Viva Questions - Informatics Practices: 16. What Is Backend and Front End?
Viva Questions - Informatics Practices: 16. What Is Backend and Front End?
Set text () method stores or changes text in a text based GUI component. For eg. Text field, Text area, get text()
method returns the text currently stored in a text based GUI component. For eg. Label, Check Box, etc.
The list a user may directly select from list whereas in combo box user can edit if he/she wishes. List have text field
where user can edit the selected item where as combo box is a cross between a text field and a list.
The loop condition is tested before entering in to the loop is called entry control loop like for and while loop. In exit
control loop it first execute loop body and than evaluate the continuation condition like while loop.
5. Through which property of radio button can we select one radio button at a time?
Through button group property of radio button we can select one radio button at a time.
Front End :- It is the user interface that the user sees and which is resp outside for interacting with the user. The
interface allows used to uses commands to the system.
Back End:- It is the Part of Application that does the real processing or get it done from the server.
HTML stands for Hyper Text Markup language. It is a markup language used to create HTML documents. An HTML
defines a Web Page.
HTML:- New Tags cannot be created using HTML tags, HTML tags can be empty tags
XML :- New tags can be created using XML tags., XML tags cannot be empty tags.
Primary key is a combination of columns that uniquely identifies a row in a relational table.
All possible combination of columns that can possibly serve as the primary key is called candidate key.
A combination of columns where values are derived from primary key of some other table is called the foreign key of
the table in which it is contained
A candidate key that is not serving as aprimary key is called alternate key.
25. How can we convert a string into upper case in mysql and java?
26. How can we convert a string into lower case in mysql and java?
Mysql is an open source RDBMS that relies on SQL for processing the data in the database. The database is
available for free under the terms of General Public License (GPL)
Relational Database Management System facilitates access, security and integrity of data & eliminates data
redundancy. Eg. Mysql, Oracle, Microsoft Sql Server etc.
Degree – Number of attributes (columns) in a relation is called degree cardinality – Number of types (rows) in a
relation is called cardinality.
Data Definition Language (DDL) commands allow us to perform tasks related to data definition. Eg. Creating, altering,
and dropping granting & revoking privileges & roles.
Data Manipulation Language (DML) commands allow us to perform data manipulation. Eg. Retrieval, Insertion,
Deletion and Modification of data stored in a database.
Transmission Control Language (TCL) commands allows us to manage and control the transaction. Eg. Commit,
Rollback, Savepoint etc.
Drop command is used to delete tables. Eg. Drop Table Orders, Delete commands is used to delete, rows of a table.
They are used to enforce rules at table level wherever row is inserted, updated or deleted from the table.
This constraint enforces uniqueness of the column. Only one primary key per table is allowed.
This constraints ensures that the null values are not permitted or a specified column. This constraint can be defined
at the column level not at the table level.
It is used to count the numbers of values in a gives column or no. of rows in a table. Eg. Select count (Roll No.) from
students.
Save point command sreates a point in transaction upto which all changes have been saved properly and
permanently.
60. Swing include a rich set of graphical component for building GUI
62. Top level container are the container which hold other container in it For eg. Frame.
Text area is a component that allow us to accept multiline input from the user or display multiline information whereas
text field allows editing/displaying of a single line of text.
66. The savepoint statement defines a marker in a transaction. These marker are useful in roll backing a transaction.
We can add a record by using insert command and we can add a column through table.
Method can be divided into two categories : getters & setters Getters : they extract (input) information from the object
-> Program Setters : They set some property of the object so that the change object’s appearance.
++a in this value is incremented first then the new value is stored back to the variable. A++ in this expression the
current value is assigned to a variable and then incremented by 1.
Networking is a collection of interconnected computers and other devices which are able to communicate with each
other and share hardware and software resources.
In bus topology all the nodes are connected to a main cable called backbone if any node has to send information to
another node it sends signal to backbone. The signal travel entire length and received by the intended node and
information is absored by terminator to remove it.
79. What is Star Topology how does it work?
In star topology each node is directly connected to hub if any node has to send some information to any other node it
sends the signal to hub. The signal is broadcast to all node but it is accepted by intended node.
Guided media include cables whereas unguided media include waves through air.
A gateway is a device which is used to connect different types of networks and perform the necessary translation so
that the connected networks can communicate properly.
A networks protocol is a set of rules for communication among networked devices. Protocol generally includes rules
of how and when a device can send or receive the data.
HTTP is used to transfer all files and other data from one computer to another on world wide web. HTTP stands for
Hyper Text Transfer Protocol.
Every machine on a TCP?IP network has a unique identifying number called an IP address:
PAN :- Personal Area network, LAN :- Local Area Network, Man:- Metropolitan Area Network, WAN :- Wide Area
Network.
90. What is the difference between Twisted Pair Cable and Unshilded Twisted Pair?
This type of cable consists of a solid wire core surrounded by our or more foil, each separated by some plastic
insulator.
100.A repeater is a device that amplifies a signal being transited on a network. It is used in long _______
101.What is HUB?
A HUB is a hardware device used to connect several computers together. Hub can be either Active & Passive hubs.
102.What is NIC?
The hardware address of the networks card is caused MAC address, which becomes computers unique hardware
number on a network.
MAC address refers to the physical address assigned by NIC manufacturer. IP address is a mechanism that obtains
IP address using a URL of a website.
DOS attacks are those attacks that present the legitimate user of the system from accessing on using the resources,
information of the system.
110.What is Snooping?
Snooping refers to the unauthorized access of someone else data, Email, computer activity or data communication.
111.What is Eavesdropping?
112.What is Firewall?
The system designed to prevent unauthorized access to or from a private network is caused firewall.
113.Describe the parts of an object?
a. Properties, methods and events can be used to control the objects appearance and behavior.
Properties of an object are used to specify its appearance on the form. Eg. Changing the front of text field.
Methods are used to perform some action on the object. Eg. To display something in a textfield, you can use it set
Text () method.
114.Which method can be used to make the object or components visible or invisible?
Set Visible