Information Technology (Code No. 402)
CBSE Class 10
Information Technology (Code No. 402)(Sample Paper)Max. Time: 2 Hours Max. Marks: 50
General Instructions:
- Please read the instructions carefully.
- This Question Paper consists of 21 questions in
two sections: Section A & Section B.
- Section A has Objective type questions whereas
Section B contains Subjective type questions.
- Out of the given (5 + 16 =) 21 questions, a
candidate has to answer (5 + 10 =) 15 questions in the allotted (maximum)
time of 2 hours.
- All questions of a particular section must be
attempted in the correct order.
- SECTION
A – OBJECTIVE TYPE QUESTIONS (24 MARKS): This
section has 05 questions.
i. This section has 05 questions.
ii. Marks allotted are mentioned against each question/part.
iii. There is no negative marking.
iv. Do as per the instructions given.
7. SECTION B – SUBJECTIVE TYPE QUESTIONS (26 MARKS):
i. This section has 16 questions.
ii. A candidate has to do 10 questions.
iii. Do as per the instructions given.
iv. Marks allotted are mentioned against each question/part.
Section A
Objective Type questionsQuestion 1.
Answer any 4 out of the given 6 questions based on Employability Skills. (4 × 1 = 4)
Max. Time: 2 Hours Max. Marks: 50
General Instructions:
- Please read the instructions carefully.
- This Question Paper consists of 21 questions in
two sections: Section A & Section B.
- Section A has Objective type questions whereas
Section B contains Subjective type questions.
- Out of the given (5 + 16 =) 21 questions, a
candidate has to answer (5 + 10 =) 15 questions in the allotted (maximum)
time of 2 hours.
- All questions of a particular section must be attempted in the correct order.
- SECTION A – OBJECTIVE TYPE QUESTIONS (24 MARKS): This section has 05 questions.
i. This section has 05 questions.
ii. Marks allotted are mentioned against each question/part.
iii. There is no negative marking.
iv. Do as per the instructions given.
7. SECTION B – SUBJECTIVE TYPE QUESTIONS (26 MARKS):
i. This section has 16 questions.
ii. A candidate has to do 10 questions.
iii. Do as per the instructions given.
iv. Marks allotted are mentioned against each question/part.
Question 1.
Answer any 4 out of the given 6 questions based on Employability Skills. (4 × 1 = 4)
(a) A file is a section of main storage used to store data.
(b) A file is a collection of information that has been given a name and has an extension.
(c) A file is the part of a program that is used to describe what the program should do.
(d) A file can be saved only on CDs.
Answer: (b) A file is a collection of information that has been given a name and has an extension.
(ii) In _______, we change from our normal activities to silence. (1)
(a) meditation
(b) stress
(c) worries
(d) survival
Answer: (a) meditation
(iii) _______ is a common response to danger in all people and animals. (1)
(a) Internal stress
(b) Environmental stress
(c) Survival stress
(d) Fatigue related stress
Answer: (c) Survival stress
(iv) Effective communication involves (1)
(a) Speaking only
(b) Listening only
(c) Speaking and listening
(d) Writing and reading
Answer: (c) Speaking and listening
(v) To find a suitable market an entrepreneur performs the functions of (1)
(a) advertisement and publicity
(b) appointment of selling agents
(c) new organization structure
(d) Both (a) and (b)
Answer: (d) Both (a) and (b)
(vi) What is the meaning of sustainable development? (1)
(a) Development that focuses on economic growth only
(b) Development that meets the needs of the present without compromising future generations
(c) Development that prioritizes social progress over environmental protection
(d) Development that relies solely on renewable energy sources
Answer: (b) Development that meets the needs of the present without compromising future generations
Question 2.
Answer any 5 out of the given 6 questions. (5 × 1 = 5)
(a) Google
(b) Microsoft
(c) Apple
(d) None of these
Answer: (c) Apple
(ii) When you define a field for a table, in which of the following parameters is access always considered optional? (1)
(a) Field name
(b) Data type
(c) Field size
(d) Description
Answer: (d) Description
(iii) A _______ is a language that enables users to access and manipulate data in a database. (1)
(a) DML
(b) DCL
(c) TCL
(d) DDL
Answer: (a) DML
(iv) _______ include fonts, alignment, borders, background, number formats (for example, currency, date, number), and cell protection in the document. (1)
(a) Cell style
(b) Numbering style
(c) Paragraph style
(d) Character style
Answer: (a) Cell style
(v) When you apply a _______, you apply a group of formatting effects together in one single step. (1)
(a) effect
(b) template
(c) style
(d) format
Answer: (c) style
(vi) Akshat wants to store a huge amount of information about his firm in a database. Which type of table organization would be most suitable for this purpose? (1)
(a) Relational
(b) Flat file
(c) Either relational or flat file
(d) Hierarchical
Answer: (c) Either relational or flat file
Question 3.
Answer any 5 out of the given 6 questions.
(a) Text Wrapping
(b) Drawing objects
(c) Text box
(d) Text Art
Answer: (a) Text Wrapping Explanation: Text wrapping is a feature of word processors that refers to the placement of text around images. The wrap settings determine the relation between the text and the graphic.
(B) Which of the following What-lf analysis tools deals with multiple unknown variables? [1]
(a) Goal Seek
(b) Solver
(c) Scenario
(d) None of these
Answer: (b) Solver Explanation: The Solver is a advanced form of Goal Seek tooL A solver deals with equations with multiple variables. It tries to find out maximum and minimum results from a multiple unknown variables. Goal seek works on single variable where target is first determined and input value is calculated.
(C) A …………….. extracts data from a database as per a condition. [1]
(a) Forms
(b) Reports
(c) Queries
(d) Table
Answer: (c) Queries Explanation: A database query is a stored object that extracts data from a database as per a condition. Queries present the extracted data in formatted form.
(D) …………….. feature, of operating system help people with disabilities. [1]
(a) Accessibility
(b) Access
(c) Assist
(d) All of these
Answer: (a) Accessibility Explanation: Every operating system provides an Accessibility feature which helps people with disabilities to use the device. E.g., Magnifier, Narrator, Closed Captioning are some of the Accessibility features provided by Windows
(E) …………….. is used for instant messaging. [1]
(a) Google Hangouts
(b) Google Chrome
(c) Gmail
(d) All of these
Answer: (a) Google Hangouts Explanation: Google Hangouts is an IM application that allows you to chat from your computer’s desktop, make video calls and do group chats with other Gmail and Google Hangouts users. Gmail is a free email service provided by Google. Google chrome is a web browser developed by Google.
(F) Which of the following is not appropriate to set as primary key? [1]
(a) Employee’s Identification Number
(b) Price of book
(c) Product code
(d) Admission number of student
Answer: (b) Price of book Explanation: The information stored in the Price of Book field will not be unique. Thus, it is not an appropriate field to set as the primary key.
Question 4.
Answer any 5 out of the given 6 questions. (5 × 1 = 5)
(a) http
(b) www.arihant.com
(c) /index, htm
(d) All of the above
Answer: (c) /index.htm
(ii) What dialog box opens on choosing File → Templates → Manage Templates in Writer? (1)
(a) The File dialog box
(b) The Manage Templates dialog box
(c) The Templates dialog box
(d) The Record Template dialog box
Answer: (c) The Templates dialog box
(iii) _______ are the ways to produce the data stored in databases and tables in a printed form. (1)
(a) The File dialog box
(b) The Manage Templates dialog box
(c) The Templates dialog box
(d) The Record Template dialog box
Answer: (c) The Templates dialog box
(iv) Arnab learned about the software that gets installed on the computer without the user’s knowledge. Help him to find the name of the same. (1)
(a) Spyware
(b) Malware
(c) Adware
(d) None of these
Answer: (a) Spyware
(v) Tamanna wants to know the name of the kind of software that seems useful in the beginning but will cause damage to the computer once installed. What is such a kind of software called? (1)
(a) Trojan horse
(b) Worm
(c) Malware
(d) Virus
Answer: (a) Trojan Horse
(vi) Which shortcut key is used to make the selected text italic? (1)
(a) Ctrl + I
(b) Shift + I
(c) FI + I
(d) None of these
Answer: (a) Ctrl + I Also Remember- Ctrl + B for bold, Ctrl + U for Underline, Ctrl + A for Select All
Question 5.
Answer any 5 out of the given 6 questions. (5 × 1 = 5)
(a) Data redundancy
(b) Data inconsistency
(c) Data piracy
(d) Data modification
Answer: (b) Data inconsistency
(ii) Line or paragraph spacing is measured in terms of lines or points, which is referred as _______ (1)
(a) text wrapping
(b) PDF
(c) XPS
(d) leading
Answer: (d) leading
(iii) Rinky wants to know about the Number data type in Calc. Which of the following statement(s) is/are TRUE about it? (1)
(a) Numbers are generally raw numbers or dates.
(b) Numbers can be started with a dollar sign ($) or with some other currency symbols to display as currency.
(c) By default, the number and date data are aligned to the right in Calc.
(d) All of the above
Answer: (d) All of the above
(iv) How much space does the DATE/TIME data type hold in Base? (1)
(a) 2 bytes
(b) 4 bytes
(c) 8 bytes
(d) 10 bytes
Answer: (c) 8 bytes
(v) Which tab is used to create a Table of Contents in a document? (1)
(a) File tab
(b) Format tab
(c) Insert tab
(d) 10 bytes
Answer: (c) Insert tab
(vi) _______ is a form of electronic commerce that allows customers to directly buy goods or services from a seller on the Internet. (1)
(a) E-Shopping
(b) E-ticketing
(c) E-buying
(d) E-Delivery
Answer: (a) E-Shopping
Section B
Subjective Type Questions
Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words. (3 × 2 = 6)
Answer: 1. Determined 2. Confident
Answer: Poor planning act as a barrier to communication as without adequate planning the result desired due to the communication may not be achieved. So, we need to properly plan what message we want to send before actually sending it.
Answer: The operating system is the system software that performs all the basic tasks of a computer system. It works like an interface between the user and the computer hardware resources. It is a collection of programs that controls and coordinates the execution of all other tasks and functions in a computer system. It mainly provides an environment to run the software and serves services to the computer hardware.
Answer: Self-regulation is the ability to control one’s behavior, emotions, and thoughts to achieve some goals. Goal setting is the process of planning and taking active steps to achieve the desired outcome which is only possible through self-regulation.
Answer: Entrepreneurs make an important contribution in implementing government policies and achieving the national goals. They cooperate with the government for the implementation of development plans in the country.
Answer: A template is a collection of styles that already have some formatting in place, such as fonts, logos, and line spacing, and can be used as a starting point for almost anything that you want to create. Microsoft Word offers hundreds of free templates, including invoices, resumes, invitations, and form letters, among others.
Answer: (1) Data Definition Language (DDL) is a language that enables a user to create, modify and work with the structure of the database. For, eg., CREATE TABLE. (2) Data Manipulation Language (DML) is a language that enables a user to access or manipulate data in a database. The DML commands help users to query and manipulate data in the existing database. For, eg., SELECT.
Answer: In a DBMS, a foreign key establishes a relationship between two tables. It references the primary key of another table, enforcing referential integrity. It ensures data consistency by preventing actions that would violate the defined relationships, such as deleting a record referenced by a foreign key constraint.
Answer: The steps to insert a record in a Datasheet View are as follows:
Step 1: When you create a table, a new blank record automatically appears in the second row of the table.
Step 2: If you enter data in the last record, a new blank record will automatically appear at the end of the table.
Step 3: Type data into the fields.
Step 4: When you have finished adding records in the datasheet, save it and close it.
Answer:
MAN | WAN |
---|---|
MAN stands for Metropolitan Area Network | WAN stands for Wide Area Network |
This type of network is spread over a city. E.g. Cable TV network | This type of network is spread across countries. E.g. Internet, Intranet |
Answer: Any two practices for internet security are:
Use Strong Passwords: A strong password is a combination of alpha-numeric and special characters.
Do not use your mobile number, friend’s name, etc. for a password.
Change your password frequently at least once in 2 or 3 weeks.
Backup Your Data: Always keep copies of your data on CDs, pen drives, etc. This may be helpful in a loss of data situation.
terms: (4)
Answer:
(a) Quick Sort is especially useful when you add new information to a spreadsheet. When a spreadsheet is long, it is usually easier to add new information at the bottom of the sheet, rather than adding it in its correct place. After you have added information, you can sort the records to update the spreadsheet and put the information in its correct place in quick sort.
(b) When a sheet contains a large amount of data, it can be difficult to find information quickly. In that case, Filters can be used to narrow down the data in your worksheet, allowing you to view only the information you need. In other words, Filters help you to ask questions about your data and retrieve only the relevant information filtering away the undesirable data.
Question 18. Write the SQL commands to answer the questions based on the “WORKER” table.
FIELDS | DATA TYPES |
---|---|
WID | Integer |
Wname | Varchar(20) |
WDesignation | Char(10) |
WCity | Varchar(30) |
WPhone | Char(10) |
Answer (a) CREATE TABLE, WORKER (WID INTEGER, WNAME VARCHAR (20), WDESIG- NATION CHAR (10), WCITY VARCHAR (30), WPHONE CHAR (10));
(b) SELECT * FROM WORKER;
(c) SELECT * FROM WORKER WHERE WCITY=”DELHI”;
(d) Primary Key – A primary key is a unique value that identifies a row in a table. A primary key is indexed in the database making it faster for the database to search for a record. The primary key constraint can be applied on one or more than one columns together.
S_NO | P_Name | S_Name | Qty | Cost | City |
---|---|---|---|---|---|
S1 | Biscuit | Priyagold | 120 | 12.00 | Delhi |
S2 | Bread | Britannia | 200 | 25.00 | Mumbai |
S3 | Chocolate | Cadbury | 350 | 40.00 | Mumbai |
S4 | Sauce | Kissan | 400 | 45.00 | Chennai |
Answer
(i) There are 6 fields and 4 records in the table PRODUCT.
(ii) (a) SELECT* FROM PRODUCT WHERE Qty BETWEEN 100 AND 400;
(b) SELECT S _Name, P _Name, Cost FROM PRODUCT WHERE Qty <300 nbsp="" p="">300>
(c) SELECT * FROM PRODUCT ORDER BY S_Name;
Answer:
(a) DBMS (Database Management System) is used to store logically related information at a centralized location. It facilitates data sharing among all the applications requiring it.
(b) Two uses of the database management system are as follows: DBMS is used to store data at a centralized location. It is used to minimize data redundancy and data inconsistency.
Question 21. Define “server,” and provide the term for other computers in the network, as well as the types of networking architecture and the likely networking technology in use. [4]
Answer:
(1) A server is a computer or system that provides resources, data, services, or programs to other
computers over a network.
(2) Other computers in the network are called clients. A client is a computer that connects to and
uses the resources of the server.
(3) Based on component roles there are two types of networking architecture:
(i) Client-server architecture
(ii) Peer to Peer architecture
(4) The networking technology used in this case is Client-Server Architecture.
In this type of
network, each computer is designated a role, either as a server or as a client.
Learn !!! Unit 1- Digital Documentation (Advanced) CBSE Class 10 IT (Code: 402)
No comments: