CHENNAI DISTRICT
Higher Secondary – First year (+1)
Half-Yearly Examination - Dec 2024
COMPUTER APPLICATIONS
ANSWER KEY
Time allowed: 3 Hrs] [Total Marks: 70
PART – I
Choose the most appropriate answer from the given four alternatives and write the
option code and the corresponding answer. 15 × 1 = 15
QN Answer Mark(s)
1 (c) RAM 1
2 (c) F 1
3 (a) Windows 1
4 (a) F2 1
5 (b) Find All 1
6 (c) Visicalc 1
7 (a) Normal 1
8 (a) World Wide Web Consortium 1
9 (b) # 1
10 (d) <b>, <i>, <u> 1
11 (a) method and action 1
12 (c) { } 1
13 (d) JavaScript 1
14 (d) do-while 1
15 (a) Ezhil 1
1
PART – II
Answer any SIX of the following: 6 × 2 = 12
Question number 24 is compulsory.
QN Answer Mark(s)
Primary Memory Secondary Memory
Used to temporarily store the Used to store the data permanently.
1
programs and data.
16 2
2 Volatile Non-Volatile
Example: Example:
3
RAM Hard Disk, CDROM, DVD ROM etc.,
The Program Counter (PC) is a special register in the CPU which always keeps the address
17
of the next instruction to be executed.
Files Folders
A folder stores files and folders. It is also
A file consists of a collection of data called a directory
18 2
Each file has its own extension A folder does not have any extension
Folder and sub folder cannot be created Folder and sub folder can be created in a
in a file folder
Copy-Paste Cut-Paste
Command: Command:
Copy: Cut:
Edit → Copy or Click “Copy” icon. Edit → Cut or Click “Cut” icon.
19 2
Paste: Paste:
Edit → Paste or Click “Paste” icon. Edit → Paste or Click “Paste” icon.
Keyboard Shortcut: Keyboard Shortcut:
Ctrl + C Ctrl + X
20 Browser is a software to view (surfing / browsing) information on the internet.
(i) <strong> - Important text:
• The <strong> tag is a phrase tag.
• It is used to define important text.
• This tag displays the text as bold.
21 1+1
(ii) <em> - Emphasized text:
• The <em> tag is used to emphasize the text.
• This tag displays the text as italics.
22 var variablename=(condition) ? value1 : value2; 2
<Form method=get/post action= "back_end_server_script">
23 Form elements 2
</Form>
24 01234 2
2
PART – III
Answer any SIX of the following: 6 × 3 = 18
Question number 33 is compulsory.
QN Answer Mark(s)
15010 = 100101102 1½
25
100101102 = 2268 1½
Advantages :
• All the tasks are given time and task switching time is very less so application don’t 1½
get interrupted by it.
• Many applications can run at the same time.
• Time sharing is batch systems increases performance.
• Provide quick response, avoids duplication of software, reduces CPU idle time.
26
Disadvantages:
• It consumes much resource.
• Switching between tasks between lots of users may hang up the system. 1½
• Problem of reliability, Question of security and integrity, Problem of data
communication.
(1) Place the insertion pointer in the row or column and right click.
(2) To insert a new row: Choose Row → Insert 3
27 To insert a new column: Choose Column → Insert
(3) Select the number of rows or columns and position from the dialog box appears.
(4) Finally click OK
There are five views are provided by Impress.
28 3
(1) Normal view (2) Outline view (3) Notes view (4) Slide Sorter view (5) Handout view
Attribute General Format Use
3
bgcolor = color <body bgcolor = color_name/color_code> To change
background
colour
text = color <body text = color_name/color_code> To change the
text colour
29
background=image <body To insert
background=“image_name_with_extenstion”> background
image
margin = value <body leftmargin=value topmargin = value> To setting
margins
(Any Three attributes)
(1) Attributes of <Select> tag:
Name : Provide the name to the control, which is sent to the server.
Size : Determine the style of dropdown list box. 2
Size = 1 dropdown list box
Size = 2 List box
30
Multiple: Allows user to select multiple values.
(2) Attributes of <Option> tag:
Selected: Indicate default selection. 1
Value : Value to be submitted to server.
• One of the built-in features of JavaScript is the ability to concatenate strings 2
(Joining two or more strings as single string).
• The + operator is also called as the string concatenation operator.
31
• Suitable Example: 1
3
• Encryption and decryption are processes that ensure confidentiality that only
authorized persons can access the information.
• Encryption is the process of translating the plain text data (plaintext) into random 3
32
and mangled data (called cipher-text).
• Decryption is the reverse process of converting the cipher-text back to plaintext.
33 Cube of the given number is 125 3
PART – IV
Answer all questions: 5 × 5 = 25
QN Answer Mark(s)
34
(a) Generations Main Component Features
• Big in size
5
First • Consumed more power
Vacuum Tubes
(1940–1956) • Malfunction
• Machine Language
• Smaller in size
Second • Less Heat
Transistors
(1956-1964) • Consumed less power
• Machine & Assembly language.
Third • Smaller, faster and reliable
(1964-1971) Integrated Circuits • Less power
• High Level Languages
Microprocessor
• Smaller and Faster
Fourth (Very Large Scale
• Microcomputer series developed
(1971-1980) Integrated
Circuits) • Portable Computers were introduced.
• Parallel Processing
Fifth Microprocessor • Super conductors
(1980-Till (Ultra Large Scale • Recognize Images and Graphics
date) Integration) • Artificial Intelligence and Expert Systems
• Solve high complex problems.
• Parallel and Distributed computing
• Smarter, faster and smaller
Sixth
• Development of robotics
(Future)
• Natural Language Processing (NLP)
• Development of Voice Recognition Software
34 JavaScript supports all the basic arithmetic operators like
(b) Addition (+), Subtraction (–), Multiplication (*), Division (/) and Modulus (%). 1½
Arithmetic
Meaning Example Result
Operator
+ Addition 20 + 10 30
- Subtraction 20 - 10 20 2
* Multiplication 20 * 10 200
/ Division 20 / 10 2
% Modulus 20 % 10 0
Suitable example: 1½
4
35 1. Select the file or folder that you wish to have as a shortcut.
(a) 2. Right click on the file or folder. 5
3. Select Send to from the shortcut menu, then select Desktop from the sub-
menu.
4. A shortcut for the file or folder will now appear on your desktop.
35 Page formatting is the process of format the page elements such as margins, 1
(b) numbering, page layout, headers and footers.
1. Changing page size:
• Select the page to be resized
• Select Format → Page, the page style dialog box appears 1
• Select Page Tab
• In the paper format group, select the format like A4, legal etc. Or set the
width and height.
2. Changing page margins
I. Using Ruler: 2
• Hold the mouse pointer over the line between the gray and white sections in
the Ruler.
• The mouse pointer turns into a double headed arrow.
• Hold down the left mouse button and drag to move the margin and release it
at the required point.
II. Using the Page Style dialog box:
• Choose Format → Page (or) Right-click anywhere on the page and select
Page from the popup menu.
• Page Style dialog box appears.
• Select Page tab if needed.
• In the Margins group, specify the values for left, right, top and bottom
margins.
• Finally, click OK.
3. Changing page Orientation
• Select the page. 1
• In the Page Style dialog box, under the Orientation group, Select Portrait or
Landscape button.
• Click ok button.
36 (1) Select cells from A1 to A15
(a) (2) Click, Edit → Fill → Series. Fill Series dialog box will appears. 5
(3) Set the following values:
Direction : Down
Series type : Growth
Start value : 5
End value : 2560
Increment : 2
(4) Finally Click, 'OK'.
(5) Now, the given series of values appeared on the worksheet.
36 1. Don’t give out your personal information – Don’t put personal details such
(b) as your home address, telephone numbers or parent’s work address online as Each 1
cybercriminals can use this information to create a fake profile with your details (5)
2. What goes online, stays online – Use privacy settings to make sure only
your friends and family can see photos you post. Avoid posting holiday plans
as criminals may track your movements
5
3. Check your security and privacy settings – Make sure your social network
privacy settings are secured so only your friends can see your personal
information and use your privacy settings to restrict who can see your posts,
videos and photos
4. Password safety – Sharing your password with your parents is a sensible
idea, but avoid sharing your password with your friends, even if they promise
they won’t tell anyone.
When setting your password, use a mixture of letters, numbers and upper and
lower case characters
5. Always protect your mobile device – Make sure your mobile phone is pin-
protected so all your personal information stored on it is safe. Download a
security app which allows you to remotely wipe any personal data, should your
mobile be lost or stolen
6. Don’t talk to strangers online or offline – Don’t meet up with strangers and
let your parents know if a stranger has tried to get in contact with you online.
7. Listen to the adults who are known to you – Adults will always be worried
about you. Help set their mind at rest and avoid chatting online with strangers.
8. Be wary of unsecured or unknown websites – When shopping online, use
reputable and known retailers.
9. Be careful what links you click on – Avoid clicking links in an email, Instant
Message or on your social network unless you are sure the message is from
someone you know.
(Any Five points)
37 (1) Clock Speed:
(a) • Every microprocessor has an internal clock that regulates the speed at which 1½
it executes instructions.
• The speed at which the microprocessor executes instructions is called the
clock speed.
• Clock speed is measured in MHz (Mega Hertz) or in GHz (Giga Hertz).
(2) Instruction Set
• A command which is given to a computer to perform an operation on data is
called an instruction.
• Basic set of machine level instructions that a microprocessor is designed to 2
execute is called as an instruction set.
• This instruction set carries out the following types of operations:
o Data transfer
o Arithmetic operations
o Logical operations
o Control flow
o Input/output
(3) Word Size
• The number of bits that can be processed by a processor in a single instruction
is called its word size.
• Word size determines the amount of RAM that can be accessed by a 1½
microprocessor at one time and the total number of pins on the
microprocessor.
37 (1) Cellspacing
(b) • It is used to set the space between cells in a table. Each 1
• The value should be in pixels (5)
(2) Cellpadding
• It is used to set the space between the contents of a cell and its border.
6
• The value should be in pixels.
(3) Border:
• It is used to specify the thickness of the border lines around the table.
• The default value is Zero in most of the browsers.
(4) Bordercolor:
• It is used to apply colour to the border lines.
(5) Align:
• It is used to set the position of the table within the browser window.
• Right or center may be the value of align attribute.
(6) BGcolor
• It is used to apply background colour to the table.
(7) Height and Width
• They are used to specify the height and width of a table in terms of pixels or
percentage.
(Any Five attributes)
38 <html>
(a) <head> 5
<script>
var x = 1;
while(x<=10)
{
document.write( x + "<br>");
x++;
}
</script>
</head>
</html>
(OR)
Any suitable JavaScript using while loop.
38 <html>
(b) <head> 5
<title> My School </title>
</head>
<body align=center>
<h1> Chennai Higher Secondary School </h1>
<h2> Rotler Street, Choolai, Chennai - 600 112. </h2>
<h3> Tamil Nadu </h3>
</body>
</html>
(OR)
Any suitable JavaScript using while loop.
-o O o-