Q: 1 - C
Q: 2 - C
Q: 3 - C
Q: 4 - A
Q: 5 - D
Q: 6 - B
Q: 7 - D
Q: 8 - C
Q: 9 - B
Q: 10 - B
Q: 11 - D
Q: 12 - B
Q: 13 - A
Q: 14 - D
Q: 15 - C
Q: 16 - B
Q: 17 - B
Q: 18 - B
Q: 19 - Difference between Series and DataFrame
Q: 20 - Difference Between Switch and Router
Q: 21 - Explain the three main parts of an optical fibre cable.
Ans
The three basic elements of a fiber optic cable are the core, the cladding and the coating.
A fibre optic cable contains three basic components:
The core, which carries the light signals;
The cladding, which surrounds the core with a lower refractive index and contains the light; and
The coating, which protects the fragile core and cladding within it..
OR
Write the difference between HTML and XML
HTML |
XML |
HTML stands
for Hypertext Markup Language |
XML stands
for Extensible Markup Language |
Case
insensitive |
Case
sensitive |
Predefined
Tags |
User defined
Tags |
Used to
Create Data |
Used to Store
and Transport Data |
Format Driven |
Content
Driven |
Q: 22 - What is E-waste? Write any four benifit of e-waste management.
E-waste
E-waste is a popular,
informal name for electronic products nearing the end of their “useful life.”
Or discarded electronic appliances like Computers,
televisions, Mobiles, VCRs, stereos, copiers, and fax machines are common
electronic products. Many of these products can be reused, refurbished, or
recycled.
Benefits of Recycling E-Waste
1. It protects the environment
2. It reduces business costs
3. It supports non-renewable recycling
4. It shows your eco-friendly credentials
5. It’s super easy to recycle e-waste
Q: 23 - What is plagiarism. Explain types of plagiarism
The act of copying another person’s ideas, words or work and
pretending they are your own is called plagiarism.
Types of plagiarism
Complete plagiarism
This overt type of plagiarism occurs when a writer submits
someone else’s work in their own name. Paying somebody to write a paper for
you, then handing that paper in with your name on it, is an act of complete
plagiarism
Direct plagiarism
Direct plagiarism is similar to complete plagiarism in that
it, too, is the overt passing-off of another writer’s words as your own.
Self-plagiarism
Self-plagiarism can be an issue if you write professionally.
When you’re commissioned to write for a client, the client owns that work.
Reusing your own words for subsequent clients is plagiarizing your own work and
can damage your professional reputation
Accidental plagiarism
Q: 24 - Difference between drop, truncate and delete.
Drop:
1. DDL
2. Can not be rollback
3. Used to delete database, table, index etc completly with structure.
Truncate:
1. DDL
2. Can not be rollback
3. Delete all rows of the table at once.
4. Can not delete structure of the table.
5. Where keyword not used
Delete:
1. DML
2. Can be rollback
3. Used to delete one or more rows from the table one by one.
4. Can be used with or without where clause
Q: 25 -
Ans:
Alter - DDL
Update - DML
Delete - DML
Truncate - DDL
Q: 26 - What is IPR? Explain different types of IPR.
Intellectual property rights (IPR)
refers to the legal rights given to the inventor or creator to protect his
invention or creation for a certain period of time. Patents, trademarks,
copyrights, and trade secrets are IPR
Types of IPR
- Patents
- trademarks
- copyrights
- trade secrets
Patents
A patent is a government-granted monopoly to build, sell,
and use your invention and prevent others from doing so. If you are issued a
patent, it’s usually good for 20 years; however, there are some patents that
are only good for 14 years. After 20 years, your patent expires and
anyone can copy, build,and sell your invention. So must be renew.
Trademarks
A trademark can be any word, phrase, symbol, design, or
combination of these things that identifies your goods or services
Copyrights
Copyrights protect original works of authorship, such
as paintings, photographs, musical compositions, sound recordings,
computer programs, books, blog posts, movies, architectural works, and plays.
Trade Secrets
A trade secret is typically something not generally known to
the public, where reasonable efforts are made to keep it confidential, and
confers some type of economic value to the holder by the information not being
known by another party.
Q: 27 What will be the output of the following code?
from matplotlib import pyplot as plt
x = [4, 8, 3] y = [1, 6, 9]
plt.plot(x,y)
plt.title(“details”)
plt.xlabel(“x axis”)
plt.ylabel(“y axis”)
plt.show()
Q: 28 - A company Stock price of five days are a follow: [74.25, 76.06, 69.5, 72.55, 81.5]. Write a program to create a bar chart with the given price.
from matplotlib import pyplot as plt
days = [1,2,3,4,5]
stock = [74.25, 76.06, 69.5, 72.55, 81.5]
plt.bar(days,stock)
plt.title("Daywise Stock Price")
plt.xlabel("Day Number")
plt.ylabel("Stock Price")
plt.show()
Q: 29
import pandas as pd
I=["Table","Chair","Bag","Bottle"]
D=[950,800,550,70]
S=pd.Series(D,I)
print(S)
print(S.index[1])
S=S+50
print(S)
print(S.tail(2))
Output:
Table 950
Chair 800
Bag 550
Bottle 70
dtype: int64
Chair
Table 1000
Chair 850
Bag 600
Bottle 120
dtype: int64
Bag 600
Bottle 120
dtype: int64
(a) S.index[1]
(b) S=S+50
(c) S.tail(2)
Q: 30
(a) Select name,salary from emp where salary=(select min(salary) from emp);
(b) Select avg(salary) from emp;
(c) update emp set salary=salary+salary*0.1;
Q: 31
Explain the following terms
(a) Cyber Bullying
Cyberbullying is when someone, bullies or harasses others on the internet and other digital spaces, particularly on social media sites.
(b) Phishing
Phishing is described as a fraudulent activity that is done to steal confidential user information such as credit card numbers, login credentials, and passwords. It is usually done by using email or other forms of electronic communication by pretending to be from a reliable business entity.
(c) Indian IT Act
The Information Technology Act, 2000 was enacted by the Indian Parliament in 2000. It is the primary law in India for matters related to cybercrime and e-commerce. The act was enacted to give legal sanction to electronic commerce and electronic transactions, to enable e-governance, and also to prevent cybercrime.
(d) Trojan Horse
A Trojan horse is any malware that misleads users of its true intent. The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment. The effects of Trojans can be highly dangerous. Like viruses, they can destroy files or information on hard disks. They can also capture and resend confidential data to an external address or open communication ports, allowing an intruder to control the infected computer remotely.
(e) Mesh Topology
Mesh topology is a type of networking in which all the computers are inter-connected to each other. The connected nodes can be computers, switches, hubs, or any other devices. In this topology setup, even if one of the connections goes down, it allows other nodes to be distributed. It is most reliable topology.
The number of wires required to connect n nodes in mesh topology is n*(n-1)/2
Q: 32
(i) Suggest a cable layout of connections between the compounds.
(ii) Suggest the most suitable place (i.e. compound) to house the server for this NGO. Also, provide a suitable reason for your suggestion.
Training Compound - because it has maximum number of computers.
(iii) Suggest the placement of the following devices with justification:
(a) Repeater (b) Hub/Switch
Repeater: As per the above layout the repeater can be avoided as all distances between the compounds are <=100m
Hub/Switch - Training Compound as it is hosting the server.
(iv) The NGO is planning to connect its international office situated in Mumbai, which out of the following wired communication link, will you suggest for a very high speed connectivity?
(a) Telephone analog line (b) Optical fibre (c) Ethernet cable.
Optical fibre.
(v) Expand the following ● LAN ● PAN
LAN - Local Area Network
PAN - Personal Area Network
Q: 33
(a) 2
(b) Indi
(c) 32
(d) 5
(e) Ram
Q: 34
(i) Display the games taken up by the students, whose name starts with ‘S’.
Select game1,game2 from sports where name like 'S%';
alter table sports add column marks float(5,2);
(iii) Write a query to assign a value 200 for Marks for all those, who are getting grade ‘B’ or grade ‘A’ in both GAME1 and GAME2.
update sports set marks=200 where grade in ('A','B') and grade1 in ('A','B');
(iv) Write the command used to arrange the whole table in the alphabetical order of NAME?
alter table sports add column marks float(4,2);
Q: 35
(a)
loc is label-based, which means that we have to specify
the name of the rows and columns that we need to filter out.
Data.loc[“id”]
df.iloc[0]
data.iloc[
head(): Function which returns the first n rows of the
dataset.
tail(): Function which returns the last n rows of the
dataset.
import pandas as pd
D=[10,20,30,40,50,60,70,80,90]
I=['a','b','c','d','e','f','g','h','i']
S=pd.Series(D,I)
print(S)
print(S.head()) #print first 5 elements
print(S.tail()) #print last 5 elements
print(S.head(3)) #print first 3 elements
print(S.tail(3)) #print last elements
print(S.head(-2)) #print first n-2 elements (not print last 2 elements)
print(S.tail(-2)) #print last n-2 elements (not print first 2 elements)
No comments:
Post a Comment