10_ComputerApplications_PB1_MS_2022-23
10_ComputerApplications_PB1_MS_2022-23
General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory.
3. Section A has 12 questions carrying 1 mark each.
4. Section B has 7 Very Short Answer (VSA) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based / Case-based / Passage based Questions carrying 04 marks each.
Page 2 of 8
15. i) Mohan has to use the bgcolor attribute with the respective <TR> or <TBODY> tags. 2
(½ mark each for the correct tag and attribute)
ii) In HTML, the term cell spacing refers to the amount of space in pixels between the
borders of a cell. On the other hand, cell padding refers to the amount of space in
pixels between the edges of a cell and its content.
(½ mark each for the correct explanation/example of cellspacing and cellpadding)
16. Secure data transmission means applying enough technical safeguards so that data 2
travels safely to its target, without being compromised or eavesdropped.
To ensure secure data transmission:
i) SSL: Secure Sockets Layer is a standard security protocol that ensures data security
by establishing encrypted online links between a web server and a browser.
ii) Data encryption: Encrypted data when sent over the internet is hard to steal and
hence is safer. Encryption is a way of scrambling data so that only authorized parties
can understand the information. In technical terms, it is the process of converting
human-readable plaintext to incomprehensible text, also known as ciphertext.
iii) Using safe protocols such as for files, use secure FTP protocol that uses some
safety shells such as SSH to ensure the safety of data being transferred.
(½ mark for the correct definition,
½ mark each for the correct explanation of any three ways)
OR
Ms. Arya has committed online fraud in the form of Identity Theft.
Identity Theft involves obtaining the personal or financial information of another
person and using someone's identity to commit fraud like making unauthorized
transactions or purchases, posting fraudulent posts, or some other
malicious/dangerous activity such as rumour mongering or riot fuelling is carried out.
Identity theft is committed in many ways and its victims may suffer damage to their
reputation or financial loss.
(1 mark for the correct identification, 1 mark for the correct definition)
17. Margin is the distance from each side to the neighboring element(or the borders of 2
the document) i.e. it is the space around an element's border.
Padding is the inner space between an element's border and the element's content and
can also be understood as filling.
In other words, the margin property controls the space outside an element, and
padding controls the space inside an element. E.g.
<style type="text/css">
H1{margin-top:10px; margin-right:10px; margin-left:10px; margin-bottom:10px;
padding-left:50px}
</style>
The above css code will leave a margin of 10px between the document's border and
the H1 element's border. It will also leave a gap of 50px on the left side between the
H1 element's border and its contents.
(1 Mark for the correct difference, 1 Mark for the correct example)
Page 3 of 8
18. The External linking links two documents i.e. upon clicking a hyperlink, a new 2
document to which the hyperlink is linked, gets opened. The external link can also be
created to link to a web URL. It is facilitated using <A> and href attribute.
The Internal linking links various sections of the same document. Upon clicking a
link, it jumps to a different section of the same document so that it becomes visible in
the browser window. It is facilitated using <A> tag and name attribute.
External Linking Internal Linking
<A href=page2.html> <A name=section1></A>
Link to Page 2</A> <H1>Section1</H1>
<A href="www.google.com"> …….
Link to Google</A> …….
<A href=#section1>Link to Section1</A>
(1 mark for the correct difference, 1 mark for a suitable example illustrating each)
OR
Correct code:
To embed audio :
<audio controls autoplay>
<source src = "GulzarNote1.mp3" />
</audio>
To embed video :
<video width = "350" height = "250" controls>
<source src = "GulzarMovie1.mp4" type="video/mp4">
</video>
(½ Mark for each correct identification of error)
19. <form name=form1> 2
Employee Name: <input type="text"></input>
<br>
Type: <input type=radio name=type>Permanent</input>
<input type=radio name=type>Adhoc</input>
<br><br>
Department:
<select name="dept">
<option value="Sales">Sales</option>
<option value="Admin" selected>Admin</option>
<option value="Finance">Finance</option>
</select>
</form>
(½ Mark for creating a textbox, ½ Mark for creating a radio button,
1 Mark for creating a dropdown)
Page 4 of 8
Section – C (3 marks each)
20. i) Freedom of information refers to the right to access information available on public 3
platforms.
(½ mark for the correct explanation)
ii) Ways to ensure freedom of information for all:
• Improving digital literacy rate in rural areas.
• Improving the infrastructure for ICT services and ensuring that the latest
technology reaches rural areas
• Bridging the unequal distribution of wealth between different sections of society
and taking steps to reduce poverty so that everyone is able to afford ICT resources.
(½ mark each for any two correct ways to ensure freedom for all)
iii) The term is Digital Divide. It refers to the differing amount of information or gap
between those who have access to ICT and those who don't have access. It is an
economic and social inequality with regard to access to, use of, or impact of
information and communication technologies. Digital Divide is the opposite of
Digital Unity
(½ mark for the correct identification of the term,
1 mark for the correct definition)
21. i) Protocol refers to a set of rules to be followed when any two devices are 3
communicating in a network.
(1 mark for the correct definition of protocol)
ii) SMTP (Simple Mail Transfer Protocol), POP3 (Post Office Protocol Version 3)
(½ mark for each correct expansion)
iii) SMTP is used in sending outgoing emails by pushing the message from the client to
the server.
POP3 is used in receiving incoming emails by pulling the message from the server to
the client.
(1 mark for the correct difference)
22. i) <BODY style="background-image:URL("water.jpg"); color:teal; margin- 3
top:5%>…</BODY>
(½ Mark for each inline CSS property)
ii) <H1 style="text-align:center">
<Font style="font-family: Bookman Old Style; color:#FC0000">…</FONT></H1>
(½ mark for each inline CSS property)
OR
i) <!-- homestyle.css -->
a) BODY {background-color: blue;}
b) P {word-spacing: 2px; font-variant:small-caps}
c) IMG{float:right; border-style:dotted} or
IMG{float:right; border:1px dotted black}
Page 5 of 8
(½ mark for body tag CSS property
1 mark each for the <P> and <IMG> tag CSS properties)
ii) <!-- Code in home.html -->
<HEAD><LINK rel="stylesheet" type="text/css" href="homestyle.css"></HEAD>
(½ mark for correct syntax of <LINK> tag)
23. Social networking is the use of internet-based social media applications to build 3
connections with friends, relatives, clients, etc. A large number of social networking
sites are available on the web where people interact freely, sharing and discussing
information about each other and their lives, using a multimedia mix of personal
words, pictures, videos, and audio
Dangers:
• There may be a misuse of data/information posted by innocent users.
• It can result in disorders like Attention Seeking Disorder and Addiction.
• It may result in Isolation, Depression, and anxiety.
• It can cause Cyberbullying, Trolling, and Cyberstalking
• Fear of missing out (FOMO) can keep you returning to social media over and
over again.
• It results in a lack of emotional connection and decreases Face-to-Face
Communication Skills.
E.g. of Social Networking Sites: Facebook, Twitter, Instagram, Whatsapp
(½ mark for the correct definition,
½ mark each for any three dangers,
½ mark each for any two correct examples)
Section - D (4 marks each)
24. <HTML> 4
<HEAD><TITLE> Tasty Food Homepage</TITLE></HEAD>
<BODY>
</BODY>
<FONT face="Algerian" color=red>
<H1 align=center> !! TASTY FOOD
!!</H1>
</FONT>
<BR><BR>
<HR size=5px noshade>
<IMG align=right src=food.jfif>
<UL type=square>
<LI> <A href="indian.html">Indian Dishes</A>
<OL type='I'>
<LI> Veg
<OL type='A' start=5>
<LI> Gujarati
Page 6 of 8
<LI> Punjabi
<LI> Rajasthani
</OL>
<LI> Non Veg
</OL>
<LI> <A href="continental.html">Continental Dishes</A>
<UL type=disc>
<LI>French Cuisine
<LI>Spanish Cuisine
</UL>
</UL>
</HTML>
(1 mark for each correct specification: any four)
OR
<html>
<head><title>Income Tax Slabs</title></head>
<body>
<table bgcolor="pink" border=1 height=300px>
<tr>
<th colspan=4>
INCOME TAX SLABS TABLE
</th>
</tr>
<tr>
<td rowspan=5><img src="d:\incometax.jfif"></td>
<td>S.No.</td>
<td>Income Range</td>
<td>Tax%</td>
</tr>
<tr>
<td>1</td>
<td>0 – 250000</td>
<td>NIL</td>
</tr>
<tr>
<td>2</td>
<td>250001 - 500000</td>
<td>10%</td>
</tr>
<tr>
Page 7 of 8
<td>3</td>
<td>500001 - 1000000</td>
<td>20%</td>
</tr>
<tr>
<td>4</td>
<td>1000000</td>
<td>30%</td>
</tr>
</table>
<br>
<hr align=left width=80% noshade color=green>
<center>
<a href=paytax.html>Pay Tax Online</a>
<BR>
<a href="mailto:[email protected]">For Your Queries</a></center>
<hr align=right width=80% noshade color=green>
</body>
</html>
(1 mark for each correct specification: any four)
Section – E
Case Study-1
25. i) Border=10 Cellspacing=10 4
ii) <Caption></Caption>
iii) Top
iv) Rowspan=3
v) Colspan
(1 mark each for any four correct answers)
Case Study-2
26. i) Cyberstalking or Cyberbullying 4
ii) He should bring it to the notice of his parents and school authorities. Also with the
help of his parents, he must report this cybercrime to the local police/cyber cell.
iii) Computer ethics/ Cyberethics
iv) Phishing
v) Data Privacy
(1 mark each for any four correct answers)
Page 8 of 8