Page 115 - IPP-12-2024
P. 115

47.  What is Primary key?
                Ans.  Primary key is a combination of columns that uniquely identifies a row in a table.
                 48.  What is Candidate key?
                Ans.  All possible combinations of columns that can possibly serve as the primary key or any other column are
                    called candidate keys.
                 49.  What is Foreign key?
                Ans.  A combination of columns where values are derived from primary key or any other column of some other
                    table is called the foreign key of the table in which it is contained.

                 50.  What is Alternate key?
                Ans.  A candidate key that is not serving as a primary key is called an alternate key.

                 51.  What is MySQL?
                Ans.  MySQL is an open-source RDBMS that relies on SQL for processing the data in the database. The database
                    is available for free under the terms of General Public Licence (GPL).
                 52.  What is RDBMS?
                Ans.  Relational Database Management System (RDBMS) facilitates access, security and integrity of data and
                    eliminates data redundancy. For example, MySQL, Oracle, Microsoft SQL Server, etc.
                 53.  What is the use of DROP TABLE command?
                Ans.  DROP TABLE command is used to delete tables. For example, DROP TABLE Orders; will delete the table
                    named ‘Orders’.
                 54.  What do you understand by NOT NULL constraint?
                Ans.  This constraint ensures that the null values are not permitted on a specified column. This constraint can be
                    defined at the column level and not at the table level.
                 55.  What is the significance of COUNT?
                Ans.  It is used to count the number of values in a given column or number of rows in a table; for example,
                    SELECT COUNT(RollNo) FROM Students;
                 56.  What is the importance of Cyber Laws?
                Ans.  Communication technology uses several means of transferring textual messages, pictures, etc., via
                    internet. Each time, there may be a number of threats on either the sender’s or the receiver’s side
                    which create a bridge between networking communication. To sort out these problems, cyber laws exist
                    that touch almost all aspects of transactions and activities on the internet. Cyber laws are used to protect
                    people from online frauds.
                 57.  Explain Phishing.
                Ans.  Phishing is the fraudulent attempt to obtain sensitive information such as usernames, passwords and
                    credit card details, often for malicious reasons, by disguising as a trustworthy entity in an electronic
                    communication. Phishing is typically carried out by email spoofing or instant messaging and it often
                    directs users to enter personal information at a fake website, the look and feel of which is identical to the
                    legitimate one, the only difference being the URL of the website in question.

                 58.  What is Cyber Stalking?
                Ans.  Cyber stalking is defined as the unlawful act of harassing a person or collecting an individual’s private
                    information using electronic network.
                 59.  What are Digital Footprints?
                Ans.  Digital footprints are the trail of data we leave behind when we visit any website or use any online
                    application or portal to fill in data or perform any transaction.
                 60.  What is Identity Theft?
                Ans.  Identity theft involves obtaining personal or financial information of another person and using their identity
                    to commit fraud, such as making unauthorised transactions or purchases. Identity theft is committed in
                    many different ways and its victims suffer damage to their reputation as well as financial loss.




                                                                                         Appendices          A.25
   110   111   112   113   114   115   116