Grade – 12 – Computer Science – Capstone Project: Technological Solution Design – Multiple Choice Questions

Multiple Choice Questions

Capstone Project: Technological Solution Design

Topic: Networking
Grade: 12

Question 1:
Which of the following protocols is used for secure communication over the internet?
a) TCP
b) IP
c) HTTPS
d) FTP

Answer: c) HTTPS

Explanation: HTTPS (Hypertext Transfer Protocol Secure) is a protocol that provides secure communication over the internet by encrypting the data being transmitted. It uses SSL/TLS (Secure Sockets Layer/Transport Layer Security) protocols to establish a secure connection between the client and the server. For example, when you make an online purchase and enter your credit card information, the website uses HTTPS to ensure that your data is encrypted and protected from unauthorized access.

Question 2:
Which of the following devices is used to connect multiple networks together?
a) Router
b) Switch
c) Hub
d) Modem

Answer: a) Router

Explanation: A router is a networking device that connects multiple networks together and forwards data packets between them. It uses routing tables to determine the best path for data to reach its destination. For example, in a home network, the router connects the local network to the internet, allowing devices in the network to communicate with devices on the internet.

Question 3:
Which of the following IP addresses is a private IP address?
a) 192.168.0.1
b) 172.16.0.1
c) 10.0.0.1
d) 123.45.67.89

Answer: a) 192.168.0.1

Explanation: Private IP addresses are reserved for use within private networks and cannot be routed over the internet. The IP address range 192.168.0.0 – 192.168.255.255 is designated as a private address range. For example, in a home network, the router assigns private IP addresses to the devices connected to it, such as 192.168.0.1, to allow them to communicate with each other.

Question 4:
Which of the following protocols is used for email communication?
a) SMTP
b) FTP
c) HTTP
d) DNS

Answer: a) SMTP

Explanation: SMTP (Simple Mail Transfer Protocol) is a protocol used for sending email messages between servers. It is responsible for the transmission of emails from the sender\’s email client to the recipient\’s email server. For example, when you send an email, your email client uses SMTP to connect to your email server and transmit the message.

Question 5:
Which of the following networking devices operates at the data link layer of the OSI model?
a) Router
b) Switch
c) Hub
d) Modem

Answer: b) Switch

Explanation: A switch is a networking device that operates at the data link layer (Layer 2) of the OSI model. It receives data packets and forwards them to the appropriate destination based on the MAC addresses of the devices connected to it. For example, in a local area network, a switch connects multiple devices together and allows them to communicate with each other.

Topic: Database Management
Grade: 12

Question 1:
Which of the following database models is based on the concept of tables?
a) Hierarchical model
b) Network model
c) Relational model
d) Object-oriented model

Answer: c) Relational model

Explanation: The relational model is based on the concept of tables, where data is organized into rows and columns. Each table represents an entity, and the relationships between entities are represented through foreign keys. For example, in a database for a school, there could be a \”Students\” table and a \”Courses\” table, with a foreign key in the \”Courses\” table linking it to the corresponding student.

Question 2:
Which of the following SQL statements is used to update data in a database table?
a) INSERT
b) SELECT
c) UPDATE
d) DELETE

Answer: c) UPDATE

Explanation: The UPDATE statement is used to modify existing data in a database table. It allows you to change the values of specific columns in one or more rows based on a certain condition. For example, you can use the UPDATE statement to change the price of a product in an e-commerce database when it goes on sale.

Question 3:
Which of the following database concepts ensures that each row in a table is uniquely identified?
a) Primary key
b) Foreign key
c) Index
d) Constraint

Answer: a) Primary key

Explanation: A primary key is a column or a combination of columns that uniquely identifies each row in a table. It ensures that there are no duplicate rows in the table and allows for efficient retrieval of data. For example, in a customer database, the customer ID column can be designated as the primary key to ensure that each customer has a unique identifier.

Question 4:
Which of the following database normalization forms eliminates repeating groups of data?
a) First normal form (1NF)
b) Second normal form (2NF)
c) Third normal form (3NF)
d) Fourth normal form (4NF)

Answer: a) First normal form (1NF)

Explanation: First normal form (1NF) is the basic level of database normalization and eliminates repeating groups of data by ensuring that each column contains only atomic values. It requires that each attribute in a table be single-valued. For example, in a table for storing customer orders, instead of having multiple columns for different items, each with its own quantity, the table should have a separate row for each item ordered.

Question 5:
Which of the following database operations is used to combine rows from multiple tables based on a related column between them?
a) JOIN
b) UNION
c) INTERSECT
d) MINUS

Answer: a) JOIN

Explanation: JOIN is a database operation that combines rows from multiple tables based on a related column between them. It allows you to retrieve data from multiple tables as if they were a single table. For example, if you have a \”Customers\” table and an \”Orders\” table, you can use a JOIN operation to retrieve all the orders made by a specific customer.

Leave a Comment

Your email address will not be published. Required fields are marked *

Shopping Cart
error: Content cannot be copied. it is protected !!
Scroll to Top