Informatics Practices Class: XII Open Teaching & Learning Materials Question‐wise & Year‐wise Collection of Questions from CBSE ‟ s AISSCE Question Papers & solutionsbasedon Marking Scheme (2011 to 2018) For free distribution NOT FOR COMMERCIAL USE Compiled By: Praveen Kumar Yadav PGT (Comp.Sc.) Kendriya Vidyalaya Sawai Madhopur (Jaipur) [email protected] Question Bank (2011‐201 8) With Solutions Question‐wise & Year‐wise Collection of Questions from CBSE ‟ s AISSCE Question Papers & solutions from 2011 to 2018
CBSE Question Bank with Solutions – Class XII (IP) 2 | P a g e CLASS XII- Informatics Practices (065) CBSE QUESTION BANK (2011‐1 8) [Question‐wise & Year‐wise Collection of Questions from CBSE ‟ s AISSCE Question Paper (2011‐201 8)] Compiled By: Praveen Kumar Yadav, PGT(CS), KV Sawai Madhopur (Jaipur) Question No.1 (10 Marks) Year - 2011 M (a) Q. Ms. Kant Sengupta wants to prevent unauthorized access to/from his company ‟ s local area network. Write the name of a system (software/hardware), which he should install to do the same. 1 A. Firewall or Intrusion Detection System (b) Q. Seven Brother Fashion Inc. is a fashion company with design unit and market unit 130 meters away from each other. The company recently connected their LANs using Ethernet cable to share the stock related information. But, after joining their LANs, they are not able to share the information due to loss of signal in between. Which device out of the following should you suggest to be installed for a smooth communication? (i) Modem (ii) Repeater (iii) UPS 1 A. (ii) Repeater (c) Q. Which of the following is not a feature of Networking? (i) Resourcesharing (ii) Reliability (iii) Uninterrupted power supply (iv) Reduced cost 1 A. (iii) Uninterrupted power supply (d) Q. Name any two Indian scripts included in Unicode. 1 A. Devnagari, Bengali, Gurmukhi, Gujarati, Kannada, Malayalam, Oriya, Tamil, Telugu (e) Q. Mr. Vidya Chauhan is confused between Proprietary and Open source software. Mention at least two points of differences to help her understand the same. 2 A. (f) Q. Identify the type of topology from the following: (i) In it, each node is connected with the help of a single co-axial cable. (ii) In it, each node is connected with the help of independent cable with the help of a central switching (communication controller). 2 A. (i) Bus Topology (ii) Star Topology (g) Q. Define the following with reference to Threats to network security. (i) Worm (ii) Trojan Horse 2 A. (i) Worm : Self-replicating malware without user intervention Consumes high volume of bandwidth leading to Denial of service (DoS) (ii) Trojan Horse Appears to perform a desirable function for the user Steals information through a 'backdoor' /Records browsing activities without the knowledge of the user Causes system crash or freeze
CBSE Question Bank with Solutions – Class XII (IP) 3 | P a g e Year - 2012 M (a) Q. Raj kamal International school is planning to connect all computers, each spread over distance within 45 meters. Suggest an economical cable type having high-speed data transfer, which can be used to connect these computers.
- Spring '20
- IP address, Switch statement