0% found this document useful (0 votes)
3 views

Viva Questions

The document covers essential concepts in informatics practices for Class XII, including computer networks, networking devices, protocols, topologies, IP addressing, security, online ethics, and database management. It explains key terms such as LAN, WAN, routers, firewalls, and MySQL, along with their functions and differences. Additionally, it addresses topics like e-waste management, digital footprints, and intellectual property rights.

Uploaded by

shimonejames15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views

Viva Questions

The document covers essential concepts in informatics practices for Class XII, including computer networks, networking devices, protocols, topologies, IP addressing, security, online ethics, and database management. It explains key terms such as LAN, WAN, routers, firewalls, and MySQL, along with their functions and differences. Additionally, it addresses topics like e-waste management, digital footprints, and intellectual property rights.

Uploaded by

shimonejames15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Basic Concepts on Informatics practices Class - XII

Q1. What is a computer network?


A1. A computer network is a group of interconnected computers that communicate with each
other and share resources like data, hardware, and software.

Q2. What are the major types of computer networks?


A2. The major types are:

 LAN (Local Area Network): Covers a small geographic area like an office or building.
 MAN (Metropolitan Area Network): Spans a city or a large campus.
 WAN (Wide Area Network): Covers large geographic areas, often using leased
telecommunication lines (e.g., the Internet).
 PAN (Personal Area Network): A very small network for personal devices (e.g.,
Bluetooth).

Networking Devices

Q3. What is the role of a router in a network?


A3. A router connects multiple networks and directs data packets between them, often
connecting a LAN to the Internet.

Q4. What is a switch? How is it different from a hub?


A4. A switch is a network device that connects devices within a LAN and forwards data based
on MAC addresses. Unlike a hub, which broadcasts data to all devices, a switch sends data
only to the intended recipient.

Q5. What is the function of a network gateway?


A5. A gateway connects different networks, often with different protocols, enabling
communication between them.

Network Protocols

Q6. What is a protocol in computer networking?


A6. A protocol is a set of rules that govern data communication between devices in a network.
Examples include HTTP, FTP, and TCP/IP.

Q7. Explain TCP/IP briefly.


A7. TCP/IP is a suite of communication protocols used to interconnect network devices on the
Internet.

 TCP (Transmission Control Protocol): Ensures reliable data transmission.


 IP (Internet Protocol): Handles addressing and routing of data packets.

S.S.Jassal
Q8. What is HTTP, and where is it used?
A8. HTTP (Hypertext Transfer Protocol) is used for transferring web pages on the World Wide
Web.

Network Topologies

Q9. What is a network topology? Name some types.


A9. Network topology refers to the arrangement of devices in a network. Types include:

 Bus topology
 Star topology
 Ring topology
 Mesh topology
 Tree topology

Q10. Which topology is most reliable and why?


A10. Mesh topology is most reliable because it provides multiple paths for data, so if one path
fails, data can take an alternative route.

IP Addressing

Q11. What is an IP address?


A11. An IP address is a unique numerical identifier assigned to each device on a network for
communication purposes.

Q12. What are the types of IP addresses?


A12.

1. IPv4: 32-bit address format (e.g., 192.168.0.1).


2. IPv6: 128-bit address format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).

Security

Q13. What is a firewall?


A13. A firewall is a network security device or software that monitors and controls incoming and
outgoing network traffic based on security rules.

Q14. What is encryption in networking?


A14. Encryption is the process of converting data into a coded format to prevent unauthorized
access.

S.S.Jassal
Miscellaneous

Q15. What is bandwidth?


A15. Bandwidth is the maximum amount of data that can be transmitted over a network in a
given time, typically measured in Mbps or Gbps.

Q16. What is the difference between the Internet and an intranet?


A16.

 Internet: A global network of interconnected networks.


 Intranet: A private network accessible only to an organization’s members.

Q17. What is a MAC address?


A17. A MAC (Media Access Control) address is a unique identifier assigned to a network
interface card (NIC) for communication within a network.

E-Waste and Green Computing

Q3. What is e-waste?


A3. E-waste refers to discarded electronic devices such as computers, mobile phones, and TVs
that are no longer in use.

Q4. How can e-waste be managed effectively?


A4.

1. Recycling and reusing electronic components.


2. Proper disposal through authorized e-waste management facilities.
3. Using eco-friendly manufacturing techniques.

Q5. What is green computing?


A5. Green computing is the practice of designing, using, and disposing of computing resources
in an environmentally sustainable way to reduce energy consumption and e-waste.

Online Ethics and Cybersecurity

Q6. What is cyberbullying?


A6. Cyberbullying is the use of digital platforms to harass, threaten, or harm others, typically
through social media, messages, or emails.

Q7. What are some ethical practices in using the Internet?


A7.

1. Avoid plagiarism and give credit to original creators.


2. Respect others' privacy online.
3. Avoid spreading false information or engaging in cyberbullying.
4. Use resources legally.

S.S.Jassal
Q8. What is hacking? Is it always illegal?
A8. Hacking refers to gaining unauthorized access to a system or network. It can be:

 Ethical hacking: Legal, used for identifying security vulnerabilities.


 Malicious hacking: Illegal, done with harmful intent.

Q9. What is phishing? How can it be prevented?


A9. Phishing is a fraudulent attempt to obtain sensitive information, such as passwords or credit
card details, by posing as a trustworthy entity.
Prevention:

1. Avoid clicking on suspicious links.


2. Verify sender authenticity.
3. Use anti-phishing software.

Intellectual Property Rights (IPR)

Q10. What are Intellectual Property Rights (IPR)?


A10. IPR refers to the legal rights given to creators to protect their inventions, designs, or artistic
works. Examples include patents, copyrights, and trademarks.

Q11. What is the difference between copyright and patent?


A11.

 Copyright: Protects original works like books, music, and software.


 Patent: Protects inventions and grants the creator exclusive rights to make, use, or sell
the invention.

Digital Footprints and Privacy

Q12. What is a digital footprint?


A12. A digital footprint is the trail of data you leave behind when using the Internet, including
your social media activity, browsing history, and online purchases.

Q13. How can individuals protect their privacy online?


A13.

1. Use strong and unique passwords.


2. Enable two-factor authentication.
3. Avoid sharing sensitive personal information.
4. Use secure websites (HTTPS).

S.S.Jassal
Online Fraud and Legal Awareness

Q14. What is identity theft?


A14. Identity theft occurs when someone uses another person’s personal information, like name
or credit card details, without permission for fraudulent purposes.

Q15. What is the IT Act, 2000?


A15. The Information Technology Act, 2000, is an Indian law that provides legal recognition to
electronic transactions and covers issues like cybercrimes and electronic commerce.

Q16. What is cyberstalking?


A16. Cyberstalking is the repeated use of digital platforms to harass or stalk someone, often
involving monitoring or sending threatening messages.

Miscellaneous

Q17. What is digital empowerment?


A17. Digital empowerment refers to the use of digital tools and technologies to enable
individuals and communities to access information, communicate, and improve their quality of
life.

Q18. What are the benefits of e-governance?


A18.

1. Faster delivery of public services.


2. Increased transparency in governance.
3. Cost-effectiveness.
4. Better citizen engagement.

Q19. What is plagiarism, and why is it unethical?


A19. Plagiarism is the act of using someone else’s work or ideas without giving credit. It is
unethical because it violates intellectual property rights and undermines creativity.

Q20. What are some ways to promote ethical use of technology?


A20.

1. Educating people about online ethics.


2. Implementing strict policies against cybercrimes.
3. Encouraging responsible digital behavior.

Q1. What is MySQL?


A1. MySQL is an open-source relational database management system (RDBMS) that allows
users to store, manage, and retrieve data efficiently.

S.S.Jassal
Q2. What is a database?
A2. A database is an organized collection of data that can be easily accessed, managed, and
updated.

Q3. What is the difference between SQL and MySQL?


A3.

 SQL (Structured Query Language): A language used for managing and manipulating
databases.
 MySQL: A database management system that uses SQL to interact with databases.

Data Types

Q4. Name some common data types used in MySQL.


A4.

1. Numeric: INT, FLOAT, DECIMAL.


2. String: CHAR, VARCHAR, TEXT.
3. Date/Time: DATE, TIME, DATETIME, TIMESTAMP.

Q5. What is the difference between CHAR and VARCHAR?


A5.

 CHAR: Fixed-length string (e.g., CHAR(5) always takes 5 bytes).


 VARCHAR: Variable-length string (e.g., VARCHAR(5) only uses the space required for
the actual data).

SQL Commands

Q6. What are the different types of SQL commands?


A6.

1. DDL (Data Definition Language): CREATE, ALTER, DROP.


2. DML (Data Manipulation Language): INSERT, UPDATE, DELETE.
3. TCL (Transaction Control Language): COMMIT, ROLLBACK.SAVEPOINT,START

Q7. How do you create a database in MySQL?


A7.

CREATE DATABASE database_name;

Q8. How do you create a table in MySQL?


A8.

CREATE TABLE table_name ( column1 datatype, column2 datatype, ……….);


S.S.Jassal
Q9. How do you insert data into a table?
A9.

INSERT INTO table_name (column1, column2, ...) VALUES (value1, value2, ...);

Q10. How do you retrieve data from a table?


A10.

SELECT column1, column2, ...


FROM table_name
WHERE condition;

Clauses

Q11. What is the purpose of the WHERE clause?


A11. The WHERE clause is used to filter rows based on a specific condition in queries.
Example:

SELECT * FROM employees WHERE age > 30;

Q12. What is the difference between GROUP BY and ORDER BY?


A12.

 GROUP BY: Groups rows with the same values in specified columns.
 ORDER BY: Sorts rows in ascending or descending order.

Q13. How do you limit the number of rows in a query result?


A13. Use the LIMIT keyword:

SELECT * FROM table_name LIMIT 5;

Joins and Relationships

Q14. What are JOINS in MySQL?


A14. JOINS are used to retrieve data from multiple tables based on a related column. Types of
JOINS include:

1. INNER JOIN: Returns matching rows from both tables.


2. LEFT JOIN: Returns all rows from the left table and matching rows from the right table.
3. RIGHT JOIN: Returns all rows from the right table and matching rows from the left table.
4. FULL JOIN: Returns all rows when there is a match in either table (not supported
natively in MySQL).

Functions

S.S.Jassal
Q16. What are aggregate functions in MySQL?
A16. Aggregate functions perform calculations on a set of values and return a single value.
Examples:

1. COUNT(): Counts rows.


2. SUM(): Calculates total.
3. AVG(): Finds average.
4. MAX(): Returns maximum value.
5. MIN(): Returns minimum value.

Q17. Write a query to find the total number of employees in a table.


A17.

sql
CopyEdit
SELECT COUNT(*) FROM employees;

Q18. What is the difference between NOW() and CURDATE()?


A18.

 NOW(): Returns the current date and time.


 CURDATE(): Returns the current date only.

Constraints

Q19. What are constraints in MySQL?


A19. Constraints are rules enforced on data in a table to maintain data integrity. Examples
include:

1. NOT NULL: Ensures a column cannot have NULL values.


2. UNIQUE: Ensures all values in a column are unique.
3. PRIMARY KEY: Combines NOT NULL and UNIQUE for a column.
4. FOREIGN KEY: Links two tables.
5. CHECK: Ensures values meet a specific condition.

Q20. How do you define a PRIMARY KEY when creating a table?


A20.

CREATE TABLE students (


id INT PRIMARY KEY,
name VARCHAR(50)
);

S.S.Jassal
Miscellaneous

Q21. What is the default port number for MySQL?


A21. The default port number for MySQL is 3306.

Q22. What is the difference between DELETE and TRUNCATE?


A22.

 DELETE: Removes specific rows based on a condition and can be rolled back.
 TRUNCATE: Removes all rows from a table and cannot be rolled back.

Q23. What is the use of the DISTINCT keyword?


A23. The DISTINCT keyword removes duplicate values in query results. Example:

sql
CopyEdit
SELECT DISTINCT column_name FROM table_name;

Q24. How can you rename a table in MySQL?


A24.

sql
CopyEdit
RENAME TABLE old_table_name TO new_table_name;

Q25. What is indexing, and why is it used?


A25. Indexing is a technique used to speed up the retrieval of data from a table by creating
pointers to the rows.

S.S.Jassal

You might also like