402 Information Tech MS X
402 Information Tech MS X
402 Information Tech MS X
Class X
INFORMATION TECHNOLOGY(402)
9. __________ are used for playing sound files while making a presentation.
Ans : Audio clips
10. Selecting the__________ view shows calendar for a month.
Ans : Month
11. You can categorize appointments in time management software by giving specific
__________ to appointments.
Ans : colours
14. What are document templates? State the purpose of using document template. (2)
Ans : Templates or document templates refer to a sample fill-in-the-blank document that can
help in saving time. Usually templates are customized documents that may have sample content,
themes, etc. For example, if you want to create a resume you can use a resume template and modify
only the sections that require changes.
Or
15. What are Clip arts? List any two websites that offer free clipart. (2)
Ans: Clip arts are pre-defined images available for use in documents. Clip Art can help in making a
document look colourful and presentable. 1 mark
Name of any two valid websites that offer free clipart ( ½ + ½ =1 mark)
16. Explain any two types of views available in Spreadsheet (2)
Ans : five types of views are ;
Normal View: The default view of the spreadsheet application is the Normal. It is a collection of
cells arranged in the work area.
Page Layout: You can select the Page Layout view in order to quickly fine tune a
worksheet that contains many charts or huge amounts of data and achieve professional looking
results.
Page Break Preview: This option is similar to the Page Layout option except you can set the area that
is to be set as a page after inserting page break.
Custom Views: If you would like to view selected areas of a document, you can use the custom view
option. For example, if you would like to point out certain row and column, you can add that to the
Custom view.
Full Screen: Selecting this option makes the workbook cover the entire screen. All tabs are hidden
from view. To get back the tabs, click on File> Restore.
20. A stranger has helped your grandfather and you want to appreciate him for the help extended
by him. Write any three lines to thank him.
Ans : Thanks a lot!
Thanks! You helped my grandfather.
Thanks! I really appreciate your help
24. Yashika is preparing a Digital Presentation for her project. Give any three basic guidelines to
be followed while making a digital Presentation.
Ans : Do a thorough spell check across all slides
- Perform a manual spell check for terms that are not included during the standard spell
check in the presentation software; NOT all terms (particularly technical terms such as
biological names, etc.) will be checked
- Remove irrelevant content such as images or clip arts, terms, etc. if they are not
required.
(any three valid guidelines)
(1 mark for each guideline)
Or
25. Ankush has to present monthly report of his department to his managing committee. Suggest
him with appropriate tools to do the following in a digital presentation:
i. To show statistical data pictorially for analysis.
Ans : Charts may be used
(1 mark)
ii. Two ways to insert movie in his presentation.
Ans: You can insert a movie in two ways:
Using Insert tab
Using Title and Content Layout Option (1 mark)
iii. Which option he shall use to keep guided text used by presenter
Ans : He should use Presenter View in Slide Show Tab (1 mark)
26. Define the following terms
a. Tuple :
A row also called a record or tuple represents a single, data item in a table
b. Foreign Key
The foreign key identifies a column or set of columns in one (referencing) table that
refers to a column or set of columns in another (referenced) table.
c. DBMS : Database Management System is a software package with computer
programs that controls the creation, maintenance, and use of a database
Section B
Long Answer Questions (5X3=15)
27. Ananya uses Internet for her School Project. Suggest any five security measure to ensure
safety from online threats.
Ans : Five safety measures :
i) Use antivirus and antispyware software
ii) Use strong passwords
iii) Backup your data:
iv) Use encryption software
v) Keeping your username and password private
vi) Do not share personal information
vii) Secure transactions:
(5 marks for any 5 valid security measures)
(1 mark for each)
Or
28. Explain the following terms :
a. Internet : The Internet is a global system of interconnected computer networks
that use the standard Internet protocol suite to serve billions of users worldwide
b. LAN : A local area network (LAN) is one which connects computers and
devices in a limited geographical area such as home, school, computer
laboratory, office building, or closely positioned group of buildings
c. Instant Messaging: Instant messaging (IM) is a form of communication over the
Internet that offers an instantaneous transmission of text-based messages from
sender to receiver.
d. Blog : A blog is a discussion style site used by non-technical (and
technical users) users for creating personal web pages.
e. P2P Architecture : Peer to Peer : Networks in which all computers have an equal
status are called peer to peer networks.
29. Write command to create a table named ‘BOOK’ with following fields:
BOOK ID Char(4)
Bname Varchar(15)
Author Varchar(20)
Price Decimal
Ans:
Create table BOOK
( BOOK_ID char(4),
Bname varchar(15),
Author varchar(20),
Price Decimal );
(2 marks)
a. Identify the primary key of the ‘Book’ Table, also mention the suitable reason for choosing
it as a Primary Key
Ans : Book_id may be chosen as the Primary key because every book has a unique id that may
be used to identify the book.
( ½ mark for primay key and ½ mark for reason)
b. Differentiate between (i) char and varchar datatype
Ans : char :
1. Stores exactly the length specified by user in field definition.
2. Pads with trailing spaces for shorter strings
varchar:
1. It Stores up to the specified length.
2. No padding with extra spaces
(1 mark for 1 correct difference)
(ii) DDL and DML
DDL : A data definition language or data description language (DDL) is a standard for
commands that define the different structures in a database
DML : A data manipulation language (DML) is a language that enables users to access and
manipulate data in a database.
(1 mark for 1 correct difference)
OR
30. Write the SQL commands to answer the queries based on Fabric table
FabricID Fname Type Disc
F001 Shirt Woollen 10
F002 Suit Cotton 20
F003 Tunic Cotton 10
F004 Jeans Denim 5
F006 Shorts Cotton 7
31. Given the Following Spreadsheet, Write the appropriate Formula/ Expression/ Function to
be used for (a) to (e) (5)