BHARATH VIDYA MANDIR
REVISION TEST I
INFORMATICS PRACTICES (065)
DATE: 11.10.2023 MARKS: 70
CLASS: XII BAJRA DURATION: 180 MINS
General Instructions:
1. This question paper contains the sections, Section A to E.
2. All questions are compulsory.
3. Section A has 18 questions carrying 01 mark each.
4. Section B has 7 Very Short Answer type questions carrying 02 marks each.
5. Section C has 5 Short Answer type questions carrying 3 marks each.
6. Section D has 2 questions carrying 04 marks each.
7. Section E has 3 question carrying 05 marks each.
SECTION A (40 MINS) (18*1 = 18 MARKS)
1. For web pages where the information is changed frequently, for example, stock prices, weather information
which out of the following options would you advise?
a. static webpage b. dynamic webpage c. both a and b d. none of the above
2. A networking device that forwards the data packets between computer networks is
a. Repeater b. Hub c. Switch d. Router
3. Physical or logical arrangement of network refers to as ________
a. Routing b. Looping c. Topology d. Networking
4. Which topology in general uses less wire length when compared to others?
a. Star topology b. Ring topology c. Bus topology d. All use same length of wire
5. A collection of hyperlinked documents on the internet forms the
a. World Wide Web (WWW) b. Email system c. Mailing list d. Hypertext Markup Language
6. From which year did the IT Amendment Act, 2008 come into force?
a. 2009 b. 2008 c. 2000 d. 2004
7. Online ____________ is a theft of personal information in order to commit a fraud.
a. Phishing b. Prank c. Identity theft d. All of these
8. Any fraudulent business practice that extracts money from an ignorant person is called.
a. Phishing b. Scam c. Both d. None of these
9. Any information about you created by you that exists in digital form is referred to as.
a. Intellectual property b. Digital property c. Both d. None of these
10. Using someone else’s twitter handle to post something will be termed as.
a. Fraud b. Identity theft c. Online stealing d. Violation
11. Standard security protocol that establish encrypted link between web server and browser is called.
a. Web encryption Technology b. STD Technology
c. Online safety Technology d. Security socket Technology
12. Intellectual property right protects the use of information and idea that are of.
a. Ethical value b. Moral value c. Commercial value d. Social value
13. When the e-waste dumped or thrown in landfills, the chemicals seep into the ___________
and pollutes it.
a. Sea b. Drain c. Soil d. All of these
14. The process of re-selling old electronic goods at lower prices is called.
a. Recycling b. Refurbishing b. Reusing d. All of these
15. Which term identifies a specific computer on the web and the main page of the entire site?
a. WWW b. link c. SQL d.URL
16. The ____________ has issued guidelines for the proper handling and disposal of e-waste.
a. State Pollution Control Board b. Central Pollution Control Board
c. Both d. None of these.
In the following questions a statement of Assertion (A) is followed by a statement of Reason(R), Mark the
correct choice as:
a) Both assertion (A) and reason (R) are true and reason (R) is the correct explanation of assertion (A)
b) Both assertion (A) and reason (R) are true and reason (R) is not the correct explanation of assertion (A)
c) Assertion (A) is true but reason (R) is false
d) Assertion (A) is false but reason (R) is true
17. Assertion (A) Browser is the software to access internet-based web pages in the computer.
Reason (R) Local Area Network (LAN) is a network where two or more computers are connected within 1km.
18. Assertion (A): Cookies are plain text files
Reason (R): Cookies store the profile picture on social media.
SECTION B (30 MINS)(7*2 = 14 MARKS)
19. Explain the term ‘web beacon’.
20. Name the crimes for which cyber laws are enforced strictly in India.
21. What is phishing?
22. Priyanka a beginner in IT field has just started learning web technologies. Help her in understanding the
difference between website and web pages with the help of a suitable general example of each.
23. Murugan wants to send a report on his trip to the North East to his mentor. The report contains images and
videos. How can he accomplish his task through internet?
24. What is the difference among Hub, Switch and Router?
25. Sahil a class X student has just started understanding the basics of internet and web technologies. He is a bit
confused in between the terms world wide web and internet. Help him in understanding both the terms with the
help of suitable examples of each.
SECTION C (50 MINS)(5*3 = 15 MARKS)
26. Differentiate between static and dynamic webpage.
27. Write short notes on applications of internet.
28. Briefly explain about topology.
29. Write short notes on types of networks.
30. Explain the different communication terminologies.
SECTION D (20 MINS)(2*4 = 8 MARKS)
31. You as a network expert have to suggest the best network related solutions for the problems raised in (i) to(iv),
keeping in mind the distances between the buildings and other given parameters.
Shortest distances between various buildings
MUMBAI CAMPUS: ADMIN TO ACCOUNTS 55 m
ADMIN TO EXAMINATION 90 m
ADMIN TO RESULT 50 m
ACCOUNTS TO EXAMINATION 55 m
ACCOUNTS TO RESULT 50 m
EXAMINATION TO RESULT 45 m
DELHI Head Office to MUMBAI campus 2150 m
Number of computers installed at various buildings is as follows:
ADMIN 110
ACCOUNTS 75
EXAMINATION 40
RESULT 12
DELHI HEAD OFFICE 20
(i) Suggest the most appropriate location of the server inside the MUMBAI campus (out of the four buildings) to
get the best connectivity for maximum number of computers. Justify your answer.
(ii) Suggest and draw cable layout to efficiently connect various buildings within the MUMBAI campus for a
wired connectivity.
(iii) Which networking device will you suggest to be procured by the company to interconnect all the computers
of various buildings of MUMBAI campus?
(iv) Company is planning to get its website designed which will allow students to see their results after registering
themselves on its server. Out of the static or dynamic, which type of website will you suggest?
32. Multipurpose Public School, Bengaluru is setting up the network between its different wings in the school
campus. There are 4 wings named as: - SENIOR(S), JUNIOR(J), ADMIN(A) and HOSTEL(H)
Distance between various buildings is as follows:
Hostel to Admin 55m
Admin to Senior 150m
Senior to Junior 160m
Junior to Hostel 60m
Admin to Junior 125m
Senior to Hostel 180m
Number of Computers in each unit:
Admin 25
Junior 100
Senior 15
Hostel 60
(i) Suggest and draw the cable layout to efficiently connect various wings of Multipurpose Public School,
Bengaluru.
(ii) Name the most suitable wing where the servers should be installed. Justify your answer.
(iii) Suggest a device/software and its placement that would provide data security for the entire network of the
school.
(iv) Suggest a device and a protocol that shall be needed to provide wireless internet access to all
smartphone/laptop users in the campus of Multipurpose Public School, Bengaluru.
SECTION E (30 MINS) ( (3*5 = 15 MARKS)
33. Explain in detail about footprints.
34. Paraphrase about networking devices.
35. Brief about:
i) Web Hosting ii) Web browser iii) Add-ons, Plug-In
(LAST 10 Mins for Checking)
PRACTICALS
SUBJECT CODE: 065
SCHOOL CODE: 55474
MAX. TIME: 30 MINS MAX MARKS: 10
QUESTIONS
1. Creating a p ython program for calculating per capita income of four zones using Series.
2. Creating a python program for modifying or updating existing values of series object.
ANSWER KEY
1. For web pages where the information is changed frequently, for example, stock prices, weather information
which out of the following options would you advise.
a. static webpage b. dynamic webpage c. both a and b d. none of the above
2. A networking device that forwards the data packets between computer network
a. Repeater b. Hub c. Switch d. Router
3. Physical or logical arrangement of network refers to as ________
a. Routing b. Looping c. Topology d. Networking
4. Which topology in general uses less wire length compare to other?
a. Star topology b. Ring topology c. Bus topology d. All use same length of wire
5. A collection of hyperlinked documents on the internet forms the
a. World Wide Web (WWW) b. Email system c. Mailing list d. Hypertext Markup Language
6. From which year did the IT Amendment Act, 2008 come into force?
a. 2009 b. 2008 c. 2000 d. 20004
7. Online ____________ is a theft of personal information in order to commit a fraud.
a. Phishing b. Prank c. Identity theft d. All of these
8. Any fraudulent business practice that extract money from an ignorant person is called.
a. Phishing b. Scam c. Both d. None of these
9. Any information about you created by you that exists in digital form is referred to as.
a. Intellectual property b. Digital property c. Both d. None of these
10. Using someone else’s twitter handle to post something will be termed as.
a. Fraud b. Identity Theft c. Online stealing d. Violation
11. Standard security protocol that establish encrypted link between web server and browser is called.
a. Web encryption Technology b. STD Technology
c. Online safety Technology d. Security socket Technology
12. Intellectual property right protect the use of information and idea that are of.
a. Ethical value b. Moral value c. Commercial value d. Social value
13. When the e-waste dumped or thrown in landfills, the chemicals seep into the ___________
and pollutes it.
a. Sea b.Drain c. Soil d. All of these
14. The process of re-selling old electronic goods at lower prices is called.
a. Recycling b. Refurbishing b. Reusing d. All of these
15. Which term identifies a specific computer on the web and the main page of the entire site?
a. WWW b. link c. SQL d.URL
16. The ____________ has issued guidelines for the proper handling and disposal of e-waste.
a. State Pollution Control Board b. Central Pollution Control Board
c. Both d. None of these.
17. B
18.C
19. Picture in email message also called ‘web beacons. A Web beacon gets your computer through an email, or it
can be in a webpage that you visit. Some people might call it “spyware,” in that it’s used to take note of your
online activity, but in most cases (especially with websites) it’s not there to do any harm.
20. i. Cybercrimes ii. Electronic and Digital Signature iii. Intellectual Property iv Data Protection
and Privacy.
21. Phishing is the attempt to acquire sensitive information such as username, password, credit card details etc.
22. The difference between a website and a web page is that a website is a collection of different web pages
containing information on a particular topic. A web page is an individual page of a big website usually containing
more specific information.
23. He can accomplish task by uploading files to a Cloud Storage Services like Google Drive, Drop Box,
OneDrive and sharing them or email them. Murugan can send his report to his mentor through internet.
24. ▪ Hub is least expensive, least intelligent and least complicated of the three and it broadcasts data to every
port which may cause serious security and reliability concern.
▪ Switch works similarly like hub but in a more efficient manner. It creates connections dynamically and
provides information only to the requesting port.
▪ Router is smartest and most complicated out of the three. It comes in all shapes and sizes. Routers are
located at gateway and forwards packets in a network.
25.
SECTION C
26.
27. Applications of Internet:
Following are some of the broad areas or services provided through Internet:
❖ World Wide Web (WWW)
❖ Electronic mail (Email)
❖ Chat
❖ Voice Over Internet Protocol (VoIP)
28. Network Topologies:
The term Topology refers to the way/layout in which the various nodes or computers of a
network are linked together.
The following factors are considered while selecting a topology:
➢Cost
➢Reliability
➢Bandwidth Capacity
➢Ease of installation
➢Ease of Troubleshooting
➢Star Topology
❖ The physical star Topology uses a central controlling hub with dedicated legs
pointing in all directions – like points of a star.
❖ Each network device has a dedicated point-to-oint link to the central hub.
❖ There is no direct link between these computers and the computers can
communicate via central controller only.
➢Bus Topology
❖ It consists of one continuous length of cable (trunk) that is shared by all the nodes
in the network and a terminating resistor (terminator) at each end that absorbs the
signal when it reaches the end of line.
❖ Without a terminator the electrical signal would reach the end of copper wire and
bounce back, causing errors on the network.
❖ Data communication message travels along the bus in both directions until it is
picked up by a workstation or server NIC.
❖ If the message is missed or not recognized, it reaches the end of the cabling and
dissipates at the terminator. Bus Network Topology requires a multipoint
connection.
➢Tree Topology
❖ This topology has Hierarchical structure.
❖ This topology connects the node via hubs. Hub, which is present at top level, is
called root hub or active hub.
❖ Another hub is called secondary hub or passive hub.
➢Mesh Topology:
❖ In mesh each node is connected to every other node in the network i.e. each node has a
dedicated point to point link to every other node as shown.
❖ Dedicated means that the link carries the traffic only between two devices it connects.
❖ In this way there exist multiple paths between two nodes of the network.
❖ In case of failure of one path, the other one can be used.
29. Types of Networks:
❖ Local Area Network (LAN)
❖ Metropolitan Area Network (MAN)
❖ Wide Area Network (WAN)
❖ Personal Area Network (PAN)
➢LAN:
❖ Use in small local area, like in an institute or an organization.
❖ Devices are connected via physical medium.
❖ Limited distance, up to 150 Meter.
❖ Example – Intranet
➢MAN:
❖ Larger than LAN.
❖ Used in Metropolitan cities.
❖ Range up to 50 KM.
➢WAN:
❖ It connects device across globe.
❖ It uses public network
❖ Internet
❖ BSNL
❖ VSNL
➢PAN:
❖ For very small distance
❖ Private Communication
❖ Example: Bluetooth
30. Communication Terminologies.
❖ Channel: A channel is a separate path through which signals can flow. Achannel has a certain capacity for
transmitting information, often measured by its bandwidth in Hz or its data rate in bits per second.
❖ Bandwidth: Bandwidth refers to the amount of information that can be transmitted over a network in a given
amount of time, usually expressed in bits per second or bps.
❖ Data Transfer Rate: The data transfer rate of a computer network connection is normally measured in units of
bits per second (bps).
Larger units are Kbps, Mbps and Gbps, KBps, MBps,GBps
bps means bits per second.
Bps means Byte per second
1 kilobit per second (Kbps) = 1000 bits per second (bps).
1 megabit per second (Mbps) = 1000 Kbps or 10002 bps.
1 gigabit per second (Gbps) = 1000 Mbps
1 Terabit per second (Tbps) = 1000 Gbps
SECTION D
31.
32.
SECTION E
33. What is a Digital Footprint?
➢A digital footprint is an impact you create on the Web through your online activity,
which incorporates browsing, interactions with others, and publication of content.
➢In other words, it can be considered as the data trail – intentional and unintentional - you
leave behind while you surf the Web or Internet.
➢Digital footprint or digital shadow refers to the trail of data left behind through the
utilization of the Web or on digital devices.
➢The digital footprint of any person can have a positive as well as a negative impact on
him.
How Digital Footprints are created?
Find some of the examples of digital footprints:
➢Visiting Websites and Online Shopping
➢Online Searching
➢Posting on social media, blogs, etc.
➢Online Image and Video Upload
➢Communicating Online (Ex: - Chat, Email, etc.)
➢Any activity you perform Online etc.
Types of Digital Footprints:
Active and Passive Digital Footprints.
➢Active digital footprints: -Active digital footprints are those data trails that a person
leaves intentionally on the Web.
Ex: - Twitter, blog posts, Facebook, social network connections, image and video
uploaded on Internet, phone calls, email, and chats are among the ways people create
active digital footprints.
➢Passive digital footprints: - This suggests that a passive footprint would be defined as
the unintentional traces of data that an individual creates on the Web.
Ex: -Website visits and actions, searches, and online purchases are among the activities
that add passive data traces to a digital footprint.
Positive and Negative Digital Footprints.
Positive digital Footprints: -That reflects your Positive Personality.
➢Increased opportunity
➢Higher profits
➢Less risk
➢Gentler treatment
Negative digital footprints: - Things that reflect your Negative Personality sort of a drunken
photo, a silly comment, logging on to an inappropriate website.
➢Fewer Opportunities (like Admission, Job, etc.)
➢Negative Personal Image
How Digital Footprints can affect you?
➢Privacy Issues: Digital footprints are a privacy concern because they're a group of
traceable actions, contributions, and concepts shared by users. They are often tracked and
may allow internet users to find out about human actions.
➢Cyber Vetting: where interviewers could research about the applicants before the
interview based on their online activities on the Web.
➢Target advertisement: It is used by marketers so as to seek out what products a user is
curious about or to inspire ones' interest during a certain product that supported similar
interests.
➢Less/More Opportunities depends upon your Positive/Negative Digital Footprints.
How can you manage your Digital Footprint?
➢Though it is not possible to fully hide your digital footprints, you can follow some of the
given techniques to manage your digital footprints.
➢You can search your name on different search engines and they provide you facilities
where you can set up an alert for future notifications when your name searched online
➢Have different email addresses, so professional and private accounts aren't automatically
related to each other
➢You can change privacy settings on social media accounts where you do not make more
things public. But you should not trust them completely because your data is still with
those platforms.
➢Exercise caution altogether our activities, and refrain from oversharing
34.
35. Web Hosting:
❖ online service that enables user to publish website or web application on the internet.
❖ When user sign up for a hosting service, basically rent some space on a server on
which user can store all the files and data necessary for website to work properly.
❖ A server is a physical computer that runs without any interruption so that website is
available all the time for anyone who wants to see it.
➢Web Browser:
❖ it is a special software that enables the user to read/view the web page and jump from
one web page to another.
❖ Mosaic was the first web browser developed by the National Centre for
Supercomputing Application (NCSA).
❖ eg. Microsoft Edge,Mozilla Firefox, Google Chrome,Opera etc.