0% found this document useful (0 votes)
13 views

Question Bank Class X IT 402 Long Question Answer

The document is a worksheet for Class X in Information Technology covering various topics such as communication skills, self-management skills, information and communication technology skills, entrepreneurial skills, and green skills. It includes long questions with detailed answers on effective presentations, communication barriers, self-awareness, time management, emotional intelligence, ICT objectives, keyboard types, computer maintenance, threats to data, and sustainable development issues. The content is prepared by Mr. Gautam Somani from Alok School, Udaipur for the academic session 2023-24.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Question Bank Class X IT 402 Long Question Answer

The document is a worksheet for Class X in Information Technology covering various topics such as communication skills, self-management skills, information and communication technology skills, entrepreneurial skills, and green skills. It includes long questions with detailed answers on effective presentations, communication barriers, self-awareness, time management, emotional intelligence, ICT objectives, keyboard types, computer maintenance, threats to data, and sustainable development issues. The content is prepared by Mr. Gautam Somani from Alok School, Udaipur for the academic session 2023-24.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 22

Worksheet Long Questions With Answer

Session : 2023-24
Class –X
Subject- Information Technology (402)

Communication Skills

Q.1. Write the points to be kept in mind to make an effective presentation for the audience
(Mention any 5 Points).

Ans.
1. Do prior research, know the topic and collect the material of what you will talk about.
2. Highlight key points that are necessary for the audience to remember. Keep the points as
short as possible.
3. Avoid too much text Summarize the content as bullet points. Use simple language and limit
the number of bullets to three or four per slide.
4. Limit the number of slides - On average, one slide per minute is recommended.
5. Fancy fonts must be avoided.
6. Keep slide color scheme consistent throughout the presentation.
7. Transitions and Animations must be used carefully to avoid distractions.
8. Use a slide design template to keep presentation look consistent.

Q.2. What are the seven elements that influence the communication skills?

Answer – There are seven different factors which affecting Perspectives in communication –

1. Language
2. Environment
3. Visual Perception
4. Culture
5. Prejudice
6. Feelings
7. Past Experience

Q.3. What is effective communication?

Answer – There are 7 C‟s effective communication which are applicable for both written as well as oral
communication. These are as follows –

a. Clear – Always say clearly, what you want to say.


b. Concise – Always use simple language and say only what is required.
c. Concrete – Always use proper words and phrases in the sentences.
d. Correct – Always use correct spelling and grammar in the sentences.
e. Coherent – Your word should be related to the main topic and your word should make sense.
f. Complete – Your message should be complete and have all the needed information.
g. Courteous – Be honest, respectful and friendly with others.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 1


Q.4. What is verbal communication and its type?

Answer – Sounds, words, language, and speech are all examples of verbal communication. Speaking is
one of the most effective and often used in verbal communication methods.

a. Interpersonal Communication – This type of communication is a one – on – one communication that


takes place between two people. It can be formal or informal.

b. Written Communication – This method of communication entails the use of written words. Letters,
circulars, reports, manuals, SMS, social media chats, and so on are all examples. It could be a group of
two or more persons.

c. Small Group Communication – When there are more than two people participating, this form of
communication occurs. Each participant has the opportunity to interact and speak with the others.

d. Public Communication – The communication takes place when one individual addresses a large
group of audience.

Q.5. Barriers of Effective Communication?

Answer – Barriers of the Effective Communication are –

a. Physical Barriers – The environmental and natural conditions that operate as a barrier in
communication when conveying messages from sender to receiver are referred to as physical barriers.

b. Linguistic Barriers – A language barrier to communication is the inability to communicate using a


language. The most common communication barriers are language barriers, which lead to
misunderstandings and misinterpretations between people.

c. Interpersonal Barriers – When a sender‟s message is received differently than intended, it creates
barriers to interpersonal contact. It‟s also tough to communicate with someone who refuses to converse
or express their emotions or opinions.

d. Organizational Barriers – Formal hierarchical structures are used to create organizations that adhere
to performance standards, rules & regulations, processes, policies, and behavioral norms, among other
things.

e. Cultural Barriers – When people from different cultures are unable to understand each other‟s
languages, it causes problems and inconveniences.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 2


Self-Management Skills
Q.1. To become successful in life, which basic self – management skills do you require?

Answer – To become successful in life, we have follow following basic skills –


a. Self-awareness: Request honest feedback. Get a better understanding of your personality and work-
related skills. Consider how you handled issues in your regular contacts and how you may have handled
them better.
b. Responsibility: Taking responsibility is very important. Accepting ownership is the step towards self –
development, For example, If you‟ve been given an assignment by a teacher, ensure you take complete
ownership.
Even if you are unable to accomplish the assignment on time, you must notify it and then make the
necessary adjustments.
c. Time Management: Make a list of the tasks you need to get done. Make a schedule for yourself and
stick to it.
d. Adaptability: Always stay up to date on best practices and fresh information. Prepare yourself for new
adjustments so you can make a smooth transition.

Q.2. How to Set Goals in Self Management Skills?

Answer – We can use different techniques to set goals.


a. Specific – Always set your clear and specific goals.
b. Measurable – A measurable goal answers the questions “How much?”, “How many?” and “How do I
know that I have achieved results?”
c. Achievable – Breaking down big goals into smaller parts will make the goal achievable.
d. Realistic – A realistic goal would be something that we want to achieve and can work towards.
e. Time bound – A goal should have a timeframe by when the goal needs to be achieved.

Q.3. What are the four steps for effective time management?

Answer – The four steps for time management are –


a. Organize – We make plans for our day-to-day activity.
b. Prioritize – We build a to-do list with all of our activities on it, and we organize them in order of
importance.
c. Control – We have a control over our activities and time
d. Track – We keep track of where we‟ve spent our time.

Q.4. How can I improve my time management?

Answer –
a. Any planned action should not be delayed or postponed.
b. Organize your room and desk at school.

c. Create a “NO DISTURBANCE ZONE” where you may sit and finish important tasks without being
disturbed.

d. Use waiting time productivity

e. Prepare a “To-do” list

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 3


f. Priorities

g. Replace ineffective activities with productive ones.

Q.5. What is emotional Intelligence in Self – Management skills?

Answer – The ability to recognize and regulate one‟s own emotions, as well as the emotions of others, is
referred to as emotional intelligence.
a. Emotional Awareness – The ability to recognize and name one‟s own feelings is known as emotional
awareness.
b. Harnessing Emotions – The ability to harness and apply emotions to tasks such as thinking and
problem solving is referred to as “harnessing emotions.”.
c. Managing Emotions – Managing Emotions entails the ability to control one‟s own emotions when
appropriate, as well as helping others in doing the same.

Information and Communication Technology Skills


Q.1. Objectives of Information and communication technology? Advantages and disadvantages of
ICT.

Answer – Full form of ICT is Information and communication technology. The goal of ICT is to bridge the
gap between parents, educators, and students by encouraging sustainable, cooperative, and transparent
communication methods.

Advantages of ICT
a. Enhanced the modes of communication
b. Independent learning platforms Cost – efficient
c. Enhanced data and information security
d. Paperless – Eliminate the usage of paper
e. Better teaching and learning methods
f. Web – based LMS tools

Disadvantages of ICT
a. Traditional books and handwritten methods are at risk.
b. Managing courses online is difficult
c. Teachers require experience to handle ICT
d. Risk of cyber attacks and hacks
e. Misuse of technology

Q.2. What are the different types of keys in Keyboard?

Answer –
a. Function keys – F1 to F12 are function keys in the keyboard, function keys are used for specific
purposes.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 4


b. Control keys – SHIFT, CONTROL (CTRL),ALT, SPACEBAR, TAB AND CAPS LOCK are known as a
control key, these keys are used as per the demand.

c. Enter key – ENTER or RETURN keys are known as Enter key, depending on the brand of computer
that you are using.

d. Punctuation keys – It includes keys for punctuation marks, such as colon (:), semicolon (;), question
mark (?), single quotation marks („ ‟), and double quotation marks (“ ”).

e. Navigation keys – END, HOME, PAGE DOWN, PAGE UP and Arrow keys are known as navigation
keys, these keys are used to move up, down, left or right in the document.

f. Command keys – BACKSPACE, INSERT (INS) and DELETE(DEL) are known as command keys.
INSERT key allows you to overwrite characters to the right side.

The DELETE command key and BACKSPACE key are used to remove typed text, character, or any other
objects from the right and left side of the cursor.

g. Windows key – Windows key is used to open the Start menu.

Q.3. How to maintain a computer system?

Answer – Some simple ways to take care of computer system are –

a. Keeping a Device Clean – Always keep a device clean, such as the keyboard, the screen, and the
mouse. Handle your gadget with care, keep it cool, and don‟t overload your battery.

b. Prepare a Maintenance Schedule – Make a schedule for computer maintenance.

Daily Maintenance

a. Clean up your email inbox

b. Save Important attachments and save in folder

Weekly Maintenance

a. Clean your Keyboard, monitor, CPU and printer

b. Backup your data

Monthly Maintenance

a. Clean unused photographs

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 5


b. Clean up Download folder

c. Uninstall unused programs

d. Run full system virus scan

e. Run disk – cleaner software

Yearly / Annual Maintenance

a. Clean up social media accounts

b. Clean up e-mail contact list

c. Update your operating System

Q.4. What are the threats?

Answer – Threats are ways in which personal information from a computer can be released without our
knowledge.

a. Theft – Theft means stealing of information or hardware. These maybe of three types:

i. Physical – Where a person may steal your desktop computer or laptop.

ii. Identity – A hacker gets your personal information and uses it to impersonate you. The hacker can
use this fake identity to get access to your account information or engage in illegal activity.

b. Software Piracy – This is stealing of software and includes using or distributing unlicensed and
unauthorized copies of a computer program or software.

i. Virus – Viruses are computer programmes that can corrupt data and software applications, as well
as steal data from computers. Worms and Trojan Horses are two major forms of viruses.

ii. Worms – Worms are viruses that replicate and spread to all files on a computer once they attack a
computer. This makes it very difficult to remove them.

A Trojan Horse appears to be a useful software programme, but once it reaches a computer, it begins to
behave like a virus and destroys the data.

iii. Online Predator – Online predators are persons who use the internet to trap you into unhealthy
relationships. They could be older people appearing as your age who harass you into doing unlawful
things online.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 6


iv. Internet Scams – You may occasionally receive highly appealing offers claiming that you have
won a large sum of money in a lottery and that you can claim your win by depositing a specific amount of
money. When you deposit money with a credit card or through online banking, you not only lose the
deposit money but your card / account information may be misused later.

Q.5. How can we protect our data?

Answer – To protect our data from theft and viruses we can take the following measures –

a. Use Strong password in your account – Make your passwords difficult to guess. When creating a
new password, attempt to use a combination of

 Small Character
 Capital Character
 Special Character
 Numbers
b. Install Antivirus and Firewall –Anti-virus software and a firewall protect your data from virus and from
hackers.

c. Encrypt your data – Keep your information in an encrypted format to keep it safe from unauthorized
users.

d. Open only secure site – Before visiting a website, make sure the address begins with https://. A
website that begins with https:// is a secure website.

Entrepreneurial Skills
Q.1. What do entrepreneurs do when they run their business?

Answer –

a. Fulfill Customer Needs – A product or service that people want is referred to as demand.
Entrepreneurs discover what people desire. Then students use their imaginations to come up with a
business plan to address that demand.

b. Use Local Materials – Entrepreneurs produce low-cost items by using the materials and people
available to them.

c. Help Society – Entrepreneurs have a good interaction with the general public. They gain money by
doing things that help society. Some business people donate money to create schools and clinics, while
others work to save the environment.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 7


d. Create Jobs – They buy more material, and from more people. They also hire more people to work for
them. In this way, more people have jobs.

e. Sharing of Wealth – Wealth means having enough money to live a comfortable life. As entrepreneurs
grow their business.

f. Lower Price of Products – The price of a product decreases when more entrepreneurs sell the same
thing. In India, for example, as more mobile phones were sold, the cost of the phone decreased.

Q.2. Difference between Self employment & Wage employment?

Answer – There are two ways a person can earn a living.

a. Self Employment – An entrepreneur is a self-employed individual who runs a business to meet a need
by experimenting with new ideas.

i. Enter – When an entrepreneur first starts business, they are simply getting their feet wet in the
business world.

ii. Survive – There are a lot of entrepreneurs around nowadays. In a competitive market, the
entrepreneur must remain competitive.

iii. Grow – An entrepreneur considers growing his or her business once it has reached a certain
level of stability.

b. Wage Employment – Wage management is based on work grades and performance parameters.
Wage management‟s goal is to take reward and give high performance standards in the business.

Q.3. Characteristics of Entrepreneurs?

Answer – Adaptable and flexible to achieve the goals of enhancing quality and customer satisfaction

1. Believe in hard work


2. Ability to take up risks
3. Money Management
4. Knowledge of the product and services and their need or demand in the market
5. Effective planning and execution
6. Financial literacy

Q.4. What qualities are required for successful entrepreneurs?

Answer – Successful entrepreneurs have the following qualities.

 They are confident, They believe in themselves and their abilities.


 They keep trying new ideas in their business
 They are creative and think differently about business ideas.
 They do not give up when they face difficulty.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 8


 They make decisions after thinking about them.
 They are patient
 They take responsibility for their actions
 They work hard

Q.5. Qualities of an Entrepreneur?

Answer – Qualities of entrepreneur are –

 I believe in myself and what I can do. I am confident.


 I think of different ways to solve a problem. I am creative.
 I work hard on every task.
 Problems take time to get solved. I am patient about solving them.
 I take responsibility for my actions and mistakes.
 I do not give up when I face a problem.
 I keep trying new ideas.
 I think before I make a decision.

Green skill
Q.1. Problems Related to Sustainable Development?

Answer – There are three major problem related to sustainable Development –


a. Food – As we use more and more land for other uses, the amount of rich, fertile soil required to grow
crops such as wheat, rice, and other grains. Chemical fertilisers are reducing soil nutrients and
contaminating the soil with a variety of pollutants.
b. Water – We use fresh water from rivers and ponds for drinking and cleaning but dump garbage into
them. Rivers and ponds are becoming more contaminated. This way after several years, we will have no
clean water for our use.
c. Fuel – We use a lot of wood from trees for fuel, as well as for building homes and furniture. The climate
of the area is being affected as more trees are cut down. Floods, extreme cold or heat, and other extreme
weather events are common in many regions, affecting the people who live there.

Q.2. What are different sustainable development goals?

Answer – Sustainable development is the development which doesn‟t compromise the capacity of the
future generation to satisfy their needs.
In 1987 the first time sustainable development appeared in the Brundtland report. This was a warning to
all countries regarding environmental consequences, globalization and economic growth.

Sustainable Development goals are also known as Global goals. There are 17 goals in sustainable
development which were introduced in 2015.

There are total 17 Sustainable Development Goals are: :


1. Zero Hunger
2. No Poverty
3. Good Health and Well-Being
4. Quality Education
5. Climate action

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 9


6. Industry Innovation and Infrastructure
7. Gender Equality
8. Clean Water and Sanitation
9. Affordable and clean energy
10. Sustainable cities and communities
11. Decent work and economic growth
12. Reduce Inequalities
13. Responsible consumption and production
14. Life on land
15. Life below water
16. Partnerships for the goals
17. Peace, Justice and strong institutions

Q.3. What is the role towards Sustainable Development?

Answer – The importance of Sustainable Development in finding solutions to the world‟s growing
problems. Countries should establish laws and guidelines to eliminate poverty and hunger, as well as to
provide decent health and education.
Some of the important Sustainable Development goals are –

a. Quality Education

b. Clean Water and Sanitation

c. Affordable and Clean Energy

d. Decent Work and Economic Growth

e. Reduced Inequalities

f. Sustainable Cities and Communities

g. Responsible Consumers and producers

h. Protect life below water

i. Protect Life on Land

Q.4. What are Sustainable Processes? What Sustainable Development Initiatives taken from the
public in India.

Answer – Farmers who practice organic farming do not use chemical pesticides or fertilizers to boost
their yield. To aid in the growth of crops, they use organic and natural fertilizers such as cow dung.
This contributes to higher-quality, chemical-free crops while also preserving the soil‟s quality for future
usage.

Many people have taken initiatives regarding sustainable development.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 10


Example

a. When plastics were banned in Mangalore, one entrepreneur, Mr. Vasth Hedge, created a
biodegradable bag that can dissolve in hot water and degrade in the natural environment.

b. Narayana Peesapath created edible cutlery out of a grain; these spoons can be eaten and even if they
are not eaten they will easily decompose in the soil.

Q.5. What steps do we have to take for sustainable development?

Answer – Sustainable development includes –


 Excessive resource consumption is being reduced, and resource conservation is being improved.
 Recycling and reuse of waste materials.
 Management of renewable resources, particularly bio-resources, in a scientific manner.
 Planting more trees;
 Green grassy patches and trees to be interspersed between concrete buildings.
 Using more environment friendly material or biodegradable material
 Environmentally friendly technologies that are based on resource efficiency are used.

Digital Documentation (Advanced)


Q.1. Elaborate four different types of styles which can be provided in a Word Processor.

ANSWER
• Paragraph styles control all aspects of a paragraph’s appearance, such as text alignment, tab
stops, line spacing, and borders, and can include character formatting.
• Character styles affect selected text within a paragraph, such as the font and size of text, or bold
and italic formats.
• Cell styles include fonts, alignment, borders, background, number formats (for example, currency,
date, number), and cell protection.
• Graphics styles in drawings and presentations include line, area, shadowing, transparency, font,
connectors, dimensioning, and other attributes.

(Or any other valid style )

Q.2. Tanmay is a Class X student. He has learnt Mail Merge option of a Word Processor in his
computer period. But he is confused with few terms used to merge documents.

Explain the following briefly, which will help Tanmay better understand the Mail Merge options.

1. Merge Field
2. Data Source
3. Main Document

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 11


4. Mention two types of data on which mail merge can be applied.

Ans. 1. Merge Field: A merge field is where you want to insert the information from a data source
into a main document. Merge fields appear with chevrons (« »).
2. Data Source: Data source is a file that contains the names and addresses or any other information
that vary with each version of a mail-merge document.
3. Main Document: Main document is the document which contains text and graphics. It may be a
formal or an official letter.
4. Two types of data on which mail merge can be applied are Labels and Letters.

Q.3. Explain different ways of creating a template.

Answer – There are two ways to create templates in a document.

Creating a template from a document –


1. Create or edit a new or existing document of the type you wish to use as a template.
2. Fill in the blanks with the content and styles you desire.
3. Select File > Templates > Save from the main menu.

Creating a template using a wizard –


Wizards can be used to construct letter, fax, agenda, presentation, and Web page templates. The Fax
Wizard, for example, walks you through the following options:
1. Fax machine type (business or personal)
2. Document components such as the date, topic line (for business faxes), salutation, and closing
3. Information about the sender and receiver options (business fax)
4. Inclusion of text in the footer (business fax)

Q.4. How can a table of contents be created and formatted in a digital document?
Answer – To create and format a table of contents in a digital document, users can follow these steps:

 Assign unique heading styles to each section or chapter of the document.


 Insert a table of contents using the appropriate option from the menu or toolbar.
 Customize the table of contents by choosing the desired style and formatting options to match the
document‟s design and layout.
 Update the table of contents whenever changes are made to the document‟s structure or content
to ensure its accuracy and usefulness to the reader.

Q.5. How can the use of styles improve the efficiency of document creation and editing?
Answer – Styles can enhance the efficiency of document creation and editing by enabling users to
quickly and easily apply formatting options to text and paragraphs. By defining a set of styles that reflect
the formatting options commonly used in the document, users can swiftly apply those styles to text and
paragraphs with a single click, streamlining the process and saving time.

This feature allows for consistency in formatting, reduces the possibility of errors, and improves the
overall productivity of document creation and editing. In summary, using styles is a powerful tool that
significantly enhances the efficiency of digital document processing.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 12


Electronic Spreadsheet (Advanced)
Q.1. Elaborate the five types of Views available in a spreadsheet.

Ans.
Normal View: The default view of the spreadsheet application is the Normal. It‟s a collection of
cells arranged in the work area.
Page Layout: It is to quickly fine tune a worksheet that contains many charts or huge amounts
of data and achieve professional looking results.
Page Break Preview: This option is similar to the Page Layout option except you can set the
area that is to be set as a page after inserting page break.
Custom Views: To view selected areas of a document the custom view option can be used.
Full Screen: Selecting this option makes the workbook cover the entire screen. All tabs are
hidden from view.

Q.2. Define the following:


a) Subtotals
b) Consolidating Data

ANSWER
a) Subtotals

Subtotal adds data arranged in an array—that is, a group of cells with labels for columns and/or
rows. It is available in Data Tab, using the Subtotals dialog, you can select arrays, and then choose a
statistical function such as Count, Min, Max etc. to be applied on arrays. For efficiency, one must
choose up to three groups of arrays to which to apply a function.

b) Consolidating Data
Consolidate provides a graphical interface for copying data from one range of cells to another, then
running one of a dozen functions on the data. During consolidation, the contents of cells from
several sheets can be combined in one place.

Q.3. Anshita is preparing spreadsheet notes for her Term Exam. Help her to write short note on the
following:
i. Scenarios
ii. Goal Seek
iii. Solver
iv. Subtotal

Ans.
Ashu must apply Goal seek to get the desired result.
i. Scenarios: Scenarios are a tool to test “what-if” questions. Each scenario is named, and can be
edited and formatted separately. It is essentially a saved set of cell values for your calculations. You
can easily switch between these sets using the Navigator or a drop-down list which can be shown
beside the changing cells

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 13


ii. Goal Seek: It is used to calculate a result based upon existing values. Using Goal Seek option
under Tools menu, we can discover what values will produce the result that we want.

iii. Solver: It is more elaborated form of Goal Seek. The difference is that the Solver deals with
equations with multiple unknown variables. It is specifically designed to minimize or maximize the
result according to a set of rules that we define.

iv. Subtotal: SUBTOTAL is a function listed under the Mathematical category when you use the
Function Wizard (Insert > Function). Because of its usefulness, the function has a graphical interface.

SUBTOTAL, totals/adds data arranged in an array—that is, a group of cells with labels for columns
and/or rows. Using the Subtotals dialog, you can select arrays, and then choose a statistical function
to apply to them. For efficiency, you can choose up to three groups of arrays to which to apply a
function.

Q.4. Explain features of accepting or rejecting changes.

Answer – The beauty of the recording changes mechanism becomes apparent when you receive a
worksheet with changes. You can now go through each change like the original author and decide how to
proceed. To get started, do the following:
1. Open the worksheet that has been changed.
2. Select Edit > Changes > Accept or Reject from the drop-down menu. The dialogue box displayed
below will appear.
3. Calc goes through each modification one by one. As you go through the process, you can accept or
reject each adjustment. If you wish to, you can also pick Accept all and reject all.

Q.5. How can we add comments to the changes made?

Answer – To add a remark to a modification, use the following syntax:


Make the necessary changes to the spreadsheet.
2. Select the cell that has been changed.
3. Select Edit > Changes > Comments from the drop-down menu. The following dialogue box appears.
Calc‟s automatically added comment displays in the title bar of this dialogue and is not editable.
4. Click OK after typing your own comment.

Database Management System


Q.1.
(a) Write a Query to create a Table with the following structure

Table Product

Field Datatype

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 14


PID Char(4)

Pname Varchar(20)

Description Varchar(40)

Price Decimal

(b) Consider the following Vendor table and write the queries

Table Vendor

VendorID VName Location


DateofRegistr
ation
V001 Mother Dairy 20-01-2009 Delhi

V002 Havmor 01-04-2015 Gujrat

V003 Amul 12-05-2012 Kolkata

V004 Kwality Walls 15-10-2013 Mumbai

(i) Write a Query to display all records

(ii) Write a Query to add a new row with the following details
(„V005‟, „Vadilal‟, „2010-03-20‟, „Pune‟)

(iii) Write a query to modify the location of V003 from Kolkata to Gujrat

Ans. (a)

Create table Product


(PID Char(4),
Pname Varchar(20),
Description Varchar(40),
Price Decimal);

Ans. (b)
(i) Select * from Vendor;
(ii) Insert into Vendor values („V005‟, „Vadilal‟, „2010-03-20‟, „Pune‟);
(iii) Update Vendor Set location= „Gujrat‟ Where location= „Kolkata‟;

Q.2. What is DBMS? Explain any two advantages of DBMS.

ANSWER

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 15


A database management system is a software package with computer programs that controls the
creation, maintenance, and use of an integrated collection of data records, files, and other objects.
It allows organizations to conveniently develop databases for various applications.
Advantages:
i) Data integrity: means the data is accurate and consistent in the database. It is very important as
there are multiple databases in a DBMS so it helps to produce the correct result.
ii) Data sharing: In a database, the users can share the data among themselves. Data can be shared
for multiple purposes with the users located at different geographical locations then remote users
can also access the database simultaneously.

(Or any other relevant advantage)

Q.3.
a) The structure of a table “ITEM” is given below. Suggest suitable data type and
size of each column.

Column name Type Size


Itemno ____________ ______
Iname ____________ ______
Price ____________ ______
Quantity ____________ ______

b) Consider the following table “ITEM”:


Table: Item
Itemno Iname Price Quantity
11 Soap 40 80
22 Powder 80 30
33 Face cream 250 25
44 Shampoo 120 100
55 Soap box 20 50

Write queries to
i. Display the total amount of each item. The amount must be calculated as
the price multiplied by quantity for each item.

ii. Display the details of items whose price is less than 50 .

ANSWER
a) Itemno integer (10)
Iname varchar(15)
Price decimal(5,2)
Quantity integer(3)

b) i. Select price * quantity from item;


ii. Select * from item where price < 50;

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 16


Q.4. TEACHERS

NUMBER NAME AGE SUBJECT DATEOFJOIN SALA GEN DER


RY
1 JUGAL 34 COMPUTER 10/01/2019 12000 M
2 PRATIGYA 31 SCIENCE 24/03/2019 20000 F
3 SANDEEP 32 MATHS 12/12/2019 30000 M
4 SANGEETA 35 SCIENCE 01/07/2020 40000 F
5 SATTI 42 MATHS 05/09/2020 25000 M
6 SHYAM 50 SCIENCE 27/06/2021 30000 M
7 SHIV OM 44 COMPUTER 25/02/2021 21000 M
8 SHALAKHA 33 MATHS 31/07/2020 20000 F

Write SQL commands:


a. To show all the information about IT teachers.
b. To list the details of all the teachers who are getting salary between 20000 to 35000.
c. To display the subject of all the teachers whose age is more than 40 years.
d. To display the list of names of all the teachers in alphabetical order.

Ans:
a. Select * from Teachers where subject = “COMPUTER”;
b. Select * from teachers where salary >= 20000 and salary <= 35000;
c. Select Subject from Teachers where age > 40;
d. Select * from Teachers order by name

Q.5. Consider the following table: Sales

Sale_Id Prod_Name Price Discount

1101 Laptop 65000 2500

1103 Pen tab 29500 1000

1105 Desktop 50000 1550

1106 Printer 12000 2000

1. How many fields and records are there in Sales table?

2. Write SQL commands for the following:

i. Display Sales ID and price of all products whose discount is more than 1000.
ii. Display the details alphabetically by product name.
iii. Display product name and sales price after deducting the discount from the price.

Note: Sales price can be calculated as (price-discount)

Ans.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 17


1. Four fields and four records are there in table Sales.
2. SQL commands:
i. select Sale_Id, Price from Sales where Discount > 1000;
ii. select * from Sales order by Prod_Name;
iii. select Prod_Name, Price- Discount from Sales;

Web Application and Security


Q.1. Rohan‟s Grandfather was wondering that how does Rohan chat on web with his father
posted in California, Elaborate the steps involved while transferring data over internet.

Ans Steps followed while transferring data are


 The data is broken up into bits of same sized pieces called packets.
 A header is added to each packet explaining where the data has come from, where it
should end up and where it fits in with the rest of the packets.

 Each packet is sent from computer to computer until it finds its destination.
 Each computer on the way decides where next to send the packet. All packets may not
take the same route.
 At the destination, the packets are examined. If any packets are missing or damaged, a
message is sent asking for them to be re-sent. This continues until all packets have
been received intact.
 The packets are now reassembled into their original form.

Q.2. What precautions must be taken to improve online security?

ANSWER
i. Antivirus and Antispyware programs offer real-time protection monitoring your computer for any
changes by malware software.
ii. Use strong passwords a combination of alphanumeric and special characters could be used for
creating a password that is not so easy to crack or guessed by other users
iii. Secure transactions because information such as credit card details or personal information is
sent over the network.
iv. Use encryption software to protect your data from unauthorized users.
(Or any other relevant precautions)

Q.3. Rahul and Amit are working on a school project assigned to them by their teacher. They have to
send instant messages to each other and also do video conferencing after school hours in order to
complete the project on time.
a. Suggest any 4 good instant messaging software that they can use.
b. Apart from computers, list 4 hardwares that Rahul and Amit need for videoconferencing.

Ans

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 18


a. Google Talk , Yahoo! Messenger , Skype , Windows Live Messenger , Rediff Bol, MS-Teams, ZOOM
etc.

b. Headphone, Speaker & Microphone & Web Camera

Q.4. Rahul has purchased some stationary items from an online site. He has to make online payment for
the items to complete the transaction. Help by answering his following queries.
1. Suggest any two options that he can use to make payment of his bill on the online shopping website.
2. Name any 2 situations where online shopping could be useful.
3. Name any 2 popular online transaction websites.
4. Write full form of COD in reference to online shopping.

Ans:
1. credit, debit card or by internet banking etc

2. • A customer does not have sufficient time to visit stores.


• Visiting a store is more expensive than purchasing a product online.
• A product or service that is not available in the local market is available online. etc

3.Flipkart , amazon, Myntra etc

4. Cash On Delivery

Q.5. Vicky is a student of class X. He used to get the work based on internet surfing, But he is not
aware of the internet and its terminology. Being a friend of Vicky, help him in finding the answers of
the following questions.
a. What do you mean by Internet Service Provider?
b. Expand the following terms:
i. WAP
ii. W3

c. Mention any two advantages of Networking.


d. What is a Blog? Name any two Online Blogs.

Ans. 1. Networks in which all computers have an equal status are called peer to peer networks
whereas in which certain computers have special dedicated tasks, providing services to other
computers (in the network) are called client server networks.
2. Expand the following terms:
i. Wireless Access Point
ii. WWW (World Wide Web)
3. Advantages of Networking are:
•Data Sharing: One of the most important uses of networking is to allow the sharing of data.
•Files Transfer : Users can send text files, spread sheets, documents, presentations, audio files,
video files, etc. to other users.
•Hardware Sharing: Hardware components such as printers, scanners, etc. can also be shared. For
example, instead of purchasing 10 printers for each user, one printer can be purchased and shared
among multiple users thus saving cost.
•Internet Access Sharing: You can purchase a single Internet connection and share it among other
computers in a network instead of purchasing multiple Internet connection for each computer. This is
very commonly found in Internet café (browsing centres), schools, colleges, companies, etc.
•Usage of network based applications: Such as web browsers, email clients, chat
application, audio & video calling, etc. is another advantage.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 19


(Any two)
4. A blog is a discussion style site used by non-technical or technical users for creating personal web
pages. Blogs are similar to an online personal diary and simple to use.
The advantage of offline blog is, it can be created first and later publish the content when an active
internet connection is available.

EXTRA LONG TYPE QUESTIONS


Q.1. Define the following:
a. Data Integrity
b. Data Inconsistency
c. Composite Primary Key
d. Relationship (with respect to DBMS)

Ans:
a. Data Integrity: Data Integrity is very important as there are multiple databases in a DBMS. It means that
the data is accurate and consistent in the database.

b. Data Inconsistency: Data inconsistency is when the same data exists in


different forms in multiple tables. Which can provide a unreliable or meaningless information.

c. Composite Primary Key: It is also called a composite key. It is a combination of


two or more columns to form a primary key for a table

d. Relationship: A relationship refers to an association or connection between two or


more tables. When we relate two tables, we don't need to enter the same data in separate tables.

Three types of relationships are:


1. One to One relationship
2. One to many or many to one relationship
3. Many to many relationships

Q.2. Your friend owns a chemist shop, he needs to keep records of the medicines with their id’s, date
of purchase, expiry date, price, etc. in a database program. But he does not have any knowledge
about the database. Explain to him the following to get a better understanding of the DBMS
concepts.
1. What is DBMS? Explain in brief.
2. Name any two database programs which can be used to create a table and store the data as per the
requirement.
3. Which field can be set as a Primary Key?
4. Is it possible to make more than one field as a primary key in your table? (Yes/No). Justify your
answer.

Ans. 1. A database management system is a software package with computer programs that controls
the creation, maintenance, and use of a database. It allows organizations to conveniently develop
databases for various
applications.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 20


2. Two databases are:
i. Microsoft Access
ii. MySQL
iii. OpenOffice Base
3. Id field will be suitable for Primary Key.
4. Yes, we can make more than one column as a primary key in a table and it is known as Composite
Primary Key.

Q.3.Define the following:


1. Sorting (with respect to DBMS)
2. Referential Integrity
3. Many-to-Many Relationship(with respect to DBMS)
4. Foreign key

Ans. 1. Sorting Data Sorting means to arrange the data in either ascending order of descending order.
Select the column(s) then click on sort buttons. The data will be displayed accordingly.
2. Referential Integrity Referential integrity is used to maintain accuracy and consistency of data in a
relationship. In Base, data can be linked between two or more tables with the help of primary key and
foreign key constraints. Referential integrity helps to avoid:
 Adding records to a related table if there is no associated record available in the primary key
table.
 Changing values in a primary if any dependent records are present in associated table(s).
 Deleting records from a primary key table if there are any matching related records available
in associated table(s).
3. Many to Many Relationship

In this relationship, no table has the primary key column. It signifies that all the columns of primary
key table are associated with all the columns of associated table. Example: In the given tables EMP
and DEPT, there is no primary key.
4. Foreign key (FK): identifies a column or set of columns in one (referencing) table that refers to a
column or set of columns in another (referenced) table. The “one” side of a relation is always the
parent, and provides the PK attributes to be copied. The “many” side of a relation is always the child,
into which the FK attributes are copied.

Q.4. What are Macros? How can we record a Macro?

Answer – When the same set of operations must be completed repeatedly, such as formatting or
applying a similar formula to a similar piece of data, macros can save time. It can be used to name and
track a sequence of events.
To record a macro, follow these steps:
1. Input data
2. Before performing any operation, go to tools->macro->record macro.
3. Now repeat the motion you just did.
4. Select “Stop Recording” from the drop-down menu. Now save the macro by giving it a name.

Q.5. What are the different types of Internet connectivity?

Answer – There are two types of Internet connectivity available (Wired connectivity & Wireless
connectivity)-
Wired connectivity

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 21


a. Dial-Up – Previously we were connecting to the internet with the help of dial – up system. Means first
we have to dial a particular number and then the internet will be established.
b. DSL – Digital Subscriber Line (DSL) provides Internet connection by transferring digital data over the
wires of a local telephone network.
c. Cable Internet Access – Cable Internet Access is delivered using existing cable TV networks, similar
to DSL, which is delivered via existing telephone lines.

Wireless connectivity
a. 3G or 4G – 3G stands for third Generation and 4G stands for fourth Generation, it is mobile
telecommunication services and network.
b. WiMax – WiMax (Worldwide Interoperability for Microwave Access) is a wireless technology providing
mobile broadband connectivity across the cities and countries, for example Jio WiMax.
c. Wi-Fi – Wi-Fi is wireless connectivity which provides high – speed internet connections to multiple
users.

Prepared By Mr. Gautam Somani PGT(CS) Alok School Sector-11,Udaipur Page 22

You might also like