0% found this document useful (0 votes)
11 views16 pages

2 Marks Questions

The document contains a series of questions and answers related to employability skills, covering topics such as self-awareness, stress management, communication, and entrepreneurship. It provides concise definitions, examples, and differentiations between various concepts. Additionally, it discusses the importance of operating systems, templates, and network types in the context of technology and business.

Uploaded by

rajputrajjjj22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views16 pages

2 Marks Questions

The document contains a series of questions and answers related to employability skills, covering topics such as self-awareness, stress management, communication, and entrepreneurship. It provides concise definitions, examples, and differentiations between various concepts. Additionally, it discusses the importance of operating systems, templates, and network types in the context of technology and business.

Uploaded by

rajputrajjjj22
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 16

Answer any 3 out of the given 5 questions based on Employability Skills.

Answer each question in 20-30


Words. (3 × 2 = 6)
Question 6. What is self-awareness? Also, give any two benefits of self-awareness. (2)
Answer:
Self-awareness refers to our knowledge and understanding of ourselves. It includes our emotions, beliefs,
assumptions, biases, knowledge base, abilities, motivations, interests etc. Benefits of self-awareness are

 Improve critical thinking skills


 Improve decision making

Question 7.Give one example of each of the following stress causal agents for students: (2)
(a) Mental
(b) Social
Answer:
(a) Exams
(b) too/less interaction

Question 8.Differentiate between files and folders. (2)


Answer:
Differences between files and folders are as follows:
File Folder
(i) Files may or may not have extensions. (i) Folders do not have extensions.
(ii) A folder can contain any number of
(ii) A file cannot contain another file/folder.
files/folders.
Question 9.
Give any two qualities of a successful entrepreneur. (2)
Answer:
Two qualities of a successful entrepreneur are

 An entrepreneur must possess the characteristics of leadership and must lead a team for the
achievement of goals.
 An entrepreneur has to make many decisions to put his business idea into reality.

Question 10. Give any two promotional functions of an entrepreneur. (2)


Answer:
Two promotional functions of an entrepreneur are as follows:

 Entrepreneurs must exercise control over all departments and direct them on a timely basis.
 An entrepreneur has to take a risk by choosing one among various alternatives.
Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)

Question 11.Differentiate between Keep scale and Keep image size options while cropping an image in a
document. (2)
Answer:
When keep scale is selected (default), cropping the image does not change the scale of the picture. When
keep image size is selected, cropping produces enlargement, shrinking, or distortion of the image so that
the image size remains constant.

Question 12.Give any two characteristics of a template in Open Office Writer. (2)
Answer:
Two characteristics of a template in Open Office Writer are as follows:
 Templates are reusable, which means that once a template is created, it can be used again and again
for similar types of documents.
 A template ensures consistency in the formatting and layout of a document.

Question 13.Why do we need to merge worksheets? (2)


Answer:
There are some reasons to merge worksheets as

 Remove duplication
 Keep data consistent

Question 14.What is a Primary Key? How is it different from a foreign key? (2)
Answer:
A field or a set of fields that uniquely identify each record in a table is known as the primary key.
Differences between primary key and foreign key are as follows:
Primary Key Foreign Key
(i) It is used to uniquely identify data in (i) It is used to maintain relationships
the table. between tables.
(ii) It cannot be NULL. (ii) It can accept the NULL values.

Question 15.Expand and explain the term WAN. (2)


Answer:
WAN (Wide Area Network): The network which connects different countries network is known as WAN.
It can be a group of LANs. The largest existing WAN is the Internet.

Question 16.(a) Identify the following network/Internet connectivities as wired or wireless: (2)
(i) Dial-up
(ii) WiMax
(b) Give any one feature of Instant messaging.
Answer:
(a) (i) Dial-up is wired Internet connectivity.
(ii) WiMax is wireless Internet connectivity.
(b) Features of instant messaging are as follows.

 Save messages for future reference


 Video calling

Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words.
(3 × 2 = 6)
Question 6.Explain any 2 Qualities of an entrepreneur.
Answer:
1. Determined
2. Confident

Question 7.In what way does inadequate planning hinder effective communication? (2)
Answer:Poor planning act as a barrier to communication as without adequate planning the result desired
due to the communication may not be achieved. So, we need to properly plan what message we want to
send before actually sending it.

Question 8.What is an operating system? (2)


Answer:The operating system is the system software that performs all the basic tasks of a computer
system. It works like an interface between the user and the computer hardware resources. It is a
collection of programs that controls and coordinates the execution of all other tasks and functions in a
computer system. It mainly provides an environment to run the software and serves services to the
computer hardware.
Question 9.
Explain the relationship between self-regulation and goal setting. [2]
Answer:
Self-regulation is the ability to control one’s behavior, emotions, and thoughts to achieve some goals. Goal
setting is the process of planning and taking active steps to achieve the desired outcome which is only
possible through self-regulation.

Question 10.
What is the contribution of the entrepreneurs in the execution of Government policies? (2)
Answer:
Entrepreneurs make an important contribution in implementing government policies and achieving the
national goals. They cooperate with the government for the implementation of development plans in the
country.
Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)

Question 11.What do you mean by template? (2)


Answer:A template is a collection of styles that already have some formatting in place, such as fonts,
logos, and line spacing, and can be used as a starting point for almost anything that you want to create.
Microsoft Word offers hundreds of free templates, including invoices, resumes, invitations, and form
letters, among others.

Question 12.Differentiate between data definition language (DDL) and data manipulation language ’
(DML).
Answer:(1) Data Definition Language (DDL) is a language that enables a user to create, modify and work
with the structure of the database. For, eg., CREATE TABLE.
(2) Data Manipulation Language (DML) is a language that enables a user to access or manipulate data in a
database. The DML commands help users to query and manipulate data in the existing database. For, eg.,
SELECT.

Question 13.What is the role of a foreign key in a database management system (DBMS)? (2)
Answer:
In a DBMS, a foreign key establishes a relationship between two tables. It references the primary key of
another table, enforcing referential integrity. It ensures data consistency by preventing actions that
would violate the defined relationships, such as deleting a record referenced by a foreign key constraint.
Question 14.
Write the steps to insert a record in a Datasheet View. (2)
Answer:
The steps to insert a record in a Datasheet View are as follows:

 Step 1: When you create a table, a new blank record automatically appears in the second row of the
table.
 Step 2: If you enter data in the last record, a new blank record will automatically appear at the end of
the table.
 Step 3: Type data into the fields.
 Step 4: When you have finished adding records in the datasheet, save it and close it.
Question 15.Differentiate between MAN and WAN. [2]
Answer:
MAN WAN
MAN stands for Metropolitan Area
WAN stands for Wide Area Network
Network
This type of network is spread across
This type of network is spread over a city.
countries.
E.g. Cable TV network
E.g. Internet, Intranet
Question 16.
State any two practices for internet security. (2)
Answer:
Any two practices for internet security are:

 Use Strong Passwords: A strong password is a combination of alpha-numeric and special characters.
Do not use your mobile number, friend’s name, etc. for a password. Change your password
frequently at least once in 2 or 3 weeks.
 Backup Your Data: Always keep copies of your data on CDs, pen drives, etc. This may be helpful in a
loss of data situation.
Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words.
(3 × 2 = 6)
Question 6.Communication skills are very important for any business. Explain any two elements of a
communication process.
Answer:
The various elements of a communication cycle are:
Sender : the person beginning the communication.
Message : the information that the sender wants to convey.
Channel : how the information is sent.
Receiver : the person to whom the message is sent.
Feedback : the receiver’s acknowledgement and response to the message.

Question 7.Difference between file and folder. (2)


Answer:
Differences between files and folders are as follows.
File Folder
Files may or may not have extensions. Folders do not have extensions.
A folder can contain any number of
A file cannot contain another file/folder.
files/folders.
A file has a certain size and memory A folder has no size of its own. It derives its
consumption. size from the files it contains.
Files cannot be shared on the network on
Folders can be shared on the network.
their own.

Question 8.Can you explain the principle of completeness in the context of effective communication? (2)
Answer:
The principle of completeness implies that the message must be complete, which means that it should
convey all the information required by the receiver. Nothing which may be required by the receiver
should be left out of the message.

Question 9.Describe any two qualities of a successful entrepreneur. [2]


Answer:Entrepreneurship is possible only when a person has built-in or developed some specific
qualities. Two of these qualities are as follows:
1. Passion: They are passionate about their work.
2. Creative and Open-minded: They are creative and open to new ideas.

Question 10.Explain any two functions of an entrepreneur. (2)


Answer:
Two functions of an entrepreneur are as follows:

 Innovation It includes introducing new products, opening new markets, and new raw material
sources, and new organization structure.
 Risk-taking Choosing one among various alternatives, the results of which are unpredictable.
Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)
Question 11.
How can you define OLE? (2)
Answer:
Use an OLE (Object Unking and Embedding) object to insert in a presentation either a new document or
an existing one. Embedding inserts a copy of the object and details of the source program in the target
document, that is the program that is associated with the file type in the operating system. The major
benefit of an OLE object is that it is quick and easy to edit the contents just by double-clicking on it. You
can also insert a link to the object that will appear as an icon rather than an area showing the contents
itself.

Question 12.What is online shopping? Explain its benefits.


Answer:
Online shopping is a form of e-commerce (Electronic commerce) where customers can buy or sell goods
over the Internet. Customers need to have an active internet connection for giving goods or services
offered by the seller, customers can pay online using a credit/ debit card or by Internet banking. These
transactions are called online transactions. Online shopping could be useful in situations when-

 The customer does not have sufficient time to visit the store.
 Visiting a store is more expensive than purchasing a product online.
 A product or service that is not available in the local market but is available online.
Question 13.
State any two ways of inserting sheets in the workbook.
Answer:
Two ways of inserting sheets in a workbook are as follows:
Select Insert → Sheet from the Menu Bar.
Right-click on the sheet tab and click on Insert Sheet.
Question 14.
Difference between circuit switching and packet switching. (2)
Answer:
Differences between circuit switching and packet switching are as follows:
Circuit Switching Packet Switching
Initially designed for voice communication. Initially designed for data transmission.
It is inflexible because once a path is set all
Flexible, because a route is created for each
parts of a transmission follow the same
packet to travel to the destination.
path.
It is connection-oriented. It is connectionless.

Question 15.What is cyber safety? Discuss its importance. [2]


Answer:Cyber safety refers to safety of computers and data over internet It simply means being safe
online from security issues such as hacking, data theft, spying, malicious software etc.
Cyber safety is important because it protects data from theft and damage. This includes sensitive data
such as personal information, intellectual property, government data and industrial or commercial data.

Question 16.What is an Internet Service Provider? (2)


Answer:
ISP (Internet Service Provider) is a company that provides individuals and other companies access to the
Internet. Internet Service Provider is used to join the Internet. Internet services typically provided by
ISPs include Internet access, Internet transit, domain name registration, web hosting, and Usenet service.
ISP does not provide E-mail addresses, e.g. MTNL, BSNL, Airtel etc.
Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words.
(3 × 2 = 6)

Question 6.What are the advantages of the ability to Work Independently?


Answer:
The advantages of the ability to Work Independently:

 Ensures greater learning.


 Individuals feel more empowered and responsible.
 It provides flexibility to choose and define working hours and working mechanisms.
 Failure and success of the task assigned are accounted by individuals.
 Individuals become assets to organizations, groups and nations at large.
 It ensures creativity and satisfaction amongst individuals.
Questions 7.What do you mean by internal stress? (2)
Answer:Internal stress is generated within humans regarding unreasonable matters. This internal stress
is one of the most important kinds of stress to understand and manage because it keeps on building up as
time passes. For example, some people become used to the kind of hurried, tense, lifestyle of persons
living in large cities. They even look for stressful situations and feel stress about matters which may not
be stressful at all. This stress affects our work performance adversely. Internal stress is a result of
unexpressed worries.
Questions 8.
What are the facilities provided by the operating system? (2)
Answer:
The facilities provided by the operating system are:

 Easy interaction between humans and computers.


 Starting the computer automatically when power is turned on.
 Loading and scheduling users’ programs along with necessary compilers.
 Controlling Input and Output.

Question 9.Give any two qualities of a successful entrepreneur. [2]


Answer:A successful entrepreneur must have the following qualities:

1. Willpower and Focused: This quality is key to success for an entrepreneur. It takes a long time to
achieve success. Despite the failures, an entrepreneur must not lose the will and focus to achieve.
2. Management: It is the ability to make plans, devise targets, and then execute. An entrepreneur
should be a good manager to perform alL these tasks successfully.

Questions 10.What policies can support the development of green skills? (2)
Answer:Policies such as funding incentives, vocational training programs, and partnerships between
educational institutions and industries can foster the development and utilization of green skills.

Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)


Questions 11.
Explain the role of a template in a word processor. (2)
Answer:
In word processors, templates are a special type of document that can hold text, styles, macros, keyboard
shortcuts, custom toolbars, QAT and ribbon modifications, and building blocks including Auto Text
entries.

Question 12.
Mention any two operations that can be performed using Macros in a spreadsheet.
Answer:
Macros are used to perform different types of operations in a Spreadsheet:

 Formatting settings to be applied repeatedly in a spreadsheet


 Sorting Data
 Applying any Mathematical functions/formulas
Questions 13.
Write down the significance of electronic spreadsheets. (2)
Answer:
Using electronic spreadsheets, large volumes of data can be stored in worksheets. Worksheets can be
managed, edited, viewed, retrieved, and printed easily in the desired format. Electronic spreadsheets
support charts, which represent data pictorically.
Questions 14.
When is the Memo data type is preferred over the Text data type for a field? (2)
Answer:
Text data type is not capable of storing the project description because its length cannot be more than
255 characters so the memo data type is preferred over the Text data type.

Question 15.Expand and explain the term WAN. [2]


Answer:WAN stands for Wide Area Network. It is the technology that connects your offices, data centers,
cloud applications, and cloud storage. This network spans beyond a single building or large campus to
include multiple locations spread across metropolitan, regional, or national boundaries.

Questions 16.Define router as a network device. (2)


Answer:The router is a network device designed to take incoming packets, analyze the packets, move the
packets to another network, convert the packets to another network interface, drop the packets, direct
packets to the appropriate locations, etc. A router functions similarly to a bridge. However, unlike a
bridge, a router passes data packets from one network to another network based on their IP addresses,
not MAC addresses.

Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words.
(3 × 2 = 6)
Question 6.Explain any two principles of effective communication.
Answer:Two principles of effective communication are as follows:
(i) Consistency: The communication should always be planned and consistent with a clear objective of the
message being conveyed.
(ii) Feedback: The feedback confirms the recipient whether the message is understood in the same sense
as it was delivered or not

Question 7.
How do green skills contribute to sustainable development? (2)
Answer:
Green skills enable the transition to a more sustainable society by promoting responsible resource
management, reducing pollution, and fostering social and economic well-being.
Question 8.
What is the difference between moving and copying a folder? (2)
Answer:
Differences between moving and copying a folder are as follows.
Copying a Folder Moving a Folder
Copying a folder means making a duplicate Moving a folder means transferring a folder
copy of a folder. from one location to another.
It uses the Copy and Paste option. It uses the cut-and-paste option.
The original folder remains at the source The original folder is moved to the
locations. destination location.
Question 9.
How we can prevent computer against attack by viruses. [2]
Answer:
We can prevent the computer against attack of viruses by installing proper antivirus, enabling the
firewall, scan external devices before using on other computer, by avoiding emails that are suspicious or
not known to us, should be very carefijl while downloading files or any programs from the internet etc

Question 10.Can you explain what it means to encode a message? (2)


Answer:Encoding a message means to change the message into a form suitable for sending. The factors
that must be considered when encoding messages are language, cultural differences, etc.
Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)
Question 11.
What is the use of grouping objects in a word processor application? (2)
Answer:
Grouping drawing objects makes it easier to handle several objects as a single entity while preserving
their relative sizes and positions. When objects are grouped, any editing operations carried out on that
group are applied to all members of the group. If you click on one member of the group, the whole group
is selected.
Question 12.
Differentiate between field and record in a table.
Answer:
Field Record
A record is a combination of related
A field contains only one type of informations.
fields.
It contains information about one aspect of a It represents a complete unit of
complete record. information.
Question 13.
What is the use of the Scenario tool? (2)
Answer:
A Scenario is a set of values that Calc saves for a group of cells. Whenever we run a scenario, Calc
automatically substitutes the saved cell values into a connected formula to give us an output. By having
different scenarios for the same group of cells we can get different results from the formula and compare
these results to know which is the most suitable set of values for us.

Question 14.Define data, the major component of a database. (2)


Answer:Data is raw numbers, characters, or facts represented by a value. Most organizations generate,
store, and process large amounts of data. The data acts as a bridge between the hardware and the
software. Data may be of different types such as User data, Metadata, and Application Metadata.
Question 15.Differentiate between a Primary key and a Foreign key. [2]
Answer:A primary key is a unique value that identifies a row in a table, whereas a foreign key identifies a
column or set of columns in one (referencing) table that refers to a column or set of columns in another
referenced table. A table can have only a Primary Key but a table can have multiple foreign keys.
Question 16.
What are the benefits of online shopping? (2)
Answer:
Some benefits of online shopping are as follows:

 Online shopping is very convenient. You can get products at home.


 Online shopping websites provide millions of choices of products.
 They offer huge discounts on goods and sen/ice.
 Online shops allow us to shop 24 × 7 and also reward us with cashback.
 Sending gifts to relatives and friends is easy by online shop.

Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words.
(3 × 2 = 6)
Question 6.
Explain innovation as the characteristic of an Entrepreneur.
Answer:
The production of any product should be according to the needs of customers, which keeps on changing
from time to time. Thus an entrepreneur has to be innovative. An entrepreneur always strives to fulfill
the demands or needs of the customers by exploring new products, ideas, and innovative creations.
Question 7.
What strategies can a communication sender use to overcome information overload as a barrier? (2)
Answer:
To overcome the barrier of information overload, the sender of a communication must try to eliminate
unnecessary information and stick to only important information in the communication.
Question 8.
Explain any two items of the Windows desktop. (2)
Answer:
Any two items of the Windows desktop are:

 Taskbar: It is present in the bottom area of the desktop. It contains the Start button, Cortana, Task
View button, Quick Launch Bar, and Notification Area.
 Icons: The small pictures on the desktop that represent various programs/applications are called
icons.
Question 9.
Define entrepreneurship. [2]
Answer:
Entrepreneurship is the process of running a business or a startup venture using a new idea. It is about
identifying and working towards fulfilling the needs of society.
Question 10.
Why are green skills important? (2)
Answer:
Green skills are important because they enable individuals to participate in the transition to a greener
economy and address environmental challenges such as climate change, pollution, and resource
depletion.
Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)
Question 11.What are objects in word processing software? (2)
Answer:The word processor object allows different formatting within the same object. However, word
processor objects are printed as an images, so they require quite a bit more resources than normal single
or multiline text objects. Word processing objects include text, graphical, and embedded objects.

Question 12.Why multiple sheets are used in a workbook?


Answer:In every spreadsheet, by default a workbook consists of at least one worksheet. You can add new
worksheets in the same workbook. Multiple worksheets are required when you are working on large
amount of data. Multiple worksheets help in organising your workbook and make it easier to find data.

Question 13.What is the use of Auto Sum in a spreadsheet? (2)


Answer:When working with large spreadsheets containing a considerable number of rows or columns
with data, AutoSum is often needed AutoSum with a quick click of a menu or button instead of manually
typing the SUM function. OpenOffice spreadsheet program Calc has this feature.

 Open any Calc workbook with numbers and data, or open your workbook.
 Select the cell where you would like to put the autosum of your data.
 Click on the sigma icon beside the formula bar and click Sum from the dropdown menu. You can see
the Sum is calculated automatically.

Question 14.A table named School (containing data of students of the entire school) is created, where
each record consists of several fields including AdmissionNo (Admission Number), RollNo (Roll Number),
and Name. Which field out of these three should be set as the primary key and why? (2)
Answer:AdmissionNoshould be set as the primary key because admission numbers are unique for every
student of the school, which is not possible in the case of RolINo and Name.
Best online courses

Question 15.What is client-server architecture? [2]


Answer:Client -Server architecture is a type of computer network in which each computer has a fixed or
designated role. It may either serve as a client or as a server. Once the role is assigned, the computer
cannot switch it.

Question 16.Explain the purpose of a blog. (2)


Answer:The main purpose of a blog is to convey messages about events, announcements, needs, reviews,
etc. Blogs are usually managed using a web browser and this requires an active internet connection.

Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words.
(3 × 2 = 6)
Question 6.What is self-management? Write any four self-management skills.
Answer:
Self-management skills are those characteristics that help a person to become more productive in the
workplace. Such skills include problem-solving, resisting stress, communicating unambiguously,
managing time, and exercising often are all key examples of self-management skills.
Question 7.
What role does non-verbal communication play in effective communication? (2)
Answer:
Non-verbal communication, such as body language, facial expressions, and gestures, complements verbal
communication and adds meaning to messages. It helps convey emotions, attitudes, and intentions.
Question 8.
Write any two main advantages of an operating system. (2)
Answer:
The main advantages of an operating system include:

 Allows multiple programs to run concurrently.


 Simplifies the programming of application software because the program does not have to manage
the hardware. The operating system manages all hardware and the interaction of software. It also
gives the program a high-level interface to the hardware and ways of interacting with other
programs.

Question 9.
What are the general things to be taken care of while physically cleaning the computer? [2]
Answer:
The physical cleaning of a computer is very important to remove dust from it. Dust makes the computer
overheat resulting in damage of its parts. While cleaning a computer following things should be taken
care of:

1. Always use a lint-free cotton cloth to clean its components.


2. Never spray any liquid onto any computer component. You can spray the liquid onto a cloth.
3. Always use a vacuum cleaner for sucking the dust from the computer parts.
Question 10.
How can green skills be acquired? (2)
Answer:
Green skills can be acquired through formal education programs, vocational training, apprenticeships,
and on-the-job experiences that focus on sustainable practices and environmental management.
Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)
Question 11.
Write some features of the spelling checker in OpenOffice Writer. (2)
Answer:

 You can right-click on a word with a wavy underline, to open a context menu. If you select from the
suggested words on the menu, the selection will replace the misspelled word in your text.
 You can change the dictionary language (for example, to Spanish, French or German) on the Spelling
dialog box.
 You can add a word to the dictionary. Click Add in the Spelling dialog box and pick the dictionary to
add it to. The Options dialog of the Spelling tool has several different options, such as whether to
check uppercase words and words with numbers. It also allows you to manage custom dictionaries;
that is, add or delete dictionaries, and add or delete words in a dictionary.
Question 12.
To resize an image you use sizing handles. What are sizing handles?
Answer:
Sizing handles are the small black boxes Located at the borders and comers of an image. These boxes or
handles allow the user to increase the size horizontally, vertically, or diagonally. When the mouse pointer
is placed on one of the sizing handles, the shape of the pointer changes to a double-headed arrow. You
may then change the size by dragging the sizing handle.
Question 13.
What is data analysis in spreadsheet software? (2)
Answer:
Data analysis is a process of inspecting, cleansing, transforming, and modeling data to derive useful
information from it, which can further be used in an organization’s decision-making process. Calc offers
several tools for analyzing and manipulating spreadsheets including data consolidation, subtotals,
scenarios, Goal seek and Solvers, etc. All these tools are organized into two menus: the tools menu and
the data menu.
Question 14.
Explain the term relational database management system. (2)
Answer:
RDBMS (Relational Database Management System) is a type of DBMS that stores data in the form of
relations (tables). Relational databases are powerful, so they require few assumptions about how data is
related or how it will be extracted from the databases. An important feature of a relational database
system is that a single database can be spread across several tables. Oracle, DB2, SAR Sybase, ASE,
Informix, Access, etc. are examples of RDBMS.

Question 15.
Discuss the purpose of adding comments in a worksheet. [2]
Answer:
The comments in a worksheet are added when you are sharing a worksheet with multiple users. They
add extra information to a figure in a cell, use to note trends or add an action note. These comments only
show the suggested changes in a worksheet which the user can accept or reject as required. The
comments are temporary and can be edited or deleted from the sheet. These refrain the user from
making any kind of permanent changes in the sheet.
Question 16.
Describe the term wireless fidelity. (2)
Answer:
Wireless Fidelity (Wi-Fi) is a universal wireless networking technology that utilizes radio frequencies to
transfer data. Wi-Fi allows high-speed Internet connections without the use of cables or wires. Wi-Fi
networks can be designed for private access within a home or business. It can be used for public Internet
access as ‘hotspots’ that offer Wi-Fi access such as restaurants, coffee shops, hotels, airports, convention
centers, and city parks.
Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words.
(3 × 2 = 6)
Question 6.
What are the skills necessary for independent working? List any six. (2)
Answer:
The skills necessary for independent working are:

 Becoming self-awareness, self-monitoring, and self-correcting.


 Knowing what we need to do.
 Taking the initiative rather than waiting to be told what to do.
 Doing what is asked to the best of our ability without needing external prodding, and working until
the job is completed.
 Taking ownership of our mistakes without looking for excuses.
 Refusing to let self-doubt or negative emotions due to negative past experiences take us away from
the task.
Question 7.
What are the benefits of acquiring green skills? (2)
Answer:
Acquiring green skills can lead to improved employability, career growth, and job opportunities in
emerging green sectors. It also contributes to a more sustainable and resilient society.
Question 8.
What are the responsibilities of an operating system concerning file management? (2)
Answer:
The operating system is responsible for the following activities in connection with file management:

 Allocating and deallocating memory space as needed.


 Creating and deleting files- and directories to organize files.
 Supporting primitives for manipulating files and directories.
 Mapping files onto secondary storage.
 Backing up files on stable (non-volatile) storage media.
Question 9.
What are the disadvantages of entrepreneurship? (2)
Answer:
Some of the disadvantages of entrepreneurship are as follows:

 Huge Amount of Time: You have to dedicate a huge amount of time to your own business.
Entrepreneurship is not easy and for it to be successful, you have to take a level of time commitment.
 Risk: Entrepreneurship involves a high risk of loss. If the business fails then it will wipe away all the
personal savings.
 Hard Work: An entrepreneur has to work very hard to make the new business very successful.
 Uncertain Income: There is no regular or fixed income available to an entrepreneur. So, there is an
uncertain kind of income received by an entrepreneur.
Question 10.
How can empathy enhance communication skills? (2)
Answer:
Empathy involves understanding and sharing others’ feelings and perspectives. By empathizing,
individuals can connect on a deeper level, demonstrate understanding, and establish trust in their
communication.
Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)
Question 11.
What is Mail Merge? (2)
Answer:
Mail Merge is a very important feature of a word processor. It is used to create a series of documents with
the same text and multiple addresses. In the process of mail merge, we merge a main document (a letter
or certificate, etc.) with different mailing addresses to create several copies of the main document
bearing the addresses of different individuals. Mail merge is generally used to send invitations, and
letters or to print certificates for several people.
Question 12.
What is a macro? (2)
Answer:
A macro is a saved sequence of commands or keystrokes that are stored for later use. An example of a
simple macro is one that “types” your address. The Libre Office macro language is very flexible, allowing
automation of both simple and complex tasks. Macros are especially useful to repeat a task the same way
over and over again.

Question 13.
What is the role of key fields in a database? Name the keys in a DBMS. (2)
Answer:
The key is defined as the column or the set of columns of the database table which is used to identify each
record uniquely in a relation, e.g. If a table has id, name, and address as the column names then say id is
the key for that table as it is a unique identifier for each record. Alternate, foreign, primary, and candidate
are a few types of keys in a DBMS.
Question 14.
How does a router help in maintaining a network? (2)
Answer:
A hardware device designed to take incoming packets, analyze the packets, move the packets to another
network, convert the packets to another network interface, drop the packets, direct packets to the
appropriate locations, etc. A router functions similarly to a bridge. However, unlike a bridge, a router
passes data packets from one network to another network based on their IP addresses, not MAC
addresses.
Question 15.
Define the following terms: (2)
(i) Active Cell
(ii) Sheet Tab
Answer:
(i) Active Cell The cell with the black outline in a spreadsheet data is always entered into the active cell.
(ii) Sheet Tab The tab at the bottom of a worksheet tells you the name of the worksheet such as Sheet 1,
Sheet 2, etc. Switching between worksheets can be done by clicking on the tab of the Sheet that you want
to access.
Question 16.
How can you prepare for emergencies? (2)
Answer:
To prepare for emergencies, follow the given guidelines:

 Follow workspace protocol and guidelines to ensure safety and health; know and understand rules
and procedures concerning fire emergencies.
 Ensure that smoke alarms and sprinkler systems are installed, working properly, and are not
blocked.
 Conduct regular fire drills.
Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words.
(3 × 2 = 6)
Question 6.
There are some myths about Entrepreneurship. Mention any four of them.
Answer:
Myths regarding entrepreneurship are as follows:-

1. Every Business Idea Needs to be Unique or Special: A person can take an existing idea in the market
and do something different with it
2. A Person Needs a Lot of Money to Start a Business: Entrepreneurship is about passion, commitment,
and execution of ideas. Money-related problems can be solved by funding, debts, loans, investors,
etc.
3. Entrepreneurs are Born Talented: Entrepreneurship starts with thinking of an idea that you want to
work on and making it different. A person who is self-aware and can develop certain qualities can
become an entrepreneur.
4. It is an Easy Way to Get Rich: Entrepreneurship does not mean making quick money. It needs
patience and time to make a business successful. Sometimes the venture results in failure.

Question 7.
It is important to be in charge of your self and not be charge of your self and not be dependent on anyone
else in life. List any two reasons for which self-regulation is a must. (2)
Answer:
Self-regulation is important in life for to following reasons:

 Self-regulation allows you to keep a tab on your own emotions.


 Self-regulation enables to development of the idea of ‘what is appropriate behaviour’ and ‘what is
inappropriate behaviour’ in a given social condition.
Question 8.
What general precautions should you take while cleaning the computer/components? (2)
Answer:

 Always Power off the computer system before cleaning.


 Never spray cleaning fluid directly on the components of the computer. First, spray the liquid on the
cloth and then wipe the component.
 Do not allow the cleaning liquid to drip near the circuit board.
 Preferably use an anti-static wrist band which helps to prevent the building up of static electricity
near electronic devices.
Question 9.
How does an entrepreneur benefit a society? [2]
Answer:
Entrepreneurs can change their way of living and work. Their ventures not only create jobs but also
conditions for making a wealthy society. Given below are some of the contributions that entrepreneurs
make to society:

 Entrepreneurship creates jobs.


 They use their creativity and finances to introduce innovative ideas and technologies.
 It helps in raising the standards of living by uplifting the earning power of people.
 Successful entrepreneurs set up a role model and inspire many more for entrepreneurship. Thus, the
cycle of economic upliftment continues.
 Entrepreneurs invest in community projects and social causes like public health and education etc.
Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)
Question 11.
Differentiate between the Save and Save As options. (2)
Answer:
‘Save’ means the file gets saved under its current name, in whatever folder it was saved before or in the
default folder of that computer, whereas ‘Save As’ gives you the opportunity to save the file under a
different name and in another folder. ‘Save As’ allows you to name the updated version with a new name
and at the same time preserve the old version.
Question 12.
What do you understand by the following:
(a) Magnifier (b) Speech recognition
Answer:
(a) Magnifier : Magnifier is a tool of Windows that makes the part of computer screen or an entire
computer screen bigger. Using this tool the images and words can be seen better. This tool is an
accessibility feature for people with low vision impairments.
(b) Speech Recognition : Speech recognition is a tool of windows that identifies the words spoken aloud
and then convert them into readable text. People who are visually impaired can use this tool to type text
by speaking the words and sentences to the system.
Question 13.
What is the use of cell reference? (2)
Answer:
To avoid writing the data again and again for calculating purposes, cell reference is used. When you write
any formula, for a specific function, you need to direct Excel to the specific locator of that data. This
location is referred to as, cell reference. So, every time a new value is added to the cell, the cell will
calculate according to the reference cell formula.
Question 14.
Describe the significance of the primary key in a database. (2)
Answer:
The primary key is used to uniquely identify the record in a database. It can be a column or a set of
columns in the table. The main features of the primary key are as follows:

 It must contain a unique value for each record of the table.


 It does not contain null values.
Question 15.
List some of the disadvantages of blogs. [2]
Answer:
The disadvantages of blogs are as follows:
 Information given in personal blogs may be biased or inaccurate.
 Blogs can be time-consuming.
 The comments written on blogs may be rude or inaccurate.
 Whatever is published in the blog is available to all.
Question 16.
Why is it important to secure the internet? What are the uses of it? (2)
Answer:
Your passwords are the most common way to prove your identity when using websites, e-mail accounts,
and your computer itself. The use of a strong password is therefore essential in order to protect your
security and identity.

You might also like