0% found this document useful (0 votes)
99 views12 pages

Sample Paper: Computer Applications

This document is a sample paper for a self-assessment exam on computer applications. It contains four parts: Part A, Part B, Part C, and Part D. Part A and B must be attempted by all students and contain questions to test their knowledge of topics like HTML, CSS, social media, and software types. Part C and D allow students to choose between questions on Scratch or Python programming. The document provides examples of different types of short answer, fill-in-the-blank, multiple choice and case-based questions that may be asked in the exam.

Uploaded by

Goutham G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
99 views12 pages

Sample Paper: Computer Applications

This document is a sample paper for a self-assessment exam on computer applications. It contains four parts: Part A, Part B, Part C, and Part D. Part A and B must be attempted by all students and contain questions to test their knowledge of topics like HTML, CSS, social media, and software types. Part C and D allow students to choose between questions on Scratch or Python programming. The document provides examples of different types of short answer, fill-in-the-blank, multiple choice and case-based questions that may be asked in the exam.

Uploaded by

Goutham G
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

2

SAMPLE PAPER
(FOR 2021-2022)
SELF-ASSESMENT

COMPUTER APPLICATIONS
Time Allowed: 2 Hours Maximum Marks: 50

General Instructions:
(i) This paper contains four Parts: Part A, Part B, Part C & Part D.
(ii) Part A and Part B have to be attempted by all students.
(iii) Students may attempt any one of the two parts: Part C (Scratch) OR Part D (Python).

PART - A 25 marks
SECTION - I 10 marks
This section contains 12 questions of very short answer type (Q1-3), fill in the blanks type
(Q4-8) and multiple choice type (Q9-12). Attempt any 10 questions.

1. What is the use of <FONT> tag in HTML? Write any two attributes used with this tag. 1

2. Name the term used for a programmer that breaks into secure systems for malicious
purposes? 1

3. State what are the two types of linking in HTML. 1

4. The electronic equivalent of junk mail is known as . 1

5. protocol works on the Client and Server model. 1

6. attribute is used to specify the source and attribute is used to


specify the alignment of an image 1

7. The default colour of an unvisited link is . 1

8. ISP stands for . 1


9. Which of the following is secure protocol?
(a) Telnet (b) FTTP
(c) HTTP (d) HTTPS 1

Sample Paper 5 39
10. What is the full form of CSS?
(a) Common Sample Sheet (b) Cascading Sample Sheet
(c) Cascading Style sheet (d) Cascading Style Sample 1

11. Which of the following is not a type of style sheet?


(a) Inline (b) Outline
(c) Internal (d) External 1

12. Which of the following style sheet has highest order of precedence?
(a) Inline (b) Internal
(c) External (d) All have equal precedence 1

SECTION - II 15 marks
The following are competency based questions all are compulsory.

13. When it comes to online social networking, websites are commonly used. These websites
are known as social sites. Social networking websites function like an online community
of internet users. Depending on the website in question, many of these online community
members share a common interest such as hobbies, religion, or politics. Social media are in
many forms including blogs and microblogs, forums and message boards, social networks,
wikis, chat rooms etc. 1×5=5
(A) It allows users to communicate through typing the messages instantly.
(a) Mail room (b) Message room
(c) Chat room (d) Buddy room 1
(B) Which of the following is not a social networking site
(a) Facebook (b) Twitter
(c) Chrome (d) LinkedIn 1
(C) An online discussion site where people can hold conversations in the form of posted
messages
(a) Blog (b) Forum
(c) Message board (d) Chat room 1
(D) A term used for internet based social media programs to make connections with people
(a) Blogging (b) Chatting
(c) Social Networking (d) All of the above 1
(E) Which of the following is a demerit of Social media
(a) Bullying and trolling (b) Peer pressure
(c) Attention seeking disorder (d) All of the above 1
(F) Which one is an example of chat room
(a) Twitter (b) Facebook
(c) WordPress (d) Telegram 1
(G) Which one is an example of blogging site
(a) WordPress (b) LinkedIn
(c) Flickr (d) MySpace 1
14. Shareware is not the same thing as free and open source software. The open source software
gives users freedom to run / use the software for any purpose to study and modify the
program and to redistribute copies of either the original or modified program. Not all OSS
provides long term support or are secure enough or scalable. Therefore we cannot blindly
recommend any OSS software 1×5=5
(A) Which of the following software can be freely used in terms of making modifications

40 Computer Applications Class X


but it does not have to be free of charge:
(a) Free software (b) Open source software
(c) Free ware (d) Proprietary software 1
(B) Which of the following software is neither open nor freely available
(a) Freeware (b) FOSS
(c) Proprietary software (d) OSS 1
(C) FLOSS is expanded as:
(a) Free Liberal and Open Source Software
(b) Free and Limited Open Source Software
(c) Free Libre and Open Source Software
(d) None of the above 1
(D) A software which is available with the right to redistribute copies, but a license fee is
to be paid after a certain period of time
(a) Copylefted Software (b) Freeware
(c) FLOSS (d) Shareware 1
(E) The most commonly used license for open source projects
(a) GNU General Public License (b) GNU Lesser General Public License
(c) BSD License (d) Apache License 1
(F) Which of the following permissions are granted by GPL to developers who work on
Open Source Software
(a) Copy the software (b) Distribute the software
(c) Modify the software (d) All of the above 1
(G) Name the software which is available free of cost and which allows copying and further
distribution but not modification
(a) Free software (b) FLOSS
(c) Open Source Software (d) Freeware 1
Case Based Question
The CSS rules can be put together to create different types of style sheets and you can use
any one or all types of style sheets in a single webpage. These style sheets tells the browser
how each type of element should be displayed. These styles can be defined in the same or
in separate HTML document.
(A) The style sheets defined in the same document are called
(a) Inline styles (b) Internal styles
(c) Cascading styles (d) None of these 1
(B) What is the extension of files that carries external style sheets? 1
(C) Differentiate between inline and internal styles. 2
OR

Mention any two advantages of External Style Sheets?

16. Mr Gobind Sharma is a retailer at Thiruvananthapuram. He works as a chemist and does


brisk business. The only problem he faces is that when he wants to make payments to the
distributors from whom he gets the stock. He usually needs to visit the State Bank of India,
ICICI Bank or Axis Bank to make money transfers, as the accounts of his distributors are in
these banks.


Suggest a method by which he can make such fund transfers from the comfort of his
home. What are the different methods of such money transfers? 2

Sample Paper 5 41
PART - B 30 marks
All questions are compulsory. In case of internal choices, attempt any one.

17. What is the difference between <FONT> and <BASEFONT> tags? 2


18. What are Headers? Write the header tag to display a level 2 heading “Computer” which
should be center aligned. 2
19. State two reasons for having security in a Computer System.
OR
Name two types of laws that can help restrict software piracy. 2
20. Describe inline style sheets with an appropriate example. 3
21. Write the HTML code to display an image on the left side of the page.
OR
Write the HTML code to display a table with a border of 5px. 3
22. Observe the following table and write the HTML code to generate it:

PAINTING HUB

A PAINTING
R
NAME QTY. PRICE
T
I Oil Painting 5 ` 5000
S Glass Painting 3 ` 6000
T
Canvas 6 ` 7000

OR

Give the output of the following codes :

(A) <label for=”payment” id=”label-payment”>Mode of payment</label>


<select name=”payment” id=”payment”>
<option value=”debit” selected=”selected”>Debit Card</option>
<option value=”credit”>Credit Card</option>
<option value=”Net”>Net Banking</option>
<option value=”upi”>UPI</option>
</select>
(B) <label> Marital Status </label>
<label for=”single”>
<input type=”radio” id=”single” name=”status”> Single
</label>
<label for=”married”>
<input type=”radio” id=”married” name=”status”> Married

</label>
5

42 Computer Applications Class X


PART - C (Scratch) 10 marks
23. Define tempo 2
24. Differentiate between if-then block and if-then-else blocks. 2
25. In the following script what will be the sprite display. 2

when clicked

set count to 1

repeat until count > 5

say count

wait 1 seconds

change count by 2

26. Consider the following script 2


27. Write the blocks and their categories to draw the following figure in scratch 3

PART - D (Python) 10 marks

28. What are the values of a Boolean literal? 2


29. Define and name the tokens in Python? 2
30. Consider the following code and give the output for the input as 7.
N= input (“Enter a numbher”)
if (n<5):
Print (n+1)
else:
Print(n+2) 2
31. Rewrite the following code fragment using for loop 2
n=50
while (n>0):
print (n)
n=n-2
32. Write a code that displays the sum of even numbers upto n (including n). 3

Sample Paper 5 43
SOLUTION
2
PART - A
SECTION - I
1. The <FONT> tag is used to change the colour, size and style (face) of text.

Related Theory
 The SIZE and COLOR attributes are used with the <FONT> tag. The size can be given an absolute value e.g. SIZE= 7,
SIZE=11. To change the color of the text, the COLOR attribute can be used. The color values can be given either as
standard color names e.g. COLOR=Red or standard RGB components e.g. #FF00BB. Font type of the text can also be
changed using FACE attribute e.g. <FONT face=”Times new roman”>

2. Hackers
Explanation: Hacking refers to activities performed by an expert programmer who seeks to
compromise digital devices, such as computers, smart phones, tablets, and even entire networks.
Hackers are motivated by personal gain, to make a statement, or just because they can cause harm.

3. The two types of linking available in HTML are:


(1) External Linking.
(2) Internal Linking.
Explanation: The External Linking links two documents i.e. upon clicking a hyperlink, a new document,
to which hyperlink is linked, gets opened. The Internal Linking links various sections of the same
document i.e. upon clicking a hyperlink, a different section of the same document becomes visible
in the browser window.

Related Theory

Hyperlink to another document can be made with the <A> tag and its href attribute, which defines the URL of the
target document e.g. <A href = “list.html”>. For internal linking you can use the <A> tag with its name or id attribute
to identify a fragment and then you can use this value of name or id attribute for setting hyperlinks.
For e.g. the name to a section can be set up by using a statement like
  <A name = “section1”> Section 1</A>
Later a link to this named section can be set up by giving a command like
  <A href = “#section1”> Go to Section 1</A>

4. Spam
Explanation: Spam is referred to as unsolicited, usually commercial messages or emails sent in
large numbers to recipients for which the recipient has not granted verifiable permission.

Related Theory
 The difference between Spam and Junk mail is that Spam is an irrelevant or inappropriate message sent on the
Internet to a large number of people whereas Junk mail is unwanted or unsolicited advertising or promotional material
through mail or email. These two terms typically are used interchangeably.

5. FTP
Explanation: FTP works on the basis of the same principle as that of the Client/Server. FTP “Client”
is a program that runs on the client computer that FTP commands and sends them requests for
information from the remote computer also known as FTP servers.

44 Computer Applications Class X


Related Theory
 FTP is not a secure protocol therefore data travelling over FTP can easily be stolen. To counter this problem SFTP
(Secure File Transfer Protocol) is used. It implements the original FTP protocol through a separately created secured
tunnel using SSH (Secured SHell).

6. SRC, ALIGN
Explanation: The <IMG> tag in HTML has an attribute SRC which is used to specify the source/
location of the image to be inserted into the webpage. The image alignment can be controlled
through the ALIGN attribute.

Related Theory
 HTML images by default appear inline with a single line of text. However they can be controlled to some extent with
the ALIGN attribute. The HTML standard specifies five alignment attribute values: left, right, top, middle and bottom.

7. BLUE.
Explanation:
(1) An unvisited link is underlined and blue.
(2) A visited link is underlined and purple.
(3) An active link is underlined and red.

8. Internet Service Provider


Explanation: ISP stands for “Internet Service Provider”. It provides access to the internet by using
several technologies like dial-up, cable modem or wireless.
Working of an ISP:

PC
Internet

ISP

9. (d) HTTPS

Related Theory
 Both HTTP and HTTPS protocols are used to transfer hypertext documents on the World Wide Web (WWW). HTTPS is
used for sensitive information shared over the Internet, such as financial data, personal details or bank details, login
id, password etc. For secure connection ensure that the address contains https and a pad lock sign with URL.

10. (c) Cascading Style Sheet

Related Theory
 CSS stands for Cascading Style Sheets, which is a programming specification markup language used for web
development. CSS uses rules called styles to determine the visual look of contents of a web page. CSS can set colors,
fonts, backgrounds, borders, margins and even the placement of elements on a web page.

11. (b) Outline


Explanation: (1) Inline styles are embedded right within the HTML code they affect.
(2) Internal styles are placed within the header information of the web page and then affect all
corresponding tags on the page.
(3) External styles are coded in a separate document, when is then referenced from within the
header of the actual webpage

Sample Paper 5 45
12. (a) Inline

Related Theory
 ⮩ When inline styles are added to a tag, they occur only for individual tags and not for all similar tags on the page.

SECTION - II
13. (A) (c) Chat room
Explanation: A chat room is a site on the internet where people can exchange messages about a
particular subject.
(B) (c) Chrome
Explanation: Chrome is a web browser that navigates through the world wide web and displays
web pages.

Related Theory
 A social networking site is a web site that provides a venue for people to share their activities.
(C) (b) Forum
Explanation: An internet forum is an online discussion site where people can hold conversations
in the form of posted messages. They differ from chat rooms. In forums participants with common
interests can exchange open messages
(D) (c) Social Networking
Explanation: Social networking is the use of internet based social media programs to make
connections with friends, family, classmates, customers and clients.

Related Theory
 Social networking sites are termed as social media. Using these sites people interact freely, share and discuss
information using a multimedia mix of personal text, pictures, videos and audio.
(E) (d) All of the above
Explanation:
(1) Bullying and trolling: With the growing use of social networking sites the practice of bullying,
defamation, harmful commenting and pranks have increased a lot. Such practices cause
emotional trauma both for the victim and the ‘bully’.
(2) Peer pressure: Experts say that a majority of people on social networking sites are actually
less than or greater than, but never equal to what they portray. This leads to consequences
born out of jealousy and harmful reactions.
(3) Attention Seeking Disorders: People on social networking sites are getting addicted to seeking
attention. Just to get attention these users will resort to any means and even fake serious
illnesses.
(F) (d) Telegram
Explanation: Telegram is a cloud based instant messaging service with end-to-end encryption for
personal chat only. A chat room is a site on the internet where people can exchange messages
about a particular subject.

Related Theory
 A chat room is a site on the internet where people can exchange messages about a particular subject.
(G) (a) WordPress
Explanation: WordPress is a website that provides a number of features to create and write a blog.
It has dozens of free and customizable designs and themes to make a blog look more attractive.

Related Theory
 A blog is a web page that serves as a publicly accessible personal journal for an individual. A blog is a frequently
updated online personal journal or diary. The action of writing a blog is called blogging. The author of a blog is called
a blogger.

46 Computer Applications Class X


14. (A) (b) Open Source Software
Explanation: An Open Source Software can be freely used in terms of making modifications,
constructing business models around the software etc., but it does not have to be free of charge. In
open software, the source code is freely available to the customer.
(B) (c) Proprietary software
Explanation: Proprietary software is the software that is neither open nor freely available. Its use is
regulated and further distribution and notification is either forbidden or requires special permission
by the supplier or vendor. Source code of proprietary software is normally not available.
(C) (c) Free Libre and Open Source Software
Explanation: FLOSS refers to Free Libre and Open Source Software or to Free Livre and Open
Source Software. The term FLOSS is used to refer to a software which is both free software and
open source software.

Related Theory
 The word Libre (a Spanish word) and Livre (a Portuguese word) mean Freedom.
(D) (d) Shareware
Explanation: Shareware is a software which is made available with the right to redistribute copies,
but if one needs to use the software often after a certain period of time, then a license fee should
be paid.

Related Theory
 In shareware software source code is not available and modifications to the software are not allowed. The software is
distributed in binary form and often includes a built-in time mechanism, which usually limits functionality after a trial
period of one to three months.
(E) (a) GNU General Public License
Explanation: The GNU General Public License (GPL) is one of the most commonly used licenses for
open source projects. It allows users to legally copy, distribute and modify the software.
(F) (d) All of the above

Related Theory
 There is another GNU license : the Lesser General Public License (LGPL). It offers lesser rights to work than the standard
GPL license. The LGPL and GPL license differ with one major exception. With LGPL the requirement that you have to
release software extensions in open GPL has been removed.
(G) (d) Freeware
Explanation: The term Freeware is generally used for software, which is available free of cost and
which allows copying and further distribution, but not modification.

Related Theory
 Freeware is distributed in binary form i.e. ready to run, without any licensing fee. In some instances the right to use the
right to use the software is limited to certain types of users, for private and non-commercial purposes.

15. (A) (b) Internal Styles


Related Theory
 An internal style are also called Embedded style sheet. These are used when a single document has a unique style
for all tags of similar types on a web page.
(B) The external style sheets that are contained in its own text file have extension .css.

Related Theory
 An external style sheet is used when the same style is applied to multiple web pages. It carries the same information
as an internal sheet except for the difference that they are contained in its own text file.
(C) The inline style sheets can be used to define unique style to single element in the HTML page.
The style attribute is added to the tag element while the internal styles can be used to define
style to a single HTML page. These are written inside the HTML file between the <head> and
</head> tag.

Sample Paper 5 47
(D) (1) The classes defined in external style sheets can be reused in many documents.
(2) By using it, you can control the styles of multiple documents from one file.

16. Mr Gobind Sharma may use e-Banking for the transfer of money to different banks from the
comfort of his home.
The different modes of inter-bank money transfers are:
(1) National Electronic Fund Transfer (NEFT).
(2) Real Time Gross Settlement (RTGS)

PART - B
17. The <BASEFONT> tag is used to specify the base font for the document. This base font is applied
to the complete document. Thus, when the <FONT> tag is not used, the attributes specified by the
<BASEFONT> are shown by default.
Thus, the font specified with the <BASEFONT> tag is applied through-out the page unless superseded
by the <FONT> tag.

18. Headers are a simple form of text formatting that allows us to give a heading to a page or
headings to a new section or subsection of a page. The six header elements (H1 through H6) are
used to provide headers in varied text sizes based on the header level.
<H2 ALIGN= “CENTER”> Computer </H2>

19. The reasons for having computer security are:


(1) It is used to ensure data protection.
(2) It is used to ensure that the computer performs well and gives accessibility to only authorised
persons at any point of time.
OR
The two laws that can help restrict software piracy are:
(1) Trademark.
(2) Patent.

20. Inline style sheets are included with HTML elements i.e. they are placed inline with the element. To
add inline CSS, one has to declare style attributes which can contain any CSS property.
For example:
<p style=“colour: blue; text-align: left; font-size: 15pts”> Inline style sheets demonstration.
</p>

21. <HTML>
<BODY>
<IMG SRC= “image.jpg” ALIGN= “left”>
</BODY>
</HTML>
OR
<HTML>
<BODY>
<TABLE BORDER= “5”>
<TR><TD>1</TD></TR>
<TR><TD>2</TD></TR>
</TABLE>
</BODY>
</HTML>

48 Computer Applications Class X


22. (A) Unordered lists are used to display the list items with bullets in the list. Ordered list, also known
as numbered lists are used to specify numbers instead of bullets as done in Unordered lists.
(B) (1) Black (2) Silver (3) Grey (4) White

Related Theory
 Some other Colors are:
(1) Maroon (2) Red (3) Purple  (4) Fuchsia  (5) Green  (6) Lime
(7) Olive (8) Yellow (9) Teal (10) Aqua (11) Navy blue (12) Brown
(C) disc

Related Theory
 UL tag along with the type attribute is used to determine the various types of bullets that can be used with an
unordered list such as disc, circle or square.
(D) SGML
Explanation: SGML is used to specify a document markup language. Such a specification is itself
a document type definition (DTD). SGML is not in itself a document language, but a description of
how to specify one.

Related Theory
 SGML refers to Standard Generalized Markup Language.
(E) The properties that control the appearance of text on a webpage in CSS are:
(1) Text-indent. (2) Text-align. (3) Text-decoration.
(4) Word-spacing. (5) Letter spacing. (6) Text-transformation.
(Note: Write any two points)
OR
(A)

(B)

PART - C (Scratch)
23. Tempo is a built-in variable that controls how fast or slow the sound will play in Scratch. It is found
in the ‘Sound’ category.
24. The blocks enclosed in ‘if-then’ block are executed only if condition is true but if the condition is false
nothing will happen, where as the blocks in if-then-else block ‘if ’ part is executed when the specified
condition is true and if the condition is false the blocks enclosed in ‘else’ part are executed.
25. The sprite will displays the caller box with numbers 1, 3 and 5 one by one for 2 seconds each.
26. (A) It changes the costume and displays the caller box with message ‘Safe’ for 1 second.
(B) Displays the caller box with message ‘Touched’
Turns to the left by 30 degrees
Increases its size by 20 points
Bounces back

Sample Paper 5 49
27. Event : When green flag clicked
Pen : Erase All
Pen : Pen down
Control : Repeat 10
Insert the following blocks inside the Repeat block
Motion : Move 100 steps
Motion : Turn left 45 degrees

PART - D (Python) (10 marks)


28. A Boolean literal has one of the two possible values: True or False.
29. The smallest individual unit in a program is known as token. Python supports five different
types of tokens. These are as follows:
(1) Keywords
(2) Identifiers
(3) Literals
(4) Operators
(5) Punctuators

30. Output:
9
31. Code using for statement:
for n in range(50, 1, -2):
print(n)
32. n=input(“Enter a number”)
sum=0
i=2
while (i<=n):
s=s+i
i=i+2
print(sum)

50 Computer Applications Class X

You might also like