Page 7 - IPP-12-2025
P. 7
23. What do you mean by phishing? [2]
Ans. Phishing is a fraudulent attempt to obtain sensitive information such as usernames, passwords and
credit card details—often for malicious purposes—by disguising as a trustworthy entity in an electronic
communication.
24. Consider the string: Machine Learning. Write suitable SQL queries for the following: [2]
(a) Convert the entire string to lowercase.
(b) Extract and display the last 5 characters from the string.
Ans. (a) SELECT LCASE('Machine Learning');
(b) SELECT RIGHT('Machine Learning', 5);
25. Define the terms URL and ISP. [2]
Or
Differentiate between open-source software and proprietary software.
Ans. URL: It stands for Uniform Resource Locator that helps in locating a particular website or a web page on
the internet. It stores the address of a web page. For example, http://www.cbse.nic.in/academics.html
ISP: It stands for Internet Service Provider. It is a company or an organization that provides individuals,
businesses and other organizations with access to the internet and related services. For example, Jio,
Airtel, Excitel, etc.
Or
Open-Source Software Proprietary Software
(a) Its source code is publicly available. (a) Its source code is not shared with the public.
(b) It is free of cost. (b) It is often paid or licensed.
(c) Users can view, modify and distribute the (c) Users cannot modify or redistribute it without
code freely. permission.
(d) For example: Linux, LibreOffice, Mozilla (d) For example: Microsoft Windows, MS Office,
Firefox, etc. Adobe Photoshop, etc.
26. Differentiate between ALTER TABLE and UPDATE commands in SQL. [2]
ALTER TABLE UPDATE
(a) It is a Data Definition Language (DDL) (a) It is a Data Manipulation Language (DML)
command. command.
(b) It is used to modify the structure of a (b) It is used to modify the data stored in the table,
table, such as adding or removing columns, such as updating the values of one or more
changing data types or adding constraints columns in existing records.
(conditions).
(c) It affects the design of the table. (c) It affects the records of the table.
(d) Forexample: ALTER TABLE STUDENT ADD (d) For example: UPDATE STUDENT SET MARKS
DOB DATE; = MARKS + 10 WHERE ROLLNO = 9;
27. Write any two ways of cyber trolling. [2]
Ans. Two ways of cyber trolling are as follows:
(a) The use of rude, abusive or offensive comments on online forums, social media platforms or blog posts
with the intent to provoke others.
(b) The use of irrelevant or repetitive messages in email inboxes, social media feeds or online forums,
often causing annoyance or disrupting conversations.
M.4 Informatics Practices with Python–XII