0% found this document useful (0 votes)
12 views7 pages

Sample Paper-1 Computer Application

This document is a sample question paper for Class X Computer Applications (Code 165) with a total of 50 marks. It consists of five sections (A-E) covering various topics, including protocols, HTML, CSS, and ethical issues in technology. Each section contains different types of questions, including multiple choice, short answer, and long answer questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
12 views7 pages

Sample Paper-1 Computer Application

This document is a sample question paper for Class X Computer Applications (Code 165) with a total of 50 marks. It consists of five sections (A-E) covering various topics, including protocols, HTML, CSS, and ethical issues in technology. Each section contains different types of questions, including multiple choice, short answer, and long answer questions.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 7
Maximum Marks: 50 Sample Question Paper (Theory) Computer Applications (Code 165) Class -X General Instructions: 1 Nowsen This Question Paper has 5 Sections A-E. All Questions are compulsory. However, internal choices have been provided in some of the questions. Section A has 12 questions carrying 01 mark each. Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each. Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each. Section D has | Long Answer (LA) type question carrying 04 marks. Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each. Section — A (All questions are compulsory) Shreya wants to securely copy files between two Servers or two connected machines over the Internet. Which Protocol should she prefer for getting her task completed? A. FTP B. HTTP c. SCP D. Telnet Which of the following is not an e-governance project in India? A. www.drdo.nic.in B. www.passport.gov.in C. www.incometaxindia.gov.in D. www. flipkart.com Which tag besides can be used to make the text bold in HTML? A. B. C. D. What is the full form of SMTP? A. Simple Message Transfer Protocol B, Secure Message Transmission Protocol C. Simple Mail Transfer Protocol D. Secure Mail Transmit Protocol Page 1 of 7 Time Allowed: 2 hours Which protocol is used for video conferencing among multiple participants? A. Telnet B. Http C. VoIP D. SFTP Select the correct option to fill in the blank: ‘A website may consist of A. Static Webpages B. Dynamic Webpages C. Both a and b. D. Domain. ‘Aman, a student of Class X, wants to create numbered list in HTML, which of the following tag should he use? A.
    B.
      Cc.
      D. Making a copy of your webpage on the computer is known as A. Uploading B, Browsing C. Downloading D. None of the above. 10. Himani, a class X student, wants to remotely access a computer system far from her house. Which protocol, out of the following, should she prefer to access or log in it remotely? A. FTP B. SFTP C. TCP/IP D. TELNET ‘Anshu, a class X student, is writing CSS code for making all elements bold. Choose the correct code for getting the desired output from the following options: A. span{text-size:bold) B. span {font-weight:bold} C. D. Page 2 of 7 ‘Questions No-I & 12 are Assertion and Reason types. Each question consists of two statements, namely Assertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason. A B. Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A). Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A). CC. Assertion (A) is true and Reason (R) is false. D. Assertion (A) is false and Reason (R) is true. 11. Assertion (A) : A set of rules, used over the networks, is called a Protocol. 1 Reason (R) : HTML is an example of a Protocol. 12. Assertion (A) :Chat and e-mail are live/real time conversation between | 1 people/machines. Reason (R) : We have to be online in both Section — B 13. Mishika, a class X student, wants to use a software but does not want to pay for it. | 2 Which type of software can she use? Write one example of this type of software. 14. A) Write any two differences between e-Banking and e-Commerce. 2 OR B) What is e-learning? Name any one e-learning platform. 15. State whether the following statements are True or False: 2 |) HTML file extension is .tml. II) Rowspan attribute is used to make a cell span multiple rows. Ill) Unordered list type creates a bulleted list. IV) HREF Stands for hyper reference. 16. ‘Ay Your best friend emails you and tells you that he/she has created a webpage on | 2 an internet site having URL as: www.children.com/india/~abc.html Now you want to create a link to this web page from your web page. Write the HTML code to do this. OR B) 1) Write HTML code to display Horizontal line of red colour. ll) Write HTML Code to create a paragraph whose text colour is blue. 17. What is the purpose of HTML forms? Write HTML Code to create a Textbox in an HTML | 2 form. 18. Ay An incomplete CSS code within .. . is given below. Complete | 2 this code by filling in the blanks as per the specifications that follow: Page 3 of 7 19. Line 1: Page background colour should be Blue. Line 2: Colour of the Paragraph text should be green. Line 3: Font family of the Paragraph text should be Dotum. Line 4: The biggest heading should be black in colour. oR B) Hemant, a class X Student, is writing HTML code to create ordered and unordered lists for a webpage as follows:

      SOME STATES IN INDIA

      • penat: < > <1i>MUMBAI
      • < > II. 600"> III. 2. Consider the URL: https://wmmw.cbse.gov.in and answer the following questions: 3 |. Which component identifies the protocol? ll. What is the significance of °s" in https? lll, Expand the terms URL and WWW? 22. 23. A) Write any two ways to add an audio file in a web page using HTML? Explain with | 3 sample code. oR B) Write any two ways to add a video file in a web page using HTML? Explain with sample code. Write suitable HTML statements to display the following text on a webpag 1) NHs Nn ® I) (AB) Section — D 24, A) Write the HTML code to design the web page as shown below: - 4 Page 5 of 7 FEEDBACK FORM USERNAME [ENTER USER NAME GENDER : © MALE © FEMALE SELECT OUR BEST FOOD ITEMS CHOLE BHATURE BURGER RAWA DOSA_ PANEER TIKKA HOW'S OUR STAFF BEHAVIOUR! EXCEPTIONALLY GOOD ~ VERY GOOD & POLITE | coop | COULDBEBETTER | OR B) Write the HTML code to design the web page as shown below (Table border should be 2, height=100 and width=300 with cellpadding =20): - EMPLOYEE TABLE EMPLOYEE | EM@LOYEE = ae DEPARTMENT ANKIT HEMA HR MANISH FINANCE Section —E Mr. Anek comes from a village, which recently started seeing the digital revolution, and now the people of his village have access to the internet. They can shop online, make payments online, sell online and so on. Anek is also excited with these new changes. He ordered some items online and entered his bank card details on the webpage to make the payment. But still after passing of the promised due date, he has not received his ordered items. There is no way to contact the company as phones are unreachable and emails are not being responded. He also noticed after some days that someone is sending emails on his behalf, using his personal data. Page 6 of 7 Based on the above information answer the following questio I. Mr. Anek is a victim of Il, Mr, Anek finds that his personal details are now leaked, This means his is compromised. Ill. While filling out details online, Mr. Anek should have checked in the URL. IV. This type of incident will be recognized as a case of (Specify the type of crime) Based on the following information, answer the questions which follows: Shresth was a bright student who excelled in academics and extracurricular activities. He intent to take some quotes and literature from internet to write an Article for Newspaper. |. Identify the type of ethical issue he will face, in case he copies the work as discussed in the above case study. Il, Does the above incident described above can be considered as example of IPR (Intellectual Property Rights) Violation? Il, How can he avoid this ethical issue? IV. Suggest two netiquettes that Shresth’s classmates must be aware of. Page 7 of 7

You might also like