You are on page 1of 4

Information Technology

class 10th (Term II)


·\

Practice p
(Solved) aper 1*
General Instructions
1. There are 8 questions in the qu t·
. . es I0n paper All .
2. Quest1on no. 11s a Case Based Qu r : questions are compulso • Time: 2Hours
• Max. Marks : 25
3. Quest!on no. 2-6 are Short Answe~~;~:· five MCQs. ~ach quesii~n carries one mark.
4. Question no. 7-8 are Long Answer Typ Q . · Each question carries 2marks
• e uestIons Each . ·
5. There 1s no overall choice. However int •• question carries 5marks
I f h • ' erna choices have b
1 • . ·
on y one o t e alternatives in such questions. een provided in some questions. Students have to attempt
• As exact Blue-print and Pattern fo CB
. • r SE Term II exam l
paper IS designed by the author on th b . s s not released yet. So the pattern of this
.
not to consider the pattern of this pa
e as,s of trend
.
of p t CBSE
. . as Papers. Students are advised
per as offic1a/, It ,s Just for practice purpose.

1. Direction Read the fallowing passage and answer the questions that fallows
Netiquette is a combination of the words network and etiquette and is defined as a set of rules for
acceptable online behaviour. Similarly, online ethics focuses on the acceptable use of online resources in an
online social environment. Netiquette exists to help people to communicate more effectively whilst online,
and to avoid unnecessary misunderstandings and potential conflicts. Without a sound understanding of
netiquette you run the risk of displaying abusive or cyber bullying type behaviour without even being aware
of it. N etiquette is a new word and concept for some of us, but a basic understanding of netiquette is
important for everybody that uses the internet.
(i) Netiquette is short for
(a) internet etiquette (b) net etici;~te
(c) net quitte (d) None o t ese
(ii) Which of the following is/are rule(s) for netiquette? .
, . (b) Don't be sarcastic
(a) Respect peopl,e s ~nvacy (d) All of these
(c) Respect other s vtews h
fl ternet sue as .............. ·
(iii) Netiquette includes several aspect;~ so:ial media
(a) e-mail (d) All of these
(c) outline chat ts online.
commen
(iv) Avoid posting . • • •· · · · · · · · · · · · · · · · · (b) polite
(a) offensive (d) All of these
(c) respectfully new
hen you are .
(v) .. ................... ot her w (b) Do not trost
(a) Always truth (d) None of these
(<: ) Sometimes trust
mt
CBSE Term II I Information Techno~~
2. What do You
U mean by th
sage O f e term f d· bT · h
Or computer? computer accessibility? What are the different types O isa 1 ittes t at affect
What should . the
3• State the ad a person do on he anng .
the fire alarm at workplace?
Or E 1 . vantages of a database
xp a1n the WorkpI h .
4• Define th ace azard · t
s m erms of uncontrolled energy.
5. Explai : tedrms field, record and file.
Or D, fi n e a vantages of networking .
. e Ine the following terms
(1) Switch (ii) Hub
6. Why do we use Instant Messaging?
Or Write the st t
eps O create a new post in Qumana.
7
· What are th e myths about entrepreneurship?
Or Explain the role of an entrepreneur as an enterprising man and the person who reinvents organisation.
S. Explain DDL and TCL in terms of database.
Or What is table? Define candidate key. Differentiate between the primary key and alternate key.

Explanations
1. (i) (a) Netiquette is short for Internet etiquette. It Or
states a number of rules that should be followed
while working online. A person should perform the following steps on hearing the
fire alarm at workplace
(ii) (d) A person working online should follow some
rules like one should be open to understand the Close all the windows, doors and switch of non-essential
services.
views of others. People should not infringe the
privacy of other person and behave properly • Walk to the nearest assembly point.
without being abusive. • Follow the emergency signs.
(iii) (d) E-mail, social media and outline chat are only • Escape routes should be lit by emergency lighting so that
possible using Internet and thus netiquettes should people can use them safely if an emergency occurs.
be followed while working on these platforms. • Don't re-enter the building until permission is given by
(iv) (a) One should avoid posting/commenting any the person in charge of the evacuation.
abusive or offensive statement which can hurt • If the fire is small, but only if you are trained to do so use
other's sentiments. fire extinguishers to attempt to put the fire out.
(v) (b) While online, one should not trust anyone as no 3. The advantages of a database are as follows
one knows anyone face-to-face. The ones whom you
Sharing of Data Different users can use the same database
personally know can be trusted upto a little extent.
to access the data according to their needs.
2. Computer accessibility refers to customizing the
Avoids data Redundancy Data redundancy means
functioning of the computer parts. These accessibility
duplication of data. It avoids duplication of data and
options enables people with a disability or impairment
ensures that there is only one instance of certain data.
to use a computer.
Highly Securable Database can be secured by assigning 8
The different types of disabilities that affect the usage of lock to it by using keys.
computer are as follows
Confidentiality The DBMS can ensure different views for
• Eyesight like low vision, color blindness, etc.
the different users of the database. This keeps the
• Dexterity like paralysis of any body part like arms, confidentiality of the data safe.
hands or fingers injured.
Or
• Hearing like deafoess. The workplace hazards in terms of uncontrolled energy are
• Speech impairment (difficulty in understanding). as follows
• Reasoning like learning disability (dyslexia) or • An object that could fall from a height (potential or
difficulty to concentrate. gravitational energy),
cesf
rerm II I Information Technology x m
• Ann1-11way chcmic,J reaction (chemical energy), 7. The myths about entrepreneurship are as follows
, '('he release ofcornpresscd gas or steam (pressure; high
tcniperatun·). (i) It is easy to start a business In reality, starting a
• Enhui!,(lenicnt of hair or clothing in rotating equipment successfol business is a very difficult and
(kinetic t'nergy), or challenging process. The rate of failure of new
ventures is high. Even after a period of seven
• contact with electrodes of a batte1y or capacitor
years, only one third of the enterprises are
(electrical ener!:,ry). profitable. However, it is relatively easy to start a
fields A c~lm~lll within a table that contains only one type very small business than a large company.
4· of inlornwtlOn 1s ca_llecl a field. For e:rample, Narne,
(ii) Lots of money is needed to start a new
Address, Date of Buth and Phone Number are different business A business can be started with limited
llekl names. money. For example, Infosys Technology was
]{ecorcl A set of various fi elds is called a record. All the started with only no,000. In the beginning you
iufonnation in the table in various columns represents a can hire space and equipment.
re~ord. For example, the information entered undt!r the (iii) A startup cannot borrow from banks Under
fields. Name, Addres~, Date of Birth and Phone Number various schemes like MUDRA, budding
indicate the record of students. entrepreneurs also can raise loans from banks.
file A file is a collection of related records. (iv) Talent is more important than industry The
_The advantages of networking are as follows: nature of industry an entrepreneur chooses has a
5
(i) User Communication Network allows users to great effect on success and growth. For example, if
communicate using emails, social networking sites, you enter an industry wherein competition is cut
video conferencing, etc. throat or materials are scarce, you may fail.
(ii) File Sharing By using networking, data or (v) Most startups are successful A large percentage
information can be shared or transfen-ed from one of startups fail. The average profit of an owner
computer to another. managed firm is ~20,000 per month. Very few
entrepreneurs earn more than employees.
(iii) Media and Entertainment Most of the companies
and TV channels use network to broadcast audio and Or
video including live radio and television programmes. Enterprising man A business does not get started by
(iv) Hardware Sharing Hardware components such as itself. It is the entrepreneur who takes the risks and is
printers, scanners, etc. can also be shared. willing to face devastating failure. He braves
For example, instead of purchasing 10 printers, one uncertainty, strikes out on his own, and through native
printer can be purchased and shared among multiple wit, devotion to duty, and singleness of purpose,
somehow creates business and industrial activity where
users thus saving cost.
none existed before. His values and activities have
Or
become integral to corporate culture.
{i) Switch A switch is a device which connects multiple
Person who reinvents organisation An entrepreneur
communication lines together. It is used to create
continuously works to reinvent his organisation. He
temporary connections between two or more devices
knows that change is a constant in and around his
linked to switch. organisation. They initiate changes. Paul Wilken
(ii) Hub A huh is a central device in a network that observes, "Entrepreneurship is a discontinuous
provides common connection among the computers phenomenon, appearing to initiate changes in the
or nodes. It is used in star topology. production process and then disappearing until it
6. Instant messaging is a set of communication technologies reappears to initiate another change." Thus,
used for text based communication between two or more entrepreneurs reinvent organisations by the spirit of
participants over the Internet or other types of networks. change and danger.
Many instant messaging services offer video calling
features, Voice over Internet Protocol (VoIP) and web 8. Data Definition Language (DDL) This command
conferencing services. Web conferencing services can enables you to perform the following tasks
iHit:grate both video calling and instant messaging abilities. • Create, alter, and drop schema objects
Or • Grant and revoke privileges and roles
To treate a new post in Qumana, follow the below steps • Add comments to the data dictionary
(i) Click on New Post option . A window will appear. The CREATE, ALTER and DROP commands require
(ii) 'Iype the title and content of the post in respective exclusive access to the object being acted upon. For
.. fields. example, an ALTER TABLE command fails if another
l i/Cli · user has an open transaction on the specified table.
ck on Publish Post button.
m CBSETerm II I
Information Technology ,
·

Transaction Control Language (TCL) Transaction . . not selected to be the primary


candidate key which 15 ·
control commands manage changes made by DML
commands. These SQL commands are used for managing key. I Con sider table PERSON
Examp e
changes affecting the data. These commands are
Aadhar Num
COMMIT, ROLLBACK and SAVEPOINT. Name Bank Ale_ N~ -
-------~----- 12908809 10991222
Or Shanu
A table consists of a number of rows and columns. Each 19090909 --- 19089090
Gopal
•-H--•---•H••--- 1---·-·-·-·-·--·-·-----

---
record contains values for the attributes. 829821282
Bhavish 19020909
A candidate key is the smallest subset of the super key for ---------- --
which there does not exist a proper subset that is super d Aadhar Num are the candidate
So Bank Ale Numan
key. Any candidate key can be chosen to uniquely
ke~s for the table.
identify the records, it is called primary key.
. ary Key Aadhar Num
Pnm
A primary key is a value that can be used to i~entify a N
Alternate Key Bank Ale um
unique row in a table. While an alternate key is any

You might also like