0% found this document useful (0 votes)
15 views5 pages

IT Phase II Funwork Worksheet 2 Key

The document contains the answer key for a worksheet in Information Technology, detailing answers to various questions related to computer science topics such as operating systems, data types in DBMS, internet threats, database languages, and password security. It includes specific answers to questions about forms, reports, primary keys, relationships in tables, and SQL commands. Additionally, it provides examples of creating tables and differentiating between forms and reports in databases.

Uploaded by

onepiecereal22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views5 pages

IT Phase II Funwork Worksheet 2 Key

The document contains the answer key for a worksheet in Information Technology, detailing answers to various questions related to computer science topics such as operating systems, data types in DBMS, internet threats, database languages, and password security. It includes specific answers to questions about forms, reports, primary keys, relationships in tables, and SQL commands. Additionally, it provides examples of creating tables and differentiating between forms and reports in databases.

Uploaded by

onepiecereal22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Department of Computer Science

Information Technology (IT-402)


FUNWORK WORKSHEET – II (PHASE -2)
ANSWER KEY
Q. No. Answer Q. No. Answer
1 a 15 a
2 d 16 b
3 d 17 a
4 d 18 d
5 b 19 b
6 d 20 c
7 b 21 c
8 b 22 d
9 c 23 a
10 c 24 a
11 a 25 d
12 c 26 a
13 c 27 b
14 a 28 a

Answer the following questions

1. What is an operating system? Give two examples.


A. An Operating System is the collection of programs that manages and controls the two major
components of a computer system, i.e., hardware and software. Computer hardware is of no
use if we do not install the essential operating system software in the computer.
Example: Microsoft Windows, Linux
2. Write any four numeric data types in DBMS.
A. Numeric data types consist of numbers. The numbers can be integer or real numbers on which
any type of arithmetic calculations can be performed. Different numeric data types are: Tiny
Integer, Small Integer, BigInt, Number, Decimal, Float, Real, Double.

1|Page
3. (a) Give examples of two Internet threats.
(b) Most of the time fire can be prevented using appropriate measures. Give any two
measures.
A. a) Malware and Spam & Phishing.
b) A key strategy to prevent fire is to remove one or more of heat, oxygen or fuel.
Two measure are: Always Have an Escape Plan.
Install Smoke Alarms in Your Place.
4. Explain two types of languages used for creating and manipulating the data in databases.
A. DDL/Data Definition Language/ Data Description Language: which work on the structure of
table and it consist of following statements: CREATE, ALTER, and DROP.
DML/Data Manipulation language: which work on the content of table and it consist of
following statements: INSERT, UPDATE, DELETE.
5. Explain the following with respect to Databases:
(a) Forms
(b) Reports
(c) Tables
A. (a) Forms: A form provides the user a systematic way of storing information into the database.
OR
It is an interface in a user specified layout that lets users to view, enter, and change data directly
in database objects such as tables.
(b) Reports: A report is used to generate the overall work outcome in a clear format
OR
Reports are used to display the selected data in a printable format
(c) Table: A table is a set of data elements (values) that is organized using a model of vertical
columns (which are identified by their name) and horizontal rows.
OR
A table is a combination of rows and columns.
6. Write any four rules which are to be followed for creating strong passwords.
A. Following are general rules to be followed for creating strong passwords:
 Keep the length of the password 12–14 characters if permitted.

2|Page
 Avoid keeping passwords based on repetition, dictionary words, letter or number
sequences, usernames, relative or pet names etc.
 Include numbers and symbols in passwords if allowed.
 Use capital/upper-case and small/lower-case letters.
 Avoid using the same password for multiple sites or purposes.
 Avoid using something that the public or workmates know you strongly like or dislike.
 Use random password generators if possible.
 Use a combination of alphanumeric and special characters
Example of a strong password: genXHd#@123$
7. What is a primary key?
A. A primary key is a unique value that identifies a row (tuple) in a table.
OR
A field (column/attribute) or set of fields (columns/attributes) which uniquely identifies rows
(tuples) in a table (relation) is called primary key.
8. Categorize the following commands as DDL and DML:
SELECT, ALTER, INSERT, DROP
A. DDL: ALTER, DROP
DML: SELECT, INSERT
9. Explain any two types of relationship that can be created in tables.
A. There are three types of relationships which can be created in tables:
1. ONE to ONE
2. ONE to MANY or MANY to ONE
3. MANY to MANY
One to One Relationship: In this relationship, both the tables must have primary key columns.
One to Many Relationship: In this relationship, one of the tables must have primary key
column. It signifies that one column of primary key table is associated with all the columns of
associated table.
Many to One Relationship: In this relationship, one of the tables must have primary key
column. It signifies that all the columns of primary key table are associated with one column of
associated table.

3|Page
Many to Many Relationship: In this relationship, no table has the primary key column. It
signifies that all the columns of primary key table are associated with all the columns of
associated table.
10. Identify any 2 column names/attributes and their data types from a given table : PLAYER
PID PNAME Runs GENDER DOB
P101 Raj 13000 M 10/04/2001
P102 Rahul 7000 M 2/02/1998
P103 Ram 12000 M 13/04/2001
P104 Ramesh 12500 M 17/03/2005

A. Column Names and their data types of the given table: Player
Columns Data Type
PID CHAR / VARCHAR / TEXT
Runs CHAR / VARCHAR / TEXT
Gender CHAR / VARCHAR / TEXT
Run INTEGER / INT / TINYINT / SMALLINT / MEDIUMINT /
BIGINT / NUMBER
DOB DATE / DATETIME
11. Define RDBMS.
A. The RDBMS (Relational Database Management System) is a software that handles/manages
relational databases.
OR
The RDBMS (Relational Database Management System) is a computerized record keeping
system or a software that enables us to create, store, modify and extract information from a
database.
12. What is the difference between form and reports?
A. (i) Form: A form provides the user a systematic way of collecting information for a database.
OR
It is an interface in a user specified layout that lets users view, enter and change data directly
in database objects such as tables.
(ii) Reports: A report helps to display the data in a summarized manner.
13. Explain RDBMS and Data Servers.
A. RDBMS (Relational Database Management System) is a database management system based
on the relational model. In an RDBMS, all data is represented in terms of tuples, grouped into
relations. Database server is a dedicated computer that actually holds the actual database and
runs only DBMS and related software.
4|Page
14. What is DDL? Mention any two DDL statements.
A. Data Definition Language (DDL) is a subset of SQL and a part of DBMS (Database Management
System). DDL consist of Commands to commands like CREATE, ALTER, TRUNCATE and DROP.
15. Explain forms and reports with respect to Databases.
A. Forms provides an interface to users to view, add, modify in both tables and queries.
Reports are presented forms used to present formatted summaries or lists of the data from
one or more tables or queries.
16. Create table employee
EMPID Char (4)
EMPNAME Varchar (15)
DESIGN Varchar (15)
SALARY Decimal
A. CREATE TABLE Employee (EMPID Char (4), EMPNAME Varchar (15), DESIGN Varchar (15),
SALARY Decimal);
17. Write SQL query to create the Table Flight with the following structure:
Field Type
FlightID Char (4)
FlightName Varchar(25)
Source Varchar(30)
Destination Varchar(30)
A. Create Table (FlightID Char (4), FlightName Varchar (25), Source Varchar(30), Destination
Varchar(30));

5|Page

You might also like