0% found this document useful (0 votes)
9 views8 pages

Scan 24 Jun 2020

Uploaded by

baishalikar04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views8 pages

Scan 24 Jun 2020

Uploaded by

baishalikar04
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

627

Science ---------,
- - - - - ~ents equivalent to A++ and I

I Ir 2----:---- -------- Tzs.


. What 1s alert statement? I
Computer
Writethestate
A-·
.
d fonn for the following: I
I
How m~ny types of comments does
3. Write the shorthan
I I 26
JavaSc~1pt ~upport? What are they? . · A==A+lS I
I
I
I 4. What 1s single line comment? Give
I exampl~s. .
B==B+l
What are the rules or
fi naming a JavaScript I
[HSLC '19) I
I 5. What 1s multi line comment? Give 27. variable? fi rmsofifstatementused I

I examples. Name the different O [HSLC '19) ·


28 · • Marks : 3/4 I
I 6. What is a variable? •n JavaScript. .
I 7. Write any two rules for naming a variable. ~ssay type questionsf ·data types does I
I 8. How m~ny types of data types does C. How many typ~s ;hat are they? Give I
I JavaS_cript have? Wh_at are _they? . 1. JavaScript have· I
I 9. What 1s the use of semicolon m JavaScript? examples. . f arithmetic operator I
I 10. What are arithmetic operators? E plain the workings O I
2· of increment and
I 11. What are ari~hmetic operator precedence? w~th an example. .
I
I 12.
I 13.
What are increment and decrement
operators?
What are comparison operators?
3. decrement operat_ors :r
Explain the workings ·th an example.
if statement.
Ex lain the work_ings ·r else statement. I
I
4· Ex~lain the workings of 1~itch statement I
I 14. What ~e compound assign~ent operators? 5.
I 15. What1stheuseofpromptd1alogbox? E ·n how does the s
1 nts in I
I 16. What is a simple statement? 6. xpk~•
I 17, What !s a compound statement?

it l~in the two types of comme I
I I 8. What 1_s the use of if statement? a!script. . JavaScri t I
19. What _is the use of if..else statement? ~hat are the rules for nammg a p I
I 20. What ~s the use of if.. else .. if statement? 8· iable? . . . witch
I 21. What 1s the use of switch statement? ~ t are the 1tm1tat10ns of s I
I 22. What ru_-e the three data types in JavaScript? 9· t:ment? . d I
I 23. How will you declare variables sub 1, sub2, ~ tis the difference between simple an I
I and sub3 in JavaScript? 1O. a ound statements?
24. Name the three logical operators. comp

Chapter LOOPING IN JAVASCRIPT


7
3· Will a for loop e:'ec1:1te without I
Ii
HSLC Exam. Questions II . •tia1iz.ation?Explainwithswtableexample. I
A. Very short type questions : Mark : 1 nu [HSLC' 20] I
1. Fill in the blankss : d a/
( i) The loop that never ends is cal[Hle LC~I
4.. What is a loop? . 'th ~~~r,C'/O\
Will a for loop execute wt out m 1a tza 10n.
I
I
5
1oop. 8 91 Explain with suitable examp 1es. I
I
(n) An early exit from a loop
complished by using the _ _ _ state-
can be ac- [HSLC' 20]
II I
ment [HSLC '20) IIAdditional Important Questions
2. This statement is used to get out of the loop k I
before the entire loop gets executed. What A. Very short type questions : Mar . : 1 I
statement is this? [HSLC' I9] I. Choose the correct option :
3. Answer the following questions in one I. How many times will the given loop be
word : executed?
(i) It is the third expression ofa for loop for (var 1 = 20 ; 1 >= 5; l -= 6)
that updates the variable nwnber e~c? document. write (" l =" + l)
time the loop is executed. What 1s 1t (i) 1 (ii) 2 (iii) 3 (iv) 4
called? [HSLC ' 20) 2. What will be the output of the following
.c. Essay type questions : . Marks : _213/4 code?
1. Differentiate between \\1~ile, do ... while and 1 = 10, S = 1
for loops in tenns of their syntax. while ( 1 > = 5) {
[HSLC ' 19) S= S+ l
2. What is a loop? What whi is tJ1e diff; rWe~:e I = 1_ 2
between while and do ... 1e 1~P · ual }
I d_ocument. write (S)
are the three statements compnsmg a for
f loop ? _____ JHSLC20l_ ___(2_24 (ii) 25 (iii) 20 (iv) 22
L---~-~ ----------~--~
. ___ ..... ---- .. .
628

( I M""I), ,,..- ......, ,,,_ " ,
l)uo•1iu11
r-
I -- -- -- -- -- -- -- -T--.- -
J.
Hnnk
Wh lch ono of Iho followin t1 In u l<•nt1l1111
1111 !ISi ,I ' m11111l110 ,u h~,. .... - - - ; il~i,~ utcd
J. ( ,'~•:,11·
110 lo'-'" ,fl
,~t ;on-
(J/lC(l '''' lh'J I
stnt~1nr 111? . I
0 0 1 C(ifllit i11 11 (ltlfll in1m
I
luloo cv I op n111)' I
I (i) If (ii) 1,re11k (iii) continue (Iv) for I 4 · A wllll1~,." 0 O
. I tor fc:,op.
II 4. Whi
loop'/ch ono of 1ho. fvllo winr, b 1111 ,nlinlto I ; !/:•.
,1 ' ~
1
: i" 11 0
I
~
~; mo11 11
, . I 5· ,cc1ut•tlfllort
cvntr,
rf loop_M11r tar
:1 11viti 2 f i
l'· s~;~:. ,11;,.,
: lnhlc
I
I ~
(i/. fo~ (; :> ((i) tor_(1
(~ 11) (or(! 3, ' <5 , '+1, l
3; I ·- 5: I H) I
I
11,10 1"'1)" 1ypct1 I
111 Ji, v11Scr1pl I •• 9111 w,ncntHcumpr1111011 I
• • I
( 1v) _tor ( 1d I 5_; I > I~- ,--)
~~
. 2 Whnl urc th<> ItJrcc
I 5. Whic!i of tho lollowmg loop cv_11lt1111 I ' 11 tot 10 op'I
I
I slopping co11d111on 1111ho c11d of loop1>s '/
tho
( Ni,r,te tho 1wo ontr)'
• •orotrollcd lof>(lfl,.
I • condition ,~ falr.c I
(i) for (ii) while I 43· Whot haPP""9 when ,c · I
I (iii)~o ... while (iv) No110 of those I · b,: .
I lormat of do ... whlle II
I II. Fill an the blankss : (ii) JJof.,whilt loop
I (i) w1tlle looP
I I. The re are ___ ___ 1ype s of loop s s. Wh1tf is the gc11era
ayailable in Java Script. . I 1nop? .
( 2. 1 he loop thal ,0 ntinuc stal,l.l,nont1 I
I an neve
. loop . . ends IS call ed 11 / II 6.
r
7.
m
Wh_ul the us~ 0 ~ ~ca k
wtout !Hthe u!c • , f0 rma statc mlln l? I
I 3. The _wh•I~ loop 1s repe ated whe n tho I 8.
t of for' loop ? .I
Whal is the g~n~ra: f<:,rmat of wblle loop'/ I
I cond1t1on as_ __ 9. Whal 1s the genera
1
I 4. - -.loop checks the stopping condition at I 8 1
. • quC11tlon : ~11rk8 : 3/4
the beginning of the loop
I 5. The__ _ stat~ment is. used to get out II C.
of the loop before the entore loop gets I I ·
Long type ·
l(ow is the break state ment drf[c
con tinu e stateme nt? £ xpJaon wrt an I
.
ren_t
.
I t~m
II 6. e)(ecuted.
The__ _statement skips the rema ining II example.
What is an indinite Jo0p ? Exp lalll · ·h, I
2 wrt an I
I code of the current iteration and transfers
the control to the next iteration of the loop. II 3·· example.
Can you incr I
variable num berease
by /a dec
valureas
e othee trhi.
t anlo~g II
I Ill. Wri te T for the true statement and F I If yes, writ e the stat e men ts for the I
II •·I. for re
The theis false one.
no diffe rence between while and II follodecr
(i) wingease
; the .
I do ... whi le loops. var! able number
(ii) increase the van~ble number by by I I
I 2. A break statement cannot be written inside 2 I
II (iii) incre ase
afor looo. (iv) decrease the varr num
ber by34 I
the varrable number
able by
I the latest syl lab us pre pa red by SEBA . I
Ch ap ter · ·t I
12 M yS Q L I
. . of the data while entenng t
is it called ? I
~~~
the validity
~~~~am~ I in a tab le. Wh at [H SL C' 2~] I
I tha t ca n be us ed m I
I [ HS LC Ex . Qu est ion s I I
I
I A. Very sho rt typ e questions : Ma rk
I 1. Write the correct or incorrect state- I
:1 I (b) It is a cla use en t to dis pla y on ly
SE LE CT Sla tem fa tab le. What is it I
II un iqu e va lue s
O [H SL C' 20] I
ment : ailed ? 2
ing statement is true in I
I I Which of the foil ow : · s · Ma rk s :
I · MySQL? [HSLC ' 19] I c
TE Iand
Short typ ues
_qere
ediff t1o ~e~ een DE LEC'
SL 9] I
I 8. What is the ~ c;Q L? [H
f {a)The SHO WDATABASES; query will dis- ses I
I 1.
I DROP com ma ~dew10a II the existing databa 9] I
II pla y c!ll
{b) The US the tab
E les.
com mand is used to activate a
2. How will you VI er? [H SL C' 1 .
I database.
I on the MySQL Serv by en tity ? W ha t are
I
I 2. It is a command used to modify the table [H SL C' 20 ] I
I 3 Wh at do yo u ~e ~t ies ?
I structure. What is the command here? 1 [H SL C' 20 ] I
[HSLC ' I9) I · the tw o typ es O en
I Wh at is SQ L? be tw ee nA LT ER I
I 3. This command is used to modify existing 4 I
mand I · Wh at is the d1fferencaned m· SQL ?.
I data values in a table. What is the com AT E mm
I here? [HSLC' 19] I 5 - [H SL C' 20 ] I
I and UPD co
I 4. Statewhetherthefollowingstatementsare
Wh at are the rul es for nru nin g a tab le in I
I tru e or false. I [H SL C' 20 ] I
I (a) Th e UP DA TE TA BL E com ma nd is
I 6. SQ L?
I E~ ~y ty~ e qu est ion s : _Ma rk s : 3/4 I
f use d to modify the table structure. I
[HSLC' 20) I C. Answer the following qu est ion s: le I
I I I. (a) Write the MySQL query to create_ a tab_
I 5. An sw er the fol low ing questions in on e
ed 'faculty' with the structure gw en m .JI
~~ ab le below: _ _ _ _ _J~~.'.,_! ~
I wo rd:
I
I
(a) Toest: are the rules that helps to ensure -
I
L---------------- ~------
. (Eng f\'ied.)
t) ucsiion B1111k fo, HSL,C Exa,~n::,s_ _;, - -
- -
-ID EO J5[rom
- - - - Rh-:-.,It I
O
0 10
r ------- - - - - -, --- --------
s· r . r
C'ohmlll Nana: Ottitt Type , ize onstnu nts
of EmP ,
Name. to Roh1t. Das . --
. I
I - - 1 - - --n-rr Shanna I
I - ,--
rnl:llllJll _ . . ~~~..-:-x-:=.....-,-;-;;-74 - =-:z_: nt Quest~
T·llc; i~ t1~1c VAR~Ari 12 NOTNlJL . [ Addido~ l _ P ~ · _ . .I
I n,~nu, 11nenl VARf1 !AR IO -- - - , . ns : Mark .1 I
~ ..J -r-· - · ATE N tty~ ques1ao
I n r11<:·0 ,0 1.!_ll ll - - -; ,'.:._ - - - , - - ---1 A. Very shor y- 0 don : I
I -Sttfo,y rN l ~_._____ l Choose the correct P . I
I (b)- Add dutn --10 ,.he ---- • ,
111bl~ 'tac ul1y so that the table
·
l . MyS
QL 5 tands for
d Query Language I
I wo11 ld lllo~ Ille ,1:; gi vt:n below :HSLC' 19) (i) My Structured Question Language I
I r 11 r~11rl.t T.i':1111yNu";";1~ o, p1.1J 1111~111 i) at I 1 (ii) My Structure Q ery Language I
I 10l!l l!ul1ii1·sliii'ii;1.i -n~'---r-1h1"111'"11'1Ml'l'"'-t7.TIU11'i1 (iii) My Staternentt Quu estion Language I
-r-nn~ 1111ii:TA,,>i7 :-tiumw (iv) My Staternen ed by .
~ ~~r :~~:t/ ~:r:~;,;~~ .:mi. 2. MySQL was devekop I Allan Larsson and I
) I
H)l) 5 J u ll n du~V. l} tlll AultJJl i()btlc i')\)8 -{)2-t) ) !l 5,000 (i) David Axmar ,
(c) (i) f,-uppost you ht1 Vc created 1lie ruble 'fac- Cl · her Lantham Sho es I
11lty' witliour s1Jeci 1y· i11g, lillY primary key m SlOp _ Axmark, Allan Larsson and I
(ii) David
nnd you wish Lo set the 'facultyld' fi eld as Michael _Widenus s· e Stroustrup and I
the primary k~y. / (iii) David Axmark, 1am I
(ii) Writ ~ down 1h e qu ery 10 set th e . h Lantham Sholes
'lltcultyld'iield t1s 1he primary key of the (~~r)ts~:,i~r Axmark, Allan Larsson and I
rnble. I
(Ii) Wri te down the query to delete the pri- Bjame Strou 5trup
11111ry key constraint of the tab le. 3. DDL stands for_____ I
(d) (i) You have decided to add NOT NULL con- (i) Data Defining Language I
strolnt to 'Department' field . So write down (ii) Data Definition Language I
the query for that purpose. (iii) Direct Definition Language
(ii) You have decided to remove the NOT (iv) None of these
NULL constrai nt from th e field 4. DML stands for _ _ __
'DateOfJoining'. So wri te down the query (i) Data Manipulation Language
for that purpose. (ii) Data Multiple Language
(c} (i)J\dd a column 'Gender' after'FacultyName' (iii) Direct Manipulation Language
field thn1can hold the va lue 'M' or 'F'. (iv) None of these
(ifii)Addd a column 'Gender' aflcr'FacultyName' S. TCL stands for _ _ __
tel that can hold the va lue 'Male' or 'Fe- (i) Transaction Control Language
male'. (ii) Transaction Complete Language
2. (a) Write an appropri ate MySQL que- (iii) Trans Control Language
ries that result into the fo llowing output: (iv) None of these
fHSLC' 20) 6. The MySQL query that will display the
,---~,--~~-,--~-~-- ...----,
structure of the 'Customer' table is
(i) DISPLAY customer
(ii) DESCRIBE customer
ron Ja1in Goswami 1994-0 1-10 Elw roni cs 40 ooo (iii) SHOW customer
3. Write any three queries from the follow- (iv) STRUCTURE customer
~ [HSLC' 20) 7. The command used to modify the c-0ntents I
(I) Write a query to set the EmplD as of a table are: I
the primary key of the above table. (!~. ALTER TABLE (ii) INSERT I
(ti) Write aquery toaddNOTNULL (tu)UPDATE (iv) SELECT I
8. The keyword used to son the col umn in
Constroints to the Department fi eld. descending order is I
(tii) Write nqueryto display therecords (i) DESCENDfNG (ii) DESC J
having 8.Salary in the range 30,000 to (iii) DES (iv) REVERSE J
40,000. 9 Which one is true about a Primary key I
(iv) Write a query to display the records column I
<!Pt has duplicate values
of empl~yec \\those ru:unes start with /A'. I
(11) It has 'NULL values
(v) Wnte a query to change the Emp I
L------ ------- ------- - ------- ------ .J
631
Computer Science

r-
_ _ _ _ _ _
(iii) 11 has un iqu ;;:~ ;;;- - - - - -
7- T wh;;;- i:-ih e ;;;.: r oDL? - - - - - , I
hes e I · What is the use of DML? I
(iv) All of~ 8
ctio ns used in the GR OU P BY I 9.· Define TCL. L
II 10. c ause are
Tlhe fun
I I0. Define DC .
I C) SUM() I
(!.. ) MJN (ii) MAX() I 11 What is DQL?
12' . Write the chaMy racteristics to detennine the II
I 'I' . ()
I JI, Fill ID the blanks, .
(iv) AII of thes e
I data type in SQL?

em ents ~re use d to man age I 13. ft "


Name any two ndes for t e gc'.'R~bl~ I
o
EI
I I. th h stat tnade by DML statements I 14. What is the syntax
I The c ~ngles · 1 TABLE command?
I ese me ude COMM
INr c MIT , RO LLB AC K, I 15. Wh at is the use of the ALTER TABLE II
I 2. and SA • PO
VE h ornmands I command?
I ~ - is t e mai n DQL t ·
What is the syntax for creating a new I
I
s a coll ect' / ;.tem ent. 16 e?
3. A- -;- -_i
need to store and m •o~ o o iects that you
I . column in a tabl
I
I What is the use of arithmetic operators?
vie w,. an,p ulat e data such as I
I4 tabl es and ? I
1 is a col um n or a set of I :;: What are the three log1cal operatoJs? I
I · ~ -ke y
s each row I 19. What is the use of 1perator prece enc e.
I in t~mn~jbat uniq uely iden tifie
Whatt' is ?the use o aggregate or group
I
I 20 _
I
I 5· eta e.som
are I · I
fu
nc mns.
I v I'd~ e rue s that help ens ure the sh: 3/4? I
whi le ente ring it in a I B. Long type questions : dMark
I taabl1e1ty of the data
How many SQL comman s are t ere
I
I 6. The ~ •
TA BLE
e stru
com
ctur
man
e.
d is used to I 1. What are
I 2. Des
they ? Des cribe them
cribe how to remove a_ database.
.
I
I
7 mo 0 dify the tabl a table.
clau se I 3. Describe the rules fornammg _ TABLE I
I · ! sele ~t a spe cifi c row (s),
-- I 4. Describe ho~ the AL_ TER
I 8 is used m the query. to com pare one I com man d help m_ th~ mod1ficallon of the I
f · Th~ st - cfause is use d structure of an ex1stmg table.
I nng value with another:
I
I 5. Describ e the use of SELECieve T statement . I
I III W · data from II
I
• fi nt: T for the .true statement and F I
or t e false one
Name the three ways
a tabl e.
to retr
irs f
DA TA BA SES ; que ry wil l I 6. Explain the use ofthe arithmetic operatc
I I. T_he SHOW I 7. Exp lain the use of the reJaiional operators. .
I 2 display all the tab !es. to acti vate a I 8. Explain the use of the log1
cal operators. 1
I - The US E com man d is used
I 9. Explain the use ofthe operator precedes. ence. 1
I
I 3. !he
database.
1 que ry
nformat1on on
DE SC
the
stud
fiel
ent;
ds
wil
in
l
the
'dis play
tabl e
I
I
10. Describe how to update data in
II. Wh at is a constraint? Name any two f
cons~ints. .
tabl
I
f :stud~nt'.
uni que val ues , the lI 12. Wh at 1s the difference between CHAR I
I 4. To display only used. . and VARCHAR data_ types? . .
I DIS TIN CT clau se is with an I
ers used with I 13. What is a group function? Explam I
I 5. The two w1l dca rd
the LIKE clause are * and ?
cha ract
I example.
ween the I
rt typ e que stio ns : Ma rks : 2 I 14. \1/hat _is the differenc:e bet I
11 B. Sh? key I followmg two statements
I. Wn te the que ry to add the prim ary
(1) DELETE FROM sl;
I
I con stra int to Em p!D col um n of the I I
I (ii) DROP TABLE sl;
I Employee table. en the I
ry wil l rem ove the Prim ary key I 15. What is the dif fer enc e betwe ?
j 2. Which que
t WHERE and HAVING clau ses
I constraint of AdmissionNo in the Studen L statements (that I
I 16. P~ir the equivalent SQ ing: I
table?
to add a NU LL or NO T NU LL I ~•ve the same output) from the followsala ry I
I 3. Is it pos sibl e
e alre ady load ed with I (1) SELECT • FROM club WH ER E
I Con stra int to a tabl
~tween 20000 and 30000; . ERE salary I
I
I data ? • I M club WH
all the tables in the f (11) SELECT • FRO
I 4. How will youedview I ~ _(20000, 30000);
I database nam Company? (lll) SELECT • FROM club WB
ERE I
ry to acti vate the data bas e I
I 5. Wr ite the que
s~lary >= 20000 and salary WH <=30000; I
named Hospital. . FRO M club ERE sala ry f
(1v) SELECT•
I 6. Name the five categories of SQ L fI = 20000 OR salary= 30000;
f
I
-- -- --comman
-- -- -- -- -- --
ds.
-- -- -- -- -- -- -J
L --
~ -'.:_, _ _ _ _ _ _ _ _1 t 1·~ 1~ lh111~ lu1 II SI ( ' l!x,11 ,,111cn (E11)t M\!'I !---------,
: Chapter sOCIB:rAi-1MrACT OJi' :
I I:\ INFORMArrI(>N 'fECllNOL()(;~ I
I 2. - Whu1
- - - t· c•iofonlineba.ckup'i t
ore the ud vun ag ' fHSI,,(,, I SI
j HSLC Exum. Questions j I . ia? How f nfoma.n,ac I
A. Very short type Questions Murk : 1 I 3. Whl\t 1s Jn fo rman d ts?fHSLC l 5] l
I. Write the 1.;orrcct or incorrect. stutcnionts I condition. D •, 1 of Service attack'/ G'1vc I
can affect ~tu ~n ·
as asked : I /4 . What 18 cnia · [HSI.£>16j I
(a) Which of the followin g statements is I example. db ryption ' nd I
true about Mirror Backup Method? I S. What d~ y~u und crSWn yen[HSLC f6j I
[M SLC' 16 J I dwcchry~t~o~ rtual school? Give its two foa- I
· Iess storage space than I 6·
1 It requires
(.) at i s vi [HSLC' 16] 1
any other backup method I
(ii) It requires more storage space than I 7·
Wr~:~ two advantages of on line back-up. I
[HSLC' 17]
any other backup method. D'f:'C: . t ', l between digital divide and I
(b) Which of the following statements is 8· .1 _ieren _ia e [HSLC' 17] I
1
~rue about ~ alware? [HSLC' 17]
9 ~~ i:I ~~typrecautions that you will take I
• (1) Malware includes computer viruses · t t our computer from malware. I
~orrns, Troj~n horses, and spyware'. to pro ec y [HSLC' 17] I
(11) Malware 1s the same as defective IO. Write the requirements that are neces-- I
software which has a legitimate • sary for an antiviorus programLC~ 0 be I
purpose but contains harmful errors. rddective. [HS 18] I
2. Which of the following statement is true for How will you protect your backup files?
differential backup method? [HSLC' 19] 11 · [HSLC' 18] I
(a) The entire data on the hard disk is cop-
12 Differentiate between IT and ICT. I
(b) l~-files that have been modified since . [HSLC' l&] I
last full backup are copied. · I3. What is Trojan horse? [HSLC: 19] I
3. Which of the following statement is true for 14. What is digital certificate? ? [H[H~tg, ;~]] I
hacker? [HSLC' 19] 15. WhatisDigitalMiddleman · · I
(a) It refers to an individual who gains un- 16. WbatisComputerwonn? ~SLC'_20] I
authorized access to a computer sys- 17. Mention any two uses ofICT m hospitals. I
tern for the purpose of stealing and cor-
rupting the data.
(b) It refers to~ person who enjoys learning
·
J8. What is Digital divide?
[HSLC' 20]
[HSLC' 20]
C. Essay type Questions Mark : 4/5/6
I
programming languages and computer I
systems, and can often be considered J. _ What do you mean by IT and ICT? Differ- I
as an expert on the subject. entiate between 'IT and ICT. [HSLC' 1S] I
4. Fill in the blanks: 2. What is a computer virus? How many I
(a) _ _ _was designed to store, carry different types of viruses are there? I
and exchange data. [HSLC' 20] Describe any two of them. [HSLC' 15)
5. Statewhetherthefollowingstatementsare 3. What is a digital certificate? What I
true or false. infonnaiton does it include? [HSLC' 16] I
(a) Computer virus includes malware, 4. What is spyware? How does it get installed I
spam, worms and spyware. on your computer? What is Anti-spyware? I
[HSLC' 20) [HSLC' 16) I
(b) A I · a able of 5. What can a computer virus do? What is I
ma ware ts a program c P 1 the difference between computer virus and I
reproducingandspreadingitselftoan- I computer worm? [HSLC' 17]
other computer system, usually by I 6. What is DATA BACKUP? Why is it I
means of a computer network. I required? Write about on line backup? I
[HSLC' 20] [HSLC' 18] I
B. Short type Questions Mark : 2/3 I 7. "Use of e-governance has social and eco• I
I. How will you take precautions against I nomic impacts." Justify. [HSLC' 19] I
L--~I_:ar_:~~u~~~~?_!~~~:!_J_ __________ ______ .J
633

,- --- h~.- - - - - - - -t arc


8 W at 1s e-comme rce? Wha the-d1.-f- T
--
Co111ru1cr Scicn1:c
-l l ·- Which: nc ofh the. -------------- ,
d?: fo ll
ow111 g i~ not a datr1 I
I
buck( up mc1 ~"ck ll p
I · fcrent kind s of e-commerce rnodd avoi I- II (i) Diffe n1 crgr1 1
1 11° I
.
able on mtcm ct, expl ain with an exam ple (ii ) renti al backup
' (.. i) Exuct co py backu p I
I of each. [ HSLC' 20) I I
(:~)full backu p
19. "Us~o~c-gove mance hassocial and cco- II A hacker . I
I nomic impacts". Justi fy. lHSLC' 201
I 12. (i) hack .-; up dat.a on~inc te.s I
I { . . - ----..;;; · - - I (ii) issues digital _cert ,fica I
I -Ad~•llo_n_•I _Impo~ t~n( _g__u2'ti ~ II
. : Mark : 1 I (iii)cnonenjoysofprog ramm in g
II A, Very short type quesllons ·v the above .
I J. Choose the correct option : I ~h~ contents of d!git al cert1ficat~srrare
ubl ic key, serial no., and exp1 ~ata I
I J. A category o~ ~~ftware that spies on your II 13. (i) (ii) ihe
bu sin es s addr ess and d1 g1tal I
c.omputeractiv1ttes iscalled •. · I
(i)_spyware (ii) freeware I signature
I (iii)lhe nam e of the orga n1zat1on I /
I (111)_ software (iv) hardware I I
ind iv id uaI
I 2. Wh •~h one ofthe following is not maIware? I (iv)all of the above . . I
I (~).virus (ii) wonn I at is often I
I A ... .... is a viru s th
I (m)Trojanhorse (iv)antivirus
i~~as a useful(n) .~omputer program. I
I 3. Which one of the following does not cause I 14. mi;t (i) spam • cracker I
I . spread of a computer virus?
the
(i;;) Trojan Horse (' v) worm t
I (') down loading files I
I (!~~ working with pen drives I 7. A softaw~e thlaltdspy on your com· pu er I
e-ma il attachment I activities 1s ca e ...::···· .. ···k·· .. .... I
I (m)
( . )ty · i) hardware
(11)
C v) coo
mal ware ware
I ,v pmg throu gh keyb oard I ( h ·rt I I
4. SSL means I (iii)spyware I
abou t t e v, ua I
I 8. Which one is not true
I (i) Switch Sockets Layer I
I school? . . ments
II (ii) Secure Sockets Layer 0 can post assign ·
(... ) . tar checking and grading of I
it~!:
!" Systematic Sock ets Laye r I {i ~u
assignments. I
I (1v)_ System Sockets Layer I 11

I 5. ~ d1gi~I certificate should contain ... ns from 9AM to 5 PM.


I (I/.
111 se~1al nui:r iber (ii) validity period : ):~ IAlf
':tat ed circulars are available. . I
y unsolicited, unwanted e-mail 1s I
I ( ) d1g1ta) S\gllature (1v) all of these in e- I 9· A c:iled ....... ............ . I
I 6. The information security system (i) e-governance (~i) e-~ommerce I
I c?~ erc e should meet requirements such as I (1v) virus I
(1) privacy I (iii)spam
zed I
ng of data to avoid unauthori
I. (!!) ~uthe~tication of sende~ and r~cipient I . Io. The codi . I
(111) mtegnty and non-repud1at1on 1v. all of (
access is ca_lled ·······::--· •
I (11) decryption
I (i) conversion
I
I
I
7.
these
It is a prog ram that appe ars useful at first
sight but is actually pro!l'ammed to pass I II. Fill
I (iii)encryption
in the blankss :
(iv) none of these I
I
crime committed using computers and
I the user's data or access nghts to someone I 1. Any . . I
I the Internet is called .
I .. .
e_lse._
(11) Won n I 2. A is a person who gams unauthonsed I
I access to a computer syste':'1 for the I
(1) Viru s _
(iii)Troj3;0 horse (iv) Spyware .
purpose of steali~g and corruptmg data. I
l 8. You can take a backuP. of I00 GB m aJan I le file I
I (i) CD or DVD . (11) pen dnve I 3. A_ ._attaches 1tselfto an exec.u~brun. I
I and mfects the computer when it 1s
I (iii) external hard 'disk ently
I I 4. __are programs that run indetopend
and travel from one computer another I
(iv) all of these
I 9. Which one of the following is not an I . I
I program? I across the network.
(ii) McAfee 5. __ _ is a software designed_ to prevent, I
(i) Facebook
I scan , ~d remove computer viruses, I
I (iii)Norton (iv) kaspersky
I I0, Mal ware includes I 6. Th~ d1g1tal code attached to a me~sage thatd II
(i) trojan horses (ii) worms I umq uely 1denllfies a message 1s calle
I
L_J~~ru~~--J~~~~~~~l----------------~
v
,-.34 Q ~ · oes (~ni Med.) -------
r - - - - - - - - - -Ul~.-;1ion Bnnk for HSLC 6xnrn 1 - , - .- - I -choo
- l't, "'I\
- - - - - - T - -n_ _ .. v1rtua s
I 7. Regular _ _ _ snves y()ur dutn from . 'd ?
6. Whut .'s neant by digital d"' 1 e_ICT h I
m1turnl disasb.·rs. 7. Whnt 15 111 Whnt imp11ct does
I . , ave l
1 Ill. Wrltt• r for the true stotcml'nt nnd .F
s. Define IC:-
n the society? two types of viruses I
I for the fnJse one. 0
hat is n vin1s? Na~e
I. A lwn ys sc nn storage dev ices befor e 9 · W ·I
connecting it to your computer. ." digital unity?_ . ? I
I 0. Whal ~~ 1ymorph1c vims · I
2. Spnm is nn unsolicited mai l sent in bulk. 11 . Whal ~~ a !'°am? I
3. You can ki.~ep n pass,~ord same as y~ur I 2. What ~~ 8 -_P ,ware?
own num e so th at 1t cn n b~ castl y 13. What 1s a sp)
remembered. backup ? Name two types 1

14 What is data
4. ln SSL connection, a key icon appears in · of data bac kup.
1

the address bur of the browser. I


5. Ahackerisapersonwhogainsunauthorized What is mnl ware? I
15 · ' . ill yo u protect your computer I
access to n co mput er syste m for th e 16. How \~ ·es
worms, and Troj an horses ? I
purpose of stealing and corrupting data. from ~,rus ~ tion ?
6. A co mput er worm cnnnot be spreed 17 . What 1s enc YP . ?
without human action . 18 . What is decry ption·
I
7. You should avoid using pirated software in I
your computer. tions : Marks : 3
C. Essay type ques
8. Spywnre is n computer program that is . h
installed on a user's computer with his of an antivirus software?
I . What 1st e use . t
consent Write any two pom s.
9. Spywar~ is also called spy bot. •d tf
2. What is spam ? How can you ~vot ge mg
IO. Once you have installed an antivirus spam mail? Write any two pomts.
program on your computer system, there Why do we require a password? What are
is no.need_to u~cfote _1t.f 3. the rules to create a secure passw?rd?
11 . Mu 1t1part1te viru s II) ects computers
systems and spreads itself in multiple ways. . b ·me? Briefly descnbe any
4. What IS cy ;rcr~ . . es
12 . A virus is a self-replication program, two types o _cy ercnm ·
which takes the entire hard disk space. f'
5. What is the difference between encryp ion
13. Spyware is a program that secretly gathers and decryption?
info~ation about ~e user and rel.ays it to . Expla in how an e-commerce transaction
6
adv~rt!sers or other 1:11terested parties. takes place with help of an example.
14. Ant1v1rus so~t~are 1s used to detect and
remove malicwus program. 7· What ste s can be taken by us to bridge
I 5. Online backup is storage on another hard . .. P . . ?
the digital divide ·
disk. 8. How is a virus different from a worm ?
16. Any file of a folder containing important 9. What
is nece ssary for an anti virus
information should be backed up. software 10 be effective?
17 . Decryption is. the process of converting IO How ICT is used in the field of education
encrypted data mto a human readable fomtat. ·
18. The virtual school is open for 24 hours . '
hea lthcare, and governance ?
19 . The digital di vide make s two group s in 11 . Why is back up requ ired ? How can
the society. backup files be protected?
20. You should read the spam mail and then 12. What is spam? List its disadvantages and
delete it. the methods by which one can avoid it.
B. Short type questions : Marks : 2 l 3. What infor mati on does a digital
1. What is the difference between a virus and certificate include ?
a worm? 14 . What are the requirements of security in
2. Write two advan tages of on line backup. e-commerce?
3. Wdbat is the difference between hackers 15 . Di ffe rent
an crackers? iate between a hacker and a
4. Give an y two examples of cert ificate cracker.
authori ty. 16. What ste ps s hould be taken by the
I 5. How is a web address starting with https:// governmen t to reduce the gap of digital
I different from the one starting with http://?
L~ -- -- -- -- -- -- ~- -- -- -- -- -- -- -~ -~ -- J divide?

You might also like