0% found this document useful (0 votes)
21 views3 pages

Answer Key-1 - 240202 - 104711

class 10 Information technology

Uploaded by

Renu Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
21 views3 pages

Answer Key-1 - 240202 - 104711

class 10 Information technology

Uploaded by

Renu Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 3
Answer Key of Sample Papers SAMPLE QUESTION PAPER SECTION-A : OBJECTIVE TYPE QUESTIONS Ans.1. (i) (a) natural resources (ii) (b) de-stressing (iii) (b) Viruses (iv) (©) Ieons (») (4) Bustress (vi) (a) Self-motivation Ans.2. (i) (c) Open office writer (i) (©) taskbar (iii) (d) Operating System (iv) (6) in (») (b) auditory (vi) (c) Internet Service Provider Ans.3. (i) (©) Assistive technology (ii) (6) Cell (iii) (d) All of these (i) (b) Graph (v) (d) Templates (vi) (c) Insert Ans.4. (i) (c) Report (ii) (@) ODS (iii) (@) Two (vi) (a) Tables (vy) (b) IRCTC (vi) (a) Tools Ans.5. (i) (d) All of the above (i) (b) Field (iii) (a) Merge Cells (») (6) Duplicate values (vi) (d) Both (a) and (b) (iv) (a) Shift SECTION-B : SUBJECTIVE TYPE QUESTIONS i. ae ‘Ans.6, 1. Determined 2. Confident ‘Ans.7. A file is a named collection of information stored on a computer and can be a text document, an image, a video, or any other type of digital content. A folder, a directory, is a container for files and other folders to organize and manage digital content on a computer. ‘Ans.8. The word modem is derived from its function modulator/demodulator. Modem is a device that converts digital computer signals into analog signals that can travel over telephone lines. It also reconverts the analog signal to digital signals at the receiving end. ‘Ans.9. A blog can be used to convey messages about personal events, worldwide happenings, announcements, news, reviews etc. The topic of the blog can be anything from personal to professional. A blogger can frequently update information related to his or her interest or (IT SAMPLE PAPERS)-X (67) activities, express his ideas or opinions i specific topics. or share his knowledge by writing articles on formance of a computer i ps1. The pe f a computer can be increased by 2 be temporary files and images. We can use ‘some disk Gaaneas eh eae respi up the unnecessary files, software, which helps us clean 11, A template is @ model document that is used to crea LibreOffice are based on templates. If you do not nec cae sniihanioasae document, by default blank template is used, mplate when you start a new (1) Data Definition Language (DDL) is a lan and work with the structure of the database, Ans. Ans.12. guage that enables a user to " create, modify Or, eg., CREATE TABLE. (2) Data Manipulation Language (DML) is a lane, , manipulate data in a database, The DML commands Rely see ens 8 Uset 10 access oF moe mmands hel a data in the existing database. For, eg., SELECT. ? “S6"® 1 very and manipulate 3. The character formatting options are — Ans. (1) Font ~ To change the font of the Character selected we can use (2) Size of the text - requirement. Son this formatting option. he size of the text can be increased or decreased as per the (3) Bold - The Bold option can be applied to emphasize/highlight the selected character. Ans.14, Data consolidation is a feature that allows you to collect data from different worksheets to one single sheet in the same workbook. This feature also allows the user to perform operations like sum, average, max, min, product, etc on the data to be consolidated ‘Ans.15. Grouping means to group multiple objects together to be treated as a single unit. Thus, grouping allows us to perform various operations like increasing or decreasing the size, changing the position of the grouped objects all at once. ‘Ans.16, (i) Peer to Peer (P2P) architecture Network in which all the computers have an equal status is called peer to peer network. Generally, in such a network, each terminal has an equally competent CPU. (i) DBMS — Database Management System is a computerized record keeping system that enables to create, store, modify, and extract information from a database. (iii) Primary Key - A primary key is a unique value that identifies a row in a table. A primary key is indexed in the database making it faster for the database to search for a record. (iv) Foreign Key — The foreign key identifies a column or set of columns in one table that refers to a column in another table. In other words, we can say that the primary key field of one table is also often present in second table and so it becomes foreign key of the main table. Ans.17. The following types of Styles are supported by Writer— (1) Page Styles - This includes margins, headers and footers, borders and backgrounds. (2) Paragraph Styles — This controls the total appearance of the paragraph such as text alignment, tabs, line spacing, borders and even character formatting. (68) GWeaie seuss Ans.18, Ans.19, Ans.20. Ans.21. a (3) Character Styles = ‘This affects only the selected text within a paragraph, Gad Size of the text, or Bold, Italic and Underline formats. ang (4) Frames Styles ~ These are used to format the frames around the graphics or ty, also includes wrapping text, borders, backgrounds and columns. Wit (a) CREATE TABLE, WORKER (WID INTEGER. WNAME VARCHAR (20), pps, NATION CHAR (10), WCITY VARCHAR (30), WPHONE CHAR (10); 7 (b) SELECT * FROM WORKER; (c) SELECT * FROM WORKER WHERE WCITY="DELHI (@) Primary Key ~ A primary key is a unique value that identifies a row in a table 4 primary key is indexed in the database making it faster for the database to search fo, . record. The primary key constraint can be applied on one or more than one columa, together. The following precautions must be taken to improve online security— (1) Keeping your Username and Password Private Never save your username or password on your devices which are used in sharey environment such as cyber cafe, offices, labs etc. Browsers can also save your personzl data on the local computer that can be used by another person using the same compute (2) Registering with Website Always read the privacy statement of policy whenever you register with outside, the statement of policy will include information about how the website use personal data (3) Do not Share Personal Information Some websites require you to fill out forms containing field such as name, gender, age, email ID School, college, company, etc. Be cautious while filling out such forms the search and verify if it is a trustable website as your information could be used by unauthorised users. (4) Secured Transactions If you to do online shopping for transactions, website stores even your credit card or net banking details as well as your personal information your credit card number, account details, etc. This information can be tracked and used by unauthorised user known as hackers may misuse this information. (b) Sort (@ =AVERAGE(B3:B6) Follow the given steps for creating a table in LibreOffice— © Position the insertion point where you want the table to appear. © Choose Table > Insert Table option. This will display the Insert Table dialogue box. © Enter the number of rows and columns for the table in the Number of Columns and the Number of Rows boxes. © Click on Insert, the table will be created with the columns and rows specified. (69) (IT SAMPLE PAPERS)-X

You might also like