0% found this document useful (0 votes)
13 views

Set(1) - Computer QP with solutions

The document is a revision worksheet for Information Technology for the academic year 2024-25 at The Cambridge International School, Bangalore. It includes objective and subjective type questions covering topics such as employability skills, database management, and software applications. Students are required to answer a selection of questions to demonstrate their understanding of the material.

Uploaded by

abhishek gupta
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views

Set(1) - Computer QP with solutions

The document is a revision worksheet for Information Technology for the academic year 2024-25 at The Cambridge International School, Bangalore. It includes objective and subjective type questions covering topics such as employability skills, database management, and software applications. Students are required to answer a selection of questions to demonstrate their understanding of the material.

Uploaded by

abhishek gupta
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 7

THE CAMBRIDGE INTERNATIONAL SCHOOL, BANGALORE

ACADEMIC YEAR 2024-25


REVISION WORKSHEET
INFORMATION TECHNOLOGY

Section A - Objective Type Questions


Question 1. Answer any 4 out of the given 6 questions based on Employability Skills. (4 × 1 = 4)
(i) What is a file? (1)
(a) A file is a section of main storage used to store data.
(b) A file is a collection of information that has been given a name and has an extension.
(c) A file is the part of a program that is used to describe what the program should do.
(d) A file can be saved only on CDs.
(ii) In _______, we change from our normal activities to silence. (1)
(a) meditation (b) stress (c) worries (d) survival
(iii) _______ is a common response to danger in all people and animals. (1)
(a) Internal stress (b) Environmental stress (c) Survival stress (d) Fatigue related stress
(iv) Effective communication involves (1)
(a) Speaking only (b) Listening only (c) Speaking and listening (d) Writing and reading
(v) To find a suitable market an entrepreneur performs the functions of (1)
(a) advertisement and publicity (b) appointment of selling agents
(c) new organization structure (d) Both (a) and (b)
(vi) What is the meaning of sustainable development? (1)
(a) Development that focuses on economic growth only
(b) Development that meets the needs of the present without compromising future generations
(c) Development that prioritizes social progress over environmental protection
(d) Development that relies solely on renewable energy sources

Question 2. Answer any 5 out of the given 6 questions. (5 × 1 = 5)


(i) Safari is a web browser developed by _______ (1)
(a) Google (b) Microsoft (c) Apple (d) None of these
(ii) When you define a field for a table, in which of the following parameters is access always considered optional?

(a) Field name (b) Data type (c) Field size (d) Description
(iii) A _______ is a language that enables users to access and manipulate data in a database. (1)
(a) DML (b) DCL (c) TCL (d) DDL
(iv) _______ include fonts, alignment, borders, background, number formats (for example, currency, date,
number), and cell protection in the document. (1)
(a) Cell style (b) Numbering style (c) Paragraph style (d) Character style
(v) When you apply a _______, you apply a group of formatting effects together in one single step. (1)
(a) effect (b) template (c) style (d) format
(vi) Akshat wants to store a huge amount of information about his firm in a database. Which type of table

1
organization would be most suitable for this purpose? (1)
(a) Relational (b) Flat file (c) Either relational or flat file (d) Hierarchical

Question 3. Answer any 5 out of the given 6 questions.


(A) …………….. controls the flow of text around an image. [1]
(a) Text Wrapping (b) Drawing objects (c) Text box (d) Text Art
Explanation: Text wrapping is a feature of word processors that refers to the placement of text around images. The
wrap settings determine the relation between the text and the graphic.
(B) Which of the following What-lf analysis tools deals with multiple unknown variables? [1]
(a) Goal Seek (b) Solver (c) Scenario (d) None of these
Explanation: The Solver is a advanced form of Goal Seek tooL A solver deals with equations with multiple
variables. It tries to find out maximum and minimum results from a multiple unknown variables.
Goal seek works on single variable where target is first determined and input value is calculated.
(C) A …………….. extracts data from a database as per a condition. [1]
(a) Forms (b) Reports (c) Queries (d) Table
Explanation: A database query is a stored object that extracts data from a database as per a condition. Queries
present the extracted data in formatted form.
(D) …………….. feature, of operating system help people with disabilities. [1]
(a) Accessibility (b) Access (c) Assist (d) All of these
Explanation: Every operating system provides an Accessibility feature which helps people with disabilities to use
the device. E.g., Magnifier, Narrator, Closed Captioning are some of the Accessibility features provided by
Windows.
(E) …………….. is used for instant messaging. [1]
(a) Google Hangouts (b) Google Chrome (c) Gmail (d) All of these
Explanation: Google Hangouts is an IM application that allows you to chat from your computer’s desktop, make
video calls and do group chats with other Gmail and Google Hangouts users.
Gmail is a free email service provided by Google. Google chrome is a web browser developed by Google.
(F) Which of the following is not appropriate to set as primary key? [1]
(a) Employee’s Identification Number (b) Price of book (c) Product code (d) Admission number of student
Explanation: The information stored in the Price of Book field will not be unique. Thus, it is not an appropriate
field to set as the primary key.

Question 4. Answer any 5 out of the given 6 questions. (5 × 1 = 5)


(i) In URL, http://www.arihant.com/index.htm, which component identifies the path of a web page? (1)
(a) http (b) www.arihant.com (c) /index.htm (d) All of the above
(ii) What dialog box opens on choosing File → Templates → Manage Templates in Writer? (1)
(a) The File dialog box (b) The Manage Templates dialog box
(c) The Templates dialog box (d) The Record Template dialog box
(iii) _______ are the ways to produce the data stored in databases and tables in a printed form. (1)
(a) Forms (b) Queries (c) Reports (d) Data
(iv) Arnab learned about the software that gets installed on the computer without the user’s knowledge. Help him
to find the name of the same. (1)
(a) Spyware (b) Malware (c) Adware (d) None of these
(v) Tamanna wants to know the name of the kind of software that seems useful in the beginning but will cause
2
damage to the computer once installed. What is such a kind of software called? (1)
(a) Trojan horse (b) Worm (c) Malware (d) Virus
(vi) Which shortcut key is used to make the selected text italic? (1)
(a) Ctrl + I (b) Shift + I (c) FI + I (d) None of these

Question 5: Answer any 5 out of the given 6 questions. (5 × 1 = 5)


(i) If the two departments (HR and IT) access the data simultaneously then only one department will see the
updates by the other department. DBMS solves this issue. Thus, DBMS helps to avoid _______ which means if a
single database is used by multiple users then it also ensures that the same data is present for all the users. (1)
(a) Data redundancy (b) Data inconsistency (c) Data piracy (d) Data modification
(ii) Line or paragraph spacing is measured in terms of lines or points, which is referred as _______ (1)
(a) text wrapping (b) PDF (c) XPS (d) leading
(iii) Rinky wants to know about the Number data type in Calc. Which of the following statement(s) is/are TRUE
about it? (1)
(a) Numbers are generally raw numbers or dates.
(b) Numbers can be started with a dollar sign ($) or with some other currency symbols to display as currency.
(c) By default, the number and date data are aligned to the right in Calc. (d) All of the above
(iv) How much space does the DATE/TIME data type hold in Base? (1)
(a) 2 bytes (b) 4 bytes (c) 8 bytes (d) 10 bytes
(v) Which tab is used to create a Table of Contents in a document? (1)
(a) File tab (b) Format tab (c) Insert tab (d) Styles tab
(vi) ___ is a form of electronic commerce that allows customers to directly buy goods or services from a seller on
the Internet.
(a) E-Shopping (b) E-ticketing (c) E-buying (d) E-Delivery

Section B - Subjective Type Questions


Answer any 3 out of the given 5 questions on Employability skills. Answer each question in 20-30 words. (3×2=6)
Question 6: Explain any 2 Qualities of an entrepreneur.
Answer: 1. Determined 2. Confident

Question 7.In what way does inadequate planning hinders effective communication? (2)
Answer: Poor planning act as a barrier to communication as without adequate planning the result desired due to the
communication may not be achieved. So, we need to properly plan what message we want to send before actually
sending it.

Question 8. What is an operating system? (2)


Answer: The operating system is the system software that performs all the basic tasks of a computer system. It
works like an interface between the user and the computer hardware resources. It is a collection of programs that
controls and coordinates the execution of all other tasks and functions in a computer system. It mainly provides an
environment to run the software and serves services to the computer hardware.

Question 9.Explain the relationship between self-regulation and goal setting. [2]
Answer: Self-regulation is the ability to control one’s behavior, emotions, and thoughts to achieve some goals.

3
Goal setting is the process of planning and taking active steps to achieve the desired outcome which is only
possible through self-regulation.

Question 10.What is the contribution of the entrepreneurs in the execution of Government policies? (2)
Answer: Entrepreneurs make an important contribution in implementing government policies and achieving the
national goals. They cooperate with the government for the implementation of development plans in the country.
Answer any 4 out of the given 6 questions in 20-30 words each. (4 × 2 = 8)
Question 11. What do you mean by template? (2)
Answer: A template is a collection of styles that already have some formatting in place, such as fonts, logos, and
line spacing, and can be used as a starting point for almost anything that you want to create. Microsoft Word offers
hundreds of free templates, including invoices, resumes, invitations, and form letters, among others.

Question 12. Differentiate between data definition language (DDL) and data manipulation language ’ (DML).
Answer: (1) Data Definition Language (DDL) is a language that enables a user to create, modify and work with the
structure of the database. For, eg., CREATE TABLE.
(2) Data Manipulation Language (DML) is a language that enables a user to access or manipulate data in a
database. The DML commands help users to query and manipulate data in the existing database.
For, eg., SELECT.

Question 13.What is the role of a foreign key in a database management system (DBMS)? (2)
Answer: In a DBMS, a foreign key establishes a relationship between two tables. It references the primary key of
another table, enforcing referential integrity. It ensures data consistency by preventing actions that would violate
the defined relationships, such as deleting a record referenced by a foreign key constraint.

Question 14.Write the steps to insert a record in a Datasheet View. (2)


Answer: The steps to insert a record in a Datasheet View are as follows:
 Step 1: When you create a table, a new blank record automatically appears in the second row of the table.
 Step 2: If you enter data in the last record, a new blank record will automatically appear at the end of the
table.
 Step 3: Type data into the fields.
 Step 4: When you have finished adding records in the datasheet, save it and close it.

Question 15. Differentiate between MAN and WAN. [2]


Answer:
MAN WAN
MAN stands for Metropolitan Area Network WAN stands for Wide Area Network
This type of network is spread over a city. This type of network is spread across countries.
E.g. Cable TV network E.g. Internet, Intranet

Question 16. State any two practices for internet security. (2)
Answer: Any two practices for internet security are:

4
 Use Strong Passwords: A strong password is a combination of alpha-numeric and special characters. Do not
use your mobile number, friend’s name, etc. for a password. Change your password frequently at least once
in 2 or 3 weeks.
 Backup Your Data: Always keep copies of your data on CDs, pen drives, etc. This may be helpful in a loss
of data situation.

Answer any 3 out of the given 5 questions in 50-80 words each. (3 × 4 = 12)

Question 17. Rita is working on a spreadsheet. She wants to know about the use of the following terms: (4)
(a) Quick Sort
(b) Filtering Data
Answer: (a) Quick Sort is especially useful when you add new information to a spreadsheet. When a spreadsheet is
long, it is usually easier to add new information at the bottom of the sheet, rather than adding it in its correct place.
After you have added information, you can sort the records to update the spreadsheet and put the information in its
correct place in quick sort.

(b) When a sheet contains a large amount of data, it can be difficult to find information quickly. In that case, Filters
can be used to narrow down the data in your worksheet, allowing you to view only the information you need. In
other words, Filters help you to ask questions about your data and retrieve only the relevant information filtering
away the undesirable data.

Question 18.Write the SQL commands to answer the questions based on the “WORKER” table.
(a) Create “Worker” table with the following fields
FIELDS DATA TYPES
WID Integer
Wname Varchar(20)
WDesignation Char(10)
WCity Varchar(30)
WPhone Char(10)
(b) Display all the records in the Worker table
(c) Display the records where city is Delhi
(d) Define Primary Key
Answer: (a) CREATE TABLE, WORKER (WID INTEGER, WNAME VARCHAR (20), WDESIG- NATION
CHAR (10), WCITY VARCHAR (30), WPHONE CHAR (10));

(b) SELECT * FROM WORKER;

(c) SELECT * FROM WORKER WHERE WCITY=”DELHI”;

(d) Primary Key – A primary key is a unique value that identifies a row in a table. A primary key is indexed in the

5
database making it faster for the database to search for a record. The primary key constraint can be applied on one
or more than one columns together.

Question 19.Consider the following table PRODUCT (4)


TABLE: PRODUCT
S_NO P_Name S_Name Qty Cost City
S1 Biscuit Priyagold 120 12.00 Delhi
S2 Bread Britannia 200 25.00 Mumbai
S3 Chocolate Cadbury 350 40.00 Mumbai
S4 Sauce Kissan 400 45.00 Chennai

(i) How many fields and records are there in the PRODUCT table?
(ii) Write SQL queries for the following:
(a) Display all Products whose Qty is between 100 and 400.
(b) Display S_Name, P_Name, and Cost for all the Products whose Qty is less than 300.
(c) Display all the records alphabetically by S_Name.
Answer: (i) There are 6 fields and 4 records in the table PRODUCT.
(ii) (a) SELECT* FROM PRODUCT WHERE Qty BETWEEN 100 AND 400;
(b) SELECT S _Name, P _Name, Cost FROM PRODUCT WHERE Qty <300;
(c) SELECT * FROM PRODUCT ORDER BY S_Name;

Question 20.Shubham is learning about DBMS. He wants to know about the following: (4)
(a) The purpose of DBMS
(b) Any two uses of DBMS
Answer:
(a) DBMS (Database Management System) is used to store logically related information at a centralized location. It
facilitates data sharing among all the applications requiring it.
(b) Two uses of the database management system are as follows:
 DBMS is used to store data at a centralized location.
 It is used to minimize data redundancy and data inconsistency.

Question 21. Define “server,” and provide the term for other computers in the network, as well as the types of
networking architecture and the likely networking technology in use. [4]
Answer: (1) A server is a computer or system that provides resources, data, services, or programs to other
computers over a network.
(2) Other computers in the network are called clients. A client is a computer that connects to and uses the resources
of the server.
6
(3) Based on component roles there are two types of networking architecture:
(i) Client-server architecture (ii) Peer to Peer architecture
(4) The networking technology used in this case is Client-Server Architecture.
In this type of network, each computer is designated a role, either as a server or as a client.

You might also like