0% found this document useful (0 votes)
59 views47 pages

MCQ

Uploaded by

Roop Ch Jha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
59 views47 pages

MCQ

Uploaded by

Roop Ch Jha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 47
PAPER -I Unir NETWORKIN' ia EN STANDARDS A. COMPUTER NETWORKING Multiple Choice Questions: Computer Network is (a) Collection of hardware components and computers (b) Interconnected by communication channels, (c) Sharing ofresources and information (@)_ Allofthe Above The best example of computer network is (a) (b) ©) @ Switeh Router Internet None of these What is the meaning of Bandwidth in Network? fa) Transmission capacity of a communication channels (b) Connected Computers in the Network (c) (d) Class of IP used in Network None of Above WA ! Repeater operates in which layer of the OSI model? (a) Physical layer (b) Data link layer (©) Network layer (@) Transport layer is to regenerate the signal over the same network before the signal becomes too weak. (a) Hub (b) Repeater (c) Switch (@) Router Bridge works in which layer of the OSI model? (a) Application layer (b) Transport layer (©) Network layer (d) Data link layer 10, What is the use of Bridge in Network? (a) toconnect two LANs (b) to separate LANs (©) tocontrol Network Speed (d)_allofthe above Router operates in which layer of OSI Reference Model? (a) Physical Layer (b) Network Layer (©) Transport Layer (@) Application Layer Routing tables of a router keeps track of, (a) MACAdéress Assignments (b) Port Assignments to network devices (c) Distribute IP address to network devices (@)_ Routes to use for forwarding data to its destination Layer-2 Switch is also called (a) Muttiport Hub (b) Multiport Switch (©) Multiport Bridge (@) Muttiport NIC A is designed for small physical areas such as an office, group of buildings within 10K.m radius. (a) LAN (b) WAN (©) MAN (d)_ None of the 12, 13. 14, 15, 16. H2 i A covers towns and cities within 50K.m radi (a) LAN (b) WAN (©) MAN (d)_ None of these It is used for the network that covers large distance such as cover states and countries. (a) LAN (©) MAN (b) WAN (d) None of these is. standard for short-distance wireless communication. (b) WAN (d) None of these (a) Wi-Fi (©) MAN Which of the following is/are the advantages of wireless LANs. i, Installation speed and simplicity ii, Installation flexibility iii, Scalability (a) iandiionly (b) itand iii only (©) iandiii only (@) Alli, iiandiii What does protocol defines? (a) Protocol defines what data is communicated. (b) Protocol defines how data is communicated. (c) Protocol defines when data is communicated. () Allofabove 17, 18, 19. 20. 21, Whats the benefit of the Networking? (a) File Sharing (b) Easier access to Resources (©) Easier Backups (@)_Allofthe Above Which of the following is not the Networking Devices? (a) Gateways (b) Window (©) Routers (@) Firewalls Which of the following is Software? (a) Routers (b) Firewalls (©) Gateway (@) Modems Physical or logical arrangement of network is (a) Topology (b) Routing (©) Networking (@) None of the mentioned This topology requires multipoint connection (a) Star (b) Bus (c) Ring (@)_ None of these 22. 23. 24. 25. 26. 27. Bus, ring and star topologies mostly used in the (a) LAN (b) MAN (c) WAN (@) Internetwork Combination of two or more topologies are called (a) Star (b) Bus. (c) Ring (d) Hybrid Which of the following is not type of the network topology. (a) Mesh (b) Bus (c) Ring (d) Stub In a network with 24 computers, which topology would require the most extensive cabling? (a) Bus (b) Mesh (©) Star (Tree Mesh topology has channels to link 'n' devices. physical (@) a (b) n(nty2 (©) (@l) (a) None of these In the star topology we use a central device (>) Hub (b) Electrical cable (©) Bus (d)_ None of these 28, 29. 30. Internet is (a) A local computer network Aworldwide network of computers An interconnected network of computers A worldwide interconnected network of computers which use a common protocol to Communicate with one another Internet requires (a) An international agreement to connect computers (b) A local area network (©) Acommonly agreed set of rules to communicate between computers (@) A World Wide Web Each computer connected to the internet must (a) BeanIBMPC (6) Haveaunique IP address (©) Be intemet compatible (d)_ Haveamodem connection Which of the follo computer network? (a) Telnet (b) MAN (©) Bluetooth HTTP @ Which of the following is a valid network topology? (a) WAN (b) MAN (©) Ring (@) PAN 34, 40. 41. 42. 4B. 44. 45. 46. 47, 4 i] Fill in the Blanks : Asset of nodes connected by is called a Network. The exchange of data between two devices through transmission medium is called is a set of rules which govern data communication. A is a multiport repeater. A ____ is used to connect two LANs working on same protocol. normally connects LANs and WANS together. A_____isamulti-port bridge with abufler. Data communication system spanning states, countries, or the whole world is isa device that routes data packets based on their IP address. Objective Type Questions: How many layers of OSI Reference Model have? What does Router do in a network? In which topology there is a central controller or hub? Which topology is called completely connected network? Expand WAN? Which network device is used to amplify signal in long-distance networking? (d) (©) (a) (a) (b) @) (a) (b) @ (©) @ ©) (b) (a) @ (d) NS aa 17. 20, 21. 22. 23. 24 25. 26, 27. 28. 29. @) (b) (>) (a) fa) (d) (d) (b) (b) (a) (c) (c) (b) (>) (©) 39. 40. al. 42. 43. 44, 46. 47. Link Data Communication Protocols Hub Bridge Routers Switch WAN Router 7 Finds the best possible route for packets Star Mesh Wide Area Network Repeater B. INTERNET & ITS APPLICATION DNS maps IP addresses to (a) Abinary Address as string (6) Analphanumerie string (©) Ahierarchy of domain names (@) Ahexadecimal Address Identify the correct sequence in which packets are transmitted in a network by a host when a browser requests a webpage from a remote server. (a) HTTP GET request, DNS Query, TCPSYN (b) DNS Query, HTTP GET request, TCPSYN (©) DNS Query, TCP SYN, HTTPGET request (@) TCP SYN, HTTP GET request, DNS Query Which one the following protocol is not used to resolve one form of an address to another (a) DNS (b) ARP (©) Duce (@) RARP A collection of hyperlinked documents on the internet forms the (a) World Wide Web (WWW) (b) E-mail system (©) @ Mailing list Hypertext markup language The location of a resource on the internet is given by its? f@) (b) (©) @) Protocol URL E-mail address IcQ 6. 10, 116 i Which one of the following is a valid email address? @ (b) ©) @ [email protected] gmail.com [email protected] javatpoint@books Which one of the following is the most common internet protocol? (a) HTML (b) NetBEUT (c) TCpAP (4) IPX/SPX The IP network 192.168.50.0 is to be divided into 10 equal sized subnets. Which of the following subnet masks can be used for the above requirement? (a) 255.243.240 (b) 255.255.0.0 (ec) 255.255.255.0 (@) 255.255.2585 When the mail server sends mail to other mail servers it becomes __? (a) SMTP client (b) SMTPserver (©) Peer (d) Master In specific, if the systems use separate protocols, which one of the following devices is used to link two systems? (b) Gateway @ (a) Repeater (©) Bridge Hub 11. 12. 13, 14, 15, 16, To join the internet, the computer has to be connected to a (@) (b) () (d) internet architecture board internet society internet service provider different computer Some websites proved chat rooms to interact with an individual or a group is called (a) Usenet (6) Newsgroup (©) Chatting (4) E-mail The sites include text, animated graph, voice and images. (a) Media (b) Telnet (©) Intranet. (d)_- Multimedia A modem that has extra functions such as automatic answering and dialing is called modems. (a) (©) Dedicated Sophisticated(b) High class (@ Intelligent A computer sharing software package and hard disk is called a (a) (b) Network G) (@) Stand-alone Server File server As the definition of social media develops, what is one underlying element? (a) Theintersection between technology, social interaction, and sharing information, () ©) @) Microsoft is the primary developer. Use of the various elements is free. All ofthe above 17. 18, 19, 20. 21. ATi Classifying content in social media happens through an activity such as (a) Alphabetizing(b) Tagging (c) Mapping = (d)_ Lineup Unsoli ited e-mail advertising is known as (@) (b) ©) @ Newsgroup Junkads Spam None of the above In social media, what type of marketing has become important for advertisers? @) E-mailed handbills and online press kits (b) | Word-of-mouth, or buzz marketing (©) EElectronic ads (@) Product placement Blogs or weblogs are (a) Web pages of short, frequently updated postings by an individual that are arranged chronologically. (b) Messages of 140 characters or less. (©) A category for discussion groups within Usenet. (4) Aweb page that allows anyone to edit it What are shared on the Internet and are called as Web pages? f@) ) (©) @ Programs Cables Hypertext documents None 22. 23. 24, 25. 26, 27. 28. 29. 30, 32, 34, ill in the blanks / State True or False: An RPC (remote procedure call) is initiated by the A remote procedure call is offered re the primary servic by the computer networks. media is the pathway for contacting each computer with other. In networks, users can share, and The button reverts to the home page of the website. Web page editors works on a principle The language that instructs the browser on how to display the hypertext, and adds pictures to the document is Looking for information on the Internet is called was one of the first uses of the Internet and is still the most popular use, accounting for most of the traffic on the Internet. Ping summarizes the packet loss and round-trip delay between two IP end points State True/False Web 2.0 is aterm used to describe major technological shifts or improvements in the Web. State True/False Media users today are accurately described as passive consumers because most tend to accept information and media content as presented, State True/False 37, I. 38. 41. 42, 43. 44. 45. 46. 47. 48, 49. 50, H8 if Conversation is a defining characteristic of social media today. State True/False Alurker on discussion boards and Web forums is a person who posts irrelevant or inflammatory messages. State ‘True/ False Blogs play an important curatorial role in social media because some popular blogs are followed by people secking the best and most interesting ideas. State True/False Objective Type Questions: What is the mechanism that is used to convert domain name into IP address What is DNS spoofing? How many possible labels are allowed in the first level of generic domain? The term HTTP stands for? Which software prevents the extemal access to a system? The termFTP stands for? The term IANA stands for? ‘How many versions available of IP? What is internet? Which program/application is used by web clients to view the web pages? What is the name of the location address of the hypertext documents? Which tag is used to display text intitle bar of a web document? What are used with a tag to modify its function? ee a A Me 12. 13. 14, 15. 16. 17. 18. 19. 20. 21. 22. 23. 24, NS aa © 26. ©) 27. © 28. (a) 29. (b) 30. @ 31. (©) ©) 33, @ 34. (b) 35 © 36. © 37. @ 38, @ (c) 40. @ 41 (b) 42 © 43. (b) 44. @ 45. © 46. Client 47. Inter Process Communications 48. File Services 49. Transmission 50. “9 i Data & Programs Home WYSIWYG HTML Browsing & Surfing E-mail True False False True False True DNS Un-authorized request to DNS 7 Hyper Text Transfer Protocol Firewall File Transfer Protocol Internet Assigned Numbers Authority 2 Inter Connected of Network Browsing URL Attributes Unir - I PROGRAMMING A. PROGRAMMING FUNDAM I. Multiple Choice Questions: 1. What happensif constructor of class 4. Whichinheritancein java programming Ais made private? is not supported? (a) Any class can instantiate objects (a) Multiple inheritance using classes of class A (b) Multiple inheritance using (b) Objects of class can be instantiated interfaces only within the class where it is declared (©) Multilevel inheritance eritance (c) Inherited class can instantiate (d)_ Singk objects of class A 5. What is subclass in java? (d) classes within the same package as class A can instantiate objects of class A (a) Subclass is a class that extends another class 2, Allthe variables of interface should be? (b) Subclass is a class declared inside . e variables of interface should be ? a class (a) default and final (©) Both above (b) default and statie (c) public, static and final (d) None of the above (@) protect, static and final 6, If class B is sub classed from class A | then which is the correct syntax Whaat is true of final class? (a) Final class cause compilation failure @ ClassB: A {} (b) Final class cannot be instantiated (b) Class B extends A {} (c) Final class cause runtime failure (c) Class B extends class A {} (4) Final class cannot be inherited (4) Class B implements A) 110 if 10, Order of execution of constructors in Java Inheritance (a) (b) ©) @) Base to derived class Derived to base class Random order None Inheritance relationship in Java language is (a) (b) ©) @ Association I-A Has-A None Advantage of inheritance in java programming is/are (a) () () @ Code Re-usability Class Extendibility Save development time All Which of the following is/are true statements? fa) (b) (c) @ ‘A class can extend only one class but can implement many interfaces An interface can extend many interfaces An interface can implement another interface An interface can implement a class 1. 12. 13, 14, 15, HAL If Which class cannot be sub classed? () final (b) object class (©) abstract class (d) child class Which is/are false statements (@) final (b) final method can be inherited -annot be inherited (c) _ final method can be overridden (d) Final variable of a class eannot be changed, cannot be inherited from a base class in Java programming (@) Constructor (b) final method (©) Both (@)_ None Which cannot be inherited from a base class in Java programming? (a) Cannot override private method of aclass (b) Protected methods are visible to only immediate child cl (c) Public methods of a class are visible to all @ All To prevent a class to be inherited / extended, the class should be (a) final class (b) abstract class (c) final and abstract both (@)_ none 16. 17. 18, 19, 20. Which of these class is superclass of every class in Java? (a) String class (b) Object class (©) Abstract class (@) ArrayList class Which of these method of Object class can clone an object? (a) ObjectCopy () (b) Copy) (©) Objectelone () (@) Clone 0) Which of these keywords can be used to prevent inheritance of a class? (a) Super (c) Class Which of these class relies upon its (b) Constant (@) Final subclasses for complete implementation of its methods? (a) Object class (b) Abstract class (©) ArrayList class (@)_ None of these If a class inheriting an abstract class does not define all of its function then it will be known as? (a) Abstract Class (b) Simple Class (c) Static class (d) None of these I. 21. 22. 23. 24, 25. 26. 27. 28. 29, HN2 I Fillin the blanks Method to compare two strings ignoring the case is method converts an entire string to Upper case. Method Removes spaces from both ofa String Returns absolute value of the number. Objective Type Questions: What is a method that compares two strings and supports a3-way comparison? What is a method that compares two strings and supports 2-way comparison? Which method concatenates two strings JJoins two strings? Which Method Returns a character by index position in a string? Method to return part ofa string in java. A Method that returns a Boolean value to check a string with specified suffix. What will be the output of the following code. Public static void main (String [] args){ Ji Integer class wraps a value of the primitive type int in an object //An object of type Integer contains a single field whose type is int. 10, ue 12. intx=5; Integer ax; System.out printin(a.compareTo(5))://0 System.out printIn(a.compareTo(6))z//-1 System.out.printin(a.compareTo(4))y/1 } 32, 33. 34, 35. How can a protected modifier be accessed? How many copies of static and class variables are created when 10 obj created of a class? -an be declared with a protected Which is the modifier when there is none mentioned explicitly? ONS eae () 13. @) 25. compareTo() (©) 14. @) 26. equals() @ 15. (a) 27. coneat() @) 16. (b) 28. charAtQ, @ 17. () 29. substring) (by 18. (d) 30, (a) 19. (b) 31. 0,-1,1 () 20. (a) 32. within package @ 21. equalslgoreCase () 1,10 (A&B) 22. toUpperCase () 34. False @ 23. trimO) 35. Default () 24. abs() 3 It B. HTML BASED WEB PAGE COVERING BASIC TAG Which of the following tag is used for line breaks in the documents? fa) ) () (@) <break> —- <br> <hr> Which of the following tag is used for new paragraph in the documents? (a) <p> b) (c) <hr> (d) <br> <break> Which of the following tag is not an empty tag? (a) (c) <p> (b) <br> <hr> (@) <li> Which of the following is not web browser? f@) (b) ©) @ Netscape Navigator Intemet Explorer Mozilla Firefox Notepad Which of the following tags is used for bold facing the text? (a) (©) <br> (b) <strong> <tt> qd) <li> Which of the image file extension cannot be inserted in the web page? (a) ped (b) gif (©) pe jpeg You can insert images in your web pages. @ 1 (b) 2 © 5 (@)_ NoLimit 14 8. 10, u. 2. 13. Which HTML tag would be used to display power in expressionX*n+Y=10? (a) (b) © @ <p <sup> <sub> <b> Choose the correct HTML code to create an email link? (a) <ahref='xx2 yy. Com"></a> (>) <ahref="mailtoxx@yy.com"></a> (c) <mail>xx@yy.com</mail> (d) <amailhref=xx@yy.com></a> Choose the correct HTML tag for the largest heading? (a) (©) <hi> <h2> (b) <hd> (@) <ho> Which of the following is not an attribute of <font> tag (a) (b) ©) @ color bgcolor size face <li> is used to create items of an (a) Ordered list (b) | Unordered list (©) Neither ofaandb (@) Bothaandb An ordered list (a) () (c) (d) ed in an unordered list «din another ordered list starts with <list> tag ends with </li> tag 14, 15, 16. 18, 19, 20. Which of the following control allows the user to select multiple values? (a) Menu Control (6) Checkbox Control (c) Frame (@) Radio Button Which of the following is not a form control in HTML? (@) Checkbox (b) Radio Box (©) Submit Button (Reset Button Which tagis used to display a picture on a web page? (a) picture (b)_ image (c) img @ ste Except <b> which other tag is used to make text bold? (a) <strong> —(b) <dar> (©) <black> — (d)_ <bold> Which of the following is not a pair tag? (a) <p> (©) To create HTML document you require a (b) <u> (@) <img> (a) Web page editing software (b) High powered computer (©) Notepad (d) None of these ‘The properties of an HTML element or tag is called (a) tags (©) values (b) attributes (d)_ None of these 22. Il. 23. 24, 25. 26, 27. 28. 29, 30. 31. 32, 33. JAS I HTML documents are saved in (a) binary format (b) machine language (©) ASClltext (d)_ None of these The tags which encloses text inside it are (a) coupletags (b) (©) doubletags (4) single tags paired tags Fillin the blanks Inthe <hr> tag hr stands for Tags and text that are not directly displayed on the page are written in section, Which tag is used to insert a horizontal line in a web page? is the first tag in an HTML document? is used to create ordered and unordered list or bulleted list. Bulleted list is known by another name which is The application software required to view and explore web pages is called A simple word processor is called Text Editor Google Chrome is a Web Browser Notepad is a Text editor Special formatted text or commands in HTML is called. ‘Tags/ Elements I. 34. 35. 36. 37. 38, 39. 40. 41. Cea anewn 10. Te 12. Objective Type Questions: ‘What does "Vlink" attribute mean? What is used to link various web pages? Which tag contains both opening and closing tag? Paired tag Which tag contains only opening tag? Singulartag Which tag contains the information about a web page? <title> What is the maximum no. of characters supported in HTML title? 64 Which tag in HTML displays heading? <hl>...<h6> Which tag in HTML is used to create italic font? <i> 42, 43, 44. 46. 47. 4B. Which tag in HTML is used to create <tt> type letter font? Which tag in HTML is used to represent text with horizontal _ stinking text?<strike> Which tag in HTML is used to scroll text onaweb page?<marquee> How many types of heading tags are there? 6 What represents the smallest heading tag?<ho> ‘What represents the largest heading tag? <hi> Which tag is used to create a line break? <br> Nea () 13. (a&b) (@ 14. (b) (@) 15. (@) @ 16. (©) b) 17. (@) @ 18. (d) @) 19. (c) @ 20. (b) ) 21. © @ 22. (@) (b) 23. Horizontal Rule @ 24, Title 25. 26. 27. 28. 29, 30. 31 32. 33. 34. 35, 36. 1/16 I <hr> 37. Singulartag <htmt> 38. <title> <li> 39. Unordered list 40. WebBrowser 41. <i> ‘Text editor 42. WebBrowser 43 Text Editor <marquee> Tags/elements 45. 6 VisitedLink 46. <h6> <href> 47. <hi> Paired tags 48. <br> Unir - TIT Multiple Choice Questions: Which of the following is generally 3. used for performing tasks like creating the structure of the relations, deleting relatio (a) DML (Data Manipulation Language) (b) Query (©) Relational Schema 4. (DDL (Data Definition Language) Which of the following provides the ability to query information from the database and insert tuples into, delete tuples from, and modify tuplesinthe 5, database? (a) DML (Data Manipulation Language) (6) DDL(ata Definition Language) (©) Query (d)_ Relational Schema 17 it What do you mean by one to many relationships? (a) One class may have many teachers (b) One teacher can have many ela: (c) Many classes may have many teachers (d) Many teachers may have many classes A Database Management System is a type of software. (a) Itis a type of system software (b) _Itisakind of application software (c)__Itisakind of general software (@) BothAandC Which of the following can be used to extract or filter the data & information from the data warehouse? (a) Dataredundancy (b) Data recovery tool (©) Datamining (@) BothB and Which one of the following refers to the copies of the same data (or information) occupying the memory space at multiple places. (a) (b) © Data Repository Data Inconsistency Data Mining (@) DataRedundaney Which one of the following refers to the "data about data"? (a) Directory (b) SubData (c) Warehouse (d) MetaData Which of the following refers to the level of data abstraction that describes exactly how the data actually stored? (a) (b) (e) @ Conceptual Level Physical Level File Level Logical Level Which of the following refers to the number of tuples in a relation? (a) () Entity Column, (c) @ ity None of the above 10. uu. 12, 13. 118 if Which one of the following is a type of Data Manipulation Command? (a) Create (b) Alter (c) Delete (d)Alloftheabove Which of the following command is a type of Data Definition language command? (a) Create (b) Update (©) Delete (@) Merge Which of the following is used to denote the selection operation in relational algebra? (a) Pi (Greek) (6) Sigma (Greek) (©) Lambda (Greek) (4) Omega (Greek) The operation, denoted by ?, allows us to find tuples that are in one relation but are not in another. (@) Union (b) Set-difference (©) Difference (d) Intersection 16. Fill in the blanks A huge collection of the information or data accumulated form several different sources is known as Rows of a relation are known as the What displays the unique values of the column? SI dept_name FROM 17. OL 18. 19, 20. clause allows us to select rows in the result relation satisfy a specified predicate. Objective Type Questions: What is a unary operation? Which is ajoin condition containing an equality operator. What is used to sort the result of query according to an attribute? DNS ae) instructor; @ 8b) (a) 9 (a) (b) 10. (©) (b) 1H. (a) © 12. @ @ 13. (c) @ 14. Data warehouse H19 I 15. Tuples 16. DISTINCT 17. WHERE 18. One operand 19. Equijoin 20. Orderby B. INTRODUCTION TO MYSQL In precedence of set operators, the expression is evaluated from (a) Left to left (b) Left to right (©) Rightto lett (@) From user specification Which of the following is not outer join? (a) Left outer join (b) Right outer join (©) Full outer join (@) None of these The System which schedules the inputs and outputs of the disk in database is classified as (a) Operating system () (©) Client system (d) Structured system The program interface which provides the feature to client side programs to call the DBMS is classified as (a) Open programming interface (b) Closed programming interface (c) Application programming interface (@)_Dataprogramming language 1/20 If In DBMS, the description of database in the form of schema is also called (a) Extension of schema (b) _Intension of schema (©) Mathematical operators of schema (@) Logical operators of schema Which of the following can add a row toa table? (a) Alter (b) Add (©) Insert (4) Commit Which of these commands will delete a table called XXX if you have appropriate authority? (a) DROP XXX (b) DROPTABLE XXX (ce) DELETEXXX, @ [ETABLE XXX Which of the following is not available in MySQL? (a) REVOKE (b) FETCH (©) LIKE (d) JOIN 10. 11. 12, Which keyword is the synonym for DATABASE? (©) DB What is abe in the following SQL statement? DELE: (a) () (©) @ 3FROM xyz WHE] Eabe=5; column name tablename row name database name What is the value of val2 in the following MySQL statement? UPDATEt SET vall=vall +2, val2=vall; (a) _ previous vall (6) () @ Which keyword is used to delete all the rows from the table? (a) TRUNCATE (6) REMOVE (©) DELETEALL (d) CLEAR updated val] unchanged vall +1 13, 14, 16. 17. 18. 19. 20. Objective Type Questions: The facility that allows nesting one select statement into another is called The assignment operator is denoted by which symbol? What is called the graphical representation of database description? If you want to undo a GRANT, you should use what? What are the differences between DESCRIBE and SHOW FIEEDS FROM commands? What statement is used to select a default database? To create a database only if it doesn't already exist, which clause is used? Which keyword in the UPDATE statement is used to assign values to columns? ENS eae (©) 6 (ce) @) 7. (b) @) 8 (b) © % @ @) 10. (a) Ml. 12. 13, 14, 15. W240 () 16. Revoke @) 17. Use SubQuerying 18, = 19. IfNot Exists Schema Diagram 20. Set i Multiple Choice Questions: An error in computer data is called 4, (a) (b) (©) Chip (@) Bug Which hole is used to mark the location of the first sector in a soft sectored disk? (a) Address (b) Index (©) Label (Location A microprocessor chip used in a PC system (a) Almost always operates on by-bits of data at atime (b) Is the only chip found in most pe models? (©) Performs the arithmetic -logie and control functions (None of the above 122 It World Wide Web (a) a collection of world-wide information (b) acoll residing on computers connected ction of linked information by the Internet (c) world-wide connection for computers (d)_ is another name for internet Which of the following describes E-commerce? (a) Doing Business electronically (b) Doing business (©) Sale of Goods d) Allofthe Above Which of the following is not one of the major types of E-commerce? (a) C2B (b) B2C (©) B2B (@) c2c 10. Which of the following is not considered to be one of the three phases of E-commerce? (a) Innovation (6) Consolidation (c) Preservation (@)_ Reinvention Which Segment do eBay, Amazon.com belongs? (a) B2Bs (b) B2Cs (©) C2Bs (@) C2Cs Which type of e-commerce focuses on consumers dealing with each other? (a) B2Bs (b) B2Cs (©) C2Bs (@) C2Cs The Best products to sell in B2C e-commerce are: (a) Small produets (b) Digital products (c) Speciality products (@)_ Fresh products Which of the following is not a key element of a business model? (a) Value proposition (b) Competitive advantage (©) Market strategy (Universal standard 12. 13. 14, 15. 123 I Which of the following is not a limitation of the current market? (a) Insufficient capacity through out the backbone (b) Network architecture limitations (c)_ Insufficient reach (4) Best efforts QAS Which of the following is a new and disruptive Web feature or service? (a) XML (b) diffserv (©) blogs (@ CDMA Which of the following is a useful security mechanism when considering business strategy and IT? (a) Encryption (b) Decryption (c) Firewall (d)_ Allofthe above Which of the following statement accurately reflect the impact of technology? (a) Technology has caused buyer power to increase (b) Technology has lessened the entry barriers for many industries (c)_ Technology has increased the threat of substitute products and services (d)_ Allofthe above 16. 17, 18. 19, How the transactions occur in e-commerce (@) ing e-medi (b) Using computers only (©) Using mobile phones only (@)_ None of the above Which type of products is lesser purchased using e-commerce? (a) Automobiles (b) | Software (©) Books (@)_ none All of the following are factors in optimizing Web Site performance except (a) Page retrieval (b) Page generation (©) Page delivery (4) Page content A business competing in a commodity like environment must focus on which of the following? (@) Price (b) Ease/speed of delivery (©) Ease of ordering (@) Allofthe above 20. 21. 22. 23. 124 I Astrategy designed to compete in all markets around the globe is called a strategy. (a) Scope (b) Differentiation (©) Cost (@) Focus Which of the following is not one of the stages of the development of the internet? (a) Innovation (b) _Institutionalization (©) Globalization (@) Commercialization Which protocols permits users to transfer the files from server to their client computer and vice versa? (@) HIP (b) SMTP (©) IMFP (@ FIP is a program that you can run in windows operating system in order to cheek the connection between your client and server. (a) Ping (b) Telnet (©) SSL (@) Alloftheabove 24, 25, 26. 27. Which of the following is not a limitation of the current internet? (a) Insufficient capacity throughout the backbone (b) Network architecture limitations (©) Insufficient reach (d)_ Best efforts QOS. Which of the following was the first commercial web browser? (a) Mosaic (b) Mozilla (©) Netscape Navigator (@)_Intemet Explorer A____deseribes the flow of information at your e-commerce site and your infrastructure that will be used in the system (a) System Design (b) Logical Design (c) Tactical Design (@)_ Physical Design All of the following are factors in optimizing web site performance except (a) Page retrieval (b) Page generation (©) Page delivery (d) Page c 28. 29, I 32. 33. 34, 125 It The largest component in Web Site budget is (a) System maintenance (b) System development (©) Cc (d)_Telecommunication {ent design and development Which of the following measures the percentage of people exposed to an online advertisement who actually click on the banner? (a) Impression rate (b) View through rate (©) Click through rate () Stickiness ration Fillin the blanks Computers that are portable and convenient for users who travel are known as Ifa user needs information instantly available to the CPU, It should be stored in The dimension of ¢ commerce that enables commerce across national boundaries is called. The prima source of financing during the early years of ecommerce was All of the following are technologies us ed to gather information about you online except A situation where there are no differences among products and services, and the only basis of choosing product is price is known as. Objective Type Questions: Which term represents a count of the number of people who visit one site, click on an ad, and are taken to the site ofthe advertiser? What is the percentage of customers who vi it a web site and actually buy something called? LISP is suitable for which operations? Whatis the idealistic market envisioned at the outset of the development of e-commerce? 36. Marketspace 37. No competitive advantage 38. 100 kbps 39. Easy for competitor to enter the market 40. Logical design 41. Commoditization 42. Click through Conversion rate 44, Arithmetic & Numeric 35. A__isasetofplanactivities designed 41 to result in a profit in a marketplace. 36. The area of actual or potential commercial; value in which a company intends to operate is a I. 37. Aperfectmarketisoneinwhich 42. 38. Broadband is generally considered to be any communication technology allowing streaming audio and video at or above 43. 39. The threat of new entrant is high when it is , 44. 40. A —___ describes the flow of information at your e-commerce site 45, and the infrastructure that will be used in the system. Saas L @ 13. (©) 23. (©) 2. (b) 14. (d) 26. (b) 3 © BO 7 @ 4. (b) 16. (a) 28. (a) 17. (a) 5. (a) ( 2%. () 6 @) 18. (a) 30. I 30. Lapto 7 © %@ “opors & & 20. @) 31. Inthe CPU . @ 21. () 32. Global reach, 10. (b) 22. (d) 33. VenturaCapital Fund 43 1. @) 23. (a) 34. Anonymizers 12. (c) 24. (c) 35. Business model 1/26 I 45. Bertrand market PAPER - II Unir -I NETWORKING EN STANDARD: OBJECTIVE QUESTIONS: 1. Write the name of three network topologi 2. Whatis the need for internet protocols? 3. Explain the uses of TCP/IP, HTTP and FTP, 4, Expand the following: (a) LAN (b) [AN (©) DSC (a) FTP 5. Whatis firewall? 6. Whatis gateway? 7. Write two advantages of networks. 8. Whatis TELNET? 9. Whatare the various types of networks? 10. Whatis CDMA? 11. Whatis a link? 12. Define a network. 13. Whatis communication channel? 14. Whatis IP addr 15. Whatis domainname? 16. 17. 18. 19. 20. 21. 22. 23. 24. 26, 27. 28, 127 It What is the difference between MAN and WAN? What is meant by Topology? What are the similarities and differences between bus and tree topologies? What are the layers of the OSI reference model? What is a node? What are routers? What is point to point link? What is subnet mask? What is the job of the Network Layer under the OSI reference model? What is a way of Securing a Computer Network? What is NIC? What is the importance of the OSI Physical Layer? How many layers are there under TCP. Ip? 29. Whatare proxy servers andhow do they 38. Whatis ISP? protect computer networks? 39. Whatis ISDN? 30. Whats the function of the OSI Sessi 40. What is Telnet? Layer? : 2? 31. Whatis a private IP address? 41. What i at is Cookies? 32. Whatis NOS? 42. What is Cookies’ 33. What is OSI and what role does it play 43+ What is malicious software in computer networks? 44. Whatis Hacking? 34. Define Simplex transmission mode 45. Whats Digital Signature? 35. Define Half Duplex transmissionmode. 46, Whatis Snooping? 36. Define Full Duplex transmission mode. 47, Whatis Cyber Crime? 37. Whatis DNS? 48. What is Cyber law? SUBJECTIVE QUESTION: 1. What is meant by Topology? Describe some popular topologies. 2. Describe the layers of the OSI reference model? 3. Whatis Web Server? Give Examples. 4, What are importance of Cyber law 1/28 I 1 Unit - I DE aaa) OBJECTIVE QUESTIONS: Star, Bus, Mesh The Internet Protocol (IP) is the protocol by which data is ent from one computer to another on the Internet. Transmission Control Protocol/Internet Protocol (TCP/IP) is a suite of communication protocols used to interconnect network devices on the internet. The Hypertext Transfer Protocol (HTTP) is an application protocol for d tributed, collaborative, hypermedia information systems. The Hypertext Transfer Protocol (HTTP) is an application protocol for distributed, collaborative, hypermedia information systems. (a) LAN: Local Area Network (b) IAN: Intemet Area Network (©) DSC: Digital Signature Certificate (@)_ FTP: File Transfer Protocol 5. A firewall is anetwork security device that monitors incoming and outgoing network traffic and permits or blocks data packets based on a set of sect rules. 10. 1/29 I A gateway is a network node that connects two networks using different protocols together, While a bridge used to join two similar types of networks, a gateway is used to join two dissimilar networks, Advantages: i, Data or information can be shared among the us Fast communication can be achieved. Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection, ‘Network can be classified on the basis, of their complexity and geographical spread. On the b: geographical spread it can be as Local Area Network, Metropolitan Area Network and Wide Area Network. size, Code Division Mu (CDMA) is a channel ac: used by various radio communication technologies. CDMA is an example of multiple access, where several le Access ‘s method transmitters can send information simultaneously over a_ single ue 12. 13, 14. 16. communication channel. CDMA is used as the access method in many mobile phone standards. A link refers to the connectivity between two devices. Itincludes the type of cables and protocols used in order for one device to be able to communicate with the other. A.computer network is a system in which computers are connected to share information and resources. Communication channels mean the connecting cables that link various workstations. A unique number consisting of 4 parts separated by dots, e.g. 165.113.245.2 Every machine that aunique IP number - if'a machine does nothave an IP number, itis not really on the Internet. son the Internet has The unique name that identifies an Internet site. Domain Names always have 2 or more parts, separated by dots. The part on the left is the most specific, and the part on the right is the most general E.g.:matisse.net A metropolitan area network (MAN) is a large computer network that usually spans a city ora large campus. WAN is a network that covers an area larger than a single building or campus such as across the cities or countries. 17. 18, 19. 20. 21. 1/30 If Network topology is defined as the interconnection of the various elements (links, nodes, ete.) of a computer network. In computer networking, topology refers to the layout of connected devices. A) Bus topology b) Star topology c) Ring topology d) Tree topology ¢) Mesh topology In bus topology each machine is connected to a single cable. Each computer or server is connected to the single bus cable through some kind of connector. Tree topology is a network with the shape of an inverted tree in which a single link between two nodes. There are 7 OSI layers: Physical Layer, Data Link Layer, Network Layer, Transport Layer, Session Layer, Presentation Layer and Application Layer. Anode refers to a point or joint where a connection takes place. It can be computer or device that is part of a network. Two or more nodes are needed in order to form a network connection, Routers can connect two or more network segments, These are intelligent network devices that store information in its routing table such as paths, hops and bottlenecks. With this info, they are able to determine the best path for data transfer. Routers operate at the OSI Network Layer. 22, 23. 24, 25. 26. 27. Itrefers toa direct connection between two computers on a network. A point to point connection does not need any other network devices other than connecting a cable to the NIC cards of both computers. A subnet mask is combined with an IP. address in order to identify two parts: the extended network addr and the host address. L mask is made up of 32 bits. ean IP address, a subnet The Network layer is responsible for data routing, packet switching and control of network congestion. Routers operate under this layer. Good passwords are made up of not just letters, but by combining letters and numbers. A password that combines uppercase and lower favorable than one that uses all upper case or all lower case letters. Passwords e letters is must be not words that can easily be guessed by hackers, such as dates, names, favorites, ete. Longer passwords are also better than short ones. NIC is short for Network Interface Card. This is a peripheral card that is attached toa PC in order to connect to anetwork. Every NIC has its own MAC address that lentifies the PC on the network. The physical layer does the conversion from data bits to electrical signal, and vice versa, This is where network devices and cable types are considered and setup. 28, 29, 30. 32, 31 It There are four layers: the Network Layer, Intemet Layer, Transport Layer and Application Layer. Proxy servers primarily prevent external users who identifying the IP addresses of an internal network, Without knowledge of the correct IP addré even the physical location of the network cannot be identified. Proxy servers can make a network virtually invisible to external users, This layer provides the protocols and means for two devices on the network to ‘communicate with each other by holding a session. This includes setting up the s ion, managing information exchange during the session, and tear-down process upon termination of the session. Private IP addresses are assigned for use on intranets. These addresses are used for internal networks and are not routable on extemal public networks. These ensures that no confliets are present among internal networks while at the same time the same range of private IP addresses are reusable for multiple intranets since they do not "see" each other. ‘Network Operating System (NOS), is specialized software whose main task is to provide network connectivity to a computer in order for it to be able to communicate with other computers and connected devices. 36. 37. OSI (Open Systems Interconnect) serves as a reference model for data communication, It is made up of 7 layers, with each layer defining a particular aspect on how network devices connect and communicate with one another. One layer may deal with the physical media used, while another layer dictates how data is actually transmitted across the network. In Simplex mode, the communication is unidirectional, as on a one-way street. Half-duplex transmission mode of data just one direction at a time. For example, a walkie talkie. Full-duplex data transmission means that data can be transmitted in both directions at the same time. For ona signal example, on a local area network with a technology that has full-duplex transmission, one workstation can be sending data on the line while another workstation is receiving data. DNS is Domain Name System. The main function of this network service is to provide host names to TCP/IP address resolution. An Internet Service Provider (ISP) is an organization that provides services for accessing, using, or participating in the Internet, 40. 41 42, 43. 44. 132 I Integrated Services Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of voice, video, data, and other network services over the traditional circuits of the public switched telephone network. Telnet is a protocol used on the Internet or local area network to provide a bidirectional interactive text-oriented communication facility using a virtual terminal connection, A computer virus is a type of mal software that, when executed, replicates itself by modifying other computer programs and inserting its own code. Cookies are small files which are stored on auser’s computer. They are designed tohold a modest amount of data specific toaparticular client and webs fe, and can be accessed either by the web server or the client computer. Malici malicious program that causes harm to ous Software refers to any a computer system or network. Malicious Software attacks a computer or network in the form of virus 8, worms, trojans, spyware. Hacking generally refers to unauthorized intrusion into a computer or a network. ‘The person engaged in hacking activities is known as a hacker. 43. A digital signature is a mathematical 47. Cyber-crime is any criminal activity that scheme for verifying the authenticity of involves a computer, networked device digital messages or documents. oranetwork. 46. Snooping, in a security context, is 48. Cyberlawis the part of the overall legal unauthorized access to another person’s system that deals with the Internet and or company's data, cyberspace. PS EAL) SUBJECTIVE QUESTIONS: 1, Representation of Computer Networks in different structures. A designated high performance system to host web pages. 4, Cyber law is important because it touches almost all aspects of transactions and activities on and concerning the Internet, the World Wide Web and Cyberspace. 133. it Unir - I PROGRAMMING OBJECTIVE QUESTIONS : 1, What is an access specifier? 10. How many types of heading does an contain? 2. Mention different types of access HITML contain’ specifiers, 11. Howto create a hyperlink in HTML? 3. Write the use of substring () function 12. Which HTML tag is used to display the with an example, data in the tabular form? 4. Distinguish between static and dynamic 13 What are some common lists that are pages in a website. used when designing a page? 5. Distinguish between LCASE () and 14. What isthe difference between HTML UCASE (). : elements and tags? 6. Distinguish between RIGHT () and . 15, Does a hyperlink only apply to text? RTRIM () functions with example. > Doesa hyperlink only apply to tex 7. Whatis HTML? 16. Whatis amarquee? 8. Whatare Tags? 17. How tomake a picture ofa background image of a web page? 9. Doall HTML tags have an end tag? SUBJECTIVE QUESTIONS: 1, Explain the use of five commonly used tags in an HTML document. 2. What is meant by Access Modifier? Describe the uses of different Access Modifiers of Java with examples What are the difference types of inheritance in java? 134 If OBJECTIVE QUESTION 1 Unir - I DNS aaa) Access specifiers are keywords in objector nted languages that set the nd acces lity of classes, methods other members. A object-oriented languages that set the accessibility of classes, methods, and other members. Types of access s specifiers are keywords in speci specifiers and they are as follows: 1 Public, 2. Private, 3. Protected 4. Default (no specifier) 1s: In java we have 4 Ac Public access specifier: The public ible everywhere. It has the widest scope among all other modifiers. access specifier is ace Private access specifier: The private access specifier is accessible only within class. Protected access spec protected ace: within package and outside the package but through inheritance only. specifier is accessi Default access specifier: If you don't use any specifier, itis treated as default, The default modifier is accessible only within package. 1/35 I The substring () function extracts a substring from a string (starting at any position). Syntax: substring (string, start, length) Ex- Select substring (‘hello’, 2, 3); Output: Ho Static Pages (i) Static web pages have fixed content (ii) Static web pages have to be manually changed (iii). Static web pages use only a web server Dynamic Pages (i) Dynamic web pages may have changing content (ii0 Changes to a dynamic page can be loaded through an application where resources are stored in a database. (iii) Dynamic web pages use a web server, application server, and a database. LCASE () LCASE () converts the characters of a string to lower case characters. Syntax: LCASE (string) Ex-LCASE (HELLO) Output: hello UCASE () UCAS a string to uppercase. () coverts all the characters of Syntax: UCASE (string) Ex-UCASE (‘hello’) Output: HELLO The RIGHT () function extracts a number of characters from a string (starting from right). Syntax:-RIGHT (string, number_of chars) Example: RIGHT (hello'3); Output: Ho ‘The RTRIM 0 function removes trailing spaces from a string. Syntax: ~ RTRIM (string) Example: RTRIM (‘hello’); Output: hello HTML stands for Hyper Text Markup Language. It is a language of World Wide Web. It is a standard text formatting language which is used to create and display pages on the Web. It makes the text more interactive and dynamic. It can tum text into images, tables, and links. 8. 10. I. 12. 1/36 I Tags are the hidden keywords within a web page that define how your web browser must format and display the content. ‘No. There are some HTML tags that don't example: <img> tag, <br> tag The HTML contains six types of headings which are defined with the <h1> to<h6>tags. Each type of heading tag displays different text size from another. So,<h1>is the largest heading tag and <h6>is the smallest one. For example: <hI>Heading no, 1 <h2>Heading no. 2 <h3>Heading no. 3 <h4>Heading no. 4 <hS>Headingno. 5 <h6>Heading no. 6 The HTML provides an anchor tag to create a hyperlink that links one page to another page. These tags can appear in any of the following ways: 1. Unvisited link- Its displayed, underlined and blue, 2. Visited link - It is displayed, underlined and purple. 3. Active link-It is displayed, underlined and red. The HTML table tag is used to display data in tabular form (row * column), 14, ‘There are many common lists which are used to design a page. You can choose any or a combination of the following list types: (i) Ordered list - The ordered list displays elements in numbered format. It is represented by <ol>tag. (ii) Unordered list - The unordered list displays elements in bulleted format. It is represented by <ul>tag, HTML elements communicate to the browser to render text. When the elements are enclosed by brackets >, they form HTML tags. Most of the time, tags come in a pair and surround content. 16. 17. 37 I No, you can use hyperlinks on text and images both. The HTML anchor tag defines a hyperlink that links one page to another page. The "href" attribute is the most important attribute of the HTML anchor tag. Marquee is used to put the scrolling text on a web page. It scrolls the image or text up, down, left or right automatically. ‘You should put the text which you want to scroll within the <marquee>...</ marquee> tag. To make a picture a background image ‘onaweb page, youshould put the following tag code after the </head>tag. <body background="image.git"> Here, replace the "image.gif" with the name of your image file which you want to display on your web page. ONS ELS) SUBJECTIVE QUESTIONS: 1 Use of five commonly used tags in an HTML document: wa (ii) Gi) (iv) () HTML tag: It is the root of the html document which is used to specify that the document is html. Syntax: <html>Statements...</html> Head tag: Head tag is used to contain all the head element in the htm! file. It contains the ttle, style, meta ... ete tag Syntax: <head>Statements........</head> Body tag: It is used to define the body of html document. It contains image, tables, lists, ... ete, Syntax: <body>Statements........</body> Title tag: It is used to define the title of html document. Syntax:<title>Statements... Paragraph tag: It is used to define paragraph content in html document. Syntax:

Statements...

Access modifiers are the keywords which are used with classes, variables, methods and constructors to control their level of access. Java has four access modifiers: Single Inheritance, Multi Default: When no access modifier is specified, it is treated as default modifier. Its Scop is limited within the package Public: The word itself indicates that it has scope everywhere, ie everywhere even outside the package. Private: It has scope only within the class Protected: Its scope limits within the package and all sub cla -vel Inheritance, Hierarchical Inheritance, Hybrid Inheritance 1/38 I Unir - OBJECTIVE QUESTIONS RN 10. ue 12. 13 Does SQL support programming? What are the languages used in SQL? ‘Whatis a Data Definition Language (DDL)? What is a Data Manipulation Language (DML)? What is Data Control Language (DCL)? What do you mean by a Database Management System? What is RDBMS? What is primary key? What is a foreign key? What is null value in MySql? Which keyword eliminates redundant data in froma query result? How would you display system date as the result of query? What is NOTNULL constraint? SUBJECTIVE QUESTIONS: 1 2 14, 16. 17. 18. 19. 20. 21 22, 23. What is error in following statement? UPDATE EMPL; Identify the error? DELETEALL FROM TABLEEMP; Differentiate WHERE and HAVING clause? How SQL commands are classified? What are the two ways in which multiple transactions can be executed? ‘What is a save point? Why do understand by transaction COMMIT andROLLBACK? What are the properties of database transaction? What’ SQL? CL commands are supported by Write the use of ORDER BY CLAUSE, What is a database transaction? What is meant by committing and revoking a transaction? How are they achieved using COMMIT and ROLLBACK statements? What are the four significant subsets of SQL? 139 If 1 Unrr - Tl ONS eae OBJECTIVE QUESTIONS: SQL refers to the Standard Query Language, which is not actually the programming language. SQL doesn'thave a loop, Conditional statement, logical operations, it cannot be used for anything other than data manipulation. It is used like commanding (Query) language to access databases. The primary purpose of SQL is to retrieve, manipulate, update and perform complex operations like joins on the data present in the database. DDL, DML, DC! Data definition language (DDL) is the subset of the database which defines the data structure of the database in the initial stage when the database is about tobe created. It cons commands: CREAI 1 of the following ALTER and ts such as schema, tables, view, sequence, ete, Data manipulation language makes the userable to retrieve and manipulate data. It is used to perform the following operations. (a) Insert data into database through INSERT command. (b) Retrieve data from the database through SELECT command. 140 I (©) Update data in the database through. UPDATE command. (d) Delete data from the database through DELETE command. Data control language allows you to control access to the database. DCL is the only subset of the database which decides that what part of the database should be accessed by which user at what point of time. Itincludes two commands GRANT and REVOKE. GRANT: to grant the specific user to perform a particular task REVOK! or granted permissions. to cancel previously denied Database Management is a collection of programs and files that allow a user to define structure of a database, store data into it, modify the structure and manipulate the data. RDBMS stands for Relational Database Management System. It is a database management system based on a relational model. RDBMS stores the data into the collection of tables and links those tables using the relational 10. i 12. 13. 14. 15. 16. 17. operators easily whenever required. It facilitates you to manipulate the data stored in the tables by using relational operators. Examples of the relational database management system are Microsoft Access, MySQL, SQLServer, Oracle database, ete. Primary key is a unique key in arelation which can uniquely identifi a tuple (row) ina given Relation, Ifakey is available in a table as a primary key then this key is called foreign key in another table, Ifa column in a row has no value, then column is said to be null. DISTINCT GETDATEO, NOT NULL constraints impose a condition that value of a row cannot be left blank. UPDATE EMPL; WHERE clause is missing in given query. ‘There is noneed to write ALL and TABLE word in above query. Correct form is- DELETE FROM EMP; Where clause is used to select particular rows that satisfy condition whereas having clause is used in connection with aggregate function, group by clause. SQL Commands are classified into four categories: 18, 19. 20. 21. 22. HAL I ‘Multiple transactions can be executed in one of the following two ways: (i) Serial (ii) Concurrent, Savepoints are special operations that allow you to divide the work of a transaction into different segments. In case of a failure, you can execute rollbacks to the savepoint only, leaving prior changes intact. COMMITTING a transaction means all the steps of a transaction are carried out successfully and all data changes are made permanent in the database. Transaction ROLLBACK med transaction has not been finished Ss completely and hence all data changes made by the transaction in the database if any, are undone and the database returns to the state as it was before thi transaction execution started, The properties of transaction are: (i) Atomicity (ii) Consistency (iii) Isolation (iv) Durability SQL supports following TCL commands BEGIN START TRANSACTION-Marks the beginning of a transaction COMMIT- Ends the current transaction by saving database changes and starts transaction, ROLLBACK- Ends the a new 1 current transaction by discarding changes and starts a new transaction. SAVEPOINT- Defines breakpoints for the transactions to allow partial SET AUTOCOMMIT- Enables or disable the default rollbacks. autocommit mode. 23. The SQL ORDER BY clause is used to sort the data in ascending or descending order, based on one or more columns. Syntax: Select Column-list from table- name [Where Condition] [Order BY Columnl, Column2, ColumnN] [ASCDESC]; ENS EL) SUBJECTIVE QUESTIONS: A transaction is program module whose execution may change the content of database. Committing a transaction means the permanently save any transaction into the database. Revoking a transaction means the operation of restoring a database to a previous state by canceling a specific transaction. There is four significant subset of the SQL: a) Data definition language (DDL): DDL is used to define the data structure it cor of the commands like CREATE, ALTER, DROP, etc. b) Data manipulation language (DML): DML is used to manipulate already existing data in the database. The commands in this category are SELECT, UPDATE, INSERT, ete. ©) Data control language (DCL): DCL s used to control access to data in the databas and includes commands such as GRANT, REVOKE. d) Transaction Control Language (TCL): transaction control commands are COMMIT, ROLLBACK. HA42 I Unit - IV OBJECTIVE QUESTIONS 1. Whatis E-business 5. Howmany major categories are there for . oo E-Commerce? Write their benefits, 2. Mention some applications of e- governance 6. Write different features of E-Commerce. What is access control attack? Give How many major categories are there for examples, E-Commerce? 8. Distinguish between spam and cookies. 4. Write the Benefits of E-commerce 9, Write the objective of eyber ave SUBJECTIVE QUESTIONS: 1. What is E-commerce? Elaborate on its benefits. What are the major challenges in implementing E-business? 143 It Unit - IV DNS aaa) Objective Questions: 1 E-business is any kind of business or commercial transaction that includes sharing information across the internet. Mention some applications of e-governance. Some applications of e-governance: (a) Government to Citizen (G2C) (6) Consumer to Government (C2G) (©) Government to Government (G2G) (@)_ Government to Business (G2B) (©) Govemment to NGO (G2N) Electronic commerce can be classified into four main categories. () B2B, (ii) B2C, (iii) C2C, (iv) C2B Benefits of E-commerce are: a. E-commerce provides the sellers with a global reach. b. E+ Commerce will substantially lower the trans: ion cost. Itprovides quick delivery of goods with very little effort on part of the customer. d. 24x7 services. e. Electronic commerce also allows the customer and the business to be in touch directly, without any intermediaries. Ad I Electronic commerce can be classified into four main categories. Benefits of E-commerce a. E-commerce provides the sellers with a global reach. b. E-Commerce will substantially lower the transaction cost. ¢. _ Itprovides quick delivery of goods with very little effort on part of the customer. d. 24x7 servi e. Electronic commerce also allows the customer and the business to be in touch directly, without any intermediaries. Seven Unique Features of E-commerce are: (i) Ubiquity - E-commerce technology is available everywhere. A unique feature of e-commerce technology. Example is if the user is at outstation, he also can through wwwacer.com get the information of the product. (ii) Global Reach - The total number of users or customers an e-commerce bus ‘an obtain. nes Example is www.acer.com is (ii) (iv) (vy) wi) (vii) whole world also can browse it. 7. Because the website have supplied many language to let different language users understand it. Universal Standards - Standards that are shared by all nations around the world. Example is when you see the price of product in the website, that price is very fairly and standards. Richness - Video, audio and text messages are possible. Example is the richness is can make the websites become attract people to browse. Interactivity - Technology that allows fortwo way communication between merchant and consumer. Example is in the website we can contract the merchants, that have many way can contract like: phone, e-mail, video call, and ete. Information Density - The total amount and quality of information available to all market participants. Example is we can get the clearly information in the websites. Personalization/Customization - It allows personalized messages to be delivered to individuals. Example of personalization is if have a new product, the website will send the email flyer to the customer. Example of customization is customer can customize something in the product like name, pattem, colors, and ete. HAS I What is access control attack? Give examples. Access control attacks typically bypass access control methods Control Access control prevents the unauthorized access to the objects which include access to the like information systems communication links, networks, b. Onthe other hand, broken access control continues to be the most common web application Vulnerability. Distinguish between spam and cookies. Cookies are files that your web browser uses to remember things like have you visited a page before and so on. ‘Spam means unwanted emails. Write the objective of cyber law. Objective of cyber law: i) Safeguard national critical information infrastructure (CII) ii) Respond to, resolve, and recover from cyber incidents and attacks through timely information sharing, collaboration, and action. iii) Establish a legal and regulatory framework to enable a safe and vibrant cyberspace. ONS ELS) SUBJECTIVE QUESTIONS: 1 commerce, also known as electronic commerce or internet commerce, refers to the buying and selling of goods or services using the internet. Benefits of E-Commerce: a. Immediacy - no going to the shops or waiting in queues b. price - goods bought online tend to be cheaper ©. Choice- the range of goods available is vast and with sites like http:// www.amazon.com that let you compare goods from many retailers itis easy to find what you want. 4. 24-hour availability - the shop never closes €. Speed- you'll locate what you want much quicker f. Global markets - neither you nor the vendor are restricted to your/their locality g. _ Interactivity - get immediate feedback on prices, features etc h. Less paperwork - always a good thing! Some of the major challenges faced by e-commerce in India are: (i) Infrastructural Problems (ii) Absence of Cyber Laws (iii) Privacy and Security Concem (iv) Payment and Tax Related Issues (v) Digital Illiteracy and Consumer awareness (vi) Virus Problem (vii) English Specific 146 I

You might also like