punctured tyre is the exception which has occurred
Supplement – Informatics Practices with Python–XI

unexpectedly. In such situations, we are required to carry along a spare tyre so that we can
change the punctured tyre then and there only and can continue with our journey, which is
described as exception handling.

Normal Flow Exception Exception Handling

Likewise, when we are browsing a webpage and that webpage is unreachable because there is
no network connection or that there is no microphone available to create an audio recording—
these are examples of exceptions or errors.
Sometimes an application can recover from an error and still provide normal, expected
behaviour, sometimes errors get reported to the user, sometimes they get logged to a file, etc.
It depends on the specific error and the application. Same is applicable in the field of computer
programming also.
Most application codes written for developing applications have errors in them. When your
application suddenly freezes for no apparent reason, that is usually because of an error. But
we all understand that programs have to deal with errors.

3.4
The process of finding errors in a program is termed as Debugging.
Due to errors, a program may not execute or may generate wrong output. So it becomes
necessary to find out and remove the errors for the successful execution of a program. Errors
in Python are classified mainly into three types:
(a) Syntax Error
(b) Runtime Error
(c) Logical Error

3.15.1 Syntax Error


A syntax error is an error in the syntax of a sequence of characters or tokens that is intended to
be written in a particular programming language. These types of errors are generated when we
violate the syntax or, in other words, the grammatical rules of a programming language. Syntax
errors are the most common type of errors which are easily traceable. They can be corrected
by the user as the reason for the error and an appropriate message about what is wrong in the
program is displayed.
For example,

Python Programming Fundamentals (Additions)


Fig. 3.20: Syntax Error: Invalid Syntax

The above statement is an example of syntax error as it violates the language protocol by not
giving parentheses with the print() function. So, the corrected statement should be:
>>> print('Hello world')
Hello world
However, some syntactical errors are quite hard to find. Python is case-sensitive, so you may
use the wrong case for a variable and find out that the variable isn’t quite working as you
thought it would.
For example,


3.5
In the above example, we have typed Print() statement instead of print(), which is syntactically
wrong and needs to be corrected. So the correct statement shall be:
>>> print(4+5)
9
Most syntactical errors occur at the time of program execution and the interpreter points them
out for you. Fixing the error is made easy because the interpreter generally tells you what to
fix and with considerable accuracy.

CTM: Syntax errors are errors that occur due to incorrect format of a Python statement. They occur
while the statement is being translated to machine language and before being executed.
A few more examples of syntax errors are shown below in Fig. 3.21.
Supplement – Informatics Practices with Python–XI

Fig. 3.21: Other types of Syntax Errors

Let us understand the reason behind the occurrence of each error given in the above example.
 Statement 1 generates syntax error because of improper closing bracket (square bracket
instead of parenthesis).
 Statement 2 generates syntax error because of missing parenthesis after ‘if’ keyword.
 Statement 3 generates syntax error because of missing parenthesis with print() method.
 Statement 4 generates syntax error because of use of semicolon instead of comma in a list
declaration.
 Statement 5 generates syntax error because of improper indentation.

3.15.2 Runtime Error


A runtime error occurs after Python interpreter interprets the code you write and the computer
begins to execute it. Runtime errors come in different types and some are hard to find.
You know you have a runtime error when the application suddenly stops running and displays
an error (exception) dialog box or when the user complains about erroneous output. It usually
results in abnormal program termination during execution.

3.6
For example,

Fig. 3.22: Example of Runtime Error

The above statement is syntactically correct but won’t yield any output. Instead, it shall
generate an error as division of any number by 0 will result in an error upon execution and
illegal program termination. Some examples of Python runtime errors are:
• division by zero,
• performing an operation on incompatible types,
• using an identifier which has not been defined,
• accessing a list element, dictionary value or object attribute which doesn’t exist,
• trying to access a file which doesn’t exist.

CTM: Errors are exceptional, unusual and unexpected situations and they are never part of the normal
flow of a program.

In Python, such unusual situations are termed as Exceptions. Exceptions are usually runtime
errors.

Python Programming Fundamentals (Additions)


3.15.3 Logical Errors
A logical error/bug (called semantic error) does not stop execution but the program behaves
incorrectly and produces undesired/wrong output. Since the program interprets successfully
even when logical errors are present in it, it is sometimes difficult to identify these errors.
Logical errors are the most difficult to fix. They occur when the program runs without crashing
but produces an incorrect result. The error is caused by a mistake in the program’s logic. You
won’t get an error message because no syntax or runtime error has occurred.
You will have to find the problem on your own by reviewing all the relevant parts of the code.
For example, if we wish to find the average of two numbers 10 and 12 and we write the code
as 10 + 12/2, it would run successfully and produce the result 16, which is wrong. The correct
code to find the average should have been (10 + 12)/2 to get the output as 11.
For example,

3.7
The example above should calculate the average of the two numbers the user enters. But
because of the order of operations in arithmetic (division is evaluated before addition), the
program will not give the right answer; this is known as logical error.

As a result, you will get 5.0 as the output instead of 3.5.


To rectify this problem, we will simply add parentheses: z = (x+y)/2

Hence, now we will get the right result as 3.5.


Supplement – Informatics Practices with Python–XI

MEMORY BYTES
 The process of identifying and removing errors from a computer program is called debugging.
 Trying to use a variable that has not been assigned a value gives an error.
 Runtime errors occur during the execution of a program.
 Irregular unexpected situations occurring during runtime are called exceptions.

OBJECTIVE TYPE QUESTIONS


1. Fill in the blanks.
(m) The process of identifying and removing errors from a computer program is called ...................... .
Answer: (m) Debugging
3. Multiple Choice Questions (MCQs):
(k) Which of the following is a syntactically correct string?
(i) “This is great !” (ii) ‘she shouted ‘HELLO’ loudly’
(iii) “Goodbye’ (iv) “This “course” is good”
Answer: (k) (i)

3.8
SOLVED QUESTIONS
18. What type of error will be produced when you type:
Result = “Python” + 10
Name the error and error message.
Ans. The error is: TypeError
The error message is: Can’t convert ‘int’ object to str implicitly
19. What type of error will be produced when you type:
while True print(“Hello world”)
Ans. The error is: SyntaxError: invalid syntax
20. Identify the error in the following Python statement:
>>> print("My name is", first_name)
Write the corrected statement also.
Ans. The above statement is trying to print the value of an undefined variable first_name. The correction is
made by defining the variable name before using it, i.e.,
>>> first_name = 'Rinku'
>>> print("My name is", first_name)

UNSOLVED QUESTIONS
36. Name three runtime errors that occur during Python program execution.
37. What is the difference between an error and exception?
38. Explain the difference between syntax error and runtime error with examples.
39. Which data type will be used to represent the following data values and why?
(a) Number of months in a year (b) Resident of Delhi or not
(c) Mobile number (d) Pocket money
(e) Volume of a sphere (f) Perimeter of a square
(g) Name of the student (h) Address of the student

Python Programming Fundamentals (Additions)


40. What is the error in the following code?
z,p = 6
41. Find out the error(s) in the following code fragments:
(1) temperature = 90
Print temperature
(2) a = 30
b = a + b
print(a And b)
(3) a, b, c = 2, 8, 9
print(a, b, c)
c, b, a + a, b, c
print(a ; b ; c)
(4) x = 24
4 = x
(5) Print("X =" X)

3.9
Emerging Trends
12 (Earlier Cyber Safety)

12.1 INTRODUCTION
The 21st century has been defined by application of and advancement in information technology.
Information technology today has become an integral part of our daily life. It has served as a
big change agent in different aspects of business and society. It has proven a game changer in
resolving economic and social issues. Advancements in and application of information technology
are ever changing.
A number of technologies are introduced almost every day. While some of these do not succeed
and fade away over time, some prosper and persist gaining attention of the users. There is hardly
any field of human life that is not affected by information technology. Various technological trends
like cloud computing, mobile computing, social media, ubiquitous computing, etc., are growing
rapidly. Cloud computing enables us to share hardware and software resources as a service over
the internet with any user over the globe on pay-per-use basis. Mobile computing helps us to
access and process data on handheld mobile devices like smartphones, iPads, etc. Social media
like Facebook, Twitter, WhatsApp, YouTube, LinkedIn help people interact with each other around
the world. Social media is also contributing to make this world a better place to live in by raising
social issues. Internet of Things (IoT), a network of a large number of objects, computing devices
embedded with microchips, sensors, actuators is making this world a smart place to inhabit.
Emerging trends are state-of-the-art technologies which gain popularity and set a new trend
among users. In this chapter, we will learn about some emerging trends like cloud computing,
mobile computing, social media and Internet of Things (IoT), which are evolving very fast, and
also discuss their role and future impact on digital economy and interaction in digital societies.

12.2 ARTIFICIAL INTELLIGENCE (AI)


Artificial Intelligence is a technology that is already impacting
how users interact with, and are affected by, the internet and
its impact will only continue to grow. AI traditionally refers to
an artificial creation of human-like intelligence that can learn,
reason, plan, perceive or process natural language. The two
words Artificial and Intelligence or AI, where Artificial means
‘man-made’, and intelligence means ‘thinking power’, together
mean ‘a man-made thinking power’.
Have you ever wondered how maps in your smartphone are able to guide you to take the
fastest route to your destination by analyzing real-time data, such as traffic congestion? On
uploading a photo on a social networking site, has it ever happened that your friends in the
photograph were recognized and tagged automatically? These are some of the examples of
application of Artificial Intelligence. The intelligent digital personal assistants like Siri, Google
Now, Cortana, Alexa are all powered by AI. Artificial Intelligence endeavours to simulate the
natural intelligence of human beings into machines, thus making them behave intelligently.
Thus, Artificial Intelligence aims to create Expert Systems, i.e., systems which display intelligent
behaviour, learn, demonstrate, explain and advice its users. AI also aims at implementing human
intelligence in machines by creating systems that can understand, think, learn and behave like
humans.
 Applications of AI:

The applications of Artificial Intelligence are endless. The technology can be applied to
different sectors and industries. AI is being tested and used in the health care industry
for dosing drugs, various other treatments, and also for surgical procedures in the
operating room.
Apart from the above important applications, AI has been dominant in various other fields
such as:
Artifical Intelligence
• Gaming Predictive Text-to- Image
Analytics Speech Recognition
Speech- Machine
• Natural Language Processing Deep
Learning to-Text Vision
Machine Speech Vision
• Expert Systems Learning

• Vision Systems
Supplement – Informatics Practices with Python–XI

Classification

• Speech Recognition Translation

• Handwriting Recognition Natural Language


Processing (NLP)
Data
Extracion
Expert
Systems
Planning &
Optimization
Robotics

• Intelligent Robots Fig. 12.1: Applications of Artificial Intelligence (AI)

Thus, we may say that Artificial Intelligence is a field of science and technology based on
disciplines such as Computer Science, Biology, Psychology, Linguistics, Mathematics and
Engineering.

12.2.1 Machine Learning


Machine Learning is an application of Artificial Intelligence (AI). It focuses on providing
systems which enable the computer to automatically learn and improve without being explicitly
programmed. Learning from the previous tasks handled by the machine leads to better
intelligence with better response to new inputs and situations in the future. This is called
machine learning.
Machine Learning focuses on development of computer programs that can access data and use
it themselves and learn from it.

12.2
Traditional Programming

Data Input Analyze Find


Computer Output Prediction Stores the
Program Data Data Patterns Feedback

Machine Learning
Data
Computer Program
Output

Fig. 12.2: How Machine Learning works

The process of learning begins with observation of data, such as examples, direct experience,
or instructions, in order to look for patterns in data and make better decisions in future based
on examples that we provide. The primary aim is to allow computers learn automatically
without human intervention or assistance and act accordingly.
It consists of several algorithms that fetch data to learn on their own and make certain
predictions. These algorithms, called models, are first trained and tested using a training and
testing data, respectively. After successive trainings, once these models are able to give results to
an acceptable level of accuracy, they are used to make predictions about new and unknown data.

12.2.2 Natural Language Processing (NLP)


Natural Language Processing (NLP) is a subfield of Artificial Intelligence that helps computers
understand human language.
Nowadays you say, “Alexa, play this song,” and a device starts playing that song. This complete
interaction could become possible by NLP along with other AI elements such as machine learning and
deep learning. NLP makes it possible for computers to read text, hear speech, interpret it, measure
sentiment and determine which parts are important. NLP is a branch of Artificial Intelligence that
deals with the interaction between computers and humans using the natural language.
Most NLP techniques rely on machine learning to derive meaning from human languages.

Emerging Trends

Fig. 12.3: Natural Language Processing (NLP) for Artificial Intelligence


Natural Language Processing is the driving force behind the following common applications:
• Language translation applications such as Google Translate.
• Word Processors such as Microsoft Word and Grammatically that employ NLP to check
grammatical accuracy of texts.
• Interactive Voice Response (IVR) applications used in call centres to respond to certain
users’ requests.
• Personal assistant applications such as OKGoogle, Siri and Alexa. 12.3
In fact, it is possible to search the web or operate or control our devices using our voice. All this
has been made possible by NLP. An NLP system can perform text-to-speech and speech-to-text
conversion as shown in Fig. 12.4.

Fig. 12.4: Application of Natural Language

Machine translation is an emerging field where machines are able to translate text from one
language to another with a fair amount of correctness. Another emerging application area is
automated customer service where computer software can interact with customers to resolve
their queries or complaints.

Thus, the field of NLP involves making computers perform useful tasks with the natural
languages that humans use. The input and output of an NLP system can be:
Supplement – Informatics Practices with Python–XI

• Speech
• Written text

12.2.3 Immersive Experiences


An “immersive experience” pulls a person into a new or
augmented reality, enhancing everyday life via technology.
It often uses one or more technologies linked together.
With three-dimensional (3D) videography, the joy of
watching movies in theatres has reached a new level.
Video games are also being developed to provide
immersive experience to the player. Immersive experience
allows us to visualize, feel and react by stimulating our
senses. It enhances our interaction and involvement,
making them more realistic and engaging.
Immersive experiences have been used in the field of
training, such as driving simulators (Fig. 12.5), flight Fig. 12.5: Driving Simulator
simulators and so on. Immersive experience can be
achieved using virtual reality and augmented reality.

12.4
Virtual Reality (VR)
Virtual Reality (VR) is the use of computer technology to
create a virtual simulator, away from real environment.
Unlike traditional user interfaces, VR puts the user
inside an experience. Instead of viewing a screen in front
of them, users are immersed and able to interact with
3D worlds. By simulating as many senses as possible,
such as vision, hearing, touch, even smell, the computer
is transformed into a gatekeeper to this artificial world. Fig. 12.6: VR Headset

Everything that we experience in our reality is perceived through our senses. From this came
the idea that if we can present our senses with made-up or non-real information, our perception
of reality would also alter in response to that.
At present, it is achieved with the help of VR headsets. In order to make the experience of VR
more realistic, it promotes other sensory information like sound, smell, motion, temperature,
etc. It is a comparatively new field and has found its applications in gaming (Fig. 12.6), military
training, medical procedures, entertainment, social science and psychology, engineering and
other areas where simulation is needed for a better understanding and learning.

Augmented Reality (AR)


Augmented Reality (AR) is one of the biggest technology trends today and it is only going to get
bigger as AR-ready smartphones and other devices become more accessible around the world.
AR lets us see real-life environment right in front of us—trees swaying in the park, dogs chasing
balls, kids playing soccer—with a digital augmentation overlaid on it.
This superimposition of computer-generated perceptual information over the existing physical
surroundings is called Augmented Reality. It adds components of the digital world to the physical
world, along with the associated tactile and other sensory requirements, thereby making the
environment interactive which can be digitally manipulated. AR adds digital elements to a live
view often by using the camera in a smartphone.
Examples of Augmented Reality experiences include Snapchat lenses and the game Pokémon
Go. In other words, if you see the real world supplemented with digital objects, that is AR.
Imagine you want to buy a piece of furniture—let’s say a chair. Augmented reality technology
can help you check how different chairs will look in your room and pick the one that fits best.

12.2.4 Robotics
Emerging Trends

Robotics is an interdisciplinary research area at the interface


of computer science and engineering. Robotics involves design,
construction, operation and use of robots. The goal of robotics is to
design intelligent machines that can help and assist humans in their
day-to-day lives and keep everyone safe.
Robotics helps develop machines that can substitute for humans and
replicate human actions. Robots can be used in many situations and
for several purposes, but today many are being used in hazardous
environments (including inspection of radioactive materials, bomb Fig. 12.7: Robotics
detection and deactivation), manufacturing processes, or where
humans cannot survive (e.g., in space, under water, in high temperature). 12.5
Robots that resemble humans are known as humanoids. Robots are being used in industries,
medical science, bionics, scientific research, military, etc. Some examples are:
NASA’s Mars Exploration Rover (MER) mission is a robotic space mission to study about the
planet Mars (Fig.12.8 (a)).
Mitra is the first Indian-made humanoid that uses artificial intelligence, visual data processing,
facial recognition and also imitates human gestures and facial expressions (Fig. 12.8 (b)).
A drone is an unmanned aircraft which can be remotely controlled or can fly autonomously
through software-controlled flight plans in their embedded systems, working in conjunction
with onboard sensors and GPS (Fig. 12.8 (c)).

Fig. 12.8(a): Rover Fig. 12.8(b): Mitra Fig. 12.8(c): Drone

Drones are being used in many fields, such as journalism, filming and aerial photography,
shipping or delivery at short distances, disaster management, search and rescue operations,
health care, geographic mapping and structural safety inspections, agriculture, wildlife
monitoring or poaching, besides law enforcement and border patrolling.
Supplement – Informatics Practices with Python–XI

12.3 BIG DATA


The term Big Data refers to a huge volume of data that cannot be stored and processed by any
traditional data storage or processing units. Big Data is generated at a very large scale and
used by many multinational companies to process and analyze in order to uncover insights and
improve the business of many organizations.

Social Netwok Data Financial Data Multimedia Data

iPhone

Big Data Analytics

Data from ERP Systems Internet of Things Mobile Apps Data

12.6 Fig. 12.9: Big Data


Analysis of big data allows analysts, researchers and business users to make better and faster
decisions using data that was previously inaccessible or unusable. Businesses can use advanced
analytics techniques such as text analytics, machine learning, predictive analytics, data mining,
statistics and natural language processing to gain new insights from previously untapped data
sources independently or together with existing enterprise data.
Big data cannot be processed and analyzed using traditional data processing tools as the data
is not only voluminous but also unstructured, e.g., our posts, instant messages and chats,
photographs that we share through various sites, our tweets, blog articles, news items, opinion
polls and their comments, audio/video chats, etc.

12.3.1 Characteristics of Big Data


Big data is distinguishable from traditional data on the basis of the following five important
characteristics as shown in Fig. 12.10.
(a) Volume
Volume is one of the characteristics of big data. We already know that big data indicates
huge ‘volumes’ of data that is being generated on a daily basis from various sources like
social media platforms, business processes, machines, networks, human interactions, etc.
Such a large amount of data is stored in data warehouses.

(b) Velocity
Velocity essentially refers to the speed at which data is being created in real-time. In a
broader prospect, it comprises the rate of change, linking of incoming datasets at varying
speeds and activity bursts.

Velocity
The speed at which data is emanating and changes
are coourring between diverse datasets

Value Volume
The value that can be derived The sheer volume of data being
from accerssing and analysing generated every second
big data

5 Vs of
Big Data

Veracity Variety
The descrepancies found in data A combination of data types that
are being dumped into the system
Emerging Trends

Fig. 12.10: Characteristics of Big Data

(c) Variety
Variety of big data refers to structured, unstructured and semi-structured data that is
gathered from multiple sources. While in the past, data could only be collected from
spreadsheets and databases, today data comes in an array of forms such as emails, PDFs,
photos, videos, audios, SM posts, so on and so forth. Variety is one of the important
characteristics of big data.

12.7
(d) Veracity
Big data can be sometimes inconsistent, biased and noisy, or there can be abnormality in
the data or issues with the data collection methods. Veracity refers to the trustworthiness
of the data because processing such incorrect data can give wrong results or mislead
interpretations.

(e) Value
Big data is not only just a big pile of data but it also possesses hidden patterns and useful
knowledge which can be of high business value. But as big data processing involves
investment of resources, we should make a preliminary enquiry to see the potential of
the big data in terms of value recovery else our efforts could be in vain.

12.4 INTERNET OF THINGS (IoT) INTERNET OF THINGS

Internet of Things (IoT) is a system of


inter-related computing devices, mechanical
and digital machines, objects, people that are
provided with unique identifiers (UIDs) and
the ability to transfer data over a network
without requiring human-to-human or
human-to-computer interaction.
IoT makes the once “dumb” devices “smarter”
by giving them the ability to send data over the
internet, allowing the device to communicate
with people and other IoT-enabled things.
Supplement – Informatics Practices with Python–XI

The connected “smart home” is a good example Fig. 12.11: Smart Homes—an IoT
of IOT in action. Internet-enabled thermostats,
doorbells, smoke detectors and security alarms create a connected hub where data is shared
between physical devices and users can remotely control the “things” in that hub (i.e., adjusting
temperature settings, unlocking doors, etc.) via a mobile app or a website.

12.4.1 Web of Things (WoT)


IoT allows us to interact with different devices through internet with the help of smartphones
or computers, thus creating a personal network. But to interact with ‘n’ number of different
devices, we need to install ‘n’ different apps. Wouldn’t it be convenient to have one interface to
connect all the devices? The web is already being used as a system to communicate with each
other. So, will it be possible to use the web in such a way that all things can communicate with
each other in the most efficient manner by integrating them? Web of Things (WoT) allows the
use of web services to connect anything in the physical world, besides human identities, on the
web. It paves the way for creating smart homes, smart offices, smart cities and so on.

12.4.2 Sensors
Sensors are sophisticated devices that are frequently used to detect and respond to electrical
or optical signals. A sensor converts the physical parameter (e.g., temperature, blood pressure,
humidity, speed, etc.) into a signal which can be measured electrically.

12.8
One of the major implementations of sensors that we observe is when you hold your mobile
vertically or horizontally. The display also changes to vertical or horizontal with respect to the
way we hold our mobile. This is possible with the help of two sensors, namely accelerometer
and gyroscope (gyro). The accelerometer sensor in the mobile phones detects the orientation
of the phone. The gyroscope sensor tracks rotation or twist of your hand and adds to the
information supplied by the accelerometer.
Sensors are very commonly used for monitoring and observing elements in real-world
applications. The evolution of smart electronic sensors is contributing in a big way to the
evolution of IoT which will lead to creation of new sensor-based, intelligent systems.

12.4.3 Smart Cities


A Smart City is an urban area that uses different types of electronic IoT sensors to collect
data and then use the insights gained from that data to manage assets, resources and services
efficiently. It includes data collected from citizens, devices and assets that is processed and
analyzed to monitor and manage traffic and transportation systems, power plants, utilities,
water supply networks, waste management, crime detection, information systems, schools,
libraries, hospitals and other community services.

Environment
Society Health care Electricity
Security

Retail
Water

Education Banking

Emerging Trends

Fig. 12.12: Smart City

A smart city makes use of computer and communication technology along with IoT, WoT to
manage and distribute resources efficiently. The smart buildings shown in Fig. 12.12 use sensors
to detect earthquakes and then warn nearby buildings so that they can prepare themselves
accordingly. A smart bridge uses wireless sensors to detect any loose bolt, cable or crack. It
alerts concerned authorities through SMS. A smart tunnel also uses wireless sensors to detect
any leakage or congestion in the tunnel. This information can then be sent as wireless signals
across the network of sensor nodes to a centralized computer system for further analysis.
12.9
Every sphere of life in a city like transportation systems, power plants, water supply networks,
waste management, law enforcement, information systems, schools, libraries, hospitals and
other community services works in unison to optimize the efficiency of city operations and
services.

12.5 CLOUD COMPUTING


Cloud computing is a technology of distributed data processing in which some scalable
information resources and capacities are provided as a service to multiple external customers
through the internet technology. It allows storing, accessing data and programs using the
internet.

Servers

Application
Laptops Desktops

Monitoring Collaboration
Content Finance
Communication
Platform

Identity
Queue
Object Storage Runtime Database

Infrastructure
Supplement – Informatics Practices with Python–XI

Tablets Network
Block Storage
Phones Tablets

CLOUD COMPUTING

Fig. 12.13: Concept of Cloud Computing

There are broadly two types of clouds one can access:


(a) Public Cloud (b) Private Cloud
(a) Public Cloud: It is defined as a public or common cloud service provided to multiple users on
a network. Public cloud services are provided through a common portal or virtual platform
owned and operated by a third-party cloud provider. In a public cloud service, resources
such as memory, hardware devices and network devices are shared by all the clients (or
organizations that use the same cloud called subscribers) who are known as cloud tenants,
such as Google Drive, Microsoft OneDrive/OneNote, iCloud, Amazon Cloud Drive.
(b) Private Cloud: Private cloud is a virtual private interface provided by an individual or
owned by one organization. In a private cloud, all the resources such as memory and
services are dedicated solely to an organization.
Cloud computing further consists of services such as:
 IaaS (Infrastructure as a Service)—A computer infrastructure, typically presented in the

form of virtualization. It is a service within the concept of cloud hosting.

12.10
 PaaS (Platform as a Service)—An integrated platform for the development, deployment,

testing and support of web applications. It is presented as a service on the basis of the
concept of cloud hosting.
 SaaS (Software as a Service)—The business model of software licence which involves

development and support of the software vendor. Customers also have the opportunity of
paid use of it, usually through the internet.

Value Visibility to End-users


End-
Saas users

Paas Application
Developers

laaS
Network
Architects
Fig. 12.14: Implementation of Cloud Computing
 DaaS (Desktop as a Service)—Another business model licence, this software, first

introduced in the early 2000s, is a slightly improved model of SaaS. It mostly involves use
of multiple services at the same time necessary to complete a work.
In addition to the above, within the concept of cloud hosting technology, there are also
common notion Data as a Service and Everything as a Service, respectively. Both concepts
show that through the World Wide Web using Cloud Hosting, any requirement can be met
in the processing of information. This is the main advantage of cloud computing hosting
in the IT-based business solutions.

CTM: Cloud computing refers to having access to all your applications and data from any network
device.

12.6 GRID COMPUTING


Database
Grid Computing can be defined as a network
of computers working together to perform a
task that would be rather difficult for a single Supercomputer

machine. All machines on that network work


under the same protocol to act like a virtual Grid
Computing
supercomputer. The task that they work on may
include analyzing huge datasets or simulating
situations which require high computing power.
Emerging Trends

Computers on the network contribute resources


like processing power and storage capacity to the Laptop PCs

network. Fig. 12.15: Grid Computing Framework

Grid Computing is a subset of distributed computing, where a virtual supercomputer consists of


machines on a network connected by some bus, mostly Ethernet, or sometimes the internet. It
can also be seen as a form of Parallel Computing where, instead of many CPU cores on a single
machine, it contains multiple cores spread across various locations.

12.11
Working
A Grid Computing network mainly consists of the following three types of machines:
1. Control Node: A computer, usually a server or a group of servers, which administers the
whole network and keeps the account of the resources in the network pool.
2. Provider: The computer which contributes its resources to the network resource pool.
3. User: The computer that uses the resources on the network.
Grid can be of two types—(i) Data grid, used to manage large and distributed data having the
required multi-user access, and (ii) CPU or Processor grid, where processing is moved from
one PC to another as needed or a large task is divided into subtasks and allotted to various
nodes for parallel processing.
Grid Computing is different from IaaS cloud service. In case of IaaS, there is a service provider
who rents the required infrastructure to the users, whereas in grid computing, multiple
computing nodes join together to solve a common computational problem. To set up a grid
by connecting numerous nodes in terms of data as well as CPU, a middleware is required to
implement the distributed processor architecture. The Globus toolkit (http://toolkit.globus.org/
toolkit) is one such software toolkit used for building grids and it is open source. It includes
software for security, resource management, data management, communication, fault detection,
etc.

12.7 BLOCKCHAIN TECHNOLOGY


Blockchain technology works on the concept
of decentralized and shared database where
Supplement – Informatics Practices with Python–XI

each computer has a copy of the database.


A block can be considered as a secured chunk
of data or valid transaction. Each block has
some data called its header, which is visible
to every other node, while only the owner
has access to the private data of the block.
Such blocks form a chain called blockchain
(Fig. 12.16). Fig. 12.16: Blockchain Technology

A simple analogy for understanding blockchain technology is a Google Doc. When we create
a document and share it with a group of people, the document is distributed instead of being
copied or transferred. This creates a decentralized distribution chain that gives everyone access
to the document at the same time. No one is locked out awaiting changes from another party,
while all modifications to the doc are being recorded in real time, making changes completely
transparent.

We can define blockchain as a system that allows a group of connected computers to maintain
a single updated and secure ledger. Each computer or node that participates in the blockchain
receives a full copy of the database. It maintains an ‘append only’ open ledger which is updated
only after all the nodes within the network authenticate the transaction. Safety and security of
the transactions is ensured because all members in the network keep a copy of the blockchain
and so it is not possible for a single member of the network to make changes or alter data.

12.12
The most popular application of blockchain technology is in digital currency. However, due to
its decentralized nature with openness and security, blockchains are being seen as one of the
ways to ensure transparency, accountability and efficiency in business as well as in governance
systems. For example, in health care, better data sharing between health care providers would
result in high probability of accurate diagnosis, more effective treatment and the overall
increased ability of health care organizations to deliver cost-effective care.

How Blockchain Works


1 2 3

A transaction is A Block that represents The Block is sent to


requested the transection every node in
is created the network

4 5 6

Nodes receive a The Block is added The transcation


Nodes validte the
reword for the to the existing is Complete
transaction
Proof of work Blockchain

Apart from the above implementation areas, the blockchain technology can be used in diverse
sectors such as banking, media, telecom, travel and hospitality and other areas.

MEMORY BYTES
 Emerging trends are the state-of-the-art technologies which gain popularity and set a new trend among users.
 Artificial Intelligence endeavours to simulate the natural intelligence of human beings into machines, thus
making them intelligent.
 Machine learning comprises algorithms that use data to learn on their own and make predictions.
 Natural Language Processing (NLP) facilitates communication with intelligent systems using a natural language.
 Virtual reality allows a user to look at, explore and interact with virtual surroundings, just like one can do in the
real world.
 Cloud computing, often referred to as “the cloud”, is the delivery of on-demand computing resources over the
internet on a pay-for-use basis.
Emerging Trends

 The superimposition of computer-generated perceptual information over the existing physical surroundings is
called augmented reality.
 Robotics can be defined as a science, primarily associated with the design, fabrication, theory and application of
robots.
 Big data holds rich information and knowledge which can be of high business value. Five characteristics of Big
data are: Volume, Velocity, Variety, Veracity and Value.
 Data analytics is the process of examining datasets in order to draw conclusions about the information they
contain.
 Internet of Things (IoT) is a network of devices that have an embedded hardware and software to communicate
(connect and exchange data) with other devices on the same network.
12.13
 A sensor is a device that takes input from the physical environment and uses built-in computing resources to
perform predefined functions upon detection of specific input and then processes data before passing it on.
 Blockchain technology uses a shared database of chaired blocks where copies of database exist on multiple
computers.

OBJECTIVE TYPE QUESTIONS


1. Fill in the blanks.
(a) .................................. refers to the ability of machines to perform cognitive tasks like thinking,
perceiving, learning, problem-solving and decision-making.
(b) NLP is a branch of AI that facilitates .................................. between humans and computers.
(c) Using a .................................., users experience being transported into real and imagined worlds.
(d) The goal of .................................. is to design intelligent machines that can help and assist humans in
their day-to-day lives and keep everyone safe.
(e) In .................................., data is not stored on the PC but it is available and accessible across devices.
(f) .................................. is a cloud computing service that allows users to create and deploy applications.
(g) A sensor converts the .................................. into a signal which can be measured electrically.
(h) The “block” in blockchain technology refers to .................................. stored in a data structure referred
to as “chain” which is called .................................. .
Answers: (a) Artificial Intelligence (b) Language interaction (c) VR device
(d) Robotics (e) Cloud computing (f) PaaS
(g) Physical parameter (h) Digital information, public database
2. State whether the following statements are True or False.
(a) AI systems cannot help in decision-making.
(b) NLP is a trait of Deep Learning, which is an implementation of AI.
(c) Virtual Reality (VR) is a three-dimensional, computer-generated situation that simulates the real
Supplement – Informatics Practices with Python–XI

world.
(d) Cloud-based storage makes use of local computer storage for saving files and information.
(e) Drone is an example of Augmented Reality.
(f) CCTV cameras installed at offices, houses, business establishments are a result of Internet of Things
(IoT) implementation.
(g) Smart cities are not sustainable and liveable.
(h) A grid is a computer network of geographically dispersed and heterogeneous computational
resources.
Answers: (a) False (b) True (c) True (d) False (e) False (f) True
(g) False (h) True
3. Multiple Choice Questions (MCQs)
(a) IoT stands for ........................ .
(i) Industry of Things (ii) Internet of Things
(iii) Intelligence of Things (iv) Internal Internet of Things
(b) Which one of these is not an area of AI?
(i) Computer vision/Image recognition (ii) Voice recognition
(iii) Web design (iv) Robotics
(c) “Virtual reality” is described as:
(i) Where parts of a person’s body are used for identification purposes. They are unique.
(ii) A software environment that recreates a real-world or imaginary scenario like a game.
(iii) The use of computers to encrypt data so that messages can be sent with complete privacy.
(iv) Where images are made to appear three-dimensional and have ‘depth’.

12.14
(d) Where is artificial intelligence used?
(i) Training soldiers in combat using battlefield simulations
(ii) In self-driving cars that do not require a driver
(iii) To allow access to buildings
(iv) To create prototypes of cars or any object
(e) Where is virtual reality used?
(i) Training soldiers in combat using battlefield simulations
(ii) In three-dimensional (3D) films
(iii) To allow access to buildings
(iv) To create prototypes of cars or any object
(f) Where is computer-assisted translation used in everyday life?
(i) Training TV hosts (ii) Spell-checkers used in word processing software
(iii) Dictation tests (iv) Recording weather conditions
(g) Which of the following is a positive impact of artificial intelligence in driverless cars?
(i) An immersive video experience for the viewer using special glasses.
(ii) Data is completely secure and cannot be tampered with.
(iii) This method ensures that only authorized people can enter restricted buildings or rooms.
(iv) Safer transport as there would be fewer road accidents.
(h) What hardware is typically used for virtual reality?
(i) A powerful computer, headset with screen to see, headphones to hear and sometimes gloves.
(ii) Keyboard, mouse, printer and plotter.
(iii) Smartphone, mic and tablet.
(iv) Plotters, mouse, speakers and tablet.
Answers: (a) (ii) (b) (iii) (c) (ii) (d) (ii) (e) (i) (f) (ii)
(g) (iv) (h) (i)

SOLVED QUESTIONS
1. Define knowledge base.
Ans. A knowledge base is a store of information consisting of facts, assumptions and rules which an AI system
can use for decision-making.
2. How does NLP help differently-abled persons?
Ans. NLP is the machine’s ability to process what was said, structure the information received, determine the
necessary response and respond in a language that we understand. It also has a key feature of word
embedding to help the differently-abled to work with ease.
3. Describe the benefits of cloud computing.
Ans. The benefits of cloud computing are:
(a) Easy to maintain. (b) Increased security at a much lesser cost.
(c) On-demand self-service by consumers. (d) Rapid scaling of capacity.
(e) Resource pooling of physical and virtual resources.
Emerging Trends

4. Define the term Robotics.


Ans. Robotics is an interdisciplinary branch of technology requiring applications of mechanical engineering,
electronics and computer science, among others. Robotics is primarily concerned with the design,
fabrication, operation and application of robots.
5. Briefly explain the role played by robots in the medical field.
Ans. Prosthetic robotic limbs interface with the nervous system to restore movement and sense of touch to
amputees. Automated dispensing robots limit medication-dispensing errors in pharmacy settings. Clinical
training robots offer lifelike simulations of medical conditions to help doctors during their training.
6. Drone—a utility of Robotics—can be helpful in the event of a natural calamity. How?
Ans. Yes, drones can be of great help during natural calamities. Following a disaster, drones can help relief
workers understand the big picture, locate survivors more quickly, perform structural analysis of damaged
infrastructure, deliver supplies and equipment, and evacuate casualties and help put out fires.
12.15
7. Define the term big data. Which all activities can contribute to big data?
Ans. Big data is a term used to describe a collection of data that is huge in volume and still growing exponentially.
In short, such data is so large and complex that none of the traditional data management tools are able
to store it or process it efficiently. The activities such as social messaging and posts, instant messages
and chats, photographs that we share through various sites, our tweets, blogs, news items, opinion polls
and their comments, audio/video chats, etc. contribute to big data.
8. Explain the types of Grids.
Ans. Grid can be of two types—(i) Data grid, used to manage large and distributed data having the required
multi-user access, and (ii) CPU or Processor grid, where processing is moved from one PC to another as
needed or a large task is divided into subtasks, and allotted to various nodes for parallel processing.
9. Name some areas where the concept of block chain technology can be useful.
Ans. Few areas of block chain technology are:
(i) Payment processing and money transfers (ii) Monitor supply chains
(iii) Digital IDs (iv) Data sharing
(v) Copyright and royalty protection (vi) Digital voting
(vii) Medical recordkeeping (viii) Managing Internet of Things (IoT) networks
10. Explain the areas where Natural Language Processing (NLP) is used extensively.
Ans. Natural Language Processing is the driving force behind the following common applications:
• Language translation applications such as Google Translate
• Word Processors such as Microsoft Word employ NLP to check grammatical accuracy of texts.
• Interactive Voice Response (IVR) applications used in call centres to respond to certain user requests.
• Personal assistant applications such as OKGoogle, Siri and Alexa.

UNSOLVED QUESTIONS
1. Explain the significance of Artificial Intelligence in today’s world.
2. What do you understand by Internet of Things? List some of its potential applications.
Supplement – Informatics Practices with Python–XI

3. Write a short note on the following:


(a) Cloud Computing (b) Big data and its characteristics
4. Explain the following along with their applications:
(a) Artificial Intelligence (b) Machine Learning
5. Differentiate between Cloud Computing and Grid Computing with suitable examples.
6. Bharat Infrastructures (P) Ltd, interested in cloud computing, is looking for a provider who offers a set of
basic services such as virtual server provisioning and on-demand storage that can be combined into a
platform for deploying and running customized applications. What type of cloud computing model fits
the following requirements?
• Platform as a Service
• Software as a Service
• Infrastructure as a Service
7. How are IoT and WoT related?
8. Home automation is a salient feature of IoT. Explain.
9. What is on-demand service? How is it provided in cloud computing?
10. If a Regional Engineering College plans to make a smart school by applying IoT concepts, how can each
of the following be implemented in order to transform a school into an IoT-enabled smart school?
• e-textbooks
• Smart boards
• Online tests
• Wi-fi sensors on classroom doors
• Sensors in buses to monitor their location
• Wearables (watches or smart belts) for attendance monitoring

12.16
Case-based/Source-based
Integrated Questions

CHAPTER: COMPUTER SYSTEM


1. Xenox Technologies deals with supply of hardware components required for the assembly of computer
systems in Nehru Place market. They provide reliable and efficient data storage devices to their customers.
Six storage devices in which they deal are described below. Name the storage device being described and
also list the appropriate category of storage.
(a) Optical media which use one spiral track; red lasers are used to read and write data on the media surface;
makes use of dual-layering technology to increase storage capacity.
(b) Non-volatile memory chip; contents of the chip cannot be altered; it is often used to store the
start-up routines in a computer (e.g., BIOS).
(c) Optical media which use concentric tracks to store data; this allows read and write operations to be
carried out at the same time.
(d) Non-volatile memory device which uses flash memory (which consists of millions of transistors
wired in a series on a single circuit board).
(e) Optical media which use blue laser technology to read and write data on the media surface.
(f) Magnetic disc with very large storage capacity; can be used to store vast amounts of data; mostly fixed
in computer cases and serves as the main storage device.
Ans. (a) DVD Offline Storage
(b) ROM Primary Memory
(c) DVD-ROM Offline Storage
(d) Solid State Memory/Memory Card Offline Storage
(e) Blu-ray Disc Offline Storage
(f) Hard Disk Secondary Memory
2. World Class Telecom Company is planning to conduct a videoconference with its associated partners across
several nations. In its videoconferencing area, there are several microphones, speakers and webcams.
Describe the purpose of each of the devices.
Ans. Microphone: This device is used to input sound or the voices of the people speaking.
Speakers: A speaker is used to listen to the sound/audio output from the computer.
Webcam: Webcam or web camera is needed to capture the video image of all the people participating in
videoconferencing.
3. ABC School newsletter contains text and images in it. The head teacher needs one thousand copies of this
newsletter. Give four reasons why a laser printer should be used rather than an inkjet or a dot matrix
printer.
Ans. (i) High quality printouts—better than inkjet or dot matrix.
(ii) Fast printouts—faster than inkjet or dot matrix.
(iii) Makes very little noise—much less than inkjet or dot matrix.
(iv) Low per page cost—cheaper than inkjet or dot matrix.
CHAPTER: PYTHON PROGRAMMING FUNDAMENTALS
1. IndiaSells is an India-based cargo company that deals with the export and ale of various goods within the
country and across the globe. To do business analysis of the day-to-day transactions, they have hired a
programmer to develop a computerized system for the same.
Write a Python code that accepts cost of goods sold (cogs), revenue generated, operating costs (oc), and
prints gross profit, net profit and net profit percentage. [Net profit = Revenue – cogs – oc]
Ans.
Supplement – Informatics Practices with Python–XI

2. Gurukul Vidyapeeth is a reputed institution in the field of academics and extra-curricular activities.
Every year, with the commencement of the new session, it hikes fee by 10% for all the students which
was manually done till date and required enormous efforts on the part of the office staff. To solve this
problem, develop a Python program that calculates this 10% fee hike every year automatically after
obtaining the basic fee amount from the user and displays it to the parents of the students enrolled with
the institute.
Ans.

C.2
CHAPTER: LISTS IN PYTHON
1. A bank is a financial institution involved in borrowing and lending of money. With advancement in
technology, online banking, also known as internet banking, allows customers of a bank to conduct a
range of financial transactions through the bank’s website anytime, anywhere.
Two basic operations performed in an account are Deposit and Withdrawal. Write a menu-driven program
that accepts either of the two choices of Deposit and Withdrawal, then accepts an amount, performs
the transaction and accordingly displays the balance.
The program should display the following options:
Open a savings bank account
Add a customer
Deposit money
Display sorted records
Close/delete account
Ans.

Case-based/Source-based Integrated Questions

C.3
Supplement – Informatics Practices with Python–XI

2. Vidyarthi Gurukul conducts physical training camps for the physical well-being of its students. This camp
is held for one week on the outskirts of the city. The entire group of students are represented as a
list. The list stores the roll numbers of the participants for camp activities. As part of this training,
the entire stream of students is divided into two halves. While the first group of students goes for
physical training, the second group goes for aerobic classes and in the later half, both these groups are
swapped.
Write a Python program that maintains and displays details about the swapping of activity classes and
awards them stars on completion of each activity.
Ans.

C.4
CHAPTER: DICTIONARY
1. Pure Basket is a department store with a wide range of merchandise including groceries, fruits,
vegetables and household accessories. It aims to develop a complete software for Billing, Inventory and
Accounts management and to provide consumers a user-friendly interface to view item codes and prices
of various items.
Write a program in Python that repeatedly asks the user to enter product names and prices. Store all of
them in a dictionary whose keys are product names and values are prices. Also write a code to search
an item from the dictionary.
Ans.

Case-based/Source-based Integrated Questions


2. With respect to “Magnetic Demographic Projections” (Ch-5), the phone numbers of the customers are to
be stored in the form of a dictionary. Write a Python program to input ‘n’ names and phone numbers to
store them in a dictionary and to input any name and to print phone number of that particular customer.
Ans.

C.5
CHAPTER: STRUCTURED QUERY LANGUAGE (SQL)
1. Kunal has entered the following SQL command in the table ‘STUDENT’ that has TotalMarks as one of
the columns:
Select * from Student;
The output displayed is 20.
Then Kunal enters the following command:
SELECT * FROM STUDENT WHERE TotalMarks < 100;
The output displayed is 15.
Kunal then enters the following command:
SELECT * FROM STUDENT WHERE TotalMarks >= 100;
He predicts the output of the above query as 5. Do you agree with Kunal? Give reasons for your answer.
Ans. The output for the two SELECT statements is different since statement–1 shall return all the records and
columns of the table student.
Whereas in statement–2, output is to be obtained on the basis of column ‘Marks’ which may include NULL
values and is, hence, ignored by MySQL compiler and, as a result, less number of records are displayed.
2. Your school management has decided to organize cricket matches between students of Classes XI and
XII. All the students are divided into four teams—Team Rockstars, Team BigGamers, Team Magnet and
Supplement – Informatics Practices with Python–XI

Team Current. During the summer vacations, various matches are to be held between these teams. Help
your sports teacher do the following:
(a) Create a database “Sports”.
(b) Create a table “TEAM” with the following considerations:
(i) It should have a column TeamID for storing an integer value between 1 and 9, which refers to
unique identification of a team.
(ii) Each TeamID should have its associated name (TeamName), which should be a string of length
not less than 10 characters.
(iii) Give the statement to make TeamID as the primary key.
(c) Show the structure of the table TEAM using SQL command.
(d) As per the preferences of the students, four teams were formed as given below.
Insert these four rows in TEAM table:
Row 1: (1, Team Rockstars)
Row 2: (2, Team BigGamers)
Row 3: (3, Team Magnet)
Row 4: (4, Team Current)
Ans. (a) create database sports;
(b) create table TEAM(TeamID int(9) primary key, TeamName varchar(10));
(c) desc TEAM;
(d) insert into TEAM values(1,“Team Rockstars”); #Row 1
insert into TEAM values(2,“Team BigGamers”); #Row 2
insert into TEAM values(3,“Team Magnet”); #Row 3
C.6 insert into TEAM values(4,“Team Current”); #Row 4

Você também pode gostar