0% found this document useful (0 votes)
699 views52 pages

6 Class XII IT CHSE Workbook

It notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
699 views52 pages

6 Class XII IT CHSE Workbook

It notes
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 52

INFORMATION TECHNOLOGY

Workbook Cum Question Bank with Answers


CLASS-XII (CHSE)

Writer

Prof. Anshuman Mishra


Assistant Professor
Deptt. of Computer Science & Engineering
Krupajal Engineering College,
Bhubaneswar

SCHEDULED CASTES & SCHEDULED TRIBES


RESEARCH & TRAINING INSTITUTE (SCSTRTI)
ST & SC DEVELOPMENT DEPARTMENT
BHUBANESWAR

2022
The ST & SC Development Department, Government of Odisha has introduced an innovative
education programme for the students appearing in +2 Science and Commerce examination
pursuing studies in the ST & SC Development Department Schools (EMRS & HSS) to ensure
quality education at +2 level. In this regard it is to mention that an Academic Performance
Monitoring Cell (APMC) has been set up in SCSTRTI to monitor the Training and Capacity
Building of Teachers of SSD Higher Secondary Schools and Ekalavya Model Residential
Schools (EMRS) to enhance quality education for better performance of the students
appearing +2 Science and Commerce examination.
Since March 2020 due to Covid-19 Pandemic Situation, the state government has closed all
the HSS & EMRS and online classes were going on. The CBSE & CHSE Board were unable to
conduct the offline examinations in 2020 and 2021. Since a few months, offline classes are
going on. To combat the situation, the CBSE & CHSE Boards have introduced alternate
comprehensive examination patterns such as 1st and 2nd Term End Examinations and Quarter
End Examinations etc. to be operative from 2021-22 academic session. Accordingly the
Question patterns have completely being changed by both Boards.
To face this situation, the APMC has designed Workbook-Cum-Question Bank with Answers
as per the new direction of the Boards. The best of subject experts have been roped to
formulate self-contained and self-explanatory “Workbook-Cum-Question Bank with
Answers” as per the new pattern of examinations of CHSE & CBSE Boards. They have tried to
make the material as far as activity based and solution based as feasible.
I would like to extend my sincere thanks to Prof. (Dr.) A. B. Ota, Advisor-Cum-Director and
Special Secretary, SCSTRTI. I would also like to thank Dr. S. C. Das, SLPM, APMC and the team of
subject experts for their sincere effort in bringing out the Question Bank in a very short time.
The Workbook-Cum-Question Bank with Answers will cater to the needs of students during
this pandemic situation and will be extremely useful for students of Science and Commerce of
CBSE and CHSE to face the new pattern of examination, as these are designed accordingly.

Ranjana Chopra
Principal Secretary
ST & SC Development Department
Govt. of Odisha
An innovative education programme has been initiated by setting up an Academic Performance
Monitoring Cell (APMC) in Scheduled Castes and Scheduled Tribes Research and Training
Institute (SCSTRTI) to monitor the Training and Capacity Building of Teachers of SSD Higher
Secondary Schools and Ekalavya Model Residential Schools (EMRS) and to ensure quality
education of students studying at +2 level under the administrative control of the ST & SC
Development Department.
Due to Covid-2019 pandemic situation, all the schools under administrative control of ST & SC
Development Department are closed since March 2020. As a result different Boards were not
able to conduct offline examinations in 2020 and 2021. As an alternative, CBSE Board and CHSE
Board have made comprehensive examination patterns in the form of 1st & 2nd Term End and 3rd
Quarter End examinations respectively to be followed from 2021-22 academic session.
The present situation demands to fullfill the desire of students and designed new pattern of
questions, which will cater to the need of students to face the examinations boldly without any
fear and nervousness. The APMC under the banner of SCSTRTI has taken the initiative to
prepare Workbook-Cum-Question Bank with Answers in Physics, Chemistry, Biology (Botany
& Zoology), Mathematics, Information Technology / Computer Science, English and Odia of
Science stream and Business Mathematics and Statistics, Business Studies and Management,
Accounting, Cost Accountancy, Fundamentals of Management Accounting, Fundamentals of
Entrepreneurship, Banking & Insurance etc. of Commerce stream as per the new pattern of
questions to be adopted in both CBSE and CHSE Boards and prepared books separately.
The subject experts, who are the best in their respective subjects in the state have been roped in
for this exercise. They have given their precious time to make the new pattern of Question Bank
as activity and solution based as per the direction of both CBSE and CHSE Boards.
I hope this material will be extremely useful for the students preparing for the +2 examination
in different subject of Science and Commerce streams.

Prof. (Dr.) A. B. Ota


Advisor-Cum-Director & Special Secretary
SCSTRTI, Govt. of Odisha
CONTENTS
Sl. No. Units Subjects Page No.

Paper - I

1. Unit - I Networking & Open Standards

A. Computer Networking 1-5

B. Internet & its Application 6-9

2. Unit - II Programming

A. Programming Fundamentals 10-13

B. HTML based web page covering basic tag 14-16

3. Unit - III Relational Database Management System

A. Database Fundamentals 17-19

B. Introduction to MYSQL 20-21

4. Unit - IV IT Applications

E-business 22-26

Paper - II

1. Unit - I Networking & Open Standards 27-33

2. Unit - II Programming 34-38

3. Unit - III Relational Database Management System 39-42

4. Unit - IV IT Applications 43-46

***
PAPER - I

UNIT - I

NETWORKING & OPEN STANDARDS

A. COMPUTER NETWORKING
I. Multiple Choice Questions:

1. Computer Network is 4. Repeater operates in which layer of


(a) Collection of hardware components the OSI model?
and computers (a) Physical layer
(b) Interconnected by communication (b) Data link layer
channels
(c) Network layer
(c) Sharing of resources and information
(d) All of the Above (d) Transport layer

2. The best example of computer network 5. is to regenerate the signal


is . over the same network before the
signal becomes too weak.
(a) Switch
(a) Hub
(b) Router
(b) Repeater
(c) Internet
(c) Switch
(d) None of these
(d) Router
3. What is the meaning of Bandwidth in
Network? 6. Bridge works in which layer of the
(a) Transmission capacity of a OSI model?
communication channels (a) Application layer
(b) Connected Computers in the (b) Transport layer
Network
(c) Network layer
(c) Class of IP used in Network
(d) Data link layer
(d) None of Above
// 1 //
7. What is the use of Bridge in Network? 12. A covers towns and cities
within 50K.m radius.
(a) to connect two LANs
(a) LAN (b) WAN
(b) to separate LANs
(c) to control Network Speed (c) MAN (d) None of these

(d) all of the above 13. It is used for the network that covers
large distance such as cover states
8. Router operates in which layer of OSI and countries.
Reference Model?
(a) LAN (b) WAN
(a) Physical Layer
(c) MAN (d) None of these
(b) Network Layer
14. is a standard for short-distance
(c) Transport Layer
wireless communication.
(d) Application Layer
(a) Wi-Fi (b) WAN
9. Routing tables of a router keeps (c) MAN (d) None of these
track of .
(a) MAC Address Assignments 15. Which of the following is/are the
advantages of wireless LANs.
(b) Port Assignments to network
devices i. Installation speed and simplicity

(c) Distribute IP address to network ii. Installation flexibility


devices iii. Scalability
(d) Routes to use for forwarding data (a) i and ii only
to its destination
(b) ii and iii only
10. Layer-2 Switch is also called (c) i and iii only
(a) Multiport Hub
(d) All i, ii and iii
(b) Multiport Switch
16. What does protocol defines?
(c) Multiport Bridge
(a) Protocol defines what data is
(d) Multiport NIC
communicated.
11. A is designed for small (b) Protocol defines how data is
physical areas such as an office, group
communicated.
of buildings within 10K.m radius.
(c) Protocol defines when data is
(a) LAN (b) WAN
communicated.
(c) MAN (d) None of these
(d) All of above

// 2 //
17. What is the benefit of the Networking? 22. Bus, ring and star topologies mostly
used in the
(a) File Sharing
(a) LAN
(b) Easier access to Resources
(b) MAN
(c) Easier Backups
(c) WAN
(d) All of the Above
(d) Internetwork
18. Which of the following is not the
23. Combination of two or more
Networking Devices?
topologies are called
(a) Gateways
(a) Star (b) Bus
(b) Window
(c) Ring (d) Hybrid
(c) Routers
24. Which of the following is not type of
(d) Firewalls
the network topology.
19. Which of the following is Software? (a) Mesh (b) Bus
(a) Routers (c) Ring (d) Stub
(b) Firewalls 25. In a network with 24 computers,
(c) Gateway which topology would require the
most extensive cabling?
(d) Modems
(a) Bus (b) Mesh
20. Physical or logical arrangement of (c) Star (d) Tree
network is
26. Mesh topology has physical
(a) Topology
channels to link 'n' devices.
(b) Routing (a) n
(c) Networking (b) n(n-1)/2

(d) None of the mentioned (c) (n-1)


(d) None of these
21. This topology requires multipoint
connection 27. In the star topology we use a central
device
(a) Star
(b) Hub
(b) Bus
(b) Electrical cable
(c) Ring
(c) Bus
(d) None of these
(d) None of these
// 3 //
28. Internet is II. Fill in the Blanks :
(a) A local computer network 33. A set of nodes connected by
is called a Network.
(b) A worldwide network of computers
(c) An interconnected network of 34. The exchange of data between two
computers devices through transmission medium is
called .
(d) A worldwide interconnected
network of computers which use a 35. is a set of rules which
common protocol to Communicate govern data communication.
with one another 36. A is a multiport repeater..
29. Internet requires 37. A is used to connect two
(a) An international agreement to LANs working on same protocol.
connect computers 38. normally connects LANs
(b) A local area network and WANs together.

(c) A commonly agreed set of rules to 39. A is a multi-port bridge with


communicate between computers a buffer.

(d) A World Wide Web 40. Data communication system spanning


states, countries, or the whole world is
30. Each computer connected to the .
internet must
41. is a device that routes data
(a) Be an IBM PC packets based on their IP address.
(b) Have a unique IP address
III. Objective Type Questions:
(c) Be internet compatible
42. How many layers of OSI Reference
(d) Have a modem connection Model have?

31. Which of the following is a type of 43. What does Router do in a network?
computer network? 44. In which topology there is a central
(a) Telnet (b) MAN controller or hub?

(c) Bluetooth (d) HTTP 45. Which topology is called completely


connected network?
32. Which of the following is a valid
network topology? 46. Expand WAN?
(a) WAN (b) MAN 47. Which network device is used to amplify
(c) Ring (d) PAN signal in long-distance networking?

// 4 //
ANSWER KEYS

1. (d) 17. (d) 33. Link

2. (c) 18. (b) 34. Data Communication

3. (a) 19. (b) 35. Protocols

4. (a) 20. (a) 36. Hub

5. (b) 21. (b) 37. Bridge

6. (d) 22. (a) 38. Routers

7. (a) 23. (d) 39. Switch

8. (b) 24. (d) 40. WAN

9. (d) 25. (b) 41. Router

10. (c) 26. (b) 42. 7

11. (a) 27. (a) 43. Finds the best possible


route for packets
12. (c) 28. (c)
44. Star
13. (b) 29. (c)
45. Mesh
14. (a) 30. (b)
46. Wide Area Network
15. (d) 31. (b)
47. Repeater
16. (d) 32. (c)

// 5 //
B. INTERNET & ITS APPLICATION
1. DNS maps IP addresses to 6. Which one of the following is a valid
(a) A binary Address as string email address?
(b) An alphanumeric string (a) [email protected]
(c) A hierarchy of domain names
(b) gmail.com
(d) A hexadecimal Address
(c) [email protected]
2. Identify the correct sequence in which
(d) javatpoint@books
packets are transmitted in a network
by a host when a browser requests a 7. Which one of the following is the
webpage from a remote server.
most common internet protocol?
(a) HTTP GET request, DNS Query,
TCP SYN (a) HTML (b) NetBEUI
(b) DNS Query, HTTP GET request, (c) TCP/IP (d) IPX/SPX
TCP SYN
8. The IP network 192.168.50.0 is to be
(c) DNS Query, TCP SYN, HTTP GET
request divided into 10 equal sized subnets.
(d) TCP SYN, HTTP GET request, Which of the following subnet masks
DNS Query can be used for the above requirement?
(a) 255.243.240
3. Which one the following protocol is
not used to resolve one form of an (b) 255.255.0.0
address to another (c) 255.255.255.0
(a) DNS (b) ARP
(d) 255.255.255
(c) DHCP (d) RARP
9. When the mail server sends mail to
4. A collection of hyperlinked documents
on the internet forms the other mail servers it becomes ___?
(a) World Wide Web (WWW) (a) SMTP client
(b) E-mail system (b) SMTP server
(c) Mailing list (c) Peer
(d) Hypertext markup language (d) Master
5. The location of a resource on the
10. In specific, if the systems use separate
internet is given by its?
protocols, which one of the following
(a) Protocol
devices is used to link two systems?
(b) URL
(c) E-mail address (a) Repeater (b) Gateway
(d) ICQ (c) Bridge (d) Hub

// 6 //
11. To join the internet, the computer has 17. Classifying content in social media
to be connected to a happens through an activity such as
(a) internet architecture board (a) Alphabetizing(b) Tagging
(b) internet society (c) Mapping (d) Line up
(c) internet service provider
(d) different computer 18. Unsolicited e-mail advertising is
known as .
12. Some websites proved chat rooms to (a) Newsgroup
interact with an individual or a group
(b) Junk ads
is called
(c) Spam
(a) Usenet (b) Newsgroup
(d) None of the above
(c) Chatting (d) E-mail

13. The sites include text, 19. In social media, what type of marketing
animated graph, voice and images. has become important for advertisers?

(a) Media (b) Telnet (a) E-mailed handbills and online


press kits
(c) Intranet (d) Multimedia
(b) Word-of-mouth, or buzz marketing
14. A modem that has extra functions (c) E Electronic ads
such as automatic answering and
(d) Product placement
dialing is called modems.
(a) Sophisticated (b) High class 20. Blogs or weblogs are

(c) Dedicated (d) Intelligent (a) Web pages of short, frequently


updated postings by an individual
15. A computer sharing software package that are arranged chronologically.
and hard disk is called a
(b) Messages of 140 characters or less.
(a) Server (b) Network
(c) A category for discussion groups
(c) File server (d) Stand-alone within Usenet.
16. As the definition of social media (d) A web page that allows anyone to
develops, what is one underlying edit it.
element?
21. What are shared on the Internet and
(a) The intersection between technology,
social interaction, and sharing are called as Web pages?
information. (a) Programs
(b) Microsoft is the primary developer. (b) Cables
(c) Use of the various elements is free. (c) Hypertext documents
(d) All of the above (d) None
// 7 //
II. Fill in the blanks / State True or 35. Conversation is a defining characteristic
False: of social media today. State True/False
22. An RPC (remote procedure call) is 36. A lurker on discussion boards and Web
initiated by the forums is a person who posts irrelevant
23. A remote procedure call is or inflammatory messages. State True/
False
24. are the primary services offered
by the computer networks. 37. Blogs play an important curatorial role
in social media because some popular
25. media is the pathway for
blogs are followed by people seeking the
contacting each computer with other.
best and most interesting ideas. State
26. In networks, users can share and True/False

III. Objective Type Questions:


27. The button reverts to the home
38. What is the mechanism that is used to
page of the website.
convert domain name into IP address
28. Web page editors works on a
39. What is DNS spoofing?
principle.
29. The language that instructs the browser 40. How many possible labels are allowed
on how to display the hypertext, and adds in the first level of generic domain?
pictures to the document is 41. The term HTTP stands for?
30. Looking for information on the Internet 42. Which software prevents the external
is called access to a system?
31. was one of the first uses of the 43. The term FTP stands for?
Internet and is still the most popular use,
44. The term IANA stands for?
accounting for most of the traffic on the
Internet. 45. How many versions available of IP?
32. Ping summarizes the packet loss and 46. What is internet?
round-trip delay between two IP end
47. Which program/application is used by
points.State True/False
web clients to view the web pages?
33. Web 2.0 is a term used to describe major
48. What is the name of the location address
technological shifts or improvements in
of the hypertext documents?
the Web. State True/False
49. Which tag is used to display text in title
34. Media users today are accurately described
bar of a web document?
as passive consumers because most tend
to accept information and media content 50. What are used with a tag to modify its
as presented. State True/False function?

// 8 //
ANSWER KEYS

1. (c) 26. Data & Programs


2. (c) 27. Home
3. (c) 28. WYSIWYG
4. (a) 29. HTML
5. (b) 30. Browsing & Surfing
6. (a) 31. E-mail
7. (c) 32. True
8. (c) 33. False
9. (a) 34. False
10. (b) 35. True
11. (c) 36. False
12. (c) 37. True
13. (d) 38. DNS
14. (d) 39. Un-authorized request to DNS
15. (c) 40. 7
16. (a) 41. Hyper Text Transfer Protocol
17. (b) 42. Firewall
18. (c) 43. File Transfer Protocol
19. (b) 44. Internet Assigned Numbers Authority
20. (a) 45. 2
21. (c) 46. Inter Connected of Network
22. Client 47. Browsing
23. Inter Process Communications 48. URL
24. File Services 49. <Title>
25. Transmission 50. Attributes
// 9 //
UNIT - II

PROGRAMMING

A. PROGRAMMING FUNDAMENTALS

I. Multiple Choice Questions:

1. What happens if constructor of class 4. Which inheritance in java programming


A is made private? is not supported?
(a) Any class can instantiate objects (a) Multiple inheritance using classes
of class A
(b) Multiple inheritance using
(b) Objects of class A can be instantiated interfaces
only within the class where it is
(c) Multilevel inheritance
declared
(c) Inherited class can instantiate (d) Single inheritance
objects of class A
5. What is subclass in java?
(d) classes within the same package as
(a) Subclass is a class that extends
class A can instantiate objects of
another class
class A
(b) Subclass is a class declared inside
2. All the variables of interface should be ?
a class
(a) default and final
(c) Both above
(b) default and static
(d) None of the above
(c) public, static and final
(d) protect, static and final 6. If class B is sub classed from class A
then which is the correct syntax
3. What is true of final class?
(a) Class B: A {}
(a) Final class cause compilation failure
(b) Final class cannot be instantiated (b) Class B extends A {}

(c) Final class cause runtime failure (c) Class B extends class A {}
(d) Final class cannot be inherited (d) Class B implements A {}

// 10 //
7. Order of execution of constructors in 11. Which class cannot be sub classed?
Java Inheritance is (a) final class
(a) Base to derived class (b) object class
(b) Derived to base class (c) abstract class
(c) Random order (d) child class
(d) None 12. Which is/are false statements
8. Inheritance relationship in Java (a) final class cannot be inherited
language is (b) final method can be inherited
(a) Association (c) final method can be overridden
(b) Is-A (d) Final variable of a class cannot be
(c) Has-A changed.

(d) None 13. hich cannot be inherited from a base


class in Java programming
9. Advantage of inheritance in java
(a) Constructor (b) final method
programming is/are
(c) Both (d) None
(a) Code Re-usability
14. Which cannot be inherited from a
(b) Class Extendibility
base class in Java programming?
(c) Save development time (a) Cannot override private method of
(d) All a class
(b) Protected methods are visible to
10. Which of the following is/are true
only immediate child class
statements?
(c) Public methods of a class are
(a) A class can extend only one class
visible to all
but can implement many
(d) All
interfaces
(b) An interface can extend many 15. To prevent a class to be inherited /
interfaces extended, the class should be

(c) An interface can implement (a) final class


another interface (b) abstract class
(d) An interface can implement (c) final and abstract both
a class (d) none

// 11 //
16. Which of these class is superclass of II. Fill in the blanks
every class in Java?
21. Method to compare two strings ignoring
(a) String class the case is
(b) Object class
22. method converts an entire
(c) Abstract class string to Upper case.
(d) ArrayList class
23. Method Removes spaces from
17. Which of these method of Object class both sides of a String.
can clone an object?
24. Returns absolute value of the
(a) ObjectCopy () number.
(b) Copy ()
III. Objective Type Questions:
(c) Objectclone ()
(d) Clone () 25. What is a method that compares two
strings and supports a 3-way comparison?
18. Which of these keywords can be used
to prevent inheritance of a class? 26. What is a method that compares two
(a) Super (b) Constant strings and supports 2-way comparison?

(c) Class (d) Final 27. Which method concatenates two strings
19. Which of these class relies upon its /Joins two strings?
subclasses for complete implementation
of its methods? 28. Which Method Returns a character by
index position in a string?
(a) Object class
(b) Abstract class 29. Method to return part of a string in java.

(c) ArrayList class 30. A Method that returns a Boolean value


(d) None of these to check a string with specified suffix.

20. If a class inheriting an abstract class 31. What will be the output of the following
does not define all of its function then code.
it will be known as? Public static void main (String [] args){
(a) Abstract Class
// Integer class wraps a value of the
(b) Simple Class primitive type int in an object
(c) Static class //An object of type Integer contains a
(d) None of these single field whose type is int.

// 12 //
int x = 5; 32. How can a protected modifier be
accessed?
Integer a =x;
33. How many copies of static and class
System.out.println(a.compareTo(5));//0 variables are created when 10 objects are
created of a class?
System.out.println(a.compareTo(6));//-1
34. A class can be declared with a protected
System.out.println(a.compareTo(4));//1
modifier. State True/False
} 35. Which is the modifier when there is
none mentioned explicitly?

ANSWER KEYS

1. (b) 13. (a) 25. compareTo()

2. (c) 14. (d) 26. equals()

3. (d) 15. (a) 27. concat()

4. (a) 16. (b) 28. charAt()

5. (a) 17. (c) 29. substring()

6. (b) 18. (d) 30. endsWith()

7. (a) 19. (b) 31. 0, -1, 1

8. (b) 20. (a) 32. within package

9. (d) 21. equalsIgoreCase () 33. 1,10

10. (A & B) 22. toUpperCase () 34. False

11. (a) 23. trim() 35. Default

12. (c) 24. abs()

// 13 //
B. HTML BASED WEB PAGE COVERING BASIC TAG
1. Which of the following tag is used for 8. Which HTML tag would be used to
line breaks in the documents? display power in expressionX^n+Y=10?
(a) <p> (b) <br> (a) <sup> (b) <sub>
(c) <hr> (d) <break> (c) <b> (d) <p>
2. Which of the following tag is used for 9. Choose the correct HTML code to
new paragraph in the documents? create an email link?
(a) <p> (b) <br> (a) <a href = 'xx 2 yy. Com"></a>
(c) <hr> (d) <break>
(b) <a href="[email protected]"></a>
3. Which of the following tag is not an (c) <mail>[email protected]</mail>
empty tag? (d) < a mailhref = [email protected]></a>
(a) <p> (b) <br>
10. Choose the correct HTML tag for the
(c) <hr> (d) <li>
largest heading?
4. Which of the following is not web (a) <h1> (b) <h2>
browser? (c) <h4> (d) <h6>
(a) Netscape Navigator
(b) Internet Explorer 11. Which of the following is not an
attribute of <font> tag
(c) Mozilla Firefox
(a) color (b) bgcolor
(d) Notepad
(c) size (d) face
5. Which of the following tags is used
for bold facing the text? 12. <li> is used to create items of an
(a) <br> (b) <strong>
(c) <tt> (d) <li> (a) Ordered list
(b) Unordered list
6. Which of the image file extension
(c) Neither of a and b
cannot be inserted in the web page?
(d) Both a and b
(a) .pcd (b) .gif
(c) .jpg (d) .jpeg 13. An ordered list

7. You can insert images in (a) can be nested in an unordered list


your web pages. (b) can be nested in another ordered list
(a) 1 (b) 2 (c) starts with <list> tag
(c) 5 (d) No Limit (d) ends with </li> tag

// 14 //
14. Which of the following control allows 21. HTML documents are saved in
the user to select multiple values? (a) binary format
(a) Menu Control (b) machine language
(b) Checkbox Control (c) ASCII text
(c) Frame (d) None of these
(d) Radio Button
22. The tags which encloses text inside
15. Which of the following is not a form
it are
control in HTML?
(a) couple tags (b) single tags
(a) Checkbox
(c) double tags (d) paired tags
(b) Radio Box
(c) Submit Button
II. Fill in the blanks
(d) Reset Button
23. In the <hr> tag hr stands for .
16. Which tag is used to display a picture
24. Tags and text that are not directly
on a web page?
displayed on the page are written in
(a) picture (b) image
section.
(c) img (d) src
25. Which tag is used to insert a horizontal
17. Except <b> which other tag is used line in a web page?
to make text bold?
26. is the first tag in an HTML
(a) <strong> (b) <dar>
document?
(c) <black> (d) <bold>
27. is used to create ordered and
18. Which of the following is not a unordered list or bulleted list.
pair tag?
28. Bulleted list is known by another name
(a) <p> (b) <u>
which is
(c) <i> (d) <img>
29. The application software required to
19. To create HTML document you view and explore web pages is called
require a .
(a) Web page editing software
30. A simple word processor is called
(b) High powered computer
. Text Editor
(c) Notepad
31. Google Chrome is a . Web
(d) None of these
Browser
20. The properties of an HTML element
or tag is called 32. Notepad is a . Text editor
(a) tags (b) attributes 33. Special formatted text or commands in
(c) values (d) None of these HTML is called . Tags/ Elements
// 15 //
III. Objective Type Questions: 42. Which tag in HTML is used to create
type letter font? <tt>
34. What does "vlink" attribute mean?

35. What is used to link various web pages? 43. Which tag in HTML is used to represent
text with horizontal stinking
36. Which tag contains both opening and
text?<strike>
closing tag? Paired tag
44. Which tag in HTML is used to scroll text
37. Which tag contains only opening tag?
on a web page?<marquee>
Singular tag
45. How many types of heading tags are
38. Which tag contains the information
there? 6
about a web page? <title>

39. What is the maximum no. of characters 46. What represents the smallest heading
supported in HTML title? 64 tag?<h6>

40. Which tag in HTML displays heading? 47. What represents the largest heading tag?
<h1>…<h6> <h1>

41. Which tag in HTML is used to create 48. Which tag is used to create a line break?
italic font? <i> <br>

ANSWER KEYS
1. (b) 13. (a & b) 25. <hr> 37. Singular tag
2. (a) 14. (b) 26. <html> 38. <title>
3. (a) 15. (d) 27. <li> 39. 64
4. (d) 16. (c) 28. Unordered list 40. <h1>…<h6>
5. (b) 17. (a) 29. Web Browser 41. <i>
6. (a) 18. (d) 30. Text editor 42. <tt>
7. (d) 19. (c) 31. Web Browser 43. <strike>
8. (a) 20. (b) 32. Text Editor 44. <marquee>
9. (b) 21. (c) 33. Tags/elements 45. 6
10. (d) 22. (d) 34. Visited Link 46. <h6>
11. (b) 23. Horizontal Rule 35. <href> 47. <h1>
12. (d) 24. Title 36. Paired tags 48. <br>

// 16 //
UNIT - III

RELATIONAL DATABASE MANAGEMENT SYSTEM

A. DATABASE FUNDAMENTALS

I. Multiple Choice Questions:

1. Which of the following is generally 3. What do you mean by one to many


used for performing tasks like relationships?
creating the structure of the relations, (a) One class may have many teachers
deleting relation? (b) One teacher can have many classes

(a) DML (c) Many classes may have many


(Data Manipulation Language) teachers
(d) Many teachers may have many
(b) Query
classes
(c) Relational Schema 4. A Database Management System is a
type of software.
(d) DDL
(Data Definition Language) (a) It is a type of system software
(b) It is a kind of application software
2. Which of the following provides the
(c) It is a kind of general software
ability to query information from the
database and insert tuples into, delete (d) Both A and C

tuples from, and modify tuples in the 5. Which of the following can be used
database? to extract or filter the data &
information from the data warehouse?
(a) DML(Data Manipulation Language)
(a) Data redundancy
(b) DDL(Data Definition Language)
(b) Data recovery tool
(c) Query
(c) Data mining
(d) Relational Schema (d) Both B and C
// 17 //
6. Which one of the following refers to 10. Which one of the following is a type
the copies of the same data (or of Data Manipulation Command?
information) occupying the memory
(a) Create
space at multiple places.
(b) Alter
(a) Data Repository
(c) Delete
(b) Data Inconsistency
(d) All of the above
(c) Data Mining
11. Which of the following command is
(d) Data Redundancy
a type of Data Definition language
7. Which one of the following refers to command?
the "data about data"?
(a) Create
(a) Directory
(b) Update
(b) Sub Data
(c) Delete
(c) Warehouse
(d) Merge
(d) Meta Data
12. Which of the following is used to
8. Which of the following refers to the denote the selection operation in
level of data abstraction that describes relational algebra?
exactly how the data actually stored?
(a) Pi (Greek)
(a) Conceptual Level
(b) Sigma (Greek)
(b) Physical Level
(c) Lambda (Greek)
(c) File Level
(d) Omega (Greek)
(d) Logical Level
13. The operation, denoted by ?,
9. Which of the following refers to the allows us to find tuples that are in one
number of tuples in a relation? relation but are not in another.

(a) Entity (a) Union

(b) Column (b) Set-difference

(c) Cardinality (c) Difference

(d) None of the above (d) Intersection


// 18 //
II. Fill in the blanks 17. The clause allows us to select
only those rows in the result relation
14. A huge collection of the information or
satisfy a specified predicate.
data accumulated form several different
sources is known as . III. Objective Type Questions:
15. Rows of a relation are known as the 18. What is a unary operation?
.
19. Which is a join condition containing an
16. What displays the unique values of the equality operator.
column?
20. What is used to sort the result of query
SELECT dept_name FROM according to an attribute?
instructor;

ANSWER KEYS

1. (d) 8. (b) 15. Tuples

2. (a) 9. (a) 16. DISTINCT

3. (b) 10. (c) 17. WHERE

4. (b) 11. (a) 18. One operand

5. (c) 12. (a) 19. Equijoin

6. (d) 13. (c) 20. Order by

7. (d) 14. Data warehouse

// 19 //
B. INTRODUCTION TO MYSQL
1. In precedence of set operators, the 5. In DBMS, the description of database
expression is evaluated from in the form of schema is also called

(a) Left to left (a) Extension of schema


(b) Left to right (b) Intension of schema
(c) Right to left (c) Mathematical operators of schema
(d) From user specification (d) Logical operators of schema
2. Which of the following is not outer 6. Which of the following can add a row
join? to a table?
(a) Left outer join (a) Alter
(b) Right outer join
(b) Add
(c) Full outer join
(c) Insert
(d) None of these
(d) Commit
3. The System which schedules the
7. Which of these commands will delete
inputs and outputs of the disk in
a table called XXX if you have
database is classified as
appropriate authority?
(a) Operating system
(a) DROP XXX
(b) Host system
(b) DROP TABLE XXX
(c) Client system
(c) DELETE XXX
(d) Structured system
(d) DELETE TABLE XXX
4. The program interface which provides
the feature to client side programs to 8. Which of the following is not
call the DBMS is classified as available in MySQL?

(a) Open programming interface (a) REVOKE

(b) Closed programming interface (b) FETCH

(c) Application programming interface (c) LIKE


(d) Data programming language (d) JOIN
// 20 //
9. Which keyword is the synonym for II. Objective Type Questions:
DATABASE?
13. The facility that allows nesting one
(a) TABLE (b) OBJECT select statement into another is called
.
(c) DB (d) SCHEMA
14. The assignment operator is denoted by
10. What is abc in the following SQL
which symbol?
statement?
DELETEFROM xyz WHEREabc=5; 15. What is called the graphical
(a) column name representation of database description?
(b) table name 16. If you want to undo a GRANT, you
(c) row name should use what?
(d) database name
17. What are the differences between
11. What is the value of val2 in the DESCRIBE and SHOW FIEEDS FROM
following MySQL statement? commands?
UPDATE t SET val1=val1+2, val2 = val1; 18. What statement is used to select a
(a) previous val1 (b) updated val1 default database?

(c) unchanged (d) val1 + 1 19. To create a database only if it doesn't


12. Which keyword is used to delete all already exist, which clause is used?
the rows from the table? 20. Which keyword in the UPDATE
(a) TRUNCATE (b) REMOVE statement is used to assign values to
(c) DELETEALL (d) CLEAR columns?

ANSWER KEYS
1. (c) 6. (c) 11. (b) 16. Revoke

2. (d) 7. (b) 12. (a) 17. Use

3. (a) 8. (b) 13. SubQuerying 18.

4. (c) 9. (d) 14. = 19. If Not Exists

5. (a) 10. (a) 15. Schema Diagram 20. Set

// 21 //
UNIT - IV

IT APPLICATIONS

E-BUSINESS

I. Multiple Choice Questions:

1. An error in computer data is called 4. World Wide Web


(a) Storage devices (a) a collection of world-wide
(b) CPU information

(c) Chip (b) a collection of linked information


(d) Bug residing on computers connected
by the Internet
2. Which hole is used to mark the
location of the first sector in a soft (c) world-wide connection for
sectored disk? computers
(a) Address (d) is another name for internet
(b) Index
5. Which of the following describes
(c) Label E-commerce?
(d) Location (a) Doing Business electronically
3. A microprocessor chip used in a PC (b) Doing business
system
(c) Sale of Goods
(a) Almost always operates on by-bits
of data at a time d) All of the Above
(b) Is the only chip found in most pc
6. Which of the following is not one of
models?
the major types of E-commerce?
(c) Performs the arithmetic -logic and
control functions (a) C2B (b) B2C

(d) None of the above (c) B2B (d) C2C

// 22 //
7. Which of the following is not 12. Which of the following is not a
considered to be one of the three limitation of the current market?
phases of E-commerce?
(a) Insufficient capacity through out
(a) Innovation the backbone

(b) Consolidation (b) Network architecture limitations

(c) Preservation (c) Insufficient reach

(d) Reinvention (d) Best efforts QAS

8. Which Segment do eBay, Amazon.com 13. Which of the following is a new and
belongs? disruptive Web feature or service?
(a) B2Bs (b) B2Cs (a) XML (b) diffserv
(c) C2Bs (d) C2Cs (c) blogs (d) CDMA

9. Which type of e-commerce focuses on 14. Which of the following is a useful


consumers dealing with each other? security mechanism when considering
(a) B2Bs (b) B2Cs business strategy and IT?

(c) C2Bs (d) C2Cs (a) Encryption


(b) Decryption
10. The Best products to sell in B2C
e-commerce are: (c) Firewall
(d) All of the above
(a) Small products

(b) Digital products 15. Which of the following statement


accurately reflect the impact of
(c) Speciality products technology?
(d) Fresh products (a) Technology has caused buyer
power to increase
11. Which of the following is not a key
element of a business model? (b) Technology has lessened the entry
barriers for many industries
(a) Value proposition
(c) Technology has increased the
(b) Competitive advantage threat of substitute products and
(c) Market strategy services
(d) All of the above
(d) Universal standard
// 23 //
16. How the transactions occur in 20. A strategy designed to compete in all
e-commerce markets around the globe is called a
strategy..
(a) Using e-medias
(a) Scope
(b) Using computers only
(b) Differentiation
(c) Using mobile phones only
(c) Cost
(d) None of the above
(d) Focus
17. Which type of products is lesser
purchased using e-commerce? 21. Which of the following is not one of
the stages of the development of the
(a) Automobiles
internet?
(b) Software
(a) Innovation
(c) Books
(b) Institutionalization
(d) none
(c) Globalization
18. All of the following are factors in (d) Commercialization
optimizing Web Site performance
except . 22. Which protocols permits users to
transfer the files from server to their
(a) Page retrieval
client computer and vice versa?
(b) Page generation
(a) HTTP (b) SMTP
(c) Page delivery
(c) IMFP (d) FTP
(d) Page content
23. is a program that you
19. A business competing in a commodity can run in windows operating system
like environment must focus on in order to check the connection
which of the following? between your client and server.

(a) Price (a) Ping

(b) Ease/speed of delivery (b) Telnet

(c) Ease of ordering (c) SSL

(d) All of the above (d) All of the above

// 24 //
24. Which of the following is not a 28. The largest component in Web Site
limitation of the current internet? budget is

(a) Insufficient capacity throughout (a) System maintenance


the backbone (b) System development
(b) Network architecture limitations (c) Content design and development
(c) Insufficient reach (d) Telecommunication

(d) Best efforts QOS. 29. Which of the following measures the
percentage of people exposed to an
25. Which of the following was the first
online advertisement who actually
commercial web browser?
click on the banner?
(a) Mosaic (a) Impression rate
(b) Mozilla (b) View through rate
(c) Netscape Navigator (c) Click through rate
(d) Internet Explorer (d) Stickiness ration

26. A describes the flow of II. Fill in the blanks


information at your e-commerce site
and your infrastructure that will be 30. Computers that are portable and
used in the system convenient for users who travel are
known as .
(a) System Design
31. If a user needs information instantly
(b) Logical Design available to the CPU, It should be stored
(c) Tactical Design in .

(d) Physical Design 32. The dimension of e commerce that


enables commerce across national
27. All of the following are factors in boundaries is called
optimizing web site performance except
33. The primary source of financing during
(a) Page retrieval the early years of e-commerce was
(b) Page generation .

(c) Page delivery 34. All of the following are technologies


used to gather information about you
(d) Page Content
online except .
// 25 //
35. A is a set of plan activities designed 41. A situation where there are no
to result in a profit in a marketplace. differences among products and
services, and the only basis of choosing
36. The area of actual or potential commercial;
product is price is known as .
value in which a company intends to
operate is a . III. Objective Type Questions:

37. A perfect market is one in which . 42. Which term represents a count of the
number of people who visit one site,
38. Broadband is generally considered to be
click on an ad, and are taken to the site
any communication technology allowing
of the advertiser?
streaming audio and video at or above
. 43. What is the percentage of customers
who visit a web site and actually buy
39. The threat of new entrant is high when it
something called?
is .
44. LISP is suitable for which operations?
40. A describes the flow of
information at your e-commerce site 45. What is the idealistic market envisioned
and the infrastructure that will be used at the outset of the development of
in the system. e-commerce?

ANSWER KEYS
1. (d) 13. (c) 25. (c) 36. Market space
2. (b) 14. (d) 26. (b) 37. No competitive advantage
3. (c) 15. (d) 27. (a) 38. 100 kbps
4. (b) 16. (a)
28. (a) 39. Easy for competitor to
5. (a) 17. (a)
29. (c) enter the market
6. (a) 18. (a)
30. Laptops 40. Logical design
7. (c) 19. (d)
31. In the CPU 41. Commoditization
8. (b) 20. (a)
21. (c) 32. Global reach 42. Click through
9. (d)
22. (d) 33. Ventura Capital Fund 43. Conversion rate
10. (b)
11. (d) 23. (a) 34. Anonymizers 44. Arithmetic & Numeric

12. (c) 24. (c) 35. Business model 45. Bertrand market

// 26 //
PAPER - II
UNIT - I
NETWORKING & OPEN STANDARDS

OBJECTIVE QUESTIONS:
1. Write the name of three network 16. What is the difference between MAN
topologies. and WAN?

2. What is the need for internet protocols? 17. What is meant by Topology?

3. Explain the uses of TCP/IP, HTTP and 18. What are the similarities and differences
FTP. between bus and tree topologies?

4. Expand the following: (a) LAN (b) IAN 19. What are the layers of the OSI reference
model?
(c) DSC (d) FTP
20. What is a node?
5. What is firewall?
21. What are routers?
6. What is gateway?
22. What is point to point link?
7. Write two advantages of networks.
23. What is subnet mask?
8. What is TELNET?
24. What is the job of the Network Layer
9. What are the various types of networks? under the OSI reference model?
10. What is CDMA? 25. What is a way of Securing a Computer
Network?
11. What is a link?
26. What is NIC?
12. Define a network.
27. What is the importance of the OSI
13. What is communication channel?
Physical Layer?
14. What is IP address?
28. How many layers are there under TCP/
15. What is domain name? IP?

// 27 //
29. What are proxy servers and how do they 38. What is ISP?
protect computer networks?
39. What is ISDN?
30. What is the function of the OSI Session
40. What is Telnet?
Layer?
41. What is Virus?
31. What is a private IP address?
42. What is Cookies?
32. What is NOS?
43. What is malicious software?
33. What is OSI and what role does it play
in computer networks? 44. What is Hacking?

34. Define Simplex transmission mode. 45. What is Digital Signature?

35. Define Half Duplex transmission mode. 46. What is Snooping?

36. Define Full Duplex transmission mode. 47. What is Cyber Crime?

37. What is DNS? 48. What is Cyber law?

SUBJECTIVE QUESTIONS:

1. What is meant by Topology? Describe some popular topologies.

2. Describe the layers of the OSI reference model?

3. What is Web Server? Give Examples.

4. What are importance of Cyber law

// 28 //
UNIT - I

ANSWER KEYS
OBJECTIVE QUESTIONS:

1. Star, Bus, Mesh 6. A gateway is a network node that


connects two networks using different
2. The Internet Protocol (IP) is the
protocols together. While a bridge is
protocol by which data is sent from one used to join two similar types of
computer to another on the Internet. networks, a gateway is used to join two
3. Transmission Control Protocol/Internet dissimilar networks.
Protocol (TCP/IP) is a suite of 7. Advantages: i. Data or information can
communication protocols used to be shared among the users. ii. Fast
interconnect network devices on the communication can be achieved.
internet. The Hypertext Transfer
Protocol (HTTP) is an application 8. Telnet is a protocol used on the Internet
protocol for distributed, collaborative, or local area network to provide a
hypermedia information systems. The bidirectional interactive text-oriented
Hypertext Transfer Protocol (HTTP) is communication facility using a virtual
terminal connection.
an application protocol for distributed,
collaborative, hypermedia information 9. Network can be classified on the basis
systems. of their size, complexity and
geographical spread. On the basis of
4. (a) LAN : Local Area Network
geographical spread it can be classified
(b) IAN : Internet Area Network as Local Area Network, Metropolitan
Area Network and Wide Area Network.
(c) DSC: Digital Signature Certificate

(d) FTP: File Transfer Protocol 10. Code Division Multiple Access
(CDMA) is a channel access method
5. 5. A firewall is a network security device used by various radio communication
that monitors incoming and outgoing technologies. CDMA is an example of
network traffic and permits or blocks multiple access, where several
data packets based on a set of security transmitters can send information
rules. simultaneously over a single

// 29 //
communication channel. CDMA is used 17. Network topology is defined as the
as the access method in many mobile interconnection of the various elements
phone standards. (links, nodes, etc.) of a computer
network. In computer networking,
11. A link refers to the connectivity between
topology refers to the layout of
two devices. It includes the type of cables
connected devices. A) Bus topology b)
and protocols used in order for one
Star topology c) Ring topology d) Tree
device to be able to communicate with
topology e) Mesh topology
the other.
18. In bus topology each machine is
12. A computer network is a system in which
connected to a single cable. Each
computers are connected to share
computer or server is connected to the
information and resources.
single bus cable through some kind of
13. Communication channels mean the connector. Tree topology is a network
connecting cables that link various with the shape of an inverted tree in
workstations. which a single link between two nodes.

14. A unique number consisting of 4 parts 19. There are 7 OSI layers: Physical Layer,
separated by dots, e.g. 165.113.245.2. Data Link Layer, Network Layer,
Every machine that is on the Internet has Transport Layer, Session Layer,
a unique IP number - if a machine does Presentation Layer and Application
not have an IP number, it is not really on Layer.
the Internet.
20. A node refers to a point or joint where a
15. The unique name that identifies an connection takes place. It can be
Internet site. Domain Names always have computer or device that is part of a
2 or more parts, separated by dots. The network. Two or more nodes are needed
part on the left is the most specific, and in order to form a network connection.
the part on the right is the most general.
21. Routers can connect two or more
E.g.: matisse.net
network segments. These are intelligent
16. A metropolitan area network (MAN) is network devices that store information
a large computer network that usually in its routing table such as paths, hops
spans a city or a large campus. WAN is a and bottlenecks. With this info, they are
network that covers an area larger than a able to determine the best path for data
single building or campus such as across transfer. Routers operate at the OSI
the cities or countries. Network Layer.

// 30 //
22. It refers to a direct connection between 28. There are four layers: the Network
two computers on a network. A point to Layer, Internet Layer, Transport Layer
point connection does not need any and Application Layer.
other network devices other than
29. Proxy servers primarily prevent external
connecting a cable to the NIC cards of
users who identifying the IP addresses
both computers.
of an internal network. Without
23. A subnet mask is combined with an IP knowledge of the correct IP address,
address in order to identify two parts: even the physical location of the network
the extended network address and the cannot be identified. Proxy servers can
host address. Like an IP address, a subnet make a network virtually invisible to
mask is made up of 32 bits. external users.
24. The Network layer is responsible for
30. This layer provides the protocols and
data routing, packet switching and
means for two devices on the network to
control of network congestion. Routers
communicate with each other by holding
operate under this layer.
a session. This includes setting up the
25. Good passwords are made up of not just session, managing information exchange
letters, but by combining letters and during the session, and tear-down
numbers. A password that combines process upon termination of the session.
uppercase and lowercase letters is
31. Private IP addresses are assigned for use
favorable than one that uses all upper case
on intranets. These addresses are used
or all lower case letters. Passwords
for internal networks and are not
must be not words that can easily be
routable on external public networks.
guessed by hackers, such as dates,
These ensures that no conflicts are
names, favorites, etc. Longer passwords
present among internal networks while
are also better than short ones.
at the same time the same range of
26. NIC is short for Network Interface Card. private IP addresses are reusable for
This is a peripheral card that is attached multiple intranets since they do not "see"
to a PC in order to connect to a network. each other.
Every NIC has its own MAC address that
32. Network Operating System (NOS), is
identifies the PC on the network.
specialized software whose main task is
27. The physical layer does the conversion to provide network connectivity to a
from data bits to electrical signal, and computer in order for it to be able to
vice versa. This is where network devices communicate with other computers and
and cable types are considered and setup. connected devices.
// 31 //
33. OSI (Open Systems Interconnect) 39. Integrated Services Digital Network
serves as a reference model for data (ISDN) is a set of communication
communication. It is made up of 7 layers, standards for simultaneous digital
with each layer defining a particular transmission of voice, video, data, and
aspect on how network devices connect other network services over the
and communicate with one another. One traditional circuits of the public
layer may deal with the physical media switched telephone network.
used, while another layer dictates how 40. Telnet is a protocol used on the Internet
data is actually transmitted across the or local area network to provide a
network. bidirectional interactive text-oriented
communication facility using a virtual
34. In Simplex mode, the communication is
terminal connection.
unidirectional, as on a one-way street.
41. A computer virus is a type of malicious
35. Half-duplex transmission mode of data
software that, when executed, replicates
in just one direction at a time. For
itself by modifying other computer
example, a walkie talkie.
programs and inserting its own code.
36. Full-duplex data transmission means that
42. Cookies are small files which are stored
data can be transmitted in both directions
on a user's computer. They are designed
on a signal carrier at the same time. For
to hold a modest amount of data specific
example, on a local area network with a to a particular client and website, and can
technology that has full-duplex be accessed either by the web server or
transmission, one workstation can be the client computer.
sending data on the line while another
workstation is receiving data. 43. Malicious Software refers to any
malicious program that causes harm to
37. DNS is Domain Name System. The main a computer system or network.
function of this network service is to Malicious Software attacks a computer
provide host names to TCP/IP address or network in the form of viruses,
resolution. worms, trojans, spyware.

38. An Internet Service Provider (ISP) is an 44. Hacking generally refers to unauthorized
organization that provides services for intrusion into a computer or a network.
accessing, using, or participating in the The person engaged in hacking activities
Internet. is known as a hacker.

// 32 //
45. A digital signature is a mathematical 47. Cyber-crime is any criminal activity that
scheme for verifying the authenticity of involves a computer, networked device
digital messages or documents. or a network.

46. Snooping, in a security context, is 48. Cyber law is the part of the overall legal
unauthorized access to another person's system that deals with the Internet and
or company's data. cyberspace.

ANSWER HINTS

SUBJECTIVE QUESTIONS:
1. Representation of Computer Networks in different structures.

2. OSI reference model description

3. A designated high performance system to host web pages.

4. Cyber law is important because it touches almost all aspects of transactions and activities
on and concerning the Internet, the World Wide Web and Cyberspace.

// 33 //
UNIT - II
PROGRAMMING

OBJECTIVE QUESTIONS :

1. What is an access specifier? 10. How many types of heading does an


HTML contain?
2. Mention different types of access
specifiers. 11. How to create a hyperlink in HTML?
3. Write the use of substring ( ) function 12. Which HTML tag is used to display the
with an example. data in the tabular form?
4. Distinguish between static and dynamic 13. What are some common lists that are
pages in a website.
used when designing a page?
5. Distinguish between LCASE ( ) and
14. What is the difference between HTML
UCASE ( ).
elements and tags?
6. Distinguish between RIGHT ( ) and
15. Does a hyperlink only apply to text?
RTRIM ( ) functions with example.
16. What is a marquee?
7. What is HTML?

8. What are Tags? 17. How to make a picture of a background


image of a web page?
9. Do all HTML tags have an end tag?

SUBJECTIVE QUESTIONS:
1. Explain the use of five commonly used tags in an HTML document.

2. What is meant by Access Modifier? Describe the uses of different Access Modifiers of
Java with examples

3. What are the difference types of inheritance in java?

// 34 //
UNIT - II

ANSWER KEYS
OBJECTIVE QUESTIONS:
1. Access specifiers are keywords in 3. The substring () function extracts a
objectoriented languages that set the substring from a string (starting at any
accessibility of classes, methods, and position).
other members.
Syntax: substring (string, start, length)
2. Access specifiers are keywords in
Ex- Select substring ('hello', 2, 3);
object-oriented languages that set the
accessibility of classes, methods, and Output: llo
other members. Types of access
4. Static Pages
specifiers: In java we have 4 Access
specifiers and they are as follows: 1. (i) Static web pages have fixed
Public, 2. Private, 3. Protected 4. content
Default (no specifier).
(ii) Static web pages have to be
Public access specifier: The public
manually changed
access specifier is accessible
everywhere. It has the widest scope (iii) Static web pages use only a web
among all other modifiers. server

Private access specifier: The private Dynamic Pages


access specifier is accessible only
within class. (i) Dynamic web pages may have
changing content
Protected access specifier: The
protected access specifier is accessible (ii0 Changes to a dynamic page can be
within package and outside the package loaded through an application
but through inheritance only. where resources are stored in a
database.
Default access specifier: If you don't
use any specifier, it is treated as default. (iii) Dynamic web pages use a web
The default modifier is accessible only server, application server, and a
within package. database.
// 35 //
5. LCASE ( ) 8. Tags are the hidden keywords within a
LCASE () converts the characters of a web page that define how your web
string to lower case characters. browser must format and display the
content.
Syntax: LCASE (string)
Ex- LCASE ('HELLO') 9. No. There are some HTML tags that don't
Output: hello need a closing tag. For example: <img>
tag, <br> tag
UCASE ( )
UCASE () coverts all the characters of 10. The HTML contains six types of
a string to uppercase. headings which are defined with the
Syntax: UCASE (string) <h1> to<h6>tags. Each type of heading
tag displays different text size from
Ex- UCASE ('hello')
another. So,<h1>is the largest heading
Output: HELLO tag and <h6>is the smallest one. For
6. The RIGHT () function extracts a example:
number of characters from a string <h1>Heading no. 1
(starting from right).
<h2>Heading no. 2
Syntax:- RIGHT (string, number_of_chars)
<h3>Heading no. 3
Example: RIGHT ('hello',3);
<h4>Heading no. 4
Output: llo
<h5>Heading no. 5
The RTRIM () function removes trailing
spaces from a string. <h6>Heading no. 6

Syntax: - RTRIM (string) 11. The HTML provides an anchor tag to


Example: RTRIM ('hello '); create a hyperlink that links one page to
another page. These tags can appear in
Output: hello
any of the following ways: 1. Unvisited
7. HTML stands for Hyper Text Markup link - It is displayed, underlined and blue.
Language. It is a language of World Wide 2. Visited link - It is displayed,
Web. It is a standard text formatting underlined and purple. 3. Active link - It
language which is used to create and
is displayed, underlined and red.
display pages on the Web. It makes the
text more interactive and dynamic. It can 12. The HTML table tag is used to display
turn text into images, tables, and links. data in tabular form (row * column).

// 36 //
13. There are many common lists which are 15. No, you can use hyperlinks on text and
used to design a page. You can choose images both. The HTML anchor tag
any or a combination of the following defines a hyperlink that links one page
list types: to another page. The "href" attribute is
the most important attribute of the HTML
(i) Ordered list - The ordered list anchor tag.
displays elements in numbered
format. It is represented by 16. Marquee is used to put the scrolling text
on a web page. It scrolls the image or
<ol>tag.
text up, down, left or right automatically.
(ii) Unordered list - The unordered list You should put the text which you want
displays elements in bulleted to scroll within the <marquee>…</
format. It is represented by marquee> tag.
<ul>tag.
17. To make a picture a background image
14. HTML elements communicate to the on a web page, you should put the following
browser to render text. When the tag code after the </head>tag. <body
elements are enclosed by brackets <>, background= "image.gif">
they form HTML tags. Most of the time, Here, replace the "image.gif" with the
tags come in a pair and surround name of your image file which you want
content. to display on your web page.

// 37 //
ANSWER HINTS

SUBJECTIVE QUESTIONS:
1. Use of five commonly used tags in an HTML document:

(i) HTML tag: It is the root of the html document which is used to specify that the
document is html. Syntax: <html>Statements...</html>

(ii) Head tag: Head tag is used to contain all the head element in the html file. It contains
the title, style, meta … etc tag Syntax: <head>Statements……..</head>

(iii) Body tag: It is used to define the body of html document. It contains image, tables,
lists, … etc. Syntax: <body>Statements…….</body>

(iv) Title tag: It is used to define the title of html document. Syntax:<title>Statements...
</title>

(v) Paragraph tag: It is used to define paragraph content in html document.

Syntax: <p> Statements….</p>

2. Access modifiers are the keywords which are used with classes, variables, methods and
constructors to control their level of access. Java has four access modifiers:

a. Default: When no access modifier is specified, it is treated as default modifier. Its


scope is limited within the package.

b. Public: The word itself indicates that it has scope everywhere, i.e.; it is visible
everywhere even outside the package.

c. Private: It has scope only within the class

d. Protected: Its scope limits within the package and all sub classes.

3. Single Inheritance, Multilevel Inheritance, Hierarchical Inheritance, Hybrid Inheritance

// 38 //
UNIT - III
RELATIONAL DATABASE MANAGEMENT SYSTEM

OBJECTIVE QUESTIONS

1. Does SQL support programming? 14. What is error in following statement?


2. What are the languages used in SQL? UPDATE EMPL;

3. What is a Data Definition Language (DDL)? 15. Identify the error? DELETE ALL FROM
TABLE EMP;
4. What is a Data Manipulation Language
(DML)? 16. Differentiate WHERE and HAVING
5. What is Data Control Language (DCL)? clause?

6. What do you mean by a Database 17. How SQL commands are classified?
Management System? 18. What are the two ways in which multiple
7. What is RDBMS? transactions can be executed?

8. What is primary key? 19. What is a save point?


9. What is a foreign key? 20. Why do understand by transaction
10. What is null value in MySql? COMMIT and ROLLBACK?

11. Which keyword eliminates redundant 21. What are the properties of database
data in from a query result? transaction?

12. How would you display system date as 22. What TCL commands are supported by
the result of a query? SQL?
13. What is NOT NULL constraint? 23. Write the use of ORDER BY CLAUSE.

SUBJECTIVE QUESTIONS:
1. What is a database transaction? What is meant by committing and revoking a transaction?
How are they achieved using COMMIT and ROLLBACK statements?

2. What are the four significant subsets of SQL?

// 39 //
UNIT - III

ANSWER KEYS

OBJECTIVE QUESTIONS:
1. SQL refers to the Standard Query (c) Update data in the database through
Language, which is not actually the UPDATE command.
programming language. SQL doesn't have
(d) Delete data from the database
a loop, Conditional statement, logical
through DELETE command.
operations, it cannot be used for anything
other than data manipulation. It is used 5. Data control language allows you to
like commanding (Query) language to control access to the database. DCL is
access databases. The primary purpose the only subset of the database which
of SQL is to retrieve, manipulate, update decides that what part of the database
and perform complex operations like should be accessed by which user at what
joins on the data present in the database. point of time. It includes two commands
2. DDL, DML, DCL, TCL GRANT and REVOKE.

3. Data definition language (DDL) is the GRANT: to grant the specific user to
subset of the database which defines the perform a particular task.
data structure of the database in the
initial stage when the database is about REVOKE: to cancel previously denied
to be created. It consists of the following or granted permissions.
commands: CREATE, ALTER and 6. Database Management is a collection of
DELETE database objects such as programs and files that allow a user to
schema, tables, view, sequence, etc. define structure of a database, store data
4. Data manipulation language makes the into it, modify the structure and
user able to retrieve and manipulate data. manipulate the data.
It is used to perform the following
7. RDBMS stands for Relational Database
operations.
Management System. It is a database
(a) Insert data into database through management system based on a
INSERT command. relational model. RDBMS stores the
(b) Retrieve data from the database data into the collection of tables and
through SELECT command. links those tables using the relational

// 40 //
operators easily whenever required. It 18. Multiple transactions can be executed in
facilitates you to manipulate the data one of the following two ways: (i) Serial
stored in the tables by using relational (ii) Concurrent.
operators. Examples of the relational
19. Savepoints are special operations that
database management system are
allow you to divide the work of a
Microsoft Access, MySQL, SQLServer,
Oracle database, etc. transaction into different segments. In
case of a failure, you can execute
8. Primary key is a unique key in a relation rollbacks to the savepoint only, leaving
which can uniquely identifies a tuple prior changes intact.
(row) in a given Relation.
20. COMMITTING a transaction means all
9. If a key is available in a table as a primary
the steps of a transaction are carried out
key then this key is called foreign key
successfully and all data changes are
in another table.
made permanent in the database.
10. If a column in a row has no value, then Transaction ROLLBACK means
column is said to be null. transaction has not been finished
completely and hence all data changes
11. DISTINCT
made by the transaction in the database
12. GETDATE() if any, are undone and the database
13. NOT NULL constraints impose a returns to the state as it was before this
condition that value of a row cannot be transaction execution started.
left blank.
21. The properties of transaction are:
14. UPDATE EMPL; WHERE clause is (i) Atomicity
missing in given query.
(ii) Consistency
15. There is no need to write ALL and TABLE
(iii) Isolation
word in above query. Correct form is-
DELETE FROM EMP; (iv) Durability

16. Where clause is used to select particular 22. SQL supports following TCL commands
rows that satisfy condition whereas BEGIN START TRANSACTION-Marks
having clause is used in connection with the beginning of a transaction COMMIT-
aggregate function, group by clause. Ends the current transaction by saving
database changes and starts a new
17. SQL Commands are classified into four
transaction. ROLLBACK- Ends the
categories:

// 41 //
current transaction by discarding 23. The SQL ORDER BY clause is used to
changes and starts a new transaction. sort the data in ascending or descending
SAVEPOINT- Defines breakpoints for order, based on one or more columns.
the transactions to allow partial Syntax: Select Column-list from table-
rollbacks. SET AUTOCOMMIT- name [Where Condition] [Order BY
Enables or disable the default Column1, Column2, ColumnN]
autocommit mode. [ASC|DESC];

ANSWER HINTS

SUBJECTIVE QUESTIONS:
1. A transaction is program module whose execution may change the content of database.
Committing a transaction means the permanently save any transaction into the database.
Revoking a transaction means the operation of restoring a database to a previous state by
canceling a specific transaction.

2. There is four significant subset of the SQL:

a) Data definition language (DDL): DDL is used to define the data structure it consists
of the commands like CREATE, ALTER, DROP, etc.

b) Data manipulation language (DML): DML is used to manipulate already existing data
in the database. The commands in this category are SELECT, UPDATE, INSERT, etc.

c) Data control language (DCL): DCL is used to control access to data in the database
and includes commands such as GRANT, REVOKE.

d) Transaction Control Language (TCL): transaction control commands are COMMIT,


ROLLBACK.

// 42 //
UNIT - IV
IT APPLICATIONS

OBJECTIVE QUESTIONS

1. What is E-business 5. How many major categories are there for


E-Commerce? Write their benefits.
2. Mention some applications of e-
governance. 6. Write different features of E-Commerce.
7. What is access control attack? Give
3. How many major categories are there for
examples.
E-Commerce?
8. Distinguish between spam and cookies.
4. Write the Benefits of E-commerce
9. Write the objective of cyber law.

SUBJECTIVE QUESTIONS:
1. What is E-commerce? Elaborate on its benefits. What are the major challenges in
implementing E-business?

// 43 //
UNIT - IV

ANSWER KEYS
Objective Questions:

1. E-business is any kind of business or 5. Electronic commerce can be classified


commercial transaction that includes into four main categories.
sharing information across the internet. Benefits of E-commerce
2. Mention some applications of a. E-commerce provides the sellers
e-governance. Some applications of with a global reach.
e-governance:
b. E- Commerce will substantially
(a) Government to Citizen (G2C) lower the transaction cost.
(b) Consumer to Government (C2G) c. It provides quick delivery of goods
(c) Government to Government (G2G) with very little effort on part of the
(d) Government to Business (G2B) customer.

(e) Government to NGO (G2N) d. 24x7 services.

3. Electronic commerce can be classified e. Electronic commerce also allows


into four main categories. the customer and the business to
be in touch directly, without any
(i) B2B, (ii) B2C, (iii) C2C, (iv) C2B
intermediaries.
4. Benefits of E-commerce are:
6. Seven Unique Features of E-commerce
a. E-commerce provides the sellers are:
with a global reach.
(i) Ubiquity - E-commerce technology
b. E- Commerce will substantially is available everywhere. A unique
lower the transaction cost. feature of e-commerce technology.
c. It provides quick delivery of goods Example is if the user is at
with very little effort on part of the outstation, he also can through
customer. www.acer.com get the information
d. 24x7 services. of the product.

e. Electronic commerce also allows (ii) Global Reach - The total number
the customer and the business to of users or customers an
be in touch directly, without any e-commerce business can obtain.
intermediaries. Example is www.acer.com is

// 44 //
whole world also can browse it. 7. What is access control attack? Give
Because the website have supplied examples. Access control attacks
many language to let different typically bypass access control methods
language users understand it. to steal data or user credentials. Ex:-
(iii) Universal Standards - Standards Common Attacks Due To Broken Access
that are shared by all nations Control
around the world. Example is when
a. Access control prevents the
you see the price of product in the
website, that price is very fairly and unauthorized access to the objects
standards. which include access to the
information systems like
(iv) Richness - Video, audio and text
messages are possible. Example is communication links, networks,
the richness is can make the computers, services and sensitive
websites become attract people to data.
browse. b. On the other hand, broken access
(v) Interactivity - Technology that control continues to be the most
allows for two way communication common web application
between merchant and consumer. Vulnerability.
Example is in the website we can
8. Distinguish between spam and cookies.
contract the merchants, that have
many way can contract like: phone, Cookies are files that your web browser
e-mail, video call, and etc. uses to remember things like have you
(vi) Information Density - The total visited a page before and so on.
amount and quality of information Spam means unwanted emails.
available to all market participants.
Example is we can get the clearly 9. Write the objective of cyber law.
information in the websites. Objective of cyber law:

(vii) Personalization/Customization - It i) Safeguard national critical


allows personalized messages to information infrastructure (CII)
be delivered to individuals.
ii) Respond to, resolve, and recover
Example of personalization is if
from cyber incidents and attacks
have a new product, the website
through timely information
will send the email flyer to the
customer. Example of customization sharing, collaboration, and action.
is customer can customize iii) Establish a legal and regulatory
something in the product like framework to enable a safe and
name, pattern, colors, and etc. vibrant cyberspace.

// 45 //
ANSWER HINTS

SUBJECTIVE QUESTIONS:
1. E-commerce, also known as electronic commerce or internet commerce, refers to the
buying and selling of goods or services using the internet.

Benefits of E-Commerce:

a. Immediacy - no going to the shops or waiting in queues

b. price - goods bought online tend to be cheaper

c. Choice - the range of goods available is vast and with sites like http:// www.amazon.com
that let you compare goods from many retailers it is easy to find what you want.

d. 24-hour availability - the shop never closes

e. Speed - you'll locate what you want much quicker

f. Global markets - neither you nor the vendor are restricted to your/their locality

g. Interactivity - get immediate feedback on prices, features etc

h. Less paperwork - always a good thing!

Some of the major challenges faced by e-commerce in India are:

(i) Infrastructural Problems

(ii) Absence of Cyber Laws

(iii) Privacy and Security Concern

(iv) Payment and Tax Related Issues

(v) Digital Illiteracy and Consumer awareness

(vi) Virus Problem

(vii) English Specific

// 46 //

You might also like