This solution is not a final or official marking scheme. It is prepared by me as IT subject teacher expert. Evaluation will be done in compliance with CBSE’s official answer key and marking scheme.
[1] Name the person who combines the factors in a creative manner to generate value for customers and create wealth.
Ans.:
Agricutlural entrepreneurship provide supports to the farmers, understand the need of farmers, and enhance the skills of farmers for the commercialization. Agricultural Entrepreneurship can be defined as being primarily related to the marketing and production of inputs and products used in agricultural activities.
Small scale entrepreneurship help society by creating wealth in local market and local area. : Small scale entrepreneurship refers to starting industries in which manufacturing, trading, providing services, productions are done on a small scale or micro scale.
[6]In our daily life we can contribute to create a Sustainable Society by Following 4Rs and 1U of sustainability. Explain any one out of 4R’s and 1 U.
Ans.:
Refuse:To create a sustainable environment, we must first REFUSE to use products that may harm the environment.
Upcycle: Upcycling allows the scope of human skills upcycle any product that is not usable with innovation.
[7] _______ is an organization which provides you with access to the internet via dial-up or direct or wireless connection.
[9] ___________ immediate assistance is provided to the injured to save life and minimize health loss till the proper medical aid/facility is provided.
Ans.:
1. Use combination of letters, symbols and digits
2. Do not use birth day or any easiliy identifiable words
3. Generate random password
4. Avoid using something that the public or workmates know you strongly like or dislike
[14] What is the special name given to the discussion style site used by non-technical(or technical) users for creating personal web pages? Give any two examples of websites that help to create such discussion style sites for free.
Ans.:
1. LAN: It stands for Local Area Network. It connects computers and peripherals in limited geographical area. The connections are limited school, home, computer lab, office building, or closely positioned group of buildings. LAN offers high speed data transfer and uses ethernet cables.
2. WAN: It stands for Wide Area Network. It covers broad area. It covers metropolitan area, regional or national boundaries. The internet is the most popular example of WAN. It is used by large organizations, business, governments, NGOs, entertainers and many others.
[16] Explain any two types of relationships that can be created in tables.
Ans.:
OO base support 3 types of relationships:
1. One to One
2. One to Many or Many to One
3. Many to Many
1. One to One: In this relationship both tables must have primary key columns. Example: In the given tables emp and dept, empno and deptno is primary key in dept table. So in relationship these two fields are used for one to one relationship.
2. One to many or Many to one: In this kind of relationship one of the table must have primary key column. It means that one column of primary key table is associated with all the columns of associated table. As above example, emp and dept tables, empno is primary key for the emp table.
3. Many to many relationship: In this kind of relationship no table has primary key column. It means that all the columns of primary key table are associated with all the columns of associated table.
[17] What is the difference between forms and reports?
Ans.:
Forms provides an interface to users to view, add, modify in both table and queries.
Reports are presented forms used to present formatted summaries or lists of the data from one or more tables or queries.
[18] Identify any two columnname/attribue and their data types from a given table : PLAYER
Ans.:
PID – Char(4), Primary Key
Pname – varchar(10)
Runs – int(5)
Gender – cahr(1)
DOB – Date
[19] Aryan is too much worried when he came to know that someone has withdrawn all money from his uncle’s bank account. He was not able to understand how this could happen when he has not given his ATM card to anyone.
(a) Suggest to him a way by which he can be assured that he is doing secured online transactions.
(b) Which type of software he needs to install in his computer to protect his computer from malware?
(c) Help him to understand about phishing.
(d) He also thinks cookies are harmless. Explain to him how cookies can also cause harm to him.
Ans.:
(a) He need to ensure that wesbite URL must have lock icon at the begining and starts with https
(b) He can use a good antivirus software
(c) Phishing refers to the internet represents an insecure channel for exchanging information leading to a high risk of intrusion or fraud.
(d) Coockies are programs that are created on your local computer when you visit websites. cookies are meant for storing data based on activity performed during earlier visits. Cookies stores logon details, details of a shopping cart, visited pages in a website etc. They could be also tracaked by unauthorized users and possibly gain access to personal information.
[20] Due to the pandemic everyone was bound to stay at home. But, due internet the whole world was connected.
(a) What is meant by World Wide Web? Also write any two web browsers names that you know.
(b) Explain how data is transferred over internet.
Ans.:
(a) World Wide Web (abbreviated as WWW or W3, commonly known as the Web), is a system of interlinked hypertext documents accessed via the Internet. Two popular web browsers are: Google Chrome and Mozilla Firefox
(b) The data transfer on the internet is done through the following steps:
1. Information on internet is divided into small packets. Each packet is sent from computer to computer until its find its destination. Each computer on the way decides where the next packet to be sent. All packets may hav etheir different routes.
2. Once the packet reaches to its destination, packet will be examined. If any packets are missing or damaged, a message for sending it again will be sent. This process continues till all packets have beed received.
3. Finally all the packets reassembled into the original form.
[21] Consider the following table: Student
ADMNO
NAME
GRADE
DOB
MARKS
HOUSE
GENDER
1001
RUPAL
9
10/04/2006
76
GREEN
M
1002
RASHMI
9
08/12/2005
87
RED
F
1003
ARNAV
10
25/05/2004
81
GREEN
M
1004
SUMONA
9
23/08/2005
68
RED
F
1005
ARUN
9
16/07/2005
72
GREEN
M
1006
TIA
9
22/09/2005
91
BLUE
F
1007
ROSHAN
10
26/08/2005
89
BLUE
M
Write SQL Commands:
(a) To display the details of all students of Green House.
(b) To increase marks by 5 whose ADMNO is 1005.
(c) To display details of all students whose MARKS are less than 80.
(d) Display the list of all students in descending order of MARKS.
Ans.:
(a) select * from student where house=’green’;
(b) update student set marks=marks+5 from student where admno=1005;
(c) select * from student where marks < 80;
(d) select * from student order by marks desc;
[/showhide]
Term 2 Mock Test Class 10 Information Technology – Mock Test 1
Section A (1 mark Questions)
[1] Write correct steps of entrepreneurs’ career process.
[2] An NGO is working for collecting plastic garbage from the people and spreading awareness to reduce the use of plastic. How this is helpful to the people? Write any two points.
Ans.:
1. It will reduce unneccessary waste.
2. Less burden on people to recycle.
[3] Mohit is working as an entrepreneur and he brings new products and services into the market and always improve the existing products or services available in the market. Here he is demonstrating which quality of an entrepreneur?
Ans.
1. Every business idea needs to be unique or special.
2. He needs lot of money to start a business.
3. A person is having big business is called an entrepreneur.
4. Entrepreneurs are born, not made.
[2]What measures can be taken to create sustainable cities?
Ans.:
The measures can be taken to create sustainable cities:
1. Switch off lights and fans when not in use
2. Use natural light as much as possible
3. Use energy efficient bulbs and appliances
4. Use alternative resources for electricity
Ans.:
Update cascade and delete cascade refers to update or detete records when any modification is done to the primary key relation records in table. It will update or delete related records automatically when changes happen in the parent table.
[2]Write a few advantages of referential integrity.
Ans.: The advantages of referential integrity are as following:
1. It saves the time as there is no need to enter the same data in separate table.
2. It reduces data-entry errors.
3. Summarize data from related tables.
4. Delete and modify the matching records from a primary key table deleted or modified.
Ans.:
Follow these steps to modify the record:
1. Create or open a form
2. Navigate the form on which records needs to be modify
3. Enter new details
4. Click on Save
[4]Charvi wants to post content on her WordPress website. Write steps to create a new post.
Ans.:
to create a post, follow the given steps:
1. Login with username and password in wordpress.
2. Click on Posts – Add New button.
3. Type the title in Add Title text box.
4. Now start typing for the content.
5. Click on Publish when you finished.
[5]Hetal is going to place an order online on Flipkart. But she doesn’t know the payment modes available on Flipkart. Help her by listing the various modes of payment.
Ans.:
Some emeregency situations are :
1. Threatens the employees, customers or the public
2. Disrupts or shuts down the operations
3. Causes physical or environmental damage
4. Natural Disasters
Section C (4 Marks Questions)
[1] Ankita is working as a manager ina company. Her management told her to make a list of points to handle accidents carefully. Suggest any four points her for the same.
Ans.:
Accidents can handled properly by taking care of these points:
1. Organization must follow SOP for accident handling.
2. Safety measures must be placed to prevent workplace accidents
3. Immediately call the medical team for any injury
4. Always stay alert
[2] Anil is working in an electronics company as a senior engineer. He is called for a seminar to explain safety rules for electrical equipment. What are these rules can be, write them?
Ans.:
The safety rules are as following:
1. Electrical equipment used should be approved by a recognized organization.
2. Workers should be trained to handle the eletric equipment safely
3. Damaged and hazardous electrical equipment should be immediately replaced. All old and workout and frayed switches and wires should be changed.
4. Heat emanating equipment should be kept away from the electical equipment.
[3] Observe the table store and write queries given below:
itemno
itemname
supplier
qty
rate
city
state
1001
Chocolate
Cadbury India
150
40.00
Pune
Maharashtra
1002
Bread
Amul
500
30.00
Anand
Gujarat
1003
Cookies
Dark Fantasy
250
35.00
Haridwar
Uttarakhand
1004
Biscuits
Parle
700
25.00
Jaipur
Rajasthan
1005
Namkeen
Gopal
500
45.00
Rajkot
Gujarat
1006
Sev
Bikaji
600
32.00
Bikaner
Rajasthan
1007
Chocolate
Amul
500
42.00
Anand
Gujarat
i) Display the records in the descending order of rate
ii) Display the itemname, and supplier from Gujarat and Rajasthan.
iii) Delete a column city
iv) Display the information of items whose price is more than 30 and the supplier is Amul.
Ans.:
i) select * from store order by rate desc;
ii) select itemname, supplier from store where state in (‘Gujarat’,’Rajasthan’);
iii) alter table store drop column city;
iv) select * from store where rate > 30 and supplier = ‘Amul’;
Watch this video for more understanding:
Follow this link for the sample papers:
Mock Test Class 10 Information Technology – Mock Test 2
Section A (1 Mark Questions)
[1] Jignesh establishes a business or a venture that generates some value for the customer and proves to be profitable for him.State the role of Jignesh here.
Ans.:
The life on land mostly dependent on trees. Cutting of trees is leading to soil erosion and making land dry and unusable for cultivation. Planting more tree to replace the ones that we have cut is an important step towards sustainable development.
Ans.:
Data Definition Language (DDL)
Example CREATE, ALTER, and DROP.
Data Manipulation Language (DML)
Example Insert, Update, Delete and Select
[3] A table named Hospital (containing data of patients of the hospital) is created, where each record consists of several fields including AdmissionNo (Unique Admission Number), Patient_Name, Doctor_Name, Adm_date. Which field out of these three should be set as the primary key and why?
Ans.:
1. Don’t panic and Maintain Silence
2. Do not use lift
3. Do not attempt to push, pull, pass others
4. Find out the nearest escape spot
5. Look for the nearest alarm call point
6. Look for nearest fire appliance and trained person to handle it as well as assembly points
2 Mark Questions
[1] Aniket is working on a table having a field comm. He wanted to display the records of those persons who are earning a commission. He wrote the following command but unable to get the desired result.
Ans.:
To create a form using wizard follow these steps:
1. Field Selection and Set up a sub form
2. Arrange Controls
3. Set Data Entry
4. Apply Styles and Set Name
[3]What are the clauses used with the SELECT command?
[5] Bhavin is a networking engineer in a multinational company. He is confused about types of the network architecture. Explain to him the types of network architecture.
Ans.: Network refers to a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information.
There are to kinds of network architecture:
Peer to Peer (P2P) Architecture
Client-Server Architecture
P2P Architecture: In this architecture, all computers have an equal status. Each node or workstation or computer has an equally comptent CPU.
Client-Server Architecture: In this architecture, certain computers have special dedicated tasks, providing services to other computers in network. The computer which provide services are called servers and the computers use those services are called client.
[6]Rutvik is paying money from his phone through an app whenever he is doing online shopping. Enlist some UPI based apps that provide online payment facilities.
Ans.: The etiquettes followed while chatting are as follows:
1. Message should be short and to the point.
2. She must introduce herself when the name doesn’t appear on the screen.
3. Always ask the person has time to chat first, however how important she think the onversation, its not goes well if the person is busy.
4. She must know exactly what she want to say.
5. She shouldn’t type the message in Upper Case as it is considered as shouting and aggresive.
6. She need to give people time to respond.
7. At the end she must end conversation properly.
[2]What are cookies? How to clear browser cookies?
Ans.:
Coockies are programs that are created on your local computer when you visit websites. cookies are meant for storing data based on activity performed during earlier visits. Cookies stores logon details, details of a shopping cart, visited pages in a website etc. They could be also tracaked by unauthorized users and possibly gain access to personal information.
To clear browser coockies follow these steps:
1. Open the browser and click on at the top right corner.
2. Click on more tools.
3. Click on clear browsing data.
4. At the top, choose a time range. To delete everything, select all time.
5. Next to “Cookies and other site data” and “Cached images files” check the boxes.
6. Click clear data.
[3] Consider the following table – ‘Candidates’ and write the answer to below given queries:
ID
CName
Age
City
Marks
1
Shivam
28
Ahemdabad
93
2
Shyama
26
Anand
98
3
Vishva
25
Ahmedabad
91
4
Zakir
22
Ahmedabad
85
5
Pankaj
27
Baroda
97
6
Manisha
30
Anand
80
(i) Display the records of candidates whose city names start with A.
(ii) Add a column status with varchar datatype.
(iii) Display the name, age and city of those candidates whose marks are more than 90.
Ans.:
(i) select * from candidate where cname like ‘A%’;
(ii) alter table candidate add column city varchar(30);
(iii) select name,age,city from candidate where marks>90;
(iv) alter table candidate rename column marks to score;