Nios Last Year Solved Question Paper Data Entry Operations 336 Class 12
Previous Year Nios Solved Question Paper for Class 12 All Subjects
Get Nios Last Year Solved Question Paper Data Entry Operations 336 Class 12 & also we have all subject solved assignment files. Download Now – https:/product-category/nios-exam/nios-model-test-paper/12th-nios-model-question-paper
Data Entry Operations
(336)
Time: 2 Hours] [ Maximum Marks: 40
Note:
(i) This question paper consists of 24 questions in all.
(ii) All questions are compulsory.
(iii) Marks are given against each question.
(iv) Section—A consists of
(a) Q.Nos. 1 to 8–Multiple Choice-type questions (MCQs), Q.No. 1 to Q.No. 7 carrying 1 mark each and Q.No. 8 carrying 2 marks. Select and write the most appropriate option out of the options given in each of these questions. An internal choice has been provided in some of these questions. You have to attempt only one of the given choices in such questions.
(b) Q.Nos. 9 to 17–Objective-type questions, Q.Nos. 9 and 10 carry 2 marks each (with 2 sub-parts of 1 mark each) and Q.Nos. 11 to 17 carry 1 mark each (An internal choice has been provided in some of these questions. You have to attempt only one of the given choices in such questions). Attempt these questions as per the instructions given for each of the questions 11–17.
(v) Section—B consists of
(a) Q.Nos. 18 and 19 – Very Short Answer-type questions carrying 2 marks each to be answered in the range of 30 to 50 words.
(b) Q.Nos. 20 to 23 – Short Answer-type questions carrying 3 marks each to be answered in the range of 50 to 80 words.
(c) Q.No. 24 – Long Answer-type question carrying 4 marks to be answered in the range of 80 to 120 words.
(1) Answers of all questions are to be given in the Answer-Book given to you.(2) 15 minutes time has been allotted to read this question paper. The question paper will be distributed at 2:15 p.m. From 2:15 p.m. to 2:30 p.m., the students will read the question paper only and will not write any answer on the Answer-Book during this period. |
SECTION – A
- Process, cycle and hierarchy are the examples of
(A) autoshapes (B) smartart graphics
(C) flowchart (D) column chart 1
Ans. (B) smartart graphics
- Each Excel file is a workbook which can hold many
(A) worksheets (B) cell sheets
(C) row sheets (D) column sheets 1
Ans. (A) worksheets
- Answer any one of the following: 1
(i) What will be the value of the following function when typed in a cell?
= MAX (15, 16, 2, 5, 18, 17)
(A) 18 (B) 15
(C) 17 (D) 16
Ans. (A) 18
Nios Solved Question Paper 2024 All Subjects Available Get it in Pdf – Download Pdf Now
(ii) Mark the correct value for the following function:
= AVERAGE (2, 3, 4, 5, 6)
(A) 4 (B) 5
(C) 3 (D) 4·5
Ans. (A) 4
- Which is the default text alignment found in word documents? 1
(A) Center (B) Right
(C) Left (D) Justified
Ans. (C) Left
- Space bar key is used to put a
(A) gap between two words (B) hiphen between two words
(C) comma between two words (D) line between two words 1
Ans. (A) gap between two words
Nios Last Year Solved Question Paper Data Entry Operations 336 Class 12 – WhatsApp On – 9643289714
- Answer any one of the following: 1
(i) Which chart is used to demonstrate the fluctuation with respect to the stock market prices?
(A) Scatter chart (B) Stock chart
(C) Bar chart (D) Surface chart
Ans. (B) Stock chart
(ii) Which chart is used to show comparison between individual items?
(A) Bar chart (B) Pie chart
(C) Radar chart (D) Doughnut chart
Ans. (A) Bar chart
- Shortcut key for closing a file is
(A) Ctrl + close (B) Ctrl + C
(C) Ctrl + W (D) Ctrl + X 1
Ans. (C) Ctrl + W
-
In the questions given below, there are two statements marked as Assertion (A) and Reason (R). Choose the correct option out of the choices given below in each question (attempt any two) : 1×2=2
(i) Assertion (A) : Operating system is a system software.
Reason (R) : System softwares are those programs which are responsible for running the computer and controlling various operations.
(A) A is true but R is false
(B) A is false but R is true
(C) Both A and R are false
(D) Both A and R are true but R is not the correct explanation of A
(E) Both A and R are true and R is the correct explanation of A
Ans. (E) Both A and R are true and R is the correct explanation of A
The operating system is indeed a system software, and system software includes programs that are responsible for running the computer and controlling various operations.
(ii) Assertion (A) : ORACLE is a generalized package user-friendly software used for database management purpose.
Reason (R) : Generalized and customized packages are two types of application software.
(A) Both A and R are true but R is not the correct explanation of A
(B) A is true but R is false
(C) A is false but R is true
(D) Both A and R are false
(E) Both A and R are true and R is the correct explanation of A
Ans. (E) Both A and R are true and R is the correct explanation of A
ORACLE is indeed a user-friendly software used for database management, and generalized and customized packages are two types of application software. The reason (R) explains why ORACLE fits into the category of generalized software.
(iii) Assertion (A) : Printed pages can have various types of margin settings.
Reason (R) : Page margin can be set in two ways; using ruler and using page setup dialog box. Other than the default margin settings, you can set customized margins for your page.
(A) A is true but R is false
(B) A is false but R is true
(C) Both A and R are false
(D) Both A and R are true and R is the correct explanation of A
(E) Both A and R are true but R is not the correct explanation of A
Ans. (D) Both A and R are true and R is the correct explanation of A
Printed pages can indeed have various margin settings, and the reason (R) accurately explains how margins can be set either using the ruler or the page setup dialog box, including the option for customized margins.
(iv) Assertion (A) : Bulleted lists are created in word documents.
Reason (R) : In order to draw readers’ attention to the main points of the document, bulleted lists are added.
(A) Both A and R are false
(B) A is false but R is true
(C) A is true but R is false
(D) Both A and R are true and R is the correct explanation of A
(E) Both A and R are true but R is not the correct explanation of A
Ans. (D) Both A and R are true and R is the correct explanation of A
Bulleted lists are indeed created in Word documents, and the reason for using them is to draw readers’ attention to the main points of the document.
-
State True or False (any two) : 1×2=2
(a) Ctrl + M keys are pressed together to move the text.
(b) For making the text center aligned, press Ctrl + C keys.
(c) Pressing tab key can move the cursor to the next cell.
(d) For undoing the mistake, immediately press Ctrl + Z keys.
Nios Last Year Solved Question Paper Data Entry Operations 336 Class 12 – www.pkkapri.com
Ans. (a) False – Ctrl + M is used to increase indent, not to move text.
(b) False – Ctrl + C is used for copying text, not for center alignment. The correct shortcut for center alignment is Ctrl + E.
(c) True – Pressing the Tab key moves the cursor to the next cell (in programs like Excel or tables in Word).
(d) True – Ctrl + Z is used for undoing the last action.
-
Fill in the blanks (any two) : 1×2=2
(a) Shortcut key for Find and Replace command is _____.
(b) Shortcut key for opening a file is _____.
(c) File can be saved by pressing _____ shortcut keys.
(d) For right alignment of text, select the text and then just press _____shortcut keys.
Ans. (a) Ctrl + H – Shortcut key for Find and Replace command.
(b) Ctrl + O – Shortcut key for opening a file.
(c) Ctrl + S – File can be saved by pressing this shortcut key.
(d) Ctrl + R – For right alignment of text, select the text and then press this shortcut key.
Nios Last Year Solved Question Paper Data Entry Operations 336 Class 12
-
Fill in the blanks :
(a) If you want to post PowerPoint presentation on the _____, you can save them as webpage. 1
Ans. If you want to post PowerPoint presentation on the __ web___, you can save them as webpage.
Or
(b) When you select print what : slides option in the print dialog box, then you will find prints of full page _____ on each page.
Ans. When you select print what : slides option in the print dialog box, then you will find prints of full page __ slides___ on each page.
- The style of writing a function is called its _____. (Fill in the blank) 1
Ans. The style of writing a function is called its syntax.
-
When you cut or copy text, the text stored in an area of memory is called_____. (Fill in the blank) 1
Ans. The text stored in an area of memory when you cut or copy text is called the clipboard.
- Answer any one of the following : 1
(a) Which function key is pressed to get any type of help?
Ans. F1 – Pressing F1 opens the help feature in most software.
(b) Which function key is pressed to explicitly run spelling and grammar check facility?
Ans. F7 – Pressing F7 explicitly runs the spelling and grammar check facility in programs like Microsoft Word.
-
Which font size is best for paragraph text? 1
Ans. The best font size for paragraph text is typically 10 to 12 points. This range ensures readability while maintaining a professional appearance in most documents. However, the choice can depend on the context, such as the type of document and the target audience.
- Which feature is used to fill cells with calendar months in sequence starting from January and ending on December? 1
Ans. The feature used to fill cells with calendar months in sequence starting from January and ending on December is called AutoFill.
To use it:
- Type “January” in the first cell.
- Select the cell and drag the fill handle (the small square at the bottom-right corner of the selected cell) down to fill the cells with the remaining months.
- Visual representation of information and ideas is called _____ art graphics. (Fill in the blank) 1
Ans. Visual representation of information and ideas is called SmartArt graphics.
SECTION–B
- Explain the importance of high-level language. Give two examples of high level language which are used these days for programming. 2
Ans. Importance of High-Level Language:
High-level languages are important because they are designed to be user-friendly, making programming easier for humans to understand and write. They provide abstraction from the underlying hardware, allowing programmers to focus more on solving problems than on managing hardware details. High-level languages also feature syntax and commands closer to natural language, which simplifies code development and maintenance.
Advantages:
- Ease of Use: High-level languages are closer to human languages, making them easier to read and write.
- Portability: Programs written in high-level languages can be run on different types of computer systems with minimal modification.
- Faster Development: High-level languages have built-in functions and libraries, which speed up the development process.
Examples of High-Level Languages:
- Python – A versatile language known for its simplicity and readability.
- Java – A widely-used language known for its platform independence, often used in web and mobile applications.
Or
What is meant by application software and what are its classification?
Ans. Application Software:
Application software refers to programs or sets of programs designed to perform specific tasks or solve particular problems for the user. Unlike system software, which manages and operates the computer hardware, application software directly helps the user carry out tasks like word processing, spreadsheet calculations, web browsing, and more.
Classification of Application Software:
- Productivity Software: These are applications that help users perform specific tasks related to office work, content creation, and more.
- Examples: Microsoft Word (word processing), Microsoft Excel (spreadsheets), Microsoft PowerPoint (presentations).
- Media Software: These are applications used to create, edit, or manage multimedia content such as audio, video, or images.
- Examples: Adobe Photoshop (image editing), VLC Media Player (media playback), Adobe Premiere Pro (video editing).
- Web Browsers: Software used to access and navigate the internet.
- Examples: Google Chrome, Mozilla Firefox, Microsoft Edge.
- Utility Software: These are applications that help manage, maintain, or optimize the system, but are designed for specific tasks outside of general system operations.
- Examples: Antivirus software, disk cleanup tools, backup software.
- Database Software: Used for managing and organizing large volumes of data.
- Examples: Oracle, Microsoft Access, MySQL.
- Gaming Software: Specialized software used for entertainment, typically video games.
- Examples: Fortnite, Minecraft, The Sims.
- Educational Software: Software designed to aid in learning and training.
- Examples: Duolingo (language learning), Khan Academy, educational simulation software.
-
(a) Name the electromechanical hand-held device used as a pointer. 1
Ans. The electromechanical hand-held device used as a pointer is called a mouse.
It is used to move the cursor on the screen and interact with graphical elements in a computer’s graphical user interface (GUI).
(b) Which device is designed to produce large drawings or images? 1
Ans.
The device designed to produce large drawings or images is called a plotter.
Plotters are used to produce high-quality graphics, engineering drawings, architectural plans, and other large-format prints. Unlike printers, which create images with dots, plotters use pens or other tools to draw continuous lines, making them ideal for precise and detailed drawings.
-
Write the names of any two graphic tools and any one DBMS program. 3
Ans. Two Graphic Tools:
- Adobe Photoshop – A widely used tool for image editing and graphic design.
- CorelDRAW – A vector graphics editor used for creating illustrations, logos, and designs.
One DBMS Program:
- Oracle – A popular relational database management system (DBMS) used for managing large databases.
Or
Write the names of any three types of printer.
Ans.
Three Types of Printers:
- Inkjet Printer – Uses liquid ink to print on paper, known for high-quality color prints.
- Laser Printer – Uses a laser beam and toner to print text and images quickly and efficiently, often used in offices.
- Dot Matrix Printer – An impact printer that uses a print head to strike an ink ribbon against paper, typically used for printing multi-part forms.
-
Name three ways of creating data source in mail merge. 3
Ans.
Three ways of creating a data source in Mail Merge:
- Using an Existing Microsoft Word Document: You can create a data source by using a pre-existing Word document that contains a list of names and addresses (e.g., a table of contact details).
- Using an Excel Spreadsheet: You can create a data source by linking to an Excel file, which is commonly used because it organizes data in rows and columns (like names, addresses, phone numbers).
- Manually Typing a New List: You can directly type a new list of data in the Mail Merge Wizard, creating a new data source within Word itself. This is useful for smaller, simpler mail merges.
- Explain the steps to create a data source using an Excel worksheet. 3
Ans. To create a data source for Mail Merge using an Excel worksheet, follow these steps:
1: Prepare the Data in Excel
- Open Microsoft Excel.
- In the first row, create column headers to describe the data. For example, if you’re creating an address list, you might use headers like First Name, Last Name, Address, City, State, Zip Code.
- Fill in the data under each header. Each row should represent one record (such as one person or one address).
- Save the Excel file with a meaningful name, such as Contacts.xlsx.
2: Start the Mail Merge in Microsoft Word
- Open Microsoft Word.
- Go to the Mailings tab and click Start Mail Merge.
- Select the type of document you want to create (e.g., Letters, Envelopes, Labels).
3: Select the Data Source
- In the Mailings tab, click on Select Recipients.
- Choose Use an Existing List from the dropdown menu.
- Navigate to the location where you saved your Excel file and select it.
- If prompted, select the worksheet that contains your data (usually Sheet1), and click OK.
4: Insert Merge Fields
- Now, place your cursor in the document where you want to insert personalized information (like the recipient’s name or address).
- Click Insert Merge Field in the Mailings tab, and select the column header from your Excel worksheet (e.g., First Name, Last Name, etc.).
- Repeat this for all the fields you want to include in the document.
5: Preview the Mail Merge
- Click Preview Results in the Mailings tab to see how the merged data will appear in the document.
- Use the Next Record button to move through different entries in your data source and ensure the fields are populated correctly.
6: Complete the Mail Merge
- Once you’re satisfied with the preview, click Finish & Merge.
- Choose whether you want to Print Documents, Create a New Document (to save the merged document), or Send Email Messages.
7: Save the Final Document
- If you chose to create a new document, save it with a new name to preserve your merged information.
By following these steps, you’ve successfully created a data source in Excel and used it in a Mail Merge in Microsoft Word.
-
Expand the following (any three) : 1×3=3
(a) IP
(b) KBPS
(c) HTTP
(d) CC
Ans.
(a) IP – Internet Protocol
(b) KBPS – Kilobits Per Second
(c) HTTP – Hypertext Transfer Protocol
(d) CC – Carbon Copy (commonly used in email)
-
(a) Explain Telnet and FTP. 2
Ans. Telnet:
- Definition: Telnet (short for “Teletype Network”) is a protocol that allows users to remotely access and manage devices or systems over a network (such as the internet) using a command-line interface.
- Functionality: It provides a text-based interface to a remote computer, enabling users to log into systems, execute commands, and manage resources as though they were directly connected to the system.
- Security: Telnet is not secure because it transmits data (including passwords) in plaintext, which makes it vulnerable to interception. It’s often replaced by more secure protocols like SSH (Secure Shell).
- Usage Example: Telnet is commonly used to manage remote servers, network equipment, and other systems that do not require graphical interfaces.
FTP (File Transfer Protocol):
- Definition: FTP is a protocol used to transfer files between a client and a server over a network (such as the internet). It allows for the uploading, downloading, and management of files remotely.
- Functionality: FTP works by using two separate connections between the client and the server:
- Control connection: For sending commands (like login credentials and file management commands).
- Data connection: For transferring the actual files.
- Security: Like Telnet, standard FTP is also not secure as it sends data in plaintext. To address security concerns, FTPS (FTP Secure) or SFTP (SSH File Transfer Protocol) are often used, which encrypt the data during transmission.
- Usage Example: FTP is commonly used for website maintenance, file sharing, and transferring large files between systems.
(b) Explain organizational domains and geographical domains. 2
Ans. Organizational Domains:
Organizational domains refer to the structure or system of domains used within an organization, typically in the context of the Domain Name System (DNS) or a company’s internal network setup. These domains are specifically created to manage and structure the organization’s internet or intranet addresses, ensuring that different departments, teams, or services are appropriately categorized.
Characteristics:
- Naming Hierarchy: Domains are typically structured in a hierarchical manner to represent the different subdivisions of an organization (e.g., hr.company.com, sales.company.com).
- Internal Use: Many organizations have their own internal domains to manage resources such as email servers, websites, and internal databases.
- Management: Organizational domains are often managed by the organization’s IT team, and these domains may be linked to internal systems such as LDAP or Active Directory.
Examples:
- company.com – The primary domain for the organization.
- hr.company.com – A subdomain used for HR department-related services.
Geographical Domains:
Geographical domains refer to domain names that are associated with a specific geographic region, typically to indicate the country, region, or area where the service is being provided. These domains are used for localization, targeting specific audiences based on their location, and for providing region-specific services or content.
Characteristics:
- Country-Code Top-Level Domains (ccTLDs): These are two-letter domain extensions assigned to countries or territories (e.g., .us for the United States, .in for India, .uk for the United Kingdom).
- Localization: Geographical domains help in serving region-specific content, improving search engine optimization (SEO), and ensuring compliance with regional laws and regulations.
- Examples of ccTLDs:
- .ca (Canada)
- .de (Germany)
- .jp (Japan)
- .au (Australia)
Examples:
- company.com.au – A domain representing an organization in Australia.
- example.co.uk – A domain for a company operating in the United Kingdom.
Comparison:
- Organizational Domains focus on internal structure and management of an organization’s network and resources.
- Geographical Domains are more focused on regional or country-specific presence, often influencing the way a website or service is presented to users in different locations.
Nios Last Year Solved Question Paper Data Entry Operations 336 Class 12 – www.pkkapri.com
Or
What happens to a piece of data when it is transferred over the Internet? Explain.
Ans.
When a piece of data is transferred over the Internet, it undergoes a series of steps to ensure that it reaches the correct destination reliably and efficiently. Here’s an explanation of the process:
- Data is Broken into Packets:
- Data is typically transferred in the form of small chunks called packets. Large files or data are broken down into smaller, manageable pieces. Each packet contains a part of the data, as well as information like the destination address and the sequence number to help reassemble the data correctly at the destination.
- Routing the Packets:
- Each packet is routed across the network via routers. The routers are devices that examine the packet’s destination IP address and decide the best path for the packet to take through the network. These routers direct packets based on factors like network topology, congestion, and the shortest available route.
-
Transmission Over Various Networks:
- The packets may travel over different types of networks (wired, wireless, local networks, and the global Internet). The data may pass through various servers, routers, switches, and other intermediate devices to reach the destination.
- Reassembly at the Destination:
- Once all the packets have arrived at the destination, the receiving system (like a server or computer) reassembles them in the correct order using the sequence numbers in the packet headers. This process ensures the data is intact and in the right order.
- Error Checking and Handling:
- During the transfer, error-checking mechanisms ensure the integrity of the data. If any packet is lost or corrupted during transmission, protocols like Transmission Control Protocol (TCP) request a retransmission of the missing packets.
-
Protocols and Encryption:
- The transfer uses different protocols to ensure the correct transmission and formatting of the data. For example:
- TCP/IP is the foundational protocol suite used for communication over the Internet, ensuring reliable transmission and routing.
- HTTP/HTTPS protocols are used for web communication, where HTTPS adds an additional layer of security (encryption) to protect the data during transfer.
- Decryption (If Required):
- If the data is being transferred over a secure connection (such as HTTPS), encryption is used to protect the data from being intercepted by third parties. The data is encrypted at the sender’s end and decrypted at the receiver’s end.
-
Final Delivery to the Application:
- After the data is reassembled and any necessary decryption is completed, it is delivered to the application at the destination. For example, if you’re sending an email, the email server will handle the final steps to display the message in the recipient’s inbox.
Nios Last Year Solved Question Paper Data Entry Operations 336 Class 12 .
Nios Solved Assignment (TMA) Pdf 2025 Online