Solved Paper 2022 Sem I
Solved Paper 2022 Sem I
6. Identify the correct statement with reference to <P> (d) All of the above
tag : Ans. Option (d) is correct.
(a) It is used within the <BODY> tag.
Explanation: The <title> HTML element defines
(b) The <p> tag defines a paragraph. the document’s title that is shown in a browser’s
(c) Browsers automatically add a single blank line title bar or a page’s tab. It only contains text; tags
before and after each <p> element. within the element are ignored.
(d) All of the above 11. Face, size, color are attributes of which tag ?
Ans. Option (d) is correct. (a) Text (b) Font
Explanation: The <p> tag defines a paragraph of (c) T (d) F
text. The <p> element is found within the <body> Ans. Option (b) is correct.
tag. Browsers automatically add a single blank line
Explanation: The HTML <font> tag defines the font
before and after each <p> element.
size, color and face of text in the HTML document.
7. OL stands for :
12. • This kind of software is “freely distributed to
(a) Organized List (b) Outstanding List users on a trial basis.”
(c) Ordered List (d) Overall List • There’s a time limitation inherent in the software
Ans. Option (c) is correct. and would be deactivated when the time period
is finished.
Explanation: An ordered list typically is a numbered
list of items. An ordered list is created by nesting • One has to pay for the software to use it after the
one or more <li> elements between the opening time limit.
and closing <ol> tags. Identify the type of software :
8. The __________ tag defines the terms in the (a) OSS (b) Proprietary
description list. (c) Freeware (d) Shareware
(a) <DL> (b) <DT> Ans. Option (d) is correct.
(c) <DD> (d) All of the above.
Explanation: Shareware is a software that
Ans. Option (b) is correct. is distributed free on a trial basis with the
Explanation: The <dt> tag defines a term/name in a understanding that the user may need or want to
description list. The <dt> tag is used in conjunction pay for it later.
with <dl> (defines a description list) and <dd> 13. H in <HR> tag stands for :
(describes each term/name). (a) Height (b) Horizontal
9. Name the activity of electronically buying or selling (c) Hollow (d) None of the above
of products on online services or over the Internet.
Ans. Option (b) is correct.
(a) Cyber Commerce (b) e-Commerce
Explanation: The <hr> tag creates a horizontal
(c) Internet business (d) Electric commerce
rule. <hr> tag declare a thematic break for content.
Ans. Option (b) is correct. 14. HTML files can be created using any :
Explanation: E-commerce (electronic commerce) (a) Spreadsheet (b) Photo editor
is the activity of electronically buying or selling of
(c) Presentation Software (d) Text editor
products on online services or over the Internet.
Ans. Option (d) is correct.
10. The <title> element
(a) defines a title in the browser toolbar
Explanation: You can use a simple text editor to
create web pages. Brackets is an excellent free
(b) provides a title for the page when it is added
HTML editing application from Adobe available
to favourites for both Windows and Mac. Common text editors
(c) displays a title for the page in search-engine for Windows include Notepad and WordPad; both
results programs are standard in Windows.
Oswaal CBSE 10 Previous years' Solved Papers, Class–10th
(c) Copyright (d) None of the above (a) <PICTURE> (b) <IMAGE>
(c) <IMG> (d) <PICT>
Ans. Option (b) is correct.
Ans. Option (c) is correct.
Explanation: A trademark is a sign capable of
distinguishing the goods or services of one enterprise
Explanation: <img> tag is used to add image inside
from those of other enterprises. Trademarks are webpage/website. Nowadays website does not
protected by intellectual property rights. directly add images to a web page, as the images
19. The _____________ tag inserts a single line break. are linked to web pages by using the <img> tag
which holds space for the image. Syntax: <img src
(a) <break> (b) <br>
= “url/path” alt = “alternative text” width = “size in
(c) <line> (d) <new line> pixels” height = “size in pixels” >
Ans. Option (b) is correct.
SOLVED PAPER – 2022 TERM-I (COMPUTER APPLICATIONS)
23. Encryption is one of the most prominent technique and the comment closes with ––> . HTML comments
used for: are visible to anyone that views the page source code,
(a) fast data transmission but are not rendered when the HTML document is
rendered by a browser.
(b) secure data transmission
26. GIMP, Mozilla Firefox, GNU/Linux, Python, etc.
(c) far away data transmission
come under :
(d) free data transmission
(a) Freeware (b) FOSS
Ans. Option (b) is correct.
(c) Shareware (d) Proprietary
Explanation: Encryption is used in electronic money
schemes to protect conventional transaction data Ans. Option (b) is correct.
like account numbers and transaction amounts,
Explanation: Free and open-source software (FOSS) is
digital signatures can replace handwritten a software that can be classified as both free software
signatures or a credit-card authorizations, and and open-source software. Few examples of FOSS
public-key encryption can provide confidentiality. software include: the Linux kernel, GNOME Desktop
24. Ms. Sandhya, vocational subject teacher in a public and Free Berkeley Software Distribution (FreeBSD).
school, has shown the following list of few of the skill 27. Sneha wants ‘B’ as first numbering in her HTML lists
courses offered by CBSE to the students to take their instead of ‘A’. Identify the most suitable attribute to
preference : specify the same :
SKILL COURSES (a) first (b) start
• Retail (c) initial (d) Not possible
• Information Technology Ans. Option (b) is correct.
• Security
Explanation: The start attribute in HTML is used to
• Automotive specify the start value for numbering the individual
Above shown list is an example of _____________ list item. It is used with ordered list.
HTML list. 28. Sajal has just started learning web page designing
(a) unordered (b) ordered through HTML. Help her in identifying the incorrect
statement regarding HEAD tag from the following:
(c) description (d) definition
(a) It is used to define the head portion of the
Ans. Option (a) is correct.
document which contains information related to
Explanation: HTML Unordered List or Bulleted List the document.
displays elements in bulleted format.
(b) No other tag can be used inside HEAD block.
We can use unordered list where we do not need
(c) <TITLE> ..... </TITLE> tag is used inside HEAD
to display items in any particular order. The HTML
block.
<ul> tag is used for the unordered list. There can
(d) All of the above
be 3 types of bulleted list:
• disc • square • circle Ans. Option (b) is correct.
Explanation: Plaintext can refer to anything which Statement 2 : Proprietary software allows developers
humans can understand and/or relate to. Ciphertext, across the globe to participate in the ongoing
or encrypted text, is a series of randomized letters and development of the software.
numbers which humans cannot make any sense of. Select the best option from the list given below to
An encryption algorithm takes in a plaintext message, understand the correctness of both the statements:
runs the algorithm on the plaintext, and produces a
(a) Both statements are correct
ciphertext.
(b) Statement 1-Correct & Statement 2-1ncorrect
30. Shambhavi is designing a HTML FORM to collect
(c) Statement 1-Incorrect & Statement 2-Correct
user’s responses. Suggest her a suitable FORM
element to take the entry of user’s place of birth: (d) Statement 1-Incorrect & Statement 2-Incorrect
(a) Check Box (b) Password field Ans. Option (b) is correct.
(c) Radio button (d) Combo Box
Explanation: Open Source software has open access,
Ans. Option (d) is correct. that is, can be accessed by anyone. Proprietary
software can be accessed only by those who
Explanation: A combo box is a combination of a
developed it and those who have paid for it. Open
standard list box or a drop-down list and an editable
Source software is flexible, that is, it can be used,
text box, thus allowing users to enter a value that isn’t
modified and distributed by anyone.
in the list.
34. Which of the following is Privacy threats to
31. I am :
e-commerce ?
• A square box
(a) Password theft (b) Identity theft
• Ticked when selected
(c) Phishing (d) All of the above
• One or more options can be selected from the
Ans. Option (d) is correct.
choices given by me
Explanation: The most typical security and privacy
Who am I ?
threats include phishing and social engineering,
(a) Radio Button (b) Text Box
personal or card data theft or misuse, malware,
(c) Check Box (d) Combo Box and hacking. Two highly prevalent threats that
Ans. Option (a) is correct. can adversely impact the personal information of
an e-commerce site visitor are phishing and social
Explanation: The HTML <checkbox> tag is used to
engineering attacks.
define the square boxes. It is a form element which
allows users to select one or more options from the 35. By mistake, Raj has jumbled up a few tags and their
given options. attributes. Help him by choosing correct option for
tags and their corresponding attributes :
32. Razia, a class X student, is a beginner in the field of
web designing. Help her in identifying the attribute TAGS ATTRIBUTES
which is not, related to <BODY> tag: 1. font i. src
(a) src (b) background 2. body ii. face
(c) bgcolor (d) text 3. img iii. text
36. The _____________ tag represents the root of an (c) <form> (d) <font>
HTML document. Ans. Option (b) is correct.
(a) <root> (b) <html>
Explanation: Elements with no closing tag are
(c) <first> (d) <main> known as an empty tag.
Ans. Option (b) is correct.
For eg: <br>, <link>, <img>, <hr>, <meta>,
Explanation: The <html> HTML element <source>, etc.
represents the root (top-level element) of an HTML
Since we can not specify anything in between those.
document, so it is also referred to as the root
element. All other elements must be descendants of SECTION-C
this element.
37. R in IPR stands for : Case Study based Questions
(a) Role (b) Rights Section C consists of 10 questions. Any 8 questions are
to be attempted.
(c) Range (d) RAM
Case Study — I
Ans. Option (b) is correct.
Nowadays we spend more time in the cyber world.
Explanation: Intellectual Property Rights (IPRs) are Anyone who uses digital technology along with the
legal rights that protect creations and/or inventions Internet is a digital citizen or a netizen. Being a good
resulting from intellectual activity in the industrial, netizen means practicing safe, ethical and legal use
scientific, literary or artistic fields. The most common of digital technology. A responsible netizen must
IPRs include patents, copyrights, marks and trade abide by net etiquettes, communication etiquettes
secrets. arid social media etiquettes.
38. Romal, a chemical analyst, is designing a webpage We follow certain etiquettes during our social
of the company, which may contain the chemical interactions. Similarly, we need to exhibit proper
formula of water H2O. Which tag should she use to manners and etiquettes while being online. One
display 2 little bits below the normal line? should be ethical, respectful and responsible while
(a) <lower> surfing the Internet. We should not use copyrighted
(b) <subscript> materials without the permission of the creator or
owner. In a group or public forum, we should respect
(c) <sub>
the diversity of the people in terms of knowledge,
(d) No tag is available in HTML for it.
experience, culture and other aspects.
Ans. Option (c) is correct.
Based on the above topic, answer the questions No.
Explanation: The <sub> tag defines subscript text. 41-45
Subscript text can be used for chemical formulas, 41. Identify the net etiquette which every netizen should
like H2O. Use the <sup> tag to define superscripted follow :
text.
(a) One should be responsible
39. A webpage can be accessed by a : (b) One should be ethical
(a) Text editor (b) Spreadsheet (c) One should be respectful
(c) Web browser (d) Office applications (d) All of the above
Ans. Option (c) is correct. Ans. Option (d) is correct.
Explanation: A web page can be accessed by entering
Explanation: Every netizen should be responsible,
a URL address into a browser’s address bar. A web ethical and respectful while surfing the Internet.
page may contain text, graphics, and hyperlinks to
42. Being ethical in the cyber world means :
other web pages and files.
(a) We should share information in the cyber world
40. The ______________ tag is an empty tag and it does
(b) We should not use copyrighted materials without
not require closing tag.
the permission of the creator or owner.
(a) <table> (b) <hr>
Oswaal CBSE 10 Previous years' Solved Papers, Class–10th
49. Choose the correct HTML control, to create the text (a) <ACCEPT> (b) <INPUT>
box having label as “Preferred User id” : (c) <NAME> (d) <BOX>
(a) Id Box (b) Id field Ans. Option (b) is correct.
(c) Text field (d) Password field
Explanation: <input> elements of type password
Ans. Option (c) is correct. provide a way for the user to securely enter a
Explanation: To create a text box (also called input password.
box), use the <input> tag and set the type attribute
Syntax:
to “text”.
<input type=”password”>
50. HTML element to create the box to accept the Secret
Password’ :