0% found this document useful (0 votes)
10 views

Model Test Paper 2 (IT-402)

Uploaded by

Ruturaj Parida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Model Test Paper 2 (IT-402)

Uploaded by

Ruturaj Parida
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

MODEL TEST PAPER 2

(Based on Latest CBSE Sample Paper)

Max. Time: 2 Hours Max. Marks: 50

General Instructions: Same as Model Test Paper 1

SECTION A: OBJECTIVE TYPE QUESTIONS


1. Answer any 4 out of the given 6 questions on Employability Skills [1 × 4 = 4 marks]
(i) __________ stress is a result of unexpressed worries. [1]
(a) Internal (b) Environmental (c) External (d) Survival
Ans: (a)
(ii) An operating system that manages a group of independent computers and makes them appear to be
a single computer is known as a _______________ operating system. [1]
(a) real-time (b) Graphical (c) distributed (d) Multi-user
Ans: (c)
(iii) __________ plays a major role in reaction to stress. [1]
(a) Personality (b) Positive attitude (c) Behaviour (d) None of these
Ans: (b)
(iv) Which term means walking in the local park or similar such activity?
(a) Nature walk (b) Motivation (c) Regulation (d) None of these
Ans: (a)
(v) An entrepreneur must form contacts with the _______ to analyse the market. [1]
(a) Planning (b) Competitors (c) Self-confident (d) None of these
Ans: (b)
(vi) __________ brings about changes in people's knowledge, attitude and skills. [1]
(a) Sustainable development (b) Natural resources
(c) Both (a) and (b) (d) None of these
Ans: (a)
2. Answer any 5 out of the given 6 questions  [1 × 5 = 5 marks]
(i) In the Mail Merge dialog box, you can select the ____________ option if you want to save the merged
documents. [1]
(a) File (b) Edit (c) View (d) Format
Ans: (a)
(ii) Prerna is a student of class X. Her teacher has asked her to create a document on 'Women
Empowerment'. She has written the text and also added relevant images in her document using Writer.
But she has realised that the paragraph will look better if the images are placed around the text. Name
the feature of Writer she can use to get the desired result. [1]
(a) Placing image (b) Positioning image (c) Wrap text (d) Closing text
Ans: (c)

452
(iii) The grey colour in the TOC reminds us that the text has been generated ______________ [1]
(a) manually (b) automatically (c) Both (a) and (b) (d) None of these
Ans: (b)
(iv) Prashant is a writer. He has just completed writing his book using Writer software. Now he wants to
add a page which will contain the title of each chapter and its respective page number. Suggest the
feature that can be used to do this task. [1]
(a) Mail merge (b) Templates (c) Styles (d) Table of contents
Ans: (d)
(v) Under Insert tab, _______ group contains the features like Shapes, ClipArt etc. [1]
(a) Illustrations (b) Shapes (c) Paragraph (d) Clipboard
Ans: (a)
(vi) Two other toolbars can be opened from Picture Tool bar are : the _______ and _______. [1]
(a) Edit picture, Color picture (b) Format, drawing
(c) Graphic Filter toolbar, Color toolbar (d) Floating toolbar, Color toolbar
Ans: (c)

3. Answer any 5 out of the given 6 questions [1 × 5 = 5 marks]


(i) Aparna has made four spreadsheets containing marks of 5 subjects of all the students of her class.
She has to prepare a sheet that contains the total marks of all the subjects of her class. Name the
option that can be used to perform this task. [1]
(a) Subtotal (b) Average (c) Goal Seek (d) Scenario
Ans: (a)
(ii) Linked data is stored in the __________. [1]
(a) destination file (b) web file (c) source file (d) domain file
Ans: (c)
(iii) ___________ is used in between the cell reference in a formula. [1]
(a) : (b) , (c) Both (a) and (b) (d) @
Ans: (a)
(iv) Internally for each recorded macro, some code is generated, which is stored inside __________
and clause. [1]
(a) Sub, End Sub (c) Function, End Function
(b) Section, End Section (d) None of these
Ans: (a)
(v) In Goal seek dialog box, in the ___________ we enter the reference of the cell that contains the value
to be changed. [1]
(a) variable cell (b) modifying cell (c) changing cell (d) replacing cell
Ans: (a)
(vi) Which allows you to reorder data? [1]
(a) Sorting (b) Filtering (c) Scenario (d) Custom sorting
Ans: (a)

453
4. Answer any 5 out of the given 6 questions  [1 × 5 = 5 marks]
(i) Field is the individual sub component of one _______. [1]
(a) record (b) column (c) data (d) None of these
Ans: (a)
(ii) The default data type for a field is _______. [1]
(a) char (b) int (c) text (d) None of these
Ans: (a)
(iii) You create a table in MS-Access. You decided to create two fields RollNo and Date of Birth, what will be
the data type of Date-of-Birth column? [1]
(a) Number (c) Yes/No (b) Text (d) Date/Time
Ans: (d)
(iv) When you define a field for a table, which of the following parameters does Access always consider
optional? [1]
(a) Field Name (c) Field Size (b) Data Type (d) Description
Ans: (d)
(v) Duplication of data is known as _______. [1]
(a) data security (b) data incomplete (c) data redundancy (d) None of these
Ans: (c)
(vi) If the two departments (HR and IT) access the data simultaneously then only one department will see the
updates by the other department. DBMS solves this issue. Thus, DBMS helps to avoid _________________
which means if a single database is used by multiple users then it also ensures that the same data is
present for all the users.
(a) Data redundancy (b) Data inconsistency
(c) Data piracy (d) Data modification
Ans: (b)
5. Answer any 5 out of the given 6 questions [1 × 5 = 5 marks]
(i) Which client software is used to request and display web pages?  [1]
(a) Web server (b) FTP (c) Multimedia (d) Web browser
Ans: (d)
(ii) Internet is a network of _________. [1]
(a) networks (b) data (b) value (d) pages
Ans: (a)
(iii) The first network was _________. [1]
(a) ARPANET (b) Internet (c) NSFnet (d) NET
Ans: (a)
(iv) A/An _________ that identifies a specific computer on the Internet. [1]
(a) user name (b) domain name (c) E-mail (d) None of these
Ans: (d)
(v) Satellite which are orbiting around the _________, provide necessary links for telephone and television
service. [1]
(a) wire (b) Earth (c) station (d) All of these
Ans: (b)

454
(vi) A router passes data packets from one network to another network based on their _________ not MAC
address. [1]
(a) IP address (b) URL (c) Web address (d) None of these
Ans: (a)

SECTION B: SUBJECTIVE TYPE QUESTIONS


Answer any 3 out of the given 5 questions on Employability Skills [2 × 3 = 6 marks]
Answer each question in 20 – 30 words.
6. What do you mean by verbal communication? [2]
Ans. Verbal communication enables us to share our thoughts with others by using words in a mutually
understandable language such as English, Hindi, Urdu, Chinese, French, Spanish, etc. Language plays
an important role in verbal communication. In simple words, language is a syntactically organised
system of signals, such as voice sounds, intonations or pitch, gestures or written symbols which help in
communicating our thoughts or feelings. Our verbal communication can be done either in a written or
oral mode.
7. Explain the term fatigue related stress. [2]
Ans. Fatigue and overwork related stress: It is generated by the fatigue and overwork that you build up over a
period of time as a result of your highly demanding study routines, ever increasing ambition, setting up
unrealistic goals and exerting yourself much beyond your mental and physical capacity. More often than
not, such stress arises from deadlines that are self-imposed or imposed by others or by circumstances.
8. Why is self-regulation important in life? [2]
Ans. In the recent years, self-regulation or systematic efforts to direct thoughts, feelings, and actions towards
the attainment of one's goals has assumed great importance in the psychological and educational
literatures. Your self-regulation allows you to keep a tab on your own emotions resulting as your response
to a specific event and attune your actions accordingly to accomplish your set goal.
9. What are the responsibilities of an operating system with respect to file management? [2]
Ans. Operating system stores all information in the form of files and also orders the files into folders for
systematic storage. The OS allows access to files, creation, editing, closing the files, transfer, changing
the format, etc. So, file management among other tasks is a responsibility of the OS.
10. Describe any two problems related to sustainable development. [2]
Ans. Two problems related to sustainable development are:
(i) The concept of sustainable development is subject to criticism. What, exactly, is to be sustained
in a sustainable development? Any positive rate of exploitation of a non-renewable resource will
eventually lead to exhaustion of earth's final stock.
(ii) Turning the concept of sustainability into policy raises questions about how to assess the well being
of present and future generations. The issue is more complicated because our children do not just
inherit environmental pollution and resource depletion, but also enjoy the fruits of our labour, in the
forms of education, skills, and knowledge (i.e., human capital), as well as physical capital. They may
also benefit from investments in natural resources, improvement in soil fertility and reforestation.
Thus, in considering and calculating what we pass on to future generations, we must take account
of the full range of physical, human and natural capital.
Answer any 4 out of the given 6 questions in 20 – 30 words each [2 × 4 = 8 marks]
11. What is Mail Merge? [2]
Ans. Mail Merge is a feature provided by LibreOffice Writer that is used to send the same basic letter, with slight
modifications, to a large number of people at the same time. The mail merge facility is widely used when

455
letters with identical information have to be sent to many people. For mail merge we use two
documents.
1. Main document: The document that contains the text of a letter.
2. Data source: The file that contains name and address, i.e. data of recipients.
 Mail merge is the process of combining the main document with the data source containing the names
and addresses of the recipients. The final document is called the merged document which is mailed
to all those to whom it is to be sent.
12. What is a macro? [2]
Ans. A macro is a saved sequence of commands or keystrokes that are stored for later use. An example of a
simple macro is one that ''types" your address. The LibreOffice macro language is very flexible, allowing
automation of both simple and complex tasks. Macros are especially useful to repeat a task the same
way over and over again.
13. Define router as network device. [2]
Ans. A router is attached to one or more networks to forward packets from one network to another.
14. Define the following terms: [2]
(i) Active Cell (ii) Sheet Tab
Ans. (i) Active cell is the cell on which there is focus, OR the cell with a dark boundary.
(ii) In general, there are multiple tabs in a spreadsheet. Each such tab holds data separated out from
the other tabs. Each such tab is known as a sheet tab. The sheet tabs are placed on the bottom
left of the Excel interface.
15. Explain the term relational database management system. [2]
Ans. RDBMS stands for Relational Database Management System. This name is used for databases that are
developed by using the relational database model as prescribed by E.F. Codd, of IBM's San Jose Research
laboratory. Most popular database systems in use are RDBMS-es.
RDBMS store the data as collection of tables, which might be related by common fields (database table
columns). RDBMS also provides relational operators to manipulate the data stored in the database
tables. Most RDBMS use SQL as database query language. The most popular RDBMS are MS SQL Server,
DB2, Oracle, MS Access and MySQL.
16. State any two practices for internet security. [2]
Ans. Best Practices for Security
1. U
 se Strong Passwords: A strong password is a combination of alpha-numeric and special characters.
Do not use your mobile number, friends name, etc. for a password. Change your password frequently
at least once in 2 or 3 weeks.
2. B
 ackup Your Data: Always keep copies of your personal data in CDs, pendrive, etc. This may be helpful
in a loss of data situation.
Answer any 3 out of the given 5 questions in 50 – 80 words each [4 × 3 = 12 marks]
17. What are the steps to change the style of the text in a document? [4]
Ans. To select a style, follow the given steps:
1. Select the text you want to format.
2. Click the Home tab. In the Styles group, hover over each style to see a live preview in the document.
3. Click the More drop-down arrow to see additional styles. The drop-down list of styles will appear.
4. Select the style you want to apply. The selected style will be applied on the text.

456
18. Ishita is a teacher. She had entered the marks of all the subjects and also calculated the total of the
students. Now, she wants to sort the data so that she can find the names of the students according to
their marks in descending order. Tell her the different steps to sort the data. [4]
Ans. For a quick sort, click the arrow below the Sort & Filtering icon in the Editing group of the Home ribbon
and choose the Sort A to Z / Z to A icons in the Sort & Filter group of the Data ribbon. In Excel 2010,
these are labeled Sort Smallest to Largest and vice versa.
19. How to clear web history on the Mozilla Firefox browser? [4]
Ans. Clear browsing data manually
1. Tap the menu button.
2. Tap Settings.
3. Tap Delete browsing data in the Privacy and security section.
4. S
 elect the types of data you want to delete: Open Tabs. Browsing history. Cookies and site data.
Cached images and files. Site permissions. Downloads.
5. Tap Delete browsing data.
20. What do you mean by data control language? Also, give its types. [4]
Ans. It is used to create roles, permissions, and referential integrity as well it is used to control access to
database by securing it. These SQL commands are used for providing security to database objects. These
commands are GRANT and REVOKE.
21. Consider the following table: Employee Salary [4]

Last Name First Name Dept Payroll Number Salary Job Title

Shen James Finance A621 19500 Payroll Clerk

Gupta Shruti Finance M502 35000 Accountant

Bedi Reeta Human Resource M455 18500 Accountant

Walker Tia Sales W232 39000 Sales Representative

(i) How many fields and records are there in the table EmployeeSalary.
(ii) Write the SQL queries for the following:
(a) List all data of table EmployeeSalary.
(b) Display all the records whose salary is less than 25000.
(c) Display the FirstName and JobTitle of employees having Dept ‘Finance’.
Ans. (i) 6 fields and 4 records.
(ii) (a) Select * From EmployeeSalary;
(b) Select * From EmployeeSalary Where Salary < 25000;
  (c) Select FirstName, JobTitle From EmployeeSalary Where Dept = ‘Finance’;

457

You might also like