ComputerApplication-SQP (1)
ComputerApplication-SQP (1)
General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, internal choices have been provided in some of the questions.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Page 1 of 7
5. Which protocol is used for video conferencing among multiple participants? 1
A. Telnet
B. Http
C. VoIP
D. SFTP
6. Select the correct option to fill in the blank: 1
A website may consist of _____
A. Static Webpages
B. Dynamic Webpages
C. Both a and b.
D. Domain.
7. Aman, a student of Class X, wants to create numbered list in HTML, which of the 1
following tag should he use?
A. <UL>
B. <OL>
C. <DL>
D. <list>
8. Making a copy of your webpage on the computer is known as …………...? 1
A. Uploading
B. Browsing
C. Downloading
D. None of the above.
9. Himani, a class X student, wants to remotely access a computer system far from her 1
house. Which protocol, out of the following, should she prefer to access or log in it
remotely?
A. FTP
B. SFTP
C. TCP/IP
D. TELNET
10. Anshu, a class X student, is writing CSS code for making all <span> elements bold. 1
Choose the correct code for getting the desired output from the following options:
A. span{text-size:bold}
B. span {font-weight:bold}
C. <span style="font-size:bold">
D. <span style="text-size:bold">
Page 2 of 7
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely
Assertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
A. Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
B. Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion
(A).
C. Assertion (A) is true and Reason (R) is false.
D. Assertion (A) is false and Reason (R) is true.
11. Assertion (A) : A set of rules, used over the networks, is called a Protocol. 1
Reason (R) : HTML is an example of a Protocol.
12. Assertion (A) :Chat and e-mail are live/real time conversation between 1
people/machines.
Reason (R) : We have to be online in both
Section – B
13. Mishika, a class X student, wants to use a software but does not want to pay for it. 2
Which type of software can she use? Write one example of this type of software.
14. A) Write any two differences between e-Banking and e-Commerce. 2
OR
B) What is e-learning? Name any one e-learning platform.
15. State whether the following statements are True or False: 2
I) HTML file extension is .tml.
II) Rowspan attribute is used to make a cell span multiple rows.
III) Unordered list type creates a bulleted list.
IV) HREF Stands for hyper reference.
16. A) Your best friend emails you and tells you that he/she has created a webpage on 2
an internet site having URL as: www.children.com/india/~abc.html
Now you want to create a link to this web page from your web page. Write the
HTML code to do this.
OR
B)
I) Write HTML code to display Horizontal line of red colour.
II) Write HTML Code to create a paragraph whose text colour is blue.
17. What is the purpose of HTML forms? Write HTML Code to create a Textbox in an HTML 2
form.
18. A) An incomplete CSS code within <head> . . . </head> is given below. Complete 2
this code by filling in the blanks as per the specifications that follow:
<head>
Page 3 of 7
<style>
body {________ : blue; } <!--line 1 -->
p {
________: green; <!--line 2 -->
________: Dotum; <!--line 3 -->
}
_____ <!--line 4 -->
{
Color : black;
}
</style>
</head>
Based on the above code fill in the blanks given in line 1, line2, line 3, and line 4 so
that Hemant’s webpage displays output correctly?
19. Write any two differences between SMS and MMS. 2
Section – C
Page 4 of 7
20. The following HTML statements are not written properly. Re-write the correct 3
statements with underlined corrections. The desired purpose of each statement is
mentioned under it.
I. <BODY color="red">
<!--Page background color should be red-->
II. <FONT type="arial">
<!--Type of Font should be Arial-->
III. <img source="img_girl.jpg" size="500" height="600">
<!—Image source should be img_girl.jpg, width and
height both should be 500-->
21. Consider the URL: https://www.cbse.gov.in and answer the following questions: 3
I. Which component identifies the protocol?
II. What is the significance of "s" in https?
III. Expand the terms URL and WWW?
22. A) Write any two ways to add an audio file in a web page using HTML? Explain with 3
sample code.
OR
B) Write any two ways to add a video file in a web page using HTML? Explain with
sample code.
23. Write suitable HTML statements to display the following text on a webpage: 3
I) NH3
II) X3
III) (A+B)3
Section – D
24. A) Write the HTML code to design the web page as shown below: - 4
Page 5 of 7
OR
B) Write the HTML code to design the web page as shown below (Table border
should be 2, height=100 and width=300 with cellpadding =20): -
Section – E
25. Mr. Anek comes from a village, which recently started seeing the digital revolution, 4
and now the people of his village have access to the internet. They can shop online,
make payments online, sell online and so on. Anek is also excited with these new
changes. He ordered some items online and entered his bank card details on the
webpage to make the payment.
But still after passing of the promised due date, he has not received his ordered
items. There is no way to contact the company as phones are unreachable and emails
are not being responded. He also noticed after some days that someone is sending
emails on his behalf, using his personal data.
Page 6 of 7
Based on the above information answer the following question: -
I. Mr. Anek is a victim of ____________.
II. Mr. Anek finds that his personal details are now leaked. This means his
______ is compromised.
III. While filling out details online, Mr. Anek should have checked _____ in
the URL.
IV. This type of incident will be recognized as a case of _________ (Specify
the type of crime)
26. Based on the following information, answer the questions which follows: 4
Shresth was a bright student who excelled in academics and extracurricular activities.
He intent to take some quotes and literature from internet to write an Article for
Newspaper.
I. Identify the type of ethical issue he will face, in case he copies the work
as discussed in the above case study.
II. Does the above incident described above can be considered as example of
IPR (Intellectual Property Rights) Violation?
III. How can he avoid this ethical issue?
IV. Suggest two netiquettes that Shresth’s classmates must be aware of.
Page 7 of 7