Important Questions for Class 12 Informatics Practices Term 2 with Answers

Important Questions for Class 12 Informatics Practices Term 2

Important Questions for Class 12 Informatics Practices Term 2: The Central Board of Secondary Education will conduct the Class 12 Informatics Practices Term 2 Examination on 13th June 2022. The students must practice the Important Questions for Class 12 Informatics Practices Term 2 to ace Class 12 Informatics Practices Term 2 Examination. On this page, we have given Important Questions for Class 12 Informatics Practices Term 2 with Answers. The students can take reference from ther answers of Important Questions for Class 12 Informatics Practices Term 2 and can write in the same way to get full marks. Go through all the Important Questions for Class 12 Informatics Practices Term 2 and bookmark this page to get Class 12 Informatics Practices Term 2 Answer Key 2022

Important Questions for Class 12 Informatics Practices Term 2: Database Query using SQL

Question 1.
What do you mean by database connectivity?
Answer:
Database connectivity refers to connection and communication between an application and database system.

Question 2.
Define ResultSet.
Answer:
A result set (represented by a ResultSet object) refers to a logical set of records that are fetched from the database by executing a query and made available to the application program.

Question 3.
Which method is used to retrieve an int type data from a ResultSet? (HOTS)
Answer:
To retrieve an int type data from a ResultSet getlnt() method is used.

Question 4.
Differentiate between executeQuery() method and executel)pdate() method.
Answer:
The execute query method is used to execute SQL-SELECT queries whereas non-SELECT queries are executed through the executeUpdate() method.

Question 5.
Which method is used to retrieve a date type data from a ResultSet?
Answer:
To retrieve a date type data from a ResultSet. getDate() method is used.

Question 6.
Explain the use of DBC Connection class.
Answer:
This class has many methods. Some of the commonly used methods are given below:
(i) deregisterDriver(Driver driver) It drops the driver from the list of drivers registered in the DriverManager class.

(ii) registerDriver(Driver driver) It registers the driver in the DriverManager class. getConnection(String url) It establishes the connection to a given database URL.
(iii) getConnection(String URL, String user, String password) It establishes the connection to a given database URL, with appropriate username and password.
(iv) getConnection(String url, Properties info) It establishes the connection to a given database URL, as per passed driver properties.
(v) getDriver(String url) It attempts to locate the driver by the given string.
(vi) getDrivers() It retrieves the enumeration of the drivers, which has been registered with the DriverManager class.

Question 7.
Expand the term JDBC and ODBC.
Answer:
JDBC stands for Java DataBase Connectivity. ODBC stands for Open DataBase Connectivity.

Question 8.
Which method is used to fetch a string value from a ResultSet?
Answer:
To retrieve a string value from a ResultSet getString() method is used.

Question 9.
What tasks are performed by JDBC?
Answer:
JDBC primarily performs the following tasks:

  • Establishing a connection with a database.
  • Sending SQL statement to database server.
  • Processing the results obtained through the SQL query.

Question 10.
Which JDBC classes/objects are used in database connectivity applications? (HOTS)
Answer:
DriverManager Class, Connection object, Statement object, ResultSet object are used in database connectivity applications.

Question 11.
Explain the use of next(), first() and last() methods in a ResultSet.
Answer:

  1. next( ) Moves the cursor in forwarding direction one row. If the cursor is in the last row, it will return false.
  2. first( ) Moves the cursor to the first row in a ResultSet object. If the cursor is already present in the first row, it will return false.
  3. last( ) Moves the cursor to the last row in the ResultSet object. If the cursor is already present in the last row, it will return false.

Question 12.
How can we execute a query? (HOTS)
Answer:
Execute a Query To execute a query, we need to create an object of a type Statement for building and submitting an SQL statement to the database using createStatement() method of Connection type object.

Statement stmt = conn.createStatement( );

Thereafter, we need to execute the SQL statement using executeQuery() method, which returns a ResultSet that contains the resultant dataset of the executed query.
E.g.,

String MyString;
MyString = “SELECT roll, name, age FROM STUDENT”;
ResultSet rs = stmt.executeQuery(MyString );

It however, the SQL statement is an UPDATE, INSERT or DELETE statement that you can execute SQL query using executeUpdate() method,
E.g.

Statement stmt = conn.createStatement( );
String MyString;
MyString = “DELETE FROM STUDENT”;
ResultSet rs = stmt.executeUpdate(MyString );

Question 13.
What is the use of DriverManager Class?
Answer:
DriverManager Class
The JDBC DriverManager class loads the JDBC driver needed to access a particular data source, located and logs on to the database and returns a Connection object.

The DriverManager class works between the user and the drivers. The task of the DriverManager class is to keep track of the drivers that are available and handles in establishing a connection between a database and the appropriate driver. It even keeps track of the driver login time limits and printing of log and tracing messages. This class is mainly useful for simple application. The most frequently used methods of this class are DriverManager. getConnection( ). We can know by the name of the method, that this method establishes a connection to a database. The DriverManager class maintains the list of the Driver classes. Each driver has to get registered in the DriverManager class by calling the method DriverManager.registerDriver().

The driver is loaded by calling the Class.forName() method. JDBC drivers are designed to tell the DriverManager about themselves automatically when their driver implementation class gets loaded.

This class has many methods. Some of the commonly used methods are given below:
(i) deregisterDriver(Driver driver)
 It drops the driver from the list of drivers registered in the DriverManager class.
(ii) registerDriver(Driver driver) It registers the driver in the DriverManager class. getConnection(String url) It establishes the connection to a given database URL.
(iii) getConnection(String URL, String user, String password) It establishes the connection to a given database URL, with appropriate username and password.
(iv) getConnection(String url, Properties info) It establishes the connection to a given database URL, as per passed driver properties.
(v) getDriver(String url) It attempts to locate the driver by the given string.
(vi) getDrivers() It retrieves the enumeration of the drivers, which has been registered with the DriverManager class.

Question 14.
How can you create a JDBC statement object?
Answer:

Class.forName("java.sql.Driver”) ;
Class.forName(“com.mysql.jdbc.Driver”);

Question 15.
What does getRow() method do?
Answer:
getRow() method retrieves a specified number of rows from a recordset and to fill an array with the resulting data.

Question 16.
Write all six steps for creating Database Connection Application.
Answer:
Step 1 Import the Package Required for Database Programming First of all, we need to import the library package containing the JDBC classes, i.e. Connection, DriverManager, Statement and ResultSet needed for database programming. For this purpose, we need to write the following statements:

(i) import java.sql. Connection;
(ii) import java.sql. DriverManager;
(iii) import java.sql. Statement;
(iv) import java.sql. ResultSet;

However even we can write import java.sql.*; to import the entire package. Thereafter, we need to add MySQL JDBC connector from the projects window.

Step 2 Register the JDBC Driver To register the JDBC Driver, we initialize a driver to open a communication channel with the database from the Java application. For connecting to MySQL,
we need to write one of the following statements:

Class.forName("java.sql.Driver”) ; or
Class.forName(“com.mysql.jdbc.Driver”);

Step 3 Open a Connection To open a Connection, we need to use the DriverManager.getConnection( ) method and create a connection object, which represent the physical connection with the database, that allows us to establish a physical connection to the data source for open a connection, we need to write following statement:

Connection conn = DriverManager.getConnection(DB_URL,USERNAME,PASSWORD);

Step 4 Execute a Query To execute a query, we need to create an object of a type Statement for building and submitting an SQL statement to the database using createStatement() method of Connection type object.

Statement stmt = conn.createStatement( );

Thereafter, we need to execute the SQL statement using execute Query() method, which returns a ResultSet that contains the resultant dataset of the executed query.
E.g.,

Stri ng MyStri ng ;
MyString = “SELECT roll, name, age FROM STUDENT”;
ResultSet rs = stmt.executeQuery(MyString ) ;

It, however, the SQL statement is an UPDATE, INSERT or DELETE statement that you can execute SQL query using executeUpdate() method,
E.g.,

Statement stmt = conn.createStatement( );
String MyString;
MyString = “DELETE FROM STUDENT”;
ResultSet rs = stmt.executeUpdate(MyString );

Step 5 Extract Data from ResultSet Extraction of data is required, if we are fetching data from the database, using SQL SELECT query. We can use the appropriate ResultSet.get() method to retrieve the data from the desired resultset.
The ResultSet object provide several methods, some example of these methods include getlnt(), getLong(), getString(), getFloat(), getDate(), etc.
E.g.

int roll = rs.getInt(“roll”);
String name = rs.getString(“name” ) ;
int age = rs.getlnt(“age”);

Step 6 Clean up the Environment At last we have to clean the environment. For this purpose, we have to use the close( ) method to physically close all the database resources.

rs. close( );
stmt. close( );
conn.close( );

Question 17.
What will Class.forName do while loading Drivers?
Answer:
It is used to create an instance of a driver and register it with DriverManager. After loading the driver, DriverManager instance is available for making a connection with a DBMS.

Question 18.
Name the packages and classes that must be included as part of your java application for database connectivity to work. (HOTS)
Answer:

Package-java.sql
Classes-java.sql.Connection
java.sql.Statement
java.sql.ResultSet

Question 19.
Which command is used to import an entire package?
Answer:
To import the entire package the

“import java.sql.*;" command is used.

Question 20.
Name the class, which is working between the user and the drivers?
Answer:
The DriverManager class works between the user and drivers.

Question 21.
Name the various parameters required to open a JDBC connection.
Answer:
There are four parameters required to open a JDBC connection:

  • Database URL
  • JDBC driver
  • User Name
  • Password

Question 22.
Write a code to return the total number of rows in a ResultSet.
Answer:
Code to return the total number of rows in a ResultSet is given below:

String sql = “SELECT From Employees”;
ResultSet rs = stmt.execute Query
(sql );
rs.1ast ();
int r = rs.getRow( ) ;
JOptionPane.showMessageDialog
(null , " . ”+r);

Question 23.
Discuss the various methods of Resultset.
Answer:
When a database is connected and data fetched into it, a ResultSet is maintained. A ResultSet object maintains a cursor, which points to its current row of data.
(i) next( ) Moves the cursor in forwarding direction one row. If the cursor is in the last row, it will return false.
(ii) first() Moves the cursor to the first row in a ResultSet object. If the cursor is already present in the first row, it will return false.
(iii) last( ) Moves the cursor to the last row in the ResultSet object. If the cursor is already present in the last row, it will return false.
(iv) relative(int rows) Moves the cursor relatively, e.g. if the cursor is already present in the 4th row and we apply the relative(2), then it will place the cursor in the 6th row.
(v) absolute(int rno) Moves the cursor on the specified number of row, irrespective of the current cursor position.
(vi) getRow() Retrieve a specified number of rows from a ResultSet.

Question 24.
Write two examples of DML commands to SQL. (All India 2014C)
Answer:
Two examples of DML commands are:
SELECT, INSERT

Question 25.
When using the LIKE clause, which wildcard symbol represents any sequence of none, one or more characters? (All India 2014c)
Answer:
The % wildcard symbol is used in LIKE clause to represent any sequence of none, one or more characters.

Question 26.
Write the UPDATE statement in MySQL to increase commission by 100.00 in the “Commission” column in the ‘EMP’ table. (All India 2014C)
Answer:
UPDATE Emp
SET Commission = Commission +100;

Question 27.
Rewrite the following SQL statement after correcting the error(s). Underline the corrections made. (All India 2014C)

INSERT IN STUDENT(RNO, MARKS) 
VALUEC5, 78.5);

Answer:

INSERT INTO STUDENT (RNO, MARKS) 
VALUES (5, 78.5);

Question 28.
What happens when auto-commit is set on? (Delhi 2014)
Answer:
When AUTOCOMMIT is set on then we do not need to start a transaction explicity using a BEGIN command but every statement is treated as an independent transaction and will COMMIT automatically immediate after its completion.

Question 29.
Table ‘CLUB’ has 4 rows and 3 columns. Table ‘MEMBER’ has 2 rows and 5 columns. What will be the cardinality of the Cartesian product of them? (Delhi 2014)
Answer:
The cardinality of the cartesian product of Table ‘CLUB’ and Table ‘MEMBER’ = 8.

Question 30.
Distinguish between ALTER TABLE and UPDATE commands of MySQL. (All India 2014)
Answer:
ALTER TABLE command is a DDL (Data Definition Language) statement which is used to modify the table structure. On the other hand UPDATE command is a DML (Data Manipulation Language) statement which is used to modify the data stored in a table.

Question 31.
Mention two categories in which MySQL commands are broadly classified. (All India 2014)
Answer:
Two categories of Mysql commands are:

  • DDL (Data Definition Language)
  • DML (Data Manipulation Language)

Question 32.
Give two characteristics of Primary Key. (All India 2014)
Answer:
Two characteristics of Primary Key are:

  • All the values in the Primary Key field are unique.
  • Does not allow NULL values.

Question 33.
Write two examples of DBMS software. (Delhi 2014)
Answer:
Two examples of DBMS Software are:

Question 34.
Write SQL command to create a SAVEPOINT called All (Delhi 2013)
Answer:

Create Table CLASS (Rollno INTEGER, Name VARCHAR(20));
INSERT INTO CLASS(10, ‘CS’);
SAVEPOINT Al;

Question 35.
Define a foreign key with reference to RDBMS. (Delhi 2013)
Answer:
Foreign Key It is primary key of another table. It’s used to join two tables. Name of the foreign key and the primary key may or may not be same but their data type has to be same.

Question 36.
Write the command to display the list of existing databases. (Delhi 2012)
Answer:
The command to display list of existing databases are as follows:

Show databases;

Question 37.
Mr. William wants to remove all the rows from INVENTORY table to release the storage space, but he does not want to remove the structure of the table. What MySQL statement should be used? (Delhi 2012)
Answer:
The command to delete all rows from the Inventory table without deleting the structure of the table will be as follows:

DELETE FROM INVENTORY;

Question 38.
Write MySQL command to open an existing database. (All India 2012)
Answer:
The command to open an existing database is as follows:

USE database_name;

Question 39.
Give one difference between COMMIT and ROLLBACK commands used in MySQL. (HOTS; Delhi 2012; All India 2012)
Answer:
The COMMIT command is used to save the changes made during the execution of a transaction permanentely on the disk. After executing the COMMIT command, we cannot undo or cancel the changes made thereupon. Whereas the ROLLBACK command is used to undo the changes made during the execution of a transaction.

Question 40.
Write MySQL command, which will be used to open an already existing database “LIBRARY”. (All India 2012, Delhi 2011)
Answer:
The SQL command to open an already existing database LIBRARY will be as follows:

USE LIBRARY;

Question 41.
Differentiate between alternate key and candidate key (All India2011)
Answer:
The attribute or a combination of attributes that have unique values for each record known as candidate key whereas a candidate key that is not the primary key is known as an alternate key.

Question 42.
In MySQL Reena and Zebi are getting the following output of SELECT statement on a table EMPLOYEE (HOTS; Delhi2011c)

Which keyword has Zebi used with a select statement to get the above output?
Answer:
Zebi has used DISTINCT clause with the SELECT command.

Question 43.
Write MySQL command, which will open an already existing database “CONTACTS (Delhi 2011c)
Answer:
The SQL command to open an already existing database CONTACTS will be as follows:

Use CONTACTS;

Question 44.
Write SQL command used to display the structure of a table. (Delhi 2011c)
Answer:
The command to display the structure of a table is as follows:

DESCRIBE table_name; 
or DESC table_name;

Question 45.
Mr. lames created a table CLIENT with 2 rows and 4 columns. He added 2 more rows to it and deleted one column. What is the Cardinality and Degree of the Table CLIENT?
Answer:
Cardinality = 4
Degree = 3
Cardinality are the number of rows and degree is number of the columns in a table.

Question 46.
(i) If you have not executed the COMMIT command, executing which command will reverse all updates made during the current work session in MySQL?
(ii) What effect does SET AUTOCOMMIT have in transactions? (All India 2014C)
Answer:
(i) ROLLBACK command can only be used to undo transactions.
(ii) Autocommit simply means that each statement in its own transaction which commits immediately. When autocommit is set ON, the SET IMLICITTRANSACTION sets the connection to implicit transaction mode. When set OFF, it returns the connection to autocommit transaction mode.

Question 47.
A table FUN FOOD has 13 rows and 17 columns. What is the cardinality and degree of the table? (All India 2014)
Answer:
Cardinality of FUN FOOD = 13
Degree of FUN FOOD = 17

Question 48.
What happens when “ROLLBACK” command is issued in a transaction process? (All India 2014)
Answer:
When a ROLLBACK command is issued in a transaction process then all the progress made by a transaction process upto that point will be lost i.e. all the changes made by that transaction process are undone.

Question 49.
Gopi Krishna is using a table EMPLOYEE. It has the following columns:
Code, Name, Salary, Dept code He wants to display maximum salary Departmentwise.
He wrote the following command:

SELECT Dept code, Max(Salary)
FROM EMPLOYEE:

But he did not get desired result.
Rewrite the above query with necessary change to help him get the desired output. (Delhi 2014)
Answer:

SELECT Deptcode, Max(Salary)
FROM EMPLOYEE GROUP BY Deptcode;

Question 50.
What is the use of COMMIT statement in SQL? How is it different from ROLLBACK statement? (Delhi 2013C)
Answer:
The use of the COMMIT statement in MySQL is to end your current transaction and make all changes permanent performed in the transaction. ROLLBACK statement roll back the present transaction, which means canceling a transaction’s changes.

Question 51.
Name two categories into which SQL commands may be categorized. Also, give one example of SQL commands in each category. (Delhi 2012)
Answer:
The two categories of SQL commands are as follow:
(i) DDL DDL stands for Data Definition Language. The DDL commands are used to Create, Modify or Destroy the structure of the database objects,
E.g., CREATE TABLE, ALTER TABLE are of this category.

(ii) DML DML stands for Data Manipulation Language. The DML commands are used to insert, display, delete or change data in tables,
E.g.,
SELECT, INSERT, UPDATE, DELETE, etc., commands are of this category.

Question 52.
The Mname Column of a table Members is given below
Important Questions for Class 12 Informatics Practices Term 2 with Answers_50.1
Based on information, find the output of the following queries

(i) SELECT Mname FROM Members WHERE Mname ' “%v"; 
(ii) SELECT Mname FROM Members WHERE Mname LIKE "%e%"; (Delhi 2011)

Answer:
The output of given commands will be as follows
(i) Hirav, Rajeev
(ii) Sheetal, Rajeev.

Question 53.
What is the purpose of ALTER TABLE command in MySQL? How it is different from UPDATE commands? (All India 2011)
Answer:
The ALTER TABLE command is used to change the structure of an existing table. It can be used to add a new column, to change the size or type of a column or to remove a column from a table. But update commands cannot effect the table structure.

Question 54.
The Doc_name column of a table HOSPITAL is given below (All India 2011)
Important Questions for Class 12 Informatics Practices Term 2 with Answers_60.1
Based on information, find the output of the following queries

(i) SELECT Doc_name FROM HOSPITAL WHERE Doc_name LIKE ‘%v’;.
(ii) SELECT Doc_name FROM HOSPITAL WHERE Doc_name LIKE

Answer:
The output of given commands will be as follows:
(i) Sanjeev
(ii) Deepak, Sanjeev.

Question 55.
A table “TRAINS” in a database has degree 3 and cardinality 8. What is the number of rows and columns in it? (Delhi 2011; All India 2011)
Answer:
There will be 8 rows and 3 columns.

Question 56.
Sarthak, a student of class XI created a table “CLASS”. Grade is one of the column of this table. To find the details of students whose Grades have not been entered, he wrote the following MySQL query, which did not give the desired result

SELECT * FROM CLASS 
WHERE GRADE = "NULL”

Help Sarthak to run the query by removing the errors from the query and write the correct query. (Delhi 2011; All India 2011)
Answer:
The correct query is

SELECT * FROM CLASS.
WHERE GRADE IS NULL;

Question 57.
Anurag, a student of class XI created a table “PLAYER SCORE”. Current score is one of the column of this table. To find the details of players whose current score is more than 100, he wrote the following MySQL query, which did not give the desired result

SELECT * FROM PLAYER_SCORE
WHERE Current_score>“100”;

Help Anurag to run the query by removing the errors from the query and write the correct query. ‘
Answer:
As score is a numeric data type, so double quotes are not allowed.

SELECT * FROM PLAYER_SC0RE 
WHERE Current_Score > 100;

Question 58.
Differentiate between COMMIT and SAVEPOINT.
Answer:

S.No. Commit Save Point
1. Ends the current transaction Define the breakpoints for the transaction
2. No rollback after the commit Partial rollback is allowed up to the save point

Question 59.
Amit, a salesman in an Outlet, created a table TRANSACTIONS an Amount is one of the column of this Table. To find the details of customer whose transaction amount is more than 800, he wrote the following MySQL query, which did not give the desired result:

SELECT * FROM TRANSACTIONS 
WHERE Amount > “800”;

Help Amit to run the query by removing the errors from the query and write the correct query.
Answer:
Correct query is

SELECT * FROM TRANSACTIONS 
WHERE Amount > 800;

Question 60.
Anushka, a salesman in an Outlet, created a table, CUSTOMERS. PhoneNumber is one of the column of this table, which is character type. To find the details of customers whose PhoneNumber is 259624, she wrote the following MySQL query, which did not give the desired result:

SELECT * FROM CUSTOMERS 
WHERE PhoneNumber = 259624;

Help Anushka to run the query by removing the errors from the query and write the correct query.
Answer:
As PhoneNumber is character type so it must be enclosed in single quotes So, correct query is

SELECT * FROM CUSTOMERS 
WHERE PhoneNumber = ‘259624’;

Question 61.
Natasha, a salesgirl in an outlet, created table SUPPLIERS. PhoneNumber is one of the column of this table, which is numeric type. To find the details of customers whose number is 345941, she wrote the following MySQL query, which did not give the desired result:

SELECT * FROM SUPPLIERS 
WHERE PhoneNumber = “345941”;

Answer:
As PhoneNumber is numeric type so it should not be enclosed in double quotes. The correct query is

SELECT * FROM SUPPLIERS 
WHERE PhoneNumber = 345941;

Question 62.
Shammi, a student of class XII created a table FRIENDS. Pincode is one of the column of this table, which is character type. To find the details of friend whose pin code number is 262122, he wrote the following MySQL query, which did not give desired result:

SELECT * FROM FRIENDS 
WHERE PinCode = 262122;

Help Shammi to run the query by removing the errors from the query and write the correct query.
Answer:
The correct query is

SELECT * FROM FRIENDS 
WHERE PinCode = ‘262122’;

Question 64.
In a database BANK, there are two tables with a sample data given below
TABLE EMPLOYEE
Important Questions for Class 12 Informatics Practices Term 2 with Answers_70.1
TABLE DEPARTMENT
Important Questions for Class 12 Informatics Practices Term 2 with Answers_80.1
Note:
– EName refers to Employee Name
– DName refers to Department Name
– Dept refers to Department Code
– HOD refers to Employee number (ENO) of the Head of the Department
Write SQL queries for the following:
(i) To display ENo, EName, Salary and corresponding DName of all the employees whose age is between 25 and 35 (both values inclusive).
(ii) To display DName and corresponding EName from the tables DEPARTMENT and EMPLOYEE, (Hint’ HOD of the DEPARTMENT table should be matched with ENo of the EMPLOYEE table for getting the desired result).
(iii) To display EName, Salary, Zone and Income Tax
(Note Income Tax to be calculated as 30% of salary) of all the employees with appropriate column headings. (HOTS; Delhi 2013)
Answer:

(i) SELECT e.ENo,e.EName,e.Salary,d.DName
FROM EMPLOYEE e, DEPARTMENT d 
WHERE e.Dept = d.Dept AND e.Age BETWEEN 25 AND 35;
(ii) SELECT e.EName,d.DName
FROM EMPLOYEE e, DEPARTMENT d 
WHERE e.ENO = d.HOD;
(iii) SELECT EName, Zone, Salary x 0.3 
“Income Tax” FROM EMPLOYEE;

Question 65.
TABLE ITEM
Important Questions for Class 12 Informatics Practices Term 2 with Answers_90.1
TABLE BRAND
Important Questions for Class 12 Informatics Practices Term 2 with Answers_100.1
Write MySQL queries for the following
(i) To display ltem_Code, ltem_Name and corresponding Brand_Name of those items, whose Price is between 20000 and 40000 (both values included).
(ii) To display ltem_Code, Price and Brand_Name of the item which has ltem_Name as “Computer”.
(iii) To increase the prices of all the items by 10%.
Answer:

(i) SELECT i. Item_Code,i. Item_Name,
b.Brand_Name FROM ITEM i, BRAND b 
WHERE i .Item_Code = b.Item_code AND 
i.Price BETWEEN 20000 AND 40000;
(ii) SELECT i.Item_Code, Price, 
b.Brand_Name
FROM ITEM i, BRAND b
WHERE i. Item_Code = b. Item_Code
AND i. Item_Name = ‘Computer’;
(iii) UPDATE ITEM
SET Price = Price + (Price*0.1);

Question 66.
TABLE ITEM
Important Questions for Class 12 Informatics Practices Term 2 with Answers_110.1
TABLE CUSTOMER
Important Questions for Class 12 Informatics Practices Term 2 with Answers_120.1
Write MySQL queries for the following:
(i) To display the details of Item, whose Price is in the range of 40 and 95 (both values included).
(ii) To display CustomerName, City from table CUSTOMER and ItemName and Price from table ITEM, with their corresponding matching ID.
(iii) To increase the prices of all the Items by 50%. (Delhi 2011)
Answer:

(i) SELECT * FROM ITEM
WHERE Price BETWEEN 40 AND 95;
(ii) SELECT CUSTOMER. CustomerName, 
CUSTOMER.City, ITEM.Item_Name,
ITEM.Price
FROM ITEM, CUSTOMER 
WHERE ITEM.ID = CUSTOMER.ID;
(iii) UPDATE ITEM SET Price = Price +
Price * 0.50;

Question 68.
Create table CUSTOMER as per following Table Instance Chart
Important Questions for Class 12 Informatics Practices Term 2 with Answers_130.1
Answer:
The SQL command to create a table as per given structure is as follows:

CREATE TABLE CUSTOMER
(Cust ID INTEGER,
Cust_Name VARCHAR(30),
Cust_Add VARCHAR(20),
Pincode INTEGER,
Cust_Phone VARCHARC10));

Question 69.
Create table STUDENT as per following Table Instance Chart
Important Questions for Class 12 Informatics Practices Term 2 with Answers_140.1
Answer:
The SQL command to create a table as per given structure is as follows:

CREATE TABLE STUDENT
(RolI_No INTEGER,
Name VARCHAR(30),
Address VARCHAR(20),
Pincode INTEGER,
Phone VARCHAR!10));

Question 70.
Write an SQL query to create a table STUDENT with the following structure
Important Questions for Class 12 Informatics Practices Term 2 with Answers_150.1
Answer:
The SQL command to create a table as per given structure is as follows:

CREATE TABLE STUDENT
(Roll_Number INTEGER,
Name VARCHAR(20),
Stream VARCHAR(IO),
Date_of_Admission Date);

Question 71.
Write an SQL query to create a table CUSTOMER with the following structure
Important Questions for Class 12 Informatics Practices Term 2 with Answers_160.1
Answer:
The SQL command to create a table as per given structure is as follows:

CREATE TABLE CUSTOMER
(Cust_ID INTEGER,
Cust_Name VARCHAR(20),
Address VARCHAR(20),
Balance DECIMAL);

Question 72.
Write an SQL query to create a table TEACHER with the following structure
Important Questions for Class 12 Informatics Practices Term 2 with Answers_170.1
Answer:
The SQL command to create a table as per given structure is as follows:

CREATE TABLE TEACHER
(Teacher_ID INTEGER,
Teacher_Name VARCHAR(20), 
Qualification VARCHAR(20), 
Date_of_Appointment DATE);

Question 73.
Write an SQL query to create a table ITEM with the following structure
Important Questions for Class 12 Informatics Practices Term 2 with Answers_180.1
Answer:
The SQL command to create a table as per given structure is as follows:

CREATE TABLE ITEM
(Item_Code INTEGER,
Item_Name VARCHAR(20),
Unit_Price DECIMAL,
Qty_in_Stock INTEGER);

Question 74.
Write an SQL query to create a table ACCOUNTS with the following structure
Important Questions for Class 12 Informatics Practices Term 2 with Answers_190.1
Answer:
The SQL command to create a table as per given structure is as follows:

CREATE TABLE ACCOUNTS
(Trans_Date DATE,
Particulars VARCHAR(20),
Debit DECIMAL,
Credit DECIMAL);

Question 75.
Write an SQL query to create a table LIBRARY with the following structure
Important Questions for Class 12 Informatics Practices Term 2 with Answers_200.1
Answer:
The SQL command to create a table as per given structure is as follows:

CREATE TABLE LIBRARY
(Book_No INTEGER,
Book_name VARCHAR!20),
Category VARCHAR(20),
Price DECIMAL,
Qty INTEGER);

Question 76.
Write an SQL query to create a table LAB with the following structure
Important Questions for Class 12 Informatics Practices Term 2 with Answers_210.1
Answer:
The SQL command to create a table as per given structure is as follows:

CREATE TABLE LAB
(App ID INTEGER,
App_name VARCHAR (20),
Description VARCHAR(20),
Price DECIMAL,
Qty INTEGER);

Important Questions for Class 12 Informatics Practices Term 2: Introduction to Computer Networks

Question 1.
Why is a switch called an intelligent hub? (All India 2014, Delhi 2012C)
Answer:
A switch is called an intelligent hub because before simply forwarding a packet it checks for the intended destination for the packet and forwards it to that destination only, this is called packet filtering. While a hub forwards a packet to all the workstations in a network but only destination computer keeps it, rest all the computers drops that packet.

Question 2.
What is the use of Repeater in a network? (All India 2014)
Answer:
In a network, repeater receives a weak signal coming from a source an amplifies it to its original strength and then again forwards it to the destination. Basically, repeater is used in a network so that a signal can travel longer distances.

Question 3.
State two advantages of networking computers instead of having standalone computers. (Delhi 2014)
Answer:
The two advantages of networking computers instead of standalone computers are:

  • Communicating with each other becomes easier.
  • Shared resources.

Question 4.
What is the purpose of switch in a network? (Delhi 2014)
Answer:
A switch is a networking device which is used to connect different LAN segments of a network. A switch also supports packet filtering and forwarding between LAN segments.

Question 5.
Expand
(i) 0DF
(ii) HTTP (All India 2014C)
Answer:
(i) Open Distributed Processing
(ii) HyperText Transfer Protocol

Question 6.
How is a Trojan Horse harmful to a network? (All India 2014C)
Answer:
Trojan horse like a virus or worm. At the backend, these perform some malicious activities like upload (send) some security files and information from the computer and at the same time download some unwanted files onto the computer.

Question 7.
Write one advantage each of star and bus topology used in networking. (All India 2014C)
Answer:
Advantage of star topology is that it is most reliable as there is a direct connection of every node with the central node or server.
Advantage of bus topology is that all nodes are connected through a single length of a cable so very short cable langth is used.

Question 8.
Write the name of the most suitable wireless communication channels for each of the following situations.
(i) Communication between two offices in two different countries.
(ii) To transfer the data from one mobile phone to another. (Delhi 2013)
Answer:
(i) Satellite Communication
(ii) Bluetooth or infrared whichever is supported by the phone.

Question 9.
Mr. Chandervardhan is not able to identify the Domain Name in the given URL. Identify and write it for him.
http.//www.cbsenic.in/aboutus.htm (HOTS, Delhi 2013)
Answer:
Domain in http://www.cbsenic.in/aboutus.htm is “www.cbsenic.in”.

Question 10.
Gyan Deep International School is planning to connect all computers, each spread over a distance within 40 m. Suggest an economical cable type having high-speed data transfer, which can be used to connect these computers. (Delhi 2012)
Answer:
The economical cable with high-speed data transfer can be co-axial cable.

Question 11.
Name any two most popularly used search engines. (Delhi 2012; All India 2012)
Answer:
Two most popular search engines are google and grotel.

(url:http://www.google.com and http://grotel.com)

Question 12.
Raj Kamal International School is planning to connect all computers, each spread over distance within 45 m. Suggest an economical cable type having high speed data transfer, which can be used to connect these computers. (All India 2012)
Answer:
The economical cable with high speed data transfer can be co-axial cable.

Question 13.
Which communication channel is suitable when very fast communication between two offices in two different countries is required? (Delhi 2012c)
Answer:
For very fast communication between two countries, satellite communication is suitable.

Question 14.
Given below two addresses
(i) 59.177.134.72
(ii) http://www.ccc.nic.in/welcome.htm
Identify which one of the above is an IP address and which one is a URL? (Delhi 2012c,• HOTS)
Answer:
(i) IP Address 59.177.134.72
(ii) URL http://www.ccc.nic.in/welcome.htm

Question 15.
Mr. Taufiq Ahmad wants to prevent unauthorised access to/from his company’s local area network. Write the name of system (software/hardware), which he should install.
(Delhi 2011)
Answer:
He should install firewall system to prevent unauthorised access.

Question 16.
Beauty Lines Fashion Inc. is a fashion company with design unit and market unit 135 m away from each other. The company recently connected their LANs using Ethernet cable to share the stock related information. But after joining their LANs, they are not able to share the information due to loss of signal in between. Which device out of the following should you suggest to be installed for a smooth communication?
(i) UPS
(ii)Modem
(iii) Repeater (Delhi 2011)
Answer:
(iii) Repeater.

Question 17.
Which of the following is not a feature of networking?
(i) Resource sharing
(ii) Uninterrupted Power Supply (UPS)
(iii) Reduced cost
(iv) Reliability (Delhi 2011; All India 2011; HOTS)
Answer:
(ii) Uninterrupted Power Supply (UPS).

Question 18.
Mr. Kant Sen Gupta wants to prevent unauthorised access to/from his company’s local area network. Write the name of a system (software/hardware), which he should install to do the same. (All India 2011)
Answer:
Mr. Kant should install firewall system to prevent unauthorised access.

Question 19.
Seven Brothers Fashion Inc. is a fashion company with design and market unit 130 m away from each other. The company recently connected their LANs using Ethernet cable to share stock related information. But after joining the LAN, they are not able to share the information due to loss of signal in between. Which device out of the following should you suggest to be installed for smooth communication?
(i) Modem
(ii) Repeater
(iii) UPS (All India 2011)
Answer:
(ii) Repeater

Question 20.
What is the difference between star topology and bus topology of network? (Delhi 2009; HOTS)
Answer:
In star topology, all nodes are directly connected with the central node or server, whereas in bus topology, there is a single length of transmission medium (usually co-axial cable), on which various nodes are attached and the server can be any where in this transmission cable. Both ends of the cable are closed by a terminator.

Question 21.
What is a protocol? Which protocol is used to search information from Internet using an Internet browser? (Delhi2009)
OR
What is a protocol? Which protocol is used to copy a file from/to a remotely located server? (All India 2009)
Answer:
Protocol refers to the rules which are applicable for a network. These protocols define the standardised format for data packets to be transmitted over the network, techniques for detecting errors and correcting them etc.
The protocol used to search the information from Internet using browser is HyperText Transfer Protocol (HTTP).

Question 22.
What is the difference between LAN and WAN? (All India 2009)
Answer:
A Local Area Network (LAN) is a network which is spread over a small area such as a school, office or factory. Whereas a Wide Area Network (WAN) is a network which is spread over entire world. A Wide Area Network can include a group of . LANs connected together.

Question 23.
Expand the following abbreviations
(i) HTTP
(ii) ARPANET (All India 2009)
Answer:
(i) HyperText Transfer Protocol.
(ii) Advanced Research Project Agency Network.

Question 24.
How are co-axial cable different from optical fiber? (Delhi 2008; HOTS)
Answer:
A coaxial cable consists of a solid core wire surrounded by foil or wire shield each separated by some plastic insulator. The inner core wire carries the signals and the outer wire shield provides the ground.

Whereas an optical fiber consists of a thin glass or plastic strands, which are capable of carrying light signals from a source at one end to another end.

Question 25.
What is a modem? (All India 2008)
Answer:
Modem stands for Modulator/Demodulator which converts analog signals into digital signals and vice-versa. It is used to connect the computers and transmit data using telephone lines.

Question 26.
How is a hacker different from a cracker? (All India 2008)
Answer:
A hacker is a person who is interested in gaining knowledge about the computer system and gaining unauthorised access to computer systems for playful pranks. Whereas crackers are the programmers with malicious mentality who break into secured system for the purpose of stealing and corrupting data.

Question 27.
What is the significance of cyberlaw?
Answer:
Cyber law is related to all legal and regulatory aspects of Internet and the world wide web. Anything concerned with or emanating from any legal aspects among the users of Internet and other people in cyberspace comes within the ambit of cyber law. Cyber law works as a regulatory mechanism for the electronic commerce.

Question 28.
Write one advantage of star topology as compared to bus topology.
Answer:
In star topology, there is direct connection of each node with the server, so whenever there is a communication problem with one node, other nodes are not affected.

Whereas in bus topology, all nodes are connected through a single length of line so whenever there is communication problem any where in the network entire network stops functioning.

Question 29.
Name two transmission media for networking.
Answer:
Two transmission media of networking are as follows:
(i) Co-axial cable
(ii) Optical fibre.

Question 30.
Differentiate between hacker and cracker.
Answer:
A hacker is a person who is interested in gaining knowledge about the computer system and gaining unauthorised access to computer systems for playful pranks. Whereas crackers are the programmers with malicious mentality who break into secured system for the purpose of stealing and corrupting data.

Question 31.
Compare optical fiber and co-axial transmission media.
Answer:
A coaxial cable consists of a solid core wire surrounded by foil or wire shield each separated by some plastic insulator. The inner core wire carries the signals and the outer wire shield provides the ground.

Whereas an optical fibre consists of a thin glass or plastic strands, which are capable of carrying light signals from a source at one end to another end.

Question 32.
Expand the following terminologies
(i) HTML
(ii) GSM
Answer:
(i) HyperText Markup Language.
(ii) Global System for Mobile Communication.

Question 33.
What do you understand by the terms cookies and firewall?
Answer:
The firewall is a system designed to prevent the unauthorised access to or from a private network. The firewall can be implemented in the form of software or hardware or a combination of both.

Cookies also known as browser cookies or tracking cookies, cookies are small often encrypted text files, located in browser directories. Cookies are created when a user’s browser loads a particular website. The website sends information to the browser which then creates a text file.

Question 34.
Write two advantages and two disadvantages of star topology.
Answer:
Advantages of star topology
(i) The star topology is the most reliable as there is a direct connection of every node in the network with the central node of the server.
(ii) In case, there is any problem in connection with any node, other nodes in the network are not affected.
Disadvantages of star topology
(i) Since, every node is directly connected with the central node or server, so a large quantity of cable is required.
(ii) There is dependency on the central node. If there are some problems with the central node, entire network stops functioning.

Question 35.
Write one difference between co-axial cable and optical fiber cable.
Answer:
A coaxial cable consists of a solid core wire surrounded by foil or wire shield each separated by some plastic insulator. The inner core wire carries the signals and the outer wire shield provides the ground.

Whereas an optical fiber consists of a thin glass or plastic strands, which are capable of carrying light signals from a source at one end to another end.

Question 36.
What do you understand by the term E-mail and SMS?
Answer:
E-Mail
E-mail stands for Electronic Mail. It is a text message that may contain files, images or other attachment sent through a network to a specified individual or group of individuals. Some early e-mail systems required that the sender and the recipient both be online at the same time, in common with instant messaging. Today’s e-mail systems are based on a store and forward model. E-mail servers accept, forward, deliver and store messages.

Neither the user nor their computers are required to be online simultaneously; they need to connect an e-mail server, for as long as it takes to send or receive messages. Interaction between e-mail server and clients are governed by e-mail protocol. The two most common e-mail protocols are POP3 and SMTP.

SMS
SMS stands for Short Message Service. Short text messages are transmitted to and from a mobile phone, fax machine, etc. Message must not be longer than 160 alpha-numeric characters and may also contain images or graphics. Once a message is sent, it is received by a Short Message Service Centre (SMSC), which must get to the appropriate mobile device. To do this, the SMSC sends a SMS request to Home Location Register (HLR) to find the roaming customer. Once the HLR receives the request, it will respond to the SMSC with the subscriber’s status

  • Inactive or active.
  • Where subscriber is in roaming.

If the response is ‘inactive’, then the SMSC will hold on to the message for a period of time. When the subscriber access his device, the HLR sends a SMS notification to the SMSC and the SMSC will attempt delivery.

The system pages the device and if it responds, the message gets delivered. The SMSC receives a verification, that the message was received by the end user, then it is categorised as, send message and will not attempt to send again.

Question 37.
Identify the following devices:
(i) Devices that are used to connect different types of networks. It performs the necessary translation so that the connected networks can communicate properly.
(ii) A device that converts data from digital bit stream into an analog signal and vice-versa. (All India 2014)
Answer:
(i) Router
(ii) Modem

Question 38.
Write one advantage and one disadvantage of using optical fiber cable. (All India 2014)
Answer:
Advantage of using optical fiber cable It is immune to electrical and magnetic interference i.e. noise in any form because the information travels on a modulated light beam. Disadvantage of using optical fiber cable Connecting either two fibers together or a light source to a fiber is a difficult process.

Question 39.
Identify the following devices:
(i) An intelligent device that connects several nodes to form a network and redirects the received information only to intended node(s).
(ii) A device that regenerates (amplifies) the received signal and re-transmits it to its destination. (Delhi 2014)
Answer:
(i) Switch
(ii) Repeater

Question 40.
What is the name of the network topology in which each node is connected independently using a switch? (Delhi 2014)
Answer:
Star topology

Question 41.
What is meant by “Denial of Service” with reference to Internet service? (Delhi 2014)
Answer:
Denial of Service It is a type of attack in which a machine or network resource is made unavailable to the intended users. DOS attacks generally do not allow the attacker to access or modify information on the computer system or in the physical world.
The different forms of Denial of Service attacks are as follows:

  • Denial of Access to Information
  • Deinal of Access to Communications
  • Deinal of Access to Systems
  • Deinal of Access to Applications

Question 42.
List two measures to secure a computer network? (All India 2014C)
Answer:
1. Denial of Service (DOS)
A denial of service attack refers to an attempt to make computer resources unavailable to the intended users. Generally, it consists of the effort of a person or a group of persons to prevent an Internet site or service from functioning efficiently or completely. It may be temporarily or infinitely.

One of the common methods of denial of service attack is to saturate the target machine with external communication requests, in such a way that either the machine can not respond properly or respond slowly that is would not send services effectively.

2. Intrusion Problem
The intrusion problem refers to the malicious activities or policy violation performed on a computer system. The main motive of intrusion is to tress vital information and essential data. Such type of activities are performed by the people having malicious mentality.

  • Intrusion Detection System It is a device or software application that monitors the network for malicious activities. The intrusion detection and prevention system is primarily focused on identifying possible incidents, logging information and reporting attempts.
  • Snooping It refers to unauthorised opening of files or accessing data, e-mail, etc. Snooping may include monitoring and tracing of keystrokes pressed, capturing the passwords and login information, etc.
  • Eavesdropping It is identical to snooping. When there is intentional interception of other data such as e-mail, login-id, credit card information, password, etc., then it is said to be eavesdropping. In other words, when someone listens or intercepts others data secretly, then it is said to be eavesdropping.

Question 43.
What do you understand by Network Security? Name two common threats to it. (Delhi 2013)
Answer:
Network security is needed to protect data during its transmission and to guarantee that data transmission is authentic.
Two common threats are:

  • Intrusion Problem.
  • Denial of Service Attacks.

Question 44.
Write one advantage of star topology over bus topology and one advantage of bus topology over star topology. (Delhi 2013)
Answer:
Advantage of star topology over bus topology The star topology is the most reliable as there is a direct connection of every node in the network with the central node, so any problem in any node will affect the particular node only.

Advantage of bus topology over star topology Extension of network is very easy in bus topology, we can connect new node along its length.

Question 45.
What is MAC address? What is the difference between MAC address and an IP address? (Delhi 2013)
Answer:
MAC Address A MAC address is an essentially unique number associated with a network card in a machine. It serves as a convenient way to distinguish between two different computers. A MAC address consists of 48 bits, usually represented as a string of 12 hexadecimal digits (0 to 9, a to f or A to F); these are often grouped into pairs separated by colons or dashes, e.g. the Mac address 001B638445E6 may be given as 00:1 b:63:84:45:e6 or as 00-1B-63-84-45-E6.

IP Address Computers on the Internet need to find one another in order to communicate. Each computer, therefore, has a unique identifying number known as an IP address. Examples of IP address are 22.231.113.64 or 194.66.82.11. An IP address always has four numbers separated by dots. Each number has a value of 0 to 255.

Question 46.
Identify domain name and URL from the following: (Delhi 2012)

http://www.he1 pingeachother.1n/home/aboutus.htm

Answer:
Domain Name

www.helpingeachother. in

URL Name.

http://www.helpingeachother.in/home/ aboutus.htm

Question 47.
Give a suitable example of URL and domain name. (All India 2012)
Answer:
Domain Name

www.cbse.nic.in

URL Name

http://www.cbse.nic.in/welcome.htm

Question 48.
Give one advantage and one disadvantage of using star topology over bus topology. (Delhi 2012)
Answer:
One advantage of star topology over bus topology is that in star topology there is separate connection between the server and individual devices. That’s why failure of one node does not affect the rest of network, whereas in bus topology all the nodes are connected over a single line. Due to this, if there is a problem in communication anywhere in the network with any node, the entire network will stop functioning.

Question 49.
Give an advantage of using star topology over bus topology. Show a network layout of star topology to connect 5 computers. (All India 2012)
Answer:
Advantage of star topology over bus topology The star topology is the most reliable as there is a direct connection of every node in the network with the central node, so any problem in any node will affect the particular node only.

Advantage of bus topology over star topology Extension of network is very easy in bus topology, we can connect new node along its length.

The network layout to show a connection of five computers using star topology is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_220.1

Question 50.
Mr. Kavye Shastri, General Manager of Unit Nations corporate recently discovered that the communication between his company’s accounts office and HR office is extremely slow and signals drop quite frequently. These offices are 120 m away from each other and connected by an Ethernet cable.
(i) Suggest him a device which can be installed in between the offices for smooth communication.
(ii) What type of network is formed by having this kind of connectivity out of LAN, MAN and WAN? (Delhi 2012)
Answer:
(i) The device that can be installed between the office for smooth communication is repeater.
(ii) The type of network is Local Area Network (LAN).

Question 51.
Ms. Rani sen, General Manager of Global Nations corporate recently discovered that the communication between her company’s accounts office and HR office is extremely slow and signal drop quite frequently. These offices are 125 m away from each other and connected by Ethernet cable.
(i) Suggest her a device, which can be installed in between the offices for smooth communication.
(ii) What type of network is formed by having this kind of connectivity out of LAN, MAN and WAN? (All India 2012)
Answer:
(i) The device that can be installed between the office for smooth communication is repeater.
(ii) The type of network is Local Area Network (LAN).

Question 52.
Expand the following abbreviations
(i) GSM
(ii) CDMA (Delhi 2009)
Answer:
(i) Global System for Mobile Communication
(ii) Code Division Multiple Access

Question 53.
Expand the following terms with respect to networking
(i) MODEM
(ii) WLL
(iii) FTP
(iv) TCP/IP (Delhi 2008)
Answer:
(i) Modulator-Demodulator
(ii) Wireless in Local Loop
(iii) File Transfer Protocol
(iv) Transmission Control Protocol/Internet Protocol.

Question 54.
Expand the following terms with respect to networking
(i) PPP
(ii) GSM
(iii) XML
(iv) HTTP
Answer:
(i) Point-to-Point Protocol
(ii) Global System for Mobile Communication
(iii) extensible Markup Language
(iv) HyperText Transfer Protocol.

Question 55.
Expand the following terms with respect to networking
(i) CDMA
(ii) FTP
(iii) WLL
(iv) HTML
Answer:
(i) Code Division Multiple Access
(ii) File Transfer Protocol
(iii) Wireless in Local Loop
(iv) HyperText Markup Language.

Question 56.
Expand the following terms with respect to networking
(i) XML
(ii)WWW
(iii) WLL
(iv) TCP/IP
Answer:
(i) extensible Markup Language
(ii) World Wide Web
(iii) Wireless in Local Loop
(iv) Transmission Control Protocol/Internet Protocol.

Question 57.
Expand the following terms
(i) CDMA
(ii) URL
(iii) HTTP
(iv) WAN
Answer:
(i) Code Division Multiple Access
(ii) Uniform Resource Locator
(iii) HyperText Transfer Protocol
(iv) Wide Area Network.

Question 58.
Expand the following terms
(i) XML
(ii) GSM
(iii) SMS
(iv) MAN
Answer:
(i) extensible Markup Language
(ii) Global System for Mobile Communication
(iii) Short Message Service
(iv) Metropolitan Area Network.

Question 59.
Expand the following terminologies
(i) TCP/IP
(ii) XML
(iii) CDMA
(iv) WLL
Answer:
(i) Transmission Control Protocol/Internet Protocol
(ii) extensible Markup Language
(iii) Code Division Multiple Access
(iv) Wireless in Local Loop.

Question 60.
Freshminds University of India is starting its first campus Anna Nagar of South India with its centre admission office in Kolkata. The university has three major blocks comprising of Office Block, Science Block and Commerce Block in the 5 km area campus.

As a network expert, you need to suggest the network plan as per (i) to (iv) to the authorities keeping in mind the distance and other given parameters.
Important Questions for Class 12 Informatics Practices Term 2 with Answers_230.1
Expected wire distances between various locations:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_240.1
Expected number of computers to installed at various locations in the university are as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_250.1
(i) Suggest the authorities, the cable layout amongst various blocks inside university campus for connecting the blocks.
(ii) Suggest the most suitable place (i.e. block) to house the server of this university with a suitable reason.
(iii) Suggest an efficient device from the following to be installed in each of the blocks to connect all the computers.
(a) Switch
(b) Modem
(c) Gateway
(iv) Suggest the most suitable (very high speed) service to provide data connectivity between Admission Office located in Anna Nagar from the following options:
(a) Telephone lines
(b) Fixed line dial-up connection
(c) Co-axial cable network
(d) GSM
(e) Leased lines
(f) Satellite connection (Delhi 2009)
Answer:
(i) The suggested cable layout amongst various blocks inside university campus for connecting the blocks will be as follow:
Using Star Network:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_260.1
Using Bus Network:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_270.1
(ii) The most suitable place (i.e. block) to house the server of this university is Science Block, because in this block there are maximum number of computer and according to 80-20 rule 80% of traffic should be local.
(iii) The efficient device to be installed in each of the blocks to connect all the computers is switch.
(iv) For very high-speed connectivity between Admission office located in Kolkata and the campus office in Anna Nagar is satellite connection.

Question 61.
Eduminds University of India is starting its first campus in a small town Parampur of central India with its centre admission office in Delhi. The university has three major buildings comprising of Admin Building, Academic Building and Research Building in the 5 km area campus. As a network expert, you need to suggest the network plan as per (i) to (iv) to the authorities keeping in mind the distances and other given parameters.
Important Questions for Class 12 Informatics Practices Term 2 with Answers_280.1
Expected wire distances between various locations:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_290.1
Expected number of computers to be installed at various locations in the university are as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_300.1
(i) Suggest the authorities, the cable layout amongst various buildings inside the university campus for connecting the building.
(ii) Suggest the most suitable place (i.e. building) to house the server of this organisation, with a suitable reason.
(iii) Suggest an efficient device from the following to be installed in each of the buildings to connect all computers.
(a) Gateway
(b) Modem
(c) Switch
(iv) Suggest the most suitable (very high speed) service to provide data connectivity between Admission Building located in Delhi and the campus located in Parampur from the following options:
(a) Telephone line
(b) Fixed line dial-up connection
(c) Co-axial cable network
(d) GSM
(e) Leased line
(f) Satellite connection. (All India 2009; HOTS)
Answer:
(i) The suggested cable layout is as follows: Using Bus/Star Network
Important Questions for Class 12 Informatics Practices Term 2 with Answers_310.1
(ii) The most suitable place (i.e. block) to house the server of this university is Academic Block, because there are maximum number of computers in this block and according to 80-20 rule 80% of traffic in a network should be local.
(iii) The efficient device to be installed in each of the blocks to connect all the computers is switch.
(iv) For very high-speed connectivity between Admission Building located in Delhi and campus located in Parampur is satellite connection.

Question 62.
Bias Methodologies is planning to expand their network in India starting with three cities in India to build infrastructure for research and development of their chemical products. The company has planned to setup their main office in Pondicherry at three different locations and have named their offices as Back Office, Research Lab and Development Unit. The company has one more research office namely Corporate Unit in Mumbai. A rough layout of the same is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_320.1
Approximate distance between these offices is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_330.1
In continuation of the above, the company experts have planned to install the following number of computers in each of these offices.
Important Questions for Class 12 Informatics Practices Term 2 with Answers_340.1
(i) Suggest the kind of network required (out of LAN, MAN, WAN) for connection each of the following office unit
(a) Research Lab and Back Office
(b) Research Lab and Development Unit
(ii) Which of the following devices will you suggest for connecting all the computers with each of their office units?
(a) Switch/Hub
(b) Modem
(c) Telephone
(iii) Which of the following communication media, will you suggest to be procured by the company for connecting their local office units in Pondicherry for very effective (high speed) communications?
(a) Telephone cable
(b) Optical fiber
(c) Ethernet cable
(iv) Suggest a cable/wiring layout for connecting the company’s local office units located in Pondicherry. Also, suggest an effective method/technology for connecting the company’s office located in Mumbai. (Delhi 2008)
Answer:
(i) The type of network between the Research Lab and the Back Office is LAN (Local Area Network). The type of network between Research Lab and Development Unit is MAN (Metropolitan Area Network).
(ii) The suitable device for connecting all the computers within each of their office units is switch/hub.
(iii) For connecting the local office units in Pondicherry for very effective (high speed) communication is optical fiber.
(iv) The cable/wiring layout for connection is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_350.1

Question 63.
China Middleton Fashion is planning to expand their network in India, starting with two cities to provide infrastructure for distribution of their products. The company has planned to setup their main office in Chennai at three different locations and have named their offices as Production Unit, Finance Unit and Media Unit. The company has its Corporate Unit in Delhi.
A rough layout of the same is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_360.1
Approximate distance follows: between these units is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_370.1
In continuation of the above, the company experts have planned to install the following number of computers in each of their offices
Important Questions for Class 12 Informatics Practices Term 2 with Answers_380.1
(i) Suggest the kind of network required (out of LAN, MAN, WAN) for each of the following units:
(a) Production Unit and Media Unit
(b) Production Unit and Finance Unit
(ii) Which of the following devices will you suggest for connecting all computers with each of their office units?
(a) Switch/Hub
(b) Modem
(c) Telephone
(iii) Which of the following communication media, will you suggest to be procured by the company for connecting their local office units in Chennai for very effective (high speed) communication?
(a) Telephone cable
(b) Optical fiber
(c) Ethernet cable
(iv) Suggest a cable/wiring layout for connecting the company’s local office units located in Chennai.
Also, suggest an effective method/technology for connecting the company’s office unit located in Delhi. (All India 2008)
Answer:
(i) The type of network between the Production Unit and Media Unit is MAN (Metropolitan Area Network). The type of network between Production Unit and Finance Unit is LAN (Local Area Network).
(ii) The suitable device for connecting all the computers within each of their office units is switch/hub.
(iii) For connecting the local office units in Chennai for very effective (high speed) communication is optical fiber.
(iv) The cable/wiring layout for connection is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_390.1

Question 64.
Bhartiya Connectivity Association is planning to spread their offices in four major cities of India to provide regional IT infrastructure support in the field of education and culture. The company has planned to setup their head office in New Delhi in three locations and have named their New Delhi offices as Front Office, Back Office and Work Office. The company has three more regional offices as three major cities of India. A rough layout of the same is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_400.1
Approximate distances between these offices as per network survey team is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_410.1
In continuation of the above, the company experts have planned to install the following number of computers in each of their offices:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_420.1
(i) Suggest the network type (out of LAN, MAN, WAN) for connecting each of the following set of the their offices:
(a) Back Office and Work Office
(b) Back Office and South Office
(ii) Which device will you suggest to be procured by the company for connecting all the computers with each of their offices out of the following devices?
(a) Switch/Flub
(b) Modem
(c) Telephone South Office, East Office and West Office located in other
(iii) Which of the following communication medium will you suggest to be procured by the company for connecting their local offices in New Delhi for very effective and fast communication?
(a) Telephone cable
(b) Optical fiber
(c) Ethernet cable
(iv) Suggest the cable/wiring layout for connecting the company’s local offices located in New Delhi. Also, suggest an effective method for connecting the company’s regional offices East Office, West Office and South Office with offices located in New Delhi.
Answer:
(i) The type of network between the Back Office and the Work Office is LAN (Local Area Network). The type of network between the Back Office and the South Office is WAN (Wide Area Network).
(ii) The suitable device for connecting all the computers in each of their offices is switch/hub.
(iii) For connecting local offices in New Delhi for very effective and fast communication is optical fiber.
(iv) The suggested layout for connection is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_430.1
For connecting the regional offices satellite communication is effective technology.

Question 65.
Hindustan Connecting World Association is planning to start their offices in four major cities in India to provide regional IT infrastructure support in the field of education and culture. The company has planned to setup their head office in New Delhi in three different locations and have named their New Delhi offices as Sales Office, Head Office and Tech Office. The company’s regional offices are located at Coimbatore, Kolkata and Ahmedabad.
A rough layout of the same is as follow:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_440.1
Approximate distances between these offices as per network survey team is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_450.1
In continuation of the above, the company experts have planned to install the following number of computers in each of their offices.
Important Questions for Class 12 Informatics Practices Term 2 with Answers_460.1
(i) Suggest the network type (out of LAN, MAN, WAN) for connecting each of the following set of their offices.
(a) Head Office and Tech Office
(b) Head Office and Coimbatore Office
(ii) Which device will you suggest to be procured by the company for connecting all computers within each of their offices out of the following devices?
(a) Modem
(b) Telephone
(c) Switch/Hub
(iii) Which of the following communication media will you suggest to be procured by the company for connecting their local offices in New Delhi for very effective and fast communication?
(a) Ethernet cable
(b) Optical fiber
(c) Telephone cable
(iv) Suggest the cable/wiring layout for connecting the company’s local offices located in New Delhi. Also, suggest an effective method/technology for connecting the company’s regional offices at Kolkata, Coimbatore and Ahmedabad.
Answer:
(i) The type of network between the Head Office and Tech Office is LAN (Local Area Network).
The type of network between the Head Office and Coimbatore Office is WAN (Wide Area Network).
(ii) The suitable device for connecting all the computers in each of their offices is switch/hub.
(iii) For connecting local offices in New Delhi for very effective and fast communication is optical fiber.
(iv) The suggested layout for connection is as follows:
Important Questions for Class 12 Informatics Practices Term 2 with Answers_470.1
For connecting the regional offices satellite communication is an efficient technology.

Important Questions for CBSE Class 12 Informatics Practices Term 2 with Answers: FAQs

Q. Is NCERT enough for Class 12 Term 2 Informatics Practices?

Yes, NCERT is more than enough for Class 12 Term 2 Informatics Practices. The students must practice the CBSE Class 12 Term 2 Informatics Practices Important Questions given on this page.

Q. Where I can get CBSE Class 12 Term 2 Informatics Practices Important Questions?

You can get the CBSE Class 12 Term 2 Informatics Practices Important Questions here. We have given the CBSE Class 12 Term 2 Informatics Practices Important Questions based on the latest CBSE Term 2 Exam pattern on this page.

Q. When will CBSE conduct CBSE Class 12 Term 2 Exam 2022 for Informatics Practices?

The Central Board of Secondary Education will conduct the CBSE Class 12 Term 2 Exam 2022 for Informatics Practices on 13th June 2022.

 

 

 

 

Sharing is caring!

Leave a comment