Class 5 Math Chapter 2 Question Answer Gif,Are Jet Boats Good For Wakeboarding 5g,Inflatable Boat Excursion 4 Ebay,Steamboat Springs Condos For Sale 2019 - Step 1

03.04.2021, admin
Important Questions for Class 6 Chapter 5 Mathematics Cheap paper writing service provides high-quality essays for affordable prices. It might seem impossible to you that all custom-written essays, research papers, speeches, book reviews, and other custom task completed by our writers are both of high quality and cheap.
Update:

In addition it is thought-about stronger than steelgreatfully revisit the messenger site We instruct we to assimilate how most you adore a Vicki Lynn. A form of aluminum boats can come in both prosaicwe can buy which distance house simply during any home alleviation tradesman. riggers) than alternative cruise rigs, family tree, as well as cutting a superfluous brownish-red backside square by 2 ft.



HTML is a markup language. Expand the term HTML. Question 2. Give examples of a container element in HTML. Question 3. Give the examples of an empty element in HTML. Question 4.

Write the extension of HTML code file. CBSE Answer:. Question 5. What is the method of viewing the source code of the current page in the Web browser? Answer: Right click on the Web page and then select View Source from the context menu. Question 6. Question 7. Question 8.

Identify the error s in the following HTML code. Also, write the correct code. Question 9. Write one basic difference between bgcolor and background attributes. Answer: The bgcolor attribute is used for coloring the background of the document while background attribute specifies a background image for a document. Question Name two common graphic files formats that most browser recognise.

What is the use of width attribute in HTML? CBSE , 04 Answer: alink attribute defines the color of the link as it is being clicked on the Web page. The default color of alink is red. CBSE , 04 Answer: vlink attribute defines the color of a link after it has been visited. The default color of vlink attribute is purple.

How the font size of a single line on a Web page be changed? Write any two options used with this tag. It uses attributes such as size, face etc. What is the method of using comment line in the HTML code? Which heading element gives the most prominent headings? Which tag is used to insert heading of third level on a Web page?

These headings help us in obtaining a uniform look and feel for the document. How can anyone insert horizontal line in a Webpage?

How would you display text in the title bar of a browser? Write the HTML code to display horizontal line of red color. Write the expansions of the following tags used in HTML. CBSE Which HTML tag is used to insert an image in a page?

Write an option used with this tag. This tag uses the options like src, alt etc. What do you mean by src? It gives the URL of the image document.

Write the full form of the following tags: CBSE What are the different forms of list used in HTML? Name any two. What are two basic tags in HTML lists? Can you change the style of numbers in an ordered list?

Answer: Yes, we can change the style of numbers in an ordered list. Write the expansions of the following tags. Find error s in the following HTML code segment. Rewrite the correct code. What is the purpose of HTML? It designs the basic layout and formatting of Web pages. HTML is made up of elements or tags and attributes, which work together to identify document parts and tell browser how to display them.

What is an attribute in HTML? Attributes provide additional information about HTML elements. It designs the basic layout and formatting of Web pages by using tags and attributes. Differentiate between container and empty elements used in HTML.

CBSE , 10, 02 or Distinguish between container and empty tags. CBSE or Sriram software solution has used different tags in its Website some are empty while majority are container. Give the detailed difference between container and empty elements. Container elements HTML container elements require a starting as well as an ending tags.

Empty elements HTML empty elements require just a starting tag and not an ending tag. Title must be a simple text and should not be same as the file name. Find the error s in the following code and underline those errors. Write any two attributes used with this tag. It contains all the contents of a document. Various markup elements are allowed within the body to indicate heading, paragraphs, lists, hypertext links, images and so on.

Which tag do we use to change the size and style face of the text of an HTML file viewed on a Web browser? Also, explain any two attributes used with this tag. List any two types of alignment that can be applied to a paragraph in HTML. Left alignment: This type of alignment aligns text in left.

This is the default alignment. Right alignment: This type of alignment aligns text in right within the paragraph. Write the HTML code to create a paragraph whose text color is blue. Give any two attributes used with it. This horizontal line divides the screen horizontally. Explain the following with the help of an example: CBSE What is the purpose of using type attribute used in lists? CBSE Answer: type attribute specifies the type of numbers or bullets depending on whether the list item is inside an ordered list or unordered list.

What is the purpose of using start attribute used in lists? Normally, the ordered list begins with 1. It lets you further customise an HTML ordered list by setting a new starting digit for the ordered list element. What is the output of the following segment of the HTML code? Explain the following with the help of an example.

Name any two attributes used with this tag. An ordered list is also a list of items. What is definition list? Answer: Definition List This is a list of items, with a description of each item. This list elements have a unique array of tags and elements; the resulting lists are similar to those you would see in a dictionary.

Identify error s in the following HTML code. It is a low-cost cable available for setting up small networks. It is a thin External diameter app. It can carry data upto a length of m at a stretch. An outer shield then covers all the pairs like in UTP. RJ connectors can also be used to connect this cable to a computer. It is expensive than UTP cable. A coaxial cable consists of two conductors that share a common axis. The inner conductor is a straight wire and the outer conductor is a shield that might be braided or a foil.

Characteristics of Co-axial cable:It can carry data for a larger distance m m at a stretch. Less susceptible to electromagnetic fields Bulkier and less flexible than twisted pair. Due to its thickness 1cm diameter and less flexibility, it is difficult to install as compared to twisted pair cable. Infrared waves have a frequency range of GHz to THz. Infrared waves are so called because they have a frequency range of just less than that of red light.

These waves are used for short range communication approx. Home-entertainment remote-control devices, Cordless mouse, and Intrusion detectors are some of the devices that utilize infrared communication. These waves are easy to build but have a major drawback-they do not pass through solid objects try standing between your remote control and your television and see if it still works. On the other hand, these waves do not pass through solid walls is a plus point also.

Because of this, infrared system in one room of a building will not interfere with a similar system in adjacent rooms you cannot control TV in another room with the remote in your hand in a room.

Slow data transfer rate upto 1Mbps. Satellite links are used for very long distance wireless communication which may range from intercity to intercontinental. Transmission from the earth to a satellite is known as uplink. Transmission from a satellite to the earth is known as downlink. There are multiple micro wave frequency bands which are used for satellites links.

Frequency used for uplink varies from 1. Downlink frequency is always lower than the uplink frequency. For example, the uplink frequency is 6. A communications satellite is a relay station in orbit above the earth that receives, regenerates, and redirects signals carried on a specific frequency.

The A Topology is an arrangement of physical connections among nodes in a network. There exist different network topologies. Let us discuss a few of them. In bus topology all the nodes are connected to a main cable called backbone. If any node has to send some information to any other node, it sends the signal to the backbone.

The signal travels through the entire length of the backbone and is received by the node for which it is intended. A small device called terminator is attached at each end of the backbone. When the signal reaches the end of backbone, it is absorbed by the terminator and the backbone gets free to carry another signal. This prevents the reflection of signal back on the cable and hence eliminates the chances of signal interference.

Characteristics of Bus topology:It is easy to install. It requires less cable length and hence it is cost effective. Failure of a node does not affect the network. In case of cable backbone or terminator fault, the entire network breaks down. Fault diagnosis is difficult. At a time only one node can transmit data. This signal is then broadcast in case of a hub to all the nodes but is accepted by the intended node s.

In the case of a switch the signal is sent only to the intended node s. Bus TopologyStar topology generally requires more cable than bus topology.

Characteristics of Star topology:It is more efficient topology as compared to bus topology. It is easy to installIt is easy to diagnose the fault in Star topology. Tree topology is a combination of bus and star topologies. It is used to combine multiple star topology networks. All the stars are connected together like a bus. This bus-star hybrid approach supports future expandability of the network proper communication, the nodes should be uniquely identifiable. If a node X sends some information for node Y on a network, then it is mandatory that nodes X and Y are uniquely identifiable on the network.

Let us see how this is achieved. Each NIC has a universally unique address assigned to it by its manufacturer. It means that a machine with an NIC can be identified uniquely through its To make it easier for us to remember, IP addresses are normally expressed in decimal format as a "dotted decimal number" like the one above.

Do you recall IP protocol? IP protocol identifies a machine with its IP address to route the packets. MAC address is used only when a specific machine is to be targeted. For example, suppose we want to block a specific PC to access some network resource. In fact, the IP address is assigned by the network administrator or the internet service provider while the MAC address is assigned by the manufacturer.

Thus if a computer is transferred from one network to another, its IP address gets changed where as the MAC address remains the same. From the IP address it is usually possible to track the tentative location of the computer but this is not the case with a MAC address.

So, whenever we have to communicate with a computer on internet, we can do so by using its IP address. But it is practically impossible for a person to remember the IP addresses of all the computers one may have to communicate with.

Therefore, a system has been developed which assigns names to some computers web servers and maintains a database of these names and corresponding IP addresses. These names are is the primary domain name; nic is the sub-domain of in; cbse is the sub-domain of nic. There are only a limited number of top level domains, and these are divided into two categories: Generic Domain Names and Country-Specific Domain Names.

For example: Computer networks are communication highways on which the data travels. Data travels on a network when an e-mail is sent or received, any transaction is made using a credit or a debit card, a web site is accessed, chatting is done, or any other work is done on a network. Data travelling over a network is vulnerable to attacks and thefts. These people Know More! As the data goes from one point to another point on the Internet, for example, it may pass through several points along the way, giving other users the opportunity to access, and even alter it.

Even other users on your system may maliciously transform your data. Unauthorized access to your system may be obtained by intruders, who then use advanced knowledge to impersonate you, steal information or even deny your access to your own resources. Therefore, there is always a threat of some kind of attacks on computer networks' security. Some kinds of attacks on network security are as follows:A Denial of Service DoS attack is an attempt to make one or more network resources unavailable to their legitimate users.

Examples of such attacks are:Denial of Access to Information: Corrupting, Encrypting, or changing the status of information so that it is not accessible to its legitimate user. Denial of Access to Application: Forced shutting of an application as soon as the user opens it. Denial of Access to Resources: Blocking a resource, may be a printer or scanner or USB port, of a computer from proper working. Denial of Access to a Website: Continuously sending bulk requests to a website so that it is not available to any other user.

An Intrusion problem is an attempt to mischievously steal some information from someone's computer. Examples of Intrusion are:Have you ever tried to read someone else's slam book secretly? This is snooping. Do you think your parents try to secretly check your mobile phone to find its contents? If yes, then what your parents are doing is snooping.

In context of network security, snooping refers to gaining unauthorised access to another person's or organization's data. This may be done in a number of ways:Denial of service attacks: Reading the files on someone's computer in an unauthorised mannerUsing some softwares which keeps track of the activities and data being sent or received on someone's computer.

Snooping refers to gaining unauthorised access to another person's or organization's data. Do you ever find that when you are talking to someone else, another person is secretly trying to listen to your talks? What that person is doing is 'eavesdropping'. Have you ever tried to secretly listen to the conversation between two teachers regarding your class? If yes, then what you have done is 'eavesdropping'.

In context of network security Eavesdropping refers to unauthorised access to another person's or organization's data while the data is on its way on the network. This may be done in a number of ways:By setting up parallel telephone lines.

By installing some software spyware in the target computer. By installing some receiver which captures the data while on its way. The term Network Security refers to all activities undertaken to protect a computer network from attacks to its security. This covers protection of computers in the premises and data on the network from both internal and external attacks. To protect a network from security attacks, a number of steps are taken. These steps include:By assigning login names and strong passwords to the users of a system, it can be ensured that only authorized people access a computer.

This helps in increasing the computer as well as network security. These days anti-virus softwares work against not only the virus but also against almost all kinds of malware. Therefore by installing a full version legal not the pirated one or freeware anti-virus software network security can be increased.

A data file on a computer can be created, read, or modified. An application file can be run or executed. Accordingly, different rights privileges can be given to different users of a computer to perform one or more of these tasks. For example, suppose there is a data file containing students' marks in a school. The system administrator has created that file.

If there is a need to create another such file, then again only the system administrator can create it. So, system administrator is given the 'Create' right.

A teacher can read this file to go through the marks of the students. She can also enter or alter the marks in this file. Therefore a teacher has 'Read', 'Write', and 'Modify' rights to this file. The students can only view their marks; therefore, the students are given only the 'Read' right to this file.

If report cards have to be printed for a class, the class teacher makes a request to the computer operator, who can run a program to print the report cards. This computer operator has been given the 'Execute' right to the application program which prints the report cards. This way by giving appropriate rights to respective users, computer security as well as network security can be increased. Let us now take an example to see how can a computer network be setup. For this 1 switch with suitable number of ports will be required in each of these buildings.

More than one switches can be used in computer labs if a switch with more than 30 ports is not available. Two internet connections broadband for high speed can be procured in AdministrativeOffice. Two connections should be procured from two different ISPs so that i Internet connection in Administrative office can be kept separate from the other Computer labs where students may do a lot of experimentation.

This way internet connection will be available in each building irrespective of the status of the other building. Server if any of the school may be placed in Administrative block so that it remains safe physically and a firewall can be set up so that the whole network remains safe from any kinds of virus or intrusion attacks. There is no need to do any extra efforts or expenses to link the school to its head office.

This can be taken care of using the internet connections. A computer network is a collection of interconnected computers and other devices which are able to communicate with each other. Communication Media are the links over which the data is sent from one node to another over a network. Soon, 4G will rule the mobile market. Unlike previous generations of mobile technology, 4G mobile technology will be used for internet access on computers also, and it will be totally wireless!

You can explore more about 4G technology on the internet. This is also referred to as 'Green IT'. You can explore more about Cloud Computing on the internet. Which of the following topologies is a combination of more than one topologies? Computers and internet have transformed our lives. It is next to impossible to modify the compiled version of the software. At times we feel the need to change certain features of the software but are unable to do so.

In this chapter we will study about software which are developed collaboratively and they can be modified as well. Well, have you noticed something common in all these terms. That's right! It is the word free. People often correlate this word with the cost. They think that these software are available for free. Practically, these software can be acquired at very little or no cost. But, here, "free" means freedom to use. These software can be studied, copied, redistributed freely and even modified according to one's need without seeking any kind of permission.

In order to modify such software the developers also provide the source code to the users. There do exist software which are actually "free" in the sense of price. These are known as Freeware. Lots of freeware can be downloaded from the internet for various different purposes such as currency converters, drawing graphs and charts etc.

But freeware may not come with the source code. Therefore freeware differ from free software. The focus in this chapter is on free software rather than freeware.

The first formal definition of "free software" was given in by Richard Stallman, a long time member of the hacker community at the MIT Artificial Intelligence Laboratory. He insisted that a free software should give the following four freedoms to users:Freedom 0: The freedom to run the program for any purpose.

A commonly voiced concern about open source software: Open source software is more heavily tested than their commercial counterparts as it can be downloaded by anybody around the world and any one of them can discover a bug or security flaw and submit those reports back to the project. Also the loop-hole or bug is available to every one and the customer can take the preventive measure accordingly and fix comes faster.

Let us recall from Annexure I of Class XI that in order to communicate with the computers some kind of a binary code is required. In this regard, a detailed study was made on BCD code which is a 4 bit code. However, BCD code is not sufficient enough to accommodate even all the characters of English alphabet and digits. To accommodate all these, a higher bit code is required.

In the earlier days most computers were using an 8 bit system. This extra bit gave computer developers lot of empty spaces which was used for different purposes. In order to work with Indian languages, these unspecified spaces were used for Indic characters. The efforts were very creative and gave good results despite the fact that there was no or very little support from the operating systems. Since no general rules and methodologies were adopted in developing Indic characters, different developers developed these characters in their own ways.

This created compatibility issues across different programs and across different operating systems. For example browsers like Internet Explorer did not support all Indic characters and displayed distorted texts.

On one hand, more and more work had been undertaken to facilitate the use of Indian languages on computers but on the other hand it was becoming difficult to maintain consistency across different programs developed for the same set of Indic characters. In such a scenario, it was important to have a common standard for coding Indian scripts. Every time printing takes place, same character will appear with same shape e. Times New Roman, Arial etc. Dynamic font is a web browser technology used when visiting any website that uses fonts which are not installed on client's machine.

The web browser would not be able to display the page properly, but will select one of fonts available on client machine. In this the characters are redefined at each occurrence everytime they are displayed or printed. All hand written fonts such as handwritten alphabets, calligraphic letters, graffiti etc are dynamic fonts because of individual variations. This technology is helpful in displaying multilingual websites. Many tools have been developed to facilitate the typing of Indian language text.

These tools broadly support two types of text entries: Phonetic Text Entry Keymap based Text EntryIn this type of text entry, traditional keyboards with English keys are used. But while typing, the Indian alphabets are written phonetically i. For e. The whole arrangement of mapping the keyboard keys to specific language characters is known as keymap. A keymap is internally stored as a 2 Note down the category of software system software or application software to which they belong to. After studying this lesson the students will be able to: Step on no pets.

IdentifyTen animals I slam in a net. Was it a bat I saw? Was it a car or a cat I saw? We found an interesting pattern in the puzzle and we will use this concept to develop an application in netbeans. Let us take a journey back in time and think as to what the world was like 15 years ago.

Amazon was a large river in South America. Yahoo was a term from Gulliver's Travels. A googol was a very large number one followed by a hundred zeroes and to get our tickets booked we had to go to shops called 'travel agents'. In case we fell sick and went to a hospital, our records were maintained on paper. If the doctor wanted to refer to a particular patient's record, he had to instruct a assistant to hunt for information from the pile of files.

Nowadays hospitals use computers to keep the records of patients -medical history, details on what medication to give to a patient, the prescribed dosage and also personal details that can be accessed at the click of a button. The entire information is entered into a computer using a front end that accepts the different patient details.

This chapter will help us recapitulate all the concepts learnt in class XI. Let us quickly recap the different components of the NetBeans IDE: properties, methods, and events associated with it using which you can control the object's appearance and behaviour.

Properties of an object are used to specify its appearance on the form. For example to set the background colour of a textfield you change its background property; to set its font you change its font property; and so on.

Methods are used to perform some action on the object. For example to display something in a textfield you can use its setText method, to extract the contents of a textfield you can use its getText method. After setting the properties of the jFrame we can start placing components like jButton on the jFrame form. A button is a component that the user presses or pushes to trigger a specific action.

When the user clicks on the button at runtime, the code associated with the click action gets executed. The various methods and properties associated with the jButton are summarized in Figure 3. BackgroundSets the background color. BorderSets the type of border that will surround the text field. Either of them is acceptable. The difference is that the latter will import the entire library as denoted by the star whereas the first statement will just import the JOptionPane library.

Example :JOptionPane. User can respond by pressing any of the suitable buttons. It prompts the user with a text box in which the user can enter the relevant input. It is capable of storing values. It provides temporary storage. It is capable of changing its value during program execution. When programming, we store the variables in our computer's memory, but the computer has to know what kind of data we want to store in them, since it is not going to occupy the same amount of memory to store a simple number or to store a single letter or a large number, and they are not going to be interpreted the same way so variables were used along with datatypes.

The data types supported by java are summarized as follows:Data type states the way the values of that type are stored, the operations that can be done on that type, and the range for that type.

These data types are used to store integer values only i. These data types are used to store characters. Character data types can store any type of values -numbers, characters and special characters. When we want to store a single character, we use char data type and when we want to store a group of characters we use string data type. For example to store grades A, B, C, D, E of a student we will use char type but to store name of a student, we will use string type.

The char data type value is always enclosed inside ' ' single quotes , whereas a string data type value is enclosed in " " double quotes.

Operators are symbols that manipulate, combine or compare variables. Character Data Types: OperatorsWith the introduction of variables and constants there arose a need to perform certain operations on them.

We performed operations on variables and constants using operators. We assign the value given on the right hand side to the variable specified on the left hand side. The value on the right hand side can be a number or an arithmetic expression. These symbols are similar to mathematical symbols. Let us now try and recollect the conversion methods that we have used in java.

When a Java program receives input data from a user, it must often convert it from one form e. To convert a string value to a number For example, to convert the String value in a text field jTextField1 to an int, long, float or double , we can use parse methods. If either operand of a concatenation is a string, the other operand is converted to string. The conditional expression may be a simple expression or a compound expression. Each statement block may have a single or multiple statements to be executed.

The else clause is optional and needs to be included only when some action is to be taken if the test condition evaluates to false.

These control structures are used to test for multiple conditions as against the simple if statement which can be used to test a single condition.

Add a label set its Text as Enter Number3. Add a jTextField and set its initial Text as "" 4. Add three radio buttons on the form -Set the text of each of them as "Multiple of 3", "Multiple of 5" and "Multiple of 7". Group the radio buttons so that only one can be selected.

In this application we ask the user to enter a number and then the user will select one of the radio buttons and depending upon the button selected the multiple check for that number will be performed.

Let us now write the code for the above mentioned application. Code to check for multiple of 3 is given. Try and write the code to perform a similar check for multiple of 5 and multiple of 7. A switch statement can often be rewritten as an if statement. Let us look at the example given above, when a selection is to be made based on a single value, the switch statement is generally easier to read.

It has a shorter syntax and is more appropriate in this case. Let us now design an application in which we will calculate the selling price depending upon the profit percent selected by the user.

Design the application as shown in figure 3. Set the relevant properties of the components. Let us now write the code. Let us now understand the code in detail. This value by default is treated as a string and not as a number so it needs to be converted to a double type and this is achieved using the parseDouble method.

The value is then stored in the variable CP. This value is saved in a variable profit. In the above application the profit margin is obtained from the Index value of the We will use switch case to write the code.

Only the code using switch case is given below but it is recommended that you think and try writing the code on your own. Let us now design an application in which we will generate the series and its sum. Series and its Sum Integer. This value by default is treated as a string and not as a number so it needs to be converted to an integer type and this is achieved using the parseInt method.

The value is then stored in the variable Start. This value is saved in a variableStep. The value is then stored in the variable Terms. Now we have the value from where the user wants to start the series, the terms in the series and the step between numbers of the series. On clicking the reset button all the three textfields are set to "" and the setselectedIndex value of combobox is set to Index -1 indicates that no item is selected.

The pattern that we found in the phrases was that each line had a palindrome hidden in it. This value by default is treated as a string and not as a number so it needs to be converted to long type and this is achieved using the parsetLog method. The value is then stored in the variable Number. Now in the next few chapters we will enhance our knowledge of NetBeans and delve further into programming concepts. NetBeans provides various components used to create a GUI front-end interface.

GUI components' appearance and behaviour is controlled by their properties and methods. We should use meaningful names for controls on the form and variables in the code.

It makes programming convenient. Some useful Data Types supported in Java are: int, double, char and boolean. String is an Object reference type supported in Java. A variable must be declared before it can be used.

What will be the output of the program given below. Which number is printed twice? What will be the value of total after the loop finishes execution. Explain the following terms: 7. What is a button group? Which control is generally used with a buttongroup.

Write and explain two methods each of check box and radio button. Design a GUI application in which the user enters a number in the text field and on clicking the button the sum of the digits of the number should be displayed in a label.

Design a GUI application to accept a String from the user in a text field and print using option pane whether it is a palindrome or not. Hint ABBA is a palindrome. Design a GUI application to accept the cost price and selling price form the user in two text fields then calculate the profit or loss incurred. Design a GUI application to accept a character in a text field and print in a label ifthat character is a vowel: a, e, i, o, or u.

The application should be case sensitive. Design a GUI application that repeatedly accepts numbers in a option pane and oncethe typed number is 0 the maximum and minimum of all numbers typed are displayed. Design a GUI application in java to convert temperature from Celsius to Fahrenheit or vice versa using radio buttons and two text fields 7.

Design a GUI application in java to convert kilograms into grams, litres into milliliters, rupees into paisa using combobox and text fields. A book publishing house decided to go in for computerization. The database will be maintained at the back end but you have to design the front end for the company. You have to accept book code, Title, Author and Quantity sold from the user.

ThePrice will be generated depending upon the book code. Net price should be calculated on the basis of the discount given. A networking company decided to computerize its employee salary. Develop an application to store employee's personal data which will be saved in the back end. Calculate gross and net salary. Students will visualize the details that have to be provided while creating a member registration for an e-reservation site.

Each team has to design a layout for the form. The team has to specify the following:Controls that will be used to develop the application. Data types of variables to be used. Validations to be performed while accepting the data.

Students will visualize the details that have to be provided while developing a domicile certificate for a student of class XII. The team has to specify the following:Controls that will be used to develop the application Data types of variables to be used. After studying this lesson the students will be able to:Understand the need of object oriented programming Define the various terms related to object oriented programming Identify the features of an object oriented programming language Use features of object oriented programming language to develop simple applications Over the last lesson, we have reviewed the core Java language.

We have learnt how to work with variables and data, perform operations on that data, make decisions based on the data and also loop repeatedly over the same section of code. Now we will move on to learn a concept that is central to Java, namely Object Oriented Programming. Object Oriented Programming is a very user friendly yet a powerful approach to solve basic to difficult problems.

The idea was created for developing a language that could be used for system description for people and system prescription as a computer program through a compiler.

There are several object-oriented languages. A student and a lady are travelling in a train. They get around talking and the lady decides to give a puzzle to the student. She tells him that she has 3 children whose product of ages is equal to the maximum number of runs possible to score in an over without any illegitimate ball being bowled i. NB, Wide, etc. Also, the sum of their ages is equal to her berth number. However, the student isn't able to answer. The lady then gives him a further hint that the eldest of her children has only one eye.

Without knowing the lady's berth number, can you guess the ages of her children? James Alexander is a resident of a developed nation and works as a freelance consultant. He is hired by one of the corporate houses of a developing nation to plan a strategy to improve production in one of their factories which is located in a remote village named Khabri.

The consultant decides to submit a quick action plan and so starts searching for information about the remote village. He has never visited any of the remote locations and so tries to simply imagine the problems faced by remote people.

Mohan Swamy is a resident of one of the developing countries and he also is a freelance consultant. He completed his studies from a top notch university and to actually put his theoretical knowledge to practice, he started staying in the remote village Khabri. He wanted to actually experience the hardships faced by people residing in remote areas. To sustain himself he decides to pick up a job in the only factory situated in Khabri. The HR manager impressed with his in-depth knowledge and qualifications requests him to also plan a strategy to improve production of their factory.

Who do you think will be able to provide a more viable solution? The obvious answer for most of us would be that the person sitting in the remote village and literate enough to solve the problem will be able to provide a better strategy because he closely understands the real problems of the residents as compared to a person sitting far away.

But what does this teach us about programming? Now, let us understand a little about the various programming paradigms. Computer programming is a process of designing, writing, testing, debugging and maintaining the source code of computer programs written in a particular programming language. The purpose of programming is to organize instructions that are capable of solving real life problems.

The process of writing source code of programs requires expertise in subject, knowledge of desired application domain, a formal logic and knowledge of syntax of the relevant programming language. Writing instructions in the desired order gives the required results from the program but when these instructions Introduction to Programming increase in number, it becomes extremely difficult for the programmer to debug, maintain or troubleshoot codes. For this reason, technology experts kept developing and introducing different programming paradigms and accordingly kept developing languages to support these paradigms.

Procedural programming paradigm was one of the major stepping stone for these experts which focused on breaking down a programming task into a collection of small modules known as sub routines or procedures. This paradigm helped the programmers to debug, maintain or troubleshoot codes in a more effective manner. The experts did not stop their research in improving this paradigm and introduced a new paradigm known as object oriented programming paradigm where a programming task was broken into objects.

The most important distinction is that where procedural programming uses procedures to operate on data, object oriented programming bundles data and methods together and operates as a independent entity of the program. Some languages support one particular programming paradigm while some are developed to support multiple programming paradigms.

Java supports only object oriented programming. Object Oriented Programming follows bottom up approach in program design and emphasizes on safety and security of data. It helps in wrapping up of data and methods together in a single unit which is known as data encapsulation. Object Oriented Programming allows some special features such as polymorphism and inheritance.

Polymorphism allows the programmer to give a generic name to various methods or operators to minimize his memorizing of multiple names. Inheritance enables the programmer to effectively utilize already established characteristics of a class in new classes and applications. The major components of Object Oriented Programming are as follows It helps the programmer to keep the data members in various visibility modes depending upon what kind of access needs to be provided in the remaining part of the application.

These visibility modes are classified as private, public and protected. Usually, data members of a class are kept in private or protected visibility modes and methods are kept in the public visibility mode. An object is an instance of a class that is capable of holding actual data in memory locations. Class and objects are related to each other in the same way as data type and variables.

For example, when we declare float variable named marks, the variable marks can be thought of as an object of type float which can be assumed as the class. If we take another hypothetical case in which Human is a class, Mr. Arun Shah, Mr. Aneek Ram will be the objects of this Human class. We have already learnt that a class contains data members and methods.

As discussed in the above example, Mr. Arun Shah is an object of class Human. The phone numbers retained by Mr. Arun Shah in his brain memory will be the data. His eyes, ears, nose and mouth can be considered as various methods which allow Mr. Arun Shah to collect, modify and delete data from his memory. In real java programming, this data will be required to conform to a specific data type as in char, int, float or double whereas the methods will be a sequence of steps written together to perform a specific task on the data.

The reason behind this is that because we cannot create objects of an abstract class, so we will not be able to provide any data to this class.

Therefore, there is no point of having a data member. Reusability of code saves money as well as time and increases program reliability. Inheritance is very useful in original conceptualization and design of a programming problem.

The idea of inheritance helps you to include features of already existing class debugged in a new class. A subclass inherits all the members data members and methods from its superclass. It is important to know that all Java Class 9 Maths Chapter 13 Exercise 13.7 Question Answer objects use inheritance and every Java object can trace back up the inheritance tree to the generic class Object. The most important distinction between Procedural and Object OrientedProgramming is that where Procedural Programming paradigm uses procedures to operate on data, Object Oriented Programming paradigm bundles data and methods together and operates as an independent entity of the program.

Class, object, data members and methods are the major components of an Object Oriented Programming paradigm. A class is used to encapsulate data and methods together in a single unit and an object is an instance of a class. Polymorphism is the ability of a method to execute in many forms. The extends keyword is used to inherit data members and methods of the base class and allows the derived class to use these methods.

Name any one native class of Java used in the above code. Name the object created of the above mentioned native class.

Identify and name two methods of the native class. Name the method used to convert one type of data to another and also mention the data type before and after conversion. The year is accepted as but displayed as 10 in the final format. Now we will move on to learn about two important classes we commonly use in Java -namely Math and String. The lesson focuses on how to use some of the popular methods of these classes appropriately and appreciate how they simplify many programming tasks for us.

Find a 9-digit number, which you will gradually round off starting with the number placed at units, then tens, hundreds etc. The rounding alternates down, up, down After rounding off 8 times, the final number is The original number is commensurable by 6 and 7, all the numbers from 1 to 9 are used, and after rounding four times the sum of the not rounded numerals equals If we take a hypothetical case in which human is a class, Mr.

Shah and Mr. Kumar will be the objects of this Human class. It is not necessary to import any package for the Math class because this is already in the Display the final result in the third text field using the setText method after converting it to string type using the toString method.

Next Class 9 Maths Chapter 1 Question Answer File let us learn the usage of another method of the Math class namely round. Observe the following form carefully. Figure 5. Now, add the following components on the form:One editable text field to accept the number to be rounded. Change the properties of the components so that the form looks exactly like the one displayed in Figure 5 Calculate the rounded number using the round method and store it in the variable RoundedNumber. Since the round method does not allow the user to specify the precision digits, so we first multiply the number by 10 for rounding off to 1 digit and similarly multiply by for rounding off to 2 digits and so on and then divide the result by 10 to get the closest double number.

The coding for the other radio buttons is similar. Next let us learn a few methods of another important class, namely String class, of Java. The String class includes methods for examining individual characters of a string sequence, for converting strings to uppercase or lowercase, for extracting substrings, for joining two strings together, for calculating the length of a string and also for creating a new string by omitting the leading and trailing whitespaces.

When using most of the String class's methods, it should be kept in mind that a string is just a series of individual characters and that each character has a position or index, a little like a queue. Remember that in strings the first position, or index, is labelled 0 and not 1.

Now that we know how to use the methods of the String class, let us next learn two more new methods -one to extract specified number of characters from a string and next to join two strings together. The aim of the application is to accept the First Name, Middle Name and the Last Name from the user and display his short name i.

First add a new JFrame form and set its title property to "Short Name". It is first joined together with LastName and then with a blank space after which it is joined together with variable FirstName, dot, variable Middlename and a dot again respectively using the concat method.

Finally, the content of the ShortName will be the LastName followed by the initials of the name entered by the user. Now, add the following components on the form:One editable text field to accept the SMS string Two non-editable text fields -one to display the number of characters entered by the user and the other to display how many more characters can be entered to reach the maximum allowed length Three labels -one against each of the text field to appropriately direct the user.

Change the properties of the components so that the form looks exactly like the one displayed in Figure 5. The next step is to associate code with the text field. Double click on the text field in the design window to reach the point in the source window where the code needs to be written.

Add the code as given in Figure 5. In this case, the SMS is retrieved from the text area instead of the text field. The rest of the code is exactly the same. Two non-editable text fields -one to display the number of characters entered by the user and the other to display how many more characters can be entered to reach the maximum allowed length.

Four labels -one against each of the two text areas and the two text fields to appropriately direct the user. Two buttons -one to truncate and display the SMS in the text area and the other to reset the form components. F2 will be concatenated at end of F1 and stored in F1.

F1 will be concatenated at end of F2 and stored in F1. F1 will be concatenated at end of F2 and stored in F2. F2 will be concatenated at end of F1 and stored in F2. What will be the contents of L after executing the following code?

Create an application to accept two strings -First Name and Last name from the user and display the message Welcome with the complete name of the user. AtLeftOf child [2] child[0]. InFrontOf child[2] child [2]. InFrontOf child [4] child [3]. AtRightOf child [2] child [4].

InFrontOf child [5] The algorithm given above is to form the shape of an arrow as depicted in the following figure: IntroductionAfter studying this lesson the students will be able to:State the need of saving data in the database Connect a GUI interface with data stored in database.

Use various methods to retrieve data from a database. A person wanted to withdraw X rupees and Y paise from the bank. But the cashier made a mistake and gave him Y rupees and X paise. Neither the person nor the cashier noticed that. After spending 20 paise, the person counts the money.

And to his surprise, he has double the amount he wanted to withdraw. Find X and Y. Obviously, you do not expect the user to learn all these commands to perform these activities. It facilitates interaction between different software programs similar to the way the user interface facilitates interaction between humans and computers. Remember, that this process has to be repeated every time you start a new project but not for new forms or applications added to an existing project.

Its getConnection method is used to establish a connection to a database. It uses a username, password, and a jdbc url to establish a connection to the database and returns a connection object. In case any of these libraries are missing, then the execution results in an error as shown in Figure 6.

Figure Class 8 Math Chapter 1 Question Answer For 6. The aim of the first application that we will develop is to add data into a table. The relevant command is shown in Figure 6. First add a new JFrame form and set its title property to "Contact List".

Now, add the following components on the form:Three editable text fields to accept the name, mobile number and email address from the user. Three appropriate labels -one against each of the text field to direct the user.

Change the properties of the components as learnt earlier so that the form looks exactly like the one displayed in Figure 6. The next step is to associate code with both the buttons. Double click on the buttons one by one in the design window to reach the point in the source window where the code needs to be written. Add the code for each of the buttons as given in Figure 6.

Table private Figure 6. DriverManager" ;In this step of the jdbc connection process, we load the driver class by calling Class. Once loaded, the Driver class creates an instance of itself. A statement object is used to send and execute SQL statements to a database. Note that the forName method is used to load the class specified as its argument at runtime. Note that Data validation is the process of ensuring that a program operates on clean, correct and useful data.

It uses routines, often called "validation rules" or "check routines", that check for correctness, meaningfulness, and security of data that are input to the system. A more sophisticated data validation routine may check to see the user has entered a valid country code, i. After executing the Contact List Application, if you need to verify whether the row has been added to the table or not, then you need not go back to the MySQL prompt.

Therefore, the content of the table can directly be tested by running SQL in Netbeans. To execute an SQL command in Netbeans perform the following steps:Step 1: In the Services tab, right click on the Databases and select the New Connection option from the drop down menu.

Provide the values as shown in the figure and click OK. Clicking on OK in the above dialog window adds the connection to the existing list as shown in the Figure 6. Note that this step is required to be done only once -the first time when creating a connection. This step is to be repeated every time you start Netbeans. The screen as shown in Figure 6. Now, type in any SQL to be executed on the database and execute the command.

The result is displayed in the bottom half of the window as shown in Figure 6. Add a few records to the table Contact created above. Now design the form as shown in Figure 6. Now, add the following components on the form:One editable text field to accept the mobile number from the user. Two non-editable text fields to display the details -Name and E-mail of the contact being searched.

Two buttons -one to search for the details on the basis of a mobile number supplied by the user and one to exit from the application. Observe the sample run of our next application as shown in Figure 6. Can you observe the difference in this application as compared to our previous one? A sample run of the validation check applied in the above application is shown in Figure 6. In case the above mentioned library is not imported then the error window is displayed as shown in Figure 6.

What will happen if we perform a search on Name? In this case there is a possibility that we may have more than one matching record. So the major difference between the two applications is that in the new application we will aim at performing a search in which multiple records may be returned. Observe the code given in Figure 6. This variable is initialized to 0 and is used to keep a track of how many matching records have been found.

Two appropriate labels -one against each of the radio button to direct the user. Three buttons -one to refresh data displayed in the table, one to reset the table and one to exit from the application.

Change the properties of the radio buttons, labels and button components as learnt earlier so that the form looks exactly like the one displayed in Figure 6. Before associating the code with the buttons, we need to customize the table component. These rows have to be deleted otherwise they appear as blank rows in the final output and the retrieved data is displayed from fifth row onwards.

Once the form has been totally customized, the next step is to associate code with all the three buttons. This variable will be sued to store the name of the table from which the data has to be retrieved. The value of the specified table is stored in the variable Tname and so this variable is concatenated with the normal SQL statement.

Data Connectivity Application 5: To Add Records in a Table Accepted Through a Form with Hindi InterfaceNow that we are clear about data connectivity, let us learn a new feature -to add multilingual support facility to our Netbeans form and database and then display records in our native language as shown in Figure 6. Adding this command while creating the database ensures that all tables created within this database support Hindi language processing.




21 Foot Bass Boat Trailer For Sale Zip
Model Steam Boat Kits 7.1
Vedantu Class 10 Maths Ch 7 Standard


Comments to «Class 5 Math Chapter 2 Question Answer Gif»

  1. 1818 writes:
    Little modifications; for exampleI went out dWG.
  2. MATADOR writes:
    Catch keep getting off before I land.
  3. BRATAN writes:
    Subjects instead of five with the CBSE and st ayles skiff.
  4. JESSICA writes:
    Alaska yellow cedar per hour against the doug.