Class-10 IT Pre Board
Class-10 IT Pre Board
Class-10th
Subject-Information Technology
Time-2 Hrs. M.M-50
Please read the instructions carefully.
This Question Paper consists of 21 questions in two sections: Section A & Section B.
Section A has Objective Type Questions whereas Section B contains Subjective Type Questions.
Out of the given (5 + 16 = 21) questions, a candidate has to answer (5 + 10 = 15) questions in the allotted
(maximum) time of 2 hours.
All questions of a particular section must be attempted in the correct order.
Section A: Objective Type Questions (24 Marks)
This section has 5 questions.
Marks allotted are mentioned against each question/part.
There is no negative marking.
Do as per the instructions given.
Section B: Subjective Type Questions (26 Marks)
This section has 16 questions.
A candidate has to do 10 questions.
Do as per the instructions given.
Marks allotted are mentioned against each question/part.
(Section A) Objective Type Questions
Q-1. Answer any 4 out of the given 6 questions based on Employability Skills. (4 × 1 = 4)
(i) What is a file? (1)
(a) A file is a section of main storage used to store data.
(b) A file is a collection of information that has been given a name and has an extension.
(c) A file is the part of a program that is used to describe what the program should do.
(d) A file can be saved only on CDs.
Answer:
(b) A file is a collection of information that has been given a name and has an extension.
(ii) In _______, we change from our normal activities to silence. (1)
(a) meditation
(b) stress
(c) worries
(d) survival
Answer:
(a) meditation
(iii) _______ is a common response to danger in all people and animals. (1)
(a) Internal stress
(b) Environmental stress
(c) Survival stress
(d) Fatigue related stress
Answer:
(c) Survival stress
(iv) Effective communication involves (1)
(a) Speaking only
(b) Listening only
(c) Speaking and listening
(d) Writing and reading
Answer:
(c) Speaking and listening
(b) Development that meets the needs of the present without compromising future generations
Question 3.
Answer any 5 out of the given 6 questions.
(A) …………….. controls the flow of text around an image. [1]
(a) Text Wrapping
(b) Drawing objects
(c) Text box
(d) Text Art
Answer:
(a) Text Wrapping
Explanation:
Text wrapping is a feature of word processors that refers to the placement of text around images. The wrap
settings determine the relation between the text and the graphic.
(B) Which of the following What-lf analysis tools deals with multiple unknown variables? [1]
(a) Goal Seek
(b) Solver
(c) Scenario
(d) None of these
Answer:
(b) Solver
Explanation:
The Solver is a advanced form of Goal Seek tooL A solver deals with equations with multiple variables. It tries
to find out maximum and minimum results from a multiple unknown variables.
Goal seek works on single variable where target is first determined and input value is calculated.
(C) A …………….. extracts data from a database as per a condition. [1]
(a) Forms
(b) Reports
(c) Queries
(d) Table
Answer:
(c) Queries
Explanation:
A database query is a stored object that extracts data from a database as per a condition. Queries present the
extracted data in formatted form.
(D) …………….. feature, of operating system help people with disabilities. [1]
(a) Accessibility
(b) Access
(c) Assist
(d) All of these
Answer:
(a) Accessibility
Explanation:
Every operating system provides an Accessibility feature which helps people with disabilities to use the device.
E.g., Magnifier, Narrator, Closed Captioning are some of the Accessibility features provided by Windows.
(E) …………….. is used for instant messaging. [1]
(a) Google Hangouts
(b) Google Chrome
(c) Gmail
(d) All of these
Answer:
(a) Google Hangouts
Explanation:
Google Hangouts is an IM application that allows you to chat from your computer’s desktop, make video calls
and do group chats with other Gmail and Google Hangouts users.
Gmail is a free email service provided by Google. Google chrome is a web browser developed by Google.
(F) Which of the following is not appropriate to set as primary key? [1]
(a) Employee’s Identification Number
(b) Price of book
(c) Product code
(d) Admission number of student
Answer:
(b) Price of book
Explanation:
The information stored in the Price of Book field will not be unique. Thus, it is not an appropriate field to set as
the primary key.
Question 4.
Answer any 5 out of the given 6 questions. (5 × 1 = 5)
(i) In URL, http://www.arihant.com/index.htm, which component identifies the path of a web page? (1)
(a) http
(b) www.arihant.com
(c) /index, htm
(d) All of the above
Answer:
(c) /index.htm
(ii) What dialog box opens on choosing File → Templates → Manage Templates in Writer? (1)
(a) The File dialog box
(b) The Manage Templates dialog box
(c) The Templates dialog box
(d) The Record Template dialog box
Answer:
(c) The Templates dialog box
(iii) _______ are the ways to produce the data stored in databases and tables in a printed form. (1)
(a) Forms
(b) Queries
(c) Reports
(d) Data
Answer:
(c) Reports
(iv) Arnab learned about the software that gets installed on the computer without the user’s knowledge. Help him
to find the name of the same. (1)
(a) Spyware
(b) Malware
(c) Adware
(d) None of these
Answer:
(a) Spyware
(v) Tamanna wants to know the name of the kind of software that seems useful in the beginning but will cause
damage to the computer once installed. What is such a kind of software called? (1)
(a) Trojan horse
(b) Worm
(c) Malware
(d) Virus
Answer:
(a) Trojan Horse
(vi) Which shortcut key is used to make the selected text italic? (1)
(a) Ctrl + I
(b) Shift + I
(c) FI + I
(d) None of these
Answer:
(a) Ctrl + I
Question 5.
Answer any 5 out of the given 6 questions. (5 × 1 = 5)
(i) If the two departments (HR and IT) access the data simultaneously then only one department will see the
updates by the other department. DBMS solves this issue. Thus, DBMS helps to avoid _______ which means if a
single database is used by multiple users then it also ensures that the same data is present for all the users. (1)
(a) Data redundancy
(b) Data inconsistency
(c) Data piracy
(d) Data modification
Answer:
(b) Data inconsistency
(ii) Line or paragraph spacing is measured in terms of lines or points, which is referred as _______ (1)
(a) text wrapping
(b) PDF
(c) XPS
(d) leading
Answer:
(d) leading
(iii) Rinky wants to know about the Number data type in Calc. Which of the following statement(s) is/are TRUE
about it? (1)
(a) Numbers are generally raw numbers or dates.
(b) Numbers can be started with a dollar sign ($) or with some other currency symbols to display as currency.
(c) By default, the number and date data are aligned to the right in Calc.
(d) All of the above
Answer:
(d) All of the above
(iv) How much space does the DATE/TIME data type hold in Base? (1)
(a) 2 bytes
(b) 4 bytes
(c) 8 bytes
(d) 10 bytes
Answer:
(c) 8 bytes
(v) Which tab is used to create a Table of Contents in a document? (1)
(a) File tab
(b) Format tab
(c) Insert tab
(d) Styles tab
Answer:
(c) Insert tab
(vi) _______ is a form of electronic commerce that allows customers to directly buy goods or services from a
seller on the Internet. (1)
(a) E-Shopping
(b) E-ticketing
(c) E-buying
(d) E-Delivery
Answer:
(a) E-Shopping
Section B
Subjective Type Questions
Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words. (3 × 2
= 6)
Question 6.
Explain any 2 Qualities of an entrepreneur.
Answer:
1. Determined
2. Confident
Question 7.
In what way does inadequate planning hinder effective communication? (2)
Answer:
Poor planning act as a barrier to communication as without adequate planning the result desired due to the
communication may not be achieved. So, we need to properly plan what message we want to send before
actually sending it.
Question 8.
What is an operating system? (2)
Answer:
The operating system is the system software that performs all the basic tasks of a computer system. It works like
an interface between the user and the computer hardware resources. It is a collection of programs that controls
and coordinates the execution of all other tasks and functions in a computer system. It mainly provides an
environment to run the software and serves services to the computer hardware.
Question 9.
Explain the relationship between self-regulation and goal setting. [2]
Answer:
Self-regulation is the ability to control one’s behavior, emotions, and thoughts to achieve some goals. Goal
setting is the process of planning and taking active steps to achieve the desired outcome which is only possible
through self-regulation.
Question 10.
What is the contribution of the entrepreneurs in the execution of Government policies? (2)
Answer:
Entrepreneurs make an important contribution in implementing government policies and achieving the national
goals. They cooperate with the government for the implementation of development plans in the country.
Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)
Question 11.
What do you mean by template? (2)
Answer:
A template is a collection of styles that already have some formatting in place, such as fonts, logos, and line
spacing, and can be used as a starting point for almost anything that you want to create. Microsoft Word offers
hundreds of free templates, including invoices, resumes, invitations, and form letters, among others.
Question 12.
Differentiate between data definition language (DDL) and data manipulation language ’ (DML).
Answer:
(1) Data Definition Language (DDL) is a language that enables a user to create, modify and work with the
structure of the database. For, eg., CREATE TABLE.
(2) Data Manipulation Language (DML) is a language that enables a user to access or manipulate data in a
database. The DML commands help users to query and manipulate data in the existing database. For, eg.,
SELECT.
Question 13.
What is the role of a foreign key in a database management system (DBMS)? (2)
Answer:
In a DBMS, a foreign key establishes a relationship between two tables. It references the primary key of another
table, enforcing referential integrity. It ensures data consistency by preventing actions that would violate the
defined relationships, such as deleting a record referenced by a foreign key constraint.
Question 14.
Write the steps to insert a record in a Datasheet View. (2)
Answer:
The steps to insert a record in a Datasheet View are as follows:
Step 1: When you create a table, a new blank record automatically appears in the second row of the table.
Step 2: If you enter data in the last record, a new blank record will automatically appear at the end of the table.
Step 3: Type data into the fields.
Step 4: When you have finished adding records in the datasheet, save it and close it.
Question 15.
Differentiate between MAN and WAN. [2]
Answer:
MAN WAN
MAN stands for Metropolitan Area Network WAN stands for Wide Area Network
This type of network is spread over a city. This type of network is spread across countries.
E.g. Cable TV network E.g. Internet, Intranet
Question 16.
State any two practices for internet security. (2)
Answer:
Any two practices for internet security are:
Use Strong Passwords: A strong password is a combination of alpha-numeric and special characters. Do not use
your mobile number, friend’s name, etc. for a password. Change your password frequently at least once in 2 or 3
weeks.
Backup Your Data: Always keep copies of your data on CDs, pen drives, etc. This may be helpful in a loss of
data situation.
Answer any 3 out of the given 5 questions in 50-80 words each. (3 × 4 = 12)
Question 17.
Rita is working on a spreadsheet. She wants to know about the use of the following terms: (4)
(a) Quick Sort
(b) Filtering Data
Answer:
(a) Quick Sort is especially useful when you add new information to a spreadsheet. When a spreadsheet is long,
it is usually easier to add new information at the bottom of the sheet, rather than adding it in its correct place.
After you have added information, you can sort the records to update the spreadsheet and put the information in
its correct place in quick sort.
(b) When a sheet contains a large amount of data, it can be difficult to find information quickly. In that case,
Filters can be used to narrow down the data in your worksheet, allowing you to view only the information you
need. In other words, Filters help you to ask questions about your data and retrieve only the relevant information
filtering away the undesirable data.
Question 18.
Write the SQL commands to answer the questions based on the “WORKER” table.
(a) Create “Worker” table with the following fields
FIELDS DATA TYPES
WID Integer
Wname Varchar(20)
WDesignation Char(10)
WCity Varchar(30)
WPhone Char(10)
(b) Display all the records in the Worker table
(c) Display the records where city is Delhi
(d) Define Primary Key
Answer:
(a) CREATE TABLE, WORKER (WID INTEGER, WNAME VARCHAR (20), WDESIG- NATION CHAR
(10), WCITY VARCHAR (30), WPHONE CHAR (10));
(b) SELECT * FROM WORKER;
(c) SELECT * FROM WORKER WHERE WCITY=”DELHI”;
(d) Primary Key – A primary key is a unique value that identifies a row in a table. A primary key is indexed in
the database making it faster for the database to search for a record. The primary key constraint can be applied
on one or more than one columns together.
Question 19.
Consider the following table PRODUCT (4)
TABLE: PRODUCT
S_NO P_Name S_Name Qty Cost City
S1 Biscuit Priyagold 120 12.00 Delhi
S2 Bread Britannia 200 25.00 Mumbai
S3 Chocolate Cadbury 350 40.00 Mumbai
S4 Sauce Kissan 400 45.00 Chennai
(i) How many fields and records are there in the PRODUCT table?
(ii) Write SQL queries for the following:
(a) Display all Products whose Qty is between 100 and 400.
(b) Display S_Name, P_Name, and Cost for all the Products whose Qty is less than 300.
(c) Display all the records alphabetically by S_Name.
Answer:
(i) There are 6 fields and 4 records in the table PRODUCT.
(ii) (a) SELECT* FROM PRODUCT WHERE Qty BETWEEN 100 AND 400;
(b) SELECT S _Name, P _Name, Cost FROM PRODUCT WHERE Qty <300;
(c) SELECT * FROM PRODUCT ORDER BY S_Name;
Question 20.
Shubham is learning about DBMS. He wants to know about the following: (4)
(a) The purpose of DBMS
(b) Any two uses of DBMS
Answer:
(a) DBMS (Database Management System) is used to store logically related information at a centralized location.
It facilitates data sharing among all the applications requiring it.
(b) Two uses of the database management system are as follows:
DBMS is used to store data at a centralized location.
It is used to minimize data redundancy and data inconsistency.
Question 21.
Define “server,” and provide the term for other computers in the network, as well as the types of networking
architecture and the likely networking technology in use. [4]
Answer:
(1) A server is a computer or system that provides resources, data, services, or programs to other computers over
a network.
(2) Other computers in the network are called clients. A client is a computer that connects to and uses the
resources of the server.
(3) Based on component roles there are two types of networking architecture:
(i) Client-server architecture
(ii) Peer to Peer architecture
(4) The networking technology used in this case is Client-Server Architecture.
In this type of network, each computer is designated a role, either as a server or as a client.