Multiple choice questions(1-1 Marks)
1. We can locate a job on
_____.
A) Newspaper b) Internet
c) Both a and b d) None of these
2. The collection of
information which is accessed via the internet.
A) Data b) Information
c) World wide web d) Web
3. These searches are useful
when we don’t know the full text of a quote.
A) Wildcards b) Operators c) Image d)
News
4. It is a photo and video
sharing social media app.
A) Facebook b) Instagram c) Both a and b d) None of
these
5. It is the most popular
product of Google.
A) bing.com b) google.com c) Wikipedia.com d)
yahoo.com
6. Cyber word is taken among
which of three?.
a)
Cybercrime b)
Cybernetic c) Cyber attack d) Cyber security
7. Copying and selling of
software or any computer-based material is known as:
a) Phishing b) Stalking c) Piracy d)
Hacking
8. A malware which acts like a
spy in computer system.
a) Spyware b) Computer-virus c)
Adware d) Ransomware
9. Which type of security
technique which converts password to special sign?
a)
Strong password b)
Firewall c) Digital signature d) Encryption
10. IT act 2000 is known by
which another name?
a)
IT act 2008 b)
ITA 2000 c) Information set d) Income tax act
11. An electronic environment
in which internet users communicate with each other?
a)
World wide web b)
Internet c) Cyber space d) Cyber cafe
12. is
a process by which a computer program is altered or updated after it has been
released.
a. Software Maintenance b. Hardware Maintenance c. Corrective Maintenance d. Preventive Maintenance
13. In computing, is the process of starting a
computer.
a. Safe mode b. Booting c.Starting d. Login
14. Which of the following is
not a type of computer port?
a. Ethernet b. PS/2 Port c.
VGA d. Printer
15. _____ security tool is
built into the latest versions of Windows and helps guard our PC against
viruses and other malware.
a. Antivirus b. Malware c.
Windows Defender d. Defragmenter
16. ______ is a software which
acts as an interface between the end user and computer hardware.
a. Windows Defender b. File Compression Utility c. Operating system d.Security Tools
17. Set of instructions is
called_________.
a. Group b. Software c.
Program d. None of
these
18. Which language is directly
understood by computer without any translation?
a. Procedure Oriented Language b. Machine Language c. Assembly Language d.
High Level Language
19. Mnemonic codes &
symbolic addresses are used in which programming language?
a. Object Oriented Language b. Non-Procedural Language
c. Assembly Language d. Machine
Language
20. Which translator does not
save object code after translation of source program written in high level
language?
a. Translator b. Compiler c.
Assembler d. Interpreter
21. Process of finding and
correcting errors in a program is called
a. Compilation b. Coding c.
Debugging d. Documentation
22. C is a _______ purpose
programming language.
a. special b. general c.
objective d. None of these
23. Which of the following is
not a valid example of identifier?
a. roll_no b. %age_marks c.
rollno d. main
24. Which of the followings
are the tokens?
a. keywords b. special symbols c.
Literals d. All
of these
25. Which of the following
keywords do not represent a data type?
a. int b.
float c. const d. char
26. ______ are used to
describe a code in the program?
a. Compiler b. Comments c. Literals d.
Identifiers
27. The symbols which are used
to perform some specific type of operation on data are called?
a. Operands b. Operators c.
Expressions d. Formulas
28. Which operator acts only
on one operand?
a. Unary b.
Binary c.
Ternary d.
Conditional
29. Which of the following is
not a Logical Operator?
a. And (&&) b. OR (||) c. Equality (==) d. NOT (!)
30. Which symbol is used for
Ternary Operator?
a. : ? b. ; ? c.
? : d.
? ;
31. Which of the following
cannot be considered as assignment operator?
a. = b. == c.
+= d.
%=
Fill in the blanks(1-1 Marks)
- For creating website clean and fresh ______ should
be prioritized.
Answer:- Design
2. It has been learned from a
research that ordinary users scan webpages (computer screens) in ____ pattern.
Answer:- “F” Pattern
3. HTML is used to organize
text, images, and other webpage’s ______ into webpages.
Answer:- Elements
4. By using ______ the design
of websites and webpages can be designed in a very simple and effective way..
Answer:- Cascading Style Sheets
5. ________ helps to select
and set html elements.
Answer:- Selector
6. _____ allows us to view and
access websites on the internet.
Answer: - Web Browser
7. Action or activity of
buying goods or services over the internet is known as ________.
Answer: - Online Shopping
8. ______ is a web-based tool
that enables users to locate information on the world wide web.
Answer: Search Engine
9. Enclosing a search term
within ______ prompts the search engine to search for that specific word or
phrase.
Answer: Quotation Marks
10. Without a subscription
with _____, we won’t have a connection to the internet.
Answer: Internet Service Provider
11. _____ corrupt the computer
system.
Answer: - Malware
12. ________ is a digital code
which is used to Transmit or verify documents online..
Answer: - Digital Signature
13. Antivirus software keeps
our computer safe from _________.
Answer: Virus
14. ________ acts as secure
wall in the computer system.
Answer: - Firewall
15. Any unauthorized person
alters the website with the use of _________.
Answer: - Cyber Attack
16. URL’s of servers connected
with internet are stored at _________.
Answer: World Wide Web
17. is the process of inspecting hardware on a
regular basis to ensure it stays in good running order.
Answer:- Preventive Maintenance
18. A _______ is software that
a device uses to work with our PC.
Answer:- Device Driver
19. A ______ is a physical
docking point using which an external device can be connected to the computer.
Answer:- Port
20. A ________ is the
combination of typeface and other qualities, such as size, pitch, and spacing.
Answer:- Font
21. Using ______, we can end
our Windows session, save our stuff, and quit programs, but Windows remains on
and ready for other people to use the computer.
Answer:- Log Off
22. A person who writes the
program is called
Answer:- Programmer
23. Low level internal details
of hardware are required for programming in .
Answer:- Low Level
24. ______ is the pictorial
representation of algorithm
Answer:- Flow chart
25. Process of translating
source program written in high level language into object code is called .
Answer:- Compilation
26. Those errors which are not
detected by the compilers are called errors.
Answer:- Logical Errors
27. __________ are the
smallest individual units of a program.
Answer:- Tokens
28. The names given to program
elements, such as variables, constants, arrays, functions etc. is called
______.
Answer:- Identifier
29. Those program elements
which do not allow changing their value during execution are called ________.
Answer:- Constant
30. To work with single
precision values, we use data
type.
Answer:- Float
31. File extension of header
files is
Answer:- .h
32. ______ are the data items
on which operators can perform operations.
Answer:- Operands
33. Unary operator acts on
only _______ operand.
Answer:- One
34. _______ arithmetic
operator performs only on integer operands.
Answer:- Modulus(%)
35. When value of one type is
converted into some other type, it is called .
Answer:- Type Conversion
36. Ternary operator is also
known as________.
Answer:- Conditional
Very short answer type questions(1-1Marks)
1. Write the full name of W3C?
Answer:- World Wide Web Consortium
2. Write the full name of CSS?
Answer:- Cascading Style Sheets
3. What is the extension of
the external CSS file?
Answer:- .css
4. In Which tag INTERNAL.CSS
is defined in the HTML Webpage?
Answer:- <link>
5. Write the full name of
WYSIWYG?
Answer:- What You See Is What You
Get.
6. A company that provides
internet connections and services to individuals and organizations is known as
_________?.
Answer: - Internet Service
Provider
7. What is the full form of
HTTPS?
Answer: - Hyper Text Transfer Protocol Over Secure Socket
Layer
8. Which tool is used to
search only for job?
Answer: Job search engine
9. What is the method of
saving a web page’s address called?
Answer: Bookmarks
10. Name any one free, open
content online encyclopedia?
Answer: Wikipedia.com
11: When first IT act comes into?
Answer:- 17th October, 2000
12: Name any two antiviruses?
Answer:- AVG, Avira, Avast, Quick heal
13: Write full form of CERT-IN?
Answer:- Indian Computer Emergency Response
Team
14: Write the complete form of ITA-2000?
Answer:- Information Technology Act 2000
15:- Related information of a
particular item may be treated as?
Ans: Record
16: The Collection of Files or
Tables is known as?
Ans: Database
17: DBMS stands for?
Ans: Database Management System
18: Who are the group of
people who actually work on the designing part of the database?
Ans: Designer
19: Who maintains the DBMS and
are responsible for administrating the database?
Ans: Database Administrator (DBA)
20: Which operator causes its
operand to be increased by one?
Ans: Increment (++) Operator
21: Which operators are used
to test the relationship between two variables?
Ans: Relational Operators
22: Write all the Arithmetic
Operators used in C programming?
Ans: +, -, *, /, %
23: Which operator returns the
size of its operand, in bytes?
Ans: sizeof( )
24: Write the name of two ways
of type conversion?
Ans: Implicit and Explicit
25: How many relational
operators are present in C Language?
Ans: 6 (Six)
Write full forms(1-1marks)
- PnP : Plug and Play
- USB : Universal Serial Bus
- VGA : Video Graphics Adapter
- UAC : User Account Control
- OS : Operating System
- NAP : Network Access Protection
- Opcode : Operation code
- Operand : Operation Address
- 4GL : Fourth Generation Language
- SQL : Structured Query Language
- OOP : Object Oriented Programming
- FORTRAN : Formula Translation
- BCPL : Basic Combined Programming
Language
- IDE : Integrated Development
Environment
- Stdio.h : Standard Input Output Header
file
- Conio.h : Console Input Output Header
File
- ASCII : American Standard Code for
Information Interchange
Write True or False(1-1marks)
- Collection of related record of Number of different
students can be treated as Database.(False)
- The database is used to retrieve, insert and delete
the data efficiently. (True)
- DBMS is a computerized record keeping system. (True)
- Database management system is Hardware. (False)
- Database management system is used to manage the
database. (True)
Short answer type questions(4-4marks)
Question:1. Write the basic
structure of HTML?
Ans: HTML document begins from
<HTML> tag and ends with </HTML> tag. Structure of HTML document
can be divided into two main parts:
- Head Part: This part begins with <HEAD>
tag and ends with </HEAD> tag. This part contains the title and
metadata of the HTML document.
- Body Part: This part begins with <BODY>
tag and ends with </BODY> tag. This part contains all those contents
that are displayed on the web page.
Question:2. Write various
Website Development Phases.
Ans: Following can be the various
phases of website development:
- Information Gathering
- Planning
- Design
- Development
- Testing & Delivery
- Maintenance
Question:3. Write the role of HTML in the WEB.
Ans: HTML plays an important role in web designing. Web would not be
possible without HTML. HTML is the default language for designing websites.
HTML code is used to design static webpages. This code is understood by the web
browser. Web browsers make the HTML code viewable and display it on our
computer screen.
Question:4. What CSS is used
for?
Ans: CSS stands for Cascading
Style Sheets. It is a simple web designing language which is used to make web
page-design simple and effective. In simple words, we can say that it is a
language to design web pages which is used to improve the look & feel of a
web page. CSS is easy to learn and understand. It is commonly used to build
websites with html.
Question:5 Define Web browser?
Ans: Web Browser is an
application software. We can easily access the websites over the internet with
the help of web browsers. It helps user to find web pages, to access them and
to display them on screen. For using websites, users have to provide the URL
(Uniform Resource Locator) of sites in the address bar of the browser. Internet
Explorer, Google Chrome, Firefox, Opera etc. are the examples of commonly used
web browsers.
Question:6 What is the use of
quotation marks in online search?
Ans: During online search, when
we enclose the search term in quotation marks, the search engine will find only
that particular term or phrase on the web and will not show the similar terms
in the search result. For example: if we begin our online search by typing the
term movie director, the search engine may show a lot of results similar to
‘movie’, ‘director’, ‘movie director’ or ‘film director’ etc. But if we begin
our search by enclosing the search term in quotation marks (i.e. "movie
director"), search engine will show results only related to that
particular term ‘movie director’.
Question:7 Name any five
Internet Security Threats.
Ans: Following are the common
internet security threats:
- Hackers
- Viruses
- Spyware
- Worms
- Phishing
- Spamming
Question:8 Explain Google Search Engine.
Ans: Google search engine is the best search engine in the world. It is one
of the most popular products of Google. Google has become one of the most
popular and trusted search engines in terms of quality of search results.
Google is using a sophisticated algorithm to deliver the best results to its
users. Google is founded by Larry Page and Sergey Brin.
Question:9 What is Bookmark?
Ans: Bookmarks are also known as
Favorites. Web addresses can be saved with the help of bookmarks so that
whenever we have to open that web address again we can quickly re-open it
without having to type it again. All web browsers offer the option to save the
web address. Internet Explorer is the only web browser that uses the word
Favorites to save a web address. In Mozilla Firefox, Google Chrome, etc. this
option is called Bookmark. To set a bookmark, click on Star in the web
browser's address bar.
Question:10 Define World Wide
Web?
Ans: The World Wide Web (WWW) is
also known as the Web or W3. It is a huge collection of different types of
information. It includes all public web sites that are connected to the
Internet worldwide. Each website/page is assigned a unique name/address, called
a URL (Uniform Resource Locator). Information stored on the www can be viewed
with the help of web browsers (Internet Explorer, Mozilla Firefox, etc.). World
Wide Web uses HTTP protocols to transfer the contents of webpages.
Question11: Explain the
Application Areas of DBMS?
Ans: Some of the DBMS application
areas are listed below:
- DBMS is used to store student records in educational
institutions.
- DBMS is used to store bank customer information.
- DBMS is used to store call records, monthly bills
etc. information in the telecommunications sector.
- DBMS is used to track the production and supply of
goods in the manufacturing sector.
- DBMS is used to store reservations and schedule
information in the Tours and travel industry.
Question12: Define about DBMS Working?
Ans: DBMS stands for Database Management System. It is basically a
computerized record keeping system. A DBMS stores data in a way that makes it
easy to retrieve information, modify data, and create information. A DBMS has
many different types of users and each user can have different rights to
perform different types operations on the database. These different users use
the database for different purposes. For example: some users retrieve data and
some takes its backup.
Question13: What do you mean
by End User?
Ans: A DBMS has many different
types of users and each user can have different rights to perform different
types operations on the database. END USERS is a type of DBMS user. It includes
those users who actually benefit from DBMS. End users can range from general
audiences to intelligent users like business analysts.
Question14: Define the 2-tier
DBMS architecture in DBMS?
Ans: DBMS has different types of
architectures: such as 1-tier architecture, 2-tier architecture, 3-tier
architecture, etc. DBMS's 2-tier architecture incorporates an application layer
between users and DBMS. This layer is responsible for forwarding the user's
request to the Database Management System and then transmits the response from
the DBMS to the user.
Question15: What is Cloud
database?
Ans: A cloud database is a
database that typically runs on a cloud computing platform. Internet is used to
access cloud databases. Cloud Database Services can be accessed in two ways:
- In the first method, an organization purchases
virtual machine space from a cloud service provider, and stores the
database on the cloud. IT staff is used by the organization to control the
database. In this system, the organization is responsible for monitoring
and managing the database.
- In the second method, the organization makes a
subscription-based agreement with the cloud service provider. The database
is stored on the cloud server, but the cloud service provider allows the
database to be used as a service (Database as a service-DBaaS).
Question16: Why C is called Middle Level Programming Language?
Ans: C has the functionality of both types of programming languages, i.e.
low-level and high-level programming languages. It means C language is suitable
for writing both types of programs - system programs and application programs.
Thus C-Language became a programming language that stood between both low-level
and high-level programming languages. That is why C language is called middle
level language. However, the middle level language is not a special category of
programming languages. Because of the special capabilities of the C language,
it is known as a middle level programming language.
Question17: What is a
character set?
Ans: The set of all characters
and symbols used in the C language is called the character set of C language.
The C language supports the ASCII character set.
The following characters and
symbols can be used in C language:
- Upper-case and Lower-case Alphabets (A to Z, a to z)
- Digits (0 to 9)
- Special Symbols, For Example: ! @ # $ % ^ . ? / | \
etc.
- Some Non-printable characters, For example: new-line,
horizontal-tab etc.
Question18: What are keywords?
Ans: Keywords are also called Reserve Words. These words are predefined in
C compiler. The meaning of these words is predefined. They are used for the
specific purpose for which they were defined. We cannot change their meaning.
In Turbo C these words are shown in white color while in Code::Blocks these
words are shown in blue color. The standard C language has 32 keywords. For
example: int, float, void, if, else, for, while etc. In C programming, all
keywords are written in lowercase letters only.
Question19: What should be the
steps for creating and executing C program?
Ans: The following steps can be
used to create a C language program:
- Develop a program algorithm.
- Create a C program as per the algorithm using any
text editor or IDE that supports C language.
- Save the file by writing a file name with .c
extension.
- Compile the program.
- If the program has a syntax error, correct it and
repeat step 4.
- Execute the program.
- Output of program will appear in the output window.
Question20: Write the difference between variables and constants.
Ans: Both of these are important program elements that are used to store a
value in a program. Both elements are given a name in the program and the type
of value to be stored in them. But there is a slight difference between the
two. Variables allow us to change their values while running a program whereas
constants do not allow it. It means constant values are fixed while variable
values are changeable.
Question21: What are
Pre-processor directives?
Ans: Pre-processor instructions
are those statements that begin with the # symbol. These statements give
instructions to the compiler to perform some specific operations before
compilation. These directive statements are commonly used to include header files
in the program or to define symbolic constants.
Here are some examples of
commonly used pre-processors:
#include <stdio.h>
#define PI 3.14
Question22: Define Expression?
Ans: Expression is like a formula
in mathematics. An expression can be any valid combination of operators and
operands. A valid combination is a combination that confirms the syntax rules
of the C language. Expression always returns some value after evaluation. For
example: x = y * z;
Question23: What is Operand?
Ans: Operands are data items on
which operators can work. These operands can be variables or constant values.
For example:
a + 5 * 10
In this example, operators + and
* are doing their work on variable ‘a’, constant values 5 and 10. Here, ‘a’, 5
and 10 are the operands.
Question24: What is Unary
operator?
Ans: Operators that require only
one operand to perform their operations are called Unary Operators. For
example: ++, --, ! and ~ operators etc. The following example uses increment
(++) Unary Operator:
int x = 10;
++ x;
Here, ++ increment operator is a
unary operator that performs its operation at only single operand
This operator will increase the
value of x by one unit and make its value 11.
Question25: Define Conditional
operator?
Ans: Conditional operator is also
known as Ternary Operator. This operator requires three operands to perform its
operation. Symbols ? : are used to represent Conditional/Ternary operator. The
syntax for using this operator is as follows:
Exp1? Exp2 : Exp3;
Exp1 should be a conditional
expression that always returns a true (1) or false (0) result. If the result of
Exp1 is true then Exp2 will perform its function otherwise Exp3 will perform
its function.
Question26: What is Type
Conversion?
Ans: In C language, the value of
an expression can be changed to a specific type of data type as required. When
one type of value is converted to another type of value, it is called Type
Conversion.
In C language, this conversion
can be done in two ways:
- Implicit Conversion
- Explicit Conversion
Question27: What is an
operator? Write the name of different types of operators?
Ans: Operators are the symbols
that are used to perform specific operations on data. For example: We use +
symbol to perform addition operation, * symbol is used to multiply, > symbol
is used to compare etc. In these examples, +, *, > symbols (operators) are
used that represents various types of operations. All operators return a value
after performing their operation. Operators can be divided into the following
three types:
- Unary Operators
- Binary Operators
- Ternary Operators
Question28: Write about increment and decrement operators?
Ans: The increment and decrement operators are the unary operators. The ++
sign is used for the increment operator and the -- sign is used for the
decrement operator. The increment operator (++) increases the value of its
operand by one while the decrement operator (--) decreases the value of its
operand by one. The operand used with these operators must be a variable. They
cannot be applied directly to a fixed value.
for example:
int x = 10;
++ x; It will increase the value
of x to 11.
--x; It will decrease the
value of x (10) to 9.
Long answer type questions(6-6marks)
Question 1: Explain any four
online search techniques?
Answer: When we search for
any information online using search engines, we can make our search more
effective by using some search techniques.
Some of the main search
techniques are given below:-
1. Using some specific
keywords:- Keywords are the words that we use to find content on the
internet. Keep the keywords as specific as possible. This helps Google to find
the information we need.
2. By simplifying the search
terms:- Some engines include “stop words” for searching. These are commonly
used words like prepositions (in, of, on), conjunctions(and, but) and
articles(a, an, the), which means that we will get more pages than we need in
the search results.
3. Using quotation marks:- When
we type in a search term in an online search, the search engine will search the
web for that specific term or phrase only and will not show similar terms in
the search results.
4. Removing unnecessary
words:- By putting a hyphen (-) or a short dash or a minus sign before a
word, that word is excluded from the search.
5. Using operators:- Wildcard
search Use the * symbol as a placeholder for something we do not know. Wildcard
searches are useful when we do not know the full text of the quote.
Question 2: What are the
advantages and disadvantages of online shopping?
Answer: Advantages of online
shopping:-
- Convenience
- Better prices
- More variety
- Easier to send gifts
- More control
- Easier to compare prices
- No crowds
Disadvantages of online
shopping:-
- Negative environmental impact of packaging
- Shipping difficulties and delays
- Risk of fraud
- Less contact with our community
- Spending too much time online
- Returns can be complicated
- We don't know exactly what we are getting
Question 3: What is social networking? Tell us about any two social
networking sites?
Answer: Social networking
allows us to stay connected with friends, family, colleagues or customers
through internet-based social media sites. Social networking websites are also
being used for business purposes these days. Social media helps people to build
better relationships with their family and friends. This is the reason why
people spend a lot of their time browsing social sites online and smartphones
and tablets etc. have further increased this.
1. Facebook:- Facebook is the
largest social media site. Many people use it for social and business purposes.
On Facebook, we can share our content with everyone in different formats such
as text, images, videos, and stories.
2. YouTube:- YouTube is a
video sharing platform. On YouTube, we can create a YouTube channel for
ourselves where we can create and upload videos. People who watch videos are
able to like, share, and comment on our videos.
Question 4: How can we
identify secure websites? Also explain the padlock symbol?
Answer: Not every website
on the internet is reliable and secure. An unsecure website can install
programs on our computer without our permission, interfere with its
functioning, steal information, etc.
Two ways to identify a secure
website are as follows:-
1. Look at the web address of the
web browser, that this web address starts with the name HTTPS://. In this,
HTTPS encrypts the information given by the user and decrypts the information
from the server side.
2. Look for a closed padlock in
the web browser.
Padlock symbol:- A green
padlock symbol indicates that we are definitely connected to the website whose
address is shown in the address bar. This connection is encrypted to prevent
spying between the browser and the website.
Question 5: What is FASTag in
travel? What are its benefits?
Answer: FASTag is a tag
through which the payment of toll charges is done automatically at toll plazas.
Using it, we can pass through the toll plaza without stopping for cash
transactions. FASTag is linked to a prepaid account, from which the toll amount
is deducted automatically. FASTag uses the RADIUS (Radio Frequency
Identification) technology, and the tag is pasted on the windscreen of the
vehicle after the account is activated.
Benefits of using FASTag:-
1. Validity:- The validity
of the FASTag card is five years.
2. Payment absorption:- The
toll amount is deducted automatically from the prepaid account of FASTag
without stopping, for which there is no need to carry cash for toll
transactions.
3. Online recharge:- FASTag
can be recharged online through credit card/debit card/credit card/debit/credit
card or net banking.
4. Message alert:- While
going to and from toll plazas, message alerts related to deductions are
received.
5. Time saving:- There is
no need to stop for transactions at toll plazas, due to which we also save
time.
Question 6. Explain the
features of Database Management System?
Answer: Features of Database
Management System:-
1. Data Integrity:- Data
integrity means that the data in the database is consistent and correct. This
is important because there are many databases in DBMS. All these databases
contain data that is visible to many users. Therefore, it is necessary to
ensure that the data in all the databases is consistent and correct for all the
users.
2. Data Security:- Data
security is an important concept in a database. Only authorized users should be
granted access to the database and their identity should be authenticated using
a username and password. Unauthorized users should not be allowed to access the
database under any circumstances.
3. Data Sharing:- In a
database, database users can share data with each other. There are multiple
levels of authority to access data, and data can be shared only based on proper
authentication protocols. Multiple remote users can access the database
simultaneously and share data with each other.
4. Reducing Data Redundancy:- File-based
data management systems have many files that are stored in many different
locations within a system or across multiple systems. Due to this, sometimes
there were multiple copies of the same file which leads to data redundancy.
This is prevented in a database because there is a single database and any
change in it is reflected immediately. Due to this, there is no possibility of
encountering duplicate data.
Question 7. Explain the
architecture of DBMS?
Answer: A database
management system is not always directly available to users and applications to
access and store data. A database management system can be centralized,
decentralized or hierarchical, there are three types of it based on its
architecture.
1-Tier:- In 1-Tier
architecture, DBMS is the only entity where the user directly sits on the DBMS
and uses it. Any changes made here will be made directly on the DBMS. It does
not provide easy tools for end users. Database designers and programmers
generally prefer to use single-tier architecture.
2. 2-Tier:- The 2-Tier
DBMS architecture includes an application layer between the user and the DBMS,
which is responsible for communicating the user's request to the database
management system and sending the response from the DBMS to the user.
3-Tier:- The 3-Tier DBMS
architecture is the most commonly used architecture for web applications. It is
an extension of the 2-Tier architecture. In the 2-Tier architecture, we have an
application layer that can be accessed programmatically to perform various tasks
on the DBMS.
Question 8. Explain the
database life cycle in detail?
Answer: Database life
cycle is based on a software development model, which is a set of tasks, which
are used to develop application software.
To develop a software, the
following processes have to be done:-
1. Planning:- Analyzing
the problem and defining it is called planning.
2. Requirements:- In this,
the user requirements are known.
3. Design:- In this, the
physical and logical design of the user's requirements is prepared.
4. Development:- In this,
the database design is prepared as per the user's requirements.
5. Implementation:- The
database is loaded into the user's system.
6. Testing:- In this, the
database is run on different platforms and it is tested by filling different
values in the database.
7. Installation and
Maintenance:- In this, the maintenance team is entrusted with the
responsibility of maintaining the database to resolve the problems faced in it
and to improve it.
Question 9: What are Cyber
Attacks? Describe five types of Cyber Attacks?
Ans: In the world of the
Internet, all those activities or attempts that harm online computer networks
or computer-based systems with the help of Internet are classified as
cyber-attacks. Here are some of the major cyber-attacks:
1. Piracy: In this type of
cyber-attack, a person sells copied/downloaded software or other content in the
market without the approval and consent of their original owner.
2. Web-Jacking: It this
type of cyber-attack, hacker hacks websites for personal gain and alter the
information on websites.
3. Salami-Attack: In this
type of cyber-attack, a small amount of money is transferred to Attacker’s
account from the account of a person after regular short time-intervals.
4. Stalking: In this type
of cyber-attack, a person sends messages or inappropriate content to another
person against their will using internet applications or social media.
5. Hacking: In this type
of cyber-attack, hackers tamper someone’s computer or social media account or a
website in one way or another way.
Question 10: Describe the
Causes of Cyber Attacks in Detail?
Ans: Following are some common
causes of cyber-attacks:
1. Easy Access to the
Internet: Nowadays, the Internet has become very easy to use. People are
unknowingly sharing their personal information on the Internet in a variety of
ways. Doing so empowers cybercriminals to carry out cyber-attacks.
2. Lack of Technical
Knowledge: Though people are using the internet easily, but most of them do
not have any technical knowledge about it. Such people get caught up in cyber
attacker’s behavior by providing their confidential information on unknown
links or sites.
3. Non-Use of Security and
Privacy: Most people do not use any kind of security or privacy when using
the Internet, which makes cyber criminals easy to harm their online accounts.
4. Criminal Wisdom or Feeling
of Revenge: Cyber-attacks are also on the rise due to the criminal
intelligence and revenge of many people nowadays.
5. Ignorance of IT Crime and
Laws: The number of cyber-attacks is also increasing because most of the
people do not have knowledge of IT crimes and related laws.
Question 11: What is Malware?
Describe five types of Malwares?
Ans: The word Malware is made up
of a combination of two English words Mal and Ware. The word Mal is derived
from the word Malicious and the word Ware is derived from Software. Thus, we
can say that a group of software is called Malware which is created to infect
or damage a computer-based system in one form or another. Computer viruses are
a common example of malware. Here are some common types of malware:
1. Computer viruses: These
malware software's come into a computer and infect our data and computer
systems.
2. Adware: These malware
software's enters in the computer system without permission and silently sends
users confidential information to cyber criminals through the Internet. This is
how these software's act like a spy.
3. Ransomware: These
malware software's lock the entire computer system or any important document.
The cyber-criminals then demand a ransom for unlocking the computer/document.
4Trojan Horse: These malware
software's initially behaves in a user-friendly way with the computer user and
later take control of the computer from the real user and hand it over to the
cyber-criminal.
5. Browser hacking: These
malware software's hacks the user's web browser, change the browser settings
without any consent and automatically opens some web sites on that browser.
Question 12: What is Cyber
Security? Describe five types of Cyber Security Techniques?
Ans: A variety of techniques are
used to prevent cyber-attacks. These different techniques are collectively
called Cyber Security. Here are some key cyber security techniques:
1. Authentication: This
cyber security technique allows a computer user to determine who can use his
computer system and who cannot.
2. Strong Password: This
cyber security technique uses a username and password to access a system.
Passwords must be complex and strong so that hackers cannot break or steal
them.
3. Encryption: This
cybersecurity technique converts the data that user sends over the network into
unrecognizable special symbols so that nobody can interpret data during
transmission.
4. Antivirus: It is a
software that protects our computer from any kind of virus. It is also called
anti-malware. This software prevents viruses from entering into our computer
and even if virus enters into the system, it removes viruses by scanning the
computer system. AVG, Avira, Norton etc. are some of the popular antivirus
softwares.
5. Firewall: This cyber
security protects computers and computer networks from viruses or any other
type of cyber-attacks. It is a strong wall that protects our computer from all
kinds of malware and does not allow any unauthorized person to access our
computer.
Question 13: What is IT Act
2000? Describe its Features?
Ans: Keeping in view about cyber
threats, Government of India had passed an Act on 17-October- 2000 to legalize
the use of Information Technology, which was named as IT Act 2000. This act is
also known as ITA 2000. Some of the salient features of this Act are:
Features of IT Act 2000:
- Digital signature is legally recognized in this Act.
- This Act gives full recognition to financial
transactions made through electronic means.
- This Act deals exclusively with Cyber Crime and
Electronic Commerce.
- This Act gives legal recognition to online submission
of forms by Government Offices and Agencies.
- The Act establishes a Cyber
Appeal Regulation Tribunal which deals with cyber appeals.
- According to this Act, a hearing against the order of
the Cyber Appeal Regulation Tribunal can be held only in the Supreme
Court.
Question 14: What are low
level programming languages? Explain their advantages and disadvantages.
Ans: Machine and assembly
languages are called low-level languages. These are explained below:
Machine language: Machine
language is also called binary language. It is the fundamental language of
computer systems because it is understood directly by the computer system. The
computer does not require any translation to understand this language. This
language is made up of only two binary digits 0 and 1.
Assembly Language: This
language is also called Symbolic Language because it uses the symbolic names of
the instructions instead of the binary code. The symbolic names of the assembly
language instructions can be easily remembered.
Advantages of Low-Level
Languages:
- These languages can communicate / interact directly
with computer hardware
- These languages work faster than computers.
Disadvantages of Machine
Language:
- For programming in low level languages, the
programmer needs to know the internal structure of the hardware.
- Programs created in low level languages are machine
dependent.
Question 15: What are Language Translators? Explain any one translator in
detail.
Ans: Language translators are also called language processors. These are
system-programs. The purpose of developing language translators is to
accomplish two main tasks: first, to translate source programs into Object
Code, and second, to detect syntax errors in the source program. Each language
has its own translator program that can only translate programs written in that
particular language. Examples of language translators are: assemblers,
compilers and interpreter.
Assembler: This is a language
translator that converts programs written in assembly language into machine
language. A program written in assembly language is called a source program.
This source program cannot be directly understood by the computer. Therefore,
it is necessary to translate it into a machine-understandable format. It is the
assembler that converts the source program of the assembly language into a
machine-understandable program. The code generated after translation is called
the object program, which is used to execute the program.
Question 16: What is
algorithm? Explain the different features that an algorithm should have.
Ans: Creating algorithms is a
basic requirement in computer programming. This is a step-by-step description
of how to solve a given problem. An algorithm has limited steps and it should
always produce some (right or wrong) result. Before creating a program, a
programmer first sets the algorithm.
An algorithm should have the
following features:
- Every step must be accurate.
- Every step should be clear, which means it should not
be ambiguous.
- Input and output should be carefully determined.
- Steps should not be repeated indefinitely.
- After implementing the steps, the required output
should be obtained in any case.
Question 17: Explain different
types of errors found in the computer programs.
Ans: There are two common types
of errors in programs:
- Syntax Errors: These are the errors that occur
when we develop programs that do not follow the rules or syntax of
programming language. These types of errors are automatically detected by
compilers during the compilation process. A program cannot be successfully
compiled until all syntax errors in the program have been corrected. Some
examples of syntax errors in C language are: Missing Semicolon, Variable
not declared, etc.
- Logical Errors: These errors occur when there
are the errors in the logic of the program. If there are logical errors in
our program, it will be successfully compiled but it will produce
incorrect results / output. Such errors cannot be detected by the
compiler. These can be easily found with the help of debugging tools.
Question 18. What are
identifiers? Write the naming rules of identifiers?
Answer: The compiler saves
memory for storing data in the computer. We can assign this saved memory
location to a name. With this given name we can find or identify the data in
the computer's memory. The name we give to the memory location of a data is
called an identifier. The name we assign to a memory location has to be defined
keeping in mind some rules, to name an identifier we have to follow the rules.
Naming Rules of Identifiers
are: -
- The name of any identifier can be used with any
capital letter in English.
- Underscore (_) can be used in the name of any
identifier.
- If we want to use a number in the name of any
identifier, we must have at least one letter or underscore before using
the number.
- In addition, no
special symbols such as period (.), Comma (,), blank space, etc. may be
used in the name of the identifier, and no reserve word or any built-in
function in the name of the identifier or even Can't use the name.
- No name can be
started with a number.
- C language is a
case-sensitive language, so the upper and lower case letters of English
are considered different in this language. For example, int Sum or int sum
will be different variable names or identifiers.
- The length of the
identifier is limited to 31 characters, meaning that the identifier name
can have a maximum of 31 characters and a minimum of 1 character.
Question 19. What are tokens? What are the different categories of tokens
that can be used in the program?
Answer: The basic and smallest units of a C program are called tokens. Each
token is made up of one or more of the C language symbols, which may contain
words or special symbols.
There are 6 types of tokens in C language.
1. Keywords: - Some keywords
in C language are predefined tokens or reserve words. The C language provides
us with 32 keywords and each keyword is defined for a specific task.
2. Identifiers: - Identifiers
in C language are the names that are used to describe the names of variables,
constants and functions. We have to use some rules to use or express these
names, by using which we can avoid mistakes in our program.
3. Constants: - The values of a constant never change in C programming.
Constant is also called literal.
4. Operators: - The
symbols that are used to operate a particular operation are called operators.
5. Special symbols: - These
are special symbols. Such as *, {,}, etc.
Question 20. What are data
types? What are the basic data types used in C language?
Answer: There are always two
things to keep in mind when defining an identifier. The first is what kind of
data we want to store in the computer's memory and the second is what to name
the reserved memory location.
Syntax to define identifier: -
Datatype identifier_name;
Here Datatype indicates what kind
of data we are going to store in the memory location and identifier_name is
name of the variable.
Basic data types used in C
language: -
Keyword |
Description |
Memory
requirement |
Range of
values |
Format |
char |
Used to
store single byte/character data |
1 Byte |
-128
upto +127 |
%c |
int |
Used to
store integer type data |
2 Byte |
-32768
upto +32767 |
%d |
float |
Used to
store single precision floating values |
4 Byte |
3.4*10-38
upto 3.4*10+38 |
%f |
double |
Used to
store double precision floating values |
8 Byte |
1.7*10-308
upto 1.7*10+308 |
%lf |
void |
Used
with functions which doesn’t return any value. |
- |
- |
- |
0 Comments
Post a Comment
Please don't post any spam link in this box.