Class 10 IT Code 402 Previous Year Question Paper 2022 – Term 2 – Solution

Series JSK/1
Question Paper Code 089/1/4

INFORMATION TECHNOLOGY – SOLUTION
Term II (Session 2021-22)

Time allowed: 1 Hour
Maximum Marks: 25

General Instructions:

  1. Please read the instructions carefully.
  2. This question paper is divided into 3 sections, viz., Section A, Section B and Section C.
  3. Section A is of 5 marks and has 6 questions on Employability Skills.
    • Question number 1 to 4 are one mark questions. Attempt any three questions.
    • Question number 5 to 6 are two mark questions. Attempt any one question.
  4. Section B is of 12 marks and 12 questions on Subject Specific Skills.
    • Question number 7 to 12 are one mark questions. Attempt any four questions.
    • Question number 13 to 18 are two marks questions. Attempt any four questions.
  5. Section C is of 8 marks and has 3 Competency-Based Questions.
    Question number 19 to 21 are four marks questions. Attempt any two questions.
  6. Do as per the instructions given in the respective sections.
  7. Marks allotted are mentioned against each section.

SECTION A (3+2=5)

Answer any 3 questions out of the given 4 questions. Each question is of 1 mark. (1X3=3)

1. Name the person who combines factors in a creative manner to generate value for customers and create wealth.
Answer: entrepreneur

2. Name the skill that helps anyone to lead, guide and supervise people who work for the business.
Answer: “leadership” or “management” skill

3. Name any two elements of nature.
Answer: Water, Air

4. Give any one method that we can adopt to promote sustainable development.
Answer: One method to promote sustainable development is “Conservation and Responsible Use of Natural Resources.”

5. Differentiate between agricultural entrepreneurship and small scale entrepreneurship with one point only.
Answer: Agricultural entrepreneurship often caters to local markets and sustains communities, while general small-scale entrepreneurship covers various business activities and aims for profit and broader growth.

6. In our daily life we can contribute to create a Sustainable Society by following 4Rs’ and 1U of sustainability. Explain any one term out of 4Rs’ and 1U.
Answer: One of the “4Rs” of sustainability is “Reduce.”
Reduce refers to the practice of reducing the consumption of resources and minimizing waste. It involves using resources more efficiently and consciously. For example, reducing energy consumption, limiting water usage, and minimizing the production of waste and emissions are all ways to contribute to a sustainable society.

SECTION B (4+8=12)

Answer any 4 questions out of the given 6 questions. (1X4=4)

7. ____ is an organisation which provides you with access to the internet via a dial-up or direct or wireless connection.
Answer: Internet Service Provider (ISP)

8. Name the software or hardware security device that analysis the network traffic and determine if the traffic should be allowed or not.
Answer: Firewall

9. ____ is the immediate assistant provided to the injured to save life and minimise health loss till the proper medical aid/facility is provided.
Answer: First Aid

10. When primary key constraint is applied on one or more columns then it is known as _____.
Answer: Composite Primary Key

11. A row that represents a single, data item in a table is known as _____.
Answer: Tuple

12. Explain the term Sorting.
Answer: Sorting is the process of arranging data in a specific order or sequence, typically based on some criteria or key, which can be ascending or descending.

Answer any 4 questions out of the given 6 questions. (2X4=8)

13. With any four rules which is to be followed for creating strong passwords.
Answer: Here are some rules to follow when creating strong passwords:
(i) Use a minimum of 12 characters.
(ii) Include a mix of uppercase, lowercase letters, numbers, and special characters.
(iii) Avoid common words, patterns, or personal information.
(iv) Use passphrases or random combinations.
(v) Change passwords regularly.
(vi) Enable two-factor authentication when possible.
(vii) Consider using a password manager for convenience and security.

14. What is the special name given to the discussion style site used by non-technical (or technical) users for creating personal web pages? Give any two examples of websites that help us to create such discussion style sites for free.
Answer: The special name given to discussion-style sites used by non-technical users for creating personal web pages is “blogging platforms” or “blogging websites.”
Two examples of websites that allow users to create discussion-style sites (blogs) for free are:
(i) WordPress.com: WordPress.com is a popular platform that offers free blog hosting. Users can create and customize their blogs with various themes and plugins.
(ii) Blogger: Blogger is another widely used platform for creating and managing blogs. It’s known for its user-friendly interface and allows users to create and customize their blogs with ease.

15. Differentiate between LAN and WAN with two points only.

CharacteristicLAN (Local Area Network)WAN (Wide Area Network)
Geographic ScopeLimited area (e.g., single building, campus, home)Extensive area (e.g., cities, states, countries, global)
Transmission SpeedHigher speed and bandwidth within a smaller areaVariable speed, can be slower due to long-distance transmission

16. Explain any two types of relationship that can be created in tables.
Answer: In database management systems, tables can establish various types of relationships to represent the connections between data entities. Two common types of relationships are:
In a one-to-many relationship, one record in a table is associated with multiple records in another table. This means that the primary key value in the “one” table uniquely identifies a record, while the foreign key in the “many” table links it to the corresponding record in the “one” table.
In a many-to-many relationship, multiple records in one table can be associated with multiple records in another table. To represent this relationship, a junction table is typically used. The junction table includes foreign keys from both related tables and serves as an intermediary to link records.

17. What is difference between Form and Reports?
Answer: Forms are primarily designed for data input and user interaction, while reports are intended for the presentation and printing of data in a structured and visually appealing format.

18. Identify any two column name/ attribute and their data types from a given table: PLAYER

PIDPNAMERUNSGENDERDOB
P101SACHIN13000M10/04/2001
P102KAPIL7000M12/02/1998
P103SAURABH12000M13/04/2001
P104VIRAT12500M17/03/2005
Answer:
Field NameData Type
(a) PIDChar OR Varchar
(b) PNAMEChar OR Varchar

SECTION C (4X2=8)Competency Based Questions

Write any 2 questions out of the given 3 questions:

19. Aryan is too much worried when he came to know that someone has withdrawn all money from his uncle’s bank account. He was not able to understand how this could happen when he has not given his ATM card to anyone.
(a) Suggest him away by which he can be assured that he is doing secured online transaction.
Answer: (i) Use secure and reputable websites for online transactions.
(ii) Check for the “https://” in the URL, which indicates a secure connection.
(iii) Keep his login credentials, especially passwords and PINs, confidential.
(iv) Regularly monitor his bank and credit card statements for any unauthorized transactions.
(v) Keep his computer and antivirus software up-to-date to protect against malware and other threats.

(b) Which type of software he needs to install in his computer to protect his computer from Malware?
Answer: Aryan should install antivirus and anti-malware software on his computer. These software programs help protect his computer from various types of malware, including viruses, trojans, spyware, and ransomware. Regularly updating the antivirus and anti-malware definitions is essential to keep the software effective against new threats.
(c) Help him to understand about Phishing.
Answer: Phishing is a fraudulent technique used by cybercriminals to trick individuals into revealing sensitive information, such as login credentials, financial details, or personal data. Phishers often impersonate legitimate organizations or individuals through email, websites, or messages, making their communication appear authentic. Aryan should be cautious when receiving unsolicited emails or messages, especially if they request sensitive data or ask for immediate action.
(d) He also things cookies are harmless. Explain in how cookies can also cause harm to him.

Answer: Cookies can sometimes cause harm. Some cookies can be used to track a user’s online behavior and collect information about their interests and activities. While this is often used for targeted advertising, it can raise privacy concerns. In some cases, malicious websites or attackers can exploit vulnerabilities in web browsers to steal cookies, gaining unauthorized access to a user’s accounts and personal information.

20. Due to pandemic everyone was bound to stay at home. But, due to internet the whole world was connected.
(a) What is meant by worldwide web? Also write any two web browsers names that you know.
Answer: World Wide Web (WWW), often simply referred to as the web, is a global information system that enables the sharing and retrieval of interconnected documents and multimedia content over the Internet. It is a subset of the Internet and consists of web pages, websites, and other online resources that are linked together through hyperlinks.
Two well-known web browsers are:
Google chrome and Mozilla Firefox

(b) Explain how data is transferred over internet.
Answer: Data is transferred over the Internet in small packets of information. These packets are like tiny envelopes containing data and are sent from one device to another. When you send an email, visit a website, or stream a video, your data is broken into these packets and sent through a series of routers and switches that guide them to their destination. Once they arrive, the packets are reassembled to present the complete data to your device. This process relies on a set of rules and protocols to ensure that your data reaches its destination accurately and securely.

21. Consider the following table: STUDENT

ADMNONAMEGRADEDOBMARKSHOUSEGENDER
1001RUPAL910/04/200676GREENM
1002RASHMI908/12/200587REDF
1003ARNAV1025/05/220481GREENM
1004SUMONA923/08/200568REDF
1005ARUN916/07/200572GREENM
1006TIA922/09/200591BLUEF
1007ROSHAN1026/08/200489BLUEM

Write SQL Commands
(a) To display the details of all students of Green House.

SELECT *
FROM STUDENT
WHERE HOUSE = 'GREEN';

(b) To increase the marks by 5 whose ADMNO is 1005.

UPDATE STUDENT
SET MARKS = MARKS + 5
WHERE ADMNO = 1005;

(c) To display the details of all students whose MARKS are less than 80.

SELECT *
FROM STUDENT
WHERE MARKS < 80;

(d) Display the list of all students in descending order of MARKS.

SELECT *
FROM STUDENT
ORDER BY MARKS DESC;

Class 10 Information Technology Previous Year Question Papers

Class 10 Information Technology Previous Year Question Papers Solution

Class 10 Information Technology Previous Year Compartment Question Papers

Class 10 Information Technology Previous Year Compartment Question Papers Solution

Leave a Comment