0% found this document useful (0 votes)
25 views

It 10class

Uploaded by

sanwaltanuj
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
25 views

It 10class

Uploaded by

sanwaltanuj
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

SAMPLE QUESTION PAPER - 1

Computer Applications (165)


Class X (2024-25)

Time Allowed: 2 hours Maximum Marks: 50


General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, an internal choice of approximately 30%
is provided.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Very Short Answer (VSA) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04
marks each.
Section A
1. Which of the following should be done to prevent hacking? [1]

a) Install anti spyware software. b) Use an updated antivirus


software.

c) Install a Firewall. d) All of these

2. A collection of Web pages linked together in a random order is [1]

a) a Web server b) a search engine

c) a Web browser d) a Website

3. In which of the following fraud, fraudster using a stolen credit card? [1]

a) Identity theft b) Friendly fraud

c) Merchant fraud d) Refund fraud

4. In this technique, there is no direct contact between users and their programs during [1]
execution:

a) Time sharing b) Batch processing


c) Message passing d) System processing

5. The first network was: [1]

a) NSFNet b) Internet

c) ARPANET d) NET

6. Which type of tags are used by HTML? [1]

a) Tags only for linking b) Tags only for image

c) Fixed tags defined by the d) User defined tags


language

7. Which of the following tags contains the Title tag? [1]

a) BODY b) HEAD

c) LIST d) TABLE

8. Which property is used to give the specified spacing between the text characters? [1]

a) Text Design b) Text Transform

c) Text Decoration d) Letter Spacing

9. ________ is the default color of a hyperlink. [1]

a) Blue b) Green

c) Red d) Black

10. The general syntax for adding inline image to HTML document is: [1]

a) <imgsrc = "filename"> b) <img "filename">

c) <srcimg = "filename"> d) <img alt = "filename">

11. Assertion (A): Line spacing between the lines of text can be given using the Line [1]
Break (<BR>) tag.
Reason (R): Title attribute changes the default colour of the hyperlink. It is used
inside the <Body> tag.
a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

12. Assertion (A): The Background color attribute of the Body tag specifies the [1]
background colour of a web page.
Reason (R): The Body tag is a container tag, i.e., it has both, an ON tag and an
OFF tag. It contains all the text and images that make up the page.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

Section B
13. What do you understand by google groups? [2]

14. Why do we need computer networks? [2]

OR
What is e-learning?

15. In which tag, <LINK> element can be used? [2]

16. Anjali is confused between freeware and shareware software. Help her understand [2]
the difference by giving atleast two points for each.

OR
What is cyberbullying?

17. Mention the use of <option> tag. [2]


18. Find the error(s) in the following code and underline those errors. [2]
<HTML>
<HEAD>
<TITLE> Example </HEAD>
</TITLE>
<BODY>...</BODY>
</HTML>

OR
What happens when we click on a hyperlink in a web page?

19. Name different control types supported by HTML forms. [2]

Section C
20. Mention any three advantages of intellectual property rights. [3]

21. Mention some of the positive impacts of e-governance in the society. [3]

22. Write an HTML code to create a password field. [3]

OR
Write an HTML code of a web page using CSS.

23. What is the digital divide? Write any two reasons for digital divide in India. [3]

Section D
24. How to embed audio and video in a Web page? [4]

OR
Explain the <HEAD> tag.

Section E
25. Read the text carefully and answer the questions: [4]
Linking: A key feature of the HTML is its ability to link text and/or an image to
another document or within a document. If you are on a web page and see the
coloured and/or an underlined text, it is a hyperlink. By default, colour of a
hyperlink is blue. The main objectives of linking are as follows:
i. To add more pages to the website and link them together.
ii. Using internal links (anchors) to save scrolling for visitors.
iii. To indirect the user to web page of different website.
In other words, hyperlinks are the links that carry user from one web page to
another (within or on another website). It is activated by clicking on an underlined
text or image.

(i) What is the default colour of a hyperlink?

(ii) Name the tag used in HTML to link a web page with other web page.

(iii) Define anchor tag.

(iv) What do you mean by HREF in HTML?

26. Read the text carefully and answer the questions: [4]
Rashmi is a student of ABC School. She has been provided with an email id from
the school to use for all academic correspondences. She generally receives all her
school's correspondences on this email.
One day she was working in the computer lab, and after her work was over, she
forgot to logout of her email account. When she left the computer lab, her
classmate, Prabhnoor sends objectionable emails from the same email id, to her
teachers, so as to malign Rashmi.

(i) Prabhnoor has invaded ________ of Rashmi.

(ii) Rashmi informs her class teacher about the incident. The teacher calls Prabhnoor
and makes him aware of ________, which is following ethical principles while
working online.

(iii) The teacher also advises all students never to share their ________ with anyone.

(iv) Rashmi has learnt that she should always ________ of her email account once her
work is complete.
Solution
SAMPLE QUESTION PAPER - 1
Computer Applications (165)
Class X (2024-25)
Section A
1.
(d) All of these
Explanation:
All of these
2.
(d) a Website
Explanation:
A Website is a collection of Web pages linked together in a random order and displays
related information on a specific topic.
3.
(d) Refund fraud
Explanation:
In refund fraud, fraudster using a stolen credit card makes an overpayment on purpose.
4.
(b) Batch processing
Explanation:
Batch processing
5.
(c) ARPANET
Explanation:
ARPANET
6.
(c) Fixed tags defined by the language
Explanation:
Fixed tags defined by the language
7.
(b) HEAD
Explanation:
HEAD
8.
(d) Letter Spacing
Explanation:
Letter Spacing
9. (a) Blue
Explanation:
Blue
10. (a) <imgsrc = "filename">
Explanation:
<imgsrc = "filename">
11.
(c) A is true but R is false.
Explanation:
A is true but R is false.
12.
(d) A is false but R is true.
Explanation:
A is false but R is true.
Section B
13. Google groups is one of the most popular search engine to find information about people.
It has incorporated over 800 million Usenet messages into its database.
14. i. Networks enable resource sharing across the globe.
ii. Networks provide high reliability by having alternate copies of data. Presence of
multiple CPUs means that if one goes down, the others may be able to take over its
work. This ability to work in the face of hardware problems is of atmost importance in
military, banking, air traffic control, nuclear reactor safety, etc.
iii. Networks enable a client/server model with clients as small computers, one per user,
with data kept on one or more shared file server machines. Eg. Software installation can
be on server and this can save cost of buying license for every machine.
OR
E-learning is the term used to explain the scenario where teaching-learning process takes
place online using the Internet and communication technology. It is the use of technology
to enable people to learn anytime and anywhere.
15. The <LINK> element goes inside the <HEAD> section.

16. Freeware Shareware


It is available free of cost and It is available free of cost for certain period of time,
allows copying and further then a license fee should be paid. It has right to
distribution. redistribute copies.
Modifications and source code are
Modifications and source code are also not available.
not available.
OR
Cyberbullying involves abuse of another person using threats, insults and hurtful remarks
and messages over the internet. There have been numerous reports of people who have
been driven to suicide by persistent cyberbullying.
17. The <option> tags inside the <select> element defines the available options in the drop-
down list.
18. <TITLE> should be placed before </HEAD>
The correct code is:
<HTML>
<HEAD>
<TITLE> Example </TITLE>
</HEAD>
<BODY> </BODY>
</HTML>

OR
When we click on a hyperlink in a web page, it provides a link that leads from one
document to another.
19. i. Buttons
ii. Check boxes
iii. Radio buttons
iv. Menus
v. Password
vi. Text input
vii. Hidden controls
Section C
20. Advantages of intellectual property rights are as follows:
i. Encourages individuals to distribute and share information and data instead of keeping
it confidential.
ii. Provides legal defense and offers the creators the incentive of their work.
iii. Provides exclusive rights to the creators or inventors.
21. The positive impacts of e-governance are:
i. E-governance has benefitted people by reducing cost and time for various services.
ii. It has reduced corruption in the government.
iii. It has made government administration more transparent and accountable.
22. <html>
<head>
<title> Password Field </Title>
</head>
<body>
<form>
User Id : <input type="text"name="userid"/>
<br><br>
Password<input type="password" name = "pswrd" value="password"/>
</form>
</body>
</html>

OR
<HTML>
<HEAD>
<TITLE>Example Web Page</TITLE>
<STYLE>
H1 {
FONT-FAMILY: comic sans ms, cursive, serif;
COLOR:red;
BORDER-BOTTOM: 1px dotted dark green;
}
P{
FONT-FAMILY: sans-serif: COLOR: orange;
}
</STYLE>
</HEAD>
<BODY>
<H1>HTML Document using CSS</H1>
<P>This is a basic HTML document. This uses CSS.</P>
</BODY>
</HTML>
OUTPUT

23. Digital divide refers to the differing amount of information between those who have
access to ICT and those who don’t have access.
Reasons:
i. Due to the unequal distribution of wealth, poverty is higher in rural areas.
ii. Less literacy rate in rural India.
Section D
24. Embed Audio Element
The HTML <AUDIO> element is used to embed sound content in documents. It may
contain one or more audio sources, represented using the src attribute. The <AUDIO>
element defines an in-browser audio player. The audio player can provide a single piece of
audio content. To specify the source file of the audio content, use one or more
<SOURCE> elements inside the <AUDIO> element. All <SOURCE> files should contain
the same audio content, but in different file formats. The browser will select the first file
format that it is able to play. If you are not going to provide multiple source file formats,
you may indicate the source file in the src attribute, instead of in a separate <SOURCE>
element.
e.g.
<HTML>
<BODY>
<AUDIO controls autoplay>
<SOURCE src = "/html/audio.ogg" type = "audio/ogg"/>
<SOURCE src = "/html/audio.wav" type = "audio/wav"/>
Your browser does not support the <AUDIO> element.
</AUDIO>
</BODY>
</HTML>

Output

Embed Video Element


The <VIDEO> element allows us to embed video files into an HTML document, very
similar to the way images are embedded. The HTML does not specify which video
formats browser should support in the <VIDEO> tag, but most commonly used video
formats are ogg, mpeg4.
e.g.
<HTML>
<BODY>
<VIDEO width = "300" height = "200" controls autoplay>
<SOURCE src = "/html/foo.ogg" type = "video/ogg"/>
<SOURCE src = "/html/foo.mp4" type = "video/mp4"/>
Your browser does not support the <VIDEO> element.
</VIDEO>
</BODY>
</HTML>

Output

OR
This element is a container for all the header elements. The <HEAD> tag must include a
title for the document that can include scripts, styles, meta information and many more.
The second line of your HTML document should be <HEAD>.
The content contained in the head section of your document provides information to the
browsers and search engines but, it is not displayed directly on the Web page. The end of
the head tag is indicated by </HEAD>.
e.g.
<pre><HTML>
<HEAD>
//Header information comes here</HEAD>
</HTML>
Section E
25. Read the text carefully and answer the questions:
Linking: A key feature of the HTML is its ability to link text and/or an image to another
document or within a document. If you are on a web page and see the coloured and/or an
underlined text, it is a hyperlink. By default, colour of a hyperlink is blue. The main
objectives of linking are as follows:
i. To add more pages to the website and link them together.
ii. Using internal links (anchors) to save scrolling for visitors.
iii. To indirect the user to web page of different website.
In other words, hyperlinks are the links that carry user from one web page to another
(within or on another website). It is activated by clicking on an underlined text or image.
(i) Blue colour
(ii) <A>
(iii)The <A> tag defines a hyperlink, which is used to link from one page to another.
The most important attribute of the <A> element is the href attribute, which indicates
the link's destination.
(iv)The HREF attribute specifies the URL of the page the link goes to. If the href attribute
is not present, the <A> tag will not be a hyperlink.

26. Read the text carefully and answer the questions:


Rashmi is a student of ABC School. She has been provided with an email id from the
school to use for all academic correspondences. She generally receives all her school's
correspondences on this email.
One day she was working in the computer lab, and after her work was over, she forgot to
logout of her email account. When she left the computer lab, her classmate, Prabhnoor
sends objectionable emails from the same email id, to her teachers, so as to malign
Rashmi.
(i) Mailbox/EmailID
(ii) Cyber Ethics
(iii)Credentials
(iv)Logout

You might also like