0% found this document useful (0 votes)
111 views

Solved Paper 2022 Sem I

Uploaded by

Soniya Munday
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
111 views

Solved Paper 2022 Sem I

Uploaded by

Soniya Munday
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 8

Solved Paper 2022

Computer Applications (TERM-I)


CLASS-X
Question Paper
Series : JSK/2
Code No. 053
Time allowed : 90 Minutes Max. Marks : 40
General Instructions :
(i) The Question paper contains three sections : A, B and C.
(ii) Section–A has 20 questions. Attempt any 16 questions.
(iii) Section–B has 20 questions. Attempt any 16 questions.
(iv) Section–C has 10 questions. Attempt any 8 questions.
(v) All questions carry equal marks.
(vi) There is no negative marking.

SECTION-A (c) Intellectual creative rights


(d) Creative property rights
This section consists of 20 questions of MCQ type.
Ans. Option (b) is correct.
Answer any 16 questions.
1. Identify the correct statement regarding OSS:
Explanation: Intellectual property rights are legal
rights that provide creators protection for original
(a) It is available for nominal or zero licensing
works, inventions, or the appearance of products,
and usage charges
artistic works, scientific developments, and so on.
(b) It can be shared with others freely
4. Extension of HTML file is:
(c) It is modifiable
(a) .ht (b) .htI
(d) All of the above
(c) .html (d) All of the above
Ans. Option (d) is correct.
Ans. Option (c) is correct.

Explanation: Open source software (OSS) is a

Explanation: An HTML file is nothing more than
software that is distributed with its source code,
plain ASCII text, but all HTML files must have a
making it available for use, modification, and
special file extension for web browsers to recognize
distribution with its original rights. It is available for
them. This extension is either .htm or .html.
nominal or zero licensing and usage charges.
5. The ________ tag in HTML is used to define that
2. Identify invalid HTML tag from the following list:
portion of the document which contains information
(a) <h6> .... </h6> (b) <h4> .... </h4> related to the document.
(c) <h5> .... </h5> (d) <h7> .... </h7> (a) <top> (b) <head>
Ans. Option (d) is correct. (c) <main> (d) <info>

Explanation: HTML headings are defined with the Ans. Option (b) is correct.
<h1> to <h6> tags.

Explanation: The <head> element is a container
3. ___________ are the rights given to persons over the for metadata (data about data). The HTML <head>
creations of their minds. element is a container for the following elements:
(a) Creative rights <title> , <style> , <meta> , <link> , <script> ,
(b) Intellectual property rights and <base> .
SOLVED PAPER – 2022 TERM-I (COMPUTER APPLICATIONS)

6. Identify the correct statement with reference to <P> (d) All of the above
tag : Ans. Option (d) is correct.
(a) It is used within the <BODY> tag.

Explanation: The <title> HTML element defines
(b) The <p> tag defines a paragraph. the document’s title that is shown in a browser’s
(c) Browsers automatically add a single blank line title bar or a page’s tab. It only contains text; tags
before and after each <p> element. within the element are ignored.
(d) All of the above 11. Face, size, color are attributes of which tag ?
Ans. Option (d) is correct. (a) Text (b) Font


Explanation: The <p> tag defines a paragraph of (c) T (d) F
text. The <p> element is found within the <body> Ans. Option (b) is correct.
tag. Browsers automatically add a single blank line

Explanation: The HTML <font> tag defines the font
before and after each <p> element.
size, color and face of text in the HTML document.
7. OL stands for :
12. • This kind of software is “freely distributed to
(a) Organized List (b) Outstanding List users on a trial basis.”
(c) Ordered List (d) Overall List • There’s a time limitation inherent in the software
Ans. Option (c) is correct. and would be deactivated when the time period
is finished.

Explanation: An ordered list typically is a numbered
list of items. An ordered list is created by nesting • One has to pay for the software to use it after the
one or more <li> elements between the opening time limit.
and closing <ol> tags. Identify the type of software :
8. The __________ tag defines the terms in the (a) OSS (b) Proprietary
description list. (c) Freeware (d) Shareware
(a) <DL> (b) <DT> Ans. Option (d) is correct.
(c) <DD> (d) All of the above.

Explanation: Shareware is a software that
Ans. Option (b) is correct. is distributed free on a trial basis with the

Explanation: The <dt> tag defines a term/name in a understanding that the user may need or want to
description list. The <dt> tag is used in conjunction pay for it later.
with <dl> (defines a description list) and <dd> 13. H in <HR> tag stands for :
(describes each term/name). (a) Height (b) Horizontal
9. Name the activity of electronically buying or selling (c) Hollow (d) None of the above
of products on online services or over the Internet.
Ans. Option (b) is correct.
(a) Cyber Commerce (b) e-Commerce

Explanation: The <hr> tag creates a horizontal
(c) Internet business (d) Electric commerce
rule. <hr> tag declare a thematic break for content.
Ans. Option (b) is correct. 14. HTML files can be created using any :

Explanation: E-commerce (electronic commerce) (a) Spreadsheet (b) Photo editor
is the activity of electronically buying or selling of
(c) Presentation Software (d) Text editor
products on online services or over the Internet.
Ans. Option (d) is correct.
10. The <title> element
(a) defines a title in the browser toolbar

Explanation: You can use a simple text editor to
create web pages. Brackets is an excellent free
(b) provides a title for the page when it is added
HTML editing application from Adobe available
to favourites for both Windows and Mac. Common text editors
(c) displays a title for the page in search-engine for Windows include Notepad and WordPad; both
results programs are standard in Windows.
Oswaal CBSE 10 Previous years' Solved Papers, Class–10th

15. Select the e-commerce fraud from the following list:


Explanation: The <br> tag inserts a single carriage
(a) Payment fraud (b) Identity Theft return or breaks in the document. This element has
no end tag.
(c) Phishing (d) All of the above
20. ______________ attribute of <BODY> tag is used to
Ans. Option (d) is correct.
specify the color of the linked text.

Explanation: E-commerce fraud is any type of fraud
(a) Icolor (b) clink
that occurs on an e-commerce platform. Using a
(c) linkcolor (d) link
stolen or fake credit card, using a false identity, and
affiliate fraud advertising are all forms of ecommerce Ans. Option (d) is correct.
fraud.
Explanation: The HTML <body> link attribute is
16. Term __________ refers to the gap between those used to specify the default color for a unvisited link
who have access to ICTs and those who don’t. in a document.
(a) Internet Gap (b) Internet Divide
(c) Digital Divide (d) Technology Divide SECTION-B
Ans. Option (c) is correct. This section consists of 20 questions of MCQ type.

Explanation: The digital divide is the gap in social Answer any 16 questions.
and economic equality that occurs when some 21. Manish has copied the information from the resources
segments of a given population do not have available on the internet for his article without
equal access to Information and Communications acknowledging the original source or taking the
Technology (ICT) and reliable high-speed Internet permission from the original creator. This unethical
service. act is termed as :
17. Which of the following will come under IPR ? (a) Phishing (b) Plagiarism
(a) Trademark (b) Patent (c) Spying (d) Identity theft
(c) Copyright (d) All of the above Ans. Option (b) is correct.
Ans. Option (d) is correct.
Explanation: Plagiarism is presenting someone

Explanation: Intellectual property rights include else’s work or ideas as your own, with or without
patents, copyright, industrial design rights, their consent, by incorporating it into your work
trademarks, plant variety rights, trade dress, without full acknowledgement.
geographical indications and in some jurisdictions 22. Rajesh, an IT club volunteer of the school, needs
trade secrets. to add a picture of ‘Green Earth’ in the center of a
18. A unique symbol or word used to represent a business webpage designed to spread awareness on saving
or its products is known as: the environment. Help him in choosing the correct
(a) Patent (b) Trademark HTML command for the same :

(c) Copyright (d) None of the above (a) <PICTURE> (b) <IMAGE>
(c) <IMG> (d) <PICT>
Ans. Option (b) is correct.
Ans. Option (c) is correct.

Explanation: A trademark is a sign capable of
distinguishing the goods or services of one enterprise
Explanation: <img> tag is used to add image inside
from those of other enterprises. Trademarks are webpage/website. Nowadays website does not
protected by intellectual property rights. directly add images to a web page, as the images
19. The _____________ tag inserts a single line break. are linked to web pages by using the <img> tag
which holds space for the image. Syntax: <img src
(a) <break> (b) <br>
= “url/path” alt = “alternative text” width = “size in
(c) <line> (d) <new line> pixels” height = “size in pixels” >
Ans. Option (b) is correct.
SOLVED PAPER – 2022 TERM-I (COMPUTER APPLICATIONS)

23. Encryption is one of the most prominent technique and the comment closes with ––> . HTML comments
used for: are visible to anyone that views the page source code,
(a) fast data transmission but are not rendered when the HTML document is
rendered by a browser.
(b) secure data transmission
26. GIMP, Mozilla Firefox, GNU/Linux, Python, etc.
(c) far away data transmission
come under :
(d) free data transmission
(a) Freeware (b) FOSS
Ans. Option (b) is correct.
(c) Shareware (d) Proprietary

Explanation: Encryption is used in electronic money
schemes to protect conventional transaction data Ans. Option (b) is correct.
like account numbers and transaction amounts,
Explanation: Free and open-source software (FOSS) is
digital signatures can replace handwritten a software that can be classified as both free software
signatures or a credit-card authorizations, and and open-source software. Few examples of FOSS
public-key encryption can provide confidentiality. software include: the Linux kernel, GNOME Desktop
24. Ms. Sandhya, vocational subject teacher in a public and Free Berkeley Software Distribution (FreeBSD).
school, has shown the following list of few of the skill 27. Sneha wants ‘B’ as first numbering in her HTML lists
courses offered by CBSE to the students to take their instead of ‘A’. Identify the most suitable attribute to
preference : specify the same :
SKILL COURSES (a) first (b) start
• Retail (c) initial (d) Not possible
• Information Technology Ans. Option (b) is correct.
• Security
Explanation: The start attribute in HTML is used to
• Automotive specify the start value for numbering the individual
Above shown list is an example of _____________ list item. It is used with ordered list.
HTML list. 28. Sajal has just started learning web page designing
(a) unordered (b) ordered through HTML. Help her in identifying the incorrect
statement regarding HEAD tag from the following:
(c) description (d) definition
(a) It is used to define the head portion of the
Ans. Option (a) is correct.
document which contains information related to

Explanation: HTML Unordered List or Bulleted List the document.
displays elements in bulleted format.
(b) No other tag can be used inside HEAD block.

We can use unordered list where we do not need
(c) <TITLE> ..... </TITLE> tag is used inside HEAD
to display items in any particular order. The HTML
block.
<ul> tag is used for the unordered list. There can
(d) All of the above
be 3 types of bulleted list:

• disc • square • circle Ans. Option (b) is correct.

25. In reference to comments in HTML document,


Explanation: The <head> tag in HTML is used to
identify the correct statement: define the head portion of the document which
contains information related to the document. The
(a) Comment line is ignored by the web browser.
<head> tag contains other head elements such as
(b) It is a good practice to add comments into your
<title>, <meta>, <link>, <style>, etc.
HTML code
29. The process of converting the original representation
(c) It helps to understand the code and increases
of the information (plaintext), into an alternative
code readability.
form (ciphertext) is known as:
(d) All of the above
(a) Encryption (b) Decryption
Ans. Option (d) is correct. (c) Phishing (d) Plagiarism

Explanation: An HTML comment begins with <! –– Ans. Option (a) is correct.
Oswaal CBSE 10 Previous years' Solved Papers, Class–10th


Explanation: Plaintext can refer to anything which Statement 2 : Proprietary software allows developers
humans can understand and/or relate to. Ciphertext, across the globe to participate in the ongoing
or encrypted text, is a series of randomized letters and development of the software.
numbers which humans cannot make any sense of. Select the best option from the list given below to
An encryption algorithm takes in a plaintext message, understand the correctness of both the statements:
runs the algorithm on the plaintext, and produces a
(a) Both statements are correct
ciphertext.
(b) Statement 1-Correct & Statement 2-1ncorrect
30. Shambhavi is designing a HTML FORM to collect
(c) Statement 1-Incorrect & Statement 2-Correct
user’s responses. Suggest her a suitable FORM
element to take the entry of user’s place of birth: (d) Statement 1-Incorrect & Statement 2-Incorrect

(a) Check Box (b) Password field Ans. Option (b) is correct.
(c) Radio button (d) Combo Box
Explanation: Open Source software has open access,
Ans. Option (d) is correct. that is, can be accessed by anyone. Proprietary
software can be accessed only by those who

Explanation: A combo box is a combination of a
developed it and those who have paid for it. Open
standard list box or a drop-down list and an editable
Source software is flexible, that is, it can be used,
text box, thus allowing users to enter a value that isn’t
modified and distributed by anyone.
in the list.
34. Which of the following is Privacy threats to
31. I am :
e-commerce ?
• A square box
(a) Password theft (b) Identity theft
• Ticked when selected
(c) Phishing (d) All of the above
• One or more options can be selected from the
Ans. Option (d) is correct.
choices given by me

Explanation: The most typical security and privacy
Who am I ?
threats include phishing and social engineering,
(a) Radio Button (b) Text Box
personal or card data theft or misuse, malware,
(c) Check Box (d) Combo Box and hacking. Two highly prevalent threats that
Ans. Option (a) is correct. can adversely impact the personal information of
an e-commerce site visitor are phishing and social

Explanation: The HTML <checkbox> tag is used to
engineering attacks.
define the square boxes. It is a form element which
allows users to select one or more options from the 35. By mistake, Raj has jumbled up a few tags and their
given options. attributes. Help him by choosing correct option for
tags and their corresponding attributes :
32. Razia, a class X student, is a beginner in the field of
web designing. Help her in identifying the attribute TAGS ATTRIBUTES
which is not, related to <BODY> tag: 1. font i. src
(a) src (b) background 2. body ii. face
(c) bgcolor (d) text 3. img iii. text

Ans. Option (a) is correct. 1 2 3 1 2 3



Explanation: The body tag is used for indicating the (a) ii iii i (b) iii i ii
main content section of the HTML document. The (c) iii ii i (d) i ii iii
body tag is placed between the </HTML> and the
Ans. Option (a) is correct.
</html> tags. Some commonly used attributes of
this tag Background, Text, Link, Vlink,Alink and
Explanation: The font tag is having three attributes
Bgcolor. called size, color, and face to customize the fonts.
33. Statement 1 : FOSS is more user friendly as compared The img tag have two attributes src and alt. Some
to Proprietary software. of the commonly used attributes of body tag are
background, text, link, bgcolor, etc.
SOLVED PAPER – 2022 TERM-I (COMPUTER APPLICATIONS)

36. The _____________ tag represents the root of an (c) <form> (d) <font>
HTML document. Ans. Option (b) is correct.
(a) <root> (b) <html>

Explanation: Elements with no closing tag are
(c) <first> (d) <main> known as an empty tag.
Ans. Option (b) is correct.
For eg: <br>, <link>, <img>, <hr>, <meta>,

Explanation: The <html> HTML element <source>, etc.
represents the root (top-level element) of an HTML
Since we can not specify anything in between those.
document, so it is also referred to as the root
element. All other elements must be descendants of SECTION-C
this element.
37. R in IPR stands for : Case Study based Questions

(a) Role (b) Rights Section C consists of 10 questions. Any 8 questions are
to be attempted.
(c) Range (d) RAM
Case Study — I
Ans. Option (b) is correct.
Nowadays we spend more time in the cyber world.

Explanation: Intellectual Property Rights (IPRs) are Anyone who uses digital technology along with the
legal rights that protect creations and/or inventions Internet is a digital citizen or a netizen. Being a good
resulting from intellectual activity in the industrial, netizen means practicing safe, ethical and legal use
scientific, literary or artistic fields. The most common of digital technology. A responsible netizen must
IPRs include patents, copyrights, marks and trade abide by net etiquettes, communication etiquettes
secrets. arid social media etiquettes.
38. Romal, a chemical analyst, is designing a webpage We follow certain etiquettes during our social
of the company, which may contain the chemical interactions. Similarly, we need to exhibit proper
formula of water H2O. Which tag should she use to manners and etiquettes while being online. One
display 2 little bits below the normal line? should be ethical, respectful and responsible while
(a) <lower> surfing the Internet. We should not use copyrighted
(b) <subscript> materials without the permission of the creator or
owner. In a group or public forum, we should respect
(c) <sub>
the diversity of the people in terms of knowledge,
(d) No tag is available in HTML for it.
experience, culture and other aspects.
Ans. Option (c) is correct.
Based on the above topic, answer the questions No.

Explanation: The <sub> tag defines subscript text. 41-45
Subscript text can be used for chemical formulas, 41. Identify the net etiquette which every netizen should
like H2O. Use the <sup> tag to define superscripted follow :
text.
(a) One should be responsible
39. A webpage can be accessed by a : (b) One should be ethical
(a) Text editor (b) Spreadsheet (c) One should be respectful
(c) Web browser (d) Office applications (d) All of the above
Ans. Option (c) is correct. Ans. Option (d) is correct.

Explanation: A web page can be accessed by entering
Explanation: Every netizen should be responsible,
a URL address into a browser’s address bar. A web ethical and respectful while surfing the Internet.
page may contain text, graphics, and hyperlinks to
42. Being ethical in the cyber world means :
other web pages and files.
(a) We should share information in the cyber world
40. The ______________ tag is an empty tag and it does
(b) We should not use copyrighted materials without
not require closing tag.
the permission of the creator or owner.
(a) <table> (b) <hr>
Oswaal CBSE 10 Previous years' Solved Papers, Class–10th

(c) We should further forward the information Case Study — II


without checl‹ing its reliability at our own end. Carefully observe the following screenshot :
(d) All of the above
Coding Club Registration Form
Ans. Option (b) is correct.
Name: lvana

Explanation: Ethics in cyber security is about what
decisions are aligned with our values and what is Preferred User id: lvana.dk
morally acceptable for both the data owner and the Secret Password: *********
organisation. Ethical standards should also describe
how to implement processes for ensuring ethical Register
decision-making.
43. Being respectful in the cyber world means: Based on the screenshot shown above, attempt the
(a) We should respect different opinion of others question number 46-50.
(b) We should use respectful language 46. An HTML _____________ is used to collect user input.
(c) We should respect others privacy (a) Frame (b) Table
(d) All of the above
(c) Box (d) Form .
Ans. Option (a) is correct.
Ans. Option (d) is correct.

Explanation: Respect: always be courteous and
respectful to others online in the same way
Explanation: The HTML <form> tag is used for
you would be in real life. The age-old saying of creating a form for user input. A form can contain
“treat others as you would like to be treated” is textfields, checkboxes, radio-buttons and more.
an important rule to maintaining positive cyber Forms are used to pass user-data to a specified URL.
citizenship. 47. HTML element to create the box to accept the
44. A netizen will be considered very irresponsible in candidate’s Name :
nature if he or she : (a) <ACCEPT> (b) <INPUT>
(a) Feed the troll
(c) <NAME> (d) <BOX>
(b) Avoid cyber bullying
Ans. Option (b) is correct.
(c) Checks the details before befriending on social
media
Explanation: The <input> HTML element is used
(d) All of the above to create interactive controls for web-based forms in
order to accept data from the user; a wide variety
Ans. Option (a) is correct.
of types of input data and control widgets are

Explanation: Responsible digital citizenship means available, depending on the device and user agent.
taking part in online community life safely, ethically
48. Correct attribute= “value” pair to create the box to
and respectfully. Good digital citizens behave
accept the candidate’s Name :
respectfully, protect their reputations and privacy,
watch their tone, and are sceptical. (a) type= “text” (b) type= “name”
45. Person who spends more time in the cyber world (c) accept= “text” (d) accept= “’name”
may be termed as:
Ans. Option (a) is correct.
(a) Netizen (b) C-Citizen

Explanation: Attributes usually come in name/
(c) D-Citizen (d) All of the above
value pairs like: name=”value”. HTML attributes
Ans. Option (a) is correct. (usually) have values and are written after a “=”

Explanation: The meaning of NETIZEN is an active after the name of the attribute. Attribute value pair
participant in the online community of the Internet. is placed before the last “>” of an HTML start tag.
SOLVED PAPER – 2022 TERM-I (COMPUTER APPLICATIONS)

49. Choose the correct HTML control, to create the text (a) <ACCEPT> (b) <INPUT>
box having label as “Preferred User id” : (c) <NAME> (d) <BOX>
(a) Id Box (b) Id field Ans. Option (b) is correct.
(c) Text field (d) Password field

Explanation: <input> elements of type password
Ans. Option (c) is correct. provide a way for the user to securely enter a

Explanation: To create a text box (also called input password.
box), use the <input> tag and set the type attribute
Syntax:
to “text”.
<input type=”password”>
50. HTML element to create the box to accept the Secret  
Password’ :

You might also like