1 Mark Questionsf
1 Mark Questionsf
Identify the error in the following SQL query In SQL, name the command/clause that is used to What is the difference between where and Write a command to add new column marks in
which is expected to delete all rows of a table display the rows in descending order of a column. having in SQL. table ‘student’ data type int.
TEMP without deleting its structure and write the Ans Order By …… Desc Ans Where is used apply condition in query, Ans Alter table student add marks int(3)
correct one: where as having is used only with group.
DELETE TABLE TEMP;
Ans DELETE FROM TEMP; Write query to display the structure of table In SQL, what is the use of BETWEEN operator?
teacher. Ans The BETWEEN operator selects values within
In SQL, what is the error in following query : Write any two aggregate functions used in SQL. Ans describe teacher or desc teacher a given range
SELECT NAME, SAL, DESIGNATION WHERE Ans max(),min(),avg(),count()
DISCOUNT=NULL; In SQL, name the clause that is used to display In SQL, what is the use of IS NULL operator?
Ans SELECT NAME,SAL,DESIGNATION WHERE the tuples in ascending order of an attribute. Ans To check if the column has null value / no
DISCOUNT IS NULL; Ans Orderby value
Which of the following is a DML command? In SQL, write the query to display the list of Write any one aggregate function used in SQL. Which of the following is a DDL command?
a) SELECT b) Update databases. Ans SUM / AVG / COUNT / MAX / MIN a) SELECT b) ALTER
c) INSERT d) All Ans SHOW DATABASES’ c) INSERT d) UPDATE
Ans (d) All Ans (b) ALTER
Which of the following will suppress the entry of A non-key attribute, whose values are derived In SQL, write the query to display the list of tables Which of the following types of table constraints
duplicate value in a column? from primary key of some other table. stored in a database will prevent the entry of duplicate rows?
a) Unique b) Distinct a). Alternate Key b). Foreign Key Ans Show tables; a) check b) Distinct
c) Primary Key d) NOT NULL c). Primary Key d). Candidate Key c) Primary Key d) NULL
Ans (b) Distinct Ans (b) foreign Key Ans (c) Primary Key
Which is known as range operator in MySQL. If column “salary” of table “EMP” contains the Rearrange the following transmission media in
a) IN b) BETWEEN dataset {10000, 15000, 25000, 10000, 25000}, increasing order of data transfer rates.
c) IS d) DISTINCT what will be the output of following SQL UTP CAT - 5 , UTP CAT – 6, IR, Bluetooth, OFC
Ans (b) BETWEEN statement? Ans IR, Bluetooth, UTP CAT - 5, UTP CAT – 6, OFC
SELECT SUM(DISTINCT SALARY) FROM EMP;
a) 75000 b) 25000
c) 10000 d) 50000
Ans (d) 50000 Networking – 1 mark Questions
_______________ is a network device that Give one example of each – Guided media and
Which of the following functions is used to find Name the clause used in query to place the
connects dissimilar networks. Unguided media
the largest value from the given data in MySQL? condition on groups in MySQL?
Ans Gateway Ans Guided – Twisted pair, Coaxial Cable, Optical
a) MAX ( ) b) MAXIMUM ( ) Ans having
Fiber (any one)
c) LARGEST ( ) d) BIG ( )
Unguided – Radio waves, Satellite, Micro Waves
Ans (a) MAX()
(any one)
Write SQL statement to find total number of Write command to list the available databases in
records in table EMP? MySQL. Ravi received a mail from IRS department on __________ is a specific condition in a network
Ans count(*) Ans show databases clicking “Click –Here”, he was taken to a site when more data packets are coming to network
designed to imitate an official looking website, device than they can handle and process at a
In SQL, name of the keyword used to display In SQL, what is the use of ORDER BY clause ? such as IRS.gov. He uploaded some important time. Ans Network Congestion
unique values of an attribute. Ans To display the values in sorted order information on it
Ans DISTINCT Ans Phishing
Write the function used in SQL to display current Which of the following is a DML command? Name the protocol that is used to transfer file Raj is a social worker, one day he noticed
date a) CREATE b)ALTER c) INSERT d) DROP from one computer to another. someone is writing insulting or demeaning
Ans curdate() Ans (c) insert Ans FTP comments on his post. What kind of Cybercrime
Raj is facing?
In SQL, write the command / query to display the Which of the following type of column Ans Identity Theft
structure of table ‘emp’ stored in a database. constraints will allow the entry of unique and not
Ans desc emp null values in the column? Name the Transmission media which consists of Write the expanded form of GPRS?
a) Unique b) Distinct an inner copper core and a second conducting Ans General Packet Radio Service (GPRS)
c) Primary Key d) NULL outer sheath.
Ans (c) Primary Key Ans Co-axial cable
In SQL, name the clause that is used to display In SQL, what is the use of <> operator? Define Bandwidth? --------------describe the maximum data transfer
the unique values of an attribute of a table. Ans not equal to Ans a band of frequencies used for sending rate of a network or Internet connection.
Ans distinct electronic signals Ans Bandwidth
Write any two aggregate function used in SQL Which of the following is/ are DML command(s)? Mahesh wants to transfer data within a city at What is a Firewall in Computer Network?
Ans max/min/avg/sum/count(*) a) SELECT b) ALTER very high speed. Write the wired transmission A). The physical boundary of Network
c) DROP d) UPDATE medium and type of network. B). An operating System of Computer Network
Ans (a) select (d) update Ans Wired transmission medium – Optical fiber C). A system designed to prevent unauthorized
cable access
In SQL, write the query to display the list Which of the following types of table constraints Type of network – MAN. D). A web browsing Software
databases. will not prevent NULL entries in a table? Ans
Ans show databases a) Unique b) Distinct C). A system designed to prevent unauthorized
c) Primary Key d) NOT NULL access.
Ans (c) Primary Key
Which of the following is not done by cyber Name the wired transmission media which has a Ans Telephone line, Twisted Pair Cable, Coaxial
criminals? higher bandwidth. Ans Optical Fiber Cable, Fiber Optics
a) Unauthorized account access
b) Mass attack using Trojans as botnets State whether the following statements is True or Expand the term a). XML b). SMS
c) Report vulnerability in any system False. When two entities are communicating and
d) Email spoofing and spamming do not want a third party to listen, this situation Ans
Ans (c) Report vulnerability in any system is defined as secure communication. (a) XML-Extensible Markup Language
Name the network device that connects Arrange the following media in decreasing order Ans True (b) SMS–Short Messaging Service
dissimilar networks. of transmission rates.
Ans Gateway Twisted Pair Cables, Optical Fiber, Coaxial Cables. Name two web scripting languages Which of these is not an example of unguided
Ans VBScript, JavaScript, ASP, PHP, PERL and JSP media?
Ans Optical Fiber, Coaxial Cables, Twisted Pair (i) Optical Fibre Cable (ii) Radio wave
Cables (iii) Bluetooth (iv) Satellite
Ans Optical Fiber( guided media or wired media)
Name the protocol used for remote login. Website incharge KABIR of a school is handling
Ans TELNET downloading/uploading various files on school What is HTML? Name the protocol that is used to upload and
website. Write the name of the protocol which is Ans HTML (Hyper Text Markup Language) is used download files on internet.
being used in the above activity. to create Hypertext documents (web pages) for Ans FTP or HTTP
Ans FTP websites.
What is its use of Data encryption in a network Give the full form of the following: Your friend kaushal complaints that somebody Which is not a network topology?
communication? (a) URL (b) TDMA accessed his mobile device remotely and deleted a)BUS b). STAR
Ans Data encryption is the process of converting Ans the important files. Also he claims that the c). LAN d). RING
a message into an unmeaningful form. It is used (a) URL – Uniform Resource Locator password of his social media accounts were Ans (c) LAN
to ensure data security while communication. (b)TDMA – Time Division Multiple Access changed. What crime was Manoj a victim of? Also
classify the crime on basis of it’s intent (malicious
Differentiate between Bps & bps. Identify the Guided and Un-Guided Transmission / non-malicious).
Ans Bps is Byte per second and Media out of the following: Ans The gaining of unauthorized access to data in
bps is bits per second which tells the variation in Satellite, Twisted Pair Cable, Optical Fiber, Infra- a system or computer is termed as hacking. It can
data transmission speed. Red waves be classified in two ways: (i) Ethical Hacking
Ans Guided: Twisted Pair Cable, Optical Fiber (ii)Cracking
Unguided: Satellite, Infra-Red waves
Which of the following appears harmless but Name the protocol that is used to send emails.
Protocol is used to send email ………… Your friend Sunita complaints that somebody has actually performs malicious functions such as Ans SMTP
Ans SMTP (simple mail transfer protocol) created a fake profile on Twitter and defaming deleting or damaging files.
her character with abusive comments and (a) WORM (b)Virus
pictures. Identify the type of cybercrime for these (c) Trojan Horse (d)Malware
situations. Ans (c) Trojan Horse
Ans Identity Theft
Your friend Ranjana complaints that somebody Name The transmission media best suitable for
Name the transmission media best suitable for Write the expanded form of VPN. has created a fake profile on Facebook and connecting to hilly areas
connecting to desert areas. Ans Virtual Private Network defaming her character with abusive comments Ans microwave/radiowave
Ans microwave and pictures. Identify the type of cybercrime for
these situations.
Rearrange the following terms in increasing order What is Telnet? Ans Cyber Stalking / Identity theft
of speedy medium of data transfer. Ans Telnet is an internet utility that lets us log on
Telephone line, Fiber Optics, Coaxial Cable, to a remote computer system. A user is able to Write the expanded form of Wi-Fi. TCP/IP stands for-
Twisted Paired Cable log in the system for sharing of files without Ans Wireless-Fidelity Ans Transmission Control Protocol/Internet
being the actual user of that system Protocol
An attack that encrypts files in a computer and Write the name of topology in which all the
only gets decrypted after paying money to the nodes are connected through a single Coaxial
attacker. cable?
a) Botnet b) Trojan Ans BUS totplogy
c) Ransomware d) Spam
Ans (c) Ransomware
Name the protocol that is used for the transfer of In a Multi-National company Mr. A steals Mr. B’s
hypertext content over the web. intellectual work and representing it as A’s own
Ans HTTP work without citing the source of information,
which kind of act this activity be termed as?
Ans Plagiarism
Give at least two names for Guided and Unguided Write the expanded form of Wi-Fi and GSM
Transmission Media in networking. Ans
Ans Guided Media: Twisted pair Cable, Coaxial WiFi : Wireless Fidelity
Cable , Fiber Optic Cable GSM : Global System for Mobile Communication
Unguided Media: Microwave / Radio wave ,
Infrared, Satellite
Rearrange the following terms in increasing order Name the protocol that is used to transfer files.
of data transfer rates. Ans FTP
Gbps, Mbps, Tbps, Kbps, bps
Your friend’s mother receives an e-mail to access Name the fastest available transmission media.
the additional services of bank at zero cost from Ans Optical Fibre cable( OFC)
some agency asking her to fill her bank details
like credit card number and PIN in the form
attached to the mail. Identify the type of
cybercrime in this situation
Ans phishing
Ans
Local Area Network .
Metropolitan Area Network