0% found this document useful (0 votes)
109 views9 pages

ITFY First Semester QuestionBank 2024

It paper

Uploaded by

prekshaaajk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views9 pages

ITFY First Semester QuestionBank 2024

It paper

Uploaded by

prekshaaajk
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Practice Questions

Chapter1-Basics of Information Technology


Important Note: The below given questions can be asked in exam in any form like fill in the blanks,
True/False, MCQ’S. In questions where options are given in bracket, all options are correct.
---------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------------

1) _____ can be any character, text, word, number or raw facts.


2) _____ is data formatted in a manner that allows it to be utilized by human beings in some
significant way.
3) The word computer is derived from the Latin word ______.
4) Computer Architecture is a specification detailing how a set of software and hardware
technology standards interact to form a computer system. T/F?
5) _____ unit helps user to enter data and commands into a computer system.
6) _____ of CPU performs arithmetic and logical operations.
7) Examples of input devices are ____.(Barcode reader,keyboard,mouse,micr,ocr,touch screen)
8) Examples of output devices are ____.(Monitor,screen,printer,speaker)
9) MICR stands for _____.
10) MICR is an example of ____ unit in a computer system.
11) OCR stands for _____.
12) OCR is an example of ____ unit in a computer system.
13) The ____ in a computer system processes data and commands from users according to
instructions provided.
14) The ____ unit is the back bone of computers responsible for coordinating tasks between all
components of a computer system.
15) ____ type of memory is internal memory of the computer.
16) ____ is an external memory of the computer used to store huge amount of different
programs and information.
17) Types of primary memory are ____ and _____.
18) ____type of primary memory is volatile memory or temporary memory.
19) RAM stands for ____.
20) ROM stands for ____.
21) ____ type of primary memory is non-volatile memory.
22) The content of ___ type of primary memory is decided by the computer manufacturer and
permanently stored at the time of manufacturing.
23) The information stored in _____ memory is lost as the power supply to the computer is
switched off.
24) Examples of secondary storage devices are ____.(Magnetic/Hard Disk,Magnetic Tapes, Pen
Drive, Flash Memory,Optical Disk(CD,DVD), SSD)
25) ____ is a binary digit that holds only one of two values: 1 or 0.
26) A group of 4 bits is called a ____.
27) A group of 8 bits is called a ____.
28) 1 TeraByte=1024 ____.
29) _____ are physical components of a computer system which we can see, touch and feel.
30) Program or set of programs given to a computer in order to perform a particular task are
called as _____.
31) DOS stands for _____.
32) The category of software which releases code in public domain for anyone to use is ____.
33) The category of software used by the proprietary and has a closely guarded code is ____.
34) _____ software is a program or group of programs designed for end users.
35) _____ software is a set of instructions required for a computer to work.
36) _____ and ____ are examples of open source operating systems for personal
computer.(Chrome OS, Linux)
37) ____ is a free and open source operating system for mobile phones provided by Google.
38) ____ is Apple’s closed source operating system for Apple’s iPhone, iPod Touch, iPad and
second generation Apple TVs.
39) ____ and ____ are the two main ways to interact with the computer.
40) The GUI for Ubuntu 18.04 is called ____.
41) The default CLI on Ubuntu 18.04 is called ____.
42) CLI stands for _____.
43) GUI stands for _____.
44) ____ Linux command Prints the list of directories in the current one.
45) ____ Linux command creates a new file.
46) ____ Linux command is used to display line of text or string that are passed as an argument.
47) ____ Linux command is used to clear the command prompt.
48) _____ network is a computer network that extends over a large geographical area that
might be confined within the bounds of a state or country.
49) ____ network covers smaller geographical area size is limited to a few kilometers and are
privately owned.
50) ____ network is larger area than LAN and smaller as compared to WAN.
51) In ____ type of network architecture, all computers connected in the network are called as
‘peer’.
52) ____ and ____ are the most widely used types of network architecture.
53) A computer which is seeking any resource from another computer is a ___ computer.
54) A computer which has a resource and it serves to another computer is a ___ computer.
55) ARPANET stands for _____.
56) A _____ is a set of rules that governs the communication between computers on a network.
57) TCP/IP stands for _____.
58) DNS stands for _____.
59) SMTP stands for _____.
60) DHCP stands for _____.
61) HTTP stands for _____.
62) IMAP stands for _____.
63) FTP stands for _____.
64) IRC stands for _____.
65) POP3 stands for _____.
66) IoT stands for _____.
67) _____,____,_____ are examples for protocols for
communication.(TCP/IP,DNS,DHCP,FTP,HTTP,IMAP,POP3,IRC,SMTP)
68) ___ protocol automatically assigns internet addresses to computers and users.
69) ___ and ___ are protocols for receiving email messages. (IMAP, POP3)
70) ___ is the process of examining data set in order to draw conclusions about the information
they contain increasingly with the help of specialized systems and software.
71) ___ is the intelligence demonstrated by machines in contrast to the natural intelligence
displayed by the humans and other animals.
72) ___ is the scientific study of algorithms and statistical models that computer systems use to
effectively perform a specific task without using explicit instructions relying on patterns and
inference.
73) ____ refers to data sets that are too large or complex for traditional data processing
application software to adequately deal with.
74) Match the pair (with correct answer given only for question bank)
A B
1. TCP/IP Breaks message in packets to send on network
2. FTP Transfer files on Internet
3. HTTP Sending & receiving web pages
4. SMTP For sending email messages
5. Ubuntu Linux distribution
6. SSD Secondary storage
7. RAM Primary storage
8. Nano text editor
9. Echo display line of text
10. Touch create new file
11. Cat Concatenate and print contents of file
12. Barcode Reader Input
13. Speaker Output

Short Answers
1. Write 4 benefits of learning GNU/LINUX.
2. Write a note on IT enabled Services.
3. What is Green Computing?
4. What is Artificial Intelligence and Machine Learning?
5. Write a note on Blockchain.
6. Write a note on careers in IT.

Answers of Objective questions


1) Data
2) Information
3) Computare
4) T
5) Input
6) ALU / Arithmetic and Logic Unit
7) Barcode reader,keyboard,mouse,micr,ocr,touch screen
8) Monitor,screen,printer,speaker
9) Magnetic Ink Character Reader
10) Input
11) Optical Character Reader
12) Input
13) CPU
14) Control
15) Primary/ Main
16) Secondary
17) RAM, ROM
18) RAM
19) Random Access Memory
20) Read Only Memory
21) ROM
22) ROM
23) RAM
24) Magnetic/Hard Disk,Magnetic Tapes, Pen Drive, Flash Memory,Optical Disk(CD,DVD), SSD
25) BIT
26) Nibble
27) Byte
28) Gigabytes
29) Hardware
30) Software
31) Disk operating system
32) Open Source
33) Closed Source
34) Application
35) System
36) Chrome OS, Linux
37) Android
38) iOS
39) GUI,CLI
40) GNOME
41) BASH
42) Command Line Interface
43) Graphical User Interface
44) Ls
45) Touch
46) Echo
47) Clear
48) WAN
49) LAN
50) MAN
51) Peer to Peer
52) Peer to Peer and Client/Server
53) Client
54) Server
55) Advanced Research Projects Agency Network
56) Protocol
57) Transmission Control Protocol/ Internet Protocol
58) Domain Name System
59) Simple Mail Transfer Protocol
60) Dynamic Host Configuration Protocol
61) HyperText Transfer Protocol
62) Internet Message Access Protocol
63) File Transfer Protocol
64) Internet Relay Chat
65) Post Office Protocol Version 3
66) Internet of Things
67) TCP/IP,DNS,DHCP,FTP,HTTP,IMAP,POP3,IRC,SMTP
68) DHCP
69) IMAP, POP3
70) Data Analytics
71) Artificial Intelligence
72) Machine Learning
73) Big Data
74) Match The Pair
A B
1) TCP/IP Breaks message in packets to send on network
2) FTP Transfer files on Internet
3) HTTP Sending & receiving web pages
4) SMTP For sending email messages
5) Ubuntu Linux distribution
6) SSD Secondary storage
7) RAM Primary storage
8) Nano text editor
9) Echo display line of text
10) Touch create new file
11) Cat Concatenate and print contents of file
12) Barcode Reader Input
13) Speaker Output
CHAPTER 2 – INTRODUCTION TO DBMS

IMPORTANT NOTE – The below given questions can be asked in exam in any form like Fill in the
blanks, True/False, MCQ’s. In questions where options are given in bracket, all options are
correct.

1) _____ is collection of interrelated data which helps in efficient retrieval, inserting and
deleting of data.
2) _____ which is processed data helps in decision making.
3) Without data information cannot be processed. T/F?
4) DBMS stands for _____.
5) A ____ is a software for creating and managing databases.
6) ____, ____ and ____ are examples of popular DBMS. (MySQL, PostgreSQL, Access, Oracle,
SQL Server, IBM, DB2 and Sybase)
7) Multiple copies of the same file lead to data _____.
8) Data _____means that the data is accurate and consistent in the database.
9) _____ ensures that only authorised users are allowed to access the database and their
identity is authenticated using a username and password.
10) The users don't need to backup data periodically because this is taken care of by the DBMS.
T/F?
11) DBMS reduces application development and maintenance time. T/F?
12) In DBMS, under the class text there are two data types ____ & ____.
13) In DBMS, ____ data type holds a fixed length string. The fixed size is specified in parenthesis.
14) In DBMS, ____ data type holds a variable length string. The maximum size is specified in
parenthesis.
15) In DBMS, under the class number there are two data types ____ & ____.
16) In DBMS, ____ data type can represent numbers with or without the fractional part.
17) In DBMS, ____ data type is used for storing integer values.
18) The data type to store the value 10.84 is ____.
19) ___, ___ and ___ are data types in DBMS. (Char, varchar, decimal, int, Date, Time)
20) ____ i.e. logical structure of database defines how the data is connected to each other and
how they are processed and stored inside the system.
21) A _____ is a unit of work that is performed against a database.
22) A in the acronym ACID, properties of transaction stands for ____.
23) C in the acronym ACID, properties of transaction stands for ____.
24) I in the acronym ACID, properties of transaction stands for ____.
25) D in the acronym ACID, properties of transaction stands for ____.
26) RDBMS stands for _____.
27) The ____ is the basic data storage unit in a Relational database.
28) Two columns cannot have the same name in a RDBMS Table. T/F?
29) A table consists of information which is stored under different headings, called as _____.
30) In a RDBMS table, a____ is composed of fields and contains all the data about one particular
person, company, or item in a database.
31) Record is also called as a _____.
32) The group of one or more columns used to uniquely identify each row of a relation is called
its _____ key.
33) _____Key is a field or collection of fields in one table that refers to the Primary Key in
another table.
34) A _____ in the context of databases, is a situation that exists between two relational
database tables when one table has a foreign key that is used as a reference to the primary
key of the other table.
35) There are 3 types of relationships in relational database design, ___, ____ and ____.
36) In a _____relationship, one record in a table is associated with one and only one record in
another table.
37) In ____ type of relationship, a row in table City can have many matching rows in table
Customer, but a row in table Customer can have only one matching row in table City.
38) A _____ relationship occurs when multiple records in a table are associated with multiple
records in another table.
39) SQL is an abbreviation of ______.
40) ____ is a computer language for storing, manipulating and retrieving data stored in a
relational database.
41) ____, _____ and ____ are Categories of SQL Command.
42) ____category of SQL command consists of statements or commands used to define and
modify the database structure of your tables or schema.
43) DDL stands for ____.
44) ____, ____ and ____ commands fall under the category of DDL. (Create Database, Create
Table, Alter Table, Drop Table, Drop Database)
45) ____ category of SQL command consists of statements or commands used for managing
data within tables.
46) DML is an abbreviation for ____.
47) ____, ____ and ____ commands fall under the category of DML.(Select, Update, Delete,
Insert into)
48) ____ category of SQL command is used to control user access in a database.
49) Full form of DCL is ____.
50) ____ and ____ commands fall under the category of DCL.

Short Answers

1) What is the difference between data and information?


2) Explain applications of DBMS.
3) Explain any two advantages of DBMS.
4) What are the data types in DBMS?
5) Explain any two properties of transaction.
6) Write a note on relationships in database.
7) Write a note on DDL.
8) Write a note on DML.
9) Write a note on DCL

Answers of Objective questions

1) Database
2) Information
3) True
4) Database Management System
5) Database Management System / DBMS
6) MySQL, PostgreSQL, Access, Oracle, SQL Server, IBM, DB2 and Sybase
7) Redundancy
8) Integrity
9) Data Security
10) True
11) True
12) Char, varchar
13) Char
14) Varchar
15) Decimal, Int
16) Decimal
17) Int
18) Decimal
19) Char, varchar, decimal, int, Date, Time
20) Data Model
21) Transaction
22) Atomicity
23) Consistency
24) Isolation
25) Durability
26) Relational Database Management System
27) Table
28) True
29) Fields
30) Record
31) Tuple
32) Primary
33) Foreign
34) Relationship
35) One to One, One to Many/Many to One, Many to Many
36) one-to-one
37) One to Many or Many to One
38) Many to Many
39) Structured Query Language
40) Structured Query Language / SQL
41) DDL, DML, DCL
42) DDL
43) Data Definition Language
44) Create Database, Create Table, Alter Table, Drop Table, Drop Database
45) Data Manipulation Language /DML
46) Data Manipulation Language
47) Select, Update, Delete, Insert into
48) DCL
49) Data Control Language
50) Grant, Revoke
PAPER PATTERN FOR FIRST SEMESTER EXAM - 50 MARKS (2.5 hrs)

Q.1 Fill in the blanks [05]


Q.2 True/False [05]
Q.3 Multiple Choice Single Answer [10]
Q.4 Multiple Choice Multiple Answers (2 correct) [10]
Q.5 Multiple Choice Multiple Answers (3 correct) [06]
Q.6 Match the following [04]
Q.7 Answer briefly (any 5 out of 8 ) [10]

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy