/**/ Sanjeev Study Hub – Class 11 & 12 Notes, Question Papers, IP & CS Study Material: 2026

Saturday, March 14, 2026

Top 5 Board-Level Networking Case Study Questions for CBSE Class 12 IP 2026 with Answers & Explanations

 Important Section-E Questions for Class 12 IP 2026 with Answers & Explanations

Question 1

A company FutureTech Pvt. Ltd. has four departments in its office building:

  • Administration

  • Finance

  • Marketing

  • Development

Distances between departments:

ConnectionDistance
Administration – Finance45 m
Administration – Marketing60 m
Administration – Development75 m
Finance – Marketing35 m
Finance – Development50 m
Marketing – Development40 m

The company also has a branch office in Chennai, located 1200 km away.

Questions

a) Suggest the most suitable department to install the network switch.

Answer: Finance Department

Reason:
Finance department has comparatively shorter distances with other departments (45 m, 35 m, 50 m).
Installing the switch at a central location reduces cable usage and improves network efficiency.


b) Which transmission media should be used for connecting departments within the building?

Answer: Twisted Pair Cable

Reason:
Twisted pair cables are widely used for LAN connections inside buildings because they are cheap, easy to install, and suitable for short distances.


c) Identify the network type formed between the main office and the Chennai branch.

Answer: WAN (Wide Area Network)

Reason:
WAN connects networks across cities, states, or countries. Since the distance is 1200 km, it forms a WAN.


d) Name the device used to connect these networks.

Answer: Router

Reason:
Routers connect different networks and control the flow of data packets between them.


Question 2

A university has the following departments:

  • Library

  • Computer Lab

  • Administration

  • Examination Cell

Distances between departments:

ConnectionDistance
Library – Computer Lab25 m
Library – Administration35 m
Library – Examination50 m
Computer Lab – Administration30 m
Computer Lab – Examination40 m
Administration – Examination20 m

The university wants to connect its campus with another campus 450 km away.


Questions

a) Suggest the best place to install the network switch.

Answer: Administration Department

Reason:
Administration has relatively shorter and balanced distances (35 m, 30 m, 20 m) with other departments, making it the central point of the network.


b) Which cable will be suitable for interconnecting the departments?

Answer: Ethernet (Twisted Pair) Cable

Reason:
Ethernet cables support high-speed data transmission within LAN networks inside buildings.


c) What type of network will connect the two campuses?

Answer: WAN

Reason:
A connection covering large geographical areas such as cities or states is categorized as WAN.


d) Which device connects a LAN to the internet?

Answer: Router

Reason:
Routers act as gateways between internal networks and external networks such as the internet.


Question 3

A hospital has four departments:

  • Emergency

  • Pharmacy

  • Laboratory

  • Billing

Distances between departments:

ConnectionDistance
Emergency – Pharmacy20 m
Emergency – Laboratory45 m
Emergency – Billing30 m
Pharmacy – Laboratory35 m
Pharmacy – Billing25 m
Laboratory – Billing40 m

The hospital wants to connect its network with another hospital 700 km away.


Questions

a) Suggest the best department to place the network switch.

Answer: Pharmacy

Reason:
Pharmacy department has shorter average distances (20 m, 35 m, 25 m) with other departments, which makes it the optimal central location.


b) Which network topology is commonly used with switches in such networks?

Answer: Star Topology

Reason:
In star topology, all devices connect to a central switch, making the network easy to manage and troubleshoot.


c) What type of network will connect the two hospitals?

Answer: WAN

Reason:
Networks spanning large distances across cities form a Wide Area Network.


d) Which device controls the data path between networks?

Answer: Router

Reason:
Routers analyze destination addresses and forward data packets through the best path.


Question 4

A publishing company has four departments:

  • Content Writing

  • Editing

  • Designing

  • Printing

Distances between departments:

ConnectionDistance
Content – Editing30 m
Content – Designing55 m
Content – Printing70 m
Editing – Designing25 m
Editing – Printing45 m
Designing – Printing35 m

The company also has another office 1000 km away.


Questions

a) Which department is the most suitable for installing the switch?

Answer: Editing Department

Reason:
Editing has shorter and balanced distances (30 m, 25 m, 45 m) compared to others, making it the central connection point.


b) Which cable is most appropriate for connecting devices inside the office?

Answer: Twisted Pair Cable

Reason:
It is cost-effective and commonly used in LAN environments.


c) What type of network connects the two offices?

Answer: WAN

Reason:
The connection spans long distances between cities, so it is classified as a WAN.


d) Which device directs data packets between networks?

Answer: Router

Reason:
Routers determine the best path for data transmission between multiple networks.


Question 5

A bank has four sections:

  • Customer Service

  • Accounts

  • Loan Department

  • IT Department

Distances between sections:

ConnectionDistance
Customer Service – Accounts25 m
Customer Service – Loan40 m
Customer Service – IT60 m
Accounts – Loan30 m
Accounts – IT45 m
Loan – IT35 m

The bank has another branch 1500 km away.


Questions

a) Which department is the best location to install the switch?

Answer: Accounts Department

Reason:
Accounts department has balanced distances to all other sections, making it the most efficient central point.


b) Which cable will be used for internal networking?

Answer: Ethernet / Twisted Pair Cable

Reason:
Twisted pair cables are standard LAN cables used for short-distance networking.


c) What type of network will connect the two bank branches?

Answer: WAN

Reason:
Networks connecting different cities over long distances are classified as WAN.


d) Which networking device connects these networks?

Answer: Router

Reason:
Routers connect different LAN networks and allow communication between distant locations.

Note: “Practice these 5 questions thoroughly—I’m confident you can score full marks in them!” 💪📚

Thank You!!!

=================================

Friday, March 13, 2026

Class 12 Informatics Practices 2026: 60 Most Important Questions with Answers for CBSE Board Exam

 The Informatics Practices (065) subject is an important part of the Class 12 curriculum under the Central Board of Secondary Education (CBSE). Every year many students look for important questions that can help them score good marks in the board examination.

To help students prepare effectively for the CBSE Board Exam 2026, we have compiled 100 most important questions with answers based on the latest CBSE syllabus, previous year questions and sample paper trends.

These questions cover all the major topics of Informatics Practices such as:

Students can use these questions for revision, practice and last-minute preparation before the board examination.

📘 Informatics Practices 2026

60 Most Important Questions with Answers


PART 1 – MCQ (1–25)

  1. Which library is used in Python for data analysis?
    Answer: Pandas

  2. What is a DataFrame in Pandas?
    Answer: A two-dimensional tabular data structure consisting of rows and columns.

  3. Which function displays the first five rows of a DataFrame?
    Answer: head()

  4. Which function displays the last rows of a DataFrame?
    Answer: tail()

  5. Which function gives a statistical summary of the data?
    Answer: describe()

  6. What is the full form of CSV?
    Answer: Comma Separated Values

  7. Which command is used to import Pandas?
    Answer: import pandas as pd

  8. What is the full form of SQL?
    Answer: Structured Query Language

  9. Which SQL command is used to retrieve data from a table?
    Answer: SELECT

  10. Which clause is used to filter records in SQL?
    Answer: WHERE

  11. Which clause is used to sort records in SQL?
    Answer: ORDER BY

  12. Which clause is used to group records in SQL?
    Answer: GROUP BY

  13. Which function counts the number of records in SQL?
    Answer: COUNT()

  14. Which function calculates the average value in SQL?
    Answer: AVG()

  15. Which function finds the maximum value in SQL?
    Answer: MAX()

  16. Which function finds the minimum value in SQL?
    Answer: MIN()

  17. Which symbol is used for lists in Python?
    Answer: [ ]

  18. Which symbol is used for dictionaries in Python?
    Answer: { }

  19. Which key uniquely identifies a record in a table?
    Answer: Primary Key

  20. Which key creates a relationship between two tables?
    Answer: Foreign Key

  21. What is the trace of personal data left on the internet called?
    Answer: Digital Footprint

  22. Give one example of data security.
    Answer: Password protection

  23. What is illegal copying of digital content called?
    Answer: Piracy

  24. What is identity theft?
    Answer: Using someone else's personal information without permission.

  25. Give one example of cybercrime.
    Answer: Hacking


PART 2 – Very Short Answer Questions (26–50)

  1. What is Pandas?
    Answer: Pandas is a Python library used for data analysis and data manipulation.

  2. What is a Series in Pandas?
    Answer: A one-dimensional labeled array.

  3. What is a DataFrame?
    Answer: A two-dimensional data structure with rows and columns.

  4. What is a CSV file?
    Answer: A text file in which values are separated by commas.

  5. What is SQL?
    Answer: A language used to manage and manipulate data in a database.

  6. What is a Primary Key?
    Answer: A field that uniquely identifies each record in a table.

  7. What is a Foreign Key?
    Answer: A field used to link two tables.

  8. What is a database?
    Answer: An organized collection of data.

  9. What is the Internet?
    Answer: A global network connecting millions of computers.

  10. What is the World Wide Web?
    Answer: A collection of websites accessed through the Internet.

  11. What is a digital footprint?
    Answer: The record of a user's online activities.

  12. What is data privacy?
    Answer: Protection of personal data from unauthorized access.

  13. What is cybercrime?
    Answer: Crime committed using computers or the internet.

  14. What is hacking?
    Answer: Unauthorized access to a computer system.

  15. What is phishing?
    Answer: A method of stealing personal information using fake emails or websites.

  16. What is malware?
    Answer: Malicious software designed to damage systems.

  17. What is a firewall?
    Answer: A security system that monitors and controls network traffic.

  18. What is cloud computing?
    Answer: Storing and accessing data over the internet instead of a local computer.

  19. What is e-commerce?
    Answer: Buying and selling goods online.

  20. What is e-governance?
    Answer: Government services delivered through the internet.

  21. What are Intellectual Property Rights (IPR)?
    Answer: Legal rights that protect creations of the mind.

  22. What is plagiarism?
    Answer: Copying someone else's work without giving credit.

  23. What is the digital divide?
    Answer: The gap between people who have access to technology and those who do not.

  24. What is data ethics?
    Answer: Ethical guidelines for using data responsibly.

  25. What is social media?
    Answer: Online platforms used for communication and sharing information.


PART 3 – Short Answer Questions (51–60)

  1. Write a Python code to create a DataFrame.

import pandas as pd

data = {"Name": ["Aman", "Riya"], "Marks": [85, 90]}
df = pd.DataFrame(data)

print(df)

  1. Write a Pandas code to read a CSV file.

import pandas as pd

df = pd.read_csv("data.csv")
print(df)

  1. Write a Pandas code to save data to a CSV file.

df.to_csv("data.csv")

  1. Write an SQL query to display all records from a Student table.

SELECT * FROM Student;

  1. Write an SQL query to display students with marks greater than 80.

SELECT * FROM Student
WHERE Marks > 80;

  1. Write an SQL query to sort students by marks in ascending order.

SELECT * FROM Student
ORDER BY Marks;

  1. Write an SQL query to sort students by marks in descending order.

SELECT * FROM Student
ORDER BY Marks DESC;

  1. Write an SQL query to calculate the average marks.

SELECT AVG(Marks)
FROM Student;

  1. Write an SQL query to count the total number of students.

SELECT COUNT(*)
FROM Student;

  1. Write an SQL query to find the highest marks.

SELECT MAX(Marks)
FROM Student;


Thank You!!!
===============================



Thursday, March 12, 2026

Most Important Informatics Practices Questions for Class 12 Board Exam 2026

Class 12 Informatics Practices is an important subject for students preparing for the board examination. Many questions in the exam are based on Python Pandas, SQL queries, data handling, and cyber safety topics.

In this article, we will discuss 10 most important questions of Informatics Practices for Board Exam 2026. Practicing these questions will help students revise key concepts and perform better in the examination.

1. What is a Pandas DataFrame?

Answer:
A DataFrame is a two-dimensional data structure in the Pandas library used to store data in rows and columns, similar to a table or spreadsheet.

Example:

import pandas as pd

data = {'Name':['Aman','Riya','Rahul'],
        'Marks':[85,90,78]}

df = pd.DataFrame(data)
print(df)


2. What is the difference between Series and DataFrame?

Answer:

Series

DataFrame

One-dimensional data structure

Two-dimensional data structure

Contains only one column

Contains multiple columns

Similar to a list or array

Similar to a table


3. How can we read and write a CSV file in Python?

Answer:
In Python, the Pandas library is used to read and write CSV files.

  • read_csv() → used to read a CSV file
  • to_csv() → used to write a CSV file

Example:

import pandas as pd
df = pd.read_csv("student.csv")
df.to_csv("newfile.csv")


4. How can you add and delete a column in a DataFrame?

Answer:

Add a column:

df['Age'] = [18,19,20]

Delete a column:

df.drop('Age', axis=1, inplace=True)


5. What do head() and tail() functions do in Pandas?

Answer:

  • head() → Displays the first five rows of a DataFrame.
  • tail() → Displays the last five rows of a DataFrame.

Example:

df.head()
df.tail()


6. What are DDL, DML and DCL commands in SQL?

Answer:

DDL (Data Definition Language):
Used to define the structure of the database.
Examples: CREATE, ALTER, DROP

DML (Data Manipulation Language):
Used to manipulate data in tables.
Examples: INSERT, UPDATE, DELETE

DCL (Data Control Language):
Used to control access to data.
Examples: GRANT, REVOKE


7. Write SQL queries for the following.

Table: STUDENT (RollNo, Name, Marks)

To display all records:

SELECT * FROM STUDENT;

To display students with marks greater than 80:

SELECT * FROM STUDENT
WHERE Marks > 80;


8. What are Aggregate Functions in SQL?

Answer:
Aggregate functions perform calculations on a group of values and return a single result.

Examples:

  • SUM() → calculates total
  • AVG() → calculates average
  • COUNT() → counts number of records

Example:

SELECT AVG(Marks) FROM STUDENT;


9. What is Digital Footprint?

Answer:
A Digital Footprint is the record of a person's online activities such as social media posts, online searches, and website visits.

Advantages:

  • Helps in building online identity
  • Useful for networking

Disadvantages:

  • Privacy risks
  • Personal information misuse

10. What is Cyber Crime?

Answer:
Cyber crime is any illegal activity carried out using computers or the internet.

Types:

  • Hacking
  • Phishing
  • Identity theft

Prevention:

  • Use strong passwords
  • Avoid clicking unknown links
  • Use antivirus software

 Note : More important questions of Informatics Practices for the 2026 board examination will be shared shortly. Until then, students are encouraged to study these questions thoroughly

Thank You!!!


============================================









Wednesday, March 11, 2026

IP MYSQL QUERIES 2026

 

10 basic SQL queries

Assume a table named STUDENT

RollNo

    Name

    Class

    Marks

    City

1

    Aisha

    12

    85    

    Delhi

2

    Rahul

    12

    72

    Mumbai

3

    Neha

    12

    91

    Delhi

4

    Arjun

    12

    65

    Kolkata

5

    Riya

    12

    88

    Mumbai


1. Display All Records

SELECT * FROM STUDENT;

2. Display Only Name and Marks

SELECT Name, Marks FROM STUDENT;

3. Display Students Scoring More Than 80 Marks

SELECT * FROM STUDENT
WHERE Marks > 80;

4. Display Students from Delhi

SELECT * FROM STUDENT
WHERE City = 'Delhi';

5. Display Students in Descending Order of Marks

SELECT * FROM STUDENT
ORDER BY Marks DESC;

6. Count Total Number of Students

SELECT COUNT(*) FROM STUDENT;

7. Find Maximum Marks

SELECT MAX(Marks) FROM STUDENT;

8. Find Average Marks

SELECT AVG(Marks) FROM STUDENT;

9. Display Students from Mumbai

SELECT Name FROM STUDENT
WHERE City = 'Mumbai';

10. Display Students Whose Name Starts with "R"

SELECT * FROM STUDENT
WHERE Name LIKE 'R%';


Note: Here are some MySQL queries that may be important for the Board Examination 2026. Students are advised to revise these queries carefully before the exam. Additional question sets are currently being prepared and will be published soon.

Thank You!


Wednesday, February 11, 2026

Multiple Choice Qestions (2026)


MULTIPLE CHOICE QUESTIONS

 

1.            Online posting of rumours, giving threats online, posting the victim’s personal information, comments aimed to publicly ridicule a victim is termed as                                              

a.   Cyber bullying

b.   Cyber crime

c.   Cyber insult

d.   All of the above

 

2.            Ankit made a ERP - Enterprise resource planning solution for a renowned university and registered and Copyrights for the same. Which of the most important option; Ankit got the copyrights.

a)     To get society status

b)     To get fame

c)     To get community welfare

d)   To secure finance protection



3.           Which of the following is not an example of Social media platform?

a.   Facebook

       b.   Pinterest

c.   Google+

      d.   Social channel

4.           A responsible netizen must abide by                         

      a.   Net etiquettes

      b.   Communication etiquettes

c.   Social media etiquettes

      d.   All of the above

 

5.           A                            is some lines of malicious code that can copy itself and can have detrimental effect on the computers, by destroying data or corrupting the system.

         a.   Cyber crime

         b.   Computer virus

  c.   Program

        d.   Software

 6.            Which of the following activity is an example of leaving Active digital footprints?

a)                 Surfing internet

b)                 Visiting a website

c)                 Sending an email to a friend

d)                 None of the above

 

7.      You are planning to go for a vacation. You surfed the internet to get answers for following queries.

a)                 Places to visit

b)                 Availability of air tickets and fares

c)                 Best hotel deals

d)   All of these



8.  Legal term to describe the rights of a creator of original creative or artistic work is called……..

a)                 Copyright

b)                 Copyleft

c)                 GPL

d)                 BSD

 

9.  Intellectual Property is legally protected through              



a)                 copyright

b)                 patent

c)                 registered trademark

d)                 All of the above

 

10.                                 includes any visual symbol, word, name, design, slogan, label, etc., that distinguishes the brand from other brands.

a)                 Trademark

b)                 Patent

c)                 Copyright

d)                 None of the above

 

11.       Gaining unauthorised access to a network or computer aur digital files with malicious intentions, is

called                    

a.   Cracking

b.   Hacking

c.   Banging

d.   Phishing

 

12.       Legal term to describe the rights of a creator of original creative or artistic work is called


a.   Copyright

b.   Copyleft

c.   GPL

d.   None of these

 

13.       OSS stands for

a.   Open system security

b.   Open system source

c.   Open software and security

d.   Open source software

 

14.       Any fraudulent business practice that extracts money e from an unsuspecting, ignorant person is called                                 

a.   Stealing

b.   Scam

c.   Violation of copyright

d.   Digital footprint

 

15.                         means no price is to be paid for the software.

a.   Free software


b.  
Freeware

c.   shareware

d.   Open source software

 

16.       Any work / information that exist in digital form idea on internet or on an electronic device, is known as      property.

a.   Licence property

b.   digital property

c.   source code property

d.   software property

 

17.       Discarded electrical or or electronic devices are known as                              .

a.   E waste

b.   Software Waste

c.   Hardware waste

d.   Computer waste

 

18.       The least restrictive open sourcelicence is                     licence.

a.   Apache Licence

b.   MIT licence

c.   GNU licence

d.   BSD licence

 

19.   The original code written by programmers for a software is known as                                    

a.   Object code

b.   Source code

c.   Python code

d.   Language code

 

20.                              means freedom to use the software.

a.   Plagiarism

b.   Freeware

c.   Open software

d.   Free software

 

21.   IAD means                                       

a.   Internet advanced data

b.   Internet addiction disorder

c.   Internet advanced digitalization

d.   Internet aggregate data

 

22.   The                       is the Digital trail of your activity on the internet.

a.   Copyleft

b.   Digital footprint


c.  
Digital data

d.   Internet property

 

23.    The                    the are the permissions given to use a product or someone's creator by the copyright holder.

a.   Source code

b.   Licence

c.   Software authority

d.   Digital rights

 

24.                                 is a licence that gives right opposite to copyright.

a.   Left copy

b.   Digital copy

c.   Copyleft

d.   IPR

 

25.   A software that can be freely accessed and modified is called

a.   synchronous software

b.   package software

c.   open source software

d.   middleware.

 

26.   Which of the following is an advantage of open source software?

a.   You can edit the source code to customise it

b.   you need to be an expert to edit code

c.   you have to pay

d.   can sometimes with two generic for specialist purposes.

 

27.   Which of the following is a disadvantage of open source software?

a.   high quality software with lots of features.

b.   not as customizable

c.   may not have been tested as much as proprietary software so might have bugs.

d.   you can added the source code to customize it

 

28.   Which of the following is an advantage of proprietary software?

a.   It is usually free

b.   thoroughly tested because people are paying to use it.

c.   Not as customizable.

d.   Can sometimes be to generate for specialist purposes.

 

29.   Which of the following is a disadvantage of proprietary software?

a.   You need to be an expert to edit code.

b.   You have to pay for this type of software.

c.   It’s licensed.


d.  
It is launched after proper testing.

 

30.    The generally recognized term for the government protection afforded to intellectual property written

and electronic is called                               

a.   Computer security law.

b.   Aggregate information.

c.   Copyright law

d.   Data security standards.

 

31.   Which of the following would be a creative work protected by copyright?

a.   A list of all Indian President names

b.   A Portrait of your family

c.   A song you wrote

d.   The name of your pet dog

 

32.   Which of the following is not done by cyber criminals?

a.   Unauthorised account access

b.   Mass Attack using trojans as botnets

c.   Email spoofing and spamming

d.   report vulnerabilty in any system

 

33.   What is the name of the IT law that India is having in the Indian legislature?

a.   India's Technology IT Act 2000

b.   India's Digital information technology DIT Act, 2000

c.   India's Information Technology IT Act, 2000

d.   The technology act, 2008.

 

34.   What is meant by the term cybercrime?

a.   Any crime that uses computers to jeopardize or attempt to jeoparadise in national security

b.   The use of computer networks to commit financial or identity fraud

c.   The theft of Digital information

d.   Any crime that involves computers and networks

 

35.    Every activity you perform on the internet is safe for how long?

a.   1 month

b.   1 year

c.   As per my setting

d.   Forever

 

36.    A                              is an injury or disorder of muscles, nerves, tendons, ligaments and joints.

a.   Repetitive Strain injury

b.   Muscle injury

c.   Nervous breakdown


d.  
Joint pain

.

37.                                        is a technology related health condition affecting eyesight.

a.   Computer vision strain

b.   Computer vision syndrome

c.   Eyesight syndrome

d.   Vision imbalance 


Top 5 Board-Level Networking Case Study Questions for CBSE Class 12 IP 2026 with Answers & Explanations

  Important Section-E Questions for Class 12 IP 2026 with Answers & Explanations Question 1 A company FutureTech Pvt. Ltd. has four dep...