Sample Paper: Computer Applications
Sample Paper: Computer Applications
SAMPLE PAPER
(FOR 2021-2022)
SELF-ASSESMENT
COMPUTER APPLICATIONS
Time Allowed: 2 Hours Maximum Marks: 50
General Instructions:
(i) This paper contains four Parts: Part A, Part B, Part C & Part D.
(ii) Part A and Part B have to be attempted by all students.
(iii) Students may attempt any one of the two parts: Part C (Scratch) OR Part D (Python).
PART - A 25 marks
SECTION - I 10 marks
This section contains 12 questions of very short answer type (Q1-3), fill in the blanks type
(Q4-8) and multiple choice type (Q9-12). Attempt any 10 questions.
1. What is the use of <FONT> tag in HTML? Write any two attributes used with this tag. 1
2. Name the term used for a programmer that breaks into secure systems for malicious
purposes? 1
Sample Paper 5 39
10. What is the full form of CSS?
(a) Common Sample Sheet (b) Cascading Sample Sheet
(c) Cascading Style sheet (d) Cascading Style Sample 1
12. Which of the following style sheet has highest order of precedence?
(a) Inline (b) Internal
(c) External (d) All have equal precedence 1
SECTION - II 15 marks
The following are competency based questions all are compulsory.
13. When it comes to online social networking, websites are commonly used. These websites
are known as social sites. Social networking websites function like an online community
of internet users. Depending on the website in question, many of these online community
members share a common interest such as hobbies, religion, or politics. Social media are in
many forms including blogs and microblogs, forums and message boards, social networks,
wikis, chat rooms etc. 1×5=5
(A) It allows users to communicate through typing the messages instantly.
(a) Mail room (b) Message room
(c) Chat room (d) Buddy room 1
(B) Which of the following is not a social networking site
(a) Facebook (b) Twitter
(c) Chrome (d) LinkedIn 1
(C) An online discussion site where people can hold conversations in the form of posted
messages
(a) Blog (b) Forum
(c) Message board (d) Chat room 1
(D) A term used for internet based social media programs to make connections with people
(a) Blogging (b) Chatting
(c) Social Networking (d) All of the above 1
(E) Which of the following is a demerit of Social media
(a) Bullying and trolling (b) Peer pressure
(c) Attention seeking disorder (d) All of the above 1
(F) Which one is an example of chat room
(a) Twitter (b) Facebook
(c) WordPress (d) Telegram 1
(G) Which one is an example of blogging site
(a) WordPress (b) LinkedIn
(c) Flickr (d) MySpace 1
14. Shareware is not the same thing as free and open source software. The open source software
gives users freedom to run / use the software for any purpose to study and modify the
program and to redistribute copies of either the original or modified program. Not all OSS
provides long term support or are secure enough or scalable. Therefore we cannot blindly
recommend any OSS software 1×5=5
(A) Which of the following software can be freely used in terms of making modifications
Suggest a method by which he can make such fund transfers from the comfort of his
home. What are the different methods of such money transfers? 2
Sample Paper 5 41
PART - B 30 marks
All questions are compulsory. In case of internal choices, attempt any one.
PAINTING HUB
A PAINTING
R
NAME QTY. PRICE
T
I Oil Painting 5 ` 5000
S Glass Painting 3 ` 6000
T
Canvas 6 ` 7000
OR
</label>
5
when clicked
set count to 1
say count
wait 1 seconds
change count by 2
Sample Paper 5 43
SOLUTION
2
PART - A
SECTION - I
1. The <FONT> tag is used to change the colour, size and style (face) of text.
Related Theory
The SIZE and COLOR attributes are used with the <FONT> tag. The size can be given an absolute value e.g. SIZE= 7,
SIZE=11. To change the color of the text, the COLOR attribute can be used. The color values can be given either as
standard color names e.g. COLOR=Red or standard RGB components e.g. #FF00BB. Font type of the text can also be
changed using FACE attribute e.g. <FONT face=”Times new roman”>
2. Hackers
Explanation: Hacking refers to activities performed by an expert programmer who seeks to
compromise digital devices, such as computers, smart phones, tablets, and even entire networks.
Hackers are motivated by personal gain, to make a statement, or just because they can cause harm.
Related Theory
Hyperlink to another document can be made with the <A> tag and its href attribute, which defines the URL of the
target document e.g. <A href = “list.html”>. For internal linking you can use the <A> tag with its name or id attribute
to identify a fragment and then you can use this value of name or id attribute for setting hyperlinks.
For e.g. the name to a section can be set up by using a statement like
<A name = “section1”> Section 1</A>
Later a link to this named section can be set up by giving a command like
<A href = “#section1”> Go to Section 1</A>
4. Spam
Explanation: Spam is referred to as unsolicited, usually commercial messages or emails sent in
large numbers to recipients for which the recipient has not granted verifiable permission.
Related Theory
The difference between Spam and Junk mail is that Spam is an irrelevant or inappropriate message sent on the
Internet to a large number of people whereas Junk mail is unwanted or unsolicited advertising or promotional material
through mail or email. These two terms typically are used interchangeably.
5. FTP
Explanation: FTP works on the basis of the same principle as that of the Client/Server. FTP “Client”
is a program that runs on the client computer that FTP commands and sends them requests for
information from the remote computer also known as FTP servers.
6. SRC, ALIGN
Explanation: The <IMG> tag in HTML has an attribute SRC which is used to specify the source/
location of the image to be inserted into the webpage. The image alignment can be controlled
through the ALIGN attribute.
Related Theory
HTML images by default appear inline with a single line of text. However they can be controlled to some extent with
the ALIGN attribute. The HTML standard specifies five alignment attribute values: left, right, top, middle and bottom.
7. BLUE.
Explanation:
(1) An unvisited link is underlined and blue.
(2) A visited link is underlined and purple.
(3) An active link is underlined and red.
PC
Internet
ISP
9. (d) HTTPS
Related Theory
Both HTTP and HTTPS protocols are used to transfer hypertext documents on the World Wide Web (WWW). HTTPS is
used for sensitive information shared over the Internet, such as financial data, personal details or bank details, login
id, password etc. For secure connection ensure that the address contains https and a pad lock sign with URL.
Related Theory
CSS stands for Cascading Style Sheets, which is a programming specification markup language used for web
development. CSS uses rules called styles to determine the visual look of contents of a web page. CSS can set colors,
fonts, backgrounds, borders, margins and even the placement of elements on a web page.
Sample Paper 5 45
12. (a) Inline
Related Theory
⮩ When inline styles are added to a tag, they occur only for individual tags and not for all similar tags on the page.
SECTION - II
13. (A) (c) Chat room
Explanation: A chat room is a site on the internet where people can exchange messages about a
particular subject.
(B) (c) Chrome
Explanation: Chrome is a web browser that navigates through the world wide web and displays
web pages.
Related Theory
A social networking site is a web site that provides a venue for people to share their activities.
(C) (b) Forum
Explanation: An internet forum is an online discussion site where people can hold conversations
in the form of posted messages. They differ from chat rooms. In forums participants with common
interests can exchange open messages
(D) (c) Social Networking
Explanation: Social networking is the use of internet based social media programs to make
connections with friends, family, classmates, customers and clients.
Related Theory
Social networking sites are termed as social media. Using these sites people interact freely, share and discuss
information using a multimedia mix of personal text, pictures, videos and audio.
(E) (d) All of the above
Explanation:
(1) Bullying and trolling: With the growing use of social networking sites the practice of bullying,
defamation, harmful commenting and pranks have increased a lot. Such practices cause
emotional trauma both for the victim and the ‘bully’.
(2) Peer pressure: Experts say that a majority of people on social networking sites are actually
less than or greater than, but never equal to what they portray. This leads to consequences
born out of jealousy and harmful reactions.
(3) Attention Seeking Disorders: People on social networking sites are getting addicted to seeking
attention. Just to get attention these users will resort to any means and even fake serious
illnesses.
(F) (d) Telegram
Explanation: Telegram is a cloud based instant messaging service with end-to-end encryption for
personal chat only. A chat room is a site on the internet where people can exchange messages
about a particular subject.
Related Theory
A chat room is a site on the internet where people can exchange messages about a particular subject.
(G) (a) WordPress
Explanation: WordPress is a website that provides a number of features to create and write a blog.
It has dozens of free and customizable designs and themes to make a blog look more attractive.
Related Theory
A blog is a web page that serves as a publicly accessible personal journal for an individual. A blog is a frequently
updated online personal journal or diary. The action of writing a blog is called blogging. The author of a blog is called
a blogger.
Related Theory
The word Libre (a Spanish word) and Livre (a Portuguese word) mean Freedom.
(D) (d) Shareware
Explanation: Shareware is a software which is made available with the right to redistribute copies,
but if one needs to use the software often after a certain period of time, then a license fee should
be paid.
Related Theory
In shareware software source code is not available and modifications to the software are not allowed. The software is
distributed in binary form and often includes a built-in time mechanism, which usually limits functionality after a trial
period of one to three months.
(E) (a) GNU General Public License
Explanation: The GNU General Public License (GPL) is one of the most commonly used licenses for
open source projects. It allows users to legally copy, distribute and modify the software.
(F) (d) All of the above
Related Theory
There is another GNU license : the Lesser General Public License (LGPL). It offers lesser rights to work than the standard
GPL license. The LGPL and GPL license differ with one major exception. With LGPL the requirement that you have to
release software extensions in open GPL has been removed.
(G) (d) Freeware
Explanation: The term Freeware is generally used for software, which is available free of cost and
which allows copying and further distribution, but not modification.
Related Theory
Freeware is distributed in binary form i.e. ready to run, without any licensing fee. In some instances the right to use the
right to use the software is limited to certain types of users, for private and non-commercial purposes.
Related Theory
An external style sheet is used when the same style is applied to multiple web pages. It carries the same information
as an internal sheet except for the difference that they are contained in its own text file.
(C) The inline style sheets can be used to define unique style to single element in the HTML page.
The style attribute is added to the tag element while the internal styles can be used to define
style to a single HTML page. These are written inside the HTML file between the <head> and
</head> tag.
Sample Paper 5 47
(D) (1) The classes defined in external style sheets can be reused in many documents.
(2) By using it, you can control the styles of multiple documents from one file.
16. Mr Gobind Sharma may use e-Banking for the transfer of money to different banks from the
comfort of his home.
The different modes of inter-bank money transfers are:
(1) National Electronic Fund Transfer (NEFT).
(2) Real Time Gross Settlement (RTGS)
PART - B
17. The <BASEFONT> tag is used to specify the base font for the document. This base font is applied
to the complete document. Thus, when the <FONT> tag is not used, the attributes specified by the
<BASEFONT> are shown by default.
Thus, the font specified with the <BASEFONT> tag is applied through-out the page unless superseded
by the <FONT> tag.
18. Headers are a simple form of text formatting that allows us to give a heading to a page or
headings to a new section or subsection of a page. The six header elements (H1 through H6) are
used to provide headers in varied text sizes based on the header level.
<H2 ALIGN= “CENTER”> Computer </H2>
20. Inline style sheets are included with HTML elements i.e. they are placed inline with the element. To
add inline CSS, one has to declare style attributes which can contain any CSS property.
For example:
<p style=“colour: blue; text-align: left; font-size: 15pts”> Inline style sheets demonstration.
</p>
21. <HTML>
<BODY>
<IMG SRC= “image.jpg” ALIGN= “left”>
</BODY>
</HTML>
OR
<HTML>
<BODY>
<TABLE BORDER= “5”>
<TR><TD>1</TD></TR>
<TR><TD>2</TD></TR>
</TABLE>
</BODY>
</HTML>
Related Theory
Some other Colors are:
(1) Maroon (2) Red (3) Purple (4) Fuchsia (5) Green (6) Lime
(7) Olive (8) Yellow (9) Teal (10) Aqua (11) Navy blue (12) Brown
(C) disc
Related Theory
UL tag along with the type attribute is used to determine the various types of bullets that can be used with an
unordered list such as disc, circle or square.
(D) SGML
Explanation: SGML is used to specify a document markup language. Such a specification is itself
a document type definition (DTD). SGML is not in itself a document language, but a description of
how to specify one.
Related Theory
SGML refers to Standard Generalized Markup Language.
(E) The properties that control the appearance of text on a webpage in CSS are:
(1) Text-indent. (2) Text-align. (3) Text-decoration.
(4) Word-spacing. (5) Letter spacing. (6) Text-transformation.
(Note: Write any two points)
OR
(A)
(B)
PART - C (Scratch)
23. Tempo is a built-in variable that controls how fast or slow the sound will play in Scratch. It is found
in the ‘Sound’ category.
24. The blocks enclosed in ‘if-then’ block are executed only if condition is true but if the condition is false
nothing will happen, where as the blocks in if-then-else block ‘if ’ part is executed when the specified
condition is true and if the condition is false the blocks enclosed in ‘else’ part are executed.
25. The sprite will displays the caller box with numbers 1, 3 and 5 one by one for 2 seconds each.
26. (A) It changes the costume and displays the caller box with message ‘Safe’ for 1 second.
(B) Displays the caller box with message ‘Touched’
Turns to the left by 30 degrees
Increases its size by 20 points
Bounces back
Sample Paper 5 49
27. Event : When green flag clicked
Pen : Erase All
Pen : Pen down
Control : Repeat 10
Insert the following blocks inside the Repeat block
Motion : Move 100 steps
Motion : Turn left 45 degrees
30. Output:
9
31. Code using for statement:
for n in range(50, 1, -2):
print(n)
32. n=input(“Enter a number”)
sum=0
i=2
while (i<=n):
s=s+i
i=i+2
print(sum)