6 Class XII IT CHSE Workbook
6 Class XII IT CHSE Workbook
Writer
2022
The ST & SC Development Department, Government of Odisha has introduced an innovative
education programme for the students appearing in +2 Science and Commerce examination
pursuing studies in the ST & SC Development Department Schools (EMRS & HSS) to ensure
quality education at +2 level. In this regard it is to mention that an Academic Performance
Monitoring Cell (APMC) has been set up in SCSTRTI to monitor the Training and Capacity
Building of Teachers of SSD Higher Secondary Schools and Ekalavya Model Residential
Schools (EMRS) to enhance quality education for better performance of the students
appearing +2 Science and Commerce examination.
Since March 2020 due to Covid-19 Pandemic Situation, the state government has closed all
the HSS & EMRS and online classes were going on. The CBSE & CHSE Board were unable to
conduct the offline examinations in 2020 and 2021. Since a few months, offline classes are
going on. To combat the situation, the CBSE & CHSE Boards have introduced alternate
comprehensive examination patterns such as 1st and 2nd Term End Examinations and Quarter
End Examinations etc. to be operative from 2021-22 academic session. Accordingly the
Question patterns have completely being changed by both Boards.
To face this situation, the APMC has designed Workbook-Cum-Question Bank with Answers
as per the new direction of the Boards. The best of subject experts have been roped to
formulate self-contained and self-explanatory “Workbook-Cum-Question Bank with
Answers” as per the new pattern of examinations of CHSE & CBSE Boards. They have tried to
make the material as far as activity based and solution based as feasible.
I would like to extend my sincere thanks to Prof. (Dr.) A. B. Ota, Advisor-Cum-Director and
Special Secretary, SCSTRTI. I would also like to thank Dr. S. C. Das, SLPM, APMC and the team of
subject experts for their sincere effort in bringing out the Question Bank in a very short time.
The Workbook-Cum-Question Bank with Answers will cater to the needs of students during
this pandemic situation and will be extremely useful for students of Science and Commerce of
CBSE and CHSE to face the new pattern of examination, as these are designed accordingly.
Ranjana Chopra
Principal Secretary
ST & SC Development Department
Govt. of Odisha
An innovative education programme has been initiated by setting up an Academic Performance
Monitoring Cell (APMC) in Scheduled Castes and Scheduled Tribes Research and Training
Institute (SCSTRTI) to monitor the Training and Capacity Building of Teachers of SSD Higher
Secondary Schools and Ekalavya Model Residential Schools (EMRS) and to ensure quality
education of students studying at +2 level under the administrative control of the ST & SC
Development Department.
Due to Covid-2019 pandemic situation, all the schools under administrative control of ST & SC
Development Department are closed since March 2020. As a result different Boards were not
able to conduct offline examinations in 2020 and 2021. As an alternative, CBSE Board and CHSE
Board have made comprehensive examination patterns in the form of 1st & 2nd Term End and 3rd
Quarter End examinations respectively to be followed from 2021-22 academic session.
The present situation demands to fullfill the desire of students and designed new pattern of
questions, which will cater to the need of students to face the examinations boldly without any
fear and nervousness. The APMC under the banner of SCSTRTI has taken the initiative to
prepare Workbook-Cum-Question Bank with Answers in Physics, Chemistry, Biology (Botany
& Zoology), Mathematics, Information Technology / Computer Science, English and Odia of
Science stream and Business Mathematics and Statistics, Business Studies and Management,
Accounting, Cost Accountancy, Fundamentals of Management Accounting, Fundamentals of
Entrepreneurship, Banking & Insurance etc. of Commerce stream as per the new pattern of
questions to be adopted in both CBSE and CHSE Boards and prepared books separately.
The subject experts, who are the best in their respective subjects in the state have been roped in
for this exercise. They have given their precious time to make the new pattern of Question Bank
as activity and solution based as per the direction of both CBSE and CHSE Boards.
I hope this material will be extremely useful for the students preparing for the +2 examination
in different subject of Science and Commerce streams.
Paper - I
2. Unit - II Programming
4. Unit - IV IT Applications
E-business 22-26
Paper - II
***
PAPER - I
UNIT - I
A. COMPUTER NETWORKING
I. Multiple Choice Questions:
(d) all of the above 13. It is used for the network that covers
large distance such as cover states
8. Router operates in which layer of OSI and countries.
Reference Model?
(a) LAN (b) WAN
(a) Physical Layer
(c) MAN (d) None of these
(b) Network Layer
14. is a standard for short-distance
(c) Transport Layer
wireless communication.
(d) Application Layer
(a) Wi-Fi (b) WAN
9. Routing tables of a router keeps (c) MAN (d) None of these
track of .
(a) MAC Address Assignments 15. Which of the following is/are the
advantages of wireless LANs.
(b) Port Assignments to network
devices i. Installation speed and simplicity
// 2 //
17. What is the benefit of the Networking? 22. Bus, ring and star topologies mostly
used in the
(a) File Sharing
(a) LAN
(b) Easier access to Resources
(b) MAN
(c) Easier Backups
(c) WAN
(d) All of the Above
(d) Internetwork
18. Which of the following is not the
23. Combination of two or more
Networking Devices?
topologies are called
(a) Gateways
(a) Star (b) Bus
(b) Window
(c) Ring (d) Hybrid
(c) Routers
24. Which of the following is not type of
(d) Firewalls
the network topology.
19. Which of the following is Software? (a) Mesh (b) Bus
(a) Routers (c) Ring (d) Stub
(b) Firewalls 25. In a network with 24 computers,
(c) Gateway which topology would require the
most extensive cabling?
(d) Modems
(a) Bus (b) Mesh
20. Physical or logical arrangement of (c) Star (d) Tree
network is
26. Mesh topology has physical
(a) Topology
channels to link 'n' devices.
(b) Routing (a) n
(c) Networking (b) n(n-1)/2
31. Which of the following is a type of 43. What does Router do in a network?
computer network? 44. In which topology there is a central
(a) Telnet (b) MAN controller or hub?
// 4 //
ANSWER KEYS
// 5 //
B. INTERNET & ITS APPLICATION
1. DNS maps IP addresses to 6. Which one of the following is a valid
(a) A binary Address as string email address?
(b) An alphanumeric string (a) [email protected]
(c) A hierarchy of domain names
(b) gmail.com
(d) A hexadecimal Address
(c) [email protected]
2. Identify the correct sequence in which
(d) javatpoint@books
packets are transmitted in a network
by a host when a browser requests a 7. Which one of the following is the
webpage from a remote server.
most common internet protocol?
(a) HTTP GET request, DNS Query,
TCP SYN (a) HTML (b) NetBEUI
(b) DNS Query, HTTP GET request, (c) TCP/IP (d) IPX/SPX
TCP SYN
8. The IP network 192.168.50.0 is to be
(c) DNS Query, TCP SYN, HTTP GET
request divided into 10 equal sized subnets.
(d) TCP SYN, HTTP GET request, Which of the following subnet masks
DNS Query can be used for the above requirement?
(a) 255.243.240
3. Which one the following protocol is
not used to resolve one form of an (b) 255.255.0.0
address to another (c) 255.255.255.0
(a) DNS (b) ARP
(d) 255.255.255
(c) DHCP (d) RARP
9. When the mail server sends mail to
4. A collection of hyperlinked documents
on the internet forms the other mail servers it becomes ___?
(a) World Wide Web (WWW) (a) SMTP client
(b) E-mail system (b) SMTP server
(c) Mailing list (c) Peer
(d) Hypertext markup language (d) Master
5. The location of a resource on the
10. In specific, if the systems use separate
internet is given by its?
protocols, which one of the following
(a) Protocol
devices is used to link two systems?
(b) URL
(c) E-mail address (a) Repeater (b) Gateway
(d) ICQ (c) Bridge (d) Hub
// 6 //
11. To join the internet, the computer has 17. Classifying content in social media
to be connected to a happens through an activity such as
(a) internet architecture board (a) Alphabetizing(b) Tagging
(b) internet society (c) Mapping (d) Line up
(c) internet service provider
(d) different computer 18. Unsolicited e-mail advertising is
known as .
12. Some websites proved chat rooms to (a) Newsgroup
interact with an individual or a group
(b) Junk ads
is called
(c) Spam
(a) Usenet (b) Newsgroup
(d) None of the above
(c) Chatting (d) E-mail
13. The sites include text, 19. In social media, what type of marketing
animated graph, voice and images. has become important for advertisers?
// 8 //
ANSWER KEYS
PROGRAMMING
A. PROGRAMMING FUNDAMENTALS
(c) Final class cause runtime failure (c) Class B extends class A {}
(d) Final class cannot be inherited (d) Class B implements A {}
// 10 //
7. Order of execution of constructors in 11. Which class cannot be sub classed?
Java Inheritance is (a) final class
(a) Base to derived class (b) object class
(b) Derived to base class (c) abstract class
(c) Random order (d) child class
(d) None 12. Which is/are false statements
8. Inheritance relationship in Java (a) final class cannot be inherited
language is (b) final method can be inherited
(a) Association (c) final method can be overridden
(b) Is-A (d) Final variable of a class cannot be
(c) Has-A changed.
// 11 //
16. Which of these class is superclass of II. Fill in the blanks
every class in Java?
21. Method to compare two strings ignoring
(a) String class the case is
(b) Object class
22. method converts an entire
(c) Abstract class string to Upper case.
(d) ArrayList class
23. Method Removes spaces from
17. Which of these method of Object class both sides of a String.
can clone an object?
24. Returns absolute value of the
(a) ObjectCopy () number.
(b) Copy ()
III. Objective Type Questions:
(c) Objectclone ()
(d) Clone () 25. What is a method that compares two
strings and supports a 3-way comparison?
18. Which of these keywords can be used
to prevent inheritance of a class? 26. What is a method that compares two
(a) Super (b) Constant strings and supports 2-way comparison?
(c) Class (d) Final 27. Which method concatenates two strings
19. Which of these class relies upon its /Joins two strings?
subclasses for complete implementation
of its methods? 28. Which Method Returns a character by
index position in a string?
(a) Object class
(b) Abstract class 29. Method to return part of a string in java.
20. If a class inheriting an abstract class 31. What will be the output of the following
does not define all of its function then code.
it will be known as? Public static void main (String [] args){
(a) Abstract Class
// Integer class wraps a value of the
(b) Simple Class primitive type int in an object
(c) Static class //An object of type Integer contains a
(d) None of these single field whose type is int.
// 12 //
int x = 5; 32. How can a protected modifier be
accessed?
Integer a =x;
33. How many copies of static and class
System.out.println(a.compareTo(5));//0 variables are created when 10 objects are
created of a class?
System.out.println(a.compareTo(6));//-1
34. A class can be declared with a protected
System.out.println(a.compareTo(4));//1
modifier. State True/False
} 35. Which is the modifier when there is
none mentioned explicitly?
ANSWER KEYS
// 13 //
B. HTML BASED WEB PAGE COVERING BASIC TAG
1. Which of the following tag is used for 8. Which HTML tag would be used to
line breaks in the documents? display power in expressionX^n+Y=10?
(a) <p> (b) <br> (a) <sup> (b) <sub>
(c) <hr> (d) <break> (c) <b> (d) <p>
2. Which of the following tag is used for 9. Choose the correct HTML code to
new paragraph in the documents? create an email link?
(a) <p> (b) <br> (a) <a href = 'xx 2 yy. Com"></a>
(c) <hr> (d) <break>
(b) <a href="[email protected]"></a>
3. Which of the following tag is not an (c) <mail>[email protected]</mail>
empty tag? (d) < a mailhref = [email protected]></a>
(a) <p> (b) <br>
10. Choose the correct HTML tag for the
(c) <hr> (d) <li>
largest heading?
4. Which of the following is not web (a) <h1> (b) <h2>
browser? (c) <h4> (d) <h6>
(a) Netscape Navigator
(b) Internet Explorer 11. Which of the following is not an
attribute of <font> tag
(c) Mozilla Firefox
(a) color (b) bgcolor
(d) Notepad
(c) size (d) face
5. Which of the following tags is used
for bold facing the text? 12. <li> is used to create items of an
(a) <br> (b) <strong>
(c) <tt> (d) <li> (a) Ordered list
(b) Unordered list
6. Which of the image file extension
(c) Neither of a and b
cannot be inserted in the web page?
(d) Both a and b
(a) .pcd (b) .gif
(c) .jpg (d) .jpeg 13. An ordered list
// 14 //
14. Which of the following control allows 21. HTML documents are saved in
the user to select multiple values? (a) binary format
(a) Menu Control (b) machine language
(b) Checkbox Control (c) ASCII text
(c) Frame (d) None of these
(d) Radio Button
22. The tags which encloses text inside
15. Which of the following is not a form
it are
control in HTML?
(a) couple tags (b) single tags
(a) Checkbox
(c) double tags (d) paired tags
(b) Radio Box
(c) Submit Button
II. Fill in the blanks
(d) Reset Button
23. In the <hr> tag hr stands for .
16. Which tag is used to display a picture
24. Tags and text that are not directly
on a web page?
displayed on the page are written in
(a) picture (b) image
section.
(c) img (d) src
25. Which tag is used to insert a horizontal
17. Except <b> which other tag is used line in a web page?
to make text bold?
26. is the first tag in an HTML
(a) <strong> (b) <dar>
document?
(c) <black> (d) <bold>
27. is used to create ordered and
18. Which of the following is not a unordered list or bulleted list.
pair tag?
28. Bulleted list is known by another name
(a) <p> (b) <u>
which is
(c) <i> (d) <img>
29. The application software required to
19. To create HTML document you view and explore web pages is called
require a .
(a) Web page editing software
30. A simple word processor is called
(b) High powered computer
. Text Editor
(c) Notepad
31. Google Chrome is a . Web
(d) None of these
Browser
20. The properties of an HTML element
or tag is called 32. Notepad is a . Text editor
(a) tags (b) attributes 33. Special formatted text or commands in
(c) values (d) None of these HTML is called . Tags/ Elements
// 15 //
III. Objective Type Questions: 42. Which tag in HTML is used to create
type letter font? <tt>
34. What does "vlink" attribute mean?
35. What is used to link various web pages? 43. Which tag in HTML is used to represent
text with horizontal stinking
36. Which tag contains both opening and
text?<strike>
closing tag? Paired tag
44. Which tag in HTML is used to scroll text
37. Which tag contains only opening tag?
on a web page?<marquee>
Singular tag
45. How many types of heading tags are
38. Which tag contains the information
there? 6
about a web page? <title>
39. What is the maximum no. of characters 46. What represents the smallest heading
supported in HTML title? 64 tag?<h6>
40. Which tag in HTML displays heading? 47. What represents the largest heading tag?
<h1>…<h6> <h1>
41. Which tag in HTML is used to create 48. Which tag is used to create a line break?
italic font? <i> <br>
ANSWER KEYS
1. (b) 13. (a & b) 25. <hr> 37. Singular tag
2. (a) 14. (b) 26. <html> 38. <title>
3. (a) 15. (d) 27. <li> 39. 64
4. (d) 16. (c) 28. Unordered list 40. <h1>…<h6>
5. (b) 17. (a) 29. Web Browser 41. <i>
6. (a) 18. (d) 30. Text editor 42. <tt>
7. (d) 19. (c) 31. Web Browser 43. <strike>
8. (a) 20. (b) 32. Text Editor 44. <marquee>
9. (b) 21. (c) 33. Tags/elements 45. 6
10. (d) 22. (d) 34. Visited Link 46. <h6>
11. (b) 23. Horizontal Rule 35. <href> 47. <h1>
12. (d) 24. Title 36. Paired tags 48. <br>
// 16 //
UNIT - III
A. DATABASE FUNDAMENTALS
tuples from, and modify tuples in the 5. Which of the following can be used
database? to extract or filter the data &
information from the data warehouse?
(a) DML(Data Manipulation Language)
(a) Data redundancy
(b) DDL(Data Definition Language)
(b) Data recovery tool
(c) Query
(c) Data mining
(d) Relational Schema (d) Both B and C
// 17 //
6. Which one of the following refers to 10. Which one of the following is a type
the copies of the same data (or of Data Manipulation Command?
information) occupying the memory
(a) Create
space at multiple places.
(b) Alter
(a) Data Repository
(c) Delete
(b) Data Inconsistency
(d) All of the above
(c) Data Mining
11. Which of the following command is
(d) Data Redundancy
a type of Data Definition language
7. Which one of the following refers to command?
the "data about data"?
(a) Create
(a) Directory
(b) Update
(b) Sub Data
(c) Delete
(c) Warehouse
(d) Merge
(d) Meta Data
12. Which of the following is used to
8. Which of the following refers to the denote the selection operation in
level of data abstraction that describes relational algebra?
exactly how the data actually stored?
(a) Pi (Greek)
(a) Conceptual Level
(b) Sigma (Greek)
(b) Physical Level
(c) Lambda (Greek)
(c) File Level
(d) Omega (Greek)
(d) Logical Level
13. The operation, denoted by ?,
9. Which of the following refers to the allows us to find tuples that are in one
number of tuples in a relation? relation but are not in another.
ANSWER KEYS
// 19 //
B. INTRODUCTION TO MYSQL
1. In precedence of set operators, the 5. In DBMS, the description of database
expression is evaluated from in the form of schema is also called
ANSWER KEYS
1. (c) 6. (c) 11. (b) 16. Revoke
// 21 //
UNIT - IV
IT APPLICATIONS
E-BUSINESS
// 22 //
7. Which of the following is not 12. Which of the following is not a
considered to be one of the three limitation of the current market?
phases of E-commerce?
(a) Insufficient capacity through out
(a) Innovation the backbone
8. Which Segment do eBay, Amazon.com 13. Which of the following is a new and
belongs? disruptive Web feature or service?
(a) B2Bs (b) B2Cs (a) XML (b) diffserv
(c) C2Bs (d) C2Cs (c) blogs (d) CDMA
// 24 //
24. Which of the following is not a 28. The largest component in Web Site
limitation of the current internet? budget is
(d) Best efforts QOS. 29. Which of the following measures the
percentage of people exposed to an
25. Which of the following was the first
online advertisement who actually
commercial web browser?
click on the banner?
(a) Mosaic (a) Impression rate
(b) Mozilla (b) View through rate
(c) Netscape Navigator (c) Click through rate
(d) Internet Explorer (d) Stickiness ration
37. A perfect market is one in which . 42. Which term represents a count of the
number of people who visit one site,
38. Broadband is generally considered to be
click on an ad, and are taken to the site
any communication technology allowing
of the advertiser?
streaming audio and video at or above
. 43. What is the percentage of customers
who visit a web site and actually buy
39. The threat of new entrant is high when it
something called?
is .
44. LISP is suitable for which operations?
40. A describes the flow of
information at your e-commerce site 45. What is the idealistic market envisioned
and the infrastructure that will be used at the outset of the development of
in the system. e-commerce?
ANSWER KEYS
1. (d) 13. (c) 25. (c) 36. Market space
2. (b) 14. (d) 26. (b) 37. No competitive advantage
3. (c) 15. (d) 27. (a) 38. 100 kbps
4. (b) 16. (a)
28. (a) 39. Easy for competitor to
5. (a) 17. (a)
29. (c) enter the market
6. (a) 18. (a)
30. Laptops 40. Logical design
7. (c) 19. (d)
31. In the CPU 41. Commoditization
8. (b) 20. (a)
21. (c) 32. Global reach 42. Click through
9. (d)
22. (d) 33. Ventura Capital Fund 43. Conversion rate
10. (b)
11. (d) 23. (a) 34. Anonymizers 44. Arithmetic & Numeric
12. (c) 24. (c) 35. Business model 45. Bertrand market
// 26 //
PAPER - II
UNIT - I
NETWORKING & OPEN STANDARDS
OBJECTIVE QUESTIONS:
1. Write the name of three network 16. What is the difference between MAN
topologies. and WAN?
2. What is the need for internet protocols? 17. What is meant by Topology?
3. Explain the uses of TCP/IP, HTTP and 18. What are the similarities and differences
FTP. between bus and tree topologies?
4. Expand the following: (a) LAN (b) IAN 19. What are the layers of the OSI reference
model?
(c) DSC (d) FTP
20. What is a node?
5. What is firewall?
21. What are routers?
6. What is gateway?
22. What is point to point link?
7. Write two advantages of networks.
23. What is subnet mask?
8. What is TELNET?
24. What is the job of the Network Layer
9. What are the various types of networks? under the OSI reference model?
10. What is CDMA? 25. What is a way of Securing a Computer
Network?
11. What is a link?
26. What is NIC?
12. Define a network.
27. What is the importance of the OSI
13. What is communication channel?
Physical Layer?
14. What is IP address?
28. How many layers are there under TCP/
15. What is domain name? IP?
// 27 //
29. What are proxy servers and how do they 38. What is ISP?
protect computer networks?
39. What is ISDN?
30. What is the function of the OSI Session
40. What is Telnet?
Layer?
41. What is Virus?
31. What is a private IP address?
42. What is Cookies?
32. What is NOS?
43. What is malicious software?
33. What is OSI and what role does it play
in computer networks? 44. What is Hacking?
36. Define Full Duplex transmission mode. 47. What is Cyber Crime?
SUBJECTIVE QUESTIONS:
// 28 //
UNIT - I
ANSWER KEYS
OBJECTIVE QUESTIONS:
(d) FTP: File Transfer Protocol 10. Code Division Multiple Access
(CDMA) is a channel access method
5. 5. A firewall is a network security device used by various radio communication
that monitors incoming and outgoing technologies. CDMA is an example of
network traffic and permits or blocks multiple access, where several
data packets based on a set of security transmitters can send information
rules. simultaneously over a single
// 29 //
communication channel. CDMA is used 17. Network topology is defined as the
as the access method in many mobile interconnection of the various elements
phone standards. (links, nodes, etc.) of a computer
network. In computer networking,
11. A link refers to the connectivity between
topology refers to the layout of
two devices. It includes the type of cables
connected devices. A) Bus topology b)
and protocols used in order for one
Star topology c) Ring topology d) Tree
device to be able to communicate with
topology e) Mesh topology
the other.
18. In bus topology each machine is
12. A computer network is a system in which
connected to a single cable. Each
computers are connected to share
computer or server is connected to the
information and resources.
single bus cable through some kind of
13. Communication channels mean the connector. Tree topology is a network
connecting cables that link various with the shape of an inverted tree in
workstations. which a single link between two nodes.
14. A unique number consisting of 4 parts 19. There are 7 OSI layers: Physical Layer,
separated by dots, e.g. 165.113.245.2. Data Link Layer, Network Layer,
Every machine that is on the Internet has Transport Layer, Session Layer,
a unique IP number - if a machine does Presentation Layer and Application
not have an IP number, it is not really on Layer.
the Internet.
20. A node refers to a point or joint where a
15. The unique name that identifies an connection takes place. It can be
Internet site. Domain Names always have computer or device that is part of a
2 or more parts, separated by dots. The network. Two or more nodes are needed
part on the left is the most specific, and in order to form a network connection.
the part on the right is the most general.
21. Routers can connect two or more
E.g.: matisse.net
network segments. These are intelligent
16. A metropolitan area network (MAN) is network devices that store information
a large computer network that usually in its routing table such as paths, hops
spans a city or a large campus. WAN is a and bottlenecks. With this info, they are
network that covers an area larger than a able to determine the best path for data
single building or campus such as across transfer. Routers operate at the OSI
the cities or countries. Network Layer.
// 30 //
22. It refers to a direct connection between 28. There are four layers: the Network
two computers on a network. A point to Layer, Internet Layer, Transport Layer
point connection does not need any and Application Layer.
other network devices other than
29. Proxy servers primarily prevent external
connecting a cable to the NIC cards of
users who identifying the IP addresses
both computers.
of an internal network. Without
23. A subnet mask is combined with an IP knowledge of the correct IP address,
address in order to identify two parts: even the physical location of the network
the extended network address and the cannot be identified. Proxy servers can
host address. Like an IP address, a subnet make a network virtually invisible to
mask is made up of 32 bits. external users.
24. The Network layer is responsible for
30. This layer provides the protocols and
data routing, packet switching and
means for two devices on the network to
control of network congestion. Routers
communicate with each other by holding
operate under this layer.
a session. This includes setting up the
25. Good passwords are made up of not just session, managing information exchange
letters, but by combining letters and during the session, and tear-down
numbers. A password that combines process upon termination of the session.
uppercase and lowercase letters is
31. Private IP addresses are assigned for use
favorable than one that uses all upper case
on intranets. These addresses are used
or all lower case letters. Passwords
for internal networks and are not
must be not words that can easily be
routable on external public networks.
guessed by hackers, such as dates,
These ensures that no conflicts are
names, favorites, etc. Longer passwords
present among internal networks while
are also better than short ones.
at the same time the same range of
26. NIC is short for Network Interface Card. private IP addresses are reusable for
This is a peripheral card that is attached multiple intranets since they do not "see"
to a PC in order to connect to a network. each other.
Every NIC has its own MAC address that
32. Network Operating System (NOS), is
identifies the PC on the network.
specialized software whose main task is
27. The physical layer does the conversion to provide network connectivity to a
from data bits to electrical signal, and computer in order for it to be able to
vice versa. This is where network devices communicate with other computers and
and cable types are considered and setup. connected devices.
// 31 //
33. OSI (Open Systems Interconnect) 39. Integrated Services Digital Network
serves as a reference model for data (ISDN) is a set of communication
communication. It is made up of 7 layers, standards for simultaneous digital
with each layer defining a particular transmission of voice, video, data, and
aspect on how network devices connect other network services over the
and communicate with one another. One traditional circuits of the public
layer may deal with the physical media switched telephone network.
used, while another layer dictates how 40. Telnet is a protocol used on the Internet
data is actually transmitted across the or local area network to provide a
network. bidirectional interactive text-oriented
communication facility using a virtual
34. In Simplex mode, the communication is
terminal connection.
unidirectional, as on a one-way street.
41. A computer virus is a type of malicious
35. Half-duplex transmission mode of data
software that, when executed, replicates
in just one direction at a time. For
itself by modifying other computer
example, a walkie talkie.
programs and inserting its own code.
36. Full-duplex data transmission means that
42. Cookies are small files which are stored
data can be transmitted in both directions
on a user's computer. They are designed
on a signal carrier at the same time. For
to hold a modest amount of data specific
example, on a local area network with a to a particular client and website, and can
technology that has full-duplex be accessed either by the web server or
transmission, one workstation can be the client computer.
sending data on the line while another
workstation is receiving data. 43. Malicious Software refers to any
malicious program that causes harm to
37. DNS is Domain Name System. The main a computer system or network.
function of this network service is to Malicious Software attacks a computer
provide host names to TCP/IP address or network in the form of viruses,
resolution. worms, trojans, spyware.
38. An Internet Service Provider (ISP) is an 44. Hacking generally refers to unauthorized
organization that provides services for intrusion into a computer or a network.
accessing, using, or participating in the The person engaged in hacking activities
Internet. is known as a hacker.
// 32 //
45. A digital signature is a mathematical 47. Cyber-crime is any criminal activity that
scheme for verifying the authenticity of involves a computer, networked device
digital messages or documents. or a network.
46. Snooping, in a security context, is 48. Cyber law is the part of the overall legal
unauthorized access to another person's system that deals with the Internet and
or company's data. cyberspace.
ANSWER HINTS
SUBJECTIVE QUESTIONS:
1. Representation of Computer Networks in different structures.
4. Cyber law is important because it touches almost all aspects of transactions and activities
on and concerning the Internet, the World Wide Web and Cyberspace.
// 33 //
UNIT - II
PROGRAMMING
OBJECTIVE QUESTIONS :
SUBJECTIVE QUESTIONS:
1. Explain the use of five commonly used tags in an HTML document.
2. What is meant by Access Modifier? Describe the uses of different Access Modifiers of
Java with examples
// 34 //
UNIT - II
ANSWER KEYS
OBJECTIVE QUESTIONS:
1. Access specifiers are keywords in 3. The substring () function extracts a
objectoriented languages that set the substring from a string (starting at any
accessibility of classes, methods, and position).
other members.
Syntax: substring (string, start, length)
2. Access specifiers are keywords in
Ex- Select substring ('hello', 2, 3);
object-oriented languages that set the
accessibility of classes, methods, and Output: llo
other members. Types of access
4. Static Pages
specifiers: In java we have 4 Access
specifiers and they are as follows: 1. (i) Static web pages have fixed
Public, 2. Private, 3. Protected 4. content
Default (no specifier).
(ii) Static web pages have to be
Public access specifier: The public
manually changed
access specifier is accessible
everywhere. It has the widest scope (iii) Static web pages use only a web
among all other modifiers. server
// 36 //
13. There are many common lists which are 15. No, you can use hyperlinks on text and
used to design a page. You can choose images both. The HTML anchor tag
any or a combination of the following defines a hyperlink that links one page
list types: to another page. The "href" attribute is
the most important attribute of the HTML
(i) Ordered list - The ordered list anchor tag.
displays elements in numbered
format. It is represented by 16. Marquee is used to put the scrolling text
on a web page. It scrolls the image or
<ol>tag.
text up, down, left or right automatically.
(ii) Unordered list - The unordered list You should put the text which you want
displays elements in bulleted to scroll within the <marquee>…</
format. It is represented by marquee> tag.
<ul>tag.
17. To make a picture a background image
14. HTML elements communicate to the on a web page, you should put the following
browser to render text. When the tag code after the </head>tag. <body
elements are enclosed by brackets <>, background= "image.gif">
they form HTML tags. Most of the time, Here, replace the "image.gif" with the
tags come in a pair and surround name of your image file which you want
content. to display on your web page.
// 37 //
ANSWER HINTS
SUBJECTIVE QUESTIONS:
1. Use of five commonly used tags in an HTML document:
(i) HTML tag: It is the root of the html document which is used to specify that the
document is html. Syntax: <html>Statements...</html>
(ii) Head tag: Head tag is used to contain all the head element in the html file. It contains
the title, style, meta … etc tag Syntax: <head>Statements……..</head>
(iii) Body tag: It is used to define the body of html document. It contains image, tables,
lists, … etc. Syntax: <body>Statements…….</body>
(iv) Title tag: It is used to define the title of html document. Syntax:<title>Statements...
</title>
2. Access modifiers are the keywords which are used with classes, variables, methods and
constructors to control their level of access. Java has four access modifiers:
b. Public: The word itself indicates that it has scope everywhere, i.e.; it is visible
everywhere even outside the package.
d. Protected: Its scope limits within the package and all sub classes.
// 38 //
UNIT - III
RELATIONAL DATABASE MANAGEMENT SYSTEM
OBJECTIVE QUESTIONS
3. What is a Data Definition Language (DDL)? 15. Identify the error? DELETE ALL FROM
TABLE EMP;
4. What is a Data Manipulation Language
(DML)? 16. Differentiate WHERE and HAVING
5. What is Data Control Language (DCL)? clause?
6. What do you mean by a Database 17. How SQL commands are classified?
Management System? 18. What are the two ways in which multiple
7. What is RDBMS? transactions can be executed?
11. Which keyword eliminates redundant 21. What are the properties of database
data in from a query result? transaction?
12. How would you display system date as 22. What TCL commands are supported by
the result of a query? SQL?
13. What is NOT NULL constraint? 23. Write the use of ORDER BY CLAUSE.
SUBJECTIVE QUESTIONS:
1. What is a database transaction? What is meant by committing and revoking a transaction?
How are they achieved using COMMIT and ROLLBACK statements?
// 39 //
UNIT - III
ANSWER KEYS
OBJECTIVE QUESTIONS:
1. SQL refers to the Standard Query (c) Update data in the database through
Language, which is not actually the UPDATE command.
programming language. SQL doesn't have
(d) Delete data from the database
a loop, Conditional statement, logical
through DELETE command.
operations, it cannot be used for anything
other than data manipulation. It is used 5. Data control language allows you to
like commanding (Query) language to control access to the database. DCL is
access databases. The primary purpose the only subset of the database which
of SQL is to retrieve, manipulate, update decides that what part of the database
and perform complex operations like should be accessed by which user at what
joins on the data present in the database. point of time. It includes two commands
2. DDL, DML, DCL, TCL GRANT and REVOKE.
3. Data definition language (DDL) is the GRANT: to grant the specific user to
subset of the database which defines the perform a particular task.
data structure of the database in the
initial stage when the database is about REVOKE: to cancel previously denied
to be created. It consists of the following or granted permissions.
commands: CREATE, ALTER and 6. Database Management is a collection of
DELETE database objects such as programs and files that allow a user to
schema, tables, view, sequence, etc. define structure of a database, store data
4. Data manipulation language makes the into it, modify the structure and
user able to retrieve and manipulate data. manipulate the data.
It is used to perform the following
7. RDBMS stands for Relational Database
operations.
Management System. It is a database
(a) Insert data into database through management system based on a
INSERT command. relational model. RDBMS stores the
(b) Retrieve data from the database data into the collection of tables and
through SELECT command. links those tables using the relational
// 40 //
operators easily whenever required. It 18. Multiple transactions can be executed in
facilitates you to manipulate the data one of the following two ways: (i) Serial
stored in the tables by using relational (ii) Concurrent.
operators. Examples of the relational
19. Savepoints are special operations that
database management system are
allow you to divide the work of a
Microsoft Access, MySQL, SQLServer,
Oracle database, etc. transaction into different segments. In
case of a failure, you can execute
8. Primary key is a unique key in a relation rollbacks to the savepoint only, leaving
which can uniquely identifies a tuple prior changes intact.
(row) in a given Relation.
20. COMMITTING a transaction means all
9. If a key is available in a table as a primary
the steps of a transaction are carried out
key then this key is called foreign key
successfully and all data changes are
in another table.
made permanent in the database.
10. If a column in a row has no value, then Transaction ROLLBACK means
column is said to be null. transaction has not been finished
completely and hence all data changes
11. DISTINCT
made by the transaction in the database
12. GETDATE() if any, are undone and the database
13. NOT NULL constraints impose a returns to the state as it was before this
condition that value of a row cannot be transaction execution started.
left blank.
21. The properties of transaction are:
14. UPDATE EMPL; WHERE clause is (i) Atomicity
missing in given query.
(ii) Consistency
15. There is no need to write ALL and TABLE
(iii) Isolation
word in above query. Correct form is-
DELETE FROM EMP; (iv) Durability
16. Where clause is used to select particular 22. SQL supports following TCL commands
rows that satisfy condition whereas BEGIN START TRANSACTION-Marks
having clause is used in connection with the beginning of a transaction COMMIT-
aggregate function, group by clause. Ends the current transaction by saving
database changes and starts a new
17. SQL Commands are classified into four
transaction. ROLLBACK- Ends the
categories:
// 41 //
current transaction by discarding 23. The SQL ORDER BY clause is used to
changes and starts a new transaction. sort the data in ascending or descending
SAVEPOINT- Defines breakpoints for order, based on one or more columns.
the transactions to allow partial Syntax: Select Column-list from table-
rollbacks. SET AUTOCOMMIT- name [Where Condition] [Order BY
Enables or disable the default Column1, Column2, ColumnN]
autocommit mode. [ASC|DESC];
ANSWER HINTS
SUBJECTIVE QUESTIONS:
1. A transaction is program module whose execution may change the content of database.
Committing a transaction means the permanently save any transaction into the database.
Revoking a transaction means the operation of restoring a database to a previous state by
canceling a specific transaction.
a) Data definition language (DDL): DDL is used to define the data structure it consists
of the commands like CREATE, ALTER, DROP, etc.
b) Data manipulation language (DML): DML is used to manipulate already existing data
in the database. The commands in this category are SELECT, UPDATE, INSERT, etc.
c) Data control language (DCL): DCL is used to control access to data in the database
and includes commands such as GRANT, REVOKE.
// 42 //
UNIT - IV
IT APPLICATIONS
OBJECTIVE QUESTIONS
SUBJECTIVE QUESTIONS:
1. What is E-commerce? Elaborate on its benefits. What are the major challenges in
implementing E-business?
// 43 //
UNIT - IV
ANSWER KEYS
Objective Questions:
e. Electronic commerce also allows (ii) Global Reach - The total number
the customer and the business to of users or customers an
be in touch directly, without any e-commerce business can obtain.
intermediaries. Example is www.acer.com is
// 44 //
whole world also can browse it. 7. What is access control attack? Give
Because the website have supplied examples. Access control attacks
many language to let different typically bypass access control methods
language users understand it. to steal data or user credentials. Ex:-
(iii) Universal Standards - Standards Common Attacks Due To Broken Access
that are shared by all nations Control
around the world. Example is when
a. Access control prevents the
you see the price of product in the
website, that price is very fairly and unauthorized access to the objects
standards. which include access to the
information systems like
(iv) Richness - Video, audio and text
messages are possible. Example is communication links, networks,
the richness is can make the computers, services and sensitive
websites become attract people to data.
browse. b. On the other hand, broken access
(v) Interactivity - Technology that control continues to be the most
allows for two way communication common web application
between merchant and consumer. Vulnerability.
Example is in the website we can
8. Distinguish between spam and cookies.
contract the merchants, that have
many way can contract like: phone, Cookies are files that your web browser
e-mail, video call, and etc. uses to remember things like have you
(vi) Information Density - The total visited a page before and so on.
amount and quality of information Spam means unwanted emails.
available to all market participants.
Example is we can get the clearly 9. Write the objective of cyber law.
information in the websites. Objective of cyber law:
// 45 //
ANSWER HINTS
SUBJECTIVE QUESTIONS:
1. E-commerce, also known as electronic commerce or internet commerce, refers to the
buying and selling of goods or services using the internet.
Benefits of E-Commerce:
c. Choice - the range of goods available is vast and with sites like http:// www.amazon.com
that let you compare goods from many retailers it is easy to find what you want.
f. Global markets - neither you nor the vendor are restricted to your/their locality
// 46 //