Sample Model Question Paper (Information Technology) - SET 1
ANNUAL EXAMINATION 2025-26
Total Marks: 50
Time: 2 Hours
General Instructions:
- All questions are compulsory.
- The question paper is divided into two parts:
- Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
- Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
- Write answers clearly and concisely within the specified word limits for Part B.
- Use of calculators is not permitted.
Part A: Objective Type Questions (24 Marks)
Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)
Which of the following is a feature of a NoSQL database?
A. Uses fixed schema
B. Supports SQL queries only
C. Handles unstructured data
D. Requires relational tablesIn Python, which module is used for interacting with a relational database?
A. pandas
B. sqlite3
C. numpy
D. matplotlibThe primary function of a DNS server is to:
A. Encrypt network traffic
B. Translate domain names to IP addresses
C. Store email data
D. Route network packetsWhich of the following is a characteristic of a public cloud?
A. Dedicated hardware for a single user
B. Shared resources among multiple users
C. On-premise infrastructure
D. No internet connectivityIn object-oriented programming, the concept of hiding internal details is called:
A. Inheritance
B. Polymorphism
C. Encapsulation
D. AbstractionWhich protocol ensures secure data transfer over the internet?
A. HTTP
B. FTP
C. HTTPS
D. SMTPThe time complexity of a binary search algorithm is:
A. O(n)
B. O(log n)
C. O(n²)
D. O(1)Which of the following is a distributed version control system?
A. SVN
B. Git
C. Mercurial
D. Both B and CIn a relational database, a foreign key is used to:
A. Uniquely identify a record
B. Establish a relationship between tables
C. Store duplicate data
D. Index a tableWhich of the following is a common attack vector in cybersecurity?
A. SQL injection
B. Data encryption
C. Two-factor authentication
D. Firewall configurationThe full form of VLAN is:
A. Virtual Local Area Network
B. Variable Local Area Network
C. Virtual Link Access Network
D. Verified Local Access NetworkWhich of the following is an example of a machine learning algorithm?
A. Bubble sort
B. Decision tree
C. Linear search
D. Dijkstra’s algorithmIn a spreadsheet, the function to find the highest value in a range is:
A. SUM
B. MAX
C. AVERAGE
D. COUNTWhich of the following is a blockchain feature?
A. Centralized control
B. Immutable ledger
C. Temporary storage
D. Single-point failureThe full form of CSS in web development is:
A. Computer Style Sheet
B. Cascading Style Sheet
C. Creative Style Sheet
D. Centralized Style SheetIn Python, which keyword is used to handle exceptions?
A. try
B. catch
C. throw
D. errorThe device that converts digital signals to analog and vice versa is:
A. Router
B. Switch
C. Modem
D. HubWhich of the following is a benefit of virtualization?
A. Increased hardware costs
B. Improved resource utilization
C. Reduced scalability
D. Higher energy consumptionThe process of verifying the identity of a user is called:
A. Authorization
B. Authentication
C. Encryption
D. CompressionWhich of the following is an open-source database management system?
A. Oracle
B. MySQL
C. Microsoft SQL Server
D. IBM DB2In networking, the term DHCP stands for:
A. Dynamic Host Configuration Protocol
B. Direct Host Control Protocol
C. Dynamic Hyperlink Configuration Protocol
D. Distributed Host Control ProtocolWhich of the following is a type of ransomware?
A. Firewall
B. WannaCry
C. Antivirus
D. VPNThe shortcut key to paste text in a document is:
A. Ctrl + C
B. Ctrl + V
C. Ctrl + X
D. Ctrl + ZWhich of the following is used to create dynamic web pages?
A. HTML
B. CSS
C. JavaScript
D. XML
Part B: Subjective Type Questions (26 Marks)
20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)
Define a NoSQL database and give one example.
What is the difference between a static and dynamic IP address?
Explain the term "hashing" in the context of data security.
What is the purpose of a foreign key in a relational database?
Define machine learning and name one application.
What is the role of a router in a network?
Explain the term "API" with an example.
50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)
Explain the role of encryption in securing data transmission over the internet.
Describe the steps to write a Python program to connect to a MySQL database.
Explain the difference between client-server and peer-to-peer network architectures.
Discuss the importance of version control systems and suggest two tools used for it.
Sample Model Question Paper (Information Technology) - SET 2 (Annual Examination 2025-26)
Total Marks: 50
Time: 2 Hours
General Instructions:
- All questions are compulsory.
- The question paper is divided into two parts:
- Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
- Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
- Write answers clearly and concisely within the specified word limits for Part B.
- Use of calculators is not permitted.
Part A: Objective Type Questions (24 Marks)
Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)
Which database model organizes data in a hierarchical structure?
A. Relational
B. NoSQL
C. Hierarchical
D. NetworkIn Python, which library is used for data visualization?
A. pandas
B. numpy
C. matplotlib
D. requestsThe primary function of a load balancer in networking is to:
A. Encrypt data
B. Distribute network traffic
C. Store data packets
D. Authenticate usersWhich of the following is a key characteristic of a hybrid cloud?
A. Fully on-premise infrastructure
B. Combination of public and private clouds
C. No internet access
D. Single-user accessIn object-oriented programming, reusing code from one class in another is called:
A. Encapsulation
B. Inheritance
C. Polymorphism
D. AbstractionWhich protocol is used for secure file transfer?
A. FTP
B. SFTP
C. HTTP
D. SMTPThe time complexity of a merge sort algorithm is:
A. O(n)
B. O(n log n)
C. O(n²)
D. O(1)Which of the following is a decentralized network technology?
A. SQL Server
B. Blockchain
C. MySQL
D. MongoDBIn a relational database, a candidate key is:
A. A field with duplicate values
B. A field that can uniquely identify a record
C. A field that links two tables
D. A field with null valuesWhich of the following is a common cybersecurity vulnerability?
A. Cross-site scripting (XSS)
B. Data backup
C. Encryption
D. FirewallThe full form of MAN is:
A. Main Area Network
B. Metropolitan Area Network
C. Medium Access Network
D. Mobile Area NetworkWhich of the following is an unsupervised learning algorithm?
A. Linear regression
B. K-means clustering
C. Logistic regression
D. Decision treeIn a spreadsheet, the function to find the average of a range of cells is:
A. SUM
B. AVERAGE
C. COUNT
D. MINWhich of the following is a key feature of IoT systems?
A. Manual data processing
B. Real-time data collection
C. Fixed software
D. Single-device operationThe full form of XML is:
A. Extended Markup Language
B. External Markup Language
C. Extensible Markup Language
D. Extra Markup LanguageIn Python, which keyword is used to create a function?
A. class
B. def
C. func
D. lambdaThe device that connects multiple devices within a single network is:
A. Router
B. Switch
C. Modem
D. GatewayWhich of the following is a benefit of serverless computing?
A. Manual server management
B. Automatic scaling
C. Fixed resource allocation
D. Increased hardware costsThe process of validating user credentials is called:
A. Authorization
B. Authentication
C. Encryption
D. TokenizationWhich of the following is an open-source content management system?
A. WordPress
B. Wix
C. Squarespace
D. ShopifyIn networking, the term ARP stands for:
A. Address Resolution Protocol
B. Access Resolution Protocol
C. Address Routing Protocol
D. Authentication Resolution ProtocolWhich of the following is a type of malware that encrypts files and demands payment?
A. Virus
B. Ransomware
C. Spyware
D. AdwareThe shortcut key to cut selected text in a document is:
A. Ctrl + C
B. Ctrl + V
C. Ctrl + X
D. Ctrl + ZWhich of the following is used to create interactive web applications?
A. HTML
B. CSS
C. JavaScript
D. XML
Part B: Subjective Type Questions (26 Marks)
20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)
Define a database management system and give one example.
What is the difference between a hub and a switch in networking?
Explain the term "cryptography" in the context of data security.
What is the purpose of a unique key in a database?
Define Internet of Things (IoT) and name one application.
What is the role of a gateway in a network?
Explain the term "microservices" with an example.
50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)
Explain the role of intrusion detection systems in network security.
Describe the steps to write a Python program to perform CRUD operations in a MySQL database.
Explain the difference between monolithic and microservices architecture.
Discuss the importance of ethical hacking and suggest two methods used in it.
Sample Model Question Paper (Information Technology) - SET 3 (Annual Examination 2025-26)
Total Marks: 50
Time: 2 Hours
General Instructions:
- All questions are compulsory.
- The question paper is divided into two parts:
- Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
- Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
- Write answers clearly and concisely within the specified word limits for Part B.
- Use of calculators is not permitted.
Part A: Objective Type Questions (24 Marks)
Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)
Which database model uses a graph-based structure for data representation?
A. Relational
B. Hierarchical
C. Graph
D. NetworkIn Python, which library is used for numerical computations?
A. pandas
B. numpy
C. matplotlib
D. seabornThe primary function of a proxy server is to:
A. Store data
B. Act as an intermediary between client and server
C. Encrypt network traffic
D. Authenticate usersWhich of the following is a characteristic of edge computing?
A. Centralized data processing
B. Data processing at the network edge
C. High latency
D. Limited scalabilityIn object-oriented programming, the concept of defining multiple forms of a method is called:
A. Encapsulation
B. Inheritance
C. Polymorphism
D. AbstractionWhich protocol is used for secure remote access to a server?
A. FTP
B. SSH
C. HTTP
D. SMTPThe time complexity of a quicksort algorithm in the average case is:
A. O(n)
B. O(n log n)
C. O(n²)
D. O(1)Which of the following technologies is used for cryptocurrency transactions?
A. SQL
B. Blockchain
C. XML
D. JSONIn a relational database, a referential integrity constraint ensures:
A. No duplicate records
B. Valid foreign key values
C. Unique primary keys
D. Non-null valuesWhich of the following is a common web application vulnerability?
A. Cross-site request forgery (CSRF)
B. Data encryption
C. Two-factor authentication
D. Secure socket layerThe full form of PAN is:
A. Personal Area Network
B. Public Access Network
C. Private Area Network
D. Personal Authentication NetworkWhich of the following is a reinforcement learning algorithm?
A. K-nearest neighbors
B. Q-learning
C. Linear regression
D. Decision treeIn a spreadsheet, the function to find the minimum value in a range is:
A. SUM
B. MIN
C. AVERAGE
D. COUNTWhich of the following is a key feature of smart devices in IoT?
A. Manual control only
B. Interconnectivity and automation
C. Fixed firmware
D. Single-purpose functionalityThe full form of JSON is:
A. JavaScript Object Notation
B. Java Standard Object Notation
C. JavaScript Online Notation
D. Java System Object NotationIn Python, which keyword is used to inherit a class?
A. extends
B. inherits
C. class
D. No keyword neededThe device that connects two different network protocols is:
A. Router
B. Switch
C. Gateway
D. HubWhich of the following is a benefit of cloud-native applications?
A. Limited scalability
B. High dependency on hardware
C. Rapid deployment and scalability
D. Increased maintenance costsThe process of assigning roles to users for resource access is called:
A. Authentication
B. Authorization
C. Encryption
D. TokenizationWhich of the following is an open-source web server software?
A. Apache
B. IIS
C. Oracle WebLogic
D. IBM WebSphereIn networking, the term VPN stands for:
A. Virtual Private Network
B. Virtual Public Network
C. Verified Private Network
D. Virtual Protocol NetworkWhich of the following is a type of spyware?
A. Keylogger
B. Firewall
C. Antivirus
D. VPNThe shortcut key to redo an action in a document is:
A. Ctrl + Z
B. Ctrl + Y
C. Ctrl + C
D. Ctrl + XWhich of the following is used to manage asynchronous tasks in JavaScript?
A. HTML
B. Promises
C. CSS
D. XML
Part B: Subjective Type Questions (26 Marks)
20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)
Define a graph database and give one example.
What is the difference between a router and a gateway in networking?
Explain the term "tokenization" in the context of data security.
What is the purpose of a clustered index in a database?
Define deep learning and name one application.
What is the role of a load balancer in a network?
Explain the term "serverless computing" with an example.
50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)
Explain the role of penetration testing in cybersecurity.
Describe the steps to write a Python program to perform data visualization using matplotlib.
Explain the difference between relational and non-relational databases with examples.
Discuss the importance of data encryption and suggest two encryption methods.
Sample Model Question Paper (Information Technology) - SET 4 (Annual Examination 2025-26)
Total Marks: 50
Time: 2 Hours
General Instructions:
- All questions are compulsory.
- The question paper is divided into two parts:
- Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
- Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
- Write answers clearly and concisely within the specified word limits for Part B.
- Use of calculators is not permitted.
Part A: Objective Type Questions (24 Marks)
Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)
Which database model organizes data as key-value pairs?
A. Relational
B. NoSQL
C. Hierarchical
D. NetworkIn Python, which library is used for data manipulation and analysis?
A. numpy
B. pandas
C. matplotlib
D. seabornThe primary function of a DHCP server is to:
A. Resolve domain names
B. Assign IP addresses dynamically
C. Encrypt network traffic
D. Route data packetsWhich of the following is a feature of a private cloud?
A. Shared resources with public access
B. Dedicated infrastructure for an organization
C. Limited scalability
D. No security measuresIn object-oriented programming, the process of simplifying complex systems is called:
A. Encapsulation
B. Inheritance
C. Polymorphism
D. AbstractionWhich protocol is used for secure web browsing?
A. HTTP
B. FTP
C. HTTPS
D. SMTPThe time complexity of a bubble sort algorithm is:
A. O(n)
B. O(n log n)
C. O(n²)
D. O(1)Which of the following is a distributed computing framework?
A. Apache Hadoop
B. MySQL
C. Oracle
D. MongoDBIn a relational database, a primary key ensures:
A. Duplicate records
B. Unique identification of records
C. Null values
D. Multiple foreign keysWhich of the following is a type of man-in-the-middle attack?
A. Phishing
B. Eavesdropping
C. SQL injection
D. Brute forceThe full form of WLAN is:
A. Wide Local Area Network
B. Wireless Local Area Network
C. Wired Local Area Network
D. Wide Link Area NetworkWhich of the following is a deep learning framework?
A. TensorFlow
B. pandas
C. scikit-learn
D. numpyIn a spreadsheet, the function to count cells meeting a specific condition is:
A. COUNT
B. COUNTIF
C. SUM
D. AVERAGEWhich of the following is a key component of an IoT ecosystem?
A. Centralized server only
B. Sensors and actuators
C. Manual controls
D. Fixed hardwareThe full form of HTML5 is:
A. Hyper Text Markup Language version 5
B. High Text Markup Language version 5
C. Hyper Transfer Markup Language version 5
D. Hyperlink Text Markup Language version 5In Python, which keyword is used to raise an exception?
A. try
B. except
C. raise
D. catchThe device that regenerates network signals to extend range is:
A. Router
B. Switch
C. Repeater
D. GatewayWhich of the following is a benefit of microservices architecture?
A. Tight coupling between components
B. Independent deployment of services
C. Single large application
D. Increased complexity in testingThe process of converting data into a secure format is called:
A. Authentication
B. Authorization
C. Encryption
D. CompressionWhich of the following is an open-source automation tool?
A. Ansible
B. Microsoft Azure
C. AWS Lambda
D. Google Cloud FunctionsIn networking, the term TCP stands for:
A. Transmission Control Protocol
B. Transfer Control Protocol
C. Transmission Communication Protocol
D. Transport Control ProtocolWhich of the following is a type of trojan malware?
A. Firewall
B. Backdoor
C. Antivirus
D. VPNThe shortcut key to select all content in a document is:
A. Ctrl + A
B. Ctrl + C
C. Ctrl + V
D. Ctrl + ZWhich of the following is used to create responsive web designs?
A. HTML
B. CSS
C. JavaScript
D. Bootstrap
Part B: Subjective Type Questions (26 Marks)
20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)
Define a NoSQL database and give one example.
What is the difference between a firewall and an intrusion detection system?
Explain the term "digital signature" in cybersecurity.
What is the purpose of normalization in a database?
Define blockchain technology and name one application.
What is the role of a DNS server in networking?
Explain the term "DevOps" with an example.
50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)
Explain the role of a content delivery network (CDN) in improving web performance.
Describe the steps to write a Python program to handle JSON data from an API.
Explain the difference between synchronous and asynchronous programming with examples.
Discuss the importance of data privacy and suggest two methods to ensure it.
Sample Model Question Paper (Information Technology) - SET 5 (Annual Examination 2025-26)
Total Marks: 50
Time: 2 Hours
General Instructions:
- All questions are compulsory.
- The question paper is divided into two parts:
- Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
- Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
- Write answers clearly and concisely within the specified word limits for Part B.
- Use of calculators is not permitted.
Part A: Objective Type Questions (24 Marks)
Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)
Which database model is best suited for handling unstructured data?
A. Relational
B. NoSQL
C. Hierarchical
D. NetworkIn Python, which library is used for web scraping?
A. pandas
B. BeautifulSoup
C. numpy
D. matplotlibThe primary function of a VPN server is to:
A. Assign IP addresses
B. Create a secure network tunnel
C. Store website data
D. Route trafficWhich of the following is a characteristic of serverless computing?
A. Manual server provisioning
B. Pay-per-use pricing model
C. Fixed resource allocation
D. High maintenance overheadIn object-oriented programming, the ability to hide implementation details is called:
A. Inheritance
B. Polymorphism
C. Encapsulation
D. AbstractionWhich protocol is used for secure remote file access?
A. FTP
B. SFTP
C. HTTP
D. SMTPThe space complexity of a binary search algorithm is:
A. O(n)
B. O(log n)
C. O(n²)
D. O(1)Which of the following is a distributed data processing framework?
A. Apache Spark
B. MySQL
C. Oracle
D. SQLiteIn a relational database, a foreign key constraint ensures:
A. Unique record identification
B. Referential integrity between tables
C. Duplicate data storage
D. Null values in primary keysWhich of the following is a common brute force attack target?
A. Passwords
B. Firewalls
C. Antivirus software
D. Data backupsThe full form of SAN is:
A. Storage Area Network
B. System Access Network
C. Secure Area Network
D. Standard Area NetworkWhich of the following is a machine learning technique for classification?
A. K-means clustering
B. Support Vector Machine
C. Apriori algorithm
D. DBSCANIn a spreadsheet, the function to find the total number of cells with numerical data is:
A. COUNT
B. SUM
C. AVERAGE
D. COUNTIFWhich of the following is a key feature of IoT security?
A. Open access to devices
B. End-to-end encryption
C. Manual configuration
D. Single-device connectivityThe full form of DOM in web development is:
A. Document Object Model
B. Data Object Model
C. Dynamic Object Model
D. Distributed Object ModelIn Python, which keyword is used to define a lambda function?
A. def
B. lambda
C. func
D. classThe device that connects networks with different protocols is:
A. Router
B. Switch
C. Gateway
D. RepeaterWhich of the following is a benefit of containerization over virtualization?
A. Higher resource usage
B. Lightweight deployment
C. Reduced portability
D. Increased complexityThe process of verifying user identity using multiple factors is called:
A. Single-factor authentication
B. Multi-factor authentication
C. Encryption
D. AuthorizationWhich of the following is an open-source operating system for IoT devices?
A. Windows IoT
B. Raspbian
C. macOS
D. iOSIn networking, the term ICMP stands for:
A. Internet Control Message Protocol
B. Internet Communication Message Protocol
C. Internal Control Message Protocol
D. Internet Connection Message ProtocolWhich of the following is a type of phishing attack?
A. Spear phishing
B. Firewall breach
C. Data encryption
D. Secure socket layerThe shortcut key to save a document is:
A. Ctrl + S
B. Ctrl + C
C. Ctrl + V
D. Ctrl + ZWhich of the following is used to create single-page applications?
A. HTML
B. CSS
C. React
D. XML
Part B: Subjective Type Questions (26 Marks)
20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)
Define a distributed database and give one example.
What is the difference between a LAN and a WAN?
Explain the term "biometric authentication" in cybersecurity.
What is the purpose of a database trigger?
Define artificial neural networks and name one application.
What is the role of a proxy server in networking?
Explain the term "containerization" with an example.
50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)
Explain the role of a honeypot in cybersecurity.
Describe the steps to write a Python program to scrape data from a website using BeautifulSoup.
Explain the difference between supervised and unsupervised machine learning with examples.
Discuss the importance of data integrity and suggest two methods to ensure it.
Sample Model Question Paper (Information Technology) - SET 6 (Annual Examination 2025-26)
Total Marks: 50
Time: 2 Hours
General Instructions:
- All questions are compulsory.
- The question paper is divided into two parts:
- Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
- Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
- Write answers clearly and concisely within the specified word limits for Part B.
- Use of calculators is not permitted.
Part A: Objective Type Questions (24 Marks)
Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)
Which database model is optimized for document-based storage?
A. Relational
B. Document
C. Hierarchical
D. NetworkIn Python, which library is used for handling large datasets?
A. numpy
B. pandas
C. matplotlib
D. requestsThe primary function of an intrusion detection system (IDS) is to:
A. Encrypt data
B. Monitor network for suspicious activity
C. Assign IP addresses
D. Store network dataWhich of the following is a feature of a hybrid cloud?
A. Fully public infrastructure
B. Combination of on-premise and cloud resources
C. No scalability
D. Single-user accessIn object-oriented programming, the concept of deriving a new class from an existing one is called:
A. Encapsulation
B. Inheritance
C. Polymorphism
D. AbstractionWhich protocol is used for secure email retrieval?
A. SMTP
B. IMAP with SSL/TLS
C. HTTP
D. FTPThe time complexity of a selection sort algorithm is:
A. O(n)
B. O(n log n)
C. O(n²)
D. O(1)Which of the following is a distributed file system?
A. Hadoop HDFS
B. MySQL
C. SQLite
D. OracleIn a relational database, a check constraint ensures:
A. Unique records
B. Valid data entry within a specified range
C. Null values in keys
D. Duplicate foreign keysWhich of the following is a type of session hijacking attack?
A. Phishing
B. Cookie stealing
C. SQL injection
D. Brute forceThe full form of CAN is:
A. Campus Area Network
B. Centralized Area Network
C. Community Access Network
D. Campus Authentication NetworkWhich of the following is a clustering algorithm in machine learning?
A. Linear regression
B. K-means
C. Logistic regression
D. Decision treeIn a spreadsheet, the function to find the median of a range of values is:
A. AVERAGE
B. MEDIAN
C. SUM
D. COUNTWhich of the following is a key component of an IoT system?
A. Manual processing
B. Cloud connectivity
C. Fixed hardware
D. Single-device operationThe full form of API is:
A. Application Programming Interface
B. Application Protocol Interface
C. Automated Programming Interface
D. Application Process InterfaceIn Python, which keyword is used to exit a loop prematurely?
A. break
B. continue
C. return
D. exitThe device that manages traffic within a single network segment is:
A. Router
B. Switch
C. Gateway
D. RepeaterWhich of the following is a benefit of edge computing?
A. High latency
B. Reduced data processing time
C. Centralized data storage
D. Increased bandwidth usageThe process of securely deleting sensitive data is called:
A. Encryption
B. Data wiping
C. Compression
D. AuthenticationWhich of the following is an open-source machine learning framework?
A. PyTorch
B. Microsoft Azure ML
C. AWS SageMaker
D. Google Cloud AIIn networking, the term SNMP stands for:
A. Simple Network Management Protocol
B. Secure Network Management Protocol
C. System Network Management Protocol
D. Standard Network Management ProtocolWhich of the following is a type of malware that tracks user activity?
A. Firewall
B. Spyware
C. Antivirus
D. VPNThe shortcut key to open a new document is:
A. Ctrl + N
B. Ctrl + O
C. Ctrl + S
D. Ctrl + PWhich of the following is used to create dynamic web content?
A. HTML
B. CSS
C. PHP
D. XML
Part B: Subjective Type Questions (26 Marks)
20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)
Define a document database and give one example.
What is the difference between a switch and a router in networking?
Explain the term "public key infrastructure" in cybersecurity.
What is the purpose of a database view?
Define natural language processing and name one application.
What is the role of a firewall in network security?
Explain the term "virtualization" with an example.
50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)
Explain the role of a content management system in web development.
Describe the steps to write a Python program to process CSV data using pandas.
Explain the difference between cloud computing and traditional on-premise computing.
Discuss the importance of cybersecurity awareness and suggest two methods to promote it.
Sample Model Question Paper (Information Technology) - SET 7 (Annual Examination 2025-26)
Total Marks: 50
Time: 2 Hours
General Instructions:
- All questions are compulsory.
- The question paper is divided into two parts:
- Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
- Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
- Write answers clearly and concisely within the specified word limits for Part B.
- Use of calculators is not permitted.
Part A: Objective Type Questions (24 Marks)
Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)
Which database model uses a tree-like structure for data organization?
A. Relational
B. NoSQL
C. Hierarchical
D. GraphIn Python, which library is used for statistical analysis?
A. pandas
B. scipy
C. matplotlib
D. requestsThe primary function of a content delivery network (CDN) is to:
A. Encrypt data
B. Reduce latency by caching content
C. Assign IP addresses
D. Authenticate usersWhich of the following is a feature of a public cloud?
A. Dedicated resources for a single user
B. Multi-tenant infrastructure
C. No internet access
D. Fixed hardware allocationIn object-oriented programming, the concept of multiple classes sharing a common interface is called:
A. Encapsulation
B. Inheritance
C. Polymorphism
D. AbstractionWhich protocol is used for secure file sharing?
A. FTP
B. SFTP
C. HTTP
D. SMTPThe time complexity of an insertion sort algorithm is:
A. O(n)
B. O(n log n)
C. O(n²)
D. O(1)Which of the following is a distributed computing platform for big data?
A. Apache Kafka
B. MySQL
C. SQLite
D. OracleIn a relational database, a unique key constraint ensures:
A. Duplicate records
B. No duplicate values in a column
C. Null values in keys
D. Multiple foreign keysWhich of the following is a type of SQL injection attack?
A. Password cracking
B. Malicious query execution
C. Data encryption
D. Two-factor authenticationThe full form of VPN is:
A. Virtual Private Network
B. Virtual Public Network
C. Verified Private Network
D. Virtual Protocol NetworkWhich of the following is a supervised machine learning algorithm?
A. K-means clustering
B. Random Forest
C. DBSCAN
D. AprioriIn a spreadsheet, the function to find the maximum value in a range is:
A. SUM
B. MAX
C. AVERAGE
D. COUNTWhich of the following is a key feature of IoT devices?
A. Manual operation
B. Real-time data transmission
C. Fixed software
D. Single-purpose functionalityThe full form of CSS3 is:
A. Cascading Style Sheet version 3
B. Creative Style Sheet version 3
C. Centralized Style Sheet version 3
D. Computer Style Sheet version 3In Python, which keyword is used to skip the current iteration of a loop?
A. break
B. continue
C. return
D. exitThe device that connects multiple networks with the same protocol is:
A. Router
B. Switch
C. Gateway
D. RepeaterWhich of the following is a benefit of serverless architecture?
A. Manual scaling
B. Reduced operational overhead
C. Fixed resource allocation
D. Increased hardware costsThe process of verifying user identity using a password and OTP is called:
A. Single-factor authentication
B. Multi-factor authentication
C. Encryption
D. AuthorizationWhich of the following is an open-source database for graph data?
A. Neo4j
B. Oracle
C. Microsoft SQL Server
D. IBM DB2In networking, the term FTP stands for:
A. File Transfer Protocol
B. File Transmission Protocol
C. File Transaction Protocol
D. File Transport ProtocolWhich of the following is a type of adware?
A. Firewall
B. Pop-up ads
C. Antivirus
D. VPNThe shortcut key to print a document is:
A. Ctrl + P
B. Ctrl + S
C. Ctrl + C
D. Ctrl + ZWhich of the following is used to create scalable web applications?
A. HTML
B. CSS
C. Node.js
D. XML
Part B: Subjective Type Questions (26 Marks)
20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)
Define a key-value database and give one example.
What is the difference between a proxy server and a VPN?
Explain the term "hashing algorithm" in cybersecurity.
What is the purpose of a database transaction?
Define computer vision and name one application.
What is the role of a network switch in a LAN?
Explain the term "cloud orchestration" with an example.
50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)
Explain the role of a security information and event management (SIEM) system in cybersecurity.
Describe the steps to write a Python program to analyze data using pandas and numpy.
Explain the difference between containerization and virtualization with examples.
Discuss the importance of data governance and suggest two methods to implement it.
Sample Model Question Paper (Information Technology) - SET 8 (Annual Examination 2025-26)
Total Marks: 50
Time: 2 Hours
General Instructions:
- All questions are compulsory.
- The question paper is divided into two parts:
- Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
- Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
- Write answers clearly and concisely within the specified word limits for Part B.
- Use of calculators is not permitted.
Part A: Objective Type Questions (24 Marks)
Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)
Which database model is best for handling semi-structured data?
A. Relational
B. NoSQL
C. Hierarchical
D. GraphIn Python, which library is used for building REST APIs?
A. pandas
B. Flask
C. numpy
D. matplotlibThe primary function of a reverse proxy server is to:
A. Assign IP addresses
B. Distribute incoming traffic to servers
C. Encrypt data
D. Store network dataWhich of the following is a characteristic of a cloud-native application?
A. Monolithic architecture
B. Microservices-based design
C. Fixed resource allocation
D. Manual scalingIn object-oriented programming, the concept of restricting direct access to attributes is called:
A. Inheritance
B. Polymorphism
C. Encapsulation
D. AbstractionWhich protocol is used for secure voice communication over the internet?
A. HTTP
B. VoIP with SRTP
C. FTP
D. SMTPThe time complexity of a heap sort algorithm is:
A. O(n)
B. O(n log n)
C. O(n²)
D. O(1)Which of the following is a stream-processing platform?
A. Apache Kafka
B. MySQL
C. SQLite
D. OracleIn a relational database, a composite key is:
A. A single field that uniquely identifies a record
B. Multiple fields combined to uniquely identify a record
C. A key used for indexing only
D. A foreign key linking tablesWhich of the following is a type of cross-site scripting (XSS) attack?
A. SQL injection
B. Malicious script injection
C. Brute force
D. Data encryptionThe full form of NFC is:
A. Near Field Communication
B. Network Field Communication
C. National Field Communication
D. Near Frequency CommunicationWhich of the following is a regression algorithm in machine learning?
A. K-means clustering
B. Linear regression
C. DBSCAN
D. AprioriIn a spreadsheet, the function to concatenate text strings is:
A. CONCAT
B. SUM
C. AVERAGE
D. COUNTWhich of the following is a key feature of IoT ecosystems?
A. Manual data processing
B. Interoperability between devices
C. Fixed hardware configurations
D. Single-device operationThe full form of REST is:
A. Representational State Transfer
B. Resource State Transfer
C. Remote State Transfer
D. Representational System TransferIn Python, which keyword is used to handle exceptions?
A. try
B. catch
C. throw
D. exceptThe device that amplifies network signals is:
A. Router
B. Switch
C. Repeater
D. GatewayWhich of the following is a benefit of microservices over monolithic architecture?
A. Tightly coupled components
B. Independent scalability
C. Single deployment unit
D. Increased complexityThe process of securely storing passwords is called:
A. Encryption
B. Hashing
C. Compression
D. AuthenticationWhich of the following is an open-source container orchestration platform?
A. Kubernetes
B. AWS ECS
C. Azure AKS
D. Google Cloud RunIn networking, the term UDP stands for:
A. User Datagram Protocol
B. Universal Data Protocol
C. User Data Protocol
D. Unified Datagram ProtocolWhich of the following is a type of rootkit?
A. Firewall
B. Kernel-level malware
C. Antivirus
D. VPNThe shortcut key to find text in a document is:
A. Ctrl + F
B. Ctrl + S
C. Ctrl + C
D. Ctrl + PWhich of the following is used to create modern web frameworks?
A. HTML
B. CSS
C. Angular
D. XML
Part B: Subjective Type Questions (26 Marks)
20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)
Define a column-oriented database and give one example.
What is the difference between a load balancer and a reverse proxy?
Explain the term "zero-day vulnerability" in cybersecurity.
What is the purpose of a database stored procedure?
Define augmented reality and name one application.
What is the role of a network gateway in communication?
Explain the term "event-driven architecture" with an example.
50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)
Explain the role of a web application firewall in securing web applications.
Describe the steps to write a Python program to fetch and parse XML data.
Explain the difference between REST and SOAP APIs with examples.
Discuss the importance of incident response planning and suggest two methods for it.
Sample Model Question Paper (Information Technology) - SET 9 (Annual Examination 2025-26)
Total Marks: 50
Time: 2 Hours
General Instructions:
- All questions are compulsory.
- The question paper is divided into two parts:
- Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
- Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
- Write answers clearly and concisely within the specified word limits for Part B.
- Use of calculators is not permitted.
Part A: Objective Type Questions (24 Marks)
Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)
Which database model is optimized for handling relationships between entities?
A. Relational
B. Document
C. Key-Value
D. Column-OrientedIn Python, which library is used for creating web applications?
A. pandas
B. Django
C. numpy
D. seabornThe primary function of a network switch is to:
A. Assign IP addresses
B. Forward data within a network
C. Encrypt traffic
D. Store network dataWhich of the following is a feature of a serverless architecture?
A. Manual server management
B. Automatic scaling
C. Fixed resource allocation
D. High operational overheadIn object-oriented programming, the ability to redefine methods in a derived class is called:
A. Encapsulation
B. Inheritance
C. Polymorphism
D. AbstractionWhich protocol is used for secure video conferencing?
A. HTTP
B. WebRTC with encryption
C. FTP
D. SMTPThe time complexity of a linear search algorithm is:
A. O(n)
B. O(log n)
C. O(n²)
D. O(1)Which of the following is a big data processing framework?
A. Apache Flink
B. MySQL
C. SQLite
D. OracleIn a relational database, a NOT NULL constraint ensures:
A. Duplicate records
B. No empty values in a column
C. Unique keys
D. Multiple foreign keysWhich of the following is a type of ransomware attack?
A. Data encryption
B. File locking with ransom demand
C. Two-factor authentication
D. Firewall breachThe full form of IoT is:
A. Internet of Technology
B. Internet of Things
C. Internet of Tools
D. Internet of TransactionsWhich of the following is a classification algorithm in machine learning?
A. K-means clustering
B. Logistic regression
C. DBSCAN
D. AprioriIn a spreadsheet, the function to join text from multiple cells is:
A. CONCATENATE
B. SUM
C. AVERAGE
D. COUNTWhich of the following is a key feature of IoT devices?
A. Manual data collection
B. Automated data exchange
C. Fixed firmware
D. Single-device operationThe full form of SOAP is:
A. Simple Object Access Protocol
B. Secure Object Access Protocol
C. System Object Access Protocol
D. Standard Object Access ProtocolIn Python, which keyword is used to return a value from a function?
A. break
B. return
C. continue
D. yieldThe device that routes data between different networks is:
A. Switch
B. Router
C. Gateway
D. RepeaterWhich of the following is a benefit of cloud computing?
A. High hardware costs
B. On-demand resource provisioning
C. Limited scalability
D. Fixed infrastructureThe process of granting specific permissions to users is called:
A. Authentication
B. Authorization
C. Encryption
D. HashingWhich of the following is an open-source web development framework?
A. Ruby on Rails
B. .NET
C. Spring
D. ASP.NETIn networking, the term DNS stands for:
A. Domain Name System
B. Dynamic Network System
C. Distributed Name System
D. Domain Network SystemWhich of the following is a type of worm malware?
A. Firewall
B. Self-replicating malicious code
C. Antivirus
D. VPNThe shortcut key to close a document is:
A. Ctrl + W
B. Ctrl + S
C. Ctrl + C
D. Ctrl + PWhich of the following is used to create dynamic single-page applications?
A. HTML
B. CSS
C. Vue.js
D. XML
Part B: Subjective Type Questions (26 Marks)
20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)
Define a graph database and give one example.
What is the difference between a gateway and a router in networking?
Explain the term "data encryption" in cybersecurity.
What is the purpose of a database index?
Define machine learning and name one real-world application.
What is the role of a load balancer in networking?
Explain the term "edge computing" with an example.
50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)
Explain the role of a network intrusion prevention system in cybersecurity.
Describe the steps to write a Python program to create a REST API using Flask.
Explain the difference between centralized and decentralized systems with examples.
Discuss the importance of cybersecurity training and suggest two methods to implement it.
Sample Model Question Paper (Information Technology) - SET 10 (Annual Examination 2025-26)
Total Marks: 50
Time: 2 Hours
General Instructions:
- All questions are compulsory.
- The question paper is divided into two parts:
- Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
- Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
- Write answers clearly and concisely within the specified word limits for Part B.
- Use of calculators is not permitted.
Part A: Objective Type Questions (24 Marks)
Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)
Which database model is best suited for real-time analytics?
A. Relational
B. Column-Oriented
C. Hierarchical
D. NetworkIn Python, which library is used for machine learning model deployment?
A. pandas
B. TensorFlow
C. numpy
D. matplotlibThe primary function of a network firewall is to:
A. Assign IP addresses
B. Filter unauthorized network traffic
C. Store data packets
D. Encrypt communicationsWhich of the following is a feature of a hybrid cloud?
A. Public-only infrastructure
B. Combination of private and public clouds
C. No scalability
D. Single-tenant architectureIn object-oriented programming, the concept of hiding complex details is called:
A. Encapsulation
B. Inheritance
C. Polymorphism
D. AbstractionWhich protocol is used for secure database access?
A. HTTP
B. SQL over SSL/TLS
C. FTP
D. SMTPThe time complexity of a binary search tree traversal is:
A. O(n)
B. O(log n)
C. O(n²)
D. O(1)Which of the following is a real-time data streaming platform?
A. Apache Storm
B. MySQL
C. SQLite
D. OracleIn a relational database, a cascade delete ensures:
A. Duplicate records
B. Deletion of related records in linked tables
C. Null values in keys
D. Unique primary keysWhich of the following is a type of social engineering attack?
A. SQL injection
B. Pretexting
C. Data encryption
D. Firewall breachThe full form of VLAN is:
A. Virtual Local Area Network
B. Virtual Link Access Network
C. Verified Local Area Network
D. Variable Local Area NetworkWhich of the following is a reinforcement learning technique?
A. K-means clustering
B. Deep Q-learning
C. Linear regression
D. Decision treeIn a spreadsheet, the function to find the total of a range of cells is:
A. SUM
B. AVERAGE
C. COUNT
D. MINWhich of the following is a key feature of IoT security?
A. Open data sharing
B. Device authentication
C. Manual updates
D. Single-device connectivityThe full form of JWT is:
A. Java Web Token
B. JSON Web Token
C. JavaScript Web Token
D. JSON Widget TokenIn Python, which keyword is used to create a generator function?
A. yield
B. return
C. break
D. continueThe device that translates between different network protocols is:
A. Router
B. Switch
C. Gateway
D. RepeaterWhich of the following is a benefit of serverless computing?
A. Manual resource provisioning
B. Cost efficiency for sporadic workloads
C. Fixed infrastructure costs
D. Increased maintenance overheadThe process of securely managing user access rights is called:
A. Authentication
B. Authorization
C. Encryption
D. TokenizationWhich of the following is an open-source IoT platform?
A. AWS IoT
B. OpenHAB
C. Google Cloud IoT
D. Azure IoT HubIn networking, the term HTTP stands for:
A. Hyper Text Transfer Protocol
B. Hyperlink Transmission Protocol
C. Hyper Text Transaction Protocol
D. Hyperlink Transfer ProtocolWhich of the following is a type of keylogger malware?
A. Firewall
B. Keystroke recorder
C. Antivirus
D. VPNThe shortcut key to open the search bar in a browser is:
A. Ctrl + F
B. Ctrl + S
C. Ctrl + T
D. Ctrl + PWhich of the following is used to create cross-platform mobile applications?
A. HTML
B. CSS
C. Flutter
D. XML
Part B: Subjective Type Questions (26 Marks)
20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)
Define a time-series database and give one example.
What is the difference between a DNS server and a DHCP server?
Explain the term "digital certificate" in cybersecurity.
What is the purpose of a database schema?
Define blockchain and name one application.
What is the role of a content delivery network in web performance?
Explain the term "serverless architecture" with an example.
50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)
Explain the role of a security operations center (SOC) in cybersecurity.
Describe the steps to write a Python program to perform machine learning using scikit-learn.
Explain the difference between public and private cloud computing with examples.
Discuss the importance of data backup strategies and suggest two methods for implementation.
No comments:
Post a Comment
Please Comment