Additional Sample Paper 1 2
Additional Sample Paper 1 2
1
with
Detailed Solutions
(Questions-Answers)
QUESTION COMPUTER
APPLICATIONS
PAPER
Class X
Time : 2 hrs.
Max. Marks : 50
General Instructions:
1. This question paper contains two parts A and B. Each part is compulsory.
2. Part-A carries 20 marks while Part-B carries 30 marks.
3. Part-A consists of very short answer and case based MCQ Questions and Part-B is Descriptive Paper.
4. Both Part-A and Part-B have choices.
Part–A:
1. It consists of two sections- I and II.
2. Section I has 13 questions of very short answer type. An examinee is to attempt any 10 out of 13 questions.
3. Section II has two case studies. Each case study has 7 case-based sub-parts. An examinee is to attempt any 5 out of 7 sub-parts.
Part–B:
1. Q
uestion No. 16 to 20 are Short Answer Type (SA-I) questions of 2 marks each, Question No. 21 to 25 are Short Answer Type (SA-II) questions
of 3 marks each and Question No. 26 is Long Answer Type question of 5 marks.
2. Internal choice is provided in 1 question of 2 marks, 1 question of 3 marks and 1 question of 5 marks.
PART-A
Section-I
This section consists of 13 questions of very short answer type. Question no. 4 to 8 are of ‘fill in the blank’ type.
Fill the blank with the most appropriate answer. Attempt any 10 questions from question no. 1 to 13.
6. ....................................... tag is used to create a 12. Write the HTML code to display an image on the
table row. right side of a page.
7. . ...................................... attribute with <HR> tag 13. Define the term OL.
2 amadhaan of COMPUTER ApPLICATIONS Class X
Section-II
Both the Case study based questions are compulsory. Attempt any 5 questions (out of 7 questions) from each case study.
Each question carries 1 mark.
14. ELECTRONIC MAIL (E-MAIL) (c) many people at a time.
E-mail is a communication system that sends and (d) All of the above
receives messages via Internet, by using specific 15. Measures to Ensure Security During
e-mail addresses known as e-mail ids. It is a E - Commerce
widely used Internet-based communication tool. Security is one of the primary concerns that restrain
It identifies the receiver with an address, similar consumers from engaging with the e-commerce
to the postal mailing system. An e-mail address and doing various online transactions such as
identifies a location on the Internet where an online banking, or the use of credit cards, debit
e-mail can be sent. Free e-mail facility is provided cards, and other tokens like the PayPal, Paytm,
on many websites. E-mail is managed by mail etc. As all such services are preferable choices for
services. Some of the mail servers available are hackers, this makes such applications vulnerable
Gmail, Yahoo mail, Hotmail, Rediffmail, etc. to security breaches. E-commerce security is
(i) Which of the following is not a part of an e-mail? the protection of e-commerce assets from
(a) Outbox (b) Inbox unauthorised access, use, alteration, or destruction.
(c) Spam (d) None of these (i) ………… is a form of electronic signature that
authenticates a document or transaction through
(ii)
Which of these is the easiest way of
encryption and password.
communication?
(a) Patent
(a) E-mail (b) Telephone
(b) Digital signature
(c) Fax (d) Letter
(c) Security certificate
(iii) Which of these is not a medium for e-mail? (d) None of the above
(a) Intranet (b) Internet
(c) Extranet (d) Paper (ii) …………… is a secure technique to protect data
being transmitted over a network.
(iv) The most common protocol used for sending mail
(a) Trademark (b) Copyright
is:
(c) Encryption (d) None of these
(a) SMTP (b) FTP
(c) HTTPS (d) None of these (iii) ………… is also a unique digital identification that is
(v) SMTP stands for: used to verify the identity of an individual website or
user.
(a) Short Mail Transmission Protocol
(a) Security certificate
(b) Small Mail Transmission Protocol (b) Plagiarism
(c) Server Mail Transfer Protocol (c) Computer ethics
(d) Simple Mail Transfer Protocol (d) Trademark
(vi) ………… is the address of an electronic postbox that (iv) It is a process of converting plain text or data into
can receive/send e-mail message on a network. ciphertext.
(a) IP address (b) E-mail address (a) Encryption (b) Http
(c) Http address (d) MAC address (c) IP address (d) Copyright
PART-B
All questions are compulsory. In case of internal choices, attempt any one.
16. Differentiate between Cc and Bcc. 21. Compare HTML and CSS.
17. Why should you try to type correct spellings while 22. Write the purpose of the name and HREF attributes
conducting a search on a search engine? of <A> tag.
18. Discuss the importance of adding images in a web 23. Discuss the width and height attributes of <IMG>
page. tag.
19. What are nested lists? Explain with the help of an 24. Discuss any three criteria that the distribution
example. terms of opensource software must comply with.
20. How can you bridge the gap between digital divide
25. Define E-governance? Explain types of interaction
and digital unite?
in E-governance?
Or Or
Define the following terms: Define E-reservation? Also explain its advantages
(a) DRM and disadvantages.
(b) Plagiarism 26. Write the html code to generate the output shown
below.
Specification Table with Hours and Marks
Or
Answer the following:
(a) Which element property is used to set the size (c) Explain HSPACE.
of the text? (d) Explain Subscript and superscript tag.
(b) Explain Vlink. (e) Explain EM tag with syntax.
4 amadhaan of COMPUTER ApPLICATIONS Class X
nswers
PART-A
Section-I
1. The first web browser was invented in 1990 by Sir Tim Berners-Lee. 7. Color [1]
The browser developed by him was initially called WorldWideWeb.
8. BOT [1]
It was later renamed Nexus. [1]
9. The <LI> tag is used inside the <OL> and </OL> tags to specify a
2. The comments are inserted into HTML documents to enhance the
list item. It is an empty tag. [1]
readability of the documents from the developer’s point of view.
10. <P> <font color =''blue''>Text< /P> [1]
[1]
3. The different types of style sheets are : Inline style sheet, Internal style 11. We use a web browser to access and open websites/ web pages.
sheet and External style sheet. [1] [1]
4. Border-width. 12. <img src “image.jpg”>[1]
5. HREF[1] 13. OL stands for ordered list. It is basically a numbered list of items
that follows a specific sequence. [1]
6. <TR>[1]
Section-II
14.
(i) (d) None of these 15. (i) (b) Digital signature
(ii) (a) E-mail (ii) (c) Encryption
(iii) (d) Paper (iii) (a) Security certificate
(iv) (a) SMTP (iv) (a) Encryption
(v) (d) Simple Mail Transfer Protocol (v) (c) Secure Hyper Text transfer Protocol
(vi) (b) E-mail address (vi) (c) Secure Socket Layer
(vii) (d) All of the above (vii) (b) E-commerce
PART-B
16. Cc (CARBON COPY): Cc is used to type the e-mail address 19. When one list is placed inside another it is called a nested list.
of the people we want to send a copy of our e-mail to. This When an ordered list is placed inside an unordered list and vice
feature is used to share a particular message with a large versa it is also called a nested list.
number of people.
Bcc (BLIND CARBON COPY): If we want to keep somebody
invisible from all the other recipients of our message, then his or
her e-mail address will be typed here. This feature is very similar
to Cc. (1 × 2 = 2)
17. We should type correct spellings for searching the information so
as to get appropriate and relevant results. For example, if we type
‘nsie plltin’ instead of ‘noise pollution’ as keywords, our search
either would turn up empty or non-relevant search results will be [2]
displayed. [2]
18. Images are very important to enhance the appearance of a web 20. Both the people and governments should work together to bridge
the gap between digital divide and digital unite. This would help
page and to grab the attention of the viewers. Images also help in
to reap the maximum benefits from the technologies. [2]
depicting or illustrating many complex concepts in simple way on
our web page. Images can be inserted in a web page by using the Or
<IMG> tag and the SRC attribute of the <IMG> Tag. [2]
(a) DRM stands for Digital Rights Management (DRM) is a set
Sample Question Paper 1 for 2021 Board Examination 5
of access control technologies for restricting the use of an aggregate software distribution containing programs from
proprietary software and copyrighted works. several different source.
(b) It defined as the act of taking another person writing, (b) Source Code: The program must include source code, and
conversation, song or even an idea and passing it off as must allow distribution in source-code as well as in its
your own, without citing or crediting the original author or compiled form.
source.[2] (c) Derived Works: The license must allow modification and
21. HTML and CSS are not really different from each other, rather CSS derived works and must allow them to be distributed under
is an extension of HTML. CSS enhances basic HTML tags and the same terms as the license of the original software.
attributes and improves the presentation of the web pages. HTML [1 × 3 = 3]
pages contain HTML tags and different styles can be specified for 25. E-governance or Electronic-governance can be defined as use
these tags using CSS. A single CSS file can be linked to many of information and communication technology by government
web pages. All web pages will import the styles of the style sheet. sectors to enhance the range, quality of services and information
Thus, we can say that HTML contains basic tags to create web provided to the citizens in a cost-effective manner.
pages, whereas CSS is an extension to HTML as it only specifies Types of Interactions in E-governance
the formatting and appearance styles for these web pages. [3] (a) G2G (Government to Government): When the exchange
22. The href attribute of <A> tag contains the address or reference of information and services is within the periphery of the
of the web page that needs to be linked. government, it is termed as G2G interaction.
Syntax: <A HREF = ''url''> (b) G2C (Government to Citizen): The interaction between the
Here, url specifies the address of the web page to be linked. government and general public is called G2C interaction.
To jump to a specific location or particular page section in the Here, an interface is set up between government and citizens,
same web page, you first need to specify or mark the particular which enables citizens to get access to a wide variety of public
page section. This can be done using the name attribute of the services.
Anchor tag. (c) G2B (Government to Business): In this case, e-governance
Syntax: <a name = ''top''> </A> Name of the section [3] helps the business class to interact with the government.
23. Width attribute: We can change the width of an image using the (d) G2E (Government to Employees): The government of any
Width attribute of the <IMG> tag. This attribute accepts values in country is the biggest employer and so it also deals with
the pixels. employees on a regular basis, as other employers do. ICT
Syntax: Width = ''Value'' helps in making the interaction between government and
Here, value indicates the measurement for specifying the width in employees fast and efficient, along with raising their level of
pixels. satisfaction by providing perquisites and add-on benefits.
Height attribute: We can change the height of an image using the [3]
Height attribute of the <IMG> tag. Or
This attribute accepts values in the pixels. E-reservation or online reservation is the process of booking
Syntax: Height = ''value'' tickets such as for movies, airlines, buses and trains using the
Here, value indicates the measurement for specifying the height Internet. E-reservation or E-booking means making a reservation
in pixels. [3] or appointment for a travel service via the Internet. There are
24. The distribution terms of opensource software must comply with many different websites using which you can make reservations
the following three criteria: online. For example, www.irctc.co.in is an Indian railways’
(a) Free Distribution: The license shall not restrict any party reservation website using which one can book railway tickets
from selling or giving away the software as a component of online anywhere in India.
[3]
6 amadhaan of COMPUTER ApPLICATIONS Class X