Page 10 - IPP-11
P. 10

Ans.  (i)  SELECT ProductName, Price FROM PRODUCT WHERE
                       Price BETWEEN 50 AND 100;
                       or
                       SELECT ProductName, Price FROM PRODUCT WHERE
                       Price>=50 AND Price<=100;
                   (ii)  SELECT * FROM PRODUCT WHERE Manufacturer IN(‘XYZ’,‘ABC’);
                       SELECT * FROM PRODUCT WHERE Manufacturer=’XYZ’
                       OR Manufacturer=’ABC’;
                   (iii)  SELECT ProductName, Manufacturer, Price WHERE Discount IS NULL;
                   (iv)  SELECT ClientName, City, CLIENT.P_ID, FROM CLIENT, WHERE
                       city=‘Delhi’;
                   (v)  P_ID is the Foreign Key which is used in CLIENT Table as Foreign Key.

              QUESTION 7
                (a)  What do you understand by online identity theft? Mention one measure that can be used to avoid online
                   identity thefts.                                                                        (2)
               Ans.  Online identity theft is a kind of online fraud that involves using someone else’s online credentials to
                   cause harm to the actual person financially or socially. Any of the following measures can help prevent
                   online frauds: Private browsing, Anonymous browsing, incognito, proxy, VPN.
                (b)  What will you do if you receive an email from an unknown source containing a lucrative financial offer
                   and a link to activate that?                                                            (1)
               Ans.  Delete the mail or mark it as spam.
                (c)  Give one word for the following:                                                      (3)
                    (i)  A system of hardware and software that monitors all communication over a network and allows only
                       legitimate communication to propagate.
                   (ii)  A microblogging social network website that allows 280-character messages.
                   (iii)  A passive attack on a network that gains access to communication medium and listens to the
                       communication to fetch content.
               Ans.  (i)  Firewall
                   (ii)  Twitter
                   (ii)  Eavesdropping
                (d)  What is the difference between a virus and a worm?                                    (2)
               Ans.  Viruses are malicious programs that need a host file to attack a computer system.
                    Worms are self-replicating programs that eat up memory.
                (e)  What are cookies for a website? What is their use?                                    (2)
               Ans.  Cookies are small pieces of data sent from a website and stored in user’s browser in the form of a text file.
                    Cookies help the website to store user’s browsing preferences and session data for user’s benefit.






















                                                               7
   5   6   7   8   9   10   11   12   13   14   15