Class 12 IP Mid Term Exam solution Oct 2022


Wed Nov 2, 2022

Class 12 IP Mid Term Exam solution Oct 2022

 Q: 1 - C 

 Q: 2 - C

 Q: 3 - C

 Q: 4 - A

 Q: 5 - D

 Q: 6 - B

 Q: 7 - D

 Q: 8 - C

 Q: 9 - B

 Q: 10 - B

 Q: 11 - D

 Q: 12 - B

 Q: 13 - A

 Q: 14 - D

 Q: 15 - C

 Q: 16 - B

 Q: 17 - B

 Q: 18 - B

 Q: 19 - Difference between Series and DataFrame

 Q: 20 - Difference Between Switch and Router

 Q: 21 - Explain the three main parts of an optical fibre cable.


The three basic elements of a fiber optic cable are the core, the cladding and the coating.

A fibre optic cable contains three basic components: 

The core, which carries the light signals; 

The cladding, which surrounds the core with a lower refractive index and contains the light; and 

The coating, which protects the fragile core and cladding within it..


Write the difference between HTML and XML



HTML stands for Hypertext Markup Language

XML stands for Extensible Markup Language

Case insensitive

Case sensitive

Predefined Tags

User defined Tags

Used to Create Data

Used to Store and Transport Data

Format Driven

Content Driven

 Q: 22 - What is E-waste? Write any four benifit of e-waste management.


E-waste is a popular, informal name for electronic products nearing the end of their “useful life.”  Or discarded electronic appliances like Computers, televisions, Mobiles, VCRs, stereos, copiers, and fax machines are common electronic products. Many of these products can be reused, refurbished, or recycled.

Benefits of Recycling E-Waste

1. It protects the environment

2. It reduces business costs

3. It supports non-renewable recycling

4. It shows your eco-friendly credentials

5. It’s super easy to recycle e-waste


 Q: 23 - What is plagiarism. Explain types of plagiarism

The act of copying another person’s ideas, words or work and pretending they are your own is called plagiarism.

Types of plagiarism

Complete plagiarism

This overt type of plagiarism occurs when a writer submits someone else’s work in their own name. Paying somebody to write a paper for you, then handing that paper in with your name on it, is an act of complete plagiarism

Direct plagiarism

Direct plagiarism is similar to complete plagiarism in that it, too, is the overt passing-off of another writer’s words as your own. 


Self-plagiarism can be an issue if you write professionally. When you’re commissioned to write for a client, the client owns that work. Reusing your own words for subsequent clients is plagiarizing your own work and can damage your professional reputation

Accidental plagiarism

 Accidental plagiarism is perhaps the most common type of plagiarism because it happens when the writer doesn’t realize they are plagiarizing another’s work.

 Q: 24 -  Difference between drop, truncate and delete.


1. DDL

2. Can not be rollback

3. Used to delete database, table, index etc completly with structure.


1. DDL

2. Can not be rollback

3. Delete all rows of the table at once.

4. Can not delete structure of the table.

5. Where keyword not used


1. DML

2. Can be rollback

3. Used to delete one or more rows from the table one by one.

4. Can be used with or without where clause

 Q: 25 - 


Alter - DDL

Update - DML

Delete - DML

Truncate - DDL

 Q: 26 - What is IPR? Explain different types of IPR.

Intellectual property rights (IPR) refers to the legal rights given to the inventor or creator to protect his invention or creation for a certain period of time. Patents, trademarks, copyrights, and trade secrets are IPR

Types of IPR

  1. Patents
  2. trademarks
  3. copyrights
  4. trade secrets


A patent is a government-granted monopoly to build, sell, and use your invention and prevent others from doing so. If you are issued a patent, it’s usually good for 20 years; however, there are some patents that are only good for 14 years.  After 20 years, your patent expires and anyone can copy, build,and sell your invention. So must be renew.


A trademark can be any word, phrase, symbol, design, or combination of these things that identifies your goods or services


Copyrights protect original works of authorship, such as paintings, photographs, musical compositions, sound recordings, computer programs, books, blog posts, movies, architectural works, and plays.

Trade Secrets

A trade secret is typically something not generally known to the public, where reasonable efforts are made to keep it confidential, and confers some type of economic value to the holder by the information not being known by another party. 

Q: 27 What will be the output of the following code?

from matplotlib import pyplot as plt 

x = [4, 8, 3] y = [1, 6, 9] 



plt.xlabel(“x axis”) 

plt.ylabel(“y axis”) 

Q: 28 -  A company Stock price of five days are a follow: [74.25, 76.06, 69.5, 72.55, 81.5]. Write a program to create a bar chart with the given price.

from matplotlib import pyplot as plt

days = [1,2,3,4,5]

stock = [74.25, 76.06, 69.5, 72.55, 81.5],stock)

plt.title("Daywise Stock Price")

plt.xlabel("Day Number")

plt.ylabel("Stock Price")

Q: 29

import pandas as pd










Table     950

Chair     800

Bag       550

Bottle     70

dtype: int64


Table     1000

Chair      850

Bag        600

Bottle     120

dtype: int64

Bag       600

Bottle    120

dtype: int64

(a) S.index[1]

(b) S=S+50

(c) S.tail(2)

Q: 30

(a) Select  name,salary from emp where salary=(select min(salary) from emp);

(b) Select  avg(salary) from emp;

(c) update emp set salary=salary+salary*0.1;

Q: 31

Explain the following terms 

(a) Cyber Bullying 

Cyberbullying is when someone, bullies or harasses others on the internet and other digital spaces, particularly on social media sites.

(b) Phishing 

Phishing is described as a fraudulent activity that is done to steal confidential user information such as credit card numbers, login credentials, and passwords. It is usually done by using email or other forms of electronic communication by pretending to be from a reliable business entity.

(c) Indian IT Act 

The Information Technology Act, 2000 was enacted by the Indian Parliament in 2000. It is the primary law in India for matters related to cybercrime and e-commerce. The act was enacted to give legal sanction to electronic commerce and electronic transactions, to enable e-governance, and also to prevent cybercrime.

(d) Trojan Horse 

A Trojan horse is any malware that misleads users of its true intent. The victim receives an official-looking email with an attachment. The attachment contains malicious code that is executed as soon as the victim clicks on the attachment. The effects of Trojans can be highly dangerous. Like viruses, they can destroy files or information on hard disks. They can also capture and resend confidential data to an external address or open communication ports, allowing an intruder to control the infected computer remotely.

(e) Mesh Topology

Mesh topology is a type of networking in which all the computers are inter-connected to each other. The connected nodes can be computers, switches, hubs, or any other devices. In this topology setup, even if one of the connections goes down, it allows other nodes to be distributed. It is most reliable topology.

The number of wires required to connect n nodes in mesh topology is n*(n-1)/2

Q: 32

(i) Suggest a cable layout of connections between the compounds. 

(ii) Suggest the most suitable place (i.e. compound) to house the server for this NGO. Also, provide a suitable reason for your suggestion. 

Training Compound - because it has maximum number of computers.

(iii) Suggest the placement of the following devices with justification: 

(a) Repeater (b) Hub/Switch 

Repeater: As per the above layout the repeater can be avoided as all distances between the compounds are <=100m

Hub/Switch - Training Compound as it is hosting the server.

(iv) The NGO is planning to connect its international office situated in Mumbai, which out of the following wired communication link, will you suggest for a very high speed connectivity? 

(a) Telephone analog line (b) Optical fibre (c) Ethernet cable. 

Optical fibre.

(v) Expand the following ● LAN ● PAN

LAN - Local Area Network

PAN - Personal Area Network

Q: 33

(a) 2

(b)  Indi

(c) 32

(d) 5

(e) Ram

Q: 34

(i) Display the games taken up by the students, whose name starts with ‘S’. 

Select game1,game2 from sports where name like 'S%';

(ii) Write a query to add a new column named MARKS. 

alter table sports add column marks float(5,2);

(iii) Write a query to assign a value 200 for Marks for all those, who are getting grade ‘B’ or grade ‘A’ in both GAME1 and GAME2. 

update sports set marks=200 where grade in ('A','B') and grade1 in ('A','B');

(iv) Write the command used to arrange the whole table in the alphabetical order of NAME? 

alter table sports add column marks float(4,2);

Q: 35


loc is label-based, which means that we have to specify the name of the rows and columns that we need to filter out.


 iloc is integer index-based. So here, we have to specify rows and columns by their integer index.


data.iloc[1: 5, 2: 5]


head(): Function which returns the first n rows of the dataset.

tail(): Function which returns the last n rows of the dataset.

import pandas as pd





print(S.head())  #print first 5 elements

print(S.tail())     #print last 5 elements

print(S.head(3))    #print first 3 elements

print(S.tail(3))    #print last elements

print(S.head(-2))   #print first n-2 elements (not print last 2 elements)

print(S.tail(-2))   #print last n-2 elements (not print first 2 elements)


Launch your GraphyLaunch your Graphy
100K+ creators trust Graphy to teach online
S P SHARMA CLASSES 2024 Privacy policy Terms of use Contact us Refund policy