0% found this document useful (0 votes)
38 views15 pages

IT - Unit 3 & 4 MCQ's

Uploaded by

SK pianist tamil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views15 pages

IT - Unit 3 & 4 MCQ's

Uploaded by

SK pianist tamil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Part–B: Subject Specific Skills

Unit–III: Database Management System

Key Points

 Data is a raw and unprocessed form of facts and figures.


 Information is a processed and meaningful data that can be easily interpreted.
 Database is a collection of data, which is stored in a systematic manner, i.e., in the form of tables.
 A table holds information in the form of rows and columns.
 In a database table, rows are referred to as records or tuples and columns as fields or attributes.
 A record is set of related information that belongs to a particular instance of an object.
 A field describes a specific property of a record. It is also known as an attribute.
 A Database Management System (DBMS) is a computerised record keeping system or a software that enables you to
create, store, modify, and extract information from a database.
 A Relational Database Management System (RDBMS) is a type of DBMS software that uses relational database (RDB)
model for its database.
 A relational model enables the users to store data in several tables.
 A primary key is a set of one or more fields that uniquely identify each record in a table. It does not contain any
duplicate data or NULL value. A table can have only one primary key.
 A composite key or composite primary key refers to a combination of two or more attributes (fields) that uniquely
identify the records in a table. It may be a candidate or primary key.
 A foreign key consists of one or more fields whose value matches a primary key in another table. It acts as a cross-
reference between the tables.
 There are four main objects in any database - Tables, Queries, Forms, and Reports. A data type determines what type
of data you can enter into a field.
 Referential Integrity (RI) is a rule in RDBMS. It states that a foreign key must have a matching primary key, i.e., all its
references must be valid and the users cannot accidentally delete or amend data.
 The three different types of relationships that can exist between a given pair of tables are: One-to-One, One-to-Many,
and Many-to-Many.
 In a One-to-One relationship, a record in a table can have only one matching record in another table.
 In a One-to-Many relationship, a record of a table is associated with several matching records in another. However, the
record of the second table is associated with only one record in the first table.
 In a Many-to-Many relationship, one record is associated with several records in another table, and vice versa.
 In RDBMS, a query is a database object that enables you to retrieve records from one or more tables of a database or
different databases that meet a specific condition or criteria. MS Access provides various built-in functions to perform
calculations on query data.
 Structured Query Language (SQL) is the language used in RDBMS for writing queries.
 Data Definition Language (DDL) commands are used to define and modify the structure of a database. Some commonly
used DDL commands are Create, Alter, Drop, Truncate, and Rename.
 Data Manipulation Language (DML) commands help in retrieval, insertion, deletion, and modification of the information
present in the database. Some commonly used DML commands are Select, Insert, Update, and Delete.
A. Multiple Choice Questions.
1. A database is an organized collection of ...................................... .
a. Data b. Attributes
c. Record d. None of these
2. Which of the following software is appropriate to store data about school students?
a. MS Access b. Writer
c. Calc d. Impress
3. Which of the following is not a database program?
a. MySQL b. Oracle
c. Writer d. OObase
4.store data in Single table.
a. Flat File b. Relational
c. Single File d. One File
5.are dedicated computers that hold the actual databases and run only DBMS and related Software.
a. Main Server b. Web Server
c. Database Server d. Non-Database Server
6. GUI act as front end and database server act as ......................................
a. Container b. Back End
c. End d. None of these
7. Duplication of data is called ...................................... .
a. Inconsistency b. Consistency
c. Redundancy d. Foreign Key
8. Which of the following is not an advantage of database?
a. Sharing of Data b. Reduce Data Redundancy
c. Increase Data Inconsistency d. Data Security
9. Data Integrity means that data is accurate and consistent in the database.
a. True b. False
10. A database can have only one table.
a. True b. False
11. Which of the following will help to maintain unique record in the table?
a. Foreign Key b. Primary Key
c. Composite Key d. Alternate Key
12. Which of the following field of table “Book” can act as primary key?
a. Book_number b. Subject
c. price d. Author_name
13. When primary key is made up of two or more columns then it is called ................................primary key.
a. Mixed b. Reference
c. Composite d. Compost
14. Duplicate values can be entered in primary key.
a. True b. False
15. A key which is referring to the primary key of another table is called ......................................
a. Alternate Key b. Primary Key
c. First Primary Key d. Foreign Key
16. A field which is ............................... for each and every record is called Primary key.
a. Common b. Same
c. Unique d. None of these
17. When data is stored, maintained and retrieved from multiple tables then special database software are required called
......................................

a. DBMS b. RDBMS
c. Special DBMS d. All of these
18. Identify the Foreign Key from table “Sales”
Table Client:
ClientID (primary Key)
clientname
clientphone
Table : Sales
SalesID (Primary Key)
ClientID
Profit
a. SalesID b. Profit
c. Clientphone d. ClientID
19. Which of the following is not valid field in table “Student”?
a. admno b. name
c. fees d. salary
20. There can be multiple primary keys in a table.
a. True b. False
21. In RDBMS, data is organized in the form of ......................................
a. Table b. Record
c. Field d. None of these
22. SQL stands for ......................................
a. Structured Queue Language b. Structured Query Language
c. Structured Query Language d. None of these
23. All the values in ............................... are of same type.
a. Records b. Table
c. Database d. Fields
24.represent a single data item in a table.
a. Tuples b. Attributes
c. Relation d. All of these
25. In tables, data is organized in the form of rows and columns.
a. True b. False
26. Every row in a table has the same structure.
a. True b. False
27. Open Office base is not an open-source software.
a. True b. False
28.are the basic building blocks of a database.
a. Tables b. Record
c. Fields d. All of these
29. We can create table:
a. in design view b. use Wizard
c. Both of the above d. None of these
30. By default, data type of fields is.
a. Text [Varchar] b. Text [Char]
c. Int d. Long
31. Base automatically adds the column as Primary Key if we don’t add it.
a. True b. False
32. By default, the length of Varchar data type is ......................................
a. 20 b. 30
c. 40 d. 50
33. By default, the name of the table is ......................................
a. Tab 1 b. Table 1
c. First Table d. Untitled 1
34.are used to identify which type of data we are going to store in the database.
a. Datatype b. Record
c. Table d. Attributes
35. Which data type will be appropriate to store information as Salary, Fees, Price etc?
a. Numeric Data type b. Alphanumeric Data types
c. Binary Data types d. Date Time
36. Which of the following is not a numeric data type?
a. Tinyint b. Smallint
c. Boolean d. Date
37. Which of the following data types cannot store decimal values?
a. Decimal b. Real
c. Numeric d. Boolean
38. Which of the following will occupy more space in computer memory?
a. Bigint b. Integer
c. Smallint d. Boolean
39.data types are used for storing photos, music files etc
a. Binary b. Alphanumeric
c. Numeric d. Special
40. Char is a ...................................... length data type and varchar is a ................................ length data type.
a. Fixed, Variable b. Variable, Fixed
c. Variable, Variable d. Fixed, Fixed
41. Which field is suitable for storing records of employees?
a. EmpNo b. Empname
c. Salary d. All of these
42. Auto Value is a property of ............................... data type.
a. Numeric b. Character
c. Binary d. Date
43. Which of the following property helps to set the number of characters in Varchar type?
a. Auto value b. Required
c. Default Value d. Length
44. Which property ensures that field cannot be left blank?
a. Entry required b. Format
c. Required Entry d. Required
45. By default, the length of the Integer data type is ......................................
a. 10 b. 15
c. 20 d. 25
46. Which of the following property to be turned “yes” so that value will be auto incremented?
a. Default b. Format
c. Auto value d. Length
47. Which of the following is not the binary data types?
a. Longvarbinary b. Varbinary
c. Binary d. Charbinary
48. Which of the following is not the date time data types?
a. Date b. Time
c. Datestamp d. Timestamp
49. Which data type is used to store value of fields like “Date of Birth”?
a. Date Time b. Varchar
c. Integer d. Other
50. A record in table is also known as Attribute.
a. True b. False
51. We can ............................... data in table.
a. modify b. insert
c. delete d. All of these
52. In which view data can be entered in table?
a. Datasheet view b. Design view
c. Both of the above d. None of these
53. In which mode we can change the structure of table?
a. Datasheet view b. Design view
c. Structure view d. All of these
54. After inserting records in table, we can not modify the structure of table.
a. True b. False
55. Sorting means to arrange data in ............................... order.
a. increasing b. decreasing
c. increasing or decreasing d. None of these
56. Referential Integrity is used to maintain accuracy and consistency of data in a relationship.
a. True b. False
57. In Base data can be linked between two or more tables with the help of ......................................
a. primary key b. foreign key
c. primary and foreign key d. None of these
58. Relationship can be created between
a. two tables only b. one table only
c. two or more tables d. None of these
59. Relationship between tables can be created from ............................... menu.
a. View b. Insert
c. Windows d. Tools
60. There are............................... types of relationship which can be created between tables.
a. three b. two
c. four d. infinite
61. Which language help to extract/fetch data from table?
a. MySQL b. Python
c. OOBase d. HTML
62. We can create query (in Open Office Base) in ...................................... .
a. In design view b. Using wizard
c. Both of the above d. None of these
63. Queries are commands that are used to define the structure and modify the data in a table.
a. True b. False
64. We cannot delete the data using queries.
a. True b. False
65. SQL stands for ......................................
a. Structural Query Language b. Structured Query Language
c. Skeletal Query Language d. None of these
66.statement is used to retrieve data from table.
a. Delete b. Update
c. Print d. Select
67.is the most common DML command.
a. Delete b. Update
c. Select d. All of these
68. DML stands for ......................................
a. Data Manipulation Language b. Database Manipulation Language
c. Data Modify Language d. None of these
69. Which of the following clause return specific rows?
a. Order By b. Where
c. Having d. Specific
70. Which of the following clause return records in ascending order?
a. Order By b. Where
c. Order Asc d. Order Inc
71. Command to display all the data in the table “emp” is.
a. Select * from emp b. Select * from emp;
c. Select all from emp d. Select all from emp;
72. Which command is used to create table?
a. Select b. Create
c. Open d. New
73. Shortcut to execute query in Create Query in SQL View is ......................................
a. F7 Key b. F5 Key
c. F8 Key d. F6 Key
74. Which command is used to display the salary of all the employees after incrementing by 1000?
a. Select b. Update
c. Modify d. Change
75. Select “salary” from emp;
a. will display all the records of table emp b. will display only particular columns of table emp;
c. will display only salary column of table emp; d. None of these
76. Select “empname”, “salary” * 3 from emp;
a. will increase the salary three times of all employees in table
b. display name and three times salary
c. give error
d. None of these
77. To get details about the list of students whose favourite colour is blue. Query for this is:
a. select all from Stud where fav_Color=’Blue’; b. select name from Stud where fav_Color=’Blue’;
c. select * from Stud where fav_Color=’Blue’; d. select all from Stud where fav_Color is ’Blue’;
78. select * from Stud order by “Rollno” ASC;
a. display all the records of table. b. display records in increasing order of roll number.
c. both of the above d. None of these
79. Which command is used to modify data in table?
a. delete b. select
c. modify d. update
80. Which command is used to delete data from table?
a. select b. delete
c. insert d. remove
81. Update statement is used to modify data in a table.
a. True b. False
82. Command to increase the salary of all employees by 15000. (Table name emp and column name sal)
a. update emp set sal = sal + 15000; b. update emp set sal = 15000;
c. update set sal = sal + 15000; d. None of these
83. By default, data is arranged in ............................... order using order by clause.
a. Ascending b. Descending
c. Primary Key d. None of these
84. Which of the following is DML commands?
a. Insert b. Update
c. Delete d. All of these
85. A ............................... provides a systematic way of storing information into the database.
a. Report b. Query
c. Form d. None of these
86. Which of the following act as an interface to view, enter and change data in database?
a. Report b. Table
c. Query d. Form
87. A ............................... helps to display the data in a summarized data.
a. Report b. Form
c. Query d. None of these
88. A ............................... helps to collect specific information from the pool of data.
a. Query b. Report
c. Form d. None of these
89. Which of the following is to be created first?
a. Report b. Query
c. Form d. Table
90. Which of the following field is invalid for storing information of “Library” Table?
a. Cost b. Booknumber
c. Authorname d. Dateofbirth
91. Which of the following is suitable to act as a primary key in table student?
a. Rollno b. Name
c. Class d. Section
92. A foreign key is a reference of the................................key in another table.
a. Alternate b. Primary
c. Candidate d. None of these
93. A table is a collection of logically related data.
a. True b. False
94.tables can be created in a database.
a. 1 b. 2
c. 3 d. More than 3
95. In primary key we can enter NULL values.
a. True b. False
96. Only numeric fields can act as a primary key in a table.
a. True b. False
97. Primary key increases data redundancy.
a. True b. False
98. In a table we can have only................................primary key.
a. 1 b. 2
c. 3 d. More than 3
99. A foreign key is a primary key in another table.
a. True b. False
100. Duplicate values can be entered in Foreign key.
a. True b. False

ANSWERS
1. a 2. a 3. c 4. a 5. c 6. b 7. c 8. c 9. a 10. b
11. b 12. a 13. c 14. b 15. d 16. c 17. b 18. d 19. d 20. b
21. a 22. b 23. d 24. b 25. a 26. a 27. b 28. d 29. c 30. a
31. a 32. d 33. b 34. a 35. a 36. d 37. d 38. a 39. a 40. a
41. d 42. a 43. d 44. a 45. a 46. c 47. d 48. c 49. a 50. b
51. d 52. a 53. b 54. b 55. c 56. a 57. c 58. c 59. d 60. a
61. a 62. c 63. a 64. b 65. a 66. d 67. d 68. a 69. b 70. a
71. a 72. b 73. b 74. a 75. c 76. b 77. c 78. b 79. d 80. b
81. a 82. a 83. a 84. d 85. c 86. d 87. a 88. a 89. d 90. d
91. a 92. b 93. a 94. d 95. b 96. b 97. b 98. a 99. a 100. a
Part–B: Subject Specific Skills
Unit–IV: Web Applications and Security

Key Points

 The ‘Accessibility’ options available in Windows have been designed to help the users who have difficulty in using
computers due to an impairment.
 Windows provides two features as alternatives for the common input devices, mouse and keyboard. These are Speech
Recognition and On-Screen Keyboard.
 Turning on Sticky Keys feature is useful for those who face difficulty in pressing more than one key at a time.
 Data communication means sending data electronically from one computer to another.
 A computer network may be defined as a group of two or more computer systems or peripheral devices, that are
connected together to exchange information and share resources among a wide range of users.
 A global interconnection of computer networks around the world is known as the internet.
 Instant Messaging (often called IM) refers to real-time communication with the user at the other end through an
application called the Instant Messenger.
 There are two types of Instant Messaging software — application-based and web-based.
 Application-based IMs are the application programs that can be easily downloaded and installed on the user's devices.
 Web-based IMs can be accessed using a browser application, such as Google Chrome, Internet Explorer, and so on.
 Google Hangouts is integrated within Gmail, that is why it can be used from Gmail as well.
 WhatsApp is the most popular instant messenger, widely used for sending text and voice messages, and making audio
and video calls.
 A blog is a combination of the words web and log. It is a frequently updated, online, personal journal or diary where
a person can log (write or post) information related to his interests or activities, express his ideas or opinions or share
his knowledge through writing.
 The person who writes a blog is called a Blogger. He can interact with the readers by answering their questions and
regularly updating the contents after the readers have given comments related to the page.
 Word Press is an online website/blog creation tool, which is versatile and simplest to use. It offers both paid and free
service.
 Blogs may contain text and pictures but videos and even audios can also be added to give more information.
 Offline blog editors are the application software that help you to easily write, edit, spell-check, and manage the content
of your blog without being connected to the Internet.
 Qumana is one of the best desktop-based blog editors.
 Buying and selling of goods and services by electronic means, combined with the power of the Internet is known as e-
commerce.
 Exchange of information on line is known as Electronic Data Interchange.
 Phishing is an act of sending an e-mail to a user; misleading him to believe that it is from a trusted person or
organisation.
 Email spoofing is one of the most common security threats that involves sending emails to the targeted recipients to
make them believe that these emails originate from trusted resources.
 Chat spoofing is quite similar to email spoofing. In chat spoofing, the spoofing happens when the target is engaged in
a chat process.
 To keep information safe, we must use strong passwords as combination of alphanumeric and special characters.
 A firewall is a software that can help in preventing unauthorised access to your computer by blocking unsolicited
communications.
 Fire is a very serious hazard at a workplace. It can cause major financial losses to a business and also result in a loss of
human lives.
 Slips, trips, and falls are common causes of injury at the workplace. They can be prevented with a better understanding
of their cause and methods to avoid them.
 Electrically-powered equipment can be a major hazard for workers, particularly when mishandled or not maintained.
 First aid is emergency care given immediately to an injured person, to minimise injury and future disability and in
serious cases to keep the affected person alive.
 An accident at a workplace is an unplanned, unintended, and unexpected incident, which can cause minor to severe
physical injury or even result in death.
 A workplace emergency is an unforeseen situation that threatens the employees, customers, or the public. It disrupts
the company’s operations and causes physical or environmental damage.
 A hazard is any agent that can cause harm or damage to human life, property, or the environment.
 A workplace hazard refers to a situation within the workplace that has the potential to cause injury or adverse health
effects for people and damage to the plant or equipment.
 The employers must advise their employees on evacuation procedures as a part of their training in order to minimise
the damage caused due to emergency situations.
 Encouraging employees to eat healthy and live actively is beneficial to them as well as employers in the long run.

A. Multiple Choice Questions.


1. A computer network allows sharing of resources and information.
a. True b. False
2. A computer network is a collection of 2 or................................ computers.
a. 5 b. 7
c. 9 d. More
3. P2P stands for:
a. Peer to Peer b. Pipe to pipe
c. Peer 2 Peer d. Pipe 2 Pipe
4. A computer who makes a request for services in Client Server Architecture is called ...................................... .
a. Server b. Client
d. Node d. None of these
5. A ............................... network is one which connects computers and devices in a limited geographical area such as home,
school etc.
a. PAN b. MAN
c. LAN d. WAN
6. Internet is an example of:
a. LAN b. WAN
c. MAN d. PAN
7. Computer Accessibility refers to the user friendliness of a computer system.
a. True b. False
8. A person with disability or impairment cannot use computer.
a. True b. False
9. Identify the cognitive impairment from the following.
a. Dyslexia b. ADHD
c. Autism d. All of these
10. Keyboard Accessibility options are useful for those who have:
a. Physical disabilities b. Vision impairment
c. Both a and b d. None of these
11.keys are used to reduce repetitive strain.
a. Filter b. Sticky
c. Toggle d. Control
12. Which of the following options allows us to press Ctrl key and 'A' key separately?
a. Filter keys b. Toggle keys
c. Sticky keys d. Mouse keys
13. Toggle Keys is designed for people who have ...................................... .
a. Vision Impairment b. Cognitive Disabilities
c. Both a and b d. None of these
14. Effect of toggle keys can be checked by pressing ............................... key.
a. Num Lock b. Caps Lock
c. Scroll Lock d. All of these
15. SoundSentry is designed to help users with ............................... impairments.
a. Physical b. Auditory
c. Visual d. None of these
16. The............................... is a global system of interconnected computer networks.
a. Internet b. Intranet
c. ARPANET d. None of these
17. A web page may contain A web page can be viewed with the help of ...................................... .
a. Web Browser b. Web server
c. Internet d. Protocol
18. Which of the following is not a web browser?
a. Mozilla Firefox b. Internet Explorer
c. Google Chrome d. None of these
19.is a computer that stores web sites and their related files for viewing on the Internet.
a. Web server b. Web Client
c. WWW d. Web
20. Dial up connection is the fastest internet connection.
a. True b. False
21. Which of the following files can be shared over network?
a. Text b. Sound
c. Spreadsheet d. All of these
22. WiMAX is a............................... technology.
a. Wired b. Wireless
c. Internet d. None of these
23. Which of the following technology is used for long distance?
a. Dial up b. DSL
c. Cable Internet Access d. WiMAX
24. Which of the following technology is used to provide free internet in hotels, malls etc. to their customers?
a. WiFi b. WiMAX
c. Dial up d. Cable Internet Access
25.converts the analog signals to digital and vice versa.
a. Switch b. Modem
c. Router d. None of these
26.is a form of communication over internet.
a. Email b. Video call
c. Instant messaging d. All of these
27.offers instantaneous transmission of text-based messages from sender to receiver.
a. Email b. Traditional post
c. Instant messaging d. All of these
28. For audio and Video chat users should have ...................................... .
a. Mike b. Speaker
c. Web Cam d. All of these
29. Key Features of an instant messaging are:
a. Text Messages can be sent to one or more person
b. Audio calling and conferencing
c. Video calling and conferencing
d. All of these
30. For using Google Talk, you should have account.
a. Gmail b. Skype
c. Yahoo d. None of these
31. Blogs are similar to an online ...................................... .
a. Book b. Notebook
c. Journal d. Diary
32. Websites that offer free blog services are:
a. www.WordPress.com b. www.blogger.com
c. www.blogsome.com d. All of these
33. We can use blogs to convey messages about ...................................... .
a. Events b. News
c. Reviews d. All of these
34. Blog address should be unique.
a. True b. False
35. The title of the blog comes at the ...................................... .
a. Top b. Bottom
c. Side d. None of these
36. Others can view the blog post only after publishing it.
a. True b. False
37. Online shopping is an example of ...................................... .
a. E-learning b. E-commerce
c. E-reservation d. All of these
38. Customers can pay online using ...................................... .
a. Credit card b. Debit card
c. Internet banking d. All of these
39. COD (in reference to online shopping) stands for ...................................... .
a. Catch on delivery b. Cash on delivery
c. Cash over delivery d. None of these
40. Which of the following are Online threats?
a. Phishing b. Email Spoofing
c. Chat spoofing d. All of these
41. Online threats can be reduced by using ...................................... .
a. Firewall b. Passwords
c. Antivirus d. All of these
42. Which of the following passwords is not easy to crack?
a. Name b. Date of birth
c. Mobile number d. Mix of digits and letters
43.could transmit every key pressed on a keyboard to unauthorized users.
a. Keypress b. Keylogger
c. Antivirus d. None of these
44. Cookies are............................... that are created on your local computer when you visit websites.
a. Text files b. Folders
c. Virus d. None of these
45. Firewalls could be a ...................................... .
a. Hardware b. Software
c. Both a and b d. None of these
46. Basic safety rules to follow at workplace includes:
a. Fire safety b. Falls and slips
c. Electrical safety d. All of these
47. Keep workplace a no-smoking zone is a basic rule of:
a. Fire Safety b. Falls and Slips
c. Electrical Safety d. First Aid
48. Which of the following are some of the measures to keep ourselves safe from electricity hazards and accidents?
a. Electrical equipment used should be of sub-standard quality
b. Workers should be trained to handle the electric equipment safely
c. Circuits should not be overloaded
d. Insulated tools and handling equipment must be used
49. Learning ............................... is the social and civic responsibility of every human being.
a. Computers b. First-aid
c. Handling electrical equipment d. None of these
50. Types of Occupational Hazards are:
a. Physical hazards b. Biological hazards
c. Ergonomic hazards d. All of these
51. Unfortunate incident that occurs unintentionally causing hazardous result or injury is called:
a. Emergency b. Hazard
c. Accident d. None of these
52. Any unexpected situation that needs immediate attention and action is called:
a. Accident b. Emergency
c. Occupational Hazard d. None of these
53. Source of any potential harm is called:
a. Emergency b. Accident
c. Hazard d. All of these
54.is the process of clearing a place in case of an emergency.
a. Buddy System b. Evacuation
c. Clearing d. Vacating
55. Healthy life style includes:
a. Healthy eating habits b. Sound sleep
c. Physical activities d. All of these

ANSWERS
1. a 2. d 3. a 4. b 5. c 6. b 7. a 8. b 9. d 10. c
11. b 12. c 13. c 14. d 15. b 16. a 17. a 18. d 19. a 20. b
21. d 22. b 23. d 24. a 25. b 26. d 27. c 28. d 29. d 30. a
31. d 32. d 33. d 34. a 35. a 36. a 37. b 38. d 39. b 40. d
41. d 42. d 43. b 44. a 45. c 46. d 47. a 48. a 49. b 50. d
51. c 52. b 53. c 54. b 55. d

You might also like