0% found this document useful (0 votes)
12 views7 pages

Solutions Class 10

Uploaded by

rs0504434
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views7 pages

Solutions Class 10

Uploaded by

rs0504434
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 7

Class: X

Session: 2023-24

**Computer Applications**

Answer Key for Sample Question Paper (Theory)

---

### SECTION A

(All questions are compulsory, 1 mark each)

1. The acronym URL stands for:

a. Uniform Resource Locator

2. Which tag is used to create a hyperlink in HTML?

c. <a>

3. CSS stands for:

b. Cascading Style Sheets

4. Which of the following is NOT an example of cybercrime?

d. Creating a personal blog

5. The tag used to create an ordered list in HTML is:

b. <ol>
6. Which CSS property is used to set the background color of a web page?

c. background-color

7. Which protocol ensures secure data transmission over the internet?

c. HTTPS

8. The <title> tag in HTML is used for:

a. Specifying the title of a web page

9. What is the purpose of the "alt" attribute in the <img> tag?

b. To provide alternate text for the image

10. Name the malware that locks users out of their system until a ransom is paid:

c. Ransomware

11. Assertion and Reason:

d. (A) is false, and (R) is true.

12. Assertion and Reason:

a. Both (A) and (R) are true, and (R) is the correct explanation of (A).

---

### SECTION B

(2 marks each)

13. Two advantages of using CSS in web development:


- It separates content from design, making the code easier to maintain.

- Styles can be reused across multiple pages, saving development time.

14. Comparison of <ul> and <ol> tags:

- <ul>: Used to create unordered (bullet point) lists.

- <ol>: Used to create ordered (numbered) lists.

15. Phishing: A method used to fraudulently obtain sensitive information by impersonating legitimate

entities.

- Prevention: Avoid clicking on suspicious links and use secure websites.

16. Two ethical guidelines for internet use:

- Respect others' privacy and avoid hacking into accounts.

- Do not plagiarize or use copyrighted material without permission.

17. HTML code for a hyperlink that opens in a new tab:

<a href="https://example.com" target="_blank">Visit Example</a>

18. Two purposes of using the "class" attribute in CSS:

- To apply specific styles to multiple elements.

- To group elements for easier identification in JavaScript.

19. Purpose of using comments in CSS:

- To provide explanations or annotations for the code.

Example:

/* This sets the background color to blue */

body {
background-color: blue;

---

### SECTION C

(3 marks each)

20. HTML code for a paragraph and heading:

<p style="color: red;">This is a paragraph.</p>

<h1 style="color: blue; background-color: yellow;">This is a heading</h1>

21. Three features of HTML5:

- New semantic tags like <header>, <footer>, and <article>.

- Support for audio and video elements without additional plugins.

- Improved form controls with attributes like "placeholder" and "required".

22. CSS rule for styling <h2> tags:

h2 {

border: 2px solid green;

font-weight: bold;

font-size: 20px;

23. Difference between inline, internal, and external CSS:

- Inline CSS: Applied directly within an element's "style" attribute.

- Internal CSS: Defined within a <style> tag in the <head> section of the HTML document.
- External CSS: Stored in a separate file and linked to the HTML document using a <link> tag.

24. HTML code for a table:

<table border="1">

<tr>

<th>Name</th>

<th>Age</th>

<th>City</th>

</tr>

<tr>

<td>Alice</td>

<td>25</td>

<td>New York</td>

</tr>

<tr>

<td>Bob</td>

<td>30</td>

<td>Los Angeles</td>

</tr>

</table>

---

### SECTION D

(4 marks each)

25. HTML form for user input:


<form action="/submit" method="post">

<label for="name">Name:</label>

<input type="text" id="name" name="name" required><br><br>

<label for="email">Email:</label>

<input type="email" id="email" name="email" required><br><br>

<label for="password">Password:</label>

<input type="password" id="password" name="password" required><br><br>

<button type="submit">Submit</button>

</form>

---

### SECTION E

(4 marks each)

**Case Study 1:**

26.

a. Tools for communication: Zoom, Microsoft Teams.

b. Protocol for secure transmission: HTTPS.

c. Importance of strong passwords: Prevents unauthorized access and secures sensitive data.

d. Precaution to avoid malware: Install and update antivirus software regularly.

**Case Study 2:**

27.

a. Ethical practices: Respect copyright laws and give credit to original sources.

b. Plagiarism: Copying content without permission; it's unethical and illegal.

c. Safety tips: Use strong passwords and enable two-factor authentication.


d. Importance of antivirus updates: Protects against the latest threats and vulnerabilities.

---

You might also like