0% found this document useful (0 votes)
2 views

solutions class 10

Uploaded by

rs0504434
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

solutions class 10

Uploaded by

rs0504434
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Class: X

Session: 2023-24

**Computer Applications**

Answer Key for Sample Question Paper (Theory)

---

### SECTION A

(All questions are compulsory, 1 mark each)

1. The acronym URL stands for:

a. Uniform Resource Locator

2. Which tag is used to create a hyperlink in HTML?

c. <a>

3. CSS stands for:

b. Cascading Style Sheets

4. Which of the following is NOT an example of cybercrime?

d. Creating a personal blog

5. The tag used to create an ordered list in HTML is:

b. <ol>
6. Which CSS property is used to set the background color of a web page?

c. background-color

7. Which protocol ensures secure data transmission over the internet?

c. HTTPS

8. The <title> tag in HTML is used for:

a. Specifying the title of a web page

9. What is the purpose of the "alt" attribute in the <img> tag?

b. To provide alternate text for the image

10. Name the malware that locks users out of their system until a ransom is paid:

c. Ransomware

11. Assertion and Reason:

d. (A) is false, and (R) is true.

12. Assertion and Reason:

a. Both (A) and (R) are true, and (R) is the correct explanation of (A).

---

### SECTION B

(2 marks each)

13. Two advantages of using CSS in web development:


- It separates content from design, making the code easier to maintain.

- Styles can be reused across multiple pages, saving development time.

14. Comparison of <ul> and <ol> tags:

- <ul>: Used to create unordered (bullet point) lists.

- <ol>: Used to create ordered (numbered) lists.

15. Phishing: A method used to fraudulently obtain sensitive information by impersonating legitimate

entities.

- Prevention: Avoid clicking on suspicious links and use secure websites.

16. Two ethical guidelines for internet use:

- Respect others' privacy and avoid hacking into accounts.

- Do not plagiarize or use copyrighted material without permission.

17. HTML code for a hyperlink that opens in a new tab:

<a href="https://example.com" target="_blank">Visit Example</a>

18. Two purposes of using the "class" attribute in CSS:

- To apply specific styles to multiple elements.

- To group elements for easier identification in JavaScript.

19. Purpose of using comments in CSS:

- To provide explanations or annotations for the code.

Example:

/* This sets the background color to blue */

body {
background-color: blue;

---

### SECTION C

(3 marks each)

20. HTML code for a paragraph and heading:

<p style="color: red;">This is a paragraph.</p>

<h1 style="color: blue; background-color: yellow;">This is a heading</h1>

21. Three features of HTML5:

- New semantic tags like <header>, <footer>, and <article>.

- Support for audio and video elements without additional plugins.

- Improved form controls with attributes like "placeholder" and "required".

22. CSS rule for styling <h2> tags:

h2 {

border: 2px solid green;

font-weight: bold;

font-size: 20px;

23. Difference between inline, internal, and external CSS:

- Inline CSS: Applied directly within an element's "style" attribute.

- Internal CSS: Defined within a <style> tag in the <head> section of the HTML document.
- External CSS: Stored in a separate file and linked to the HTML document using a <link> tag.

24. HTML code for a table:

<table border="1">

<tr>

<th>Name</th>

<th>Age</th>

<th>City</th>

</tr>

<tr>

<td>Alice</td>

<td>25</td>

<td>New York</td>

</tr>

<tr>

<td>Bob</td>

<td>30</td>

<td>Los Angeles</td>

</tr>

</table>

---

### SECTION D

(4 marks each)

25. HTML form for user input:


<form action="/submit" method="post">

<label for="name">Name:</label>

<input type="text" id="name" name="name" required><br><br>

<label for="email">Email:</label>

<input type="email" id="email" name="email" required><br><br>

<label for="password">Password:</label>

<input type="password" id="password" name="password" required><br><br>

<button type="submit">Submit</button>

</form>

---

### SECTION E

(4 marks each)

**Case Study 1:**

26.

a. Tools for communication: Zoom, Microsoft Teams.

b. Protocol for secure transmission: HTTPS.

c. Importance of strong passwords: Prevents unauthorized access and secures sensitive data.

d. Precaution to avoid malware: Install and update antivirus software regularly.

**Case Study 2:**

27.

a. Ethical practices: Respect copyright laws and give credit to original sources.

b. Plagiarism: Copying content without permission; it's unethical and illegal.

c. Safety tips: Use strong passwords and enable two-factor authentication.


d. Importance of antivirus updates: Protects against the latest threats and vulnerabilities.

---

You might also like