Qno. 5 SQL 2014 Q.Paper: (B) Write The SQL Queries (1 To 4)
Qno. 5 SQL 2014 Q.Paper: (B) Write The SQL Queries (1 To 4)
Qno. 5 SQL 2014 Q.Paper: (B) Write The SQL Queries (1 To 4)
5 SQL
2014 Q.Paper
(a) Explain the concept of Union between two tables, with the help of appropriate example.
Note:
Answer the questions (b) and (c) on the basis of the following tables STORE and ITEM
Table: STORE
SNo SName Area
(b)
(i) Select IName, Price
From Item
Order By Price Asc;
IName
Hard Disk
LCD
Mother Board
(ii)
Area Count
CP 2
GK II 1
Nehru Place 2
(iii)
Count
(iv)
IName discount
Keyboard 25
Motherbaord 650
Key Board 20
Q PAPER2013
Question 5 : (10 Marks)
(a) Explain the concept of the candidate keys with the help of an
appropriate example.
NOTE:
Write SQL queries for (b) to (g) and write the outputs for the
SQL queries mentioned in (h1) to (h4) parts on the basis of
tables; PRODUCTS and SUPPLIERS.
Table: PRODUCTS
PI PNAM QT PRIC SUPCOD
COMPANY
D E Y E E
DIGITAL
101 120 12000 RENIX S01
CAMERA 14X
DIGITAL PAD
102 100 2200 DIGI POP S02
11i
PEN DRIVE 16
104 500 1100 STOREKING S01
GB
LED SCREEN DISPEXPERT
106 70 28000 S02
32 S
CAR GPS
105 60 12000 MOVEON S03
SYSTEM
Table: SUPPLIERS
(c) To display the product name and the price of all those
products, whose price is in the range of 10,000 and 15,000 (both
values inclusive).
ANSWERS
Answer 5 :
(10 Marks)
(a). Candidate key: A candidate key is a single field or the least combination of
fields other than the primary key that uniquely identifies each record in the table.
In the table below, the StudentId is working as a primary key, where as we can
define the firstName as the candidate key to uniquely identify the record.
(h)
(h1)
SUPCODE
S01
S02
S03
(h2)
MAX(PRICE) MIN(PRICE)
28000 1100
(h3)
AMOUNT
550000
(h4)
PNAME SNAME
DIGITAL CAMERA 14X GET ALL INC
PEN DRIVE 18 GB GET ALL INC
Q PAPER 2012
Question 5 : a) Give a suitable example of a table with sample data and (8
illustrate Primary and Alternate Keys in it. Marks
)
Consider the following tables CARDEN and CUSTOMER and answer
(b) and (c) parts of this question:
Table: CARDEN
Ccode CarName Make Color Capacity Charges
Table: CUSTOMER
CCode Cname Ccode
1001 Hemant Sahu 501
b) Write SQL
1002 Raj Lal 509 commands for the
following:
1003 Feroza Shah 503 (i) To display the
names of all the
1004 Ketan Dhal 502 silver colored
Cars.
(ii)To display the
name of the car, make and capacity of cars in descending order of their
sitting capacity.
(iii)To display the highest charges at which vehicle can be hired from
CARDEN.
(iv) To display the customer name and the corresponding name of the
cars hired by them.
c) Give the output of the following SQL queries:
(i) SELECT COUNT(DISTINCT Make) FROM CARDEN;
(ii) SELECT MAX(Charges),MIN(Charges) FROM CARDEN;
(iii) SELECT COUNT(*), Make FROM CARDEN;
(iv) SELECT CarName FROM CARDEN WHERE Capacity =4;
[2+4+2 =8]
ANSWERS
Answer 5 :
(8 Marks)
(a).Primary Key – A primary key is a candidate key that is most appropriate to be
the main reference key for the table. Primary keys are mandatory for every table.
Alternate Key – We can define more than one primary key in a table. All these
keys are collectively known as candidate keys. Out of which one who is selected
as the primary key but those who are not selected are known as secondary keys or
alternative keys.
For example, in the above table showing the studentId would be the most
appropriate for a primary key leaving the other candidate key as secondary or
alternative key.
(b).
(i)SELECT CarName FROM CARDEN WHERE Color = “SILVER”;
(ii) SELECT CarName, Make, Capacity FROM CARDEN ORDER BY Capacity
desc;
(iii) SELECT MAX(Charges) AS “Highest Charges” FROM CARDEN
(iv) SELECT CName, CarName FROM CUSTOMER, CARDEN WHERE
CUSTOMER.CCode = CARDEN.Ccode
(c)
Q PAPER 2011
Question 5 : a) What do you understand by Selection & Projection operations in
relational algebra?
Consider the following tables EMPLOYEE and SALGRADE and answer (b) and (c)
parts of this questions:
Table : EMPLOYEE
ECODE NAME DESIG SGRADE DOJ DOB
101 Abdul EXECUTIVE S03 23-Mar- 13-Jan-
Ahmad 2003 1980
102 Ravi HEAD-IT S02 12-Feb- 22-Jul-
Chander 2010 1987
103 John Ken RECEPTIONIST S03 24-Jun— 24-Feb-
2009 1983
105 NazarAmeen GM S02 11-Aug- 03-Mar-
2006 1984
108 PriyamSen CEO S01 29-Dec- 19-Jan-
2004 1982
Table : SALGRADE
SGRADE SALARY HRA
S01 56000 18000
S02 32000 12000
S03 24000 8000
b) Write SQL commands for the following statements:
(c)
(i)
COUNT SGRADE
2 S03
2 S02
1 S01
(ii) DOB DOJ
22-Jul-1987 12-Feb-2010
(iii)
NAME SALARY
QPAPER 2010
Question 5 : (8 M
a) What do you understand by Candidate Keys in a table? Give a
suitable example of candidate keys from a table containing some
meaningful data. (2)
b) Consider the following tables STORE and SUPPLIERS and answer
b1 and b2 part of this question.
Table: STORE
Item Item Scode Qty Rate LastBuy
No.
2005 Sharpener Classic 23 60 8 31-Jan-09
Table : SUPPLIERS
Scode Sname
21 Premium
Stationary
23 Soft Plastic
22 Tetra Supply
b1) Write SQL commands for the following statements: (4)
i. To display details of all the items in the Store table in ascending order
of LastBuy.
ii. To display the Item No and Item name of those items from store table
whose Rate is more than 15 Rupees.
A ANSWERS
Answer 5 :
(8 Marks)
a) A table may have more than one such attribute/group of attributes that identifies
a tuple uniquely, all such attributes are known as candidate key. For example
Table: Item
Ino Item Qty
I01 Pen 560
I02 Pencil 780
I04 CD 450
I09 Long File 350
I05 Eraser 250
I03 Duster 128
From above table Ino and Item are treated as the candidate keys.
iv)MAX ( LastBuy )
24-Feb-10
Q PAPER2009
Question 5 : (8 Marks)
a) What do you understand by Primary key? Give a suitable
example of Primary key from a table containing some
meaningful data. (2)
b) Consider the following tables STOCK and DEALERS and
answer (b1) and (b2) parts of this question.
Table: STOCK
Item Item Scode Qty Rate LastBuy
No.
5005 BallPen 0.5 102 100 16 31-Mar-10
Consider if a customer does not want to share his contact number, then contact number will be null. Since, primary key has
a constraint of non-null values, contact number cannot be used as primary key(even though it satisfies uniqueness criteria).
Customer Id can be used as primary key as it satisfies uniqueness as well as non-null criteria.
Q NO. 7 NETWORKING
Q. PAPER 2014
Question 7 : (10 Marks
(a) Write one characteristics each of 2G and 3G Mobile Technologies.
(b) What is the difference between Video Conferencing and Chat?
(c) Expand the following:
GPRS
CDMA
(d) Which type of network ( out of LAN, PAN and MAN ) is formed, when you connect two
mobiles using Bluetooth to transfer a picture file.
(e) Trine Tech Corporation ( TTC ) is professional consultancy company. The company is
planning to set up their new offices in India with its hub at Hyderabad. As network adviser,
you have to understand their requirement and suggest them the best available solutions. Their
queries are mentioned as (i) to (iv) below.
Physical Location of the blocks of TTC:
[1+1+1+1+1+1+1+1+1+1=10]
ANSWERS
Answer 7 :
(10 Marks)
(a) Characteristic of 2G Mobile Technologies-
2G Mobile technology allows the dial–up data calls digitally, so that the network’s switching station
receives actual ones and zeroes rather than the screech of an analog modem.
Characteristic of 3G Mobile Technology-
3G mobile communication technology is a broadband, packet-based transmission of media files at data
rates up to 2Mbps, offering a consistent set of services to mobile computer and phone users no matter
where they are located in the world.
(b) The video conferencing is a two-way videophone conversation (where participants are visible to each other) among
multiple participants at a time where as, chatting is an online textual talk in real time.
(c)
GPRS- General Packet Radio Service
CDMA- Code Division Multiple Access
(d) PAN (Private Area Network) will be formed, when we connect two mobiles using Bluetooth.
(e)
(i) Finance is the most appropriate block, where TTC should plan to install their server
(ii)
(f) The two popular Open Source Softwares used as operating system are-
Linux
OpenSolaris
Q. PAPER 2013
Question 7 : (8 Marks)
(a) Write the two advantages of using an optical fibre cable over an
Ethernet cable to connect the two service stations, which are 200 m
away from each other.
(i) Suggest the most appropriate block, where RCI should plan to
install the server.
(e) Which of the following crime(s) does not come under cybercrime?
(c)
(i) Faculty recording building
(ii) Finance building
(iii) MAN
(iv) Satellite
Number of Computers
Building “GREEN” 32
Building “BLUE” 45
Head Office 10
(i) Suggest the most suitable place (i.e. building) to house the server of
this organization. Also give a reason to justify your suggested
location.
(ii) Suggest a cable layout of connections between the buildings inside
the campus.
(iii) Suggest the placement of the following devices with justification:
1. Switch
2. Repeater
(iv)The organization is planning to provide a high speed link with its
head office situated in MUMBAI using a wired connection. Which of
the following cables will be most suitable for this job?
1) Optical Fiber
2) Co-axial cable
3)Ethernet cable
f) Give one suitable example of each URL and Domain Name.
g) Name two Proprietary softwares along with their
applications. [1+1+1+1+4+1+1 = 10]
ANSWERS
Answer 7 :
(10 Marks)
(a). (ii) VoIP
Voice over IP (VoIP) commonly refers to the communication
protocols which consist of the transmission techniques involved in
the delivery of voice communications and multimedia sessions
over Internet Protocol (IP) networks, such as the Internet.
(b). One client side scripting is Java Script.
One server side script is JSP (Java Server Page).
(c). (i) Operating someone’s Internet banking account, without
his knowledge.
(d). The advantage of Star Topology of network:
The four computers can be connected with each other using Star
Topology of network. In which one computer would be the central
node which will work as a server. The other three computers
would be connected to the central node called server. The
communication between each node will take place through the
server.
(e)
(e1) Building “RED” is the most suitable place for the server as it
contains maximum numbers of computers.
(e2) We can use any of the following topology to design the
layout:
Bus Topology: In bus topology all the nodes are connected in a
linear fashion with a single continuous cable.
Star Topology: In star topology all the nodes are connected to a
central hub/switch to form a network.
(e3) Switch- Every Building will need 1 switch, to send signals to
all the workstations connected to it.
Repeater - A repeater should be placed when the distance
between any two connecting computers exceeds 70m.
(e4)
(i) Optical Fiber can be used for a high speed link.
(f) URL- www.yahoo.com, www.google .com etc
Domain Names - .com, .gov, .edu etc
(g) Proprietary softwares are softwares that are exclusive property
of their developers or publishers, and they cannot be copied or
distributed without complying with their licensing agreements.
The Two Proprietary software’s are:
(i) Microsoft Windows – Microsoft Windows is a series of
software operating systems and graphical user interfaces
produced by Microsoft.
(ii) Adobe Flash Player - The Adobe Flash Player is software for
viewing animations and movies using computer programs such as
a web browser.
Q PAPER 2011
Question 7 : a) In Networking , what is WAN ? How is it (10 Marks)
different from LAN?
(c) Web 2.0 refers to a new generation of applications that are social in
nature. They allow for collaboration, information exchange, and are user-
oriented. Facebook and MySpace are prime examples of Web 2.0 sites.
(d) Client-Side Script — Javascript , vbscript
Server-Side Script — ASP, JSP
(e)
(i) Admin Center
(ii) STAR Topology
(iii) Hub/Switch
(iv) WAN(Wide Area Network)
The connection between admission office to the closest big city will be
through WAN. It is span over a larger distance so dedicatedlines are not
possible. Here connections are made using radio waves or satellites.
(f) Open source software is free to download therefore lower in cost,
whereas, Proprietary software is computer software licensed under
exclusive legal right of the copyright holder. The licensee is given the right
to use the software under certain conditions, but restricted from other uses,
such as modification, further distribution, or reverse engineering.
(g) Cookies are the bits of data put on a hard disk when someone visits
certain websites. The cookie on the hard disk has the username and
password in it, so people don’t have to log in.
Q.PAPER 2010
Answer 7 :
Question 7 : (10 Marks)
a) What was the role of APARENT in Computer
Networking? (1)
b) Which of the following is not a unit for data transfer
rate? (1)
i) mbps
ii) kbps
iii) sbps
iv) gbps
c) What is the difference between Virus and Worms in the
computers? (1)
d) What term do we use for a hardware/software device, which
is used to block unauthorized access while permitting
authorized communications. This term is also used for a device
or set of devices configured to permit, deny, encrypt, decrypt
or proxy all (in and out) computer traffic between different
security domains based upon a set of rules and other criteria.
(1)
e) ”Vidya For All” is an educational NGO. It is the setting up
its new campus at Jaipur for its web based activities. The
campus has four buildings as shown in the diagram below: (4)
Center to center distances between various Compounds as per
architectural drawings (in metres) is as follows:
Main Building to Resource Building 120m
Main Building to Training Building 40m
Main Building to Accounts Building 135m
Resource Building to Training Building 125m
Resource Building to Accounts Building 45m
Training Building to Accounts Building 110m
(10 Marks)
a) The first computer network was jointly designed by the
Advanced Research Projects Agency (ARPA) and department of
Defence (DOD) of United States in 1969 and was called ARPANET.
It was an experimental project which connected a few computers
from some of the reputed universities of USA and DOD. APRANET
allowed access to computer resource sharing projects. This
ARPANET was handed over to Defence Communication Agency
(DCA) for further development.
b) (iii)sbps
c) VIRUS: Virus is a malicious program that damages data and
files and causes harm to computer system.
WORM: A computer worm is a program which copies itself across
a network. A computer worm differs from a computer virus in that
a computer worm can run itself. A virus needs a host program to
run and the virus code runs as part of the host program. A
computer worm can spread without a host program, although
some modern computer worms also use files to hide inside.
d) Firewall
e) e1) The cable network layout is as follows:
Question 7 : (8 Marks)
a) What is the difference between LAN and WAN? [ 1]
(b) Expand the following abbreviations: [1]
(i) HTTP
(ii) ARPANET
( c) What is protocol? Which protocol is used to copy a file from/to a remotely located
server? [1]
(d) Name two switching techniques used to transfer data between two terminals
(computers). [1]
(e) Eduminds University of India is starting its first campus in a small town Parampur
of Central India with its center admission office in Delhi. The University has 3 major
buildings comprising of Admin Building, Academic Building and Research Building in
the 5 KM area Campus.
As a network expert, you need to suggest the network plan as per (E1) to (E4) to the
authorities keeping in mind the distances and other given parameters.
(E1) Suggest to the authorities, the cable layout amongst various buildings
inside the university campus for connecting the buildings. [1]
E2) Suggest the most suitable place (i.e. building) to house the server of this
organization, with a suitable reason. [1 ]
(E3) Suggest an efficient device from the following to be installed in each of the
buildings to connect all the computers: [1]
(i) GATEWAY
(ii) MODEM
(iii) SWITCH
(E4) Suggest the most suitable (very high speed) service to provide data connectivity
between Admission Building located in Delhi and campus located in Parampur from the
following options: [ 1]
Telephone line
Fixed-Line Dial-up connection
Co-axial Cable Network
GSM
Leased line
Satellite connection
ANSWERS
Answer 7 :
(8 Marks)
(a) There are two basic types of network, LAN and WAN.
LAN stands for Local Area Network, while WAN stands for Wide Area Network.
Local Area Networks are smaller networks, usually within an office base. Connections
between the workstations are physical with cables and all the office resources are
shared and distributed between the network workstations.
WAN or Wide Area Networks, are broader geographic networks, like one city to another. They
are more of a collection of interconnected LAN networks.
The main difference between LAN and WAN is in their data transfer rate. LANs are faster, with
10Gbit data transfer rates.
(c) A protocol is a set of rules that end points in a telecommunication connection use when
they communicate. Protocols exist at several levels in a telecommunication connection. For
example, there are protocols for the data interchange at the hardware device level and
protocols for data interchange at the application program level. File Transfer Protocol (FTP) is
used to copy a file from/to a remotely located computer.
(d) The two types of switching techniques used to transfer data between two terminals are:
Circuit Switching: This method involves the physical interconnection of two devices. A good
example of circuit switching involves the public phone network.
Packet Switching: Packet Switching techniques switch packets of data between destinations.
Traditionally, this applied to X.25 techniques, but this also applies to TCP/IP and IPX/SPX
routers. Proprietary Frame Relay switches can switch voice signals.
(E1)
(E2) The most suitable place to house the server of this organization is Academic
Building, as this location has maximum number of computers installed. This will reduce
the network traffic, as most of the traffic will be local and also decrease the cost.
(E3) SWITCH
(E4) Satellite connection is required to provide data connectivity between Admission Building located in Delhi and
Parampur because they are very far located from each other.