You are on page 1of 7

INFORMATION TECHNOLOGY (Code 402)

SAMPLE QUESTION PAPER -1 CLASS X (2020-21)

Max Time: 2 Hrs. Max. Marks: 50

General Instructions:

• Questions paper has 21 (5 + 16) questions of which 15 (5 + 10) questions must be answered.
• Do as per the instructions given with the questions.
• Section A: Objective type questions (24 marks) – Total Questions 5
• Section B: Subjective Type Questions (26 marks) – Total 16 questions

SECTION A: OBJECTIVE TYPE QUESTIONS

Q 1. Answer any 4 out of given 6 questions on Employability Skills (1 X 4 = 4)

i. Traffic police and city administration use which of the communication means for instant guidance of
the drivers and citizens?

a. Visual b. Written c. Both a) and b) d. Oral

ii. Kunal is working on a school project along with his 5 classmates. This team of 6 students has been
assigned specific, independent tasks at their homes. They are supposed to meet next week to share
their progress after accomplishing their tasks. Which of the following abilities would help Kunal and
his team mates most in completing their independent tasks? Their ability to….

a. work as a team b. work independently c. be self-aware d. None of these

iii. Snigdha went on a jungle safari trip along with her friends. They were riding a jeep and enjoying
the surroundings when they saw a group of wild elephants running towards them. The elephants
seemed angry. Snigdha jumped from the jeep and climbed the big tree to hide herself in its dense
leaves. In which of the following categories should you keep Snigdha’s response to the danger?

a. Fight b. Eustress c. Distress d. Flight

iv. In a spreadsheet, which of the following is the correct form of the formula to multiply two values?

a. =50 * A1 b) =50 * 23 c) =B5 * A3 d. All of these

v. Which of the following is not a myth related to entrepreneurship?

a. No quick success guaranteed b. Easy to do c. More freedom d. Lot of funding is required

vi. According to sustainable development goals, the economic growth of a nation should be which of
the following?

a. Inclusive b. Exclusive c. Always increasing d. Decreasing

Q 2. Answer any 5 out of given 6 questions (1 X 5 = 5)

i. Manish has a multipage document with headings, sub-headings and sub-topics. He wants to apply
formal formatting on the document in least possible time. Which of the following is the best suited
approach for him?

a. Format painter b. Themes c. Template d. Formatting toolbar


ii. Naveen has inserted a large picture in his document covering half the page. He wants to keep the
picture on one side of the page. Which of the features must help him in doing so?

a. Cropping b. Rotating c. Text wrapping d. Resizing

iii. Which of the following actions may increase the size of the image?

a. Text wrapping b. Cropping c. Flipping d. Resizing

iv. Anu could not find certain characters on the keyboard to type in her document. Which feature of
the word processor program should help her?

a. Shapes and special characters b. Shapes and symbols c. Symbols and special characters
d. WordArt

v. Each entry in a Table of Content is a/an _____________ to the topic.

a. External hyperlink b. Internal hyperlink c. Reference d. Data source

vi. The label’s height and width are referred to as which of the following?

a. Vertical pitch b. Horizontal pitch c. Both a) and b) d. Page size

Q 3. Answer any 5 out of given 6 questions (1 X 5 = 5)

i. Raman wants to calculate category-wise average of the sales of items in his shop. Which of the
following spreadsheet feature will help him in this?

a. Scenario b. Sub-total c. Goal seek d. Average function

ii. In the formula, =sales_sheet!B5 * D5, the cell belonging to the current sheet is which of the
following?

a. D5 b. B5 c. Both a) and b) d. None of these

iii. Relative hyperlinks are created on the basis of which of the following?

a. Base address b. Common absolute address c. Linked text d. Linked file

iv. Another name for internal hyperlink is which of the following?

a. Defined name b. Bookmark c. Base address d. Data source

v. Rajeev scored 70% marks in Math and 65% marks in Science. He wants to know how many marks
he needs to achieve to secure at least 90% in English. Which feature of spreadsheet is best suited to
calculate this?

a. Scenario b. Sub-total c. Goal seek d. Macro

vi. Rajeev receives sales report every week from his head office in a standard format. He needs to
perform certain calculations every week. Which feature of spreadsheet is best suited to calculate this?

a. Scenario b. Sub-total c. Goal seek d. Macro

Q 4. Answer any 5 out of given 6 questions (1 X 5 = 5)

i. A database is an organised set of ___________.


a. Tables b. Data c. Forms d. Queries

ii. Incorrect and inconsistent data should not be stored in a database – this is ensured by which of the
following database features?

a. Security b. Data sharing c. Data recovery d. Referential integrity

iii. A database frontend interface is run by which of the following?

a. Database server b. Database client c. DBMS d. Web server

iv. A database table, that stores admission_number, student_name and address, has 900 records.
What is the Degree of the table?

a. 3 b. 1000 c. 2700 d. 300

v. Ritu is the class teacher of class 10th. She is creating a database table to store daily student
attendance if the student is present or not. Which data type is most suitable for such field?

a. Char b. Varchar c. Boolean d. Real

vi. To setup a field as foreign key while designing a table, what should be done?

a. Right click on the desired field b. Use Format toolbar c. Both a) and b) d.
None of these

Q 5. Answer any 5 out of given 6 questions (1 X 5 = 5)

i. Varun is copy-pasting some text in a file. He needs the Ctrl key to remain active without pressing
while he presses C for copy and V for paste. Which feature of operating system should he use?

a. Toggle keys b. Filter keys c. Mouse keys d. Sticky keys

ii. Bluetooth is best suited for which of the following network types?

a. MAN b. PAN c. LAN d. WAN

iii. Google hangout, Facebook messenger and Whatsapp are which of the following types of tools?

a. Instant messaging b. Blogging c. Online classes d. Email

iv. A blog needs to be ______________ for viewing by the people online.

a. Promoted b. Published c. Shared d. Edited

v. Find the odd one out payment mode.

a. Netbanking b. Credit card c. Cash on delivery d. Debit card

vi. In case of any cyberbullying, children must do immediately which of the following?

a. Inform the principal b. Inform the police c. Inform their parents d. Inform their friends
SECTION B: SUBJECTIVE TYPE QUESTIONS

Answer any 3 out of given 5 questions on Employability Skills in 20-30 words (2 X 3 = 6)

6. Briefly describe any 2 features that mainly reveal about ourselves through our body language?
Our facial expressions inform a lot about ourselves. One can easily figure about our mood and
emotions through our facial expressions.
Our gestures and pose also inform about our state of mind. For example, if we are fidgeting during
a conversation that means we are bored. Position of our hands and legs inform our interest in the
conversation such as open hands means we are interested, moving toe means we are getting bored
and want to leave in a hurry.

7. Why eustress is of a very brief duration? Explain with an example.


Eustress is the positive form of stress or good stress. It is of short duration because it usually appears
like a sudden surge in our body. A sudden good news or appreciation by others or recognition for
something give us eustress which passes quickly as the feeling of elation goes away.

8. Do you think, the terms “innovation” and “entrepreneurship” related? How?


An entrepreneur runs a business on budget with constraints of finance and resources hence it is
necessary that the product or service should be innovative to attract customers. If innovation is not
there, the competition will affect the business.

9. What is the benefit of mail merge feature?


Mail merge allows automatic creation of multiple letters from a main document. This feature just
needs the variable data to insert in the main document to generate as many letters as the number
of data records we insert. This process saves time and effort as letters are generated in no time.

10. How do renewable energy sources help environment?


As compared to traditional energy sources, renewable energy sources like solar, wind, geothermal
energy etc. are reusable hence affordable. Energy from these sources is green as it does not harm
environment by dangerous gas emissions or global warming. They do not pollute the environment
and easy to maintain hence waste products are not generated.

Answer any 4 out of given 6 questions in 20-30 words (2 X 4 = 8)

11. What is the basic difference between cropping and resizing a picture?
Cropping a picture means removing the surrounding unwanted part of the picture. While resizing a
picture none of its part is removed. Entire image remains intact.

12. What is the role of “base address” in relative hyperlinking?


The common path to both the source file (that contains the hyperlink) and linked files is
called Base address. So, if the source file and the linked file are sharing a common path,
then hyperlink can be created by omitting the base (common) path. This is called relative
hyperlinking.
This approach keeps the hyperlink in working condition since despite copying or moving
the files, base path remains unchanged.
13. How a macro helps in easing our task in a spreadsheet?
Macro is a set of steps pr instructions recorded or arranged in a logical sequence to perform a task.
Computer treats the macros as executable programs hence a macro takes mere seconds to run and
complete the task which otherwise takes longer time. So, for the complex tasks which we perform
on routine basis, we should create a macro to save time and effort.

14. Why do we need to store data in multiple tables in a database?


Table is a symmetrical structure of columns and rows. If we store all the data in a single table then
management of data will be very difficult since we need to insert, delete and modify records evry
now and then. Deleting and updates will be most difficult and for every insert, repeated or
redundant data will be stored. It will be difficult to perform calculations also. To avoid such
problems, we need to plan multiple tables.

15. Briefly describe the standard flow of an online transaction such as purchase or booking a ticket.
1. User registers on the website.
2. User browses through product catalog.
3. User searches, reviews and adds products to the shopping cart.
4. User reviews cart and finalises the cart contents.
5. User enters shipping address.
6. User enters online payment details.
7. User completes online payment.
8. websites confirms user purchase through email and SMS.
9. Finally, products are delivered to the user’s dispatch address.

16. How fire is a safety hazard over workplace?


Fire is the most dangerous threat for any place. For workplaces which are cluttered and congested
fire can prove fatal for workers. If the workplace contains combustible material such as papers,
books, chemicals, clothes etc. then it can spread quickly. Electric short circuit can also cause fire.
Place prone to fire threat need to have special arrangements to prevent and fight it.

Answer any 3 out of given 5 questions in 50-80 words (3 X 4 = 12)

17. Describe the role of Data source and Main document in the process of mail merge.
As the name suggests, Data source keeps all the variable data that is needed to mere with the main
document such as Names, Address, Pin codes, Department, Phone number, email id etc. These all
are different for different people. Main document contains the common content that needs to go
to each recipient. Main document and data source contents are merged to create unique letters for
each recipient.

18. In what situations Goal Seek and Scenarios are used? Explain with a brief example each.
When we need to assess the impact on any data value by changing other data values, we
use Goal Seek feature. Goal seek allows us to determine the input for a desired output. For
example, how many more students should have scored 70% to make class average 75%?
Or, how many more five stars were needed for a web site to have its rating above 8?
In goal seek, you need to specify 3 items – which cell you want changed, by which value
(output value) and which cell has the input value.
19. What is a database? Briefly describe any 3 application areas of a database.
Organised arrangement of data is called a database. Data is arranged in one or more tables in a
database. Databases are used in all kinds of industries such as schools to keep the details of students
admission, their exam performance details, fess details etc. In businesses like banks and industries
databases are used to store the details of various transactions, customers and products etc. All the
data we see online comes and gets stored in a database like train reservations details, hotel
bookings, online book stores, social media platforms etc.
20. a. Consider the following table SUBSCRIBER structure and explain which field is best suited for
being a primary key and why?
EmailID
Customer Name
Course Type
Fees
A primary key stores unique values in a table and never stores NULL value. No two persons on the
world have same email IDs hence, EmailID is the best suited field to be primary key because
customer names may be duplicate, Course type may also be duplicate, fees, if not paid may be null
or zero but email ID must always be there because customer is uniquely identified here by his/her
email ID.
b. Consider the following table FURNITURE and write the queries for the requirements that follow.

Table: FURNITURE

FURNITURE_CODE DESCRIPTION MATERIAL MRP DISCOUNT PERCENT


F001 Chair Plastic 1200 5
F002 Sofa Wood 85000 12
F003 Chair Wood 3000 8
F004 Table Plastic 3000 10
F005 Table Wood 25000 7
F006 Sofa Leather 85000 10

i. Display the amount to pay after discount along with MRP of all the plastic furniture.
Select FURNITURE_CODE, DESCRIPTION, MRP, AMOUNT AS MRP – ((DISOUNT/100)*MRP)
From FURNITURE
Where MATERIAL = ‘Plastic’

ii. Display the details of all the wooden furniture items whose MRP is more than 20000.
Select * from FURNITURE where MATERIAL = ‘Wooden’ and MRP >20000

21. Briefly describe some best practices for online security.


With online communication and information technology, threats have also risen such as
unauthorised access to data, financial frauds, cyberbullying and harmful programs. To keep
ourselves safe from online threats we need to be a responsible and careful netizen. Sone common
safety practices are:
Use of unique and difficult password for online accounts. Passwords must be complicated and not
easy to guess.
Never sharing personal information with anyone no matter how close someone is.
Keep all the passwords and useful keywords safely.
For online frauds, avoid fancy offers related to money and prizes, perform transactions through
secured portals such as banking app, never pen messages from unknown sources, never download
just any app without confirmation or requirement.
Avoid financial transactions on public networks.
Use genuine software, upgraded antivirus and regularly update operating systems of the devices we
use.
Take parents into confidence in case of cyberbullying.

You might also like