Computer science
Class : 11th
Term 2 revision of
1-1 marks, 4-4 marks and 6-6 marks questions

    Multiple choice questions(1-1 Marks)

    1. We can locate a job on _____.

    A) Newspaper   b) Internet          c) Both a and b             d) None of these

    2. The collection of information which is accessed via the internet.

    A) Data                b) Information  c) World wide web        d) Web

    3. These searches are useful when we don’t know the full text of a quote.

    A) Wildcards     b) Operators       c) Image                         d) News

    4. It is a photo and video sharing social media app.

    A) Facebook      b) Instagram      c) Both a and b d) None of these

    5. It is the most popular product of Google.

    A) bing.com       b) google.com  c) Wikipedia.com            d) yahoo.com

    6. Cyber word is taken among which of three?.

    a)        Cybercrime        b) Cybernetic     c) Cyber attack d) Cyber security

    7. Copying and selling of software or any computer-based material is known as:

    a) Phishing         b) Stalking          c) Piracy               d) Hacking

    8. A malware which acts like a spy in computer system.

    a) Spyware         b) Computer-virus          c) Adware           d) Ransomware

    9. Which type of security technique which converts password to special sign?

    a)        Strong password            b) Firewall          c) Digital signature         d) Encryption

    10. IT act 2000 is known by which another name?

    a)        IT act 2008         b) ITA 2000        c) Information set          d) Income tax act

    11. An electronic environment in which internet users communicate with each other?

    a)        World wide web              b) Internet          c) Cyber space                d) Cyber cafe

    12.         is a process by which a computer program is altered or updated after it has been released.

    a. Software Maintenance            b. Hardware Maintenance   c. Corrective Maintenance               d. Preventive Maintenance

    13. In computing,          is the process of starting a computer.

    a. Safe mode                    b. Booting          c.Starting            d. Login

    14. Which of the following is not a type of computer port?

    a. Ethernet         b. PS/2 Port                      c. VGA                 d. Printer

    15. _____ security tool is built into the latest versions of Windows and helps guard our PC against viruses and other malware.

    a. Antivirus        b. Malware                        c. Windows Defender    d. Defragmenter

    16. ______ is a software which acts as an interface between the end user and computer hardware.

    a. Windows Defender                   b. File Compression Utility         c. Operating system               d.Security Tools

    17. Set of instructions is called_________.

    a. Group             b. Software                       c. Program                        d. None of these

    18. Which language is directly understood by computer without any translation?

    a. Procedure Oriented Language            b. Machine Language                  c. Assembly Language                          d. High Level Language

    19. Mnemonic codes & symbolic addresses are used in which programming language?

    a. Object Oriented Language                   b. Non-Procedural Language

    c. Assembly Language                               d. Machine Language

    20. Which translator does not save object code after translation of source program written in high level language?

    a. Translator                     b. Compiler        c. Assembler     d. Interpreter

    21. Process of finding and correcting errors in a program is called               

    a. Compilation                 b. Coding            c. Debugging     d. Documentation

    22. C is a _______ purpose programming language.

    a. special           b. general           c. objective        d. None of these

    23. Which of the following is not a valid example of identifier?

    a. roll_no            b. %age_marks               c. rollno       d. main

    24. Which of the followings are the tokens?

    a. keywords       b. special symbols          c. Literals     d. All of these

    25. Which of the following keywords do not represent a data type?

    a. int                    b. float                 c. const               d. char

    26. ______ are used to describe a code in the program?

    a. Compiler        b. Comments                   c. Literals                          d. Identifiers

    27. The symbols which are used to perform some specific type of operation on data are called?

    a. Operands      b. Operators                     c. Expressions                 d. Formulas

    28. Which operator acts only on one operand?

    a. Unary              b. Binary                            c. Ternary                           d. Conditional

    29. Which of the following is not a Logical Operator?

    a. And (&&)        b. OR (||)                            c. Equality (==)                d. NOT (!)

    30. Which symbol is used for Ternary Operator?

    a. : ?                     b. ; ?                                    c. ?  :                                   d. ? ;

    31. Which of the following cannot be considered as assignment operator?

    a. =                       b. ==                                   c. +=                                    d. %=

    Fill in the blanks(1-1 Marks)

    1. For creating website clean and fresh ______ should be prioritized.

    Answer:- Design

    2. It has been learned from a research that ordinary users scan webpages (computer screens) in ____ pattern.

    Answer:- “F” Pattern

    3. HTML is used to organize text, images, and other webpage’s ______ into webpages.

    Answer:- Elements

    4. By using ______ the design of websites and webpages can be designed in a very simple and effective way..

    Answer:- Cascading Style Sheets

    5. ________ helps to select and set html elements.

    Answer:- Selector

    6. _____ allows us to view and access websites on the internet.

    Answer: - Web Browser

    7. Action or activity of buying goods or services over the internet is known as ________.

    Answer: - Online Shopping

    8. ______ is a web-based tool that enables users to locate information on the world wide web.

    Answer: Search Engine

    9. Enclosing a search term within ______ prompts the search engine to search for that specific word or phrase.

    Answer: Quotation Marks

    10. Without a subscription with _____, we won’t have a connection to the internet.

    Answer: Internet Service Provider

    11. _____ corrupt the computer system.

    Answer: - Malware

    12. ________ is a digital code which is used to Transmit or verify documents online..

    Answer: - Digital Signature

    13. Antivirus software keeps our computer safe from _________.

    Answer: Virus

    14. ________ acts as secure wall in the computer system.

    Answer: - Firewall

    15. Any unauthorized person alters the website with the use of _________.

    Answer: - Cyber Attack

    16. URL’s of servers connected with internet are stored at _________.

    Answer: World Wide Web

    17.          is the process of inspecting hardware on a regular basis to ensure it stays in good running order.

    Answer:- Preventive Maintenance

    18. A _______ is software that a device uses to work with our PC.

    Answer:- Device Driver

    19. A ______ is a physical docking point using which an external device can be connected to the computer.

    Answer:- Port

    20. A ________ is the combination of typeface and other qualities, such as size, pitch, and spacing.

    Answer:- Font

    21. Using ______, we can end our Windows session, save our stuff, and quit programs, but Windows remains on and ready for other people to use the computer.

    Answer:- Log Off

    22. A person who writes the program is called           

    Answer:- Programmer

    23. Low level internal details of hardware are required for programming in              .

    Answer:- Low Level

    24. ______ is the pictorial representation of algorithm

    Answer:- Flow chart

    25. Process of translating source program written in high level language into object code is called                .

    Answer:- Compilation

    26. Those errors which are not detected by the compilers are called            errors.

    Answer:- Logical Errors

    27. __________ are the smallest individual units of a program.

    Answer:- Tokens

    28. The names given to program elements, such as variables, constants, arrays, functions etc. is called ______.

    Answer:- Identifier

    29. Those program elements which do not allow changing their value during execution are called ________.

    Answer:- Constant

    30. To work with single precision values, we use       data type.

    Answer:- Float

    31. File extension of header files is   

    Answer:- .h

    32. ______ are the data items on which operators can perform operations.

    Answer:- Operands

    33. Unary operator acts on only _______ operand.

    Answer:- One

    34. _______ arithmetic operator performs only on integer operands.

    Answer:- Modulus(%)

    35. When value of one type is converted into some other type, it is called .

    Answer:- Type Conversion

    36. Ternary operator is also known as________.

    Answer:- Conditional

    Very short answer type questions(1-1Marks)

    1. Write the full name of W3C?

    Answer:- World Wide Web Consortium

    2. Write the full name of CSS?

    Answer:- Cascading Style Sheets

    3. What is the extension of the external CSS file?

    Answer:- .css

    4. In Which tag INTERNAL.CSS is defined in the HTML Webpage?

    Answer:- <link>

    5. Write the full name of WYSIWYG?

    Answer:- What You See Is What You Get.

    6. A company that provides internet connections and services to individuals and organizations is known as _________?.

    Answer: - Internet Service Provider

    7. What is the full form of HTTPS?

    Answer: - Hyper Text Transfer Protocol Over Secure Socket Layer

    8. Which tool is used to search only for job?

    Answer: Job search engine

    9. What is the method of saving a web page’s address called?

    Answer: Bookmarks

    10. Name any one free, open content online encyclopedia?

    Answer: Wikipedia.com

    11: When first IT act comes into?

    Answer:- 17th October, 2000

    12: Name any two antiviruses?

    Answer:- AVG, Avira, Avast, Quick heal

    13: Write full form of CERT-IN?

    Answer:- Indian Computer Emergency Response Team

    14: Write the complete form of ITA-2000?

    Answer:- Information Technology Act 2000

    15:- Related information of a particular item may be treated as?

    Ans: Record

    16: The Collection of Files or Tables is known as?

    Ans: Database

    17: DBMS stands for?

    Ans: Database Management System

    18: Who are the group of people who actually work on the designing part of the database?

    Ans: Designer

    19: Who maintains the DBMS and are responsible for administrating the database?

    Ans: Database Administrator (DBA)

    20: Which operator causes its operand to be increased by one?

    Ans: Increment (++) Operator

    21: Which operators are used to test the relationship between two variables?

    Ans: Relational Operators

    22: Write all the Arithmetic Operators used in C programming?

    Ans: +, -, *, /, %

    23: Which operator returns the size of its operand, in bytes?

    Ans: sizeof( )

    24: Write the name of two ways of type conversion?

    Ans: Implicit and Explicit

    25: How many relational operators are present in C Language?

    Ans: 6 (Six)

    Write full forms(1-1marks)

    1. PnP                      :              Plug and Play
    2. USB                      :              Universal Serial Bus
    3. VGA                     :              Video Graphics Adapter
    4. UAC                     :              User Account Control
    5. OS                        :              Operating System
    6. NAP                     :              Network Access Protection
    7. Opcode                :              Operation code
    8. Operand              :              Operation Address
    9. 4GL                      :              Fourth Generation Language
    10. SQL                      :              Structured Query Language
    11. OOP                     :              Object Oriented Programming
    12. FORTRAN          :              Formula Translation
    13. BCPL                   :              Basic Combined Programming Language
    14. IDE                      :              Integrated Development Environment
    15. Stdio.h                 :              Standard Input Output Header file
    16. Conio.h                :              Console Input Output Header File
    17. ASCII                  :              American Standard Code for Information Interchange

    Write True or False(1-1marks)

    1. Collection of related record of Number of different students can be treated as Database.(False)
    2. The database is used to retrieve, insert and delete the data efficiently. (True)
    3. DBMS is a computerized record keeping system. (True)
    4. Database management system is Hardware. (False)
    5. Database management system is used to manage the database. (True)

    Short answer type questions(4-4marks)

    Question:1. Write the basic structure of HTML?

    Ans: HTML document begins from <HTML> tag and ends with </HTML> tag. Structure of HTML document can be divided into two main parts:

    1. Head Part: This part begins with <HEAD> tag and ends with </HEAD> tag. This part contains the title and metadata of the HTML document.
    2. Body Part: This part begins with <BODY> tag and ends with </BODY> tag. This part contains all those contents that are displayed on the web page.

    Question:2. Write various Website Development Phases.

    Ans: Following can be the various phases of website development:

    1. Information Gathering
    2. Planning
    3. Design
    4. Development
    5. Testing & Delivery
    6. Maintenance

    Question:3. Write the role of HTML in the WEB.

    Ans: HTML plays an important role in web designing. Web would not be possible without HTML. HTML is the default language for designing websites. HTML code is used to design static webpages. This code is understood by the web browser. Web browsers make the HTML code viewable and display it on our computer screen.

    Question:4. What CSS is used for?

    Ans: CSS stands for Cascading Style Sheets. It is a simple web designing language which is used to make web page-design simple and effective. In simple words, we can say that it is a language to design web pages which is used to improve the look & feel of a web page. CSS is easy to learn and understand. It is commonly used to build websites with html.

    Question:5 Define Web browser?

    Ans: Web Browser is an application software. We can easily access the websites over the internet with the help of web browsers. It helps user to find web pages, to access them and to display them on screen. For using websites, users have to provide the URL (Uniform Resource Locator) of sites in the address bar of the browser. Internet Explorer, Google Chrome, Firefox, Opera etc. are the examples of commonly used web browsers.

    Question:6 What is the use of quotation marks in online search?

    Ans: During online search, when we enclose the search term in quotation marks, the search engine will find only that particular term or phrase on the web and will not show the similar terms in the search result. For example: if we begin our online search by typing the term movie director, the search engine may show a lot of results similar to ‘movie’, ‘director’, ‘movie director’ or ‘film director’ etc. But if we begin our search by enclosing the search term in quotation marks (i.e. "movie director"), search engine will show results only related to that particular term ‘movie director’.

    Question:7 Name any five Internet Security Threats.

    Ans: Following are the common internet security threats:

    1. Hackers
    2. Viruses
    3. Spyware
    4. Worms
    5. Phishing
    6. Spamming

    Question:8 Explain Google Search Engine.

    Ans: Google search engine is the best search engine in the world. It is one of the most popular products of Google. Google has become one of the most popular and trusted search engines in terms of quality of search results. Google is using a sophisticated algorithm to deliver the best results to its users. Google is founded by Larry Page and Sergey Brin.

    Question:9 What is Bookmark?

    Ans: Bookmarks are also known as Favorites. Web addresses can be saved with the help of bookmarks so that whenever we have to open that web address again we can quickly re-open it without having to type it again. All web browsers offer the option to save the web address. Internet Explorer is the only web browser that uses the word Favorites to save a web address. In Mozilla Firefox, Google Chrome, etc. this option is called Bookmark. To set a bookmark, click on Star in the web browser's address bar.

    Question:10 Define World Wide Web?

    Ans: The World Wide Web (WWW) is also known as the Web or W3. It is a huge collection of different types of information. It includes all public web sites that are connected to the Internet worldwide. Each website/page is assigned a unique name/address, called a URL (Uniform Resource Locator). Information stored on the www can be viewed with the help of web browsers (Internet Explorer, Mozilla Firefox, etc.). World Wide Web uses HTTP protocols to transfer the contents of webpages.

    Question11: Explain the Application Areas of DBMS?

    Ans: Some of the DBMS application areas are listed below:

    1. DBMS is used to store student records in educational institutions.
    2. DBMS is used to store bank customer information.
    3. DBMS is used to store call records, monthly bills etc. information in the telecommunications sector.
    4. DBMS is used to track the production and supply of goods in the manufacturing sector.
    5. DBMS is used to store reservations and schedule information in the Tours and travel industry.

    Question12: Define about DBMS Working?

    Ans: DBMS stands for Database Management System. It is basically a computerized record keeping system. A DBMS stores data in a way that makes it easy to retrieve information, modify data, and create information. A DBMS has many different types of users and each user can have different rights to perform different types operations on the database. These different users use the database for different purposes. For example: some users retrieve data and some takes its backup.

    Question13: What do you mean by End User?

    Ans: A DBMS has many different types of users and each user can have different rights to perform different types operations on the database. END USERS is a type of DBMS user. It includes those users who actually benefit from DBMS. End users can range from general audiences to intelligent users like business analysts.

    Question14: Define the 2-tier DBMS architecture in DBMS?

    Ans: DBMS has different types of architectures: such as 1-tier architecture, 2-tier architecture, 3-tier architecture, etc. DBMS's 2-tier architecture incorporates an application layer between users and DBMS. This layer is responsible for forwarding the user's request to the Database Management System and then transmits the response from the DBMS to the user.

    Question15: What is Cloud database?

    Ans: A cloud database is a database that typically runs on a cloud computing platform. Internet is used to access cloud databases. Cloud Database Services can be accessed in two ways:

    1. In the first method, an organization purchases virtual machine space from a cloud service provider, and stores the database on the cloud. IT staff is used by the organization to control the database. In this system, the organization is responsible for monitoring and managing the database.
    2. In the second method, the organization makes a subscription-based agreement with the cloud service provider. The database is stored on the cloud server, but the cloud service provider allows the database to be used as a service (Database as a service-DBaaS).

    Question16: Why C is called Middle Level Programming Language?

    Ans: C has the functionality of both types of programming languages, i.e. low-level and high-level programming languages. It means C language is suitable for writing both types of programs - system programs and application programs. Thus C-Language became a programming language that stood between both low-level and high-level programming languages. That is why C language is called middle level language. However, the middle level language is not a special category of programming languages. Because of the special capabilities of the C language, it is known as a middle level programming language.

    Question17: What is a character set?

    Ans: The set of all characters and symbols used in the C language is called the character set of C language. The C language supports the ASCII character set.

    The following characters and symbols can be used in C language:

    1. Upper-case and Lower-case Alphabets (A to Z, a to z)
    2. Digits (0 to 9)
    3. Special Symbols, For Example: ! @ # $ % ^ . ? / | \ etc.
    4. Some Non-printable characters, For example: new-line, horizontal-tab etc.

    Question18: What are keywords?

    Ans: Keywords are also called Reserve Words. These words are predefined in C compiler. The meaning of these words is predefined. They are used for the specific purpose for which they were defined. We cannot change their meaning. In Turbo C these words are shown in white color while in Code::Blocks these words are shown in blue color. The standard C language has 32 keywords. For example: int, float, void, if, else, for, while etc. In C programming, all keywords are written in lowercase letters only.

    Question19: What should be the steps for creating and executing C program?

    Ans: The following steps can be used to create a C language program:

    1. Develop a program algorithm.
    2. Create a C program as per the algorithm using any text editor or IDE that supports C language.
    3. Save the file by writing a file name with .c extension.
    4. Compile the program.
    5. If the program has a syntax error, correct it and repeat step 4.
    6. Execute the program.
    7. Output of program will appear in the output window.

    Question20: Write the difference between variables and constants.

    Ans: Both of these are important program elements that are used to store a value in a program. Both elements are given a name in the program and the type of value to be stored in them. But there is a slight difference between the two. Variables allow us to change their values while running a program whereas constants do not allow it. It means constant values are fixed while variable values are changeable.

    Question21: What are Pre-processor directives?

    Ans: Pre-processor instructions are those statements that begin with the # symbol. These statements give instructions to the compiler to perform some specific operations before compilation. These directive statements are commonly used to include header files in the program or to define symbolic constants.

    Here are some examples of commonly used pre-processors:

    #include <stdio.h>

    #define PI 3.14

    Question22: Define Expression?

    Ans: Expression is like a formula in mathematics. An expression can be any valid combination of operators and operands. A valid combination is a combination that confirms the syntax rules of the C language. Expression always returns some value after evaluation. For example: x = y * z;

    Question23: What is Operand?

    Ans: Operands are data items on which operators can work. These operands can be variables or constant values. For example:

    a + 5 * 10

    In this example, operators + and * are doing their work on variable ‘a’, constant values 5 and 10. Here, ‘a’, 5 and 10 are the operands.

    Question24: What is Unary operator?

    Ans: Operators that require only one operand to perform their operations are called Unary Operators. For example: ++, --, ! and ~ operators etc. The following example uses increment (++) Unary Operator:

    int x = 10;

    ++ x;

    Here, ++ increment operator is a unary operator that performs its operation at only single operand

    This operator will increase the value of x by one unit and make its value 11.

    Question25: Define Conditional operator?

    Ans: Conditional operator is also known as Ternary Operator. This operator requires three operands to perform its operation. Symbols ? : are used to represent Conditional/Ternary operator. The syntax for using this operator is as follows:

    Exp1? Exp2 : Exp3;

    Exp1 should be a conditional expression that always returns a true (1) or false (0) result. If the result of Exp1 is true then Exp2 will perform its function otherwise Exp3 will perform its function.

    Question26: What is Type Conversion?

    Ans: In C language, the value of an expression can be changed to a specific type of data type as required. When one type of value is converted to another type of value, it is called Type Conversion.

    In C language, this conversion can be done in two ways:

    1. Implicit Conversion
    2. Explicit Conversion

    Question27: What is an operator? Write the name of different types of operators?

    Ans: Operators are the symbols that are used to perform specific operations on data. For example: We use + symbol to perform addition operation, * symbol is used to multiply, > symbol is used to compare etc. In these examples, +, *, > symbols (operators) are used that represents various types of operations. All operators return a value after performing their operation. Operators can be divided into the following three types:

    1. Unary Operators
    2. Binary Operators
    3. Ternary Operators

    Question28: Write about increment and decrement operators?

    Ans: The increment and decrement operators are the unary operators. The ++ sign is used for the increment operator and the -- sign is used for the decrement operator. The increment operator (++) increases the value of its operand by one while the decrement operator (--) decreases the value of its operand by one. The operand used with these operators must be a variable. They cannot be applied directly to a fixed value.

    for example:

    int x = 10;

    ++ x;      It will increase the value of x to 11.

    --x;         It will decrease the value of x (10) to 9.

    Long answer type questions(6-6marks)

    Question 1: Explain any four online search techniques?

    Answer: When we search for any information online using search engines, we can make our search more effective by using some search techniques.

    Some of the main search techniques are given below:-

    1. Using some specific keywords:- Keywords are the words that we use to find content on the internet. Keep the keywords as specific as possible. This helps Google to find the information we need.

    2. By simplifying the search terms:- Some engines include “stop words” for searching. These are commonly used words like prepositions (in, of, on), conjunctions(and, but) and articles(a, an, the), which means that we will get more pages than we need in the search results.

    3. Using quotation marks:- When we type in a search term in an online search, the search engine will search the web for that specific term or phrase only and will not show similar terms in the search results.

    4. Removing unnecessary words:- By putting a hyphen (-) or a short dash or a minus sign before a word, that word is excluded from the search.

    5. Using operators:- Wildcard search Use the * symbol as a placeholder for something we do not know. Wildcard searches are useful when we do not know the full text of the quote.

    Question 2: What are the advantages and disadvantages of online shopping?

    Answer: Advantages of online shopping:-

    1. Convenience
    2. Better prices
    3. More variety
    4. Easier to send gifts
    5. More control
    6. Easier to compare prices
    7. No crowds

    Disadvantages of online shopping:-

    1. Negative environmental impact of packaging
    2. Shipping difficulties and delays
    3. Risk of fraud
    4. Less contact with our community
    5. Spending too much time online
    6. Returns can be complicated
    7. We don't know exactly what we are getting

    Question 3: What is social networking? Tell us about any two social networking sites?

    Answer: Social networking allows us to stay connected with friends, family, colleagues or customers through internet-based social media sites. Social networking websites are also being used for business purposes these days. Social media helps people to build better relationships with their family and friends. This is the reason why people spend a lot of their time browsing social sites online and smartphones and tablets etc. have further increased this.

    1. Facebook:- Facebook is the largest social media site. Many people use it for social and business purposes. On Facebook, we can share our content with everyone in different formats such as text, images, videos, and stories.

    2. YouTube:- YouTube is a video sharing platform. On YouTube, we can create a YouTube channel for ourselves where we can create and upload videos. People who watch videos are able to like, share, and comment on our videos.

    Question 4: How can we identify secure websites? Also explain the padlock symbol?

    Answer: Not every website on the internet is reliable and secure. An unsecure website can install programs on our computer without our permission, interfere with its functioning, steal information, etc.

    Two ways to identify a secure website are as follows:-

    1. Look at the web address of the web browser, that this web address starts with the name HTTPS://. In this, HTTPS encrypts the information given by the user and decrypts the information from the server side.

    2. Look for a closed padlock in the web browser.

    Padlock symbol:- A green padlock symbol indicates that we are definitely connected to the website whose address is shown in the address bar. This connection is encrypted to prevent spying between the browser and the website.

    Question 5: What is FASTag in travel? What are its benefits?

    Answer: FASTag is a tag through which the payment of toll charges is done automatically at toll plazas. Using it, we can pass through the toll plaza without stopping for cash transactions. FASTag is linked to a prepaid account, from which the toll amount is deducted automatically. FASTag uses the RADIUS (Radio Frequency Identification) technology, and the tag is pasted on the windscreen of the vehicle after the account is activated.

    Benefits of using FASTag:-

    1. Validity:- The validity of the FASTag card is five years.

    2. Payment absorption:- The toll amount is deducted automatically from the prepaid account of FASTag without stopping, for which there is no need to carry cash for toll transactions.

    3. Online recharge:- FASTag can be recharged online through credit card/debit card/credit card/debit/credit card or net banking.

    4. Message alert:- While going to and from toll plazas, message alerts related to deductions are received.

    5. Time saving:- There is no need to stop for transactions at toll plazas, due to which we also save time.

    Question 6. Explain the features of Database Management System?

    Answer: Features of Database Management System:-

    1. Data Integrity:- Data integrity means that the data in the database is consistent and correct. This is important because there are many databases in DBMS. All these databases contain data that is visible to many users. Therefore, it is necessary to ensure that the data in all the databases is consistent and correct for all the users.

    2. Data Security:- Data security is an important concept in a database. Only authorized users should be granted access to the database and their identity should be authenticated using a username and password. Unauthorized users should not be allowed to access the database under any circumstances.

    3. Data Sharing:- In a database, database users can share data with each other. There are multiple levels of authority to access data, and data can be shared only based on proper authentication protocols. Multiple remote users can access the database simultaneously and share data with each other.

    4. Reducing Data Redundancy:- File-based data management systems have many files that are stored in many different locations within a system or across multiple systems. Due to this, sometimes there were multiple copies of the same file which leads to data redundancy. This is prevented in a database because there is a single database and any change in it is reflected immediately. Due to this, there is no possibility of encountering duplicate data.

    Question 7. Explain the architecture of DBMS?

    Answer: A database management system is not always directly available to users and applications to access and store data. A database management system can be centralized, decentralized or hierarchical, there are three types of it based on its architecture.

    1-Tier:- In 1-Tier architecture, DBMS is the only entity where the user directly sits on the DBMS and uses it. Any changes made here will be made directly on the DBMS. It does not provide easy tools for end users. Database designers and programmers generally prefer to use single-tier architecture.

    2. 2-Tier:- The 2-Tier DBMS architecture includes an application layer between the user and the DBMS, which is responsible for communicating the user's request to the database management system and sending the response from the DBMS to the user.

    3-Tier:- The 3-Tier DBMS architecture is the most commonly used architecture for web applications. It is an extension of the 2-Tier architecture. In the 2-Tier architecture, we have an application layer that can be accessed programmatically to perform various tasks on the DBMS.

    Question 8. Explain the database life cycle in detail?

    Answer: Database life cycle is based on a software development model, which is a set of tasks, which are used to develop application software.

    To develop a software, the following processes have to be done:-

    1. Planning:- Analyzing the problem and defining it is called planning.

    2. Requirements:- In this, the user requirements are known.

    3. Design:- In this, the physical and logical design of the user's requirements is prepared.

    4. Development:- In this, the database design is prepared as per the user's requirements.

    5. Implementation:- The database is loaded into the user's system.

    6. Testing:- In this, the database is run on different platforms and it is tested by filling different values ​​in the database.

    7. Installation and Maintenance:- In this, the maintenance team is entrusted with the responsibility of maintaining the database to resolve the problems faced in it and to improve it.

    Question 9: What are Cyber Attacks? Describe five types of Cyber Attacks?

    Ans: In the world of the Internet, all those activities or attempts that harm online computer networks or computer-based systems with the help of Internet are classified as cyber-attacks. Here are some of the major cyber-attacks:

    1. Piracy: In this type of cyber-attack, a person sells copied/downloaded software or other content in the market without the approval and consent of their original owner.

    2. Web-Jacking: It this type of cyber-attack, hacker hacks websites for personal gain and alter the information on websites.

    3. Salami-Attack: In this type of cyber-attack, a small amount of money is transferred to Attacker’s account from the account of a person after regular short time-intervals.

    4. Stalking: In this type of cyber-attack, a person sends messages or inappropriate content to another person against their will using internet applications or social media.

    5. Hacking: In this type of cyber-attack, hackers tamper someone’s computer or social media account or a website in one way or another way.

    Question 10: Describe the Causes of Cyber Attacks in Detail?

    Ans: Following are some common causes of cyber-attacks:

    1. Easy Access to the Internet: Nowadays, the Internet has become very easy to use. People are unknowingly sharing their personal information on the Internet in a variety of ways. Doing so empowers cybercriminals to carry out cyber-attacks.

    2. Lack of Technical Knowledge: Though people are using the internet easily, but most of them do not have any technical knowledge about it. Such people get caught up in cyber attacker’s behavior by providing their confidential information on unknown links or sites.

    3. Non-Use of Security and Privacy: Most people do not use any kind of security or privacy when using the Internet, which makes cyber criminals easy to harm their online accounts.

    4. Criminal Wisdom or Feeling of Revenge: Cyber-attacks are also on the rise due to the criminal intelligence and revenge of many people nowadays.

    5. Ignorance of IT Crime and Laws: The number of cyber-attacks is also increasing because most of the people do not have knowledge of IT crimes and related laws.

    Question 11: What is Malware? Describe five types of Malwares?

    Ans: The word Malware is made up of a combination of two English words Mal and Ware. The word Mal is derived from the word Malicious and the word Ware is derived from Software. Thus, we can say that a group of software is called Malware which is created to infect or damage a computer-based system in one form or another. Computer viruses are a common example of malware. Here are some common types of malware:

    1. Computer viruses: These malware software's come into a computer and infect our data and computer systems.

    2. Adware: These malware software's enters in the computer system without permission and silently sends users confidential information to cyber criminals through the Internet. This is how these software's act like a spy.

    3. Ransomware: These malware software's lock the entire computer system or any important document. The cyber-criminals then demand a ransom for unlocking the computer/document.

    4Trojan Horse: These malware software's initially behaves in a user-friendly way with the computer user and later take control of the computer from the real user and hand it over to the cyber-criminal.

    5. Browser hacking: These malware software's hacks the user's web browser, change the browser settings without any consent and automatically opens some web sites on that browser.

    Question 12: What is Cyber Security? Describe five types of Cyber Security Techniques?

    Ans: A variety of techniques are used to prevent cyber-attacks. These different techniques are collectively called Cyber Security. Here are some key cyber security techniques:

    1. Authentication: This cyber security technique allows a computer user to determine who can use his computer system and who cannot.

    2. Strong Password: This cyber security technique uses a username and password to access a system. Passwords must be complex and strong so that hackers cannot break or steal them.

    3. Encryption: This cybersecurity technique converts the data that user sends over the network into unrecognizable special symbols so that nobody can interpret data during transmission.

    4. Antivirus: It is a software that protects our computer from any kind of virus. It is also called anti-malware. This software prevents viruses from entering into our computer and even if virus enters into the system, it removes viruses by scanning the computer system. AVG, Avira, Norton etc. are some of the popular antivirus softwares.

    5. Firewall: This cyber security protects computers and computer networks from viruses or any other type of cyber-attacks. It is a strong wall that protects our computer from all kinds of malware and does not allow any unauthorized person to access our computer.

    Question 13: What is IT Act 2000? Describe its Features?

    Ans: Keeping in view about cyber threats, Government of India had passed an Act on 17-October- 2000 to legalize the use of Information Technology, which was named as IT Act 2000. This act is also known as ITA 2000. Some of the salient features of this Act are:

    Features of IT Act 2000:

    1. Digital signature is legally recognized in this Act.
    2. This Act gives full recognition to financial transactions made through electronic means.
    3. This Act deals exclusively with Cyber Crime and Electronic Commerce.
    4. This Act gives legal recognition to online submission of forms by Government Offices and Agencies.
    5. The Act establishes a Cyber Appeal Regulation Tribunal which deals with cyber appeals.
    6. According to this Act, a hearing against the order of the Cyber Appeal Regulation Tribunal can be held only in the Supreme Court.

    Question 14: What are low level programming languages? Explain their advantages and disadvantages.

    Ans: Machine and assembly languages are called low-level languages. These are explained below:

    Machine language: Machine language is also called binary language. It is the fundamental language of computer systems because it is understood directly by the computer system. The computer does not require any translation to understand this language. This language is made up of only two binary digits 0 and 1.

    Assembly Language: This language is also called Symbolic Language because it uses the symbolic names of the instructions instead of the binary code. The symbolic names of the assembly language instructions can be easily remembered.

    Advantages of Low-Level Languages:

    1. These languages can communicate / interact directly with computer hardware
    2. These languages work faster than computers.

    Disadvantages of Machine Language:

    1. For programming in low level languages, the programmer needs to know the internal structure of the hardware.
    2. Programs created in low level languages are machine dependent.

    Question 15: What are Language Translators? Explain any one translator in detail.

    Ans: Language translators are also called language processors. These are system-programs. The purpose of developing language translators is to accomplish two main tasks: first, to translate source programs into Object Code, and second, to detect syntax errors in the source program. Each language has its own translator program that can only translate programs written in that particular language. Examples of language translators are: assemblers, compilers and interpreter.

    Assembler: This is a language translator that converts programs written in assembly language into machine language. A program written in assembly language is called a source program. This source program cannot be directly understood by the computer. Therefore, it is necessary to translate it into a machine-understandable format. It is the assembler that converts the source program of the assembly language into a machine-understandable program. The code generated after translation is called the object program, which is used to execute the program.

    Question 16: What is algorithm? Explain the different features that an algorithm should have.

    Ans: Creating algorithms is a basic requirement in computer programming. This is a step-by-step description of how to solve a given problem. An algorithm has limited steps and it should always produce some (right or wrong) result. Before creating a program, a programmer first sets the algorithm.

    An algorithm should have the following features:

    1. Every step must be accurate.
    2. Every step should be clear, which means it should not be ambiguous.
    3. Input and output should be carefully determined.
    4. Steps should not be repeated indefinitely.
    5. After implementing the steps, the required output should be obtained in any case.

    Question 17: Explain different types of errors found in the computer programs.

    Ans: There are two common types of errors in programs:

    1. Syntax Errors: These are the errors that occur when we develop programs that do not follow the rules or syntax of programming language. These types of errors are automatically detected by compilers during the compilation process. A program cannot be successfully compiled until all syntax errors in the program have been corrected. Some examples of syntax errors in C language are: Missing Semicolon, Variable not declared, etc.
    2. Logical Errors: These errors occur when there are the errors in the logic of the program. If there are logical errors in our program, it will be successfully compiled but it will produce incorrect results / output. Such errors cannot be detected by the compiler. These can be easily found with the help of debugging tools.

    Question 18. What are identifiers? Write the naming rules of identifiers?

    Answer: The compiler saves memory for storing data in the computer. We can assign this saved memory location to a name. With this given name we can find or identify the data in the computer's memory. The name we give to the memory location of a data is called an identifier. The name we assign to a memory location has to be defined keeping in mind some rules, to name an identifier we have to follow the rules.

    Naming Rules of Identifiers are: -

    1. The name of any identifier can be used with any capital letter in English.
    2. Underscore (_) can be used in the name of any identifier.
    3. If we want to use a number in the name of any identifier, we must have at least one letter or underscore before using the number.
    4. In addition, no special symbols such as period (.), Comma (,), blank space, etc. may be used in the name of the identifier, and no reserve word or any built-in function in the name of the identifier or even Can't use the name.
    5. No name can be started with a number.
    6. C language is a case-sensitive language, so the upper and lower case letters of English are considered different in this language. For example, int Sum or int sum will be different variable names or identifiers.
    7. The length of the identifier is limited to 31 characters, meaning that the identifier name can have a maximum of 31 characters and a minimum of 1 character.

    Question 19. What are tokens? What are the different categories of tokens that can be used in the program?

    Answer: The basic and smallest units of a C program are called tokens. Each token is made up of one or more of the C language symbols, which may contain words or special symbols.

    There are 6 types of tokens in C language.

    1. Keywords: - Some keywords in C language are predefined tokens or reserve words. The C language provides us with 32 keywords and each keyword is defined for a specific task.

    2. Identifiers: - Identifiers in C language are the names that are used to describe the names of variables, constants and functions. We have to use some rules to use or express these names, by using which we can avoid mistakes in our program.

    3. Constants: - The values ​​of a constant never change in C programming. Constant is also called literal.

    4. Operators: - The symbols that are used to operate a particular operation are called operators.

    5. Special symbols: - These are special symbols. Such as *, {,}, etc.

    Question 20. What are data types? What are the basic data types used in C language?

    Answer: There are always two things to keep in mind when defining an identifier. The first is what kind of data we want to store in the computer's memory and the second is what to name the reserved memory location.

    Syntax to define identifier: -

    Datatype identifier_name;

    Here Datatype indicates what kind of data we are going to store in the memory location and identifier_name is name of the variable.

    Basic data types used in C language: -

    Keyword

    Description

    Memory requirement

    Range of values

    Format

    char

    Used to store single byte/character data

    1 Byte

    -128 upto +127

    %c

    int

    Used to store integer type data

    2 Byte

    -32768 upto +32767

    %d

    float

    Used to store single precision floating values

    4 Byte

    3.4*10-38 upto 3.4*10+38

    %f

    double

    Used to store double precision floating values

    8 Byte

    1.7*10-308 upto 1.7*10+308

    %lf

    void

    Used with functions which doesn’t return any value.

    -

    -

    -