0% found this document useful (0 votes)
33 views2 pages

Selection For 2026

The document outlines expected questions for the CHSE 2025 examination, categorized into sections for 7 marks, 3 marks, and 2 marks. It covers a wide range of topics including computer networks, internet applications, cybercrime, Java programming, HTML, and database management systems. Additionally, it highlights important and less probable questions for students to focus on.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views2 pages

Selection For 2026

The document outlines expected questions for the CHSE 2025 examination, categorized into sections for 7 marks, 3 marks, and 2 marks. It covers a wide range of topics including computer networks, internet applications, cybercrime, Java programming, HTML, and database management systems. Additionally, it highlights important and less probable questions for students to focus on.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 2

EXPEXTED QUESTIONS FOR CHSE 2025

7 MARKS

is computer network ?Discuss various types of network?


2. Discuss Different types of network Topology With Advantage and Disadvantage?
3. What is communication media. Discuss about Wire technologies briefly?
4. Discuss different types of Internet connection(Dlalup. Broadband and Direct connection).
5. What is Internet? Write the role of Internet backbone?
G. Explain Different types of Internet application?( Webpage ,Website ,Web browser, search
engine)?
What is IP Address ?Discuss Different Types of IP Address?
7,

S. What do you mean by cyber crime .Explain different types of cybercrimes?


9. What is network Threats. Discuss different types of network threats?
10. What is Inheritance. Discuss different types of Inheritance in Java?
11, What is Access Modifier and Discuss Different types of Access modifier.
12. Explain Different Types of Library Function in java(String class and Math class)?
13. What is HTML? Write down Different Types of Tag in HTML?
14. What is DBMS? What advantages/Characteristics /Features and disadvantages of DBMS?
15. Explain the functions and use of aggregate functions in MySQL?
16. What is SQL commands? What are the different typos of SQL commands?/Database Operation?
17. Explain different types of constraints used in MySQL?
1S. What is RDBMS?Write thefunction and use of string function and mathematical function in MySQL
19. Define the Date and Time functions with an examples in MySQL.
20. What are social impact and challenges of E-commerce/E-BUSINESS? j
21. What is E-commerce ? Describe the different types of e-commerce ?
VERY VERY IMPORTANT: 1,2,3,4,9,10,11,15,16,21
LES POSSIBLE QUESTIONS:5,6,7,8,12,12,17,20

3 MARKS
DIFFERENCE
1. UTP AND STP
16. Give an Example of paragraph(p), Line
2. FTP and TELNET
break(BR),Section separator(HR).
3. Encryption and Decryption
17. Difference between DBMS and RDBMS
4. lnternet and Intranet 18. SQL and MySQL
:5.Bluetooth and Infrared 19 WHERE and HAVING
I
I

6.Webbrowser and search engine 20. Primary key and Foreign key
7.3G and 4G communication 21. Order By and Group By
3.LCASE() and UCASE() 22. COMMENT and ROLLBACK
9.JDBC AND ODBC 23.E- Business and E-commerce
10. Website and Webpage 24 828 and B2C
11 Simplex ,half duplex ,Fullduplex 25. . Front -End Interface and Back -End
Interface
.
12. How to create table in HTML explain with
an example?
26. CLI and GUI
27. HTML and XML
13. How to create form in HTML explain with
28. HTML and DHTML
an example?
29. Different Network }]
14. Explain about wireless mobile
Device(HUB,SWITCH,ROUTER,REPEATER, BRID
communication(GSM,CDMA,3G,4G) GE,GATEWAY). •
30. Netwotk protocol(HTTP,TELNET,TCP/IP)
15. What is Snooping and Spooling
31- IP cud DA¢
tlhcund stoitcb
I

PREPARED BY--JYOTI SEKHAR PANDA(IT)(7381241189) 32.


23.Giudl «rd Unauded
u
2MARKS 40. Worm
1 Bus topology 41, Trojan Horse
S I
. Ring Topology 42. poofing
2. Mesh topology 43. Snooping
3. Router device 44. What is HTML?
4. Gateway device 45. Tag and Attribute
5. WAN
6. 46. Different Heading Tag
,. MAN 47. Order list and unorder list
8. LAN 48,How to Insert imago
9. IP address 49, How Hyperlinks inserted In the html web 1
10. MAC address page?
11. Inheritance 50. What is marquee in html?
12. What is String class? 51. Different common clement
13. Search engine 52. What is JDBC and OD8C
II 14. TCP/IP 53. Why java does not support
15. WW multiple inheritance?
16. Web browser 54. Is string is immutable in java?
17. SMS 55. Static variable
18. Voice mail 56. Local variable
19. IRC 57. Instance variable
20. CDMA 58. What is Data Independence?
21. WLL 59. Whal do you mean by
22. Gopher Referential Integrity?
23. Modem 60. Use of SELECT statement in SOL.
61. What is UNION clause in SOL?
24. Telnet 62. What is Join?
25. FTP 63. What is Inner join?
26. Synchronous Transmission 64. What is Outer join?
27. Asynchronous Transmission 65. What is Self join?
28. Backbone of Internet 66. What is Cross Join?
29. DSL 67. What is Database Connectivity?
30. Cryptography 68. What is SOL and MySQL?
31. Eavesdropping 69. What are the features of SOL and
32. Online fraud MySQL? I
33. Cybercrime 70. What are the benefits of Database [
34. Internet Threats · Connectivity? ;
35. Firewall 71. What are the components of E-R Model?
36. Broadband 72. What is EFT 2
37. Phishing 73. What is EDI?
38. Vishing 74. What is Smart card?
39. Virus 75. What is Online Transaction?

�MP ABBREVIATION: TELNET, WAIS, SNMP, MAC, VIRUS, WLL, ARPANET, IRC, ODBC, XML, CU, JVM, I
FDMA, DNS, EDGE, Wi-Fi, BIOS. VPN, TOMA, OSI, ISO, USB, DBA,MAN,PAN, WAIS, RDBMS,
B2C,TCPIIP,DHTML,DBMS,HTTP,GUI,HTML,PSTN,DML,IDE, KYC, FDDI, MODEM

BEST OF LUCK

!PREPARED BY--JYOTI SEKHAR PANDA(IT)(7381241189)

You might also like