informatics practices 2023
Q1. Which method is used to write multiple strings to a file? 1. write() 2. writelines() 3. writeline() 4. writes() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q2. <a+ > opens the file in _____and ______mode. 1. append, read 2. append, write 3. read, write 4. binary mode, read. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q3. The file offset position in <wb+> file mode is _____ 1. middle of the file 2. end of the file 3. beginning of the file 4. current position |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q4. Which of the following statements is not true? 1. Traditional file system increases data redundancy 2. Metadata is data about data 3. Number of rows in a relation called Degree of a relation 4. Candidate Key can be a Primary Key |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q5. Consider the following table.
Identify the correct pair of values: 1. Degree = 5: No. of tuples = 6 2. Cardinality 6: Degree = 5 3. Degree-5; Cardinality - 5 4. Degree=6: Cardinality = 6 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q6. Which of the following is the limitation of DBMS 1. Data Consistency 2. Increased Complexity 3. Controlled Data redundancy 4. Data Independency |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q7. Match List I with List II
Choose the correct answer from the options given below: 1. A-IV. B-II, C-III, D-I 2. A-I. B-II, C-III, D-IV 3. A-III, B-L, CIV, D-II 4. A-II, B-III, C-IV, D-I |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q8. A row in a table is called ____ 1. Cardinality 2. Primary Key 3. Tuple 4. Attribute |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q9. What is the output of the following SQL query? SELECT * FROM STUDENTS WHERE SName like 5 and age > 18. 1. Selects details of all those students whose name ends with 'S' and age greater than 18 2. Selects details of all those students whose name starts with 'S and age is greater than 18 3. Selects details of all those students whose name starts and ends with 'S and age is greater than 18 4. Selects details of all those students whose name starts with 'S" or age greater than 18 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q10. Let us consider two relations Student and Major as shown in Table I and Table 2 respectively, Table 1: Student
Table 2: Major
How many Tuples will be in the result table after Student U Major operation 1. 9 2. 8 3. 20 4. 6 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q11. Which of the following statements is/are true? (A) Group by function is used to group rows of a table that contain the same values in a specified column. (B) The BETWEEN operator used for pattern matching (C) The IN operator selects values that match any value in the given list of values (D) COUNT. MAX. MIN. AVG and SUM are multiple row functions work on a set of records and return a single value (E) Update table is used to change the data in a table Choose the correct answer from the options given below 1. A, C, D and E only 2. A, B, C and D only 3. B, C, D and E only 4. A, B, D, and E only |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q12. Which of the following address is associated with a network adapter (NIC) 1. IP address 2. Port address 3. MAC address 4. URL |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q13. Which device maintains a database of domain names and their corresponding IP addresses. 1. HTTP server 2. DNS server 3. Router 4. Gateway |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q14. Match List I with List II
Choose the correct answer from the options given below: 1. A-III, B-I, C-II, D-IV 2. A-III, B-II, C-I, D-IV 3. A-I. B-II, CIV, D-III 4. A-III, B-IV, C-I, D-II |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q15. What will be returned by the given query? Select INSTR("DBIT BITSIT", "IT"). 1. 2 2. 3 3. 10 4. -2 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q16. Which statement is correct to check that the series is without elements? 1. STA.empty 2. A null 3. STA.blank 4. TA.nan |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q17. STASTB-STA[0:3]-STB['a':c'] As per the above statement, what are the values of objects AssB. Choose correct output- A class teacher wants to manage her class results on her computer using Pandas. Help her to choose the data structure which is best suited for her to manage class results. 1. Series 2. Numpy Array 3. DataFrame 4. List |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q18. ______leads to an error, if there are multiple entries for a column's value for the same values for index (row). 1. Pivot_table( ) 2. pivot( ) 3. describe( ) 4. describe all ( ) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q19. ______will drop all rows that have NaN values in them while______will drop only those rows that have all NaN values 1. dropna (how 'all'), dropaa( ) 2. dropnal(), dropna (how 'all') 3. fill( ) 4. deletena(how = 'all'), deletena( ) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q20. Which of the following is are true statements? (A) Python integer types can not store NaN values. (B) Python float types can not store NaN values (C) Python integer types can store NaN values (D) Python float types can store NaN values Choose the correct answer from the options given below: 1. B and C only 2. A and B only 3. C and D only 4. A and D only |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q21. Which of the following is not a line style? 1. Solid 2. dotted 3. dashdot 4. Darke |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q22. What is the full form of OGD? 1. Open Governance Data 2. Open Government Data 3. Only Government Data 4. Open Government Digital |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q23. To define the limit of axes of a chart, which function can be used? 1. xlabel() and ylabel() 2. xticks() and yticks() 3. xlimit) and ylimit() 4. xlim and ylim() |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q24. Match List I with List II
Choose the correct answer from the options given below: 1. A-III, B-IV, C-I, D-II 2. A-IV, B-III, C-II, D-I 3. A-IV, B-III C-I, D-II 4. A-III, B-II, C-I, D-IV |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q25. Modulation is the process of ____________ 1. Sending a file from one computer to another computer 2. converting digital signals to analog signals 3. converting analog signals to digital signals 4. echoing every character that is received |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q26. Match List I with List II
Choose the correct answer from the options given below: 1. A-II, B-I, C-IV, D-III 2. A-IV, B-I, C-II, D-III 3. A-II, B-IV, C-I, D-III 4. A-I, B-IV, C-II, D-III |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q27. The number of pins in an RJ45 connector is: 1. 5 2. 6 3. 8 4. 10 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q28. A sender wants to transmit their data at the rate of 3200 bit-per 16 second. What will be the data rate of the channel? 1. 1200 bps. 2. 200 bps 3. 2000 bps 4. 3216 bps |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q29. Which of the following is measured in Kbps. Mbps and Gbps? 1. Memory capacity 2. Data Transfer Rate 3. Bandwidth 4. Radio Waves |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q30. The File Transfer Protocol (FTP) requires a reliable transport service. Which protocol of the TCP/IP suite does it use? 1. Transmission Control Protocol (TCP) 2. Simple Mail Transfer Protocol (SMTP) 3. Telnet 4. Hyper Text Transfer Protocol (HTTP) |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q31. Which of the following are correct about firewall? (A) Firewall can be implemented only in software (B) Firewall can be implemented only in hardware (C) Firewall can be implemented both hardware as well as software (D) Firewall can be implemented among two or more networks (E) Firewall act as a first barrier against malware Choose the correct answer from the options given below: 1. A, C, D and E only 2. A, B, D and E only 3. C, D and E only 4. A, C, D and E only |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q32. A scenario wherein a hacker limit or stop an authorised used to access service, device or other resource by overloading that resource with illegitimate request- 1. DOS (Denial of Service) 2. Spoofing 3. Eavesdropping 4. Gray hats |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q33. When a hacker uses knowledge to find and help in fixing the security flaws in the system is called- 1. Unethical Hacking 2. Ethical Hacking 3. Black Hat Hacking 4. Grey Hat Hacking |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q34. A_________is a hardware device or software program that prevents unwanted traffic, 1. Firewall 2. Denial of service (DoS) 3. Malware 4. Virus |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Consider the following table and answer the questions that follow: Teacher
Q35. Choose the correct output of the following SQL query Select min Doj) from Teacher. 1. 01/07/99 2. 25/02/97 3. 31/07/97 4. 10/197 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q36. select count Age) from Teacher. 1. 9 2. 7 3. 8 4. NULL |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q37. Choose the correct query to display Names of Teachers along with Salary of those Teachers who are in History department? 1. Select Name from Teacher where Department- 'History': 2. Select Name, Salary from Teacher where Department = 'Hist": 3. Select Name, Salary from Teacher where Department History': 4. Select Salary from Teacher where Department = 'Hist": |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q38. Suppose the teacher with No - 7 left the school, suggest the correct query to delete that record from the teacher table: 1. Delete from Teacher: 2. Delete from Teacher where No = 7; 3. Delete from Teacher, where No - 17: 4. Delete from Teacher where No = 7 |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q39. Choose the correct statement with reference to SQL table Teacher (A) Alter table Teacher is used to make changes in the structure of the table (B) Upate Teacher is used to modify existing data in the table (C) Desc Teacher will display the tuples in sorted order (D) Select * from Teacher will display all the attributes along with their data types. Choose the correct answer from the options given below: 1. A, Band D only 2. C and D only 3. A and D only 4. B, C and D only |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Consider the following paragraph and answer the questions that follow: Mohan keeps working on various IT projects. He is continuously online for many hours. Many a times while working on various softwares, he is required to share his personal sensitive information like mobile number. date of birth etc. He has started facing a number of problems while working on his computer. 1. His bank account showed a debit transaction of 50.000, which was not done by him 2. He cannot open some of the applications 3. He has started getting junk emails. 4. Many a times unwanted advertisements have started popping up onto his computer. 5. He has started getting backache, shoulder pain and stress. Q41. The unwanted and unnecessary advertisements that have started poping up on his system. According to you. which of the following may be the reason? 1. Virus 2. Trojan 3. Adware 4. Hacking |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q42. As his account was hacked and a debit transaction was made in his bank account. What do you suggest him to install? 1. Router 2. Firewall 3. Antivirus 4. Modem |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q43. He has started facing health issues. These can be resolved by arranging and designing the workplace including furniture and system. These changes come under which of the following branch of science? 1. Carcinogenic 2. Leaching 3. e-waste management 4. Ergonomics |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q44. Mohan is blocked from accessing data and some money is demanded. This is an example of - 1. Trojan attack 2. adware 3. Malware 4. Ransomware |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q45. As Mohan remains online continuously for hours, what is he leaving on the internet? 1. Digital footprints 2. Digital Handprints 3. Offline Footprints 4. Online Handprints |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q46. The purpose of attribute dataframe.dtypes is: 1. To display data type of each column in the dataframe. 2. To display a tuple representing the dimensionality of the dataframe. 3. To display the first n rows in the dataframe, 4. To display the last n rows in the dataframe. |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q47. Match List I with List II
Choose the correct answer from the options given below. 1. A-II, B-I, C-IV, D-III 2. A-I, B-II, C-IV, D-III 3. A-III, B-IV, C-I, D-II 4. A-IV, B-II, C-I, D-III |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q48. Which of the following is a Frequency range of Radio waves? 1. 3 KHz - 1 GHz 2. 1 GHz - 300 GHz 3. 300 GHz 400 THz 4. 400 THz-900 THz |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q49. The e-banking page logged out automatically by___________ 1. Authentication cookies 2. Session cookies 3. Super cookies 4. Zombie cookies |
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Q50. Which of the following is correct code to plot line Chart with dotted linestyle? 1. plt.plot(x, y) plt.linestyle "dotted" plt.show( ) 2. plt.plot(x, y) plt.linestyle | "dotted") plt.show ( ) 3. plt.plot(x, y), linestyle-dotted) plt.show( ) 4. plt.plot(x, y, linestyle = "dotted") plt.show( ) |
Comments
Nam cursus tellus quis magna porta adipiscing. Donec et eros leo, non pellentesque arcu. Curabitur vitae mi enim, at vestibulum magna. Cum sociis natoque penatibus et magnis dis parturient montes, nascetur ridiculus mus. Sed sit amet sem a urna rutrumeger fringilla. Nam vel enim ipsum, et congue ante.
Cursus tellus quis magna porta adipiscin
View All