0% found this document useful (0 votes)
60 views

Computer Sample Question Paper 4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
60 views

Computer Sample Question Paper 4

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

SAMPLE QUESTION PAPER-4

Computer Applications (165)


Class X (2024-25)
Maximum Marks: 50
Time Allowed: 2 hours
General Instructions:

1. This Question Paper has 5 Sections A-E.


2. All Questions are compulsory. However, an internal choice of approximately 30%
is provided.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Very Short Answer (VSA) type questions carrying 02 marks cach.
5. Section Chas 4 Short Answer (SA) type questions carying 03 marks each.
6. Section Dhas 1 Long Answer (LA) type question carrying 04 marks.
7. Section Ehas 2 Source bascd /Case-based /Passage based Questions carrying 04
marks cach.
Section A

1. Which of the following is not considered as netiquette?


a) Avoid posting offensive b) Avoid trolling people by your
comments comments

c) Sending unsolicited email d) Respect other people's privacy

2. The words typed in search box are called


a) Phrases b) Answer

c)Keywords d) earch words


3. Select the e-commerce fraud from the folloiwng list:

a)phishing b)Allof these


c)identity theft d)payment fraud

4. IP addresses of two computers on a network:


a)are not defincd b)can be the same
c)cannot be the same d) must match with a third
computer

5 Which of the following agencies initially started the project Internet?


a) NSA b) NSF
c)ARPA d).NET

6. Following tag stands for - <a>

a) Anchor Tag b) Additional Tag


c)Active Tag d) Action Tag

7 The <A> tag is:


a)a container tag b)a open tag
c)an empty tag d)a closing tag

8 The full form of CSS is:

a) Coloured Style Sheet b) Common Style Sheets


c)Cascading Style Sheets d) Cascading Sample Sheets
9 Priyanka has developed two separate webpages. Now she wants to link the two
pages. What is this type of linking called?
a) lInternal linking b) Extemal Linking
c)Hyper linking d) Web linking

10. Which of the following tags is used to position the images in a web page?
a)<ALIGN> b) <SRC>

c)<IMG> d)<ALT>
11 Assertion (A): The external style sheet is the one that we define in the same HTML [1|
page in which we want to use the styles.
Reason (R): The styles can even be defined in the HTML code along with the code
for which we want to define styles. Such style sheets are known as inline style
sheets.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the corect explanation of
A.

c)A is true but R is false. d)A is false but R is true.

12 Assertion (A): A web browser is an application software that lets you open and
visit websites on the devices like computers, laptops, tablets and smartphones.
Various types of web browsers are the Microsoft Internet Explorer, Google
Chrome, UC Browser, ete.
Reason (R): Markup means to instruct the web browser program. HTML tags are
actually HTML commands that mark up or instruct a web browser how to display
the page in the web browser view.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c)A is true but R is false. d)A is false but R is true.

Section B
13 Search engine maintains an index of searched pages. Define indexing in terms of (2]
search engine.
14 Newsgroups and emails both can be used to communicate. How is newsgroup [21
different from E-mail messages?
OR

Write two advantages of 4G over 3G Mobile communication technologies in terms of


speed and services.
15 Explain the given command: [21
<A HREF =wild html">Click Here for wild animals</A>

16 Name two types of software in terms of licensing


OR

Sunita wants to buy and sell goods online. Which term is used to describe this process?
17. Mention the properties of CSS used to insert Letter spacing in a line. |2]

18, Which three tags are used to create definition lists? [2


OR

Name the attribute of the anchor tag that specifies where to open the linked document.
19. Name the attributes of <<SELECT> tag which are used to create drop-down menus. 2]
Section C

20. What do you understand by the term secure data transmission? Mention any two [3]
main points to ensure secure data transmission in e-commerce.
21. Define the following terms: (3]
i. Wink
iü. Pipl
i. Peek You
22. Explain the text-transform property with all its values. 3|
OR

Discuss diferent border properties.


23 What can you do to avoid plagiarism? Write any three points. 3|
Section D

24. Identify the erors in the following HTML code and write the correct code with (4)
each correction underlined.
<HTML>
<TITLE> IMAGES <HEAD>
<BODY bgcolor ="PICJPG>
IMG href-"ABC JPG>
HERE IS MY IMAGE FILE
<BGCOLOR>
<SHTML>

OR
Create a web page to demonstrate how to create a link within the same page.
Section E
25 Read the text carefully and answer the questions: 4)
Outline Property: The outline property specifies a line to be drawn around
elements. The line is drawn outside the borders to make the element 'stand out' and
to enhance its impact. Different types of outline properties such as outline-style,
outline-colour, outline-width can be specified for an HTML tag.
() Which property applies an outline that makes the box look like it is embedded in
the page?

(ü) Why the Outlines are different from the borders?


(ii) Which property applies an outline that makes the box look like it is coming out of
the canvas?

(iv) What are the different types of outline properties which can be specified for an
HTML tag?
26. Read the text carefully and answer the questions: 4]
Zeeshan is a student of XYZ school and is an excellent poet. He decides to upload
some of his poems on his blog. After few days, he notices that his classmate, Antara
has uploaded Zeeshan's poem on her Facebook page, mentioning Antara as its poet.
) ldentify the type of cy bererime, Zeeshan is a victim of.
(i) Zeeshan informs his class teacher about the incident. The school decides to hold a
seminar for its students to make them aware of moral principles that determine
behaviour of students when they are online. These are called
(iii) The rights of Zeeshan have been violated.
(iv) One of the students requests the expert to give tips on using their email account in a
secure manner. The expert advises the students to never share their with
anyone

You might also like