Page 115 - IPP-12-2024
P. 115
47. What is Primary key?
Ans. Primary key is a combination of columns that uniquely identifies a row in a table.
48. What is Candidate key?
Ans. All possible combinations of columns that can possibly serve as the primary key or any other column are
called candidate keys.
49. What is Foreign key?
Ans. A combination of columns where values are derived from primary key or any other column of some other
table is called the foreign key of the table in which it is contained.
50. What is Alternate key?
Ans. A candidate key that is not serving as a primary key is called an alternate key.
51. What is MySQL?
Ans. MySQL is an open-source RDBMS that relies on SQL for processing the data in the database. The database
is available for free under the terms of General Public Licence (GPL).
52. What is RDBMS?
Ans. Relational Database Management System (RDBMS) facilitates access, security and integrity of data and
eliminates data redundancy. For example, MySQL, Oracle, Microsoft SQL Server, etc.
53. What is the use of DROP TABLE command?
Ans. DROP TABLE command is used to delete tables. For example, DROP TABLE Orders; will delete the table
named ‘Orders’.
54. What do you understand by NOT NULL constraint?
Ans. This constraint ensures that the null values are not permitted on a specified column. This constraint can be
defined at the column level and not at the table level.
55. What is the significance of COUNT?
Ans. It is used to count the number of values in a given column or number of rows in a table; for example,
SELECT COUNT(RollNo) FROM Students;
56. What is the importance of Cyber Laws?
Ans. Communication technology uses several means of transferring textual messages, pictures, etc., via
internet. Each time, there may be a number of threats on either the sender’s or the receiver’s side
which create a bridge between networking communication. To sort out these problems, cyber laws exist
that touch almost all aspects of transactions and activities on the internet. Cyber laws are used to protect
people from online frauds.
57. Explain Phishing.
Ans. Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and
credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic
communication. Phishing is typically carried out by email spoofing or instant messaging and it often
directs users to enter personal information at a fake website, the look and feel of which is identical to the
legitimate one, the only difference being the URL of the website in question.
58. What is Cyber Stalking?
Ans. Cyber stalking is defined as the unlawful act of harassing a person or collecting an individual’s private
information using electronic network.
59. What are Digital Footprints?
Ans. Digital footprints are the trail of data we leave behind when we visit any website or use any online
application or portal to fill in data or perform any transaction.
60. What is Identity Theft?
Ans. Identity theft involves obtaining personal or financial information of another person and using their identity
to commit fraud, such as making unauthorised transactions or purchases. Identity theft is committed in
many different ways and its victims suffer damage to their reputation as well as financial loss.
Appendices A.25