Information Technology – Solved Paper PYQs - CBSE Board 2022
CBSE Board 2022 — Complete solved paper (MCQs + Subjective answers)
SECTION A: Employability Skills (5 Marks)
-
1. Name the person who creatively combines factors to generate value for customers and create wealth.Answer: EntrepreneurExplanation: An entrepreneur creatively arranges factors of production to generate customer value and wealth.
-
2. Name the skill that helps someone lead, guide, and supervise people working in a business.Answer: Managerial Skill (Leadership Skill)Explanation: Managerial skill enables a person to lead, guide and oversee employees effectively.
-
3. Name any two elements of nature.Answer: Water and AirExplanation: Elements of nature include water, air, fire, earth and sky.
-
4. Give one method to promote sustainable development.Answer: RecyclingExplanation: Recycling reduces waste and conserves resources, promoting sustainability.
-
5. Differentiate Agricultural Entrepreneurship and Small Scale Entrepreneurship in one point.Answer:
- Agricultural entrepreneurship involves agriculture-related activities such as farming and processing.
- Small scale entrepreneurship operates small manufacturing or service-related businesses.
-
6. Explain any one of 4Rs and 1U to contribute to a sustainable society.Answer: ReduceExplanation: Reduce means minimizing resource use and consumption to lessen environmental impact.
SECTION B: Subject-Specific Questions (12 Marks)
-
7. Name the organization that provides Internet access via dial-up, direct, or wireless connection.Answer: Internet Service Provider (ISP)Explanation: ISP provides Internet access services through different connection methods.
-
8. Name the software or hardware security device that analyzes network traffic to allow or block it.Answer: FirewallExplanation: A firewall monitors and controls incoming/outgoing traffic based on rules.
-
9. Name the immediate assistance given to an injured person to save life until medical help arrives.Answer: First AidExplanation: First Aid prevents death or further injury until professional help arrives.
-
10. What is it called when primary key constraints are applied on one or more columns?Answer: Composite KeyExplanation: A primary key made of two or more columns is a composite key.
-
11. What is the name of a row representing a single data item in a table?Answer: Record or TupleExplanation: A record (tuple) is a single row containing related data items.
-
12. Explain the term Sorting.Answer: SortingExplanation: Sorting arranges data in an order (ascending/descending) for easier search and analysis.
-
13. Write any four rules to create a strong password.Answer:
- Use uppercase and lowercase letters.
- Include numbers and special characters.
- Avoid easily guessable information (e.g., birthdays).
- Use at least 8 characters.
-
14. What is the special name for discussion-style sites used by non-technical/technical users to create personal web pages? Give two examples.Answer: Blogging Platforms or Discussion ForumsExamples: WordPress, Blogger
-
15. Differentiate between LAN and WAN in two points.Answer:
- LAN (Local Area Network) covers a small geographical area like a home or office.
- WAN (Wide Area Network) covers large geographical areas, connecting multiple LANs.
-
16. Explain any two types of relationships that can be created between tables.Answer:
- One-to-One: Each record in Table A matches one record in Table B.
- One-to-Many: One record in Table A matches multiple records in Table B.
-
17. What is the difference between Form and Reports?Answer:
- Form: Used to enter or view data interactively.
- Report: A formatted, read-only view of data for presentation.
-
18. Identify any two column names and their data types from the PLAYER table.Answer:
- PID: Text / String (Player ID)
- RUNS: Integer (Number of runs scored)
SECTION C: Competency-Based Questions (8 Marks)
-
19. Aryan is worried because someone withdrew all money from his uncle's bank without giving ATM card. Answer the following:
-
(a) Suggest a way to assure secure online transactions.
Use Two-Factor Authentication (2FA) and transact only on secure sites (https).
-
(b) Name the software needed to protect his computer from malware.
Antivirus / Anti-malware software
-
(c) Help him understand phishing.
Phishing is a fraudulent attempt to obtain sensitive information by pretending to be a trustworthy source.
-
(d) Explain how cookies can harm him.
Cookies can track browsing habits and store personal info which may be misused if leaked.
-
(a) Suggest a way to assure secure online transactions.
-
20. Due to the pandemic, internet kept everyone connected.
-
(a) What is World Wide Web? Name two web browsers.
WWW is a system to access and share information using web pages over the Internet.
Examples: Google Chrome, Mozilla Firefox -
(b) Explain how data is transferred over the internet.
Data is broken into packets, sent using protocols (like TCP/IP), and reassembled at the destination.
-
(a) What is World Wide Web? Name two web browsers.
-
21. Consider the STUDENT table below and write SQL commands:
ADMNO NAME GRADE DOB MARKS HOUSE GENDER 1001 RUPAL 9 10/04/2006 76 GREEN M 1002 RASHMI 9 08/12/2005 87 RED F 1003 ARNAV 10 25/05/2004 81 GREEN M 1004 SUMONA 9 23/08/2005 68 RED F 1005 ARUN 9 16/07/2005 72 GREEN M 1006 TIA 9 22/09/2005 91 BLUE F 1007 ROSHAN 10 26/08/2004 89 BLUE M SQL Commands:-- (a) Display all students of Green House: SELECT * FROM STUDENT WHERE HOUSE = 'GREEN'; -- (b) Increase marks by 5 for ADMNO 1005: UPDATE STUDENT SET MARKS = MARKS + 5 WHERE ADMNO = 1005; -- (c) Display all students with marks less than 80: SELECT * FROM STUDENT WHERE MARKS < 80; -- (d) Display all students in descending order by marks: SELECT * FROM STUDENT ORDER BY MARKS DESC;
Definitions for Visually Impaired Students
(a) Database Management System (DBMS)
Answer: A software system that manages databases—enables creation, retrieval, update, and administration of data.
(b) Primary Key
Answer: A unique attribute or set of attributes that uniquely identify a record in a table.
(c) Numeric Data Type
Answer: Data types used to store numbers, such as integer, float, and decimal.
(d) Referential Integrity
Answer: A property ensuring relationships between tables remain consistent — foreign keys must match primary keys.