You are on page 1of 6

GURU NANAK PUBLIC SCHOOL, SARABHA NAGAR, LUDHIANA

INFORMATION TECHNOLOGY (SUBJECT CODE - 402)


Pre Board II (February) Class X (Session 2022-2023)
Set – B
Max. Time: 2 Hours Max. Marks: 50

General Instructions:
1. Please read the instructions carefully.
2. This Question Paper consists of 21 questions in two sections: Section A & Section B.
3. Section A has Objective type questions whereas Section B contains Subjective type questions.
4. Out of the given (5 + 16 =) 21 questions, a candidate has to answer (5 + 10 =) 15 questions in the
allotted (maximum) time of 2 hours.
5. All questions of a particular section must be attempted in the correct order.
6. SECTION A - OBJECTIVE TYPE QUESTIONS (24 MARKS):
i. This section has 05 questions.
ii. Marks allotted are mentioned against each question/part.
iii. There is no negative marking.
iv. Do as per the instructions given.
7. SECTION B – SUBJECTIVE TYPE QUESTIONS (26 MARKS):
i. This section has 16 questions.
ii. A candidate has to do 10 questions.
iii. Do as per the instructions given.
iv. Marks allotted are mentioned against each question/part.

SECTION A: OBJECTIVE TYPE QUESTIONS


Q.1 Answer any 4 out of the given 6 questions on Employability Skills (1 x 4 = 4 marks)
i. Which of the following is an example of an Operating system? 1
a. Java b. Paint c. Linux d. MS PowerPoint
ii. Which of the following techniques of stress management comes under emotion- 1
oriented approach?
a. Medication and exercises b. Affirmations and imagery
c. Physical reaction d. Adequate sleep
iii. An enterprise owned and controlled by a woman and giving at least 51 per cent of the 1
employment generated in the enterprise to women is ………… entrepreneurship.
a. Agricultural b. social c. women d. small scale
iv. If the displayed system date and time is wrong, you can reset it using: 1
a. accessories b. control panel c. calendar d. settings
v. ……………………. involves being able to control reactions to emotions like frustration or 1
excitement.
a. Self-motivation b. Self-awareness
c. Self-confidence d. Self-regulation
vi. Society plays a role in boosting entrepreneurship by ……………………………… 1
a. providing raw materials b. creating needs and demands
c. both a. and b. d. Neither a. nor b.

Page 1 of 4
Q.2 Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)
i. Serial keys are helpful for those people who have difficulty to use ……………... 1
a. keyboard b. mouse c. both a. and b. d. None of these
ii. Which type of database model is MS Access? 1
a. Flat file b. Relational c. Object-Oriented d. None of these
iii. Which of the following enables you to view data from a table based on a specific 1
criterion?
a. Form b. Macro c. Query d. Report
iv. How many menus are available in Calc? 1
a. 6 b. 7 c. 8 d. 9
v. …………………… controls how graphics are stacked upon each other or relative to text. 1
a. Anchoring b. Alignment c. Wrapping d. Arrangement
vi. Which of the following is not a database model? 1
a. network b. relational c. object oriented d. none of these

Q.3 Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)


i. Which of the following filter will play with the contrast of the image? 1
a. Smooth b. Sharpen c. Both a. and b. d. None of these
ii. Which property ensures that a field cannot be left blank? 1
a. Auto value b. Entry Required c. Default Value d. Length
iii. Number keys can be used to operate mouse when ………………….. is active. 1
a. KeyboardKeys b. MouseKeys
b. NumKeys d. None of these
iv. State whether True or False: 1
“Footer is the text that appears at the top of each page.”
a. True b. False
v. Which of the following symbols is used to separate the first and the last cell address 1
to show cell range in Calc?
a. . b. , c. : d. ;
vi. Macros option is available in OpenOffice Calc in which tab? 1
a. Insert b. Data c. Tools d. Format

Q.4 Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)


i. Which of the following threats attempts to steal your personal information by 1
pretending to originate from a legitimate source?
a. Spamming b. Phishing c. Hacking d. E-mail spoofing
ii. Ashar is running a business and has to send letters to a number of delegates. Using 1
mail merge, he can send the letter typed as ………………………….. and send it to the
people’s mailing addresses stored as …………………………
a. main document, data source b. main document, mailing labels
b. data source, main document d. mailing labels, main document
iii. Which of the following data types allows alphanumeric characters and special 1
symbols?
a. text b. autonumber c. memo d. None of these
iv. Which of the following analyses the network traffic of a computer? 1
a. Anti-virus b. anti-spyware c. firewall d. cookies
v. If you select …………………., then any values modified in the source range are 1
automatically updated in the target range.
a. Link to source data b. Link to sheet data
c. Link to original data d. Link to source range
Page 2 of 4
vi. In goal seek, which field asks us to specify the target range? 1
a. Source data range b. Copy results to
c. Need result at d. Target range

Q.5 Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)


i. Which table view is used to enter data directly into the database? 1
a. Datasheet b. Design c. Layout d. Link
ii. Internet stands for 1
a. Internet Networks b. International Network
c. Inter Network d. Intra Network
iii. We can consolidate data by ………………………. 1
a. Row label b. Column label c. Both a. and b. d. None of these
iv. Sorting means to arrange data in ………………. order. 1
a. increasing b. decreasing c. increasing or decreasing d. None of these
v. How many ways are there to create a template? 1
a. 4 b. 5 c. 3 d. 2
vi. Which type of network is used to connect two computers and a printer? 1
a. LAN b. MAN c. WAN d. PAN

SECTION B: SUBJECTIVE TYPE QUESTIONS

Answer any 3 out of the given 5 questions on Employability Skills (2 x 3 = 6 marks)


Answer each question in 20 – 30 words.
Q.6 Define stress management. Explain the ABC of stress management. 2
Ans- Managing stress is about making a plan to be able to cope effectively with daily
pressures.
A – Adversity or the stressful event B – Beliefs or the way you respond to the event
C – Consequences or actions and outcomes of the event
Q.7 Briefly explain the four steps of effective time management. 2
Ans- 1. Organise: We plan our day-to-day activities. We make a timetable that we follow.
2. Pritortise: We make a to-do list that has all our activities and we rank them in the
order of importance.
3. Control: We have a control over our activities and time. We avoid time wasters like
chatting on the phone and focus on more important things.
4. Track: We identify and note where we have spent our time. This will help us analyse
if we have used our time effectively or not.
Q.8 Differentiate between Worm and Trojan horse. 2
Ans- Worms are viruses that replicate themselves and spread to all files once they attack a
computer. This makes it very difficult to remove them.
A Trojan Horse disguises itself i.e., it appears to be a useful software program but once
it reaches a computer it starts behaving like a virus and destroying data.
Q.9 Mention any two advantages of entrepreneurship. 2
Ans- 1. Fulfil Customer Needs - Demand means a product or service that people want.
Entrepreneurs find out what people want. Then, they use their creativity to come up
with a business idea that will meet that demand.
2. Use Local Materials - Entrepreneurs use the material and people available around
them, to make products at low cost.
3. Help Society - Entrepreneurs have a positive relationship with society. They make
Page 3 of 4
profits through activities that benefit society.
4. Create Jobs - With the growth of a business, entrepreneurs look for more people to
help them. They buy more material, and from more people. The also hire more people
to work for them. In this way, more people have jobs.
5. Sharing of Wealth - Wealth means having enough money to live a comfortable life. As
entrepreneurs grow their business, the people working for them and in related
businesses also grow.
6. Lower Price of Products - As more entrepreneurs sell the same product, the price of
the product goes down. (any two)
Q.10 List any four qualities of a successful entrepreneur. 2
Ans- • They are confident. They believe in themselves and their abilities.
• They keep trying new ideas in their business.
• They are patient. • They work hard.
• They are creative and think differently about business ideas.
• They take responsibility for their actions.
• They take decisions after thinking about them.
• They do not give up when they face a difficulty. (any four)

Answer any 4 out of the given 6 questions in 20 – 30 words each (2 x 4 = 8 marks)


Q.11 What do you mean by grouping of objects? How can you achieve it? 2
Ans- Grouping means to combine several objects together to treat them as a single object.
Select all the objects, then choose Format > Group > Group.
Q.12 What is absolute hyperlink in spreadsheet? Explain how it works. 2
Ans- An absolute hyperlink contains the complete path name for the target file. It will stop
working only if the target is moved. It will not break if the spreadsheet containing the
target is moved.
Q.13 Define Solver in OpenOffice Calc. What are limiting conditions? 2
Ans- Solver deals with equations with multiple unknown variables. It is specifically designed
to minimize or maximize the result according to a set of rules that you define.
The rules set up whether an argument in the formula should be greater than, lesser
than, or equal to the value you enter. These rules are called limiting conditions.
Q.14 Give two differences between primary key and foreign key. 2
Ans- Primary Key – 1. It uniquely identifies a row in a table.
2. It can never be null or have duplicate values.
Foreign Key – 1. It is a column or set of columns in child table that refers to the primary
key of the parent table.
2. It accepts null and duplicate values.
Q.15 State any two differences between web page and website. 2
Ans- Webpage – 1. It is a single document on the Internet that is linked to a specific URL
under the respective domain.
2. It is the content that is displayed on the website.
3. Example – Login page, Contact us page
Website – 1. It is a collection of several documents associated with a specific domain.
2. It is a place to put and display content.
3. Example – Amazon.in, Wikipedia.org
Q.16 Explain Keyloggers and Cookies with respect to Internet Security. 2
Ans- Programs such as keyloggers could be installed on your computer track and transmit
every key that is pressed on a keyboard (keystrokes) to unauthorized users.
Cookies are programs that are created on your local computer when you visit
websites. Though cookies are meant for storing data based on your activity performed
during your earlier visit, they could also be tracked by unauthorized users and possibly
gain access to your personal information.
Page 4 of 4
Answer any 3 out of the given 5 questions in 50 – 80 words each (4 x 3 = 12 marks)
Q.17 Erica wants her colleagues to help her finish an annual progress report for her 4
company. Explain which feature will best help her to track their changes. How would
she identify the changed cells? Explain the alternative solution if she skips recording
the changes. Which menu and command will she use for this second option?

Ans- Record Changes feature. Calc has the feature to track what data was changed, when
the change was made, who made the change and in which cell the change has
occurred. A colored border, with a dot in the upper left-hand corner, appears around a
cell where changes were made. When sharing worksheets reviewers may forget to
record the changes they make. This is not a problem with Calc because Calc can find
the changes by comparing worksheets. Edit > Compare Document
Q.18 Elliott has inserted some images in a document. Help him understand the different 4
settings that control the positioning of graphics.
Ans- 1. Arrangement refers to the placement of a graphic on an imaginary vertical axis.
Arrangement controls how graphics are stacked upon each other or relative to the
text.
2. Alignment refers to the vertical or horizontal placement of a graphic in relation to
the chosen anchor point.
3. Anchoring refers to the reference point for the graphics. This point could be the
page, or frame where the object is, a paragraph, or even a character. An image always
has an anchor point.
4. Text wrapping refers to the relation of graphics to the surrounding text, which may
wrap around the graphic on one or both sides, be overprinted behind or in front of the
graphic, or treat the graphic as a separate paragraph or character.
Q.19 (i) Create a table “Emp” with the fields given below. Also create a primary key column. 4
Column Name Data Type
Emp_Code Integer(5)
Emp_Name Varchar(30)
Branch Varchar(20)
Date of Join Date
(ii) Suggest at least four fields and appropriate data types for a table: Item.
(iii) Categorize the following SQL commands as DDL or DML: TRUNCATE, DROP
(i) Create table Emp (Emp_Code integer(5) primary key), Emp_Name varchar(30),
Ans- Branch varchar(20), Date of Join (Date));
(ii) ItemNo. – char(5)
ItemName – varchar(20)
Price – integer(5)
Quantity – integer(5) (or any other relevant fields)
(iii) Truncate – DDL Drop – DDL
Q.20 Consider the following table “Summer Camp” and write the queries (i) to (iv): 4
ChildID Name DOB Gender Group
109 Maxine 30/06/10 F 2A
214 Christina 09/12/08 F 1B
115 Adam 13/04/09 M 2B
108 Jared 02/02/10 M 1A
(i) Add a new record: (141, “Anne”, “01/08/10”, “1A”)
(ii) Display the children’s ID and names in alphabetical order.
(iii) Change Adam’s group to 2A.
(iv) Delete Maxine’s record.

Page 5 of 4
Ans- (i) Insert into Summer Camp values (141, “Anne”, “01/08/10”, “1A”);
(ii) Select ChildID, Name from Summer Camp order by Name asc;
(iii) Update Summer Camp set Group=”2A” where Name=”Adam”;
(iv) Delete from Summer Camp where Name=”Maxine”;
i)
Q.21 Mason is a student of class X. He wants to purchase stationery online, but he is 4
unaware of Internet and its terminology. Help him understand the following terms:
Ans-
ii) (i) WAP (ii) Blog (iii) Encryption software (iv) Firewall
(i) WAP – Wireless Access Point is a device that helps WiFi devices such as
smartphones, PCs to connect to a network resource such as the Internet.
iii) (ii) Blog – A blog is a discussion style site used by non-technical (or technical users)
users for creating personal web pages. Blogs are similar to an online personal diary
and simple to use.
iv) (iii) Encryption software – It is a software that can encrypt data files to help keep
sensitive data secure from unauthorized access.
v) (iv) Firewall – Firewalls analyse the network traffic and determine if the traffic should
be allowed or not. Firewalls could be software or hardware and can assist in keeping
a computer and a network secure.

Page 6 of 4

You might also like