Question Bank Class XII IP 065 MCQ With Answer
Question Bank Class XII IP 065 MCQ With Answer
Session : 2023-24
Class –XII
Subject- Informatics Practices (065)
Ans. b. 1
Ans. c. Pandas
Ans. b. Series
Q10. A Series by default have numeric data labels starting from ______________.
a. 3
b. 2
c. 1
d. 0
Ans. d. 0
Q11. The data label associated with a particular value of Series is called its ______________
a. Data value
b. Index
c. Value
d. None of the above
Ans. b. Index
Ans. b. Pandas
Ans. b. Series( )
Ans. a.
0 40
1 50
2 60
dtype: int64
Q15. How many values will be there in array1, if given code is not returning any error?
series4 = pd.Series(array1, index = [“Jan”, “Feb”, “Mar”, “Apr”])
a. 1
b. 2
c. 3
d. 4
Q16. How many elements will be there in the series named “S1”?
>>> S1 = pd.Series(range(5))
>>> print(S1)
a. 5
b. 4
c. 6
d. None of the above
Ans. a. 5
Q17. When we create a series from dictionary then the keys of dictionary become _______
a. Index of the series
b. Value of the series
c. Caption of the series
d. None of the series
Ans. a.
a 14
b 14
c 14
dtype: int64
Ans. c. ValueError
Ans. a. Column
Ans. c) DataFrame()
Ans. d) read_csv()
Q27. From a 4(rows) x 3(columns) size dataframe, we can extract total different series
based on index and columns will be
a) 4 b) 3
c) 7 d) 12
Ans. c) 7
Q29. Assertion – Two basic data structure in Python are: Series and Dataframe. But
both are different from each other.
Reason - Series stores heterogenous data while Dataframe stores homogenous data.
Q.30. Write correct Python statement to display 2nd,3rd,4th rows and 6th,7th
columns from a DataFrame Sales.
a) Sales.loc[2:4,6:7]
b) Sales.loc[6:7,2:4]
c) Sales.iloc[2:4,6:7]
d)Sales.iloc[6:7,2:4]
Q.33. Which is the correct Python statement to display last 6 rows of DataFrame Item of 10
rows with some columns?
a) Item.loc[4:9]
b) Item.loc[9:4]
c) Item.loc[:10]
d) Item.loc[:11]
Ans. a) Item.loc[4:9]
Q.34. Write Python statement to display last two rows of the above DataFrame Products.
a) Products.loc[2:]
b) Products.loc[‘Computer’:’Laptop’]
c) Products.loc[2:3]
d) Products.loc[:’Laptop’]
Ans. b) Products.loc[‘Computer’:’Laptop’]
Q35. To change the 5th column's value at 3rd row as 35 in dataframe DF, you can write
_____.
(a) DF[4, 6] = 35 (b) DF[3, 5] = 35
(c) DF.at[4, 6] = 35 (d) DF.at[3, 5] = 35
Q.36. Choose the correct function to rename city columns to location using rename()
function:
a. df.rename(columns={‘City’:’Location’})
b. df.rename(columns={‘City’=’Location’})
c. df.rename(‘City’=’Location’)
d. df.rename(df.columns(‘City’,’Location’))
Ans. a. df.rename(columns={‘City’:’Location’})
Q. 38. Replace the row label ‘Ankit’ with ‘Ankita’ in dataframe ‘DF’
a. DF.Rename({‘Ankit’ : ‘Ankita’})
b. DF.rename({‘Ankit’ : ‘Ankita’})
c. DF.repalce({‘Ankit’:’Ankita’})
d. None of the above
Ans. d. plt.title()
Q.42. Using Python Matplotlib ___________ can be used to count how many values fall into
each interval.
Ans. c. histogram
Q44. Which graph should be used where each column represents a range of values, and
the height of a column corresponds to how many values are in that range?
a. plot
b. line
c. bar
d. histogram
Ans. d. histogram
Ans. b. pyplot
Ans. c. savefig()
Ans. d) line( )
Q48. Which of the following function will create a horizontal bar chart ?
(a) plot( )
(b) bar( )
(c) plotbar( )
(d) barh( )
Q50. Which argument of bar() lets you set the thickness of bar ?
(a) thick
(b) thickness
(c) width
(d) barwidth
Q.2. A relational database can have how many type of keys in a table ?
(a) Candidate Key (b) Primary Key (c) Foreign Key (d) All of these
Q.5. Which of the following is a group of one or more attributes that uniquely identifies a
row?
(a) Key (b) Determinant (c) Tuple (d) Relation
Q.6. Which of the following attributes cannot be considered as a choice for Primary Key ?
(a) Id (b) License number (c) Dept_Id (d) Street
Q.7. An attribute in a relation is a foreign key if it is the ______ key in any other relation.
(a) Candidate (b) Primary (c) Super (d) Sub
Ans. (d) ID
Q.11. In SQL, which of the following will select only one copy of each set of duplicate rows
from a table.
(a) SELECT UNIQUE
(b) SELECT DISTINCT
(c) SELECT DIFFERENT
(d) All of these.
Q.12. Which of the following keywords will you use in the following query to display the
unique values of the column dept_name?
SELECT________ dept_name FROM COMPANY;
(a) All (b) From (c) Distinct (d) Name
Q.13. The___ clause of SELECT query allows us to select only those rows in the result that
satisfy a specified condition.
(a) where (b) from (c) having (d) like
Q.14. Which operator can take wild card characters for query condition?
(a) BETWEN (b) LIKE (c) IN (d) NOT
Q.16. Which of the following SQL commands retrives data from table(s) ?
(a) UPDATE (b) SELECT (c) Union (d) All of these
Ans. (d)
Which of the names will not be displayed by the below given query ?
SELECT name from Employee WHERE employee_id>1009;
(a) Misha, Khushi (b) Khushi, Japneet (c) Japneet (d)Misha, Japneet
Ans. (d) %
Q.21. Which operator tests a column for the absence of data(i.e. NULL value) ?
(a) Exist Operator (b) NOT Operator (c) IS Operator (d) None of these
Ans. (d)
Ans. (c)
Q.29. Which of the following types of table constraints will prevent the entry of duplicate
rows?
(a) Unique (b) Distinct (c) Primary Key (d) Null
Q.30. Consider the following SQL Statement. What type of statement is this ?
INSERT INTO instructor VALUES (10211, „SHREYA‟ , „BIOLOGY‟, 69000);
(a) Procedure (b) DML (c) DCL (d) DDL
Q.31. Which of the following statements will delete all rows in a table namely
mytablewithout deleting the table‟s structure.
(a) DELETE FROM mytable;‟
(b) DELETE TABLE mytable;
(c) DROP TABLE mytable;
(d) None of these.
Ans. (a)
Q.32. Which of the following query will drop a column from a table ?
(a) DELETE COLUMN column_name;
(b) DROP COLUMN column_name;
(c) ALTER TABLE table_name DROP COLUMN column_name;
(d) None of these
Ans. (c)
Ans. (a)
Q.35. An attribute in a relation is termed as a foreign key when it reference the _____ of
another relation.
(a) Foreign Key (b) Primary Key (c) Unique Key (d) Check Constraint
Ans. (c)
Q.37. A relationship is formed via _______ that relates two tables where one table references
other table‟s key.
(a) Candidate Key (b) Primary Key (c) Foreign Key (d) Check Constraint
Ans. (c)99.99
Q.39. What should be the data type for the column Pricestoring values less than Rs.1000 e.g.
200.21
(a) VARCHAR(50) (b) NUMBER (c) NUMBER(5,2) (d) NUMBER(6)
Q.41. Data manipulation language (DML) includes statements that modify the_____ of the
tables of database.
(a) Structure (b) Data (c) User (d) Size
Q.42. All aggregate functions ignore NULLs except for the __________ function.
(a) Distinct (b) Count(*) (c) Average() (d) None of these
Ans. (b)Count(*)
Q.45. Aggregate functions can be used in the select list or the ____ clause of the select
statement.
They cannot be used in a _______ clause.
(a) Where, having (b) Having, where (c) Group by, having (d) Group by where
Ans. (a)
Ans. (b) 3
Ans. (a) 5
Ans. C
Ans. B
Ans. C
Ans. B
Ans. B
Ans. D
Ans. A
Ans. A
Ans. A
Ans. B
Ans. B
Q.14. Which topology in general uses less wire length compare to other
a. Star Topology
b. Ring Topology
c. Bus Topology
d. All use same Length of Wire
Ans. C
Q.15. The device with smartly controls the flow of data over the network by hoping is
a. Router
b. Gateway
c. Switch
d. None of them
Ans. A
Ans. A
Ans. A
Ans. A
Ans. B
Q.20. Which is the physical address to identify the Machine uniquely in network
a. IP Address
b. MAC Address
c. Computer Name
d. Your Used ID
Ans. B
Q.22. The First Page we generally view when we open the browser is called.
a. Default page
b. First page
c. Home page
d. Landing Page
Ans. C
Ans. D
Ans. B
Ans. D
Ans. C
Ans. B
Q.28. Google is a
a. Web service
b. Website
c. Program
d. All of it
Ans. A
Q.29. When the signal from one wire bleeds into another wire , it is called as
a. Radio waves
b. Infrared
c. Laser
d. None of them
Ans. C
Ans. C
Q.31. To prevent unauthorized access to and / or from the network, a system known as
____________, can be implemented by hardware and / or software
a. Antivirus
b. Firewall
c. Software
d. Hardware
Ans. B
Q.33.
Statement A : Social media are websites or applications that enable their users to participate
in social networking but they cannot create and share content with others in the community.
Statement B : We should not waste precious time in responding to unnecessary emails or
comments unless they have some relevance for us.
a. Both statements are correct.
b. Both statements are incorrect
c. Statement A is correct, but Statement B is incorrect
d. Statement A is incorrect, but Statement B is correct
Ans D
Ans. c)
Q.35. Mr. Vasu has designed a Open source software which must comply with some criteria.
Choose right statement in respect of above.
Statement I: No restriction on re-distribution of the software as a part or whole
Statement II: The integrity of the Author’s source code must be maintained
Statement III: The software can be sold after distribution
a) Statement I is False
b) Statements I and II are True
c) Statements II and III are True
d) Statements I, II and III are True
Ans. b)
Ans. a)
Answer: c
Ans. (a) anyone causing the pollution will pay for the damage caused
Q.41. When circuits are burnt for disposals, it creates which of the following harmful
chemicals?
(a) beryllium
(b) lead
(c)copper
(d) mercury
Q.45. Given below are two statements- one is labelled as Assertion (A) and another are
labelled as Reason(R):
Assertion (A): Users or companies who distribute GPL license works may charge a fee for
copies or give them free of charge.
Reason(R): The GNU General public license (GPL) is a popular category of public licenses.
(1)Both (A) and (R) are true and (R) is the correct explanation of (A)
(2) Both (A) and (R) are true and (R) is not the correct explanation of (A)
(3) (A) is true. (R) Is False
(4) (A) is False. (R) Is True
Ans) A
Ans) D
Ans) A
Ans) C
Ans) B
Societal Impacts
Q1. A ______________ is a body of data that you create while using the Internet:
a) Digital Sign print
b) Digital hand print
c) Digital footprint
d) Digital head print
Ans. c
Ans. d
Ans. c
Q4. A……. digital footprint is created when data is collected without the owner knowing.
a) Passive
b) Active
c) Objective
d) Subjective
Ans. a
Ans. c
Q6. ………. refers to the practices, safeguards, and binding rules put in place to protect your
personal information and ensure that you remain in control of it.:
a) Data Security
b) Data Protection
c) Data Stealing
d) Unknown Data
Ans. b
Q7. Presenting an entire text by someone else as your own work is known as ….:
a) Plain Plagiarism
b) Global Plagiarism
c) Local Plagiarism
d) Unknown Plagiarism
Ans. b
Ans. d
Ans. b
Q10. Permissive licenses provide a royalty-free license to do virtually anything with the
source code. Do you….?
a) Agree
b) Disagree
c) Can’t say
d) None of above
Ans. a
Q11. Exclusive rights in the software are retained with the owner /developer / publisher
are known as……………:
a) Open Source Software
b) Proprietary Software
c) Free Software
d) Freeware
Ans. b
Q12. Intellectual property always refers to intangible property that has been created by
individuals and corporations for their benefit or usage such as copyright, trademark,
patent and digital data……:
a) True
b) False
c) Sometimes
d) Never
Ans. a
Ans. a
Ans. b
Q15. Anushka is using her internet connection to book a train ticket. This is a classic
example of leaving a trail of web activities carried by her. What do we call this type of
activity?
a) Digital login
b) Digital Footprint
c) Digital Log off
d) Digital Error
Ans. b
Q16. Anil likes to do his homework late at night. He uses the Internet a lot and also sends
useful data through email to many of his friends. One Day he forgot to sign out from his
email account. In the morning, his twin brother, Sunil started using the computer. He
used Anil’s email account to send inappropriate messages to his contacts. What do we
call this type of activity?
a) Stealing of Data
b) Identity Theft
c) Digital Theft
d) Misuse of Email
Ans. b
Q17. Linux, Apache, MySQL and PHP software come under_______ category.
a) Proprietary Software
b) FLOSS
c) Freeware
d) Shareware
Ans. b
Q18. We should follow the rules for good Etiquettes while being online. Choose the right net
etiquette (s) from the following:
a) Avoid posting offensive comments
b) Respect others' privacy
c) Don't troll people in web forums
d) All the above
Ans. d
Ans. d
Q20. Sunita is confused about the free operating system available in the market. Few of her
friends suggested a few operating systems. Help her in choosing free operating system
for her device:
a) Apache
b) Windows
c) Mozilla
d) Ubuntu
Ans. d
Q 21. Aman deleted all his chats from all his social media accounts, and he thinks that all his
traces are deleted completely. Is he right in thinking so?
a) No
b) Yes
c) May be
d) Not Sure
Ans. a
Q 22. ____________is the practice of taking someone else's work or ideas and passing them off
as one's own:
a) Plagiarism
b) Copyright
c) Patent
d) All of the above
Ans. a
Ans. c
Ans. c
Q 25. The user must agree to the ……terms and agreements when they use an OSS.
a) System
b) License
c) Community
d) Program
Ans. b
Q 26. Intellectual Property Rights (IPR) protect the use of information and ideas that are
of….
a) Social value
b) Moral Value
c) Commercial Value
d) Ethical value
Ans. c
Ans. d
Ans. b
Ans. d
Ans. d
Q31. _______ is defined as a crime in which the computer is the medium of crime.
a) Computer crime
b) Cyber crime
c) Internet crime
d) Digital crime
Ans. b
Q32. A ___________ is some lines of malicious code that can copy itself and can have
detrimental effect on the computers, by destroying data or corrupting the system.
a) Cyber crime
b) Computer virus
c) Program
d) Software
Ans. b
Ans. b
Ans. a
Ans. d
Q37. ______________ is an activity where fake websites or emails that look original or
authentic are presented to the user.
a) Phishing
b) Hacking
c) Spamming
d) Identity theft
Ans. a
Q38. Online posting of rumours, giving threats online, posting the victim’s personal
information, comments aimed to publicly ridicule a victim is termed as __________
a) Cyber bullying
b) Cyber crime
c) Cyber insult
d) All of the above
Ans. a
Ans. d
Q40. The process of re-selling old electronic goods at lower prices is called ____
a) refurbishing
b) recycle
c) reuse
d) Reduce
Ans. a
Q41. _______ is a person who deliberately sows discord on the Internet by starting
quarrels or upsetting people, by posting inflammatory or off topic messages in an online
community.
a) Netizen
b) Digital Citizen
c) Internet troll
d) None of the above
Ans. c
Ans. d
Ans. c
Ans. b
Q45. Use of electronic messaging systems to send unsolicited bulk messages are
called
a) email bombing
b) Spamming
c) Cyber stalking
d) Phishing
Ans. b
Ans. d
Ans. d
Q49. After practical, Rani left the computer laboratory but forgot to sign off from her
email account. Later, her classmate Ravina started using the same computer. She is now
logged in as Rani. She sends inflammatory email messages to few of his classmates using
Rani’s email account. Ravina’s activity is an example of which of the following cyber-
crime?
a) Plagiarism
b) Hacking
c) Identity theft
d) Cyber bullying
Ans. c
Q50. Kamal found a crumpled paper under her desk. She picked it up and opened it. It
contained some text which was struck off thrice. But she could still figure out easily that
the struck off text was the email ID and password of Ronak, her classmate. What is
ethically correct for Kamal to do?
a) Inform Ronak so that he may change his password
b) Give the password of Ronak’s email ID to all other classmates
c) Use Ronak’s password to access his account
d) None of the above
Ans. A