Professional Documents
Culture Documents
VST Question Set-+2 2ND Year
VST Question Set-+2 2ND Year
VST Question Set-+2 2ND Year
Group – B
3. Answer any ten of the following questions within 30 words each : [2x10=20]
a. What is the difference between MAN and WAN?
b. What are the similarities and differences between bus and tree topologies?
c. What is TELNET?
d. Explain the uses of TCP/IP, HTTP and FTP
e. What is Digital Signature?
f. Define Full Duplex transmission mode.
g. Write the use of substring ( ) function with an example.
h. write the dissimilarities between SYSDATE() AND NOW() .
i. Write the use of ORDER BY CLAUSE.
j. Write different features of E-Commerce.
k. Distinguish between spam and cookies.
l. What is a foreign key?
4. Answer any three of the following questions within 50 words each : [3x3=9]
a) Difference between COMMIT AND ROLLBACK
b) Define:-Spam,Snooping,Spoofing,Eavesdropping and Cyber-stalking
c) Difference between HUB ,Switch,Router.
d)Diference between IP address and MAC address.
e)Difference between UNION AND UNION ALL.
Group – C
Answer any three of the following questions : [7x3=21]
5. What is E-commerce ? Elaborate on its benefits. What are the major challenges in
implementing E-business ?
6. What is a database transaction ? What is meant by committing and revoking a transaction ?
How are they achieved using COMMIT and ROLLBACK statements ?
7. What is the need for Internet addressing ? Discuss different interent addressing schemes.
8. What is a network topology ? Explain the working of different topologies highlighting their
merits and demerits.
9. what is inheritance?Briefly explain different types of inheritance with diagram and example
java program.
ix) Which keyword is used to delete all the rows from the table?
(a) TRUNCATE (b) REMOVE (c) DELETE ALL (d) CLEAR
x) Which of the following is not one of the major types of E-commerce?
(a) C2B (b) B2C (c) B2B (d) C2C
Group – B
3. Answer any ten of the following questions within 30 words each : [2x10=20]
a) What is firewall?
b) Explain the uses of TCP/IP, HTTP and FTP.
c) What is NIC?
d) What is Digital Signature?
e) What is Cyber Crime?
f) What is Cyber law?
g) What is Web Server? Give Examples.
h) Define Half Duplex transmission mode.
i) How many types of heading does an HTML contain?
j) What is primary key and foreign key?
k) Write the use of ORDER BY CLAUSE.
l) What is E-business?
4. Answer any three of the following questions within 50 words each : [3x3=9]
Group – C
Answer any three of the following questions : [7x3=21]
5. What are the different types of mobile technology/mobile
communication currently in operation?Discuss all of them with exapmles.
6. .What is cyber crime?Discuss different types of cyber crimes,where the
computer is used as a target and where computer used as a weapon/tool.
7. What is FORM?Explain about various types of FORM controls used used
within a FORM with proper example.
8. What is JDBC and ODBC?What are the different driver and classes used to
connect the JDBC.
9. What is database transaction?Briefly explain the ACID properties of
transaction .What is the use of commit and rollback statement?Briefly
Explain with examples.