PAEC10IFT0501 - Prelim Paper - 5 - Answers
PAEC10IFT0501 - Prelim Paper - 5 - Answers
Q2. Answer any 5 questions out of the given 6 questions (1×5 = 5 marks)
1 a) Logical Attributes 1
2 d) Drag and Drop Styles 1
3 d) Goal Seek 1
4 b) Shared Drive 1
5 b) False 1
6 c) Wrapping 1
Q3. Answer any 5 questions out of the given 6 questions (1×5 = 5 marks)
1 b) 3 1
2 c) The document must contain headings 1
3 b) Synchronize contents 1
4 c) Red colour box 1
5 c) Maybe 1
6 d) Picture 1
Q5. Answer any 5 questions out of the given 6 questions (1×5 = 5 marks)
1 c) Cookies 1
2 b) You cannot reject all the changes at a time 1
3 a) Keep Scale 1
4 c) Keep Ratio 1
5 b) False 1
6 a) subtotal 1
SECTION B
Answer any 3 out of the given 5 questions in 20 – 30 words. (2×3 = 06 marks)
Q6 Operating system is an integrated set of program that can controls the resources of a computer 2
and provides its users with an interface that is more convenient to use.
function of operating system :
a) Making computer system convenient to use.
b) To allocate resources to process
c) Provides user interface
d) Managing resources of computer system
Q8 Stress is our emotional, mental, physical, and social response to any perceived demands or 2
threats.
The techniques to manage stress:
Physical exercise and fresh air
Time management
Healthy diet
Positivity
Organising academic life; no delaying
Holidays with family and friends
Good Sleep
Q10 2
Misconception 1
The misconception is that every business idea needs to be unique or special.
Misconception 2
The misconception we have is that a person needs a lot of money to start a
business.
Misconception 3
A misconception we have is that only a person having a big business is an
entrepreneur.
Misconception 4
A misconception we have is that entrepreneurs are born, not made.
Answer any 4 out of the given 6 questions in 20 – 30 words each (2 x 4 = 8 marks)
Q11 2
Grouping is used to combine multiple objects into one object which is helpful to resize and
move multiple objects in a document. These are the steps to use grouping object :
Draw two objects (for example: one circle and a rectangle)
2) Select first object and then press Ctrl+Shift and select second object with mouse.
3) Now right click mouse button and select group option
Q12 2
A network is a collection of interlinked computers by means of a communication system.
Components of network :
i) Hosts ii) NIC(Network Interface Card)
iii) Ethernet Cable iv) Hub
v) Switch vi) Routers
vii) Modem viii) Internet connection
Q13 2
A Workbook is multipage document. Each page in the workbook is called a worksheet and
the active worksheet is displayed in the document window.
Q14 2
Front end provides the interface to the application. This application is used for data entry.
Back end is used to store the data into disks entered from the front end.
Q15 2
Numeric data types in OpenOffice base.
BOOLEAN TINYINT
SMALLINT INTEGER
BIGINT NUMERIC
DECIMAL REAL, FLOAT, DOUBLE
Q16 2
Text wrapping refers to the relation of graphics to the surrounding text, which may wrap
around the graphic on one or both sides, be overprinted behind or in front of the graphic, or
treat the graphic as a separate paragraph or character.
The options of wrap text are:
a) No Wrap: The image will be inserted and kept as it is inserted.
b) Page Wrap: Image will be placed around the text to be rearranged and fill the space to
the left and right of it
c) Optimal page wrap: It prevents text from being placed to the side of the image if the
spacing between the image and the margin is less than 2 cm.
d) Wrap through: The image will be brought forward on written text.
Answer any 3 out of the given 5 questions in 50– 80 words each (4 x 3 = 12 marks)
4
Q17 e) Rajeev should use Goal seek- as It is one of the What-if tools & it helps us to find the
desired result by adjusting an input value.
f) Neeta should use What-if analysis , it is a technique that is used to determine how
projected result is affected by changes in the assumptions that projections are based
upon.It is the process of changing the values in cells to see how those changes will
affect the outcome of formulas on the worksheet.
Q18 Table : A Table is a collection of records that can be divided into fields. Each field holds a
single piece of information. 4
Feild : A field is raw fact and figure
Record : A record is a collection of fields.
Query : A query is a statement that gives us filtered data according to our condition.
4
Q19 1. select * from Fabric where Disc>10;
2. select * from Fabric where type = ‘Woollen’;
3. update fabric set Disc =Disc + 10 where Fname = ‘Shirt’;
4. delete from Fabric where FabricID =‘F003’;
5. select FName, Type, Discount from Fabric where Fabric Id = F005;
4
Q20 In an email, the message can be sent to a person but we are not getting an immediate
response.
In Instant Messaging, the user gets a real-time response from the participant. I
n the email the screen cannot be shared whereas in Instant Messaging screen will be shared.
The keyboard accessibility options:
On-Screen keyboard
Use sticky keys
Use toggle keys
Use Filter keys
Change how keyboard shortcut work
Print shortcut
Make it easier to type
The mouse accessibility options:
Cursor Options
Mouse Keys
There are many different type of computer virus. They infect the computer in different ways. 4
Q21 1)Malware-is a program which harms the computer, and comes into the computer without
the user’s consent.
2)Spyware-is a kind of malware that is sent to someone’s computer intentionally to steal
information such as e-mail password, credit card password.
3)Program Virus-infects the files with the extension .exe, .com, .sys, .ovl. program files are
used by virus as they
4)Trojan Horse-is a program which appears to be useful. Confidential information is stolen
and passed using this virus. A Trojan horse enters in the computer with the help of the users.
The users install it under the wrong impression that it is useful and harmless program.
5)Worms-is a program which is capable of reproducing spreading itself to another computer
system with the help of the computer network. This type of virus doesn’t cause direct
damage to the files and programs.
6)Boot Sector Virus-When computer boots, it loads Operating System in Main
Memory(RAM) from Boot Sector. The Boot Sector virus changes the location of the
Operating System, so the computer does not boot properly and does not start.