Podcast
Questions and Answers
Which of the following is the most efficient type of network topology?
Which of the following is the most efficient type of network topology?
What does a "Gateway" do in a network?
What does a "Gateway" do in a network?
What is the purpose of a "Repeater" in a network?
What is the purpose of a "Repeater" in a network?
Which transmission medium provides the highest bandwidth and is least susceptible to interference?
Which transmission medium provides the highest bandwidth and is least susceptible to interference?
Signup and view all the answers
Match the following network devices with their corresponding function:
Match the following network devices with their corresponding function:
Signup and view all the answers
The term “DHTML” refers to a specific programming language.
The term “DHTML” refers to a specific programming language.
Signup and view all the answers
The <i>
and <b>
tags in HTML are both paired tags.
The <i>
and <b>
tags in HTML are both paired tags.
Signup and view all the answers
Wireless communication, like radio waves and microwaves, can penetrate solid objects.
Wireless communication, like radio waves and microwaves, can penetrate solid objects.
Signup and view all the answers
What is the purpose of the <h2>
tag in HTML?
What is the purpose of the <h2>
tag in HTML?
Signup and view all the answers
What is the purpose of the <b>
tag in HTML?
What is the purpose of the <b>
tag in HTML?
Signup and view all the answers
A _________ is a collection of linked web pages.
A _________ is a collection of linked web pages.
Signup and view all the answers
Which of the following is NOT one of the common types of e-commerce business models?
Which of the following is NOT one of the common types of e-commerce business models?
Signup and view all the answers
Which of the following is a key feature of an e-business?
Which of the following is a key feature of an e-business?
Signup and view all the answers
Which of the following is NOT a benefit of e-business?
Which of the following is NOT a benefit of e-business?
Signup and view all the answers
Which of the following is NOT a challenge faced by e-businesses in India?
Which of the following is NOT a challenge faced by e-businesses in India?
Signup and view all the answers
Which of the following is a website related to a central government initiative aimed at facilitating business transactions online?
Which of the following is a website related to a central government initiative aimed at facilitating business transactions online?
Signup and view all the answers
Which of the following describes a user-friendly front-end of an application?
Which of the following describes a user-friendly front-end of an application?
Signup and view all the answers
Which of the following components is used to get an option out of several mutually exclusive options where the number of options is small?
Which of the following components is used to get an option out of several mutually exclusive options where the number of options is small?
Signup and view all the answers
Which of the following component is used to get an option out of several options where the number of options is large?
Which of the following component is used to get an option out of several options where the number of options is large?
Signup and view all the answers
A password field is used to get some secret textual information like a password or CVV number of a credit card.
A password field is used to get some secret textual information like a password or CVV number of a credit card.
Signup and view all the answers
Which of the following is a method used in database management systems to ensure that a set of operations occur as a single unit, ensuring that either all operations are successfully completed or none are completed?
Which of the following is a method used in database management systems to ensure that a set of operations occur as a single unit, ensuring that either all operations are successfully completed or none are completed?
Signup and view all the answers
Which of the following SQL commands is used to modify the structure of a database, such as creating, deleting, or altering tables?
Which of the following SQL commands is used to modify the structure of a database, such as creating, deleting, or altering tables?
Signup and view all the answers
Which of the following is used to display distinct values from a column of a table?
Which of the following is used to display distinct values from a column of a table?
Signup and view all the answers
Which of the following SQL commands is used to retrieve data from a table?
Which of the following SQL commands is used to retrieve data from a table?
Signup and view all the answers
Which of the following SQL commands is used to insert new data into a table?
Which of the following SQL commands is used to insert new data into a table?
Signup and view all the answers
Which of the following SQL commands is used to change existing data in a table?
Which of the following SQL commands is used to change existing data in a table?
Signup and view all the answers
Study Notes
Bureau's Higher Secondary Information Technology (Class XII)
- Prescribed by the Council of Higher Secondary Education, Odisha, Bhubaneswar
- Board of Writers: Ranjan Kumar Bal, Ajay Kumar Mishra, Dhruba Charan Pradhan, Nrusingha Charan Samal
- Published by: The Odisha State Bureau of Textbook Preparation and Production
- Publication Number: 198
- ISBN: 978-81-8005-391-7
- First Edition: 2017/5000
- Price: ₹120/- (Rupees One Hundred Twenty Only)
Syllabus (2016)
-
Unit 1: Networking and Open Standards (25 periods / 30 marks)
- Computer Networking (8 periods / 10 marks)
- Overview, network devices (hub, switch, bridge, router, repeater, gateway) and their functions
- Network types (LAN, MAN, WAN, PAN)
- Network topologies (star, ring, bus, tree), communication media
- Wired technologies (coaxial, ethernet cable, optical Fiber) and wireless technologies (bluetooth, infrared, microwave, radio link, satellite link)
- Internet and its Applications (12 periods / 10 marks)
- Overview, internet backbone, internet access (dial-up, direct, broadband connections), role of ISP
- Internet protocols (TCP/IP, HTTP, FTP, TELNET, WAIS, GOPHER)
- Internet addressing (IP address, domain name, MAC (Media Access Control))
- Internet application (Web browser & search engines, URL, WWW, web pages & web sites, SMS, voice mail, electronic mail, chat, IRC, video conferencing), wireless/mobile communication (GSM, CDMA, WLL, 3G, 4G)
- Computer Networking (8 periods / 10 marks)
-
Unit 2: Programming (40 periods / 16 marks)
- Programming Fundamentals (28 periods / 10 marks)
- Access specifiers for class members, basics of inheritance, common libraries (String methods, Math methods), & MySQL database accessing (ODBC/JDBC)
- HTML Based Web Pages (12 periods / 6 marks)
- Basic HTML tags (H1-H6, P, BR, HR, UL, OL, FORM), creating and accessing static and dynamic pages
- Introduction to XML.
- Programming Fundamentals (28 periods / 10 marks)
-
Unit 3: Relational Database Management System (30 periods / 14 marks)
- Review of RDBMS from 1st Year Course
- Database fundamentals
- Introduction to MySQL
- Review of RDBMS from 1st Year Course
-
Unit 4: IT Applications (10 periods / 10 marks)
- e-Business
- Definition, e-commerce, types of e-commerce, and their benefits
- Website features, societal impact, and challenges of e-business
- e-Business
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.