0% found this document useful (0 votes)
31 views4 pages

PAEC10IFT0501 - Prelim Paper - 5 - Answers

Highest quality full portion Prelim Paper

Uploaded by

saumitrapotdar1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
31 views4 pages

PAEC10IFT0501 - Prelim Paper - 5 - Answers

Highest quality full portion Prelim Paper

Uploaded by

saumitrapotdar1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

CBSE | DEPARTMENT OF SKILL EDUCATION

INFORMATION TECHNOLOGY (SUBJECT CODE 402)


Class X – Answer Key Prelim V (2022-23)
Max. Time : 2 Hrs. Max. Marks: 50
SECTION A
Q1.Answer any 4 questions out of the given 6 questions (1×4 = 4 marks)
1 d)Self-Awareness 1
2 a)Any device which tangible and can be touched is hardware and a program that makes 1
hardware function is software
3 c)Patient 1
4 d)thinking about daily interactions. 1
5 b)Ransomware 1
6 c)Delete erases characters from right side , Backspace erases characters from left side 1

Q2. Answer any 5 questions out of the given 6 questions (1×5 = 5 marks)
1 a) Logical Attributes 1
2 d) Drag and Drop Styles 1
3 d) Goal Seek 1
4 b) Shared Drive 1
5 b) False 1
6 c) Wrapping 1

Q3. Answer any 5 questions out of the given 6 questions (1×5 = 5 marks)
1 b) 3 1
2 c) The document must contain headings 1
3 b) Synchronize contents 1
4 c) Red colour box 1
5 c) Maybe 1
6 d) Picture 1

Q4.Answer any 5 questions out of the given 6 questions (1×5 = 5 marks)


1 b) Graphic Styles 1
2 c) macro recorder 1
3 a) Primary Key 1
4 c) Format Example 1
5 b)A and B both are correct 1
6 b) False 1

Q5. Answer any 5 questions out of the given 6 questions (1×5 = 5 marks)
1 c) Cookies 1
2 b) You cannot reject all the changes at a time 1
3 a) Keep Scale 1
4 c) Keep Ratio 1
5 b) False 1
6 a) subtotal 1
SECTION B
Answer any 3 out of the given 5 questions in 20 – 30 words. (2×3 = 06 marks)
Q6 Operating system is an integrated set of program that can controls the resources of a computer 2
and provides its users with an interface that is more convenient to use.
function of operating system :
a) Making computer system convenient to use.
b) To allocate resources to process
c) Provides user interface
d) Managing resources of computer system

Q7 Helps in Wealth creation and sharing 2


Creating Employment Opportunities jobs
Innovation
Balanced Regional Development
improves Standards of Living of People

Q8 Stress is our emotional, mental, physical, and social response to any perceived demands or 2
threats.
The techniques to manage stress:
 Physical exercise and fresh air
 Time management
 Healthy diet
 Positivity
 Organising academic life; no delaying
 Holidays with family and friends
 Good Sleep

Q9 Five safety measures : 2


i) Use antivirus and antispyware software
ii) Use strong passwords
iii) Backup your data:
iv) Use encryption software
v) Keeping your username and password private
vi) Do not share personal information
vii) Secure transactions

Q10 2
Misconception 1
The misconception is that every business idea needs to be unique or special.
Misconception 2
The misconception we have is that a person needs a lot of money to start a
business.
Misconception 3
A misconception we have is that only a person having a big business is an
entrepreneur.
Misconception 4
A misconception we have is that entrepreneurs are born, not made.
Answer any 4 out of the given 6 questions in 20 – 30 words each (2 x 4 = 8 marks)
Q11 2
Grouping is used to combine multiple objects into one object which is helpful to resize and
move multiple objects in a document. These are the steps to use grouping object :
Draw two objects (for example: one circle and a rectangle)
2) Select first object and then press Ctrl+Shift and select second object with mouse.
3) Now right click mouse button and select group option

Q12 2
A network is a collection of interlinked computers by means of a communication system.
Components of network :
i) Hosts ii) NIC(Network Interface Card)
iii) Ethernet Cable iv) Hub
v) Switch vi) Routers
vii) Modem viii) Internet connection

Q13 2
A Workbook is multipage document. Each page in the workbook is called a worksheet and
the active worksheet is displayed in the document window.

Q14 2
Front end provides the interface to the application. This application is used for data entry.
Back end is used to store the data into disks entered from the front end.

Q15 2
Numeric data types in OpenOffice base.
BOOLEAN TINYINT
SMALLINT INTEGER
BIGINT NUMERIC
DECIMAL REAL, FLOAT, DOUBLE
Q16 2
Text wrapping refers to the relation of graphics to the surrounding text, which may wrap
around the graphic on one or both sides, be overprinted behind or in front of the graphic, or
treat the graphic as a separate paragraph or character.
The options of wrap text are:
a) No Wrap: The image will be inserted and kept as it is inserted.
b) Page Wrap: Image will be placed around the text to be rearranged and fill the space to
the left and right of it
c) Optimal page wrap: It prevents text from being placed to the side of the image if the
spacing between the image and the margin is less than 2 cm.
d) Wrap through: The image will be brought forward on written text.

Answer any 3 out of the given 5 questions in 50– 80 words each (4 x 3 = 12 marks)
4
Q17 e) Rajeev should use Goal seek- as It is one of the What-if tools & it helps us to find the
desired result by adjusting an input value.
f) Neeta should use What-if analysis , it is a technique that is used to determine how
projected result is affected by changes in the assumptions that projections are based
upon.It is the process of changing the values in cells to see how those changes will
affect the outcome of formulas on the worksheet.
Q18 Table : A Table is a collection of records that can be divided into fields. Each field holds a
single piece of information. 4
Feild : A field is raw fact and figure
Record : A record is a collection of fields.
Query : A query is a statement that gives us filtered data according to our condition.
4
Q19 1. select * from Fabric where Disc>10;
2. select * from Fabric where type = ‘Woollen’;
3. update fabric set Disc =Disc + 10 where Fname = ‘Shirt’;
4. delete from Fabric where FabricID =‘F003’;
5. select FName, Type, Discount from Fabric where Fabric Id = F005;
4
Q20 In an email, the message can be sent to a person but we are not getting an immediate
response.
In Instant Messaging, the user gets a real-time response from the participant. I
n the email the screen cannot be shared whereas in Instant Messaging screen will be shared.
The keyboard accessibility options:
 On-Screen keyboard
 Use sticky keys
 Use toggle keys
 Use Filter keys
 Change how keyboard shortcut work
 Print shortcut
 Make it easier to type
The mouse accessibility options:
 Cursor Options
 Mouse Keys
There are many different type of computer virus. They infect the computer in different ways. 4
Q21 1)Malware-is a program which harms the computer, and comes into the computer without
the user’s consent.
2)Spyware-is a kind of malware that is sent to someone’s computer intentionally to steal
information such as e-mail password, credit card password.
3)Program Virus-infects the files with the extension .exe, .com, .sys, .ovl. program files are
used by virus as they
4)Trojan Horse-is a program which appears to be useful. Confidential information is stolen
and passed using this virus. A Trojan horse enters in the computer with the help of the users.
The users install it under the wrong impression that it is useful and harmless program.
5)Worms-is a program which is capable of reproducing spreading itself to another computer
system with the help of the computer network. This type of virus doesn’t cause direct
damage to the files and programs.
6)Boot Sector Virus-When computer boots, it loads Operating System in Main
Memory(RAM) from Boot Sector. The Boot Sector virus changes the location of the
Operating System, so the computer does not boot properly and does not start.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy