0% found this document useful (0 votes)
41 views9 pages

Practice Paper 1

The document consists of a series of objective and subjective questions related to employability skills, computer literacy, and database management. It covers topics such as communication, entrepreneurship, stress management, and computer protection against viruses. The questions are designed to assess knowledge and understanding in these areas through multiple-choice and short answer formats.

Uploaded by

Khushal Chandak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
41 views9 pages

Practice Paper 1

The document consists of a series of objective and subjective questions related to employability skills, computer literacy, and database management. It covers topics such as communication, entrepreneurship, stress management, and computer protection against viruses. The questions are designed to assess knowledge and understanding in these areas through multiple-choice and short answer formats.

Uploaded by

Khushal Chandak
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

SECTION A: OBJECTIVE TYPE QUESTIONS

Q. 1 Answer any 4 out of the given 6 ques�ons on Employability Skills (1 x 4 = 4 marks)


[1] When it is difficult to communicate with someone who is not willing to talk or express their feelings and views it
means there is a/an __________________
a. Culture Barrier b. Interpersonal Barrier
c. Physical Barrier d. Language Barrier
Ans.: b. Interpersonal Barrier

[2] Kar�k’s Computer was running very slow, hangs and o�en restarts. He is very confused and tensed as he was
working on a very important assignment. Kar�k’s friend gave him the following sugges�ons. Iden�fy who has given
him a genuine sugges�on.
a. Radha : Restart your machine b. Ishan : Install reliable an�virus so�ware and update
c. Amar : Don’t use Pendrive d. Sam : Install free an�virus from net
Ans. b) Ishan: Install reliable an�virus so�ware and update

[3] ___________ refers to focusing human efforts for maintaining a healthy body and mind capable of beter
withstanding stressful situa�ons.
a. Self-Mo�va�on b. Stress Management
c. Self-Awareness d. Self-Regula�on
Ans. b. Stress Management

[4] High expecta�ons from self can leave with chronic anxiety and stress, thus leading to ___________ stress.
a. Physical b. Emo�onal c. Mental d. Financial
Ans.: c. Mental

[5] Which of the following is/are a myth about Entrepreneurship?


a. Need a lot of Money b. Must have a great Idea
c. Should know everything about business d. All of these
Ans.: d. All of these

[6] Name the organiza�on that has the Sustainable Development Goals?
a. UNICEF b. League of Na�ons c. United Na�ons d. World Health Organiza�on
Ans.: c. United Na�ons

Q. 2 Answer any 5 out of the given 6 ques�ons (1 x 5 = 5 marks)


[1] Which one is not the tab of the insert/index Table window of Writer Document?
a. Entries b. Background c. Style d. Row
Ans.: d. Row

[2] In the custom styles, each _____________ field on the Structure line represents a blank space in a document.
a. Black b. White c. Blue d. Yellow
Ans.: a. Black

[3] Saurabh has made an adver�sement in Digital Document. He is facing difficulty in posi�oning the images within
the text. Suggest him how he can adjust the image?
a. Wrap text b. Crop c. Alignment d. Layout
Ans.: a. Wrap text

[4] A _____________ is a collec�on of records that store data in Mail merge.


a. Data Source b. Main Document c. Document d. Merge Field
Ans.: a. Data Source

[5] To increases the contrast of an image, ___________ op�on is used in a document.


a. Smooth b. Sharpen c. Aging d. Mosaic
Ans.: b. sharpen

Smooth – So�ens the contrast of an image


Aging – Simulates the effects of �me on a picture. Can be applied several �mes. A further dialog box opens to adjust
the aging level.
Mosaic – Joins groups of pixels into a single area of one color.

[6] ___________ provide Internet access by transmi�ng digital data over wires of a local telephone network.
a) ISP b) DSL c) Dial-up connec�on d) Modem
Ans.: b) DSL

ISP – A company that provides an internet


Dial-up connec�on – Dial-up Internet access is a form of Internet access that uses the facili�es of the public switched
telephone network (PSTN) to establish a connec�on to an Internet service provider.
Modem – Á modem is a device that converts digital computer signals into a form (analog signals) that can travel over
phone lines. It also re-converts the analog signals back into digital signals. The word modem is derived from its func�on
Modulator / DEModulator.

Q. 3 Answer any 5 out of the given 6 ques�ons (1 x 5 = 5 marks)


[1] ____________ is specifically designed to minimize the results according to a set rule that we define in a
spreadsheet.
a. Goal Seek b. Scenario c. Solver d. Subtotal
Ans.: c. Solver
Goal Seek – using Goal Seek op�on under Tools menu, you can discover what values will produce the result that you
want.
Scenario – Scenarios are a tool to test “what-if” ques�ons. Each scenario is named, and can be edited and formated
separately. When you print the spreadsheet, only the content of the currently ac�ve scenario is printed.
Subtotal – SUBTOTAL is a func�on listed under the Mathema�cal category when you use the Func�on Wizard (Insert
> Func�on). Because of its usefulness, the func�on has a graphical interface.

[2] Sahil and his partners have created a list of their company employees in one of the spreadsheets in the office.
Now the rest of the task they want to complete from home. Which op�on they should use to access the same
Spreadsheet from home?
a. Consolidate Worksheet b. Link Worksheet
c. Merge Worksheet d. Lock Worksheet
Ans.: b. Link Worksheet

[3] ______________ can help to clarify the rela�on between cells while using “Mul�ple Opera�ons”.
a. Detec�ve b. Solver c. Naviga�on d. Hyperlink
Ans.: b. Solver

[4] Iden�fy the part of a Spreadsheet using which a user can manage mul�ple sheets.
a. Status Bar b. Sheet Tab c. Formula Bar d. Worksheet Area
Ans.: b. Sheet tab

[5] Spreadsheet so�ware can find the changes by ________ sheets.


a. Changing b. Comparing c. Renaming d. Edi�ng
Ans.: b. Comparing

[6] At the botom of each worksheet, le� tab indicates the ____________ of the worksheet in a workbook.
a. Size b. 3 Type c. Name d. Color
Ans.: c. Name
Q. 4 Answer any 5 out of the given 6 ques�ons (1 x 5 = 5 marks)
[1] It enables users to view, enter, and change data directly in database objects.
a. Report b. Query c. Form d. Database
Ans.: c. Form

[2] There are _ types of Rela�onships in a table of a database.


a. One b. 3 c. 4 d. Many
Ans.:b. 3

[3] A Rela�onal database uses ____________ commands which is a standard user applica�on that provides an easy
programming interface for database interac�on.
a. Access b. Python c. SQL d. Protocol
Ans.:c. SQL

[4] Suraj wants to create a database for his clients. For this purpose, she needs to store the Email IDs of his clients.
Which datatype should he use to accomplish this purpose?
a. Numeric b. Varchar c. Binary d. Boolean
Ans.: b. varchar

[5] Geet has writen a SQL query in SQL view. But he doesn’t know how to execute the query using keyboard keys.
Suggest him the shortcut key to complete the task.
a. Enter b. Ctrl + E c. Space bar d. F5
Ans.: d. F5

[6] A table can have only _ primary key in a database.


a. 1 b. 2 c. 3 d. Many
Ans.: a. 1

Q. 5 Answer any 5 out of the given 6 ques�ons (1 x 5 = 5 marks)


[1] ____ key is an accessibility feature that assists people having difficulty in using keyboard and mouse.
a. Guide b. S�cky c. Serial d. Home
Ans.: c. Serial

[2] Anaisha is a wildlife photographer. She wants to create her website where she can update the pictures and discuss
about different events, reviews, announcements, news etc. Suggest her a suitable op�on to complete the task.
a. Blog b. E-Mail c. Instant Messaging d. Mail Merge
Ans.: a. Blog

[3] Which of the following is not a web browser?


a. Safari b. Internet Explorer c. Google d. Firefox
Ans.: c. Google

[4] Which out of the following is the best example of a strong password?
a. 9412356789 b. 14Hd{]$_Sb10 c. HarryPoterSeries d. 14Oct2004
Ans.: b. 14Hd{]$Sb10

[5] Bharat has set up his company with 20 computers in a building. He wants to connect all the computers together.
Which type of Network will be the best suitable for this purpose?
a. LAN b. WAN c. PAN d. MAN
Ans.: a. LAN

[6] IP stands for _____________________ .


a. Interna�onal Protocol b. Internet Protocol
c. Intranet Protocol d. Interpersonal Protocol
Ans.: b. Internet Protocol

SECTION B: SUBJECTIVE TYPE QUESTIONS


Answer any 3 out of the given 5 ques�ons on Employability Skills (2 x 3 = 6 marks)
Answer each ques�on in 20 – 30 words.
Q. 6 What are the learning objec�ves of communica�on?
Ans.: Learning objec�ves of Effec�ve communica�on are:
1. Sending, receiving and understanding the message or informa�on
2. Development of Interposal Skills
3. To express effec�vely with maximum efficiency

Q. 7 Why do we say that an entrepreneur should be open-minded?


Ans.: The smartest and most successful people welcome new ideas and diverse perspec�ves, allowing them to see
more opportuni�es ahead of them and beter solu�ons to problems. Open-minded entrepreneurs are able to
strategize beter because they can listen to varying and look at a problem through mul�ple lenses.

Q. 8 How is self-regula�on connected to the ability to work independently?


Ans.: Self-regula�on and the ability to work independently are closely connected. Here’s how:
1. Goal Se�ng: Self-regulated individuals can set clear, achievable goals for themselves, which is crucial for
working independently. Without constant guidance or supervision, they can define their objec�ves and map
out the steps needed to achieve them.
2. Time Management: Effec�ve self-regula�on involves managing one’s �me efficiently. This is essen�al for
working independently, as individuals need to priori�ze tasks, adhere to deadlines, and avoid procras�na�on.
3. Mo�va�on: Self-regulated individuals possess intrinsic mo�va�on, driving them to complete tasks and
pursue goals even without external incen�ves. This self-mo�va�on is key to maintaining produc�vity and
focus when working independently.
4. Problem-Solving: Self-regula�on includes the ability to handle challenges and setbacks. When working
independently, individuals must be able to iden�fy problems, devise solu�ons, and adapt their strategies
without relying on others.
5. Self-Monitoring: Self-regulated individuals constantly assess their progress and adjust their ac�ons
accordingly. This self-monitoring ability ensures that they stay on track and make necessary improvements
when working independently.

Q. 9 How we can prevent computer against atack by viruses.


Protec�ng your computer from viruses involves a combina�on of good prac�ces and protec�ve so�ware. Here are
some key steps to keep your computer safe:
1. Install An�virus So�ware: Ensure that you have reliable an�virus so�ware installed on your computer. This
so�ware helps detect and remove viruses before they can cause harm.
2. Keep So�ware Updated: Regularly update your opera�ng system, an�virus so�ware, and other applica�ons.
Updates o�en include security patches that protect against newly discovered vulnerabili�es.
3. Use Strong Passwords: Create strong, unique passwords for your accounts and change them regularly. Avoid
using easily guessable passwords.
4. Enable Firewall: Make sure your computer's firewall is enabled. A firewall helps block unauthorized access to
your computer.
5. Be Cau�ous with Email Atachments and Links: Do not open email atachments or click on links from
unknown or suspicious sources. These can o�en contain viruses or malware.
6. Download from Trusted Sources: Only download so�ware and files from reputable websites and sources.
Avoid downloading from unknown or untrusted sites.
7. Use a VPN: When using public Wi-Fi, use a virtual private network (VPN) to encrypt your internet connec�on
and protect your data from hackers.
8. Backup Your Data: Regularly back up important data to an external drive or cloud storage. This ensures you
can recover your data in case of a virus atack.
9. Educate Yourself and Others: Stay informed about the latest cybersecurity threats and educate yourself on
how to recognize and avoid them.
Q. 10 “Green economy promotes sustainable development”. Jus�fy the statement.
The statement "Green economy promotes sustainable development" highlights the interconnectedness between a
green economy and the principles of sustainable development. Let's break down how a green economy contributes
to sustainable development:
1. Environmental Protec�on: A green economy priori�zes the protec�on and preserva�on of natural resources.
By promo�ng renewable energy sources, reducing carbon emissions, and encouraging eco-friendly prac�ces,
it helps mi�gate environmental degrada�on and combat climate change. This leads to a healthier planet and
ensures that natural resources are available for future genera�ons.
2. Economic Growth: A green economy fosters innova�on and the development of new technologies, which
can drive economic growth. Investments in renewable energy, energy efficiency, and sustainable agriculture
create new job opportuni�es and s�mulate economic ac�vity. This economic growth is more resilient and
less dependent on finite resources, contribu�ng to long-term stability.
3. Social Equity: Sustainable development encompasses social equity, ensuring that the benefits of economic
growth are distributed fairly. A green economy promotes social equity by crea�ng green jobs, improving
access to clean energy, and enhancing the quality of life for communi�es. This inclusive growth reduces
poverty and addresses social inequali�es.
4. Resource Efficiency: A green economy emphasizes efficient use of resources, reducing waste and minimizing
the ecological footprint. Prac�ces such as recycling, sustainable farming, and circular economy principles
ensure that resources are used responsibly and waste is minimized. This efficient resource management
supports the sustainability of ecosystems and economies.
5. Health and Well-being: By reducing pollu�on and promo�ng clean technologies, a green economy improves
public health and well-being. Access to clean air, water, and sustainable food sources leads to healthier
communi�es. This contributes to the overall quality of life and supports the goals of sustainable
development.

Answer any 4 out of the given 6 ques�ons in 20 – 30 words each (2 x 4 = 8 marks)


Q. 11 What do you understand by Anchoring in Word Processor?
In a word processor, "anchoring" typically refers to the way objects, such as images, text boxes, or shapes, are
posi�oned and linked within the text. Anchoring determines how these objects move and behave when the text
around them is edited. There are a few common types of anchoring:
1. Inline with Text: The object is treated as a character within the text. It moves along with the text as you type
or delete content.
2. Fixed/Absolute Posi�on: The object is anchored to a specific loca�on on the page. It remains in the same
place even if the text around it changes.
3. Anchor to Paragraph: The object is linked to a specific paragraph. It moves with the paragraph but maintains
its rela�ve posi�on within the text.
4. Anchor to Page: The object is linked to a specific page. It stays on that page regardless of changes to the
surrounding text.
5. Floa�ng Object: The object is anchored to a specific posi�on rela�ve to the page margins or text flow. It can
move independently of the text.

Q. 12 What do you mean by Sor�ng in a Spreadsheet?


Sor�ng in a spreadsheet refers to arranging data in a specific order based on one or more columns. This can be done
in either ascending (smallest to largest, A-Z) or descending (largest to smallest, Z-A) order. Sor�ng helps in organizing
and analyzing data more effec�vely. Here are some common ways to sort data in a spreadsheet:
1. Single Column Sor�ng: Arrange the data in a single column alphabe�cally or numerically. For example,
sor�ng a list of names from A to Z.
2. Mul�-Column Sor�ng: Arrange data based on mul�ple columns. For example, first sor�ng by last name, and
then by first name within each last name group.
3. Custom Sor�ng: Define a specific order for sor�ng, such as sor�ng months of the year in chronological order
(January, February, etc.) instead of alphabe�cally.

Q. 13 State any four e�quetes to be followed while cha�ng on the internet.


Here are four important e�quetes to follow while cha�ng on the internet:
1. Be Respec�ul: Always maintain a respec�ul tone and be mindful of others' feelings. Avoid using offensive or
inappropriate language, and refrain from making personal atacks or derogatory comments.
2. Avoid All Caps: Typing in all capital leters can be perceived as shou�ng. Use normal sentence case to ensure
your message is clear and doesn't come across as aggressive.
3. Stay on Topic: Keep the conversa�on relevant and focused on the topic at hand. Avoid derailing the
discussion with unrelated comments or spamming the chat with off-topic messages.
4. Be Pa�ent: Understand that people may have different response �mes. Allow others �me to reply and avoid
sending mul�ple messages if you don't receive an immediate response.

Q. 14 How is Goal Seek different from Solver in a Spreadsheet?


Goal Seek and Solver are both powerful tools in spreadsheet applica�ons like Microso� Excel, but they serve
different purposes and have dis�nct func�onali�es:
Goal Seek:
• Purpose: Goal Seek is used to find a specific value for a single variable that will achieve a desired result in a
formula. It essen�ally works backwards from the result to find the input value needed.
• Simplicity: Goal Seek is simple and easy to use. It is best suited for straigh�orward problems with one
variable.
• Single Constraint: Goal Seek can handle only one input variable and one target value at a �me.
• Example: If you want to determine what sales amount is needed to achieve a target profit, you can use Goal
Seek to find that specific sales value.
Solver:
• Purpose: Solver is a more advanced tool used for op�miza�on problems. It can find the op�mal value
(maximum or minimum) for a formula in one cell, subject to constraints on the values of other cells.
• Complexity: Solver is more complex and versa�le. It can handle mul�ple variables and constraints, making it
suitable for more complicated problems.
• Mul�ple Constraints: Solver can manage mul�ple input variables and constraints simultaneously.
• Example: If you need to maximize profit by adjus�ng mul�ple factors like produc�on levels, costs, and
resource alloca�on, you can use Solver to find the best combina�on of these variables.

Q. 15 Differen�ate between a Primary key and Foreign key.


Primary Key:
1. Uniqueness: A Primary key is a field (or combina�on of fields) that uniquely iden�fies each record in a table.
No two rows can have the same value for the Primary key.
2. Non-Null: A Primary key cannot contain NULL values. Every record must have a valid value for the Primary
key.
3. Single Table: A Primary key is defined within a single table. It ensures the uniqueness of the records within
that table.
4. Example: In a table of Customers, the CustomerID field might serve as the Primary key, uniquely iden�fying
each customer.
Foreign Key:
1. Referen�al Integrity: A Foreign key is a field (or combina�on of fields) that creates a link between two tables.
It references the Primary key in another table, establishing a rela�onship between the records.
2. Can be Null: A Foreign key can contain NULL values, meaning that some records might not have an
associated value in the referenced table.
3. Mul�ple Tables: A Foreign key exists in one table but refers to the Primary key of another table, enforcing
referen�al integrity between the two tables.
4. Example: In a table of Orders, the CustomerID field might serve as a Foreign key, linking each order to a
specific customer in the Customers table.
In summary:
• A Primary key ensures the uniqueness of each record within a single table and cannot be NULL.
• A Foreign key establishes a rela�onship between two tables by referencing the Primary key of another table
and can contain NULL values.

Q. 16 What is the importance of healthy lifestyle? Give any four points related to it.
A healthy lifestyle is vital for overall well-being and helps in preven�ng various health issues. Here are four key points
related to its importance:
1. Improved Physical Health: Maintaining a healthy lifestyle through regular exercise, a balanced diet, and
adequate sleep strengthens the immune system, reduces the risk of chronic diseases such as heart disease,
diabetes, and obesity, and enhances overall physical fitness.
2. Enhanced Mental Well-being: A healthy lifestyle posi�vely impacts mental health by reducing stress, anxiety,
and depression. Ac�vi�es like exercise, medita�on, and social interac�ons release endorphins, which
improve mood and promote a sense of well-being.
3. Increased Energy Levels: Proper nutri�on, regular physical ac�vity, and sufficient rest boost energy levels and
improve stamina. This allows individuals to perform daily tasks more efficiently and stay ac�ve throughout
the day.
4. Beter Longevity: Adop�ng a healthy lifestyle contributes to a longer life expectancy. By preven�ng illnesses
and maintaining overall health, individuals can enjoy a higher quality of life and remain ac�ve and
independent as they age.

Answer any 3 out of the given 5 ques�ons in 50– 80 words each (4 x 3 = 12 marks)
Q. 17 What do you understand by the term Table of Contents? List the characteris�cs of a good ‘Table of content’ in a
word processor.
A Table of Contents (TOC) in a word processor is a list that outlines the headings and subheadings in a document,
along with their corresponding page numbers. It serves as a roadmap, helping readers navigate the document
efficiently by providing an overview of the content and its structure.
Here are the characteris�cs of a good Table of Contents in a word processor:
1. Clarity and Simplicity: The TOC should be easy to read and understand. Use clear and concise headings that
accurately reflect the content of each sec�on.
2. Accurate Page Numbers: Ensure that the page numbers listed in the TOC match the actual page numbers in
the document. This helps readers quickly locate specific sec�ons.
3. Consistent Forma�ng: Use consistent forma�ng for headings and subheadings, such as font style, size, and
indenta�on. This creates a clean and professional appearance.
4. Logical Hierarchy: Organize the TOC in a logical hierarchy, with main headings and subheadings properly
indented. This helps readers understand the structure and flow of the document.
5. Automa�c Updates: U�lize the word processor's feature to automa�cally update the TOC. This ensures that
any changes to the document's headings or page numbers are reflected in the TOC without manual
adjustments.
6. Clickable Links: In digital documents, include clickable links in the TOC that allow readers to jump directly to
specific sec�ons. This enhances naviga�on and user experience.
7. Comprehensive Coverage: Include all major sec�ons and subsec�ons in the TOC, but avoid lis�ng too many
minor details that can cluter the content.

Q. 18 Explain the term ‘Scenarios’ in rela�on to the Spreadsheets with example.


In the context of spreadsheets, scenarios refer to different sets of input values that can be used to model and analyze
various outcomes or situa�ons. Scenarios are a part of what-if analysis, allowing users to explore the impact of
different assump�ons or variables on the results.
Example:
Imagine you are a sales manager, and you want to forecast your revenue for the next quarter. You have three
different scenarios in mind: op�mis�c, pessimis�c, and most likely. Each scenario will have different values for key
variables like sales volume, unit price, and costs.
1. Op�mis�c Scenario:
o Sales Volume: 10,000 units
o Unit Price: $50
o Costs: $200,000
2. Pessimis�c Scenario:
o Sales Volume: 5,000 units
o Unit Price: $45
o Costs: $220,000
3. Most Likely Scenario:
o Sales Volume: 7,500 units
o Unit Price: $48
o Costs: $210,000

Q. 19 Explain different kinds of online threats.


Here are some common types of online threats:
1. Malware: Short for malicious so�ware, malware includes viruses, worms, trojans, ransomware, spyware, and
adware. Malware can damage your computer, steal personal informa�on, and disrupt your system's
opera�ons.
2. Phishing: This involves fraudulent atempts to obtain sensi�ve informa�on, such as usernames, passwords,
and credit card details, by disguising as a trustworthy en�ty in electronic communica�ons. Phishing o�en
comes in the form of emails or messages that appear to be from legi�mate sources.
3. Ransomware: A type of malware that encrypts a vic�m's files and demands payment (ransom) for the
decryp�on key. Ransomware atacks can cripple individuals, businesses, and even government organiza�ons.
4. DDoS Atacks: Distributed Denial of Service (DDoS) atacks involve overwhelming a server with a flood of
internet traffic, causing it to slow down or crash. This disrupts the normal traffic of a targeted network or
service.
5. Social Engineering: This involves manipula�ng individuals into divulging confiden�al informa�on or
performing ac�ons that may compromise their security. Tac�cs include impersona�on, pretex�ng, and
bai�ng.
6. Man-in-the-Middle (MitM) Atacks: In these atacks, the atacker secretly intercepts and possibly alters the
communica�on between two par�es who believe they are directly communica�ng with each other. This can
lead to data breaches and unauthorized access.
7. SQL Injec�on: This involves inser�ng malicious SQL code into a query input field for execu�on. It allows
atackers to interfere with the queries an applica�on makes to its database, poten�ally accessing or
modifying data.
8. Zero-Day Exploits: These atacks target so�ware vulnerabili�es that are unknown to the so�ware's
developers. Atackers exploit these vulnerabili�es before they are patched or fixed, posing significant security
risks.
9. Botnets: Networks of infected computers (bots) controlled by an atacker (botmaster). These bots can be
used to launch large-scale atacks, distribute spam, or engage in other malicious ac�vi�es.
10. Creden�al Stuffing: This involves using lists of stolen usernames and passwords to gain unauthorized access
to user accounts. Atackers exploit the tendency of individuals to reuse passwords across mul�ple sites.
Q. 20 Explain the term “Referen�al Integrity”. Why is it important in a database?
Referen�al Integrity is a concept in rela�onal database management that ensures the consistency and accuracy of
data by maintaining the defined rela�onships between tables. It is enforced through the use of primary keys and
foreign keys.
Explana�on:
• Primary Key: A unique iden�fier for each record in a table.
• Foreign Key: A field (or combina�on of fields) in one table that refers to the primary key in another table.
Importance of Referen�al Integrity:
1. Data Consistency: Referen�al integrity ensures that rela�onships between tables remain consistent. For
example, if a foreign key references a primary key, any change to the primary key value will be automa�cally
updated in the related tables, maintaining data consistency.
2. Prevents Orphan Records: It prevents orphan records, which are records in a child table that have no
corresponding record in the parent table. This helps maintain data accuracy and reliability.
3. Data Accuracy: By enforcing referen�al integrity, the database ensures that only valid data is entered,
reducing the risk of data entry errors. For instance, a foreign key must have a corresponding primary key
value, preven�ng invalid references.
4. Maintains Rela�onships: Referen�al integrity maintains the logical rela�onships between tables, making it
easier to understand and work with the data. This is crucial for complex databases with mul�ple related
tables.
5. Ease of Maintenance: It simplifies database maintenance by ensuring that changes to data (such as updates
and dele�ons) are automa�cally propagated to related tables, reducing the risk of data anomalies.

Q. 21 Consider the following Vendor table and write the queries for the following:
Table: Datesheet
Sub_Code Sub_Name DateofExam Days

E001 English 11-03-2021 Monday

H002 Hindi 15-03-2021 Friday

S003 Social Sci. 18-03-2021 Monday

S004 Science 21-03-2021 Thursday


i. Write a SQL command to display the records in ascending order by date of exam.
ii. Write a query to display the above date sheet.
iii. Write a query to display the subject name and date of the exam held on ‘Monday’
iv. Write a SQL command to display the date of exam and Sub_Name of Science subject.
Ans.:
(i) SELECT * FROM VENDOR ORDER BY DateofExam ASC;
(ii) SELECT * FROM VENDOR;
(iii) SELECT * FROM Sub_Name, DateofExam WHERE Days = ‘Monday’;
(iv) SELECT * FROM DateofExam, Sub_Name WHERE Sub_Name = ‘Science’;

You might also like