0% found this document useful (0 votes)
20 views9 pages

Sample Paper 2

This document is a model test paper for Class X Information Technology based on CBSE sample papers. It consists of 21 questions divided into two sections: Objective Type Questions (Section A) and Subjective Type Questions (Section B), with a total of 50 marks. Candidates are required to answer a specified number of questions from each section within a time limit of 2 hours.

Uploaded by

Sanchi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
20 views9 pages

Sample Paper 2

This document is a model test paper for Class X Information Technology based on CBSE sample papers. It consists of 21 questions divided into two sections: Objective Type Questions (Section A) and Subjective Type Questions (Section B), with a total of 50 marks. Candidates are required to answer a specified number of questions from each section within a time limit of 2 hours.

Uploaded by

Sanchi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Model Test Paper – 2

(Based on CBSE Sample Paper)


Information Technology
Class X Examination

Time: 2 hrs Max. Marks : 50

n
1. Please read the instructions carefully.
2. This Question Paper consists of 21 questions in two sections: Section A & Section B.
3. Section A has Objective Type Questions whereas Section B contains Subjective Type Questions.

tio
4. Out of the given (5 + 16 =) 21 questions, a candidate has to answer (5 + 10 =) 15 questions in the
allotted (maximum) time of 2 hours.
5. All questions of a particular section must be attempted in the correct order.
6. Section A : Objective Type Questions (24 Marks)
(i) This section has 5 questions.

ca
(ii) Marks allotted are mentioned against each question/part.
(iii) There is no negative marking.
(iv) Do as per the instructions given.
7. Section B: Subjective Type Questions (26 Marks)
(i) This section has 16 questions.

du
(ii) A candidate has to do 10 questions.
(iii) Do as per the instructions given.
(iv) Marks allotted are mentioned against each question/part.

SECTION A :Objective Type Questions


1. Answer any 4 out of the given 6 questions based on Employability Skills (1 x 4 = 4)
tE
(i) .............. stress is a result of unexpressed worries. (1)
(a) Internal (b) Environmental
(c) External (d) Survival
an

Ans. (a) Internal

(ii) An operating system that manages a group of independent computers and makes them appear to be a
single computer is known as a _______________ operating system. (1)
nt

(a) real-time (b) Graphical


(c) distributed (d) Multi-user

Ans. (c) distributed


ve

(iii) ............... plays a major role in reaction to stress. (1)

(a) Personality (b) Positive attitude


(c) Behaviour (d) None of these

Ans. (a) Personality


In

(iv)

Which term means walking in the local park or similar such activity?
(a) Nature walk (b) Motivation
(c) Regulation (d) None of these
Ans. (a) Nature walk

(v) An entrepreneur must form contacts with the ......... to analyse the market. (1)

(a) Planning (b) Competitors


(c) Self-confident (d) None of these
Ans. (b) Competitors

n
(vi) .............. brings about changes in people's knowledge, attitude and skills. (1)
(a) Sustainable development

tio
(b) Natural resources
(c) Both (a) and (b)
(d) None of these

Ans. (a) Sustainable development

ca
2. Answer any 5 out of the given 6 questions (1X5=5)

(i) In the Mail Merge dialog box, you can select the _____ option if you want to
save the merged documents. (1)
du
(a) File (b) Edit (c) View (d) Format
Ans. (a) File
(ii) Prerna is a student of class X. Her teacher has asked her to create a document on
'Women Empowerment'. She has written the text and also added relevant images in
her document using Writer. But she has realised that the paragraph will look better if
tE
the images are placed around the text. Name the feature of Writer she can use to get
the desired result. (1)
(a) Placing image
(b) Positioning image
(c) Wrap text
(d) Closing text
an

Ans. (c) Wrap text


(iii)The grey colour in the TOC reminds us that the text has been generated ___ _
(a) manually (b) automatically (c) Both (a) and (b) (d) None of these (1)
Ans. (b) automatically
(iv) Prashant is a writer. He has just completed writing his book using Writer software.
nt

Now he wants to add a page which will contain the title of each chapter and its
respective page number. Suggest the feature that can be used to do this task. (1)
(a) Mail merge (b) Templates
(c) Styles (d) Table of contents
ve

Ans. (d) Table of contents

(v)

Under Insert tab, ......... group contains the features like Shapes, ClipArt etc. (1)
In

(a) Illustrations
(b) Shapes
(c) Paragraph
(d) Clipboard
Ans. (a) Illustrations

(vi)
Two other toolbars can be opened from Picture Tool bar are : the .......... and ........... . (1)
(a) Edit picture, Color picture
(b) Format, drawing
(c) Graphic Filter toolbar, Color toolbar
(d) Floating toolbar, Color toolbar
Ans. (b) Format, drawing

Q.3. Answer any 5 out of the given 6 questions (lx5=5)


(i) Aparna has made four spreadsheets containing marks of 5 subjects of all the students

n
of her class. She has to prepare a sheet that contains the total marks of all the subjects
of her class. Name the option that can be used to perform this task. (1)

tio
(a) Subtotal (b) Average
(c) Goal Seek (d) Scenario

Ans. (a) Subtotal

ca
(ii) Linked data is stored in the ......... . (1)

(a) destination file (b) web file


(c) source file (d) domain file

Ans. (c) source file


du
(iii) _____ is used in between the cell reference in a formula.
(a): (b), (c) Both (a) and (b) (d)@
(1)
tE
Ans. (c) Both (a) and (b)
(iv) Internally for each recorded macro, some code is generated, which is stored inside
______ and clause. (1)
(a) Sub, End Sub
(c) Function, End Function
(b) Section, End Section
an

(d) None of these

Ans. (a) Sub, End Sub


(v) In Goal seek dialog box, in the ........._we enter the reference of the cell that
contains the value to be changed. (1)
(a) variable cell
nt

(c) modifying cell


(b) changing cell
(d) replacing cell
ve

Ans. (a) variable cell


(vi)
Which allows you to reorder data? (1)
(a) Sorting
(b) Filtering
In

(c) Scenario
(d) Custom sorting

Ans. (a) Sorting

Q.4. Answer any 5 out of the given 6 questions (lx5=5)


(i)
Field is the individual sub component of one ......... . (1)
(a) record (b) column
(c) data (d) None of these

Ans. (a) record


(ii) The default data type for a field is ......... . (1)
(a) char (b) int
(c) text (d) None of these

n
Ans. (c) text

tio
(iii) You create a table in MS-Access. You decidedto create two fields RollNo and Date of Birth,

what will be the data type of Date-of-Birthcolumn? (1)


(a) Number
(c) Yes/No
(b) Text

ca
(d) Date/Time

Ans. (d) Date/Time


(iv) When you define a field for a table, which of the following parameters does Access always
consider optional? (1)
(a) Field Name
(c) Field Size
(b) Data Type
(d) Description
Ans. (d) Description
du
tE
(v) Duplication of data is known as ......... . (1)
(a) data security (b) data incomplete
(c) data redundancy
(d) None of these
an

Ans. (c) data redundancy


(vi) If the two departments (HR and IT) access the data simultaneously then only one department will see the
updates by the other department. DBMS solves this issue. Thus, DBMS helps to avoid_________________
which means if a single database is used by multiple users then it also ensures that the same data is present
for all the users.
(a) Data redundancy
nt

(b) Data inconsistency

(c) Data piracy


ve

(d) Data modification

Ans. (b) Data inconsistency

Q.5. Answer any 5 out of the given 6 questions (lx5=5)


In

(i) Which client software is used to request and display web pages? (1)
(a) Web server
(b) FTP
(c) Multimedia
(d) Web browser
Ans. (d) Web browser
(ii) Internet is a network of ......... . (1)
(a) networks
(b) data
(b) value
(d) pages

Ans. (a) networks

n
(iii) The first network was ......... . (1)

tio
(a) ARPANET
(b) Internet
(c) NSFnet
(d) NET

ca
Ans. (a) ARPANET

(iv) A/An ......... that identifies a specific computer on the Internet. (1)
(a) user name
(b) domain name
(c) E-mail
(d) None of these

Ans. (b) domain name


du
(v) Satellite which are orbiting around the ......... , provide necessary links for
telephone and television service. (1)
tE
(a) wire (b) Earth
(c) station (d) All of these

Ans. (b) Earth

(vi) A router passes data packets from one network to another network based on
an

their ......... not MAC address. (1)


(a) IP address (b) URL
(c) Web address (d) None of these
Ans. (a) IP address

SECTION B : Subjective Type Questions


nt

Answer any 3 out of the given 5 questions based cm Employability Skills. Answer eachquestion in 20-30
words

6. What do you mean by verbal communication? [2]


ve

Verbal communication means communication through spoken oral and written words. It implies use
of words which make up a language. It is the ability to communicate using words in understandable
language i.e. English, Hindi, French, Urdu etc. Language play a significant role in verbal
communication. The effectiveness of the verbal communication depends on the tone of the
In

speaker, clarity of speech, volume, speed, body language and the quality of words used in
conversation.
7. Explain the term fatigue related stress. [2]

Fatigue related kind of stress builds up over a long time like by working too long or too hard at our
job, school or home. It can also be caused by exercising too much or too long.
If you do not know how to manage your time well or how to take time out for rest and relaxation, you
will become a victim of fatigue related stress. This can be one of the hardest kinds of stresses to
avoid because many people feel that it is out of their control.
8.
Why is self-regulation important in life? [2]

Ans. Self-regulation is important in life due to followingreasons:


(i) Self-regulation allows you to keep a tab on yourown emotions.
(ii) Self-regulation enables to develop the idea about'what is appropriate behaviour' and 'what is
inappropriate behaviour' in a given socialcondition.

n
(iii) It helps in controlling negative impulses andreciprocate emotions for actualising set goals.

9.What are the responsibilities of an operating system with respect to file management?

tio
[2]

Ans.
The operating system is responsible for the following activities in connection with
file management :

ca
• Allocating and deallocating memory space as needed.
• Creating and deleting files.
• Creating and deleting directories to organise files.
• Supporting primitives for manipulating files and directories.
• Mapping files onto secondary storage.
Backing up files on stable (non-volatile) storage media.
du
10. Describe any two problems related to sustainable development.
Ans.Two problems related to sustainable development are as follows:
[2]

• Poor management of natural resources combined with growing economic activities will continue
to pose serious challenges to environment.
tE
• The most significant environmental problems are associated with resources that are renewable
such as air and water. They have finite capacity to assimilate emissions and wastes but if pollution
exceeds this capacity ecosystem can deteriorate rapidly.

Answer any 4 out of the given 6 questions in 20-30 words each (2 x 4=8)
11. What is Mail Merge? [2]
Ans.
an

Mail Merge is a very important feature of a word processor. It is used to create a series of
documents with same text and multipleaddresses. In the process of mail merge we
merge a main document (a letter or certificateetc.) with different mailing addresses to create
several copies of the main document bearingaddresses of different individuals. Mail merge
is generally used to send invitations, lettersor to print certificates for several people .
nt

12.What is a macro? [2]


Ans.
A macro is a saved sequence of commands or keystrokes that are stored for later use. An example
of a simple macro is one that "types" your address. The LibreOffice macro language is very
ve

flexible, allowing automation of both simple and complex tasks. Macros are especially useful to
repeat a task the same way over and over again.

13. Define router as network device. [2]


In

Ans.
A hardware device designed to take incoming packets, analyse the packets, move the packets to another
network, convert the
packets to another network interface, drop the packets, direct packets to the appropriate locations, etc. A
router functions
similar to a bridge. However, unlike a bridge, a router passes data packets from one network to another
network based on their
IP addresses not MAC addresses.

14. Define the following terms: [2]


(i) Active Cell (ii) Sheet Tab

Ans. (i) Active Cell The cell with the black outline. Data is always entered into the active cell.
(ii) Sheet Tab The tab at the bottom of a worksheet tells you the name of the worksheet such as Sheet 1, Sheet
2 etc. Switching

n
between worksheets can be done by clicking on the tab of the Sheet which you want to access.

15. Explain the term relational database management system. [2]

tio
Ans. RDBMS (Relational Database Management System) is a type of DBMS that stores data in the form of
relations (tables).
Relational databases are powerful, so they require few assumptions about how data is related or how it will be
extracted from the

ca
databases.
An important feature of rational database system is that a single database can be spread across several tables.
Base, Oracle,
DB2, SAP, Sybase, ASE, Informix, Access etc. are the examples of RDBMS.

16. State any two practices for internet security. (2)

du
Ans. Any two practices for internet security are:

i. Use Strong Passwords: A strong password is a combination of alpha-numeric and special characters. Do not
use your mobile number, friends name, etc. for a password. Change your password frequently at least
once in 2 or 3 weeks.
tE
ii. Backup Your Data: Always keep copies of your personal data in CDs, pendrive, etc. This may be helpful in a
loss of data situation

Answer any 3 out of the given 5 questions in 50-80 words each (4 x3 = 12)
an

17. What are the steps to change the style of the text in a document? [4]

Word supplies you with predesigned style sets that contain styles for titles, subtitles, quotes, headings, lists
and more.
nt

To choose a style set, follow the given steps:


• Click on Home tab.
• Click Change Styles in the Styles group. A menu will appear.
• Select Style Set and a sub menu will appear.
ve

• You can choose from any of the styles listed on the menu.

18.Ishita is a teacher. She had entered the marks of all the subjects and also calculated the total of the
students. Now, she wants to sort the data so that she can find the names of the students according to their
marks in descending order. Tell her the different steps to sort the data.
In

[4]

Ans. To sort more than one columns, follow the given steps:
• Select those cells, which you want to sort.
• Click on Sort & Filter option from Editing group in Home tab. By this, you will get a drop-down menu.
• From this menu, select Custom Sort option and then Sort dialog box will appear.
• Click on Add Level button and then select next column (which you want to sort).
• Click on OK button.

19. How to clear web history on the Mozilla Firefox browser? [4]
Ans. Follow the steps below for how to clear web history on the Mozilla Firefox browser:

• Click on the upper right of the browser toolbar.


• Click History.
• Click Clear Recent History.

n
• Click the drop-down menu next to Time range to clear and select Everything.
• Place a checkmark next to the following options under Details:
• Browsing and Download History • Form & Search History • Cookies

tio
• Cache • Active Logins • Offline Website Data
• Site Preferences
• Click on clear Now button.

ca
20. What do you mean by data control language? Also, give its types. [4]
Ans. DCL (Data Control Language) commands are used to assign security levels in database which involves
multiple user setups. They are

used to grant defined role and access privileges to the users.


There are two kinds of user in the schema
du
o Users They work with the data, but cannot change the structure of the schema. They write data
manipulation language.
o Admin They can change the structure of the schema and control access to the schema objects. They write
data definition
language.
tE
Basically, the DCL component of the SQL language is used to create privileges that allow users to access and
manipulation of
the database.
Two types of DCL commands are :
(i) GRANT Used to give user's access privileges to database.
(ii) REVOKE Used to withdraw access privileges given with the GRANT command.
an

21.
Consider the following table: EmployeeSalary [4]
nt

Lastname FirstName Dept PayrollNumber Salary JobTitle


Shen James Finance A621 19500 Payroll Clerk
Gupta Shruti Finance M502 35000 Accountant
ve

Bedi Reeta Human M455 18500 Accountant


Resource
Walker Tia Sales W232 39000 Sales
Representative
In

(i) How many fields and records are there in the table EmployeeSalary.
(ii) Write the SQL queries for the following:
(a) List all data of table EmployeeSalary.
(b) Display all the records whose salary is less than 25000.
(c) Display the FirstName and JobTitle of employees having Dept ‘Accountant’.
Ans. (i) There are 6 fields and 4 records in the table EmployeeSalary.
(ii)
(a) SELECT * FROM EmployeeSalary;
(b) SELECT * FROM EmployeeSalary WHERE Salary<25000;
(c) SELECT FirstName, JobTitle FROM EmployeeSalary WHERE Dept=’Finance’;

n
tio
ca
du
tE
an
nt
ve
In

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy