CLICK

Visit Home CBSE Board New ALL INDIA STATE BOARD New Positive Update New Latest Job News New Education Library New Result New Admit Card New Admission New Viral Video New Stories / कहानियाँ New

BREAKING NEWS

Breaking News
Find everything in one place! Get the latest updates on CBSE Board, All Boards Question Papers, Competitive Exams, Online Forms, Results, Admit Cards, Answer Keys, Syllabus, Career News, Sarkari Yojana, Scholarships, Sarkari Notices and more. Along with this, explore YouTube Content, Canva Creations (PPTs, Logos, Video Editing), Positive News, Birthday & Party Management Ideas, Property & Broker Updates, and many other useful resources. Stay connected with fast,🙏
LATEST JOB IN MONTH
Breaking News
ब्रेकिंग न्यूज
📢 Latest Admit Cards & Exam Updates – November 2025 🎯 जिन उम्मीदवारों ने आवेदन किया है, वे नीचे दिए गए लिंक से अपना Admit Card डाउनलोड करें या Exam City Details देखें 👇 ━━━━━━━━━━━━━━ 🚌 RSSB Conductor Admit Card 2025 📅 Admit Card: 03/11/2025 | Exam: 06/11/2025 🔗 https://www.careerinformationportal.in/p/admit-cards.html 👮‍♂️ SSC Constable GD 2024 DV/DME Admit Card 2025 📅 Admit Card: 03/11/2025 | DME: 12/11/2025 – 04/12/2025 🔗 https://www.careerinformationportal.in/p/admit-cards.html 📘 SSC CHSL 10+2 Tier-I Exam City Details 2025 📅 City Slip: 03/11/2025 | Exam: 12/11/2025 🔗 https://www.careerinformationportal.in/p/admit-cards.html 🚓 ITBP Constable Driver 2024 PET/PST Admit Card 2025 📅 Admit Card: 03/11/2025 | PET/PST: Nov–Dec 2025 🔗 https://www.careerinformationportal.in/p/admit-cards.html 📡 ITBP Telecom SI, HC & Constable PET/PST Admit Card 2025 📅 Admit Card: 03/11/2025 | PET/PST: Nov–Dec 2025 🔗 https://www.careerinformationportal.in/p/admit-cards.html 🔧 ITBP Constable & HC (Motor Mechanic) PET/PST Admit Card 2025 📅 Admit Card: 03/11/2025 | PET/PST: Nov–Dec 2025 🔗 https://www.careerinformationportal.in/p/admit-cards.html 🏦 LIC AAO / AE Mains Admit Card 2025 📅 Admit Card: 01/11/2025 | Exam: 08/11/2025 🔗 https://www.careerinformationportal.in/p/admit-cards.html 📡 RPSC Rajasthan Police SI Telecom Exam City Details 2025 📅 City Details: 31/10/2025 | Exam: 09/11/2025 🔗 https://www.careerinformationportal.in/p/admit-cards.html 🚨 Rajasthan Police Constable PET / PST Date 2025 📅 Announced: 30/10/2025 | PET/PST: 30/11/2025 – 07/12/2025 🔗 https://www.careerinformationportal.in/p/admit-cards.html 💼 IBPS SO XV (15th) Mains Admit Card 2025 📅 Admit Card: 30/10/2025 | Exam: 09/11/2025 🔗 https://www.careerinformationportal.in/p/admit-cards.html 🧾 CBSE Board Class 10th / 12th Exam Date Sheet 2025-26 📅 Released: 30/10/2025 | Exams Start: 17/02/2026 🔗 https://www.careerinformationportal.in/p/admit-cards.html ━━━━━━━━━━━━━━ 📢 सभी Admit Card और Exam Updates के लिए विज़िट करें: 👉 https://www.careerinformationportal.in/p/admit-cards.html 🚨 देशभर की प्रमुख संस्थाओं में बड़ी भर्ती! 👉 SEBI में Assistant Manager (Grade A) – 110 पद 👉 MECON Limited – 39 पद 👉 RRB NTPC – 5,810 पद (Station Master, Traffic Assistant आदि) 👉 SBI Specialist Officer – 103 पद 👉 BEL, BRO, NEEPCO में भी कई पद रिक्त 📝 आवेदन शुरू – आधिकारिक नोटिफिकेशन जारी! 📅 अंतिम तिथि: जल्द आवेदन करें Reserve Bank of India (RBI) में ग्रेड-B अधिकारी (Officer Grade B) के लगभग 120 पदों के लिए भर्ती निकली है। Bihar Staff Selection Commission (BSSC) द्वारा ≈ 23,175 पदों की द्वितीय इंटर-स्तरीय भर्ती जारी की गई है, जिसमें 12वीं पास उम्मीदवार भी शामिल हों सकते हैं। Uttar Pradesh Subordinate Services Selection Commission (UPSSSC) द्वारा राज्य में बड़ी संख्या में रिक्तियों पर भर्ती आ रही है — यूपी में लगभग 69,729 पदों पर भर्ती की सूचना है।

Translate

Offline Jobs

SARKARI RESULT

Exam Time Table

Model Answersheet

Cut Off Mark Exam

Exam Syllabus

ADMIT CARDS & EXAM UPDATES 2025

10TH CBSE Sample Model Question Paper 2025-26(Information Technology)


Sample Model Question Paper (Information Technology) - SET 1
ANNUAL EXAMINATION 2025-26

Total Marks: 50
Time: 2 Hours

General Instructions:

  1. All questions are compulsory.
  2. The question paper is divided into two parts:
    • Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
    • Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
  3. Write answers clearly and concisely within the specified word limits for Part B.
  4. Use of calculators is not permitted.

Part A: Objective Type Questions (24 Marks)

Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)

  1. Which of the following is a feature of a NoSQL database?
    A. Uses fixed schema
    B. Supports SQL queries only
    C. Handles unstructured data
    D. Requires relational tables

  2. In Python, which module is used for interacting with a relational database?
    A. pandas
    B. sqlite3
    C. numpy
    D. matplotlib

  3. The primary function of a DNS server is to:
    A. Encrypt network traffic
    B. Translate domain names to IP addresses
    C. Store email data
    D. Route network packets

  4. Which of the following is a characteristic of a public cloud?
    A. Dedicated hardware for a single user
    B. Shared resources among multiple users
    C. On-premise infrastructure
    D. No internet connectivity

  5. In object-oriented programming, the concept of hiding internal details is called:
    A. Inheritance
    B. Polymorphism
    C. Encapsulation
    D. Abstraction

  6. Which protocol ensures secure data transfer over the internet?
    A. HTTP
    B. FTP
    C. HTTPS
    D. SMTP

  7. The time complexity of a binary search algorithm is:
    A. O(n)
    B. O(log n)
    C. O(n²)
    D. O(1)

  8. Which of the following is a distributed version control system?
    A. SVN
    B. Git
    C. Mercurial
    D. Both B and C

  9. In a relational database, a foreign key is used to:
    A. Uniquely identify a record
    B. Establish a relationship between tables
    C. Store duplicate data
    D. Index a table

  10. Which of the following is a common attack vector in cybersecurity?
    A. SQL injection
    B. Data encryption
    C. Two-factor authentication
    D. Firewall configuration

  11. The full form of VLAN is:
    A. Virtual Local Area Network
    B. Variable Local Area Network
    C. Virtual Link Access Network
    D. Verified Local Access Network

  12. Which of the following is an example of a machine learning algorithm?
    A. Bubble sort
    B. Decision tree
    C. Linear search
    D. Dijkstra’s algorithm

  13. In a spreadsheet, the function to find the highest value in a range is:
    A. SUM
    B. MAX
    C. AVERAGE
    D. COUNT

  14. Which of the following is a blockchain feature?
    A. Centralized control
    B. Immutable ledger
    C. Temporary storage
    D. Single-point failure

  15. The full form of CSS in web development is:
    A. Computer Style Sheet
    B. Cascading Style Sheet
    C. Creative Style Sheet
    D. Centralized Style Sheet

  16. In Python, which keyword is used to handle exceptions?
    A. try
    B. catch
    C. throw
    D. error

  17. The device that converts digital signals to analog and vice versa is:
    A. Router
    B. Switch
    C. Modem
    D. Hub

  18. Which of the following is a benefit of virtualization?
    A. Increased hardware costs
    B. Improved resource utilization
    C. Reduced scalability
    D. Higher energy consumption

  19. The process of verifying the identity of a user is called:
    A. Authorization
    B. Authentication
    C. Encryption
    D. Compression

  20. Which of the following is an open-source database management system?
    A. Oracle
    B. MySQL
    C. Microsoft SQL Server
    D. IBM DB2

  21. In networking, the term DHCP stands for:
    A. Dynamic Host Configuration Protocol
    B. Direct Host Control Protocol
    C. Dynamic Hyperlink Configuration Protocol
    D. Distributed Host Control Protocol

  22. Which of the following is a type of ransomware?
    A. Firewall
    B. WannaCry
    C. Antivirus
    D. VPN

  23. The shortcut key to paste text in a document is:
    A. Ctrl + C
    B. Ctrl + V
    C. Ctrl + X
    D. Ctrl + Z

  24. Which of the following is used to create dynamic web pages?
    A. HTML
    B. CSS
    C. JavaScript
    D. XML


Part B: Subjective Type Questions (26 Marks)

20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)

  1. Define a NoSQL database and give one example.

  2. What is the difference between a static and dynamic IP address?

  3. Explain the term "hashing" in the context of data security.

  4. What is the purpose of a foreign key in a relational database?

  5. Define machine learning and name one application.

  6. What is the role of a router in a network?

  7. Explain the term "API" with an example.

50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)

  1. Explain the role of encryption in securing data transmission over the internet.

  2. Describe the steps to write a Python program to connect to a MySQL database.

  3. Explain the difference between client-server and peer-to-peer network architectures.

  4. Discuss the importance of version control systems and suggest two tools used for it.

Sample Model Question Paper (Information Technology) - SET 2 (Annual Examination 2025-26)

Total Marks: 50
Time: 2 Hours

General Instructions:

  1. All questions are compulsory.
  2. The question paper is divided into two parts:
    • Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
    • Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
  3. Write answers clearly and concisely within the specified word limits for Part B.
  4. Use of calculators is not permitted.

Part A: Objective Type Questions (24 Marks)

Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)

  1. Which database model organizes data in a hierarchical structure?
    A. Relational
    B. NoSQL
    C. Hierarchical
    D. Network

  2. In Python, which library is used for data visualization?
    A. pandas
    B. numpy
    C. matplotlib
    D. requests

  3. The primary function of a load balancer in networking is to:
    A. Encrypt data
    B. Distribute network traffic
    C. Store data packets
    D. Authenticate users

  4. Which of the following is a key characteristic of a hybrid cloud?
    A. Fully on-premise infrastructure
    B. Combination of public and private clouds
    C. No internet access
    D. Single-user access

  5. In object-oriented programming, reusing code from one class in another is called:
    A. Encapsulation
    B. Inheritance
    C. Polymorphism
    D. Abstraction

  6. Which protocol is used for secure file transfer?
    A. FTP
    B. SFTP
    C. HTTP
    D. SMTP

  7. The time complexity of a merge sort algorithm is:
    A. O(n)
    B. O(n log n)
    C. O(n²)
    D. O(1)

  8. Which of the following is a decentralized network technology?
    A. SQL Server
    B. Blockchain
    C. MySQL
    D. MongoDB

  9. In a relational database, a candidate key is:
    A. A field with duplicate values
    B. A field that can uniquely identify a record
    C. A field that links two tables
    D. A field with null values

  10. Which of the following is a common cybersecurity vulnerability?
    A. Cross-site scripting (XSS)
    B. Data backup
    C. Encryption
    D. Firewall

  11. The full form of MAN is:
    A. Main Area Network
    B. Metropolitan Area Network
    C. Medium Access Network
    D. Mobile Area Network

  12. Which of the following is an unsupervised learning algorithm?
    A. Linear regression
    B. K-means clustering
    C. Logistic regression
    D. Decision tree

  13. In a spreadsheet, the function to find the average of a range of cells is:
    A. SUM
    B. AVERAGE
    C. COUNT
    D. MIN

  14. Which of the following is a key feature of IoT systems?
    A. Manual data processing
    B. Real-time data collection
    C. Fixed software
    D. Single-device operation

  15. The full form of XML is:
    A. Extended Markup Language
    B. External Markup Language
    C. Extensible Markup Language
    D. Extra Markup Language

  16. In Python, which keyword is used to create a function?
    A. class
    B. def
    C. func
    D. lambda

  17. The device that connects multiple devices within a single network is:
    A. Router
    B. Switch
    C. Modem
    D. Gateway

  18. Which of the following is a benefit of serverless computing?
    A. Manual server management
    B. Automatic scaling
    C. Fixed resource allocation
    D. Increased hardware costs

  19. The process of validating user credentials is called:
    A. Authorization
    B. Authentication
    C. Encryption
    D. Tokenization

  20. Which of the following is an open-source content management system?
    A. WordPress
    B. Wix
    C. Squarespace
    D. Shopify

  21. In networking, the term ARP stands for:
    A. Address Resolution Protocol
    B. Access Resolution Protocol
    C. Address Routing Protocol
    D. Authentication Resolution Protocol

  22. Which of the following is a type of malware that encrypts files and demands payment?
    A. Virus
    B. Ransomware
    C. Spyware
    D. Adware

  23. The shortcut key to cut selected text in a document is:
    A. Ctrl + C
    B. Ctrl + V
    C. Ctrl + X
    D. Ctrl + Z

  24. Which of the following is used to create interactive web applications?
    A. HTML
    B. CSS
    C. JavaScript
    D. XML


Part B: Subjective Type Questions (26 Marks)

20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)

  1. Define a database management system and give one example.

  2. What is the difference between a hub and a switch in networking?

  3. Explain the term "cryptography" in the context of data security.

  4. What is the purpose of a unique key in a database?

  5. Define Internet of Things (IoT) and name one application.

  6. What is the role of a gateway in a network?

  7. Explain the term "microservices" with an example.

50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)

  1. Explain the role of intrusion detection systems in network security.

  2. Describe the steps to write a Python program to perform CRUD operations in a MySQL database.

  3. Explain the difference between monolithic and microservices architecture.

  4. Discuss the importance of ethical hacking and suggest two methods used in it.


Sample Model Question Paper (Information Technology) - SET 3 (Annual Examination 2025-26)

Total Marks: 50
Time: 2 Hours

General Instructions:

  1. All questions are compulsory.
  2. The question paper is divided into two parts:
    • Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
    • Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
  3. Write answers clearly and concisely within the specified word limits for Part B.
  4. Use of calculators is not permitted.

Part A: Objective Type Questions (24 Marks)

Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)

  1. Which database model uses a graph-based structure for data representation?
    A. Relational
    B. Hierarchical
    C. Graph
    D. Network

  2. In Python, which library is used for numerical computations?
    A. pandas
    B. numpy
    C. matplotlib
    D. seaborn

  3. The primary function of a proxy server is to:
    A. Store data
    B. Act as an intermediary between client and server
    C. Encrypt network traffic
    D. Authenticate users

  4. Which of the following is a characteristic of edge computing?
    A. Centralized data processing
    B. Data processing at the network edge
    C. High latency
    D. Limited scalability

  5. In object-oriented programming, the concept of defining multiple forms of a method is called:
    A. Encapsulation
    B. Inheritance
    C. Polymorphism
    D. Abstraction

  6. Which protocol is used for secure remote access to a server?
    A. FTP
    B. SSH
    C. HTTP
    D. SMTP

  7. The time complexity of a quicksort algorithm in the average case is:
    A. O(n)
    B. O(n log n)
    C. O(n²)
    D. O(1)

  8. Which of the following technologies is used for cryptocurrency transactions?
    A. SQL
    B. Blockchain
    C. XML
    D. JSON

  9. In a relational database, a referential integrity constraint ensures:
    A. No duplicate records
    B. Valid foreign key values
    C. Unique primary keys
    D. Non-null values

  10. Which of the following is a common web application vulnerability?
    A. Cross-site request forgery (CSRF)
    B. Data encryption
    C. Two-factor authentication
    D. Secure socket layer

  11. The full form of PAN is:
    A. Personal Area Network
    B. Public Access Network
    C. Private Area Network
    D. Personal Authentication Network

  12. Which of the following is a reinforcement learning algorithm?
    A. K-nearest neighbors
    B. Q-learning
    C. Linear regression
    D. Decision tree

  13. In a spreadsheet, the function to find the minimum value in a range is:
    A. SUM
    B. MIN
    C. AVERAGE
    D. COUNT

  14. Which of the following is a key feature of smart devices in IoT?
    A. Manual control only
    B. Interconnectivity and automation
    C. Fixed firmware
    D. Single-purpose functionality

  15. The full form of JSON is:
    A. JavaScript Object Notation
    B. Java Standard Object Notation
    C. JavaScript Online Notation
    D. Java System Object Notation

  16. In Python, which keyword is used to inherit a class?
    A. extends
    B. inherits
    C. class
    D. No keyword needed

  17. The device that connects two different network protocols is:
    A. Router
    B. Switch
    C. Gateway
    D. Hub

  18. Which of the following is a benefit of cloud-native applications?
    A. Limited scalability
    B. High dependency on hardware
    C. Rapid deployment and scalability
    D. Increased maintenance costs

  19. The process of assigning roles to users for resource access is called:
    A. Authentication
    B. Authorization
    C. Encryption
    D. Tokenization

  20. Which of the following is an open-source web server software?
    A. Apache
    B. IIS
    C. Oracle WebLogic
    D. IBM WebSphere

  21. In networking, the term VPN stands for:
    A. Virtual Private Network
    B. Virtual Public Network
    C. Verified Private Network
    D. Virtual Protocol Network

  22. Which of the following is a type of spyware?
    A. Keylogger
    B. Firewall
    C. Antivirus
    D. VPN

  23. The shortcut key to redo an action in a document is:
    A. Ctrl + Z
    B. Ctrl + Y
    C. Ctrl + C
    D. Ctrl + X

  24. Which of the following is used to manage asynchronous tasks in JavaScript?
    A. HTML
    B. Promises
    C. CSS
    D. XML


Part B: Subjective Type Questions (26 Marks)

20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)

  1. Define a graph database and give one example.

  2. What is the difference between a router and a gateway in networking?

  3. Explain the term "tokenization" in the context of data security.

  4. What is the purpose of a clustered index in a database?

  5. Define deep learning and name one application.

  6. What is the role of a load balancer in a network?

  7. Explain the term "serverless computing" with an example.

50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)

  1. Explain the role of penetration testing in cybersecurity.

  2. Describe the steps to write a Python program to perform data visualization using matplotlib.

  3. Explain the difference between relational and non-relational databases with examples.

  4. Discuss the importance of data encryption and suggest two encryption methods.



Sample Model Question Paper (Information Technology) - SET 4 (Annual Examination 2025-26)

Total Marks: 50
Time: 2 Hours

General Instructions:

  1. All questions are compulsory.
  2. The question paper is divided into two parts:
    • Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
    • Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
  3. Write answers clearly and concisely within the specified word limits for Part B.
  4. Use of calculators is not permitted.

Part A: Objective Type Questions (24 Marks)

Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)

  1. Which database model organizes data as key-value pairs?
    A. Relational
    B. NoSQL
    C. Hierarchical
    D. Network

  2. In Python, which library is used for data manipulation and analysis?
    A. numpy
    B. pandas
    C. matplotlib
    D. seaborn

  3. The primary function of a DHCP server is to:
    A. Resolve domain names
    B. Assign IP addresses dynamically
    C. Encrypt network traffic
    D. Route data packets

  4. Which of the following is a feature of a private cloud?
    A. Shared resources with public access
    B. Dedicated infrastructure for an organization
    C. Limited scalability
    D. No security measures

  5. In object-oriented programming, the process of simplifying complex systems is called:
    A. Encapsulation
    B. Inheritance
    C. Polymorphism
    D. Abstraction

  6. Which protocol is used for secure web browsing?
    A. HTTP
    B. FTP
    C. HTTPS
    D. SMTP

  7. The time complexity of a bubble sort algorithm is:
    A. O(n)
    B. O(n log n)
    C. O(n²)
    D. O(1)

  8. Which of the following is a distributed computing framework?
    A. Apache Hadoop
    B. MySQL
    C. Oracle
    D. MongoDB

  9. In a relational database, a primary key ensures:
    A. Duplicate records
    B. Unique identification of records
    C. Null values
    D. Multiple foreign keys

  10. Which of the following is a type of man-in-the-middle attack?
    A. Phishing
    B. Eavesdropping
    C. SQL injection
    D. Brute force

  11. The full form of WLAN is:
    A. Wide Local Area Network
    B. Wireless Local Area Network
    C. Wired Local Area Network
    D. Wide Link Area Network

  12. Which of the following is a deep learning framework?
    A. TensorFlow
    B. pandas
    C. scikit-learn
    D. numpy

  13. In a spreadsheet, the function to count cells meeting a specific condition is:
    A. COUNT
    B. COUNTIF
    C. SUM
    D. AVERAGE

  14. Which of the following is a key component of an IoT ecosystem?
    A. Centralized server only
    B. Sensors and actuators
    C. Manual controls
    D. Fixed hardware

  15. The full form of HTML5 is:
    A. Hyper Text Markup Language version 5
    B. High Text Markup Language version 5
    C. Hyper Transfer Markup Language version 5
    D. Hyperlink Text Markup Language version 5

  16. In Python, which keyword is used to raise an exception?
    A. try
    B. except
    C. raise
    D. catch

  17. The device that regenerates network signals to extend range is:
    A. Router
    B. Switch
    C. Repeater
    D. Gateway

  18. Which of the following is a benefit of microservices architecture?
    A. Tight coupling between components
    B. Independent deployment of services
    C. Single large application
    D. Increased complexity in testing

  19. The process of converting data into a secure format is called:
    A. Authentication
    B. Authorization
    C. Encryption
    D. Compression

  20. Which of the following is an open-source automation tool?
    A. Ansible
    B. Microsoft Azure
    C. AWS Lambda
    D. Google Cloud Functions

  21. In networking, the term TCP stands for:
    A. Transmission Control Protocol
    B. Transfer Control Protocol
    C. Transmission Communication Protocol
    D. Transport Control Protocol

  22. Which of the following is a type of trojan malware?
    A. Firewall
    B. Backdoor
    C. Antivirus
    D. VPN

  23. The shortcut key to select all content in a document is:
    A. Ctrl + A
    B. Ctrl + C
    C. Ctrl + V
    D. Ctrl + Z

  24. Which of the following is used to create responsive web designs?
    A. HTML
    B. CSS
    C. JavaScript
    D. Bootstrap


Part B: Subjective Type Questions (26 Marks)

20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)

  1. Define a NoSQL database and give one example.

  2. What is the difference between a firewall and an intrusion detection system?

  3. Explain the term "digital signature" in cybersecurity.

  4. What is the purpose of normalization in a database?

  5. Define blockchain technology and name one application.

  6. What is the role of a DNS server in networking?

  7. Explain the term "DevOps" with an example.

50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)

  1. Explain the role of a content delivery network (CDN) in improving web performance.

  2. Describe the steps to write a Python program to handle JSON data from an API.

  3. Explain the difference between synchronous and asynchronous programming with examples.

  4. Discuss the importance of data privacy and suggest two methods to ensure it.



Sample Model Question Paper (Information Technology) - SET 5 (Annual Examination 2025-26)

Total Marks: 50
Time: 2 Hours

General Instructions:

  1. All questions are compulsory.
  2. The question paper is divided into two parts:
    • Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
    • Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
  3. Write answers clearly and concisely within the specified word limits for Part B.
  4. Use of calculators is not permitted.

Part A: Objective Type Questions (24 Marks)

Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)

  1. Which database model is best suited for handling unstructured data?
    A. Relational
    B. NoSQL
    C. Hierarchical
    D. Network

  2. In Python, which library is used for web scraping?
    A. pandas
    B. BeautifulSoup
    C. numpy
    D. matplotlib

  3. The primary function of a VPN server is to:
    A. Assign IP addresses
    B. Create a secure network tunnel
    C. Store website data
    D. Route traffic

  4. Which of the following is a characteristic of serverless computing?
    A. Manual server provisioning
    B. Pay-per-use pricing model
    C. Fixed resource allocation
    D. High maintenance overhead

  5. In object-oriented programming, the ability to hide implementation details is called:
    A. Inheritance
    B. Polymorphism
    C. Encapsulation
    D. Abstraction

  6. Which protocol is used for secure remote file access?
    A. FTP
    B. SFTP
    C. HTTP
    D. SMTP

  7. The space complexity of a binary search algorithm is:
    A. O(n)
    B. O(log n)
    C. O(n²)
    D. O(1)

  8. Which of the following is a distributed data processing framework?
    A. Apache Spark
    B. MySQL
    C. Oracle
    D. SQLite

  9. In a relational database, a foreign key constraint ensures:
    A. Unique record identification
    B. Referential integrity between tables
    C. Duplicate data storage
    D. Null values in primary keys

  10. Which of the following is a common brute force attack target?
    A. Passwords
    B. Firewalls
    C. Antivirus software
    D. Data backups

  11. The full form of SAN is:
    A. Storage Area Network
    B. System Access Network
    C. Secure Area Network
    D. Standard Area Network

  12. Which of the following is a machine learning technique for classification?
    A. K-means clustering
    B. Support Vector Machine
    C. Apriori algorithm
    D. DBSCAN

  13. In a spreadsheet, the function to find the total number of cells with numerical data is:
    A. COUNT
    B. SUM
    C. AVERAGE
    D. COUNTIF

  14. Which of the following is a key feature of IoT security?
    A. Open access to devices
    B. End-to-end encryption
    C. Manual configuration
    D. Single-device connectivity

  15. The full form of DOM in web development is:
    A. Document Object Model
    B. Data Object Model
    C. Dynamic Object Model
    D. Distributed Object Model

  16. In Python, which keyword is used to define a lambda function?
    A. def
    B. lambda
    C. func
    D. class

  17. The device that connects networks with different protocols is:
    A. Router
    B. Switch
    C. Gateway
    D. Repeater

  18. Which of the following is a benefit of containerization over virtualization?
    A. Higher resource usage
    B. Lightweight deployment
    C. Reduced portability
    D. Increased complexity

  19. The process of verifying user identity using multiple factors is called:
    A. Single-factor authentication
    B. Multi-factor authentication
    C. Encryption
    D. Authorization

  20. Which of the following is an open-source operating system for IoT devices?
    A. Windows IoT
    B. Raspbian
    C. macOS
    D. iOS

  21. In networking, the term ICMP stands for:
    A. Internet Control Message Protocol
    B. Internet Communication Message Protocol
    C. Internal Control Message Protocol
    D. Internet Connection Message Protocol

  22. Which of the following is a type of phishing attack?
    A. Spear phishing
    B. Firewall breach
    C. Data encryption
    D. Secure socket layer

  23. The shortcut key to save a document is:
    A. Ctrl + S
    B. Ctrl + C
    C. Ctrl + V
    D. Ctrl + Z

  24. Which of the following is used to create single-page applications?
    A. HTML
    B. CSS
    C. React
    D. XML


Part B: Subjective Type Questions (26 Marks)

20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)

  1. Define a distributed database and give one example.

  2. What is the difference between a LAN and a WAN?

  3. Explain the term "biometric authentication" in cybersecurity.

  4. What is the purpose of a database trigger?

  5. Define artificial neural networks and name one application.

  6. What is the role of a proxy server in networking?

  7. Explain the term "containerization" with an example.

50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)

  1. Explain the role of a honeypot in cybersecurity.

  2. Describe the steps to write a Python program to scrape data from a website using BeautifulSoup.

  3. Explain the difference between supervised and unsupervised machine learning with examples.

  4. Discuss the importance of data integrity and suggest two methods to ensure it.



Sample Model Question Paper (Information Technology) - SET 6 (Annual Examination 2025-26)

Total Marks: 50
Time: 2 Hours

General Instructions:

  1. All questions are compulsory.
  2. The question paper is divided into two parts:
    • Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
    • Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
  3. Write answers clearly and concisely within the specified word limits for Part B.
  4. Use of calculators is not permitted.

Part A: Objective Type Questions (24 Marks)

Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)

  1. Which database model is optimized for document-based storage?
    A. Relational
    B. Document
    C. Hierarchical
    D. Network

  2. In Python, which library is used for handling large datasets?
    A. numpy
    B. pandas
    C. matplotlib
    D. requests

  3. The primary function of an intrusion detection system (IDS) is to:
    A. Encrypt data
    B. Monitor network for suspicious activity
    C. Assign IP addresses
    D. Store network data

  4. Which of the following is a feature of a hybrid cloud?
    A. Fully public infrastructure
    B. Combination of on-premise and cloud resources
    C. No scalability
    D. Single-user access

  5. In object-oriented programming, the concept of deriving a new class from an existing one is called:
    A. Encapsulation
    B. Inheritance
    C. Polymorphism
    D. Abstraction

  6. Which protocol is used for secure email retrieval?
    A. SMTP
    B. IMAP with SSL/TLS
    C. HTTP
    D. FTP

  7. The time complexity of a selection sort algorithm is:
    A. O(n)
    B. O(n log n)
    C. O(n²)
    D. O(1)

  8. Which of the following is a distributed file system?
    A. Hadoop HDFS
    B. MySQL
    C. SQLite
    D. Oracle

  9. In a relational database, a check constraint ensures:
    A. Unique records
    B. Valid data entry within a specified range
    C. Null values in keys
    D. Duplicate foreign keys

  10. Which of the following is a type of session hijacking attack?
    A. Phishing
    B. Cookie stealing
    C. SQL injection
    D. Brute force

  11. The full form of CAN is:
    A. Campus Area Network
    B. Centralized Area Network
    C. Community Access Network
    D. Campus Authentication Network

  12. Which of the following is a clustering algorithm in machine learning?
    A. Linear regression
    B. K-means
    C. Logistic regression
    D. Decision tree

  13. In a spreadsheet, the function to find the median of a range of values is:
    A. AVERAGE
    B. MEDIAN
    C. SUM
    D. COUNT

  14. Which of the following is a key component of an IoT system?
    A. Manual processing
    B. Cloud connectivity
    C. Fixed hardware
    D. Single-device operation

  15. The full form of API is:
    A. Application Programming Interface
    B. Application Protocol Interface
    C. Automated Programming Interface
    D. Application Process Interface

  16. In Python, which keyword is used to exit a loop prematurely?
    A. break
    B. continue
    C. return
    D. exit

  17. The device that manages traffic within a single network segment is:
    A. Router
    B. Switch
    C. Gateway
    D. Repeater

  18. Which of the following is a benefit of edge computing?
    A. High latency
    B. Reduced data processing time
    C. Centralized data storage
    D. Increased bandwidth usage

  19. The process of securely deleting sensitive data is called:
    A. Encryption
    B. Data wiping
    C. Compression
    D. Authentication

  20. Which of the following is an open-source machine learning framework?
    A. PyTorch
    B. Microsoft Azure ML
    C. AWS SageMaker
    D. Google Cloud AI

  21. In networking, the term SNMP stands for:
    A. Simple Network Management Protocol
    B. Secure Network Management Protocol
    C. System Network Management Protocol
    D. Standard Network Management Protocol

  22. Which of the following is a type of malware that tracks user activity?
    A. Firewall
    B. Spyware
    C. Antivirus
    D. VPN

  23. The shortcut key to open a new document is:
    A. Ctrl + N
    B. Ctrl + O
    C. Ctrl + S
    D. Ctrl + P

  24. Which of the following is used to create dynamic web content?
    A. HTML
    B. CSS
    C. PHP
    D. XML


Part B: Subjective Type Questions (26 Marks)

20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)

  1. Define a document database and give one example.

  2. What is the difference between a switch and a router in networking?

  3. Explain the term "public key infrastructure" in cybersecurity.

  4. What is the purpose of a database view?

  5. Define natural language processing and name one application.

  6. What is the role of a firewall in network security?

  7. Explain the term "virtualization" with an example.

50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)

  1. Explain the role of a content management system in web development.

  2. Describe the steps to write a Python program to process CSV data using pandas.

  3. Explain the difference between cloud computing and traditional on-premise computing.

  4. Discuss the importance of cybersecurity awareness and suggest two methods to promote it.


Sample Model Question Paper (Information Technology) - SET 7 (Annual Examination 2025-26)

Total Marks: 50
Time: 2 Hours

General Instructions:

  1. All questions are compulsory.
  2. The question paper is divided into two parts:
    • Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
    • Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
  3. Write answers clearly and concisely within the specified word limits for Part B.
  4. Use of calculators is not permitted.

Part A: Objective Type Questions (24 Marks)

Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)

  1. Which database model uses a tree-like structure for data organization?
    A. Relational
    B. NoSQL
    C. Hierarchical
    D. Graph

  2. In Python, which library is used for statistical analysis?
    A. pandas
    B. scipy
    C. matplotlib
    D. requests

  3. The primary function of a content delivery network (CDN) is to:
    A. Encrypt data
    B. Reduce latency by caching content
    C. Assign IP addresses
    D. Authenticate users

  4. Which of the following is a feature of a public cloud?
    A. Dedicated resources for a single user
    B. Multi-tenant infrastructure
    C. No internet access
    D. Fixed hardware allocation

  5. In object-oriented programming, the concept of multiple classes sharing a common interface is called:
    A. Encapsulation
    B. Inheritance
    C. Polymorphism
    D. Abstraction

  6. Which protocol is used for secure file sharing?
    A. FTP
    B. SFTP
    C. HTTP
    D. SMTP

  7. The time complexity of an insertion sort algorithm is:
    A. O(n)
    B. O(n log n)
    C. O(n²)
    D. O(1)

  8. Which of the following is a distributed computing platform for big data?
    A. Apache Kafka
    B. MySQL
    C. SQLite
    D. Oracle

  9. In a relational database, a unique key constraint ensures:
    A. Duplicate records
    B. No duplicate values in a column
    C. Null values in keys
    D. Multiple foreign keys

  10. Which of the following is a type of SQL injection attack?
    A. Password cracking
    B. Malicious query execution
    C. Data encryption
    D. Two-factor authentication

  11. The full form of VPN is:
    A. Virtual Private Network
    B. Virtual Public Network
    C. Verified Private Network
    D. Virtual Protocol Network

  12. Which of the following is a supervised machine learning algorithm?
    A. K-means clustering
    B. Random Forest
    C. DBSCAN
    D. Apriori

  13. In a spreadsheet, the function to find the maximum value in a range is:
    A. SUM
    B. MAX
    C. AVERAGE
    D. COUNT

  14. Which of the following is a key feature of IoT devices?
    A. Manual operation
    B. Real-time data transmission
    C. Fixed software
    D. Single-purpose functionality

  15. The full form of CSS3 is:
    A. Cascading Style Sheet version 3
    B. Creative Style Sheet version 3
    C. Centralized Style Sheet version 3
    D. Computer Style Sheet version 3

  16. In Python, which keyword is used to skip the current iteration of a loop?
    A. break
    B. continue
    C. return
    D. exit

  17. The device that connects multiple networks with the same protocol is:
    A. Router
    B. Switch
    C. Gateway
    D. Repeater

  18. Which of the following is a benefit of serverless architecture?
    A. Manual scaling
    B. Reduced operational overhead
    C. Fixed resource allocation
    D. Increased hardware costs

  19. The process of verifying user identity using a password and OTP is called:
    A. Single-factor authentication
    B. Multi-factor authentication
    C. Encryption
    D. Authorization

  20. Which of the following is an open-source database for graph data?
    A. Neo4j
    B. Oracle
    C. Microsoft SQL Server
    D. IBM DB2

  21. In networking, the term FTP stands for:
    A. File Transfer Protocol
    B. File Transmission Protocol
    C. File Transaction Protocol
    D. File Transport Protocol

  22. Which of the following is a type of adware?
    A. Firewall
    B. Pop-up ads
    C. Antivirus
    D. VPN

  23. The shortcut key to print a document is:
    A. Ctrl + P
    B. Ctrl + S
    C. Ctrl + C
    D. Ctrl + Z

  24. Which of the following is used to create scalable web applications?
    A. HTML
    B. CSS
    C. Node.js
    D. XML


Part B: Subjective Type Questions (26 Marks)

20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)

  1. Define a key-value database and give one example.

  2. What is the difference between a proxy server and a VPN?

  3. Explain the term "hashing algorithm" in cybersecurity.

  4. What is the purpose of a database transaction?

  5. Define computer vision and name one application.

  6. What is the role of a network switch in a LAN?

  7. Explain the term "cloud orchestration" with an example.

50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)

  1. Explain the role of a security information and event management (SIEM) system in cybersecurity.

  2. Describe the steps to write a Python program to analyze data using pandas and numpy.

  3. Explain the difference between containerization and virtualization with examples.

  4. Discuss the importance of data governance and suggest two methods to implement it.



Sample Model Question Paper (Information Technology) - SET 8 (Annual Examination 2025-26)

Total Marks: 50
Time: 2 Hours

General Instructions:

  1. All questions are compulsory.
  2. The question paper is divided into two parts:
    • Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
    • Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
  3. Write answers clearly and concisely within the specified word limits for Part B.
  4. Use of calculators is not permitted.

Part A: Objective Type Questions (24 Marks)

Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)

  1. Which database model is best for handling semi-structured data?
    A. Relational
    B. NoSQL
    C. Hierarchical
    D. Graph

  2. In Python, which library is used for building REST APIs?
    A. pandas
    B. Flask
    C. numpy
    D. matplotlib

  3. The primary function of a reverse proxy server is to:
    A. Assign IP addresses
    B. Distribute incoming traffic to servers
    C. Encrypt data
    D. Store network data

  4. Which of the following is a characteristic of a cloud-native application?
    A. Monolithic architecture
    B. Microservices-based design
    C. Fixed resource allocation
    D. Manual scaling

  5. In object-oriented programming, the concept of restricting direct access to attributes is called:
    A. Inheritance
    B. Polymorphism
    C. Encapsulation
    D. Abstraction

  6. Which protocol is used for secure voice communication over the internet?
    A. HTTP
    B. VoIP with SRTP
    C. FTP
    D. SMTP

  7. The time complexity of a heap sort algorithm is:
    A. O(n)
    B. O(n log n)
    C. O(n²)
    D. O(1)

  8. Which of the following is a stream-processing platform?
    A. Apache Kafka
    B. MySQL
    C. SQLite
    D. Oracle

  9. In a relational database, a composite key is:
    A. A single field that uniquely identifies a record
    B. Multiple fields combined to uniquely identify a record
    C. A key used for indexing only
    D. A foreign key linking tables

  10. Which of the following is a type of cross-site scripting (XSS) attack?
    A. SQL injection
    B. Malicious script injection
    C. Brute force
    D. Data encryption

  11. The full form of NFC is:
    A. Near Field Communication
    B. Network Field Communication
    C. National Field Communication
    D. Near Frequency Communication

  12. Which of the following is a regression algorithm in machine learning?
    A. K-means clustering
    B. Linear regression
    C. DBSCAN
    D. Apriori

  13. In a spreadsheet, the function to concatenate text strings is:
    A. CONCAT
    B. SUM
    C. AVERAGE
    D. COUNT

  14. Which of the following is a key feature of IoT ecosystems?
    A. Manual data processing
    B. Interoperability between devices
    C. Fixed hardware configurations
    D. Single-device operation

  15. The full form of REST is:
    A. Representational State Transfer
    B. Resource State Transfer
    C. Remote State Transfer
    D. Representational System Transfer

  16. In Python, which keyword is used to handle exceptions?
    A. try
    B. catch
    C. throw
    D. except

  17. The device that amplifies network signals is:
    A. Router
    B. Switch
    C. Repeater
    D. Gateway

  18. Which of the following is a benefit of microservices over monolithic architecture?
    A. Tightly coupled components
    B. Independent scalability
    C. Single deployment unit
    D. Increased complexity

  19. The process of securely storing passwords is called:
    A. Encryption
    B. Hashing
    C. Compression
    D. Authentication

  20. Which of the following is an open-source container orchestration platform?
    A. Kubernetes
    B. AWS ECS
    C. Azure AKS
    D. Google Cloud Run

  21. In networking, the term UDP stands for:
    A. User Datagram Protocol
    B. Universal Data Protocol
    C. User Data Protocol
    D. Unified Datagram Protocol

  22. Which of the following is a type of rootkit?
    A. Firewall
    B. Kernel-level malware
    C. Antivirus
    D. VPN

  23. The shortcut key to find text in a document is:
    A. Ctrl + F
    B. Ctrl + S
    C. Ctrl + C
    D. Ctrl + P

  24. Which of the following is used to create modern web frameworks?
    A. HTML
    B. CSS
    C. Angular
    D. XML


Part B: Subjective Type Questions (26 Marks)

20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)

  1. Define a column-oriented database and give one example.

  2. What is the difference between a load balancer and a reverse proxy?

  3. Explain the term "zero-day vulnerability" in cybersecurity.

  4. What is the purpose of a database stored procedure?

  5. Define augmented reality and name one application.

  6. What is the role of a network gateway in communication?

  7. Explain the term "event-driven architecture" with an example.

50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)

  1. Explain the role of a web application firewall in securing web applications.

  2. Describe the steps to write a Python program to fetch and parse XML data.

  3. Explain the difference between REST and SOAP APIs with examples.

  4. Discuss the importance of incident response planning and suggest two methods for it.

Sample Model Question Paper (Information Technology) - SET 9 (Annual Examination 2025-26)

Total Marks: 50
Time: 2 Hours

General Instructions:

  1. All questions are compulsory.
  2. The question paper is divided into two parts:
    • Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
    • Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
  3. Write answers clearly and concisely within the specified word limits for Part B.
  4. Use of calculators is not permitted.

Part A: Objective Type Questions (24 Marks)

Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)

  1. Which database model is optimized for handling relationships between entities?
    A. Relational
    B. Document
    C. Key-Value
    D. Column-Oriented

  2. In Python, which library is used for creating web applications?
    A. pandas
    B. Django
    C. numpy
    D. seaborn

  3. The primary function of a network switch is to:
    A. Assign IP addresses
    B. Forward data within a network
    C. Encrypt traffic
    D. Store network data

  4. Which of the following is a feature of a serverless architecture?
    A. Manual server management
    B. Automatic scaling
    C. Fixed resource allocation
    D. High operational overhead

  5. In object-oriented programming, the ability to redefine methods in a derived class is called:
    A. Encapsulation
    B. Inheritance
    C. Polymorphism
    D. Abstraction

  6. Which protocol is used for secure video conferencing?
    A. HTTP
    B. WebRTC with encryption
    C. FTP
    D. SMTP

  7. The time complexity of a linear search algorithm is:
    A. O(n)
    B. O(log n)
    C. O(n²)
    D. O(1)

  8. Which of the following is a big data processing framework?
    A. Apache Flink
    B. MySQL
    C. SQLite
    D. Oracle

  9. In a relational database, a NOT NULL constraint ensures:
    A. Duplicate records
    B. No empty values in a column
    C. Unique keys
    D. Multiple foreign keys

  10. Which of the following is a type of ransomware attack?
    A. Data encryption
    B. File locking with ransom demand
    C. Two-factor authentication
    D. Firewall breach

  11. The full form of IoT is:
    A. Internet of Technology
    B. Internet of Things
    C. Internet of Tools
    D. Internet of Transactions

  12. Which of the following is a classification algorithm in machine learning?
    A. K-means clustering
    B. Logistic regression
    C. DBSCAN
    D. Apriori

  13. In a spreadsheet, the function to join text from multiple cells is:
    A. CONCATENATE
    B. SUM
    C. AVERAGE
    D. COUNT

  14. Which of the following is a key feature of IoT devices?
    A. Manual data collection
    B. Automated data exchange
    C. Fixed firmware
    D. Single-device operation

  15. The full form of SOAP is:
    A. Simple Object Access Protocol
    B. Secure Object Access Protocol
    C. System Object Access Protocol
    D. Standard Object Access Protocol

  16. In Python, which keyword is used to return a value from a function?
    A. break
    B. return
    C. continue
    D. yield

  17. The device that routes data between different networks is:
    A. Switch
    B. Router
    C. Gateway
    D. Repeater

  18. Which of the following is a benefit of cloud computing?
    A. High hardware costs
    B. On-demand resource provisioning
    C. Limited scalability
    D. Fixed infrastructure

  19. The process of granting specific permissions to users is called:
    A. Authentication
    B. Authorization
    C. Encryption
    D. Hashing

  20. Which of the following is an open-source web development framework?
    A. Ruby on Rails
    B. .NET
    C. Spring
    D. ASP.NET

  21. In networking, the term DNS stands for:
    A. Domain Name System
    B. Dynamic Network System
    C. Distributed Name System
    D. Domain Network System

  22. Which of the following is a type of worm malware?
    A. Firewall
    B. Self-replicating malicious code
    C. Antivirus
    D. VPN

  23. The shortcut key to close a document is:
    A. Ctrl + W
    B. Ctrl + S
    C. Ctrl + C
    D. Ctrl + P

  24. Which of the following is used to create dynamic single-page applications?
    A. HTML
    B. CSS
    C. Vue.js
    D. XML


Part B: Subjective Type Questions (26 Marks)

20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)

  1. Define a graph database and give one example.

  2. What is the difference between a gateway and a router in networking?

  3. Explain the term "data encryption" in cybersecurity.

  4. What is the purpose of a database index?

  5. Define machine learning and name one real-world application.

  6. What is the role of a load balancer in networking?

  7. Explain the term "edge computing" with an example.

50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)

  1. Explain the role of a network intrusion prevention system in cybersecurity.

  2. Describe the steps to write a Python program to create a REST API using Flask.

  3. Explain the difference between centralized and decentralized systems with examples.

  4. Discuss the importance of cybersecurity training and suggest two methods to implement it.

Sample Model Question Paper (Information Technology) - SET 10 (Annual Examination 2025-26)

Total Marks: 50
Time: 2 Hours

General Instructions:

  1. All questions are compulsory.
  2. The question paper is divided into two parts:
    • Part A: Objective Type Questions (24 MCQs, 1 mark each, Total 24 marks).
    • Part B: Subjective Type Questions (7 questions of 20-30 words, 2 marks each; 4 questions of 50-80 words, 3 marks each, Total 26 marks).
  3. Write answers clearly and concisely within the specified word limits for Part B.
  4. Use of calculators is not permitted.

Part A: Objective Type Questions (24 Marks)

Multiple Choice Questions (MCQs) (1 Mark Each, 24 Questions, Total 24 Marks)

  1. Which database model is best suited for real-time analytics?
    A. Relational
    B. Column-Oriented
    C. Hierarchical
    D. Network

  2. In Python, which library is used for machine learning model deployment?
    A. pandas
    B. TensorFlow
    C. numpy
    D. matplotlib

  3. The primary function of a network firewall is to:
    A. Assign IP addresses
    B. Filter unauthorized network traffic
    C. Store data packets
    D. Encrypt communications

  4. Which of the following is a feature of a hybrid cloud?
    A. Public-only infrastructure
    B. Combination of private and public clouds
    C. No scalability
    D. Single-tenant architecture

  5. In object-oriented programming, the concept of hiding complex details is called:
    A. Encapsulation
    B. Inheritance
    C. Polymorphism
    D. Abstraction

  6. Which protocol is used for secure database access?
    A. HTTP
    B. SQL over SSL/TLS
    C. FTP
    D. SMTP

  7. The time complexity of a binary search tree traversal is:
    A. O(n)
    B. O(log n)
    C. O(n²)
    D. O(1)

  8. Which of the following is a real-time data streaming platform?
    A. Apache Storm
    B. MySQL
    C. SQLite
    D. Oracle

  9. In a relational database, a cascade delete ensures:
    A. Duplicate records
    B. Deletion of related records in linked tables
    C. Null values in keys
    D. Unique primary keys

  10. Which of the following is a type of social engineering attack?
    A. SQL injection
    B. Pretexting
    C. Data encryption
    D. Firewall breach

  11. The full form of VLAN is:
    A. Virtual Local Area Network
    B. Virtual Link Access Network
    C. Verified Local Area Network
    D. Variable Local Area Network

  12. Which of the following is a reinforcement learning technique?
    A. K-means clustering
    B. Deep Q-learning
    C. Linear regression
    D. Decision tree

  13. In a spreadsheet, the function to find the total of a range of cells is:
    A. SUM
    B. AVERAGE
    C. COUNT
    D. MIN

  14. Which of the following is a key feature of IoT security?
    A. Open data sharing
    B. Device authentication
    C. Manual updates
    D. Single-device connectivity

  15. The full form of JWT is:
    A. Java Web Token
    B. JSON Web Token
    C. JavaScript Web Token
    D. JSON Widget Token

  16. In Python, which keyword is used to create a generator function?
    A. yield
    B. return
    C. break
    D. continue

  17. The device that translates between different network protocols is:
    A. Router
    B. Switch
    C. Gateway
    D. Repeater

  18. Which of the following is a benefit of serverless computing?
    A. Manual resource provisioning
    B. Cost efficiency for sporadic workloads
    C. Fixed infrastructure costs
    D. Increased maintenance overhead

  19. The process of securely managing user access rights is called:
    A. Authentication
    B. Authorization
    C. Encryption
    D. Tokenization

  20. Which of the following is an open-source IoT platform?
    A. AWS IoT
    B. OpenHAB
    C. Google Cloud IoT
    D. Azure IoT Hub

  21. In networking, the term HTTP stands for:
    A. Hyper Text Transfer Protocol
    B. Hyperlink Transmission Protocol
    C. Hyper Text Transaction Protocol
    D. Hyperlink Transfer Protocol

  22. Which of the following is a type of keylogger malware?
    A. Firewall
    B. Keystroke recorder
    C. Antivirus
    D. VPN

  23. The shortcut key to open the search bar in a browser is:
    A. Ctrl + F
    B. Ctrl + S
    C. Ctrl + T
    D. Ctrl + P

  24. Which of the following is used to create cross-platform mobile applications?
    A. HTML
    B. CSS
    C. Flutter
    D. XML


Part B: Subjective Type Questions (26 Marks)

20-30 Word Based Questions (2 Marks Each, 7 Questions, Total 14 Marks)

  1. Define a time-series database and give one example.

  2. What is the difference between a DNS server and a DHCP server?

  3. Explain the term "digital certificate" in cybersecurity.

  4. What is the purpose of a database schema?

  5. Define blockchain and name one application.

  6. What is the role of a content delivery network in web performance?

  7. Explain the term "serverless architecture" with an example.

50-80 Word Based Questions (3 Marks Each, 4 Questions, Total 12 Marks)

  1. Explain the role of a security operations center (SOC) in cybersecurity.

  2. Describe the steps to write a Python program to perform machine learning using scikit-learn.

  3. Explain the difference between public and private cloud computing with examples.

  4. Discuss the importance of data backup strategies and suggest two methods for implementation.



THE END

No comments:

Post a Comment

Please Comment

AD

BIHAR JOB

DELHI RECRUITMENT

CENTRAL GOVT RECRUITMENT NEWS

RAJASTHAN RECRUITMENT

UTTHAR PRADESH RECRUITMENT

All India Exams - Admit Cards October 2025

All India Competitive Exams - Admit Cards Released in October 2025

(For Exams Scheduled Up to 30 October 2025)

Exam Name Admit Card Release Date Exam Date Conducting Body Download Link
SSC CGL Tier 1 Re-Test (for affected candidates) 9 October 2025 14 October 2025 Staff Selection Commission (SSC) Download Admit Card (Regional Websites)
NIOS Class 10 & 12 (October-November Session) 8 October 2025 14 October 2025 to 18 November 2025 (up to 30 Oct relevant) National Institute of Open Schooling (NIOS) Download Admit Card (Use Enrollment No.)
UPTET 2025 (Uttar Pradesh Teacher Eligibility Test) Expected mid-October 2025 15-16 October 2025 Uttar Pradesh Basic Education Board (UPBEB) Official Site (Admit card link soon)
MPESB PSTST 2025 (Primary School Teacher) 9 October 2025 Starting 9 October 2025 (multi-day, up to 30 Oct shifts) Madhya Pradesh Employees Selection Board (MPESB) Download Admit Card

Important Notes

  • SSC CGL Re-Test: For 55,000+ candidates affected by technical issues. Total vacancies: 14,582.
  • NIOS Exams: Theory exams start 14 October. Download admit card using Enrollment Number. Confirm fee payment.
  • UPTET: For Primary/Upper Primary teacher eligibility. Notification recently released.
  • MPESB PSTST: Primary teacher selection, 18,650 vacancies. Exam in two shifts (10:30 AM-12:30 PM & 3:00 PM-5:00 PM).
  • How to Download: Use Registration Number, DOB, etc., to log in. Take a printout and carry a valid photo ID (Aadhaar/Voter ID) to the exam hall.
  • Updates: Check official websites for any changes in dates or links.

For further details, visit the respective official websites or contact their helplines.

Visit MPESB Website Visit SSC Website Visit NIOS Website Visit UPTET Website

MADHYA PRADESH RECRUITMENT

Government Recruitment Websites

अक्टूबर 2025 की नई सरकारी नौकरियां

Government Jobs October-November 2025 (Central & All States) - Official Links

Government Job Openings: Central & All States (Oct 26 - Nov 30, 2025)

Only Govt Jobs | Total Vacancies: 75,000+ | Central (All India) + State-Specific

Job Title Organization/Type State/Scope Vacancies Qualification Last Date Official Apply/Notification Link
Research Fellow & Manager National Judicial Academy (Central) All India (Bhopal) 4 PG/PhD October 27, 2025 Apply Now PDF
Technical Assistant & Junior Assistant NIT Jalandhar (Punjab State) Punjab 58 Diploma/Graduate October 27, 2025 Apply Now PDF
Prohibition Constable, Jail Warder & Mobile Squad Bihar Police (State) Bihar 4,128 12th Pass October 25, 2025 Apply Now PDF
Laboratory Technician AIIMS Raebareli (UP State) Uttar Pradesh Various B.Sc October 30, 2025 Apply Now PDF
HSSC Clerk & Group D Haryana Staff Selection (State) Haryana 10,000+ 10th/12th/Graduate October 28, 2025 Apply Now PDF
Assistant Manager & Extension Officer KMF Shimul (Karnataka State) Karnataka 27 Graduate October 29, 2025 (Extended) Apply Now PDF
SSC CGL Tier-1 SSC (Central) All India 10,000+ Graduate November 15, 2025 Apply Now PDF
IBPS PO Prelims IBPS (Central) All India 5,000+ Graduate November 10, 2025 Apply Now PDF
RRB NTPC RRB (Central) All India 35,000+ 12th/Graduate November 20, 2025 Apply Now PDF
BPSC 71st Prelims BPSC (Bihar State) Bihar 1,000+ Graduate November 5, 2025 Apply Now PDF
UPPSC PCS Mains UPPSC (UP State) Uttar Pradesh 200+ Graduate November 18, 2025 Apply Now PDF
HPSC HCS Prelims HPSC (Haryana State) Haryana 200+ Graduate November 12, 2025 Apply Now PDF
PPSC Lecturer PPSC (Punjab State) Punjab 300+ PG November 25, 2025 Apply Now PDF
Bihar Teacher TRE 4.0 Bihar Education (State) Bihar 1,00,000+ Graduate/B.Ed November 30, 2025 Apply Now PDF

Upcoming Major Govt Exams/Jobs in October-November 2025 (Central & States)

Key exams/notifications expected; prepare now!

Exam/Job Organization/Type Scope Vacancies (Est.) Key Date Official Link
SSC MTS SSC (Central) All India 10,000+ November 2025 Check
IBPS Clerk Prelims IBPS (Central) All India 6,000+ November 2025 Check
RRB Group D RRB (Central) All India 30,000+ November 2025 Check
BPSC Mains BPSC (Bihar State) Bihar 800+ November 2025 Check
MPSC State Services MPSC (Maharashtra State) Maharashtra 500+ November 2025 Check
KPSC Gazetted Probationers KPSC (Karnataka State) Karnataka 300+ November 2025 Check
TNPSC Group-1 TNPSC (Tamil Nadu State) Tamil Nadu 100+ November 2025 Check
Kerala PSC Various Kerala PSC (State) Kerala 500+ November 2025 Check
PPSC Lecturer PPSC (Punjab State) Punjab 300+ November 2025 Check
HPSC HCS Prelims HPSC (Haryana State) Haryana 200+ November 2025 Check

Note: Updated as of October 26, 2025. Always verify official websites for latest changes. Good luck! 🚀

NCERT

NCERT Books Portal - Classes 1 to 12
Indian Libraries
Government Recruitment Portal 2025

Government Recruitment Portal 2025

Latest Updates on Job Notifications, Eligibility, Syllabus, and Application Links

Bihar STET 2025 Online Form – Start

Vacancies: Not specified (Eligibility Test)

Eligibility: Graduation + B.Ed; Age 21-42 years (as on 01/08/2025)

Last Date: 27 September 2025

Syllabus: Paper 1 (Classes 9-10): Specific Subject, Pedagogy, General Knowledge; Paper 2 (Classes 11-12): Advanced Subject, Pedagogy. Qualifying marks: 60% for General.

Apply Online

BPSC AEDO Online Form 2025

Vacancies: 935

Eligibility: Graduation in Agriculture/Science; Age 21-37 years (as on 01/08/2025)

Last Date: 26 September 2025

Syllabus: Prelims: General Studies, Aptitude; Mains: General Hindi, General Studies, Optional (Agriculture). Qualifying: 30% in language papers.

Apply Online

Bihar BPSC AES Online Form 2025 – Last Date Today

Vacancies: 17

Eligibility: M.Sc in Environmental Science; Age 21-37 years

Last Date: 19 September 2025

Syllabus: General Studies, Environment Science, Hindi. Focus on pollution control, ecology.

Apply Online

Patna High Court Stenographer Online Form 2025 – Last Date Today

Vacancies: 111

Eligibility: 12th Pass + Shorthand 80 wpm; Age 18-47 years (as on 01/01/2025)

Last Date: 19 September 2025

Syllabus: Written: English Grammar, Computer Basics; Skill Test: Shorthand/Typing. Qualifying: 40% General.

Apply Online

IOCL Pipelines Division Apprentice Online Form 2025 – Date Extend

Vacancies: 537

Eligibility: ITI/Diploma/12th; Age 18-24 years (as on 31/08/2025)

Last Date: 28 September 2025

Syllabus: Merit-based on qualifying marks; No exam. Focus on trade skills.

Apply Online

Railway RRB Junior Engineer JE Online Form 2025

Vacancies: 2570

Eligibility: Diploma/BE; Age 18-33 years

Last Date: To be announced (Notification in September 2025)

Syllabus: CBT 1: Maths, Reasoning, GK; CBT 2: Technical Subject. Qualifying: 40% UR.

Apply Online (Soon)

Railway RRC NCR Apprentice Online Form 2025 – Start

Vacancies: 1763

Eligibility: 10th + ITI; Age 15-24 years

Last Date: 17 October 2025

Syllabus: Merit-based; No exam. Focus on ITI marks.

Apply Online

IBPS RRB 14th Online Form 2025 – (13217 Posts)

Vacancies: 13217

Eligibility: Graduation; Age 18-28/40 years (post-wise)

Last Date: 21 September 2025

Syllabus: Prelims: Reasoning, Quant; Mains: English, GK, Computer. Qualifying: 40% UR.

Apply Online

DSSSB Primary Teacher PRT Online Form 2025 – Start

Vacancies: 1180

Eligibility: 12th + B.El.Ed/D.El.Ed; Age up to 30 years

Last Date: 16 October 2025

Syllabus: General Awareness, Reasoning, Hindi, English, Maths, EVS. Qualifying: 40% General.

Apply Online

BPSC APS & WMO Online Form 2025

Vacancies: 60

Eligibility: Graduation; Age 21-42 years

Last Date: 30 September 2025

Syllabus: General Studies, Sanitation/Waste Management. Qualifying: 30% language.

Apply Online

UPPSC APO Online Form 2025 – Start

Vacancies: 182

Eligibility: LLB; Age 21-40 years

Last Date: 16 October 2025

Syllabus: Prelims: GK, Law; Mains: Constitution, IPC, CrPC. Qualifying: 40% UR.

Apply Online

MPESB Police Constable Online Form 2025 – Start

Vacancies: 7500

Eligibility: 12th Pass; Age 18-33 years

Last Date: 29 September 2025

Syllabus: GK, Reasoning, Maths, Hindi, Science. Qualifying: 40% UR.

Apply Online

Bihar BSSC Office Attendant Online Form 2025 (3727 Posts) – Start

Vacancies: 3727

Eligibility: 10th Pass; Age 18-37 years

Last Date: 24 September 2025

Syllabus: Written: GK, Maths, Reasoning. Qualifying: 30% UR.

Apply Online

RRB Section Controller Online Form 2025 – Start

Vacancies: 368

Eligibility: Graduation; Age 20-33 years

Last Date: 14 October 2025

Syllabus: CBT: Reasoning, Maths, GK. Qualifying: 40% UR.

Apply Online

Bihar BSSC 4th Graduate Level Online Form 2025 (1481 Posts) – Start

Vacancies: 1481

Eligibility: Graduation; Age 21-37 years

Last Date: 24 September 2025

Syllabus: Prelims: GK, Reasoning; Mains: Hindi, English, Subject. Qualifying: 30% UR.

Apply Online

RRVUNL Technician III, Operator & Plant Attendant Online Form 2025 – Re-Open

Vacancies: 2163

Eligibility: ITI; Age 18-28 years

Last Date: 25 September 2025

Syllabus: Written: Technical, GK, Reasoning. Qualifying: 40% UR.

Apply Online

BPSC District Sports Officer DSO Online Form 2025 – Start

Vacancies: 33

Eligibility: Graduation + Sports Degree; Age 21-42 years

Last Date: 26 September 2025

Syllabus: GK, Sports Science, Hindi. Qualifying: 30% language.

Apply Online

BPSC HOD Online Form 2025 – Start

Vacancies: 218

Eligibility: PhD/Master's + Experience; Age 33+ years

Last Date: 30 September 2025

Syllabus: Subject-specific, Teaching Aptitude. Interview-based.

Apply Online

Army AFMS MO Online Form 2025 – Start

Vacancies: 225

Eligibility: MBBS; Age up to 30/35 years

Last Date: 03 October 2025

Syllabus: NEET PG-based shortlisting; Interview: Medical Knowledge.

Apply Online

IOCL Junior Engineer/ Officer Online Form 2025 – Start

Vacancies: Not specified

Eligibility: Diploma; Age 18-26 years

Last Date: 28 September 2025

Syllabus: CBT: Domain (50%), Aptitude (50%). Qualifying: 45% UR.

Apply Online