Computer Application Sample Paper
Computer Application Sample Paper
© Publisher
Head Office
Kalindi, TP Nagar, Meerut (UP) - 250002, Tel: 0121-7156203, 7156204
Sales & Support Offices
Agra, Ahmedabad, Bengaluru, Bareilly, Chennai, Delhi, Guwahati,
Hyderabad, Jaipur, Jhansi, Kolkata, Lucknow, Nagpur & Pune.
ISBN : 978-93-25795-17-4
PO No : TXT-XX-XXXXXXX-X-XX
Published by Arihant Publications (India) Ltd.
For further information about the books published by Arihant, log on to
www.arihantbooks.com or e-mail at [email protected]
Follow us on
Contents
þ One Day Revision 3-6
þ The Qualifiers 9-14
þ Latest CBSE Sample Paper 17-25
. Cyber ethics
. HTML
UNIT HTML - I
— Introduction to web page designing using HTML: create and save an HTML document, access
a web page using a web browser.
— HTML tags: html, head, title, body, attributes: text, background, bgcolor, link, vlink, alink , br
break , hr horizontal rule , inserting comments, h ..h heading , p paragraph , b bold , i
italics , u underline , ul unordered list , ol ordered list , and li list item . Description lists: dl,
dt and dd. Attributes of ol start, type , ul type .
— Font tags attributes: face, size, color .
— Insert images: img attributes: src, width, height, alt , sup super script , sub subscript .
— HTML Forms: Textbox, radio buttons, checkbox, password, list, combobox.
MCQs Preparation Tips
ONE DAY
REVISION
Revise All the Concepts in a Day
Just Before the Examination...
● Introduction to HTML
HTML is a markup language, which is used to This tag provides various attributes, which are as follows:
define the layout and attribute of a World Wide ● background attribute specifies a background image
Web (WWW) document as well as to create for a document. HTML supports various graphics
links between web pages. format such as .gif, .jpg etc.
It is a subset of SGML (Standard Generalised ● text attribute specifies the color of the text in a
2. <HEAD> Tag This element is a container for between the top of the document and the top of the
all the header elements. The <HEAD> tag browser window) of your body element.
● leftmargin property sets a left hand margin (distance
must include a title for the document that can
include scripts, styles, meta information and between the left side of the document and the left
many more. The second line of your HTML edge of the browser window) of your body element.
document should be <HEAD>. 5. <FONT> Tag This tag specifies the font face, font size
3. <TITLE> Tag This tag defines the title of the and font color of the text. This tag is generally used for
changing the appearance of a short segment of text. It
ONE DAY REVISION
document’s body. It is used to set the basic <FONT> tag. The range of accepted values goes
page characteristics. It contains all the from 1 (the smallest) to 7 (the largest).
necessary contents of a HTML document, such ● face attribute specifies the font name or type face of
as text, hyperlinks, images, tables, lists etc. The the text inside a <FONT> tag.
content of your web page is placed in between ● color attribute specifies the color of the text inside a
the opening <BODY> and closing </BODY> <FONT> tag.
tags.
04 CBSE Sample Paper Computer Applications Class X (Term I)
6. <BASEFONT> Tag This tag specifies a default ● width attribute specifies the width of a horizontal
font color, font size or font family for all the text in a line in pixels or percent. Its default value is 100%.
document that follows it, which is only supported ● color attribute specifies the color of the
by Internet Explorer web browser. horizontal line.
Following are the attributes of <BASEFONT> tag: 13. Style Tags
● color attribute specifies the color of the text
There are three types of style tags are as follows:
inside a <BASEFONT> tag. ● Bold <B> Tag This tag specifies the text into
window. With the <CENTER> tag, closing tag underline the text. It is also a container element.
</CENTER> is always used. 14. HTML Lists HTML supports several elements for
8. Comment <!- -... - -> Tag This tag is used to making lists. They can be divided into two types of
insert comments in the source code of the web lists, i.e. Glossary lists and Regular lists. Glossary
page. Comments are not displayed in the lists are denoted by the element <DK>, while
browser’s window. All the text inserted inside this Regular lists are denoted by the elements <UL>,
tag (<!- - ...- - >) will be ignored by the browser <OL>, <MENU> and <DIR>.
that made invisible for the user.
Types of Lists
9. Heading Tags In HTML, heading tags are used to
There are various types of list as follows:
display the text as a heading. It can also be used to
give section headings. There are six levels of (i) Unordered List <UL> This list (also known as
headings, ranging from <H1>…</H1> to unnumbered list) is an indented list with a bullet
<H6>…</H6>. symbol in front of each list item.
Attribute of heading tags is: An unordered list starts with the <UL> tag. Each
● align attribute specifies the alignment of the text
list item starts with the <LI> tag.
as heading. By default, alignment is left. Attribute of <UL> List tag is:
10. Paragraph <P> Tag This tag is used to mark a ● type attribute is used to change the bulleted
block of text as a paragraph. It is used to insert a symbol in a list. The attribute may have a
line break with extra space in the beginning. This is value of circle, disc or square.
a container tag. (ii) Ordered List <OL> This list starts with the
Attribute of <P> tag is: <OL> tag. Each list item starts with the <LI>
● align attribute specifies the alignment of the text
tag. The list items are marked with numbers. By
default, the numbering will be 1, 2, 3 ... . You can
within a paragraph. By default, alignment is left.
also adjust the numbering using type attribute.
11. Line Break <BR> Tag This tag is used to insert a
Attributes of <OL> tag is:
line break which means the text/image following the
tag will be moved to the next line when displayed in
● type The numbering of an HTML list can be
the browser. changed to letters or roman numerals by the type
attribute.
12. Horizontal Rule <HR> Tag To create a horizontal ● start attribute is used to change the beginning
line on your web page, you have to use the empty
value of an ordered list. Normally, the ordered
tag <HR>. This horizontal line can be used to list begins with 1.
divide information into sections.
(iii) Definition List This is a list of items, with a
ONE DAY REVISION
Following are the attributes of <HR> tag: description of each item. HTML definition lists
● size attribute specifies the height of the rule in
(<DL>) are indented list without any bullet
pixels. Its default value depends directly on the symbol or any number in front of each item.
browser. Generally, the default size of a rule is
3 pixels. Tags used in definition lists are as follows:
● noshade is boolean attribute. When this attribute ● <DL> Opening tag that defines the start of
is present, the rule is drawn with a solid black the list.
line as a 2D effect instead of the default ● <DT> List item that defines the definition term.
appear on the place where the image will be where the user can enter text.
loaded. ● Password provides a single line text input field
● border attribute of the <IMG> tag specifies the where the user can enter password. A
width of the border around an image. You can set password field shows one dot for each
the border of an image that you want to use in your character input by the user.
web page. By default, an image has no border in ● Checkbox provides a checkbox on the
<SUB> and </SUB> tags turn the enclosed text drop-down list of some options from which
into subscript. In its simplest form, <SUB> tag one can be selected. <SELECT> tag is
may be specified as: supported in all the web browsers.
<SUB> aaa </SUB> <OPTION> tag is used inside the
where, aaa is the text, which is to be subscripted. <SELECT> tag that displays the options in
the list.
06 CBSE Sample Paper Computer Applications Class X (Term I)
● Cyber Ethics
1. Issues Related to Cyber Ethics 2. Open Source Software Movement The open
● Plagiarism The word ‘plagiarism’ has emerged source software movement is a movement that
from a latin word plagiarius, which means supports the use of open source licenses for some
kidnapping. Plagiarism is an act of copying software. The open source movement was started
another person’s idea, words or work and to spread the concept of open source software.
pretend that they are our own. Thus, open source software is a software whose
● Intellectual Property Rights (IPR) Intellectual source code is available for modification or
property rights reserves all the rights of the owner enhancement by anyone. Examples of open source
to the information to decide, how much information software are Linux, Unix, MySQL, etc.
is to be exchanged, shared or distributed. The 3. Freedom of Information (FOI) FOI or Right to
owner can decide the price for doing so. Information (RTI) refers to a citizen’s right to access
● Netiquettes The word netiquette is a
information that is held by the state. In many
combination of net (from Internet) and etiquette. It countries, this freedom is supported as a
means respecting other users' views and constitutional right.
displaying common etiquette when posting your
views to online discussion groups. Freedom of Information Act (FOIA) FOIA is a
federal law that generally provides that any person
● Hacking Hacking means stealing of required
has a right to obtain access to federal agency
information by seeking and exploting weakness in
records.
a computer or a computer network. For gathering
required information, a hacker appears with 4. Digital Divide Digital divide is a term that describes
malicious intention and breaks into the owner’s the uneven distribution of Information and
system and steals the information illegally. Communication Technologies (ICTs) in society.
● Piracy Software piracy means copying of data or 5. e-Commerce e-Commerce (Electronic Commerce
computer software without the owner’s or EC) is the buying and selling of goods and
permission. However, most peoples are aware services on the Internet. e-Commerce draws on
about piracy and know that it is illegal, yet the technologies such as mobile commerce, electronic
piracy is uncontrollable. funds transfer, supply chain management, Internet
● Digital Property Rights Digital property includes marketing, online transaction processing, electronic
data, Internet accounts, and other rights in the data interchange, inventory management systems
digital world, including contractual rights and and automated data collection systems.
intellectual property rights. Digital property rights There are some types of e-Commerce, which are as
disputes arise when some form of counterfeiting follows:
or piracy occurs between companies. ● Business-to-Business (B2B)
● Consumer-to-Business (C2B)
agreement that gives an individual, company or
organisation permission to use a software ● Consumer-to-Consumer (C2C)
right to one or more copies of the software Frauds in e-Commerce e-Commerce fraud shows
without violating copyrights.
no signs of slowing down. Online businesses are
There are two types of software license, which are quickly becoming easy targets for cybercriminals as
as follows: fraud in e-Commerce continues to rise.
(i) Proprietary Software License The hallmark There are some methods of fraud that are used to
of proprietary software licenses is that the
target e-Commerce as:
software publisher grants the use of one or
● Refund Fraud ● Merchant Fraud
more copies of software under the End-User
ONE DAY REVISION
THE
QUALIFIERS
Chapterwise Set of MCQs to Check Preparation
Level of Each Chapter
1. Introduction to HTML
Direction (Q. Nos. 1-15) Each of the question has four options out of which only one is correct.
Select the correct option as your answer.
1. To create a web page, we need
(a) notepad (b) web browser
(c) Both (a) and (b) (d) None of these
11. Identify the error in the following HTML code. Also, choose the correct code.
<BODY color=“yellow” background=“nature.jpg”>
(a) <BODY text=“yellow” background=“nature.jpg”>
(b) <BODY text=“yellow” image =“nature.jpg”>
(c) <BODY bgcolor=“yellow” image =“nature.jpg”>
(d) <BODY bgcolor=“yellow” background=“nature.jpg”>
12. Choose the HTML code to set the image ‘life.jpg’ stored in ‘pictures’ folder in F : as the
background of your web page.
(a) <BODY image =“F:\pictures\life.jpg”>
(b) <BODY background =“F:\pictures\life.jpg”>
(c) <BODY background =“F:\life.jpg”>
(d) <BODY Images =“F:\life.jpg”>
Maharashtra
Mumbai
(a) <DL> (b) <DT>
<DT> Delhi <DL> Delhi
<UL> Mayur Vihar <DD> Mayur Vihar
<DT> Maharashtra <DL> Maharashtra
<UL> Mumbai <DD> Mumbai
</DL> </DT>
CBSE Sample Paper Computer Applications Class X (Term I) 11
Answers
For Detailed Solutions
1. (c) 2. (a) 3. (c) 4. (d) 5. (a)
6. (c) 7. (b) 8. (c) 9. (a) 10. (a) Scan the code
11. (d) 12. (b) 13. (b) 14. (c) 15. (a)
5. HTML code to display an image “school.jpg” on the right side of the page.
(a) <IMG src=“school.jpg” alt=“right”>
(b) <IMG src=“school.jpg” alignment=“right”>
(c) <IMG src=“school.jpg” align=right>
(d) <IMG src=“school.jpg” align=“right”>
6. Identify the code to insert an image “hello.jpg” in a web page with alternate text
“Welcome” when image is not displayed.
(a) <IMG src=“hello.jpg” alt=“Welcome”>
(b) <IMG src=“hello.jpg”> alt=“Welcome”
(c) <IMG src=“hello.jpg”> Welcome
(d) <IMG src=“hello.jpg” alternate=“Welcome”>
11. HTML code to create two textbox with labels ‘Field’ and ‘Interest’.
(a) <INPUT type = “text” name = “field”/> <BR>
<INPUT type = “text” name = “interest”/>
(b) <INPUT type = “text”label = “field”/><BR>
<INPUT type = “text” label = “interest”/>
(c) Field : <INPUT type = “text” name = “field”/><BR>
Interest : <INPUT type = “text” name = “interest”/>
(d) None of the above
THE QUALIFIERS
12. Which method attribute of <FORM> tag opens a new form as per the URL?
(a) GET (b) Form
(c) POST (d) SET
Answers
For Detailed Solutions
1. (d) 2. (a) 3. (b) 4. (c) 5. (d)
6. (a) 7. (b) 8. (c) 9. (c) 10. (a) Scan the code
11. (c) 12. (b) 13. (b) 14. (a) 15. (b)
3. Cyber Ethics
Direction (Q. Nos. 1-15) Each of the question has four options out of which only one is correct.
Select the correct option as your answer.
1. Which of the following is defined as a set of rules for acceptable online behaviour?
(a) Netiquette (b) Internetiquette
(c) Etiquette (d) Ethics
3. Which of the following is a contract between the entity that created and supplied an
application, underlying source code?
(a) Software rules (b) Software license
(c) Software norms (d) None of these
4. When software is defined as being in the ………… , anyone is free to use and modify
the software without restrictions.
(a) public domain (b) proprietary
(c) commercial (d) closed
7. Which of the following protects the specific, unique name, logo and symbols
pertaining to your products or business brand?
(a) Patent (b) Trademark
(c) Copyrights (d) Digital rights
14 CBSE Sample Paper Computer Applications Class X (Term I)
8. They usually give the creator an exclusive right over the use of his/her creation for a
certain period of time.
(a) IPR (b) FOI
(c) RTI (d) All of these
9. Which of the following can be defined as the right to access information held by public
bodies?
(a) Freedom of Information (FOI) (b) Right to Information (RTI)
(c) Both (a) and (b) (d) None of these
10. ………… , term that describes the uneven distribution of Information and
Communication Technologies (ICTs) in society.
(a) Digital divide (b) Cyber crime (c) Cyber ethics (d) Digital rights
12. Riya has received an encrypted message and wants to convert this message into the
actual message (message before encryption). The technique she should use is called
(a) conversion (b) encryption
(c) decryption (d) None of these
13. This type of e-Commerce is when an individual sells their services or products to a
business organisation.
(a) C2B (b) B2B
(c) C2C (d) B2C
15. Which of the following is the act of copying another person’s work word-for-word?
(a) Paraphrased plagiarism (b) Direct plagiarism
(c) Accidental plagiarism (d) Mosaic plagiarism
Answers
For Detailed Solutions
1. (a) 2. (d) 3. (b) 4. (a) 5. (c)
6. (a) 7. (b) 8. (a) 9. (c) 10. (a) Scan the code
11. (a) 12. (c) 13. (a) 14. (c) 15. (b)
THE QUALIFIERS
CBSE Sample Paper Computer Applications Class X (Term I)
17
Latest CBSE
SAMPLE PAPER
Latest Sample Question Paper for Class X (Term I)
Issued by CBSE on 2 Sept, 2021
Section A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
1. Which one of the following software comes under open source software category?
(a) Photoshop (b) MS-Paint
(c) Linux (d) Windows
10. The…………… attribute of <IMG> tag specifies an alternate text for an image, if the
image cannot be displayed due to any reason.
(a) alt (b) alternate
(c) tooltip (d) text
11. While creating a web document, which unit is used to express an image’s height and
width?
(a) Centimetres (b) Pixels
(c) Dots per inch (d) Inches
12. Preeti needs to send a very confidential message to her colleague in office over a secure
channel. She uses a technique wherein an actual message (which is in readable form)
can be converted into an unreadable message. This concept is known as…………… .
(a) encryption (b) decryption
(c) plagiarism (d) data security
14. The default alignment of images, that are inserted in web page, is
Latest CBSE SAMPLE PAPER
15. Which of the following techniques can be used for security of data?
(a) Authentication (b) Authorisation
(c) Encryption (d) All of these
17. …………… is a software for which exclusive rights of modification in the source code
remain with the owner.
(a) Free and Open Source Software (b) Freeware Software
(c) Open Source Software (d) Proprietary Software
CBSE Sample Paper Computer Applications Class X (Term I)
19
18. A …………… is the right given by the government to an inventor to protect his/ her
invention from being used/copied for a fixed period of time.
(a) copyright (b) intellectual property
(c) patent (d) trademark
Section B
This section consists of 20 questions. Answer any 16 questions.
21. Arun clicks on a link received in a message on his phone which promises him a
complimentary trip to a destination of his choice. He forwarded this message to his
friend, Panshul and asked him to do the same. But Panshul refuses and tells Arun that
his personal and private information, such as online account names, login information
and passwords can be stolen and he should be careful of such …………… attacks.
(a) phishing (b) spamming
(c) scamming (d) plagiarism
23. Charlene is an artist. She displays her artwork on the Internet using her website to
attract buyers. One day while browsing the Internet she discovers that another artist
has displayed her painting portraying it as his own. Which rights of Charlene was
infringed?
(a) Digital Privacy Rights (b) Intellectual Property Rights
(c) Digital Property Rights (d) Intellectual Privacy Rights
20 CBSE Sample Paper Computer Applications Class X (Term I)
24. Which of the following will result in the largest text size?
(a) <H3> (b) <H6>
(c) <H2> (d) <H4>
27. Identify which of the following type of list will create a bulleted list?
(a) Unordered (b) Ordered
(c) Definition (d) Numbered
29. Pratham is excited to use a new software which is freely available to download but he
cannot modify or change the source code. Pratham is using
(a) freeware software (b) open source software
(c) Both (a) and (b) (d) None of these
30. Priyanshu has written the following code snippet as part of an HTML program:
<B> Mystery Moon </B>
Predict the output of the above code.
(a) Mystery Moon (b) Mystery Moon
(c) Mystery Moon (d) Mystery Moon
Fill in the blanks to set the image size to be 250 pixels wide and 400 pixels tall.
(a) 250, 400 (b)400, 250
(c) <250><400> (d) <400><250>
33. Which of the following is not a reason for the digital divide in different demographic
regions?
(a) Cost of technology
(b) Lack of information
(c) Lack of access to high performance computers
(d) Lack of access to the disabled
CBSE Sample Paper Computer Applications Class X (Term I)
21
34. One of the most popular method of encrypting data is ceaser cipher where original
data is replaced by a key character like if key is - 2 then ‘a’ will be replaced by ‘y’, ‘b’
is replaced by ‘z’, and so on.
If the key is 2 i.e. every letter is replaced by its next to next letter means the letter ‘A’ will be
replaced by ‘C’, the letter 'B' is replaced by ‘D’, and so on then what will be the replacement
of the word ‘CoMpUtEr’?
(a) Eqorwvgt (b) eQOrwVtG
(c) eqroWVTG (d) EqOrWvGt
36. Gagandeep has written the following code to display an image in the background of
HTML document:
<BODY BgGround= “Animals.jpeg”>
But he is not getting the desired output. Help him to identify correct code.
(a) <BODY Bg= “Animals.jpeg”>
(b) <BODY BACK= “Animals.jpeg”>
(c) <BODY BGIMAGE= “Animals.jpeg”>
(d) <BODY BACKGROUND= “Animals.jpeg”>
37. Which of the following is a way to avoid plagiarism when using material from the
Internet?
i. Citing
ii. Paraphrasing
Latest CBSE SAMPLE PAPER
iii. Referencing
iv. Embedding
Choose the correct option.
(a) Only i and ii (b) Only i
(c) Only i, ii and iii (d) Only ii and iv
39. Which of the following tag is used to define options in a drop down selection list?
(a) <SELECT> (b) <LIST>
(c) <DROPDOWN> (d) <OPTION>
22 CBSE Sample Paper Computer Applications Class X (Term I)
40. Which of the following is the correct way to create a list using the lowercase letters?
(a) <OL alpha = “a” > (b) <OL type = “a”>
(c) <OL letter = “a”> (d) None of these
Section C
(Case Study Based Questions)
This section consists of 10 questions. Any 8 questions are to be attempted.
Case Study-I
Geetika has recently created her social accounts. She is very excited as she waited so long to
go online. She has recently also got admission in a prestigious high school and does not
know many students.
When she logs into her social media a few days later, she finds that someone is posting
negative, demeaning comments on her social media profile. She is also getting repeated
mails from unknown people. Whenever she goes online, she is trolled by multiple
unknown people.
Based on the given information, answer the questions 41 to 45.
42. Which of the following is the most appropriate action she should take?
(a) She should stop going online and delete her social media accounts.
(b) She should not share this with anyone as she might face more of such kind of behaviour.
(c) She should file a complaint at the nearest police station.
(d) She should inform her parents and bring to the notice of school authorities.
43. After hearing her ordeal, the school decides to publish a set of moral principles that
determines the appropriate behaviour of students while using the Internet. The school
is referring to…………… .
(a) intellectual property rights
(b) internet privacy
(c) computer ethics
Latest CBSE SAMPLE PAPER
44. Geetika is advised by her best friend, Seerat to protect her personal information from
intentional or unintentional attacks by others. This is also known as …………… .
(a) digital right
(b) copyright
(c) data privacy
(d) intellectual property
45. The computer teacher of Geetika’s class decides to take an online session on the topic
Netiquettes, which generally includes
(a) safeguarding one’s passwords and sensitive online information
(b) logging out of social media accounts after the session
(c) not bullying or trolling anyone by disrespecting them or passing inappropriate remarks
(d) All of the above
CBSE Sample Paper Computer Applications Class X (Term I)
23
47. Choose the correct option from the following to fill up in line 2.
(a) font (b) face
(c) type (d) text
48. Choose the correct option from the following to fill up in line 3.
(a) </F> (b) <F>
(c) </FONT> (d) <FONT>
Latest CBSE SAMPLE PAPER
49. Choose the correct option from the following to fill up in line 4.
(a) <I> (b) </LI>
(c) <\LI> (d) <\I>
50. Choose the correct option from the following to fill up in line 5.
(a) UL (b) <\UL>
(c) <UL> (d) /UL
Answers
1. (c) 2. (b) 3. (b) 4. (c) 5. (c) 6. (d) 7. (b) 8. (b) 9. (c) 10. (a)
11. (b) 12. (a) 13. (b) 14. (c) 15. (d) 16. (c) 17. (d) 18. (c) 19. (c) 20. (a)
21. (a) 22. (b) 23. (b) 24. (c) 25. (c) 26. (b) 27. (a) 28. (a) 29. (a) 30. (b)
31. (a) 32. (d) 33. (c) 34. (d) 35. (a) 36. (d) 37. (c) 38. (b) 39. (d) 40. (b)
41. (d) 42. (d) 43. (d) 44. (c) 45. (d) 46. (d) 47. (b) 48. (c) 49. (b) 50. (d)
24 CBSE Sample Paper Computer Applications Class X (Term I)
SOLUTIONS
1. Open source software is a software whose readable text so it can only be read by the
source code is available for modification or person who has the secret code or decryption
enhancement by anyone. e.g. Linux, Unix, key.
MySQL, etc. 13. <! - - .... - -> is a comment tag, that is used to
2. HTML tag to draw a horizontal line is <HR>. insert comments in the source code of the web
This horizontal line can be used to divide page. Comments are not displayed in the
information into sections. browser’s window.
3. Secure data transmission means data cannot 14. An image that is displayed in the same line of
be accessed by any unauthorised person the text is called an inline image. By default, an
during transmission. image, inserted using <IMG> tag, is placed
4. The correct code to display (P+Q) 2 is inline with text.
(P + Q) <SUP> 2 </SUP> 15. Techniques can be used for security of data as
authentication, authorisation and encryption.
<SUP> tag is used to represent superscript
text. Superscript text is elevated slightly 16. Cyber crime is a crime that involves a computer
above the baseline to appear above and a network. It may harm someone’s security
surrounding the text. and financial health.
5. <I> </I> tags cause browsers to render text as 17. Proprietary software is a software for which
italics. It is also a container tag and used for exclusive rights of modification in the source
text formatting. code remain with the owner.
6. <IMG> tag is used to insert an image in a web 18. A patent is the right given by the government to
page. src attribute of <IMG> tag takes URL of an inventor to protect his/her invention from
an image file as value which points to the being used/copied for a fixed period of time.
direct location of an image to be displayed. 19. <FONT> tag specifies the font face, font size and
7. <BODY> tag defines the document’s body. It font color of the text. Its attributes are size, face,
contains all the necessary contents of a HTML color. But type is not an attribute of the <FONT>
document, such as text, hyperlinks, images, tag.
tables, lists etc. Its attributes are background, 20. <SUB> tag displays text in subscript form.
text, bgcolor, alink, link, vlink, topmargin and Subscript text is lowered slightly below the
leftmargin. color is not an attribute of baseline to appear below the surrounding text.
<BODY> tag.
21. He should be careful of such phishing attacks.
8. src attribute is used to specify the location of Phishing attacks are the practice of sending
an image file. fraudulent communications that appear to come
Syntax <IMG src=“image name”> from a reputable source.
Latest CBSE SAMPLE PAPER
9. Intellectual Property Rights (IPR) reserves all 22. Ordered list starts with the <OL> tag. Each list
the rights of the owner to the information to item starts with the <LI> tag. The list items are
decide, how much information is to be marked with numbers.
exchanged, shared or distributed. e.g. patent, The numbering of an HTML list can be changed
trademark, industrial design, copyright etc. to letters or roman numerals by the type
Password is not an example of IPR. attribute.
10. alt attribute of <IMG> tag is used to provide 23. The right of Charlene was infringed as
alternate text when an image on a web page Intellectual Property Right (IPR). IPR reserves
cannot be displayed. all the rights of the owner to the information to
decide, how much information is to be
11. width and height attributes of <IMG> tag tell
exchanged, shared or distributed.
the dimensions of an image to the browser.
Dimensions of image are in pixels or 24. There are six levels of headings in HTML,
percentage. ranging from <H1> to <H6>. <H1> defines the
largest heading level and <H6> defines the
12. This concept is known as encryption.
smallest heading level.
Encryption is the process that scrambles
CBSE Sample Paper Computer Applications Class X (Term I)
25
different demographic regions. the heading tag. It is also a container tag which
34. The word CoMpUtEr is replaced with next to has closing tag </H1>.
next letter means EqOrWvGt. 47. face is attribute of <FONT> tag, which specifies
35. Radio button provides a radio button on the the type of font such as arial, Times new roman
form. Only one radio button of a group can be etc.
selected at one time. 48. <FONT> tag specifies the font face, font size
36. background attribute specifies a background and font color of the text. It is a container tag
image for a document. HTML supports that has closing tag </FONT>, which is used to
various graphics format such as .gif, .jpg etc. fill up the blank in line 3.
Syntax <BODY background=“URL”> 49. In line 4, <LI> tag is used to specify the list
37. Plagiarism is an act of copying another item. Its closing tag is </LI> which will be used
person’s idea, words or work and pretend that to fill up the blank in line 4.
they are our own. To avoid plagiarism when 50. <UL> tag specifies the unordered list whose
using material from the Internet, the way closing tag is </UL>. Closing tag must be
is/are required to fill up the blank in line 5.
SAMPLE PAPER 1
COMPUTER APPLICATIONS
A Highly Simulated Practice Questions Paper
for CBSE Class X (Term I) Examination
Instructions
1. This question paper is divided into three sections.
2. Section - A contains 20 questions. Attempt any 16 questions.
3. Section - B contains 20 questions. Attempt any 16 questions.
4. Section - C contains 10 questions. Attempt any 8 questions.
5. Each question carries 0.625 mark.
6. There is no negative marking.
Maximum Marks : 25
Roll No. Time allowed : 90 min
Section A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
2. HTML is a
(a) package (b) software
(c) markup language (d) None of these
3. The …… refers to a code of safe and responsible behaviour for the Internet community.
(a) cyber law (b) cyber ethics
(c) Both (a) and (b) (d) None of these
6. Which of the following security protocol protects communication between client and
server?
(a) SSL (b) SET
(c) Both (a) and (b) (d) None of these
30 CBSE Sample Paper Computer Applications Class X (Term I)
11. When creating a web document, which unit is used to express an image’s height and
width?
(a) Centimetres (b) Pixels (c) Dots per inch (d) Inches
15. Which of the following HTML container tags do you apply to text for formatting the
text as a paragraph?
(a) <PARAGRAPH> ....... </PARAGRAPH> (b) <PARA> ....... </PARA>
(c) <P> …… </P> (d) None of these
16. Which section is used for text and tags that are shown directly on your web pages?
(a) Meta (b) Head (c) Body (d) Table
Section B
This section consists of 20 questions. Answer any 16 questions.
21. It is an act of copying another person’s idea, words or work and pretend that they are
our own. The intentions behind this could be malicious or it could be done accidently
like copying data from other’s computer without his/her permission and redistributing
further. What is it?
(a) Piracy (b) Plagiarism
(c) Hacking (d) Intellectual property rights
22. Consider the following HTML code :
<HTML><BODY>
<DL><DT>Computer
<DD>An electronic machine
<DT>CPU
<DD>Brain of computer</DL>
</BODY></HTML>
Choose the correct output that would be shown upon execution of the above code.
23. Cheery is an Author who writes the book and her friend suggests that if you copy
someone else’s work in your task, word for word, then do not forget enclosing it in
quotes and also mention its source. Her friend is asking to Cherry to avoid ……… .
(a) intellectual property rights (b) plagiarism
SAMPLE PAPER 1
27. ……… value of type attribute displays a hollow circle for an unordered list.
(a) Circle (b) Disc
(c) Hollow circle (d) Semicircle
28. Observe the following code and find which line has an error.
<UL style = “square”>
<LI> Water Bottles
<LI> Lunch Box
<LI> Handkerchief
</UL>
(a) <UL style= “square”> (b) <LI> Water Bottles
(c) <LI> Lunch Box (d) <LI> Handkerchief
29. Intellectual property rights protect the use of information and ideas that are of
(a) social value (b) moral value
(c) commercial value (d) ethical value
31. Which tag is used to get the desired result, if text is Hello World?
The output should be displayed as
Hello World
(a) <I> (b) <U>
(c) <B> (d) <H>
33. Which of the following refers to attempt to gain information from undisclosed areas?
SAMPLE PAPER 1
34. Rahul is working in MNC company. His friend told him about a term that it
encourages people to create new softwares as well as helps them to improve the
existing application. Identify that term.
(a) Hacking
(b) Plagiarism
(c) Intellectual property rights
(d) Netiquette
CBSE Sample Paper Computer Applications Class X (Term I) 33
36. Aayan has written the following code to display an image in the background of HTML
document:
<BODY BgGround = “Flowers.jpeg”>
But he is not getting the desired output. Help him in identifying correct code from the
following.
(a) <BODY Bg = “Flowers.jpeg”>
(b) <BODY BACK = “Flowers.jpeg”>
(c) <BODY BGIMAGE = “Flowers.jpeg”>
(d) <BODY BACKGROUND = “Flowers.jpeg”>
38. The value for alt attribute is a text string of upto ……… characters.
(a) 256 (b) 1024 (c) 216 (d) 512
39. Which of the following tag is used to make the web browser ignore anything that the
tag contains?
(a) <Paragraph> (b) <! ---- .....----> (c) <Comment> (d) None of these
40. Trademark is the registered word or text /logo depicting the identity of a
(a) product (b) work (c) company (d) All of these
Section C
(Case Study Based Questions)
This section consists of 10 questions. Any 8 questions are to be attempted.
SAMPLE PAPER 1
Case Study-I
Raman wants to buy some goods or books online. His friends told him about e-Commerce
that it is the buying and selling of goods and services on the Internet.
e-Commerce draws on technologies such as mobile commerce, electronic funds transfer,
supply chain management, Internet marketing, online transaction processing, electronic
data interchange, inventory management systems and automated data collection
systems.There is no special software to install other than a web browser and many banks
do not charge for this service.
34 CBSE Sample Paper Computer Applications Class X (Term I)
His friend also told about the types of e-Commerce in which different parties interact to
each other. These types are B2B, B2C, C2B, C2C, B2G, etc.
Based on the given information, answer the questions 41 to 45.
41. Which type of e-Commerce involves the electronically facilitated transactions between
consumers?
(a) C2B (b) C2C (c) B2C (d) B2B
42. Which of the following is considered as a powerful tool to collect consumer’s private
information?
(a) e-Commerce (b) e-Shopping (c) e-Learning (d) B2B
44. e-Commerce was one of the ……… business types to become digitally available.
(a) first (b) second (c) third (d) fourth
45. Which of the following applies to any consumer that sells a product or service to a
business over the Internet?
(a) C2C (b) B2G (c) C2B (d) B2B
Case Study-II
Consider the following code created by Riya for a web page:
<HTML>
<HEAD>
<TITLE>
REALLY HONEST BOOK REVIEWS
</TITLE>
_____ #line 1
<BODY bgcolor=“aqua” text=“blue” link= “green” alink=“red” vlink=“red”>
<BASEFONT face= “News Gothic MT”>
<CENTER> <H1> REALLY HONEST </H1> <_____> #line 2
<H1 align=“right”> BOOK REVIEWS </H1>
<HR color=“blue” >
I read a lot of books about many different subjects, here is a list of books
that I have read recently
<UL type =“square”> <LI> <B> <U>
<FONT color=“green”>
“The Rainbow Returns” by E.Smith </FONT>____</B> #line 3
SAMPLE PAPER 1
<LI><FONT face=“arial”color=“purple”>
“Seven steps to immeasurable wealth” by R.U. Needy. </FONT>
<LI> <I> <____color = “black”> “The Food_Lover’s Guide to Weight Loss”
#line 4
by L. Goode. </FONT> </I>
<LI> <U> <FONT____=“yellow”>“A Silly Person’s Guide to Seriousness”
by M. Nott.</FONT></U> #line 5
</UL>
</BODY>
</HTML>
CBSE Sample Paper Computer Applications Class X (Term I) 35
47. Choose the correct option from the following to fill up in line 2.
(a) /CEN (b) \CENTER
(c) /CENTER (d) \CEN
48. Choose the correct option from the following to fill up in line 3.
(a) </LI> (b) </UL>
(c) </U> (d) <U>
49. Choose the correct option from the following to fill up in line 4.
(a) FACE (b) FONT
(c) TEXT (d) STYLE
50. Choose the correct option from the following to fill up in line 5.
(a) type (b) color
(c) face (d) style
SAMPLE PAPER 1
OMR SHEET SP 1
Roll No.
Instructions
Use black or blue ball point pens and avoid Gel & Fountain pens for filling the OMR sheet.
Darken the bubbles completely. Don’t put a tick mark or a cross mark, half-filled or over-filled bubbles will not be read
by the software.
✔ ✗
Correct Incorrect Incorrect Incorrect
Do not write anything on the OMR Sheet.
Multiple markings are invalid.
1 18 35
2 19 36
3 20 37
4 21 38
5 22 39
6 23 40
7 24 41
8 25 42
9 26 43
10 27 44
11 28 45
12 29 46
13 30 47
14 31 48
15 32 49
16 33 50
17 34
Answers
1. (c) 2. (c) 3. (b) 4. (d) 5. (b) 6. (a) 7. (b) 8. (b) 9. (d) 10. (b)
11. (b) 12. (c) 13. (a) 14. (c) 15. (c) 16. (c) 17. (a) 18. (b) 19. (c) 20. (a)
21. (b) 22. (a) 23. (b) 24. (d) 25. (b) 26. (d) 27. (a) 28. (a) 29. (c) 30. (d)
31. (c) 32. (b) 33. (a) 34. (c) 35. (b) 36. (d) 37. (b) 38. (b) 39. (b) 40. (d)
41. (b) 42. (a) 43. (d) 44. (a) 45. (c) 46. (a) 47. (c) 48. (c) 49. (b) 50. (b)
SOLUTIONS
1. Copyright is an exclusive right of the 13. The given list uses the uppercase letter for each
developer to protect their works, which is item, so the correct syntax is
granted by law. <OL type=“A”>
2. HTML is a markup language, which is used to 14. Square bulleted list is the part of unordered list.
define the layout and attributes of WWW To create a square bulleted list, use
document.
<UL type = “square”>
3. The word cyber ethics refers to a code of safe
15. <P> ........... </P> is a container tag, which is used
and responsible behaviour for the Internet
for formatting text as a paragraph.
community.
16. Body section is used for text and tags that are
4. GPL (General Public License), BSD (Berkeley
shown directly on your web pages.
Source Distribution) license and MlT
(Massachusetts Institute of Technology) 17. From the given options, a web page normally
license are the examples of free and open consists of head and body.
source software license. This license is aimed 18. <TITLE> tag must close inside the <HEAD> and
at giving all users unlimited freedom to use, </HEAD> tags.
study and privately modify the software.
19. In HTML, container elements are required as
5. Netiquette is short for Internet etiquette. both starting and ending tags.
Etiquette is a code of polite behaviour in
society, while netiquette is a code of good 20. Software piracy refers for making illegal copies
behaviour on the Internet. of copyrighted software.
21. Plagiarism is an act of copying another person’s
6. Secure Sockets Layer (SSL) is a security
idea, words or work and pretend that they are
protocol protects communication between any
our own.
SSL enabled client and server software
running on a network. 22. HTML definition lists (<DL>) are indented list
without any bullet symbol or any number in
7. The privacy in e-Commerce means the front of each item.
protection of privacy of the parties involved in
trading through e-Commerce. 23. To avoid plagiarism, Cherry should follow
guideline that is given by her friend.
8. Freedom of Information (FOI) refers to a
24. alt attribute allows addition of alternate text
citizen’s right to access information that is
about an image.
held by the state.
25. <SUB> tag is used to write the H 2O in HTML.
9. size attribute of <INPUT> tag is used to resize
SAMPLE PAPER 1
the field such as set the length of text box. The text which is lowered slightly below the
baseline to appear below the surrounding text
10. Checkboxes allow multiple selections at a time is known as subscript.
while radio button allows only a single
26. To prevent hacking, should use the points
selection at a time.
create complex passwords, don’t give your
11. Image’s height and width units are expressed password to anyone and log out of accounts
in pixels or in per cent form. when you are done with them.
12. <lMG> tag is used to insert an inline image in 27. Circle value of type attribute displays a hollow
a web page. This is a container tag. circle for an unordered list.
38 CBSE Sample Paper Computer Applications Class X (Term I)
28. There should be type instead of style. So, correct 39. <! ---- ...---- > is a comment tag that is used to
line is <UL type =“square”> make the web browser ignore anything that
29. Intellectual Property Rights (IPR) protect the use the tag contains.
of information and ideas that are of commercial 40. Trademark is the registered word or
value. IPR encourages people to create new text/logo depicting the identity of a product,
softwares as well as helps them to improve the work and company.
existing applications. 41. C2C (Consumer-to-Consumer) is a type of
30. alt attribute provides an alternate text to an e-Commerce that involves the electronically
image, in case of someone using a text only facilitated transactions between consumers,
browser or using a graphical browser with through third party.
images turned OFF. To fill the blank, ‘School in 42. e-Commerce (Electronic Commerce) is
India’ is used because it is given. considered as a powerful tool to collect
31. <B> tag specifies the text into bold text. So, this consumer’s private information.
tag is used to desired result. 43. Many people think that e-Commerce is the
32. noshade is an attribute of <HR> tag. When this same as e-Business, but as defined here it is
attribute is present, the rule is drawn with a solid only a subset.
blank line as a 2D effect instead of the default 3D 44. e-Commerce was one of the first business
effect, i.e. without shading. types to become digitally available, but the
33. Hacking refers to attempt to gain information Internet offers more than just buying and
from undisclosed areas. To prevent hacking, selling products and services.
make sure you are on an official website, when 45. C2B (Consumer-to-Business) applies to any
entering password. consumer that sells a product or service to a
34. His friend used the term intellectual property business over the Internet.
rights that encourages people to create new 46. </HEAD> is the correct option to fill up in
softwares as well as helps them to improve the line 1 because <HEAD> is a container tag
existing application. and it must be required its closing tag.
35. Textbox provides a single line text input field, 47. /CENTER is the correct option to fill up in
where the user can enter text. line 2. It is the closing tag of <CENTER>.
Textbox is created by <INPUT> tag.
48. </U> is the correct option to fill up in line 3.
36. background attribute of <BODY> tag is used to This tag is used to underline the text. It
set the image in the background. Flowers is the started after the <B> in this code, so it must
name of image and jpeg is the graphics format. be closed before </B>.
37. <INPUT> tag is used to create textbox field in 49. FONT is a tag that required to set the font
HTML document, where the user can enter text. style and type.
38. The value for alt attribute is a text string of upto 50. color is the correct option to fill up in line 5.
1024 characters. color is the attribute of FONT tag.
SAMPLE PAPER 1
SAMPLE PAPER 2
COMPUTER APPLICATIONS
A Highly Simulated Practice Questions Paper
for CBSE Class X (Term I) Examination
Instructions
1. This question paper is divided into three sections.
2. Section - A contains 20 questions. Attempt any 16 questions.
3. Section - B contains 20 questions. Attempt any 16 questions.
4. Section - C contains 10 questions. Attempt any 8 questions.
5. Each question carries 0.625 mark.
6. There is no negative marking.
Maximum Marks : 25
Roll No. Time allowed : 90 min
Section A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
1. Tags and text that do not display directly on the web page are placed in
(a) body (b) table (c) head (d) title
6. The alternate text of an image can be displayed by using ……… attribute of the <IMG>
tag.
(a) src (b) alt (c) align (d) None of these
40 CBSE Sample Paper Computer Applications Class X (Term I)
8. Which option provides a way for the user to securely enter a password?
(a) Text (b) Checkbox
(c) Password (d) All of these
16. ........ attribute is used to set the color of a link, while it is active.
(a) vlink (b) alink
(c) Both (a) and (b) (d) None of these
17. Which attribute of <BODY> tag specifies the color of visited links in a HTML document?
(a) vlink (b) alink
(c) link (d) None of these
20. The hallmark of ……… grants the use of one or more copies of software.
(a) proprietary software license (b) freeware software license
(c) shareware software license (d) open source software license
CBSE Sample Paper Computer Applications Class X (Term I) 41
Section B
This section consists of 20 questions. Answer any 16 questions.
21. In this case, the fraudsters assume another person’s identity, creates credit cards in the
victim’s name and goes on a shopping.
(a) Merchant fraud (b) Refund fraud
(c) Fraud via identity fraud (d) Friendly fraud
±
New Delhi New Delhi
●
±
PAKISTAN PAKISTAN
●
±
Islamabad Islamabad
●
2. PAKISTAN 2. PAKISTAN
● Islamabad Islamabad
±
23. Shreya told her friend Princy about a term that, “It is the study of ethics pertaining to
computers, encompassing user behaviour and what computers are programmed to and
how this affects individuals and society”. What is it?
(a) Cyber ethics (b) Plagiarism
(c) Netiquette (d) Hacking
24. Which of the following is an attribute of the <IMG> tag, which specifies the location of
the image?
(a) alt (b) src
(c) face (d) loc
25. ……… gives the ability to select only one item from the list.
SAMPLE PAPER 2
26. Which of the following is not the factor which contribute to digital divide?
(a) Age (b) Gender
(c) Relevant content (d) Economic growth
29. Rahul has some information and he wants that unauthorised person could not access
this information. Which term he should use for this?
(a) Integrity
(b) Availability
(c) Confidentiality
(d) Authenticity
30. Sohan has written the following code snippet as part of an HTML program.
<U> Honesty Policy </U>
Predict the output of above code.
(a) Honesty Policy (b) Honesty Policy
(c) Honesty Policy (d) Honesty Policy
31. An image to be displayed in a web page has to cover 25% of the browser window
horizontally and 50% vertically. The attribute ……… and ……… of the <IMG> tag
would be used for achieving this.
(a) height, width (b) width, height
(c) width, width (d) height, height
34. Kavi is using social media a lot. His friend suggest him that don’t troll people in web
forums or website comments by repeatedly nagging or annoying them. This rule is
considered in which term?
(a) Piracy (b) Privacy
(c) Digital divide (d) Netiquette
36. Jatin has written the following code to display an image in the background of HTML
document:
<BODY BgGround=“Birds.jpeg”>
But he is not getting the desired output. Help him in identifying correct code from the
following.
(a) <BODY Bg=“Birds.jpeg”> (b) <BODY BACK =“Birds.jpeg”>
(c) <BODY BGIMAGE=“Birds.jpeg”> (d) <BODY BACKGROUND=“Birds.jpeg”>
37. Which of the following was supported by Mastercard, Visa, Microsoft, Netscape, etc?
(a) SSL (b) SET (c) B2B (d) B2C
39. To make an item selected by default, use the selected attribute in the
(a) <OPTION> tag (b) <SELECT> tag
(c) <INPUT> tag (d) <FORM> tag
40. Which of the following is correct way to create a list using the numbers?
(a) <ol type=number> (b) <OL type=“1”>
(c) <OL type=1> (d) <OL letter=1>
Section C
(Case Study Based Questions)
This section consists of 10 questions. Any 8 questions are to be attempted.
Case Study-I
Intellectual property rights are a common type of legal IP protection for those who create.
These rights, however, have actually contributed enormously to the world, in particular
economically.
Many companies in a variety of industries rely on the enforcement of their patents,
trademarks and copyrights, while consumers can also be assured of quality when they
purchasing IP-backed products. The purpose of intellectual property rights is to encourage
new creations, including technology, artwork and inventions, that might increase economic
growth. Intellectual property rights increase the incentives for individuals to continue to
produce things that further create job opportunities and new technologies, while enabling
our world to improve and evolve even faster.
Based on the given information, answer the questions 41 to 45.
41. Which of the following encourages people to create new softwares as well as helps
SAMPLE PAPER 2
42. Which of the following are the controls of intellectual property rights?
(a) Avoid joint ownership
(b) Get exact match domains
(c) Safeguard with strong access control
(d) All of the above
44 CBSE Sample Paper Computer Applications Class X (Term I)
43. ……… can still be enforced, if others try to create simple material from the original
source material.
(a) Patent law (b) Trademark law
(c) Copyright law (d) All of these
44. IPR reserves all the rights of the owner to the ……… to decide.
(a) information (b) name (c) salary (d) work
45. Which term provides the assurity of good returns, people and businesses invest?
(a) Plagiarism (b) Copyright (c) Trademark (d) IPR
Case Study-II
Consider the following code create by Nidhi for a web page:
<HTML>
<HEAD>
<TITLE>Taj Mahal____ #line 1
</HEAD>
<BODY bgcolor=“pink”>
<CENTER>
<IMG src=“taj.jpeg” height=“1OO”width=“150”>
<H1><U> The Taj Mahal</U> ____ #line 2
</CENTER>
<P><_____color=“blue”size=“5”face=“Times New Roman”> #line 3
The Taj Mahal is a world famous white marble <BR> monument located on the
Yamuna river bank in _____ #line 4
the Indian historical city of Agra.
</FONT>
</P>
<FONT color=“green”>
</FONT>
_____ #line 5
</HTML>
Based on the given code, answer the questions 46 to 50.
46. Choose the correct option from the following to fill up in the line 1.
(a) </BODY> (b) </HTML>
(c) </TITLE> (d) None of these
47. Choose the correct option from the following to fill up in the line 2.
(a) <\H1> (b) </H1>
SAMPLE PAPER 2
48. Choose the correct option from the following to fill up in the line 3.
(a) FACE (b) FONT (c) CAPTION (d) BODY
49. Choose the correct option from the following to fill up in the line 4.
(a) <HR> (b) <H1> (c) <BR> (d) <P>
50. Choose the correct option from the following to fill up in the line 5.
(a) </HEAD> (b) </TITLE> (c) </CAPTION> (d) </BODY>
OMR SHEET SP 2
Roll No.
Instructions
Use black or blue ball point pens and avoid Gel & Fountain pens for filling the OMR sheet.
Darken the bubbles completely. Don’t put a tick mark or a cross mark, half-filled or over-filled bubbles will not be read
by the software.
✔ ✗
Correct Incorrect Incorrect Incorrect
Do not write anything on the OMR Sheet.
Multiple markings are invalid.
1 18 35
2 19 36
3 20 37
4 21 38
5 22 39
6 23 40
7 24 41
8 25 42
9 26 43
10 27 44
11 28 45
12 29 46
13 30 47
14 31 48
15 32 49
16 33 50
17 34
Answers
1. (c) 2. (b) 3. (c) 4. (d) 5. (b) 6. (b) 7. (a) 8. (c) 9. (b) 10. (b)
11. (a) 12. (c) 13. (a) 14. (d) 15. (d) 16. (b) 17. (a) 18. (c) 19. (c) 20. (a)
21. (c) 22. (d) 23. (a) 24. (b) 25. (d) 26. (d) 27. (b) 28. (a) 29. (c) 30. (d)
31. (a) 32. (c) 33. (b) 34. (d) 35. (a) 36. (d) 37. (b) 38. (b) 39. (a) 40. (b)
41. (a) 42. (d) 43. (c) 44. (a) 45. (d) 46. (c) 47. (b) 48. (b) 49. (c) 50. (d)
SOLUTIONS
1. Information in <HEAD> tag is not displayed Because circular list starts with unordered list
directly on web page. It is used to identify the type circle.
matter (tags) used on a web page. 15. HR is an empty tag because it has no closing
2. Software license is a license agreement that tag, while P, B and OL are container elements.
gives an individual or organisation permission 16. alink attribute is used to set the color of link,
to use a software program. while it is active.
3. In refund fraud, fraudster using a stolen credit 17. vlink attribute of <BODY> tag specifies the
card makes an overpayment on purpose. color of visited links in a HTML document.
4. Business-to-Business (B2B), 18. To create an HTML page, you need text editor
Business-to-Consumer (B2C), and web browser. Because text editor is
Consumer-to-Business (C2B), required to write HTML code and web
Consumer-to-Consumer (C2C) and browser is needed to display the page.
Business-to-Government (B2G), are the main
types of e-Commerce. 19. Plagiarism occurs due to lack of knowledge. It
is an act of copying another person’s idea,
5. Web page provides six levels of headings, words or work and pretend that they are our
ranging from <H1> … </H1> to <H6> … </H6>. own.
6. alt attribute of the <IMG> tag is used to display 20. The hallmark of proprietary software license
the alternate text of an image. grants the use of one or more copies of
7. size attribute of <INPUT> tag is used to resize software.
the field such as set the length of text box. 21. In fraud via identity fraud case, the fraudsters
Syntax <INPUT size = “value”> assume another person’s identity, creates
8. <INPUT> element of type password provides a credit cards in the victim’s name and goes on a
way for the user to securely enter a password. shopping. This type of fraud is increasing
rapidly as the number and scope of data
9. Textbox provides a single line text input field, breaches increase.
where the user can enter text.
22. <OL> tag creates the ordered list, while <UL>
10. The need of netiquette arises mostly when tag creates the unordered list. <LI> tag is used
sending or distributing E-mail posting on to define the list item. Circle is a type of
usenet groups or chatting. unordered list.
11. The align attribute of <P> tag (for paragraph) 23. Shreya told her friend Princy about a term
provides various alignments like left, right, cyber ethics. Cyber ethics is the study of ethics
center and justify. But by default, its alignment pertaining to computers, encompassing user
SAMPLE PAPER 2
26. Digital divide is a term that describes the initially by Mastercard, Visa, Microsoft,
uneven distribution of ICT. Economic growth is Netscape and others.
not the factor which contribute to digital divide. 38. <INPUT> element of type “checkbox”
27. <SUP> tag defines superscript text, which provides a way for the user to choose more
appears half a character above the normal line than one items from the list.
and is sometimes rendered in a smaller font. 39. To make an item selected by default, use the
To write (A + B)2 , <SUP> is used as selected attribute in the <OPTION> tag.
(A + B) <SUP>2 </SUP> 40. <OL> tag is used to define the ordered or
numbered list in HTML document. type
28. <OL> tag is the ordered list. Each list item starts
attribute of <OL> tag defines the type of
with the <LI>tag. The list items are marked with
ordered list.
numbers. <HTML> show that, it is HTML
document and all code is written in <BODY> To create a list using the numbers, the correct
tag. code is
29. He should use confidentiality. In <OL type=“1”>
confidentiality, information should not be 41. IPR (Intellectual Property Rights) encourages
accessible to an unauthorised person. It should people to create new softwares as well as
not be intercepted during the transmission. helps them to improve the existing
30. <U> tag is used to underline the text. It is also a applications.
container element. 42. Avoid joint ownership, get exact match
31. The attributes height and width of the <IMG> domains and safeguard with strong access
tag would be used for horizontally and control are the controls of intellectual
vertically. property rights.
32. vlink attribute specifies the color of a visited 43. Copyright law can still be enforced, if others
link in a document. The default color of vlink is try to create simple material from the original
purple. source material.
33. Proprietary software is a software that legally 44. IPR (Intellectual Property Rights) reserves all
remains the property of the organisation, group the rights of the owner to the information to
or individual who created it. Microsoft decide, how much information is to be
Windows is a proprietary software. exchanged, shared or distributed. The owner
can decide the price for doing so.
34. Netiquette means respecting other user’s views
and displaying common etiquette, when 45. IPR provides the assurity of good returns
posting your views to online discussion groups. people and businesses invest in the national
economy.
35. type=“checkbox” in <INPUT> tag provides a
checkbox on the form. With checkboxes, we can 46. </TITLE> is the correct option to fill up in line
give the users a list of items to choose from. 1. It must be closed before </HEAD>.
36. To display the image in the background of 47. </H1> is the correct option to fill up in line
HTML document, BACKGROUND attribute is 2.</H1> is the closing tag of <H1>.
used which take image’s name with its format 48. FONT is the correct option to fill up in line 3.
as value. This tag is used to define the font type, face
So, the correct code is and color.
49. <BR> is the correct option to fill up in line 4.
SAMPLE PAPER 2
<BODY BACKGROUND=“Birds.jpeg”>
This tag is used to break the line.
37. SET (Secure Electronic Transaction) is a system
for ensuring the security of financial 50. </BODY> is the correct option to fill up in line
transactions on the Internet. It was supported 5. This tag is closed before </HTML>.
SAMPLE PAPER 3
COMPUTER APPLICATIONS
A Highly Simulated Practice Questions Paper
for CBSE Class X (Term I) Examination
Instructions
1. This question paper is divided into three sections.
2. Section - A contains 20 questions. Attempt any 16 questions.
3. Section - B contains 20 questions. Attempt any 16 questions.
4. Section - C contains 10 questions. Attempt any 8 questions.
5. Each question carries 0.625 mark.
6. There is no negative marking.
Maximum Marks : 25
Roll No. Time allowed : 90 min
Section A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
1. Which of the following will produce a solid circle bullet when given as value of type
with <UL>?
(a) Circle (b) Disc (c) Square (d) Rectangle
4. Which of the following is a system for ensuring the security of financial transactions
on the Internet?
(a) SSL (b) SET
(c) URL (d) FOI
6. Which of the following term is used when information should be available wherever
required within time limit?
(a) Authenticity (b) Integrity
(c) Availability (d) Confidentiality
10. Which of the following will give smallest size of the text?
(a) <H3> (b) <H6>
(c) <H2> (d) <H4>
12. This technology firm is much easier and affordable to create a privacy policy.
(a) CPA Web Trust (b) BBB Online
(c) PrivacyBot.com (d) TRUSTe
15. Why should you specify a background color, if you are using an image for the actual
background of your page?
(a) So the text shows up better
(b) The background color will be shown until the image loads
(c) In case the image does not fit right
SAMPLE PAPER 3
18. Selling of a software illegally for temporary use as on rent basis is called
(a) renting (b) softlifting
(c) downloading (d) counterfeiting
19. The crime like ………, have/has increased leaps and bounds.
(a) abduction (b) fraud
(c) Both (a) and (b) (d) None of these
Section B
This section consists of 20 questions. Answer any 16 questions.
21. Surbhi is a student of Class Xth and her elder sister is teaching to her about a term. She
told to Surbhi that to prevent this term, make sure you are on an official website when
entering password. What term is she talking about?
(a) Piracy (b) Hacking (c) Privacy (d) Plagiarism
23. John is an executive in e-Commerce company. He is writing some content about types
of e-Commerce, in which he wrote, the sale of the shoes from the shoemaker to the
retailer would be considered as ……… transaction.
(a) C2B (b) B2C (c) B2B (d) C2C
24. The tag that requires an opening as well as closing tag is called
(a) empty tag (b) container tag (c) ordered tag (d) unordered tag
SAMPLE PAPER 3
25. Which attribute is used to change the beginning value of an ordered list?
(a) type (b) begin
(c) start (d) first
28. Which of the following protects the communication link between the merchants and
customers?
(a) SET (b) SSL (c) BBB (d) B2C
29. ......... specifies the language of an element content and attribute values.
(a) dir (b) strong (c) lang (d) link
33. The term ……… refers to something that can be modified and shared as its designed is
publicly accessible.
(a) proprietary source (b) freeware source
(c) open source (d) None of these
34. “Avoid replying to negative comments with more negative comments” is include under
(a) netiquette (b) hacking (c) plagiarism (d) privacy
36. Manan has written the code to insert an image named “globe.jpg” in the background of
a web page.
<BODY image=“globe.jpg”>
But he is not getting desired output. Help him to identify the correct code.
(a) <BODY bg=“globe. jpg”> (b) <BODY back=“globe.jpg”>
(c) <BODY background=“globe.jpg”> (d) <BODY bgImage=“globe.jpg”>
37. It applies to businesses buying from and selling to each other over the Internet.
(a) B2B (b) B2C (c) C2B (d) C2C
52 CBSE Sample Paper Computer Applications Class X (Term I)
39. Which attribute of <INPUT> tag specifies the value of an <INPUT> tag?
(a) val (b) value (c) type (d) label
40. Which value of size attribute to display the list is drop down menu?
(a) 0 (b) -1 (c) 1 (d) None of these
Section C
(Case Study Based Questions)
This section consists of 10 questions. Any 8 questions are to be attempted.
Case Study-I
Suresh is a cyber expert. He told his friend that, if you are using social media then you
should follow some rules for good netiquettes. His friend does not know about the term
netiquette then Suresh told him.
Netiquette, abbreviation of Internet etiquette or network etiquette, guidelines for courteous
communication in the online environment. It includes proper manners for sending E-mail,
conversing online and so on. Much like traditional etiquette, which provides rules of
conduct in social situations, the purpose of netiquette is to help construct and maintain a
pleasant, comfortable and efficient environment for online communication as well as to
avoid placing strain on the system and generating conflict among users.
Netiquette includes rules that provide guidance for appropriate social interaction and
technical performance online.
Based on the given information, answer the questions 41 to 45.
Case Study-II
Observe the following code:
<HTML>
<HEAD>
<TITLE>Really ____ #Statement 1
</HEAD>
<BODY bgcolor=“aqua” text=“blue” link=“green” alink=“red” vlink=“red”>
<basefont _____ =“news gothic mt”> #Statement 2
<CENTER><H1>REALLY HONEST</H1></CENTER>
<____ align=“right”>BOOK REVIEWS</H1> #Statement 3
<HR color=“blue”>
I read a lot of books of many different subjects, here is a list of books that I
have read recently
<UL type=“square”>
<LI><B><U><FONT color=“green”>“The Rainbow Returns” by E.Smith </FONT></U></B>
<LI><FONT face=“arial” color=“purple”>“Seven steps to immeasurable wealth”
by R.U. Needy.</FONT>
<LI><FONT ____ =“black”>“The Food_Lover’s Guide to Weight Loss” # Statement 4
by L.Goode.</FONT>
<LI><U><FONT color=“yellow”>“A Silly Persons Guide to Seriousness” by M.
Nott.</FONT></U> </UL>
_____ #Statement 5
</HTML>
Based on the given code, answer the questions 46 to 50.
Instructions
Use black or blue ball point pens and avoid Gel & Fountain pens for filling the OMR sheet.
Darken the bubbles completely. Don’t put a tick mark or a cross mark, half-filled or over-filled bubbles will not be read
by the software.
✔ ✗
Correct Incorrect Incorrect Incorrect
Do not write anything on the OMR Sheet.
Multiple markings are invalid.
1 18 35
2 19 36
3 20 37
4 21 38
5 22 39
6 23 40
7 24 41
8 25 42
9 26 43
10 27 44
11 28 45
12 29 46
13 30 47
14 31 48
15 32 49
16 33 50
17 34
Answers
1. (b) 2. (a) 3. (d) 4. (b) 5. (d) 6. (c) 7. (a) 8. (a) 9. (a) 10. (b)
11. (c) 12. (c) 13. (d) 14. (d) 15. (c) 16. (b) 17. (c) 18. (a) 19. (c) 20. (d)
21. (b) 22. (a) 23. (c) 24. (b) 25. (c) 26. (a) 27. (b) 28. (b) 29. (c) 30. (b)
31. (b) 32. (d) 33. (c) 34. (a) 35. (b) 36. (c) 37. (a) 38. (b) 39. (b) 40. (c)
41. (b) 42. (c) 43. (b) 44. (b) 45. (c) 46. (b) 47. (c) 48. (b) 49. (a) 50. (c)
SOLUTIONS
1. A solid circle bullet use the type disc. 16. The open source movement is branched from
This is used in <UL> tag. the free software movement which began in
the late 80’s with the launching of the GNU
2. The tags used for specifying the style in HTML project by Richard Stallman.
are <B> and <I> because these two tags are text
formatting/styling tags. 17. From the given options, Notepad is useful
program to write HTML code.
3. Detailed list is not a type of HTML list.
18. Selling of software illegally for temporary use
4. SET (Secure Electronic Transaction) is a system as on rent basis is called renting.
for ensuring the security of financial
transactions on the Internet. 19. The crime like abduction, fraud, etc., have
increased leaps and bounds.
5. Examples of HTML editor are Notepad,
Microsoft frontpage, Dreamweaver etc. 20. HTML provides predefined and fixed tags
defined by the language.
6. Availability is used when information should
be available wherever and whenever required 21. Hacking is an attempt to exploit a computer
within time limit, specified. system or a private network inside a
computer. To prevent hacking make sure you
7. The correct syntax for start a list with number 3 are on an official website when entering
is <OL start = “3”>, where OL is ordered list. password.
8. The <INPUT> tag specifies an input field where 22. Ordered list starts with <OL> tag. start
the user can enter data. attribute is used to change the beginning value
9. Merchant fraud is a type of fraud method that of an ordered list.
also exists in wholesale. The numbering of an HTML list can be
10. From the given options, <H6> tag displays the changed to letters or roman numerals by the
smallest size of heading text. type attribute.
While <H1> tag displays the largest size of 23. B2B (Business-to-Business) applies to
heading text. businesses buying from and selling to each
11. <IMG src = “image.gif ”> other over the Internet. The sale of the shoes
from the shoemaker to the retailer would be
where, <IMG> is a tag and src is an attribute
considered a B2B transaction.
which specifies the source of an image.
24. The tag that requires an opening as well as
12. PrivacyBot.com is a technology firm that much
closing tag is called container tag. These types
easier and affordable to create a privacy policy. of tags always wrap around the text or
SAMPLE PAPER 3
<IMG src=“color.jpg” alt = “Hello colors”> 44. Avoid replying to negative comments with
more negative comments.
32. A list box is a graphical control element that
allows the user to select one or more items 45. Do not trust other when you are new on social
from a list contained. <OPTION> tag is media.
required to create list box in HTML. 46. </TITLE> is the correct option to fill up the
33. The term open source refers to something that blank in Statement 1. It is a closing tag of
can be modified and shared as its designed is <TITLE> and must be closed before </HEAD>.
publicly accessible. 47. face is used in Statement 2 to fill up the blank.
34. Netiquette means respecting other user’s views It is an attribute of FONT and define the font
and displaying common etiquette when type.
posting your views to online discussion 48. H1 is the largest heading tag. It will be used in
groups. It includes avoid replying to negative Statement 3 to fill up the blank because its
comments with more negative comments. closing tag is already given at end of line.
35. Password provides a single line text input field 49. color is an attribute of FONT tag which will
where the user can enter password. define the color of text.
36. background attribute specifies a background 50. </BODY> is used to fill up in Statement 5. It is
image for a document. the closing tag of <BODY>, which already
Syntax <BODY background=“URL”> given and it must be closed before </HTML>.
SAMPLE PAPER 3
SAMPLE PAPER 4
COMPUTER APPLICATIONS
A Highly Simulated Practice Questions Paper
for CBSE Class X (Term I) Examination
Instructions
1. This question paper is divided into three sections.
2. Section - A contains 20 questions. Attempt any 16 questions.
3. Section - B contains 20 questions. Attempt any 16 questions.
4. Section - C contains 10 questions. Attempt any 8 questions.
5. Each question carries 0.625 mark.
6. There is no negative marking.
Maximum Marks : 25
Roll No. Time allowed : 90 min
Section A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
4. A feature of ……… licenses means that certain rights regarding the software are
reserved by the software publisher.
(a) proprietary software (b) open source
(c) freeware (d) shareware
7. What will happen, if the background image is smaller than the browser’s window?
(a) It will leave a blank space at the bottom of your page
(b) It will be repeated
(c) It will be stretched
(d) It will not be displayed
8. Which of the following appears with malicious intention and breaks into the owner’s
system?
(a) Craker (b) Hacker (c) Copyrighter (d) Plagiarius
9. Which one of the following list type that will create a bulleted list?
(a) Unordered (b) Ordered (c) Definition (d) All of these
12. Choose the correct HTML tag for the second largest heading.
(a) <H2> (b) <H4>
(c) <H6> (d) <H1>
13. Which of the following is the most successful online auction website?
(a) e-Bay (b) Amazon
(c) Flipkart (d) Myntra
14. Which describes as “Data should recorded in such a way that it can be audited for
integrity requirements”?
(a) Encryption (b) Audited
(c) Integrity (d) Auditability
16. In which type of fraud, the transaction was placed by a true customer and the
chargeback is initiated for something innocent?
SAMPLE PAPER 4
17. ……… is a privacy seal program for websites created by Invisible Hand Software.
(a) TRUSTe (b) BBB Online
(c) PrivacyBot (d) CPA WebTrust
Section B
This section consists of 20 questions. Answer any 16 questions.
23. If a third party were to assume ownership, copy or sell someone’s previously
copywritten work, that would legally be considered. What right was infringed?
(a) Patent (b) Trademark
(c) Copyright (d) Plagiarism
25. <! ---- .... ---- > tag is used in HTML for
(a) comment line (b) break line
(c) horizontal line (d) underline
27. Identify which of the following type of style tag will create an italic text.
(a) <IT> (b) <IA>
(c) <I> (d) <ITALIC>
29. Riya wants to learn some software skills for which she needs some softwares. But she
does not want to pay for this. Which type of software she should use?
(a) Open source software (b) Microsoft’s software
(c) Antivirus software (d) Proprietary software
30. This attribute specifies that a drop down list should not be enabled.
(a) notEnabled (b) disable
(c) disabled (d) None of these
33. Which of the following is not the factor, which contribute to digital divide?
(a) Relevant content (b) Age
(c) Economic growth (d) Gender
34. Which of the following applies to businesses buying from and selling to each other
over the Internet?
(a) B2C (b) B2B
(c) C2C (d) B2G
36. If you put a <P> tag before <IMG> tag, a blank line will appear
(a) before the image (b) after the image
SAMPLE PAPER 4
Section C
(Case Study Based Questions)
This section consists of 10 questions. Any 8 questions are to be attempted.
Case Study-I
Naman wants to write his book on HTML, so he discussed this idea to his elder brother
Raman. Raman told him that during the writing of book please avoid plagiarism because it
is illegal.
Plagiarism is presenting someone else’s work or ideas as your own, with or without their
consent, by incorporating it into your work without full acknowledgement. All published
and unpublished material, whether in manuscript, printed or electronic form, is covered
under this definition. Plagiarism may be intentional or reckless or unintentional. Under the
regulations for examinations, intentional or reckless plagiarism is a disciplinary offence.
Based on the given information, answer the questions 41 to 45.
43. Which of the following is an act of copying another person’s idea, words or work and
pretend that they are our own?
(a) Phishing (b) Plagiarism
SAMPLE PAPER 4
Case Study-II
Consider the following HTML code given below:
<HTML>
<HEAD>
<TITLE>
My first web page
______ # Statement 1
</HEAD>
<BODY ______ = “red”> # Statement 2
<H1> Look at the image </H1> <BR>
<IMG ___=“D:\images.jpg” alt = “Rose Flower”> # Statement 3
</BODY>
</HTML>
Based on the given code, answer the questions 46 to 50.
47. What will be the alternate text if the image not displayed?
(a) My first web page (b) Look at the image
(c) Rose Flower (d) Image
Instructions
Use black or blue ball point pens and avoid Gel & Fountain pens for filling the OMR sheet.
Darken the bubbles completely. Don’t put a tick mark or a cross mark, half-filled or over-filled bubbles will not be read
by the software.
✔ ✗
Correct Incorrect Incorrect Incorrect
Do not write anything on the OMR Sheet.
Multiple markings are invalid.
1 18 35
2 19 36
3 20 37
4 21 38
5 22 39
6 23 40
7 24 41
8 25 42
9 26 43
10 27 44
11 28 45
12 29 46
13 30 47
14 31 48
15 32 49
16 33 50
17 34
Answers
1. (d) 2. (a) 3. (d) 4. (a) 5. (d) 6. (b) 7. (b) 8. (b) 9. (a) 10. (c)
11. (a) 12. (a) 13. (a) 14. (d) 15. (b) 16. (b) 17. (c) 18. (a) 19. (b) 20. (c)
21. (b) 22. (b) 23. (c) 24. (c) 25. (a) 26. (d) 27. (c) 28. (c) 29. (a) 30. (c)
31. (b) 32. (b) 33. (c) 34. (b) 35. (a) 36. (c) 37. (d) 38. (c) 39. (c) 40. (a)
41. (d) 42. (a) 43. (b) 44. (a) 45. (b) 46. (a) 47. (c) 48. (b) 49. (d) 50. (a)
SOLUTIONS
1. It is important to specify width and height 16. In case of friendly fraud, the transaction was
attributes in <IMG> tag to help the browser to placed by a true customer and the chargeback
load the web page faster. is initiated for something innocent like
2. HTML form on a web page allows a user to believing their package to be stolen or not
enter data. i.e. sent to a server for processing. recognising the merchant’s name on their
credit card statement.
3. Plagiarism is an act of copying another
person’s idea, words or work and pretend that 17. PrivacyBot is a privacy seal program for
they are our own. Not having enough websites created by InvisibleHand Software.
knowledge is a reason behind plagiarism. 18. <B> is a bold tag. It is a container element. This
4. A feature of proprietary software licenses tag is used for text formatting.
means that certain rights regarding the 19. <IMG> tag is an empty element, which means
software are reserved by the software it has no closing tag.
publisher. 20. name attribute of <INPUT> tag is required for
5. Web browser displays images in XBM, JPEG, the identification of form.
GIF, etc., format. Syntax <INPUT name=“field name”>
6. size is not an attribute of <BODY> tag. 21. B2B (Business-to-Business) describes
7. When the background image is smaller than transaction between businesses, such as a
the browser’s window, then it will be shown in business between a manufacturer and a
boxes in repeated pattern. wholesaler or between a wholesaler and a
8. A hacker appears with malicious intention and retailer.
breaks into the owner’s system and steals the 22. Ordered list starts with the <OL> tag. The
information illegally. numbering of an HTML list can be changed to
9. Unordered list provides various types of letters or roman numerals by the type
bullets like square, disc and circle. attribute.
10. Open source software refers to something that 23. Copyright is an exclusive right of the
can be modified and shared as its designed is developer or author, to protect their works
publicly accessible. Source code must be which is granted by law.
included to be considered as open source 24. size attribute specifies the size of the text. The
software. range of accepted values goes from 1 (smallest)
11. H1…H6 are headings tag in HTML. to 7 (largest).
SAMPLE PAPER 4
12. <H2> tag provides the second largest heading 25. In HTML code, the comment line is declared as
in HTML. <! --- … --->. Comments are not displayed in
the browser’s window.
13. e-Bay is the most successful C2C
(Consumer-to-Consumer) online auction 26. SSL (Secure Sockets Layer) is a security
website. protocol protects communications between any
SSL enabled client and server software running
14. Auditability describes as, “Data should on a network.
recorded in such a way that it can be audited
for integrity requirements”. “SSL cannot provide assurance of
non-repudiation without a third party server”
15. Because regular numbering is the natural is not an advantage of SSL.
numbers starting from 1, 2, 3, ..., etc.
CBSE Sample Paper Computer Applications Class X (Term I) 65
27. <I> is a style tag that is used to make the text in 39. <BR> tag is used to break line, so it will display
italic form. It is also used for text formatting. the text in next line.
28. <IMG> is an empty element, so its closing tag Output Hello
is an optional. So, both options (a) and (b) are world
correct.
40. align attribute specifies the alignment of the
29. She should use open source software whose text within a paragraph. right align will shift
source code is available for modification or the text to the right.
enhancement of anyone.
41. There are various reason behind plagiarism as
30. disabled attribute of <SELECT> tag specifies being lazy, fear of failure, competition, not
that a drop down list should be disabled. having enough knowledge, lack of
Syntax <SELECT disabled> enforcement, lack of management, lack of
management skills, etc.
31. <SUB> tag is used to display the sub-scripted
text. Sub-scripted text appears slightly below 42. The word plagiarism has emerged from a latin
the base line. word plagiarius which means kidnapping.
32. <P> tag is used to create paragraph in HTML. 43. Plagiarism is an act of copying another
It inserts a line break with extra space in the person’s idea, words or work and pretend that
beginning. they are our own.
33. Digital divide is a term that describes the 44. The intentions behind plagiarism could be
uneven distribution of ICT. There are various malicious or it could be done accidently like
factors which contribute to digital divide are copying data from other’s computer without
relevant content, age, lack of ICT skills and his permission.
support, gender and attitudinal factors. 45. The word plagiarism has emerged from the
34. B2B (Business-to-Business) applies to latin word plagiarius.
businesses buying from and selling to each 46. <TITLE> tag defines the title of the document.
other over the Internet. So, text within <TITLE> and </TITLE> will be
35. By default, first item in the drop down list is displayed in the title bar, i.e. My first web
selected. List box is a graphical control element page.
that allows the user to select one or more items 47. Rose Flower will be the alternate text, if the
from a list contained. image linked in this web page will not open.
36. If you put a <P> tag before <IMG> tag, a blank For this, alt attribute is used.
line will appear before and after the image. 48. </ TITLE> is used to fill up the blank in
e.g. <P> <IMG src = “image 1. jpg”> </P> Statement 1. It is a closing tag of <TITLE> and
must be closed before </HEAD>.
37. Intellectual property includes create invention,
literary and artistic work, design, symbols, 49. bgcolor is the correct option to fill up the blank
names and image used in commerce. in Statement 2. It is used to set the background
color of HTML document.
38. Tag to create superscript text in HTML
document is <SUP>. It displays the text slightly 50. src attribute is used to give source of an image.
above the base line. So, src is the correct option to fill up the blank
in Statement 3.
SAMPLE PAPER 4
SAMPLE PAPER 5
COMPUTER APPLICATIONS
A Highly Simulated Practice Questions Paper
for CBSE Class X (Term I) Examination
Instructions
1. This question paper is divided into three sections.
2. Section - A contains 20 questions. Attempt any 16 questions.
3. Section - B contains 20 questions. Attempt any 16 questions.
4. Section - C contains 10 questions. Attempt any 8 questions.
5. Each question carries 0.625 mark.
6. There is no negative marking.
Maximum Marks : 25
Roll No. Time allowed : 90 min
Section A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
5. Which of the following shows purchasing only one licensed copy of a software and
distributing and loading it onto multiple systems?
(a) Renting (b) Softlifting
(c) Patent (d) Loading
6. The demand for C2B e-Business will ………. over the next few years.
(a) increase (b) decrease
(c) constant (d) depend on situation
CBSE Sample Paper Computer Applications Class X (Term I) 67
7. ………… is simply the violation of intellectual property rights and right to privacy.
(a) Hacking (b) Privacy (c) Plagiarism (d) Piracy
10. Which of the following is an exclusive right of the developer or author to protect their
work?
(a) Copyright (b) Patent (c) Trademark (d) Renting
17. Which of the following option allows the user to select one or more items from a list?
(a) Combo box (b) List box
(c) Option element (d) None of these
18. Which of the following applies to any consumer that sells a product or service to a
business over the Internet?
(a) C2C (b) C2B
SAMPLE PAPER 5
19. With the ………, common people can ask questions regarding the work status of their
complaints to government.
(a) RTI Act (b) Info Act
(c) Human Act (d) Citizen Act
Section B
This section consists of 20 questions. Answer any 16 questions.
21. Ritu and Raman are students of Class 10th. They are learning about digital divide. Ritu
asked that what factor(s) that contribute to the digital divide but Raman is not able to
give answer to her question. Help them to find the factor(s).
(a) Age (b) Gender
(c) Relevant content (d) All of these
23. Which of the following examines the impact that cyber technology has for social, legal
and moral systems?
(a) Plagiarism (b) Cyber ethics
(c) IPR (d) Netiquette
24. Abhinav has written a code to align the image in center in the browser’s window.
<IMG src = “image.jpg” align = “center”>
But he did not get desired result. Help him in identifying the correct code.
(a) <IMG src = “image.jpg” align = CENTER>
(b) <CENTER> <IMG src = “image.jpg”>
SAMPLE PAPER 5
26. It refers to the use of digital technology to cause harm to other people.
(a) Cyber bullying (b) Cyber crime
(c) Cyber security (d) Cyber hacking
CBSE Sample Paper Computer Applications Class X (Term I) 69
27. Identify the correct code to set the font used for heading is “Arial”, size is 6 and color is
black.
(a) <FONT type = “arial” color = “black” size = “6”>
(b) <FONT face = “arial” color = “black” size = “6”>
(c) <FONT family = “arial” color = “black” size = “6”>
(d) <FONT face = arial, color = black, size = 6>
28. Which of the following is the correct syntax for <OPTION> tag?
(a) <OPTION value = “value”> Text
(b) <OPTION value = value> Text </OPTION>
(c) <OPTION value = “value”> Text </OPTION>
(d) <OPTION> Text </OPTION>
33. To ensure merchant privacy, …… prevents the payment gateway from seeing the order
information.
(a) SSL (b) SET
(c) BBB (d) FOI
35. See the below text and identify the tag is used for formatting in first line
Welcome
SAMPLE PAPER 5
to
Arihant
37. The need of …… arises mostly when sending or distributing E-mail posting on usenet
groups or chatting.
(a) plagiarism (b) bullying
(c) netiquette (d) stalking
39. Which of the following tag is used to define checkbox in HTML form?
(a) <SELECT> (b) <INPUT>
(c) <OPTION> (d) <CHECKBOX>
40. To change the font size of a single line on a web page, code is
(a) <FONT size = + 1> </FONT> (b) <FONT size = 0> </FONT>
(c) <FONT size = +1> (d) <FONT size = 0 >
Section C
(Case Study Based Questions)
This section consists of 10 questions. Any 8 questions are to be attempted.
Case Study - I
Consider the following code:
<HTML>
<HEAD>
<TITLE>Experiment______</HEAD> # Statement 1
<BODY>
<BASEFONT face=“Times New Roman” ____=“4”> # Statement 2
<H2>Reaction of Magnesium with Hydrochloric Acid</H2>
<IMG _____= “reaction.jpg” alt= # Statement 3
“magnesium with hydrochloric acid” width=“500” height=“200”>
<BR><BR>
____The equation for the reaction is:</B><BR> # Statement 4
Magnesium + Hydrochloric Acid = Magnesium Chloride + Hydrogen <BR>
Mg(s) + 2HCl(aq) = MgCl<SUB>2</SUB>(ag) + H<SUB>2 _____(g) # Statement 5
</BODY>
</HTML>
SAMPLE PAPER 5
Case Study-II
The digital divide refers to the gap between demographics and regions that have access
to modern information and communications technology and those that do not have
access. Though the term now encompasses the technical and financial ability to utilise
available technology-along with access (or lack of access) to the internet –– the gap it
refers to is constantly shifting with the development of technology.
Digital inequality is evident between communities living in urban areas and those
living in rural settlements; between socioeconomic groups; between less economically
developed countries and more economically developed countries; between the
educated and uneducated population.
Individuals with access to a broadband connection can be digitally split. There are
numerous types of the digital divide that influence our efforts in accessing the Internet.
Based on the given information, answer the questions 46 to 50.
46. Which of the following is the gap that exists between individuals who have access to
modern information and communication technology?
(a) Digital divide (b) Piracy
(c) Stalking (d) Phishing
49. “Many people thought that new technology are harmful for young generation”, this
term refers to which factor of digital divide?
SAMPLE PAPER 5
50. ……… appears in differences between developed, developing and emerging nations.
(a) Cyber bullying (b) Cyber ethics
(c) Digital divide (d) Cyber stalking
OMR SHEET SP 5
Roll No.
Instructions
Use black or blue ball point pens and avoid Gel & Fountain pens for filling the OMR sheet.
Darken the bubbles completely. Don’t put a tick mark or a cross mark, half-filled or over-filled bubbles will not be read
by the software.
✔ ✗
Correct Incorrect Incorrect Incorrect
Do not write anything on the OMR Sheet.
Multiple markings are invalid.
1 18 35
2 19 36
3 20 37
4 21 38
5 22 39
6 23 40
7 24 41
8 25 42
9 26 43
10 27 44
11 28 45
12 29 46
13 30 47
14 31 48
15 32 49
16 33 50
17 34
Answers
1. (d) 2. (b) 3. (b) 4. (b) 5. (b) 6. (a) 7. (d) 8. (a) 9. (c) 10. (a)
11. (b) 12. (b) 13. (b) 14. (c) 15. (a) 16. (a) 17. (b) 18. (b) 19. (a) 20. (c)
21. (d) 22. (a) 23. (b) 24. (c) 25. (d) 26. (a) 27. (b) 28. (c) 29. (b) 30. (a)
31. (d) 32. (b) 33. (b) 34. (d) 35. (c) 36. (d) 37. (c) 38. (a) 39. (b) 40. (a)
41. (c) 42. (a) 43. (c) 44. (b) 45. (a) 46. (a) 47. (d) 48. (a) 49. (c) 50. (c)
SOLUTIONS
1. HTML tags are enclosed within angular 16. Bulleted list provides various values like disc,
brackets (< and >). circle and square.
2. center is not a valid value in the align attribute 17. A list box is a graphical control element that
of <IMG> tag. To align in center, <CENTER> allows the user to select one or more items
tag can be used. from a list.
3. Use <SELECT> container tag to create 18. C2B (Consumer-to-Business) applies to any
drop-down menus. consumer that sells a product or service to a
4. <TITLE> tag is placed in the <HEAD> tag. business over the Internet.
5. Purchasing only one licensed copy of a 19. With the RTI (Right to Information) Act,
software and distributing and loading it onto common people can ask questions regarding
multiple systems is called softlifting. the work status of their complaints to
government. They have the right to know the
6. The demand for C2B e-Business will increase information which is related to them.
over the next few years due to customer’s
desire for greater convenience and lower 20. <TEXTAREA> is an opening tag and
price. </TEXTAREA> is its closing tag.
7. Software piracy means copying of data or 21. There are several factors that contribute to the
computer software without the owner’s digital divide as relevant content, age, gender,
permission. This is simply the violation of lack of ICT skills, support and attitudinal
intellectual property rights and right to factors.
privacy. 22. This list elements have a unique array of tags
8. The text specified in alt attribute is displayed or elements; the resulting lists are similar to
as tooltip in Internet Explorer only. those you would see in its dictionary.
9. An image which is inserted in web page by 23. Cyber ethics examines the impact that cyber
default placed inline with text. technology has for social, legal and moral
systems. It also evaluates the social policies
10. Copyright is an exclusive right of the
and laws that have been framed in reply to
developer or author to protect their work
issues generated by the development.
which is granted by law.
24. The reason for not getting the desired result is
11. src attribute is used to specify the location of
that CENTER is not a value of align attribute in
an image file.
<IMG> tag.
12. M in HTML stands for Markup. So, correct code is
SAMPLE PAPER 5
13. SSL (Secure Sockets Layer) is already built into <CENTER><IMG src=“image.jpg”></CENTER>
commonly used web browsers and there is no
25. <INPUT> tag defines an object on the form
need to install any additional software.
which can receive user input. It has some
14. The open source movement is branched from attributes as type, name, value, size, height
the free software movement which began in and width.
the late 80's with the launching of GNU project
26. Cyber bullying refers to the use of digital
by Richard Stallman.
technology to cause harm to other people. This
15. Each item must be enclosed in <LI> tag either typically involves the use of the Internet, but
in ordered list or unordered list. may also take place through mobile phones.
74 CBSE Sample Paper Computer Applications Class X (Term I)
27. face is an attribute of <FONT> tag that specifies 39. <INPUT> tag is used to define checkbox in
the font family for font. The values of HTML form. With checkboxes, we can give the
attributes are always given in double quotes. users a list of items to choose from.
28. <OPTION> tag is used to represent each choice 40. The font size of a single line can be changed by
of the select. It has some attributes as label, using the following HTML code.
selected and value. <FONT size = +1> This is HTML text </FONT>
29. Plagiarism is an act of copying another 41. </TITLE> is used to fill up the blank in
person’s idea, words or work and pretend that Statement 1. It must be closed before
they are our own. </HEAD>.
30. bgcolor is an attribute of <BODY> tag, which 42. size is used to fill up the blank in Statement 2.
defines the background color. Its value is always in numbers.
31. HTML can be used to insert image in formats 43. src is used to fill up the blank in Statement 3. It
as GIF (Graphics Interchange Format), XBM takes URL of the image file that you want to
(X Bitmap), JPG (Joint Photographic Experts insert in the web page.
Group) and PNG (Portable Network Graphics).
44. <B> is used to fill up the blank in Statement 4.
32. <IMG> tag is required to set an image in It specifies the text into bold.
HTML document. It is an empty tag that
45. </SUB> is used to fill up the blank in
means it is not required to use its closing tag.
Statement 5. It must be used because its
33. To ensure merchant privacy, SET (Secure opening tag is here.
Electronic Transaction) prevents the
46. The digital divide is the gap that exists
payment gateway from seeing the order
between individuals who have access to
information.
modern information and communication
34. Friendly fraud is nearly identical to chargeback technology and those who lack access.
fraud, except that it is done without malicious
47. There are various barriers to the digital divide
intent.
as high cost, language barrier, technology
35. <B> is a bold tag that is used to set the barrier, Internet connectivity barrier, etc.
formatting as bold text.
48. Digital divide is a term that describes the
36. <LI> element is used to indicate a list item as uneven distribution of ICT (Information and
contained in an ordered list or an unordered Communication Technology).
list.
49. Attitudinal factor derived from cultural and
37. The word netiquette is a combination of net behavioural attitudes towards technology.
and etiquette. The need of netiquette arises Many people thought that new technologies
mostly when sending or distributing E-mail are harmful for young generation.
posting on usenet groups or chatting.
50. Digital divide appears in differences between
38. <P> is a paragraph tag used to create a developed, developing and emerging nations
paragraph in HTML document. in terms of the availability of Internet.
SAMPLE PAPER 5
SAMPLE PAPER 6
COMPUTER APPLICATIONS
A Highly Simulated Practice Questions Paper
for CBSE Class X (Term I) Examination
Instructions
1. This question paper is divided into three sections.
2. Section - A contains 20 questions. Attempt any 16 questions.
3. Section - B contains 20 questions. Attempt any 16 questions.
4. Section - C contains 10 questions. Attempt any 8 questions.
5. Each question carries 0.625 mark.
6. There is no negative marking.
Maximum Marks : 25
Roll No. Time allowed : 90 min
Section A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
6. Apart from <B> tag, what other tag makes text bold?
(a) <FAT> (b) <STRONG>
(c) <BLACK> (d) <EMP>
10. Gif and jpg are the two main types of what?
(a) Animated effects (b) Videos
(c) Images (d) None of these
11. Which tag can set the background color for web page?
(a) <BODY> (b) <FONT>
(c) <HEAD> (d) <TITLE>
13. Tags and text that do not show directly on the page are placed in ……… tag.
(a) <HEAD> (b) <BODY>
(c) <TITLE> (d) None of these
14. The user must agree to the …… terms and agreements, when they use an open source
software.
(a) system (b) license
(c) community (d) programmer
15. Which of the following term means stealing of required information by seeking and
exploting weakness in a computer?
(a) Plagiarius (b) Hacking
(c) Cracking (d) License
SAMPLE PAPER 6
16. Installing an illegal copy of software on the hard disk of a personal computer is called
(a) Softlifting (b) Renting
(c) Hard disk loading (d) Software counterfeiting
17. Which of the following provides the assurity of good returns, people and businesses
invest in the national economy?
(a) FOI (b) IPR
(c) Privacy (d) Ethical issues
CBSE Sample Paper Computer Applications Class X (Term I) 77
Section B
This section consists of 20 questions. Answer any 16 questions.
21. Anjali is a student who is writing documentation. Her faculty suggest her that instead
of copying the language of the book as it is, try to put it in your own language. Anjali
can avoid ……, if she follows this instruction.
(a) hacking (b) stalking
(c) plagiarism (d) piracy
22. Correct code to set the font is in verdana, font size is 4 and color is brown.
(a) <FONT face = “verdana” color = “brown” size = “4”>
(b) <FONT family = “verdana” color = “brown” size = “4”>
(c) <FONT style = “verdana” color = “brown” size = “4”>
(d) <FONT text = “verdana” color = “brown” size = “4”>
25. Observe the code and find which line has an error.
<UL style = circle>
<LI> Mathematics
<LI> Science
SAMPLE PAPER 6
<LI> Accountancy
</UL>
(a) <UL style = circle> (b) <LI> Mathematics
(c) <LI> Science (d) <LI> Accountancy
26. Anuj is a student of Class 12th. His brother told Anuj about a point that ‘An
environment is provided for the innovative thoughts and technologies’.
Identify that term.
(a) Phishing (b) Plagiarism
(c) Ethical issues (d) Intellectual property rights
78 CBSE Sample Paper Computer Applications Class X (Term I)
27. Which attribute of <HR> tag is drawn with a solid line without shading?
(a) noshade (b) align
(c) margin (d) color
28. Correct code to set the background color of the page is aqua and the text color is blue.
(a) <BODY bgcolor = “aqua” color = “blue”>
(b) <BODY bgcolor = “aqua” text = “blue”>
(c) <BODY background = “aqua” color = “blue”>
(d) <BODY background = “aqua” text= “blue”>
29. Which of the following requires that no one can discriminate against a group is not
sharing the edited code from already edited?
(a) Open source (b) Proprietary source
(c) Commercial source (d) End source
30. Ansh has written the following code as part of an HTML program:
<INPUT type = “radio” name = “subject” value = “computer” > Computer
Predict the output of the above code snippet.
(a) Computer (b) Computer
(c) Computer (d) Computer
31. Which tag is used to create drop down menus and scrolled lists?
(a) <OPTION> (b) <TEXTAREA>
(c) <SELECT> (d) <INPUT>
33. Which of the following shows that information should not be altered during its
transmission over the network?
(a) Availability (b) Integrity (c) Authenticity (d) Encryption
34. Which of the following prevents merchants from seeing the customer payment
information?
(a) SSL (b) SET (c) FOI (d) SDT
37. The open source movement was started to spread the concept of
(a) open source software (b) commercial software
(c) proprietary software (d) freeware software
CBSE Sample Paper Computer Applications Class X (Term I) 79
Section C
(Case Study Based Questions)
This section consists of 10 questions. Any 8 questions are to be attempted.
Case Study-I
A software license is a legally binding agreement made between the owner or
developer of a software program and the user, outlining how they can use and
distribute the product. The license is a text document designed to protect the
intellectual property of the software developer and to limit any claims against them
that may arise from its use. The EULA is a contract that establishes the rights of the
purchaser for installing and using the software.
Every EULA contains a clause that stipulates when its conditions are activated by an
end user. Failure to follow the terms and conditions of an open-source license can lead
to revealing trade secrets or even legal action from the project’s developers.
Based on the given information, answer the questions 41 to 45.
41. Which of the following provides end users with the right to one or more copies of the
software?
(a) Piracy (b) Software license
(c) Copyright law (d) Trademark
Case Study - II
Consider the following code
<HTML>
<HEAD>
<TITLE> My school </TITLE>
</HEAD>
<BODY ____ = “black”> # line 1
<CENTER>
<FONT face = “verdana” color = “maroon” size = “5”>
<B> ABC School _____ # line 2
</FONT>
</CENTER>
<_____ size = “4” width = “75%” noshade> <BR> # line 3
<IMG src = “School.jpg” height = “150” width = “400” ____ = “right”>
# line 4
<FONT size = “4”>
<P align = “justify”> <B>
ABC is a Hightech School for the next generation kids, situated on the feet
of Shivalik in the city of Chandigarh which offers quality education on its
best. The school has a vast campus of 200 acres with state of the art
building and other facilities to provide excellent shape to the future of
your kids. The School is affiliated to CBSE board that offers education from
Pre-nursery to class XIIth </B> </P>.
______ # line 5
<LI> About Us </LI>
<LI> Meet the Stuff </LI>
<LI> Principal Notes </LI>
<LI> Facilities </LI>
</OL>
</BODY>
</HTML>
Based on the given code, answer the questions 46 to 50.
46. Choose the correct option to fill up in line 1.
(a) color (b) font
(c) text (d) background
(c) \B (d) /B
Instructions
Use black or blue ball point pens and avoid Gel & Fountain pens for filling the OMR sheet.
Darken the bubbles completely. Don’t put a tick mark or a cross mark, half-filled or over-filled bubbles will not be read
by the software.
✔ ✗
Correct Incorrect Incorrect Incorrect
Do not write anything on the OMR Sheet.
Multiple markings are invalid.
1 18 35
2 19 36
3 20 37
4 21 38
5 22 39
6 23 40
7 24 41
8 25 42
9 26 43
10 27 44
11 28 45
12 29 46
13 30 47
14 31 48
15 32 49
16 33 50
17 34
Answers
1. (c) 2. (d) 3. (a) 4. (a) 5. (d) 6. (b) 7. (b) 8. (a) 9. (a) 10. (c)
11. (a) 12. (b) 13. (a) 14. (b) 15. (b) 16. (c) 17. (b) 18. (c) 19. (a) 20. (b)
21. (c) 22. (a) 23. (d) 24. (b) 25. (a) 26. (d) 27. (a) 28. (b) 29. (a) 30. (a)
31. (c) 32. (d) 33. (b) 34. (b) 35. (d) 36. (c) 37. (a) 38. (b) 39. (d) 40. (a)
41. (b) 42. (c) 43. (c) 44. (a) 45. (c) 46. (c) 47. (b) 48. (d) 49. (b) 50. (c)
SOLUTIONS
1. The forward-slash(/) character is used to 14. The user must agree to the license terms and
indicate the closing of a tag in HTML. agreement in order to access an open source
2. <IMG> tag and the src attribute are used to software. There is a limitation of open source
display an image on the HTML document. software that the user cannot modify the terms
and conditions of any software.
3. face attribute of FONT tag is used to set the
type of font. 15. Hacking means stealing of required
information by seeking and exploting
4. Elements in HTML describes the way of weakness in a computer.
presenting the content in the browser is correct
statement. 16. Installing an illegal copy of software on the
hard disk of a personal computer is called hard
5. All three options are true with reference to the disk loading.
GET method in HTML.
17. IPR (Intellectual Property Rights) provides the
6. <STRONG> tag is used to mark content having assurity of good returns, people and
strong importance on a webpage. It works just businesses invest in the national economy.
like the HTML bold tag style-wise, but it adds
additional meaning to the text inside this tag 18. B2C (Business-to-Consumer) describes the
which is considered as important by browser. activities of business serving and consumers
with products and services. Common B2C
7. Microsoft Office is not an open source software e-Business models include e-Ships and E-mails.
since its source code is not shared publicly.
Others like LibreOffice, MySQL are open 19. Copyright is an exclusive right of the
source softwares through which is distributed developer or author to protect their work
along with its source code. which is granted by law.
8. Copyrights protect the intellectual property 20. disc bullet list is the part of unordered list. To
created by artists. Copyright is an exclusive create a disc bullet list, we use
right of the developer or author, to protect <UL type = “disc”>
their works which is granted by law. 21. Plagiarism is an act of copying another
9. Image link can show a text label, if you add person’s idea, words or work and pretend they
property alt. alt provides an alternate text to an are our own.
image in case of someone using a text only 22. FONT tag specifies the font face, font size and
browser or using a graphical browser with font color of the text. This tag is generally used
images turned OFF. for changing the appearance of a short
10. HTML can be used to insert images in formats segment of text.
as GIF, JPG, XBM and PNG. 23. Netiquette means respecting other users views
SAMPLE PAPER 6
11. <BODY> tag can set the background color for and displaying common etiquette when
web pge. posting your views to online discussion
groups.
Syntax Users should follow some rules as
<BODY bgcolor = “colorname”> ● Do not use offensive language.
12. It must to add alternative text to images so ● Do not troll people in web forums.
users can get an idea of what the image is ● Do not trust others when you are new.
before.
24. <SUB> tag is used to write the O2 in HTML.
13. Tags and text that do not show directly on the The text which is lowered slightly below the
page are placed in <HEAD> tag.
CBSE Sample Paper Computer Applications Class X (Term I) 83
baseline to appear below the surrounding text is 36. <U> tag is used to underline the text. To get
known as subscript. the desired output, correct code is
<SUB> is used to display subscript text. Learn the <U> computers </U>
25. There should be type instead of style. So, correct 37. Open source software movement is a
line is movement that supports the use of open
<UL type = “circle”> source licenses for some software. The open
26. Intellectual property rights (IPR) reserves all the source movement was started to spread the
rights of the owner to the information to decide, concept of open source software.
how much information is to be exchanged, 38. <! ---- ……… ----> is used to insert comments
shared or distributed. It has feature as an in the source code of the web page.
environment is provided for the innovative Comments are not displayed in the browser’s
thoughts and technologies. window.
27. When noshade boolean attribute is present, the 39. Glossary lists are denoted by the element
rule is drawn with a solid black line as a 2D <DK>, while regular lists are denoted by the
effect instead of the default 3D effect, i.e. elements <UL>, <OL>, <MENU> and <DIR>.
without shading.
40. <P> is paragraph tag that has only one
28. bgcolor attribute of <BODY> tag specifies the attribute, i.e. align.
background color of a document. text attribute
41. Software license provides end users with the
specifies the color of the text in a document.
right to one or more copies of the software,
29. The term open source requires that no one can without violating copyrights.
discriminate against a group is not sharing the
42. Full form of FOSS is Free and Open Source
edited code from already edited.
Software.
30. Radio button provides a radio button on the
43. Examples of permissive free software licenses
form. Only one radio button of a group can be
are the BSD license and the MIT license,
selected at one time.
which give unlimited permission to use,
31. Use the <SELECT> container tag to create drop study and privately modify the software and
down menus and scrolled lists. Between includes only minimal requirements on
<SELECT> and </SELECT> tags, you can only redistribution.
have <OPTION > tag and their text, which
44. Open source software is a software whose
define the items in the list.
source code is available for modification or
32. Tag required to create combo box in HTML is enhancement by anyone.
<OPTION>. Combo box is used to display a
45. Types of software license are proprietary
drop down list of some options from which one
software license and free and open source
can be selected.
software license.
33. Integrity shows that information should not be
46. text is an attribute that specifies the text’s
altered during its transmission over the
color.
network.
47. </B> is the closing tag of <B>, which is used to
34. SET (Secure Electronic Transaction) is a system
bold the text.
for ensuring the security of financial transactions
on the Internet. It prevents merchants from 48. HR tag is used to drawn a horizontal line. It
seeing the customer payment information. has some attributes like size, align, noshade,
etc.
35. alt attribute provides an alternate text to an
SAMPLE PAPER 6
image, in case of someone using a text only 49. align attribute is used to specify the
browser or using a graphical browser with alignment of the image.
images turned OFF. To fill the blank, “Computer 50. <OL> is ordered list tag that specifies the
Education” is used. number list.
SAMPLE PAPER 7
COMPUTER APPLICATIONS
A Highly Simulated Practice Questions Paper
for CBSE Class X (Term I) Examination
Instructions
1. This question paper is divided into three sections.
2. Section - A contains 20 questions. Attempt any 16 questions.
3. Section - B contains 20 questions. Attempt any 16 questions.
4. Section - C contains 10 questions. Attempt any 8 questions.
5. Each question carries 0.625 mark.
6. There is no negative marking.
Maximum Marks : 25
Roll No. Time allowed : 90 min
Section A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
9. Which type of e-Commerce describes activities of business serving and consumers with
products and services?
(a) B2B (b) C2C (c) C2B (d) B2C
10. Which attribute of <FORM> tag provides the URL of the program?
(a) name (b) method (c) action (d) post
12. Which of the following cannot provide assurance of non-repudiation without a third
party server?
(a) SET (b) SSL
(c) IPR (d) FOI
14. ……… tag is used to insert inline images into paragraphs and headings.
(a) <IMG> (b) <IMAGE>
(c) <I> (d) <IM>
16. It can still be enforced, if others try to create simple material from the original source
material.
(a) IPR (b) Information law
(c) Copyright law (d) Trademark law
Section B
This section consists of 20 questions. Answer any 16 questions.
21. “Today a large percentage of information content on the Internet is in English”, it is the
barrier to
(a) plagiarism (b) digital divide
(c) stalking (d) spamming
Science Science
Science Science
23. Which term defines, “There should be a mechanism to authenticate a user before
giving him/her an access to the required information”.
(a) Availability (b) Authenticity
(c) Integrity (d) Auditability
repeatedly.
(d) Cyberbullying is when you make new friends online who without knowing them in
person.
29. Which of the following is a fundamental human right that underpins freedom of
association, thought and expression?
(a) Privacy (b) Piracy
(c) Plagiarism (d) Stalking
33. Which of the following encompasses the technical and financial ability to utilise
available technology, along with acess to the Internet?
(a) Plagiarism (b) Stalking
(c) Digital divide (d) FOI
36. Shrey has written the following code to display an image in background of HTML
document:
<BODY background = nature.jpg>
But he is not getting the desired output. Help him to identify the correct code.
(a) <BODY bg=nature.jpg> (b) <BODY background=“nature.jpg”>
(c) <BODY image=nature.jpg> (d) <BODY image=“nature.jpg”>
88 CBSE Sample Paper Computer Applications Class X (Term I)
Section C
(Case Study Based Questions)
This section consists of 10 questions. Any 8 questions are to be attempted.
Case Study - I
_______ # line 1
<BODY ______=“yellow” link=“black” vlink=“green”> # line 2
<BASEFONT face=“center”>
<____ color=“maroon”>INDIAN RHINOCEROS</FONT></H1> # line 3
<IMG src=“rhinoceros.jpg” ______=“right” height=“100” width=“100”> # line 4
The Indian rhinoceros lives primarily in northern India and Nepal.These massive
beats have some noticeable physical differences from their African relatives.
Their segmented hide looks like a formidable coat of natural body armout.
It functions a bit like one also.Flexible skin between the thicker hide“plates”
allow them to shift as the rhincoceros moves.<BR><BR>
Other Endangered Animals:
<UL>
<LI>
Whooping Crane
SAMPLE PAPER 7
</LI>
<LI>
White Rhino
</LI>
_______ # line 5
</BODY>
</HTML>
CBSE Sample Paper Computer Applications Class X (Term I) 89
Case Study - II
Rahul is a student of Class 10th. He got an assignment in which one question is ‘what is the
next generation of Intellectual property rights?’ Rahul asked his elder brother for his help,
then Rahul’s brother told him about that term.
Digital property rights represent the next generation of intellectual property rights, which
puts them on the same playing field as patents, copyrights and trademark brands. Digital
rights are those human rights and legal rights that allow individuals to access, use, create
and publish digital media or to access and use computers, other electronic devices and
telecommunications networks.
Based on the given information, answer the questions 46 to 50.
46. Which of the following includes data, Internet accounts and other rights in the digital
world?
(a) Digital property (b) Intellectual property
(c) Digital document (d) None of these
47. ………… disputes arise when some form of counterfeiting or piracy occurs between
companies.
(a) Intellectual property rights (b) Digital property rights
(c) Human rights (d) Information rights
48. Intellectual property rights also can exist in ……… , such as pictures, musics, movies
and literary works.
(a) documents (b) information
SAMPLE PAPER 7
Instructions
Use black or blue ball point pens and avoid Gel & Fountain pens for filling the OMR sheet.
Darken the bubbles completely. Don’t put a tick mark or a cross mark, half-filled or over-filled bubbles will not be read
by the software.
✔ ✗
Correct Incorrect Incorrect Incorrect
Do not write anything on the OMR Sheet.
Multiple markings are invalid.
1 18 35
2 19 36
3 20 37
4 21 38
5 22 39
6 23 40
7 24 41
8 25 42
9 26 43
10 27 44
11 28 45
12 29 46
13 30 47
14 31 48
15 32 49
16 33 50
17 34
Answers
1. (a) 2. (b) 3. (c) 4. (c) 5. (b) 6. (c) 7. (a) 8. (c) 9. (d) 10. (c)
11. (a) 12. (b) 13. (b) 14. (a) 15. (b) 16. (c) 17. (d) 18. (b) 19. (a) 20. (b)
21. (b) 22. (a) 23. (b) 24. (b) 25. (c) 26. (c) 27. (c) 28. (c) 29. (a) 30. (c)
31. (a) 32. (b) 33. (c) 34. (a) 35. (d) 36. (b) 37. (a) 38. (b) 39. (c) 40. (d)
41. (c) 42. (b) 43. (c) 44. (b) 45. (a) 46. (a) 47. (b) 48. (c) 49. (d) 50. (a)
SOLUTIONS
1. Hacking is the act of intruding into someone 11. bgcolor attribute of <BODY> tag specifies the
else’s computer or network. To prevent background color of a document.
hacking, do not give your password to anyone 12. SSL (Secure Socket Layer) cannot provide
and log out of accounts when you are done assurance of non-repudiation without a third
with them. party server.
2. The text which is elevated slightly above the 13. In HTML, <DD> tag is used for definition of
baseline to appear above the surrounding text list item. DD stands for definition description.
is known as superscript. To show the
superscript text, use <SUP> tag. 14. <IMG> tag is used to insert inline images into
paragraphs and headings.
3. Netiquette is a code of good behaviour on the
Internet. This includes several aspects of the 15. Plagiarism is an act of copying another
Internet such as E-mail, social media, online person’s idea, words or work and pretend that
chat, web forums, website comments and other they are our own.
types of online communications. 16. Copyright law can still be enforced if others try
4. The text which is lowered slightly below the to create simple material from the original
baseline to appear below the surrounding text source material.
is known as subscript. To show the subscript 17. Open source software is a software whose
text, <SUB> tag is used. source code is available for modification or
5. <U> tag is used to underline the text. It is also a enhancement by anyone. Examples of
container element. open source software are Linux, Unix, MySQL
etc.
e.g. <U> Hello </U>
18. Content management system is the back end of
Output Hello your website. Check who has access to this
6. HTML is a page layout and hyperlink section of your website and make sure they do
specification language. HTML documents are not have unrestricted access to the site.
saved with the extension .htm or .html. 19. <IMG> tag is used to insert an image in HTML
7. <BR> tag is used to insert a line break which document. href is not an attribute of <IMG>
means the text/image following the tag will be tag.
moved to the next line. 20. src(source) attribute takes URL (Universal
8. color attribute of <HR> tag specifies the color Resource Locator) of an image file as value,
of horizontal line. which points to the direct location of an image
Syntax <HR color = “color_name”> to be displayed.
SAMPLE PAPER 7
9. B2C (Business-to-Consumer) describes 21. The barrier to the digital divide is, that “Today
activities of business serving and consumers a large percentage of information content on
with products and services. An example of the Internet is in English”, which is a barrier
B2C transaction would be a person buying a for the people whose primary language is not
pair of shoes from a retailer. English.
10. action attribute of <FORM> tag provides the 22. <UL> tag define the unordered list. Each list
URL of the program (in the server) that item starts with the <LI> tag. type attribute is
receives the information from the form and used to change the bulleted symbol in a list.
processes it. 23. Authenticity defines the given definition.
92 CBSE Sample Paper Computer Applications Class X (Term I)
24. HTML is a subset of SGML (Standard 37. Online auctions and classified advertisements
Generalised Markup Language). SGML are two examples of C2C (Consumer-to
provides a way to define markup languages -Consumer) platforms.
and sets the standard for their form. 38. <INPUT> tag is used to create radio button in
25. <BODY> tag specifies the all main content of HTML document.
HTML document. <BODY> tag is usually used 39. HTML is written in the form of tags. A tag or
after <HEAD> ...... </HEAD> tags. element refers to a string enclosed within
26. Cyberbullying is any bullying behaviour that angular brackets (< and >).
takes place virtually via many different devices 40. align attribute specifies the alignment of the
and platforms. text. Values of align are left/right/justify.
27. Notepad program is used to write HTML Top is not a valid value for alignment.
which saves a file with .htm or .html
41. <HTML> is used to fill up the blank in line 1
extension.
that acts as a container for all other HTML
28. <FONT> tag is used to set the font type, font elements.
size and font color. face attribute in <FONT>
42. bgcolor is used to fill up the blank in line 2 as it
tag defines the font type of text.
represents the background color of web page.
29. Privacy is a fundamental human right that
43. FONT is used to fill up the blank in line 3. It is
underpins freedom of association, thought and
a container tag whose closing tag </FONT> is
expression as well as freedom from
already given at end of line 3.
discrimination.
44. align is used to fill up the blank in line 4.
30. start attribute of <OL> is used to change the
beginning value of an ordered list. 45. </UL> is used to fill up the blank in line 5.
</UL> is closing tag of <UL>.
31. The width and height attributes tell the
dimensions of an image to the browser. If 46. Digital property includes data, Internet
height and width are set, the space required for accounts and other rights in the digital world,
image is reserved before loading the page. including contractual rights and intellectual
property rights.
32. To set the image in centre of document,
<CENTER> tag can be used. 47. Digital property rights disputes arise when
some form of counterfeiting or piracy occurs
Syntax <CENTER><IMG src=“URL”></CENTER>
between companies.
33. Digital divide encompasses the technical and
48. Intellectual property rights also can exist in
financial ability to utilise available technology,
digital property, such as pictures, musics,
along with access to the Internet.
movies, literary works, web pages, computer
34. Freeware is a software under copyright but code and other creative works.
available at no cost. A freeware application
49. Some digital property rights are domain name,
may or may not have its source code freely
content management system, site hosting,
available.
social media pages etc.
35. Use the <TEXTAREA> container tag to create
50. As intellectual property, digital information
multiline scrollable, text entry boxes. Use the
exists inside the Internet realm. In effect,
rows and cols attributes to set the displayed
transactions and agreements between
height and width of the text area.
companies and consumers take place in a
36. background attribute is used to set the image virtual world as opposed to the “real-life”
SAMPLE PAPER 7
in HTML document. Name of image always world standard laws were designed to protect.
should be in double quotes.
SAMPLE PAPER 8
COMPUTER APPLICATIONS
A Highly Simulated Practice Questions Paper
for CBSE Class X (Term I) Examination
Instructions
1. This question paper is divided into three sections.
2. Section - A contains 20 questions. Attempt any 16 questions.
3. Section - B contains 20 questions. Attempt any 16 questions.
4. Section - C contains 10 questions. Attempt any 8 questions.
5. Each question carries 0.625 mark.
6. There is no negative marking.
Maximum Marks : 25
Roll No. Time allowed : 90 min
Section A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
3. Which of the following uses different encryption and hashing techniques to secure
payments over Internet?
(a) SSL (b) BBB
(c) SET (d) IPR
11. Which alignment of align attribute of <IMG> tag is different in both Internet Explorer
and Mozilla Firefox?
(a) Middle (b) Top
(c) Bottom (d) Left
12. ……… reserves all the rights of the owner to the information to decide, how much
information is to be exchanged.
(a) Plagiarism (b) Cyberbullying
(c) IPR (d) FOI
14. ……… defines an object on the form which can receive user input.
(a) <OBJECT> (b) <OUTPUT>
(c) <OPTION> (d) <INPUT>
18. Which of the following occur when another company usually a competitor uses a
corporation trademark to reinforce its own image?
(a) Patent infringements
(b) Trademark infringements
(c) Copyright infringements
(d) None of the above
CBSE Sample Paper Computer Applications Class X (Term I) 95
Section B
This section consists 20 questions. Answer any 16 questions.
21. Shrey is asking about a term to his younger sister that it is a crime that involves a
computer and a network. Which type of crime is mentioned here?
(a) Cyber crime (b) Network crime
(c) Security crime (d) IT crime
23. Which of the following is the use of Internet or other electronic means to stalk or
harass an individual, group or organisation?
(a) Bullying (b) Stalking
(c) Cyber stalking (d) Phishing
26. Computer system assets can be modified only by authorised parties is termed as
(a) confidentiality (b) availability
(c) authenticity (d) integrity
27. Identify which of the following tag will show the password field?
(a) <SELECT> (b) <OPTION>
(c) <INPUT> (d) <PASSWORD>
29. Sohan is using software that includes a license that allows him to modify the software
to best fit his needs. What type of software is he using?
(a) Open source software (b) Proprietary software
(c) Closed software (d) Commercial software
32. Which of the following includes rules that provide guidance for appropriate social
interaction and technical performance online?
(a) Netiquette (b) Stalking (c) Phishing (d) Rights
33. ……… can use the information which they gather to then financially fund themselves
or worryingly that they might use this money to fund terrorism.
(a) Fraudsters (b) Hackers (c) Crackers (d) Righters
37. Which value of type attribute in <UL> tag is used to show the following list?
± Mango
± Apple
± Banana
(a) disc (b) sphere
(c) circle (d) square
38. Identify the code to insert image taj.jpeg size to be 70 pixels wide and 100 pixels tall.
(a) <IMG src =“taj.jpeg” width=“70” height=“100”>
(b) <IMG src=“taj.jpeg” width=“100” height=“70”>
(c) <IMG src=“taj.jpeg” width=70 height=100>
(d) <IMG src=taj.jpg width=70 height=100>
Section C
(Case Study Based Questions)
This section consists of 10 questions. Any 8 questions are to be attempted.
Case Study - I
Riya is working in MNC. She needs a software for her new project. Riya wants any software
SAMPLE PAPER 8
for which she has not to pay. Her colleague told Riya about open source software.
Open Source Software (OSS) is software with source code that anyone can inspect, modify
and enhance. “Source code” is the part of software that most computer users do not ever
see; it’s the code computer programmers can manipulate to change how a piece of
software-a “program” or “application” works.
Open source software is also sometimes conflated with the free software movement, which
can add to the confusion around whether open source means “free”. The free software
movement grew out of the hacker culture of the 1970s and was formally founded by
Richard Stallman as part of the GNU Project and the non-profit Free Software Foundation.
98 CBSE Sample Paper Computer Applications Class X (Term I)
41. Which type of software is completely customisable but it depends on the open source
license?
(a) Closed software (b) Open source software
(c) Proprietary software (d) Commercial software
44. Which of the following is usually stored in a public repository and shared publicly for
OSS?
(a) Open source code (b) Code modification
(c) Both (a) and (b) (d) None of these
45. Can Riya change some code of open source software which she will use?
(a) Yes (b) No
(c) Depend on price of software (d) Depend of her coding skills
Case Study-II
Consider the following code:
<HTML>
<HEAD>
<TITLE>Dubai Tourism</TITLE>
</HEAD>
<BODY>
<CENTER>
<H1>
<FONT ___=“arial” color=“maroon”> #line 1
WELCOME TO DUBAI</FONT>
</H1>
</CENTER>
<HR width=80% size=“5” color=“red” noshade>
<HR width=60% size=“5” color=“red” noshade>
<P>
<FONT size=“5”>
SAMPLE PAPER 8
Morning
-Dolphinarium and Palm Dubai
</LI>
<LI>
Evening
- Ski Dubai and Cruise
</LI>
</UL>
</BODY>
</HTML>
Based on the given code, answer the questions 46 to 50.
46. Choose the correct option to fill up the blank in line 1 as marked.
(a) style (b) face
(c) label (d) design
47. Choose the correct option to fill up the blank in line 2 as marked.
(a) href (b) alt
(c) name (d) src
48. Choose the correct option to fill up the blank in line 3 as marked.
(a) <\P> (b) </P>
(c) </HR> (d) <\HR>
49. Choose the correct option to fill up the blank in line 4 as marked.
(a) type (b) style
(c) start (d) design
50. Choose the correct option to fill up the blank in line 5 as marked.
(a) <OL> (b) <UL>
(c) <LI> (d) </UL>
SAMPLE PAPER 8
OMR SHEET SP 8
Roll No.
Instructions
Use black or blue ball point pens and avoid Gel & Fountain pens for filling the OMR sheet.
Darken the bubbles completely. Don’t put a tick mark or a cross mark, half-filled or over-filled bubbles will not be read
by the software.
✔ ✗
Correct Incorrect Incorrect Incorrect
Do not write anything on the OMR Sheet.
Multiple markings are invalid.
1 18 35
2 19 36
3 20 37
4 21 38
5 22 39
6 23 40
7 24 41
8 25 42
9 26 43
10 27 44
11 28 45
12 29 46
13 30 47
14 31 48
15 32 49
16 33 50
17 34
Answers
1. (b) 2. (d) 3. (c) 4. (b) 5. (d) 6. (a) 7. (a) 8. (c) 9. (d) 10. (c)
11. (a) 12. (c) 13. (a) 14. (d) 15. (a) 16. (c) 17. (a) 18. (b) 19. (a) 20. (d)
21. (a) 22. (b) 23. (c) 24. (d) 25. (b) 26. (d) 27. (c) 28. (a) 29. (a) 30. (b)
31. (d) 32. (a) 33. (a) 34. (c) 35. (b) 36. (c) 37. (c) 38. (a) 39. (d) 40. (a)
41. (b) 42. (d) 43. (b) 44. (a) 45. (a) 46. (b) 47. (d) 48. (b) 49. (a) 50. (c)
SOLUTIONS
1. Encryption defines that information should be 14. <INPUT> defines an object on the form which
encrypted and decrypted only by an authorised can receive user input.
user. Syntax
2. alt attribute define the short description of an <INPUT type=“fieldtype” name=“field name”
image. The value for alt attribute is a text string value = “fieldtext”>
of upto 1024 characters including spaces and
punctuations. 15. Black hat hackers are also known as an
unethical hacker. These people hack the
3. Secure Electronic Transaction (SET) uses system illegally to steal money or to achieve
different encryption and hashing techniques to their own illegal goals.
secure payments over Internet done through
credit cards. 16. Patent is the granting of a property right by a
sovereign authority to an inventor. It provides
4. <SUP> is superscript tag which displays the text the inventor exclusive rights to the patented
slightly above the base line. process.
5. <H> is not a style tag while <B>, <U> and <I> are 17. DPR (Digital Property Rights) represent
style tags which are used for formatting the subsequent generations of property rights
text. which puts them on an equivalent playing
6. Glossary lists are denoted by the element <DK>. field as patents, copyrights and trademark
7. start attribute is used to change the beginning brands.
value of an ordered list. 18. Trademark infringements occur when another
Syntax <OL start = “number”> company usually a competitor uses a
corporation trademark to reinforce its own
8. <IMG> tag is used to insert an image in a web image.
page. src attribute takes URL of an image file as
value, which points to the direct location of an 19. An absolute URL is a full path to an image.
image to be displayed. 20. link attribute specifies the color of an
9. CPA WebTrust provide services titled unvisited link in a document.The default color
“WebTrust” and “SysTrust”. It promises an of link attribute is blue.
audit of technology, security and business 21. Cyber crime is a crime that involves a
practices. computer and network.
10. border attribute of <IMG> tag specifies the 22. Definition list is a list of items, with a
width of the border around an image. description of each item. <DL> are indented
list without any bullet symbol or any number
SAMPLE PAPER 8
12. IPR (Intellectual Property Rights) reserves all 23. Cyber stalking is the use of Internet or other
the rights of the owner to the information to electronic means to stalk or harass an
decide, how much information is to be individual, group or organisation. It may
exchanged, shared or distributed. also include monitoring, identity theft,
threats.
13. <SELECT> tag is used to create drop down list.
The <OPTION> tag inside the <SELECT> tag 24. align attribute specifies the alignment of the
define the available options in the lists. text within a paragraph.
102 CBSE Sample Paper Computer Applications Class X (Term I)
25. Unordered list is an indented list with a bullet 35. Freedom of Information(FOI) is freedom of a
symbol in front of each list item. An person or people to publish and consume
unordered list start with the <UL> tag. information.
26. Computer system assets can be modified only 36. <BR> tag is used to line break while <U> tag is
by authorized parties is termed as integrity. used for underlined the text.
27. A password field is shown by <INPUT> tag. A 37. type attribute of <UL> tag is used to change the
password field shows one dot for each bulleted symbol in a list.
character input by the user. 38. <IMG> tag is used to insert image in which
28. <HTML> tag tells the browser that this is an attribute src is used to take URL of an image.
HTML document. 39. <HTML> tag is the main tag to create HTML
<BODY> tag is used for text and tags that document.
appear directly on the web page. To create 40. With checkboxes, we can give the users a list of
horizontal line use <HR> tag. items to choose from. The user can choose more
29. OSS (Open Source Software) typically than one items from the list.
includes a license that allows programmers to 41. Open source software is completely
modify the software to best fit their needs and customizable but it depends on the open source
control how the software can be distributed. license. It requires in-house expertise.
30. <EM> element indicates emphasis, browser 42. LibreOffice, Python and Linux are examples of
will show the contents of <EM> element in open source software.
italic.
43. Open source software licenses promote
31. When we want to pick one option from the collaboration and sharing because they permit
given many options we use radio type. name other people to make modifications to source
attribute sent the value of the option selected code and incorporate those changes into their
to the server. value attribute indicates the own projects.
value that has been sent to the server for the
selected option. The checked attribute 44. Open source code is usually stored in a public
indicates that which value should be selected repository and shared publicly. Anyone can
on the loading of the page. access the repository to use the code
independently or contribute improvements to
32. Netiquette includes rules that provide the design and functionality of the overall
guidance for appropriate social interaction project.
and technical performance online. Netiquette
varies among the many subcultures of the 45. Yes, Riya can change the some code of open
Internet, and, of course, netiquette issues source software because it is distributed with
change with time and technology. its source code, making it available for use,
modification and distribution with its original
33. Fraudsters can use the information which they rights.
gather to then financially fund themselves, or
46. face attribute specifies the type of text font such
worryingly that they might use this money to
as times new roman, arial etc.
fund terrorism. Therefore, it is essential that
individuals and organisations are aware of 47. src attribute takes the URL of an image file that
how to protect themselves against cyber you want to insert in the web page.
fraud. 48. <P> tag specifies to mark a block of text as a
34. Computer fraud is any dishonest paragraph. It is a container tag and its closing
SAMPLE PAPER 8
Instructions
1. This question paper is divided into three sections.
2. Section - A contains 20 questions. Attempt any 16 questions.
3. Section - B contains 20 questions. Attempt any 16 questions.
4. Section - C contains 10 questions. Attempt any 8 questions.
5. Each question carries 0.625 mark.
6. There is no negative marking.
Maximum Marks : 25
Roll No. Time allowed : 90 min
Section A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
1. Integrity defines
(a) information should not be altered during its transmission
(b) the protection against the denial of order
(c) information should be encrypted
(d) information should not be accessible to unauthorised user
10. Which type of software piracy occurs when fake copies of software are produced in
such a way that they appear to be authentic?
(a) Renting (b) Softlifting
(c) Software counterfeiting (d) Hard disk loading
11. Which method attribute of <FORM> tag sends the form information in the HTTP
environment?
(a) GET (b) POST (c) Form (d) action
13. Which is the correct way to set the title of the page is “Save the Earth”?
(a) <HEAD> Save the Earth </HEAD> (b) <BODY> Save the Earth </BODY>
(c) <HTML> Save the Earth </HTML> (d) <TITLE> Save the Earth </TITLE>
15. This respects other user’s views and displaying common etiquette when posting your
views online.
(a) Etiquette (b) Netiquette
(c) Both (a) and (b) (d) None of these
SAMPLE PAPER 9
16. Which of the following was established for transparency, government accountability
and general public protection against corruption?
(a) FOI (b) RTI
(c) Both (a) and (b) (d) None of these
19. If you want to display uppercase alphabets instead of numbers, ……… ordered type
should you use.
(a) a (b) A (c) 1 (d) I
Section B
This section consists of 20 questions. Answer any 16 questions.
21. Ajay purchased a proprietary software for his new project. His friend Aman asked to
Ajay that which type of license is used for this software. Ajay read description for this
license, there is no renewal, a new license must be purchased after expiration. Identify
this license.
(a) Perpetual license (b) Annual license
(c) Permissive license (d) None of these
22. HTML code to set the image ‘nature.jpg’ stored in ‘Picture’ folder in C : as the
background of your web page.
(a) <BODY background=“C :\Picture\nature.jpg”>
(b) <BODY image=“C :\Picture\nature.jpg”>
(c) <IMG src=“C :\Picture\nature.jpg”>
(d) <BODY src=“C :\Picture\nature.jpg”>
23. Riya wrote a book on Java language and she wants to published this book with her
name. But she get some confusion that how is she protect her work to be copied?
Which law can protect her work?
(a) Copyright (b) Patent (c) Trademark (d) Renting
25. ……… scrolls as much as needed, so you are only seeing the display size, not the data
size.
(a) Text box (b) Combo box
(c) Textarea (d) List box
SAMPLE PAPER 9
26. Which act provides that every person has the right to access official records held by
government departments?
(a) FOI Act (b) Human Act
(c) Government Act (d) Information Act
28. If there are no other images in the current line, then the image is aligned to ……… of
the text.
(a) top (b) bottom (c) middle (d) right
29. The license also defines the responsibilities of the parties entering into the
(a) license rules (b) license limit
(c) license agreement (d) All of these
30. Riya has written the following code as part of HTML program :
<UL type=“disc”>
<LI> controlling
<OL type=“1”>
<LI> Pollution
<LI> Deforestation
</OL>
</UL>
Predict the output of above code.
(a) ± Controlling (b) ~ Controlling
1. Pollution 1. Pollution
2. Deforestation 2. Deforestation
(c) ● Controlling (d) ● Controlling
1. Pollution i. Pollution
2. Deforestation ii. Deforestation
31. Which of the following is a graphical control element that allows the user to select one
or more items from a list contained?
(a) Check box (b) Text box
(c) Radio button (d) List box
32. As per HTML standard, ……… attribute of <IMG> tag is optional but is highly
recommended.
(a) src (b) alt
(c) href (d) noshade
33. Which of the following refers to the misuse of devices like computers, smartphones,
tablets and networks to gather information on users?
(a) Hacking (b) Cracking
(c) Phishing (d) Stalking
34. This software remains the property of its owner/creator and is used by
SAMPLE PAPER 9
35. Find the correct code to set the web page background color as yellow, text color as red
and visited link color as blue.
(a) <BODY bgcolor=“yellow” font=“red” vlink=“blue”>
(b) <BODY color=“yellow” text=“red” vlink=“blue”>
(c) <BODY color=“yellow” font=“red” vlink=“blue”>
(d) <BODY bgcolor=“yellow” text=“red” vlink=“blue”>
CBSE Sample Paper Computer Applications Class X (Term I) 107
38. Value for type attribute of <OL> tag uses uppercase roman numerals is
(a) i (b) I (c) A (d) 1
39. Which of the following tag not need its closing tag?
(a) <HEAD> (b) <HTML> (c) <BR> (d) <UL>
40. Identify the correct syntax for selected attribute of <OPTION> tag.
(a) <OPTION select> (b) <OPTION selected>
(c) <OPTION value=“selected”> (d) <OPTION selected=“value”>
Section C
(Case Study Based Questions)
This section consists of 10 questions. Any 8 questions are to be attempted.
Case Study-I
Consider the following code:
<HTML>
<HEAD> <TITLE> Candy World ____ # line 1
</HEAD>
<BODY bgcolor = “pink” link = “green” vlink = “blue”>
<FONT face = “Comic Sans” ____ = “red”> # line 2
<H1> <CENTER>Smacking Lollies </CENTER> </H1>
</FONT>
<FONT size = “4” ____ = “arial”> <U> <I> Smacking Lollies </I> </U> is a new
chain of stores selling of candies and mouth watering lollies. # line 3
<IMG src = “Ice.jpg” ____ = “right”> # line 4
<P> The following is a list of major outlets of Smacking Lollies : </P>
<UL>
<LI>West Delhi Janak Puri and Rajori Garden </LI>
<LI>South Delhi-South Extension and Vasant Kunj </LI>
____ </FONT> # line 5
</BODY>
</HTML>
SAMPLE PAPER 9
43. Choose the correct option to fill up the blank in line 3 as marked.
(a) style (b) value (c) face (d) design
44. Choose the correct option to fill up the blank in line 4 as marked.
(a) margin (b) align (c) paragraph (d) setting
45. Choose the correct option to fill up the blank line 5 as marked.
(a) \UL (b) /UL (c) <\UL> (d) </UL>
Case Study-II
Secure data transmission means that data/information is not being received or modified by
an unauthorised person, over a network, from source to destination. For secure data
transmission, we can convert an actual message (which is in readable form) into an
unreadable message (called an encrypted message) with the help of the concept of
encryption. This unreadable message is sent through the network to the destination. If a
hacker tries to read this message, he/she receives an unreadable message that cannot be
easily converted into the actual message. The unreadable message can be converted to the
original message by the receiver at the destination. Caesar Cipher is one of the common
encryption techniques. In this technique, each letter of the word is replaced by a letter some
fixed number of positions (usually called as key) down the alphabet.
For example, if the key is 3, each ‘A’ will be replaced by ‘D’ (Letter ‘D’ is 3 positions down
Letter ‘A’ in the alphabet), each ‘B’ will be replaced by ‘E’ and similarly, each ‘Z’ will be
replaced by ‘C’. The receiver can identify the original message by using the reverse
technique of encryption. This reverse technique is called decryption.
Based on the given information, answer the questions 46 to 50.
47. Which of the following techniques can be used for security of data?
(a) Authentication (b) Authorisation
(c) Encryption (d) All of these
49. Person ‘X’ has received an encrypted message and wants to convert this message into
the actual message (message before encryption). The technique he should use is called
(a) conversion (b) encryption
(c) decryption (d) None of these
50. A sender wants to send a message having the text as ‘COMPUTER’ to a receiver using 4
as the key. What will be the encrypted message?
(a) GSQTZXIV (b) GSQTYXIV
(c) GSXTYXIV (d) GSQSYXIV
OMR SHEET SP 9
Roll No.
Instructions
Use black or blue ball point pens and avoid Gel & Fountain pens for filling the OMR sheet.
Darken the bubbles completely. Don’t put a tick mark or a cross mark, half-filled or over-filled bubbles will not be read
by the software.
✔ ✗
Correct Incorrect Incorrect Incorrect
Do not write anything on the OMR Sheet.
Multiple markings are invalid.
1 18 35
2 19 36
3 20 37
4 21 38
5 22 39
6 23 40
7 24 41
8 25 42
9 26 43
10 27 44
11 28 45
12 29 46
13 30 47
14 31 48
15 32 49
16 33 50
17 34
Answers
1. (a) 2. (d) 3. (d) 4. (c) 5. (b) 6. (d) 7. (a) 8. (c) 9. (a) 10. (c)
11. (b) 12. (d) 13. (d) 14. (a) 15. (b) 16. (c) 17. (a) 18. (b) 19. (b) 20. (c)
21. (b) 22. (a) 23. (a) 24. (b) 25. (c) 26. (a) 27. (b) 28. (a) 29. (c) 30. (c)
31. (d) 32. (b) 33. (a) 34. (d) 35. (d) 36. (a) 37. (d) 38. (b) 39. (c) 40. (b)
41. (b) 42. (c) 43. (c) 44. (b) 45. (d) 46. (b) 47. (d) 48. (c) 49. (c) 50. (b)
SOLUTIONS
1. Integrity defines information should not be 15. Netiquette means respecting other user’s views
altered during its transmission over the and displaying common etiquette when posting
network. your views to online discussion groups.
2. These types of HTML elements always wrap 16. FOI (Freedom of Information) or RTI (Right to
around the text or graphics which come in a Information) was established for transparency,
set with an opening as well as closing tag. government accountability, education and
general public protection against corruption.
3. Security is an essential part of any
transaction that takes place over the Internet. 17. Business-to-Business (B2B) e-Commerce applies
Essential requirements for safe e-Payments to businesses buying from and selling to each
are confidentiality, integrity, encryption, other over Internet.
authenticity, etc. 18. Expanded form of ICT is Information and
4. <SUB> tag is used to display SO 4 . It is Communication Technology.
subscript tag which shows the text slightly 19. The numbering of an HTML list can be changed
below the base line. to letters or roman numerals by the type
5. <BODY> tag defines the document’s body. It attribute. For uppercase alphabets, A is used as
is used to set the basic page characteristics. value of type attribute.
6. alink attribute specifies the color of an active 20. name attribute of <TEXTAREA> is used to
link in a document. The default color of an identify the input field.
alink attribute is red. Syntax <TEXTAREA name=“text”>
7. alt attribute contains string which must be 21. For annual licenses, there is no renewal, a new
enclosed in quotation marks. license must be purchased after expiration.
8. alt is used for displaying alternate text when 22. background attribute of <BODY> tag specifies a
image is not displayed on web page. background image for a document.
9. Heading tag always start new line and it is of 23. Copyright is an exclusive right of the developer
size types say H1, H2, H3, H4, H5 and H6. or author, to protect their work which is granted
10. Software counterfeiting occurs when fake by law.
copies of software are produced in such a 24. size attribute specifies the height of the rule in
way that they appear to be authentic. pixels. A pixel is a tiny dot that makes up the
display of your computer.
11. POST method of <FORM> tag sends the form
information in the HTTP environment. 25. Textarea scrolls as much as needed, so you are
only seeing the display size, not the data size.
12. Open source software is a software, whose
SAMPLE PAPER 9
criteria must be met as 26. Freedom of Information (FOI) Act provides that
every person has the right to access official
(i) Source code must be included.
records held by government departments as
(ii) Modified versions can be redistributed. defined by the act.
13. <TITLE> tag defines the title of the 27. The default bullet type for most web browsers is
document. Title must be a simple text and a disc.
should not be same as the file name. e.g.
14. Ordered list starts with the <OL> tag. Each ● Mango
etc.
CBSE Sample Paper Computer Applications Class X (Term I) 111
28. If there are no other images in the current line, be turned back into plaintext by using the
then the image is aligned to top of the text. decryption key.
Both Internet Explorer and Mozilla Firefox 38. The numbering of an HTML list can be
treat this alignment in same manner. changed to letters or roman numerals by the
29. The license also defines the responsibilities of type attribute. I uses uppercase roman
the parties entering into the license agreement numerals.
and may impose restrictions on how the 39. To add a single line of space, you can use a line
software can be used. break <BR> tag. This is an empty tag, i.e. no
30. An unordered list starts with the <UL> tag and need of its closing tag.
ordered list starts with the <OL> tag. 40. selected attribute defines the default option to
31. A list box is a graphical control element that be selected when page is loaded.
allows the user to select one or more items Syntax <OPTION selected>
from a list contained. The <SELECT> tag is
used to create drop down list. 41. <TITLE> tag is used to set the title of web page.
Its closing tag is </TITLE>.
32. alt attribute is specified to provide alternate
information for an image. As per HTML 42. color attribute of <FONT> tag is used to define
standard, this attribute of <IMG> tag is the color of text.
optional but is highly recommended. 43. face attribute specifies the style of text font
33. Hacking refers to the misuse of devices like such as times new roman, arial, etc.
computers, smartphones, tablets and networks 44. align attribute of <FONT> tag specifies the
to cause damage to or corrupt systems, gather alignment of the text.
information on users, steal data and 45. <UL> tag creates unordered list. Its closing tag
documents or disrupt data-related activity.
is </UL>.
34. Proprietary software remains the property of
46. Secure data transmission means data cannot be
its owner/creator and is used by
accessed by any unauthorised person during
end-users/organisations under predefined
transmission. Secure transmission refers to the
conditions. Proprietary software may also be
transfer of data such as confidential or
called closed source software or commercial
proprietary information over a secure channel.
software.
47. Secure data transmission can be used various
35. bgcolor attribute sets the background color, techniques as authentication, authorisation,
text attribute sets the text color and vlink encryption, integrity, auditability, etc.
attribute sets the visited link.
48. Caesar Cipher is an encryption technique that
36. width attribute specifies the width of a used for conversion of the actual message into
horizontal line in pixels or per cent. Its default an encrypted message.
value is 100%.
49. The receiver can identify the original message
37. An encryption algorithm is used to transform a by using the reverse technique of encryption.
readable message into encrypted message. This reverse technique is called decryption.
An encryption algorithm is the method used to
50.
transform data into cipher text. An algorithm
will use the encryption key in order to alter the C O M P U T E R
+4
data in a predictable way, so that even though
the encrypted data will appear random, it can G S Q T Y X I V
SAMPLE PAPER 9
SAMPLE PAPER 10
COMPUTER APPLICATIONS
A Highly Simulated Practice Questions Paper
for CBSE Class X (Term I) Examination
Instructions
1. This question paper is divided into three sections.
2. Section - A contains 20 questions. Attempt any 16 questions.
3. Section - B contains 20 questions. Attempt any 16 questions.
4. Section - C contains 10 questions. Attempt any 8 questions.
5. Each question carries 0.625 mark.
6. There is no negative marking.
Maximum Marks : 25
Roll No. Time allowed : 90 min
Section A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
1. Which of the following concerns to the code of responsible behaviour on the Internet?
(a) Cyber ethics (b) Phishing
(c) Hacking (d) Cyber crime
2. ....... tag is used to insert a line break with extra space in the beginning.
(a) <P> (b) <BR> (c) <HR> (d) <I>
3. Hacking done by stealing classified information, stealing passwords to get into a site
and also recasting a website
(a) with permission (b) with rules
(c) without agreement (d) without permission
7. Which of the following tag affects all text in a document that follows it?
(a) <FONT> (b) <BASEFONT>
(c) <OL> (d) <UL>
10. Which method attribute of <FORM> tag sends the information to the server?
(a) POST (b) GET (c) FORM (d) SET
11. Which field shows one dot for each character input by the user?
(a) Radio button (b) Check box (c) Password (d) Text box
16. Any software you did not pay for or see online for downloading that’s normally not
free is considered
(a) proprietary software (b) commercial software
(c) pirated software (d) closed software
18. In this phishing, an attacker attempts to obtain confidential information from the
victims.
(a) Spear phishing (b) Whaling
(c) Deceptive phishing (d) Pharming
Section B
This section consists of 20 questions. Answer any 16 questions.
21. This agreement is a legal document that stipulates several key conditions between a
software company or developer and a user to allow use of the software.
(a) IPR (b) FOI
(c) RTI (d) Software license
23. Software licenses typically provide end users with the right to one or more copies of
the software without violating
(a) trademark (b) copyrights
(c) patent (d) human rights
</HTML>
(c) <HTML> (d) <HTML>
<BODY> <BODY>
<HR> <HR>
Education <BR> Hub <BR>
</BODY> Education
</HTML> Hub
</BODY>
</HTML>
CBSE Sample Paper Computer Applications Class X (Term I) 115
26. ……… describes the gap between people who have access to affordable, reliable
Internet service and those who lack it.
(a) License (b) Piracy
(c) Cyberbullying (d) Digital divide
29. Which of the following e-Commerce refers to a business selling a good or service to
another business, like a manufacturer and wholesaler or a wholesaler and a retailer?
(a) B2B (b) B2C
(c) C2C (d) B2G
30. HTML code that produces a horizontal rule with size 5, aligning right on page is
(a) <HR size =5 align=right> (b) <HR size =5, align=right>
(c) <HR size=“5” align“=right”> (d) <HR value=“5” align=“right”>
31. Riya has written a code to set the color of text in which she can give the value of color
with
(a) color name (b) hex_number
(c) rgb_number (d) Any of these
33. Which of the following is a type of social engineering attack often used to steal user
SAMPLE PAPER 10
34. This includes information they hold about you or about government policies and
decisions.
(a) Freedom of Information Act
(b) Human Rights
(c) Right to Information
(d) Intellectual Property Rights
116 CBSE Sample Paper Computer Applications Class X (Term I)
Computer
Science
38. Which of the following code is used for English of an element content and attribute
values?
(a) hi (b) en
(c) de (d) es
40. ...... attribute of <OPTION> tag specifies the value to be sent to the server when form is
submitted.
(a) label (b) name (c) value (d) size
Section C
(Case Study Based Questions)
This section consists of 10 questions. Any 8 questions are to be attempted.
Case Study-I
Consider the following code:
<HTML>
<HEAD><TITLE>FOOTBALL CLUB</TITLE></HEAD>
<BODY>
<FONT face=“arial” ____ =“3”></FONT>
<H1 align=“center”> # line 1
<FONT color=“blue”>FOOTBALL CLUB</FONT></____> # line 2
<CENTER><IMG ____ =“football.jpg” height=“150” width=“150”></CENTER> # line 3
<H3>Welcome to the website of the Manchester Football Club</H3>
<P>The Manchester Football Club is based in United States of America and has
a long <BR>
and proud history. We have several teams in various age groups from kids to
grown-<BR>ups so there is a team to suit any player. <BR><BR>
<U>This year’s motto:<____><BR>
We are the BEST:<BR> # line 4
<____ size=“3” noshade size =“75%”> # line 5
</BODY>
</HTML>
Based on the given code, answer the questions 41 to 45.
41. Choose the correct option to fill up the blank in line 1 as marked.
(a) text (b) size
(c) value (d) text
42. Choose the correct option to fill up the blank in line 2 as marked.
(a) \H1 (b) /H1
(c) H1 (d) <H1>
43. Choose the correct option to fill up the blank in line 3 as marked.
SAMPLE PAPER 10
44. Choose the correct option to fill up the blank in line 4 as marked.
(a) \U (b) U
(c) /U (d) /I
45. Choose the correct option to fill up the blank line 5 as marked.
(a) BR (b) HR
(c) UL (d) OL
118 CBSE Sample Paper Computer Applications Class X (Term I)
Case Study-II
The word plagiarism has come from the Latin word ‘plagiarius’, which means to kidnap.
As the plagiarism definition suggests, when someone uses the work of another artist
without properly citing the source or giving credit, then that will be an instance of
plagiarism. Plagiarism is a punishable offense and it is a form of intellectual theft.
Plagiarism is applicable for writing or website articles, but it is also applicable in stealing
intellectual property like music, images, videos; and even choreography of a dance.
Not everyone who plagiarizes starts out with the goal of stealing someone else’s work.
Sometimes, plagiarism is simply the result of poor planning and a few bad, panicked
decisions. Don’t fall victim to the plagiarism trap.
Based on the given information, answer the questions 46 to 50.
46. It is presenting someone else’s work or ideas as your own, with or without their
consent.
(a) Phishing (b) Cracking
(c) Plagiarism (d) Stalking
47. Which of the following plagiarism is the act of copying another person’s work word for
word?
(a) Direct plagiarism (b) Paraphrased plagiarism
(c) Mosaic plagiarism (d) Accidental plagiarism
48. If someone reuses his own work again without the permission of the professor, it will
be considered as
(a) direct plagiarism (b) self-plagiarism
(c) mosaic plagiarism (d) accidental plagiarism
50. Which of the following involves making a few changes to someone else’s work, then
passing it off as your own?
(a) Accidental plagiarism (b) Self-plagiarism
(c) Mosaic plagiarism (d) Paraphrased plagiarism
SAMPLE PAPER 10
OMR SHEET SP 10
Roll No.
Instructions
Use black or blue ball point pens and avoid Gel & Fountain pens for filling the OMR sheet.
Darken the bubbles completely. Don’t put a tick mark or a cross mark, half-filled or over-filled bubbles will not be read
by the software.
✔ ✗
Correct Incorrect Incorrect Incorrect
Do not write anything on the OMR Sheet.
Multiple markings are invalid.
1 18 35
2 19 36
3 20 37
4 21 38
5 22 39
6 23 40
7 24 41
8 25 42
9 26 43
10 27 44
11 28 45
12 29 46
13 30 47
14 31 48
15 32 49
16 33 50
17 34
Answers
1. (a) 2. (a) 3. (d) 4. (b) 5. (d) 6. (a) 7. (b) 8. (b) 9. (b) 10. (b)
11. (c) 12. (d) 13. (a) 14. (a) 15. (a) 16. (c) 17. (d) 18. (c) 19. (b) 20. (c)
21. (d) 22. (c) 23. (b) 24. (a) 25. (d) 26. (d) 27. (c) 28. (d) 29. (a) 30. (c)
31. (d) 32. (c) 33. (b) 34. (a) 35. (a) 36. (c) 37. (b) 38. (b) 39. (a) 40. (c)
41. (b) 42. (c) 43. (a) 44. (c) 45. (b) 46. (c) 47. (a) 48. (b) 49. (d) 50. (d)
SOLUTIONS
1. Cyber ethics concerns to the code of 14. <FONT> tag can be set for a character, sentence
responsible behaviour on the Internet. This or entire document. This tag is generally used
field is sometimes also referred to by phrases for changing the appearance of a short
such as Internet ethics, computer ethics and segment of text.
information ethics. 15. The most well-known example of a copyleft or
2. <P> tag is used to mark a block of text as a reciprocal license is the GPL. These licenses
paragraph. It inserts a line break with extra allow you to modify the licensed code and
space in the beginning. distribute new works based on it, as long as
3. Hacking done by stealing classified you distribute any new works or adaptations
information, stealing passwords to get into a under the same software license.
site and also recasting a website without 16. Any software you did not pay for or see online
permission. for free that’s normally not free is considered
4. <SUB> tag is used to display subscript text. The pirated software. For example, Adobe
text which is lowered slightly below the Photoshop is a popular commercial image
baseline to appear below the surrounding text editor that must be paid for to use. If you
is known as subscript. found a way to install that software for free on
your computer, you are committing software
5. <! - - .... - - > tag is used to insert comments in piracy.
the source code of the web page. Comments
are not displayed in the browser’s window. 17. e-Commerce is the buying and selling of goods
and services over the Internet. It is conducted
6. Heading tag can also be used to give section over computers, tablets, smartphones and
headings. other smart devices.
7. <BASEFONT> tag affects all text in a document 18. Deceptive phishing is the most common type
that follows it. It has optional ending tag. of phishing. In this case, an attacker attempts
8. In HTML, images appear inline with a single to obtain confidential information from the
line of the text. victims.
9. Netiquette exists to help people to 19. hex_number specifies the text color with a
communicate more effectively whilst online hexadecimal code. Color name for hexadecimal
and to avoid unnecessary misunderstandings value #FF0000 is red.
and potential conflicts. 20. Inline images can occur within headings and
10. GET method sends the information to the paragraphs.
server. 21. A software license agreement is a legal
SAMPLE PAPER 10
11. A password field shows one dot for each document that stipulates several key
character input by the user. This prevents other conditions between a software company or
from seeing the password. developer and a user to allow use of the
software.
12. There are numerous types of the digital divide
that influence our efforts in accessing the 22. <B> tag is used to make the text bold and <OL>
Internet. Some of the vivid gaps in digital creates a numbered list.
inequality include gender divide, social divide 23. Software licenses typically provide end users
and universal access divide. with the right to one or more copies of the
13. An absolute URL contains all the information software without violating copyrights. The
necessary to locate a resource. license also defines the responsibilities of the
CBSE Sample Paper Computer Applications Class X (Term I) 121
parties entering into the license agreement and card and credit card payments. Secure
may impose restrictions on how the software electronic transaction was used to facilitate the
can be used. secure transmission of consumer card
information via electronic portals on the
24. <BR> tag is used to insert line break while
Internet.
<HR> creates a horizontal line.
38. ‘en’ as code is used for English of an element
25. <UL> (unordered list) is an indented list within
content and attribute values.
a bullet symbol in front of each list item.
39. <H1> heading element gives the most
26. The digital divide describes the gap between
prominent headings.
people who have access to affordable, reliable
Internet service (and the skills and gadgets 40. value attribute of <OPTION> tag specifies the
necessary to take advantage of that access) and value to be sent to the server when form is
those who lack it. submitted.
27. <HR> tag can be used to divide information Syntax <OPTION value=“value”>
into sections. 41. size attribute of <FONT> tag specifies the size
28. <P> tag is used to mark a block of text as a of the text.
paragraph. This is a container tag that has 42. <H1> defines the most largest heading level. Its
opening tag as well as closing tag. closing tag is </H1>.
29. Business-to Business (B2B) e-Commerce refers 43. src attribute takes URL of the image file that
to a business selling a good or service to you want to insert in the web page.
another business, like a manufacturer and
44. <U> specifies the underlined the text. It is a
wholesaler or a wholesaler and a retailer.
container tag and its closing tag is </U>.
30. <HR> tag is used to create horizontal line on
45. <HR> tag is used create horizontal line on web
your web page.
page.
31. The value of color can give with color name,
46. Plagiarism is presenting someone else’s work
hex_number or rgb_number.
or ideas as your own, with or without their
32. Definition lists are started with <DL> tag. consent, by incorporating it into your work
33. Phishing is a type of social engineering attack without full acknowledgement.
often used to steal user data, including login 47. Direct plagiarism is the act of copying another
credentials and credit card numbers. It occurs person’s work word for word. Inserting a
when an attacker, masquerading as a trusted paragraph from a book or an article into your
entity, dupes a victim into opening an E-mail, essay without including attribution or
instant message or text message. quotation marks, for example, is direct
34. The Freedom of Information (FOI) Act gives plagiarism.
you the right to request access to 48. If someone reuses his own work again without
government-held information. This includes the permission of the professor, it will be
information they hold about you or about considered as self-plagiarism.
government policies and decisions.
49. Accidental plagiarism is often the result of a
35. Combo box in HTML is used to display a drop disorganized research process and a
down list of some options from which one can last-minute time crunch.
be selected.
50. Paraphrased plagiarism involves making a few
SAMPLE PAPER 10
36. <TITLE> tag defines the title of the document. changes to someone else’s work, then passing
It is placed between <HEAD> and </HEAD> it off as your own. Unless a specific idea is
tags. common knowledge, you cannot include it in
37. Secure Electronic Transaction (SET) was an your paper without providing a citation even if
early communications protocol used by you do not include any direct quotes.
e-Commerce websites to secure electronic debit