Plus Two Computer Applications Micro
Plus Two Computer Applications Micro
on) The statement continue is another jump statement used for skipping over a part of the code within the loop d) puts(string_data): Output function for string operation.
Chapter One {statement1; body and forcing the next iteration. 2) Stream Functions for I/O Operations:-[The supporting header file is #include<iostream>]
Review of C++ Programming } a) cin.get(): It can accept a single character or multiple characters(String) through the keyboard.
Character Set:-Fundamental unit of C++ language. Classified into letters(a-z,A-Z),digits(0-9),special characters(# , ; : > { + else Chapter Two b) cin.getline() : It accepts a string through the keyboard.
etc.),white spaces(space bar , tab, new line) and some ASCII characters ranges from 0 to 255. {statement2; Arrays c) cout.put(): It is used to display a character constant or the content of a character variable given as argument.
Tokens:-Basic building blocks of C++ programs. Classified into keywords, identifiers, literals, punctuators and } An array is a collection of elements of the same type placed in contiguous memory locations. Each element in an array d) cout.write():This function displays the string contained in the argument.
operators. 3) if(test_expression1) can be accessed using its position in the list, called index number or subscript. 3) String Functions[The supporting header file is #include<cstring>]
Keywords:-Reserved words that convey specific meaning to the language compiler. {statement1;} Declaring Arrays: a) strlen():This function is used to find the length of a string .Syntax: int strlen(string);
Identifiers:-User defined words to identify memory locations(variables), statements(labels),functions(function names) else if(test_expression2) data_type array_name[size]; b) strcpy(): This function is used to copy one string into another. Syntax: strcpy(string1,string2);
data types etc. {statement2;} eg:- int num[10]; c) strcat():This function is used to append one string into another string. The length of the resultant string is the
Literals:-Constants that do not change their value during the program run. Classified into integer constants(digits else Memory Allocation for Arrays:- total length of the two strings.Syntax:strcat(string1,string2);
preceded by +(plus) or -(minus) sign. ), floating point constants(expressed in fractional form and exponential form) , {statement3;} The amount of storage required to hold an array is directly related to its type and size. The memory space allocated for d) strcmp(): This function is used to compare two strings. In this comparison, the alphabetical order of characters
character constants(single character enclosed within single quotes) and string constants(group of characters enclosed 4) switch(expression) an array can be can be computed using the following formula : in the strings are considered . Syntax:strcmp(string1,string2);
within double quotes). {case value 1:statement1; total_bytes=sizeof(array_type)*size _of_array The function returns any of the following values in three different situations:
Operators:-Symbols that trigger a specific operation. Based on the number of operands , they are classified into break; Array Initialisation:- 1) Returns 0 if string1 and string2 are same.
unary(that requires only one operand), binary(that requires two operands), and ternary(which requires three case value2:statement2; Array elements can be initialized in their declaration statements. 2) Returns a –ve value if string1 is alphabetically lower than string2.
operands). Based on the type of operation, they are classified into arithmetic operators (+,-,*,/,%), relational operators break; Eg:-int score[5]={98,87,92,79,85}; 3) Returns a +ve value if string1 is alphabetically higher than string2.
(<,<=,>,>=,==,!=), logical operators(&&(AND),|| (OR),! (NOT)), get from operator(>>), put to operator(<<), assignment default: statement3; Accessing elements of arrays:- e) strcmpi():This function is used to compare two strings ignoring the cases. In this comparison, the alphabetical
operator(=), increment operator(++), decrement operator(- -), arithmetic assignment operators(+=,-+,*=,/=,%=) and } Accessing each element of an array at least once to perform any operation is known as traversal operation. order of characters in the strings are considered . Syntax:strcmpi(string1,string2);
conditional operator(?:). 5) conditional operator(?:) String handling using arrays:- The function returns any of the following values in three different situations:
Punctuators:-Special characters like comma(;), semi colon(;), hash(#), braces({}) etc. It is a ternary operator of C++ and it requires three operands and It can substitute if- else statement. Eg:- char my_name[10]; i. Returns 0 if string1 and string2 are same.
Data types:-These are means to identify the type of data and associated operations. Classified into fundamental data expression1?expression2:expression3; for(int i=0;i<6;i++) ii. Returns a –ve value if string1 is alphabetically lower than string2.
types ( int , char, float, double, void(represents empty set of data , hence size is zero. )) , derived data types (array, b) Looping Statements:- cin>>my_name[i]; iii. Returns a +ve value if string1 is alphabetically higher than string2.
function)and user defined data types(structure, class, union, enumeration). 1. for(initialization_expression;test_expression;updation_expression) for(int i=0;i<6;i++) 4) Mathematical Functions:- [The supporting header file is #include<cmath>]
Type Modifiers:-The keyword signed, unsigned, short and long are type modifiers . {statements; cout<<my_name[i]; i. abs(): used to find the absolute value of a number. syntax: int abs(int);
Expressions:-Expressions are constituted by operators and required operands to perform an operation. Based on the } NOTE:-A null character ‘\0’ is stored at the end of each string. This character is used as the string terminator and added ii. sqrt): used to find the square root of a number. syntax: double sqrt(double);
operators used, they are classified into arithmetic expression, relational expression(uses numeric or character data as 2) initialization_expression; at the end automatically. So we can say that memory required to store a string will be equal to the number of iii. pow(): used to find the power of a number. double pow(double,double);
operands and returns True or False value as outputs) and logical expression(uses relational expressions as operands while(test_expression) characters in the string plus one byte for null character. 5) Character Functions:[The supporting header file is #include<cctype>]
and returns True or False value as outputs). Arithmetic expression is divided into integer expression(uses integer data {statements; Input/Output Operations on strings [The supporting header file is #include<cstdio>] i. isupper(): This function carries out a test “ Is the character an upper case ?” . It is used to check
as operands and returns an integer value) and real expression(uses floating point data as operands and returns a updation_expression; Input function for string operation: gets(character_array_name); whether a character is in upper case or not. It returns a 1 if the character is in uppercase and 0
floating point value). } Output function for string operation: puts(string_data); otherwise. syntax: int isupper(char c);
Type Conversion:-It is the process of converting the current data type of a value into another type. It may be 3) initialization_expression; Chapter Three ii. islower(): This function carries out a test “ Is the character a lower case ?” . It is used to check whether
implicitly(type promotion) or explicitly(type casting) converted. In implicit type conversion ,the compiler converts a do Functions a character is in lower case or not. It returns a 1 if the character is in lowercase and 0 otherwise.
lower type into higher type. In explicit type conversion, user is responsible for the conversion. A type cast operator() is {statement; In programming, the entire problem will be divided into small sub problems that can be solved by syntax: int islower(char c);
used for this purpose. updation_expression; writing separate programs. This kind of approach is known as modular programming. The process of breaking iii. isalpha(): This function carries out a test “ Is the character an alphabet ?” . It is used to check whether
Various statements in a C++ Program }while(test_expression); large programs into smaller sub programs is called modularization. a character is an alphabet or not. It returns a 1 if the character is an alphabet and 0 otherwise. syntax:
1) Declaration Statement:- 4) Nesting of Looping Statements:- Merits of modular programming:- int isalpha(char c);
Variables should be declared prior to their use in the program and data types are required for this. Placing a loop inside the body of another loop is called nesting of a loop. 1) Reduces the size of the program. iv. isdigit(): This function carries out a test “ Is the character a digit?” . It is used to check whether the
Eg: int n,sum; Eg:for(i=1;i<=2;++i) 2) Less chance of error occurrence. character is a digit or not. It returns a 1 if the character is a digit and 0 otherwise. syntax: int
2) Input Statement:- {for(j=1;j<=3;++j) 3) Reduces programming complexity isdigit(char c);
C++ provides the operator >>, called extraction operator or get from operator for input statement. {cout<<”\n”<<i<<” “<<j;}} 4) Improves reusability v. isalnum(): This function carries out a test “ Is the character an alphabet or a number?” . It is used to
Eg:- cin>>a>>b>>c; c) Jump Statements:- Demerits of modular programming:- check whether a character is alphanumeric or not. It returns a 1 if the character is alphanumeric and
3) Output Statement:- The statements that facilitate the transfer of program control from one place to another place are called jump 1) Proper breaking down of the problem is a challenging task. 0 otherwise. syntax: int isalnum(char c);
To perform output operation, C++ gives the <<, called insertion operator or put to operator. statements. C++ provides four jump statements that perform unconditional control transfer in a program. They 2) Each sub problem must be independent of others. vi. toupper(): This function is used to convert a lower case character to an upper case.
Eg: cout<<”Hello”; are return, goto, break and continue statements. Functions in C++:- Syntax: char toupper(char c);
cout<<a+b+c; 1) return statement: A function is a named unit of statements in a program to perform a specific task .Functions can be categorized into vii. tolower(): This function is used to convert an upper case character to a lower case.
4) Assignment Statement:- The return statement is used to transfer control back to the calling program or to come out of a function. two: Syntax: char tolower(char c);
A specific data is stored in memory locations assignment operator(=).The statement that contains “ = ” is known as 2) goto statement: 1) Predefined Functions or Built-in Functions 2. User defined functions:-
assignment statement. The goto statement can transfer the program control to anywhere in the function. The target destination of a 2) User defined functions A. Function definition:-
Eg:- area=3.14*radius*radius; goto statement is marked by a label , which is an identifier. 1. Predefined Functions:- The syntax of a function definition is given below:-
5) Control Statements:- 3) break statement:- 1) Console Functions for character I/O:-[The supporting header file is #include<cstdio>] data_type function_name(argument_list)
a) Selection Statements:- When a break statement is encountered in a loop, it takes the program control outside the immediate a) getchar(): returns the character that is input through the keyboard. {statements in the body;}
1) if(test_expression) enclosing loop. b) putchar():-displays the character given as the argument on the monitor.
{statements;} 4) continue statement:- c) gets(character_array_name): Input function for string operation.
B B B B
BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 1 BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 2 BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 3 BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 4
The data_type is any valid data type of C++. The function_name is a user defined word. The argument_list is SlNo Client Side Scripting Server Side Scripting 22. <pre>:- Displaying preformatted text. c) value:-used to provide an initial value.
a list of parameters , i.e is a list of variables preceded by data types and separated by commas. The body 1 Script is copied to the client browser It remains in the Web Server 23. <address>:- Displaying the address d) size:- sets the width of the input texts.
comprises of C++ statements required to perform the task assigned to the function. 2 Executed in the client browser Executed in the Web Server 24. <marquee>:-Displaying the text in a scrolling marquee. e) maxlength:-specifies the maximum size.
B. Prototype of functions:- 3 Mainly used for validation of data Used to connect to databases and return data from the Attributes of <marquee>:- 2) <textarea> Tag:- Used for creating a multiline entry text box. Attributes are name,rows,cols.
A function prototype is the declaration of a function by which compiler is provided with the information about web server height,width,direction(up,down,left,right),behaviour(scroll,slide,alternate),scrolldelay,scrollamount,loop,bgcolor, 3) <select> Tag:- Used to create a drop down list box . Attributes are name,size,multiple.
the function such as the name of the function, its return type, the number and type of arguments, and its 4 Users can block client side scripting. Server scripting cannot be blocked by a user. hspace(horizontal space),vspace(vertical space). 4) <fieldset> Tag:- Used for grouping related data in a form.
accessibility. The following is the format: 5 Features of the webserver affects the coding Features does not affects the coding. 25.<div>:-defining a section. Attributes are align,id(identifier),style. Chapter Six
data_type function_name(argument_list); Scripting Languages: 26.<font>:-specifying the font characteristics. Attributes are color,face(type of the font),size(values ranges from 1 to Client Side Scripting Using JavaScript
C. Arguments of functions:- A . JavaScript: Developed by Brendan Eich. Ajax(Asynchronous JavaScript and Extensible Markup Language ) 7,default value is 3) <script> Tag:- This tag is used to include scripting code in an HTML page.
Arguments or parameters are the values from the calling function to the called function. The variables used in technology is used in JavaScript. 27. <img> Tag:- To insert images in HTML pages. Attributes are <script Language=”JavaScript”>
the function definition as arguments are known as formal arguments. The constants, variables or expressions B. VBScript: Developed by Microsoft Corporation. src(source),width,height,vspace,hspace,align(bottom,middle,top),border(border line around the image) </script>
used in the function call are known as actual(original ) arguments. C. PHP:-Stands for “PHP-Hyper text Preprocessor”, developed by Rasmus Lerdorf. HTML ENTITIES FOR RESERVED CHARACTERS:-1) -non breaking space,2) " - Double quotation mark Functions in JavaScript:-
D. Methods of calling function:- D.ASP:-Stands for Active Server pages. 3) ' - Single quotation mark 4) & - Ampersand 5) < - Less than 6) > - Greater than 7) © - Copy function function_name()
Based on the method of passing arguments, the function calling methods can be classified as Call by Value E. JSP:-Stands for Java Server Pages right Symbol 8) ™ – Trade mark symbol 9) ® – Registered Symbol {
method and Call by reference method. F.CSS:-Stands for Cascading Style Sheets. Comments in HTML:- HTML comments are placed within <!-- --> tag. body of the function;
a. Call by Value (Pass by Value ) method:- Basic Structure of an HTML Document Chapter Five }
In this method , the values of the actual parameters are copied into the formal parameters . So any <html><head><title></title></head><body></body></html> Web Designing using HTML Data types in JavaScript:-Number(All positive and negative numbers),String(Characters enclosed within double
changes made inside the formal parameters are not reflected back to the actual parameters. Container Tags:-requires pair tags – i.e opening tag and closing tag. Eg. <html></html>,<head></head> Lists in HTML quotes),Boolean(true and false values)
b. Call by Reference (Pass by Reference ) method:- Empty Tags:-Used opening tags only. Eg. <br>,<hr>,<img> 1).Ordered list(<ol><li></li></ol>):- Attributes – start and type(Arabic Numerals,Upper Case Alphabets,Lower Case variables:-In JavaScript , variables can be declared by using the keyword var.
In this method , the values of the actual parameters are shared into the formal parameters . So any Attribute:-Parameters included within the opening tag. Eg <body bgcolor = ” red ”> Alphabets,Roman Numeral Upper,Roman Numeral Lower). var x,y;
changes made inside the formal parameters are reflected back to the actual parameters. Here a reference Important Tags and Attributes 2).Unordered list(<ul><li></li></ul>):-Attributes - type(disc,circle,square) x=25;
variable is used as the formal argument. A reference variable is an alias name of another variable. An 1.<html> Tag:- a). dir-specifies the direction of the text to be displayed on the web page. Two values ltr(left to right) 3).Definition List(<dl><dt></dt><dd></dd></dl>)[dl-definition list,dt- definition term,dd- definition description] y=”Kerala”;
ampersand(&) symbol is placed in between the data type and the variable in the function header. and rtl(right to left). Creating Links Operators in JavaScript:-
E. Scope and life of variables and functions:- b).lang:-specifies the language used within the document. Different lang values are en- english, fr- french,de-german, 1).Internal Linking:-Link within the same document.<A>(anchor tag) is used. Name attribute is used for the target 1) Arithmetic Operators(+,-,*,/,%,++,--)
The concept of availability or accessibility of variables and functions is termed as their scope and life it-italian,el-greek,es-spanish,ar-arabic,ja-japanese,hi-hindi and ru-russian. specification and href – (means hyper reference)(# symbol is essential) attribute is used for linking purpose. 2) Assignment Operators(= ,+ =,- =,*=,/=,%=)
time. 2.<head>:-declares the head section. 2).External Linking:-Link from one web page to another web page. .<A>(anchor tag) and href attribute is used. 3) Relational Operators(<,<=,>,>=,==,!=)
1. Local variable:- A variable which is declared inside a function is known as a local variable. 3.<title>:-mentions the document title. URL:-Uniform Resource Locator 4) Logical Operators(&&(AND),|| (OR),NOT(!))
2. Global variable:- A variable which is declared outside all other functions is known as a global variable. 4.<body> Tag: specifies the document body section. 1).Relative URL :- <a href=”http://www.scertkerala.gov.in”> - represents the complete path. 5) String Addition Operator(+)
3. Local function:- A function which is declared inside the function body of another function is known as a local 1. background:-sets a background image. The important attributes are 2).Absolute URL:- <a href=”image.html”> - represents the specified file name only. Control Structures in JavaScript:-
function. 2. bgcolor:-specifies the background colour. Creating email linking:-We can create an email hyperlink to a web page using the hyper link protocol “mailto:” . 6) if(test_expression)
4. Global function:- A function which is declared outside the function body of any another function is known as a 3.text:-specifies the foreground colour. eg:-<a href=”mailto: [email protected]”>scert </a> {statements;
global function. 4. link:-colour of the hyperlink that are not visited by the viewer. Default colour is blue. <embed> tag is used for Inserting Music and Video:-Attributes are src,height,width,align. }
Chapter Four 5.alink:-specifies the colour of the active hyperlink. Default colour is green. <bgsound> tag is used for inserting audio files only. Attributes are src,loop. 7) if(test_expression)
Web Technology 6.vlink:-specifies the colour of the hyperlink which is already visited by the viewer. Default colour is purple. <table>tag and its attributes:- {statement1;
Communication the Web 7.leftmargin:-leftside margin. border(thickness of the border line),bordercolor,align,bgcolor,background,cellspacing(amount of space between the }
a. Client to Web Server Communication 8. topmargin:-topside margin. cells),cellpadding(amount of space between the cell border and content),width,height,frame(void-no border,above- else
b. Web Server to Web Server Communication 5.Heading Tags:-<h1></h1>,<h2></h2>,<h3></h3>,<h4></h4>,<h5></h5>,<h6></h6>. Attribute align – values are - top border,below-bottom border,hsides-top and bottom borders,vsides-right and left borders,lhs-left side border,rhs- {statement2;
Web Server :-1. A server computer that hosts web sites. 2. A web server software that is installed in a server computer . left,right and center. right side border,box & border-border on all sides),rules(values - none,cols,rows,groups,all) }
Web Server Packages 6. <P> Tag:-paragraph tag. Attribute align- values are – left,right,center or justify. NOTE: When both bgcolor and background are specified , the background will override the bgcolor. 8) switch(expression)
Apache Server, MicroSoft Internet Information Server (IIS), Google Web Server(GWS),nginx 7.<br>:-inserting line breaks. Attributes of <tr> Tags:- {case value 1:statement1;
Software Ports:-FTP(20 & 21),SSH(22),SMTP(25),DNS(53),HTTP(80),POP3(110),HTTPS(443) 8. <hr>:-produces horizontal line. Attributes size,width,color,noshade align(values- left,right,center),valign-vertical alignment( values - top,middle,bottom,baseline(aligns the baseline of the break;
NASA:-National Aeronautics and Space Administration 9.<center>:- brings the content to the center . text across the cells in the row)) case value2:statement2;
ICANN:-Internet Corporation for Assigned Names and Numbers 10.<b>:- making the text bold. Attributes of <th> and <td> Tags:-align,valign,bgcolor,rowspan(number of rows to be spanned by the break;
SlNo Static Web Page Dynamic Web Page 11. <i>:-Italicizing the text . cell),colspan(number of columns to be spanned by the cell) default: statement3;
1 The content and layout is fixed The content and layout may change during run time. 12. <u>:- Underlining the text. <caption> Tag:-we can provide a heading to a table. }
2 Never use databases Database is used 13. <s> and <strike> :- Striking through the text. <frameset> Tag:- Used for dividing the browser window. Attributes are cols,rows,border,bordercolor 9) for(initialization;test_expression;updation)
3 Directly run on the browser. Runs on the server side application programs 14.<big>:- Making the text big sized. <frame> Tag:- Attributes are src,scrolling(displays whether a scrollbar or not-values are {statements;
4 They are easy to develop. Development requires programming skills. 15.<small>:-Making the text small sized. yes,no,auto),noresize(prevents the resizing behaviour),marginwidth,marginheight,name(gives a name to a frame). }
Scripts:-Scripts are program codes written inside html pages. A script is written inside the <SCRIPT> and </SCRIPT> 16.<strong>:-Making the text bold text. Forms in Web pages:- 10) while(test_expression)
tags . 17.<em>:- Emphasizing the text <form> Tag:- Used for creating a form with various form controls. Attributes are action(specifies the URL),method(get {statements;
18.<sub>:-creating subscripts. method and post method),target(specifies the target window). }
19. <sup>:-creating super scripts. Form Controls:- Built in Functions :-
20.<q>:-used for short quotations 1) <input> Tag. Attributes are a) type :- Values are text,password,checkbox,radio,reset,submit,button 1) alert():-Used to display a message on the screen.
21. <blockquote>:-used for long quotations b) name:- used to give a name to the control. 2) isNaN():- Used to check whether a value is number or not.
B B B B
BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 5 BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 6 BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 7 BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 8
3) toUpperCase():-Converts a lowercase character to an upper case. 3) Data:-The operational data and the meta- data(data about data). Chapter Nine MySQL provides a variety of operators or clauses attached with SELECT command.
4) toLowerCase():-Converts an uppercase character to a lower case. a) Fields:- The smallest unit of stored data. Structured Query Language(SQL) SLNO OPERATOR MEANING/RESULT
5) charAt():- returns the character at a particular position. The counting starts at zero. b) Record:-A collection of related fields. The original version of SQL was developed in the 1970’s by Donald D Chamberlin and Raymond F Boyce at IBM’s 1 = Equal to relational operator
6) length property:-This property returns the length of the string. c) File:-A collection of all occurrences of the same type of data. San Jose Research Laboratory(now Almanden Research Centre). It was originally called Sequel(Structured English 2 < > or != Not Equal to relational operator
For accessing values in a Textbox, JavaScript uses the following format:- 4) Users:- Query Language) and later its name was changed to SQL. 3 < Less than relational operator
document.form_name.textbox_name.value a) Database Administrator(DBA):-Person who is responsible for the control of the centralized and shared Components of SQL:- 4 <= Less than or equal to relational operator
The various JavaScript Events are: database. a) Data Definition Language(DDL):-CREATE TABLE,ALTER TABLE,DROP TABLE. 5 > Greater than relational operator
1) onClick:- It occurs when the user clicks over an object. b) Application Programmer:-Computer professionals who interact with the DBMS through application b) Data Manipulation Language(DML):-SELECT,INSERT INTO,UPDATE,DELETE FROM. 6 >= Greater than or equal to relational operator
2) onMouseEnter:-It occurs when the mouse pointer is moved onto an object. programs. c) Data Control Language(DCL):-GRANT,REVOKE. 7 NOT True when condition is False
3) onMouseLeave:-It occurs when the mouse pointer is moved out of an object. c) Sophisticated users:- person who interact with the DBMS through their own queries. Creating database:- CREATE DATABASE <database_name>; 8 AND True if both the conditions are True
4) onKeyDown:-It occurs when the user is pressing a key on the keyboard. d) Naive Users:-who interact with the DBMS through application programs that were written previously. Opening database:-USE <database_name>; 9 OR True if either of the condition is True
5) onKeyUp:-It occurs when the user releases a pressed key. 5) Procedures:-refers to the instructions and rules that govern the design and use of the database. DATA TYPES IN SQL:-
10 BETWEEN…AND Used to specify a range including lower and upper values
External JavaScript file:- We can place the scripts into an external file and then link to that file from within the HTML Data Abstraction:- The developers hide the complexity of the database from users through several levels of 1) TINY INT ,SMALL INT,MEDIUM INT,INT,BIG INT
11 IN It provides a list of values
document. This file is saved with the extension ‘.js’ . The file can be linked to HTML file using the<script> tag. The type abstraction. They are 2) FLOAT(M,D),DOUBLE(M,D),DECIMAL(M,D)
12 IS retrieves NULL values with this operator
attribute specifies that the linked file is a JavaScript file and the src attribute specifies the location and file name of 1) Physical Level:- The lowest level of database abstraction. This level describes that how the data are actually [M means maximum size and D means the number of digits to the right of the decimal point]
13 LIKE It is a pattern matching operator. % (percentage )and _(under
external JavaScript file. stored on the storage devices. 3) CHAR(SIZE),VARCHAR(SIZE):- includes letters, digits and special symbols. CHAR is a fixed length character data
score ) are used with this keyword
Chapter Seven 2) Logical Level:-The next higher level of database abstraction. This level describes that what data are actually type. It consumes the declared size. VARCHAR represents variable length strings. It consumes only the actual
14 ORDER BY It is used for sorting ascending (ASC) or descending(DESC) order
Web Hosting stored in the database. size of the string, not the declared size.
Web Hosting:- The service of providing storage space in a web server. 3) View Level:-The highest level of database abstraction. This level is concerned with the way in which data are 4) DATE:-Used to store dates. The YYYY-MM-DD is the standard format. The supported range is from 1000-01- 15 GROUP BY used to form groups
1)Shared Hosting:-Multiple websites are shared on a single web server. Cheaper and easy to use. But heavy traffic viewed by individual users. 01 to 9999-12-31. 16 HAVING specifies conditions and it is used along with GROUP BY clause
slows the webserver. Schema: Overall design of the database. 5) TIME:-displays the current time in the format HH:MM:SS. Aggregate Functions:-
2)Dedicated Hosting:-Uses a single , powerful web server for hosting. Advantage are very speed and performance is Instances:-Collection of information stored in the database at a particular moment. SQL COMMANDS 1) SUM():-Calculates the sum of a specified column.
stable. But it is highly expensive. Data Independence:- The ability to modify the schema followed at one level without affecting the schema followed at a. DATA DEFINITION LANGUAGE (DDL COMMANDS) 2) AVG():-Calculates the average value in a specified column.
If the client is allowed to place their own purchased web server in the service providers facility, then it is called co- the next higher level. 1. CREATE TABLE COMMAND:- 3) MAX():-Calculates the maximum value.
location . a) Physical Data Independence:- The ability to modify the schema followed at physical level without affecting the CREATE TABLE <table_name>(<column1> < data_type1> (size)*<constraint>+,……….); 4) MIN():-Finds the minimum value.
3) Virtual Private Server:-It is a physical server that is virtually partitioned into several servers using the virtualization schema followed logical level. Constraints:- rules enforced on data that are entered into the column of a table. 5) COUNT():-Counts the number of non null values.
technology. Some popular server virtualization software’s are VMware,Virtualbox,FreeVPS,User mode Linux, b) Logical Data Independence:- The ability to modify the schema followed at logical level without affecting the a) Column constraints:-are applied only to individual columns. 3. UPDATE COMMAND
Microsoft Hyper-V. schema followed view level. 1) NOT NULL:- Specifies that a column can never have null values. UPDATE <table_name> SET <column_name>=<value> WHERE <condition>;
FTP Client Software’s :-It transfers files from one computer to another on the internet. The popular FTP Client RDBMS:-Relational Database Management System.- invented by Edgar Frank Codd. 2) AUTO_INCREMENT:-Performs an automatic increment feature. 4. DELETE FROM COMMAND
Software’s are FileZilla,CuteFTP,SmartFTP. Terminologies in RDBMS:- 3) UNIQUE:-It ensures that no two rows have the same value . DELETE FROM <table_name> WHERE <condition>;
Free Hosting:-provides web hosting services free of charge. a) Entity:-a person or a thing in the real world that is distinguishable from others. 4) PRIMARY KEY:-This constraint declares a column as the primary key of the table. Nested Query:- One query contains another query is called nested query. Then the inner most query is called sub query
Content Management System:- Refers to a web based software system which is capable of creating, administering and b) Relation(Table):- collection of data elements organized in terms of rows and columns. 5) DEFAULT:-a default value can be set for a column. and the outer most query is called outer query.
publishing web sites. c) Tuple:- The row(records) of a relation. b) Table Constraints:-It can be used not only on individual columns, but also on a group of columns. Eg:UNIQUE. VIEWS:- A view is a virtual table that does not really exist in the database, but is derived from one or more tables.
Responsive Web design:-It is the custom of building a website suitable to work on every devise and every screen size. d) Attribute:-The columns of a relation. 2. ALTER TABLE ADD COMMAND:- CREATE VIEW <viewname> AS SELECT <column1>,<column2>,… FROM <table_name> WHERE <condition>;
The term Responsive Web design was coined by Ethan Marcotte. e) Degree:- The number of attributes in a relation. ALTER TABLE <table_name> ADD <column_name> <data_type>[<size>] [<constraint>] [FIRST] / AFTER A view can be removed by
ICANN:-Internet Corporation for Assigned Names and Numbers f) Cardinality:- The number of rows or tuples in a relation. <column_name>]; DROP VIEW <viewname>;
WHOIS:- It is a domain name availability checker platform. g) Domain:- a pool of values from which actual values appearing in a given column are drawn. 3. ALTER TABLE MODIFY COMMAND:- Chapter Ten
Chapter Eight h) Keys:-An attribute or a collection of attributes in a relation that uniquely distinguishes each tuple from other ALTER TABLE <table_name> MODIFY <column_name> <data_type> [<size]> [<constraint>]; Enterprise Resource Planning(ERP)
Database Management System(DBMS) tuples in a given relation. 4. ALTER TABLE DROP COMMAND:- ERP combines all the business requirements of an enterprise or company together into a single ,
Database: An organized collection of inter related data items stored together with minimum redundancy. 1) Candidate key:- The minimal set of attributes that uniquely identifies a row in a relation. ALTER TABLE <table_name> DROP <column_name>; integrated software that runs off a single database so that the various departments of an enterprise can share
DBMS(Database Management System):-A system which has some set of rules and relationships which allows for the 2) Primary key:- one of the candidate keys chosen to be the unique identifier for a table by the database 5. ALTER TABLE RENAME COMMAND:- information and communicate each other more easily.
definition, creation, retrieval, updation, maintenance and protection of the databases. designer. ALTER TABLE <table_name> RENAME TO <new_table_name>; Functional units of ERP:-
Advantages:- 3) Alternate keys:- A candidate key that is not the primary key . 6. DROP TABLE COMMAND A. Financial Module:- It can collect financial data from various functional departments and generate valuable
1) Database reduces data redundancy. 4) Foreign keys:- A candidate key which is the primary key of another table. DROP TABLE <table_name>; financial reports.
2) Database can control data inconsistency. Relational Algebra:- b. DATA MANIPULATION LANGUAGE COMMANDS(DML):- B. Manufacturing module:- It contains necessary business rules to manage the entire production process.
3) Efficient data access. 1) SELECT(σ) Operation: Unary operator . Selects rows from a relation that satisfies a given predicate(condition). 1. INSERT INTO COMMAND:- C. Production Planning module :- It is used for optimizing the utilization of available resources and helps the
4) Data integrity can be maintained. 2) PROJECT(π):- Unary operator. Selects certain attributes from the table and forms a new relation. INSERT INTO <table_name> (<column1>,<column2>,….) VALUES(<value1><value2>,….); organization to plan their production.
5) Data security can be ensured. 3) UNION(U):- Binary operator. Combines two relations. 2. SELECT FROM COMMAND:- D. HR Module:- Human Resource module of ERP focuses on the management of human resources and human
6) Database facilitates the sharing of data. 4) INTERSECTION(∩) : Binary operator. It returns the common elements only. SELECT <column1>,<column2>,…. FROM <table_name> WHERE <condition>; capital.
7) Enforces the necessary standards. 5) SET DIFFERENCE(-):- Binary operator. It returns a relation containing the tuples appearing in the first relation The DISTINCT keyword is used for avoiding the duplicate values. E. Inventory Control Module:- This module covers processes of maintaining the appropriate level of stock in
8) Offers a facility to do the backup and recovery. but not in the second. the ware house.
Components of DBMS environment:- 6) CARTESIAN PRODUCT(×):- returns a relation consisting of all possible combinations of tuples from two F. Purchasing Module:- It is used for making the required raw materials available in the right time and at the
1) Hardware:- The actual computer system used for the storage and retrieval of the database. relations. right price.
2) Software:- consists of the actual DBMS, Application Programs and Utilities.
B B B B
BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 9 BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 10 BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 11 BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 12
G. Marketing Module:- It is used for monitoring and tracking customer orders, increasing customer Decision Support System(DCS):- Decision Support Systems are interactive, computer based systems that aid B. Cyber Crime against Property
satisfaction, and for eliminating credit risks. users in judgment and choice activities. 1. credit card fraud
H. Sales and distribution module:- It includes inquiries , order placement, order scheduling , dispatching and Chapter Eleven 2. intellectual property theft
invoicing. Trends and Issues in ICT 3. internet time theft
I. Quality Management Module:-This module is used for managing the quality of the product. ICT means Information and Communication Technology. C. Cyber Crime against Government
Business Process Re- engineering(BPR):- It is the analysis and redesign of work flow within an enterprise. A business Mobile Computing:- 1. Cyber Terrorism
process consists of three elements. Generations in Mobile Communication:- 2. Website Defacement
Inputs 1. First Generation networks(1G):- developed around 1980. 1G mobile phones were based on the analog system 3. Attack against e-governance websites
Processing and provided basic voice facility only. Cyber Laws:- refers to the legal regulatory aspects of the internet.
Outputs 2. Second Generation networks(2G):- It follows digital system for communication. The popular standards Information Technology Act 2000(Amended in 2008):- In May 2000, the Indian Parliament passed Information Technology
Implementation of ERP:- introduced by 2G systems are Global System for Mobiles(GSM) ,Code Division Multiple Bill and it is known IT Act 2000.
1. Pre Evaluation screening:- This step limits the number of packages to be evaluated. Access(CDMA),General Packet Radio Services(GPRS) and Enhanced Data rates for GSM Evolution(EDGE). Cyber Forensics:- It is the process of using scientific knowledge for identifying, collecting, preserving, analyzing and
2. Package Selection:- selects an appropriate package. 3. Third Generation networks(3G): It is also referred to as wireless broadband and it uses the WCDMA(Wideband presenting evidence to the courts .
3. Project Planning: - This phase decides when to begin the project, how to do it and when to complete it. Code Division Multiple Access) technology. Infomania:- It is the state of getting exhausted with excess information.
4. Gap Analysis:-Gap analysis means the steps to find the remaining needs of the enterprise. 4. Fourth Generation networks(4G):- It is also called LTE(Long Term Evolution) and it uses the Orthogonal
5. Business Process Re- engineering:- rethinking and redesign of the business process to achieve Frequency Division Multiple Access(OFDMA) technology.
improvements in process.. 5. Fifth Generation networks(5G):- It will be the future generation of mobile networks. Prepared By:
6. Installation and Configuration:-installs a new ERP package. Mobile Communication Services:-
Biju John Ampalakara,
7. Implementation team training:- The company trains their employers to implement and run the new ERP a. Short Message Services(SMS):- SMS messages are exchanged using the protocol called Signaling System No.
package. 7(SS7). H.S.S.T Computer Science,
8. Testing:- The software is tested to ensure that it performs properly. b. Multimedia Message Services(MMS):-MMS supports contents such as text, graphics, music, video clips and St John’s Model H.S.S,
9. Going live:- in this step, the system becomes live to perform the enterprise operations. more. Nalanchira,Thiruvananthapuram.
10. End user training:-this step provides the training for end users. c. Global Positioning System(GSM):- It is a satellite based navigation system that is used to locate a geographical
11. Post implementation:-In this phase, errors may be corrected and necessary steps may be taken to improve position anywhere on earth , using its longitude and latitude.
the processing efficiency. d. Smart cards:-It is a plastic card embedded a computer chip that stores and transacts data.
ERP Solution Providers/Packages:- Android Operating Systems:- Android operating systems was developed by Andy Rubin in 2003.The various versions
Oracle are Cupcake(1.5), Donut(1.6), Éclair(2.0), Froyo(2.2), Gingerbread(2.3), Honeycomb(3.0), Ice cream Sandwich(4.0),
SAP(Systems Applications and Products) Jelly Bean(4.1 to 4.3.1), KitKat(4.4 to 4.4.4), Lollipop(5.0 to 5.1.1) ,Marshmallow(6.0 to 6.0.1), Nougat(7.0 to 7.1),
Odoo Oreo(8.0 to 8.1) and Pie(9.0).
Microsoft Dynamics ICT in Business:-
Tally ERP 1. Social networks and Big data analytics:-Big data analytics is the process of examining large data sets
Benefits and risks of ERP:- containing a variety of data types to uncover hidden patterns, market trends , customer preferences and other
Benefits:- useful business information.
1. Improved resource utilization 2. Business Logistics:-It is the management of flow of goods/resources in a business between the point of origin
2. Better Customer Satisfaction and the point of consumption in order to meet the requirements of customers or corporations. Radio
3. Provides accurate information Frequency Identification(RFID) technology is used for business logistics.
4. Decision making capability Information Security:-
5. Increased flexibility 1. Intellectual Property Right(IPR)
6. Information Integrity a) Patent:- exclusive right granted for an invention.
Risks of ERP implementation:- b) Trade Mark:- distinctive sign that identifies certain goods or services produced or provided by an individual
1. High cost or a company.
2. Time consuming c) Industrial Designs:-refers to the ornamental or aesthetic aspects of an article.
3. Requirement of additional trained staff d) CopyRight:-legal right given to the creators for an original work, for a limited period of time.
4. Operational and maintenance issues Infringement:- Unauthorized use of intellectual property rights such as patents, copyrights, and trademarks .
ERP and Related Technologies:- Cyber space:- a virtual environment created by computer systems connected to the internet.
Product Life Cycle Management(PLM):- It is the process of managing the entire life cycle of a product. Cyber Crimes:- It is a criminal activity in which computers or computer networks are used as a tool, target or a place of
Customer Relationship Management(CRM):-It is a comprehensive approach for creating, maintaining and criminal activity.
expanding customer relationships. A. Cyber crimes against individual:-
1. Identity Theft
Management Information Systems(MIS):- It is an integrated system of man and machine for providing the
2. Harassment
information to support the operations, the management and the decision making function in an organization.
3. Impersonation and Cheating
Supply Chain Management(SCM):-It consists of all the activities associated with moving goods from the
4. Violation of Privacy
supplier to the customer.
5. Dissemination of obscene material
B B B
BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 13 BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 14 BIJU JOHN Ampalakara,St. John’s Model H.S.S,Nalanchira,TVM Page 15