🌟 We hope you're enjoying our content! 🌟

To keep bringing you quality articles, please consider whitelisting our site in your ad blocker. It’s a small step that makes a big difference!

Thank you for your support.

Top Ad unit 728 × 90

Welcome !!! To The World of Programming

OOPS FEATURES

Oops

Information Technology (Code No. 402)

 CBSE Class 10

Information Technology (Code No. 402)
(Sample Paper)

Max. Time: 2 Hours                                                                              Max. Marks: 50

General Instructions:

  1. Please read the instructions carefully.
  2. This Question Paper consists of 21 questions in two sections: Section A & Section B.
  3. Section A has Objective type questions whereas Section B contains Subjective type questions.
  4. Out of the given (5 + 16 =) 21 questions, a candidate has to answer (5 + 10 =) 15 questions in the allotted (maximum) time of 2 hours.
  5. All questions of a particular section must be attempted in the correct order.
  6. SECTION A – OBJECTIVE TYPE QUESTIONS (24 MARKS): This section has 05 questions.

          i. This section has 05 questions.

          ii. Marks allotted are mentioned against each question/part.

          iii. There is no negative marking.

          iv. Do as per the instructions given.

7. SECTION B – SUBJECTIVE TYPE QUESTIONS (26 MARKS):

     i. This section has 16 questions.

     ii. A candidate has to do 10 questions.

     iii. Do as per the instructions given.

     iv. Marks allotted are mentioned against each question/part.

                                                                 Section A

                                                 Objective Type questions

Question 1.

Answer any 4 out of the given 6 questions based on Employability Skills. (4 × 1 = 4)


(i) What is a file? (1)  

(a) A file is a section of main storage used to store data.  

(b) A file is a collection of information that has been given a name and has an extension.  

(c) A file is the part of a program that is used to describe what the program should do.  

(d) A file can be saved only on CDs.


Answer: (b) A file is a collection of information that has been given a name and has an extension.


(ii) In _______, we change from our normal activities to silence. (1)  

(a) meditation  

(b) stress  

(c) worries  

(d) survival


Answer: (a) meditation


(iii) _______ is a common response to danger in all people and animals. (1)  

(a) Internal stress  

(b) Environmental stress  

(c) Survival stress  

(d) Fatigue related stress


Answer: (c) Survival stress


(iv) Effective communication involves (1)  

(a) Speaking only  

(b) Listening only  

(c) Speaking and listening  

(d) Writing and reading


Answer: (c) Speaking and listening


(v) To find a suitable market an entrepreneur performs the functions of (1)  

(a) advertisement and publicity  

(b) appointment of selling agents  

(c) new organization structure  

(d) Both (a) and (b)


Answer: (d) Both (a) and (b)


(vi) What is the meaning of sustainable development? (1)  

(a) Development that focuses on economic growth only  

(b) Development that meets the needs of the present without compromising future generations  

(c) Development that prioritizes social progress over environmental protection  

(d) Development that relies solely on renewable energy sources


Answer: (b) Development that meets the needs of the present without compromising future generations


Question 2.

Answer any 5 out of the given 6 questions. (5 × 1 = 5)


(i) Safari is a web browser developed by _______ (1)  

(a) Google  

(b) Microsoft  

(c) Apple  

(d) None of these


Answer: (c) Apple


(ii) When you define a field for a table, in which of the following parameters is access always considered optional? (1)  

(a) Field name  

(b) Data type  

(c) Field size  

(d) Description


Answer: (d) Description


(iii) A _______ is a language that enables users to access and manipulate data in a database. (1)  

(a) DML  

(b) DCL  

(c) TCL  

(d) DDL


Answer: (a) DML


(iv) _______ include fonts, alignment, borders, background, number formats (for example, currency, date, number), and cell protection in the document. (1)  

(a) Cell style  

(b) Numbering style  

(c) Paragraph style  

(d) Character style


Answer: (a) Cell style


(v) When you apply a _______, you apply a group of formatting effects together in one single step. (1)  

(a) effect  

(b) template  

(c) style  

(d) format


Answer: (c) style


(vi) Akshat wants to store a huge amount of information about his firm in a database. Which type of table organization would be most suitable for this purpose? (1)  

(a) Relational  

(b) Flat file  

(c) Either relational or flat file  

(d) Hierarchical


Answer: (c) Either relational or flat file


Question 3.

Answer any 5 out of the given 6 questions.


(A) …………….. controls the flow of text around an image. [1]  

(a) Text Wrapping  

(b) Drawing objects  

(c) Text box  

(d) Text Art


Answer: (a) Text Wrapping Explanation: Text wrapping is a feature of word processors that refers to the placement of text around images. The wrap settings determine the relation between the text and the graphic.


(B) Which of the following What-lf analysis tools deals with multiple unknown variables? [1]  

(a) Goal Seek  

(b) Solver  

(c) Scenario  

(d) None of these


Answer: (b) Solver Explanation: The Solver is a advanced form of Goal Seek tooL A solver deals with equations with multiple variables. It tries to find out maximum and minimum results from a multiple unknown variables. Goal seek works on single variable where target is first determined and input value is calculated.


(C) A …………….. extracts data from a database as per a condition. [1]  

(a) Forms  

(b) Reports  

(c) Queries  

(d) Table


Answer: (c) Queries Explanation: A database query is a stored object that extracts data from a database as per a condition. Queries present the extracted data in formatted form.


(D) …………….. feature, of operating system help people with disabilities. [1]  

(a) Accessibility  

(b) Access  

(c) Assist  

(d) All of these


Answer: (a) Accessibility Explanation: Every operating system provides an Accessibility feature which helps people with disabilities to use the device. E.g., Magnifier, Narrator, Closed Captioning are some of the Accessibility features provided by Windows


(E) …………….. is used for instant messaging. [1]  

(a) Google Hangouts  

(b) Google Chrome  

(c) Gmail  

(d) All of these


Answer: (a) Google Hangouts Explanation: Google Hangouts is an IM application that allows you to chat from your computer’s desktop, make video calls and do group chats with other Gmail and Google Hangouts users. Gmail is a free email service provided by Google. Google chrome is a web browser developed by Google.


(F) Which of the following is not appropriate to set as primary key? [1]  

(a) Employee’s Identification Number  

(b) Price of book  

(c) Product code  

(d) Admission number of student


Answer: (b) Price of book Explanation: The information stored in the Price of Book field will not be unique. Thus, it is not an appropriate field to set as the primary key.


Question 4.

Answer any 5 out of the given 6 questions. (5 × 1 = 5)


(i) In URL, http://www.arihant.com/index.htm, which component identifies the path of a web page? (1)  

(a) http  

(b) www.arihant.com  

(c) /index, htm  

(d) All of the above


Answer: (c) /index.htm


(ii) What dialog box opens on choosing File → Templates → Manage Templates in Writer? (1)  

(a) The File dialog box  

(b) The Manage Templates dialog box  

(c) The Templates dialog box  

(d) The Record Template dialog box


Answer: (c) The Templates dialog box


(iii) _______ are the ways to produce the data stored in databases and tables in a printed form. (1)  

(a) The File dialog box  

(b) The Manage Templates dialog box  

(c) The Templates dialog box  

(d) The Record Template dialog box


Answer: (c) The Templates dialog box


(iv) Arnab learned about the software that gets installed on the computer without the user’s knowledge. Help him to find the name of the same. (1)  

(a) Spyware  

(b) Malware  

(c) Adware  

(d) None of these


Answer: (a) Spyware


(v) Tamanna wants to know the name of the kind of software that seems useful in the beginning but will cause damage to the computer once installed. What is such a kind of software called? (1)  

(a) Trojan horse  

(b) Worm  

(c) Malware  

(d) Virus


Answer: (a) Trojan Horse


(vi) Which shortcut key is used to make the selected text italic? (1)  

(a) Ctrl + I  

(b) Shift + I  

(c) FI + I  

(d) None of these


Answer: (a) Ctrl + I Also Remember- Ctrl + B for bold, Ctrl + U for Underline, Ctrl + A for Select All

Question 5.

Answer any 5 out of the given 6 questions. (5 × 1 = 5)


(i) If the two departments (HR and IT) access the data simultaneously then only one department will see the updates by the other department. DBMS solves this issue. Thus, DBMS helps to avoid _______ which means if a single database is used by multiple users then it also ensures that the same data is present for all the users. (1)  

(a) Data redundancy  

(b) Data inconsistency  

(c) Data piracy  

(d) Data modification


Answer: (b) Data inconsistency


(ii) Line or paragraph spacing is measured in terms of lines or points, which is referred as _______ (1)  

(a) text wrapping  

(b) PDF  

(c) XPS  

(d) leading


Answer: (d) leading


(iii) Rinky wants to know about the Number data type in Calc. Which of the following statement(s) is/are TRUE about it? (1)  

(a) Numbers are generally raw numbers or dates.  

(b) Numbers can be started with a dollar sign ($) or with some other currency symbols to display as currency.  

(c) By default, the number and date data are aligned to the right in Calc.  

(d) All of the above


Answer: (d) All of the above


(iv) How much space does the DATE/TIME data type hold in Base? (1)  

(a) 2 bytes  

(b) 4 bytes  

(c) 8 bytes  

(d) 10 bytes


Answer: (c) 8 bytes


(v) Which tab is used to create a Table of Contents in a document? (1)  

(a) File tab  

(b) Format tab  

(c) Insert tab  

(d) 10 bytes


Answer: (c) Insert tab


(vi) _______ is a form of electronic commerce that allows customers to directly buy goods or services from a seller on the Internet. (1)  

(a) E-Shopping  

(b) E-ticketing  

(c) E-buying  

(d) E-Delivery


Answer: (a) E-Shopping

Section B
Subjective Type Questions

Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words. (3 × 2 = 6)


Question 6. Explain any 2 Qualities of an entrepreneur.

Answer: 1. Determined 2. Confident


Question 7. In what way does inadequate planning hinder effective communication? (2)

Answer: Poor planning act as a barrier to communication as without adequate planning the result desired due to the communication may not be achieved. So, we need to properly plan what message we want to send before actually sending it.


Question 8. What is an operating system? (2)

Answer: The operating system is the system software that performs all the basic tasks of a computer system. It works like an interface between the user and the computer hardware resources. It is a collection of programs that controls and coordinates the execution of all other tasks and functions in a computer system. It mainly provides an environment to run the software and serves services to the computer hardware.


Question 9. Explain the relationship between self-regulation and goal setting. [2]

Answer: Self-regulation is the ability to control one’s behavior, emotions, and thoughts to achieve some goals. Goal setting is the process of planning and taking active steps to achieve the desired outcome which is only possible through self-regulation.


Question 10. What is the contribution of the entrepreneurs in the execution of Government policies? (2)

Answer: Entrepreneurs make an important contribution in implementing government policies and achieving the national goals. They cooperate with the government for the implementation of development plans in the country.


Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)

Question 11. What do you mean by template? (2) 

Answer: A template is a collection of styles that already have some formatting in place, such as fonts, logos, and line spacing, and can be used as a starting point for almost anything that you want to create. Microsoft Word offers hundreds of free templates, including invoices, resumes, invitations, and form letters, among others.


Question 12. Differentiate between data definition language (DDL) and data manipulation language ’ (DML). 

Answer: (1) Data Definition Language (DDL) is a language that enables a user to create, modify and work with the structure of the database. For, eg., CREATE TABLE. (2) Data Manipulation Language (DML) is a language that enables a user to access or manipulate data in a database. The DML commands help users to query and manipulate data in the existing database. For, eg., SELECT. 


Question 13. What is the role of a foreign key in a database management system (DBMS)? (2)

Answer: In a DBMS, a foreign key establishes a relationship between two tables. It references the primary key of another table, enforcing referential integrity. It ensures data consistency by preventing actions that would violate the defined relationships, such as deleting a record referenced by a foreign key constraint. 


Question 14. Write the steps to insert a record in a Datasheet View. (2)

Answer: The steps to insert a record in a Datasheet View are as follows: 

Step 1: When you create a table, a new blank record automatically appears in the second row of the table. 

Step 2: If you enter data in the last record, a new blank record will automatically appear at the end of the table. 

Step 3: Type data into the fields. 

Step 4: When you have finished adding records in the datasheet, save it and close it.

Please check


Question 15. Differentiate between MAN and WAN. [2]

Answer: 

Internet And WWW

MAN WAN
MAN stands for Metropolitan Area Network WAN stands for Wide Area Network
This type of network is spread over a city. E.g. Cable TV network This type of network is spread across countries. E.g. Internet, Intranet


Question 16. State any two practices for internet security. (2)

Answer: Any two practices for internet security are: 

Use Strong Passwords: A strong password is a combination of alpha-numeric and special characters. 

Do not use your mobile number, friend’s name, etc. for a password. 

Change your password frequently at least once in 2 or 3 weeks. 

Backup Your Data: Always keep copies of your data on CDs, pen drives, etc. This may be helpful in a loss of data situation.


Answer any 3 out of the given 5 questions in 50-80 words each. (3 × 4 = 12)

Question 17. Rita is working on a spreadsheet. She wants to know about the use of the following
                      terms: (4) 
                      (a) Quick Sort (b) Filtering Data

Answer: 

(a) Quick Sort is especially useful when you add new information to a spreadsheet. When a spreadsheet is long, it is usually easier to add new information at the bottom of the sheet, rather than adding it in its correct place. After you have added information, you can sort the records to update the spreadsheet and put the information in its correct place in quick sort. 

(b) When a sheet contains a large amount of data, it can be difficult to find information quickly. In that case, Filters can be used to narrow down the data in your worksheet, allowing you to view only the information you need. In other words, Filters help you to ask questions about your data and retrieve only the relevant information filtering away the undesirable data.


Question 18. Write the SQL commands to answer the questions based on the “WORKER” table.

FIELDS DATA TYPES
WID Integer
Wname Varchar(20)
WDesignation   Char(10)
WCity Varchar(30)
WPhone Char(10)

(a) Create “Worker” table with the following fields 

(b) Display all the records in the Worker table
 
(c) Display the records where city is Delhi 

(d) Define Primary Key

Answer (a) CREATE TABLE, WORKER (WID INTEGER, WNAME VARCHAR (20), WDESIG- NATION CHAR (10), WCITY VARCHAR (30), WPHONE CHAR (10)); 

(b) SELECT * FROM WORKER; 

(c) SELECT * FROM WORKER WHERE WCITY=”DELHI”; 

(d) Primary Key – A primary key is a unique value that identifies a row in a table. A primary key is indexed in the database making it faster for the database to search for a record. The primary key constraint can be applied on one or more than one columns together.



Question 19. Consider the following table PRODUCT (4) 

TABLE: PRODUCT

S_NO P_Name S_Name Qty Cost City
S1 Biscuit Priyagold   120   12.00  Delhi
S2 Bread Britannia 200 25.00 Mumbai  
S3 Chocolate  Cadbury 350 40.00 Mumbai
S4 Sauce Kissan 400 45.00 Chennai

(i) How many fields and records are there in the PRODUCT table? 

(ii) Write SQL queries for the following: 

   (a) Display all Products whose Qty is between 100 and 400. 

   (b) Display S_Name, P_Name, and Cost for all the Products whose Qty is less than 300.
 
   (c) Display all the records alphabetically by S_Name

Answer 

(i) There are 6 fields and 4 records in the table PRODUCT. 

(ii) (a) SELECT* FROM PRODUCT WHERE Qty BETWEEN 100 AND 400; 

      (b) SELECT S _Name, P _Name, Cost FROM PRODUCT WHERE Qty <300 nbsp="" p="">

      (c) SELECT * FROM PRODUCT ORDER BY S_Name;



Question 20. Shubham is learning about DBMS. He wants to know about the following: (4) 

      (a) The purpose of DBMS
 
      (b) Any two uses of DBMS

Answer: 

(a) DBMS (Database Management System) is used to store logically related information at a centralized location. It facilitates data sharing among all the applications requiring it. 

(b) Two uses of the database management system are as follows: DBMS is used to store data at a centralized location. It is used to minimize data redundancy and data inconsistency.

DBMS Unit 3 ...


Question 21. Define “server,” and provide the term for other computers in the network, as well as the types of networking architecture and the likely networking technology in use. [4]

Answer: 

(1) A server is a computer or system that provides resources, data, services, or programs to other
     computers over a network. 

(2) Other computers in the network are called clients. A client is a computer that connects to and
      uses the resources of the server. 

(3) Based on component roles there are two types of networking architecture: 

      (i) Client-server architecture 

      (ii) Peer to Peer architecture 

(4) The networking technology used in this case is Client-Server Architecture. In this type of
      network, each computer is designated a role, either as a server or as a client.


Learn !!! Unit 1- Digital Documentation (Advanced) CBSE Class 10 IT (Code: 402)


Information Technology (Code No. 402) Reviewed by Syed Hafiz Choudhary on October 02, 2024 Rating: 5

No comments:

Contact Form

Name

Email *

Message *

Powered by Blogger.
!-- JavaScript for Ad Block Detection -->