0% found this document useful (0 votes)
195 views24 pages

Computer Science Q&A: Structures & OOP

The document contains a series of questions and answers related to Computer Science topics for Class XII, covering various chapters including data structures, object-oriented programming, web development, and databases. Each chapter includes multiple-choice questions and fill-in-the-blank statements designed to test knowledge on specific concepts. It serves as a study guide for students preparing for exams in Computer Science.

Uploaded by

sushan11224
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
195 views24 pages

Computer Science Q&A: Structures & OOP

The document contains a series of questions and answers related to Computer Science topics for Class XII, covering various chapters including data structures, object-oriented programming, web development, and databases. Each chapter includes multiple-choice questions and fill-in-the-blank statements designed to test knowledge on specific concepts. It serves as a study guide for students preparing for exams in Computer Science.

Uploaded by

sushan11224
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

Join Now: [Link] Downloaded from [Link]

in ®

One Score Questions and Answers


XII COMPUTER SCIENCE

Chapter 1
1. A ____ is a collection of logically related data items of different data types under a
common name.
2. The keyword to create a structure is _______

IN
3. The operator used to access structure elements using structure variable is
_______
4. Which of the following is a user defined data type in C++?
a. Array b. double c. Function d. Structure

E.
5. A structure inside another structure is called ________
6. A structure which contains a pointer of its own type is called _________
7. A variable which can store the address of another variable is ______
8. The operator used to get the address of another variable is ______
IV
9. Which of the following is indirection or dereference operator or value at
operator?
a. % b. $ c. & d. *
10. Two types of memory allocations are ______and ______
L
11. The operator used for dynamic memory allocation is _______
12. The operator which deallocates or free the memory is _______
SS

13. The situation when there is huge loss of memory due to orphaned memory blocks
is known as ________
14. The array created during run time with the help of new operator is called ______
15. Which of the following statement is used to declare a pointer variable?
a. int &a; b. int *a; c. int **a; d. int a&;
H

16. Which of the following user defined data type is usually used to create a linked
list?
a. Array b. Pointer c. Structure d. Self-referential Structure
17. int *ptr; ptr=new int(10); Which type of memory allocation is used here?
18. Which of the following statement used to create a dynamic array with size 5?
a. int arr[5]; b. int *ptr[5]; c. int *ptr=new int[5] d. int *ptr=int[5]
19. Which of the following statements is an example for dynamic deallocation?
Hint: ‘p’ is a pointer variable.
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

a. delete *p; b. delete &p; c. delete p; d. delete p*;


20. Which operator is called ‘value at’ operator?
a. & b. $ c. @ d. *
Chapter 2

1. Full form of OOP is _______


2. Full form of POP is ________

IN
3. Collection of similar objects is called _______
4. An ______ is an instance of a class.
5. If bird is a class, then parrot is an ________
6. A blueprint of an object in OOP is called a ______

E.
7. The functions associated with a class are called _______
8. The variables declared inside the class are known as _______
9. Showing only the essential things by hiding the details is called _______
10. Wrapping up of data and functions as a single unit is called ______
IV
11. Large programs are divided into small modules so that they can be solved easily.
This process is called ______
12. The ability of a class to inherit properties from a parent class is called _____
L
13. The ability of a programming language to process objects differently is called
_____
SS

14. Two types of Polymorphisms are ______ and ________


15. Function overloading is an example of ______ polymorphism. Compile
16. When one class is derived from only one parent class, then it is called _____
17. When one class is derived from more than one parent class, then it is called
______
18. When more than one class is derived from a single parent class, then it is called
H

_____
19. A class is derived from one class which itself is derived from another class, then it
is called ______
20. C++ is a ______ language
21. Which of the following is not a property of OOP?
a. Inheritance b. Polymorphism c. Importance is given to procedured.
Importance is given to data
22. Default access specifier in a class is _______
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

23. Three sections inside a class are ______, _______ and ______
24. A base class is also called _______
25. A sub class is also called _______
26. In OOP _____ is given more importance.
27. In POP _____ is given more importance.
28. Two types of polymorphism is ______ and _______
29. Operator overloading is ______ type of polymorphism.
30. Which type of polymorphism is called late binding.

IN
Chapter 3
1. Logically related data items that can be processed as a single unit is called ____
2. The data structure which follows FIFO principle is ________

E.
3. The data structure which follows LIFO principle is ______
4. Full form of LIFO is _______
5. Full form of FIFO is ________
6. Visiting or processing each and every element of a data structure is called ______
IV
7. Finding an element in a data structure is called _____
8. Arranging elements in a data structure in some order is called ______
9. Combining two data structures is called _______
10. Inserting a new element into a Stack data structure is called _____
L
11. Removing an element from a Stack data structure is called ______
12. A special type Queue data structure in which two end points meet is called _____
SS

13. A ___ is used to create a Linked list.


14. The node of a Linked list has two parts namely _____ part and ______ part.
15. The Start or Header in a Linked list contains _________.
16. The limitations of a linear queue are avoided in ______ queue.
17. If we try to insert a new element in a full stack, the situation is called _____
H

18. If we try to remove an element from an empty stack, the situation is called ___
19. A linked list is usually created by ______ data type.
20. If a node in a linked list is not pointing to any other node, then its link part
contains the ____ value.

Prepared by Sai Prakash for [Link]


Join Now: [Link] Downloaded from [Link] ®

Chapter 4

1. A ________ is a powerful computer which is always switched on and connected to


a high bandwidth Internet connection.
2. A _______ is a dedicated physical location where organizations house their servers
and networking systems.
3. Full form of FTP is ________
4. Full form of HTTP is _______

IN
5. Full form of HTTPS is _______
6. Full form of SMTP is ______
7. The port number of HTTP is _____
8. The port number of HTTPS is _____

E.
9. The port number of SMTP is _____
10. The port number of DNS is _____
11. The IP address of a domain name(website) will be given by ______
12. The number of bits in a software port number is _____
IV
a. 8 b. 16 c. 32 d. 64
13. ________ are program codes written inside HTML pages
14. The tag used for inserting script in HTML is _______
15. A client-side scripting language is ______
L
a. PHP b. JavaScript c. VB Script d. ASP
16. The web pages that remain the same until their code is changed manually are
SS

called ______.
17. Name two technologies that can be used to develop dynamic web pages.
18. ______ are the commands used in the HTML.
19. An attribute of <HTML> tag is _______
20. Choose an empty tag from the following:
H

a. <BODY> b. <HTML> c. <HR> d.<HEAD>


21. Full form of HTML is __________.
22. The type of tag that requires only a starting tag but not an ending tag is called
______
23. Which tag is same as <B> tag?
24. Which tag is same as <EM> tag?
25. Pick the odd one out from the following:
a. HTML b. ALIGN c. HEAD d. CENTER
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

26. Which tag will display the content as we entered in the text editor?
27. The tag used to insert scrolling text in a web page is _______
28. Which tag has the attribute Loop?
29. The tag is used for defining a section or a block in the document is _____
30. _______ is the main attribute of <IMG> tag.
31. Port number of POP3 is _______
32. GWS stands for ______
33. Two types of web pages are _____ and _____
34. Which type of web page never use database?

IN
35. ____ and ____ are the attributes of <SCRIPT> tag.
36. Which heading tag is used for smallest heading?
37. Pick the odd one from the following?
a. <B> b. <BR> c.<H1> d.<HEAD>

E.
38. HTML code to display A2B3 is _____
39. The ____ tag is used for short quotation and ____ tag is used for long quotation.
40. ____ tag is used for displaying contact information in a webpage which is normally
displayed in italics when the page opens.
IV
Chapter 5
L
1. The main tag used for ordered list is ______
2. The main tag used for unordered list is _____
SS

3. The main tag used for definition list is ______


4. Which tag has the attribute Start?
5. A list inside another list is called _______
6. The tag used for hyperlinking is ______
7. The main attribute of <A> tag is ______
H

8. Two types of hyperlinks are ____ and ______.


9. Full form of URL is ______
10. Which protocol is used in e-mail hyperlink to a web page?
11. The tag used for inserting music and video in a web page is ______
12. Cellspacing and Cellpadding are the attributes of _____ tag.
13. Give any two attributes of <TR> tag
14. Which tag is used to divide the browser window into two or more?
15. The form controls are determined by the ______ attribute of <INPUT> tag.
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

16. Maxlength is the attribute of ___ tag.


17. Multiple line of text can be entered using _____ tag.
18. Name the tag used within <FORM> tag to input data
19. The two methods of sending data through the forms is _____ and _____
20. Action is the attribute of ______ tag.
21. Which of the following tags has no Bgcolor attribute?
a. <TABLE> b.<TR> c.<TD> d.<FRAME>
22. If a browser does not support Frame, then a message can be displayed using ____
tag.

IN
23. Which tag is used to group related data in a form?
24. Method attribute of <FORM> tag has values ____ and ____
25. If a browser cannot display audio or video, a warning message can be displayed
using ____ tag.

E.
Chapter 6
1. JavaScript is ______ side scripting language.
IV
2. The keyword to create a variable in JavaScript is ______
3. The data types in JavaScript are _____, ______and _______
4. If a=”5” and b=3 then a+b will be _____
5. If a=”5” and b=3 then Number(a)+b will be ______
L
6. If a=”WELCOME”, b=[Link](2) the value of b will be_____
7. A pre-defined function in JavaScript to display a message is _______
SS

8. If x=”hello”, y=[Link](), then the value of y will be _______


9. The tag used to insert a script in HTML page is _______
10. An attribute of <SCRIPT> tag is ________
11. If a=”computer”, b=[Link], then the value of b will be _____
12. Predict the output of isNaN(“123”)
H

13. Predict the output of isNaN(“abc”)


14. Predict the output of isNaN(“a123”)
15. The function to convert capital letter to small letter is ________
16. In JavaScript, var a; a = ”true”; then the data type of ‘a’ is _____
17. In JavaScript, var a; a = true; then the data type of ‘a’ is _____
18. In JavaScript, var a; a = -0.00254; then the data type of ‘a’ is _____
19. The output statement in JavaScript which display output in a new window is ___
20. A multi-branching statement in JavaScript is ____
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

Chapter 7

1. The process of uploading the web pages into the web servers so that it is available
in Internet is called ________.
2. The type of web hosting useful for government organizations and big companies is
_________
3. The type of web hosting useful for schools, colleges and offices is _________
4. Hosting which involves no cost is called ________.

IN
5. The database which contains all the domain names is known as __________.
6. An ________ is used to store the IP address of a web server connected to a
domain name
7. Full form of VPS is _______

E.
8. If the client is allowed to place their own purchased web server in the service
providers facility, then it is called _________
9. An FTP client software is ________
10. Full form of CMS is ____________
IV
11. Example of a CMS software is ________
12. The technology by which the website is automatically adjust to the size of the
viewing screen like mobile phone, laptop or TV is called ________
L
13. Responsive web design can be implemented using _______ and ________.
14. Joomla is _____ type of software.
SS

15. An example of a software that is used for making a virtual server for VPS hosting
is _______.
16. In which type of web hosting, a web server is logically partitioned into more than
one server and each is given users for hosting.
17. _______ is a non-profit organization that coordinates the Internet's core
H

infrastructure, including domain names and IP addresses, ensuring a stable,


secure, and unified global Internet.
18. Full form of ICANN is ______
19. Using _____ a person with limited knowledge in web designing can develop and
publish webpages or website.
20. Full form of SSL is ______

Prepared by Sai Prakash for [Link]


Join Now: [Link] Downloaded from [Link] ®

Chapter 8

1. Full form of DBMS is ____________


2. The storing of the same data in multiple locations is known as _______
3. Full form of DBA is ________
4. The person who has full control over database is called_______
5. A _____ is the smallest unit of stored data.
6. A ________ is a collection of related fields.

IN
7. A ______ is a collection of records.
8. Which is the most internal level of abstraction?
a. Logical level b. Physical Level c. View Level
9. Which database level is closest to the users?

E.
a. External b. Internal c. Physical d. Conceptual
10. Clerical staff in an office, billing clerk in a supermarket or hotels, bank clerk, etc.
are examples of ____ users.
a. Sophisticated user b. Application programmer c. Naïve user
IV
11. Who changes the structure of a database?
12. ________ interacts with the database through the prewritten application
program.
L
a. Sophisticated user b. Application programmer c. Naïve user
13. Full form of RDBMS is _______
14. An _____ is a person or a thing in the real world that is distinguishable from
SS

others.
15. ________ is a collection of data elements organized in terms of rows and
columns.
16. The rows (records) of a relation are generally referred to as ______.
17. The columns of a relation are generally referred to as ________.
H

18. The number of attributes in a relation determines the ________ of a relation.


19. The number of tuples in a relation determines the _______ of a relation.
20. A ______ is a pool of values from which actual values appearing in a given
column are drawn.
21. The description or structure of a database is called the database ________.
22. An _________ of a relation is a set of tuples in which each tuple has the same
number of fields as the relational schema.

Prepared by Sai Prakash for [Link]


Join Now: [Link] Downloaded from [Link] ®

23. A _______ key is one of the candidate keys chosen to be the unique identifier for
that table.
24. A candidate key that is not the primary key is called an _________ key.
25. A key in a table can be called ________ key if it is a primary key in another table.
26. The ______ operation selects certain attributes from the table and forms a new
relation.
27. _______ operation is a binary operation and it returns a relation containing all
tuples appearing in either or both of the two specified relations without
duplication.

IN
28. __________ operation is also a binary operation and it returns a relation
containing the tuples common two both the relations.
29. How many distinct tuples are there in a relation with cardinality 15 and degree
10?

E.
a. 15 b. 10 c. 25 d. 150
30. A file manipulation command that extracts some of the records from a file is
called
a. SELECT b. PROJECT c. JOIN d. PRODUCT
IV
31. Degree of a table with 10 rows and 6 columns is ______
32. Suppose table A has 5 rows and 3 columns, table B has 6 rows and 4 columns.
Then the number of rows and columns in the output of AxB (Cartesian product)
L
will be ____ and _____
33. Cartesian product in relational algebra is ______
(Unary operator, Binary operator, Ternary operator)
SS

34. Which of the following is a unary operator?


(Union, Intersection, Select)
35. If table A contains 10 records and table B contains 8 records, then the minimum
number of records in AꓵB is ______
36. Data about data is called ______
H

37. In the ______ model, data is organized as tables.


38. Which of the following fields cannot be a primary key of a table?
a. Admission number b. Adhaar Number c. Register Number d. Age
39. Organization of data in rows and columns is called ______
40. ______ in a table gives the complete data of a particular entity.

Prepared by Sai Prakash for [Link]


Join Now: [Link] Downloaded from [Link] ®

Chapter 9

1. Full form of SQL is ______


2. Full form of DDL is ______
3. Full form of DML is _______
4. Full form of DCL is _______
5. Revoke and Grant are _______ commands
b. DDL b. DCL c. DML
6. CREATE TABLE is a _______ command.

IN
a. DDL b. DCL c. DML
7. UPDATE is _______ command.
a. DDL b. DCL c. DML
8. DROP TABLE is a _______ command.

E.
a. DDL b. DCL c. DML
9. The command to remove a record from a table is _______
10. The command to remove a table is __________.
11. The command to change the structure of a table is ________.
IV
12. The command to modify the records in a table is _________.
13. The command to enter records into a table is ________.
14. Which keyword is used to eliminate duplicate records from the output of a SELECT
L
command?
15. Which of the following is an aggregate function in SQL?
a. MIN() b. TOTAL() c. HIGHEST()
SS

16. Which clause is used for sorting the records of a table?


17. The column constraint which will not allow blank or white space in a field is
______
18. The column constraint which will not allow duplicate value for a field is _______
19. Which of the following is not a data type of SQL?
H

a. INT b. DEC c. LIKE d. CHAR


20. The command to display records from a table is ______.
21. While displaying records from a table _____ eliminates duplicate values in column.
22. The special operator used for pattern matching in records is ______
23. Which clause is normally used along with GROUP BY clause?
24. A _____ is a virtual table which is not really existing but it is derived from one or
more base tables.
25. A query which contains another query is called ______
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

26. In SQL query statement, ______ character id used for multiple character pattern
matching.
27. In SQL query statement, ______ character id used for single character pattern
matching.
28. An SQL data type which can save memory while dealing with character date is ___
29. The RDBMS software used in higher secondary curriculum is _____
30. Which command is used to open a database file?

Chapter 10

IN
1. Full form of PHP is ______
2. Three output statements in PHP is ______, _______ and _______.
3. Data types of PHP is broadly divided into ______ and ________.

E.
4. Array is _____ data type in PHP
5. Boolean is a _____ data type in PHP
6. Null is _____ data type in PHP
7. Variables in PHP starts with the special symbol ______
IV
8. PHP file has file extension _______
9. Types of arrays in PHP are _____, ______ and ______.
10. Concatenating operator in PHP is _______
11. PHP will consider a variable as ______ if we do not use it.
L
12. PHP is ______ type of scripting language.
13. _____ statement is little bit faster than print statement in PHP.
SS

14. Concatenating assignment operator in PHP is ____


15. ______ is a looping statement in PHP when we work with an array of unknown
number of elements.
16. In PHP, the tier1 deals with ______
17. In PHP, the tier2 deals with _____
H

18. In PHP, the tier3 deals with ______


19. Predefined global arrays in PHP are called _____
20. ______ method is the more secure for sending data from form to web server.
21. Full form of LAMP is _____
22. Full form of WAMP is _____
23. PHP files are saved with extension ____
24. Single line comments in PHP starts with ______
25. Multi-line comments in PHP stars with ____ and ends with ___.
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

Chapter 11
1. Single processor is used in ______ computing.
2. Multiple processors are used in ______ computing.
3. ______ computing is described as world in which computational power is readily
available like electric power.
4. In _____ computing a group of personal computers and storage devices are linked
together.

IN
5. In ______ computing Internet and other web servers are used for storing data and
applications.
6. Three cloud service models are ______, ______ and ______
7. Who proposed Turing test?

E.
8. Full form of NLP is ______
9. The study of control and communication between man and machine is called
_____
10. The study of adaptive mechanism to facilitate intelligent behaviour in complex
IV
and changing environment to solve real life problems.
11. Full form of EC is ______
12. Swarm intelligence is a _____ paradigm.
13. Identification of human characteristics and traits is called ______
L
14. A scientific study associated with the design, fabrication, theory and application
of robots is called _______
SS

15. Full form of ASR is ________


16. Full form of GIS is ________
17. Computer vision is an application of ______
18. Fuzzy system is a _____ paradigm.
19. The term Artificial Intelligence is coined by _______
H

20. A measure of uncertainty in human observations is generally called ______


21. Google Drive ____ type of cloud service model.
22. Google Docs is ____ type of cloud service model.
23. [Link] is ____ type of cloud service model.
24. Top most area of knowledge pyramid is _____
25. The ability to draw useful interferences from available knowledge is called ___

Prepared by Sai Prakash for [Link]


Join Now: [Link] Downloaded from [Link] ®

Chapter 12
1. ICT stands for __________
2. Application of ICT for delivering government services to citizens in a convenient
and efficient manner.
3. Types of interactions in e-Governance are ____, _____, ______ and _____
4. Full form of CSC is _______
5. Full form of SDC is _______
6. Full form of KSWAN is ______
7. Full form EPS is ______

IN
8. A system of financial exchange between buyers and sellers in the online
environment is known as ________.
9. Use of electronic media and ICT in education is termed ________
10. Which of the following is not an e-Learning tool?

E.
a. e-Text b. Online chat c. e-book reader d. e-mail
11. An educational TV channel is _______.
12. Full form of IPR is _____
13. Full form of WIPO is ______
IV
14. An exclusive right given for an invention is _______
15. A distinctive sign or logo that identifies a product or service is termed ______
16. A legal right given for the creator of an original work is ________
L
17. Unauthorised use of intellectual property rights such as patent, trademark etc. is
called _______
SS

18. A virtual environment created by computer systems connected to Internet is


called ________
19. Criminal activity using computer, mobile phone etc. in Internet is called _______
20. Cyber terrorism is a cyber crime against ________
21. Stealing one’s information such as password and user name is called ______
H

22. An excessive enthusiasm for acquiring knowledge is _______


23. The process of using scientific knowledge for identifying, collecting, analysing and
presenting evidence of cyber crime Infront of court is _____
24. Internet time theft is a crime against _______
25. Which of the following is NOT a crime against individual?
a. Harassment b. Impersonation and cheating c. Credit card fraud d.
Violation of privacy
26. IT act came into existence in India in the year ____

Prepared by Sai Prakash for [Link]


Join Now: [Link] Downloaded from [Link] ®

27. Copying another person’s language, thoughts and ideas and presenting them as
one’s own work is called ______
28. Cyber terrorism is a type of _____ cyber crime.
29. _______ is known as an excessive enthusiasm for acquiring knowledge.
30. The right way of using and working with cyber world is generally called ___

Answer Key

IN
Chapter 1

1. Data structure
2. struct

E.
3. Dot (.)
4. Structure
5. Nested structure
6. Self-referential structure
IV
7. Pointer variable
8. &
9. *
10. Dynamic and Static
L
11. new
12. delete
SS

13. Memory Leak


14. Dynamic array
15. B
16. Self-referential structure
17. Dynamic memory allocation
H

18. int *ptr=new int[5];


19. delete p;
20. *

Chapter 2
1. Object Oriented Programming
2. Procedure Oriented Programming
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

3. Class
4. Object
5. Object
6. Class
7. Member function
8. Data members
9. Abstraction
10. Encapsulation
11. Modularity

IN
12. Inheritance
13. Polymorphism
14. Compile time polymorphism and Run-time polymorphism
15. Compile time polymorphism

E.
16. Single Inheritance
17. Multiple Inheritance
18. Hierarchical Inheritance
19. Multilevel Inheritance
IV
20. OOP
21. c
22. Private
L
23. Private, Public and Protected
24. Parent
25. Child
SS

26. Data
27. Procedure
28. Static (compile-time) and Dynamic(run-time)
29. Static or Compile-time
30. Dynamic or Run-time
H

Chapter 3
1. Data structure
2. Queue
3. Stack
4. Last In First out
5. First In First Out
6. Traversal
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

7. Searching
8. Sorting
9. Merging
10. PUSH
11. POP
12. Circular Queue
13. Structure
14. Data and Link
15. Address

IN
16. Circular Queue
17. Overflow
18. Underflow
19. Self-referential structure

E.
20. NULL

Chapter 4
IV
1. Server
2. Data Centre
3. File Transfer Protocol
4. Hyper Text Transfer Protocol
L
5. Hyper Text Transfer Protocol Secure
6. Simple Mail Transfer Protocol
SS

7. 80
8. 443
9. 25
10. 53
11. DNS
H

12. 16
13. Scripts
14. <SCRIPT>
15. JavaScript
16. Static webpage
17. PHP, ASP
18. Tags
19. Dir, Lang
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

20. <HR>
21. Hyper Text Markup Language
22. Empty tag
23. <STRONG>
24. <I>
25. ALIGN
26. <PRE>
27. <MARQUEE>
28. <MARQUEE>

IN
29. <DIV>
30. Src
31. 443
32. Google Web Server

E.
33. Static and Dynamic
34. Static
35. Type and Src
36. H6
IV
37. <BR>
38. A<SUP>2</SUP>B<SUB>3</SUB>
39. <Q> and <BLOCKQUOTE>
L
40. <ADDRESS>
SS

Chapter 5
1. <OL>
2. <UL>
3. <DL>
4. <OL>
H

5. Nested List
6. <A>
7. Href
8. Internal and External
9. Uniform Resource Locator
10. mailto:
11. <EMBED>
12. <TABLE>
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

13. Align, Bgcolor


14. <FRAMESET>
15. Type
16. <INPUT>
17. <TEXTAREA>
18. <INPUT>
19. Get and Post
20. <FORM>
21. <FRAME>

IN
22. <NOFRAME>
23. <FIELDSET>
24. get and post
25. <NOEMBED>

E.
IV
Chapter 6
1. Client
L
2. var
3. Number, String, Boolean
4. 53
SS

5. 8
6. L
7. alert()
8. HELLO
9. <SCRIPT>
H

10. Language
11. 8
12. False
13. True
14. True
15. toLowerCase()
16. String
17. Boolean
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

18. Number
19. alert()
20. switch…case

Chapter 7
1. Web Hosting

IN
2. Dedicated Hosting
3. Shared hosting
4. Free hosting
5. WHOIS

E.
6. 'A record'
7. Virtual Private Server
8. Co-location
9. FileZilla
IV
10. Content Management System
11. WordPress, Joomla, Drupal
12. Responsive Web design
13. Flexible images, Flexible grid layout
L
14. CMS
15. VMWare, VirtualBox etc.
SS

16. VPS
17. ICANN
18. Internet Corporation for Assigned Names and Numbers
19. CMS
20. Secure Socket Layer
H

Chapter 8
1. Database Management System
2. Data redundancy
3. Database Administrator
4. DBA
5. Field
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

6. Record
7. File
8. Physical Level
9. External Level
10. Naïve Users
11. DBA
12. Application Programmer
13. Relational Database Management System
14. Entity

IN
15. Relation
16. Tuples
17. Attributes
18. Degree

E.
19. Cardinality
20. Domain
21. Schema
22. Instance
IV
23. Primary key
24. Alternate key
25. Foreign
L
26. Project
27. Union
28. Intersection
SS

29. 15
30. SELECT
31. 6
32. 30 and 7
33. Binary
H

34. SELECT
35. Zero
36. Metadata
37. Relational
38. Age
39. Table or Relation
40. Tuple or Record

Prepared by Sai Prakash for [Link]


Join Now: [Link] Downloaded from [Link] ®

Chapter 9
1. Structured Query Language
2. Data Definition Language
3. Data Manipulation Language
4. Data Control Language
5. DCL
6. DDL
7. DML
8. DDL

IN
9. DELETE
10. DROP TABLE
11. ALTER TABLE
12. UPDATE

E.
13. INSERT INTO
14. Distinct
15. MIN()
16. Orderby
IV
17. NOT NULL
18. UNIQUE or PRIMARY KEY
19. LIKE
L
20. SELECT
21. DISTINCT
SS

22. LIKE
23. HAVING
24. View
25. Nested Query
26. *
H

27. _ (Underscore)
28. Varchar
29. MySQL
30. Use

Chapter 10

Prepared by Sai Prakash for [Link]


Join Now: [Link] Downloaded from [Link] ®

1. PHP Hypertext Preprocessor


2. echo(), print() and Var_dump()
3. Core data type and Special data type
4. Special
5. Core
6. Special
7. $
8. .php
9. Indexed, Associative and Multi-dimensional

IN
10. . (dot)
11. NULL
12. Server Side
13. echo

E.
14. .=
15. foreach loop
16. Browser or Client
17. Web server
IV
18. Database
19. Superglobal
20. Post
L
21. Linux Apache MySql Php
22. Windows Apache MySql Php
23. .php
SS

24. //
25. /* and */

Chapter 11
H

1. Serial Computing
2. Parallel
3. Grid
4. Cluster
5. Cloud
6. SaaS, PaaS and IaaS
7. Allen Turing
8. Natural Language Processing
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

9. Cybernetics
10. Computational Intelligence
11. Evolutionary Computing
12. Computational Intelligence
13. Biometrics
14. Robotics
15. Automatics Speech Recognition
16. Geographical Information System
17. Computational Intelligence

IN
18. Computational Intelligence
19. John McCarthy
20. Fuzzy system
21. IaaS

E.
22. SaaS
23. PaaS
24. Wisdom
25. Intelligence
IV
Chapter 12
L
1. Information and Communication Technology
SS

2. e-Governance
3. G2G,G2E,G2B and G2C
4. Common Service Centre
5. State Data Centre
6. Kerala State Wide Area Network
H

7. Electronic Payment System


8. e-Commerce
9. e-Learning
10. e-mail
11. Victers
12. Information Property Right
13. World Intellectual Property Right
14. Patent
Prepared by Sai Prakash for [Link]
Join Now: [Link] Downloaded from [Link] ®

15. Trademark
16. Copyright
17. Infringement
18. Cyber Space
19. Cyber Crime
20. Government
21. Identity Theft
22. Infomania
23. Cyber Forensic

IN
24. Property
25. Credit card Fraud
26. 2000
27. Plagiarism

E.
28. Crime against government
29. Infomania
30. Cyber ethics
L IV
SS
H

Prepared by Sai Prakash for [Link]

You might also like