P.T.O. 1 The Air Force School Mock Pre-Board Marking Scheme – 2016-17 (INFORMATICS PRACTICES) 1. (i) Write examples of one proprietary and one Open Source Software. 1 Proprietary software :MS Office, Oracle, Windows , Photoshop Open Source Software: Linux, Google Chrome OS, Android smart, GIMP, OpenOffice,org, Python, MySQL, Java,OR Any other correct answer for each type of software ( ½ mark for each correct answer) (ii) What do you understand by LAMP? 1 LAMP is a web server program (Linux, apache, MySql, PHP). Apache Server is the most common web server. MYSQL is one of the most popular open source database system. Linux: - free and open source operating system . PHP is server side programming language. (iii)List any two measures to secure a network. 1 Measures to secure a network are: Use of (i) Login-Password (ii) Firewall (iii) Anti Virus Software (iv) File permissions (iv) Divyansh wants to download/upload files from/to a remote internet server. Which communication protocol will let him do the same. 1 FTP – File Tranfer Protocol (v) Differentiate between MAC address and IP address 2 MAC Address IP Address MAC(Media Access Control) address is a unique 12 digit hexadecimal number assigned to each Network Interface Card. IP (Internet Protocol ) address is a numerical label that is assigned to a device which is a part of a computer network using Internet Protocol
13
Embed
The Air Force School Mock Pre-Board Marking Scheme 2016-17The Air Force School Mock Pre-Board Marking Scheme – 2016-17 (INFORMATICS PRACTICES) ... „%‟ is a mathematical operator
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
P.T.O. 1
The Air Force School Mock Pre-Board Marking Scheme – 2016-17
(INFORMATICS PRACTICES)
1.
(i) Write examples of one proprietary and one Open Source Software. 1
Proprietary software :MS Office, Oracle, Windows , Photoshop
Open Source Software: Linux, Google Chrome OS, Android smart, GIMP, OpenOffice,org,
Python, MySQL, Java,OR Any other correct answer for each type of software
( ½ mark for each correct answer)
(ii) What do you understand by LAMP? 1
LAMP is a web server program (Linux, apache, MySql, PHP). Apache Server is
the most common web server. MYSQL is one of the most popular open source
database system. Linux: - free and open source operating system . PHP is server side
programming language.
(iii)List any two measures to secure a network. 1
Measures to secure a network are:
Use of
(i) Login-Password
(ii) Firewall
(iii) Anti Virus Software
(iv) File permissions
(iv) Divyansh wants to download/upload files from/to a remote internet server. Which
communication protocol will let him do the same. 1
FTP – File Tranfer Protocol
(v) Differentiate between MAC address and IP address 2
MAC Address IP Address
MAC(Media Access Control) address
is a unique 12 digit hexadecimal number
assigned to each Network Interface Card.
IP (Internet Protocol ) address
is a numerical label that is
assigned to a device which is a part of a
computer network using Internet
Protocol
2
It is constant and cannot be changed. It Can be changed.
It is device dependent It is area dependent
e.g. 00.A0.C9:14:C8:35 e.g. 192.168.0.2
(vi) What is denial of services? Explain briefly. 2
Denial-of-services attacks: are those attacks that prevent the legal users of a system from
accessing or using the resources, information or capabilities of a system. This term
is also used to refer to any outwardly induced condition that renders a computer
unusable. It may be of following types:
a) Denial of Access to Information: Such attacks cause deletion or changing of impor
tant information to non-readable format.
b) Denial of Access to Applications: Such attacks make the applications unusable or
unavailable for legal user of the system.
c) Denial of Access to Communications: Such attacks includes cutting of communication
wire, jamming radio communications, flooding a system with junk mail.
d) SYN flooding: It is a denial of service attack. It takes advantage of a loop hole in the way
TCP connection are created.
e) Pentium F00F Bug: It is a series of assembly language code sent to genuine Intel Pentium
processor that reboots a machine.
(vii) Give 2 advantages and 2 disadvantages of star topology 2
Advantages of Star Topology
i. No disruptions to the network when connecting or removing devices.
ii. Easy to detect faults and to remove parts.
Disadvantages of a Star Topology
i. Requires more cable length than a linear topology.
ii. If the hub or concentrator fails, nodes attached are disabled.
2.
(a) Which property is used for setting the password character as „&‟. 1
P.T.O. 3
Echochar
(b) Which attributes of HTML are used to- 1
(i) path of the picture file to be displayed on a web page. <img src>
(ii) to combine more than 2 columns . colspan
(c) Give the value of variable „a‟ and „b‟ after the execution of the following code: 1
int a;
int b;
b=6;
a = (4 *(++b) )% 4 ;
a=0, b =7
(d) Distinguish between „%‟ and „ /‟ mathematical operator in Java. 1
„%‟ is a mathematical operator which returns the remainder after dividing the given
numbers while „/‟ is a mathematical operator which returns the quotient after
dividing the given numbers.
Eg 5%3= 2 and 5/3 =1
(e) Give any 2 features of XML. Explain with the help of an example that we can create our
own tags in XML. 2
FEATURES OF XML
1. XML is designed to carry data not to display data.
2. XML was created to structure, store and to send information.
3. XML is self-descriptive. Tags are not pre-defned; rather they are created to describe the
content in appropriate manner.
4. XML is free and extensible.
5. XML is platform independent.
XML tags are created by the user as there are no standard tags.
For example :
To store address , the tag <address> may be used as :
< address > Punjabi Bagh </ address >
(f) What will be value of x and y when following code will be executed? 2
int x = 5;
int y = 20;
4
while(x<=y)
x+=y--;
y+=2;
System.out.println(“Values are “+x+” “+y);
x=25
y=21
(g)Write the output that will be generated by the code given below: 2
int ans;
int i;
for (i = 15; i <=25; i = i+5)
ans = i+4;
System.out.println(" "+ans);
19
24
29
g. Write a function in Java that takes length and breadth of float data type as parameter and returns the
area of a rectangle. 2
float area(float l, float b)
float ans = l*b;
return ans;
h. Differentiate between Actual and Formal parameters 2
Actual Parameter A parameter used in the function call is known as Actual Parameter. It
is used to send the data to function.
Formal Parameter A parameter used in the function definition is known as Formal
Parameter, It is used to accept the data from actual parameter.
3.
(a) Distinguish between DROP TABLE and DELETE commands of MySQL. 1
DROP TABLE DELETE
The statement is used to delete a table This statement is used to REMOVE the rows in a
P.T.O. 5
table
It is a DDL command It is a DML command
It is non conditional command It is a conditional command
It cannot be rolled back. It can be rolled back.
The structure of the table is deleted hence no
more rows can be added after Drop Table
command.
New rows can be added after the execution of this
command.
(b) How is NULL value different from 0 (zero) value. 1
NULL means Unknown/No value/Empty while 0 is a numeric value.
(c) When using the LIKE clause, which wildcard symbol represents any sequence of
none, one or more characters 1
% (d) A table COURSE has 10 rows and 12 columns and table STUDENT has 12 rows and 8
columns. What is the cardinality and degree of the Cartesian product of the tables? 1
120 and 20
(e) A numeric column MONEY contains 98765.7896. Give the SQL commands to truncate
MONEY. 2
(i) Up to 2 decimal places. (i.e. expected result 98765.78)
SELECT ROUND (MONEY,2);
(ii) Up to -3 places (i.e expected result 98000)
SELECT ROUND (MONEY,2);
(f) What happens when ROLLBACK command is issued in a transaction process?
What is a savepoint? 2
ROLLBACK To revert all operations on transaction
SAVEPOINT Make a mark upto certain operations
(g) Is a primary and candidate key same. Explain ? 2
Candidate Key: All attribute combinations inside a relation that can serve as primary key
(uniquelyidentifies a row in a relation) are Candidate Keys as they are candidates for the primary key position.
Primary Key: It is a field or collection of fields through which a record can be uniquely
identified in a table. Primary keys may consist of a single attribute or multiple attributes in
combination.
6
4.
(a) Given a string object named Salary having value as “65000” stored in it. Obtain the output