Friday, December 30, 2022

12 CS Pre Board Dec 2022

 

SECTION - A

1. False

2. C - 18

3. C -  a

4. D - **

5. D - 4map

6. B - random

7. []  / Empty List

8. D - Server

9. C - flush()

10 . B - Stop

11 . A - SMTP, POP

12. B - ALTER

13. A - read()

14. A - 0

15. C - (comma) ,

16. B - commit()

17. A

18. A

SECTION - B

Q: 19.

def swap(d):

    n = {}

    values = d.values()

    keys = list(d.keys())

    k = 0

    for i in values:

        n[i] = keys[k]

        k=k+1

    return n

result = swap({'a':1,'b':2,'c':3})

print(result)


Output:

{1: 'a', 2: 'b', 3: 'c'}

Q: 20

Cookies are small pieces of text sent to your browser by a website you visit. They help that website remember information about your visit, which can both make it easier to visit the site again and make the site more useful to you.

Advantages

Cookies are extremely user friendly.

Disadvantages

Size limitations also exist on cookies. They cannot store large amount of information. Most cookies are able to store information only up to 4kb.

OR

Client-side scripting

It runs on the user’s computer.

HTML, CSS, and JavaScript are used.

Server-side scripting

It runs on the webserver.

PHP, Python, Java, Ruby are used.

Q: 21 (a)

mystring = 'Programming is Fun'

print(mystring[-50:10:2].swapcase())

pORMI

Q: 21 (b)

a,b,c,d = (1,2,3,4)

mytuple = (a,b,c,d)*2+(5**2,)

print(len(mytuple)+2)

11


Tuesday, December 27, 2022

12 IP Pre Board Dec 2022 Solution

 Section - A

1. LAN 

2. Data Theft

3. Unused Old computer

4. 12

5. 26000

6. Free

7. ii - SELECT COUNT (FEE) FROM STUDENT;

8. ROUND()

9. MIN()

10. iv - S1.tail()

11. student_df.sort_values(by=["marks"])

12. All of these

13. Avast

14.Dayname()

15. Patent

16. Digital Footprint

17. B

18. B

Section - B

19.  

Static Website:

Static website is the basic type of website that is easy to create.

A static site is a website built with pages of static content, or plain html, JavaScript, or CSS code. 

Dynamic Website:

Dynamic website is a collection of dynamic web pages whose content changes dynamically. 

It accesses content from a database or Content Management System (CMS). Therefore, when you alter or update the content of the database, the content of the website is also altered or updated.


OR


Four networking goals are:

Resource sharing.

Reliability.

Cost-effective.

Fast data sharing.


20. 

SELECT house, count(*) FROM Student group by house having house='Green' or house='Orange';

21.

Having Clause

The HAVING clause used in SQL  with aggregate functions because the WHERE keyword cannot be used with aggregate functions.

Having clause is only used with the SELECT clause.

Having clause is generally used after GROUP BY.


SELECT column_name(s) FROM table_name WHERE condition GROUP BY column_name(s) HAVING condition ORDER BY column_name(s);


Example:

SELECT COUNT(CustomerID), Country FROM Customers GROUP BY Country HAVING COUNT(CustomerID) > 5;


22.

import pandas as pd

D={'H1':40,'H2':30,'H3':35,'H4':45}

A=pd.Series(D)

print(A)


H1    40

H2    30

H3    35

H4    45

dtype: int64


23.

IPR

Intellectual property rights are the rights given to persons over the creations of their minds.

There are four main types of intellectual property rights, including patents, trademarks, copyrights, and trade secrets.


OR


Net Etiquettes.

  • Be respectful.
  • Be aware of what you are commenting on social media.
  • Be careful with humor and sarcasm.
  • You should take care of how you are sharing your data and who can see this.
  • Friend requests and group invites should be checked before you accept them.

24.

0     True

1    False

2     True

3    False

dtype: bool

25.

(a) Digital Footprints

A digital footprint is data that is left behind when users have been online. There are two types of digital footprints which are passive and active. A passive footprint is made when information is collected from the user without the person knowing this is happening. An active digital footprint is where the user has deliberately shared information about themselves either by using social media sites or by using websites.


(b) Phishing

Phishing is described as a fraudulent activity that is done to steal confidential user information such as credit card numbers, login credentials, and passwords. Phishing is described as a fraudulent activity that is done to steal confidential user information such as credit card numbers, login credentials, and passwords


26.

(I) Select Tname, Salary from Teacher;

(II) Select sum(salary) from Teacher;

(III) Select count(NoofPeriod) from Teacher;

OR

(I) ALL THE BEST

(II) INFOR

(III) INDIA


27.

import pandas as pd

D=[[110,'Gurman',98],[111,'Rajveer',95],[112,'Samar',96],[1113,'Yuvraj',88]]

DF=pd.DataFrame(D,columns=['Id','Name','Marks'])

print(DF)


     Id     Name  Marks

0   110   Gurman     98

1   111  Rajveer     95

2   112    Samar     96

3  1113   Yuvraj     88


28.

import numpy as np

import pandas as pd


D={'Name':['Item1','Item2','Item3','Item4'],'Price':[150,180,225,500]}

DF=pd.DataFrame(D)

print(DF)

DF['Special_Price']=[135,150,200,440]

print(DF)

DF.loc[4] = ['The Secret',800,500]

print(DF)

del DF['Special_Price']

print(DF)


29

(I) - Cyber Bullying

(II) Report to local police station and cyber cell, E-FIR, Inform to parents

(III) IT Act 2000

OR

Free and open-source software (FOSS) is a term used to refer to groups of software consisting of both free software and open-source software where anyone is freely licensed to use, copy, study, and change the software in any way, and the source code is openly shared so that people are encouraged to voluntarily improve the design of the software

Example of FOSS:

GNU/Linux, Mozilla Firefox, VLC media player,SugarCRM,GIMP,VNC,Apache web server,LibreOffice.


30.

(I)  select * from emp;

(II) select ename, sal, deptno from emp where comm is null;

(III) select empno, ename, sal, sal * 12 as 'Annual Salary' from emp;

31.

(I) SELECT MID("INDIASHINING", 7,7);

(II) SELECT INSTR("WELCOMEWORLD", 'COME') ;

(III) SELECT ROUND(23.78,1);

(IV) SELECT MOD(100,9);

(V) SELECT TRIM(userid) from users;


OR


UCASE()

The UCASE() function converts a string to upper-case.

Syntax

UCASE(text)

Ex:

SELECT UCASE("ram");

RAM


TRIM()

The TRIM() function removes leading and trailing spaces from a string.

Syntax

TRIM(string)

SELECT TRIM('    RAM    ');

RAM

MID()

The MID() function extracts a substring from a string (starting at any position).

Syntax

MID(string, start, length)

SELECT MID("Manmohan", 5, 3);

oha

DAYNAME()

The DAYNAME() function returns the weekday name for a given date.

Syntax

DAYNAME(date)

SELECT DAYNAME("2022-12-30");

Friday

POWER()

The POWER() function returns the value of a number raised to the power of another number.

Syntax

POWER(x, y)

SELECT POWER(4, 2);

16


Q: 32

(I) Server should be installed in Admin department as it has maximum number of computers.

(II) 







(III)  Hub/Switch
(IV) Dynamic
(V)  Video Conferencing

Q: 33.

import matplotlib.pyplot as plt
MT=['Gold','Silver','Bronze']
M=[20,15,17.5]
plt.bar(MT, M)
plt.xlabel('Medal Type')
plt.ylabel('Medal')
plt.title('Indian Medal Tally in Olympics')
plt.show()
plt.savefig("abc.png")





OR

import matplotlib.pyplot as plt
Week=[1,2,3,4]
Avg_week_temp=[40,42,38,44]
plt.plot(Week, Avg_week_temp)
plt.show()


Q: 34

(I) select Lcase(CName)/lower(CName) from cloth;
(II) select min(price) from cloth;
(III) select count(size) from cloth where size = 'M';

OR

Select count(CName) from cloth where year(DOP) = '2022';

Q: 35

import numpy as np
import pandas as pd

D={'School':{'CO1':'PPS','CO2':'JPS','CO3':'GPS','CO4':'MPS','CO5':'BPS'},
  'Tot_students':{'CO1':40,'CO2':30,'CO3':20,'CO4':18,'CO5':28},
  'Topper':{'CO1':32,'CO2':18,'CO3':18,'CO4':10,'CO5':20},
  'First_Runnerup':{'CO1':8,'CO2':12,'CO3':2,'CO4':8,'CO5':8}
}
DF=pd.DataFrame(D)
print(DF)

  School  Tot_students  Topper  First_Runnerup
CO1    PPS            40      32               8
CO2    JPS            30      18              12
CO3    GPS            20      18               2
CO4    MPS            18      10               8
CO5    BPS            28      20               8


print(DF.shape)
(5, 4)
print(DF[2:4])
  School  Tot_students  Topper  First_Runnerup
CO3    GPS            20      18               2
CO4    MPS            18      10               8
print(DF.iloc[2:5,2:3])
    Topper
CO3      18
CO4      10
CO5      20
print(DF['Tot_students']-DF['First_Runnerup'])
CO1    32
CO2    18
CO3    18
CO4    10
CO5    20
dtype: int64


Tuesday, December 6, 2022

What is DataFrame?


12 CS Function Assignment - 06 Dec

1. What is function?

2. Explain the types of function?

3. Write the name of 10 built in function of Python.

4. Write the name of 5 modules of Python.

5. Write the 5 functions of math module.

6. Write the 5 functions of random module.

7. Write the 5 functions of Statistics module.

8. Write the 5 functions of pickle module.

9. Write the 5 functions of csv module.

10. Write the syntax to define and call the user defined function.

Tuesday, November 1, 2022

Class 11 CS Assignment


Q. 1: What is the full form of CPU?

(a)   Central Processing Unit

(b)  Control Processing Unit

(c)   Common Processing Unit

(d)  Common Programming Unit

Q. 2: What is the decimal equivalent of binary number 11001?

(a)   3

(b)  25

(c)   31

(d)  None of these

Q. 3: Which is the correct ascending order of memory unit?

(a)   TB, PB, GB, MB

(b)  PB, MB, GB, TB

(c)   MB, GB, TB, PB

(d)  MB, GB, PB, TB

Q. 4: Which of the following is Utility software?

(a)   Windows

(b)  MS-Office

(c)   Tally

(d)  Quick Heal

Q. 5: First General of computer operate with - 

(a)   Vacuum Tube

(b)  Transistor

(c)   IC

(d)  Microprocessor

Q. 6: What is the full form of ISCII?

(a)   International Script Code for Information Interchange

(b)  Indian Script Code for Information Interchange

(c)   Information Script Code for Information Interchange

(d)  Indian Skill Code for Information Interchange

Q. 7: The octal equivalent of the decimal number 417 ------

(a)   619

(b)  640

(c)   641

(d)  598

Q. 8: Convert the Hexadecimal Number 1E2 to decimal?

(a)   480

(b)  482

(c)   483

(d)  484

Q. 9: What is the output of (-22%5) in Python?

(a)   2

(b)  3

(c)   -2

(d)  -3

Q. 10: What is the output of (5 and 3) in Python?

(a)   5

(b)  3

(c)   True

(d)  False

Q. 11: What is the output of (not 5 and 3 or 7)?

(a)   5

(b)  3

(c)   7

(d)  None of these

Q. 12: What is the output of -4j +3?

(a)   -4j +3

(b)  3+4j

(c)   (3-4j)

(d)  3-4j

Q. 13: Which is an immutable type?

(a)   List

(b)  String

(c)   Tuple

(d)  Dictionary

Q. 14: Which is a valid identifier?

(a)   if

(b)  True

(c)   for

(d)  none

Q. 15: Which is a complex number?

(a)   3 + 4i

(b)  2i + 4

(c)   4 – 3j

(d)  3 + (-1)1/2

Q. 16: What is the full form of IDLE?

(a)   Integrated Development Environment  

(b)  Integrated Development and Learning Environment  

(c)   Integrated Design and Learning Environment  

(d)  Integrated Digital and Learning Environment  


Class 12 IP Mid Term Exam solution Oct 2022

 Q: 1 - C 

 Q: 2 - C

 Q: 3 - C

 Q: 4 - A

 Q: 5 - D

 Q: 6 - B

 Q: 7 - D

 Q: 8 - C

 Q: 9 - B

 Q: 10 - B

 Q: 11 - D

 Q: 12 - B

 Q: 13 - A

 Q: 14 - D

 Q: 15 - C

 Q: 16 - B

 Q: 17 - B

 Q: 18 - B

 Q: 19 - Difference between Series and DataFrame

 Q: 20 - Difference Between Switch and Router

 Q: 21 - Explain the three main parts of an optical fibre cable.

Ans

The three basic elements of a fiber optic cable are the core, the cladding and the coating.

A fibre optic cable contains three basic components: 

The core, which carries the light signals; 

The cladding, which surrounds the core with a lower refractive index and contains the light; and 

The coating, which protects the fragile core and cladding within it..


OR

Write the difference between HTML and XML


HTML

XML

HTML stands for Hypertext Markup Language

XML stands for Extensible Markup Language

Case insensitive

Case sensitive

Predefined Tags

User defined Tags

Used to Create Data

Used to Store and Transport Data

Format Driven

Content Driven



 Q: 22 - What is E-waste? Write any four benifit of e-waste management.

E-waste

E-waste is a popular, informal name for electronic products nearing the end of their “useful life.”  Or discarded electronic appliances like Computers, televisions, Mobiles, VCRs, stereos, copiers, and fax machines are common electronic products. Many of these products can be reused, refurbished, or recycled.

Benefits of Recycling E-Waste

1. It protects the environment

2. It reduces business costs

3. It supports non-renewable recycling

4. It shows your eco-friendly credentials

5. It’s super easy to recycle e-waste

 

 Q: 23 - What is plagiarism. Explain types of plagiarism

The act of copying another person’s ideas, words or work and pretending they are your own is called plagiarism.

Types of plagiarism

Complete plagiarism

This overt type of plagiarism occurs when a writer submits someone else’s work in their own name. Paying somebody to write a paper for you, then handing that paper in with your name on it, is an act of complete plagiarism

Direct plagiarism

Direct plagiarism is similar to complete plagiarism in that it, too, is the overt passing-off of another writer’s words as your own. 

 Self-plagiarism

Self-plagiarism can be an issue if you write professionally. When you’re commissioned to write for a client, the client owns that work. Reusing your own words for subsequent clients is plagiarizing your own work and can damage your professional reputation

Accidental plagiarism

 Accidental plagiarism is perhaps the most common type of plagiarism because it happens when the writer doesn’t realize they are plagiarizing another’s work.

 Q: 24 -  Difference between drop, truncate and delete.

Drop:

1. DDL

2. Can not be rollback

3. Used to delete database, table, index etc completly with structure.

Truncate:

1. DDL

2. Can not be rollback

3. Delete all rows of the table at once.

4. Can not delete structure of the table.

5. Where keyword not used

Delete:

1. DML

2. Can be rollback

3. Used to delete one or more rows from the table one by one.

4. Can be used with or without where clause


 Q: 25 - 

Ans:

Alter - DDL

Update - DML

Delete - DML

Truncate - DDL


 Q: 26 - What is IPR? Explain different types of IPR.


Intellectual property rights (IPR) refers to the legal rights given to the inventor or creator to protect his invention or creation for a certain period of time. Patents, trademarks, copyrights, and trade secrets are IPR

Types of IPR

  1. Patents
  2. trademarks
  3. copyrights
  4. trade secrets

Patents

A patent is a government-granted monopoly to build, sell, and use your invention and prevent others from doing so. If you are issued a patent, it’s usually good for 20 years; however, there are some patents that are only good for 14 years.  After 20 years, your patent expires and anyone can copy, build,and sell your invention. So must be renew.

Trademarks

A trademark can be any word, phrase, symbol, design, or combination of these things that identifies your goods or services

Copyrights

Copyrights protect original works of authorship, such as paintings, photographs, musical compositions, sound recordings, computer programs, books, blog posts, movies, architectural works, and plays.

Trade Secrets

A trade secret is typically something not generally known to the public, where reasonable efforts are made to keep it confidential, and confers some type of economic value to the holder by the information not being known by another party. 

Q: 27 What will be the output of the following code?

from matplotlib import pyplot as plt 

x = [4, 8, 3] y = [1, 6, 9] 

plt.plot(x,y) 

plt.title(“details”) 

plt.xlabel(“x axis”) 

plt.ylabel(“y axis”) 

plt.show() 




Q: 28 -  A company Stock price of five days are a follow: [74.25, 76.06, 69.5, 72.55, 81.5]. Write a program to create a bar chart with the given price.

from matplotlib import pyplot as plt

days = [1,2,3,4,5]

stock = [74.25, 76.06, 69.5, 72.55, 81.5]

plt.bar(days,stock)

plt.title("Daywise Stock Price")

plt.xlabel("Day Number")

plt.ylabel("Stock Price")

plt.show()



Q: 29

import pandas as pd

I=["Table","Chair","Bag","Bottle"]

D=[950,800,550,70]

S=pd.Series(D,I)

print(S)

print(S.index[1])

S=S+50

print(S)

print(S.tail(2))

Output:

Table     950

Chair     800

Bag       550

Bottle     70

dtype: int64

Chair

Table     1000

Chair      850

Bag        600

Bottle     120

dtype: int64

Bag       600

Bottle    120

dtype: int64


(a) S.index[1]

(b) S=S+50

(c) S.tail(2)

Q: 30

(a) Select  name,salary from emp where salary=(select min(salary) from emp);

(b) Select  avg(salary) from emp;

(c) update emp set salary=salary+salary*0.1;

Q: 31

Explain the following terms 

(a) Cyber Bullying 

Cyberbullying is when someone, bullies or harasses others on the internet and other digital spaces, particularly on social media sites.


(b) Phishing 

Phishing is described as a fraudulent activity that is done to steal confidential user information such as credit card numbers, login credentials, and passwords. It is usually done by using email or other forms of electronic communication by pretending to be from a reliable business entity.

(c) Indian IT Act 

The Information Technology Act, 2000 was enacted by the Indian Parliament in 2000. It is the primary law in India for matters related to cybercrime and e-commerce. The act was enacted to give legal sanction to electronic commerce and electronic transactions, to enable e-governance, and also to prevent cybercrime.

(d) Trojan Horse 

A Trojan horse is any malware that misleads users of its true intent. The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment. The effects of Trojans can be highly dangerous. Like viruses, they can destroy files or information on hard disks. They can also capture and resend confidential data to an external address or open communication ports, allowing an intruder to control the infected computer remotely.

(e) Mesh Topology

Mesh topology is a type of networking in which all the computers are inter-connected to each other. The connected nodes can be computers, switches, hubs, or any other devices. In this topology setup, even if one of the connections goes down, it allows other nodes to be distributed. It is most reliable topology.

The number of wires required to connect n nodes in mesh topology is n*(n-1)/2

Q: 32

(i) Suggest a cable layout of connections between the compounds. 





(ii) Suggest the most suitable place (i.e. compound) to house the server for this NGO. Also, provide a suitable reason for your suggestion. 

Training Compound - because it has maximum number of computers.

(iii) Suggest the placement of the following devices with justification: 

(a) Repeater (b) Hub/Switch 

Repeater: As per the above layout the repeater can be avoided as all distances between the compounds are <=100m

Hub/Switch - Training Compound as it is hosting the server.

(iv) The NGO is planning to connect its international office situated in Mumbai, which out of the following wired communication link, will you suggest for a very high speed connectivity? 

(a) Telephone analog line (b) Optical fibre (c) Ethernet cable. 

Optical fibre.

(v) Expand the following ● LAN ● PAN

LAN - Local Area Network

PAN - Personal Area Network


Q: 33

(a) 2

(b)  Indi

(c) 32

(d) 5

(e) Ram


Q: 34

(i) Display the games taken up by the students, whose name starts with ‘S’. 

Select game1,game2 from sports where name like 'S%';

(ii) Write a query to add a new column named MARKS. 

alter table sports add column marks float(5,2);

(iii) Write a query to assign a value 200 for Marks for all those, who are getting grade ‘B’ or grade ‘A’ in both GAME1 and GAME2. 

update sports set marks=200 where grade in ('A','B') and grade1 in ('A','B');

(iv) Write the command used to arrange the whole table in the alphabetical order of NAME? 

alter table sports add column marks float(4,2);


Q: 35

(a) 

loc is label-based, which means that we have to specify the name of the rows and columns that we need to filter out.

Data.loc[“id”]

 iloc is integer index-based. So here, we have to specify rows and columns by their integer index.

df.iloc[0]

data.iloc[1: 5, 2: 5]

(b)


head(): Function which returns the first n rows of the dataset.

tail(): Function which returns the last n rows of the dataset.

import pandas as pd

D=[10,20,30,40,50,60,70,80,90]

I=['a','b','c','d','e','f','g','h','i']

S=pd.Series(D,I)

print(S)

print(S.head())  #print first 5 elements

print(S.tail())     #print last 5 elements

print(S.head(3))    #print first 3 elements

print(S.tail(3))    #print last elements

print(S.head(-2))   #print first n-2 elements (not print last 2 elements)

print(S.tail(-2))   #print last n-2 elements (not print first 2 elements)