VST Question Set-+2 2ND Year

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 12

SARASWATI GROUP OF INSTITUTIONS, CUTTACK ODISHA

+2(2nd) YR VST EXAM QUESTION


SET-A QUESTION
SUB-IT. GROUP A
1) Choose the correct answer.(1*10)
a)_____ is the smartest device.
i) Bridge
ii) Router
iii) gateway
iv) None
b) Attributes refers to ____in a table.
i) Record
ii) column
iii) Tuple
iv) key
C) ______ key doesn't allow duplicate records to be inserted.
i) foreign key
ii) Non Null
iii) Default
iv) primary key
d) An IPV4 consists of ___ bit address.
i) 4
ii) 8
iii) 16
Iv) 32
e) concealing the functional details of a class is referred to as
i) Abstraction
ii) Encapsulation
iii) Data Hiding
iv) inheritance
f) An online community bulletin board is also called as_____.
i) Telnet
ii) News group
iii) chat
iv) Newsnet
g) In SQL ____ functions remove any trailing space from a string.
i) RIGHT
ii) INSTRI
iii) SUBSTR
iv) RTRIM
h) ______ is an example of an auction site.
i) E-bay
ii) ibibo
iii) Facebook
iv) orkut
I) HTML is a _____language.
i) programming
ii) Markup
iii) Scripting
iv) All of these
j) string in java a ______.
i) class
ii) Datatype
iii) object
iv) inheritance
Q2) Expand the following.(1*10)
a) CSS
b) DNS
c) IP
d) GPS
e) GUI
f) IDE
g) HTTPS
h) BSNL
i) TCL
j) IRC
GROUP B
Q3) Answer any 10 questions.(2*10)
a) What is snooping?
b) Define database?
c) Why MODEM is used?
d) What is firewall?
e) What is digital signature?
f) What is SMS?
g) What is webpage?
h) Write any four string function in java?
i) What is tree topology?
j) What are tags?
k) What is TCP/IP?
l) What is smart Card?
Q4) Distinguish between any 3 of the following.(3*3)
a) JDK and JRE
b) HTML and DHTML
c) MODEM and NIC
d) Spam and phishing
e) Web browser and web site
Answer any 3 questions?
GROUP C. (7*3)

Q5) Explain different types of access specifiers with example?


Q6) Briefly explain different Network topology?
Q7) what is E- commerce? Explain different types of e- commerce?
Q8) Briefly discuss about HTML form?
Q9) Briefly discuss about the cyber crime?

ALL THE BEST

SARASWATI GROUP OF INSTITUTIONS, CUTTACK, ODISHA


+2(2ND)YR VST EXAM QUESTION
SET-B QUESTION
SUB-IT. GROUP A
Q1) choose the correct answer:---(1*10)
a) Which of the following features is satisfied in a database?
i) sharing.
ii) security
iii)all of these
iv) integrity
b) Which technology is used in mobile communication?
i)GSM
ii) GPRS
iii) LTE
iv) all the above
c) In broadband transmission,signals are sent on _____ frequencies.
i) single
ii) multiple
iii) microwave
iv) radio
d) Which of the following is a valid inheritance type?
i) single level
ii) multiple level
iii) multi level
iv) all of these
e) What is the minimum number of arguments required for the INSTR() functions?
i) 1
ii) 2
iii) 3
iv) 4
f) WLI stands for _______
i) wireless local loop
ii) wireless local link
iii) wire less link
iv) None of these
g) _______ function display date and time.
i) Now
ii) year
iii) Day
iv) DTime
h) The father of MYSQL is______
i) Michael widenius
ii) Bill Gates
iii) Tim Berners Lee
iv) Bill joy
i) _______ is not not a feature of Java.
i) platform Dependent
ii) secure
iii) Robust
iv) object oriented
j) Converting plain text to cipher text is called _______
i) Digital conversion
ii) Encryption
iii) Decryption
iv) cipher conversion
Q2) Expand the following (1*10)
a) SMTP
b) WAIS
c) PSTN
d) DSL
e) IDE
f) TCL
g) CDMA
h) 3G
i) BSNL
j) JRC
GROUP B
Q3) Answer any 10 questions (2*10)
a) What is search engine?
b) What is cipher text?
c) What is data integrity?
d) What is hacking?
e) What is gopher?
f) How is data transmitted in optical fiber?
g) What id JDBC?
h) Explain virus?
i) What are MAC addresses?
j) What is Wi-Fi?
k) What is webpage?
l) What is cyber stalking?
Q4) Distinguish between any 3 of the following?(3*3)
a) LAN and WAN
b) Antivirus and firewall
c) Spam and phishing
d) Client and server
e) 3G and 4G
GROUP C
Answer any 3 questions?
Q5) Discuss about different types of network topology?
Q6) write program for accessing data from database?
Q7) Briefly discuss about the cyber crime?
Q8) Explain different inheritance in java with suitable example?
Q9) Briefly discuss about the wireless technologies?
ALL THE BEST

SARASWATI GROUP OF INSTITUTIONS, CUTTACK, ODISHA


+2(2ND)YR VST EXAM QUESTION
SET-C QUESTION
SUB-IT. GROUP A
Q1) choose the correct answer:---(1*10)
a. Which of the following is a database package?
i. Java ii. Oracle iii. Hotmail iv. None of these
b. Which of the following operation can make a transaction permanent?
i. Roll back ii. Commit iii. Partial commit iv. Store
c. Which aggregation function is used to retrieve the greatest value of an attribute?
i. TOP ( ) ii. MOST ( ) iii. MAX ( ) iv. UPPER ( )
d. Which function is used to join two strings ?
i. Join () ii. Merge () iii. Concat () iv. None of these
e. E – commerce includes :
i. Business to consumer transactions
ii. E – Shopping
iii. Business to Business transactions
iv. All of the above
f. In which type of the e-commerce, can a business directly sell a product to the
customers ?
i. B 2 C ii. E 2 C iii. B 2 B iv. C 2 C
g. Which of the following is not a form of e-commerce ?
i. B2B ii. C2C iii. B2C iv. G2C
h. Which of the following is not a communication technology ?
i. GSM ii. 4G iii. 3G iv. WILL
i.Which of the following operator is used to test the relationship between two variables ?
i. Arithmetic ii. Logical iii. Relational iv. Special
j. Name the function declared in a class.
i. data member ii. Method iii. ADT iv. Member function

Q2) Expand the following (1*10)


a) FTP
b) TCP/IP
c) WAIS
d) URL
e) WLL
f) XML
g) RDBMS
h) B2C
i) DHTML
J) ODBC
Group - B
3. Answer any ten of the following questions within 30 words each : [2x10=20]
a. What is the use of a Hub in a computer network ?
b. How does the Ring network topology work ?
c. Write the use of search engine. Give examples of two popular search engines.
d. What is meant by video conferencing ? Write its advantage. What are the requirements for
implementing it ?
e. Write the significance of firewalls in a computer network.
f. Distinguish between static and dynamic pages in a website.
g. What is voice mail ?
h. What is the need for Cyber laws ?
i. How does the Radio link work ?
j. Write the significance of URL.
k. Write the function of a Repeater.
l. Write the merits and demerits of Bus network topology.
4. Answer any three of the following questions within 50 words each : [3x3=9]
a. Distinguish between RIGHT ( ) and RTRIM ( ) functions with example.
b. Explain the use of SUM ( ) and COUNT ( ) functions with example.
c. Distinguish between Web browser and search engine.
d. Distinguish between Bluetooth and Infrared technologies.
e. What is an access specifier ? Mention different types of access specifiers.
Group – C
Answer any three of the following questions : [7x3=21]
5. Explain various wires and wireless technologies used in communication networks. Also
highlight their merits and demerits.
6. What is the significance of Internet protocol ? Explain various internet protocols along with
their usage.
7. What are access specifiers ? How do they control access to data members and methods of a
class ? Explain with examples.
8. Explain database operations with multiple tables using Cartesian product, Union, Equijoin.
What is the necessity of a foreign key ?
9. What is the significance of front-end and back end components of a database application ?
How can one connect both the components ?
SARASWATI GROUP OF INSTITUTIONS, CUTTACK, ODISHA
+2(2ND)YR
SET-D QUESTION VST EXAM QUESTION
SUB-IT.
GROUP A
Q1) choose the correct answer:---(1*10)
a. Fibre optic technology converts electrical signal to ______ for data transmission.
i. Digital signal ii. Magnetic signal iii. Light iv. Heat
b. WLL stands for _______.
i. Wireless local loop ii. Wireless Local Link
iii. Wire Less Link iii. None of these
c. In HML which of the following tags is used for line break ?
i. <Ib> ii. <bk> iii. <br> iv. None of these
d. What is the minimum number of arguments required for the INSTR ( ) function ?
i. 1 ii. 2 iii. 3 iv. 4
e. Cartesian product between two tables A and B refers to ______.
i. Set of all ordered pairs from A and B ii. Set of rows from A and B
iii. Set of columns from A and B iv. Concatenation of two tables A and B
f. Which of the following is a valid network topology ?
i. WAN ii. MAN iii. Ring iv. PAN
g. In broadband transmission signals are sent on ______ frequencies.
i. Single ii. Multiple iii. Microwave iv. Radio
h. Which of the following is a valid inheritance type ?
i. Single level ii. Multilevel iii. Multiple level iv. All of these
i. Which of the following is a Group function ?
i. MAX ( ) ii. COUNT ( ) iii. COUNT ( *) iv. All of these
j. The CURDATE ( ) function returns the current date in the format _______.
i. YY-MM-DD ii. DD-MM-YYYY iii. YYYY-MM-DD iv. None of these

2. Expand the following. [1x10=10]


a. SMTP b. IDE c. OLE d. MAC e. PSTN f. DML
g. MTNL h. SQL i. B2C j. DHTML

Group – B
3. Answer any ten of the following questions within 30 words each : [2x10=20]
a. What is the difference between MAN and WAN?
b. What are the similarities and differences between bus and tree topologies?
c. What is TELNET?
d. Explain the uses of TCP/IP, HTTP and FTP
e. What is Digital Signature?
f. Define Full Duplex transmission mode.
g. Write the use of substring ( ) function with an example.
h. write the dissimilarities between SYSDATE() AND NOW() .
i. Write the use of ORDER BY CLAUSE.
j. Write different features of E-Commerce.
k. Distinguish between spam and cookies.
l. What is a foreign key?
4. Answer any three of the following questions within 50 words each : [3x3=9]
a) Difference between COMMIT AND ROLLBACK
b) Define:-Spam,Snooping,Spoofing,Eavesdropping and Cyber-stalking
c) Difference between HUB ,Switch,Router.
d)Diference between IP address and MAC address.
e)Difference between UNION AND UNION ALL.
Group – C
Answer any three of the following questions : [7x3=21]
5. What is E-commerce ? Elaborate on its benefits. What are the major challenges in
implementing E-business ?
6. What is a database transaction ? What is meant by committing and revoking a transaction ?
How are they achieved using COMMIT and ROLLBACK statements ?
7. What is the need for Internet addressing ? Discuss different interent addressing schemes.
8. What is a network topology ? Explain the working of different topologies highlighting their
merits and demerits.
9. what is inheritance?Briefly explain different types of inheritance with diagram and example
java program.

SARASWATI GROUP OF INSTITUTIONS, CUTTACK, ODISHA


+2(2ND)YR VST EXAM QUESTION
SET-E QUESTION
SUB-IT.
GROUP A
Q1) choose the correct answer:---(1*10)
i) What is the meaning of Bandwidth in Network?
(a) Transmission capacity of a communication channels
(b) Connected Computers in the Network
(c) Class of IP used in Network
(d) None of Above
ii) Which of the following is/are the advantages of wireless LANs.
(i)Installation speed and simplicity
(ii)Installation flexibility
(iii)Scalability
(a) i and ii only
(b) ii and iii only
(c) i and iii only
(d) All i, ii and iii
iii) What does protocol defines?
(a) Protocol defines what data is communicated.
(b) Protocol defines how data is communicated.
(c) Protocol defines when data is communicated.
(d) All of above
iv) DNS maps IP addresses to
(a) A binary Address as string
(b) An alphanumeric string
(c) A hierarchy of domain names
(d) A hexadecimal Address
v) When the mail server sends mail to other mail servers it becomes ___?
(a) SMTP client (b) SMTP server (c) Peer (d) Master
vi) <li> is used to create items of an
(a) Ordered list (b) Unordered list (c) Neither of a and b (d) Both a and b
vii) Which of the following provides the ability to query information from the database and insert
tuples into, delete tuples from, and modify tuples in the database?
(a) DML(Data Manipulation Language)
(b) DDL(Data Definition Language)
(c) Query
(d) Relational Schema
viii) A business competing in a commodity like environment must focus on which of the
following?
(a) Price (b) Ease/speed of delivery (c) Ease of ordering (d) All of the above

ix) Which keyword is used to delete all the rows from the table?
(a) TRUNCATE (b) REMOVE (c) DELETE ALL (d) CLEAR
x) Which of the following is not one of the major types of E-commerce?
(a) C2B (b) B2C (c) B2B (d) C2C

2. Expand the following. [1x10=10]


a. HTTP b. JDBC c. SQL d. RDBMS e. GSM f. WAN
g. MAC h. HTML i. XML j.IDE

Group – B
3. Answer any ten of the following questions within 30 words each : [2x10=20]

a) What is firewall?
b) Explain the uses of TCP/IP, HTTP and FTP.
c) What is NIC?
d) What is Digital Signature?
e) What is Cyber Crime?
f) What is Cyber law?
g) What is Web Server? Give Examples.
h) Define Half Duplex transmission mode.
i) How many types of heading does an HTML contain?
j) What is primary key and foreign key?
k) Write the use of ORDER BY CLAUSE.
l) What is E-business?
4. Answer any three of the following questions within 50 words each : [3x3=9]

a) Difference between SYSDATE() and NOW()


b) Difference between HYPERTEXT and HYPERLINK
c) Difference between WEBSITE and WEBPAGE
d) Difference between DBMS and RDBMS.
e) Difference between FRONT-END and BACK-END.

Group – C
Answer any three of the following questions : [7x3=21]
5. What are the different types of mobile technology/mobile
communication currently in operation?Discuss all of them with exapmles.
6. .What is cyber crime?Discuss different types of cyber crimes,where the
computer is used as a target and where computer used as a weapon/tool.
7. What is FORM?Explain about various types of FORM controls used used
within a FORM with proper example.
8. What is JDBC and ODBC?What are the different driver and classes used to
connect the JDBC.
9. What is database transaction?Briefly explain the ACID properties of
transaction .What is the use of commit and rollback statement?Briefly
Explain with examples.

You might also like