Question Bank Class X IT 402 Long Question Answer
Question Bank Class X IT 402 Long Question Answer
Session : 2023-24
Class –X
Subject- Information Technology (402)
Communication Skills
Q.1. Write the points to be kept in mind to make an effective presentation for the audience
(Mention any 5 Points).
Ans.
1. Do prior research, know the topic and collect the material of what you will talk about.
2. Highlight key points that are necessary for the audience to remember. Keep the points as
short as possible.
3. Avoid too much text Summarize the content as bullet points. Use simple language and limit
the number of bullets to three or four per slide.
4. Limit the number of slides - On average, one slide per minute is recommended.
5. Fancy fonts must be avoided.
6. Keep slide color scheme consistent throughout the presentation.
7. Transitions and Animations must be used carefully to avoid distractions.
8. Use a slide design template to keep presentation look consistent.
Q.2. What are the seven elements that influence the communication skills?
Answer – There are seven different factors which affecting Perspectives in communication –
1. Language
2. Environment
3. Visual Perception
4. Culture
5. Prejudice
6. Feelings
7. Past Experience
Answer – There are 7 C‟s effective communication which are applicable for both written as well as oral
communication. These are as follows –
Answer – Sounds, words, language, and speech are all examples of verbal communication. Speaking is
one of the most effective and often used in verbal communication methods.
b. Written Communication – This method of communication entails the use of written words. Letters,
circulars, reports, manuals, SMS, social media chats, and so on are all examples. It could be a group of
two or more persons.
c. Small Group Communication – When there are more than two people participating, this form of
communication occurs. Each participant has the opportunity to interact and speak with the others.
d. Public Communication – The communication takes place when one individual addresses a large
group of audience.
a. Physical Barriers – The environmental and natural conditions that operate as a barrier in
communication when conveying messages from sender to receiver are referred to as physical barriers.
c. Interpersonal Barriers – When a sender‟s message is received differently than intended, it creates
barriers to interpersonal contact. It‟s also tough to communicate with someone who refuses to converse
or express their emotions or opinions.
d. Organizational Barriers – Formal hierarchical structures are used to create organizations that adhere
to performance standards, rules & regulations, processes, policies, and behavioral norms, among other
things.
e. Cultural Barriers – When people from different cultures are unable to understand each other‟s
languages, it causes problems and inconveniences.
Q.3. What are the four steps for effective time management?
Answer –
a. Any planned action should not be delayed or postponed.
b. Organize your room and desk at school.
c. Create a “NO DISTURBANCE ZONE” where you may sit and finish important tasks without being
disturbed.
Answer – The ability to recognize and regulate one‟s own emotions, as well as the emotions of others, is
referred to as emotional intelligence.
a. Emotional Awareness – The ability to recognize and name one‟s own feelings is known as emotional
awareness.
b. Harnessing Emotions – The ability to harness and apply emotions to tasks such as thinking and
problem solving is referred to as “harnessing emotions.”.
c. Managing Emotions – Managing Emotions entails the ability to control one‟s own emotions when
appropriate, as well as helping others in doing the same.
Answer – Full form of ICT is Information and communication technology. The goal of ICT is to bridge the
gap between parents, educators, and students by encouraging sustainable, cooperative, and transparent
communication methods.
Advantages of ICT
a. Enhanced the modes of communication
b. Independent learning platforms Cost – efficient
c. Enhanced data and information security
d. Paperless – Eliminate the usage of paper
e. Better teaching and learning methods
f. Web – based LMS tools
Disadvantages of ICT
a. Traditional books and handwritten methods are at risk.
b. Managing courses online is difficult
c. Teachers require experience to handle ICT
d. Risk of cyber attacks and hacks
e. Misuse of technology
Answer –
a. Function keys – F1 to F12 are function keys in the keyboard, function keys are used for specific
purposes.
c. Enter key – ENTER or RETURN keys are known as Enter key, depending on the brand of computer
that you are using.
d. Punctuation keys – It includes keys for punctuation marks, such as colon (:), semicolon (;), question
mark (?), single quotation marks („ ‟), and double quotation marks (“ ”).
e. Navigation keys – END, HOME, PAGE DOWN, PAGE UP and Arrow keys are known as navigation
keys, these keys are used to move up, down, left or right in the document.
f. Command keys – BACKSPACE, INSERT (INS) and DELETE(DEL) are known as command keys.
INSERT key allows you to overwrite characters to the right side.
The DELETE command key and BACKSPACE key are used to remove typed text, character, or any other
objects from the right and left side of the cursor.
a. Keeping a Device Clean – Always keep a device clean, such as the keyboard, the screen, and the
mouse. Handle your gadget with care, keep it cool, and don‟t overload your battery.
Daily Maintenance
Weekly Maintenance
Monthly Maintenance
Answer – Threats are ways in which personal information from a computer can be released without our
knowledge.
a. Theft – Theft means stealing of information or hardware. These maybe of three types:
ii. Identity – A hacker gets your personal information and uses it to impersonate you. The hacker can
use this fake identity to get access to your account information or engage in illegal activity.
b. Software Piracy – This is stealing of software and includes using or distributing unlicensed and
unauthorized copies of a computer program or software.
i. Virus – Viruses are computer programmes that can corrupt data and software applications, as well
as steal data from computers. Worms and Trojan Horses are two major forms of viruses.
ii. Worms – Worms are viruses that replicate and spread to all files on a computer once they attack a
computer. This makes it very difficult to remove them.
A Trojan Horse appears to be a useful software programme, but once it reaches a computer, it begins to
behave like a virus and destroys the data.
iii. Online Predator – Online predators are persons who use the internet to trap you into unhealthy
relationships. They could be older people appearing as your age who harass you into doing unlawful
things online.
Answer – To protect our data from theft and viruses we can take the following measures –
a. Use Strong password in your account – Make your passwords difficult to guess. When creating a
new password, attempt to use a combination of
Small Character
Capital Character
Special Character
Numbers
b. Install Antivirus and Firewall –Anti-virus software and a firewall protect your data from virus and from
hackers.
c. Encrypt your data – Keep your information in an encrypted format to keep it safe from unauthorized
users.
d. Open only secure site – Before visiting a website, make sure the address begins with https://. A
website that begins with https:// is a secure website.
Entrepreneurial Skills
Q.1. What do entrepreneurs do when they run their business?
Answer –
a. Fulfill Customer Needs – A product or service that people want is referred to as demand.
Entrepreneurs discover what people desire. Then students use their imaginations to come up with a
business plan to address that demand.
b. Use Local Materials – Entrepreneurs produce low-cost items by using the materials and people
available to them.
c. Help Society – Entrepreneurs have a good interaction with the general public. They gain money by
doing things that help society. Some business people donate money to create schools and clinics, while
others work to save the environment.
e. Sharing of Wealth – Wealth means having enough money to live a comfortable life. As entrepreneurs
grow their business.
f. Lower Price of Products – The price of a product decreases when more entrepreneurs sell the same
thing. In India, for example, as more mobile phones were sold, the cost of the phone decreased.
a. Self Employment – An entrepreneur is a self-employed individual who runs a business to meet a need
by experimenting with new ideas.
i. Enter – When an entrepreneur first starts business, they are simply getting their feet wet in the
business world.
ii. Survive – There are a lot of entrepreneurs around nowadays. In a competitive market, the
entrepreneur must remain competitive.
iii. Grow – An entrepreneur considers growing his or her business once it has reached a certain
level of stability.
b. Wage Employment – Wage management is based on work grades and performance parameters.
Wage management‟s goal is to take reward and give high performance standards in the business.
Answer – Adaptable and flexible to achieve the goals of enhancing quality and customer satisfaction
Green skill
Q.1. Problems Related to Sustainable Development?
Answer – Sustainable development is the development which doesn‟t compromise the capacity of the
future generation to satisfy their needs.
In 1987 the first time sustainable development appeared in the Brundtland report. This was a warning to
all countries regarding environmental consequences, globalization and economic growth.
Sustainable Development goals are also known as Global goals. There are 17 goals in sustainable
development which were introduced in 2015.
Answer – The importance of Sustainable Development in finding solutions to the world‟s growing
problems. Countries should establish laws and guidelines to eliminate poverty and hunger, as well as to
provide decent health and education.
Some of the important Sustainable Development goals are –
a. Quality Education
e. Reduced Inequalities
Q.4. What are Sustainable Processes? What Sustainable Development Initiatives taken from the
public in India.
Answer – Farmers who practice organic farming do not use chemical pesticides or fertilizers to boost
their yield. To aid in the growth of crops, they use organic and natural fertilizers such as cow dung.
This contributes to higher-quality, chemical-free crops while also preserving the soil‟s quality for future
usage.
a. When plastics were banned in Mangalore, one entrepreneur, Mr. Vasth Hedge, created a
biodegradable bag that can dissolve in hot water and degrade in the natural environment.
b. Narayana Peesapath created edible cutlery out of a grain; these spoons can be eaten and even if they
are not eaten they will easily decompose in the soil.
ANSWER
• Paragraph styles control all aspects of a paragraph’s appearance, such as text alignment, tab
stops, line spacing, and borders, and can include character formatting.
• Character styles affect selected text within a paragraph, such as the font and size of text, or bold
and italic formats.
• Cell styles include fonts, alignment, borders, background, number formats (for example, currency,
date, number), and cell protection.
• Graphics styles in drawings and presentations include line, area, shadowing, transparency, font,
connectors, dimensioning, and other attributes.
Q.2. Tanmay is a Class X student. He has learnt Mail Merge option of a Word Processor in his
computer period. But he is confused with few terms used to merge documents.
Explain the following briefly, which will help Tanmay better understand the Mail Merge options.
1. Merge Field
2. Data Source
3. Main Document
Ans. 1. Merge Field: A merge field is where you want to insert the information from a data source
into a main document. Merge fields appear with chevrons (« »).
2. Data Source: Data source is a file that contains the names and addresses or any other information
that vary with each version of a mail-merge document.
3. Main Document: Main document is the document which contains text and graphics. It may be a
formal or an official letter.
4. Two types of data on which mail merge can be applied are Labels and Letters.
Q.4. How can a table of contents be created and formatted in a digital document?
Answer – To create and format a table of contents in a digital document, users can follow these steps:
Q.5. How can the use of styles improve the efficiency of document creation and editing?
Answer – Styles can enhance the efficiency of document creation and editing by enabling users to
quickly and easily apply formatting options to text and paragraphs. By defining a set of styles that reflect
the formatting options commonly used in the document, users can swiftly apply those styles to text and
paragraphs with a single click, streamlining the process and saving time.
This feature allows for consistency in formatting, reduces the possibility of errors, and improves the
overall productivity of document creation and editing. In summary, using styles is a powerful tool that
significantly enhances the efficiency of digital document processing.
Ans.
Normal View: The default view of the spreadsheet application is the Normal. It‟s a collection of
cells arranged in the work area.
Page Layout: It is to quickly fine tune a worksheet that contains many charts or huge amounts
of data and achieve professional looking results.
Page Break Preview: This option is similar to the Page Layout option except you can set the
area that is to be set as a page after inserting page break.
Custom Views: To view selected areas of a document the custom view option can be used.
Full Screen: Selecting this option makes the workbook cover the entire screen. All tabs are
hidden from view.
ANSWER
a) Subtotals
Subtotal adds data arranged in an array—that is, a group of cells with labels for columns and/or
rows. It is available in Data Tab, using the Subtotals dialog, you can select arrays, and then choose a
statistical function such as Count, Min, Max etc. to be applied on arrays. For efficiency, one must
choose up to three groups of arrays to which to apply a function.
b) Consolidating Data
Consolidate provides a graphical interface for copying data from one range of cells to another, then
running one of a dozen functions on the data. During consolidation, the contents of cells from
several sheets can be combined in one place.
Q.3. Anshita is preparing spreadsheet notes for her Term Exam. Help her to write short note on the
following:
i. Scenarios
ii. Goal Seek
iii. Solver
iv. Subtotal
Ans.
Ashu must apply Goal seek to get the desired result.
i. Scenarios: Scenarios are a tool to test “what-if” questions. Each scenario is named, and can be
edited and formatted separately. It is essentially a saved set of cell values for your calculations. You
can easily switch between these sets using the Navigator or a drop-down list which can be shown
beside the changing cells
iii. Solver: It is more elaborated form of Goal Seek. The difference is that the Solver deals with
equations with multiple unknown variables. It is specifically designed to minimize or maximize the
result according to a set of rules that we define.
iv. Subtotal: SUBTOTAL is a function listed under the Mathematical category when you use the
Function Wizard (Insert > Function). Because of its usefulness, the function has a graphical interface.
SUBTOTAL, totals/adds data arranged in an array—that is, a group of cells with labels for columns
and/or rows. Using the Subtotals dialog, you can select arrays, and then choose a statistical function
to apply to them. For efficiency, you can choose up to three groups of arrays to which to apply a
function.
Answer – The beauty of the recording changes mechanism becomes apparent when you receive a
worksheet with changes. You can now go through each change like the original author and decide how to
proceed. To get started, do the following:
1. Open the worksheet that has been changed.
2. Select Edit > Changes > Accept or Reject from the drop-down menu. The dialogue box displayed
below will appear.
3. Calc goes through each modification one by one. As you go through the process, you can accept or
reject each adjustment. If you wish to, you can also pick Accept all and reject all.
Table Product
Field Datatype
Pname Varchar(20)
Description Varchar(40)
Price Decimal
(b) Consider the following Vendor table and write the queries
Table Vendor
(ii) Write a Query to add a new row with the following details
(„V005‟, „Vadilal‟, „2010-03-20‟, „Pune‟)
(iii) Write a query to modify the location of V003 from Kolkata to Gujrat
Ans. (a)
Ans. (b)
(i) Select * from Vendor;
(ii) Insert into Vendor values („V005‟, „Vadilal‟, „2010-03-20‟, „Pune‟);
(iii) Update Vendor Set location= „Gujrat‟ Where location= „Kolkata‟;
ANSWER
Q.3.
a) The structure of a table “ITEM” is given below. Suggest suitable data type and
size of each column.
Write queries to
i. Display the total amount of each item. The amount must be calculated as
the price multiplied by quantity for each item.
ANSWER
a) Itemno integer (10)
Iname varchar(15)
Price decimal(5,2)
Quantity integer(3)
Ans:
a. Select * from Teachers where subject = “COMPUTER”;
b. Select * from teachers where salary >= 20000 and salary <= 35000;
c. Select Subject from Teachers where age > 40;
d. Select * from Teachers order by name
i. Display Sales ID and price of all products whose discount is more than 1000.
ii. Display the details alphabetically by product name.
iii. Display product name and sales price after deducting the discount from the price.
Ans.
Each packet is sent from computer to computer until it finds its destination.
Each computer on the way decides where next to send the packet. All packets may not
take the same route.
At the destination, the packets are examined. If any packets are missing or damaged, a
message is sent asking for them to be re-sent. This continues until all packets have
been received intact.
The packets are now reassembled into their original form.
ANSWER
i. Antivirus and Antispyware programs offer real-time protection monitoring your computer for any
changes by malware software.
ii. Use strong passwords a combination of alphanumeric and special characters could be used for
creating a password that is not so easy to crack or guessed by other users
iii. Secure transactions because information such as credit card details or personal information is
sent over the network.
iv. Use encryption software to protect your data from unauthorized users.
(Or any other relevant precautions)
Q.3. Rahul and Amit are working on a school project assigned to them by their teacher. They have to
send instant messages to each other and also do video conferencing after school hours in order to
complete the project on time.
a. Suggest any 4 good instant messaging software that they can use.
b. Apart from computers, list 4 hardwares that Rahul and Amit need for videoconferencing.
Ans
Q.4. Rahul has purchased some stationary items from an online site. He has to make online payment for
the items to complete the transaction. Help by answering his following queries.
1. Suggest any two options that he can use to make payment of his bill on the online shopping website.
2. Name any 2 situations where online shopping could be useful.
3. Name any 2 popular online transaction websites.
4. Write full form of COD in reference to online shopping.
Ans:
1. credit, debit card or by internet banking etc
4. Cash On Delivery
Q.5. Vicky is a student of class X. He used to get the work based on internet surfing, But he is not
aware of the internet and its terminology. Being a friend of Vicky, help him in finding the answers of
the following questions.
a. What do you mean by Internet Service Provider?
b. Expand the following terms:
i. WAP
ii. W3
Ans. 1. Networks in which all computers have an equal status are called peer to peer networks
whereas in which certain computers have special dedicated tasks, providing services to other
computers (in the network) are called client server networks.
2. Expand the following terms:
i. Wireless Access Point
ii. WWW (World Wide Web)
3. Advantages of Networking are:
•Data Sharing: One of the most important uses of networking is to allow the sharing of data.
•Files Transfer : Users can send text files, spread sheets, documents, presentations, audio files,
video files, etc. to other users.
•Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared. For
example, instead of purchasing 10 printers for each user, one printer can be purchased and shared
among multiple users thus saving cost.
•Internet Access Sharing: You can purchase a single Internet connection and share it among other
computers in a network instead of purchasing multiple Internet connection for each computer. This is
very commonly found in Internet café (browsing centres), schools, colleges, companies, etc.
•Usage of network based applications: Such as web browsers, email clients, chat
application, audio & video calling, etc. is another advantage.
Ans:
a. Data Integrity: Data Integrity is very important as there are multiple databases in a DBMS. It means that
the data is accurate and consistent in the database.
Q.2. Your friend owns a chemist shop, he needs to keep records of the medicines with their id’s, date
of purchase, expiry date, price, etc. in a database program. But he does not have any knowledge
about the database. Explain to him the following to get a better understanding of the DBMS
concepts.
1. What is DBMS? Explain in brief.
2. Name any two database programs which can be used to create a table and store the data as per the
requirement.
3. Which field can be set as a Primary Key?
4. Is it possible to make more than one field as a primary key in your table? (Yes/No). Justify your
answer.
Ans. 1. A database management system is a software package with computer programs that controls
the creation, maintenance, and use of a database. It allows organizations to conveniently develop
databases for various
applications.
Ans. 1. Sorting Data Sorting means to arrange the data in either ascending order of descending order.
Select the column(s) then click on sort buttons. The data will be displayed accordingly.
2. Referential Integrity Referential integrity is used to maintain accuracy and consistency of data in a
relationship. In Base, data can be linked between two or more tables with the help of primary key and
foreign key constraints. Referential integrity helps to avoid:
Adding records to a related table if there is no associated record available in the primary key
table.
Changing values in a primary if any dependent records are present in associated table(s).
Deleting records from a primary key table if there are any matching related records available
in associated table(s).
3. Many to Many Relationship
In this relationship, no table has the primary key column. It signifies that all the columns of primary
key table are associated with all the columns of associated table. Example: In the given tables EMP
and DEPT, there is no primary key.
4. Foreign key (FK): identifies a column or set of columns in one (referencing) table that refers to a
column or set of columns in another (referenced) table. The “one” side of a relation is always the
parent, and provides the PK attributes to be copied. The “many” side of a relation is always the child,
into which the FK attributes are copied.
Answer – When the same set of operations must be completed repeatedly, such as formatting or
applying a similar formula to a similar piece of data, macros can save time. It can be used to name and
track a sequence of events.
To record a macro, follow these steps:
1. Input data
2. Before performing any operation, go to tools->macro->record macro.
3. Now repeat the motion you just did.
4. Select “Stop Recording” from the drop-down menu. Now save the macro by giving it a name.
Answer – There are two types of Internet connectivity available (Wired connectivity & Wireless
connectivity)-
Wired connectivity
Wireless connectivity
a. 3G or 4G – 3G stands for third Generation and 4G stands for fourth Generation, it is mobile
telecommunication services and network.
b. WiMax – WiMax (Worldwide Interoperability for Microwave Access) is a wireless technology providing
mobile broadband connectivity across the cities and countries, for example Jio WiMax.
c. Wi-Fi – Wi-Fi is wireless connectivity which provides high – speed internet connections to multiple
users.