Study Notes Class XII IP
Study Notes Class XII IP
Study Notes Class XII IP
Series
It is an amazing
visualization library
in Python that used
Pandas Series is a one- Jnbroduction ta for 2D plots of array
dimensional array that capable
of holding various data types Python Libraries
such asinteger, string, float etc.
aticcaal operations Matplotib
Addition
Selection
Deletion
Renaming
Operatriations on rowo DataFrame is a two dimensional
data structure i.e., data is
in a tabular form
aligned
along rows and
columns
An empty dataframe
From list of dictionary
Indexing
reate DataFrame
t a (i l
Iterating over
rows
This function returns the Iteration is a general term for
first n rows for the object taking each item of something
based on position one after another. In Pandas
DataFrame, we can iterate an Iterating over
element in two ways
This function returns last columns
n rows from the object
based on position
It represents categorical data with stick
like bars with height or lengths
proportional to the values of data
what they represent.
It is a representation of
data in graphical format
like bar, chart, pie-chart,
histogram etc.
It is an accurate
representation
the distribution of
Histogram auyad
numerical data in
the form of rectangle.
Data Visualization
easier. 8rouping
Instr () Returns the position of the
first occurrence of a
specified Math or mathematical functions
Lcase(O
Right () sub string from a given string accept numeric value, perform
These functions are used to
extract, change, format or alter
returns the specified number naticalfunctic
ctions some operations on it and also
return numeric value.
of characters from right
character string.
TPesyD
auyaC
Group by lause
Orderbyclause
Se
data in ascending
It is used to sort the
on one or
o r descending
order, based Having is applied to
It can be
more columns. summarised rows.
used only with the select|
statement.
A computer network is a
collection of independent
computerS and other
Bus Topology hardware interconnected
Star Topology Types It is the
arrangement
Mesh Topology
of
the terminals or work-
| by communication channels
that allow sharing of
Tree Topology stations of a
computer resources and information.
Ring Topology network.
Network topr
It acts as a centralised
connection to several
computers with the central
LAN node or server.
Typesof NetWor It isused to connect
devices of the network
LAN stands for local
into smaller
area nework, cover subsets of
LAN segments
upto one kilometer as Computer Networks
building or campus.
network. It covers
longdistance.
upto few kilometers
e.g. the houses and
colonies of a city
Ces
It converts digital| Network devices are the
signal to analo8 units that mediate data
signal and vice-versa in computer network and
Modem
also called network
equipments. Gateway It is used to connect
dissimilar networks.
8eographical area as
country or confinement.
VOIP stands for voice over internet
|It is a network of the
protocol that allows one to make
voice calls using a broadband | interlinked computer
internet connection instead of a networking worldwide,
which is accessible to the
regular phone line.
generalpublic.
Vebbrowser
It is a software application
for opening and reading
information in the world
Web
5
Ema URL
URL stand for uniform
resource locator, is a unique
wide web. E-mail stands for electronic identifier used to locate
mail, is a method of exchanging| resources on the internet.
digital messages from sender to
one or more recipients.
|Information life
cycle Management
Digital print
Netiquette
eyber Safety
It is the information about a
particular person that exists
eDigitalFootprint on the Internet as a result of
their online activity.
Proprietarylicense
Presenting someone
GNU general else's idea or work as
public license It is a document that one's own idea or work
is called plagiarism.
provides legally bonding |
guidelines for the use
and distribution of
software
End user license
Accidental
agreement
plagiarism
Direct plagiarism Mosaic
Self
plagiarism
plagiarismn
Creative commons license
It happens when someone steals
o u r personal information
to Criminal activities or offences
Commit fraud.
carried out in a digital environment
IT act or Information
Technology can be considered as cyber crime.
act is an act passed to check misuse
of cyber network and computer in
India. IT Act
Cyber law
Cyber Crime
It is law that applies | and 1T Act
Hacking
to the Internet and Internet
related technologies to
evaluate and panalize if a
Cyberbulying
person commits some cyber
frauds or crime.
Syntax
pandas.series (data, index, dtype, copy)
Mathematical Operations
We can perform matlhematical operation on series like addition, subtraction, multiplication, division
etc.
For this, various methods are used, as follows:
add(): This function is used to add series and others, element-wise (binary operator add).
Papers,
I N F O R M A T I C s
PRACTICES,
CES, ClasS X
c
Question
Sample axis=0)
OsWAAL CBSE
12 fill_
value=None,
but its default val,ae
other,
level=None,
float value is None
None o r
Series.add(self, is element-wise.
Syntax: fill_value
scalar value and other,
Here, other is
series or
get
subtraction of series axis=0)
function is used to fill_value=None,
other,
level=None,
and others, element-in.
rise.
Syntax: Series.div(self,
exponential power of series
is used to get
This function fill_value==None,
axis=0)
pow): level=None,
other,
Syntax: Series.pow(selt,
This function
returns data co.
Selection
function is used
for selection. thicnding orresp
Series.select() f u n c t i o n as an argument to
In series, n a m e of the
criteria. We pass the
to axis labels matching tables. The index labels satistying
the criteria
ted. on
are selected
object.
Syntax: Series.index
Question
Papers,
INFORMATICS
Uass- X
Sample It
data. to.
CBSE
OSWAAL numerical
of
14 distri
ution canAn be
distribution
probability
of the distribution.
A
Plotting Histogram accurate
representation
show a
is an used to
histogram are
A data.
Histograms
to represent
estimated using a
histogram plot.
details.
The graph
or plot should ha.have aproper
Customizing Plots with proper
o r graphs
the charts function
is used.
customise
ou can etc. graph title()
or
title, labels, legends tittle in
chart
a tittle: To add a
Adding
legend(loc
<matplotlib.pyplot>
Syntax
QUERY
UsING SQL
DATABASE
CHAPTER 3:
in the calculation
m:
Itis a base value calculation
n:Itis exponentvalue in the
raised to the nth power
This function returns m upwards or downwards
the number to the
function is used to round up
O ROUND() : This
number.
whichever the nearest whole
Syntax:
ROUNDnumber) can also pass that
number with certain number of decimal places, you
If you wants to get
number, and use following syntax.
ROUND (number, decimal place)
o MOD(): This function is used to return the remainder of one expression by dividin8
another expression.
Syntax:
MOD(n, m)
Parameter:
n:number to be divided by m
m:numberthatwill divide n
s usedin
Text Functions
MySQL text functions manipulate the character string data effectively. Some text functio
MySQL are as follows: u p p e rc a s e
Syntax:
MID(str, pos, len)
SUBSTRING()/SUBSTR(): These function are same as MID() function.
Syntax:
SUBSTRTING(str, pos, len)
the
LENGTH(): This function is used to return the length of the specified string. It returns
length in bytes. This function also includes all the blanks spaces which are include in string.
Syntax:
LENGTH(str)
the left of the
LEFT() : This function is used to return a specified number of characters from
string. The number of characters returned is determined by the second argument.
Syntax:
LEFT(str, len)
RIGHT(): This function is just opposite of LEFT() function. It is used to return a specified
number of characters from the right of the string. The number of characters returned is
determined by the second argument.
Syntax:
RIGHT(str, len)
INSTR(): This function takes two arguments as str (string) and sub_str (sub string) and returns
the position of the first occurrence of a specified sub_str from a given str.
Syntax:
INSTR( str, sub_str)
LTRIM(): This function takes a string argument and returns a new string with all the leading
space characters removed. Spaces in the middle or trailing spaces are not removed.
Syntax:
LTRIM(str)
RTRIM() : This function takes a string argument and returns a new string with all the trailing
space characters removed. Spaces in the middle or leading space are not removed.
Syntax:
RTRIM(str)
TRIM(): This functions enables you to remove leading and trailing white space from string.
Syntax
TRIM(str)
Date Functions
The date functions are used to perform some operations on date that is stored in the database.
Some common date functions are as follows:
D NOW): This function returns the currentdate and time in the configured time zone as a
string,or a number in the 'YYYY-MM-DD HH: MM: SS' or "YYYYMMDDHHMMSS' format.
Syntax:
NOW()
OSWAAL CBSE
Sample
Question Papers,
INFORMATICS
PRACTICES, Clae.
Class-X
date.
16 value from a
extracts the date
DATE(): This function
Syntax: to 12 for Jan.
DATE()
This function
returns the month for date, in
the range 1
date contains
NULL. [anuary to
MONTH( ) :
r e t u r n s 0 then
month part of the given
December. If it
Syntax:
MONTH(date)
returns the full name of the month for given date.
This function
a MONTHNAME():
Syntax:
MONTHNAME(date)
the given date. It returns a year
value in the ran
the range
o YEAR(): This function
returns the year of
is it returns 0.
1000 to 9999. If the date zero,
Syntax:
YEAR(date) date. If the date argumentis zero
returns the day of the month of a given ero,
DAY(): This function this function returns NULL.
date in NULL,
it returns 0. In case, the
Syntax
DAY(date)
Aggregate Functions
A n aggregate function performs a calculation on one
or more values and returns a single value.
W e often use aggregate functions with the GROUP By and HAVING clauses of the SELECT statement
Except for count("), aggregate functions totally ignore NULL values and consider all values present in
a column.
Some aggregate functions are as follows:
MAXO This function returns the maximum value in selected columns. MAX) function ignores
NULL values and considers all values in the calculation.
Syntax:
SELECT MAX(Column_Name) FROM Table_Name;
MIN): This function returns the minimum value in the selected columns. MIN() function ignores
NULL values
Syntax:
SELECT MIN(Column_ Name) FROM
Table_Name;
AVG0:This function calculates the average of specified column(s). It ignores NULL values.
Syntax:
SELECT AVG(Column_ Name) FROM Table_Name;
SUM) : This function calculates the sum of all values in the
expression that evaluates to numeric values specified columns.
also.
It accepts only the
Syntax:
SELECT
SUM(Column_Name) FROM
Table_Name;
COUNT): This function returns the number
COUNT(") function returns a number of rows of items found in a
in a
set.
of
duplicates and NULL values. specified table or view that includes the mber
Syntax: nu
SELECT COUNT(") FROM
GROUP BY Clause Table_Name;
GROUP BY clause is used to
columns. group rows
returned by SELECT statement into a
Syntax: speciieu
SELECT column 1,
column 2,..,
FROM Table_Name Aggregate _function (exp)
WHERE condition
GROUP BY Column_Name;
On Tips Notes
ORDER BY Clause 17
ORDER BY clause is used to sort a result set returned by a SELECT statement.
Tosort a result set in
keyword.
ascending order, use ASC keyword and in
descending order, use DESC
The ORDER BY clause sorts the result
set in
Syntax: ascending order by default.
SELECT column 1, column 2, ..
FROM Table_Name
ORDER BY
>
Column_Name <ASC/DESC>;
HAVING Clause
The HAVING clause is
often used with the GROUP BY
group of rows based on a clause in the SELECT statement to filter
specified
condition.
Syntax:
SELECT column 1, column 2,
FROM Table_Name
..,
Aggregate_ function (Exp).
GROUP BY Column_ Name
HAVING condition;
erconnected
Each compute
Bus Topology: It u s e s a c o m m o n single
cable to connect all the worKStations.
of the central server. However, nputer reform
only one
t s task of sending messages without the help
the bus topology.
Workst
can transmit a message at a particular time in
on a central connection
which acts as a hub. A
star
topology is
Star Topology: It is based
home networks where all the computers connect to the single central computer using a mmon in
hub.
Tree Topology: It combines the characteristics of the linear bus and star topologies. It c
groups configured workstation connected to
ot star
a bus backbone cable. consists of
device is connected to every other device on tho. ne
Mesh Topology: In this topology, each we say dedicated, it
means that the
link onlor
through a dedicated point-to-point link. When s
data for the two connected devices only
Internet
The Internet is world wide system of computer networks i.e., network of networks. Throuch:
computers become able to exchange information with each other and find diverse perspective enet,
from a global audience. All computer on the Internet, communicate with one another using TCP
which is a basic protocol of the Internet. TCP/IP,
URL
URL stands for Uniform Resource Locator. It is a unique identifier used to locate a resource on t
Internet. It is also referred to as a web addresses. the
URL protocols include HTTP (Hypertext Transfer Protocol) and HTTPs (HTTP secure) for-
resources, SMTP for email, FTP for files on a file transfer protocol server and telnet for sessionweb
fn
access remote computers.
World Wide Web (Www)
The world wide web is a way of exchanging information, between computers on the Interne
typing them together into a vast collection of interactive multimedia resources.
The development of the world wide web was
begun in 1989 by Tim Berners-Lee and his
at CERN, an international scientific organization based in Geneva, Switzerland. colleagues
World wide web had several differences from other
The web required only unidirectional links rather thanhypertext systems available at that time.
bidirectional ones, making it possible for
someone to link to another resource without action
Web
by the owner of that resource.
Web is the common name for the World Wide
that can be accessed by a web browser.
Web, a subset of the Internet consisting of the pages
Many people assume that the web is the same as the Internet and use these terms
However, the term Internet refers to the interchangeaby
sharing, over the web possible. global network of servers that makes the intormato
E-mail
E-mail stands for Electronic Mail. It is a
audio files from one place to another
even
paperless method of sending messages, notes, picturc and
internet.
software. downloaded chat proga
browser based services that do
not require
in addition, there
manyare
Web Hosting
A web hosting is a type of Internet hosting service that allows individuals and organizations to
make their website accessible via world wide web. Web hosts are companies that provide space on
a server. Owned and leased for use by clients as well as providing Internet connectivity, typically
in a data center.
Web Browser
A web browser or simply browser is special software that enables the users to read/view webpage
and jump from one webpage to another. It displaysa webpage and interprets its HTML codes. Itis
the software that is needed to find, retrieve, view and send information over the Internet.
OsWAAL CBSE Sample Question Papers, INFORMATICS PRACTICES, CIace
20 ss -XI
Add-onss
Add-ons are tools which integrate into your browser. They are similar to regular apps or proo
but only run when the browser runs. Add-ons can allow the viewingof certain types of web eams
web content,
such as Adobe Flash player for youtube videos efc.
Add-os can work within the framework of the browser provided or they can provide sen
Digital Footprint
Whatever a person be on internet creates his usage or we can say left a shadow behind of that
activity and all these activities shadow creates your identity, this identity is called digital footprint
Digital footprint is nothing but the record of what a person do online.
Digital footprint includes e-mail you sent, information you shared, websites you visited and the
activities you took part online.
Digital footprint is of two types:
1. Active Digital Footprint: When a user knowingly share the personal data in order to share
information about the user by means of social networking digital platform. e.g. when user makes a
comment or post something on social media.
2. Passive Digital Footprint: When the personal data of the user in collected without letting him
know or collection of personal data of user without the
permission of him is known as passive
digital footprint. e.g. when user visits any website traces his physical location using user's device lP
address.
Net and Communication Etiquettes (Netiquettes)
Netiquette is a way to communicate over Internet. In real world, we use a manner to talk so that
the exact meaning could successfully convey to the listener. On Internet, this manner is known as
Netiquettes which help the user to get exact idea of what is said.
Netiquettes makes the communication process successful because without it sender's messageta
be misinterpreted by the receiver
though he will not be able to see the facial expression or u
sender.
Netiquettes makes the communication more effective by adding human emotion to it. By ng
netiquettes, sender can express what he was feeling while writing the
post or message.
Netiquettes help the user in establishing good relation with the other users because use
short, you should be able to decide whether or not you want compromise hhas
access to it, for how
toshare some information
Ame
long, for what reason more
and be able to
modify some of this
informatio
On Tips Notes
21
A
large partorof a dataprotection strategy is ensuring that data can be restored quickly
COrrupton loss. Protecting data from compromise and after any
COmponents of data protection. There ensuring data privacy are other
Key
are two key areas of data
as: management used in data protection
D a t a ite cycle management is the process of automating the movement of critical data to
online and offline
storage.
(11) Information life cycle
management is a comprehensive strategy for valuing,
protecting information assets from cataloguing ana
application and user errors, malware and virus dulaho,
machine failure or
Ethical-Issues
facility outage and disruptions.
Intellectual Property
When someone owns a house or a
if someone comes motorcycle, we say that the person owns that property. Similariy,
out with a new
idea,
this original idea is that
person's intellectual property.
Intellectual property refers to the
inventions, literary and artistic
of such concepts lies with expressions, designs and symboIs,
names and
logos. The
intellectual property. ownership the creator or the holder of the
Intellectual property is legally
protected through
(i) Copyright: It grants legal rights to creators forcopyright patents, trademarks etc.
their original works like writing,
recordings, video, sculptures, architectural works, computer photograph, audio
literary and artistic work. software, and other creative works
like
alternative to paper based methods of communication and storage of information, to facilitate electronic filling
of document with the Government agencies and further to amend the lndian Penal Code, the Indian Evidence
Act1872, the Banker's Book EvidenceAct, 1891 and The Reserve Bank ofIndiaAct, 1934 andfor matters connected
therewith or incidental thereto.
Technology and Society
E-waste Management
In most part of the world, underground water is not drinkable directly. Long ago, people simply
used to draw up water from wells and drink it. But now, you have to use some sort of filter to purify
the water and make it drinkable. Why? It is just one of the many problems and hazards of e-waste.
The electronic devices, dead cells and batteries you throw away with other garbage contains lead
that easily mixes with underground water, makingit unfit for direct consumption. That is just the
tip of the iceberg - the problems of e-waste disposal
This word has caught up in the recent past only when someone studying the subject noted that our
environment will be 3x more congested with e-waste by 2017. E-waste is growing in huge volumes.
The reason why e-waste is increasing is that technology is growing fast and in an attempt to get
better devices, we casually get rid of old electronics- the best examples being that of smart-phones.
Treating e-Waste
As of now, there are no proper methods being implemented even in the first world to eliminate the
problem of e-waste. The two methods that found interesting for proper treatment of e-waste are
recycling and refurbishing.
For recycling, there may be products that cannot be recycled completely. PVC layers, for example,
stay as such for ages and cannot be recycled. It would be better if the manufacturers use recyclable
material so that the e-waste is converted into something that can be used again without harming
the planet and its inhabitants. Thus, one of the major factors in treating e-waste is to compel
manufacturers to use green elements.
For detailed
Revision Notes