In this post, I am going to discuss Important PYQs Information Technology Class 10. If you are a class 10 student and preparing for the Information Technology Class 10 board exam, this post is written for you specially.
PYQs Information Technology Class 10 provides you with important questions for preparing for board exams. So let us begin with it!
Topics Covered
Important PYQs Information Technology Class 10
As per board exam structure and pattern your board question paper includes following types of questions:
Very Short Answer Type Questions (1 Mark) – (MCQs, Fill in the blanks, Ture/False, One word answer etc.)
Short Answer Type Questions (2 Mark) – (Definitions, Differences, Listing etc.)
Log Answer Type Questions (4 Marks)
So let us begin!
Part A Employability skills – 1 mark Important PYQs Information Technology Class 10
[1] _____________ is the ability to work independently. (a) Motivation
Ans.: (c) Self Reliance
Self-reliance is the ability to work independently without depending on others for guidance, support, or resources. It involves confidence in one’s own abilities, decision-making skills, and problem-solving capabilities.
A self-reliant person takes responsibility for their actions, completes tasks on their own, and finds solutions to challenges without constantly seeking help.
This quality is essential in both personal and professional life, as it enables individuals to be productive and self-sufficient.
Thus, self-reliance is the best choice for the ability to work independently.
[2] Identify the situation/thing which leads to mental stress amongchildren. (a) Stress due to change of Principal of school (b) Stress due to examination grades (c) Stress due to problem in friend’s family (d) Stress due to waking up in the morning
Explanation:
Among the given options, stress due to examination grades is the most common cause of mental stress in children.
Academic pressure and the fear of scoring low grades can create anxiety and stress.
Children may feel pressure from parents, teachers, or even themselves to perform well.
This stress can lead to emotional distress, lack of confidence, and even health issues like headaches or sleep disturbances.
Other options may cause minor stress, but exam-related stress is a widespread and significant concern for children’s mental well-being.
[3] ________________ is a type of operating system that runs on a set of computers that are interconnected by a network. (a) Multi-user
Explanation:
A distributed operating system is a type of OS that runs on multiple computers interconnected by a network. These computers work together as a single system to process tasks efficiently.
Key Features of a Distributed OS:
It manages multiple machines and makes them appear as a single system to users.
Resources (such as memory, processors, and storage) are shared across the network.
If one computer fails, others can take over its tasks, improving reliability and performance.
Thus, a distributed operating system is the correct answer!
[4] Which keys do you press to copy a file or a folder? (a) Ctrl + X
Ans.: (b) Ctrl + C
Explanation:
Ctrl + C is the shortcut key used to copy a file or folder. It creates a duplicate of the selected item without removing it from its original location.
After copying, you can use Ctrl + V to paste the copied file or folder in the desired location.
Other Options:
Ctrl + X → Cuts the file/folder (moves it instead of copying).
Ctrl + Z → Undo the last action.
Ctrl + Y → Redo an action that was undone.
Thus, Ctrl + C is the correct shortcut for copying files or folders.
[5] State whether the following statement is True or False : There is direct relationship between entrepreneurship and society.
Ans.: True
There is a direct relationship between entrepreneurship and society because entrepreneurs play a crucial role in shaping and developing society.
Job Creation: Entrepreneurs create employment opportunities, reducing unemployment and improving living standards.
Economic Growth: By starting new businesses, they contribute to the economy, increasing GDP and national income.
Innovation & Development: Entrepreneurs introduce new products, services, and technologies that improve people’s lives.
Social Change: Many entrepreneurs address social issues through their businesses, such as sustainable practices and community development.
[6] Which of the following is an example of entrepreneurship ? (a) A cook working in a restaurant (b) A mechanic who owns a garage for repairing vehicles (c) A doctor working in a hospital (d) A teacher teaching in a school
Ans.: (b) A mechanic who owns a garage for repairing vehicles
Entrepreneurship refers to the process of starting, managing, and running a business with the aim of making a profit. Entrepreneurs take risks, invest resources, and create value by offering products or services.
A mechanic who owns a garage is an entrepreneur because they run their own business, take financial risks, and manage operations independently.
The other options (cook, doctor, teacher) are employees working for someone else, not entrepreneurs.
[7] ____________ refers to focussing human efforts for maintaining a healthy body and mind, capable of withstanding stressful situations.
Stress management refers to focusing human efforts on maintaining a healthy body and mind, capable of withstanding stressful situations. It involves techniques and strategies to cope with stress effectively.
[8] Which of the following is not the benefit of stress management?
Stress management helps in improving efficiency rather than reducing it. Proper stress management techniques enhance focus, productivity, and overall well-being, making individuals more efficient in their tasks.
[9] _____________ are computer programs that can damage the data and software programs or steal the information stored on a computer.
Explanation:
A virus is a malicious software program (malware) that can infect, damage, or steal data from a computer. It can spread from one system to another through files, emails, USB drives, or the internet. Some viruses delete files, corrupt data, slow down system performance, or even give hackers control over a computer.
Other Options:
(a) Spam
Spam refers to unwanted or unsolicited messages, usually sent in bulk, often via email. These messages are typically advertisements, phishing attempts, or scams. While spam can be annoying and may sometimes lead to security risks (like phishing attacks), it does not directly damage data or steal information like a virus does.
(c) Junk Mail
Junk mail is another term for spam, especially in email services. These are irrelevant or unwanted emails sent to many recipients, usually for advertising purposes. While annoying, junk mail does not necessarily harm the computer or steal data unless it contains malicious links or attachments.
(d) BIOS (Basic Input/Output System)
BIOS is a firmware program that runs when a computer starts up. It is responsible for initializing hardware components (like the processor, RAM, and hard drive) and loading the operating system. BIOS is essential for a computer to function and is not a type of malware or threat.
[10] ______________ is a horizontal bar present at bottom of the Windows Desktop.
Ans.: (c) Task Bar
Explanation:
The taskbar is a horizontal bar present at the bottom of the Windows Desktop. It contains:
The Start button (to open the Start menu)
Quick launch icons
Open application windows (to switch between running programs)
The System Tray/Notification area (showing time, date, and system icons).
Other options:
(a) Status Bar – The status bar is a horizontal bar typically found at the bottom of application windows (such as MS Word, Excel, or web browsers). It displays information about the current status of the application, such as page number, zoom level, or cursor position.
(b) Menu Bar – The menu bar is usually located at the top of an application window and contains various menu options like File, Edit, View, Tools, Help, etc.
(d) Recycle Bin – The Recycle Bin is a desktop icon/folder where deleted files are temporarily stored. It is not a bar but a system folder that allows users to restore or permanently delete files.
[11] State whether the following statement is a myth or reality:
Ans.:
The statement “Entrepreneurs are born a certain way.” is a myth.
Reality:
Entrepreneurship is not an inborn trait; it is a skill that can be learned and developed. While some people may have natural leadership qualities or risk-taking tendencies, entrepreneurial skills such as problem-solving, decision-making, and innovation can be acquired through experience, education, and practice. Many successful entrepreneurs have developed their abilities over time through hard work, learning from failures, and adapting to challenges.
[12] Which one of the following is not true for entrepreneurs?
(a) They create needs and demands.
(b) They provide raw materials.
(c) They do not create jobs.
(d) They help society by supporting infrastructure development
Explanation:
Entrepreneurs create jobs by launching and expanding businesses. They hire employees, work with suppliers, and contribute to economic growth. Startups and businesses generate employment opportunities across various industries.
Other Options:
(a) They create needs and demands.
Entrepreneurs identify market gaps and introduce innovative products or services that create new needs and demands in the economy. For example, smartphones created a demand for mobile applications.
(b) They provide raw materials.
Entrepreneurs mainly focus on creating businesses and offering products/services rather than providing raw materials. However, some businesses (e.g., mining, agriculture) may supply raw materials.
(d) They help society by supporting infrastructure development.
Entrepreneurs contribute to infrastructure growth by investing in industries like construction, transportation, and technology. Their businesses also support local economies, increasing demand for better roads, utilities, and services.
[13] The filename and filename extension are separated by a _____________ . (A) Dollar ($)
Explanation:
The dot (.) is used to separate the filename and its extension.
Example: document.txt (where document is the filename and txt is the extension).
Other Options:
(A) Dollar ($):
The dollar sign ($) is not used to separate filenames and extensions. It is sometimes used in system variables, programming, or hidden system files (e.g., $RECYCLE.BIN in Windows).
(C) Underscore (_):
The underscore (_) is often used to replace spaces in filenames to improve readability.
Example: my_document.pdf (but it does NOT separate the filename from the extension).
(D) Hash (#):
The hash (#) is sometimes used in filenames, but it has no special role in separating filenames and extensions.
[14] Which of the following type of communication involves interchanging messages only through images or pictures? (A) Verbal
Explanation:
This involves conveying messages through images, pictures, symbols, or diagrams without using words.
Example: Traffic signs, infographics, charts, emojis, etc.
Other Options:
(A) Verbal:
This involves communication using spoken or written words.
Example: Talking, speeches, written text, etc.
(B) Gesture:
This refers to communication using hand movements, body language, or signs.
Example: Waving, thumbs-up, nodding, etc.
(D) Facial:
This involves expressing emotions and messages through facial expressions.
Example: Smiling to show happiness, frowning to show displeasure, etc.
[15] ___________ is the ability to identify and manage one’s own emotions, as well as the emotions of others. (A) Self-Awareness (B) Emotional Intelligence (C) Stress Management (D) Emotional Barrier
Explanation:
This is the ability to identify, understand, and manage one’s own emotions as well as the emotions of others. It includes self-awareness, self-regulation, motivation, empathy, and social skills. Example: A leader managing their team’s emotions during a crisis.
Other options:
(A) Self-Awareness:
This refers to recognizing and understanding one’s own emotions, strengths, and weaknesses.
It is a part of emotional intelligence but not the complete concept.
(C) Stress Management:
This refers to techniques and strategies used to control stress and maintain emotional balance.
Example: Meditation, deep breathing, time management, etc.
(D) Emotional Barrier:
This refers to obstacles in communication caused by emotions such as fear, anger, or anxiety.
Example: A person being too nervous to express their thoughts in a meeting.
[16] ___________ is the driving force that pushes us to achieve our goals,feel happy and improve our quality of life. (A) Stress Management (B) Self-Awareness (C) Self-Growth (D) Self-Motivation
Explanation:
This is the internal drive that pushes a person to achieve goals, stay positive, and improve their life.
Example: A student studying hard without external pressure to achieve good grades.
Other Options:
(A) Stress Management:
This refers to techniques used to handle stress and maintain emotional balance.
Example: Meditation, exercise, and time management.
(B) Self-Awareness:
This means understanding one’s emotions, strengths, weaknesses, and values.
Example: Recognizing what triggers stress or motivation in yourself.
(C) Self-Growth:
This refers to continuous learning and personal development to improve oneself.
Example: Learning new skills, setting personal development goals.
[17] Which of the following is not an essential quality to become a successful entrepreneur ? (A) Confidence (B) Creativity (C) Patience (D) Wealthy
Explanation:
Being rich is not a requirement to become a successful entrepreneur. Many successful entrepreneurs started with little money but had strong ideas and determination. Example: Steve Jobs, who started Apple in a garage with minimal resources.
Other Options:
(A) Confidence:
Entrepreneurs need confidence to take risks, make decisions, and lead their businesses.
Example: Believing in their ideas even when facing challenges.
(B) Creativity:
Creativity helps entrepreneurs come up with innovative ideas, solutions, and strategies.
Example: Developing unique products or marketing strategies.
(C) Patience:
Success in entrepreneurship takes time, effort, and persistence.
Example: Waiting for a startup to grow and generate profits.
[18] In total, how many SDGs were adopted by the United Nations in 2015 as a universal call to action to end poverty, protect the planet, and ensure that by 2030 all people enjoy peace and prosperity ? (A) 13
Climate Change – Sustainable development promotes the use of renewable energy and energy-efficient practices, reducing greenhouse gas emissions.
Deforestation – Sustainable development encourages afforestation, reforestation, and responsible use of natural resources to protect forests and biodiversity.
Ans.: An advantage of using solar power is that it is a renewable and eco-friendly energy source that reduces reliance on fossil fuels, lowers electricity bills, and decreases carbon emissions, helping to combat climate change.
Part A Employability skills – 2 marks Important PYQs Information Technology Class 10
[1] Explain any two benefits of stress management.
Improved Physical Health – Effective stress management reduces the risk of health issues like high blood pressure, heart disease, and weakened immunity.
Better Mental Well-being – Managing stress helps reduce anxiety, enhances focus, and promotes emotional stability, leading to a more balanced and positive mindset.
[2] What is the difference between yoga and meditation?
Aspect
Yoga
Meditation
Definition
A physical, mental, and spiritual practice that includes postures (asanas), breathing exercises (pranayama), and meditation.
A practice that focuses on mindfulness, awareness, and mental relaxation, often involving deep concentration and breathing techniques.
Focus
Improves flexibility, strength, and overall well-being through physical movements and breathing.
Enhances mental clarity, emotional balance, and relaxation by training the mind.
Techniques Used
Involves body postures, breathing exercises, and sometimes meditation.
Primarily focuses on mindfulness, concentration, and deep breathing.
Goal
Promotes overall physical and mental health, including fitness and stress relief.
Aims to achieve inner peace, mental stability, and self-awareness.
[3] What is an operating system ? Give two examples.
Ans.: An Operating System (OS) is system software that manages computer hardware and software resources and provides essential services for computer programs. It acts as an interface between the user and the computer hardware.
Examples of Operating Systems:
Windows – Developed by Microsoft, commonly used in personal computers.
Linux – An open-source operating system widely used in servers and development environments.
Watch this video to learn more:
[5] Give any two misconceptions about an entrepreneur.
Ans.: Self-awareness is the ability to recognize and understand your own emotions, thoughts, strengths, weaknesses, and behaviors. It helps individuals assess how their actions impact themselves and others, leading to better decision-making and personal growth.
Two Benefits of Self-Awareness
Improved Decision-Making – Being self-aware helps individuals make better choices by understanding their strengths, weaknesses, and emotions, leading to more rational and thoughtful decisions.
Better Emotional Control – Self-awareness enables people to manage their emotions effectively, reducing stress and improving relationships by responding thoughtfully instead of reacting impulsively.
[7] Give one example each of following stress causal agents for students :
Ans.:
(a) Mental Stress – Excessive academic pressure, such as preparing for multiple exams or completing assignments within tight deadlines, can cause mental stress.
(b) Social Stress – Peer pressure, such as feeling the need to fit in with friends or conform to social expectations, can create social stress.
[8] Differentiate between files and folders.
Ans.:
Definition
A file is a collection of data stored on a computer.
A folder is a container used to organize multiple files and other folders.
Purpose
Stores specific content such as text, images, videos, or software.
Helps in organizing and managing files systematically.
Extension
Files have extensions like .docx, .jpg, .mp4, .exe, etc.
Folders do not have extensions.
Size
Files occupy storage space based on their content.
Folders do not have a fixed size; they depend on the size of the files they contain.
Examples
notes.pdf, photo.jpg, song.mp3
Documents, Pictures, Music
[9] Give any two qualities of a successful entrepreneur.
Ans.:
1. Innovation – A successful entrepreneur is creative and always looks for new ideas, products, or solutions to solve problems and meet market demands.
2. Risk-taking Ability – Entrepreneurs take calculated risks and are willing to step out of their comfort zones to achieve business success.
3. Self-confidence – A Successful entrepreneur believes in their vision, abilities, and decisions, which helps them stay motivated.
4. Decision-making Skills – Entrepreneurs make quick and effective decisions based on market trends, data, and intuition.
[10] Give any two promotional functions Of an entrepreneur.
Ans.:
1. Preconceived notions about other cultures can lead to bias and misinterpretation, affecting communication effectiveness.
2. Cultures differ in their view of punctuality and time management. For instance, Western cultures value strict time adherence, while some Asian or Latin American cultures have a more flexible approach.
[12] Briefly discuss the significance of time management skills in order to succeed in life.
Ans.: Proper time management allows individuals to complete tasks effectively, reducing procrastination and maximizing output. When time is managed well, individuals can think clearly, analyze situations, and make better decisions. By prioritizing tasks, individuals can allocate time for both personal and professional life, leading to a balanced lifestyle. Time management helps in developing self-control, ensuring tasks are completed on time without distractions. When tasks are planned and executed efficiently, individuals can reach their personal and professional goals more quickly.
[13] Very often we hear about spam mails. Explain what are spam mails, and what should be done with such mails.
Ans.: Spam mails, also known as junk emails, are unsolicited, irrelevant, or inappropriate messages sent in bulk to a large number of recipients. These emails often contain advertisements, phishing attempts, malware, or scams.
What Should Be Done with Spam Mails?
1. Do Not Open or Reply – Avoid opening spam emails, as they may contain harmful links or attachments. Never respond, as it confirms your email is active.
2. Do Not Click on Links or Download Attachments – Spam emails may contain malicious links that can steal your personal information or install malware.
[14] Mention any two ways to get clean and affordable energy.
Ans.:
1. Solar Energy – Using solar panels to convert sunlight into electricity is a renewable and cost-effective way to generate clean energy. It reduces dependence on fossil fuels and lowers electricity bills over time.
2. Wind Energy – Wind turbines harness wind power to generate electricity, providing a sustainable and eco-friendly energy source. It is increasingly becoming more affordable with advancements in technology.
3. Hydropower – Generating electricity from flowing water (such as rivers or dams) is a renewable and cost-effective energy source that provides stable power with minimal pollution.
4. Biogas Energy – Produced from organic waste like food scraps and agricultural residues, biogas is an eco-friendly and affordable energy source used for cooking, heating, and electricity generation.
[15] Differentiate between Agricultural Entrepreneurship and Small Scale Entrepreneurship with one point only.
Ans.:
Aspect
Agricultural Entrepreneurship
Small Scale Entrepreneurship
Nature of Business
Involves farming, livestock, dairy, fisheries, and agribusiness activities.
Involves manufacturing, trading, or service-based businesses with limited investment and workforce.
Dependency on Natural Factors
Highly dependent on weather, soil quality, and climatic conditions.
Less affected by natural factors, as it is based on production, trade, or services.
Type of Resources Used
Uses land, water, seeds, fertilizers, and livestock as primary resources.
Uses raw materials, machinery, labor, and technology for production.
Market Scope
Mainly caters to local and global food supply chains and agricultural industries.
Serves various industries, including retail, fashion, technology, and services.
[16] In our daily life we can contribute to create a Sustainable Society by following 4Rs’ and IU of Sustainability. Explain any one term out of 4Rs’ and 1 U.
Ans.: The 4Rs stand for Reduce, Reuse, Recycle, and Recover, which help in minimizing waste and conserving natural resources.
1R – Reduce
Reduce means minimizing waste and consumption of resources. By using less plastic, saving electricity, and reducing water wastage, we can lower our environmental impact and promote sustainability.
1U – Usefulness
Usefulness in sustainability refers to maximizing the efficiency and long-term benefits of resources. It promotes using products, energy, and technologies in a way that minimizes waste and environmental impact while ensuring long-term benefits for society.
Ans.:
1. Innovation and Creativity – Entrepreneurs introduce new ideas, products, and services, improving existing ones or creating entirely new markets. Their innovative approach helps in solving real-world problems and advancing technology, contributing to economic growth and societal progress.
2. Job Creation – Entrepreneurs generate employment opportunities by establishing new businesses. As their ventures grow, they hire employees, reducing unemployment and improving the standard of living. This, in turn, boosts the economy by increasing consumer spending and demand for goods and services.
[18] List any two challenges to fulfil Sustainable Development Goals.
Ans.:
1. Climate Change and Environmental Degradation – Rising global temperatures, deforestation, pollution, and loss of biodiversity threaten sustainable development. Climate-related disasters, such as floods and droughts, disrupt progress in achieving goals related to clean water, food security, and poverty reduction.
2. Economic Inequality and Poverty – Unequal distribution of wealth and resources hinders inclusive growth. Many developing nations struggle with limited access to education, healthcare, and job opportunities, making it difficult to achieve SDGs related to reducing poverty, ensuring quality education, and promoting decent work for all.
Ans.: (b) Page Style
Explanation:
Page Style is used to define the formatting of an entire page, including:
Margins (space around the text)
Headers and Footers (text or elements at the top and bottom of the page)
Borders (lines around the page)
Backgrounds (colors or images behind the text)
Other Options:
Character Style → Applies formatting to individual characters (e.g., font, bold, italic).
Numbering Style → Used for numbered or bulleted lists.
Frame Style → Used for formatting frames that contain text or images.
[2] Pushkar has created a drawing using multiple shapes that are arranged in a particular position and manner in his document. Suggest a feature that can be used to let the objects remain set as a collection. (a) Transparency
Ans.: (c) Grouping drawing objects
Explanation:
Grouping drawing objects allows multiple shapes or objects to be treated as a single unit. This helps in maintaining their relative positions and arrangements when moving, resizing, or formatting them together.
Other Options:
Transparency → Adjusts the visibility of an object by making it partially see-through.
Posterize → Reduces the number of colors in an image to create a stylized effect.
Ordering drawing objects → Changes the stacking order of objects (e.g., bringing an object forward or sending it backward).
[3] Mehul has inserted images in his document report “Travel MyState” to make it more descriptive. Some of the images are having some extra part that needs to be removed. Which of the following option is suitable to do the task? (a) Resize
Explanation:
Cropping is the process of removing unwanted parts of an image while keeping the necessary portion. This helps in improving the composition and focusing on the important areas of the image.
Other Options:
Resize → Changes the dimensions (height & width) of an image but does not remove any parts.
Recolor → Changes the color effects of an image (e.g., grayscale, sepia).
Rotate → Turns the image in different directions (90°, 180°, etc.).
[4] Suresh has been assigned a task to create multiple documents such that the first page of every document contains the and logo in a particular style. Which feature of word processor can be used to complete the task quickly? (a) Cell styles
Explanation:
A template in a word processor is a pre-designed document that contains formatting, styles, and elements (like logos) already set up. Suresh can create a template with the required logo and style on the first page. Then, every time he creates a new document from the template, the logo and style will automatically appear, saving time.
Other Options:
Cell styles → Used in spreadsheets to format individual cells, not applicable for logos in documents.
Image → You can insert an image manually, but using a template is a more efficient solution for repeating tasks.
Table of Contents → Automatically generates a table of contents based on headings but not related to setting up a document with a logo.
[5] Writer’s ___________ feature let you build an automated index from the headings in your document. (a) Header
Explanation:
The Table of Contents (TOC) feature in a word processor lets you automatically generate an index based on the headings in your document. When you apply heading styles (like Heading 1, Heading 2) to different sections, the TOC will pull those headings and organize them into a structured list, making it easy to navigate through the document.
Other Options:
Header → Refers to the top section of a document, typically used for titles or page numbers.
Styles → Defines formatting rules for headings, text, and other elements but doesn’t generate an index automatically.
Template → Provides a pre-designed structure for documents but is not used for creating an index.
[6] To protect the table of contents from being changed accidentally, check the ________ check box. (a) Protected against manual changes (b) Allow only manual changes (c) Manual changes (d) Password
Ans.:(a) Protected against manual changes
Explanatio
The “Protected against manual changes” checkbox ensures that the table of contents (TOC) is locked and cannot be altered by accidental or unauthorized manual editing. This protects the TOC from unintended changes while still allowing it to be updated automatically based on changes to headings in the document.
Other Options:
Allow only manual changes → Allows manual changes, which could defeat the purpose of protecting the TOC.
Manual changes → This is not a valid option related to protecting the TOC.
Password → A password can be used to protect the entire document, but the specific option to protect the TOC is through the “protected against manual changes” checkbox.
[7] A statistical formula can be applied to a selected array of cells using _______________. (a) Consolidate
Explanation:
AutoSum is a feature in spreadsheet applications like Microsoft Excel that allows users to quickly apply statistical formulas (such as SUM, AVERAGE, COUNT, MAX, and MIN) to a selected array of cells. It automatically detects the range and applies the chosen function.
[8] Which of the following term refers to a cell or range of cells that canbe used in a formula ?
Explanation:
A cell reference refers to a single cell or a range of cells that can be used in a formula. It tells Excel (or any spreadsheet software) where to find the values or data that should be used in calculations.
For example:
=A1+B1 → Here, A1 and B1 are cell references.
=SUM(A1:A10) → The range A1:A10 is a cell reference.
Other options:
(b) Cell Formula → Incorrect, as a formula is an expression used to calculate values.
(c) Formula Reference → Incorrect, as it’s not a standard term.
(d) Linked Cells → Incorrect, as linked cells refer to cells that get values from another sheet or workbook.
[9] How many sheets are provided by default in spreadsheets in a workbook?
Ans.: By default, the number of sheets in a new workbook in LibreOffice Calc and OpenOffice Calc is:
LibreOffice Calc → 1 sheet (since version 4.2, earlier versions had 3 sheets by default)
OpenOffice Calc → 3 sheets
Explanation:
In LibreOffice Calc, the default number of sheets was changed from 3 to 1 in version 4.2 to reduce memory usage. However, users can manually add more sheets as needed.
In Apache OpenOffice Calc, the default is 3 sheets, but this can be modified in settings.
You can change the default number of sheets in both applications through:
Tools → Options → LibreOffice Calc/OpenOffice Calc → Defaults → Number of sheets
[10] Give an example of statistical function in Calc.
Ans.:
AVERAGE(range) → The AVERAGE() function calculates the mean (average) of a range of numbers.
SUM(range) → Adds up values
COUNT(range) → Counts numerical values
MAX(range) → Finds the highest value
MIN(range) → Finds the lowest value
STDEV(range) → Calculates the standard deviation
[11] Record changes feature of Calc marks a deleted column or row in a worksheet by a ________________. (a) red border over the cell
Explanation:
In LibreOffice Calc, the Record Changes feature tracks modifications made to a worksheet. When a row or column is deleted, Calc marks the change with a heavy colored bar on the edge of the sheet to indicate the removal.
Inserted cells → Marked with a colored border.
Deleted rows/columns → Indicated with a heavy colored bar at the edge.
Edited cells → Highlighted with a colored border and annotation.
This feature is useful for tracking modifications in collaborative work. You can enable it by going to:
Edit → Track Changes → Record
[12] A _____________ is a database object that provides a systematic way to accept data from the user and store it in a table of a database. (a) Query
Explanation:
A form is a database object designed to accept data from the user and store it in a table. It provides a user-friendly interface for entering, modifying, and viewing data while ensuring validation and accuracy.
Other Options:
(a) Query
A query is used to retrieve, filter, and manipulate data from one or more tables in a database. It does not directly accept data input from the user but helps in fetching specific information based on conditions.
(c) Report
A report is used to display and format data in a structured way for printing or viewing purposes. It does not accept data input but presents existing data in an organized format for analysis.
(d) Table
A table is a fundamental database object where data is stored in rows and columns. While it holds data, it does not directly provide a user-friendly way to accept data input from users.
[13] Primary Keys are also _____________ in the database, making it faster for the database to search for a record. (a) indexed
Explanation:
In a database, Primary Keys are indexed to improve search performance. Indexing allows the database to quickly locate records based on the primary key without scanning the entire table.
Primary Key → A unique identifier for each record in a table.
Indexing → Speeds up searching, sorting, and querying data.
Why Other Options Are Incorrect?
(b) Defined → A primary key is defined, but this doesn’t explain why searches are faster.
(c) Duplicated → Primary keys must be unique, so they cannot be duplicated.
(d) Replicated → While data may be replicated in distributed databases, primary keys themselves are not replicated for speed improvements.
[14] Record uniqueness in a table helps to avoid accidental ____________ of records caused by user or computer error. (a) duplication
Explanation:
Record uniqueness in a table ensures that each record is unique and prevents duplicate entries caused by user mistakes or system errors.
Primary Keys and Unique Constraints enforce uniqueness in a database.
Avoiding duplicate records helps maintain data integrity and prevents inconsistencies.
Why Other Options Are Incorrect?
(b) Key → While primary keys help enforce uniqueness, the question is about preventing errors, which relates more to avoiding duplication.
(c) Deletion → Uniqueness does not prevent accidental deletions.
(d) Removal → Similar to deletion, uniqueness is about avoiding duplicates, not preventing removals.
[14] Data in RDBMS is organized in ______________. (a) files
[17] ____________ is an accessibility function that tells the keyboard to ignore brief or repeated keystrokes, making typing easier for people with hand tremors. (a) Sticky keys
[18] A ________________ is a collection of computers and other hardware components interconnected by communication channels (cables or satellites) that allow sharing of resources and information. (a) Computer
[19] WiFi devices such as personal computer, smartphones, video game console, etc. can connect to a network resource such as Internet through a device called the ______________. (a) PSTN
[21] Which one of the following is not a part of healthy lifestyle ? (a) Physical activities (b) Sound sleep (c) Healthy eating habits (d) Watching television for long hours
[23] ____________ controls all aspects of a paragraph’s appearance, such as text alignment, tab stops, line spacing, and borders, and can include character formatting.
Explanation:
Paragraph Style controls all aspects of a paragraph’s appearance, including:
– Text alignment (left, right, center, justified)
– Tab stops
– Line spacing
– Borders and shading
– Character formatting (font, bold, italics, etc.)
Other options:
(a) Page Style:
Page Style controls the formatting of an entire page, such as page size, margins, headers, footers, and background. It does not focus on paragraph-specific formatting.
(b) Character Style:
Character Style applies formatting to individual characters or words, including font type, size, bold, italics, and color. It does not control paragraph settings like alignment or spacing.
(c) Cell Style:
Cell Style is used in tables or spreadsheets (like Excel or Word tables) to format individual cells with background colors, borders, and text alignment. It does not control paragraph formatting.
[24] How many levels of heading does Open Office Writer evaluate to build the Table of contents ?
Explanation:
LibreOffice Writer allows you to build a Table of Contents (TOC) using up to 10 levels of headings. These levels are based on the heading styles (Heading 1, Heading 2, Heading 3, etc.) that you apply to your document. Each level can represent a different depth in the structure of the content, which is reflected in the TOC.
[25] Reema has created a pamphlet on ‘Tour to West India’. She has inserted many images to make it more presentable but the size of images is occupying a lot of space. Her friend has suggested her to reduce the size of images. Which of the following options will help her in doing the task without losing any content of the image ?
Explanation:
(c) Resize – Resizing an image changes its dimensions, reducing its width and height while keeping the content intact. This option would help Reema reduce the space occupied by the image without losing any part of it.
Other options:
(a) Recolor – Recoloring changes the color scheme of an image but does not affect its size. It doesn’t help in reducing the space the image occupies.
(b) Docking – Docking refers to attaching an image or object to a particular area on the screen or in the document. It doesn’t resize the image itself.
(d) Rotate – Rotating an image changes its orientation (e.g., from landscape to portrait), but it does not resize the image or reduce the space it occupies.
[26] Which of the following Graphic filter is used to increase the contrastof an image in a document?
Explanation:
The Sharpen filter increases the contrast and clarity of the image by making the edges more defined. It highlights the differences between light and dark areas, thereby enhancing the contrast.
Other Options:
(a) Smooth – The Smooth filter is used to soften or blur the image, reducing the sharpness. It does not increase contrast but helps in making the image appear more even and less harsh.
(c) Remove Noise – The Remove Noise filter is used to reduce unwanted grain or distortion in the image, which can sometimes help clarify details, but it doesn’t directly affect contrast.
(d) Invert – The Invert filter inverts the colors of an image, turning light areas dark and dark areas light. While it alters the image’s color scheme, it does not necessarily increase contrast in a traditional sense.
[27] Which of the following is not used when creating a mail-mergedocument?
Explanation:
Paint is an image-editing program and is not used in the mail merge process. Mail merge involves text-based documents and data sources (like spreadsheets or databases), not images.
Other Options:
(a) Spreadsheet – A spreadsheet (e.g., Microsoft Excel) is commonly used in mail merge to store data such as names, addresses, or other personalized information that will be inserted into the main document.
(b) Document – A document (e.g., Microsoft Word) is used as the main template in a mail merge, where placeholders (fields) are added to merge with the data.
(d) Database – A database (e.g., Microsoft Access) can also be used as a data source for a mail merge, where the required data is stored and merged with the document.
[28] Which mode is used to apply a style to many different areas Of a document quickly without going back to styles and formatting window in Writer?
Explanation:
Fill format mode selected text or sections, bypassing the need to modify or select a predefined style.
For example, if you want to apply bold or italic formatting across different parts of a document, you can do it immediately by selecting the text and choosing the formatting options, rather than opening the Styles and Formatting window every time.
[29] A colored border, with _____________ appears around a cell where changes are made in a shared worksheet.
Explanation:
When you’re working in a shared worksheet (such as in Microsoft Excel), a colored border appears around the cell where changes are made. This is a feature that helps identify cells that are being edited by different users.
The dot in the upper left-hand corner indicates the cell where the last change was made. The colored border around the cell helps to easily identify the cell being edited.
The other options do not typically represent this indicator in shared worksheets.
[30] ____________ feature adds data arranged in a group of cells in Calc, with labels for columns and/or rows.
Explanation:
The Subtotal feature in Calc is used to calculate subtotals for data that is arranged in a group of cells, and it can include labels for columns and rows. It helps to summarize data by applying functions like sum, average, count, etc. to a specific range.
Other Options:
(a) Average – The Average function calculates the arithmetic mean of a set of numbers, but it does not organize or group data with labels.
(c) Goal Seek – Goal Seek is a tool that helps you find the input value needed to achieve a desired result. It is used for solving simple equations but does not add data or organize it into groups with labels.
(d) Solver – Solver is a tool used for solving optimization problems with multiple constraints. It is more complex than Goal Seek and is not focused on organizing data with labels.
Wath this video for more details:
[31] Which one of the following is not a part of healthy lifestyle? (a) Physical activities (b) Sound sleep (c) Healthy eating habits (d) Watching television for long hours
Explanation:
A healthy lifestyle includes habits that promote overall well-being, such as regular exercise, proper sleep, and a balanced diet. Sitting for long periods and excessive screen time can lead to obesity, eye strain, and poor mental health, making it not a part of a healthy lifestyle. (Unhealthy habit)
Other Options:
(a) Physical activities → Engaging in regular exercise improves physical and mental health. (Healthy lifestyle component)
(b) Sound sleep → Getting adequate rest is essential for body recovery and overall health. (Healthy lifestyle component)
(c) Healthy eating habits → A balanced diet provides essential nutrients and energy for the body. (Healthy lifestyle component)
[32] Any unexpected situation that needs immediate attention and action is called __________. (a) SDGs
Explanation:
An emergency is an unexpected situation that requires immediate attention and action to prevent harm, loss, or danger. An emergency is a sudden, unexpected event that demands quick action, such as medical emergencies, natural disasters, or accidents.
Other Options:
(a) SDGs (Sustainable Development Goals) → These are global goals set by the United Nations to achieve a better and more sustainable future. (Not Related)
(c) Loss → Loss refers to a reduction in value, money, or resources, but it does not necessarily require immediate action. (Not the best fit)
(d) Profit → Profit is a financial gain and is unrelated to emergencies. (Not applicable)
[33] ___________ feature of Calc is used to test ‘what-if questions.
Explanation:
In LibreOffice Calc (or other spreadsheet software like Microsoft Excel), the Scenario feature is used to test “what-if” questions by allowing users to create and compare different sets of input values without changing the original data. The Scenario feature allows users to create multiple scenarios by changing input values to see different possible outcomes.
Other Options:
(a) Solver → Solver is used for optimization problems, where you find the best solution under given constraints. (Not for “what-if” analysis)
(b) Goal Seek → Goal Seek helps find the required input value to achieve a specific target output, but it doesn’t handle multiple scenarios. (Not the best fit for “what-if” analysis)
(d) Styles → Styles are used to format cells and documents but have no role in “what-if” analysis. (Not applicable)
[34] Macros are especially useful to ______ the same way over and over again. (a) repeat a task (b) reject a task (c) report a task (d) comment a task
Explanation:
(a) Repeat a task →
Macros are primarily used to automate repetitive tasks. By recording a series of actions, a macro allows you to repeat those actions with just a single click or command. This is the correct answer.
Other Options:
(b) Reject a task →
Macros do not reject tasks. Rejecting tasks refers to denying or discarding them, which is unrelated to the functionality of macros.
(c) Report a task →
Reporting tasks involves summarizing or generating reports about tasks, which is not what macros are designed to do.
(d) Comment a task →
Adding comments to tasks involves annotating or providing additional information, which is unrelated to macros.
[35] ______ feature of Calc helps to track what data was changed, when the change was made, who made the change and in which cell the change has occurred. (a) Record Changes (b) Edit record (c) Change record (d) Macro
Explanation:
This feature in LibreOffice Calc enables users to track modifications made in a spreadsheet. It records what data was changed, when the change was made, who made the change, and in which cell the change occurred. It is useful for collaborative work where multiple users edit the same spreadsheet. It found under Edit → Track Changes → Record in LibreOffice Calc.
Other options:
(b) Edit Record – This option does not exist as a feature in Calc. However, “Edit” generally refers to modifying existing data, but it does not track changes like “Record Changes” does.
(c) Change Record – This is not a recognized feature in LibreOffice Calc. It might sound similar to “Record Changes,” but it does not exist as an actual function.
(d) Macro – A macro is a recorded sequence of commands and actions that can be executed automatically to automate repetitive tasks. While macros can be used to modify data, they do not track changes like “Record Changes” does.
[36] Which one of the following is not an example of DBMS ?
Explanation:
Impress is a presentation software that is part of LibreOffice (similar to Microsoft PowerPoint). It is used for creating slideshows and not for managing databases.
Other Options:
(a) PostgreSQL – PostgreSQL is an open-source relational database management system (RDBMS). It is widely used for managing structured data with SQL (Structured Query Language).
(b) SQLite – SQLite is a lightweight, self-contained, embedded database management system. It does not require a separate server and is used in mobile applications and small projects.
(c) FoxPro – FoxPro is an old DBMS developed by Microsoft. It was used for creating and managing databases, but it is now outdated.
[37] __________ is an interface in a user specified layout that lets users to view, enter, and change data directly in database objects such as tables.
Explanation:
A form is an interface that allows users to view, enter, and modify data in a structured way. It is used in database management systems (DBMS) such as Microsoft Access, LibreOffice Base, and other relational databases. Forms provide a user-friendly way to interact with tables without directly editing raw data.
Other options:
(a) Frame – A frame is a structural element in a graphical user interface (GUI). It is not specifically used for viewing or entering database data.
(c) Relation – A relation refers to a table in a relational database. It defines how different tables are related to each other but does not serve as a direct interface for user input.
(d) Report – A report is used to display or print formatted data from a database. It is mainly used for presenting information rather than data entry.
[38] Which of the following is expanded form of SQL?
Explanation:
SQL (Structured Query Language) is a standard programming language used for managing and manipulating databases. It is used in RDBMS (Relational Database Management Systems) like MySQL, PostgreSQL, Oracle, and SQL Server.
Rest of all are incorrect.
[39] ___________ is usually suitable for less amount of data. (Relational/Flat file)
Explanation:
Binary data types are designed to store various types of binary files, such as images (photos), audio files (music), and videos. These files are typically large and cannot be stored in standard text formats. Using binary data types allows databases to handle and manage these types of multimedia efficiently.
Other options:
(b) Integer values
Integer values are typically stored using numeric data types, not binary data types. Numeric types are designed to store whole numbers and perform mathematical operations, while binary data types are used for non-numeric data. Therefore, this option is incorrect in the context of binary data types.
(c) Only image files
This option is incorrect because binary data types can store a variety of file types, not just image files. While they can certainly store images, they are also capable of handling audio files, video files, and other binary data formats.
(d) Only video files
Similar to option (c), this option is incorrect because binary data types are not limited to storing only video files. They can store a wide range of binary data types, including images, audio, and any other binary formats. Thus, this option also does not accurately represent the capabilities of binary data types in a database.
[41] ___________ clause can be used with the SELECT statement in SQL to specify which rows to retrieve from the table.
Explanation:
The WHERE clause is used to filter records and specify conditions that must be met for rows to be selected. It allows you to retrieve only those rows that satisfy certain criteria.
Other options:
(b) GROUP
The GROUP BY clause is used to group rows that have the same values in specified columns into summary rows, such as calculating aggregates (e.g., COUNT, SUM, AVG). It is often used with aggregate functions to produce a single result for each group.
(c) SAME
The SAME clause is not a valid SQL clause. There is no standard SQL command or clause known as “SAME.” This option is incorrect.
(d) SIMILAR
The SIMILAR clause is not commonly used in SQL either. While SQL does have some operators that can be used for pattern matching (like LIKE), there is no standard SQL clause specifically called “SIMILAR.”
[42] ___________ is an accessibility function which is designed for people who have vision impairment or cognitive disabilities.
Explanation:
Filter Keys is an accessibility feature in operating systems that allows users with vision impairments or cognitive disabilities to set the keyboard to ignore brief or repeated keystrokes, making it easier for them to type.
Other options:
(b) Sound Key
There is no specific accessibility feature known as “Sound Key.” This option does not refer to a recognized accessibility function.
(c) Toggle Keys
Toggle Keys is an accessibility feature that provides auditory notifications when certain keys, such as Caps Lock, Num Lock, or Scroll Lock, are pressed. While it helps users know the state of these keys, it is not specifically designed for individuals with vision impairments or cognitive disabilities.
(d) Sticky Keys
Sticky Keys is another accessibility feature that allows users to press modifier keys (like Shift, Ctrl, and Alt) one at a time instead of holding them down while pressing other keys. It can assist users with motor difficulties, but it is not specifically targeted at individuals with vision impairments or cognitive disabilities.
[43] Networks in which certain computers have special dedicated tasks, providing services to other computers (in the network) are called__________ networks.
Explanation:
In a client-server network, certain computers (servers) are dedicated to providing services, resources, or data to other computers (clients) on the network. This architecture allows for centralized management and resource allocation.
Other Options:
(a) Hierarchical
Hierarchical networks are structured in a way that organizes nodes in a top-down manner, often resembling a tree. This structure can be used in various contexts but does not specifically refer to dedicated tasks or services like client-server networks do.
(b) Dedicated server
While a dedicated server refers to a specific type of server that is dedicated to a single task or application, the term itself does not describe the overall network structure. It focuses more on the server’s function rather than the relationship between computers in the network.
(c) Peer to peer
In a peer-to-peer (P2P) network, all computers (peers) share resources and communicate directly with each other without a central server. Each computer can act as both a client and a server, so this option does not fit the description of networks with dedicated tasks for certain computers.
[44] ____________ provides Internet access by transmitting digital data overwires of a local telephone network.
Explanation:
DSL (Digital Subscriber Line) provides Internet access by transmitting digital data over the existing wires of a local telephone network, allowing for high-speed Internet without interfering with voice calls.
Other options:
(a) HSDPA
HSDPA (High-Speed Downlink Packet Access) is a mobile telecommunication protocol that enhances the data transfer rates of 3G networks, primarily used in mobile devices rather than over local telephone lines.
(b) P2P
P2P (peer-to-peer) refers to a network model in which each participant (peer) can act as both a client and a server, sharing resources directly without the need for a central server. It does not specifically provide Internet access over telephone lines.
(d) Modem
A modem (modulator-demodulator) is a device that converts digital data from a computer to analog for transmission over telephone lines and vice versa. While it is necessary for DSL to function, it does not exclusively provide Internet access over telephone wires as DSL does.
[45] ___________ is an unplanned event that may happen all of a sudden and may lead to unwanted or unprecedented results/outcomes.
Explanation:
An accident is an unplanned event that occurs suddenly and can lead to unwanted or unforeseen results or outcomes, often resulting in harm or damage.
Other options:
(a) Emergency
An emergency is a situation that requires immediate action or response, typically due to a threat to life, health, property, or environment. While emergencies can be caused by accidents, they encompass a broader range of situations.
(b) Hazard
A hazard is a potential source of harm or adverse effect. It refers to a condition or situation that could lead to an accident or emergency but is not an event itself.
(d) Illness
Illness refers to a state of being unwell or having a disease. It is not necessarily an unplanned event like an accident but can result from various causes, including accidents or exposure to hazards.
[46] A ___________ worker will always perform to the best to his ability.
Explanation:
A happy and healthy worker is more likely to perform to the best of their ability, as their well-being positively influences motivation, productivity, and overall job satisfaction.
Other options:
(a) Fast working
A fast-working individual may complete tasks quickly, but speed does not necessarily equate to high-quality performance or the best effort. This option focuses on speed rather than overall effectiveness.
(b) Highly educated
While a highly educated worker may possess valuable knowledge and skills, education alone does not guarantee that the individual will always perform to the best of their ability. Factors such as motivation and well-being also play significant roles.
(d) Stressed
A stressed worker is less likely to perform at their best due to the negative effects of stress on focus, motivation, and mental health. Stress typically hampers performance rather than enhances it.
[47] _____________ is the process of emptying a place in case of an emergency,disaster.
Explanation:
Evacuation is the process of emptying a place or removing people from an area in case of an emergency or disaster to ensure their safety.
Other options:
(a) Emergency
An emergency refers to a serious, unexpected situation requiring immediate action. It is not the process of removing people but rather the circumstance that may lead to evacuation.
(b) Accident
An accident is an unplanned event that can cause harm or damage, but it does not specifically refer to the process of clearing an area or moving people.
(c) Drill
A drill is a practice or simulation of an emergency procedure, such as an evacuation. While it helps prepare individuals for an actual evacuation, it is not the process itself.
[48] Which of the following features allows one to apply a group of formats at the same time ? (A) Fill
Explanation:
Styles allow users to apply a set of formatting options (such as font, color, size, alignment, and spacing) simultaneously. Example: In LibreOffice Writer, using Heading 1 applies a predefined font size, color, and spacing to a title.
Other Options:
(A) Fill:
This feature is used to fill cells, shapes, or backgrounds with color or patterns, but it does not apply multiple formatting options at once. Example: Filling a cell in calc with a specific color.
(C) Images:
This feature is used to insert pictures into a document, but it does not relate to formatting text or applying styles.
(D) Drag and Drop:
This feature allows users to move files, text, or images by clicking and dragging, but it does not apply formatting.
[49] In Writer, the styles and formatting option is available under ____________menu. (A) Insert
Explanation:
The Format menu is the correct answer. This menu usually contains options related to text formatting, including font style, size, color, paragraph alignment, line spacing, and styles. It allows users to apply predefined styles or create custom styles for consistent formatting throughout the document.
Other Options:
(A) Insert
The Insert menu is typically used to add various elements to a document, such as images, tables, charts, links, page breaks, and other objects. It does not generally contain options related to styles and formatting.
(B) Tools
The Tools menu often includes options for settings, preferences, and utilities that enhance the functionality of the word processor. This can include spell checking, macros, and other tools, but it is not primarily focused on styles and formatting.
(D) Window
The Window menu is used to manage the document windows within the application. This can include options for arranging, splitting, or closing document windows. It does not typically contain styles and formatting options.
[50] Gaurav is creating a report in Writer. The image gets embedded in his document whenever he drags and drops the image and the document size increases. Suggest a way to link the image file instead of embedding it. (A) Drag and drop the image. (B) Hold down the Ctrl key while dragging. (C) Hold down the Shift key while dragging the image. (D) Hold down the Ctrl and Shift key while dragging and dropping the image.
Explanation:
This option allows you to create a link to the image instead of embedding it. By holding down the Ctrl key while dragging the image into the document, you tell the application to link to the file rather than embed it.
Other Options:
(A) Drag and drop the image – Simply dragging and dropping the image will embed it in the document, increasing the file size. This option does not link the image.
(C) Hold down the Shift key while dragging the image – Holding down the Shift key typically constrains the proportions of the image being dragged but does not create a link. This option would still embed the image.
(D) Hold down the Ctrl and Shift key while dragging and dropping the image – While this may have some effect on the image’s placement or dimensions, it does not serve the primary purpose of linking the image. It would still likely embed the image.
[51] Resizing a _________may badly affect the resolution of an image. (A) Vector image
Explanation:
Raster images are composed of pixels, which means that when they are resized, especially when enlarged, the individual pixels can become more apparent, leading to a loss of quality and resolution. This can result in a blurry or pixelated appearance.
Other options:
(A) Vector image
Vector images are made up of paths defined by mathematical equations, allowing them to be resized without losing quality or resolution. They maintain sharpness regardless of how much they are enlarged or reduced.
(C) CAD image
CAD (Computer-Aided Design) images can be either vector or raster, depending on how they are created. However, the term “CAD image” itself does not specifically indicate a resolution issue related to resizing.
(D) Coloured image
The term “coloured image” is too broad and could refer to either raster or vector images. The resolution impact depends more on the type of image (raster vs. vector) than on whether it is colored.
[52] In Writer, you can create your own template in ___________ way(s). (A) One
Explanation:
Using the Template Manager:
You can create a new template by opening the Template Manager, selecting a base template (or starting from scratch), and then customizing it according to your needs. After customizing, you save it as a new template.
Saving a Document as a Template:
Another method is to create a document with the desired formatting and content, and then save it as a template by choosing the “Save As” option and selecting the template format (usually .ott for OpenDocument templates). This allows you to use that document as a template for future projects.
[53] In Writer, ____________ function key is used to see the databases while implementing mail merge. (A) F1
Explanation:
LibreOffice provides a Define range option is used to assign a name to a range in consolidation.
Other Options:
Other options are not valid for LibreOffice calc.
[54] Kawal and his friends are working on a Spreadsheet for entering data and updating records. They wish to keep a track of changes. Which of the following options will help in knowing who made the changes and what changes were done in the spreadsheet ? (A) View changes (B) Record changes (C) Store changes (D) Track changes
Explanation:
This is the most relevant option. When enabled, LibreOffice Calc tracks edits made by different users and shows details such as who made the change and when it was made. Users can accept or reject changes from the Edit → Track Changes → Manage option. It is useful for collaborative editing and maintaining a record of modifications.
Other options:
(A) View Changes
Not a specific feature in LibreOffice Calc but could refer to the ability to check modifications made in the document. In LibreOffice Writer, there is an option called Edit → Track Changes → Show Changes, which highlights edits. However, in Calc, changes can be viewed through the Track Changes feature.
(B) Record Changes
This is the actual Track Changes feature in LibreOffice Calc. When enabled (Edit → Track Changes → Record), it records any modifications made in the spreadsheet, such as cell edits, deletions, or insertions. Changes are highlighted and can be reviewed later. Useful for collaboration, as multiple users can track what modifications were made.
(C) Store Changes
Not an existing option in LibreOffice Calc. However, changes can be stored in different ways, such as saving versions of a spreadsheet or using the Track Changes feature to maintain a record of edits.
[55] _______________ is a more elaborate form of Goal Seek. (A) Database
Explanation:
Solver is an advanced version of Goal Seek in LibreOffice Calc. While Goal Seek allows finding a single input value to achieve a target result, Solver can handle more complex scenarios with multiple constraints and variables. It is useful for optimization problems, such as maximizing profits or minimizing costs based on multiple conditions.
Other options:
(A) Database
A database is used to store, organize, and manage large amounts of structured data. It is not related to Goal Seek or solving optimization problems.
(B) Hyperlink
A Hyperlink is used to create clickable links to websites, files, or other locations within the document. It does not perform any calculations or goal-seeking functions.
(C) Report
A Report is typically used to present and summarize data in a structured format. It is more relevant to databases and not for mathematical calculations or Goal Seek functions.
[56] Macro functions can be written to behave as regular functions by writing a/an ___________. (A) Void
Explanation:
In LibreOffice Basic, a macro function must use the Return statement to send a value back to the caller (such as a spreadsheet cell or another function).
Example:
Function AddNumbers(a As Integer, b As Integer)
AddNumbers = a + b
End Function
The function AddNumbers behaves like a regular function, returning the sum of a and b.
Other options:
(A) Void
In some programming languages like C or Java, void is used to define functions that do not return a value. However, in LibreOffice Macros (written in Basic, Python, or other supported languages), there is no need to use void for defining functions. In LibreOffice Basic, functions must return a value to behave like regular spreadsheet functions.
(C) Add-In
An Add-In is a separate extension or plugin that enhances LibreOffice with additional features.
It is not related to writing functions within macros.
(D) Dim
Dim is used in LibreOffice Basic to declare variables.
Example:
Dim x As Integer
It does not define or return values from a function.
[57] ____________ option of Calc helps in viewing the changes made to a worksheet using original and edited worksheet. (A) Edit -> Revise document (B) Edit -> Consolidate (C) Edit -> Compare document (D) Edit -> Collaborate document
Explanation:
This option allows users to compare two versions of a spreadsheet (original and edited). It highlights differences, showing what changes were made. It is found under Edit → Compare Document in LibreOffice Calc.
Other options:
(A) Edit → Revise Document – Incorrect, as there is no specific “Revise Document” option in LibreOffice Calc. LibreOffice uses Track Changes for revision tracking, but “Revise Document” is not a feature.
(B) Edit → Consolidate – Incorrect, as the Consolidate option is used for combining and summarizing data from multiple sheets or ranges, not for comparing changes.
(D) Edit → Collaborate Document – Incorrect, as there is no “Collaborate Document” option in LibreOffice Calc. Collaboration features exist through Track Changes and sharing options, but not under this name.
[58] In Calc, shared workbooks allow : (A) Merging cells (B) Conditional formatting (C) Inserting pictures/graphs (D) Adding text
Explanation:
The “Remove” option allows users to delete a relationship between tables in the Relationships window. It does not delete the tables, only the relationship between them.
Other options:
(A) Clear – “Clear” is not used for removing relationships in LibreOffice Base. It is usually associated with clearing content (like clearing fields or values).
(C) Drop – “Drop” is a SQL command used in databases to delete an entire table or column, not just relationships.
(D) Delete – While “Delete” is a common term, it is not the correct option for removing relationships in LibreOffice Base. “Delete” is usually used for records (rows) in tables.
[60] In SQL, the keyword to display records in ascending order is : (A) Asce
Explanation:
The Boolean data type is specifically designed to store Yes/No or True/False values. Internally, it stores 0 for False (No) and 1 for True (Yes).
Other options:
(B) Char – The Char data type is used to store fixed-length text characters (e.g., ‘Y’ or ‘N’), not numeric Yes/No values.
(C) Binary – The Binary data type is used for storing binary data like images or raw byte data, not Yes/No values.
(D) OtherObject – “OtherObject” is not a valid data type in LibreOffice Base.
[62] Which of the following statement retrieves zero or more rows from one or more database tables or database views ? (A) UPDATE
Explanation:
The SELECT statement is used to retrieve data (zero or more rows) from one or more tables or views.
Example:
SELECT * FROM students;
It can fetch all rows or be used with conditions to filter specific records.
Other Options:
(A) UPDATE – The UPDATE statement is used to modify existing records in a table.
Example: UPDATE students SET grade = ‘A’ WHERE id = 1;
(B) DELETE – The DELETE statement is used to remove rows from a table.
Example: DELETE FROM students WHERE id = 1;
(D) DISPLAY – it is not a valid keyword for SQL.
[63] Roshni has created a table Customer in SQL and wants to store photograph image of every customer under Cust_photo field. Suggest a suitable data type from the options given below. (A) IMAGE (B) PICTURE (C) LONGVARBINARY (D) GRAPHIC
Explanation:
LONGVARBINARY is the correct data type for storing binary data, including images, in SQL databases like OpenOffice (LibreOffice) Base. It is designed to store large binary objects (BLOBs), such as photographs, audio, or video files.
Other options are not valid data types in libreoffice base.
[64] By default, all the fields in OpenOffice/Libreoffice Base will have ____________ datatype. (A) int (tiny)
Explanation:
A Blog is a discussion-style website or platform that serves as an online personal diary or journal, where individuals can create and share their thoughts, experiences, and opinions. Blogs can include text, images, videos, and links, allowing for interactive discussions through comments.
(A) WWW – WWW stands for the World Wide Web, which is the system of interlinked hypertext documents accessed via the internet. It is not a specific type of website.
(B) Web – The term Web is often used informally to refer to the internet or web pages in general but does not describe a specific format or style of a website.
(D) Chat – Chat refers to real-time communication between users, typically through text messaging, and does not relate to the concept of personal web pages.
[66] Natasha works as floor manager. She has been assigned a task for conducting regular _______ to ensure safety of life in case of any disaster or emergency by evacuating the place of danger. (A) Cultural assembly (B) Open house events (C) Evacuation drill (D) Trips and excursions
Explanation:
An evacuation drill is a practice exercise that prepares individuals for a safe and orderly evacuation in case of an emergency or disaster. These drills help ensure that everyone knows how to respond effectively to various emergency situations.
Other options:
(A) Cultural assembly – A cultural assembly refers to gatherings focused on cultural activities and discussions, which are not related to safety protocols or emergency preparedness.
(B) Open house events – Open house events are typically opportunities for people to visit and learn about a place, such as schools or organizations, and are not focused on safety or evacuation procedures.
(D) Trips and excursions – Trips and excursions refer to outings or field trips and are not related to safety measures or emergency preparedness.
[67] ___________ is an accessibility feature that assists people who have difficulty using a keyboard or a mouse (or both). (A) Sticky keys
Explanation:
Sticky Keys is an accessibility feature that allows users to press and release modifier keys (like Shift, Ctrl, or Alt) one at a time rather than holding them down while pressing another key. This feature is particularly helpful for individuals who have difficulty using a keyboard or mouse simultaneously.
Other Options:
(B) Serial key – A serial key usually refers to a product activation code for software and is not related to accessibility features.
(C) Control key – The Control key (Ctrl) is a standard keyboard key used in conjunction with other keys to perform various functions. It is not an accessibility feature.
(D) Toggle keys – Toggle Keys is an accessibility feature that provides an audio cue when keys like Caps Lock, Num Lock, or Scroll Lock are pressed. While it helps with awareness, it does not assist users with keyboard or mouse difficulties as effectively as Sticky Keys.
[68] Network in which all computers have equal status is called _____________. (A) Peer-to-Peer architecture (B) Central architecture (C) Hierarchical architecture (D) Client-server architecture
Explanation:
In a Peer-to-Peer (P2P) architecture, all computers (peers) have equal status and can act as both clients and servers. Each peer can share resources, such as files and printers, without needing a central server.
Other Options:
(B) Central architecture – Central architecture implies a centralized control model where a central server manages and controls access to resources. This contradicts the concept of equal status among all computers.
(C) Hierarchical architecture – Hierarchical architecture is structured in levels or tiers, with different levels having varying statuses and roles (e.g., a central server at the top and clients below), thus not providing equal status.
(D) Client-server architecture – In Client-server architecture, there is a distinct separation between clients and servers, where clients request resources or services, and servers provide them, creating a hierarchy rather than equal status.
[69] _________ are text files with small pieces of data – like a username and password. (A) Operating System
Explanation:
Cookies are small text files stored on a user’s computer by a web browser. They contain data such as usernames, passwords, and other session information, allowing websites to remember user preferences and login status.
Other options:
(A) Operating System – An Operating System (OS) is system software that manages computer hardware and software resources. It is not a text file for storing small pieces of data like usernames and passwords.
(B) Antivirus – Antivirus software is designed to detect and eliminate malware. It does not function as a text file for storing user data.
(D) Modem – A Modem is a hardware device that modulates and demodulates signals for internet access. It does not store user data as text files.
[70] DSL stands for ______________. (A) Digital System Line
[73] __________ is the immediate assistance provided to the injured to save life and minimize health loss till the proper medical aid/facility is provided.
Ans.: A Foreign Key is a column or a set of columns in a table that establishes a link between the data in two tables. It refers to the Primary Key in another table, ensuring data integrity and enforcing referential constraints.
Ans.:
1. Quick Navigation – Hyperlinks can be used to jump to different sheets, specific cells, or external files, making it easier to navigate large spreadsheets.
2. Linking to External Resources – Hyperlinks can connect to websites, cloud storage, or email addresses, allowing users to access additional information or communicate directly from the spreadsheet.
[3] Under Record changes feature, one can control the changes that appear on the screen using filters.Explain any two criteria on which these filters are based.
Ans.: Under the Record Changes feature in LibreOffice Calc, filters help control which changes appear on the screen. Here are two key criteria on which these filters are based:
1. Author-Based Filtering – This allows users to display changes made by a specific user. It is useful in collaborative work to track modifications made by individual contributors.
2. Date-Based Filtering – Users can filter changes based on a specific date or date range. This helps in reviewing only recent modifications or changes made within a particular period.
[4] Differentiate between data organized in a flat file and a relational form.
Ans.:
Definition
A simple storage system where data is stored in plain text files or spreadsheets.
A software system that manages structured data efficiently.
Structure
Data is stored in a single table or multiple unrelated tables.
Data is stored in a well-structured format using tables, rows, and relationships.
Data Retrieval
Slow, as searching requires scanning the entire file.
Fast, as queries are optimized using indexing and relationships.
Security
Minimal security; access control is difficult to implement.
Strong security with user authentication and access control.
Concurrency
Does not support multiple users accessing the same file efficiently.
Supports concurrent access by multiple users with transaction management.
Scalability
Limited scalability; performance degrades with large datasets.
Highly scalable; handles large datasets efficiently.
Ans.:
The term WWW stands for World Wide Web. It is a system of interlinked web pages and resources that are accessed via the Internet using web browsers. The WWW was invented by Tim Berners-Lee in 1989 while working at CERN (European Organization for Nuclear Research).
[6] (a) Arrange the following network in decreasing order of speed : DSL, 3G, 5G (b) Give any two examples of instant messaging software.
Ans.:
(a) Arranging the networks in decreasing order of speed: 5G > DSL > 3G
5G (Fifth Generation Mobile Network): The fastest among the three, offering speeds up to 10 Gbps.
DSL (Digital Subscriber Line): A wired broadband technology that provides speeds ranging from 1 Mbps to 100 Mbps, depending on the type (ADSL, VDSL, etc.).
3G (Third Generation Mobile Network): The slowest among the three, with speeds ranging from up to 3 Mbps in most implementations.
(b) Examples of Instant Messaging Software:
WhatsApp
Telegram
Other examples include Facebook Messenger, Signal, Microsoft Teams, and Slack.
[7] Differentiate between Keep scale and Keep image size options while cropping an image in a document.
Ans.:
Keep Scale
The overall size of the image remains unchanged, but the cropped portion is enlarged to fill the same space. This may cause the image to appear zoomed in.
Keep Image Size
The physical dimensions of the image remain the same, but the cropped area is simply removed, leaving empty space (or resizing the image to fit the new cropped area).
[8] Give any two characteristics of a template in Open Office Writer.
Ans.:
1. Predefined Formatting and Layout – A template provides a structured document with predefined styles, fonts, margins, headers, footers, and other formatting elements. This ensures consistency across multiple documents.
2. Reusability – A template can be used multiple times to create documents with the same structure and design, saving time and effort. Users can create new documents based on a template without modifying the original template.
Ans.:
Merging worksheets is useful for combining data from multiple sheets into a single sheet for better analysis, reporting, and organization. Here are some key reasons:
Consolidated Data Management – Merging worksheets helps in combining related data from different sources into one sheet, making it easier to analyze and manage.
Simplified Reporting – Instead of switching between multiple sheets, merging allows users to generate summaries, reports, or charts from a single dataset.
Avoiding Duplication – Merging helps eliminate duplicate entries across different sheets, ensuring data consistency and accuracy.
Improved Data Analysis – Many functions like pivot tables, charts, and filtering work better when data is in a single sheet rather than spread across multiple sheets.
[10] What is a Primary Key ? How is it different from foreign key ?
Ans.:
WAN (Wide Area Network) is a type of computer network that spans a large geographical area, such as cities, countries, or even continents. It connects multiple local area networks (LANs) and metropolitan area networks (MANs) using communication technologies like fiber optics, satellite links, and leased telephone lines.
[12] (a) Identify the following network / Internet connectivities as wired or wireless :
(i) Dial-up
(ii) WiMax
(b) Give any one feature of instant messaging software.
Ans.: (a) Identifying Network/Internet Connectivities as Wired or Wireless
1. Dial-up→ Wired (Uses telephone lines for internet access)
2. WiMax → Wireless (Uses radio signals to provide broadband internet over long distances)
(b) One Feature of Instant Messaging Software
Real-time Communication – Instant messaging software allows users to send and receive messages instantly over the internet, enabling quick and efficient communication.
[13] Write the main steps to group drawing objects in Writer.
Ans.: The steps are as follows:
Click on the first object.
Hold the Shift key and click on other objects to select multiple objects.
Right-click on one of the selected objects.
From the context menu, choose Group → Group.
[14] What is the purpose of consolidating data in spreadsheets? Discuss briefly.
Ans.:
1. Summarization of Data – Consolidation helps in creating a single summary table from multiple sources, making it easier to analyze trends and patterns.
2. Eliminating Redundancy – It removes duplicate data entries and ensures that only relevant data is presented.
3. Easy Comparison – By bringing data from different sheets into one place, users can compare values and identify key insights more efficiently.
4. Time-Saving & Automation – Instead of manually copying and pasting data, consolidation automates the process, reducing errors and saving time.
5. Better Decision-Making – Consolidated data provides a clearer overview, which helps businesses and individuals make informed decisions.
[15] Differentiate between LAN and WAN.
Ans.:
Feature
LAN (Local Area Network)
WAN (Wide Area Network)
Definition
A network that connects computers within a small area like an office, home, or school.
A network that spans large geographical areas, connecting multiple LANs over cities, countries, or continents.
Coverage Area
Limited to a small geographic area (e.g., a building or campus).
Covers a large area, including multiple cities, countries, or even globally.
Speed
High-speed (up to Gbps).
Comparatively slower due to long-distance communication.
Ownership
Usually owned and managed by a single organization.
Can be public (e.g., the Internet) or private (leased network infrastructure).
Setup Cost
Low setup and maintenance cost.
High setup and maintenance cost due to long-distance infrastructure.
Example
Office network, school network, home Wi-Fi.
The Internet, banking networks, multinational corporate networks.
[16] What are the two parts of a cell reference while referencing data on other sheets ? Explain with an example.
Ans.:
Two Parts of a Cell Reference in LibreOffice Calc (Referencing Data from Other Sheets)
When referencing data from other sheets in **LibreOffice Calc**, a cell reference consists of two main parts:
1. Sheet Name – The name of the worksheet from which data is being referenced.
2. Cell Address – The specific cell location within that sheet (e.g., A1, B5).
Example:
If we want to reference **cell B2** from a sheet named **Sales**, the reference will be:
=Sales.B2
Explanation:
– `Sales` → Sheet Name
– `B2` → Cell Address in the “Sales” sheet
Example Usage:
If the “Sales” sheet has a value of **500** in cell B2, and we enter `=Sales.B2` in another sheet, the value **500** will be displayed in that cell.
If the sheet name contains spaces, enclose it in single quotes:
=’Monthly Sales’.B2
[17] Give any two benefits of creating relationships between tables in a database.
Ans.:
1. Reduces Data Redundancy – By creating relationships, the same data does not need to be stored in multiple tables. This minimizes duplication and saves storage space.
2.Ensures Data Integrity – Relationships enforce referential integrity, ensuring that related data remains consistent. For example, a foreign key in one table must match a primary key in another, preventing invalid or orphaned records.
[18] Mention any two basic fire safety rules to be followed in any organization.
Ans.:
1. Keep Fire Exits Clear – Emergency exits and escape routes should always be unobstructed to allow quick evacuation during a fire.
2. Use Fire Extinguishers Properly – Employees should be trained on how to locate and use fire extinguishers based on the type of fire (e.g., electrical, chemical, or paper fires).
[19] Write any four rules which is to be followed for creating strong passwords.
Ans.: The rules are as follows:
Use a Mix of Characters – Include uppercase (A-Z), lowercase (a-z), numbers (0-9), and special symbols (@, #, $, etc.) to make the password harder to crack.
Avoid Common Words & Personal Information – Do not use easily guessable words like “password123” or personal details like your name, birthdate, or phone number.
Make It Long – A strong password should be at least 12-16 characters long to increase security.
Use Unique Passwords for Different Accounts – Avoid reusing passwords across multiple websites to prevent security breaches if one password gets compromised.
[20] What is the special name given to the discussion style site used by nontechnical (or technical) users for creating personal web pages ? Give any two examples of websites that help us to create such discussion style sites for free.
Ans.:
When creating relationships between tables in a database, different types of relationships help maintain data integrity and efficiency. Here are two common types:
1. One-to-One (1:1) Relationship
In this relationship, each record in Table A corresponds to exactly one record in Table B, and vice versa.
Used when data is divided into two tables for security or organizational reasons.
Example:
A Person table (Person_ID, Name) and a Passport table (Passport_ID, Person_ID) where each person has only one passport.
2. One-to-Many (1:M) Relationship
A record in Table A can have multiple related records in Table B, but each record in Table B is linked to only one record in Table A.
This is the most common relationship in databases.
Example:
A Customers table (Customer_ID, Name) and an Orders table (Order_ID, Customer_ID) where one customer can place multiple orders.
[22] What is difference between Form and Reports?
Ans.:
Feature
Form
Report
Purpose
Used to enter, edit, and update data in a table.
Used to display, summarize, and print data from a table or query.
Data Interaction
Allows users to input and modify data.
Read-only; does not allow data modification.
Usage
Designed for data entry and user-friendly interaction.
Used for analyzing and presenting data in a structured format.
Customization
Can include buttons, dropdowns, and interactive elements.
Focuses on formatting and layout for better readability.
Example
A student admission form where user inputs student details.
A monthly sales report that summarizes total sales per region.
[23] Identify any two Column name/Attribute and their data types from a given table: PLAYER
PID
PNAME
RUNS
GENDER
DOB
PIOI
SACHIN
13000
M
10/04/2001
P102
KAPIL
7000
M
12/02/1998
P103
SAURABH
12000
M
13/04/2001
P104
VIRAT
12500
M
17/03/2005
Ans.:
Attribute/Column Name
Datatype
PID
CHAR
PNAME
VARCHAR
RUNS
INTEGER
GENDER
CHAR
DOB
DATE
[24] Give a list of any four types of accidents.
Ans.: The four types of accidents are as follows:
Slips, Trips, and Falls – Occur due to wet floors, uneven surfaces, or poor lighting.
Road Accidents – Involve vehicles, pedestrians, or cyclists due to speeding, distractions, or poor road conditions.
Fire Accidents – Caused by electrical faults, open flames, or flammable materials.
Chemical Accidents – Result from improper handling of hazardous chemicals in laboratories or industries.
[25] What are cookies ? What details are stored by the cookies ?
Ans.: Cookies are small text files stored on a user’s computer by a website. They help websites remember user preferences, login details, and browsing activity to improve user experience.
Cookies can store various types of information, including:
1. User Authentication Data – Login credentials (username, but usually not passwords) to keep users signed in.
2. Browsing History – Pages visited and interactions on a website.
3. Preferences & Settings – Language selection, theme settings, and other customization choices.
4. Shopping Cart Data – Items added to the cart on e-commerce websites.
5. Session Information – Temporary data used during a browsing session, such as form inputs.
[26] Give one point of difference between peer-to-peer architecture and client-server architecture.
Ans.:
Aspect
Peer-to-Peer (P2P) Architecture
Client-Server Architecture
Structure
No central server; all nodes (peers) communicate directly.
A central server manages data, and clients request services from it.
Data Management
Each peer stores and shares data independently.
The server stores and manages all data, providing controlled access.
Performance
Performance may degrade as the number of peers increases.
Server can be optimized for performance, but high traffic may slow it down.
Security
Less secure, as every device has access to shared files.
More secure, as the server controls authentication and data access.
Scalability
Harder to scale efficiently, as each peer must manage its own resources.
Easier to scale by upgrading the server or adding more clients.
Ans.:
1. Data Consistency
Definition: Data consistency ensures that data remains accurate, reliable, and uniform across a database or system. When multiple users or applications access and update the same data, consistency ensures that all copies of the data remain synchronized and correct.
Example:
In a banking system, if a user transfers money from Account A to Account B, both accounts should update correctly to reflect the transaction.
2. Data Redundancy
Definition: Data redundancy occurs when the same data is stored in multiple locations within a database or system, leading to unnecessary duplication. This can result in increased storage usage and data inconsistency if not properly managed.
Example:
If customer details (name, address, phone number) are stored in both the Orders table and the Customers table, any update in one table might not reflect in the other, causing inconsistencies.
Watch this video to learnn more:
Part B Subject Specific skills – 4 marks Important PYQs Information Technology Class 10
[1] Give two areas where Mail Merge can be used. Also give names of any two softwares that can be used to store the data list.
Ans.: Areas where Mail Merge can be used –
1. Sending Letters to Multiple Recipients – Businesses or organizations can use mail merge to send personalized letters, such as invitation letters, notices, or promotional offers.
2. Generating Address Labels – Mail merge can be used to create address labels for bulk mailing, making it easier to send documents or packages efficiently.
Two Software for Storing the Data List:
1. Microsoft Excel
2. Microsoft Access
[2] Explain the following concepts of spreadsheets : (a) Scenario (b) Goalseek
Ans.:
(a) Scenario
A Scenario in a spreadsheet is a tool used for what-if analysis, allowing users to create and compare multiple sets of data within the same worksheet. It helps in analyzing different possible outcomes based on changing input values.
–> Example:
A business can create scenarios for Best Case, Worst Case, and Expected Case to predict financial outcomes by adjusting values like sales, costs, and profit margins.
(b) Goal Seek
Goal Seek is a feature used to find the required input value needed to achieve a specific result. It works backward by adjusting one variable to meet a target value.
–> Example:
If a student wants to score 80% overall in exams and needs to determine the minimum marks required in the final test, Goal Seek can calculate it by adjusting the marks in the final test column.
Ans.:
TINYINT – Used to store very small whole numbers (Range: -128 to 127).
SMALLINT – Stores small integer values (Range: -32,768 to 32,767).
INTEGER – Stores larger whole numbers (Range: -2,147,483,648 to 2,147,483,647).
DECIMAL (NUMERIC) – Used for storing precise decimal numbers, especially for financial data (e.g., 999.99, 12.345).
[4] (a) The structure of a table SUPPLIER is given below. Suggest suitable data type for each column.
Table – Supplier
Suppno
Suppname
City
Amount
11
Sourabh
Delhi
98983.00
22
Pratabh
Jaipur
45780.00
33
Faviaam
Mumbai
82875.00
44
Shekhar
Jaipur
45465.00
55
Swami
Mumbai
56784.00
Ans.:
Column Name
Data Type
Suppno
tinyint
Suppname
varchar
City
varchar
Amount
decimal
(b) Consider the table “SUPPLIER” given in (a). Write queries to : (i) Display the supplier name of all suppliers from Delhi (ii) Display details of suppliers whose amount is greater than 50000.
Ans.:
(i) select suppname from supplier where city='delhi';
(ii) select * from supplier where amount > 50000;
[5] (a) Give examples of two Internet threats. (b) Most of the time fire can be prevented using appropriate measures. Give any two measures.
Ans.:
a)
1. Phishing – A cyber-attack where attackers trick users into providing sensitive information (such as passwords, credit card details) by pretending to be a legitimate entity through fake emails or websites.
-> Example: A user receives an email that looks like it’s from their bank, asking them to update their account details via a fraudulent link.
2. Malware (Malicious Software) – Harmful software designed to damage, disrupt, or steal data from a computer or network. Common types include viruses, worms, and ransomware.
-> Example: A user downloads a free software that secretly installs a virus, which then corrupts files or steals personal data.
b)
1. Proper Electrical Safety Practices – Avoid overloading electrical circuits, use high-quality wiring, and regularly inspect electrical appliances to prevent short circuits and overheating.
2. Fire Safety Equipment and Training – Install smoke detectors, fire extinguishers, and sprinkler systems, and ensure that people are trained in fire safety procedures and emergency exits.
3. Safe Storage of Flammable Materials – Keep flammable substances like gasoline, chemicals, and paper away from heat sources and store them in properly labeled, fire-resistant containers.
4. Regular Fire Drills and Emergency Planning – Conduct fire drills in workplaces and schools to ensure people know how to respond quickly and safely in case of a fire emergency.
[6] Explain the following terms with respect to positioning the graphics in a document :
Ans.:
(a) Arrangement refers to the order or layering of graphics in relation to other objects (such as text or other images) in a document. It determines whether a graphic appears in front of or behind other elements.
-> Example: In word processors like Microsoft Word or LibreOffice Writer, you can use options like “Bring to Front”, “Send to Back”, “Bring Forward”, and “Send Backward” to arrange images relative to other objects.
(b) Text Wrapping controls how text flows around a graphic in a document. It defines whether text should surround the image, be placed above/below it, or be integrated within it.
-> Common Text Wrapping Styles:
In Line with Text – The image behaves like text and moves with it.
Square – Text wraps around the edges of the image in a rectangular shape.
Tight – Text follows the exact contour of the image (for non-rectangular shapes).
Behind Text – The image is placed behind the text.
In Front of Text – The image appears on top of the text, covering it.
[7] Distinguish between the following with respect to spreadsheets :
Relative and Absolute hyperlink
Internet hyperlink and Document hyperlink.
Ans.:
Feature
Relative Hyperlink
Absolute Hyperlink
Definition
A hyperlink that points to a file or webpage relative to the current document’s location.
A hyperlink that contains the full URL or absolute path to a file or webpage.
Path Format
Uses a shortened path (e.g., images/photo.jpg).
Uses the complete URL or file path (e.g., https://example.com/images/photo.jpg).
Usage
Commonly used for linking files within the same website or local folder.
Used for linking to external websites or files in different locations.
Example
documents/report.pdf (refers to a file in the “documents” folder relative to the current location).
https://www.tutorialaicsip.com/pyqs/it – A full address
Effect When Moved
Works as long as the relative structure remains the same.
Always works, regardless of the file’s location.
Feature
Internet Hyperlink
Document Hyperlink
Definition
A hyperlink that directs users to a webpage on the Internet.
A hyperlink that navigates to a specific location within the same document or another document.
Path Format
Uses a URL (Uniform Resource Locator) (e.g., https://www.example.com).
Uses an internal reference, such as a bookmark or section within a document.
Usage
Used to link to external websites, web pages, or online resources.
Used for navigating within long documents, jumping between sections, or linking to another document.
Ans.:
1. Integer (INT)
Used to store whole numbers (both positive and negative) without decimal points.
Example: 100, -25, 5000
Common Variants: SMALLINT, BIGINT (for smaller or larger ranges).
2. Decimal (NUMERIC, DECIMAL)
Used for precise decimal numbers, often in financial or monetary calculations.
Example: 999.99, 12.345
Advantage: Maintains exact precision compared to floating-point types.
3. Varchar (VARCHAR, TEXT)
Stores variable-length text or string data, such as names or addresses.
Example: “John Doe”, “New York”
Efficient for saving space as it only uses memory for the actual text stored.
4. Date/Time (DATE, TIME, DATETIME, TIMESTAMP)
Stores date and time values for tracking events or records.
Example:
DATE: “2024-02-12”
TIME: “14:30:00”
DATETIME: “2024-02-12 14:30:00”
[9] (a) Structure of a table “0rders” is given below. Suggest a suitable data type for each column.
Table : Orders
Order_ID
Order_date
Customer_ID
Amount
A-101
12/12/19
C3445
1200.00
A-202
11/09/19
Cl’245
3456.00
A-402
09/07/19
C’2121
2312.00
Ans.:
Column Name
Datatype
order_id
char
order_date
date
customer_id
char
amount
float
(b) Consider the followin table “Books”.
BkID
BkName
Author
Qty
Price
B 101
Learni with Fun
Jacobins
5
355.00
B_103
How I Live Now
Me Rosoff
4
400.00
B_104
I Capture the Castle
Dodie Smith
5
520.00
B_10G
Mortal E ines
Phili Reeve
4
260.00
B_IIO
The Kite Rider
Geraldine McCau hrean
3
270.00
Write SQL queries to:
Display data of all books whose quantity is more than 3.
Display total amount Of all books whose price is less than 500. (Hint : amount Qty x Price)
Ans.:
(i) select * from books where qty>3;
(ii) select qty*price from books where price<500;
[10](a) Give two best practices for internet safety.
Ans.:
(a)
1. Use Strong and Unique Passwords – Create complex passwords with a mix of uppercase letters, lowercase letters, numbers, and special characters. Use different passwords for different accounts and enable two-factor authentication (2FA) whenever possible.
2. Be Cautious with Links and Attachments – Avoid clicking on suspicious links or downloading attachments from unknown emails, messages, or websites, as they may contain malware or phishing scams. Always verify the source before opening any link.
(b)
1. Keep Floors Clean and Dry – Immediately clean up spills, remove obstacles, and ensure walkways are free of clutter to prevent slipping hazards.
2. Wear Proper Footwear – Use slip-resistant shoes, especially in workplaces or areas prone to wet or uneven surfaces, to reduce the risk of falling.
3. Use Handrails on Stairs and Ramps – Always hold onto handrails while using stairs or ramps to maintain balance and prevent falls.
4. Ensure Proper Lighting – Keep walkways, staircases, and entryways well-lit to improve visibility and reduce the risk of tripping over unseen obstacles.
[11] What is the concept of mail merge in word processing software ? Discuss in detail. Also give any two major benefits of using mail merge.
Ans.: Mail Merge is a feature in word processing software (such as Microsoft Word or LibreOffice Writer) that allows users to create multiple personalized documents (e.g., letters, emails, labels) by combining a main document with a data source.
It is particularly useful when sending the same document to multiple recipients with slight variations, such as names, addresses, or other personalized details.
Two Major Benefits of Using Mail Merge:
1. Saves Time and Effort – Instead of manually creating multiple personalized documents, mail merge automates the process, significantly reducing time and workload.
2. Ensures Accuracy and Consistency – Mail merge minimizes human errors and ensures uniform formatting, as the same template is used for all recipients while pulling correct data from the source.
[12] Explain four types of hyperlinks that can be applied in spreadsheets.
Ans.: The four main types of hyperlinks that can be applied are:
1. URL (Web Page) Hyperlink – Links to an external website or online resource.
Example: Clicking on https://www.google.com in a spreadsheet opens Google in a web browser.
Usage: Used to access reference materials, company websites, or online reports.
2. Document Hyperlink
Links to another file stored on the computer or network.
Example: Clicking on C:\Documents\Report.pdf opens a PDF file stored on the local drive.
Usage: Helpful for linking to reports, presentations, or related spreadsheets.
Sheet/Cell Hyperlink (Internal Link)
3. Links to a specific cell, range, or sheet within the same spreadsheet.
Example: A hyperlink in Sheet1 that jumps to Sheet3, Cell B10 when clicked.
Usage: Useful for navigating within large workbooks, such as jumping between summary and data sheets.
4. Email Hyperlink
Opens the default email client to send an email to a specified address.
Example: Clicking on mailto:example@email.com opens an email composition window.
Usage: Used for contacting team members or customer support directly from a spreadsheet.
[14] In context of Libre/OpenOffice Base, explain the concept and significance of the following : (a) Forms (b) Reports
Ans.:
(a) Forms
Forms in LibreOffice Base are user-friendly interfaces used for data entry, modification, and viewing records stored in a database. Instead of directly working with tables, users can enter and edit data using forms, which provide a structured layout with text boxes, dropdowns, buttons, and other controls.
Significance:
1. Simplifies Data Entry – Forms make it easier for users to enter data without directly interacting with tables.
2. Enhances Data Accuracy – Provides validation rules, dropdown lists, and input masks to reduce errors.
3. User-Friendly Interface – Customizable design makes data entry more intuitive, especially for non-technical users.
4. Efficient Navigation – Allows users to quickly move between records using buttons and search features.
[15] Consider the table Product and write SQL queries for the following :
Table : Product
PID
PNAME
PRICE
QUANTITY
CATEGORY
P01
BOARD
10000
2
OFFICE
P02
EYELINER
700
50
MAKEUP
P04
PENCIL
5
500
SCHOOL
P05
LAMP
250
10
DOMESTIC
P08
BEDSHEET
450
45
DOMESTIC
P09
LAPTOP
75000
15
OFFICE
(a) To display names of all products whose category is ‘‘domestic’’. (b) To display product name and price whose quantity is less than 50. (c) To display price and quantity of Laptop. (d) To display name and quantity of those products whose price is above 5000.
Ans.:
(a) select pname from product where category='domestic';
(b) select pname, price from product where quantity < 50;
(c) select price, quantity from product where pname='laptop';
(d) select name, quantity from product where price > 5000;
[16] In the context of Database Management System, write a short note on the following : (i) Database (ii) Table (iii) Field (iv) Composite Primary Key
Ans.:
(i) Database
A database is an organized collection of data that allows users to store, manage, and retrieve information efficiently. It is designed to handle large amounts of structured data and supports operations like insertion, deletion, updating, and querying. Databases are managed using Database Management Systems (DBMS) such as MySQL, Oracle, and PostgreSQL.
(ii) Table
A table is a structured format for organizing data within a database. It consists of rows (records) and columns (fields), where each row represents a unique entry, and each column stores specific attributes related to the data. Tables help in structuring and categorizing data for efficient access and management.
(iii) Field
A field is a single column in a table that holds specific information about an entity. Each field has a defined data type (such as integer, text, date, etc.) and represents one attribute of a record. For example, in a “Students” table, fields could be “Student_ID,” “Name,” and “Date_of_Birth.”
(iv) Composite Primary Key
A composite primary key is a primary key that consists of two or more fields (columns) to uniquely identify a record in a table. It is used when a single field is not sufficient to ensure uniqueness. For example, in a “Course_Enrollment” table with columns “Student_ID” and “Course_ID,” a composite primary key (Student_ID, Course_ID) ensures that each student can enroll in multiple courses but cannot enroll in the same course more than once.
[17] Aryan is too much worried when he came to know that someone has withdrawn all money from his uncle’s bank account. He was not able to understand how this could happen when he has not given his ATM card to anyone.
Suggest him a way by which he can be assured that he is doing secured online transaction.
Which type of software he needs to install in his computer to protect his computer from malware
Help him to understand about Phishing.
He also thinks cookies are harmless. Explain him how cookies can also cause harm to him.
Ans.:
(i) Check the website url contains ‘s’ after http
(ii) Antivirus or antimalware
(iii) hishing is a cyberattack where scammers try to steal sensitive information like bank details, passwords, or credit card numbers by pretending to be a trusted source. This is done through fake emails, messages, or websites that look legitimate.
(iv) Cookies are small files stored in a web browser to remember user preferences and login details.
While they improve user experience, they can also be harmful:
1. Tracking & Privacy Risks: Some websites track browsing habits and sell data to advertisers.
2. Session Hijacking: Hackers can steal cookies and use them to access user accounts.
3. Storage of Sensitive Data: If login credentials are stored in cookies, attackers can steal them.
To stay safe, Aryan should regularly clear cookies, avoid saving passwords in browsers, and use private browsing when necessary.
[18] Due to pandemic everyone was bound to stay at home. But, due to internet the whole world was connected.
Explain how data is transferred over the internet.
What is meant by World Wide Web ? Also write any two web browsers names that you know.
Ans.:
Data is transferred over the internet using a system called packet switching.
The process follows these steps:
1. Breaking Data into Packets: Large files or messages are broken into small units called packets.
2. Assigning Addresses: Each packet gets a header containing information such as the sender’s and receiver’s IP addresses.
3. Routing Through Networks: Packets travel across different routers and networks using protocols like TCP/IP.
4. Reassembly: Once all packets reach their destination, they are reassembled in the correct order to form the complete message.
The World Wide Web (WWW) is a system of interconnected documents and resources accessed via the internet. It uses hyperlinks and web pages that can be viewed using a web browser. The WWW is based on technologies like HTTP (Hypertext Transfer Protocol) and HTML (Hypertext Markup Language).
Two Web Browsers are Google Chrome and Mozilla Firefox.
[19] Consider the following table :
STUDENT
ADMNO
NAME
GRADE
DOB
MARKS
HOUSE
GENDER
1001
RUPAL
9
10/04/2006
76
GREEN
M
1002
RASHMI
9
08/12/2005
87
RED
F
1003
ARNAV
10
25/05/2004
81
GREEN
M
1004
SUMONA
9
23/08/2005
68
RED
F
1005
ARUN
9
16/07/2005
72
GREEN
M
1006
TIA
9
22/09/2005
91
BLUE
F
1007
ROSHAN
10
26/08/2004
89
BLUE
M
Write SQL Commands :
To display the details of all students of Green House.
To increase the marks by 5 whose ADMNO is 1005.
To display the details of all students whose MARKS are less than 80.
Display the list of all students in descending order of MARKS.
Ans.:
(i) select * from student where house='green';
(ii) update student set marks=marks+5 where admno=1005;
(iii) select * from student where marks<80;
(iv) select * from student order by marks desc;
Ans.:
1. Database Management System (DBMS):
A DBMS is software that allows users to create, manage, and manipulate databases efficiently. Examples include MySQL, PostgreSQL, Oracle, and Microsoft SQL Server.
2. Primary Key:
A Primary Key is a column (or a set of columns) in a table that uniquely identifies each row. It cannot contain NULL values and must have unique values.
Example: In a “Students” table, the Student_ID can be the primary key.
3. Numeric Data Type:
Numeric data types store numbers and are used for calculations. Common numeric data types in SQL include:
INT (Integer) – Whole numbers
DECIMAL(p, s) – Fixed-point numbers
FLOAT / DOUBLE – Floating-point numbers
4. Referential Integrity:
It ensures that relationships between tables remain consistent. It prevents actions like deleting a record that is referenced by a foreign key in another table. This is enforced using Foreign Keys.
[23] Consider the following table :
Table : EMPLOYEE
EMPID
NAME
SALARY
DOJ
COMM
DEPT
GENDER
1001
ROHAN
7000
10/04/2006
300
SALES
M
1002
RISHU
12000
08/12/2005
100
FINANCE
F
1003
DEVANSH
9000
25/05/2004
500
SALES
M
1004
SUMAN
10000
23/08/2005
300
MARKETING
F
1005
ARYAN
11000
16/07/2005
500
SALES
M
1006
TAMANNA
15000
22/09/2005
200
FINANCE
F
1007
ROHIT
8000
26/08/2004
900
SALES
M
Write SQL Commands :
To display the details of all employees of SALES Department.
To increase the SALARY by 1000 whose EMPID is 1007.
To display the details of all employees whose SALARY is more than 10000.
To display the list of all employees in descending order of SALARY.
Ans.:
(i) select * from employee where department='sales';
(ii) update employee set salary=salary + 1000 where empid=1007;
(iii) select * from employee where salary>10000;
(iv) select * from employee order by salary desc;
Ans.:
1. Relational Database Management System (RDBMS):
An RDBMS is a type of DBMS that stores data in a structured format using tables, rows, and columns.
It follows the principles of relational algebra and allows data to be related using primary and foreign keys.
Examples: MySQL, PostgreSQL, Oracle, SQL Server.
Composite Key:
2. A composite key is a combination of two or more columns that uniquely identifies each row in a table.
It is used when a single column is not enough to ensure uniqueness.
Example: In a Student_Course table, the combination of Student_ID and Course_ID can be a composite key.
Field:
3. A field is a single column in a table, representing a specific piece of data.
Example: In a Students table, fields could be Student_ID, Name, Age, Email.
4. DDL (Data Definition Language) Commands:
DDL commands are used to define and modify database structures (tables, schemas, indexes, etc.).
Common DDL Commands:
CREATE – Creates a new table or database.
ALTER – Modifies an existing table.
DROP – Deletes a table or database.
TRUNCATE – Removes all records from a table but keeps its structure.