Plus one Computer Science Micro Full
Plus one Computer Science Micro Full
Has the advantage of ‘drawing’ directly onto 3. Printer: Used to produce hardcopy output. The Utility software: complex problem into smaller sub tasks and solving
the screen. output printed on paper is known as hardcopy. each task from sub to main.
1. Compression utility: Large files can be
Classified as Impact or Non-impact printers.
4. Touch screen: Allows the user to compressed sothat they take less storage Stages of problem solving:
operate/make selections by simply touching Dot-matrix uses impact mechanism. It can area.
(i) Problem identification
on the display screen. print carbon copies with less printing cost. These
2. Disk defragmenter: A program that rearranges (ii) Preparing algorithms and flowcharts
printers are slow and noisy.
5. Graphic tablet: Consists of an electronic files on a computer hard disk. (iii) Coding the program using programming language
writing area and a special ‘pen’ that works with Inkjet printers, Laser printers and thermal (iv) Translation
3. Backup utility: These programs facilitate the
it. Allows artists to create graphical images printers are non-impact printers (v) Debugging
backing up of disk.
with actions similar to traditional drawing tools. (vi)Execution and Testing and
4. Plotter: A plotter is an output device used to
4. Antivirus programs: A utility program that (vii) Documentation
6. Joystick: Used to play video games, control produce hardcopies of graphs and designs on the
scans the computer system for viruses.
training simulators and robots. paper.
Algorithm: It is a step-by-step procedure to solve a
General purpose software: These are used
7. Microphone: Accepts sound in analogue 5. 3D printer: A 3D printer is an output device used problem, where each step represents a specific task
to perform tasks in a particular application area.
nature as input and converts it to digital to print 3D objects. It can produce different kinds of to be carried out.
format. objects, in different materials, using the same 1. Word processing software: It is designed for
Flowchart: The pictorial representation of an algorithm
printer. creating and modifying documents. Eg: MS
8. Scanner: Allows capturing of information, like with specific symbols for instructions and arrows
Word, Open Office Writer, Apple iWork Pages,
pictures or text and converting it into a digital e-Waste: Electronic waste may be defined as discarded showing the sequence of operations.
etc.
format that can be edited using a computer. computers, office electronic equipment, entertainment Process
devices, mobile phones, television sets and 2. Spreadsheet software: This software allows Chapter 5: Introduction to C++ Programming
9. OMR: Scanning device that reads predefined
refrigerators. users to perform calculations. Eg: Microsoft
positions and records where marks are made
Excel, Open Office Calc, Lotus 1-2-3 and Apple Character set: The fundamental unit of C++
on the printed form. Useful for applications such e-Waste disposal methods: Re-use, incineration
iWork Numbers. language. The character set of C++ is categorized
as objective type tests and questionnaires. (combustion process in which the waste is burned in
incinerators at a high temperature), recycling, (the 3. Presentation software: The software is used as (i) Letters (A – Z, a – z), (ii) Digits (0 – 9), (iii)
10. Bar Code Reader: A bar code is a set of Special characters (iv)White spaces.
process of making new products from a product that has to display information in the form of a slide
vertical lines of different thicknesses and Tokens: The fundamental building blocks of the
originally served its purpose) and land filling. show. Eg: Microsoft PowerPoint, Apple iWork
spacing that represent a number. Barcode
Keynote and Open Office Impress. program. C++ has five types of tokens – Keywords,
readers are used to input data from such set of Software: A general term used to denote a set of Identifiers, Literals, Punctuators and Operators.
barcodes. programs that help us to use the computer system. Two 4. Database software: Database is an organised Keywords: The words (tokens) that convey a
types - system software, application software. collection of data arranged in tabular form. Eg: specific meaning to the language compiler. These
11. QR (Quick Response) code is similar to
System software: A set of programs which aids in Microsoft Access, Oracle, Postgres SQL, My are also known as reserved words.
barcodes.
Barcodes are single dimensional where as QR the execution of a general user’s computational SQL, etc. Identifiers: These are the user-defined words used to
codes are two dimensional. requirements on a computer system. 5. Multimedia software: Multimedia is the name different program elements such as memory
integration of multiple forms of media. Eg: VLC locations, statements, functions, objects, classes etc.
12. Biometric sensor: Identifies unique human The components of system softwareare Operating
Player, Adobe Flash, Real Player, Media The identifiers of
physical features like fingerprints, retina, iris system, Language processors and Utility software.
Player, etc. memory locations are called variables.
patterns, etc. to identify, verify and authenticate Operating system (OS): A set of programs that acts Rules for naming identifiers: An arbitrary long
the identity of the user. as an interface between the user and computer The Free Software Foundation (FSF) defines sequence of letters, digits and underscores.
hardware. the four freedoms for free and open source The first character must be a letter or underscore
13. Smart card reader: These are used to access
software: ( _ ). White space and special characters are not
data in a smart card. Smart card is a plastic card Function of OS: Process management,
that stores and transacts data. Used in banking, memory management, file management, Freedom 0 : The freedom to run program. allowed.
healthcare, telephone calling, electronic cash device management, security management and Freedom 1 : The freedom to study Keywords cannot be used. Upper and lower case
payments and other applications. command interpretation. Freedom 2 : The freedom to distribute letters are treated
copies Freedom 3 : The freedom to improve differently.
14. Digital camera: Takes pictures and videos and Computer languages: Machine language, Literals: Data items that never change their value
the program
converts it to the digital format. Web camera is a assembly language and High Level Languages during the program run. They are often referred to
compact and less expensive version of a digital
camera. Language processors: These are the system Chapter 4 – Principles of Programming as constants.
programs that translate programs written in high level and Problem Solving Literals are of four types – Integer literals,
Output devices: These devices present information language or assembly language into its equivalent Computer program: A sequence of instructions Floating point literals, Character literals(‘) and
from a computer system to the user. machine language. given to a computer to solve a problem. String literals.(“)
Escape sequences: These special character
1. Monitor: Display devices include CRT monitors, Types of language processors: Program instruction: It is an action oriented constants that represent non-graphic symbols. It
LCD monitors, TFT monitors, LED monitors, gas statement and it tells the computer what operation it consists of a backslash (\) followed by one or more
plasma monitors, Organic Light Emitting Diode 1. Assembler (translates the program code
should perform. specific characters.
(OLED) Monitors, etc. written in assembly language to machine language),
2. Interpreter (converts a HLL program into machine Top down design: It is the process of solving a .
2. LCD projector: An LCD projector is a type of language line by line) and 3. Compiler (translates a complex problem by breaking it down into different
video projector for displaying video, images or program written in high level language into machine tasks and solving each task from main to sub.
computer data on a large screen or other flat language).
surface. Bottom up design: It is the process of breaking a
Flow line
on Type conversion: Conversion of the data type of an This selection statement successively tests the three loop elements (initialisation, test expression
Advantages of flowcharts: Better communication, operand into another type. Done in two ways: implicitly value of a variable or an expression against a list and update statement) are placed together in for
Effective analysis, Effective synthesis, Efficient coding. and explicitly. of integers or character constants. statement.
Translation: It is the process of converting a program Type promotion: It is the implicit type conversion is switch(expression) do...while statement
written in high level language into its equivalent version performed by C++ compiler internally.
in machine language. It is also an exit-controlled loop. The body of the loop will
Type casting: It is the explicit type conversion and is execute at least once.
Debugging: It is the process of detecting and done by the programmer by specifying the data type within
correcting the errors in a program. parentheses to the left of the operand.
Nesting of a loop: Placing a loop inside the body of
Syntax errors: The errors occur when the rules or Variable declaration: data_type <variable1>,<variable2>; another loop. When we nest two loops, the outer loop
syntax of the programming language are not followed. counts the number of completed repetitions of the
Variable initialisation: Supplying value to a variable at
Logical error: It is due to improper planning of the the time of its declaration. inner loop.
program's logic and revealed during the execution of {case constant_1 : statement
the program. Pre-processors: These are the compiler directive block 1; break;
statements which give instruction to the compiler to case constant_2 : statement
Run time error: These errors occur unexpectedly process the information provided before actual
Chapter 8: Arrays
block 2; break;
when computer becomes unable to process some compilation starts. These lines always start with a # (hash) default : statement block n;} An array is a collection of elements of the same type
improper data. symbol. placed in contiguous memory locations. Arrays are used
Documentation: 1. Internal documentation is to store a set of values of the same type under a single
Header files: Files available along with compiler
done through comments in programs. 2. Various variable name. Each element in an array can be
manuals provide external documentation. using namespace statement: It tells the compiler about accessed using its position in the list called index
a namespace where it should search for the elements number or subscript.
used in the program.
Chapter 6: Data Types and Operators Syntax: data_type array_name[size];
main() function: An essential function in every C++
Eg: int num[10];
program. The execution starts at main() and ends
within main(). int score[5] = {98, 87, 92, 79, 85};
Data types: These are the means to identify the
total_bytes = sizeof(array_type) × size_of_array
nature of the data and the set of operations that can
be performed on the data. Chapter 7: Control Statements Array Operations:
The conditional operator (?:)
Fundamental data types: The five fundamental Decision making statements or Selection 1. Traversal
C++ has a ternary operator. It is the conditional 2. Searching
data types in C++ are char (1byte), int (4byte), float statements. if and switch are the two types of selection
operator (?:) consisting of the symbols ? and : (a a. Linear Serach b. Binary Search
(4byte), double (8byte) and void (0byte). statements in C++. The selection will be based on
question mark and a colon). It requires three 3. Sorting
conditions.
Data type modifiers: The keywords used to alter operands. a. Selection Sort b. Bubble Sort
the size, range or precision of data supported by the if statement
Looping (Iteration) Statements
basic data types. Important modifiers are signed,
The if statement is used to select a set of statements
unsigned, long and short. Four elements of a loop:
for execution based on a condition.
Variables: The names given to memory locations. 1. Initialisation: The loop control variable
if – else statement
(Variable used in the condition) gets its first
Operators: The tokens or symbols that trigger
The syntax is: value..
computer to carry out operations. The data on which Two dimensional (2D) arrays
an operation are called operands. An operand may if (test expression) 2. Test expression: It is a relational or
be either a constant or a variable. Classified into statement block 1; logical expression whose value is either A two dimensional array is an array in which each element
three –unary, binary and ternary. else True or False. itself is an array. For instance, an array AR[m][n] is a 2D
statement block 2; array containing m rows and n columns.
Arithmetic operators: Used to perform basic 3. Update statement: The update statement
When we write an if statement inside another if block, it is data_type array_name[rows][columns];
arithmetic operations. modifies the loop control variable by changing
called nesting.
its value.. The indices (subscripts) of rows and columns, start at 0
Modulus operator (%): Also called as mod
The else if ladder and ends at (rows–1) and (columns–1) respectively.
operator. It gives the remainder value during 4. Body of the loop: The statements that
arithmetic division. When we want to select one action from more than two need to be executed repeatedly constitute the int marks[5][4];
actions, different conditions will be given and each body of the loop.
Relational operators: Used for comparing numeric condition will decide which statement is to be selected for
while statement
data. These are binary operators. The result of any execution. Chapter 9: String Handling and I/O Functions
relational operation will be either True or False. if (test expression 1) It is an entry-controlled loop. The condition is
statement block 1; checked first and if it is True the body of the loop will A character array can be used to store a string, since it
Expression: Composed of operators and be executed. is a sequence of characters. The array char
else if (test expression 2)
operands. Classified into arithmetic my_name[10]; can store a string of 9 characters. One
statement block 2; for statement
expressions, relational expressions and logical location will be used to store ‘\0’ (null character) as
expressions. switch statement It is also an entry-controlled loop in C++. All the string terminator.
function, getline() function or get() function. strcmp() strcmp(string To compare two strings.
String
Functions
data (stdio.h h)
(math.h)
Character getchar( cin.get() Character input pow() pow(double, int) To find the power of a number. It takes two arguments x
functions )
putchar( cout.put() Character and y. Returns the value of xy.
) output
gets() cin.getline( String input isupper() isupper(char) To check whether a character is in upper case or not. The
String
Function ) function returns non-zero if the given character is in uppercase,
s puts() out.write() String output and 0 otherwise.
islower() islower(char) To check whether a character is in lower case or not. The
function returns non-zero if the given character is in lowercase,
and 0 otherwise.
Chapter 10: Functions
Character Functions (ctype.h)
them require data for performing the task converted. The second argument is the character array where
Conversion
Types of social media: Internet forums, social Denial of Service (DoS): It is a network attack is
blogs, micro blogs, wikis, social networks, usually aimed at a web server. Such an attack forces
content communities and a lot more. the server/computer to restart.
Internet forums: It is an online discussion Phishing:Phishing websites have URLs and home
website where people can engage in pages similar to their original ones. The act of creating
conversations in the form of posted messages. such a misleading website is called spoofing.
Eg: Ubuntu Forum Man-in-the-middle attack: It refers to an attack in
Social blogs: It is a discussion or informational which an attacker secretly intercepts electronic
website consisting of entries or posts displayed in messages between the sender and the receiver and
the reverse chronological order i.e., the most recent then captures, inserts and modifies messages
post appears first. Eg: Blogger.com, Wordpress.com. during message transmission.
Microblogs: They allow users to exchange short Firewall: It is a system of computer hardware and
sentences, individual images or video links. It software that provides security to the computer
offers a communication mode that is spontaneous network in an organisation. It denies malicious data
and can influence public opinion. Twitter.com is a from entering into the computer networks.
popular micro blogging site.
Antivirus programs: These tools are used to
Wikis: Wikis allow people to add content or edit detect viruses and cure the infected system. It
existing information in a web page, to form a scans files in the computer system for known
community document. Wiki is a type of content viruses and removes them if found.
management system. Eg: wikipedia.org.
Cookies: These are small text files that are created
Social networks: These sites allow people to when we use a browser to visit a website.
build personal web pages and then connect
Mobile computing: It is a technology that has
with friends to communicate and share content.
computing capability and can transmit/receive data
We can share text, pictures, videos, etc. and
while in motion..
comment to the posts. Eg: facebook.com,
linkedin.com. Generations of mobile communication: 1G
mobile phones were based on the analog system
Content communities: These are websites that
and provided basic voice facility only. 2G networks
organise and share contents like photos, videos,
follow digital system for communication. Picture
etc. Eg: Youtube.com, flickr.com.
messages and MMS (Multimedia Messaging
Advantages of social media: Bring people Service) were introduced in 2G. 3Gnetworks
together, help to plan and organise events, offered multimedia services combining voice and
promoting business, enhance social skills. data. It has the facility to send and receive large
amounts of data using a mobile phone. 4G system,
Limitation of social media: Intrusion to
also called Long Term Evolution (L.T.E.), provides
privacy, addiction, spread rumours.
mobile ultra-broadband Internet access to mobile
Computer virus: It is a program that attaches itself devices.
to another program or file enabling it to spread from
Mobile communication technologies: SMS,
one computer to another without our knowledge and
MMS, GPS and smart cards. Short Message Service
interferes with the normal operation of a computer.
Mobile Operating System: The software that
Computer worm: It is a stand-alone malware
manages the hardware, multimedia functions,
(malicious software) program that replicates itself in
Internet connectivity, etc. in a mobile device. Eg:
order to spread to other computers.
Android from Google, iOS from Apple, BlackBerry
Trojan horse: It will appear to be a useful OS from BlackBerry and Windows Phone from
software but will actually do damage once installed Microsoft
or run on your computer.
Spams or junk mails: These are unsolicited e-
. JOIN OUR GROUP FOR MORE STUFF:
mails sent indiscriminately to persons to promote a
product or service.
Hacking: It is a technical effort to manipulate the
normal behaviour of network connections and
connected systems. Computer experts perform
hacking to test the security and find the
vulnerabilities in computer networks and computer
systems. ‘white hats’, ‘black hats’. and‘grey hat
hackers’,.