MadXAbhi_RSSB_Basic_&_Senior_Computer_Instructor_study_Material
MadXAbhi_RSSB_Basic_&_Senior_Computer_Instructor_study_Material
RSSB
Basic and Senior
Computer Instructor
Study Material
&
Question Bank
Chief Editor
Anand Kumar Mahajan
Written by
Shrikant Vishwakarma, Vikash Maurya, Nitesh Mishra,
Pramod Yadav, Shashikant Yadav, Meena Kanaujia
Computer Graphics by
Balkrishna, Charan Singh
Editorial Office
Youth Competition Times
12, Church Lane Prayagraj-211002
Mob. : 9415650134
Email : [email protected]
website : www.yctbooks.com
Publisher Declaration
Edited and Published by A.K. Mahajan for YCT Publication Pvt. Ltd.
and printed by R.A. Security Printers, Prayagraj.
In order to publish the book, full care has been taken by the editor and
the publisher, still your suggestions and queries are welcomed. Rs. : 250/-
In the event of any dispute, the Judicial area will be Prayagraj.
Content
Syllabus of RSSB ............................................................................................................................... 3-3
Fundamentals of Computer ............................................................................................................ 4-19
Introduction of Computer Computer Hardware and Devices Input Device Output Device
Memory/Storage Device Representation of Data, Number system Conversion of Numbers
Introduction to Data Processing Data Processing Files and Types Important Facts
Important Questions Asked in Previous Years Examinations with Answer Key
Data Processing.............................................................................................................................. 20-52
Word Processing Microsoft Office Word (MS Word) Microsoft Excel PowerPoint M.S.
Office (Access) Important Facts Important Questions Asked in Previous Years Examinations
with Answer Key
Programming Fundamentals...................................................................................................... 53-110
Introduction to C Introduction to C++ Java .Net Artificial Intelligence Machine
Learning Pytho Blockchain, Principles and programming techniques Introduction of object
oriented programming (OOPs) Integrated Development Environment Important facts
Important Questions Asked in Previous Years Examinations with Answer Key
Data structures and Algorithms ............................................................................................... 111-125
Algorithms for Problem Solving Abstract Data Types (ADT) Arrays as Data Structure
Linked list V/S Array for Storage Stack & Stack Operation Queue Basic Operations
General Tree Graph and their representation Sorting & Searching Symbol Table Data
Structure Using C & C++ Important Points Important Questions Asked in Previous Years
Examinations with Answer Key
Computer Organization and Operation System ..................................................................... 126-149
Basic Structure of Computer Computer Arithmetic Operations Central Processing Unit and
Instructions Memory Organization I/O Organization Operating Systems Overview Process
Management Finding & Processing File Important Facts Important Questions Asked in
Previous Years Examinations with Answer Key
Communication and Network Concepts ................................................................................. 150-173
Introduction to Computer Network Networks Layers/Models Networking Devices
Fundamentals of Mobile Communication Important Facts Important Questions Asked in
Previous Years Examinations with Answer Key
Network Security ....................................................................................................................... 174-184
Network Security Protecting computer systems from viruses and malicious Attacks Firewall
Network attack Ethical Hacking Important Facts Important Questions Asked in Previous
Years Examinations with Answer Key
Database Management System................................................................................................. 185-209
An Overview of the Database Management Architecture of DBMS Relational Database
Management System (RDBMS) Database Design Manipulating Data NoSql database SQL
Important Facts Important Questions Asked in Previous Years Examinations with Answer Key
System Analysis and Design ..................................................................................................... 210-241
Introduction Requirement Gathering & Feasibility Analysis Structured Analysis
Structured Design Object-oriented Modeling using UML Testing Software
Implementation and Maintenance Software Implementation: Other Software Development
Approaches Important Facts Important Questions Asked in Previous Years Examinations with
Answer Key
Internet of things and its application ....................................................................................... 242-258
Introduction to IoT What is data What is Cloud Virtual Reality Internet Technology
Protocol Search Engines Introduction to online & offline messaging World Wide Web
Browsers Web Publishing Basic Knowledge HTML, XML and Scripts Creation &
Maintenance of websites HTML Tools Multimedia and Graphics Voice Mail and Video
Conferencing Introduction to e-commerce Important Facts Important Questions Asked in
Previous Years Examination with Answer Key
Major Developments in IT........................................................................................................ 259-261
Introduction Important Questions Asked in Previous Years Examinations with Answer Key
Pedagogy..................................................................................................................................... 262-272
Aims and Objectives of Teaching Computer Sciences Hardware and Software of Computers
Micro Teaching Instructional Methods Instructional Aids Latest Trends in Information
Technology Evaluation in Computer Science Important Questions Asked in Previous Years
Examinations with Answer Key
2
Syllabus of RSSB
1. Fundamentals of Computer: Overview of the Computer 12. Pedagogy:
System including input-Output devices, pointing devices UNIT-I: Aims and Objectives of Teaching computer Sciences
and scanner, Representation of Data (Digital versus 1.1 Introduction
Analog, Number System- Decimal, Binary & 1.2 Objectives
1.3 Purpose of Teaching Computer Science
Hexadecimal), Introduction to Data Processing, Concepts
1.4 Aims and Objectives of Teaching Computer Science
of files and its types.
1.5 Need for Teaching Computer Science
2. Data Processing: Word Processing (MS-Word), Spread Sheet 1.6 Bloom's Taxonomy of Educational Objectives
Software (MS Excel), Presentation Software (MS Power Point), 1.7 Computer Science Teaching at Different Levels in Schools
DBMS software (MS Access). 1.8 The Place of Computer Science in School Curriculum
3. Programming Fundamentals: Introduction to C, C++, 1.9 Computer Science Teaching in Relation to Other School
Java, .NET, Artificial Intelligence (AI), Machine learning, Subjects
Python and Block Chain, Principles and Programming UNIT-II: Hardware and Software of Computers
Techniques, Introduction of Object Oriented Programming 2.1 Introduction
(OOPs) concepts, Introduction to "Integrated 2.2 Objectives
Development Environment" and its advantages. 2.3 Definitions Computers
2.4 History of Computers
4. Data structures and Algorithms: Algorithms for Problem
2.5 Types of Computers
Solving, Abstract data types, Arrays as data structures, linked 2.6 Computer Network
list v/s array for storage, stack and stack operations, queues, 2.7 Computer Virus
binary tress, binary search trees, graphs and their 2.8 The Various Uses of Computers
representations sorting and searching, symbol table. Data 2.9 Uses of Computers in Schools
Structure using c & C++. UNIT-III: Micro Teaching
5. Computer Organization and Operation System: Basic 3.1 Introduction
Structure of Computers, Computer Arithmetic Operations, 3.2 Objectives
Central Processing Unit and Instructions, Memory 3.3 Micro Teaching
Organization, I/O organization, Operating Systems Overview, 3.4 Principles of Micro Teaching
Process Management, Finding and processing files. 3.5 Phases of Micro-Teaching
3.6 Teaching Skills
6. Communication and Network Concepts: Introduction to
UNIT-VI: Instructional Methods
Computer Networks, Introduction: Networks layers/
4.1 Introduction
Models, Networking Devices, Fundamentals of Mobile 4.2 Objectives
Communication. 4.3 Unit Plan
7. Network Security: Protecting Computer Systems from 4.4 Lesson Plan Writing in Computer Science
viruses & malicious attacks, Introduction to Firewalls and its 4.5 Methods of Teaching Computer Science
utility, Backup & Restoring data, Networking (LAN & WAN), UNIT V: Instructional Aids
Security, Ethical Hacking. 5.1 Instructional Aids in the Teaching of Computer Science
8. Database Management System: An Overview of the 5.2 Characteristics of Instructional Aids or Audio-Visual Aids
Database Management, Architecture of Database System, 5.3 Instructional Aids Used in Teaching
Relational Database Management System (RDBMS), Database 5.4 Interactive Whiteboard
Design, Manipulating Data, NoSQL Database Technologies, 5.5 PowerPoint Presentation
UNIT VI: Latest Trends In Information Technology
Selecting Right Database.
6.1 Multimedia
9. System Analysis and Design: Introduction, Requirement, 6.2 Desktop Publishing
Gathering and Feasibility Analysis, Structured Analysis, 6.3 Internet
Structured Design, Object-Oriented Modeling Using 6.4 E-Learning
UML, Testing, System Implementation and Maintenance, 6.5 Virtual Learning
Other Software Development Approaches. 6.6 Web-based Learning
10. Internet of things and its application: Introduction of 6.7 Tele-Conferencing
Internet Technology and Protocol, LAN, MAN, WAN, 6.8 Audio Conferencing
Search Services/Engines, Introduction to online & offline 6.9 Video Conferencing
messaging, World Wide View Browsers, Web Publishing, UNIT VII: Evaluation In Computer Science
Basic knowledge HTML, XML and Scripts Creation Y 7.1 Introduction
7.2 Purposes of Evaluation
maintenance of Websites, HTML interactivity Tools,
7.3 Types of Evaluation
Multimedia and Graphics, Voice Mail and Video
7.4 New Scheme of Evaluation
Conferencing, Introduction to e-Commerce.
7.5 Techniques and Tools of Evaluation
11. Major developments in the field of Information 7.6 Achievement Test
Technology. 7.7 Online Examination
3
01.
FUNDAMENTALS OF COMPUTER
Introduction of Computer 2. Input Unit– Input is a unit with the help of which
data or instructions are entered into the computer. It is a
The word computer is derived from the Latin Word link between the computer and the user.
'Compute' which means 'to calculate'. Therefore, the 3. Output Unit– An output unit is a device through
literal meaning of computer is calculator. which type processor or CPU displays the result of a
A computer is an electronic device that receives data written task in the form of output. These output can be in
control through input and displays it as an output by the form of softcopy or hardcopy.
working on it according to the instructions given.
1.1 Structure of Computer– All types of computers Types of Computer
follow the same basic logical structure. Computers are (i) Analog Computer– Analog computers are
made of three basic units. computers that measure physical units (pressure,
1. CPU (Central Processing Unit) temperature etc.) and convert them into numbers. These
2. Input Unit computers measures any quantity on the basis of
3. Output Unit comparison. For example- Thermometer, Voltmeter.
Data is used continuously in analog computers.
(ii) Digital Computer– In this category come those
computer, which calculate the marks. Most of the
computers fall under the category of digital computers.
Digital computers convert data and programs into binary
(0's and 1's) and carry them in electronic form.
(iii) Hybrid Computer– Hybrid computers are
made up of a mixture of analog and digital computers,
hybrid computers are capable of performing the
functions of both computers.
Conversion of Numbers
The computer systems accept the data in decimal
form, whereas they store and process the data in binary
form. Therefore, it becomes necessary to convert the
number represented in one system into the numbers
represented in another system. The different types of (iii) Decimal to Hexadecimal Conversion– The
number system conversions can be divided into the decimal to hexadecimal conversion is performed by
following major categories. repeatedly dividing the decimal number by 16 till the
1. Decimal to Non-decimal decimal number becomes zero and reading the
2. Non-decimal to Decimal remainders from last to first to obtain the hexadecimal
3. Binary to Octal equivalent of the given decimal number. The following
4. Binary to Hexadecimal example illustrate the method of converting decimal
5. Octal to Hexadecimal number to its hexadecimal equivalent.
1. Decimal to Non-decimal– The decimal to non-
decimal (binary, octal or hexadecimal), conversions use
the step given below.
Step 1: Divide the given number by the base value
of the number system in which it is to be converted.
Step 2 : Note the remainder.
Step 3: Keep on dividing the quotient by the base
value and note the remainder till the quotient is Zero.
Step 4 : Write the noted remainders in the reverse 2. Non-decimal to Decimal– The non-decimal to
order (from bottom to top). decimal conversions can be implemented by taking the
(i) Decimal to Binary conversion– The decimal to concept of place values not consideration we can use the
binary conversion is performed by repeatedly dividing following steps to convert the given number with base
Fundamental of Computer 9 YCT
value to its decimal equivalent, where base value can be number of 0s on most significant position of the binary
2, 8 and 16 for binary, octal and hexadecimal number number
system, respectively. Example – Convert (10101100)2 to octal number.
Step 1 : Write the position number for each Make group of 3-bits of the
alphanumeric symbol in the given number. given binary number (Right to Left) 010 101
Step 2 : Get positional value for each symbol by 100
raising its position number to the base value symbol in Write octal number for each 3- bit group. 2 5
the given number. 4
Step 3 : Multiply each digit with the respective Therefore, (10101100)2 = (254)8
positional value to get a decimal value. (ii) Octal Number to Binary Number– Each octal
Step 4 : Add all these decimal values to get the digit is an encoding for a 3-digit binary number. Octal
equivalent decimal number. number is converted to binary by replacing each octal
(i) Binary Number to Decimal Number digit by a group of three binary digits.
Conversion– A binary number can be converted to Example– Convert (705)8 to binary number.
equivalent decimal number by calculating the sum of the Octal digit → 7 0 5
products of each bit multiplied by its corresponding Write 3-bits binary
place value. The following example illustrate the method
value for each digit → 111 000 101
of converting binary number (1101)2 to decimal number.
Therefore, (705)8 = (111000101)2
Digit→ 1 1 0 1
4 Conversion from Binary Number to
Positional value→ 23 22 21 2º
Hexadecimal Number and Vice-versa–
Decimal Number→ 1× 23 + 1×22 + 0×21 + 1× 2º
(i) Binary Number to Hexadecimal Number–
8 + 4 + 0 + 1 = (13)10 Given a binary number, its equivalent hexadecimal
Therefore, (1101)2 = (13)10 number is computed by making a group of 4 binary
(ii) Octal Number to Decimal Number digits from right to left and substituting each 4-bit group
Conversion– An octal number can be converted into its by its corresponding computed by making a group of 4
equivalent number in decimal system by calculating the binary digits from right to left and substituting each 4-bit
sum of the products of each digit multiplied by its group by its corresponding hexadecimal alphanumeric
corresponding place value. The following example symbol. If required, add 0 bit on to have number of bit in
shows how to compute the decimal equivalent of an octal a binary number as multiple of 4.
number (257)8. Example– Convert (0110101100)2 to hexadecimal
Digit→ 2 5 7 number.
Positional value→ 82 81 80 Make group of 4-bits of
Decimal Number→ 2× 82 + 5×81 + 7×80 the given binary number (Right to left)
128 + 40 + 7 = (175)10 → 0001 1010 1100
Therefore, (257)8 = (175)10 Write hexadecimal symbol for each group
(iii) Hexadecimal Number to Decimal Number → 1 A C
Conversion– A hexadecimal number can be converted Therefore, (0110101100)2 = (1AC)16
into its equivalent number in decimal system by (ii) Hexadecimal Number to Binary Number–
calculating the sum of the products of each symbol Each hexadecimal symbol is an encoding for a 4-digit
multiplied by its corresponding place value. The binary number. Hence, the binary equivalent of a
following example shows how to compute the decimal hexadecimal number is obtained by substituting 4-bit
equivalent of an Hexadecimal (3A5)16. binary equivalent of each hexadecimal digit and
Digit→ 3 A 5 combining them together.
Positional value→ 162 161 16º Example. Convert (23D)16 to binary number.
2
Decimal Number→ 3× 16 +10×16 + 5×160
1
Hexadecimal digits→ 2 3 D
768 + 160 + 5 = (933)10 Write 4-bit binary for each digit→ 0010 0011 1101
Therefore, (3A5)16 = (933)10 Therefore, (23D)16 = (001000111101)2
3. Conversion from Binary Number to Octal 5. Conversion from Octal Number to
Number and Vice-versa– Hexadecimal Number– The given octal number can be
(i) Binary Number to Octal Number- Given a converted into its equivalent hexadecimal number in two
binary number, an equivalent octal number different steps. Firstly, We need to convert the given
representation by 3 bits is computed by grouping 3 bits octal number into its binary equivalent. After obtaining
from right to left and replacing each 3-bit group by the the binary equivalent, we need to making a group of 4
corresponding octal digit. In case number of bits in a binary digits from right to left and substituting each 4-bit
binary number is not multiple of 3, then add required, group by its corresponding hexadecimal alphanumeric
Fundamental of Computer 10 YCT
symbol. In this type of conversion, we need to represent (ii) Fractional Part of Decimal Number to Octal
each digit in the octal number to its equivalent 3-bit Number.
binary number.
Example– Convert the octal number (365)8 into its
hexadecimal number.
Octal digits→ 3 6 5
Write 3-bits binary value Since the fractional part is 0, the multiplication is
for each digit→ 011 110 stopped, write the integer part from top to bottom to get
101 octal number for the fractional part .
Regrouping into 4-bits of Therefore, (0.625)10 = (0.50)8
the binary number (Right to Left) → (iii) Fractional Part of Decimal Number to
0000 1111 0101 Hexadecimal Number.
Write hexadecimal symbol Example– Convert (0.675)10 to hexadecimal form.
for each group→ 0 F 5
Therefore, (365)8 = (F5)16
Conversion of a Number with Fractional
Part. Since the fractional part (.800) is repeating, the
Decimal Number with Fractional Part to multiplication is stopped, Write the integer part from top
Another– to bottom to get hexadecimal equivalent for the
Number system– To convert the fractional part of a fractional part.
decimal number to another number system with base
Therefore, (0.675)10 = (0.AC)16
value, repeatedly multiply the fractional part by the base
Non-decimal Number with Fractional Part to
value till the fractional part becomes 0. Use integer part
Decimal Number System– Computer positional value
from top to bottom to get equivalent number in that
number system. The fractional part does not become 0 in of each digit in the given number using its base value,
successive multiplication, then stop after, 10 Add the product for positional value and the digit to get
multiplications. In some cases, fractional part may start the equivalent decimal number with fractional part.
repeating then stop further calculation. (i) Fractional Part of Binary Number to Decimal
(i) Fractional Part of Decimal Number to Binary Number.
Number. Convert (0.111)2 into decimal number.
Example. Convert decimal number (0.25)10 to Digit→ 0 1 1 1
–1
binary. Fractional value→ 0 2 2–2 2–3
–1 –2 –3
Decimal value→ 1×2 + 1× + 1×2
0.25×2 = 0.50 0.5 + 0.25 + 0.125 = 0.875
0.50×2 = 1.00 Therefore, (0.111)2 = (0.875)10
Since the fractional part is 0, the multiplication is (ii) Fractional Part of Octal Number to Decimal
stopped. Write the integer part from top to bottom to get
Number.
binary number for the fractional part.
Convert (0.12)8 into decimal number.
Therefore, (0.25)10 = (0.01)2
Digit→ 0. 1 2
Example– Convert (0.675)10 to binary.
Fractional value→ 0. 8–1 8–2
–1 –2
Decimal value→ 1×8 + 2×8
0.125 + 0.03125 = 0.15625
Therefore, (0.12)8 = (0.15625)10
(iii) Fractional Part of Hexadecimal Number to
Decimal Number
Convert (0.58)16 into decimal number.
Digit→ 0. 5 8
Since the fractional part (400) is the repeating value
Fractional value→ 16–1 16–2
in the calculation, the multiplication is stepped, write the
integer part from top to bottom to get binary number for Decimal value→ 5×16–1 + 8×16–2
the fractional part. 0.3125 + 0.03125 =0.34375
Therefore, (0.675) = (0.1010110)2 Therefore, (0.58) 16 = (0.34375) 10
ANSWER KEY
1. (a) 2. (b) 3. (a) 4. (d) 5. (b) 6. (a) 7. (b) 8. (d) 9. (d) 10. (c)
11. (c) 12. (a) 13. (d) 14. (d) 15. (c) 16. (a) 17. (a) 18. (d) 19. (a) 20. (a)
21. (d) 22. (d) 23. (c) 24. (c) 25. (c) 26. (b) 27. (c) 28. (c) 29. (a) 30. (a)
31. (d) 32. (d) 33. (b) 34. (d) 35. (b) 36. (a) 37. (c) 38. (a) 39. (a) 40. (c)
41. (b) 42. (b) 43. (d) 44. (d) 45. (b) 46. (d) 47. (d) 48. (c) 49. (b) 50. (a)
51. (a) 52. (a) 53. (d) 54. (b) 55. (b) 56. (a) 57. (d) 58. (b) 59. (a) 60. (d)
61. (b) 62. (c) 63. (a) 64. (c) 65. (d) 66. (c) 67. (c) 68. (a) 69. (b) 70. (b)
71. (d) 72. (b) 73. (a) 74. (b) 75. (d) 76. (b) 77. (d) 78. (b) 79. (b) 80. (d)
81. (b) 82. (c) 83. (b) 84. (d) 85. (c) 86. (c) 87. (d) 88. (b) 89. (a) 90. (a)
91. (a) 92. (c) 93. (c) 94. (c) 95. (d) 96. (a) 97. (a) 98. (d) 99. (a) 100. (b)
101. (c) 102. (a) 103. (d) 104. (c) 105. (c) 106. (c) 107. (b) 108. (c) 109. (a) 110. (d)
111. (d) 112. (c) 113. (b) 114. (c) 115. (c) 116. (d) 117. (c) 118. (c)
1. File Tab→In word 2010, the file tab replaces word 2007's office button. The file tab contains some commands
like Home,New, Open, Save, Save As, Print etc.
2. Home Tab: It is used to changing document setting like font size, font color, adding bullets, adjusting styles.
Data Processing 21 YCT
3. Insert Tab→ It is used to insert pictures icons, shapes, tables etc into the word document.
.
4. Draw Tab→ It is used to draw different colored inks with pen, pencil and highlighter with different effects.
5. Design Tab→ It is the fourth tab from the left between the insert and the layout tabs. It is includes document
formatting, page background like watermark, page color, page border etc.
6.Layout→ It is use to set margin, control of page orientation and size, add or remove column, line breaks and set
paragraph indentation and lines.
7. References Tab→ It is used to enter document sources citations, bibliography commands etc. in word document.
It is used to create a table of contents and insert caption etc.
9. Review→ It consist of spelling & grammar, Thesaurus, speech-Read Aloud, Accessibility Track changes etc
commands. It provides icons for document review-related commands, such as spelling check, translation track
changes, apply changes and toggles the display of the research task pane defaulting the research service to the
thesaurus.
10. View→ This tab contains the commands of all the methods of viewing the documents, such as-
Views: read mode, Print layout, Web Layout, Outline, draft.
Page movement: Vertical, side to side.
Show: ruler, Gridlines, navigation pane, zoom split windows macros etc.
Note→ When your document is stored in one drive ,word will save your changes automatically.
Shortcut Keys→
Ctrl + S → Save
F12 → Save As
Note→ When you save for the first time "save" and "Save As" command are same.
Step-2: To preview each page, select the forward and backward arrows at the bottom of the page.
If the text is too small to read, use the zoom slider at the bottom of the page to enlarge it.
Or
Step-3: Paste the copied text or file with the help of paste command.
there are some method for paste command:
- using right click on mouse
- using paste button from ribbon
- using Ctrl+V (shortcut keys).
2-Moving a text one place to another place:
cut and paste:
Step-1: Select the text you want to move.
Step-2: go to the "clipboard section" in the home tab and click on 'cut' option.
or
press ctrl + X keys from keyboard.
Step-3: Click on "Paste" option from clipboard in the "Home" tab where you want to move text.
or
Press Ctrl + V Key form keyboard
Shortcut key→
Ctrl + X and Ctrl + V
Text can be selected either by mouse or keyboard- 1.13 Undo and Redu:
To select text with mouse, place the cursor at the Undo: The undo command is used to reverse a
beginning of the word or line, hold down the left mouse immediate changes in document. You can undo changes,
button and then drag the pointer over the text that you even after you have saved and then save again as long as
want to select to select text with keyboard, place the you are within the undo limits.
cursor at the beginning of the word or line using arrow
Note- By default office saves the last 100 undoable
keys and press shift + right arrow.
actions.
Select all text:
To undo an action press Ctrl + Z or click undo on quick
Click anywhere within the document and press Ctrl
access toolbar.
+ A on your keyboard
Select a single word:
to select a single word, quickly double-click that
word
Select a line of text:
Place your cursor at the start of the line and press
shift + down arrow key.
Select a paragraph of document :
Place your cursor at the anywhere of the paragraph
and quickly 3 times click on that paragraph. Place your Redo: Redo is the opposite of undo action. To Redo an
cursor at the beginning of the paragraph text and press action press Ctrl + Y or click on redo from quick access
Ctrl + Shift + down arrow. toolbar.
12. YEAR()–
This function returns the year corresponding to the date,
given as an argument.
Syntax–
YEAR (Serial_Number)
Serial_Number is the date of the year you want to find it.
Example–
Year ("11/8/2022") = 2022
ANSWER KEY
1. (a) 2. (c) 3. (b) 4. (a) 5. (b) 6. (c) 7. (a) 8. (c) 9. (c) 10. (d)
11. (a) 12. (a) 13. (b) 14. (d) 15. (b) 16. (a) 17. (b) 18. (d) 19. (d) 20. (d)
21. (b) 22. (b) 23. (b) 24. (d) 25. (c) 26. (d) 27. (d) 28. (a) 29. (c) 30. (d)
31. (d) 32. (b) 33. (c) 34. (d) 35. (c) 36. (d) 37. (d) 38. (b) 39. (d) 40. (d)
41. (d) 42. (b) 43. (d) 44. (a) 45. (c) 46. (a) 47. (c) 48. (c) 49. (c) 50. (a)
51. (a) 52. (c) 53. (a) 54. (a) 55. (d) 56. (b) 57. (d) 58. (b) 59. (b) 60. (a)
61. (b) 62. (c) 63. (c) 64. (d) 65. (c) 66. (c) 67. (b) 68. (b) 69. (c) 70. (c)
71. (d) 72. (a) 73. (d) 74. (d) 75. (a) 76. (b) 77. (c) 78. (c) 79. (d) 80. (b)
81. (b) 82. (c) 83. (c) 84. (b) 85. (a) 86. (d) 87. (c) 88. (a) 89. (d) 90. (d)
91. (a) 92. (c) 93. (c) 94. (c) 95. (b) 96. (a) 97. (c) 98. (a) 99. (a) 100. (c)
101. (d) 102. (a) 103. (a) 104. (a) 105. (d) 106. (b) 107. (a) 108. (d) 109. (b) 110. (a)
111. (b) 112. (d) 113. (d) 114. (d) 115. (a) 116. (b) 117. (b) 118. (c) 119. (b) 120. (d)
121. (c) 122. (a) 123. (b) 124. (d) 125. (a) 126. (a) 127. (d) 128. (b) 129. (a) 130. (a)
131. (b) 132. (b) 133. (c) 134. (c) 135. (d) 136. (b) 137. (a) 138. (b) 139. (d) 140. (d)
141. (a) 142. (a) 143. (c) 144. (b) 145. (c) 146. (a) 147. (c) 148. (a) 149. (c) 150. (d)
151. (b) 152. (a) 153. (a) 154. (a) 155. (c) 156. (d) 157. (d) 158. (a) 159. (c) 160. (c)
161. (c) 162. (d) 163. (d) 164. (c) 165. (a) 166. (c) 167. (c) 168. (c) 169.(b) 170. (a)
171. (b) 172. (c) 173. (d) 174. (b) 175. (d) 176. (a) 177. (d) 178. (d) 179. (c) 180. (a)
181. (c) 182. (b) 183. (a) 184. (c) 185. (c) 186. (b) 187. (a) 188. (a) 189. (b)
.Net .
2. .Net Framework Class Library (FCL)
.Net framework • It is a standard library that is a collection of
thousands of classes and used to build an
• .Net is a framework which was designed and application. The BCL (Base Class Library) is the
developed by Microsoft and it is a framework to core of the FCL and provides basic functionalities.
develop software applications. • In short, developers just need to import the BCL
• It is a software development framework for building in their language code and use its predefined
methods and properties to implement common and
and running applications on Windows.
complex functions like reading and writing to file,
• The software programs written in .NET are executed graphic rendering, database interaction, and XML
in CLR (Common Language Runtime). document manipulation.
• The .Net Framework supports programming languages 3. Common Type System (CTS)–
such as C#, F#, VB.NET, J#, VC++, JScript.NET, • The Common Type System (CTS) is a standard
for defining and using data types in the
APL, COBOL, Perl, Oberon, ML, Pascal, Eiffel, .NETframework.
Smalltalk, Python, etc. • CTS defines a collection of data types, which are
Components of .Net framework– used and managed by the run time to facilitate
1. Common Language Runtime (CLR) cross-language integration.
4. Common Language Specification (CLS)
• .Net Framework provides a runtime environment
• The Common Language Specification (CLS) is a
called Common Language Runtime (CLR). fundamental set of language features supported by
• It provides an environment to run all the .Net the Common Language Runtime (CLR) of the
Programs. .NET Framework.
The code which runs under the CLR is called as • It is a part of the specifications of the .NET
Framework and was designed to support language
Managed Code. Programmers need not to worry on
constructs commonly used by developers and to
managing the memory if the programs are running under produce verifiable code, which allows all CLS-
the CLR because it provides memory management and compliant languages to ensure the type safety of
thread management as well. code.
● Programmatically, when our program needs memory, • CLS includes features common to many object-
CLR allocates the memory for scope and de-allocates oriented programming languages. It forms a
subset of the functionality of common type system
the memory if the scope is completed. (CTS) and has more rules than defined in CTS.
● Programmatically, when our program requires C# –
memory then CLR allocates the memory for scope and C# is pronounced as "C-Sharp". It is an object-oriented
de-allocates the memory if the scope is completed. programming language provided by Microsoft that runs
● Language Compilers ( for example C#, VB.Net, J#) on .Net Framework.
History of C#
will convert the Code to Microsoft Intermediate
• The development of the dot net Framework began
Language (MSIL) intern this will be converted to about two decades ago in the mid-90s with the
Native Code by CLR. premise being very different from what it is now.
Programming Fundamentals 65 YCT
• The idea was built around the concept of a code that is Advantages of Dotnet–
named “managed code.” It was supposed to be the Object Oriented:
kind of code that developers would be able to execute • .NET is based on an Object-Oriented Programming
while it is under a runtime environment.
Module.
• This was essential because of how previous coding
• And it is a development model that involves breaking
processes and platforms were inefficient in providing
more flexible and secure experiences. down software into easily manageable smaller pieces.
• By building the .NET Framework, those issues are • It compartmentalizes data into data fields and
addressed, along with active memory management. It describes objects behavior through the declaration of
also dealt with more minor problems involved when classes.
working with C and C++. • It eliminates necessary programming and hence less
• C# was developed in the year 2002 and was introduced coding for developers. In addition to this, .NET makes
with .Net framework 1.0 it possible to reuse components and code, thereby
• Anders Hejlsberg is known as the founder of C# saving time and cost of development.
language. Visual Studio IDE–
Features of C# Visual Studio is an Integrated Development Environment
Simple by Microsoft which is used for building, debugging and
• In C# pointers are missing in C#. publishing applications across various platforms,
• Unsafe operations such as direct memory including Android and iOS.
manipulation are not allowed. The key features of the Visual Studio IDE:
• In C# there is no usage of "::" or "->" operators. It is a single IDE for all .NET applications
• Since it's on .NET, it inherits the features of automatic • The IDE comprises debugging and integrated
memory management and garbage collection. compilation features
• Varying ranges of the primitive types like Integer, • The solution can be used for applications that are
Floats, etc. based on code written in different languages.
• Integer values of 0 and 1 are no longer accepted as • It also customizes the environment to match user
Boolean values. Boolean values are pure true or false preference.
values in C# so no more errors of "="operator and
Flexible Deployment and Easy Maintenance–
"=="operator.
• "==" is used for comparison operation and "=" is used • One of the crucial and most advantageous features of
for assignment operation. .NET Core is flexible deployment.
Modern– • It can be installed as a part of the application .
C# programming is based upon the current trend and it is • The modular design allows including all the
very powerful and simple for building scalable, dependencies that we need. Moreover, the deployment
interoperable and robust applications. with .NET is as easy as copying a folder.
Object-oriented– • Another benefit is that we can have more than one
C# is object oriented programming language and it is a .NET Core version running side by side on the same
simple, modern, object oriented language derived from machine.
C++ and Java.C# supports Data Encapsulation, • Therefore, making it easy to cover different projects
inheritance, polymorphism, interfaces. and seamlessly perform a deployment task.
Type safe–
Great Caching System–
• In C# we cannot perform unsafe casts like convert
double to a Boolean. • The simplicity of the caching system of .NET makes it
reliable and easy to temporarily store data.
• Value types (primitive types) are initialized to zeros
and reference types (objects and classes) are • Moreover, it allows for the cache implementation to
initialized to null by the compiler automatically. be customized, so developers can improve
• Arrays are zero base indexed and are bound checked. performance and scale as needed.
• Overflow of types can be checked. Large Community:-
Interoperability– • When a framework is used by many businesses and
It enables the C# programs to do almost anything that a developers, it means it has such features that attract
native C++ application can do. them.
Scalable and Updateable– • It also proves its stability and high level of trust from
• C# is automatic scalable and updateable programming the community, making everyone try the framework.
language. • Moreover, a large community means that almost any
• For updating our application we delete the old files issue can be solved with the aid of community
and update them with new ones. members.
Programming Fundamentals 66 YCT
• According to the recent survey by Stack Overflow, • It was first released in 2002 to replace Visual Basic 6.
ASP.NET took fourth place among the most popular VB.NET is an object-oriented programming language.
frameworks, while dotNET and .NET core has ranked • This means that it supports the features of object-
second and third. oriented programming which include encapsulation,
Cost-Effective– polymorphism, abstraction, and inheritance.
• Visual Code Studio by Microsoft has been preferred • Visual Basic .ASP NET runs on the .NET framework
by a large number of front-end developers as it is that means that it has full access to the .NET libraries.
good, small, extensible and updated. • It is a very productive tool for rapid creation of a wide
• When choosing the appropriate technology, one of the range of Web, Windows, Office, and Mobile
first things that we check is the IDEs and tools that are applications.
mandatory or add to productivity. Control Statement in C#
• A lot of them are free, but the best ones come with C# IF Statement–
licensing costs per developer, per, which can sum up It checks the condition first and if the condition is true
to thousands of dollars. then the statement is executed.
• No matter whether we are a Startup trying to find our Syntax–
way into the market or a big company, the money if(expression)
could be spent in a better way. {
Disadvantages of .NET ………
Limited Object-Relational Support ………
• As we know, .NET works on the Object-Oriented }
Programming approach, which is based on objects C# IF-else Statement–
rather than actions and data rather than logic.
In C#, if-else statement also tests the condition. It
• The support of data-oriented software application executes the if block, if the condition is true otherwise
development in .NET Framework is provided by the the else block is executed.
Entity Framework.
Syntax–
• The entity acts as the bridge between the object- if(expression)
oriented .NET Framework and SQL databases.
{
• However, some developers believe The Entity ………
Framework doesn’t offer the required flexibility and
……..
doesn’t support all the available database designs.
}
Stability Issues for New Releases–
else
• Finally, whenever the company decides to launch new
{
features or make new updates, documents and support
can be lacking. ……
• This can jeopardize the stability of development ……
projects. }
Memory Leaks For loop in C#
• .NET is one of those platforms that are frequently Syntax–
criticized for memory-related and memory leak issues. for(initialization; condition; incr/decr)
• Although .NET possesses a garbage collector for this {
problem. ………
Difficulty in the Transition to .NET core– ……...
• The transition to .NET core can be long and difficult. }
The applications built with older .NET versions are far While Loop in C#
more than that built with .NET core. Syntax–
• Transiting these applications to the latest versions of while(condition)
.NET can be a little bumpy. {
Licensing Cost– ,........
• Many aspects of the .NET family will cost money in ……..
terms of licensing fees and they can stack up. }
• The more demanding the project, the more expensive Do-While Loop in C#
it can get. For example, Visual Studio can cost a Syntax–
whopping $539.00 for one year. do
VB.Net– {
• VB.NET stands for Visual Basic.NET and it is a ……..
computer programming language developed by ……..
Microsoft. }while(condition);
Programming Fundamentals 67 YCT
Arrays in C# • Artificial intelligence is the ability of machines that
• Array in C# is a group of similar types of elements perform certain tasks which require the intelligence
that have contiguous memory locations. showcased by humans and animals.
• In C#, array is an object of base type System.Array. • The above definition was proposed by Marvin Minsky
Array index starts from 0 in C#. and John McCarthy from 1950s who were also known
as the father of the Artificial intelligence.
Array declaration in C#
Types of AI
Following is single array declaration:
There are two ways in which artificial intelligence is
generally classified-
int[ ] array = new int [4 ]; (i) Based on capabilities and
(ii) Based on functionality of AI
this keyword in C# Following diagram depicts the types of AI
this is a keyword which is used to refer the current meaningfully:
instance of the class.
Artificial Intelligence .
Separation of Concerns–
• Separation of concerns is a principle used in
programming to separate an application into units,
with minimal overlapping between the functions of
the individual units.
• The separation of concerns is achieved using
Composition Over Inheritance– modularization, encapsulation and arrangement in
• The Composition Over Inheritance principle is very software layers.
useful while writing code by using object- oriented Following diagram demonstrates the separation of
programming . concerns.
• It states that objects with complex behaviors should
contain instances of objects with individual behaviors
and they should not inherit a class and add new
behaviors.
• Only relying on inheritance causes two major
problems. First, the inheritance hierarchy can get
messy in a hurry and we also have less flexibility for
defining special-case behaviors.
Following diagram illustrates composition over
inheritance.
Class–
• Objects are variables of the type class and once a class
is defined then we can create any number of objects
belonging to that class.
• A class is therefore, a collection of objects of similar
OR
type and it represents the set of properties or methods
that are common to all objects of one type. Class Animal {
• A class is like a blue print for an object. // eat () → function
For example– Mango, apple and orange are members // shout () → function
of a class fruit. };
fruit mango; class Dog: public Animal{
↓ ↓ // bark () → function
(class) (object) };
Data abstraction– Data abstraction refers to the act Note– In OOP the concept of inheritance provides the
of providing essential features without including the idea of reusability that means we can add additional
background details or explanations. features to an existing class without modifying it.
For example- A man who knows to drive a car but There are many forms of inheritance-
does not know the inner mechanism of car how it runs. Single inheritance–
Note– This is a form of inheritance in which a class inherits
• Attributes are sometime called as data members only one parent class.
because they hold information.
for example
• The functions which operate on these data are
sometime is called as method or member functions.
Encapsulation–
• In general, encapsulation is a process of wrapping
similar code in one place. In the above diagram, class y extends only class x and
• It involves the bundling of data members and class x is a super class and class y is a sub-class.
functions inside a single class. Multiple Inheritance–
• Bundling similar data members and functions inside Here, one class extends more than one class.
a class together helps in data hiding as well.
For example
class Rect
{
public:
int leng; Note-: Java does not support multiple inheritance.
int brdth; Multilevel Inheritance– Here, one class can inherit
int getArea() from a derived class; therefore, the derived class
{ becomes the base class for the new class.
return long * brdth;
}
};
in the above code leng and brdth are data members and
the function get Area () are kept together in Rect class.
Programming Fundamentals 82 YCT
Hierarchical Inheritance– Here, one class is For example
inherited by many sub classes. Class Text
{
public:
void display ()
It is clear from the above diagram that class b, class {
c and class d inherit the same class. cout << "Text class";
Hybrid Inheritance– }
It is also known as multipath inheritance due to the };
subclass deriving its properties from super class Class Derived: public Text
following the various paths. {
public:
void display ()
{
cout << "Derived class";
}
}
Polymorphism– Polymorphism, a Greek term, Now, it is clear from the above example that function
which means the ability to take more than one form. It is display () is overridden in the derived class.
the same entity (function or operator) that behaves Dynamic binding–
differently in different scenarios. • Dynamic binding means that a block of code executed
For example– (+) operator in C++ programming is with reference to a procedure (method) call is
used in two ways- determined at run time.
First as arithmetic operation as addition and second • Dynamic binding is also called as late binding or run-
as string concatenation or in layman words we can say, a time binding
lady can perform as a teacher in school and mother at Message passing–
home. • Objects communicate with one another by sending
Polymorphism is mainly divided into two parts– and receiving information to each other. A message
• Compile time polymorphism for an object is a request for execution of a procedure
• Runtime polymorphism (method) and that is why it invokes function in the
• Compile time polymorphism– receiving object that generates the desired results.
It is achieved by function overloading or operator over • Message passing involves specifying the name of
loading. object, the name of the function and the information to
be sent.
Function overloading–
Constructors–
Function overloading refers to the use of the same
• A constructor is a 'special' member function whose task
thing for different purposes that means we can use the
is to initialize the objects of its class.
same function name to create functions that perform a
variety of different tasks. This is also called as function • It is special because its name is the same as the class
polymorphism in OOP. Functions can be overloaded by name.
change in number of arguments or change in type of • It is invoked whenever an object of its associated class
argument. is created.
Operator overloading– • It is called constructor because it constructs the values
of data members of the class
Overloading means assigning different meanings to
an operation, depending on the context. For example, '+' Syntax–
operator is performed as addition in arithmetic operation Class integer //class with a constructor
and it is also used for concatenate two strings. {
int x, y;
• Runtime polymorphism–
public:
Runtime polymorphism is achieved by function
overriding. integer(void) // constructor declared
..........
Function overriding– It is a feature that allows to
use a function in the child class that is already present in ..........
its parent class. The child class inherits all the data };
members and the member functions present in the parent integer :: integer(void)
class. {
Function overriding means creating a newer version x = 0; y = 0;
of the parent class function in the child class. }
Programming Fundamentals 83 YCT
Destructors– It is used to destroy the object that is Number of objects created 5
created by a constructor. Same as constructor, the Number of objects destroyed 5
destructor is a member function whose name is the same Re-enter main
as the class name but it is preceded by a tidle (~). Number of objects destroyed 4
for example, the destructor for the class text can be Number of objects destroyed 3
defined as- Number of objects destroyed 2
~ class () Number of objects destroyed 1
{ Note–
} 1. A constructors has the same name as that of a class.
For example 2. Constructors are normally used to initialize variables
# include<iostream> and to allocate memory.
using namespace std; Features of OOPs–
int count = 0, • Emphasis in on doing things (algorithms)
class birth • Large programs are divided into smaller programs
{ which is known as functions.
public: • Data is hidden and cannot be accessed by external
birth() functions.
{ • Data move openly around the system from function to
count ++; function.
cout<<"\n number of objects created"<< • Employs top-down approach in program design.
count; Benefits of OOP's–
• With the help of inheritance, we can eliminate
} redundant code and extend the use of existing classes.
~birth (){ • The principle of data hiding helps the programmer to
cout<<"\n number of objects destroyed" build secure programs that can not be invaded by code
<< count; in other parts of the program.
count --; • Software complexity can be easily managed.
} • The data centered design approach enables to capture
}; more details of a model in implementation form.
int main (){ • Message passing techniques for communication
cout<< "\n\ n Enter Main \ n"; between objects make the interface descriptions with
birth B1,B2, B3, B4 external systems much simpler.
{ • Flexibility through polymorphism.
cout<< "\n\n Enter Block 1\n"; • Security→ because of concept of data abstraction,
birth B5; only limited amount of data is shown to user. It allows
} the maintenance of security.
{ Integrated Development Environment
cout<< "\n\ n Enter Block 2 \n"; • Integrated development environments (IDE) are
birth B6; applications that facilitates the development of other
} applications.
cout<< "\n\n Re-enter main \n"; • It provides a central interface with any tools which
return 0; appears convenient for developer to use.
} • It is a build application that combines common
The output of the program is- developer tools into a single graphical user interface
Enter main (GUI). An IDE typically may have source code
Number of objects created 1 editor, local build automation and debugger etc.
Number of objects created 2 History of IDE
Number of objects created 3 • Before the development of IDE, programmer used to
Number of objects created 4 write their program in text editor.
Enter Block 1 • And this involved writing and saving an application in
Number of objects created 5 the text editor before running run the compiler, taking
Number of objects destroyed 5 note of any error messages, and then going back to the
Enter Block 2 text editor to revise their code.
Programming Fundamentals 84 YCT
• During 1983, Borland Ltd. acquired a Pascal compiler Unit Testing–
and published it as Turbo Pascal which had for the It’s necessary to conduct proper testing for checking
first time integrated editor and compiler. the quality of code in the software. We can do the testing
Benefits of Using IDEs– with different types of testing software such as PHPUnit,
It improve developers productivity. Perl TAP, Python unit test, and Ruby’s rake test to
support frameworks for our language.
Boost the speed of development activities.
Code Refactoring & Profiling–
• Keeps developers up to date with the latest practices
It allows to change the code globally, which saves time
and threats.
instead of changing the code manually. Code profiling
• It saves times and a programmer doesn't need to type quickly recognizes the congestion by analyzing the code
out full character sequences. performance based on a function-by-function basis.
• Help developers to organize their workflow and solve Source Code Integration–
problems. An IDE contains necessary commands such as push,
• Syntax highlighting is also common in most IDEs, pull/update, commit, history, etc…, that keeps the
which uses visual cues to distinguish grammar in the application up to date with the team and vice versa
text editor. without using another tool. For example, Komodo IDE
Multi-Language IDE– supports for Subversion, Mercurial, Git, Perforce,
• The multi-language IDE such as Eclipse, Aptana, Bazaar, and CVS.
Komodo, NetBeans, and Geany support multiple Development and Release Tool Integration–
programming languages. The IDE software can easily integrate tools or other
• Eclipse- It supports C++, Perl, Python, Ruby, PHP, systems and allows accessing them easily. Some features
Java and others. It is managed and directed by the include spell-checking, track changes and database
Eclipse.org Consortium.It is a free and open source integrations with the database explorer.
editor for many development frameworks. Important facts
• Aptana- It supports HTML, JavaScript, CSS, AJAX • A static variable retains its value throughout the file of
and others through plugins. It is a popular choice for the program
programmers who do web app development. • A continue statement in a while loop shall transfer
• Komodo- It supports Perl, PHP, Python, Tcl, control to test condition of while loop.
JavaScript, Ruby etc. • Semantic errors can be detected at both compile time
• NetBeans- It supports Java, PHP, JavaScript, C, C++, and run-time only.
Python, Ruby etc. It is also free and open source. • C was primarily developed as a system programming
• Geany- It supports C, PHP, Java, HTML, Perl, language.
Python, Pascal etc. • One of the disadvantages of pass by reference is that
Visual Studio– It supports VB.NET, Visual C++, the called function may inadvertently corrupt the
C#, F# and more. Visual Studio is Microsoft's IDE, caller's data and this can be avoided by declaring the
designed to create apps for the Microsoft platform. formal parameters constant.
MonoDevelop– It supports Visual Basic, C/C++, • Register, Extern and Type def are storage class
C#, and additional .NET languages. specifies in C programming language.
Coda– Supports PHP, CSS, HTML, JavaScript, • The value range for "short" data type in Java is -215
AppleScript, and Cocoa API. This IDE is highlighted as to +215–1.
"one-window development" for Mac users. • In java, the "DataInputastream" class is defined in
Espresso: it supports XML, HTML, CSS, PHP, and java.io package.
JavaScript. Espresso is a tool specifically for Mac web • Earlier name of Java programming language was
programmers. OAK.
Why IDE Should be used– • Object oriented inheritance models "is a kind of"
The functionality of IDE saves time and makes relationship.
coding easier . Followings are certain points that specify • Prepared statement can execute parameterized queries.
why to go for IDE. • The keyword used to transfer control from a function
Debugging– back to the calling function is return.
It is a tool for monitoring and analyzing the • Java is a platform free language.
programs and generates the output as specified. The • Bug means a logical error in a program.
Komodo IDE contains debugging features such as • Polymorphism, Data encapsulation and operator over
breakpoint control, remote debugging, watching loading is the property of object oriented
variables, viewing the call stack, etc. programming.
ANSWER KEY
1. (a) 2. (c) 3. (b) 4. (d) 5. (a) 6. (d) 7. (c) 8. (c) 9. (a) 10. (d)
11. (b) 12. (a) 13. (c) 14. (a) 15. (b) 16. (a) 17. (b) 18. (a) 19. (c) 20. (d)
21. (d) 22. (d) 23. (d) 24. (d) 25. (a) 26. (b) 27. (b) 28. (b) 29. (a) 30. (c)
31. (d) 32. (a) 33. (a) 34. (d) 35. (a) 36. (b) 37. (c) 38. (b) 39. (c) 40. (b)
41. (b) 42. (a) 43. (b) 44. (d) 45. (a) 46. (b) 47. (d) 48. (c) 49. (a) 50. (d)
51. (a) 52. (a) 53. (d) 54. (b) 55. (a) 56. (d) 57. (a) 58. (d) 59. (d) 60. (a)
61. (d) 62. (b) 63. (d) 64. (a) 65. (b) 66. (c) 67. (a) 68. (b) 69. (a) 70. (b)
71. (d) 72. (a) 73. (b) 74. (a) 75. (a) 76. (c) 77. (a) 78. (b) 79. (a) 80. (a)
81. (d) 82. (d) 83. (a) 84. (a) 85. (a) 86. (b) 87. (d) 88. (a) 89. (b) 90. (c)
91. (a) 92. (a) 93. (a) 94. (c) 95. (c) 96. (c) 97. (a) 98. (c) 99. (b) 100. (d)
101. (d) 102. (d) 103. (a) 104. (a) 105. (c) 106. (c) 107. (a) 108. (b) 109. (a) 110. (d)
111. (c) 112. (a) 113. (a) 114. (a) 115. (b) 116. (d) 117. (b) 118. (a) 119. (b) 120. (a)
121. (d) 122. (c) 123. (d) 124. (a) 125. (a) 126. (d) 127. (d) 128. (c) 129. (c) 130. (a)
131. (c) 132. (b) 133. (d) 134. (b) 135. (c) 136. (a) 137. (a) 138. (c) 139. (d) 140. (b)
141. (b) 142. (c) 143. (a) 144. (b) 145. (a) 146. (d) 147. (d) 148. (c) 149. (b) 150. (a)
151. (c) 152. (d) 153. (b) 154. (d) 155. (c) 156. (d) 157. (c) 158. (d) 159. (b) 160. (c)
161. (d) 162. (c) 163. (b) 164. (d) 165. (a) 166. (b) 167. (b) 168. (d) 169. (c) 170. (c)
171. (b) 172. (c) 173. (c) 174. (b) 175. (d) 176. (d) 177. (a) 178. (d) 179. (b) 180. (a)
181. (b) 182. (b) 183. (a) 184. (b) 185. (a) 186. (d) 187. (d) 188. (d) 189. (d) 190. (c)
191. (d) 192. (d) 193. (a) 194. (c) 195. (c) 196. (d) 197. (b) 198. (a) 199. (b) 200. (b)
201. (d) 202. (d) 203. (e) 204. (b) 205. (d) 206. (a) 207. (b) 208. (a) 209. (d) 210. (a)
211. (a) 212. (d) 213. (d) 214. (c) 215. (a) 216. (d) 217. (c) 218. (a) 219. (b) 220. (c)
221. (b) 222. (c) 223. (a) 224. (d) 225. (d) 226. (b) 227. (a) 228. (a) 229. (c) 230. (c)
231. (a) 232. (d) 233. (b) 234. (d) 235. (d) 236. (c) 237.(c) 238. (a) 239. (b) 240. (b)
241. (d) 242. (c) 243. (d) 244. (d) 245. (c) 246. (c) 247. (d) 248. (a) 249. (d) 250. (b)
251. (a) 252. (d) 253. (c) 254. (b) 255. (a) 256. (b) 257. (b) 258. (a) 259. (d) 260. (b)
261. (c) 262. (d) 263. (c) 264. (d) 265. (a) 266. (b) 267. (a) 268. (d) 269. (b) 270. (c)
271. (d) 272. (c) 273. (d) 274. (a) 275. (a) 276. (d) 277. (b) 278. (d) 279. (d) 280. (a)
281. (c) 282. (c) 283. (a) 284. (d) 285. (c) 286. (c) 287. (c) 288. (a) 289. (a) 290. (b)
291. (d) 292. (d) 293. (b) 294. (d) 295. (c) 296. (a) 297. (b) 298. (c) 299. (a) 300. (b)
301. (b) 302. (d) 303. (b) 304. (b) 305. (a) 306. (a) 307. (a) 308. (c) 309. (a) 310. (b)
311. (b) 312. (d) 313. (c) 314. (a) 315. (d) 316. (b) 317. (b) 318. (c) 319. (a) 320. (a)
321. (a) 322. (c) 323. (b) 324. (d) 325. (c) 326. (b) 327. (b) 328. (a) 329. (d) 330. (a)
331. (c) 332. (a) 333. (c) 334. (b) 335. (b) 336. (d) 337. (c) 338. (d) 339. (b) 340. (d)
341. (c) 342. (d) 343. (b) 344. (a) 345. (c) 346. (b) 347. (c) 348. (d) 349.(c) 350. (c)
351. (d) 352. (d) 353. (a) 354. (c) 355. (b) 356. (c) 357. (b) 358. (b) 359. (c) 360. (c)
361. (c) 362. (b) 363. (b) 364. (d) 365. (a) 366. (c)
In order: 42513
Pre order: 12453
Post order: 45231
AVl Tree–
AVL tree can be defined as height balanced binary
search tree in which each node is associated with a
balance factor which is calculated by subtracting the
height of its right sub tree from that of its left sub tree. If
• Strictly Binary Tree– If every non leaf node in a there are N nodes then height of tree is log 2(N+1).
binary tree has non-empty left and right sub trees. All of When a tree is balanced then difference of height between
the nodes in a strictly binary tree are of degree zero or left sub tree and right sub tree is not more than 1.
two, never degree one. Graph and their representation–
Graph is linear or data type, to represent a graph, we
just need the set of vertices and each vertex the
neighbors of vertex. If it is weighted graph, then the
weight will be associated with each edge, there are
different ways to optimally represent a graph, depending
on the density of its edges, type of operations to be
performed and ease of use.
Adjacency Matrix–
• Adjacency matrix is sequential representation
• It is used to represent which nodes are adjacent to
each other.
A strictly binary tree with n leaves always 2n-1 nodes. • In this representation we have to construct nxn matrix
Complete Binary Tree– A Complete binary tree is of there is any edge from a vertex i to vertex J then the
a binary tree in which all the levels are completely filled corresponding element of A i.e. aiJ = 1 otherwise
except possibly the lowest one which is filled from left. aiJ = 0.
Tree Traversal Undirected graph representation–
Pre-order Traversal
First visit the root then traverse the left sub tree after
that traverse the right sub tree.
Note- Preorder traversal is used to create a copy of
the tree. Pre order traversal is also used to get prefix
expression on an expression tree.
In Order Traversal- Traverse the left sub tree.
Visit the root & then traverse the right sub tree.
Directed graph representation
Note- In the case of binary search tree in order
traversal gives nodes in non-diseasing order.
Post-order Traversal
First traverse the left sub tree then traverse the right
sub tree after that visit root.
Note- Post order traversal is used to delete the tree.
Post order traversal is also useful to get the post fix
expression of an expression tree.
DATA Structures and Algorithm 113 YCT
In the above figure I represents an edge from row Example–
vertex to column vertex and o represent no edge from
row vertex to column vertex.
Undirected weighted graph representation–
ANSWER KEY
1. (a) 2. (a) 3. (d) 4. (a) 5. (b) 6. (a) 7. (a) 8. (d) 9. (b) 10. (d)
11. (d) 12. (c) 13. (d) 14. (a) 15. (c) 16. (b) 17. (a) 18. (a) 19. (b) 20. (b)
21. (d) 22. (c) 23. (a) 24. (a) 25. (a) 26. (d) 27. (a) 28. (b) 29. (b) 30. (c)
31. (c) 32. (b) 33. (c) 34. (d) 35. (b) 36. (d) 37. (a) 38. (b) 39. (a) 40. (d)
41. (b) 42. (c) 43. (a) 44. (d) 45. (b) 46. (d) 47. (b) 48. (b) 49. (c) 50. (d)
51. (b) 52. (a) 53. (b) 54. (a) 55. (a) 56. (d) 57. (b) 58. (d) 59. (c) 60. (d)
61. (b) 62. (c) 63. (a) 64. (b) 65. (a) 66. (a) 67. (b) 68. (d) 69. (c) 70. (d)
71. (c) 72. (b) 73. (c) 74. (b) 75. (b) 76. (d) 77. (b) 78. (c) 79. (c) 80. (b)
81. (a) 82. (d) 83. (b) 84. (d) 85. (d) 86. (b) 87. (a) 88. (b) 89. (b) 90. (a)
91. (b) 92. (b) 93. (c) 94. (c) 95. (b) 96. (b) 97. (d) 98. (a) 99. (d) 100. (c)
101. (b) 102. (a) 103. (c) 104. (b) 105. (b) 106. (a) 107. (b) 108. (a) 109. (b) 110. (b)
111. (d) 112. (c) 113. (b) 114. (a) 115. (a) 116. (d) 117. (c) 118. (a) 119. (c) 120. (c)
121. (c) 122. (b) 123. (a) 124. (c) 125. (c) 126. (c) 127. (c) 128. (d) 129. (c) 130. (a)
131. (b) 132. (c) 133. (a) 134. (c)
ANSWER KEY
1. (d) 2. (a) 3. (c) 4. (d) 5. (d) 6. (a) 7. (c) 8. (b) 9. (b) 10. (c)
11. (c) 12. (a) 13. (c) 14. (c) 15. (c) 16. (c) 17. (c) 18. (a) 19. (b) 20. (a)
21. (a) 22. (d) 23. (c) 24. (c) 25. (c) 26. (d) 27. (a) 28. (a) 29. (d) 30. (d)
31. (b) 32. (b) 33. (a) 34. (b) 35. (b) 36. (a) 37. (a) 38. (b) 39. (a) 40. (c)
41. (c) 42. (a) 43. (c) 44. (d) 45. (c) 46. (a) 47. (d) 48. (a) 49. (a) 50. (a)
51. (b) 52. (a) 53. (c) 54. (b) 55. (c) 56. (b) 57. (b) 58. (c) 59. (b) 60. (d)
61. (d) 62. (b) 63. (d) 64. (a) 65. (a) 66. (c) 67. (d) 68. (d) 69. (a) 70. (c)
71. (a) 72. (a) 73. (c) 74. (d) 75. (b) 76. (d) 77. (d) 78. (b) 79. (a) 80. (d)
81. (b) 82. (d) 83. (d) 84. (d) 85. (b) 86. (b) 87. (a) 88. (c) 89. (b) 90. (a)
91. (a) 92. (a) 93. (c) 94. (b) 95. (b) 96. (d) 97. (c) 98. (d) 99. (c) 100. (d)
101. (b) 102. (d) 103. (a) 104. (a, c) 105. (c) 106. (a) 107. (c) 108. (b) 109. (a) 110. (c)
111. (a) 112. (b) 113. (c) 114. (c) 115. (b) 116. (a) 117. (c) 118. (a) 119. (d) 120. (a)
121. (b) 122. (a) 123. (c) 124. (a) 125. (a) 126. (b) 127. (b) 128. (c) 129. (c) 130. (c)
131. (d) 132. (c) 133. (a)
Mesh Topology :
Network Transmission Modes :
Which data is transmitted from one device to
In mesh topology each computer is connected to
another device is known as transmission or
every other computer in point-to-point mode. There
communication mode, each communication channel
are multiple paths from one computer to another
has a direction associated with it, and transmission
computer. It does not contain the switch, hub or any
media provide the direction. It is defined in the
central computer, which acts as a central point of
physical layer.
communication. Mesh topology is mainly used for
‘WAN’ implementations where communication There are three types of transmission mode :
failures are a critical concern. Mesh topology can be (i) Simplex mode (ii) Half-duplex mode
formed by using the formula Number of cables = (n (iii) Full-duplex mode
*(n – 1))/2, when n is the number of node that (i) Simplex Mode : In simplex mode, the
represent the network. communication is unidirectional, the data flow in
Communication & Network Concept 153 YCT
one direction. A device can only send the data but OSI Model : OSI stands for open system
cannot receive it or it can receive the data but cannot interconnection. It is an open standard for
send the data. establishing communication between systems. OSI
Keyboards and traditional monitors are example of is a reference model that describes how information
simplex device the keyboard can only introduce from a software application in one computer moves
input; the monitor can only accept output. Simplex through a physical medium to the software
mode can use the entire capacity of the channel to application in another computer.
send data in one direction. OSI model was developed by the international
The simplex mode is used in the business filed as Organization for standardization (ISO) in 1984, and
sales that do not require any corresponding reply. it is now considered as an architectural model for the
inter-computer communications.
This model consists of seven layers and each layer
performs a particular network function and each
layer is self-contained. So that task assigned to each
(ii) Half-duplex Mode : In half-duplex mode, each
layer can be performed independently.
station can both transmit and receive but not at the
same time when one device is sending data then
other device only can receive a walkie-talkie is an
example of the half-duplex mode in Walkie-talkie if
one party speaks and another party can listeners.
After a pause the other speaks and first party listen
in half-duplex mode. When one device is sending
the data. Then another has to wait, this cause the
delay in sending the data at the right time.
ANSWER KEY
1. (a) 2. (a) 3. (a) 4. (b) 5. (d) 6. (d) 7. (b) 8. (d) 9. (d) 10. (a)
11. (d) 12. (d) 13. (a) 14. (d) 15. (a) 16. (b) 17. (d) 18. (d) 19. (d) 20. (d)
21. (d) 22. (c) 23. (c) 24. (a) 25. (a) 26. (d) 27. (c) 28. (c) 29. (c) 30. (c)
31. (c) 32. (c) 33. (b) 34. (d) 35. (c) 36. (b) 37. (a) 38. (d) 39. (d) 40. (d)
41. (a) 42. (c) 43. (d) 44. (d) 45. (b) 46. (d) 47. (c) 48. (b) 49. (a) 50. (b)
51. (d) 52. (b) 53. (b) 54. (a) 55. (c) 56. (c) 57. (a) 58. (d) 59. (b) 60. (d)
61. (a) 62. (a) 63. (b) 64. (b) 65. (b) 66. (d) 67. (d) 68. (b) 69. (d) 70. (a)
71. (b) 72. (c) 73. (d) 74. (a) 75. (c) 76. (d) 77. (b) 78. (b) 79. (c) 80. (a)
81. (b) 82. (b) 83. (a) 84. (c) 85. (d) 86. (c) 87. (a) 88. (c) 89. (d) 90. (d)
91. (b) 92. (a) 93. (b) 94. (b) 95. (c) 96. (c) 97. (d) 98. (a) 99. (a) 100. (c)
101. (b) 102. (b) 103. (c) 104. (b) 105. (b) 106. (a) 107. (a) 108. (a) 109. (c) 110. (a)
111. (b) 112. (b) 113. (a) 114. (b) 115. (c) 116. (c) 117. (a) 118. (d) 119. (b) 120. (c)
121. (c) 122. (c) 123. (c) 124. (c) 125. (d) 126. (a) 127. (d) 128. (d) 129. (c) 130. (c)
131. (b) 132. (d) 133. (b) 134. (c) 135. (b) 136. (a) 137. (c) 138. (c) 139. (a) 140. (d)
141. (d) 142. (c) 143. (c) 144. (a) 145. (c) 146. (d) 147. (a) 148. (d) 149. (d) 150. (c)
151. (b) 152. (a) 153. (b) 154. (a) 155. (b) 156. (a) 157. (a) 158. (c) 159. (a) 160. (b)
161. (c) 162. (a) 163. (c) 164. (d) 165. (a) 166. (a) 167. (b) 168. (c) 169. (a) 170.(a)
171. (d) 172. (a) 173. (c) 174. (d) 175. (c) 176. (b) 177. (c) 178. (a) 179. (c) 180.(a)
181. (c) 182. (a) 183. (c) 184. (d) 185. (c) 186. (b) 187. (b)
ANSWER KEY
1. (a) 2. (b) 3. (d) 4. (a) 5. (a) 6. (b) 7. (a) 8. (a) 9. (c) 10. (b)
11. (b) 12. (a) 13. (c) 14. (d) 15. (b) 16. (a) 17. (a) 18. (d) 19. (a) 20. (c)
21. (a) 22. (d) 23. (a) 24. (b) 25. (a) 26. (c) 27. (d) 28. (a) 29. (d) 30. (c)
31. (b) 32. (c) 33. (b) 34. (b) 35. (b) 36. (b) 37. (a) 38. (c) 39. (c) 40. (a)
41. (d) 42. (a) 43. (d) 44. (a) 45. (a) 46. (a) 47. (c) 48. (d) 49. (d) 50. (d)
51. (d) 52 (b) 53. (d) 54. (a) 55. (c) 56. (b) 57. (d) 58. (a) 59. (b) 60. (d)
61. (c) 62. (d) 63. (a) 64. (a) 65. (b) 66. (d) 67. (b) 68. (b) 69. (a) 70. (b)
71. (c) 72. (a) 73. (b) 74. (b) 75. (d) 76. (c) 77. (b) 78. (b) 79. (b) 80. (b)
81. (c) 82. (d) 83. (c) 84. (a) 85. (c) 86. (d) 87. (c) 88. (c) 89. (c) 90. (b)
91. (a) 92. (c) 93. (b) 94. (c) 95. (c) 96. (c) 97. (d) 98. (a)
3-Tier Architecture–
1 student can opt for many courses but a course can • Manipulation of data is the modification of
only have 1 student, this is how it is. information to make it easer to read and more
Many to One Relationship– When more than one structured.
instances of an entity is associated with a single
instance of another entity then it is called many to •DML (Data Manipulation Language) is used to
one relationship. For example- Many students can manipulate data and it is a programming language
study in a single college but a student cannot study which helps in modifying data such as adding,
in many colleges at the same time. removing and altering databases.
•Data manipulation is a key feature for business
operations and optimization. Steps involved in Data
Manipulation
Many to Many Relationship– Followings are the steps in the data manipulation–
1. There must be some possible data to create a
database which is generated from the data sources.
The above diagram represents that one student can 2. Knowledge of restructuring and reorganization is
enroll for more than one courses and a course can required which is done with the manipulation of
have more than 1 students enrolled in it. data.
Database Management System 188 YCT
3. In this step then we need to import a database and • ease of use for developers
create it to start working with data. • lightning fast queries
4. Then we can edit, delete, merge or combine our
Types of NoSQL Databases
information with the help of data manipulation.
Document Databases: it stores data in documents
5. And at the end, analysis of data becomes easy at the similar to JSON (JavaScript Object Notation) objects.
time of manipulating data. Each document contains pairs of fields and values. The
Why to use data manipulation? values can typically be a variety of types including things
• To improve the growth of any business and like strings, numbers, booleans, arrays, or objects.
organization. Graph Databases: it stores data in nodes and
• Helps in organising raw data in a structured way edges. Nodes typically store information about people,
which boosts productivity, trend analysis, cutting places, and things, while edges store information about
cost and analyzing customer behaviour etc. the relationships between the nodes.
• DML-Data Manipulation Language in SQL Wide-column: it stores data in tables, rows, and
With the help of DML command we can easily dynamic columns.
access, store, modify, update and delete the existing Key-value Databases: These are a simpler type of
records from the database. database where each item contains keys and values.
Followings are the DML commands in SQL Various Factors to Use NoSQL:-
(i) SELECT Command– This command shows the ● Fast-paced agile development
records of the specified table and it also shows the ● Storage of structured and semi-structured data
particular record of a particular column by using the ● Huge volumes of data
clause WHERE. ● Requirements for scale-out architecture
Syntax– ● Modern application paradigms like microservices
and real-time streaming
Datatypes in MongoDB
• To retrieve the data from all the columns of the String- It is used to store data and it must be UTF 8
table, following SELECT commands is used- valid in mongodb.
SELECT * FROM table_Name; Integer- it stores numeric value and It can be 32 bit
INSERT Command– It allows users to insert data in or 64 bit depending on the server.
database tables. Double- it stores floating point values.
Syntax– INSERT INTO table_name (Col_name1, Arrays- it is used to store a list or multiple values
Col_name2, .....Col_NameN) into a single key.
VALUES(Val_1, Val_2, Val_3 ...... Val_N) Object- it is used to store a list or multiple values
into a single key.
UPDATE Command– It allows users to update or
Null- It is used to store null values.
modify the existing data in database tables.
Date-It stores the current date or time in unix time
Syntax– UPDATE table_name SET [Col_name1 =
format.
Value_1 .... Col_name N = Value_N] WHERE
MongoDB Compass-
CONDITION;
• It is based on GUI therefore ,it is also called as
DELETE Command– It allows user to remove single or
mongoDB GUI.
multiple existing records from the database tables.
• It allows users to analyze the content of their stored
Syntax–
data without any prior knowledge of MongoDB
DELETE FROM table_Name WHERE conditions query syntax. It is an open source.
NoSql database .
Components of the BI System
NoSQL Database is nothing but mongoDB. It is MongoDB Database: it is used to store data.
used to refer to a non-SQL or non relational BI Connector: It translates the SQLqueries and provides
a relational schema between BI tool and MongoDB.
database.Database doesn't use tables for storing
data. It is generally used to store big data and real- ODBC Data Source Name (DSN): It holds the
connection and authorization configuration data.
time web applications.
BI Tool: This tool is used for visualization and analysis
Followings are the advantages of NoSQL database-
of data.
• supports query language. Java MongoDB Connectivity-
• provides fast performance. It includes the following steps to connect with the
• provides horizontal scalability mongoDB database.
• flexible schemas 1. Create a Maven Project
Database Management System 189 YCT
2. Add dependency to POM file MongoDB Logical Operator
3. Create Java File $and- It works as a logical AND operation on an array.
4. Build Dependency to load JAR The array should be of one or more expressions and
5. Enter into Mongo Shell chooses the documents that satisfy all the expressions in
Php MongoDB Connectivity- the array.
• Php provides a mongodb driver to connect with the Syntax-
mongoDB database. { $and: [ { <exp1> }, { <exp2> }, ....]}
• It performs database operations by using PHP. $not- The $not operator works as a logical NOT on the
specified expression and chooses the documents that are
It includes the following steps to connect with the
not related to the expression.
mongoDB database.
Syntax-
1. Installing Driver
{ field: { $not: { <operator-expression> } } }
2. Edit php.ini File
$or- It works as a logical OR operation on an array of
3. Install mongo-php library
two or more expressions and chooses documents that
4. Create Php Script meet the expectation at least one of the expressions.
5. Execute Php Script Syntax-
6. Enter into Mongo Shell { $or: [ { <exp_1> }, { <exp_2> }, ... , { <exp_n> } ] }
Python MongoDB Connectivity $type- The type operator chooses documents where the
pymongo driver is installed to create connection between value of the field is an instance of the specified BSON
Python programming language and MongoDB database. type.
It includes the following steps: Syntax-
1. Install Driver { field: { $type: <BSON type> } }
2. Create Python File $jsonSchema- It matches the documents that satisfy the
3. Execute Python Script specified JSON Schema.
4. Enter into Mongo Shell Syntax-
5. Check Databases { $jsonSchema: <JSON schema object> }
6. Check Collection limit() Method in mongoDB–
7. Access records limit() method is used to limit the fields of document.
MongoDB Query and Projection Operator Syntax-
It includes comparison, logical, element, evaluation, db.COLLECTION_NAME.find().limit(NUMBER)
larray, bitwise, and comment operators. skip() method in mongoDB–
MongoDB Comparison Operators It is used to skip the documents and . It is used with
$eq- refers to equality condition find() and limit() methods.
Syntax- { <field> : { $eq: <value> } } Syntax-
$gt- it selects a document where the value of the field is db.COLLECTION_NAME.find().limit(NUMBER).skip(
greater than the specified value. NUMBER)
Syntax- { field: { $gt: value } } sort() method– sort() method is used to sort the
$gte- It selects the documents where the field value is documents in the collection.
greater than or equal to a specified value. Syntax-
Syntax- db.COLLECTION_NAME.find().sort({KEY:1})
{ field: { $gte: value } } MongoDB Create Database– mongoDB doesn't have a
$in- Choose the documents where the value of a field create database command.In SQL we used to create a
equals any value in the specified array. table and insert value manually but in mongoDB it
Syntax- creates automatically.
{ filed: { $in: [ <value1>, <value2>, ……] } } Drop Database– This command is used to drop a
$lt- The $lt operator opt for the documents where the database. It also deletes the associated data files and it
value of the field is less than the specified value. operates on the current database.
Syntax- Syntax–
{ field: { $lt: value } } db.dropDatabase()
$lte- It chooses the documents where the field value is 7.0 SQL
less than or equal to a specified value. • SQL is a short-form of the structured query language.
Syntax- • SQL is a standard language for storing, manipulating
{ field: { $lte: value } } and retrieving data in databases.
Database Management System 190 YCT
History of SQL:- Syntax-
• A Relational Model of Data for Large Shared Data IS NULL
Banks" was a paper which was published by the great SELECT column_names
computer scientist "E.F. Codd" in 1970. FROM table_name
• The IBM researchers Raymond Boyce and Donald WHERE column_name IS NULL;
Chamberlin developed the SEQUEL (Structured Syntax-
English Query Language) after learning from the IS NOT NULL
paper given by E.F. Codd. They both developed the
SELECT col_names
SQL at the San Jose Research laboratory of IBM
Corporation in 1970. FROM table_name
• SQL became a standard of the American National WHERE col_name IS NOT NULL;
Standards Institute (ANSI) in 1986, and of the AND, OR and NOT Operators–
International Organization for Standardization (ISO) • The WHERE clause can be combined with AND, OR,
in 1987 and NOT operators while the AND and OR operators
SQL SELECT Statement– It is used to select data from are used to filter records based on more than one
a database. condition.
Syntax- • The AND operator shows a record if all the conditions
SELECT col1, col2, ... separated by AND are TRUE.
FROM table_name; • The OR operator shows a record if any of the
SELECT DISTINCT statement- It is used to return conditions separated by OR is TRUE.
only distinct values. Inside a table, a column often • The NOT operator shows a record if the condition(s)
contains many duplicate values; and sometimes we only is NOT TRUE.
want to list the distinct values.
Syntax-
Syntax-
AND
SELECT DISTINCT col1, col2, ...
SELECT col1, col2, ...
FROM table_name;
FROM table_name
WHERE Clause-
WHERE condition1 AND condition2 AND condition3
• It is used to filter records and It is used to extract only
…;
those records that fulfill a specified condition.
Syntax-
• The WHERE clause is not only used in SELECT
statements, it is also used in UPDATE, DELETE, etc OR
Syntax- SELECT col1, col2, ...
SELECT col1, col2,... FROM table_name
FROM table_name WHERE condition1 OR condition2 OR condition3 ...;
WHERE condition; Syntax- NOT
SELECT UNIQUE- SELECT column1, column2, ...
• There is no difference between DISTINCT and FROM table_name
UNIQUE. WHERE NOT condition;
• SELECT UNIQUE statement is used to retrieve a ORDER BY Keyword
unique or distinct element from the table. • It is used to sort the result-set in ascending or
Syntax- descending order.
SELECT UNIQUE column_name • It sorts the records in ascending order by default. To
FROM table_name; sort the records in descending order, use the DESC
SELECT SUM- t is also known as SQL SUM() keyword.
function. And It is used in a SQL query to return the Syntax-
summed value of an expression. ORDER BY
Syntax- SELECT col1, col2, ...
SELECT SUM (exp) FROM table_name
FROM tables ORDER BY column1, column2, ... ASC|DESC;
WHERE conditions; INSERT INTO Statement- It is used to insert new
NULL Value- A field with a NULL value is a field with records in a table.
no value. And It is not possible to test for NULL values
Syntax-
with comparison operators, such as =, <, or <>.
INSERT INTO table_name (col1, col2, col3, ...)
Therefore,we will have to use the IS NULL and IS NOT
NULL operators instead. VALUES (val1, val2, val3, ...);
Database Management System 191 YCT
UPDATE Statement- • INNER JOIN: it returns records that have matching
• The UPDATE statement is used to modify the existing values in both tables
records in a table. • LEFT OUTER JOIN: it returns all records from the
• The WHERE clause specifies which record(s) that left table, and the matched records from the right table
should be updated. If we omit the WHERE clause, all • RIGHT OUTER JOIN: it returns all records from
records in the table will be updated. the right table, and the matched records from the left
Syntax- table
UPDATE table_name • FULL OUTER JOIN: it returns all records when
SET col1 = val1, col2 = val2, ... there is a match in either left or right table
WHERE condition; Cartesian Join or Cross Join–
DELETE Statement– If cross join is used to combine two different tables, then
• The DELETE statement is used to delete existing we will get the Cartesian product of the sets of rows from
records in a table. the joined table and when each row of the first table is
• The WHERE clause specifies which record(s) should combined with each row from the second table, then it is
be deleted. If we omit the WHERE clause, all records known as Cartesian join or cross join.
in the table will be deleted.
Syntax- Self Join– It is a regular join, but the table is joined with
DELETE FROM table_name WHERE condition; itself.
MIN() function–It returns the smallest value of the Syntax-
selected column. SELECT col_name(s)
Syntax- FROM table1 T1, table1 T2
SELECT MIN(col_name) WHERE condition;
FROM table_name EQUI JOIN–
WHERE condition; • EQUI JOIN performs a JOIN against equality or
MAX() Function–It returns the largest value of the matching column(s) values of the associated tables.
selected column. An equal sign (=) is used as comparison operator in
Syntax- the where clause to refer equality.
SELECT MAX(col_name) • We can also perform EQUI JOIN by using JOIN
FROM table_name keyword followed by ON keyword and then
specifying names of the columns along with their
WHERE condition;
associated tables to check equality.
LIKE Operator–
Syntax-
The LIKE operator is used in a WHERE clause to search
SELECT col_list
for a specified pattern in a column.
FROM t1, t2....
Syntax-
WHERE t1.col_name =
SELECT col1, col2, ...
t2.col_name;
FROM table_name
Or
WHERE columnN LIKE pattern;
SELECT *
COUNT() Function– It returns the number of rows that
matches a specified criterion. FROM table1
Syntax- JOIN table2
SELECT COUNT(col_name) [ON (join_condition)]
FROM table_name Natural Join– NATURAL JOIN is a type of EQUI
JOIN and is structured in such a way that, columns with
WHERE condition;
the same name of associated tables will appear once
AVG() Function– The AVG() function returns the
only.
average value of a numeric column.
Syntax-
Syntax-
SELECT *
SELECT AVG(col_name)
FROM table_name FROM table1
WHERE condition; NATURAL JOIN table2;
JOIN- It is clause that is used to combine rows ofrom CREATE DATABASE Statement– It is statement
two or more tables, based on a related column between used to create a new SQL database.
them. Syntax-
There are different types of the JOINs in SQL:- CREATE DATABASE database_name;
Database Management System 192 YCT
DROP DATABASE- It is statement used to drop an PRIMARY KEY– The PRIMARY KEY constraint
existing SQL database. uniquely identifies each record in a table. Primary keys
Syntax- must contain UNIQUE values, and cannot contain NULL
DROP DATABASE database_name; values. A table can have only ONE primary key; and in
BACKUP– It is used in SQL Server to create a full back the table, this primary key can consist of single or
up of an existing SQL database. multiple columns (fields).
Syntax- FOREIGN KEY Constraint–
BACKUP DATABASE database_name • The FOREIGN KEY constraint is used to prevent
TO DISK = 'filepath'; actions that would destroy links between tables.
CREATE TABLE Statement– The CREATE TABLE • A FOREIGN KEY is a field in one table, that refers
statement is used to create a new table in a database. to the PRIMARY KEY in another table.
• The table with the foreign key is called the child table,
Syntax-
and the table with the primary key is called the
CREATE TABLE table_name ( referenced or parent table.
col1 datatype, CREATE INDEX Statement– It is used to create
col2 datatype, indexes in tables. Indexes are used to retrieve data from
col3 datatype, the database more quickly than otherwise.
.... Syntax-
); CREATE INDEX index_name
ON table_name (col1, col2, ...);
DROP TABLE- It is used to drop an existing table in a Dense Index– The dense index contains an index record
database. for every search key value in the data file. It makes
Syntax- searching faster.In a dense index, the number of records
DROP TABLE table_name; in the index table is same as the number of records in the
main table. It requires more space to store index record
ALTER TABLE Statement–
itself. The index records have the search key and a
• It is used to add, delete, or modify columns in an pointer to the actual record on the disk.
existing table. CREATE VIEW Statement–
• It is also used to add and drop various constraints on A view is a virtual table based on the result-set of an
an existing table. SQL statement. It contains rows and columns, just like a
Syntax- real table. The fields in a view are fields from one or
ALTER TABLE table_name more real tables in the database.
ADD col_name datatype; Syntax-
ALTER TABLE-DROP COLUMN– It is used to CREATE VIEW view_name AS
delete a column in a table. SELECT col1, col2, ...
Syntax- FROM table_name
ALTER TABLE table_name WHERE condition;
DROP COLUMN col_name; Updating a View– A view can be updated with the
ALTERTABLE-ALTER/MODIFY COLUMN– It is CREATE OR REPLACE VIEW statement.
used to change the data type of a column in a table. Syntax-
Syntax- CREATE OR REPLACE VIEW view_name AS
ALTER TABLE table_name SELECT col1, col2, ...
ALTER COLUMN col_name datatype; FROM table_name
Constraints– It is specified when the table is created WHERE condition;
with the CREATE TABLE statement, or after the table is Dropping a View– A view can be deleted with the
created with the ALTER TABLE statement. DROP VIEW statement.
Syntax- Syntax-
CREATE TABLE table_name ( DROP VIEW view_name;
col1 datatype constraint, Facts Table– The fact table is a primary table in the
col2 datatype constraint, dimensional model. It also contains measurement, metric
and quantitative information.
col3 datatype constraint,
Transaction Fact Table– The transaction fact table is a
.... basic approach to operate the businesses. These fact
); tables represent an event that occurs at the primary point.
NOT NULL Constraint– The NOT NULL constraint A line exists in the fact table for the customer or product
enforces a column to NOT accept NULL values.By when the transaction takes place. Fact tables are
default, a column can hold NULL values. completely normalized.
Database Management System 193 YCT
Triggers in SQL– A trigger is a set of SQL statements of a diagram which is known as entity relationship
that reside in system memory with unique names. It is a diagram.
specialized category of stored procedure that is called • An E-R model is a design or blue print of a database
automatically when a database server event occurs. Each
that can later be implemented as a database.
trigger is always associated with a table.
Syntax- • A data model is a collection of conceptual tools for
CREATE TRIGGER schema.trigger_name describing data, data relationship, data semantics and
ON table_name consistency constraints.
AFTER {INSERT, UPDATE, DELETE} • Data flow is described by means of DFDs as studied
[NOT FOR REPLICATION] earlier and represented in algebraic form.
AS • The difference (–) operation removes common tuples
{Statements} from the first relation that is known as commutative
Benefits of Triggers– Generating some derived column
and associative operation.
values automatically
• Relational algebra is a procedural language which
• Enforcing referential integrity
takes instances of relations as input and yields
• Synchronous replication of tables
instances of relations as output.
• Imposing security authorizations
• Preventing invalid transactions • A recursive relationship is a relationship between an
TRUNCATE– It removes all the values from the table entity and itself.
permanently. This command cannot delete the particular • Cardinality in an ER diagram is a relationship between
record because it is not used with the WHERE clause. two entity sets.
Syntax- • In a dataflow diagram, a circle/bubble represents
TRUNCATE TABLE Table_Name; process.
EXCEPT– The EXCEPT clause in SQL is widely used
• Key constraints states that the value of foreign key
to filter records from more than one table.
it retrieves all rows from the first SELECT query while must be unique for each records.
deleting redundant rows from the second. • In dbms, there are three levels of abstractions logical
Syntax- physical and view level.
SELECT col_lists from table_name1 • Related fields in a database are grouped to form a data
EXCEPT record.
SELECT col_lists from table_name2;
• If attribute of relation schema R is member of some
Important Facts .
candidate key then this type of attributes are classified
• LIKE operator is used to perform the pattern as prime attribute.
matching. • 'AS' clause is used in SQL for rename operation.
• In RDBMS, different classes of relationship are • A table joined with itself is called as self join.
created using normal forms technique to prevent • In functional dependency between two sets of
modification anomalies and 3NF normal from is
attributes A and B then set of attributes A of database
considered enough for database design.
is classified as left hand side.
• Second Normal form (2NF) disallows partial
• If there is more than one key for relation schema in
functional dependency.
dbms then each key in relation schema classified as
• Fifth normal form (5 NF) is also called as project join candidate key. The primary key is selected from the
normal form.
candidate key.
• If a relation is in 2NF and 3NF forms, then prime
• Normalization form which is based on transitive
attribute is functionally independent of all non-prime
dependency is classified as third normal form. The
attributes.
process of analyzing relation schemas to achieve
• In a relational database table a row is called as tuple. minimal redundancy and insertion or update
• Tables, records and complex logical relationships are anomalies is classified as normalization of data. SQL
characteristic of relational DBMS. is developed to support relational database and it
• E-R model is not record based data model and it provides controlling access to database, facility for
describes the structure of a database with the help of integrity constraints and query on database files.
Database Management System 194 YCT
• Transaction in a database should be atomic, durable from the operational environment to the data
and consistent. warehouse.
• The full form of DDL in SQL is data definition • In second normal form partial dependency get
language. DML commands of SQL allows deletion of removed.
tuples from tables. Create table, Alter and Drop are a • Centralized database is best for security and
DDL command of SQL. management.
• Natural join operator of relational algebra joins two • A virtual relation composed of columns form one or
tables at a time. more related relations is called a view. A view of a
• The goal of normalization is to eliminate insertion database that appears to an application program is
anomaly deletion anomaly and update anomaly. known as subschema.
• In ACID properties of transaction 'A' stands for • Armstrong's inference rule does not determine mutual
atomicity, 'C' stands for consistency, 'I' stands for dependency.
isolation and 'D' stands for durability. These are the • Project operation is used to extract specified columns
four properties in ACID that maintain the integrity of from a table.
data.
• In case the indices values are larger, index is created
• ER diagram can be transformed to tables.
for these values of the index and this is called
• A database file must ensure data consistency and data multilevel index.
integrity both.
• Designers use de-normalization to tune the
• If a relation contains atomic values of the attributes, performance of systems to support time-critical
then the relation. operations.
• A relational database is a set of tuples and a database
• Domain constraints, functional dependency and
always requires secondary storage device.
referential integrity are special forms of assertion.
• A weak entity set is a entity set whose existence
• Mapping ordinations.
depends on another strong entity set.
• Domain constraints, functional dependency and
• Under keyword is used in SQL to achieve inheritance.
referential integrity are special forms of assertion.
• A functional dependency is a relationship between
• Mapping cardinality express the number of entities to
attributes.
which another entity can be associated via a
• Outer join operator is used to retain the unmatched
relationship set.
rows of relations when they joined.
• Data model view of reports editor depicts the
• Entity types that do have key attributes of their own
structural representation of the data used in report
are called weak entity types.
definition.
• Address is an example of a composite attribute.
• Query acts as a data source for the reports definition.
• Logical design describes an abstract or conceptual
• Entity integrity constraint states that no primary key
design of the database.
value can be null.
• ADO is a simple object model that is easier to
• A super key for an entity consist of one or more
understand and use than OLE DB and is frequently
attributes.
used for database applications.
• Data dictionary contains name, width and data type • A primary key for an entity is a unique attributes.
etc. • Horizontal fragmentation is based on SELECT
• For a relation the number of tuples is called operation in relational algebra.
cardinality. • Min-Max normalization is a data transformation
• SQL provides special aggregate functions such as technique.
count() min() and sum() etc. • A relation in a relational database can have only one
• The content of the data dictionary is metadata and it primary key.
contains at least the structure of the data, the • BIRCH is balanced item set reducing and clustering
algorithms used for summarization and the mapping using hierarchies.
Database Management System 195 YCT
• The phenomenon in which a single transaction failure • The load and index is a process to load the data in the
leads to a series of transaction rollbacks is called data warehouse and to create the necessary indexes.
cascading rollback. • Alter table is used to include integrity constraints in an
• The database must not contain any unmatched foreign existing relation.
key values and this property is called as referential • OLAP stands for online analytical processing. The
integrity. data is stored, retrieved and updated in OLTP (online
• User's view in a database is also called as external transactional processing).
view. • Visualisation is the technique used for discovering
• Update, insertion and deletion are database anomaly. patterns in database at the beginning of data mining
• Secondary index is also known as dense index. processes.
• Double lines, double rectangles and dashed ellipses • SELECT is not a DDL statement. Weak entities are
are valid component of a E-R diagram. double rectangles which is a correct notation in ER
• Set difference, rename and cartesian product are diagram.
fundamental operation in the relational algebra. • Domain is the RDBMS terminology for a set of legal
• Referential integrity constraint can be enforced by values that an attribute can have.
designing foreign key with respect to primary key of • An entity s a distinct real world item in an application.
another table. • The change made by one transaction are not visible to
• A database can be inconsistent due to redundancy. others till the commit point, this property is called
• Conceptual design of the database is done with the isolation.
help of data models. • NULL, Check and unique is an integrity constraints.
• Primary means of searching the records from database • Database schema, which is the logical design of the
is called as primary key. Subschema can be created database and the database instance which is a snapshot
using create view. of the data in the database at a given instant in time.
• SQL is a non-procedural query language. And in • Management of metadata information is done by
dbms, data about data is stored in data dictionary. logical file system and a locked file can be accessed
• A culstering index is defined on the fields which are by only one user.
of type non-key and ordering. • Data mining refers to analyzing large databases to find
• Trigger is statement that is executed automatically by useful patterns.
the system as a side effect of a modification to the • Conn's rule of high-level update rule states that the
database. RDBMS support insertion, updation and deletion at a
• 'Second normal form' is based on the concept of 'Full table level.
functional dependency'. • Minimal super key is candidate key.
• The purpose of 'foreign key' in a table is to ensure null • Authorization is the process by which the user's
and domain integrity. privileges are ascertained in database.
• If several concurrent transactions are executed over • The values of the attribute should be present in the
the same data set and the second transaction updates domain and a domain is a set of values permitted.
the database before the first transaction is finished, the • Table in second normal form (2NF) eliminates all
isolation property is violated and the database is no hidden dependency domain constraints, functional
longer consistent. dependency and referential integrity are special terms
• Referential integrity constraints is a special type of of assertion.
integrity constraint that relates two relations & • Selection operations are commutative and natural join
maintains consistency across the relations. operations are associative.
• The DROP TABLE statement deletes the table • Distinct is the keyword used to eliminate duplicate
structure along with the table data. rows from the query result.
• Business metadata contains information that gives • The overall logical structure of a database can be
users an easy to understand perspective of the expressed graphically by entity relationship model.
information stored in the data warehouse. • The relation schema describes set of field.
Database Management System 196 YCT
Important Questions Asked in Previous Years Examinations
1. What is DBMS? 11. Who developed the first general purpose
(a) any organised piece of information DBMS?
(b) database (a) Charles Bachman (b) Edgar codd
(c) meta data (c) Francis Bacon (d) William Drebbel
(d) non-organised data. 12. Duplication of data is known as-
2. DBMS is a type of- (a) Redundancy (b) Consistency
(a) program (b) software (c) Data security (d) Data integrity
(c) spyware (d) malware 13. Which of the following is true about database
3. Which is not a fundamental operation in the being an organised collection of?
relational algebra ? (a) Data (b) Attributes
(a) natural join (b) cartesian product (c) Records (d) Views
(c) set difference (d) rename 14. Which of the following is correct full form of
RPSC VPITI 2018 (CS) RDBMS?
4. Which of the following is not an example of (a) Relational database management system
DBMS? (b) Relative database management system
(a) SQL server (b) MySQL (c) Rotational database manageable service
(c) Microsoft outlook (d) Microsoft Access (d) Regional database management system
UPPCL ARO Official paper I 18/02/2018 Shift-I 15. The term "relational database" was invented
5. What type of database can not be stored in a by.
database software? (a) E.F. Codd (b) Charles Bachman
(a) Any form of image, text, audio or video files (c) Steve Woznaik (d) Ronald Wayne
(b) Any inaccessible data 16. A relational DBMS stores information in a set
(c) Any organised and updated data of-
(d) Any releted piece of information. (a) Table (b) Key
6. In which of the following forms data can be (c) Row (d) Horizontal
stored in the database management system? 17. Which of the following is used to refer for a
(a) Image (b) Graph 'row'?
(c) Audio (d) Table (a) Attribute (b) Tuple
7. A data can be stored in the format of- (c) Field (d) Column
(a) Table (b) Schema 18. What does attribute mean in a particular
table?
(c) Views and reports (d) All of the above
(a) Record (b) Column
8. Which one of the following is a disadvantage of
(c) Key (d) Tuple
database management system?
19. An absent value in a particular field
(a) Data redundancy
represents-
(b) Elimination of inconsistency
(a) Empty value (b) Absent value
(c) Flexibility
(c) Null value (d) New value
(d) Security improvement
20. Which of the following is not an integrity
9. Which of the following is an advantage of constraint?
database management system? (a) PRIMARY KEY (b) FOREIGN KEY
(a) Reduce development time (c) CHECK (d) NULL
(b) Complexity 21. Which one of the following does prevent action
(c) Costly that ends links between the tables?
(d) large is size (a) foreign Key (b) primary Key
10. What does the mean of user administration in (c) check constraint (d) default
dbms? 22. 'Data integrity' refers to
(a) Registering users (a) accuracy and consistency
(b) Performance monitoring (b) prevents users from the changing the data
(c) Maintaining data integrity (c) ensures duplicate records
(d) All of the above (d) allow access to data
Database Management System 197 YCT
23. Primary Key is a combination of- 35. Which of the following model is concerned with
(a) NOT NULL & UNIQUE developing a database model as per
(b) FOREIGN KEY & CHECK requirement and the entire design is completed
(c) DEFAULT & CREATE on paper rather physical implementation?
(d) UNIQUE (a) Physical model (b) Logical model
24. Which of the following does ensure all the (c) Schematic model (d) Sigma model
values to be different in a column? 36. With reference to data manipulation which of
(a) PRIMARY KEY (b) CHECK the following statement is correct?
(c) NOT NULL (d) UNIQUE 1. To improve the growth of any business and
organisations
25. What is the function of constraints?
2. It helps in organising raw data in a
(a) Ensuring accuracy and reliability
structured way
(b) Ensuring deletion of data
3. It doesn't help in organising raw data
(c) Ensuring creation of data
4. DML is used to manipulate data and it helps
(d) None of the able in modifying data.
26. A single entry in a table is called- (a) 1 ,2 & 3 (b) 2 & 4
(a) column (b) null value (c) 1 & 3 (d) 1,2 & 4
(c) attributes (d) row or record 37. Which command does allow users to insert
27. Database normalization was developed by- data in database tables?
(a) Charles Bachman (b) Franeic Bacon (a) Update (b) Insert
(c) E.F. codd (d) William Drebbel (c) Put data (d) Delete
28. Which of the following does enforce valid 38. Which command does allow a user to remove
entries for a given column? single or multiple existing records from
(a) Entity integrity database tables?
(b) user-defined integrity (a) Delete (b) Remove
(c) Domain integrity (c) Destroy (d) Select & delete
(d) Referential integrity 39. Which of the following is not part of database
29. A constraints which ensures, a value in a development life cycle?
column to be satisfied a specific conditions- (a) Requirement analysis
(a) DEAAULT (b) PRIMARY KEY (b) Database designing
(c) FOREIGN KEY (d) CHECK (c) Implementation
30. How many types of database architecture are, (d) Structured data
there logically? 40. Which of the following is used to specify rules
(a) 3 (b) 2 for the data in a table?
(c) 4 (d) 5 (a) Column (b) Record
31. Which of the following enforces valid entry for (c) Protocol (d) Constraints
a given column by restricting the type, format 41. Which of the following is not advantages of
or the range of values. NoSQL?
(a) Referential integrity (a) Supports query language
(b) Data integrity (b) Provides horizontal scalability
(c) Domain integrity (c) Flexible schemas
(d) Entity integrity (d) Ease of use for non-developers
32. Which is not a valid join in SQL ? 42. Which of the following is type of NoSQL
(a) left outer join (b) partial outer join database?
(c) full outer join (d) natural full outer join (a) Document database (b) Graph database
RPSC VPITI 2018 (CS) (c) Key value database (d) All of the above
33. An attributes composed of simple components 43. Which of the following databases store data in
with an independent existence is called- nodes and edges?
(a) Composite attributes (b) Simple attributes (a) Graph (b) Document
(c) Derived attributes (d) Single attributes (c) Wide-column (d) Key-value
34. In which relationship each record of one table 44. In NoSQL, which method is used to sort the
is related to only one record of the other table? documents in the collection?
(a) One to many (b) One to one (a) Select() (b) Sort()
(c) Many to one (d) Many to many (c) Opt() (d) Skip()
Database Management System 198 YCT
45. Which of the following command is used to 57. Which of the following is used to perform a
delete the associated data files and it operates JOIN against equality or matching column(s)
on the correct database? values of the associated table?
(a) Truncate (b) Drop (a) Full outer join (b) Equi join
(c) Delete (d) Remove (c) Self join (d) Product join
46. Which of the following is standard language for 58. Natural Join is a type of
storing, manipulating and retrieving data in (a) Equi join (b) Self join
databases? (c) Inner join (d) Select join
(a) C++ (b) Java 59. Which of the following in SQL server is used
(c) SQL (d) ADA to create a full back up of an existing SQL
47. "A relational model of data for large shared database?
data banks" was a paper which was published (a) BACKUP (b) ROLLUP
by the great computer scientist "E.F. Codd" in- (c) DROP (d) REVERSE
(a) 1970 (b) 1972 60. Which of the following is a set of SQL statements
(c) 1975 (d) 1977 that reside in system memory with unique
48. In which laboratory of IBM SQL was names?
developed? (a) Triggers (b) Foreign key
(a) Son Josh research (b) San Jose research (c) Primary key (d) Constraints
(c) Brainly research (d) ANSI 61. Which operator perform the pattern
49. In which year did SQL become a standard of matching?
ANSI and of the ISO ? (a) As operator (b) LIKE Operator
(a) 1986&1987 (b) 1988&1999 (c) SELECT Operator (d) None of above
(c) 2001& 2004 (d) 1986& 1988 Punjab State Civil Supplies Corp. Ltd. 13.11.2011
50. Which clause in SQL is used to filter records 62. Which of the following is NOT a characteristic
and extract only those records that full fil a of relational DBMS?
specified condition? (a) tables
(a) SELECT (b) WHERE (b) tree-like structures
(c) UNIQUE (d) NULL (c) complex logical relationships
51. The keywords in SQL which is used to sort the (d) records
result-set in ascending or descending order? RPSC Lect. 2011
(a) Select by (b) Order by 63. Which normal form is considered adequate for
(c) Order to (d) Order for database design?
52. Which of the following statement in SQL is (a) 3NF (b) 2NF
used to modify the existing records in a table? (c) 1NF (d) 4NF
(a) DELETE (b) UPDATE
RPSC Lect. 2011
(c) UPDATION (d) RE NEW
64. In RDBMS, different classes of relations are
53. Which of the following function in SQL is used created using ______ technique to prevent
to return the smallest value of the selected modification anomalies.
column?
(a) functional dependencies
(a) MAX() (b) MIN()
(b) data integrity
(c) COUNT() (d) AVG()
(c) referential intergrity
54. Which of the following function in SQL is used
(d) normal forms
to return the largest value of the selected
column? UPPSC LT GRADE 29.07.2018
(a) MIN() (b) MAX() 65. Which of the following is not is recordbased
data model?
(c) LARGEST () (d) SMALLEST ()
(a) Relational model
55. The function in SQL that is used to return the
number of rows that matches a specified (b) Hierarchical model
criterion is . (c) E-R model
(a) RETURN () (b) COUNT() (d) Network model
(c) MAX() (d) MIN() UPPSC LT GRADE 29.07.2018
56. Cartesian join is also known as 66. A data model is a collection of conceptual tools
(a) Self join (b) Inner join for describing
(c) Cross join (d) Triplate join (a) data and data relationship
Database Management System 199 YCT
(b) data semantics and consistency constraints 74. A recursive relationship is a relationship
(c) data, data relationship, data semantics and between an entity and...............
consistency constraints (a) itself (b) a subtype entity
(d) None of the above (c) an archetype entity (d) an instance entity
UPPSC LT GRADE 29.07.2018 Punjab PSC Lect. 2016 (IT)
67. The difference (-) operation removes common 75. Key constraint states that:
tuples from the first relation. This operation is (a) the value of primary key can not be Null
(a) commutative and associative (b) the value of foreign key can not be Null
(b) non-commutative and associative (c) the value of primary key must be unique for
(c) commutative and non-associative each records
(d) non-commutative and non-associative (d) the value of foreign key must be unique for
UPPSC LT GRADE 29.07.2018 each records
68. Fifth normal form is also called :- (e) the value of foreign key can be Null
(a) Protect-join normal form CGPSC Asstt. Prof. 2014 (IT)
(b) Process-join normal form
(c) Project-join normal form 76.
(d) None of these
RPSC VPIITI 2012 (CS)
Weight is a in the above ER diagram :
69. Second normal form disallows
(a) entity (b) relation
(a) Full functional dependency
(c) context (d) attribute
(b) Partial functional dependency
(c) Transitive functional dependency RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(d) Non- trivial Multivalued dependency 77. In a data flow diagram, a circle/bubble
represents
TANGEDCO AE 2018
(a) Data flow (b) External entity
70. If a relation is in 2NF and 3NF forms, then
(c) Data store (d) Process
(a) no non-prime attribute is functionally
dependent on other non-prime attributes RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(b) no non-prime attribute is functionally 78. What is cardinality in an ER diagram ?
dependent on the prime attributes (a) Relationship between two data stores.
(c) all attributes are functionally independent (b) Relationship between two entity sets.
(d) prime attribute is functionally independent of (c) Relationship between two attributes.
all non-prime attributes (d) Relationship between two processes.
APPSC Lect. Degree College 07.06.2017 (CS) RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
71. Which normal form is considered adequate for 79. A table joined with itself is called
relational database design? (a) Join (b) Self Join
(a) 2 NF (b) 3 NF (c) Outer Join (d) Equi Join
(c) 4 NF (d) BCNF NIELIT Scientists-B 22.07.2017 (IT)
APPSC Lect. Degree College 07.06.2017 (CS) 80. Consider the join of a relation R with relation S
72. A table on the many side of a one to many or If R has m tuples and S has n tuples, then the
many to many relationship must: maximum size of join is
(a) Be in Second Normal Form (2NF) (a) mn (b) m+n
(b) Be in Third Normal Form (3NF) (c) (m+n)/2 (d) 2(m+n)
(c) Have a single attribute key NIELIT Scientists-B 22.07.2017 (IT)
(d) Have a composite key 81. ‘AS’ clause is used in SQL for
GPSC Asstt. Prof. 30.06.2016 (a) Selection operation (b) Rename operation
73. Which of the following is a procedural (c) Join operation (d) projection operation
language? NIELIT Scientists-B 22.07.2017 (IT)
(a) tuple relational calculus 82. Related fields in a database are grouped to
(b) domain relational calculus form a
(c) relational algebra (a) data file (b) data record
(d) None of these (c) menu (d) bank
RPSC ACF & FRO 23.02.2021 (CS) NIELIT Scientists-B 22.07.2017 (IT)
Database Management System 200 YCT
83. If attribute of relation schema R is member of 92. DML commands of SQL allows
some candidate key then this type of attributes (a) Deletion of tuples from table(s)
are classified as: (b) Definition of table(s)
(a) atomic attribute (b) candidate attribute (c) Creation of views
(c) nonprime attribute (d) prime attribute (d) None of these
NIELIT Scientists-B 04.12.2016 (CS) MPPSC State Forest Service Examination 2014
84. In functional dependency between two sets of 93. Transaction in a database should be
attributes A and B then set of attributes A of (a) Atomic (b) Durable
database is classified as:
(c) Consistent (d) All options are correct
(a) top right side (b) down left side
MPPSC State Forest Service Examination 2014
(c) left hand side (d) right hand side
94. Natural join operator of relational Algebra,
NIELIT Scientists-B 04.12.2016 (CS)
joins _____ tables at a time
85. The primary key is selected from the:
(a) Three (b) Four
(a) Composite keys. (b) Determinants
(c) Two (d) Five
(c) Candidate keys. (d) Foreign keys.
MPPSC State Forest Service Examination 2014
NIELIT Scientists-B 04.12.2016 (CS)
95. Which of the following is not a Set operator in
86. Normalization form which is based on
SQL?
transitive dependency is classified as:
(a) Like (b) Union
(a) first normal form (b) second normal form
(c) Intersection (d) Minus
(c) fourth normal form (d) third normal form
MPPSC State Forest Service Examination 2014
NIELIT Scientists-B 04.12.2016 (CS)
96. A relation is in 4NF if it is in 3NF and contains
87. If there is more than one key for relation
(a) No multi-valued dependency
schema in DBMS then each key in relation
schema is classified as: (b) No non prime attribute is transitively
(a) prime key (b) super key dependent on the key
(c) candidate key (d) primary key (c) Non lossy decomposition
NIELIT Scientists-B 04.12.2016 (IT) (d) Every non key attributes is fully dependent on
the primary key
88. Process of analyzing relation schemas to
achieve minimal redundancy and insertion or MPPSC State Forest Service Examination 2014
update anomalies is classified as: 97. Full form of DDL in SQL is
(a) normalization of data (a) Data directed language
(b) denomination of data (b) Data definition language
(c) isolation of data (c) Data density language
(d) de-normalization of data (d) None of these
NIELIT Scientists-B 04.12.2016 (IT) MPPSC State Forest Service Examination 2014
89. SQL is developed to support 98. A database can be inconsistent due to
(a) Hierarchical database (a) Atomicity (b) Redundancy
(b) Relational database (c) Efficiency (d) All options are correct
(c) Network database MPPSC State Forest Service Examination 2014
(d) A simple data file 99. In order to have multi-valued dependency on
MPPSC State Forest Service Examination 2014 the table, it must have
90. SQL provides (a) Only one attribute
(a) Controlling access to database (b) NULL or one attribute
(b) Providing facility for integrity constraints (c) Two or more attributes
(c) Query on database files (d) Less than two attributes
(d) All options are correct MPPSC State Forest Service Examination 2014
MPPSC State Forest Service Examination 2014 100. The goal of normalization is to eliminate
91. Which of the following is not a DDL command (a) Insertion anamoly
of SQL? (b) Deletion anamoly
(a) Create table (b) Alter (c) Update anamoly
(c) Drop (d) Insert (d) All options are correct
MPPSC State Forest Service Examination 2014 MPPSC State Forest Service Examination 2014
Database Management System 201 YCT
101. “NOT NULL” keyword in SQL is used 110. Conceptual design of the data base is done with
(a) As constraint the help of
(b) When value is unknown (a) Data marts (b) Data models
(c) When value is missed during insertion (c) DFD (d) Flowchart
MPPSC State Forest Service Examination 2014
(d) All options are correct
111. Primary means of searching the records from
MPPSC State Forest Service Examination 2014 database is called as
102. A relation contains atomic values of the (a) Candidate Key (b) Primary Key
attributes, then relation is said to be in (c) Foreign key (d) alternate Key
(a) 1 NF (b) 2NF MPPSC State Forest Service Examination 2014
(c) 3NF (d) 4NF 112. Trigger is
MPPSC State Forest Service Examination 2014 (a) Statement that enables to start any DBMS
103. In ACID properties of transactions processing, (b) Statement that is executed by the user when
‘C’ stands for debugging an application program
(c) the condition that the system tests for the
(a) Consistency (b) Cordinality
validity of the database user
(c) Conefirmity (d) None of these (d) Statement that is executed automatically by
MPPSC State Forest Service Examination 2014 the system as a side effect of a modification
104. A database file must ensure following to the database
properties ISRO Scientist/Engineer 2016 (July)
(a) Data consistency 113. Which 'Normal Form' is based on the concept
(b) Data integrity of 'full functional dependency' is
(c) Both (Data consistency) and (Data integrity) (a) First Normal Form
(b) Second Normal Form
(d) None of these
(c) Third Normal Form
MPPSC State Forest Service Examination 2014 (d) Fourth Normal Form
105. A relational database is a ISRO Scientist/Engineer 2011
(a) Set of tuples 114. Purpose of 'Foreign Key' in a table is to ensure
(b) Set of nodes in tree form (a) Null integrity
(c) Set of nodes in hierarchical form (b) Referential integrity
(d) None of these (c) Domain integrity
MPPSC State Forest Service Examination 2014 (d) Null & Domain integrity
ISRO Scientist/Engineer 2009
106. In DBMS, Network model is based on
115. If several concurrent transactions are executed
(a) Linked list (b) Graph over the same data set and the second transaction
(c) Tree (d) Queue updates the database before the first transaction
MPPSC State Forest Service Examination 2014 is finished, the____ property is violated and the
107. A database always requires database is no longer consistent.
(a) Secondary storage device (a) Atomicity (b) consistency
(b) Only primary storage device (c) isolation (d) Durability
(c) DMA controller RPSC VPITI 2014 (IT)
116. Which of the following protocols ensures
(d) None of these
conflict serializability and safety from
MPPSC State Forest Service Examination 2014 deadlocks?
108. E-R diagram can be transformed to (a) Two- phase locking protocol
(a) Objects and classes (b) Tables (b) Time- stamp ordering protocol
(c) Arrays (d) None of these (c) Graph based protocol
MPPSC State Forest Service Examination 2014 (d) Both Two- phase locking protocol and Time-
109. A weak entity set is a stamp ordering protorcol
(a) Entity set whose existence depends on RPSC VPITI 2014 (IT)
117. If a transaction is performed in a database and
another weak entity set
committed, the changes are taken to the
(b) Entity set whose existence depends on
previous state of transaction by
another strong entity set (a) Flashback
(c) Entity set whose existence dependency does (b) Rollback
not matter (c) Both Flashback and Rollback
(d) None of these (d) Cannot be done
MPPSC State Forest Service Examination 2014 RPSC VPITI 2014 (IT)
Database Management System 202 YCT
118. …….is a special type of integrity constraint 126. In order to maintain the consistency during
that relates two relations & maintains transactions databases provides
consistency across the relations. (a) Commit (b) Atomic
(a) Entity Integrity constraints (c) Flashback (d) Rollback
(b) Referential Integrity Constraints RPSC Lect. 2014
(c) Domain Integrity Constraints 127. Which is the technique used for discovering
(d) Key Constraints patterns in dataset at the beginning of data
RPSC VPITI 2014 (IT) mining processes?
119. The DROP TABLE statement: (a) Kohenen map (b) Visualisation
(a) Deletes the table structure only (c) OLAP (d) SQL
(b) Deletes the table structure along with the RPSC VPITI 2018 (IT)
table data 128. Which one of following is a correct notation in
(c) works whether or not referential integrity ER diagrams?
constraints would be violated (a) Entities are oval
(d) is not an SQL statement
(b) Relationships are rectangles.
RPSC VPITI 2014 (IT)
(c) Attributes are diamonds
120. The_____ contains information that gives users
(d) Weak entities are double rectangles.
an easy-to- understand perspective of the
information stored in the data warehouse. RPSC VPITI 2018 (IT)
(a) business metadata. (b) technical metadata . 129. What is the RDBMS terminology for a set of
(c) operational metadata. (d) financial metadata. legal values that an attribute can have?
RPSC VPITI 2014 (IT) (a) Tuple (b) Relation
121. The load and index is _____. (c) Attribute (d) Domain
(a) a process to upgrade the quality of data before RPSC VPITI 2018 (IT)
it is moved into a data warehouse. 130. An entity is:
(b) a process to upgrade the quality of data after (a) A collection of items in an application
it is moved into a data warehouse. (b) A distinct real world item in an application
(c) a process to reject data from the data warehouse (c) An inanimate object in an application
and to create the necessary indexes. (d) A data structure in DBMS
(d) a process to load the data in the data warehouse TNPSC 2016 (Degree) P-II
and to create the necessary indexes. 131. The changes made by one transaction are not
RPSC VPITI 2014 (IT) visible to others till the commit point, this
122. To include integrity constraint in an existing property is called:
relation use: (a) Automicity (b) Consistency
(a) Create table (b) Modify table (c) Isolation (d) Durability
(c) Alter table (d) Drop table TNPSC 2016 (Degree) P-II
RPSC VPITI 2014 (IT) 132. Which of the following is not a integrity
123. In the daily running of the business which of constraints?
the following information systems are used? (a) Not null (b) Positive
(a) Operational planning systems.
(c) Unique (d) Check
(b) Transaction Processing systems (TPS).
TNPSC 2016 (Degree) P-II
(c) Process control system.
133. Database .........., which is the logical design of
(d) Office automation system (OAS).
the database and the database ........., which is a
RPSC VPITI 2014 (IT)
snapshot of the data in the database at a given
124. Which is not a valid component of a E-R
instant in time:
diagram ?
(a) Instance, schema (b) Schema, Relation
(a) dashed lines (b) double lines
(c) Domain, Relation (d) Schema, Instance
(c) double rectangles (d) dashed ellipses
RPSC VPITI 2018 (CS) TNPSC 2016 (Degree) P-II
RPSC Lect. 2014 134. A locked file can be?
125. The data is stored, retrieved and updated (a) Accessed by only one user
in……….. (b) Modified by users with correct password
(a) OLAP (b) OLTP (c) Is used to hide sensitive information
(c) Online processing (d) POP3 (d) Both (b) and (c)
RPSC Lect. 2014 TNPSC 2016 (Degree) P-II
Database Management System 203 YCT
135. Management of metadata information is done (c) Assertion
by: (d) Referential constraint
(a) File-organisation module TNPSC 2016 (Degree) P-II
(b) Logical file system 144. Selection operations are ......... and natural join
(c) Basic file system operations are ........ .
(d) Application programs (a) Commutative, Associative
TNPSC 2016 (Degree) P-II (b) Associative, commutative
136. Data mining refers to: (c) Associative, associative
(a) Retrieving a record from a large database (d) Commutative, commutative
(b) Retrieving similar records from a large TNPSC 2016 (Degree) P-II
database 145. ......... is the keyword used to eliminate
(c) To find out whether a particular pattern exists duplicate rows from the query result:
among the records (a) No duplicate (b) Unique
(d) Analyzing large databases to find useful (c) Distinct (d) Primary
patterns TNPSC 2016 (Degree) P-II
TNPSC 2016 (Degree) P-II 146. ALL or NONE refers:
137. Minimal super key is: (a) Consistency (b) Isolation
(a) Candidate key (b) Primary key (c) Durability (d) Atomicity
(c) Referential key (d) Foreign key TRB Poly. Lect. 2017
TNPSC 2016 (Degree) P-II 147. Inheritance achieved by the keyword is SQL is:
138. Which of the following conn's rule states that (a) of (b) sub
the RDBMS support insertion, updation and (c) under (d) from
deletion at a table level:
TRB Poly. Lect. 2017
(a) High-level update rule
148. A functional dependency is a relationship
(b) Guaranteed access rule
between:
(c) Non-subversion rule
(a) tables (b) attributes
(d) View updating rule
(c) rows (d) relations
TNPSC 2016 (Degree) P-II
TRB Poly. Lect. 2017
139. Which of the following is the process by which
the user's privileges are ascertained in 149. ______ operator is used to retain the
database? unmatched rows of relations when they joined.
(a) Authentication (b) Authorization (a) Outer join (b) Inner join
(c) Access control (d) Login (c) Natural join (d) Self Join
TNPSC 2016 (Degree) P-II TRB Poly. Lect. 2017
140. OLAP stands for: 150. Entity types that do have key attributes of
(a) Online Analysis and processing their own are called:
(b) Online Analytical Processing (a) Identifying relationship
(c) One time Analysis and Processing (b) Strong entity types
(d) One time Analytical Processing (c) Identifying owner
TNPSC 2016 (Degree) P-II (d) Weak entity types
141. For each attribute of a relations there is a set of UPPCL AE 18.05.2016
permitted values, called the .......... that 151. The conceptual organization of the entire
attribute. database, as viewed by the database
(a) Domain (b) Relation administrator, relates to
(c) Set (d) Schema (a) schema (b) sub-schema
TNPSC 2016 (Degree) P-II (c) DML (d) DDL
142. Table in second normal form (2NF): APPSC Poly. Lect. 13.03.2020
(a) Eliminates all hidden dependencing 152. Which of the following options is an example of
(b) Eliminates the possibility of a insertion a composite attribute?
anomalies (a) Address (b) Age
(c) Has a composite key (c) First name (d) DOB
(d) Has all non key field, depends on the whole APPSC Poly. Lect. 13.03.2020
primary key
153. A minimal (irreducible) super key in a
TNPSC 2016 (Degree) P-II
relational database is:
143. Domain constraints, functional dependency
and referential integrity are special terms of: (a) Candidate key (b) Primary key
(a) Foreign key (c) Secondary key (d) Foreign key
(b) Primary key APPSC Poly. Lect. 13.03.2020
Database Management System 204 YCT
154. Which of he following options describes an 164. In which normal form partial dependency
abstract or conceptual design of the database? removed?
(a) Modular design (b) Physical design (a) First normal form
(c) Logical design (d) Mapped design (b) Second normal form
APPSC Poly. Lect. 13.03.2020 (c) Third normal form
155. The simple object model that is frequently used (d) BCNF
for database applications and which is easier to RPSC ACF & FRO 23.02.2021 (CS)
understand and use than OLEDB is : 165. Which of the following creates a virtual
(a) ADO (b) ASP relation for storing the query?
(c) XML (d) ODBC (a) Function (b) View
UPSC Senior Scientific Officer Grade-II 16.07.2017 (c) Procedure (d) None of these
156. Joining a table with itself is called RPSC ACF & FRO 23.02.2021 (CS)
(a) Self Join (b) Equi Join 166. Which of the join operation do not preserve
(c) Outer Join (d) Join non matched tuples?
UPPCL AE 2014 (a) Left Outer join (b) Right Outer Join
157. Data dictionary contains (c) Inner Join (d) full outer join
(i) name (ii) width (iii) data type RPSC ACF & FRO 23.02.2021 (CS)
(a) i and ii (b) ii and iii 167. To sort the results of a query use:
(c) i and iii (d) i, ii and iii (a) SORT BY (b) GROUP BY
UPPCL AE 2014 (c) ORDER BY (d) None of the above
158. Duplicate rows are eliminated using Punjab PSC Lect. 2016 (IT)
(a) ELIMINATE (b) NODUPLICATE 168. The SQL WHERE clause:
(c) DISTINCT (d) UNIQUE (a) limits the column data that are returned
UPPCL AE 2014 (b) limits the row data are returned
159. For a relation the number of tuples is called (c) Both (a) and (b) are correct
(a) Degree (b) Cardinality (d) Neither A nor B are correct
(c) Columns (d) Rows Punjab PSC Lect. 2016 (IT)
169. Centralized database:
UPPCL AE 2014
(a) Is best for security and management.
160. SQL provides a number of special aggregate
functions. Which of the following is not (b) Has all or part of the database copied at 2 or
included in SQL? more computers.
(a) Count (b) Median (c) Is dispersed among multiple computer
systems.
(c) Min (d) Sum
(d) Has problem of keeping all up to date data.
RPSC ACF & FRO 23.02.2021 (CS)
Punjab PSC Network Engineer 21.06.2014
161. The data can be stored, retrieved and updated
170. A virtual relation composed of columns from
in:
one or more related relations is called a/an:
(a) OLAP (b) OLTP
(a) Index (b) View
(c) SMTP (d) FTP
(c) Relational map (d) Base table
RPSC ACF & FRO 23.02.2021 (CS)
Punjab State Civil Supplies Corp. Ltd. 13.11.2011
162. Metadata contains at least:
171. Which process in database design has as a
(a) The structure of the data. purpose the elimination of data redundancy
(b) the algorithms used for summarization and the avoidance of update anomalies?
(c) the mapping from the operational (a) Hierarchical representation
environment to the data warehouse. (b) Normalization
(d) All of these (c) Data warehousing
RPSC ACF & FRO 23.02.2021 (CS) (d) Entity relationship modeling
163. The content of the data dictionary is Punjab State Civil Supplies Corp. Ltd. 13.11.2011
(a) DML Commands 172. A view of a database that appears to an
(b) DDL Commands application program is known as
(c) Indexes to user data (a) Schema (b) Subschema
(d) Metadata (c) Virtual table (d) None of these
RPSC ACF & FRO 23.02.2021 (CS) ISRO Scientist/Engineer 2007
Database Management System 205 YCT
173. Armstrong's inference rule doesn't determine 182. Weak entity in the following ER diagram is
(a) Reflexivity (b) Augmentation
(c) Transitivity (d) Mutual dependency
ISRO Scientist/Engineer 2007
174. Which operation is used to extract specified
columns from a table?
(a) Project (b) Join
(c) Extract (d) Substitute
(a) Loan
ISRO Scientist/Engineer 2007 (b) Loan payment
175. In case the indices values are larger, index is (c) Payment
created for these values of the index. This is (d) Both Loan payment and payment
called RPSC VPITI 2018 (CS)
(a) Pointed index (b) Sequential index 183. Domain constraints, functional dependency
(c) Multilevel index (d) Multiple index and referential integrity are special forms of
_____
GPSC Asstt. Prof. 30.06.2016 (a) Foreign key (b) Primary key
176. Which is a join condition contains an equality (c) Assertion (d) Referential constraints
operator: GPSC Asstt. Prof. 30.06.2016
(a) Equijoins (b) Cartesian 184. _______ express the number of entities to
(c) Both (a) and (b) (d) None of the above which another entity can be associated via a
GPSC Asstt. Prof. 30.06.2016 relationship set.
(a) Mapping Cardinality
177. Which operation is/are allowed in a join view: (b) Relational Cardinality
(a) UPDATE (b) INSERT (c) Participation Constraints
(c) DELETE (d) Any of the above (d) None of the above
GPSC Asstt. Prof. 30.06.2016 GPSC Asstt. Prof. 30.06.2016
178. Which of the join operations do not preserve 185. In an enterprise structure, a Legal Entity is
non matched tuples? (a) Same as Enterprise
(b) Part of an Enterprise
(a) Left outer join (b) Right outer join
(c) Refers to Legal Department
(c) Inner join (d) Natural join (d) None of the above
GPSC Asstt. Prof. 30.06.2016 GPSC Asstt. Manager 13.12.2020 (IT)
179. In SQL the statement select * from R, S is 186. Which view of reports editor depicts the
equivalent to structural representation of the data used in
(a) Select * from R natural join S report definition?
(a) Web source view
(b) Select * from R cross join S
(b) Paper design view
(c) Select * from R union join S (c) Data Model view
(d) Select * from R inner join S (d) Paper parameter view
GPSC Asstt. Prof. 30.06.2016 GPSC Asstt. Manager 13.12.2020 (IT)
180. Designers use which of the following to tune the 187. Which of the following acts as a data source for
performance of systems to support time-critical the reports definition?
(a) Database columns (b) Parameters
operations?
(c) Query (d) Group
(a) De-normalization GPSC Asstt. Manager 13.12.2020 (IT)
(b) Redundant optimization 188. The set of permitted values of an attribute is
(c) Optimization called
(d) Realization (a) Tuple (b) Column
GPSC Asstt. Prof. 30.06.2016 (c) Domain (d) Table
GPSC Asstt. Manager 13.12.2020 (IT)
181. ______ can help us detect poor E-R design.
189. What is true about the INSERT statement in
(a) Database Design Process
Oracle SQL?
(b) E-R Design Process (a) An INSERT statement can be used only if a
(c) Relational scheme constraint is placed on the table
(d) Functional dependencies (b) An INSERT statement can never insert a row
GPSC Asstt. Prof. 30.06.2016 that violates a constraint
Database Management System 206 YCT
(c) An INSERT statement can override any (b) Columns used for joining can have same or
constraint put on the table different name
(d) An INSERT statement cannot be used if a (c) Columns used for joining must have different
constraint is placed on the table names
GPSC Asstt. Manager 13.12.2020 (IT) (d) A column is not required for joining
190. Computer table has CompId, Make, Model and GPSC Asstt. Manager 13.12.2020 (IT)
MYear attributes. Which of the following 196. Which join is to be used between two tables A
statement will not execute successfully? and B when the resultant table needs rows
(a) SELECT * FROM Computer ORDER BY from A and B that matches the condition and
Make rows from A that does not match the condition.
(b) SELECT CompId FROM Computer ORDER (a) OUTER JOIN (b) CROSS JOIN
BY Make (c) INNER JOIN (d) SELF JOIN
(c) SELECT CompId FROM Computer ORDER
GPSC Asstt. Manager 13.12.2020 (IT)
BY 2
197. The degree (or arity) of a database relation is
(d) SELECT * FROM Computer ORDER BY 1
the number of _____ in its relation schema.
GPSC Asstt. Manager 13.12.2020 (IT)
(a) attributes (b) tuples
191. In which of the following circumstances a
(c) entities (d) primary keys
GROUP BY clause is mandatory?
(e) foreign keys
(a) SELECT query having only one aggregate
function CGPSC Asstt. Prof. 2014 (CS)
(b) SELECT query having two aggregate 198. Entity integrity constraint states that:
functions (a) no candidate key value can be null
(c) SELECT query having one aggregate (b) no foreign key value can be null
function along with other columns (c) Primary key values can't be duplicate
(d) SELECT query having only two columns (d) No primary key value can be null
GPSC Asstt. Manager 13.12.2020 (IT) (e) foreign key values can't be duplicate
192. Which of the following is true? CGPSC Asstt. Prof. 2014 (CS)
(a) Selection, projection union, difference, and 199. A superkey for an entity consists of
Cartesian product are independent. (a) one attribute only
(b) Selection, projection, intersection, difference, (b) atleast two attributes
and Cartesian product are independent. (c) at most two attributes
(c) Selection, projection, union, division, and (d) one or more attributes
Cartesian product are independent. APPSC Lect. Degree College 07.06.2017 (CS)
(d) Natural Join, selection, projection, Division 200. Which of the following sets of keywords
are independent. constitutes a mapping in SQL?
GPSC Asstt. Manager 13.12.2020 (IT) (a) SELECT, FROM, TABLE
193. Choose the right option for the Query below: (b) SELECT, FROM, WHERE
SELECT MAX(AVG(Salary)) FROM Employee
(c) CONNECT, TABLE, CREATE
(a) Displays Maximum Average Salary of
(d) SELECT, TABLE, INSERT
Employees
APPSC Lect. Degree College 07.06.2017 (CS)
(b) Error
201. A primary key for an entity is
(c) Displays Average Salary of Employees
(a) A candidate key
(d) Displays Average and Maximum Salary of
Employees (b) Any attribute
GPSC Asstt. Manager 13.12.2020 (IT) (c) A unique attribute
194. Which Join is equivalent to Cartesian Join? (d) A super key
(a) INNER JOIN (b) OUTER JOIN APPSC Lect. Degree College 07.06.2017 (CS)
(c) CROSS JOIN (d) NATURAL JOIN 202. Aggregate functions in SQL are
GPSC Asstt. Manager 13.12.2020 (IT) (a) GREATEST, LEAST and ABS
195. Which of the following conditions has to be (b) SUM, COUNT AND AVG
satisfied for INNER JOIN to work? (c) UPPER, LOWER AND LENGTH
(a) Columns used for joining must have same (d) SQRT, POWE AND MOD
name APPSC Lect. Degree College 07.06.2017 (CS)
Database Management System 207 YCT
203. Horizontal fragmentation is based on 210. Which of the join operations do not preserve
_________ operation in relational algebra. non matched tuples :-
(a) Select (b) Project (a) Left outer join (b) Right outer join
(c) Join (d) Division (c) Inner join (d) Natural join
TANGEDCO AE 2018 RPSC VPIITI 2012 (CS)
204. Min- Max normalization is a ______ technique 211. The entity integrity rule requires that
(a) Data cleaning (a) All primary key entries are unique
(b) Data integration (b) A part of the key may be null
(c) Data transformation (c) Foreign key values do not reference primary
(d) Outlier mining key values
TANGEDCO AE 2018 (d) Duplicate object values are allowed
205. A relation in a relational database can TSPSC Manager 2015
have_____ primary key (s). 212. The referential integrity rule requires that
(a) any number of (a) Every null foreign key value must reference
(b) a maximum of four an existing primary key value.
(c) only one (b) It makes it possible for an attribute to have a
(d) at least two corresponding value.
TANGEDCO AE 2018 (c) Every non- null foreign key value must
206. BIRCH is: reference and existing primary key value.
(a) Balanced Iterative Reducing and (d) It makes it possible to delete a row in one
Characterization using Hierarchies table whose primary key does not have a
(b) Balanced Iterative Repartitioning and matching foreign key value in another table.
Clustering using Hierarchies TSPSC Manager 2015
(c) Balanced Iterative Reducing and 213. Fact tables are which of the following?
Computation using Hierarchies (a) Completely denormalized
(d) Balanced Iterative Reducing and Clustering (b) Partially denormalized
using Hierarchies (c) Completely normalized
(e) Balanced Item set Reducing and Clustering (d) Partially normalized
using Hierarchies APPSC Lect. Degree College 07.06.2017 (CS)
CGPSC Asstt. Prof. 2014 (IT) 214. The content of the database cannot be modified
207. The phenomenon in which a single transaction using the operation
failure leads to a series of transaction rollbacks (a) Deletion (b) Insertion
is called: (c) Updating (d) Selection
(a) Concurrent rollback (b) Continuous rollback RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(c) Cascading rollback (d) Conflict rollback 215. The key chosen by database designer as
(e) Control rollback principal means of identifying entities within
CGPSC Asstt. Prof. 2014 (IT) an entity set, is
208. An entity set which may not have sufficient (a) Candidate key (b) Super key
attributes to form a primary key is termed as: (c) Foreign key (d) primary key
(a) Relationship set (b) Strong entity set RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(c) Redundant set (d) Trivial entity set 216. The database must not contain any unmatched
(e) Weak entity set foreign key values. This property is known as
CGPSC Asstt. Prof. 2014 (IT) (a) Entity integrity
209. Constraint that ensures that a value appearing (b) Atomicity
in one relation for a given set of attributes also (c) Referential integrity
appears for a certain set of attributes in (d) Consistency
another relation is: RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
(a) Domain constraint 217. User's view in a database is also called
(b) Unique constraint (a) External view
(c) Key constraint (b) Conceptual view
(d) Referential Integrity constraint (c) Internal view
(e) Entity integrity constraint (d) Contextual view
CGPSC Asstt. Prof. 2014 (IT) RPSC ACF FRO 23.02.2021 (Comp. App./Sci.)
Database Management System 208 YCT
218. Which is not a database anomaly ? 221. Which one of the following statement is correct
(a) Update anomaly about keys in databases ?
(b) Create anomaly (a) A super key is also a candidate key.
(c) Insertion anomaly (b) A primary key is also a candidate key.
(d) Deletion anomaly (c) A primary key is also a minimal key.
RPSC ACF FRO 23.02.2021 (Comp. App./Sci.) (d) A minimal super key is a candidate key.
219. Which of the following is dense index? RPSC VPITI 2018 (CS)
(a) Primary index 222. Which term is used to describe user's view of
data item types and record types?
(b) Clusters index
(a) schema (b) view
(c) Secondary index
(c) subschema (d) instance
(d) Secondary non key index
RPSC VPITI 2018 (CS)
ISRO Scientist/Engineer 22.04.2018
223. The ______ are used to model a system's
220. Which of the following is not a Unified behavior in response to internal and external
Modeling Language (UML) diagram ? events.
(a) Class diagram (a) Activity diagrams
(b) Deployment diagram (b) Data flow diagrams
(c) Sequence diagram (c) E-R diagrams
(d) Star diagram (d) State diagrams
RPSC VPITI 2018 (CS) RPSC VPITI 2018 (CS)
ANSWER KEY
1. (a) 2. (b) 3. (a) 4. (c) 5. (b) 6. (d) 7. (d) 8. (a) 9. (a) 10. (d)
11. (a) 12. (a) 13. (a) 14. (a) 15. (a) 16. (a) 17. (b) 18. (b) 19. (c) 20. (d)
21. (a) 22. (a) 23. (b) 24. (d) 25. (a) 26. (d) 27. (c) 28. (c) 29. (d) 30. (b)
31. (c) 32. (a) 33. (b) 34. (b) 35. (b) 36. (d) 37. (b) 38. (a) 39. (d) 40. (d)
41. (d) 42. (d) 43. (a) 44. (b) 45. (b) 46. (c) 47. (a) 48. (b) 49. (a) 50. (b)
51. (b) 52. (b) 53. (b) 54. (b) 55. (b) 56. (c) 57. (b) 58. (a) 59. (a) 60. (a)
61. (b) 62. (b) 63. (a) 64. (d) 65. (c) 66. (c) 67. (a) 68. (c) 69. (b) 70. (d)
71. (b) 72. (d) 73. (c) 74. (a) 75. (c) 76. (d) 77. (d) 78. (b) 79. (b) 80. (a)
81. (b) 82. (b) 83. (d) 84. (c) 85. (c) 86. (d) 87. (c) 88. (a) 89. (b) 90. (d)
91. (d) 92. (a) 93. (d) 94. (c) 95. (a) 96. (a) 97. (b) 98. (b) 99. (c) 100. (d)
101. (d) 102. (a) 103. (a) 104. (c) 105. (a) 106. (b) 107. (a) 108. (b) 109. (b) 110. (b)
111. (b) 112. (d) 113. (b) 114. (d) 115. (c) 116. (b) 117. (d) 118. (b) 119. (b) 120. (a)
121. (d) 122. (c) 123. (b) 124. (a) 125. (b) 126. (d) 127. (b) 128. (d) 129. (d) 130. (b)
131. (c) 132. (b) 133. (d) 134. (a) 135. (b) 136. (d) 137. (a) 138. (a) 139. (b) 140. (b)
141. (a) 142. (a) 143. (c) 144. (a) 145. (c) 146. (d) 147. (c) 148. (b) 149. (a) 150. (d)
151. (a) 152. (a) 153. (a) 154. (c) 155. (a) 156. (a) 157. (d) 158. (c) 159. (b) 160. (b)
161. (b) 162. (d) 163. (d) 164. (b) 165. (b) 166. (c) 167. (c) 168. (b) 169. (a) 170. (b)
171. (b) 172. (b) 173. (d) 174. (a) 175. (c) 176. (a) 177. (d) 178. (c) 179. (b) 180. (a)
181. (d) 182. (c) 183. (c) 184. (a) 185. (b) 186. (c) 187. (c) 188. (c) 189. (b) 190. (c)
191. (c) 192. (a) 193. (b) 194. (c) 195. (b) 196. (a) 197. (a) 198. (d) 199. (d) 200. (b)
201. (c) 202. (b) 203. (a) 204. (c) 205. (c) 206. (d) 207. (c) 208. (e) 209. (d) 210. (c)
211. (a) 212. (c) 213. (c) 214. (d) 215. (d) 216. (c) 217. (a) 218. (b) 119. (c) 220. (d)
221. (b) 222. (c) 223. (d)
Decision Table-
Symbol → It is a brief visual representation for specifying
Process which actions to perform depending on given conditions.
Function– It performs some transformation of input • It is also known as a cause-effect table because it is a
data to yield output data best way to settle with different combination inputs
with their corresponding outputs.
• The information represented in decision tables can
Symbol → also be represented as decision trees and in
programming language it can be used as if-else or
switch case statements as well.
System Analysis and Design 212 YCT
Pseudocode– Cohesion– It is a measure of the degree to which the
It is an informal way of programming description elements of the module are functionally related. It is the
that does not require any strict programming language degree to which all elements directed towards
syntax or underlying technology considerations. It is performing a single task are contained in the component.
used for creating an outline or a rough draft of a It is basically internal glue that keeps the module
program. together. A good software design has high cohesion.
System designers write pseudocode to ensure that Structure Chart
programmers understand a software project's • A structure chart is used in structured programming to
requirements and align code accordingly. arrange the program modules in a tree structure and
Structured English– each module is displayed by a box, which contains the
It is similar to a programming language such as module name.
Pascal and it does not have strict syntax rules like • It represents hierarchical structure of module and it
programming language. breaks down the entire system into lowest functional
Example Customer authentication in the online shopping modules.
environment. 1. Module– Shows the process and it is of three types
Enter Cust_Name Control Module– It branches to more than one sub
SEEK Cust_Name in Cust_Name_DB file module.
IF Cust_Name found THEN Sub Module– It is a part (child) of another module.
call procedure USER_PASSWORD_AUTHETICATE() Library Module– They are reusable and invokes
ELSE from any module.
PRINT error message 2. Conditional Call– It shows that control module can
Call procedure NEW_customer_req() select any of the sub module on the basis of certain
END IF condition.
Types of System Design–
Logical Design– It is used to represent the data Control
flow, input and output of the system. Module
For example– Entity Relationship diagram (ERD)
Physical Design– In ensures
1. How users add information to the system and how the
system represents information back to user.
2. How the data is modelled and stored within the Sub Sub
system. Module Module
3. How data moves through the system and how data is 3. Hoop Module– It shows the repetitive execution of
validated, secured and transformed because it flows module by the sub model and a curved arrow
through and out of the system. denotes loop in the module.
Architectural Design–
It is used to describe the views models, behavior
and structure of the system. etc.
Structured Design .
Advantages–
• More flexible & less costly to change scope and
requirements.
• Early to test and debug during iterations.
• Initial delivery cost is minimal.
Disadvantages-
• It requires clear and completes definition of the entire
system before breaking down and building
incrementally.
• Total cost can be high.
• It requires good planning and design.
Generic Process Model–
Advantage of Spiral Model– • The generic process model is an abstraction of the
software development process and it specifies the
• The risk management feature is one of the best
stages and order of a process.
development characteristics of the spiral model.
• It establishes the foundation for a complete software
• It is suitable for intricate and extensive projects. process by identifying a small number of framework
• Replacements and other demands for projects activities.
requirement in the spiral model are docile.
• It also includes a set of umbrella activities that are
• The early estimation cost of the project can be applicable across the entire software processes.
computed in the spiral model.
• A generic process framework for software
Disadvantage of Spiral Model– development encompasses five activities which have
• The spiral model is difficult to use since the volume of been mentioned in the below diagram.
documentation required in its initial stage is vast.
• Developing a spiral model is very expensive and small
projects may find it difficult to use.
• The spiral model depends on risk analysis and without
a highly experienced team developing this project is
impossible.
• It is not user-friendly especially for projects with an
unambiguous SRS. Software Prototyping–
Incremental Model– • This is one way in which we can buy knowledge and
• It determines the user needs and defines the overall reduce uncertainty.
architecture, but then delivers the system in a series of • A prototype is working model of one or more aspects
increments (software builds). of the projected system.
• In incremental model, multiple development cycles • It is constructed and tested quickly and inexpensively
take place to make the life cycle a "Multi-waterfall" in order to test out assumptions.
cycle. It is classified as–
• The cycles are get divided into smaller and more Throw-away Prototypes
easily managed modules. • It tests out some ideas and is then discarded when the
• It is a type of software development model such as V- true development of the operational system is
model, Agile model etc. commenced.
System Analysis and Design 219 YCT
• It can be developed using different software or • It predicts the efforts required for the software project.
hardware environment. • It depends on the number of lines of code for software
Evolutionary Prototypes– product development.
• It is developed and modified until it is finally in a state • It also estimates or predicts the required number of
where it can become the operational system. man-months (MM) for the full development of
• In this case, the standards which are used to develop software products.
the software have to be carefully considered. Software Development Life Cycle–
Rapid Application Development– • It is a process that produces software with the highest
• RAD is model which is also sometimes referred to as quality and lowest cost in the shortest time possible.
the rapid prototyping model. • It provides a well-structured flow of phases that help
• RAD has the features of both the prototyping and the an organization to quickly produce high- quality
incremental delivery models. software that is well-tested and ready for production
Major Objectives of RAD are– use.
• To decrease the time taken and the cost incurred to SDLC Six Phases– that has been given in the below
diagram.
develop software systems.
• To limit the costs of accommodating change requests
by incorporating them as early as possible before large
investments have been made on development and
testing.
Agile Model–
• It is also a type of incremental model and used for
time critical applications.
• Software is developed in incremental, rapid cycles and
this results in small incremental releases with each
release building on previous functionality.
Important Facts
• Each release is here thoroughly tested to ensure that
.
ANSWER KEY
1. (a) 2. (b) 3. (a) 4. (d) 5. (c) 6. (a) 7. (b) 8. (b) 9. (b) 10. (c)
11. (b) 12. (a) 13. (a) 14. (b) 15. (c) 16. (d) 17. (c) 18. (d) 19. (d) 20. (b)
21. (c) 22. (d) 23. (a) 24. (b) 25. (b) 26. (c) 27. (d) 28. (d) 29. (b) 30. (c)
31. (d) 32. (b) 33. (b) 34. (a) 35. (c) 36. (b) 37. (d) 38. (c) 39. (b) 40. (d)
41. (d) 42. (d) 43. (a) 44. (b) 45. (c) 46. (c) 47. (b) 48. (a) 49. (c) 50. (a)
51. (c) 52. (d) 53. (a) 54. (b) 55. (b) 56. (d) 57. (d) 58. (d) 59. (b) 60. (d)
61. (d) 62. (b) 63. (c) 64. (a) 65. (d) 66. (b) 67. (b) 68. (d) 69. (a) 70. (b)
71. (c) 72. (c) 73. (b) 74. (d) 75. (a) 76. (c) 77. (b) 78. (c) 79. (a) 80. (d)
81. (b) 82. (c) 83. (c) 84. (a) 85. (d) 86. (d) 87. (a) 88. (b) 89. (a) 90. (d)
91. (c) 92. (a) 93. (d) 94. (c) 95. (b) 96. (a) 97. (d) 98. (c) 99. (c) 100. (d)
101. (c) 102. (b) 103. (b) 104. (b) 105. (d) 106. (a) 107. (d) 108. (a) 109. (a) 110. (a)
111. (c) 112. (a) 113. (a) 114. (c) 115. (c) 116. (a) 117. (c) 118. (c) 119. (d) 120. (c)
121. (a) 122. (c) 123. (b) 124. (d) 125. (b) 126. (d) 127. (a) 128. (d) 129. (c) 130. (a)
131. (b) 132. (a) 133. (b) 134. (a) 135. (c) 136. (b) 137. (c) 138. (b) 139. (c) 140. (d)
141. (a) 142. (a) 143. (b) 144. (c) 145. (d) 146. (d) 147. (c) 148. (a) 149. (d) 150. (d)
151. (b) 152. (d) 153. (a) 154. (b) 155. (c) 156. (c) 157. (d) 158. (c) 159. (a) 160. (c)
161. (c) 162. (c) 163. (d) 164. (c) 165. (d) 166. (a) 167. (a) 168. (d) 169. (b) 170. (c)
171. (b) 172. (c) 173. (d) 174. (a) 175. (b) 176. (b) 177. (c) 178. (b) 179. (a) 180. (c)
181. (a) 182. (b) 183. (b) 184. (c) 185. (c) 186. (b) 187. (c) 188. (d) 189. (a) 190. (d)
191. (c) 192. (b) 193. (a) 194. (d) 195. (b) 196. (a) 197. (d) 198. (b) 199. (a) 200. (a)
201. (a) 202. (d) 203. (c) 204. (d) 205. (a) 206. (b) 207. (a) 208. (c) 209. (d) 210. (d)
211. (d) 212. (d) 213. (c) 214. (b) 215. (c) 216. (a) 217. (b) 218. (b) 219. (b) 220. (c)
221. (b) 222. (c) 223. (b) 224. (d) 225. (d) 226. (b) 227. (b) 228. (c)
then this layer to convert the data according to that file Cloud is interconnected networks of services
system. designed to provide computer resources. In this you can
Analysis Layer– The function of the analysis layer work according to your need, it is a huge network. You
in big data is use to the information gathered from the do not even know about how it brings data in front of
source layer and the store layer to create algorithms and you. Cloud computing is a collection of licensed services
present the information that can be accessed using that are provided by different vendors.
existing tools. This information is used to create What is Cloud Computing– Cloud computing is
advertising and business intelligent methods. the technology in which various types of services are
Consumption Layer– The main function of the provided using the internet. These services can be
consumption layer is to observe the information provided anything such as software or storage space provided on
by the analysis layer and convert it into business the server or any other service.
intelligence report. Which is used by companies to Cloud computing means providing any kind of
design and present the product in the market compared to computing services on the demand of the user through
their competitors. the internet. If understood in simple language in this
Big Data Analytics–- Big data analytics defines the technology the user is provided with the facility of data
method of analyzing huge amounts of big data. Big data storage on a server of the internet. Buy purchasing space
analytics is a process by which large sets of data are on the cloud, the user can save his data on it and can
collected and analyzed to detect hidden patterns and access his data from anywhere in the world through the
useful information. Organization use this information to internet.
improve their business. More decision efficient, Cloud Computing History– The beginning of
operations by big data analytics can lead to higher profits cloud computing, a company named Salesforce thanked
and happier customers. to provide the service to the peoples of its website. It was
Internet of things and its Application 244 YCT
only after this that it came to know how important it can Disadvantages of Cloud Computing– When you
prove to be in the coming times. After many years this use cloud you must have internet connection, so that user
field gained momentum and by coming in the 21st can access his cloud account. Cloud can not be used
century many giant companies like Amazon, Google and without internet.
Microsoft started providing their services in the field of • The cloud is fully infrastructure and manage by the
cloud computing. cloud provider, so that the cloud provider can
Features of Cloud Computing discontinue your services at any time.
Resources Pooling– Resource pooling is one of the
• Many cloud provider company's limit the bandwidth.
essential features of cloud computing. Resource pooling
means that a cloud service provider can share resources If you want to increase your bandwidth then you will
among multiple clients, each providing a different set of have to pay for it separately.
services according to their needs. • A high speed internet connection is required to access
It is a multi-client strategy that can applied to data the cloud. If you have an internet connection but the
storage, processing and bandwidth-delivered services. speed is slow then you will not be able to use the
The administration process of allocating resources in cloud.
real-time does not conflict with the client's experience. How Cloud Computing Works– In cloud
On-demand Self-Service– It is one of the important computing there can be many server i.e. computers on
and essential features of cloud computing. This enables which a particular type of software is installed, it can be
the client to continuously monitor server uptime, one or more.
capabilities and allocated network storage.
Cloud computing basically works on dual layers
This is a fundamental feature of cloud computing
technology to manage the servers. There is a separate
and a customer can also control the computing
layer called backend and second layer which is used by
capabilities according to their needs.
client is called frontend.
Easy Maintenances– This is one of the best cloud
features. Servers are easily maintained and downtime is Similarly the server setup for a complete cloud
minimum or sometimes zero. computing is done by combining both the backend and
Cloud computing powered resources often undergo frontend.
several updates to optimize their capabilities and Type of Cloud Computing– Cloud computing is
potential. divided on the basis of two different method.
Security– Data security is one of the best features of A. On the basis of deployment.
cloud computing. cloud services make a copy of the B. Depending on the service provided by the cloud.
stored data to prevent any kind of data loss. A. Following are the types of cloud computing on
If one server loss data by any chance, the copied the basis of deployment–
version is restored from the other server. This feature
1. Public Cloud– Public cloud available to
handy when multiple users are working on a particular
file in real-time and file suddenly gets corrupted. everyone and it is managed by the service
Cost Savings– Using web-based services eliminates provider. Public cloud services are sometimes
the need for large expenditures on implementing and free or charged very little for them.
maintaining the hardware. Cloud services work on a pay- Amazon web services (AWS), Microsoft Azure
as-you-go subscription model. ware all example of public cloud computing. In
Advantages and Disadvantages of Cloud Computing– this type of cloud the infrastructure is hosted by
Advantages of Cloud Computing–Cloud other service providers and which are later
applications improve collaboration by allowing groups of made public.
people to quickly and easily share information in the 2. Private Cloud– Private cloud will provide the
cloud via shared storage. infrastructure to only one organizations or
• On cloud you can provide unlimited storage capacity company, whether managed internally or by a
which you can customize according to your need can third party and hosted either internally or
increase or decrease. externally.
• Data security on the cloud is a huge benefit. Cloud 3. Hybrid Cloud– Hybrid cloud is a combination
provides facilities to provide a lot of security for data of public and private cloud, many company use
security to protect data. public cloud for their database as well as use a
• In cloud computing organization, the maintenance private cloud to store sensitive application.
cost of computer hardware and software is reduced. 4. Community Cloud– In community cloud
Thereby reducing the cost of the organization. computing, there is sharing of data between
• You can access the cloud from anywhere and can take such organization that have similar goals and
facility of all the services that the cloud provides. For who together form a community. Only members
this you just need to have internet. of that community can use this services.
Internet of things and its Application 245 YCT
B. There are following types of cloud computing to manipulate the objects present in the world and
based on the service provided by the cloud– navigate through it, so that he can feel his presence in
1. Iaas (Infrastructure as a Service) – In this that object and can also do action-reaction. To create
type of service, the computing power, storage, virtual reality special types of glasses are presented on
software, network power and all other control of the glass as well as the user has to wear fiber hand gloves
the cloud is with the user. This service is from which he controls the actions. Like - playing a car
basically used for business. The biggest race game on a computer. We get involved in the game
example of this is VPS (Virtual Private Server) in such a way that we are actually driving the car, but in
in which you get computing power along with reality it does not happen thus virtual reality given an
software and network. impression of reality.
2. Pass (Platform as a Service)– In pass the user Characteristics of Virtual Reality–
gets only one platform which can be either Believable– You feel like you're in the virtual world
storage or computing power. In this things do through what you see and hear.
not control completely only the cloud provider Full Immersive– As you move your head around
can control them. Example of this are Gmail, with the VR headset on, what you see changes as well,
Yahoo, Rediff etc. just as it world in real life.
3. Saas (Software as a Service)– In saas you get Computer-generated– VR world are usually
only one software hosted on remote server, created with complex 3D computer graphics that change
which is used for a specific task. These type of in real time as we move.
services are mostly used in small business for Interactive– You can interact with and move the
example- Google Docs, Website etc. different objects in the scene.
Uses of Cloud Computing– Internet Technology– The internet is a network of
File Storage– Generally users use cloud computing global system interconnected with computers that
to store, manage and share their files in remotely hosted connect any computer in the world through routers and
system. Examples are Google drive and drop box. servers. In other words, the connection established
Website Hosting– Cloud hosting is used to host any between two computers through TCP/IP protocol to
websites in addition to hosting your website. Cloud host exchange information is called internet. Internet is the
provide also provide their own computing resources. largest network in the world.
Backup and Recovery– Businesses and History of Internet– The first workable prototype
organizations usually backup their data a storage device, of the internet came in the late 1960s with the creation of
but its not very effective. Such as loss or damage to the ARPANET, or the Advanced Research Projects Agency
device, that is you can easily back up your data in cloud Network. Originally funded by the U.S. Department of
base backup, in this way it is also easy to recover data. defense, ARPANET used packet switching to allow
Test and Development– Cloud computing also play multiple computers to communicate on a single network.
a good role in the testing and development of any The internet is a vast network that connects computers all
software and network. Cloud services help to check over the world. Through the internet, people can share
whether your software is running smoothly or there is no information and communicate form anywhere with an
error in it. internet connection.
Example of Cloud Computing– Protocol– A protocol is a set of rule that govern the
YouTube– YouTube is famous video sharing process of exchanging information. The standard protocols
platform, in which millions of videos are uploaded daily used for this purpose are TCP, IP, FTP, UDP etc.
in such a situation. YouTube uses cloud computing to TCP/IP– TCP stands for transmission control
store so many videos. protocol and IP stands for internet protocol. Internet
Facebook– Facebook is famous social media protocol suite commonly known as TCP/IP. IP handles
platform which on the millions of people profile and lot datagram routing while TCP handles higher level
of data are available to store it facebook also uses cloud functions such as segmentation, reconnection and error
computing. detection. It is a collection of communication protocols.
Emails– All the companies providing email services There are four layers in TCP/IP.
such as Gmail, Rediff, Yahoo and all the companies Application Layer
providing online storage such as drop box, yadex, media Transport Layer
fire mega etc. all uses cloud computing.
Internet Layer
Virtual Reality Network Interface Layer
Virtual Reality is a computer device used to create (i) Application Layer Protocol– The application layer
an imaginary world. The world created in virtual reality serves as the top 3 layer (application, presentation,
makes the user feel the presence of the world that in session) of the OSI model. It is responsible for node-
which he is. Virtual reality makes the user feel the ability to-node communication and user interface.
Internet of things and its Application 246 YCT
(ii) Transport Layer Protocol– This is the third layer switches and hubs together form a metropolitan area
from the bottom. It is responsible for all types of network. Government agencies use MAN to connect
data transfer. It establishes connection oriented and with citizens and private industries.
connectionless communication. In this layer TCP
and UDP protocols are included. TCP is a
connection based and reliable protocol whereas UDP
is connectionless protocol.
(iii) Internet Layer Protocol– This protocol is
responsible for routing. Its purpose is to follow a set
of protocols to deliver data packets to the destination
as per the information contained in the packet
header. The main function of this layer is to send IP
address, routing and avoiding traffic.
(iv) Network Interface Layer Protocol– This is the
bottom layer of the TCP/IP model and contains the
physical and datalink layers of the OSI model. It WAN (Wide Area Network)– A wide area network
recognizes the characteristics of the protocol, is a type of network that transmits voice, data, image and
hardware and media used for communication. video across a geographic area. It is a group of local area
networks. It connects different cities, states or countries.
FTP–File Transfer Protocol (FTP) is a standard
Example- connects districts and all state headquarters.
communication protocol used to transmit files between Internet is also a type of wide area network, it is spread
computers over the internet. FTP is an application layer all over the world.
protocol that transfer files between local and remote file Data communication is done with the help of hubs,
systems. switches, fiber optics, modems and routers etc. and
UDP–User Datagram Protocol (UDP) is a widely technologies like ATM, ISDN, MPLS, frame relay are
used transport protocol. It is faster than TCP but it is less used to transfer data through the internet.
reliable. It is used to transmit small size data packets.
These small sized data packets is known as datagram.
HTTP–HTTP stands for Hypertext Transfer
Protocol. HTTP is used to transfer data over the web. It
is an application layer protocol that allows users to
communicate data over the world wide web (www).
LAN (Local Area Network)– A Local Area
Network is a network used within a very small
geographical area (about 1 km) such as a home, school,
computer lab, office building etc. within a group. It is
used to connect network and computer accessories. In Search Engines– A search engines is a software that
this communication, devices like hubs, switches are searches the desired information, web pages, images etc.
used. The hub, switch and router are connected to an from the database of the internet and displays the results
Ethernet cable via an RJ45 port. to the user on the browser. The search engine searches
any web page on the basis of its title, key words or any
phrase located on that page. The results displayed on a
search are often arranged in a list according to the most
frequently visited pages.
Some of the popular search engines are as follows–
(i) Google
(ii) Yahoo
(iii) Ask.com
(iv) Bing
(v) Duck Duck Go
MAN (Metropolitan Area Network)– MAN is the (i) Google– Google is a famous search engine, which
extended form of LAN which covers a large was created by Sergey Brin and Larry Page, two
geographical area like city or town. The data transfer rate Ph.D students of (Stanford University California).
in MAN is in Mbps. In MAN, different LANs are Initially its name was BACKRUB, later in 1997 it
connected to each other through a telephone exchange was renamed as Google. Initially it was made for
line. It can be extended up to 30-40 km. Routers, ranking.
Internet of things and its Application 247 YCT
(ii) Yahoo– Yahoo is a search engine, started in 1994 by associated webpages and posting content to these web
Jerry Yang and David Fillo at Stanford University. pages online. The content meant for web publishing can
But it was registered in 1995. include text, videos, digital images, artwork and other
(iii) Ask.com– It is a question-answer based e-business forms of media. Web publishing comprises of personal,
and web search engine. Ask browser toolbar is an business and community websites in addition to e-books
extension that displays as a separate bar on the and blogs. Publishers must possess a web server, a web
browser window. It was created in 1996 in publishing software and an internet connection to carry
California by Garrett Gruener and David Warthen. out web publishing. Web publishing is also known as
(iv) Bing– It was launched by Microsoft on 3 June 2009 online publishing.
as a web search engine. These are the 5 steps to publish your website
(v) Duck Duck Go– Duck Duck Go (also abbreviated 1. Prepare your website content– The structure and
as DDG) is an internet search engine that layout of a web design converges around content.
emphasizes on protecting searchers privacy and The communication of ideas informs everything
avoiding the filter bubble of personalized search from navigation to the arrangement of writing and
results. visuals. When you don't work with the actual text
Introduction to online & offline messaging– If a and images, your design is only an approximation.
person is active over a messaging tool and able to accept Go over your content are make sure that it's in great
the messages, it is termed as online message and if the shape before you place a single element in your
person is not available and the message is left to view design. Optimize your content for SEO and having
when the person is back, it is termed as offline message. SEO in place makes the content you are working
Instant messaging technology is a type of online with even more accurate.
message allowing real-time text transmission over the 2. Design and build your website– This is the biggest
internet or another computer network. Messages are step in this process. There are many way to arrange
typically transmitted between two or more parties, who your pages with a layout.
are all connected on a common network. Instead of using • Select appropriate typography
mobile or Wi-Fi data like popular messaging apps such • Create a user experience
as Whatsapp. The offline messaging apps create a peer-
• Develop a consistent and usable user interface
to-peer bluetooth mesh network or Wi-Fi direct-based
3. Find Web Hosting– When looking for hosting you
network on your phone eliminating the need for mobile
need to consider the speed, reliability, level of
data services. The network uses these nodes to transfer
security as well as the ease of scalability to
data across devices.
accommodate future traffic growth.
World Wide Web Browsers– The World Wide
4. Do a quality assurance audit– Your website is
Web was the first web browser invented by Team
Berners Lee in 1990. The World Wide Web is known as done, you found web hosting and you are ready to
the Web. It is a large group of interconnected put it out into the world. Before you hit the publish
information (web pages) through hyper links, which can button make sure to do a thorough QA before going
be accessed on the internet with the help of a web live. The process of creating a website can be a long
browser. The World Wide Web is a system that one, with many changes and edits that may have
interconnects the information gathered in many happened along the way.
computers with the help of hyper text documents and • Proofread the content
hyper text transfer protocol (http). It is used to send these • Check the spelling
information from one place to another. Which exchanges • Do a grammar check
data with the help of hyper links.
• Check all the text
Web Page– Each page stored on the World Wide
• Optimize images
Web (WWW) is called a webpage, which is created
using HTML (Hyper Text Markup Language). Web • Follow proper semantic structure
pages are stored on web servers and can contain a large • Test links and integrations
amount of information, including text, graphics, audio, 5. Publish your website with a domain name– A
video and hyperlinks. domain host provides a domain name like
Hyperlink– A hyperlink is that part of HTML text www.yourdomainname.com that visitors can use to
in which the address of another page or webpage is find you. A domain name is an identification string
given. On clicking the hyperlink, the computer shows us that defines a realm of administrative autonomy,
the page or webpage. authority or control within the internet. Domain
Web Publishing– Web publishing is the process of names are used in various networking contexts and
publishing original content on the internet. The process for application specific naming and addressing
includes building and uploading websites, updating the purposes.
Internet of things and its Application 248 YCT
Basic Knowledge HTML, XML and Scripts visual imagery in order to make the website more
HTML (Hyper Text Markup Language)– Hyper visually appealing and easy to use.
text markup language (HTML) is the standard markup Developing a web page involves designing and
language for web page documents to be displayed in web implementing the part that your readers see and interact
browsers. Which is used to give the structure of the with, known as the front end, as well as the programming
webpage and its content. The structure of the web page is and database element of the page, known as the back
created using paragraphs, lists, images and data tables. end. Web design has numerous components that work
HTML allows creating and structuring sections, together to create the finished experience of a website,
headings, links, paragraphs and more in a webpage using including graphic design, user experience design,
various tags and elements. interface design, search engine optimization (SEO) and
<!DOCTYPE html>– All HTML documents must content creation. These elements determine how a
start with a <!DOCTYPE html> declaration. The website looks, feels and works on various devices.
declaration is not an HTML tag. It is an information to Website Maintenance– Website maintenance is the
the browser about what document type to expect. practice of monitoring your websites overall health and
like– HTML5 declaration <!DOCTYPE html> performance. Keeping a website up-to-date it is crucial to
<html>– This is the root element of an HTML page ensure it's working at full capacity, engaging and
called the start tag. This is the first tag of an HTML retaining site visitors. There are a number of tasks
document. required to properly check and maintain a website,
including updating security software and plugins, adding
<head>– This element contains the meta data of the
fresh content, increasing new and returning traffic and
HTML page.
meeting the satisfaction of your site users. Website
<title>– This element is for the title of the HTML maintenance can impact your business first impressions,
page which is shown in the title bar of the browser or in SEO strategy, security and sales. Whether you are a
the tab of the web page. business owner or starting a blog, you will want to make
<body>– This is the container for all the visible sure that when people and search engines land on your
content or information that defines the body of the site. They will immediately see the benefits of your sites
document. This tag is required for every HTML offerings or risk losing them. This means that your
document and should only use once in the whole HTML ability to retain online interest lies primarily in your
document. website maintenance.
XML (Extensible Markup Language)– Extensible HTML Tools– HTML tools prove to be a great help
Markup Language (XML) is a markup language and a when it comes to step up their workflow and perform
file format for storing, transmitting and reconstructing repetitive tasks. These tools are blessed with all the
arbitrary data. It defines a set of rules for encoding richness and power that help webmasters to augment the
documents in a format that is both human-readable and value of their work and improve the usability of their
machine-readable. XML is one of the most widely used web designs. They are compelling enough to build
formats for sharing structured information, between beautiful and responsive website in the quickest possible
programs, between people, between computer and manner. The majority of HTML5 tools is available for
people, both locally and across networks. If you are free and they are popular because they take less time and
already familiar with HTML, you can see that XML is efforts to fabricate a commendable website. Using
very similar. HTML5 tools, developers can easily incorporate eye-
Scripts– In computer programming, a script is a catching animation effects, video, fonts and graphics to
program or sequence of instructions that is interpreted or their websites. You can pick any one of them to manage
carried out by another program rather than by the and build the code for your website.
computer processor (as a compiled program). As with 1. Font Dragr
scripts in general, scripting language are mostly used to 2. HTML5 Maker
automate processes at the application level. At the 3. HTML Kickstart
command line or through a web server, they are able to 4. Initializer
execute programs running on a web server and display 5. Liveweave
the appropriate results to the users. 6. Adobe Edge Animate
Every computer user uses scripts of some kind, 7. Modernizr
even if they are not aware of it. Scripts are sometimes 8. CrossWalk
used to customize and automate repeated tasks and 9. Online 3D sketch
control overall computer functions. 10. Patternizer
Creation & Maintenance of websites 1. Font Dragr– Font dragr is all what you need to
Website Creation– Web design is a web preview custom web fonts in the browser. It's a very
development process for creating a website that focuses simple tool that comes with a drag and drop
on aesthetic factors like layout, user interface and other interface allowing you to drop your typeface,
Internet of things and its Application 249 YCT
scalable vector graphics and web open fonts on the generate impressive patterns that are sure to please
web page to test all of them instantly. Use font dragr your website visitors.
to instantly load your font and know whether it's Multimedia and Graphics– Computer graphics are
appropriate or not. picture and films created using computers. Multimedia is
2. HTML5 Maker– Animation make a dynamic visual content that uses a combination of different content
impact on the appearance of a website and HTML5 forms such as text, audio, images, animations, video and
maker is a richly different take on this aspect. Being interactive content.
the finest online animation tool, HTML5 maker Multimedia– The word multi and media are
makes it easy for developers to add interactive combined to form the word multimedia. That is many
content to their website with the help of HTML, types of media (hardware/software) used for
CSS and Javascript. communication of information. Multimedia is a
3. HTML kickstart– HTML kickstart is a set of representation of information in an attractive and
HTML, CSS, JQuery elements and layouts that interactive manner with the use of a combination of text,
together help you to start your HTML5 venture audio, video, graphics and animation. In other words, we
while saving you a lot of precious time and efforts. can say that multimedia is a computerized method of
4. Initializer– Initializer is a high-end HTML5 tool presenting information combining textual data, audio,
and template generator to help you kick start your video, graphics and animations.
next HTML5 boilerplate project quickly. It's nice Component of Multimedia
tool for developing impressive and customizable Text– All multimedia productions contain some
template to suit your project needs. amount of text. The text can be in a variety of fonts and
5. Liveweave– Liveweave is yet another exemplary sizes to match the multimedia softwares professional
HTML5 tool that comes packed with context presentation.
sensitive auto completion for both HTML and CSS. Graphics– Graphics make the multimedia
The tool provides you a playground to play around application attractive. In many circumstances, people
different codes and tag elements to structure your dislike reading big amounts of material on computers. As
project. Liveweave is a highly sough-after tool a result, pictures are more frequently used than words to
among front-end developers as it helps them clarify concepts, offer background information and so
generate HTML and CSS tags automatically. on. Graphics are at the heart of any multimedia
6. Adobe Edge Animate– Adobe edge animate is a presentation.
compelling tool for HTML5 developers for creating Audio– A multimedia application may require the
interactive HTML animations. If you are a part of use of speech, music and sound effects. These are called
digital publishing, web or advertisement then adobe audio or sound element of multimedia. Sound is the most
edge animation will surely appease you. serious aspect of multimedia, delivering the joy of music,
7. Modernizr– Modernizr is an advanced open source special effects and other forms of entertainment. Speech
javascript library that allows designers to create is also a perfect way for teaching. Computer stores the
pleasurable website experiences on the basis of sound in digital form. Therefore the sound used in
visitors browser. Using this tool, you can easily multimedia application is digital audio.
detect whether the current browser supports CSS3 Video– The term video refers to the moving picture,
and HTML5 features. This way you can make your accompanied by sound such as a picture in television.
website suitable as per the browser. Video element of multimedia application gives a lot of
8. CrossWalk–Create cutting-edge HTML5 information in small duration of time. Digital video is
applications using crosswalk. In its bare bones, useful in multimedia application for showing real life
crosswalk is a web runtime tool that comes complete objects. Digital video files can be stored like any other
with outstanding features of a modern browser. files in the computer and the quality of the video can still
Crosswalk is a tool that deserves your attention for be maintained. The digital video clips can be edited
constructing interactive mobile applications. easily.
9. Online 3D Sketch– Online 3D sketch is a Animation– Animation is a process of making a
remarkable tool that makes the process of creating static image look like it is moving. An animation is just a
sketches and drawings absolutely fun and easy. It's a continuous series of still images that are displayed in a
free online tool that allows developers to create and sequence. The animation can be used effectively for
share their drawing experiences among their friends attracting attention. Animation also makes a presentation
and team members while encouraging their valuable light and attractive. Animation is very popular in
feedbacks. multimedia application.
10. Patternizer– As the name suggests, patternizer is a Graphics– A graphic is an image or visual
tool that enables developers to develop inspiring representation of an object. Therefore, computer graphics
patterns for their website. The tool is available for are simple images displayed on a computer screen.
free and allows you to integrate clean codes to Graphics are often contrasted with text, which is
Internet of things and its Application 250 YCT
comprised of characters, such as numbers and letters, • Microphone, Speakers
rather than images. • A stable internet connection
Computer graphics are separated into two different • A computer or conference phone
categories– raster graphics and vector graphics.
• Video conferencing software
Raster Graphics– Raster graphics represents image Video Conferencing Protocols– Internet
by bitmaps stored in computer memory and displayed on communication simply means communication between
a screen composed of tiny pixels. Each pixel is two or many users over the internet or the WWW (World
represented by one or more memory bits. Also known as Wide Web). The communication can be in the form of
bitmaps and one bit per pixel suffices for black and white texting, sharing information, videos, audios, ideas, video
images, while four bits per pixel specify a 16 step gray chatting etc.
scale image. Some protocols of video conferencing are–
Vector Graphics– Whereas raster graphics depend
on pixels vector graphics use path made from a
mathematical formula. The formula also known as
vectors, tells the path its shape, color and if there is one
its border. Vector graphics are computer images created
using a sequence of commands or mathematical
statements that place lines and shapes in a two-
dimensional or three-dimensional space. 1. Video Conferencing Protocol H.323–
• Designed by ITU (International
Voice Mail and Video Conferencing–
Telecommunication Union)
Voice Mail– Voicemail is a computerized system
• Computer language used is binary
that allows callers to leave a message. A voicemail is an
electronically stored voice message that is left by a caller • Provides multimedia communication over a
to be retrieved later by the intended recipient. Callers variety of networks.
leave short messages that are stored on digital media. It • It is quite complex, possibilities of delay.
is stored on the service providers server, in a space • Multipoint Control Unit (MCU), gateway,
reserved for the user called a mailbox. Voicemail has the gatekeeper (optional) and the terminal are some
same characteristics of email, except that the messages functioning components.
are voices instead of text. Voicemail comes with features 2. SIP (Session Initiation Protocol)–
like a user interface to enable selecting, playing and • Designed by IETF (Internet Engineering Task
managing of messages. Voicemail message receive from Force)
many callers at the same time and broadcast voice • Computer Language used is ASCII
messages to send to more than one person at the same • Highly Flexible and Simple
time. • User-Agent and Network server are two major
Video Conferencing– Video conferencing is live, functioning components.
visual connection between two or more remote parties • Used to establish, modify and terminate
over the internet that simulates a face to face meeting. multimedia sessions or calls
With a strong internet connection, the participants can • Resembles HTTP protocol
see, hear and talk to each other in real time, no matter • Works with both IPv4 and IPv6.
where in the world they are. Video conferencing is Introduction to e-commerce– E-commerce
important because it joins people who would not (electronic commerce) is the buying and selling of goods
normally be able to form a face to face connection. This and services or the transmitting of funds or data, over the
technology is particularly convenient for business users internet. E-commerce is also known as electronic
in different cities or even different countries because it commerce or internet commerce. There are no physical
saves time, expenses and hassles associated with market places and the entire process of marketing and
business travel. Uses of video conferencing include selling of goods, takes place online or electronically.
holding routine meetings, negotiating business deals and Online stores like Amazon, Flipkart, Shopify, Myntra,
interviewing job candidates. Ebay, Olx are example of e-commerce websites. These
When a video conference is held for informal business transactions occur either as business-to-business
purposes, it is called a video call or video chat. (B2B), business-to-consumer (B2C), consumer-to-
Components of video conferencing– consumer (C2C) or consumer-to-business (C2B). The
terms e-commerce and e-business are often used
• Video Camera or Webcam
interchangeably. The term e-tail is also sometimes used
• Display device (computer monitor, television, in reference to the transactional process that make up
projector or laptop) online retail shopping.
Internet of things and its Application 251 YCT
Types of E-commerce Models– Electronic Intranet– An intranet is a private network that can
commerce (e-commerce) can be classified into four main only be accessed by authorized users. Some intranet are
categories. The basis for this simple classification is the limited to a specific local area network (LAN), while
parties that are involved in the transactions. So the four others can be accessed from remote locations over the
basic e-commerce models are as follow. internet.
1. Business-to-Business (B2B) Email– The history of modern internet email
2. Business-to-Consumer (B2C) services reaches back to early ARPANET, with
3. Consumer-to-Consumer (C2C) standards for encoding email messages published as
4. Consumer-to-Business (C2B) early as 1973. Ray Tomlinson is credited as the inventor
of networked email in 1971, he developed the first
1. Business-to-Business (B2B)– Business to Business
system able to send mail between users on different hosts
e-commerce refers to the electronic exchange of
across the ARPANET, using the @ sign to link the user
products, services or information between
name with a destination server. Electronic mail (e-mail
businesses. Here the companies are doing business
or email) is a method of exchanging messages (mail)
with each other. The final consumer is not involved.
between people using electronic devices. A world wide
So the online transaction only involve the
e-mail network allows people to exchange e-mail
manufactures, wholesalers, retailers etc.
messages very quickly.
2. Business-to-Consumer (B2C)– Business to Email Spam– Email spam, also referred to as junk
Consumer is the retail part of e-commerce on the email or simply spam is unsolicited messages sent in
internet. It is when businesses sell products, services bulk by email (Spamming).
or information directly to consumers. The consumer
SMTP– The Simple Mail Transfer Protocol (SMTP)
can browse their website and look at products,
is an internet standard communication protocol for
pictures, read reviews. Then they place their order electronic mail transmission. Mail servers and other
and the company ships the goods directly to them. message transfer agents use SMTP to send and receive
Popular examples are Amazon, Flipkart etc. mail messages.
3. Consumer-to-Consumer (C2C)– Consumer to FTP– The File Transfer Protocol (FTP) is a standard
Consumer is a type of e-commerce in which communication protocol used for the transfer of
consumers trade products, services and information computer files from a server to a client on a computer
with each other online. These transactions are network. FTP is design for sending files to a server on
generally conducted through a third party that the internet.
provides an online platform on which the EPS File– EPS (Encapsulated Post Script) is
transactions are carried out. Consumer to consumer perhaps the most common vector image format. It is the
are direct contact with each other. It helps people standard interchange format in the print industry. EPS
sell their personal good and assets directly to an files also contain bitmap data, retaining individual
interested party. Usually, goods traded are car, coding on colour and size. This means the image retains
bikes, electronics etc. and the example of this model its resolution regardless of scale.
is OLX, Quikr etc. RGB Model– The main purpose of the RGB colour
4. Consumer-to-Business (C2B)– This is the opposite model is for the sensing, representation and display of
of the traditional commerce model of B2C. images in electronic systems, such as televisions and
Consumer to Business is a type of e-commerce in computers though it has also been used in conventional
which consumers make their products and services photography.
available online for companies to bid on and B2G– Business-To-Government (B2G), also known
purchase. A popular example of C2B platform is a as Business-To-Administration (B2A), refers to trade
market that sales royalty-free photographs, images, between the business sector as a supplier and a
media and design elements, such as istock. government body as a customer.
Important Facts ARP– The Address Resolution Protocol (ARP) is a
communication protocol used for discovering the link
HTTPS– Hypertext Transfer Protocol Secure is an
layer address, such as a MAC address, associated with a
extension of the Hypertext Transfer Protocol. It is used given internet layer address, typically an IPv4 address.
for secure communication over a computer network and This mapping is a critical function in the internet
is widely used on the internet. protocol suite.
IP Address– An Internet Protocol address (IP IPv6– Internet Protocol Version (IPv6) is the most
address) is a numerical label assigned to each device recent version of the Internet Protocol (IP). All IPv6
connected to a computer network that uses the internet addresses are 128 bits long, written as 8 sections of 16
protocol for communication. bits each.
Internet of things and its Application 252 YCT
Important Questions Asked in Previous Years Examinations
1. AMQP stands for– 13. Which of the following is not a TCP/IP layer?
(a) Advanced Mass Query Protocol (a) Application Layer (b) Transport Layer
(b) Advanced Message Queuing Protocol (c) Network Layer (d) Data Link Layer
(c) Add-on Message Query Protocol 14. Which of the following communication medium
(d) Add-on Message Queuing Protocol supports highest data rate?
2. What does IDE stand for? (a) Ethernet (b) Bluetooth
(a) In Deep Environment (c) Optical Fibre (d) Wi-Fi
(b) Integrated Development Environment 15. The IIoT stands for–
(c) Internal Deep Escape (a) Indepth Internet of Things
(d) IDLE (b) Innovative Internet of Things
3. Which is not a characteristic of TCP/IP Model? (c) Information Internet of Things
(a) Connection-oriented protocol. (d) Industrial Internet of Things
(b) Implements flow control
16. What are the challenges in IoT?
(c) Support for a flexible architecture
(d) Unreliable (a) Energy Consumption (b) Security
4. Which of the following things can have an (c) Network Congestion (d) All the above
effect on the development of an individual's 17. ________ tags, devices, smart phones useful in
personality? identification.
(a) physical and mental capabilities (a) IETF 6LoWPAN
(b) health and physical appearance (b) IEFT CoAP
(c) skin color and gender (c) RFID/NFC
(d) all of the above (d) IEEE 802.15.4LoWPAN
5. The huge number of devices connected to the 18. Which protocol interacts asynchronously over
IoT to communicate automatically. It is called– UDP?
(a) Bot to Bot (B2B) (a) HMTP (b) CoAP
(b) Machine to Machine (M2M) (c) MQTT (d) TCP/IP
(c) Skynet 19. WSN stands for _____.
(d) InterCloud (a) Wired Sensor Network
6. IoT security management includes– (b) Wireless Sensor Network
(a) Protocol abstraction (c) Wired Service Network
(b) Simple and fast installation (d) Wireless Service Network
(c) Security with hardware
20. Which of the following design is a high level
(d) Data storage
7. IoT data scalability includes _____. design without any detail?
(a) Protocol abstraction (a) Logical Design (b) Physical Design
(b) Simple and fast installation (c) Both (a) and (b) (d) None of the these
(c) Security with hardware 21. Which one of the technologies is not a
(d) Data storage technology of software IoT system?
8. Which protocol is used to link all the devices in (a) M2M (b) Data Collection
the IoT? (c) Device Integration (d) Real time Analytics
(a) TCP/IP (b) Network 22. What is a private key?
(c) UDP (d) HTTP (a) A key on your key chain
9. ______ supports low energy radio operation. (b) A key not to be given to the public
(a) IETF 6LoWPAN (b) IEFT CoAP (c) A key that opens a secret door
(c) RFID/NFC (d) Bluetooth (d) A key given to the public
10. MQTT stands for– 23. Communication is a non stop _____.
(a) Mass Query Telemetry Transport (a) Process (b) Paper
(b) Message Queuing Telemetry Transport (c)Programme (d) Plan
(c) Message Query Text Transport
24. Full form of OSI Model.
(d) Mass Queuing Text Transport
(a) Option systems Interconnection
11. What is the microcontroller used in Arduino
UNO? (b) Output systems Interconnection
(a) ATmega328P (b) ATmega2560 (c) Open system Interconnection
(c) ATmega32114 (d) AT91SAM3x8E (d) None of these
12. What does GPIO stands for? 25. _______ is an open light-weight easy to
(a) General Purpose Inner Outer implement messaging protocol for M2M
(b) General Purpose Input/Output communication.
(c) General Purpose Intersected Old (a) XMPP (Extensible Messaging and Presence
(d) General Purpose Input Outpur Protocol)
Internet of things and its Application 253 YCT
(b) MQTT (Message Queuing Telementry (a) 20 MHz (b) 16 MHz
Transport) (c) 6 MHz (d) 10 MHz
(c) AMQP (Advance Message Queuing Protocol) 41. Which one of the following protocol is mainly
(d) HTTP (Hypertext Transfer Protocol) used for home automation?
26. Who is the real creator of Bitcoin? (a) Bluetooth protocol (b) X-10 protocol
(a) Santoshi Nakamoto (b) Jeff Bezos (c) MQTT (d) Zigbee protocol
(c) Jerry Yang (d) Paul Allen 42. Which transport layer protocol is used by
27. Which is the seventh layer of OSI model? DHCP?
(a) Physical layer (b) Presentation layer (a) RSVP (b) TCP
(c) Application layer (d) Data Link layer (c) DCCP (d) UDP
28. Which of the following is not a part of IoT 43. Which of the following is not weakness of IoT?
applications? (a) Communication attacks
(a) Smart city (b) Connected Cars (b) Life cycle attack
(c) Home automation (d) Television (c) Physical attack
29. Arduino is a prototype based on an ---- to use? (d) Cost reduction
(a) Hardware (b) Software 44. End-to-end connection is established by ______
(c) Both (a) and (b) (d) None of the above protocol of the TCP/IP suite.
30. Which of the following is not element of IoT? (a) IP (b) UDP
(a) Data Cloud (b) System Security (c) TCP (d) All of these
(c) User interface (d) People 45. The RISC Stands for ______.
31. Full form of SIG is _____. (a) Reduced Instruction Set Computer
(a) Special Interface Group (b) Revise Instruction Set Computer
(b) Special Interest Group (c) Reduced Instrument Set Computer
(c) Standard Interface Group (d) Reduced Instrument Setting Computer
(d) None of these 46. A program that is used to view websites is
32. To secure your data in IoT devices. called a:
(a) Keep changing your password (a) Browser (b) Web viewer
(b) Keep updated your device (c) Spreadsheet (d) Word processor
(c) Reduce your use of Cloud Technology 47. TCP/IP is a:
(d) All of above (a) Network Hardware (b) Network Software
33. Which layer of the OSI model does data (c) Protocol (d) None of these
compression? 48. Which IP address is reserved for loop back or
(a) Network (b) Data link local host:
(c) Physical (d) Presentation (a) 192.168.0.0 (b) 127.0.0.0
34. Which of the following electronic components (c) 127.0.0.1 (d) None of these
stores electric charge? 49. The size of the IPv4 is:
(a) Resistor (b) Capacitor (a) 16 bits (b) 32 bits
(c) LED (d) Relay (c) 64 bits (d) 128 bits
35. Li-Fi technology is base on _____ for high 50. Who provide us internet:
speed data transmission. (a) TCP (b) ISP
(a) VLC (Visible Light Communication) (c) FTP (d) HTTP
(b) Wi-Fi 51. Which is not the search engine:
(c) Cellular Network (a) Altavista.com (b) Google.com
(d) Twisted Pair Cables (c) Yahoo.com (d) Facebook.com
36. PubNub ……….. publishes and subscribes in 52. What protocol does www use:
order to send and receive message. (a) HTTP (b) FTP
(a) Network (b) Account (c) WBC (d) MTP
(c) Portal (d) Keys 53. In computer FTP stands for
37. Arduino in an _____ plateform. (a) file transfer protocol (b) finding telepath
(a) Open-source (b) Close source (c) finish tele program (d) file transfer process
(c) Adware (d) All of the above 54. Bluetooth is a technology that connected
38. Which type of cable has glass center core? devices in a small area:
(a) UTP (b) Fiber-optic (a) VLAN (b) Wireless LAN
(c) STP (d) Coaxial (c) Wired LAN (d) None of the above
39. The CISC stand for ______. 55. The Word Wide Web (www) is the largest:
(a) Computer Instruction Set Compliment (a) LAN (b) MAN
(b) Complete Instruction Set Components (c) WAN (d) All of these
(c) Computer Indexed Set Componets 56. Computer network over a large area such as a
(d) Complex Instruction Set computer city:
40. What is the minimum operating frequency of (a) LAN (b) WLAN
the Arduino UNO broad? (c) PAN (d) MAN
Internet of things and its Application 254 YCT
57. What is the acronym MAN stands for: 71. TCP/IP is an example of
(a) Magnetic Access Network (a) communication protocol
(b) Multi-Area Network (b) networking protocol
(c) Metropolitan Area Network (c) data transfer protocol
(d) Multi-Access Net (d) all of the above
58. How many layers are present in the TCP/IP 72. The network protocol which is used to get
reference model? MAC address of a node by providing IP
(a) 6 (b) 7 address is
(c) 5 (d) 4 (a) SMTP (b) ARP
59. The packets of data that is transported by IP is (c) RIP (d) BOOTP
called: 73. The address resolution protocol (ARP) is used
(a) datagrams (b) frames for
(c) segments (d) encapsulate message (a) Finding the IP address from the DNS
60. Arrange the search engines by there (b) Finding the IP address of the default gateway
(c) Finding the IP address that corresponds to a
popularity:
MAC address
1. Bing 2. Yahoo 3. Ask 4. Goolge
(d) Finding the MAC address that corresponds to
(a) 4321 (b) 4312
a IP address
(c) 4231 (d) 4213
74. An example of an internet search engine is
61. SEO stands for: (a) Windows (b) Linux
(a) Search Entry Optimization (c) Yahoo (d) MS Word
(b) Search Engine Optimization 75. What is the name of the software that allows us
(c) Search Engine Operation to browse through web pages called:
(d) None of the above (a) Browser (b) Mail client
62. Website is a collection of (c) FTP client (d) Messenger
(a) Webpage (b) HTML page 76. Buying and selling goods over the internet is
(c) Both (a) and (b) (d) HTTP page called:
63. Which is a client program that acts as an (a) Hyper-marketing (b) E-commerce
interface between user and World Wide Web. (c) Cyber-selling (d) Euro-conversion
(a) Web browser (b) HTML 77. Which of the following e-commerce company
(c) URL (d) OS has launched shopsy, an app that allows
64. A multimedia file Indians to start online shops for free.
(a) is same as any other regular file (a) Amazon (b) Snapdeal
(b) must be accessed at specific rate (c) Filpkart (d) Paytm
(c) stored on remote server cannot be delivered to 78. Which segment do Flipkart, Amazon, eBay etc.
client belong to:
(d) none of the mentioned (a) B2G (b) C2C
65. In which type of streaming multimedia file is (c) B2B (d) B2C
delivered to the client but not shared? 79. Which of the following is TRUE only for XML
(a) real-time streaming but not for HTML:
(b) progressive download (a) It is derived from SGML
(c) compression (b) It describes content and layout
(d) none of the mentioned (c) It allows user defined tags
66. The graphics can be (d) It is restricted only to be used with web
(a) Drawing (b) Photograph, movies browsers
(c) Simulation (d) All of these 80. Which network has the highest speed of data
67. The component of interactive computer transfer:
(a) MAN (b) WAN
graphics are:
(c) LAN (d) SAN
(a) A light pen (b) Display unit
81. Which of the following protocols may be used
(c) Bank of switches (d) All of these for accessing World Wide Web?
68. Several graphics image file formats that are (a) HTTP (b) SMTP
used by most of graphics system are (c) SLIP (d) None of the above
(a) GIF (b) JPEG 82. A network spreading in different geographical
(c) TIFF (d) All of these location is known as
69. The length of on IPv6 address is: (a) LAN (b) WAN
(a) 16 bits (b) 32 bits (c) Both (a) and (b) (d) None of the above
(c) 64 bits (d) 128 bits 83. A set of rules that governs data
70. Internet is an example of: communication:
(a) LAN (b) MAN (a) Rule (b) Medium
(c) WAN (d) None of these (c) Link (d) Protocol
Internet of things and its Application 255 YCT
84. What is the scope of e-commerce business 98. Graphics programs are those that create
platform like Flipkart, Amazon etc. (a) Designs (b) Pictures
(a) Virtual (b) National (c) Images (d) All of the above
(c) Local (d) Global 99. Video conferencing is used for:
85. Used for video conferencing: (a) Business (b) Education
(a) Zoom (b) Skype (c) Health (d) All of the above
(c) Both (a) & (b) (d) None of these 100. Vector graphics is composed of
86. ____ is used to store the data within the (a) Pixels (b) Palette
document on the server. (c) Paths (d) None of these
(a) XML (b) DHTML 101. Raster graphics are composed of
(c) HTML (d) CGI (a) Paths (b) Pixels
87. Which language is case sensitive? (c) Palette (d) None of these
(a) HTML (b) XML 102. The quality of an image depends on
(c) Both (a) & (b) (d) None of the above (a) No of resolution used by image
(b) No. of pixel used by image
88. What does XML stands for:
(c) No. of line used by image
(a) Extra Modern Link
(d) None
(b) Extensible Markup Language
103. EPS image file format is used for
(c) Example Markup Language
(a) Vector graphics (b) Bitmap
(d) X-Markup Language (c) Both (a) & (b) (d) None of these
89. A proper scripting language is a 104. EPS means
(a) High level programming language (a) Encapsulated Post Script
(b) Assembly level programming language (b) Entire Post Script
(c) Machine level programming language (c) Entire Post Scale
(d) Low level programming language (d) None of these
90. Which tag tells browser where the page starts 105. RGB model are used for
and stops: (a) Printing (b) Computer display
(a) <html> (b) <body> (c) Painting (d) None of these
(c) <head> (d) <title> 106. E-mail stands for
91. Types of computer graphics are (a) Electronic man
(a) scalar and raster (b) vector and raster (b) Electromagnetic mail
(c) vector and scalar (d) none of these (c) Engine mail
92. The GIF format is much ____ to be (d) Electronic mail
downloaded or uploaded over the www. 107. An unsolicited email message sent to many
(a) slower (b) faster recipients at once is
(c) medium (d) none of these (a) Inbox (b) Virus
93. Once a file is saved in JPEG format some data (c) Spam (d) Attack
is lost 108. Write the correct sequence of HTML tags to
(a) Temporarily (b) Permanently design a webpage?
(c) Both (a) & (b) (d) None (a) HTML, Head, Title, Body
94. What is a method of communication between (b) HTML, Title, Body, Head
two persons with personal computers who are (c) Title, HTML, Head, Body
both connected online through the internet? (d) Head, Title, HTML, Body
(a) E-Groups 109. The first network that planted the seeds of
(b) Audio Visual Conference internet was
(c) Multimedia Conference (a) ARPANET (b) NSFNET
(d) Audio-Video Conference (c) VNET (d) INET
95. What is an electronic communication network (UPPCL TG-2 26.06.2016)
110. ..............is a global system of interconnected
for the interconnection of computers to access
governmental, academic, corporate, public, and
different websites.
private computer networks.
(a) Wi-Fi (b) Bluetooth (a) Intranet (b) Internet
(c) Internet (d) Broadband (c) Extranet (d) Darknet
96. Which one of the following telephonic (SSC 10+2 CHSL 31.01.17, 1.15 pm)
conferencing with a radio link is very popular 111. Internet, initially started as–
throughout the world? (a) TCP/IP experiment
(a) TPS (b) Telepresence (b) Network for the defence force of America
(c) Video conference (d) Video teletext (c) Group of research scientists of bell Lab
97. Voice Mail is called (d) Contribution was done by all the above
(a) Voice sequence (b) Voice message institutions
(c) Both (a) & (b) (d) None of these (RRB JE-2014)
Internet of things and its Application 256 YCT
112. Which of the following is not a web browser? 124. Flipkart is an example of which type of website?
(a) Chrome (b) Firefox (a) Celebrity website
(c) Safari (d) Linux (b) Forum Website
(SSC 10+2 CHSL 27.01.17, 10 am) (c) E-commerce website
113. Internet Explorer is a (d) Social networking website
(a) Web browser (UPPCL TG2 11-11-2016)
(b) Web search engine 125. What is e-commerce?
(c) Hypertext transfer protocol (a) Buying and selling of computer products
(d) Web data store (b) Buying and selling of products and services
(RRB JE (Shift-II), 29.8.2015) not found in stores
114. Which of the following options displays the (c) Buying and selling of intermational goods
name of the web page in an Internet Explorer (d) Buying and selling of products and services
browser? over the internet
(a) Address bar (b) Menu bar (UPPCL TG-2 26.06.2016)
(c) Status bar (d) Title bar 126. Which of the following is a tiny digital camera
UPPCL JE 31-01-2019 (Batch-02) generally used in video chats or video
115. To view information on the web you must have a conferencing?
(a) Cable modem (b) Web browser (a) Joystick (b) Light pen
(c) Domain name server (d) Hypertext viewer (c) Web camera (d) MICR
(UPPCL TG-2 26.06.2016) (AHC RO-2016)
116. Client-side scripting generally refers to the 127. HTTP stands for –
class of computer programs on the web that (a) Hyper Text Transmission Protocol
are executed client-side by (b) Hyper Text Transfer Program
(a) web browser (b) web server (c) Hyper Text Transfer Protocol
(c) website (d) URL (d) Hyper Text Transmission Program
(UPPCL RO/ARO-2014) (RRB SSE Secundrabad (Shift-I), 01.09.2015)
117. Who invented E-Mail? 128. Which of the following is an application
(a) Tim Berners-Lee (b) James Gosling protocol?
(c) Vinton Cerf (d) Ray Tomlinson (a) HTTP (b) TCP
(SSC 10+2 CHSL 15.01.17, 4.15 pm) (c) IP (d) UDP
118. World Wide Web was invented by………. (SSC CGL (TIER-1) 27-08-2016, 10am)
(a) John Barber (b) Tim Berners-Lee 129. SMTP in computer science stands for?
(c) Alan Blumlein (d) David Brewster (a) Simple Markup Transfer Protocol
(SSC 10+2 CHSL 24.01.17, 4.15 pm) (b) Systems Mail Transfer Protocol
119. The process of publishing original content on (c) Simple Mail Transfer Protocol
the Internet is called (d) Systems Memory Transfer Protocol
(a) Community publishing (UPPCL RO/ARO-2014)
(b) Digital publishing 130. Which Network protocol is used to send email?
(c) Web publishing (a) FTP (b) SSH
(d) Desktop publishing (c) POP 3 (d) SMTP
UPPCL ARO-18.02.2018 (RRB SSE Bilaspur Yellow paper, 21.12.2014)
120. Links that lead to another webpage are called- 131. Which of the following is not an e–mail
(a) Hyperlinks (b) HTTP Links protocol ?
(c) Embedded Links (d) URL (a) POP (b) IMAP
UPPCL Accountant 10-02-2018 (c) SMTP (d) FTP
121. A program that serves requested HTML files (RRB JE (Shift-2), 27.8.2015)
and page is 132. In HTTP, P stands for–
(a) Web address (b) Web page (a) Pattern (b) Protocol
(c) Web server (d) Home page (c) Program (d) Policy
(UPPCL RO/ARO-2014) RRB NTPC 28.01.2021 (Shift-II) Stage Ist
122. Files can be safely transferred using Internet 133. The internet works by using a protocol called
through- TCP/IP. What is the full form of TCP/IP?
(a) FTP (b) SMTP (a) Transmission Control Protocol/Internet
(c) TCP/IP (d) HTTP Protocol
UPPCL Accountant 10-02-2018 (b) Tele Computer Protocol/Internet Protocol
123. Mozilla Firefox, Google Chrome, Opera etc. (c) Temporary Computer Protocol/Internet
are the example of _______. Protocol
(a) Railway services (b) Web browsers (d) Transmission Computer Programme/Internet
(c) Search engine (d) Email services Protocol
UPPCL APS Exam-18.02.2018 RRB NTPC 16.01.2021 (Shift-II) Stage Ist
Internet of things and its Application 257 YCT
134. _______ is a communication protocol. 140. In reference to computers what is the meaning
(a) HTP (b) CP of LAN?
(c) TP (d) HTTP (a) Largest Area Network
RRB NTPC 09.01.2021 (Shift-I) Stage Ist (b) Local Area Network
135. Which of the following is an advantage of (c) Legal Area Network
LAN? ? (d) Longest Area Network
(a) automatic pricing of data RRB NTPC Stage-Ist, , 28.03.2016 (Shift-III)
(b) sharing peripherals 141. What is the address given to the computer
(c) saving up data connected to a network is called?
(d) backing up data (a) System address (b) S.Y.SI.D
RRB NTPC 23.02.2021 (Shift-I) Stage Ist (c) Process id (d) IP address
136. An organization has a private network for RRB J.E. (14.12.2014, Green Paper)
exclusive use by its employees- 142. Which of the following is NOT an internet
(a) Internet (b) Intranet browser?
(c) LAN (d) Network interface (a) Panda (b) Safari
RRB NTPC Stage-Ist, , 29.04.2016 (Set-II) (c) Firefox (d) Chrome
137. Which of the following is the largest network in RRB NTPC 27.02.2021 (Shift-II) Stage Ist
terms of area? 143. What is the meaning of letter 's' in 'https'
(a) MAN (b) WAN Protocol ?
(c) INTRANET (d) INTERNET (a) Scale (b) Save
RRB NTPC Stage-Ist, 27.04.2016 (Shift-I) (c) Software (d) Secure
138. Transmission of which of the following RRB NTPC 11.03.2021 (Shift-II) Stage Ist
network topologies has the highest speed? 144. Which is the world’s oldest web browser?
(a) LAN (a) World Wide Web (b) Mosaic
(b) WAN (c) Opera (d) Netscape
(c) MAN RRB NTPC Stage-Ist, , 12.04.2016 (Shift-I)
(d) LAN and WAN have equal transmission 145. Whenever we open the internet, we see
speed. ourselves by creating ‘www’. What is the full
RRB NTPC Stage-Ist, , 29.04.2016 (Shift-II) form of WWW?
139. What is the extension of TCP in relation to (a) World Wide Web (b) World Wide Word
computer system? (c) World Wise Web (d) None of the above
(a) Transmission control protocol RRB J.E. (14.12.2014,Red Ppaer)
(b) Transfer call plan 146. Webpages are created using….
(c) Transfer control process (a) HTTP (b) URL
(d) Transmission call protocol (c) HTML (d) FTP
RRB NTPC Stage-Ist, , 16.04.2016 (Shift-III) RRB NTPC Stage-Ist, , 31.03.2016 (Shift-III)
ANSWER KEY
1. (b) 2. (b) 3. (d) 4. (d) 5. (b) 6. (c) 7. (d) 8. (a) 9. (d) 10. (b)
11. (a) 12. (b) 13. (d) 14. (c) 15. (d) 16. (d) 17. (c) 18. (b) 19. (b) 20. (a)
21. (a) 22. (b) 23. (a) 24. (c) 25. (b) 26. (c) 27. (a) 28. (d) 29. (c) 30. (d)
31. (b) 32. (d) 33. (d) 34. (b) 35. (a) 36. (d) 37. (a) 38. (b) 39. (d) 40. (b)
41. (b) 42. (d) 43. (d) 44. (c) 45. (a) 46. (a) 47. (c) 48. (c) 49. (b) 50. (b)
51. (d) 52. (a) 53. (a) 54. (b) 55. (c) 56. (d) 57. (c) 58. (d) 59. (a) 60. (d)
61. (b) 62. (a) 63. (a) 64. (b) 65. (a) 66. (d) 67. (d) 68. (d) 69. (d) 70. (c)
71. (d) 72. (b) 73. (d) 74. (c) 75. (a) 76. (b) 77. (c) 78. (d) 79. (c) 80. (c)
81. (a) 82. (b) 83. (d) 84. (d) 85. (c) 86. (a) 87. (b) 88. (b) 89. (a) 90. (a)
91. (b) 92. (b) 93. (b) 94. (d) 95. (c) 96. (c) 97. (b) 98. (d) 99. (d) 100. (c)
101. (b) 102. (b) 103. (c) 104. (a) 105. (b) 106. (d) 107. (c) 108. (a) 109. (a) 110. (b)
111. (b) 112. (d) 113. (a) 114. (d) 115. (b) 116. (a) 117. (d) 118. (b) 119. (c) 120. (a)
121. (b) 122. (a) 123. (b) 124. (c) 125. (d) 126. (c) 127. (c) 128. (a) 129. (c) 130. (d)
131. (d) 132. (b) 133. (a) 134. (d) 135. (b) 136. (b) 137.(d) 138. (a) 139.(a) 140.(b)
141.(d) 142. (a) 143. (d) 144. (a) 145. (a) 146. (c)
ANSWER KEY
1. (b) 2. (d) 3. (c) 4. (b) 5. (b) 6. (a) 7. (c) 8. (d) 9. (b) 10. (d)
11. (d) 12. (a) 13. (d) 14. (a) 15. (b) 16. (d) 17. (c) 18. (c) 19. (c) 20. (a)
21. (a) 22. (b) 23. (d) 24. (d) 25. (d)
ANSWER KEY
1. (c) 2. (a) 3. (c) 4. (b) 5. (c) 6. (b) 7. (d) 8. (c) 9. (d) 10. (a)
11. (d) 12. (d) 13. (d) 14. (b) 15. (a) 16. (d) 17. (d) 18. (a) 19. (a) 20. (a)
21. (a) 22. (c) 23. (b) 24. (b) 25. (d) 26. (a) 27. (a) 28. (b) 29. (a) 30. (a)
31. (c) 32. (c) 33. (c) 34. (a) 35. (a) 36. (b) 37. (d) 38. (c) 39. (c) 40. (d)
41. (c) 42. (c) 43. (c) 44. (b) 45. (a) 46. (c) 47. (d) 48. (b) 49. (a) 50. (a)
51. (a) 52. (d) 53. (b) 54. (c) 55. (b) 56. (d) 57. (c) 58. (d) 59. (d) 60. (d)
61. (c) 62. (d) 63. (a) 64. (a) 65. (d) 66. (c) 67. (d) 68. (d) 69. (d) 70. (b)
71. (d) 72. (d) 73. (b) 74. (a) 75. (d) 76. (a) 77. (c) 78. (d) 79. (d) 80. (d)
81. (c) 82. (b) 83. (a) 84. (b) 85. (b) 86. (c) 87. (a) 88. (c) 89. (a) 90. (d)
91. (c) 92. (d) 93. (b) 94. (d) 95. (d) 96. (b) 97. (d) 98. (b) 99. (c) 100. (b)