Class 10 IT Code 402 Term 2 Board Question Paper Answer key

CLASS 10 – INFORMATION TECHNOLOGY CODE- 402

CBSE TERM 2 BOARD EXAMINATION 2022

ANSWER KEY / SOLUTION OF IT 402 TERM 2

SECTION – A

1. Name the person who combines the factors in a creative manner to generate value for customers and create wealth.

Answer: Entrepreneur

2. Name the skill that helps anyone to lead, guide, and supervise people who work for business.

Answer: Leadership

3. Name any two elements of nature.

Answer: Five elements of nature – Prithvi (Earth), Agni (Fire), Jal (Water), Vaayu (Air), Aakash (Space)

4. Give any method that we can adopt to promote Sustainable Development.

Answer: The driving force to promote Sustainable Development:

i. Protecting and living in harmony with the Nature

ii. Considering all human beings as equal

iii. Promoting good governance

iv. Using Science & Technology responsibly

v. Creating a healthy, social, and economically viable society

5. Differentiate between agricultural entrepreneurship and Small Scale Entrepreneurship with one point only.

Answer: Agricultural Entrepreneurship can be defined as being primarily related to the marketing and production of inputs and products used in agricultural activities.

Small scale entrepreneurship refers to starting industries in which manufacturing, trading, providing services, and productions are done on a small scale or micro scale.

6. In our daily life, we can contribute to create a Sustainable Society by Following 4Rs and 1U of sustainability. Explain any one out of 4R’s and 1 U.

Answer: 4Rs’ and 1U of Sustainability means – REFUSE, REDUCE, REUSE, RECYCLE and UPCYCLE.

REFUSE: To create a sustainable environment, we must first REFUSE to use products that may harm the environment.

REDUCE is the next step, that is minimizing the use of the products that may cause harm to the environment.

We must REUSE these products as far as possible, in order to reduce the waste generation.

Next comes RECYCLE. After reusing the product, we must try to recycle it as far as possible

UPCYCLE: Upcycling allows the scope of human skills upcycles any product that is not usable with innovation.

SECTION – B

7. _______ is an organization which provides you with access to the internet via dial-up or direct or wireless connection.

Answer: ISP

8. Name the software or hardware security device that analyzes the network traffic and determines if the traffic should be allowed or not.

Answer: Firewall

9. ___________ immediate assistance is provided to the injured to save life and minimize health loss till the proper medical aid/facility is provided.

 Answer: First Aid

10. When the primary key constraint is applied to one or more columns in a table is known as __________

Answer: Composite Primary Key

11. A row that represents a single, data item in a table is known as ____________

Answer: Tuple or Record

12. Explain the term sorting.

Answer: Sorting refers to arranging the table data in increasing (ascending) or decreasing (descending) order.

13. With any four rules which are to be followed for creating strong passwords.

Answer: Rules for strong passwords-

• Keep the length of the password at least 12-14 characters if permitted.

• Avoid keeping passwords based on repetition, dictionary words, letter or number sequences, usernames, relative or pet names, etc.

• Including numbers, and symbols in passwords if allowed.

• Use capital and lower-case letters.

• Avoid using the same password for multiple sites or purposes.

• Avoid using something that the public or workmates know you strongly like or dislike.

14. What is the special name given to the discussion style site used by non-technical (or technical) users for creating personal web pages? Give any two examples of websites that help to create such discussion-style sites for free.

Answer: Blog
Websites helps to create discussion style sites (blog) are : www.wordpress.com,
www.wix.com, www.blogger.com , www.blog.com, www.weebly.com

15. Differentiate between LAN and WAN with two points only.

Answer: LAN vs WAN

LAN: A local area network (LAN) is one that connects computers and devices in a limited geographical area up to 1 KM such as a home, school, computer laboratory, office building, or closely positioned group of buildings.

WAN: A Wide Area Network (WAN) is a group of computers spread across countries. WAN is an interconnection of several smaller LANs, to form a big network. The WAN link computers to facilitate a fast and efficient exchange of information at lesser costs and higher speeds.

16. Explain any two types of relationships that can be created in tables.

Answer: Three types of relationships can be created in OpenOffice.org Base. These are:
1. One to One
2. One to Many or Many to One
3. Many to Many

17. What is the difference between forms and reports?

Answer: Difference between Forms & Reports-

Forms : Form is an interface in a user-defined layout that lets users view, enter and change data directly in database objects like tables. A Form provides users with a systematic way to storing information in the database.

Reports: A database reports the formatted result of data coming from database objects like tables or queries. A report helps to display the data in a summarized manner.

18. Identify any two-column name/attribute and their data types from a given table : PLAYER

Table: PLAYER

PIDPNAMERUNSGENDERDOB
P101Sachin13000M10/04/2001
P102Kapil7000M12/02/1998
P103Saurabh12000M13/04/2001
P104Virat12500M17/03/2005

 Answer:

COLUMN NAMEDATATYPESCONSTRAINT
PIDCHAR / VARCHAR / TEXT 10PRIMARY KEY
PNAMECHAR / VARCHAR / TEXT (20)
RUNSNUMBER / INT / SMALLINT (3)
GENDERCHAR(1) OR TEXT(1) OR VARCHAR(1)
DOBDATE 

19 Aryan is too much worried when he came to know that someone has withdrawn all money from his uncle’s bank account. He was not able to understand how this could happen when he has not given his ATM card to anyone.

(a) Suggest to him a way by which he can be assured that he is doing secured online transactions.

Answer: By checking the lock pad icon and protocol. URL must start with https:// protocol.

(b) Which type of software he needs to install on his computer to protect his computer from malware?

Answer:  Antivirus and Antispyware software

(c) Help him to understand about phishing.

Answer: Phishing (pronounced: fishing) is an attack that attempts to steal your money, or your identity, by getting you to reveal personal information — such as credit card numbers, bank information, or passwords — on websites that pretend to be legitimate.

(d) He also thinks cookies are harmless. Explain to him how cookies can also cause harm to him.

Answer: Cookies are programs that are created on your local computer when you visit websites.

Cookies are meant for storing data based on activity performed during earlier visits. Cookies stores login details, details of a shopping cart, visited pages on a website, etc.   

They could be also tracked by unauthorized users and possibly gain access to personal information

20 Due to the pandemic everyone was bound to stay at home. But, due internet the whole world was connected.

(a) What is meant by the World Wide Web? Also, write any two web browser names that you know.

Answer: World Wide Web (WWW or W3), which is also known as a Web, is a collection of websites or web pages stored on web servers and connected to local computers through the internet. These websites contain text pages, digital images, audio, videos, etc. Users can access the content of these sites from any part of the world over the internet using their devices such as computers, laptops, cell phones, etc.

Two popular web browsers are: Google Chrome, Microsoft Edge, Opera, and Mozilla Firefox

(b) Explain how data is transferred over the internet.

Answer: The data is transferred on the internet with the help of TCP/IP protocol.

1. TCP protocol divides the data or information on the internet into small packets. Each packet is sent from computer to computer until it finds its destination. Each computer on the way decides where the next packet to be sent. All packets may have different routes.

2. Once the packet reaches to its destination, the packet will be examined. If any packets are missing or damaged, a message for sending it again will be sent. This process continues till all packets have been received.

3. Finally all the packets are reassembled into the original form.

21. Consider the following table: Student

ADMNONAMEGRADEDOBMARKSHOUSEGENDER
1001RUPAL910/04/200676GREENM
1002RASHMI908/12/200587REDF
1003ARNAV1025/05/200481GREENM
1004SUMONA923/08/200568REDF
1005ARUN916/07/200572GREENM
1006TIA922/09/200591BLUEF
1007ROSHAN1026/08/200589BLUEM

Write SQL Commands:

(a) To display the details of all students of Green House.

Answer: SELECT * FROM STUDENT WHERE HOUSE=’GREEN’;

(b) To increase marks by 5 whose ADMNO is 1005.

Answer: UPDATE STUDENT SET MARKS=MARKS+5 FROM STUDENT WHERE ADMNO=1005;

(c) To display details of all students whose MARKS are less than 80.

Answer: SELECT * FROM STUDENT WHERE MARKS < 80;

(d) Display the list of all students in descending order of MARKS.

Answer:  SELECT * FROM STUDENT ORDER BY MARKS DESC;

For Visually Impaired Students:

21. Define the following :

(a) Database Management System

(b) Primary Key

(c) Numeric Data Type

(d) Referential Integrity

Answer:

(a) Database Management System: Database Management System is a software which allow to manage interrelated data items. It allows to create, update, insert, delete and fetch the record.

(b) Primary Key :  Primary key is an attribute of table, which helps in uniquely identify the record. A table has only one primary key.

(c) Numeric Data type: Numeric data type allow to enter numeric value i.e number.

(d) Referential Integrity : Referential Integrity is the rules of DBMS, which ensure that no one will delete or update any related records accidently in the related table.

You cannot copy content of this page

Scroll to Top