EDUSOFT IT SOLUTIONS PVT LTD.
Sample Question Paper
Computer Applications (Code 165)
Class X (Session 2023-2024)
Maximum Marks: 50 Time Allowed: 2 hours
General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, an internal choice is provided with some questions.
3. Section A has 12 questions carrying 1 mark each.
4. Section B has 7 Very Short Answer (VSA) type questions carrying 2 marks each.
5. Section C has 4 Short Answer (SA) type questions carrying 3 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 4 marks.
7. Section E has 2 Source-based/Case-based /Passage based Questions carrying 4 marks each.
Section A (12 x 1 = 12)
1. Which of the following does not fall into the area of cyber-ethics?
a. Respecting online privacy of others.
b. Modifying an open-source software and distributing freely to others.
c. Compliance to cyber laws.
d. Avoiding digital piracy.
2. Which of the following protocol breaks the message into packets to be sent over a computer
network?
a. IP
b. TCP
c. Both a) and b)
d. HTTP
3. Sam tried to send a 1 GB AVI video file as email attachment but could not do so. What could be the
possible reasons of the following?
a. Videos cannot be sent as email attachments.
b. The file should be mp4 instead of avi.
c. His Outbox must be full.
EDUSOFT IT SOLUTIONS PVT LTD.
d. File is too large than the permitted size.
4. Find the odd one out:
a. Skype
b. WhatsApp
c. Messenger
d. Facebook
5. mget *.docx – this command is using which of the following protocol and for which purpose?
a. TCP/IP to upload some documents.
b. FTP to upload some documents.
c. TCP/IP to download some documents.
d. FTP to download some documents.
6. ___________ is the command-line-based encrypted tool that works like Telnet.
a. SFTP
b. SSH
c. SMTP
d. SCP
7. An empty tag does not have ___________________________.
a. Attributes
b. Attribute values
c. Closing tag
d. Angle brackets
8. Which of the following headings will be the smallest?
a. <H5>Welcome</H5>
b. <H6>Welcome</H6>
c. <H7>Welcome</H7>
d. <H8>Welcome</H8>
9. <OL><LI>Item 1</LI><DL><dt>Entry 1</dt><dd>Explanation</dd></dt></OL> - In this code, which
one is nested list?
EDUSOFT IT SOLUTIONS PVT LTD.
a. OL
b. dd
c. dt
d. DL
10. An HTML entity begins with a _______ and ends with a ______.
a. $, ;
b. &, ;
c. $, :
d. &, :
11. Assertion (A): % sign used in the size value of any attribute is larger than the size in pixels.
Reason (R): % refers to the part of the window size while pixel is like a tiny dot on the screen.
a. Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
b. Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion.
c. Assertion (A) is true and Reason (R) is false.
d. Assertion (A) is false and Reason (R) is true.
12. Assertion (A): <A href= “#Lesson 1”>Go to Lesson 1</A> - this hyperlink will open another webpage.
Reason ®: Internal hyperlinks refer to the hyperlinked content in the same web page.
a. Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
b. Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion.
c. Assertion (A) is true and Reason (R) is false.
d. Assertion (A) is false and Reason (R) is true.
Section B (7 x 2 = 14)
13. What is the difference between a tag and attribute? Give example.
Ans. A tag is a basic building block of markup. Each tag can also have content, including other tags and
text. HTML tags represent semantics, or meaning. For example, the title element represents the title
of the document. A tag name appears between the opening and closing < > brackets. For example
<HTML>
An attribute is a property value that customizes or modifies an HTML element or tag. For example -
<BODY bgcolor= “#0000f0”>. Here 'bgcolor' is an attribute of <BODY> tag.
EDUSOFT IT SOLUTIONS PVT LTD.
14. What do you mean by IPR?
Ans. Information created through a thought process and creativity in any form is called intellectual
property. The prime owner has the right to do whatever needs to be done with that property. Without
owner's consent, information cannot be used, reused or exploited in any way. The right to protection
of the intellectual property is called intellectual property right.
or
Briefly discuss the difference between open source software and free software?
Ans. An open source software gives freedom with flexible conditions to use, reuse, modify and
distribute the software for various purposes like educational, personal or commercial use without
paying royalty to the original or previous creators.
Free software refers to any software that can be used, modified, reused and distributed in any form
free of cost and has no user agreements and commercial licenses.
15. How will you group radio buttons?
Ans. To group the radio buttons, we give them same name and different id. Name keeps them in same
group and id identifies the radio button in a group uniquely. E.g.,
<input type= “radio” name= “food” id= “veg”>Vegetarian
<input type= “radio” name= “food” id= “nveg”>Non-vegetarian
Here, both radio buttons are in group “food” and have unique Ids.
16. How is URL different from email address?
Ans. URL; is composed of communication protocol, domain name, website name, and path resources,
for example: https://www.mywebsite.com/home.html while email ID contains the username of the
email service and the name of the email service website. Both are separated by @ sign. E.g.,
user1india@gmail.com.
17. Which devices are used to connect to internet?
Ans. The devices, to connect the computer to internet, are - Computer System to be connected with
Internet, Modem to modulate/demodulate signals, Telephone connection to connect with the
modem. Internet service provider provides the internet access over telephone network. Modem
connection with the computer could be wired or wireless.
or
What do you mean by E-learning? List its two main advantages.
Ans. E-learning is the mode of acquiring knowledge by means of Internet and computer-based training
programs. E-learning can be done anywhere and at any time. Broadly, E-learning is synonymous with
EDUSOFT IT SOLUTIONS PVT LTD.
Computer Based Instruction (CBI), Computer Based Training (CBT), Internet Based Training (IBT), Web
Based" Training (WBT) and online education.
Advantages of E-learning:-
1. Reduces travel time and travel costs for off-campus students.
2. Learning can accommodate, different learning styles and facilitate learning through a variety of
activities.
18. Which elements are used to create HTML table? Give their use with an example.
Ans. <TABLE>, <TH>, <TR> and <TD> container elements are used to create an HTML table.
<TABLE> represents the whole table, <TH> represents the table header, <TR> represents table row and
<TD> represents table data. For example:
<table>
<tr><th>Item</th> <th>Price</th></tr>
<tr><td>Mixy</td> <td>5000</td></tr>
<tr><td>Toaster</td> <td>4500</td></tr>
<tr><td>Filter</td> <td>8000</td></tr>
</table>
or
Mention any two attributes of <body> tag along with their purposes.
Ans. The <body> tag defines the document's body. Various mark-up elements are allowed within the
body to indicate headings, paragraphs, lists, hypertext links, etc.
Attributes of Body tag are :-
a. Background: This attribute is used to apply a picture as a background on the web page.
Syntax: <body background="Logo.jpg"> ...... </body>
b. Bgcolor: This attribute is used to change the background colour of web page.
Syntax:< body bgcolor-"#99BBCC"> ...... <fbody>
19. List any 2 main advantages of CSS.
Ans. The 2 main advantages of CSS are:
1. Time and effort in designing the web pages is saved significantly since styles are defined once in
style sheet.
EDUSOFT IT SOLUTIONS PVT LTD.
2. Web pages get a consistent look throughout the website. For example, if a web site is following a
theme called “Ocean” then shades of gray, blue and green can be defined in various styles of
paragraphs, headings and backgrounds etc. once in style sheet and it would be cascaded on all the
pages.
Section C (4 x 3 = 12)
20. Using CSS, display some text in arial font family, size extra large, letter spacing 20. Text should be in a
box with red dotted border of thickness 10 points and fill colour in the box should be pink. Keep all the
text on the page in center of the page. Do all the formatting and alignments using CSS only.
Ans. <P style= “font-family:arial;
Font-size:xx-large;
Letter-spacing:20;
Border-width:10;
Border-style:dotted;
Border-color:red;
Backgrpound-color:pink;
Text-align:center”>
WLECOME
</P>
21. How can web sites safeguard privacy of the users?
Ans. Websites can safeguard the privacy and data of the users by following some industry standard
measures as listed below:
Using technology such as data encryption through Secured Socket Layer with HTTP (https),
firewalls and antiviruses on the servers, regular updates in security measures, data backups
and training of their staff as required etc.
A robust monitoring process to identify and eliminate or prevent unauthorised access to the
user data and web site resources.
Educating and notifying users in safe transaction practices.
Industry standard compliance certifications for financial transactions. For example, SSL
certifications, Payment Card Industry Data Security Standard (PCI DSS) for electronic card-
based transactions
22. Sneha creates motivational videos and she needs to showcase them on her own web site. She has 2
videos so far. She needs to display them in a 1x2 grid with the help of table. How should she write the
code?
EDUSOFT IT SOLUTIONS PVT LTD.
Ans. <video width="320" height="240" controls>
<table border>
<tr>
<td><source src="v1.mp4" type="video/mp4"></td>
<td><source src="v2.mp4" type="video/mp4"></td>
</tr>
</table>
</video>
An older way is also used as below, but today it is obsolete and nonstandard:
<table border>
<tr>
<td><img width=300 height=100 dynsrc="v1.mp4" type="video/mp4"></td>
<td><source width=300 height=100 dynsrc="v2.mp4" type="video/mp4"></td>
</tr>
<table>
23. Vishal needs to display the definition of 3 English grammar terms - Noun, Pronoun and Adjectives as
below:
Noun - name of the person, place or thing.
Pronoun - used in place of noun.
Adjective - describes noun.
Help him display these definitions using HTML definition lists.
Ans. <DL>
<DT>Noun</DT>
<DD>name of the person, place or thing.</DD>
<DT>Pronoun</DT>
<DD>used in place of noun.</DD>
<DT>Adjective</DT>
<DD>describes noun.</DD>
</DL>
EDUSOFT IT SOLUTIONS PVT LTD.
or
Write HTML code to display an image "learn.png" of dimensions 100x100 as hyperlink to a text named
"Lesson 1" in a web page named "Book1.html". Assume that all the files are in the same directory on the
web site. Write only necessary code.
Ans. <a href="Book1.html#Lesson1">
<img height="100" width="100" src="learn.png">
</a>
Section D (1 x 4 = 4)
24. Consider the web page given here and complete the HTML code that follows to match the output.
The browser window title should be BEUQUOTES. Assume the colours and font.
Ans.
<html>
<head><title>BEUQUOTES</title></head>
<body bgcolor= “maroon”>
<hr width= “90%” size= “2” noshade>
<h4>Charlie and the chocolate factory</h4>
<hr width= “90%” color= “green” size= “2”>
<center>
<font color= “yellow” size= “6” face= “arial”>
EDUSOFT IT SOLUTIONS PVT LTD.
So please, ……pray. <br>
Go…..away!<br>
And…..install, <br>
a……wall.
</font>
</center>
<P align= “right”>
<font color= “white” size= “6” face= “arial”>Roald Dahl</font>
</P>
</body>
</html>
OR
Create the table as shown here, stars are images of dimension 10x10 pixels.
Ans. <table border>
<tr><th>CLASS</th><th>ACADEMICS</th>SPORTS<th></th></tr>
<tr align= “center”><td>6A</td><td>93</td>
<td>
<img src= “star.jpg” height= “10” width= “10”>
<img src= “star.jpg” height= “10” width= “10”>
<img src= “star.jpg” height= “10” width= “10”>
</td>
</tr>
<tr align= “center”><td>6A</td><td>93</td>
EDUSOFT IT SOLUTIONS PVT LTD.
<td>
<img src= “star.jpg” height= “10” width= “10”>
<img src= “star.jpg” height= “10” width= “10”>
<img src= “star.jpg” height= “10” width= “10”>
<img src= “star.jpg” height= “10” width= “10”>
</td>
</tr>
</table>
Section E (2 x 4 = 8)
Case Study - 1
25. Create the following list and answer the questions that follow:
Ans. <UL type= “square”>
<LI>Life skills</LI>
<OL type= “a”>
<LI>Communication skills</LI>
<LI>Self management</LI>
</OL>
<LI>Technical Skills</LI>
<OL type= “a” start= “3”>
EDUSOFT IT SOLUTIONS PVT LTD.
<LI>Coding</LI>
<LI>Design</LI>
</OL>
</UL>
a. How many nested lists are there in the code?
Ans. Two ordered nested list in an unordered list.
Case Study - 2
26. Read the paragraph below and answer the questions that follow:
Cyberbullying is an act of harassing someone online in different ways such as sending unsolicited,
unconstitutional messages, images or content; threatening online, mocking or shaming someone online
in a group or individually, compelling someone to do something unwanted by threatening with severe
consequences. Children are the prime target of cyberbullying because their young minds can be easily
manipulated. Children can be easily lured into traps set through friendship, hobby groups, pop
communities, chatrooms, and daring contests or games. Cyberbullying may lead to severe consequences
up to the extent of the victim committing suicide. Children must always and immediately get in touch of
their elders in such a case without any hesitation or shame. They must realise that by hiding facts the
threat will become serious and their elders are the best people to help them out of it.
I. Give one reason why children are prime targets of cyberbullies?
Ans. Children are young and immature. They do not have the ability to differentiate good from bad.
Their minds are easily influenced by the adults.
II. Rahul received mocking comments on his pic on social media – what kind of threat was he exposed
to?
Ans. Cyber bullying.
III. The best way to ensure that we do not indulge into cyber-bullying, we must follow the rules of
_______________.
Ans. Cyber ethics.
IV. The nest way to ensure that we do not get threatened by any cyber-bullying, we must follow the
rules of ___________________ .
Ans. Cyber safety.