0% found this document useful (0 votes)
74 views15 pages

IP XII Holiday HomeWork

stands for Internet Protocol, which is a set of rules that govern how data is routed and addressed across networks. IP addresses are unique numeric identifiers that are assigned to devices connected to the internet or a local network. They are used to locate and identify devices on a network, and to allow devices to communicate with each other. IP What it is A set of rules that govern how data is

Uploaded by

abhisekkabat004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
74 views15 pages

IP XII Holiday HomeWork

stands for Internet Protocol, which is a set of rules that govern how data is routed and addressed across networks. IP addresses are unique numeric identifiers that are assigned to devices connected to the internet or a local network. They are used to locate and identify devices on a network, and to allow devices to communicate with each other. IP What it is A set of rules that govern how data is

Uploaded by

abhisekkabat004
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 15

Chapter:3 Review of Database Concepts & SQL

1 Mark Questions
(MCQ)

1. A collection of fields is termed as ____________.


a) record b) data
c) attribute d) character

2. _____________is a collection of database tables.


a) record b) file c) database d) None of these

3. The repetition of same data ic called _____________.


a) Data security b) Data redundancy c) Data sharing
d) None of these

4. The mismatch of same data in two different fields is called ____.


a) data inconsistency b) data security c) data sharing
d) None of these.

5. Which of the following model says that the data should be


organized in the form of table?
a) Network model b) Hierarchical model c) spiral model
d) relational model

6. Which of the following command is used to modify the data of a


database table.
a) UPDATE
b) DELETE
c) ALTER
d) DROP

(Fill in the blanks)


7. The total number of attributres in a relation is called _________.
Ans: degree
8. The ____________ command in mysql is used to insert one or
multiple recordes into a database table.
Ans: INSERT

9. _________ command in mysql is used to remove one or multiple


records in a database table.
Ans: DELETE

10. The _________ function return the position of a substring in the


main string.
Ans: instr( )

11. _________ is a set of one or more attributes that can uniquely


identify tuples . .
Ans: PRIMARY KEY

12. A non-key attribute whose values can be retrived from the


primary key of another table is known as ______________ in its
current table.
Ans: Foreign key
13. _________ command in mysql is used to modify the structure of
the database table.
Ans: ALTER TABLE

14. The candidate key that is not the primary key is known as
____________.
Ans: ALTERNATE KEY.

15. ___________ function is used to remove both leading and trailing


spaces from a given string.
Ans: TRIM
Assertion and Reasoning based questions
16. Assertion (A): Database Management System is an application
software which arrange data in a well organised manner in the form
of table.
Reasoning (R): DBMS acts as an interface between the database
stored in the computer memory and user.
Ans: (i) Both A and R are true and R is the correct explanation of A.

17. Assertion (A): The aggregate function in SQL operate on multiple


set of values and return a single value as output.
Reasoning (R): The aggregate function are used to perform some
fundamental arithmetic operations such as MAX(), MIN(), SUM() etc.
Ans: (i) Both A and R are true and R is the correct explanation of A.

18. Assertion (A): A join is a query that combine rows from two or
more tables.
Reasoning (R): Equi-joins are joins based based on equality
conditions.
Ans: (ii) Both A and R are true and R is not the correct explanation of A.

19. Assertion (A): GROUP BY clause is always preceded by ORDER BY


clause in a SELECT statement.
Reasoning (R): ORDER BY clause always follows other clauses.
Ans: (i) Both A and R are true and R is the correct explanation of A.

20. Assertion (A): All aggregate functions except count(*) ignores


NULL values in their input collection.
Reasoning (R): SUM, AVG, MIN and MAX can only be used with
numeric functions.
Ans: (ii) Both A and R are true and R is not the correct explanation of A.
LONG QUESTIONS (5 Marks Questions)
14) What is wild card character in MYSQL. Explain them with suitable
example.

15) What are aggregate functions in MYSQL. Explain any four


aggregate functions.

16) EMP TABLE

Write the MYSQL queries as per the above given EMP table :
i) Write the MYSQL query to display the name, job and commission of all
employees by providing a message ‘NO COMMISSION’ in place of NULL
value of COMM column.
ii) Display the name and job of those employees whose name and job contain
equal number of characters.
iii)Increase the salary by 10% of those employees who are getting
commission.
iv)Delete the record of those employees who has joined on ‘SUNDAY’.
v) Remove the field DEPTNO from the above EMP table.
17) What are the various operations are performed in ‘operation on
relations’. Explain with a suitable example for each.

18) What do you mean by table joining? Why it is required? Explain


about equi-join, left outer join and right outer join by giving a
suitable table in your example.

ABDUL SIR

Chapter:2 Data Visualization using Matplotlib


1 Mark Questions
(MCQ)

1. Which is a python package used for 2D graphics?


a) matplotlib.pyplot b) matplotlib.pip
c) matplotlib.numpy d) matplotlib.plt

2. Which of the following value is provided by keyword for barplot?


a) pie b) line c) bar d) None of these

3. Which type of chart shows the relationship between a numerical


variable and a categorical variable?
a) Line b) Bar c) Pie d) None of these

4. What is the minimum number of arguments required for plot()


function in matplotlib ?
a) 1 b) 2 c) 3 d) 4

5. Which graph should be used where each column represents a


range of values and the height of a column corresponds to how many
values are in the range?
a) plot b) line c) bar d) histogram
6. Which of the following command is used to import matplotlib for
coding?
a) import matplotlib.pyplot as plt
b) import plt.matplotlib as plt
c) import py.matplotlib as plt
d) import pyplot.matplotlib as plt

(Fill in the blanks)


7. __________ is used to save a graph.
Ans: savefig( )
8. The ____________ can be plotted vertically and horizontally.
Ans: barchart

9. _________ is used to add title to a chart


Ans: title( )

10. The pyplot module provides the __________ function which is


frequently use to plot graph
Ans: plot( )

Assertion and Reasoning based questions


11. Assertion (A): Data visualization helps users in analyzing a large
amount of data in a simple way.
Reasoning (R): Data visualization makes complex data more
accessible, understandable and usable.
Ans: (i) Both A and R are true and R is the correct explanation of A.

12. Assertion (A): import matplotlib.pyplot as plt is used to import


pyplot module.
Reasoning (R): Matplotlib is a python library and pyplot is a module
that contains functions to create various plots.
Ans: (i) Both A and R are true and R is the correct explanation of A.
13. Assertion (A): Data visualization refers to the graphical
representation of information and data using visual elements like
charts, graphs and maps, etc.
Reasoning (R): To install matplotlib library, we can use the
command – pip install matplotlib.
Ans: (ii) Both A and R are true and R is not the correct explanation of A.

LONG QUESTIONS (5 Marks Questions)


14) The inventory management software of a grocery shop stores the
price of al fruits as follows:
Fruits=[‘Apple’, ‘Guava’, ‘Papaya’, ‘Grapes’, ‘Mango’ ]
Price=[150, 70, 50, 30, 120]
Write suitable Python code to generate a Bar chart on the given
data. Also add the chart title and label for X and Y axis. Also add
suitable statement to save this chart with the name fruits.png.

15) Write Python code to draw the following bar graph representing
the total sales in each quarter. Add the Title, label for X and Y axis.
Use the following data for plotting the graph.
sales=[450,300,500,650]
qtr=[‘QTR1’, ‘QTR2’, ‘QTR3’, ‘QTR4’]
16) Consider the following graph. Write the python code to plot it.
Also add the Title, label for X and Y axis.
Use the following data for plotting the graph.
Smarks=[10,40,30, 60,55]
Sname=[‘Sahil’, ‘Deepak’, ‘Anil’, ‘Ravi’, ‘Riti’]

17) Write suitable Python code to draw the following line chart “CO2
Emission” having title and label for X and Y axis as shown below.

Also give suitable python statement to save this chart with the name
emission.png.
18) Write the code to plot the given graph

Chapter:6 Societal Impacts

1 Mark Questions

(Fill in the blanks)


1) A copyright is automatically granted to authors or creators of
content. (True/False)
Ans: True

2) Freeware is copyrighted software that is freely available to use.


(True/False)
Ans: True
3) ___________ is a secure technique to protect data being
transmitted over a network.
Ans: Encryption
4) _____________ are the etiquettes that are to be followed while
communicating online.
Ans: Netiquettes

(MCQ)
5) Online posting of rumours, giving threats online, posting the
victim’s personal information, comments aimed to publicly ridicule a
victim is termed as __________
a) Cyber bullying b) Cyber crime c) Cyber insult d) None of these

6) A fraudulent process that extracts money from an ignorant person


is called
a) Spamming b) Phishing c) Bullying d) None of these

7) In FOSS, source code is hidden from _______


a) All users
b) Purchaser
c) Only the Vendor
d) In FOSS source code is not hidden

8) Pallabi found that her picture posted in a social networking site


has been merged with an unknown person and published. What
should she do?
a) Ignore the instance
b) Report it to the cyber crime cell
c) Try to delete the post
d) Enjoy the instance

9) Using Someone’s Twitter handle to post something will be termed


as
a) Fraud
b) Identity theft
c) Online stealing
d) Phishing
10) Legal term to describe the rights of a creator of original creative
or artistic work is called________
a) Copyright
b) Copyleft
c) GPL
d) BSD

Assertion and Reasoning based questions

11. Assertion (A): Hacking is compromising security on digital


devices.
Reasoning (R): Hacking involves stealing passwords and other digital
information.
Ans: (i) Both A and R are true and R is the correct explanation of A.

12. Assertion (A): Rajat has stolen the content of a research paper
and published it online. Rajat has committed cybercrime.
Reasoning (R): Plagiarism is an act of stealing someone’s work and
presenting it as one’s own.
Ans: (iv) A is false but R is true.

13. Assertion (A): Digital footprint is the trail of data we leave behind
when we visit any website (or use any online application or portal) to
fill in data or perform any transaction.

Reasoning (R): While online, all of us need to be aware of how to


conduct ourselves, how best to relate with others and what ethics,
morals and values to maintain.
Ans: (i) Both A and R are true and R is not the correct explanation of A.

SHORT TYPE QUESTIONS (2 Marks Questions)


14) What is Plagiarism?
15) What is the difference between Software License and copyright?
16) What are Intellectual Property Rights?
17) What is Phishing?
18) What is netiquette? Explain any two such etiquettes.
19) What do you understand by the term hacking? Write any two
measures that one should take to avoid being the victim of hacking.

CASE BASED QUESTIONS (3 Marks Questions)


20. Ayesha's family is replacing their old computer with a new one.
They decide to throw the old computer in a nearby empty field/plot.
I. Explain any one potential environmental hazard associated
with improper e-waste disposal.
II. Suggest one responsible way to Ayesha's family for proper
disposal of their old computer.
III. Describe the importance of recycling in e-waste
management.

21. Richa recently started using her social media account. Within a
few days, she befriends many people she knows and some that she
does not know. After some time, she starts getting negative
comments on her posts. She also finds that her pictures are being
shared online without her permission.
Based on the given information, answer the questions given
below.
i) Identify the type of cybercrime she is a victim of.
ii) Under which act, she can lodge a complaint to the
relevant authorities.
iii) Suggest her any two precautionary measures which she
should take in future while being online to avoid any such
situations.

22. Mention any three health hazards associated with inappropriate


and excessive use of gadgets.
23. Manohar received an email from a company, named
Makemoney Pvt. Ltd., claiming that Manohar has won `20 lakhs in a
survey done online. In order to claim the prize money, he was
required to answer few security questions such as his Name, Account
number, PAN card details, Phone number and OTP for verification
purposes. For this, he had to click on the link provided in the email.

Answer the following questions


i) Should Manohar give the required details to the company?
ii) What is the activity depicted above?
iii) What should he do with this email?

LONG QUESTIONS (5 Marks Questions)

24. The School offers Wi-Fi to the students of Class XII. For
communication, the network security-staff of the school is having a
registered URL “schoolwifi.edu”.
On 17th September 2023, E-mails were received by all students
regarding expiry of their passwords. Instructions were also given
renew their password within 24 hours by clicking on particular URL
provided.

i) Identify the name of cyber crime which is done by given


information.
a) Spamming b) Phishing c) Identity theft d) Hacking

ii)URL stands for ____________


a) Universal Resource Loader
b) Uniform Resource Locator
c) United Research Loader
d) Uniform Resource Loader

iii) Unsolicited commercial e-mail is known as ___________


a) malware b) virus c) spam d) spyware
iv) Wi-Fi stands for ____________
a) Wireless Internet Frequent Interface
b) Wireless Functioning
c) Wireless Fidelity
d) Wire Free Internet

v) Ideally, what characters should be used in a password to make


it strong?
a) Letters and numbers only
b) Mixed Case (Upper and lower)
c) Special characters
d) all the above

25. Smridh has recently changed his school, so he is not aware of


the people, but someone is posting negative, demeaning comments
on his social media profile. He is also getting repeated mails from
unknown people. Everytime he goes online, he finds someone
chasing him online.

i) Smridh is a victim of__________


a) eavesdropping b) stolen identity c) phishing d) cyber stalking

ii) The action that Smridh should take:


a) He should only share with his friends
b) He should not share with anyone as it can cause serious problem
c) He should immediately report to the police
d) He should bring to the notice of his parents and school authorities.

iii) _______ is a set of moral principles that governs the behaviour of


a group or an individual and regulates the use of computers.
a) Copyright b) Computer Ethics c)Property Rights d) Privacy Law

iv) Smridh needs to protect his personal information or data from


unintentional and intentional attacks and disclosure which is termed
as _________ .
a) Digital right b) Copyright c) Privacy d) Intellectual Property
v) The act of fraudulently acquiring someone’s personal and private
information, such as online account names, login information and
passwords is called as _______.
a) Phishing b) fraud c) scam d) plagiarism

You might also like