IP XII Holiday HomeWork
IP XII Holiday HomeWork
1 Mark Questions
(MCQ)
14. The candidate key that is not the primary key is known as
____________.
Ans: ALTERNATE KEY.
18. Assertion (A): A join is a query that combine rows from two or
more tables.
Reasoning (R): Equi-joins are joins based based on equality
conditions.
Ans: (ii) Both A and R are true and R is not the correct explanation of A.
Write the MYSQL queries as per the above given EMP table :
i) Write the MYSQL query to display the name, job and commission of all
employees by providing a message ‘NO COMMISSION’ in place of NULL
value of COMM column.
ii) Display the name and job of those employees whose name and job contain
equal number of characters.
iii)Increase the salary by 10% of those employees who are getting
commission.
iv)Delete the record of those employees who has joined on ‘SUNDAY’.
v) Remove the field DEPTNO from the above EMP table.
17) What are the various operations are performed in ‘operation on
relations’. Explain with a suitable example for each.
ABDUL SIR
15) Write Python code to draw the following bar graph representing
the total sales in each quarter. Add the Title, label for X and Y axis.
Use the following data for plotting the graph.
sales=[450,300,500,650]
qtr=[‘QTR1’, ‘QTR2’, ‘QTR3’, ‘QTR4’]
16) Consider the following graph. Write the python code to plot it.
Also add the Title, label for X and Y axis.
Use the following data for plotting the graph.
Smarks=[10,40,30, 60,55]
Sname=[‘Sahil’, ‘Deepak’, ‘Anil’, ‘Ravi’, ‘Riti’]
17) Write suitable Python code to draw the following line chart “CO2
Emission” having title and label for X and Y axis as shown below.
Also give suitable python statement to save this chart with the name
emission.png.
18) Write the code to plot the given graph
1 Mark Questions
(MCQ)
5) Online posting of rumours, giving threats online, posting the
victim’s personal information, comments aimed to publicly ridicule a
victim is termed as __________
a) Cyber bullying b) Cyber crime c) Cyber insult d) None of these
12. Assertion (A): Rajat has stolen the content of a research paper
and published it online. Rajat has committed cybercrime.
Reasoning (R): Plagiarism is an act of stealing someone’s work and
presenting it as one’s own.
Ans: (iv) A is false but R is true.
13. Assertion (A): Digital footprint is the trail of data we leave behind
when we visit any website (or use any online application or portal) to
fill in data or perform any transaction.
21. Richa recently started using her social media account. Within a
few days, she befriends many people she knows and some that she
does not know. After some time, she starts getting negative
comments on her posts. She also finds that her pictures are being
shared online without her permission.
Based on the given information, answer the questions given
below.
i) Identify the type of cybercrime she is a victim of.
ii) Under which act, she can lodge a complaint to the
relevant authorities.
iii) Suggest her any two precautionary measures which she
should take in future while being online to avoid any such
situations.
24. The School offers Wi-Fi to the students of Class XII. For
communication, the network security-staff of the school is having a
registered URL “schoolwifi.edu”.
On 17th September 2023, E-mails were received by all students
regarding expiry of their passwords. Instructions were also given
renew their password within 24 hours by clicking on particular URL
provided.