0% found this document useful (0 votes)
27 views

ComputerApplication-SQP-24

sa

Uploaded by

samitavij
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

ComputerApplication-SQP-24

sa

Uploaded by

samitavij
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Sample Question Paper

(Theory) Computer
Applications (Code 165) Class:
X Session: 2024-25

Maximum Marks: 50 Time Allowed: 2


hours

General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, internal choices have been provided in some of the questions.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.

Section – A (All questions are


compulsory)
1. Shreya wants to securely copy files between two Servers or two connected 1
machines over the Internet. Which Protocol should she prefer for getting her
task completed?
A. FTP
B. HTTP
C. SCP
D.Telnet
2. Which of the following is not an e-governance project in India? 1
A. www.drdo.nic.in
B. www.passport.gov.in
C. www.incometaxindia.gov.in
D.www.flipkart.com
3. Which tag besides <B> can be used to make the text bold in HTML? 1
A. <strong>
B. <dark>
C. <fat>
D.<I>

Page 1 of 7
4. What is the full form of SMTP? 1
A. Simple Message Transfer Protocol
B. Secure Message Transmission Protocol
C. Simple Mail Transfer Protocol
D.Secure Mail Transmit Protocol

Page 2 of 7
5. Which protocol is used for video conferencing among multiple participants? 1
A. Telnet
B. Http
C. VoIP
D.SFTP
6. Select the correct option to fill in the 1
blank: A website may consist of
A. Static Webpages
B. Dynamic Webpages
C. Both a and b.
D.Domain.
7. Aman, a student of Class X, wants to create numbered list in HTML, which 1
of the following tag should he use?
A. <UL>
B. <OL>
C. <DL>
D.<list>
8. Making a copy of your webpage on the computer is known as.....? 1
A. Uploading
B. Browsing
C. Downloading
D.None of the above.
9. Himani, a class X student, wants to remotely access a computer system far 1
from her house. Which protocol, out of the following, should she prefer to
access or log in it remotely?
A. FTP
B. SFTP
C. TCP/IP
D. TELNET
10. Anshu, a class X student, is writing CSS code for making all <span> 1
elements bold. Choose the correct code for getting the desired output from
the following options:
A. span{text-size:bold}
B. span {font-weight:bold}
C. <span style="font-size:bold">

Page 3 of 7
D.<span style="text-size:bold">

Page 4 of 7
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements,
namely Assertion (A) and Reason (R). Select the most suitable option considering the Assertion &
Reason.
A. Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
B. Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion
(A).
C. Assertion (A) is true and Reason (R) is false.
D. Assertion (A) is false and Reason (R) is true.
11. Assertion (A) : A set of rules, used over the networks, is called a Protocol. 1
Reason (R) : HTML is an example of a Protocol.
12. Assertion (A) :Chat and e-mail are live/real time 1
conversation between people/machines.
Reason (R) : We have to be online in both
Section – B
13. Mishika, a class X student, wants to use a software but does not want to 2
pay for it.
Which type of software can she use? Write one example of this type of
software.
14. A) Write any two differences between e-Banking and e-Commerce. 2
OR
B) What is e-learning? Name any one e-learning platform.
15. State whether the following statements are True or False: 2
I) HTML file extension is .tml.
II) Rowspan attribute is used to make a cell span multiple rows.
III) Unordered list type creates a bulleted list.
IV) HREF Stands for hyper reference.
16. A)Your best friend emails you and tells you that he/she has created a 2
webpage on an internet site having URL as:
www.children.com/india/~abc.html
Now you want to create a link to this web page from your web page.
Write the HTML code to do this.
OR
B
)
I) Write HTML code to display Horizontal line of red colour.
II) Write HTML Code to create a paragraph whose text colour is blue.
17. What is the purpose of HTML forms? Write HTML Code to create a Textbox 2
in an HTML
Page 5 of 7
form.
18. A) An incomplete CSS code within <head> . . . </head> is given below. 2
Complete this code by filling in the blanks as per the specifications that
follow:
<head>

Page 6 of 7
<style>
body { : blue; } <!--line 1 -->
p {
: green; <!--line 2 -->
: Dotum; <!--line 3 -->
}
<!--line 4 -->
{
Color : black;
}
</style>
</head>

Line 1: Page background colour should be Blue.


Line 2: Colour of the Paragraph text should be green.
Line 3: Font family of the Paragraph text should be Dotum.
Line 4: The biggest heading should be black in colour.
OR
B) Hemant, a class X Student, is writing HTML code to create ordered and
unordered lists for a webpage as follows:
<html>
<body bgcolor="yellow">
<h1>My First Heading < > <!-- line 1 -->
<p>
<font color="red" size="5"
="Times New Roman"> <!-- line 2 -->
SOME STATES IN INDIA
</p>
<ul>
<li>DELHI: < > <!-- line 3 -->
<li>MUMBAI </li>
< > <!-- line 4 -->

Based on the above code fill in the blanks given in line 1, line2, line 3, and
line 4 so
that Hemant’s webpage displays output correctly?
19. Write any two differences between SMS and MMS. 2
Section – C

Page 7 of 7
Page 8 of 7
20. The following HTML statements are not written properly. Re-write the 3
correct statements with underlined corrections. The desired purpose of
each statement is mentioned under it.
I. <BODY color="red">
<!--Page background color should be red-->
II. <FONT type="arial">
<!--Type of Font should be Arial-->
III. <img source="img_girl.jpg" size="500" height="600">
<!—Image source should be img_girl.jpg, width and
height both should be 500-->
21. Consider the URL: https://www.cbse.gov.in and answer the following questions: 3
I. Which component identifies the protocol?
II. What is the significance of "s" in https?
III. Expand the terms URL and WWW?
22. A)Write any two ways to add an audio file in a web page using HTML? 3
Explain with sample code.
OR
B) Write any two ways to add a video file in a web page using HTML?
Explain with sample code.
23. Write suitable HTML statements to display the following text on a webpage: 3
I) NH3
II)
X3
III)
(A+B)3
Section – D
24. A) Write the HTML code to design the web page as shown below: - 4

Page 9 of 7
OR
B) Write the HTML code to design the web page as shown below (Table
border should be 2, height=100 and width=300 with cellpadding =20): -

Section – E
25. Mr. Anek comes from a village, which recently started seeing the digital 4
revolution, and now the people of his village have access to the internet.
They can shop online, make payments online, sell online and so on. Anek is
also excited with these new changes. He ordered some items online and
entered his bank card details on the webpage to make the payment.
But still after passing of the promised due date, he has not received his
ordered items. There is no way to contact the company as phones are
unreachable and emails are not being responded. He also noticed after
some days that someone is sending emails on his behalf, using his
personal data.

Page 10 of
7
Based on the above information answer the following question: -
I. Mr. Anek is a victim of .
II. Mr. Anek finds that his personal details are now leaked. This means
his
is compromised.
III. While filling out details online, Mr. Anek should have checked
in the URL.
IV. This type of incident will be recognized as a case of (Specify
the type of crime)
26. Based on the following information, answer the questions which follows: 4
Shresth was a bright student who excelled in academics and extracurricular
activities. He intent to take some quotes and literature from internet to
write an Article for Newspaper.
I. Identify the type of ethical issue he will face, in case he copies
the work as discussed in the above case study.
II. Does the above incident described above can be considered as
example of IPR (Intellectual Property Rights) Violation?
III. How can he avoid this ethical issue?
IV. Suggest two netiquettes that Shresth’s classmates must be aware
of.

Page 11 of
7

You might also like