Class 10 IT (402) Preboard Sample Paper - Set 3
IT (402) Preboard Sample Paper - Set 3
SECTION A: OBJECTIVE TYPE QUESTIONS (24 Marks)
Q1. Answer any 4 out of the given 6 questions on Employability Skills (1 x 4 = 4 marks)
1. Using correct grammar and spelling is an example of:
Correct Answer: b) Verbal communication quality
2. Which is NOT a technique for time management?
Correct Answer: b) Procrastination
3. The taskbar is usually located at the ________ of the desktop.
Correct Answer: b) Bottom
4. Entrepreneurs help in the economic development of a country by:
Correct Answer: b) Creating jobs
5. Which practice contributes to sustainability?
Correct Answer: b) Rainwater harvesting
6. The shortcut to cut a selected file is:
Correct Answer: b) Ctrl + X
Q2. Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)
1. Mode to apply a style to many areas without revisiting the Styles window?
Correct Answer: b) Fill Format Mode
2. In Calc, "Goal Seek" is found under which menu?
Correct Answer: c) Tools
3. View in Base used to define field names and data types?
Correct Answer: b) Design View
4. Accessibility option that turns the keyboard into a mouse?
Correct Answer: b) Mouse Keys
5. Shortcut key to print a document?
Correct Answer: a) Ctrl + P
6. Amazon and Flipkart are examples of:
Correct Answer: b) E-Commerce
Q3. Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)
1. To update the TOC after editing text, you press:
Correct Answer: b) F9 (or right-click Update Index/Table)
2. When sharing a worksheet, which user can accept or reject changes?
Correct Answer: b) The Reviewer/Owner
3. Data type best for storing a "Yes/No" value?
Correct Answer: b) Boolean
4. WAN stands for:
Correct Answer: a) Wide Area Network
5. A digital certificate is used to verify:
Correct Answer: b) Identity of the user/website
6. DML stands for:
Correct Answer: a) Data Manipulation Language
Q4. Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)
1. The space between the text and the paper edge is called:
Correct Answer: b) Margin
2. Feature in Calc used to combine multiple cells into one?
Correct Answer: b) Merge Cells
3. A "Foreign Key" links to the ________ in another table.
Correct Answer: b) Primary Key
4. Communication model where data transfers in both directions but not simultaneously?
Correct Answer: b) Half-Duplex
5. The buying and selling of goods over the internet is called:
Correct Answer: c) E-Commerce
6. Which is NOT a natural disaster?
Correct Answer: c) Gas Leakage (It's a man-made/technological disaster)
Q5. Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)
1. To insert a page break manually, press:
Correct Answer: a) Ctrl + Enter
2. What is the extension of a Base database file?
Correct Answer: a) .odb
3. Which query statement is used to count the number of records?
Correct Answer: b) SELECT COUNT(*)
4. Which device modulates and demodulates signals?
Correct Answer: b) Modem
5. Software that tracks a user's activity without their knowledge is called:
Correct Answer: b) Spyware
6. An "Assembly Point" is:
Correct Answer: b) A safe area to gather during an evacuation
SECTION B: SUBJECTIVE TYPE QUESTIONS (26 Marks)
Answer any 3 out of 5 Employability Skills questions (2 marks each)
Q6. Explain "Feedback" in communication. Why is it important?
Answer: **Feedback** is the **response** given by the receiver to the sender. It is important because it confirms that the message was **received and understood** correctly, allowing the sender to improve communication.
Q7. Name two external factors that cause stress.
Answer: 1. **Work/School pressure** (e.g., deadlines, exams). 2. **Financial problems**. 3. **Major life changes** (e.g., moving, loss of a loved one).
Q8. Define "Operating System". Give one example.
Answer: An **Operating System (OS)** is a system software that manages computer hardware, software resources, and provides common services for computer programs. It acts as an **interface** between the user and the hardware. Example: Windows, Linux, Android.
Q9. List two roles of an Entrepreneur.
Answer: 1. **Innovation** (introducing new ideas/products). 2. **Risk-taking** (taking calculated financial and business risks). 3. **Job creation**.
Q10. What are the "4 Rs" of sustainability?
Answer: 1. **Reduce** (consumption). 2. **Reuse** (items). 3. **Recycle** (materials). 4. **Recover** (energy/resources from waste).
Answer any 4 out of 6 Subject Specific Skills questions (2 marks each)
Q11. How do you insert a "Watermark" in a Writer document?
Answer: Watermarks are typically inserted by modifying the **Page Style**. Go to **Format > Page > Background Tab**, select **Watermark** and enter the desired text and adjust font/transparency settings.
Q12. Explain the difference between "Subtotal" and "Consolidate" in Calc.
Answer: **Subtotal** is used to calculate summary functions (like SUM, AVG) for **groups of data** within a single list/table (data must be sorted first). **Consolidate** is used to calculate summary functions across **multiple worksheets or workbooks** into a single destination cell range.
Q13. What is a "Compound Primary Key"? Give an example.
Answer: A **Compound (or Composite) Primary Key** is a primary key that consists of **two or more attributes/fields** combined. All fields together uniquely identify the record, but individually they may not. Example: In a **RESULT** table, (**StudentID** + **CourseID**) could form the primary key.
Q14. Explain the use of "Filter Keys" in Windows Accessibility.
Answer: **Filter Keys** is an accessibility option that **ignores brief or repeated keystrokes**. It helps users with tremors or physical disabilities who might accidentally press a key multiple times or struggle with key debounce issues, making typing easier and more accurate.
Q15. What is the purpose of a "Router" in a network?
Answer: A **Router** is a networking device that **forwards data packets** between computer networks. Its main purpose is to determine the **best path** for data to travel from its source to its destination, thus connecting different networks (like a home network to the Internet).
Q16. What is "Phishing"? How can you identify a phishing email?
Answer: **Phishing** is a fraudulent attempt, typically made through email, to **obtain sensitive information** (passwords, credit card details) by disguising as a trustworthy entity. **Identification:** Check for misspelled company names, generic greetings, urgent/threatening language, and suspicious sender email addresses/links.
Answer any 3 out of 5 Subject Specific Skills questions (4 marks each)
Q17. (Competency) Sam's Mail Merge...
Answer:
a) **Three components:** 1. **Main Document** (the letter/template). 2. **Data Source** (the list of recipient names and addresses). 3. **Merged Document** (the final output).
b) **Yes**, a Calc spreadsheet can be used as a Data Source.
c) **Yes**, the merge process can output to individual files, which can then be edited.
d) **Benefit:** It saves immense time and effort by automatically personalizing hundreds of documents without manual copy-pasting, ensuring accuracy and consistency.
a) **Three components:** 1. **Main Document** (the letter/template). 2. **Data Source** (the list of recipient names and addresses). 3. **Merged Document** (the final output).
b) **Yes**, a Calc spreadsheet can be used as a Data Source.
c) **Yes**, the merge process can output to individual files, which can then be edited.
d) **Benefit:** It saves immense time and effort by automatically personalizing hundreds of documents without manual copy-pasting, ensuring accuracy and consistency.
Q18. (Competency) Shopkeeper's Goal Seek...
Answer:
a) **Formula Cell:** The cell containing the Profit formula (Selling Price - Cost Price).
b) **Target Value:** 1000.
c) **Variable Cell:** The cell containing the Selling Price.
d) **No**, Goal Seek can change **only one cell** (the variable cell) to reach the target result. For multiple variable cells, the Solver tool must be used.
a) **Formula Cell:** The cell containing the Profit formula (Selling Price - Cost Price).
b) **Target Value:** 1000.
c) **Variable Cell:** The cell containing the Selling Price.
d) **No**, Goal Seek can change **only one cell** (the variable cell) to reach the target result. For multiple variable cells, the Solver tool must be used.
Q19. SQL Queries for table EMPLOYEE...
Answer:
a)
b)
c)
d)
a)
SELECT Name FROM EMPLOYEE WHERE Dept = 'IT';b)
SELECT * FROM EMPLOYEE WHERE Salary > 50000;c)
SELECT DISTINCT Dept FROM EMPLOYEE;d)
UPDATE EMPLOYEE SET Salary = 60000 WHERE EmpID = '101';Q20. Differentiate between LAN, MAN, and WAN.
Answer:
| Feature | LAN (Local Area Network) | MAN (Metropolitan Area Network) | WAN (Wide Area Network) |
|---|---|---|---|
| **Span** | Small (Office, Home, Building) | City/Town (Campus) | Large (Country, Continent, Global) |
| **Speed** | High (100 Mbps to 1 Gbps) | Moderate | Low/Moderate (relies on leased lines) |
| **Ownership** | Private | Often shared (ISP, large organization) | Shared (Telecommunication companies) |
Q21. IT Head of a school scenario...
Answer:
a) **Backup Strategy:** Implement a **daily backup** process to an external drive (e.g., NAS) and a **weekly cloud backup** (Off-site backup) to protect against physical disasters.
b) **No Eat/Drink Policy:** Food and drinks can be accidentally spilled onto keyboards/monitors, causing **damage to electronic circuitry** (short circuits) and attracting pests.
c) **Importance of Complex Passwords:** Complex passwords (using upper/lower case, numbers, symbols) are much harder for hackers and **brute-force programs** to guess or crack, significantly improving security.
d) **Physical Data Security:** Locking the server room, using **cabinet locks** on server racks, and placing computers in **monitored areas** to prevent theft or unauthorized hardware access.
a) **Backup Strategy:** Implement a **daily backup** process to an external drive (e.g., NAS) and a **weekly cloud backup** (Off-site backup) to protect against physical disasters.
b) **No Eat/Drink Policy:** Food and drinks can be accidentally spilled onto keyboards/monitors, causing **damage to electronic circuitry** (short circuits) and attracting pests.
c) **Importance of Complex Passwords:** Complex passwords (using upper/lower case, numbers, symbols) are much harder for hackers and **brute-force programs** to guess or crack, significantly improving security.
d) **Physical Data Security:** Locking the server room, using **cabinet locks** on server racks, and placing computers in **monitored areas** to prevent theft or unauthorized hardware access.
Comments
Post a Comment