You are on page 1of 1

M.C.E.

Society’s
Abeda Inamdar Junior College For Girls, PUNE
TUTORIAL APRIL-2021
STD:XI COMMERCE Marks:25

TIME:1 Hour INFORMATION TECHNOLOGY Date: 23/04/2021

Q1.(A) FILL IN THE BLANKS 5 marks

1. In RDBMS record is also called as _____________.


2. Activity such as decipher codes or passwords and breaking security systems for illegal
reasons is called __________.
3. DBMS stand for ___________
4. ____________command of SQL is used to extract data from table.
5. Gaining access without the user’s permission is called as __________.
Q1 (B) TRUE OR FALSE 5 marks

1. Reducing Data Redundancy is one of the disadvantages of DBMS.


2. Foreign key is a field or collection of fields in one table that refers to the
Primary Key in another table.
3. Relational data model is the primary data model, which is used widely around the world
for data storage and processing.
4. Hacking refers to authorized intrusion into a computer or a network.
5. The table is the basic data storage unit in a relational database.

Q2. (A) Consider the following Table Stationary.


Write SQL Commands For Following Statements. 3 marks

Q.2 (B) Answer Briefly:- (Any 6) 12 marks


1. Explain different Data types used in DBMS.
2. Explain in brief Software Piracy.
3. Explain different commands in DDL.
4. Write down any 4 uses of SQL.
5. Define Phishing.
6. Write down any 4 applications of DBMS.
7. What do you mean by Relationships? Enlist its different types.

You might also like