0% found this document useful (0 votes)
56 views15 pages

Class 10 CA QB 2024-25

Uploaded by

5205prachi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views15 pages

Class 10 CA QB 2024-25

Uploaded by

5205prachi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 15

Delhi Public School, Gandhinagar

Academic Session 2024-25


Question Bank -Class: X
Sub: Computer Applications (165)

Ch 3, Ch 4 HTML-I and HTML-II


1. Define the following:
i. Tag
ii. Attribute
iii. Element

2. Give the full form of the following tag/attribute:


a) P
b) HR
c) A
d) LI
e) ALINK
f) VLINK
g) IMG
h) BR
i) TR
j) TD
k) TH
l) THEAD
m) TFOOT

3. Identify the errors and write the corrected HTML statements:

a) <BODY backgroundcolor = red color = yellow>Attributes of body tag </Body>


b) <FONT weight=6 NAME=Calibri>
c) <HR thickness=4 alignment=center>
d) <font type=“Arial” fontcolor=”Red”>
4. Which attribute of body tag in HTML is used to change the color of the text for the entire webpage?
5. Which Heading tag is used to give the largest size of text in HTML?
6. Name the tag and attribute used for the following
a) Changing the cell span.
b) Aligning cell content vertically.
c) Setting the cell width.
7. What is meant by inline images in HTML?

8. What for Mailto function is used?

9. Write the HTML code to display

a) A2+B2
b) H20
c) CO2

10. Write HTML code to create the following ordered list.


III. Football
IV. Basketball

11. Write HTML code to create the following list using HTML.
• Story Books
• Computer Books
o Computer Applications
o Learning to Code

12. Write HTML code to display the following list. The title of the webpage should be “Books”.

A. Fiction
● A tale of two cities
● The adventures of Sherlock Holmes
B. Non-Fiction

13. Write the HTML code to do the following.


a. To display the text “Naval Architecture & Ocean Engineering” with the largest heading and blue
color.
b. To create image hyperlink for the image “lion.jpeg” to the next page named “next.html”.

14. Write HTML code to create the following Definition List.

Virtual reality
Virtual reality is the term used to describe a three-dimensional, computer
generated environment which can be explored and interacted with by a person.
Augmented reality
a technology that superimposes a computer-generated image on a user's view of the real
world, thus providing a composite view.

15. What are comments in HTML? How can you insert comment? Give Example.

16. What are special characters in HTML? Give any two examples.
17. Differentiate between Ordered List and Unordered List. Give Example.

18. Differentiate between Container and Empty elements. Give Example.

19. Differentiate between <P> and <BR>. Also give the full form of both the tags.

20. Consider the following HTML code

<A HREF= #intro> Introduction </A>


In the above code,
i. What is the purpose of # ?
ii. What will happen when the user clicks on “Introduction”?

21. Observe the following table and write the HTML code to generate it.

i. Caption of the table is Visitor Details.


ii. Border color of the entire table is blue.
iii. Background color of first two rows is yellow.
iv. Data in number and percentage column is center
aligned.

22. Write output of the following HTML code.


<html>
<head><title></title></head>
<body>
<table border=2 width=40%>
<tr align="center"><td align="center" rowspan=2>1</td><td>2</td><td>3</td></tr>
<tr align="center"><td colspan=2>4</td></tr>
<tr align="center"><td align=center>5</td><td>6</td><td align=center>7</td></tr>
</body>
</html>
23. Identify any 5 (2 structural and 3 formatting tags) that have been utilized in creating the webpage given
below and write the usage of each of them.
24. Observe the given output and write the HTML code to generate it. Consider the following
points while generating the web page:

25. You are developing a website for an online course platform. In one of the course descriptions, you want to
list the benefits of the course using HTML list tags. Explain how you would use HTML list tags (<ul>, <ol>,
or <dl>) to structure and present this information effectively.

26. You are a web developer tasked with creating an online recipe website. The website aims to provide a
user-friendly and accessible platform for people to find and share their favorite recipes. As part of this project,
you need to design and implement the structure for recipe ingredients and instructions using HTML list tags.

27.Gulzar is a talented musician. He is trying to create a web page so as to share his creations with music lovers
across the world. He wants to embed audio and video files in the web page with the following specifications:
• To embed audio files:
• The name of the audio file is GulazarNote1.mp4.
• The audio should start playing automatically when the page loads.
• The audio controls such as Play, Pause and Volume should be visible.
To embed video files:
• The name of video file is GulzarMovie1.mp4.
• The video should play in a window of width 350 pixels and height 250 pixels.
• The video controls such as Play, Pause and Volume should be visible.
To complete the task, Gulzar has written the following HTML code:
To embed audio: <audio controls autoplay>
<source src=”GulzarNote1.mp3”>
</audio controls>
To embed video:
<video width = “350” height=”250”>
<source src = “GulzarMovie1.mp4”> </video>
Gulzar is not getting the desired output as the code contains errors. Rewrite the correct statements to
help him to complete the task. Underline all the corrections made.
28. Rohan is creating a Web page in HTML. He wants to insert a link in his web page appear with the text as
“Click to open” which on clicking should open the URL named http://www.Mywebsite.com in a new window.
Help him to write the HTML code to create the hyperlink.

29. Read the case study given below and answer the questions given below.
Bidya is a nurse in XYZ hospital. Owing to the emergency due to COVID-19, she needs to communicate in
almost real-time with the Medical Superintendent about the status of the patients. The hospital has provided her
a laptop, web camera and other accessories for communication purposes.
a) As instructed by the Medical Superintendent, Bidya has to send the RT-PCR reports of some patients who
have tested negative to their respective family members using her laptop. Which web service should she
avail?
b) Bidya wants to establish a connection with the remote computer of pathology lab in the city, so that she can
see the RT-PCR reports of her patients. Which protocol will be used for the same?
c) Bidya has also been instructed by the Medical Superintendent to upload the RT-PCR reports in the
Hospital's Data Server. Which Internet protocol shall be used during this process of uploading the reports
into the Hospital's Server?
d) The Medical Superintendent has asked Bidya to inform about the billing and payment details of the admitted
patients. Bidya needs to securely access the details from the Hospital's server using her Admin Login
Credentials. Which secured network protocol is she using to access the account details for the patients?
e) Bidya, during her free time, likes to browse the Internet for products available for Online Shopping. Which
Internet protocol does Bidya use while browsing for such products?

30. Write the HTML code to design a Web page as shown below:
Class Class Average
Roll No. Name

1 Amit 95

2 Angel 96
95.5

Teacher Mr. Harshit

31. Write the use of target and href attributes of Anchor tag with the help of example.

32. Explain with an example, "How can I create a hyperlink in an HTML document that links to a specific
section of another HTML file, effectively allowing users to navigate to that section? What HTML elements and
attributes should be used to achieve this?"
33. "Imagine you're developing a website for a historical archive project. You have two HTML files:
'Timeline.html,' which contains an overview of a historical timeline, and 'Details.html,' which offers in-depth
information about individual historical events.

In 'Timeline.html,' you want to provide users with a brief timeline of events and allow them to click on a
particular event to access more detailed information in 'Details.html.' How would you create a hyperlink within
'Timeline.html' that, when clicked, takes users to a specific section named “XYZ” within 'Details.html' where
they can read more about that particular historical event?
Write the HTML code to achieve the same in both the files.
Ch 5 HTML III: FORMS
1. Define HTML form.
2. What do you mean by Controls?
3. Write the tag to create a multiline control with 3 rows and 20 columns.
4. Which element is used to create checkboxes?
5. Name the control that is mutually exclusive.
6. Name the element that is used to create multi line text.
7. What is the use of hidden controls?
8. Explain the working of HTML form.
9. What are the two tags that can be used to create Button.
10. What is the difference between size and maxlength attribute of INPUT tag?
11. Write the code to create the form with post method. What is the difference between GET and
POST method of posting the form data?
12. How many types of Buttons can be created in HTML? Name and explain.
13. Observe the given output and write the HTML code to create the form.

14. Design HTML form to help customers place orders for pastries on her website. Be sure to include
the necessary HTML elements and attributes to create a user-friendly and functional order form.
Form should have Personal information of a customer like Name, Phone-no.
Form should have options like egg/eggless pastries, flavours like chocolate, fruit. IT also should have
a payment method specified.
Ch 6 CASCADING STYLE SHEETS
1. Expand the following:
a) DHTML
b) DOM
c) CSS
2. Write the syntax of defining the Style Rule in CSS. Explain each part of it.
3. What is the precedence order of the style sheet.
4. What is universal selector? How do you define it?

5. What is class attribute in CSS? Give example.


6. How will you hide CSS from older browser?
7. In the following CSS code snippet, what value is given for the top margin?
Margin: 5px 8px 10px 7px
8. What is the meaning of different font size symbols? (px, pt,em and %).
9. Identify the error and write the correct code.
i. h1 [text-transform=uppercase]
ii. P <font-size:10px>
iii. H3(font-variant:small-caps;)
iv. H1{fontfamily = “Times New Roman”}
v. Body{topmargin : 100px margin-left=70px;}
vi. H1{background : yellow ; padding=20px 20px;20px 80px;}
vii. P{decoration-text : underline;}
viii. Body (background-image : url{“picture1.jpg”};)

10. Write any two properties for the following element in CSS.
i. Background
ii. Font
iii. Text
iv. Margin
v. Padding
vi. Border
11. Write CSS Rule for the Heading tag/BODY tag (if not specified).
i. Background color-red, background image-Flower.jpg and no repeat.
ii. Font is Italic, weight is 500, size is 30PX, Arial.
iii. Space on the left of the text is 30px, underlined, center aligned, letter and word spacing
is 10px.
iv. Top margin is 30 px, left margin is 20px, right margin is 15 px and bottom margin is
25 px.
v. Top padding is 30 px, left padding is 20px, right padding is 15 px and bottom padding
is 25 px.
vi. Border is dashed, 3px and red color
vii. Make the fonts of all the paragraph red using inline style.
viii. To link an external stylesheet “somefile.css” to a web page.
ix. Set the background image “flower.gif” for the web page using internal stylesheet.
Ch 1 Internet Basics

1. Define the following.


a) WebHost
b) Blog
c) Thread
d) Newgroup
2. What are the two types of Browser? Give Example.

3. What are the different types of Blogs that can be created.

4. Give the full form of of the following:


a) DNS
b) TCP/IP
c) POP
d) SMTP
e) NNTP
5. What is DNS? Give any five examples of common domain names used.

6. What is the difference between HTTP and HTTPS?

7. Name the protocol used for the following


a) Used to transfer files and files are organised in a hierarchical structure.
b) Used to transfer files and files are organised in a menu structure.
c) Used to link image, sound and other multimedia file on the WWW.
d) Used to receive messages via electronic mail.
e) Used to send messages via electronic mail.
f) Used to organise content in a hierarchical structure
8. A school has two separate computer networks. One is used for keeping pupil and staff
records. The other is for pupils to use in lessons to help with their learning and to store their
work.
Pupils use the Internet quite frequently in their lessons to help them with their work. Discuss
the the advantages and disadvantages of (the Internet) this as far as pupils is concerned.
9. In order to fully utilize the digital networking facilities, the manager has organized an e-
training course for his employees where they talked about different protocols and their
utility. After successful completion of the course, employees are given some vouchers to
shop online.
a. State one benefit of e-learning.
b. Which protocol is used to transfer files across various servers over the Internet?
c. Buying goods by placing orders online is called ___________.
d. Mention any two reasons for e-shopping’s popularity.
e. During office hours of the employees which sites should be blocked or banned? (any 2)
10. What is WWW?

11. What do you understand by the term TELNET?

12. Differentiate between Server and Web Server.

13. Differentiate between Website and Web Portal.

14. Give any two examples of Website and Web Portal.

15. Enlist any two services provided by Server.

16. Enlist any two services provided by Web Server.

17. Explain the components of URL with example.

18. What are the advantages and disadvantages of the Internet?


Ch 2 Internet Services and Mobile Technologies

1. Explain the term “ Downloading” and Uploading from Internet.


2. Give the full form of of the following:
• WWW
• FTP
• MODEM
• HTTP
• SFTP
• ISP
• HTML
• SCP
• CC
• BCC
• SMS
• MMS
• 4G
• URL
3. Name some popular e-mail client programs.
4. Explain how Search engine works.
OR
What do you understand by Spider (or web crawler or Bots or Agents), Indexing Software
and Search Algorithm?

5. How does search engine interpret lowercase and uppercase keywords?


6. How does FTP Work?
7. Define, write the feature (or application), advantages and disadvantages and give one
example of the following web services.
a) Video Conferencing
b) Chat
c) E-learning
d) E-banking
e) E-shopping
f) E-reservation
g) E-Governance
h) E-Groups
i) Newsgroups
8. Identify the domain name, e-mail address and URL from the following list
a) [email protected]
b) Healthyworld.com
c) www.healthy world.com/old/index.html
d) 197.199.0.9
e) http://ncert.nic.in
9. What is an E-mail program? Write its advantages and disadvantages compared with
ordinary post message.
10. What is ISP ? Name any one ISP of India.
11. Mr.Pritish sends an email to Harish requesting him to prepare the balance sheet. Which
network protocol is involved during this email communication?
12. Mr. Harish wants to hold an online meeting with the company’s client such that he can
interact as well as see them. Which web service should he avail?
13. ____________ is a technique through which confidential data needs to be transferred over
the secured channel.
14. _____________is the uneven distribution of information and communication.
15. A student wants to complete his project task, for accessing some material using internet, he
should use search engines. Advise him some useful searching tips.

16. The search engine returned many links when I entered a word ‘Gandhi’. Give two thigs
which I can do to reduce the number of links.
CH 7 CYBER ETHICS
1. Write the full form of the following
a) OSI
b) FLOSS
c) FSF
d) GNU
e) GPL
f) W3C
g) OSS

2. What do you understand by privacy of data in the context of e-commerce?

3. What is identity theft?

4. What is Public Domain Software?

5. Intellectual Property Rights are the rights of the owner of the information to decide how much of the

information to be shared or distributed. Why Intellectual Property Rights must be protected?

6. Name the type of ethical issue involved, if someone uses another person’s work without crediting the

author.

7. State the methods for protecting Digital Property Rights.

8. Name the Non-profit organization responsible for supporting free software movement.

9. Name the type of software which is available free of cost and allows copying and further
distribution, but no modification is not allowed. Give one example.

10. Name the organization responsible for producing the web standards for WWW.

11. Name the type of software that is neither open nor freely available. Give example.

12. When was OSI founded and who were its founders?

13. Name the license which offers least restriction for Open Source Software.
14. Which type of license is used in the following?

1) Copy and modify the software as many times as needed, no restriction of distribution
method, allows to charge after modification.
2) A license that can be used for both free software and proprietary software and offers
lesser rights to a work than the standard GPL.
3) License that offers fewer restrictions on distribution compared to another license.
4) License that offers copying, modifying, no restrictions on redistribution etc.
5) License used for copyright and patent software.
6) License that allows to copy software as many times as needed and there is no restriction of
distribution methods and styles.
15. What do you mean by freedom of information?
16. Differentiate between online fraud and Credit Card Fraud with example.
17. What is plagiarism? How can you avoid plagiarism while referring to someone else’s creation?

18. What is digital property? What are the threats to digital properties?

19. Define Digital Divide. What are the major factors behind digital divide?

20. Arpita is advised by her best friend to protect her personal information from intentional or
unintentional attacks by others. This is also known as____________________.

21. A case where an individual's identity was stolen and used for fraudulent activities_______.

22. Sneha is a very social girl who likes to make new friends and interact with them. Suggest a web
service using which she can make new friends. Also, suggest one necessary precaution that she should
keep in mind while using the service.

23. Cyber ethics refers to a use of safe and responsible behaviour for the internet community. It is the
study of ethics pertaining to computers, encompassing user behaviour and what computers are
programmed to and how this affects individuals and society. Cyber ethics is the moral, legal, and social
issues relating to cyber technology. It examines the impact that cyber technology has for social, legal and
moral system. It also evaluates the social politics and laws that have been formed in reply to issues
generated by the development and use of cyber technology.

i. ____________refers to a code of safe and responsible behaviour for the internet community.
ii. Cyber ethics is the study of the ethics pertaining to ____________.
iii. __________is/are ethical issues as for as it converted.
iv. Producing good__________involves understanding the risks of harmful and illegal behaviour online.
v. Cyber ethic is the moral, legal and social issues relating to___________.

You might also like