[go: up one dir, main page]

0% found this document useful (0 votes)
33 views11 pages

Selfstudys Com File (1) (4)

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 11

SAMPLE QUESTION PAPER - 4

Computer Applications (165)


Class X (2024-25)

Time Allowed: 2 hours Maximum Marks: 50


General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, an internal choice of approximately 30%
is provided.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Very Short Answer (VSA) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04
marks each.
Section A
1. Which of the following is not considered as netiquette? [1]

a) Avoid posting offensive b) Avoid trolling people by your


comments comments

c) Sending unsolicited email d) Respect other people’s privacy

2. The words typed in search box are called [1]

a) Phrases b) Answer

c) Keywords d) earch words

3. Select the e-commerce fraud from the folloiwng list: [1]

a) phishing b) All of these

c) identity theft d) payment fraud

4. IP addresses of two computers on a network: [1]

a) are not defined b) can be the same


c) cannot be the same d) must match with a third
computer

5. Which of the following agencies initially started the project Internet? [1]

a) NSA b) NSF

c) ARPA d) .NET

6. Following tag stands for - <a> [1]

a) Anchor Tag b) Additional Tag

c) Active Tag d) Action Tag

7. The <A> tag is: [1]

a) a container tag b) a open tag

c) an empty tag d) a closing tag

8. The full form of CSS is: [1]

a) Coloured Style Sheet b) Common Style Sheets

c) Cascading Style Sheets d) Cascading Sample Sheets

9. Priyanka has developed two separate webpages. Now she wants to link the two [1]
pages. What is this type of linking called?

a) Internal linking b) External Linking

c) Hyper linking d) Web linking

10. Which of the following tags is used to position the images in a web page? [1]

a) <ALIGN> b) <SRC>

c) <IMG> d) <ALT>
11. Assertion (A): The external style sheet is the one that we define in the same HTML [1]
page in which we want to use the styles.
Reason (R): The styles can even be defined in the HTML code along with the code
for which we want to define styles. Such style sheets are known as inline style
sheets.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

12. Assertion (A): A web browser is an application software that lets you open and [1]
visit websites on the devices like computers, laptops, tablets and smartphones.
Various types of web browsers are the Microsoft Internet Explorer, Google
Chrome, UC Browser, etc.
Reason (R): Markup means to instruct the web browser program. HTML tags are
actually HTML commands that mark up or instruct a web browser how to display
the page in the web browser view.

a) Both A and R are true and R is b) Both A and R are true but R is
the correct explanation of A. not the correct explanation of
A.

c) A is true but R is false. d) A is false but R is true.

Section B
13. Search engine maintains an index of searched pages. Define indexing in terms of [2]
search engine.

14. Newsgroups and emails both can be used to communicate. How is newsgroup [2]
different from E-mail messages?

OR
Write two advantages of 4G over 3G Mobile communication technologies in terms of
speed and services.

15. Explain the given command: [2]


<A HREF ="wild.html">Click Here for wild animals</A>

16. Name two types of software in terms of licensing. [2]


OR
Sunita wants to buy and sell goods online. Which term is used to describe this process?

17. Mention the properties of CSS used to insert Letter spacing in a line. [2]

18. Which three tags are used to create definition lists? [2]

OR
Name the attribute of the anchor tag that specifies where to open the linked document.

19. Name the attributes of <SELECT> tag which are used to create drop-down menus. [2]

Section C
20. What do you understand by the term secure data transmission? Mention any two [3]
main points to ensure secure data transmission in e-commerce.

21. Define the following terms: [3]


i. Wink
ii. Pipl
iii. PeekYou

22. Explain the text-transform property with all its values. [3]

OR
Discuss different border properties.

23. What can you do to avoid plagiarism? Write any three points. [3]

Section D
24. Identify the errors in the following HTML code and write the correct code with [4]
each correction underlined.
<HTML>
<TITLE> IMAGES </HEAD>
<BODY bgcolor ="PICI.JPG">
<IMG href="ABC.JPG">
HERE IS MY IMAGE FILE
</BGCOLOR>
</HTML>

OR
Create a web page to demonstrate how to create a link within the same page.

Section E
25. Read the text carefully and answer the questions: [4]
Outline Property: The outline property specifies a line to be drawn around
elements. The line is drawn outside the borders to make the element 'stand out' and
to enhance its impact. Different types of outline properties such as outline-style,
outline-colour, outline-width can be specified for an HTML tag.

(i) Which property applies an outline that makes the box look like it is embedded in
the page?

(ii) Why the Outlines are different from the borders?

(iii) Which property applies an outline that makes the box look like it is coming out of
the canvas?

(iv) What are the different types of outline properties which can be specified for an
HTML tag?

26. Read the text carefully and answer the questions: [4]
Zeeshan is a student of XYZ school and is an excellent poet. He decides to upload
some of his poems on his blog. After few days, he notices that his classmate, Antara
has uploaded Zeeshan's poem on her Facebook page, mentioning Antara as its poet.

(i) Identify the type of cybercrime, Zeeshan is a victim of.

(ii) Zeeshan informs his class teacher about the incident. The school decides to hold a
seminar for its students to make them aware of moral principles that determine
behaviour of students when they are online. These are called ________.

(iii) The ________ rights of Zeeshan have been violated.

(iv) One of the students requests the expert to give tips on using their email account in a
secure manner. The expert advises the students to never share their ________ with
anyone.
Solution
SAMPLE QUESTION PAPER - 4
Computer Applications (165)
Class X (2024-25)
Section A
1.
(c) Sending unsolicited email
Explanation:
Sending unsolicited email
2.
(c) Keywords
Explanation:
The queries or terms entered to search a particular information in search engine are called
keywords.
3.
(b) All of these
Explanation:
All of these
4.
(c) cannot be the same
Explanation:
cannot be the same
5.
(c) ARPA
Explanation:
ARPA
6. (a) Anchor Tag
Explanation:
Anchor Tag
7. (a) a container tag
Explanation:
a container tag
8.
(c) Cascading Style Sheets
Explanation:
Cascading Style Sheets
9.
(b) External Linking
Explanation:
External Linking
10. (a) <ALIGN>
Explanation:
<ALIGN>
11.
(d) A is false but R is true.
Explanation:
A is false but R is true.
12.
(b) Both A and R are true but R is not the correct explanation of A.
Explanation:
Both A and R are true but R is not the correct explanation of A.
Section B
13. Indexing is the process to store and organize the content found during the crawling
process. Once a page is in the index, it’s in the running to be displayed as a result to
relevant queries.

14. Email Newsgroups


Email is used to send written messages
A newsgroup is like a community bulletin
between individuals or groups of
board.
individuals.
Only the users marked as recipient can Every message sent by any user is posted by
read a mail message. the news server for everyone to read.
One can send message or read a message on a
We can send/recieve message from any
particular newsgroup for which he/she has
of the mail server applications.
subscribed.
OR
Speed: 4G offers speed of more than 10 Mbps while 3G around 3 Mbps.
Services: It can prioritise services to offer flawless performance. Ex: VoIP is prioritised
over other data to offer flawless calling experience.
15. In this command, anchor <a> tag and its href attribute is included. The text (Click Here for
wild animals) will appear underlined and indicates that clicking the text activates the
hypertext link.
The address of the referenced document can be specified by an absolute or relative URL.
Thus, "wild.html" is an URL or Web page address and Click Here for wild animals is the
hyperlinked text.
16. The two types of software are: Open source software and Proprietary software.
OR
E-commerce is the term used to describe this process.
17. Letter-spacing property is used to insert Letter spacing in a line.
18. i. <dl> (Definition List)
ii. <dt> (Definition Term)
iii. <dd> (Definition Description)
OR
The target attribute of the anchor tag specifies where to open the. linked document.
19. There are various attributes of <SELECT> tag
Attribute Use Syntax
<SELECT name
name It shows the name of drop-down
="name">
It displays height of the list. If it is 1 (or omitted), the list <SELECT size
size
is a drop-down menu, otherwise it is a scrolled list. ="value">
This attribute specifies that a drop-down list should be <SELECT
disabled
disabled. disable>
Section C
20. Secure data transmission refers to the protection of data during its transfer from one
location to another, ensuring confidentiality and integrity. Two main points to ensure
secure data transmission in e-commerce are implementing encryption technologies like
SSL/TLS and using secure communication protocols like HTTPS, which encrypt and
authenticate the data exchanged between the client and the server.
21. i. Wink: It searches across what we would find using a regular search engine as well as
across social communities, online profiles, etc. We can also use Wink to manage our
online presence by creating a Wink profile.
ii. Pipl: It is a people search engine that is used to find information about people.
iii. PeekYou: It checks the databases of websites like Pinterest, Linkedin, Instagram and
more and thus helps in giving the search results.
22. The text-transform property changes the capitalization of text within an element. lt can be
used to make text appear in all-uppercase or all-lowercase, or with each word capitalized.
Following are the possible values for text-transform property:
i. capitalize - The first letter of each word in the element’s text will be capitalized.
ii. uppercase - All of the characters in the element’s text will be uppercase (capital letters).
iii. lowercase - All of the characters in the element’s text will be lowercase.
iv. none - The capitalization of the element’s text should not be altered.
OR
The border properties are used to specify the border-style, border-color, border-width, etc.
Different border-style properties are as follows:
i. Border-color: This property specifies the colour of a border.
ii. Border-style: This property specifies whether a border should be solid, dashed line,
double line or one of the other possible values.
iii. Border-width: This property specifies the width of a border.
23. To avoid Plagiarism one should follow these guidelines:
i. Give credit to the creator if someone’s original or intellectual work is used.
ii. Use quotation marks for another person’s actual spoken or written words.
iii. Take the permission of the author or owner wherever required.
Section D
24. Error 1 The <TITLE> tag must be within <HEAD> tag.
Error 2 bgcolor attribute of BODY element supports a color like red, green or its color
value.
Error 3 <IMG> tag needs a source attribute src to place an href.
Error 4 BODY element must be closed not bgcolor attribute.
The correct code is as follows:
<HTML>
<HEAD>
<TITLE>IMAGES</TITLE>
</HEAD>
<BODY bgcolor ="yellow">
<IMG src="ABC.JPG">
HERE IS MY IMAGE FILE
</BODY>
</HTML>

OR
<!DOCTYPE html>
<html>
<body>
<h2><a id="top"> Laws of motion</a></h2>
<h2>First Law of Motion</h2>
<p>An Object continues to be in a state of rest or of uniform motion along a straight l
<h2>Second Law of Motion</h2>
<p>The rate of change of momentum of an object is proportional to the applied unbala
<h2>Third Law of Motion</h2>
<p>To every action, there is an equal and opposite reaction and they act on two differe
<br />
<a href="top">Go to top</a>
</body>
</ht l>
OBJECT:

Section E
25. Read the text carefully and answer the questions:
Outline Property: The outline property specifies a line to be drawn around elements. The
line is drawn outside the borders to make the element 'stand out' and to enhance its impact.
Different types of outline properties such as outline-style, outline-colour, outline-width
can be specified for an HTML tag.
(i) Inset property.
(ii) The outlines are different from the borders because of the following reasons:
i. An outline does not take up space.
ii. The outlines do not have to be rectangular.
iii. The outline is always the same on all sides.
(iii)Outset property.
(iv)The different types of outline properties which can be specified for an HTML tag are as
follows:
i. Outline-style
ii. Outline-color
iii. Outline-width

26. Read the text carefully and answer the questions:


Zeeshan is a student of XYZ school and is an excellent poet. He decides to upload some of
his poems on his blog. After few days, he notices that his classmate, Antara has uploaded
Zeeshan's poem on her Facebook page, mentioning Antara as its poet.
(i) In this scenario, Zeeshan is a victim of plagiarism, a form of intellectual property theft.
Antara is claiming Zeeshan's work as her own, which constitutes a violation of his
creative ownership and rights.
(ii) Digital Citizenship.
(iii)intellectual property
(iv)passwords

You might also like