Class 10 IT (402) Preboard Sample Paper - Set 3

IT (402) Preboard Sample Paper - Set 3

IT (402) Preboard Sample Paper - Set 3

Subject: Information Technology (402) | Class: X
Max Marks: 50 | Time: 2 Hours

SECTION A: OBJECTIVE TYPE QUESTIONS (24 Marks)

Q1. Answer any 4 out of the given 6 questions on Employability Skills (1 x 4 = 4 marks)
1. Using correct grammar and spelling is an example of: a) Non-verbal communication b) Verbal communication quality c) Visual communication d) Feedback
Correct Answer: b) Verbal communication quality
2. Which is NOT a technique for time management? a) Prioritizing tasks b) Procrastination c) Making a To-Do list d) Scheduling
Correct Answer: b) Procrastination
3. The taskbar is usually located at the ________ of the desktop. a) Top b) Bottom c) Left d) Right
Correct Answer: b) Bottom
4. Entrepreneurs help in the economic development of a country by: a) Saving money b) Creating jobs c) Buying imported goods d) Reducing competition
Correct Answer: b) Creating jobs
5. Which practice contributes to sustainability? a) Using plastic bags b) Rainwater harvesting c) Burning garbage d) Wasting water
Correct Answer: b) Rainwater harvesting
6. The shortcut to cut a selected file is: a) Ctrl + C b) Ctrl + X c) Ctrl + V d) Ctrl + Z
Correct Answer: b) Ctrl + X
Q2. Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)
1. Mode to apply a style to many areas without revisiting the Styles window? a) Paint Format b) Fill Format Mode c) Clone Formatting d) Style Bucket
Correct Answer: b) Fill Format Mode
2. In Calc, "Goal Seek" is found under which menu? a) Insert b) Format c) Tools d) Data
Correct Answer: c) Tools
3. View in Base used to define field names and data types? a) Datasheet View b) Design View c) Layout View d) Structure View
Correct Answer: b) Design View
4. Accessibility option that turns the keyboard into a mouse? a) Filter Keys b) Mouse Keys c) Sticky Keys d) Toggle Keys
Correct Answer: b) Mouse Keys
5. Shortcut key to print a document? a) Ctrl + P b) Ctrl + O c) Ctrl + S d) Ctrl + Q
Correct Answer: a) Ctrl + P
6. Amazon and Flipkart are examples of: a) Social Networking b) E-Commerce c) Search Engines d) Educational sites
Correct Answer: b) E-Commerce
Q3. Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)
1. To update the TOC after editing text, you press: a) F5 b) F9 c) F1 d) F12
Correct Answer: b) F9 (or right-click Update Index/Table)
2. When sharing a worksheet, which user can accept or reject changes? a) Any user b) The Reviewer/Owner c) Guest d) No one
Correct Answer: b) The Reviewer/Owner
3. Data type best for storing a "Yes/No" value? a) Varchar b) Boolean c) Integer d) Float
Correct Answer: b) Boolean
4. WAN stands for: a) Wide Area Network b) Wireless Area Network c) Wide Access Network d) Web Area Network
Correct Answer: a) Wide Area Network
5. A digital certificate is used to verify: a) Internet speed b) Identity of the user/website c) Hard disk space d) Monitor resolution
Correct Answer: b) Identity of the user/website
6. DML stands for: a) Data Manipulation Language b) Data Management Language c) Data Mining Language d) Data Model Language
Correct Answer: a) Data Manipulation Language
Q4. Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)
1. The space between the text and the paper edge is called: a) Indent b) Margin c) Spacing d) Border
Correct Answer: b) Margin
2. Feature in Calc used to combine multiple cells into one? a) Wrap Text b) Merge Cells c) Shrink to Fit d) Split Cells
Correct Answer: b) Merge Cells
3. A "Foreign Key" links to the ________ in another table. a) Foreign Key b) Primary Key c) Candidate Key d) Alternate Key
Correct Answer: b) Primary Key
4. Communication model where data transfers in both directions but not simultaneously? a) Simplex b) Half-Duplex c) Full-Duplex d) Complex
Correct Answer: b) Half-Duplex
5. The buying and selling of goods over the internet is called: a) E-Learning b) E-Banking c) E-Commerce d) E-Mail
Correct Answer: c) E-Commerce
6. Which is NOT a natural disaster? a) Earthquake b) Flood c) Gas Leakage d) Tsunami
Correct Answer: c) Gas Leakage (It's a man-made/technological disaster)
Q5. Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)
1. To insert a page break manually, press: a) Ctrl + Enter b) Shift + Enter c) Alt + Enter d) Space + Enter
Correct Answer: a) Ctrl + Enter
2. What is the extension of a Base database file? a) .odb b) .ods c) .odt d) .dbf
Correct Answer: a) .odb
3. Which query statement is used to count the number of records? a) SELECT TOTAL(*) b) SELECT COUNT(*) c) SELECT SUM(*) d) SELECT NUMBER(*)
Correct Answer: b) SELECT COUNT(*)
4. Which device modulates and demodulates signals? a) Router b) Modem c) Switch d) Bridge
Correct Answer: b) Modem
5. Software that tracks a user's activity without their knowledge is called: a) Malware b) Spyware c) Adware d) Firmware
Correct Answer: b) Spyware
6. An "Assembly Point" is: a) A place to manufacture b) A safe area to gather during an evacuation c) A meeting room d) A cafeteria
Correct Answer: b) A safe area to gather during an evacuation

SECTION B: SUBJECTIVE TYPE QUESTIONS (26 Marks)

Answer any 3 out of 5 Employability Skills questions (2 marks each)
Q6. Explain "Feedback" in communication. Why is it important?
Answer: **Feedback** is the **response** given by the receiver to the sender. It is important because it confirms that the message was **received and understood** correctly, allowing the sender to improve communication.
Q7. Name two external factors that cause stress.
Answer: 1. **Work/School pressure** (e.g., deadlines, exams). 2. **Financial problems**. 3. **Major life changes** (e.g., moving, loss of a loved one).
Q8. Define "Operating System". Give one example.
Answer: An **Operating System (OS)** is a system software that manages computer hardware, software resources, and provides common services for computer programs. It acts as an **interface** between the user and the hardware. Example: Windows, Linux, Android.
Q9. List two roles of an Entrepreneur.
Answer: 1. **Innovation** (introducing new ideas/products). 2. **Risk-taking** (taking calculated financial and business risks). 3. **Job creation**.
Q10. What are the "4 Rs" of sustainability?
Answer: 1. **Reduce** (consumption). 2. **Reuse** (items). 3. **Recycle** (materials). 4. **Recover** (energy/resources from waste).
Answer any 4 out of 6 Subject Specific Skills questions (2 marks each)
Q11. How do you insert a "Watermark" in a Writer document?
Answer: Watermarks are typically inserted by modifying the **Page Style**. Go to **Format > Page > Background Tab**, select **Watermark** and enter the desired text and adjust font/transparency settings.
Q12. Explain the difference between "Subtotal" and "Consolidate" in Calc.
Answer: **Subtotal** is used to calculate summary functions (like SUM, AVG) for **groups of data** within a single list/table (data must be sorted first). **Consolidate** is used to calculate summary functions across **multiple worksheets or workbooks** into a single destination cell range.
Q13. What is a "Compound Primary Key"? Give an example.
Answer: A **Compound (or Composite) Primary Key** is a primary key that consists of **two or more attributes/fields** combined. All fields together uniquely identify the record, but individually they may not. Example: In a **RESULT** table, (**StudentID** + **CourseID**) could form the primary key.
Q14. Explain the use of "Filter Keys" in Windows Accessibility.
Answer: **Filter Keys** is an accessibility option that **ignores brief or repeated keystrokes**. It helps users with tremors or physical disabilities who might accidentally press a key multiple times or struggle with key debounce issues, making typing easier and more accurate.
Q15. What is the purpose of a "Router" in a network?
Answer: A **Router** is a networking device that **forwards data packets** between computer networks. Its main purpose is to determine the **best path** for data to travel from its source to its destination, thus connecting different networks (like a home network to the Internet).
Q16. What is "Phishing"? How can you identify a phishing email?
Answer: **Phishing** is a fraudulent attempt, typically made through email, to **obtain sensitive information** (passwords, credit card details) by disguising as a trustworthy entity. **Identification:** Check for misspelled company names, generic greetings, urgent/threatening language, and suspicious sender email addresses/links.
Answer any 3 out of 5 Subject Specific Skills questions (4 marks each)
Q17. (Competency) Sam's Mail Merge...
Answer:
a) **Three components:** 1. **Main Document** (the letter/template). 2. **Data Source** (the list of recipient names and addresses). 3. **Merged Document** (the final output).
b) **Yes**, a Calc spreadsheet can be used as a Data Source.
c) **Yes**, the merge process can output to individual files, which can then be edited.
d) **Benefit:** It saves immense time and effort by automatically personalizing hundreds of documents without manual copy-pasting, ensuring accuracy and consistency.
Q18. (Competency) Shopkeeper's Goal Seek...
Answer:
a) **Formula Cell:** The cell containing the Profit formula (Selling Price - Cost Price).
b) **Target Value:** 1000.
c) **Variable Cell:** The cell containing the Selling Price.
d) **No**, Goal Seek can change **only one cell** (the variable cell) to reach the target result. For multiple variable cells, the Solver tool must be used.
Q19. SQL Queries for table EMPLOYEE...
Answer:
a) SELECT Name FROM EMPLOYEE WHERE Dept = 'IT';
b) SELECT * FROM EMPLOYEE WHERE Salary > 50000;
c) SELECT DISTINCT Dept FROM EMPLOYEE;
d) UPDATE EMPLOYEE SET Salary = 60000 WHERE EmpID = '101';
Q20. Differentiate between LAN, MAN, and WAN.
Answer:
FeatureLAN (Local Area Network)MAN (Metropolitan Area Network)WAN (Wide Area Network)
**Span**Small (Office, Home, Building)City/Town (Campus)Large (Country, Continent, Global)
**Speed**High (100 Mbps to 1 Gbps)ModerateLow/Moderate (relies on leased lines)
**Ownership**PrivateOften shared (ISP, large organization)Shared (Telecommunication companies)
Q21. IT Head of a school scenario...
Answer:
a) **Backup Strategy:** Implement a **daily backup** process to an external drive (e.g., NAS) and a **weekly cloud backup** (Off-site backup) to protect against physical disasters.
b) **No Eat/Drink Policy:** Food and drinks can be accidentally spilled onto keyboards/monitors, causing **damage to electronic circuitry** (short circuits) and attracting pests.
c) **Importance of Complex Passwords:** Complex passwords (using upper/lower case, numbers, symbols) are much harder for hackers and **brute-force programs** to guess or crack, significantly improving security.
d) **Physical Data Security:** Locking the server room, using **cabinet locks** on server racks, and placing computers in **monitored areas** to prevent theft or unauthorized hardware access.

Comments

Popular posts from this blog

Communication Skill

Class IX - Sample Test I - (Q&A)

Class 9 - Chapter - 7 - Introduction to IT-ITES Industry