Students can access the CBSE Sample Papers for Class 10 IT with Solutions and marking scheme Set 4 will help students in understanding the difficulty level of the exam.
CBSE Sample Papers for Class 10 IT Set 4 With Solutions
Time Allowed: 2 Hours
Maximum Marks: 50
General Instructions:
- Please read the instructions carefully.
- This Question Paper consists of 21 questions in two sections: Section A & Section B.
- Section A has Objective type questions whereas Section B contains Subjective type questions.
- Out of the given (5 + 16 =) 21 questions, a candidate has to answer (5 + 10 =) 15 questions in the allotted (maximum) time of 2 hours.
- All questions of a particular section must be attempted in the correct order.
- Section A – Objective Type Questions (24 Marks):
- This section has 05 questions
- Marks allotted are mentioned against each question/part.
- There is no negative marking.
- Do as per the instructions given.
- Section B – Subjective Type Questions (26 Marks):
- This section has 16 questions.
- A candidate has to do 10 questions.
- Do as per the instructions given.
- Marks allotted are mentioned against each question/part
Section – A (24 marks)
Question 1.
Answer any 4 out of the given 6 questions on Employability Skills.
(A) When it is difficult to communicate with someone who is not willing to talk or express their feelings and views it means there is a/an__________ [1]
(a) Culture Barrier
(b) Interpersonal Barrier
(c) Physical Barrier
(d) Language Barrier
Answer:
(b) interpersonal Barrier
Explanation:
Interpersonal communication barriers are obstacles that hinder effective exchange of information and understanding between individuals. These can include language differences, cultural misunderstandings, emotional barriers, or physical distractions, all of which impede the smooth flow of communication in 1 interpersonal interactions.
(B) Kartik’s Computer was running very slow, hangs and often restarts. He is very confused and tensed as he was working on a very important assignment. Kartik’s friend gave him the following suggestions. Identify who has given him a genuine suggestion. [1]
(a) Radha: Restart your machine.
(b) Ishan: Install reliable antivirus software and update.
(c) Amar: Don’t use Pendrive.
(d) Sam: Install free antivirus from net.
Answer:
(b) Ishan: Install reliable antivirus software and update.
Explanation:
An antivirus software is a program designed to detect, prevent, and remove malicious software (malware) from a computer or network. It serves as a crucial tool in maintaining the security of digital systems by identifying and neutralising threats such as viruses, spyware, ransomware, and other types of malicious code.
(C)_________ refers to focusing human efforts for maintaining a healthy body and mind capable of better withstanding stressful situations. [1]
(a) Self-Motivation
(b) Stress Management
(c) Self-Awareness
(d) Self-Regulation
Answer:
(b) Stress Management.
Explanation:
Stress management refers to the set of techniques, strategies, and practices individuals employ to cope with and alleviate the negative effects of stress.
This may include making healthier lifestyle choices, engaging in relaxation methods, and practicing time management.
(D) High expectations from self can leave with chronic anxiety and stress, thus leading to_________stress. [1]
(a) Physical
(b) Emotional
(c) Mental
(d) Financial
Answer:
(c) Mental
Explanation:
Mental stress, also known simply as stress, refers to a state of mental or emotional strain resulting from challenging or adverse situations. It is the body’s natural response to perceived threats, often referred to as stressors. These stressors can be external, such as work pressures, relationship difficulties, financial problems, or environmental factors, as well as internal, like unrealistic expectations, negative self-talk, or personal insecurities.
(E) Which of the following is/are a myth about Entrepreneurship? [1]
(a) Need a lot of Money
(b) Must have a great Idea
(c) Should know everything about business
(d) All of these
Answer:
(d) All of these
Explanation:
It is a myth that entrepre-neurship requires a lot of money to get started. Some businesses may require a Large sum of money, but there are others that can be started with a small amount e.g., online businesses that needs very little money.
Another myth is that an entrepreneur must have a groundbreaking idea. Not every successful business is built on a great idea. Many successful entrepreneurs have found success by addressing existing needs, improving existing products or services, or applying a unique approach to a common problem.
The misconception that an entrepreneur must know everything about business is also not true. The primary thing that an entrepreneur needs to know is, the knowledge and experience required for the business. The business tactics can be Learnt from their experiences over the time.
(F) Name the organization that has the Sustainable Development Goals? [1]
(a) UNICEF
(b) League of Nations
(c) United Nations
(d) World Health Organization
Answer:
(c) United Nations
Explanation:
The Sustainable Development Goals (SDGs) were established by the United Nations (UN) as a universal call to action to end poverty, protect the planet, and ensure prosperity for all by 2030.
Question 2.
Answer any 5 out of the given 6 questions. (1 × 5 = 5 Marks)
(i) ‘App Solutions’, an IT-based company, wants to interview for the position of System Analyst. For this purpose, the company has already received several resumes. Now the company wants to send interview letters to all the candidates with different names and addresses. To accomplish the task company should use …………… feature of Word Processor.
(a) E-mail
(b) Tables
(c) Mail Merge
(d) All of these
Answer:
(c) Mail Merge
(ii) …………… allows you to test out various scenarios and determine a range of possible outcomes.
(a) Data consolidation
(b) Goal seek
(c) Track Changes
(d) What-lf Analysis
Answer:
(d) What-lf Analysis
(iii) Sahil is designing a database for storing records of students in a school. He has created two tables one for the personal details of students and another to store their fee records. He wants to keep a common field in both the tables to identify the records uniquely. That filed should be declared as
(a) Composite primary
(b) Primary
(c) Alternate
(d) Foreign
Answer:
(b) Primary
(iv) Data consolidation allows you to combine data from …………… worksheet to single worksheet.
(a) 2
(b) 3
(c) 4
(d) Multiple
Answer:
(d) Multiple
(v) Which of the following sign or symbol is used in secured sites?
(a) HTTP
(b) Padlock sign
(c) FTP
(d) Cross sign
Answer:
(b) Padlock sign
(vi) Commands that allow you to make permanent changes in the database are called ……………
(a) DDL commands
(b) TCL commands
(c) DML commands
(d) All of these
Answer:
(b) TCL commands
Question 3.
Answer any 5 out of the given 6 questions. (5 × 1 = 5)
(i) Editing Custom Shapes feature allows __________ of small segments of a drawing. (1)
(a) shaping
(b) reshaping
(c) rehearse
(d) None of these
Answer:
(b) reshaping
(ii) DBMS is a program, that controls the creation, maintenance, and use of a database. Here, DBMS stands for (1)
(a) Digital Base Management System
(b) Data Build Management System
(c) Database Management System
(d) Database Management Service
Answer:
(c) Database Management System
(iii) A __________ filters data traffic at a network boundary. (1)
(a) bridge
(b) switch
(c) gateway
(d) hub
Answer:
(a) bridge
(iv) Template includes a text space that is surrounded by brackets. It is called a __________ (1)
(a) margin
(b) placeholder
(c) data source
(d) track changes
Answer:
(b) placeholder
(v) Key field is a unique identifier for each record. It is defined in the form of __________ (1)
(a) rows
(b) columns
(c) tree
(d) query
Answer:
(b) columns
(vi) What is the name given to a combination of two cell references? (1)
(a) Relative reference
(b) Absolute reference
(c) Mixed reference
(d) None of the above
Answer:
(c) Mixed reference
Question 4
Answer any 5 out of the given 6 questions. (1 × 5 = 5 Marks)
(i) Technique used to remove an unwanted area from an image is called ………………
(a) Grouping
(b) Ungrouping
(c) Cropping
(d) Deleting
Answer:
(c) Cropping
(ii) The amount of data that a signal can carry is called ………………
(a) WiFi
(b) Bandwidth
(c) Megabits
(d) Gigabits
Answer:
(b) Bandwidth
(iii) Satya Tripathi has started a travel agency which offers train and flight bookings along with hotel reservations. He has 4 employees each having a PC to do the task. He wants to create a network which should have a server. Which of the following network should he set up?
(a) Peer-to-Peer
(b) MAN
(c) WAN
(d) Client/Server
Answer:
(d) Client/Server
(iv) Kamal has created a worksheet where he has added the details of all products in his grocery shop. He told his accountant to go through the worksheet and make necessary changes if required. In addition he also wants to know the changes done by his accountant. Which of the following features of spreadsheet should he use to see the changes made by his accountant?
(a) Review changes
(b) Macros
(c) Track changes
(d) Find and replace
Answer:
(c) Track changes
(v) The arrangement of records in an order is called ………………
(a) Sorting
(b) Indexing
(c) Filtering
(d) Query
Answer:
(a) Sorting
(vi) In Excel ……………… can be used to create a hyperlink inside a worksheet.
(a) Insert → Link
(b) File → New Link
(c) Home → Insert → Link
(d) All of these
Answer:
(a) Insert → Link
Question 5.
Answer any 5 out of the given 6 questions.
(A) _______ key is an accessibility feature that assists people having difficulty in using keyboard and mouse. [1]
(a) Guide
(b) Sticky
(c) Serial
(d) Home
Answer:
(c) Serial
Explanation:
Serial key is an accessibility features that assists people that have difficulty using a keyboard or a mouse. It enables the user to provide input using an alternate input device attached to the computer’s serial port. This feature is designed for users who are unable to use the computer’s standard keyboard and mouse.
(B) Anaisha is a wildlife photographer. She wants to create her website where she can update the pictures and discuss about different events, reviews, announcements, news etc. Suggest her a suitable option to complete the task. [1]
(a) Blog
(b) E-Mail
(c) Instant Messaging
(d) Mail Merge
Answer:
(a) Blog
Explanation:
A blog is a type of website or online platform where an individual, group, or organization regularly publishes content on various topics. They often serve as a personal diary, a platform for expressing opinions, or a means of sharing information with a wider audience.
(C) Which of the following is not a web browser? [1]
(a) Safari
(b) Internet Explorer
(c) Google
(d) Fi refox
Answer:
(c) Google
Explanation:
Google is a popular internet search engine. It scans the Web to find Web pages that are relevant to the words you have typed in the search box. It is known for its speed, relevance, and accuracy in providing search results.
(D) Which out of the following is the best example of a strong password? [1]
(a) 9412356789
(b) 14Hd{]$_SblO
(c) HarryPotterSeries
(d) 140ct2004
Answer:
(b) 14Hd{]$_SblO
Explanation:
A strong password is a password that is designed to be difficult for others to guess or crack. This type of password should be lengthy at least 10 to 12 characters long and include a mix of
uppercase and lowercase letters, numbers, and special characters (e.g., !, @, #, $, %). This complexity makes the password more resistant to brute force attacks.
(E) Bharat has set up his company with 20 computers in a building. He wants to connect all the computers together. Which type of Network will be the best suitable for this purpose? [1]
(a) LAN
(b) WAN
(c) PAN
(d) MAN
Answer:
(a) LAN
Explanation: LAN stands for Local Area Network. It refers to a network of interconnected computers, devices, and resources within a limited geographical area, such as a home, office, or campus.
(F) IP stands for __________ [1]
(a) International Protocol
(b) Internet Protocol
(c) Intranet Protocol
(d) Interpersonal Protocol
Answer:
(b) Internet Protocol
Explanation:
Internet Protocol (IP) refers to a set of rules that govern how data packets should be sent, received, and routed across networks. The Internet Protocol is a fundamental protocol of the Internet and serves as the basis for communication in computer networks.
Section – B (26 marks)
Answer any 3 out of the given 5 questions on Employability Skills
Answer each question in 20 – 30 words.
Question 6.
How stress can be caused by both good and bad experiences? (2)
Answer:
Stress can be caused by both good and bad experiences when people feel stressed by something going on around them, their bodies react by releasing chemicals into the blood. These chemicals give more energy and strength, which can be a good thing if their stress is caused by physical danger but it can also be a bad thing if the stress is in response to something emotional and there is no outlet for this extra energy and strength. The good stress is called eustress, whereas the bad stress is termed as distress.
Question 7.
Why do we say that an entrepreneur should be open-minded? [2]
Answer:
The smartest and most successful people welcome new ideas and diverse perspectives, allowing them to see more opportunities ahead of them and better solutions to problems. Open-minded entrepreneurs can strategize better because they can listen to varying and look at a problem through multiple lenses.
Question 8.
How is entrepreneurship important in creating jobs?
Answer:
Entrepreneurs provide a large number of employment opportunities. An entrepreneur, even at the most basic scale, employs people to manage their business activities. They generate direct as well as indirect employment by setting up new units at small and large-scale levels.
Question 9.
How entrepreneur is helpful in capital formation? (2)
Answer:
An entrepreneur is helpful in capital formation as we know that an increase in the rate of capital formation is quite essential for the economic development of any country. Those nations that are not able to increase the rate of capital formation or do it nominally remain backward from industrial development’s point of view.
Question 10.
Goal setting is a very essential factor in your personal life. List all the SMART methods to set the goals. Explain ‘A’ in brief.
Answer:
SMART is an acronym that stands for Specific, Measurable, Achievable, Realistic and Timely. It incorporates all these criteria to help focus your efforts in achieving the goals. A stands for Achievable which means that goals should be attainable and not impossible to achieve. For achieving the goals, they can be broken into small steps for short term. Related Theory :
Other terms of SMART are:
- Specific – Coats should be specific, clear and unambiguous.
- Measurable – Goals should have specific criteria to measure the progress towards their accomplishments.
- Realistic – Goals should be realistic within reach and most importantly you should be willing and able to work to achieve them.
- Timely – For achieving the goals there should be a clearly defined timeline with both starting and target dates.
Answer any 4 out of the given 6 questions in 20 – 30 words each.
Question 11.
What do you understand by Anchoring in a Word Processor? [2]
Answer:
Anchoring refers to the reference point for the graphics. This point could be the page, or frame where the object is. paragraph, or even a character. An image always Has an anchor point.
Question 12.
What is the difference between a workbook and a worksheet? (2)
Answer:
Differences between the workbook and worksheet are as follows:
Workbook | Worksheet |
A workbook is an Excel file with one or more worksheets. | A worksheet is a single spreadsheet of data. |
A workbook would be the entire binder, with everything in it. | A worksheet would be like one section in that binder. |
Question 13.
State any four etiquettes to be followed while chatting on the internet. [2]
Answer:
The etiquettes to be followed while chatting on the internet are:
- The message should be short and to the point.
- Always introduce yourself by name if your screen name doesn’t reflect it
- Always ask if the other person has time to chat first, regardless of how important you think what you have to say is, it’s not going to be well received if the recipient is busy.
Question 14.
How is LAN different from WAN?
Answer:
LAN | WAN |
LAN stands for Local Area Network | WAN stands for Wide Area Network Area Network |
It is a small computer network confined to a local area such as one office or a building etc. | It is a network of computers that are geographically apart such as cities, countries etc. |
Question 15.
Name any two ways of wireless connections to the Internet. Ramya wants to connect all the computers in her office wirelessly to avoid uncoordinated cables. Which wireless technology would be best suitable for her office? (2)
Answer:
Wi-Fi and WiMax are the two ways of wireless connections to the Internet. Wi-Fi technology would be best suitable for her office to avoid cabling. Because it allows high-speed Internet connections without the use of cables or wires.
Question 16.
Define online transaction. What is the other name given to it?
Answer:
Online transaction is a payment method in which money is transferred electronically over the Internet. It is also known as e-payment.
Answer any 3 out of the given 5 questions in 50 – 80 words each.
Question 17.
What do you understand by the term Table of Contents? List the characteristics of a good ‘Table of content’ in a word processor. [4]
Answer:
The table of contents is a snapshot of the headings and page numbers in your document and does not automatically updates itself as you make changes. It acts as a map for the users.
A good table of content has the following characteristics:
- It should be easy to read and ample to use.
- It should be organised and formatted properly.
- It must be accurate and easily accessible.
- It should be given after the title and copyright page.
Question 18.
Ojas had prepared a Table of Contents of the project work he had done in a word processor application. (4)
(a) Tell him the different steps to update the TOC.
(b) Tell him the different steps to delete the TOC.
Answer:
The writer does not update the table of contents automatically, so after any changes to the headings, you must update it manually.
(a) To update a table of contents when changes are made to the document:
(i) Right-click anywhere in the TOC.
(ii) From the pop-up menu, choose Update Index/Table. The writer updates the table of contents to reflect the changes in the document.
You can also update the index from the Navigator by right-clicking on Indexes → Table of Contents and choosing Index → Update from the pop-up menu.
(b) To delete the table of contents from a document:
(i) Right-click anywhere in the TOC.
(ii) From the pop-up menu, choose Delete Index/Table. The writer deletes the table of contents.
Question 19.
Explain different kinds of online threats. [4]
Answer:
There are different kinds of online threads:
- Phishing: Phishing attacks use fake communication, such as an email, to trick the receiver into opening it and carrying out the instructions inside, such as providing a credit card number.
- Malware: Malware is malicious software such as spyware, ransomware, viruses, and worms. Malware is activated when a user clicks on a malicious link or attachment, which leads to installing harmful software.
- Password Attacks: With the right password, a cyber attacker has access to a wealth of information. Social engineering is a type of password attack that data insider defines as “a strategy cyber attackers use that relies heavily on human interaction and often involves tricking people into breaking standard security practices.”
- Email spoofing: It is the forgery of an email header so that the message appears to have originated from someone or somewhere other than the actual source.
Question 20.
‘Bookomenia’ is a public library. The librarian there wants to keep records of books with , their Id’s, names, publishing house, price etc. in a database program. Solve the following queries to help them understand the concept of databases.
(A) What are the different methods that are used to create tables in Base?
(B) Write any one difference between a Table and a Database.
(C) Explain Null value.
(D) Explain primary key.
Answer:
A. There are three methods to create a table in OpenOffice Base These are
- Using Table wizard
- Using Datasheet view
- Using Design view.
B. Database is a collection of interrelated tables whereas a table is a component of a database that consists of all the information and data organized in rows and columns.
C. The absence of value or an unknown value in a field is called Null value.
D. A field that uniquely identifies each record in a table is called a primary key. E.g. Book ID, Product_No, etc.
Question 21.
Pinky had heard about the words types of networks. She had some doubts. Answer to her queries to clear her doubts. (4)
(i) What is PAN?
(ii) Define the term WAN.
(iii) Define the term MAN.
(iv) Write a disadvantage of both LAN and WAN.
Answer:
(i) A Personal Area Network (PAN) is a computer network for interconnecting electronic devices within a person’s workspace.
(ii) A Wide Area Network (WAN) is the one which covers a broad area. It consists of two or more local area networks. A WAN is used by government organizations and businesses.
(iii) A Metropolitan Area Network (MAN) is a computer network in which two or more computers that are geographically distributed but in the same metropolitan city are connected. Its geographic scope falls between a WAN and a LAN.
(iv) Disadvantage of LAN: Even though LAN saves a lot of money in terms of resource sharing, the initial cost involved in setting up the network is quite high.
Disadvantage of WAN: It is difficult to maintain the WAN network. It requires skilled technicians and network administrators.