You are on page 1of 6
SECOND YEAR EXAMINATION ~ 2020 (ANNUAL) ) ay Time - 3 Hours Full Marks — 70 The figures in the right-hand margin indicate marks, Answer all questions from Group ~ A, ten bits from Q.No.3, three bits from O.No. 4 of Group —B and three questions from Group ~C 1. Choose the correct answer : [1x 10=10 (2) Which of the following is a type of comput xs omputer () Telnet Gi) MAN (ii) Bluetooth (iv) HTTP (©) —— uses light for dada transmission, (i) Optical disk (ii) Optical fibre (ii) WEL (iv) Broadband (©) Gopher is a / an — ayer protocol (application (ii) network (iii) transport (iv) data tink (d)_ Use of Internet to harass somebody is referred as (Hacking (On-line fraud (ii) Cyber stalking (iv) Snooping (©) Which of the following is a valid access specifier ? () Public (ii) Private (iii) Protected (iv) Alll of these (Which tag is used as a section separator in HTML? <= (i) (ii) (iv) None of these (e) The MAX () function in SQL returns the largest value of the selected (i) row (ii) column (iit) file (iv) All of these (bh) InsQu. function removes any trailing blank spaces from a string. (i) RIGHT() (ii) INSTR() (ii) RTRIM()__ (iv) SUBSTR() (i) Which of the following is not a valid SQL function ? () DAYOFMONTH () (ii) NOW () (ii) SYSDATE() (iv) SYSTIME() G)_ Which of the following is not an e-Business website ? (Amazon (ii) Ebuy (iii) Alibaba (iv) Flipkart Expand the following : [1x 10=10 (@) FIP () TcPaP (©) Wals (@) URL (© WL (® ODBC (g) DHTML () B2B @ DBMS @_iRc Answer any ten of the following questions within 30 words each : [2 10=20 @ () © @ What is the use of a Hub in a computer network ? How does the Ring network topology work ? Write the use of search engine. Give examples of two popular search engines. ‘What is meant by video conderencing ? Write its advantage. What are the requirements for implementing it ? (c) Write the significance of firewalls in a computer network. (1) Write the use of the tags P, BR and HR in an HTML document. (g) Write the significance of COMMIT and ROLLBACK in database transactions. Explain the options available for restructuring. a database table. (i) Explain the use of CONCAT () function with proper syntax and example. (j)_ Distinguish between ROUND () TRUNCATE () functions. (k) Mention the social impacts of E-business. (1) Mention the types of input validation can be carried out at the front-end. Distinguish between any three of the following within 50 words each : [4x3=12 (a) Switch and Router. (b) 3G and 4G communication (c)_ trim () and substring ( ) functions. (h (d) LCASE () and UCASE () (©) Text Box and Check Box. Answer any three of the following questions 8 (6*3=18 Explain various wired and wireless technologies used in communication networks. Also highlight their merits and demerits. What is the significance of Internet protocol ? Explain various internet protocols along with their usage. What are access specifiers ? How do they control access to data members and methods of a class ? Explain with examples. Explain database operations with multiple tables using Cartesian product, Union. Equijoin. What is the necessity of a foreign key ? What is the significance of front-end and back-end components of a database application ? How can one connect both the components ? ‘Time ~3 Hours Full Marks ~ 70 The figures in the right-hand margin indicate marks. Answer all questions from Group ~ A, ten bits from Q.No.3, three bits from Q.No. 4 of Group ~B and 1, Choose the correct answer : @ (b) © @ © three questions from Group ~C [1x 10=10 Fibre optic technology converts electrical signal to — for data transmission. (i Digita! signal (ji) Magnetic signal (ii) Light (iv) Heat WLI stands for —. (i Wireless Local Loop (ii) Wireless Local Link (iii) Wire Less Link (iv) None of these In HTML, which ofthe following tags is used for line break ? @ (iv) None of these What is the minimum number of arguments required for the INSTR () function ? ji (i) 2 Git) 3 Ww 4 Cartesian product between two tables A and Brefers to (i) Set of all ordered pairs from A and B (ii) Set of rows from A and B (ii) Set of columns from A and B (iv) Concatenation of two tables A and B a 0 (g) (h) @ o Which of the following is a valid network topology ? (i) WAN (iii) Ring In broadband transt frequencies. (i) Single (ii) Multiple i) Microwave (iv) Radio Which of the following is a Group function ? () MAX() (ii) COUNT () (iii) COUNT (*) (iv) All of these Which of the following is a valid inheritance type? (Single level (ii) Multilevel (iii) Multiple level (iv) All of these ‘The CURDATE () function returns the current date in the format () YY-MM-DD (ii), DD-MM-YYYY (iii) YYYY-MM-DD (iv) None of these (ii) MAN (iv) PAN ‘ion, signals are sent on Expand the following : [x 10=10 () HTTP (b) JDBC (©) SQL (4) RDMs. (©) GSM () WAN (2) MAC (b) HTML @ EML G)_ 4G Answer any TEN of the following questions within 30 words each : (a) [2«10=20 Distinguish between LCASE () and UCASE () (b) Mention some applications of e-governance, (c) Explain the use of MAX () function with an example. (d) Write the use of ORDER BY CLAUSE. (ec) Write the use of substring ( ) function with an example. (f) Distinguish between static and dynamic pages in a website. (g) What is voice mail ? (bh) What is the need for Cyber laws ? (i) How does the Radio link work ? (j) Writethe significance of URL. (k) Write the function of a Repeater. (1) Write the merits and demerits of Bus network topoloty. Answer any THREE questions within 50 words each : [3x3=9 (a) Distinguish between RIGHT ( ) and RTRIM () functions with example. (c) Distinguish between Web browser and Search engine. (b) Explain the use of SUM () and COUNT QO functions with example, (d) Distinguish between Bluetooth and Infrared technologies. (€) What is an access specifier ? Mention different types of access specifiers. Answer any THREE of the following questions. [7x3=21 What is E-commerce ? Elaborate on its benefits. What are the major challenges in implementing E-business ? What is a database transaction ? What is meant by committing and revoking a transaction ? How are they achieved using COMMIT and ROLLBACK statements ? What is the need for Internet addressing ? Discuss different internet addressing schemes. What is a network topology ? Explain the working of different topologies highlighting their merits and demerits. Explain the use of five commonly used tages in an HTML document. ‘Time — 3 Hours SECOND YEAR EXAMINATION ~ 2018 (ANNUAL) Full Marks ~ 70 The figures in the right-hand margin indicate marks. Answer all questions from Group — A, ten bits from O.No.3, three bits from .No. 4 of Group — B and three questions from Group — C Choose the correct answer from the following: [Lx 10=10 (a) The process of converting analog signals into digitalis referred as () Modulation (ii) Demodulation (iii) Synchronizing (iv) None of these (b)_ In database system - key is used to identify tuples uniquely in a relation. (i) Primary key (ii) Secondary key Internal key (iv) Foreign key (©) IPadrress is of — bit. () 8 (ii) 16 ii) 32 (iv) 64 (@) The degree of a relation is the number of —— it contains. (i) Records (ii) Keys (iii) Attributes (iv) Relations (€) Converting plain test into cipher text is called as ——. (i) Digital conversion (ii) Encryption (iii) Decryption iv) Cipher conversion (An online community bullentin board is also called as : (@ Telnet (ii) Newsgroup (iii) Chat (iv) Newsnet (g) is a java IDE. () DBC (ii) ODBC (iii) java. tang (iv) Eclipse (h) — enforces access policies such as what services as allowed to be accessed by the network users. () Gateway (i) Protocol (iii) Firewall (jv) Router () COUNT (*) return the number of in atable, () Rows (ii) Columns (iii) Keys (iv) Primary keys o— is not a package name the Java language. () lang Gi) util (iii) sql (iv) pkg Expand the following : [1x 10=10 (a) SMTP (&) IDE (©) OLE (d) MAC (©) SPTN () DML (g) MTNL (hb) SQL (i) BIC G) DHTML 3. Explain any TEN of the following with two / three sentences each : [2x 10=20 (a) DCL commands (b) Public-key encryption (c) Broadband (d)_ Instance variable (e) XML (f) Protocol (g) Electronic Data Exchange (EDE) (h) Public variable (i) ORDER BY clause @) Switch (kK) Firewall qa) Www Answer the THREE from the following within SIX sentences each : [3x3=09 (a) What is Back-end database ? (b) Is a NULL value same as zero or a blank space ? If not then what is the difference ? (c) List three features of Java. 10. (d) How many encryption techniques are there and what are they ? (e) How many major categories are there for E-Commerce ? Write their benefits. Answer any THREE of the following : (7*3=21 Write different features of E-commerce. Write the name of three network topologies. Describe them with their advantages and disadvantages. What are Tags ? Do all HTML tags have end tag ? What are the commonly used tags that are used when designing a page ? What are various types of threats on Internet ? ‘What is meant by Access Modifier ? Describe the uses of different Access Modifiers of Java with example. What is the difference between SQL and My SQL? What are the various DDL commands present in SQL ? Give brief description of their purposes.

You might also like