0% found this document useful (0 votes)
55 views

Selfstudys Com File

Important for all
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views

Selfstudys Com File

Important for all
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

SAMPLE QUESTION PAPER - 3

Computer Applications (165)


Class X (2024-25)

Time Allowed: 2 hours Maximum Marks: 50


General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, an internal choice of approximately 30%
is provided.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Very Short Answer (VSA) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04
marks each.
Section A
1. Why these four elements (confidentiality, integrity, authenticity and availability) are [1]
considered fundamental?

a) They help understands security b) They help to understand the


and its components better cyber-crime better

c) They help understanding d) They are key elements to a


hacking better security breach

2. IRC stands for ________. [1]

a) International Relay Chat b) Intranet Relay Chat

c) Internet Relay Chat d) International Relay Chatting

3. ________ is a secure technique to protect data being transmitted over a network. [1]

a) Digital property b) Encryption

c) E-commerce d) Plagiarism
4. ________ allows remote accessing to the files which contain programs, technical [1]
handouts, reports etc.

a) FTP b) Remote Desktop

c) Telnet d) Chat

5. It is a program or a component on client side that requests and uses services [1]
provided by web server:

a) web browser b) web client

c) web portal d) website

6. Apart from <b> tag, what other tag makes text bold? [1]

a) <strong> b) <emp>

c) <fat> d) <black>

7. Which of the following tags gives the strikethrough effect? [1]

a) <HEAD> b) <SUB>

c) <SUPER> d) <STRIKE>

8. External Style sheet consists of the following: [1]

a) All of these b) HTML tags

c) <Style> d) CSS definitions

9. Empty elements are also referred as ________. [1]

a) clear elements b) valid elements

c) void elements d) Both void elements and clear


elements

10. Which of the following options is INVALID attribute of HTML <img> tag? [1]

a) src b) alt

c) width d) color
11. Assertion (A): Unordered lists are bulleted lists. [1]
Reason (R): <ul></ul> used to show unnumbered lists.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

12. Assertion (A): The inline property specifies a line to be drawn around elements. [1]
The line is drawn outside the borders to make the element 'stand out’ and to
enhance its impact.
Reasons (R): Different types of outline properties such as outline-style, outline-
color, outline-width can be specified for an HTML tag.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

Section B
13. What does a minus sign used with keywords in the search box mean? [2]

14. What are the two main parts of an email address? [2]

OR
How would you ensure that the website on which you are keying in your personal
details is a secured one?

15. What is the purpose of MAlLTO function? [2]

16. Name three types of law that can help restrict software piracy. [2]

OR
What do you understand by SSL?

17. Observe the following code and give the output. [2]
<HTML>
<HEAD>
<style type="text/css">
#p1
{
font-size: 15 pt;
text-align: center;
color: blue;
}
</style>
</HEAD>
<BODY>
<p id = "p1"> welcome to the class of CSS</p>
<p> CSS enhances the looks of a webpage</p>
</BODY>
</HTML>

18. What are the different types of lists available in HTML? [2]

OR
The syntax of <A> tag is:
<A href = "‘filename">Text to be displayed </A>. Explain href.

19. What is the difference between Radio Button and Checkbox? [2]

Section C
20. Who is a black hat hacker? [3]

21. What are the proposed applications of 5G? [3]

22. Consider the following webpage and write a code according to given instructions: [3]

i. The background colour is yellow.


ii. The heading “Personal Details Form” is of 30 point size.
iii. The program that recieves the filled in detalis is ‘personal-html’.

OR
Briefly explain the precedence order of style sheets.
23. Which software will be called open-source software? Mention any two popular [3]
open-source software.

Section D
24. Write the HTML code to generate the following output of a table with content [4]
exactly is the same format as shown in the table:
ADMNO SNAME NAME DOB Opening Balance
1110 MANJIT RANJIT 4-MAR-1988

OR
List and explain the different attributes of body tag?

Section E
25. Read the text carefully and answer the questions: [4]
Embed Audio Element: The HTML <AUDIO> element is used to embed sound
content in documents. It may contain one or more audio sources, represented using
the SRC attribute. The <AUDIO> element defines an in-browser audio player. The
audio player can provide a single piece of audio content. To specify the source file
of the audio content, use one or more <SOURCE> elements inside the <AUDIO>
element. All <SOURCE> files should contain the same audio content but in
different file formats. The browser will select the first file format that it is able to
play. If you are not going to provide multiple source file formats, you may indicate
the source file in the SRC attribute, instead of in a separate <SOURCE> element.

(i) Define audio tag.

(ii) <AUDIO> tag is used under which tag?

(iii) Which attribute specifies the location of the audio file?

(iv) Name the attributes of <SOURCE> tag.

26. Read the text carefully and answer the questions: [4]
Sachin Sharma is a Public Relations Officer in IDB Bank. His job responsibility is
to make new customers for his bank. During work from home period, he made
contacts with his customers on phone calls and by emails.

(i) Sachin can send email using his ________.

(ii) The customers usually mark such mails as spam. What is spam?
(iii) If any customer wants to download the mail sent by Sachin then it can be done from
________.

(iv) If Sachin wants to send the same promotional mail to multiple customers, then what
should he do?
Solution
SAMPLE QUESTION PAPER - 3
Computer Applications (165)
Class X (2024-25)
Section A
1. (a) They help understands security and its components better
Explanation:
They help understands security and its components better
2.
(c) Internet Relay Chat
Explanation:
Internet Relay Chat
3.
(b) Encryption
Explanation:
Encryption
4. (a) FTP
Explanation:
FTP
5.
(b) web client
Explanation:
web client
6. (a)
<strong>

Explanation:
<strong>

7.
(d)
<STRIKE>

Explanation:
<STRIKE>

8.
(d) CSS definitions
Explanation:
CSS definitions
9.
(c) void elements
Explanation:
void elements
10.
(d) color
Explanation:
color
11. (a) Both A and R are true and R is the correct explanation of A.
Explanation:
Both A and R are true and R is the correct explanation of A.
12.
(d) A is false but R is true.
Explanation:
A is false but R is true.
Section B
13. The minus sign in front of a word or phrase means that the specified word must not appear
in matched documents.
For example, India - Delhi, will exclude all information from Delhi in the search.
14. i. Username
ii. Domain name of host server
Ex: [email protected]
OR
If the URL of the website starts with ‘HTTPS’ and there is a padlock sign on the
navigation bar of the browser, it indicates that the website is a secured one.
15. The MAILTO function is used to send e-mail messages to multiple recipients. For this, we
only need to type the e-mail address of the recipients in the same link separated by
commas.
16. The following are the three types of law that can help to restrict software piracy:
i. Copyright
ii. Patent
iii. Trademark
OR
SSL stands for Secure Sockets Layer. It is a standard security protocol which establishes
encrypted links between a web server and a browser in an online communication.
17. The text ‘welcome to the class of CSS’ will be displayed blue in colour, centered and with
font size of 15 points.
The text ‘CSS enhances the looks of a webpage ‘ will be displayed with default settings.
18. There are 3 types of lists ordered lists, unordered lists and definition lists.
OR
HREF stands for Hypertext Reference. It is used with <A> tag to create a link to some
other document or a section of same or another webpage.

19. Checkbox Radio button


In this, user can select any one option at a It this, user can select one; or more than
time. one option at a time.
In HTML, the code for the checkbox is <input In HTML, the code tor the radio button is
type = "checkbox"> <input type = "radio>
Section C
20. When a person breaks into a computer system like a hacker but tries to steal the
passwords, files or other information with the intention to misuse it, the person is
considered a black hat hacker. A black hat hacker is also called a cracker or a cyber-
criminal.
21. Applications of 5G are beyond our imagination. User never experienced ever before such
high-value technology which includes all type of advanced features. Some of the proposed
applications of 5G (Fifth Generation) are:
Charge our mobile using our own heart beat.
Feel our parent's sugar level with our mobile.
Know the exact time of our child birth in nano seconds.
View our residence in our mobile when someone enters and also when someone opens
our intelligent car.
Sense Tsunami/Earthquake before it occurs.
Access our office desktop, laptop, car, bike using our mobile.
Identify our stolen mobile within nanoseconds.
Our mobile can share our workload, identify the best server and also intimate us
before the call drops.
22. code:
<html>
<head>
<title>Example web page</title>
</head>
<body bgcolor=yellow>
<h1>Personal Details Form</h1>
<form action="personal.html" method="get">
<b>Username</b>
<input type = "text" name = "account
holder name" value= "Enter your name" size= "30">
<button type="button">submit</button>
</form>
</body>
</html>

OR
The precedence order of style sheets are as follows:
i. Internal Style Sheet: The internal style sheet has the highest priority. So, it will
override any rule defined in the <STYLE> ... </STYLE> tags or the rules defined in
any external style sheet file.
ii. Inline Style Sheet: After the internal style sheet, the second priority is given to the
inline style sheet. Any rule defined in the <STYLE> ... </STYLE> tags will override
rules defined in any external style sheet file.
iii. External Style Sheet: The external style sheet has the least priority. Any rule defined in
an external style sheet file takes the lowest priority, and rules defined in this file will be
applied only when the above two rules are not applicable.
23. Open-source software is software that is released under a license that allows users to view,
modify, and distribute the source code freely. Two popular examples of open-source
software are:
i. Linux: An open-source operating system that is widely used in various applications,
from personal computers to servers and embedded systems. It offers flexibility, stability,
and a vast ecosystem of software.
ii. Mozilla Firefox: An open-source web browser that prioritizes user privacy, security,
and customization. It is known for its speed, extensive add-ons, and cross-platform
compatibility.
Section D
24. <HTML>
<BODY>
<TABLE BORDER = "2" WIDTH = "500">
<TR ALIGN = "CENTER" VALIGN = "MIDDLE">
<TH> ADMNO</TH>
<TH> SNAME </TH>
<TH> NAME </TH>
<TH> DOB</TH>
<TH> Opening Balance </TH> </TR>
<TR ALIGN = "CENTER" VALIGN = "MIDDLE">
<TD> 1110 </TD>
<TD> MANJIT </TD>
<TD> RANJIT </TD>
<TD> 4-MAR-1998</TD>
</TR>
</TABLE>
</BODY>
</HTML>

OR
Attribute Description
Specifies the color of an active link in a
alink
document. <body alink="green">
Specifies a background image for a document.
background
<body background="../images/back.gif">
Specifies the background color of a document.
bgcolor
<body bgcolor="green">
Specifies the color of unvisited links in a
link
document. <body link="blue">
Specifies the color of the text in a document.
text
<body text="#FF0000">
Specifies the color of visited links in a document.
vlink
<body vlink="#AAAAFF">
Sets a left-hand margin for your body element.
left margin
<body leftmargin ="60">
Sets a margin along the top of your body element.
topmargin
<body leftmargin ="60">
Section E
25. Read the text carefully and answer the questions:
Embed Audio Element: The HTML <AUDIO> element is used to embed sound content
in documents. It may contain one or more audio sources, represented using the SRC
attribute. The <AUDIO> element defines an in-browser audio player. The audio player can
provide a single piece of audio content. To specify the source file of the audio content, use
one or more <SOURCE> elements inside the <AUDIO> element. All <SOURCE> files
should contain the same audio content but in different file formats. The browser will select
the first file format that it is able to play. If you are not going to provide multiple source
file formats, you may indicate the source file in the SRC attribute, instead of in a separate
<SOURCE> element.
(i) The <audio> tag is used to embed sound content in a document, such as music or other
audio streams.
The <audio> tag contains one or more <source> tags with different audio sources. The
browser will choose the first source it supports.
(ii) <AUDIO> tag is used under <BODY> tag.
(iii)SRC attribute.
(iv)SRC and TYPE are the attributes of <SOURCE> tag.

26. Read the text carefully and answer the questions:


Sachin Sharma is a Public Relations Officer in IDB Bank. His job responsibility is to
make new customers for his bank. During work from home period, he made contacts with
his customers on phone calls and by emails.
(i) 1. Email Id
(ii) Spam is defined as irrelevant or unsolicited e-mails sent typically to a large number of
users, for the purpose of advertising, phishing, spreading malware, etc.
(iii)1. Mail box
(iv)He can give multiple email addresses in ‘To’ field separated by a comma.

You might also like