12/16/17

Database Q/Ans

What id data?

Data consists or raw facts and figures, Data consists of letter, sound, image or video within the computer.

 What is information?

Processed data is known as information. Using a data base program or software, they are converted into the meaningful result called information.

 What is database?

A database is a collection of interrelated data. It refers to an organized collection of data stored on a computer in such a way that its content can easily be accessed, updated and queried upon with the help of a software program.
Example = Banks must have systems for keeping track of customers and their accounts.

What is rdbms (Relational Database Management System)?

Relational Database Management System (RDBMS) is method of viewing information from several, separate database that relate to one another through the keyword or values. The main advantage of RDBMS is that we can simultaneously use more than one database to see information stored in them.
List importance of database
Database stores the data.
Computerized database saves data from being lost.
Computerized database protects from unauthorized access and use of the data.
Data can be stored in a small area or space in computerized database.

What is dbms? Write its types.

A database management system is a collection of programs that enables you to store, modify, and extract information from database.

Any four database management systems are as follows:

  • Relational Database Management System
  • Hierarchical Database Management System
  • Network Database Management System
  • Object Oriented Database Management System

Write advantage of database.

  • The advantages of database are as follows:
  • Database saves the data.
  • Data can be stored in a small area or space in computerized database.
  • Database protects from unauthorized access and use of data.
  • It saves data from being lost.


List feature of dbms

  • Easy to access data
  • Ease to modify data
  • Delete existing data.
  • Organize the data in proper sequence.
  • Sorting and indexing of data.
  • Easy queries in data.
  • Retrieve the data easily.
  • Print the formatted reports, labels etc.
  • Linking between two or more databases.
  • It can be used as SQl (Structured Query Language)

What is ms-access?

 Microsoft Access is a Relational Database Management System which comes as an integral part of the MS Office Suite of applications.

 What is data shorting?

The process of arranging the data smallest to largest and largest to smallest in table or in ascending or descending order is known as data sorting.

 What is query?

Query is a way of extracting information from a database, usually by using certain criteria or requesting certain data. It is request for database records that fit specified criteria.

 
What is the use of query?

The uses of query are as follows:
i. A query can count the amount of records that meet the certain criteria.
ii. It can also be used to extract data to a separate table or delete data, change data and many other things.

What is select query?

Select query is a query in which the relevant data from a table is selected and displayed. It allows the user to retrieve data from one or more tables and displays the results in a datasheet where the user can update the record.

 
What is parameter query?

Parameter query is a query that when run displays its own dialog box prompting the user for information, such as criteria for retrieving records or value the user want to insert in a field. For example: the following criterion selects records for which the records for which the value for the Obtain_mark field is greater than 70: Obtain_mark>70

What is a dynast?

A dynast is a set of data that is dynamically linked back to the database. Instead of having the query result stored in a temporary table, where the data cannot be updated directly by the user, the dynast allows the user to view and update the data contained in the dynast

What is attributes?

Attributes refer to a single data item related to a database object. The database schema associates one or more attributes with each database entity.

Explain different type of query

The different types of queries are as follows:

a. Select query = It is a query in which the relevant data from a table is selected and displayed. It allows the user to retrieve data from one or more tables and displays the results in a datasheet where the user can update the record.
b. Parameter queries = It is a query that when run displays its own dialog box prompting the user for information, such as criteria for retrieving records or value the user want to insert in a field.
c. Crosstab queries = A query that calculates a sum, average, count, or other type of total for data that is grouped by the two types of information is known as crosstab queries.

d. Action queries = A query which performs an action with the records /fields selected by the query. Action queries includes delete, Append, update and make table queries.

Explain different object of MS-access.


a. Table = Table are the core database object, used to store information. The tables are the containers for all the data in a database. In a table, data are arranged in a columns and rows.
b. Queries = Queries means to ask question about the data presented in the table. BY using queries, we can view records or data, modify the content of table and a lot more. It is a way of retrieving and editing information according to the condition asked. It is a strong tool using in searching of desired data from database.
c. Forms = A form is a database object used to enter and edit data in a table. Form can be used to edit the records of underlying tables or to enter new records.
d. Reports = A report is especially formatted collections of data organized according to our specification for summarizing and printing. They are the means to present the information as a printed document.
e. Macros = When macro is executed, it executes one or more database commands automatically. They are meant for automating the task that is done over and over again.
f. Modules = Modules are pieces of code used to impose particular behaviours to your application programmatically. They are more flexible and extensive than macros, although they are usually written for various and particular circumstances.

  Explain different data types of Ms Access


The different data types are as follows

Text = A text field contains up to 255 characters or it can set the length in the field size, text data type can include numbers letters and symbols.
Memo = This type of field holds an unlimited amount of text. It can accommodate 65, 535 characters.
Number = This type of field allows only the numbers to be entered.
Date/Time = This field type only allows date and time to be entered. It occupies 8 bytes.
Currency = This field allows to enter currency.
AutoNumber = This type automatically generates and insert the unique number in the new row.
Yes/No = It allows the user to select Yes or No when completing the field.
OLE object = It allows to link to binary data or files.
Hyperlink = It allows to create a hyperlink. It stores up to 64,000 characters.
Lookup Wizard = The lookup wizard creates a field that allows the user to choose a value from a list of values by using a list box or combo box.


Write difference between filter & query.

Filter
  • A filter cannot be saved as separate object.
  • A filter cannot be used for displaying the records of more than related table at once.
  • A filter cannot be used for performing calculation on values of numeric fields.

Query


  • A query can be saved as separate object.
  • A query can be used for displaying the records of more than related table at once.
  • A query can be used for performing calculation on values of numeric fields.

Write differences between primary key and foreign key 


Primary Key


  • It is a column or a set of column that can be used to uniquely identify a row in a table.
  • A table can have a single primary key that can reference different tables.

Foreign Key


  • It is a column or a set of column that refer to a primary key or a candidate key of another table.
  • A table can have multiple foreign key that can reference different tables.

Programming Q/Ans

What is control structure?

A control structure is a block of programming that analyzes variables and chooses a direction in which to go based on given parameters.

What is loop ?

A loop is a sequence of statement that is executed repeatedly until the given condition is satisfied.

What is section structure?

The structure in which the execution of next statement of a program depends upon the result of a condition is known as Decision or Selection structure. The statements used in this structure are: IF .. THEN, IF .. THEN .. ELSE, IF .. THEN ELSEIF … ELSE, SELECT .. CASE statement.

What is loop structure?

The structure which is used to execute a group of statements a certain number of times depending upon the condition is called loop structure. The statement used in this structure are; FOR..NEXT, DO..LOOP, WHILE..WEND etc.

What is c language?

C is the high level programming language that was developed by Dennis Ritchie at Bell Telephone Laboratories in 1972.

What is file handling?

The way of handling file is known as File Processing. In QBASIC you can save the data into a separate file called a data file. So there are two types of files in QBASIC. They are Program file and Data file

What is modular programming?

The programming technique, in which a program is divided into small logical and manageable part, is known as modular programming. The small, logical and manageable part of the program is called procedure (module). Since the modular programming uses small block of functional codes, it is also called structured program.

What is library function in QBSIC?


A function in QBASIC is a readymade program or user made small program which helps us to perform a specific task. The function manipulates the data passes to it and returns either a string value or a numeric value.  QBASIC supports two different kinds of functions are User 


What is difference between entry control loop & exit control loop ?The difference between Entry control loop and Exit control loop are as follows:

Entry Control Loop
  • In Entry controlled loop the test condition is checked first then executes the body loop
  • It checks the conditions first.

Exit control loop

  • In exit control loop the body of the loop will be executed first then checks the test condition.
  • It checks the condition at last.

Multimedia Q/Ans

What is multimedia? Write four use of multimedia .

Multimedia is a computer delivered electronic system which allows the user to control, combine, and manipulate different types of media, such as text, sound, graphics, animation etc.

Any four uses of multimedia are as follows:

i. It is used in television, film industries and for personal entertainments.
ii. It is highly used to realize the concept of Open University, Distance Education System, and Video Conferencing.
iii. It is also used in Internet to make up the interactive web page contents.
iv. It can be used to teach a subject in a class in an interesting way.


What is advantage of multimedia ?

i. It increases learning effectiveness.
ii. It is portable.
iii. It cab store data and information for a long period of time.
iv. It makes presentation of the related subject matter attractive.
v. It makes teaching learning easier in the classroom.

How multimedia used in education?

Multimedia is used for education and training in schools. It is used for education to produce computer based training and reference books like encyclopedia. It allows the students to learn different subjects at their own pace.
It also brings presentations alive with sounds, movies, animations and interactivity and motivates students to become active participants in the learning process.

How multimedia plays role in business?

Multimedia plays an important role in today's business. The role of multimedia in business can include:
i. Promoting sales though external clients through a multimedia based presentations.
ii. Staff training through a multimedia based training learning media.
iii. Internal meetings on various subject matters.

Write any 4 software used in multimedia

i. Windows Media Player
ii. Flash Player
iii. Adobe Photoshop
iv. Total Video Converter

Cyber Law & Ethics Q/Ans

What is cyber law?

Cyber law is a generic term which refers to all the legal and regulatory aspects of internet and World Wide Web. Cyber law is required to overcome the cybercrime in the internet. It is needed in order to stop the illegal activities done in the internet.

What is computer ethics?

Computer ethics is the branch of practical principles that deals with how the computer experts should make decisions in regard to the social and professional behavior. It is a set of moral principles that regulates the use of computers.

 
HAT IS COMPUTER HACKING?

Computer hacking is the transferring illegal items through the internet (such as encryption technology) that is banned in some locations. It is the activity of breaking into a computer system to gain an unauthorized access.
Any person who is found in hacking is fined with Rs. 2 lakhs along with the imprisonment of 3 years.

Define cyber low about Nepal.

Cyber Law of  Nepal was introduced on  30th Bhadra, 2061 (15 September, 2004) in order to legalize the electronic transaction and to control cybercrimes


List any 4 computer ethics

  1. We should not use a computer to harm other people.
  2. We should not use or destroy other’s files or database.
  3. We should not use computer to publish fake information.
  4. We should not copy or make duplicate copy and distribute illegally.
  5. We should not steal computer password of others or use it.
  6. We should not use other people’s computer resources without permission.
  7. We should not steal or use digital signature and pin of ATM card of others.
  8. We should not create a virus and use it.
  9. We should not publics an illegal pictures or videos in electronic form.





Computer Security Q/Ans

What is computer security?

Computer security refers to the protection of computer system and its valuable information against unwanted access, damage, modification or destruction.

Why we need to apply computer security?

We need to apply computer security measures because these measures help in the protection of information and property from theft, corruption or natural disaster, while the information and property to remain accessible and productive to its intended users.

What is computer hardware security?

Hardware security refers to the securing of computer hardware from damage from physical harm or loss due to theft.

What is Computer data (software) security?

Data and software security is the way of ensuring the data and software free from corruption. It is the protection of data and software from the unauthorized persons or by physical means.


What is defragmentation?

Defragmentation is the process of locating the noncontiguous fragments of data, rearranging the fragments and restoring the, into fewer fragments or into the whole file.

Write 4 importances of ups?

  • It absorbs relatively small power surges.
  • It provides power for some time even after a blackout.
  • It smoothes out noisy power sources
  • It continues to provide power to equipment during line sags.

List any 4 measure of hardware and software security measureHardware Security Measures

  • Regular Maintenance
  • Insurance
  • Free from dust environment
  • Protection from fire
  • Protection from theft
  • Using Air condition system
  • Using Power Protection devices (UPS, Spike guard, CVT, Voltage Stabilizer)


Software Security Measures

  • Using Password Policy
  • Using Antivirus Software
  • Using Backup
  • Scandisk utility
  • Defragmentation

Computer Virus Q/Ans

What is compute virus?
Computer virus is a computer program that is designed to copy itself and infects or damages a computer without permission or knowledge of a user.
or
Viruses are developed intentionally to damage, infect or even destroy the computer for a designed purpose. A destructive minded person intentionally writes parasitic programs to affect, bother, harm other persons, organization and even nation.
Some of them are: Trojan Horse, Macro Virus, Boot Sector virus etc

Write common characteristics of Computer viruses.

  • Viruses slow down the system performance.
  • Viruses destroy data and programs from the system.
  • Viruses increase the size of executable files.
  • Viruses decrease the space on hard disk by duplicating files.
  • Viruses cause system to hang or freeze frequently.


Write four symptoms of computer viruses are as follows

  • Programs take long time to load.
  • Renaming all the files with different names
  • Shows unusual error messages on the screen frequently
  • Corrupt or deletes system data and programs


How Viruses spread from one computer to another?

  • Opening the infected email attachment
  • By downloading infected programs from the internet
  • By using infected floppy disk, pen drives and CDs
  • By transferring an infected program over a network and executing it.


What is Boot Sector Virus?

Boot Sector virus is regarded as one of the most hostile types of virus, a boot sector virus infects the boot record of a hard or a floppy disk. The virus moves the boot sector data to a different part of a disk. This virus allows the actual boot sector data to be read as though a normal start up were occurring.

What is File Infecting Virus?

This type of virus infects program files on a disk. When infected program is launched, the virus code is also launched. After the virus code has been launched, it will normal load and execute the program that has been infected.

What is Multi partite Virus?

This virus is the combination of parasitic and boot sector virus and due to this, it is able to infect both the files or boot sector of a disk. They infect program files and when it is executed, these viruses affect the boot record.

What is Macro Virus?

These viruses infect the Microsoft Office programs such as Excel, Word, Access and PowerPoint. When we open the Microsoft program then the virus is loaded and it affects the normal template or document. Since it is attached in the document, if the infected document is opened on other computer, it affects the computer too.

What is Script Virus?

Script Virus is written in script programming languages, such as VBScript and JavaScript. It can infect a computer through various scripting environments, such as Windows Help, Windows installation files and Windows registry files.

What is Worm?

Worm is a program whose purpose is to duplicate itself. An effective worm will fill entire disk with the copies of itself and it can spread to multiple computer on network essentially clogging the entire system with copies.

Explain Trojan horse Virus. 


Trojan horse is a destructive program that comes as an application. The software initially appears to perform a desirable function for the user prior to installation but steals and harms the system. Unlike viruses and worms, it does not replicate themselves.

HOW TO PROTECT COMPUTER FORM VIRUS?


  • We can protect the computer from computer viruses by following ways:
  • Scanning the email attachment before executing them.
  • Use of a good anti-virus program to scan for viruses.
  • Scanning the disk frequently for viruses.
  • Not installing the pirated software, especially computer games.


WHAT IS ANTI VIRUS SOFTWARE WRITE 2 EXAMPLE OF IT

Anti-virus software is a computer program designed to detect and remove viruses from the computer system. Any three anti-virus programs are as follows:
  • McAfee Antivirus
  • Kaspersky Antivirus
  • Avira Antivirus