Page 371 - Informatics_Practices_Fliipbook_Class12
P. 371

6.  Which of the following is not a free and open-source software?
                a.  Linux                                         b.  MS Windows
                c.  Python                                        d.  Audacity

              7.  ___________ is the visual symbol, word, name, design, slogan, label, etc., that distinguishes one brand from other
                brands.

                a.  Trademark                                     b.  Copyright
                c.  Patent                                        d.  Trade Secret
              8.  Consider a table employee given below.

                      ID       Ename      SALARY       DEPT
                    Q101        Rahul      54000         10

                    Q103       Sachin      67000         20
                    Q105        Virat      75000         20
                    Q109        Rohit       NULL         30

                 The degree and cardinality of employee are:
                a.  4, 4                                          b.  5, 4
                c.  4, 5                                          d.  4, 3
              9.  What will be the output produced on the exceution of the following SQL statement?

                SELECT MONTHNAME("2016-10-29");
                a.  29                                            b.  10
                c.  October                                       d.  Oct
             10.  To skip NaN values in a calculation involving a Pandas DataFrame, you can specify ___________ attribute.

                a.  NaN                                           b.  NA
                c.  skipna                                        d.  all of these
            11.  Which SQL clause is used to match the character data based on certain pattern?
                a.  LIKE                                          b.  IN
                c.  BETWEEN                                       d.  RANGE
             12.  In Pandas DataFrame, ___________ function can be used to drop missing values.

                a.  fillna( )                                     b.  isnull()
                c.  dropna( )                                     d.  delna()
             13.   Gaining  unauthorised  access  to  a  network  or  computer  or  digital  files  with  malicious  intentions,  is  called
                ___________ .
                a.  Cracking                                      b.  Hacking
                c.  Banging                                       d.  Phishing

             14.  In SQL, the function equivalent to LCASE() is:
                a.  LOWERCASE ()                                  b.  CAPITALCASE()
                c.  LOWER()                                       d.  TITLE()
             15.  Which of these components is internal to a computer and is required to connect the computer to a network?
                a.  Wireless Access Point                         b.  Network Interface card
                c.  Switch                                        d.  Hub




                                                                                                Practice Paper 2  357
   366   367   368   369   370   371   372   373   374   375   376