Students must start practicing the questions from CBSE Sample Papers for Class 10 Computer Applications with Solutions Set 6 are designed as per the revised syllabus.
CBSE Sample Papers for Class 10 Computer Applications Set 6 with Solutions
Time : 2 hrs
Max. Marks : 50
Instructions
- This Question Paper has 5 Sections A-E.
- All Questions are compulsory. However, internal choices have been provided in some of the questions.
- Section A has 12 questions carrying 01 mark each.
- Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
- Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
- Section D has 1 Long Answer (LA) type question carrying 04 marks.
- Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Section A
(All questions are compulsory)
Question 1.
Which of the following is an open source software license? [1]
(a) GPL
(b) BSD
(c) MIT
(d) All of these
Answer:
(d) All of these
Question 2.
The first graphical web browser was [1]
(a) Mosaic
(b) Netscape
(c) Opera
(d) Lynx
Answer:
(a) Mosaic
Question 3.
Which of the following is an online discussion group that allows chat and an electronic bulletin board system? [1]
(a) Video conferencing
(b) Vlog
(c) Blog
(d) Newsgroup
Answer:
(d) Newsgroup
Question 4.
What is used by a browser to connect to the location of the Internet resources? [1]
(a) Cable
(b) Protocol
(c) Linker
(d) URL
Answer:
(d) URL
Question 5.
……… is an audio and video communication technology that can be used anywhere over the Internet. [1]
(a) Chat
(b) SMS
(c) Video conferencing
(d) Google
Answer:
(c) Video conferencing
Question 6.
Which tag is used to insert comments in HTML? [1]
(a) <!– –>
(b) <comment></comment>
(c) <note></note>
(d) <remark> </remark>
Answer:
(a) <!– –>
Question 7.
The <TFOOT> tag is used to specify the …….. part of the table. [1]
(a) header
(b) footer
(c) body
(d) bgcolor
Answer:
(b) footer
Question 8.
Use the container tag to create multiline, scrollable, text entry boxes. [1]
(a) <TEXTAREA>
(b) <TEXTIMG>
(c) <IMG>
(d) <CHECKBOX>
Answer:
(a) <TEXTAREA>
Question 9.
What will be the output of x<SUP>3</SUP> – y<SUP>3</SUP>? [1]
(a) x2+ y2
(b) x3 + y2
(c) x2 – y2
(d) x3 – y3
Answer:
(d) x3 – y3
Question 10.
The ………. attribute is used for specifying the URL of the anchor tag. [1]
(a) ref
(b) href
(c) hurl
(d) hdref
Answer:
(b) href
Directions ( Q.Nos. 11 and 12) are Assertion and Reason types. Each question consists of two statements, namely Assertion (A) and Reason (R). Select the most suitable option considering the Assertion and Reason.
Question 11.
Assertion (A) E-mail is an electronic version of sending and receiving letters. [1]
Reason (R) You can send and receive an e-mail without using internet.
(a) Both A and Rare true and R is a correct explanation of A.
(b) Both A and Rare true but R is not a correct explanation of A.
(c) A is true and R is false.
(d) A is false and R is true.
Answer:
(c) A is true and R is false.
(c) A is true but R is false because Email can be send only with when you have Internet connection.
Question 12.
Assertion (A) <HTML> </HTML> is a container tag.
Reason (R) Container tags do not require opening and closing tags and can be used anywhere in an HTML document.[1]
(a) Both A and R are true and R is a correct explanation of A.
(b) Both A and R are true but R is not a correct explanation of A.
(c) A is true and R is false.
(d) A is false and R is true.
Answer:
(c) A is true and R is false.
A is true but R is false because container tags are the HTML tags which include both ON and OFF tags.
Section B (2 Marks Each)
Question 13.
Describe the following social networking sites [2]
(i) Facebook
(ii) MySpace
Answer:
(i) Facebook It was developed on February 4, 2004 by Mark Zuckerberg. Today, Facebook is one of the largest online social network with over 500 million users. It is the one site where you are likely to find friends, colleagues and relatives all floating around.
(ii) MySpace It is a social networking website offering an interactive, user submitted network of friends, personal profiles, blogs, photos, music and videos. It was the largest social networking site in the world.
Question 14.
What are the emoticons? Also, write some commonly used smileys? [2]
Or
What is Secure Shell protocol?
Answer:
Emoticons or smileys are elements that help you to express your emotions or feelings in your E-mails and text messages. They provide a direct and funny way to express yourself in addition to the words in your messages.
Some commonly used smileys are as follows
Or
The SSH (Secure Shell) protocol is a method for secure remote login from one computer to another. It provides several alternative options for strong authentication and it protects the communications security and integrity with strong encryption. It is a secure alternative to the non-protected login protocols (such as telnet) and insecure File Transfer Methods (such as FTP).
Question 15.
Answer the following questions.
(i) Which attributes of <TABLE> tag are used for specifying its dimensions in a web page?
(ii) Name the attribute of <TABLE> tag which is used for specifying the alignment of text in table.
(iii) Name the attribute for changing text color.
(iv) Write the name of attribute for giving alternate text for image. [2]
Answer:
(i) width and height attributes
(ii) align attribute
(iii) color attribute
(iv) alt attribute
Question 16.
Write any two advantages and disadvantages of SSL. [2]
Or
What is SET? Write its two advantages.
Answer:
Two advantages of SSL are:
- SSL (Secure Sockets Layer) provides security at the session layer, its presence is completely invisible either to the merchant’s web shop software or the customer.
- SSL is already built into commonly used web browsers and there is no need to install any additional software.
‘Two disadvantages of SSL are as follows
- SSL protects the communication link between the merchants and customers. The merchant is allowed to see the payment information. But SSL can neither guarantee that the merchant will not misuse this information.
- SSL cannot provide assurance of non-repudiation without a third party server.
Or
SET (Secure Electronic Transaction) is a system for ensuring the security of financial transactions on the Internet. It was supported initially by Mastercard, Visa, Microsoft, Netscape and others. SET is not some system that enables payment but it is a security protocol applied on those payments. It uses different encryption and hashing techniques to secure payments over Internet done through credit cards.
Two advantages of SET are as follows
- SET prevents merchants from seeing the customer payment information.
- To ensure merchant privacy; SET prevents the payment gateway from seeing the order information.
Question 17.
What is linking in HTML? Write its objectives. [2]
Answer:
A key feature of the HTML is its ability to link text and/or an image to another document or within a document. If you are on a Web page and see the colored and/or an underlined text, it is a hyperlink. It is also known as hypertext link or just link. By default, color of a hyper link is blue.
The main objectives of linking are as follows
- To add more pages to the Website and link them together.
- Using internal links (anchors) to save scrolling for visitors.
Question 18.
Write the differences between height and width attributes of a table in HTML. [2]
Or
Differentiate between valign attribute and align attribute.
Answer:
Differences between height and width attributes of a table in HTML are as follows:
height attribute | width attribute |
(i) This specifies the height of a cell. | (i) This specifies the width of a cell. |
(ii) It is used to set pre-defined height of a cell. | (ii) It is used to set the width of a “table (with <TABLE>tag)” or width of a “cell (with <TD> tag). |
Or
align | valign |
(i) It aligns TABLE data. | (i) It aligns contents in a cell. |
(ii) It is used with tags like <BODY> <IMG> etc. | (ii) It sets the vertical alignment of the cell’s content. It is used with <TD> tag. |
(iii) It can be left, right or center. | (iii) It can be top, middle or bottom. |
Question 19.
List a few attributes of world wide web. [2]
Answer:
WWW provides various attributes, which are as follows
(a) User-friendly The WWW resource works smoothly with most Web browsers, such as Internet Explorer, Firefox etc.
(b) Multimedia documents WWW allows users to create and display Web pages that contains various graphics, audio, video, animation and text.
(c) Interactive WWW provides interactivity using hyperlinks and input boxes (i.e. textboxes and checkboxes).
(d) Frames WWW supports frames that allow users to display more than one independent section on a single Web page.
Section – C (3 Marks Each)
Question 20.
Intellectual property right means that the person who produces the information is the only one who can use that information. Now, explain the need of protecting intellectual property right. [3]
Answer:
The intellectual property rights must be protected because of protecting them
- Encourages individuals and businesses to create new software and new software applications, as well as improving existing applications.
- Ensures new ideas and technologies are widely distributed.
- Promotes investment in the national economy.
Question 21.
Observe the following web page and write the code to generate it. [3]
Answer:
<HTML> <HEAD><TITLE>Career</TITLE></HEAD> <BODY> <H1>!!Progen Careers!!</H1> <P align = "right"><An ISO 9002 organisation)</P> <UL type = "disc"> <LI> Computer Courses > <OL type = "1"> <LI> BCA <LI> MCA ‘</OL> <LI> Management Courses <OL type ="1"> <LI> BBA <LI> MBA </OL> <LI> B.Tech </UL> </BODY> </HTML>
Question 22.
What is a list box? How does it look? [3]
Or
What is a combo box? How does it look?
Answer:
A list box is a graphical control element that allows the user to select one or more items from a list contained.
The <SELECT> tag is used to create a drop-down list. The <OPTION> tag inside the <SELECT> tag defines the available options in the list. By default, the first item in the drop-down list is selected.
As multiple attribute value is specified as “multiple”, so it gives ability to select more than one item from the box by holding Ctrl key.
Combo box in HTML is used to display a drop-down list of some options from which one can be selected. <SELECT> tag is supported In all the web browsers. <OPTION> tag is used inside the <SELECT> tag that displays the options in the list. It occupies less space but shows only one value for visibility. In this, multiple selection of items are not possible.
Question 23.
Help Priya in designing a table of first two periods in school along with the subjects taught in those periods.
Observe the table and write the code to generate it. [3]
Period1 | Period2 |
Math | Science |
English | SST |
Science | SST |
Answer:
<HTML> <BODY> <TABLE cellpadding = "10" cellspacing="0" border="1"> <TR> <TH>Periodl</TH> <TH> Period2 </TH> </TR> <TR align = "center"> <TD>Math</TD> <TD>Science</TD> </TR> <TR align="center"> <TD>English</TD> <TD>SST</TD> </TR> <TR align="center"> <TD>Science</TD> <TD>SST</TD> </TR> </TABLE> </BODY> </HTML>
Section – D (4 Marks)
Question 24.
Write the HTML code to design the web page as shown below, considering the specifications that follows. You can write the code for given specifications. [4]
(i) The title of the page is “Manchester Football Club Website”.
(ii) The heading is blue color.
(iii) Font of entire document is arial.
(iv) The page is linked to
Proud history to “history.html”
(v) Bottom message is of size 2.
Or
Write the HTML code to design the web page as shown below, considering the specifications that follow. You can write the code for given specifications.
(i) Title of the page is “Save the Earth”.
(ii) The sub heading is in “Verdana” font, font size is 4 and color is Brown.
(iii) The links are provided in an unordered list with ordered list used in between.
(iv) The pages are linked as follows
Home – Home.html
Faqs Faq.html
Pollution Poll.html
Deforestation Defores.html
Poaching Poach.html
Forests Forest.html
Endangered Species Specie.html
(v) The categories ‘Controlling’ and ‘Saving’ in the unordered list are not linked to any page.
Answer:
<HTML> <HEAD><TITLE>Manchester Football Club Website</TITLE></HEAD> <BODY> <FONT face="arial" size="3"> <H1 align="center"><FONT color="blue">FOOTBALL CLUB</FONT></H1> <CENTER><IMG src="footbal.jpg” height=" 150" width="150"></CENTER> <H3>Welcome to the website of the Manchester Football Club</H3> <P>The Manchester Football Club is based in United States of America and has a long <BR> and <A href="history.html">proud history</A>. We have several teams in various age groups from kids to grown-<BR>ups so there is a team to suit any player. <BR><BR> <U>This year's motto:</U><BR> We are the BEST:<BR> <HR size="3" noshade size ="75%"> <FONT size="2"XB>If you have any questions about us. send us a mail at [email protected]</B></FONT><BR> <H5 align="right"> <IMG src="copy.jpg" height=”20" width=”30">Manchester Football Club.Last updated 30th July 2017</H5> </FONT> </BODY> </HTML>
Or
<HTML> <HEAD> <TITLE> Save the Earth </TITLE> </HEAD> <BODY bgcolor =”silver"> <H1> <FONT face=''arial" color="black” size=”6"> <CENTER>Save the Earth!! </CENTER> </FONT> </H1> <FONT face="verdana” color="brown”size="4"> <P align="center''>NGo Group dedicated to Saving the Earth’s Natural Environment</P> </FONT> <FONT face ="verdana" color="black" size="4"> <CENTER> <IMG src =”Main.jpg"> </CENTER> <UL type = "disc"> <LI> <A href="Home.html">Home</A> </LI> <LI> <A href="Faq.html">Faqs</A> . </LI > <LI> <B>Controlling </B> </LI > <OL type="1"> <LI> <A href="Poll.html"> Pollution</A> </LI> < LI > <A href="Defores.html"> Deforestation</A> </LI> < LI > <A href="Poach.html"> Poaching</A> </LI> </OL> < LI > <B> Saving </B> </LI> <OL type="1"> < LI > <A href="Forest.html"> Forests</A> </LI > <LI > <A href="Specie.html"> Endangered Species</A> </LI> </OL> </UL> </FONT> <HR noshade width=”820" height="80” size="2"> <B><FONT size=''4">Do visit: www.saveearth.com</FONT></B> </BODY> </HTML>
Section – E (4 Marks Each)
Case Study-1
Question 25. [4]
The RBI is planning to expand its connectivity with all major banks of India. The plan includes providing TCP connectivity through HTTP for easy access points and seeks help from some ISPs to join hands in this venture.
Also, there is a plan to set-up IIS and SMTP servers. Some banks will go for ADSL line while others will use leased line connectivity to access these services.
The RBI is also taking help of IIT professors in this venture.
Answer the following questions.
(i) Give the full form of TCP and HTTP.
(ii) What do you mean by ISP?
(iii) What is the use of protocol which used in above paragraph?
(iv) Help to understand the term ADSL.
Answer:
(i) TCP Transmission Control Protocol
HTTP HyperText Transfer Protocol
(ii) ISP (Internet Service Provider) An organisation that provides access to the Internet through various connectivity
methods.
(iii) TCP (Transmission Control Protocol) A protocol developed for the Internet to get information from one network device to another.
HTTP (HyperText Transfer Protocol) A protocol that transmits hypertext over networks. This is the protocol of the Web.
SMTP (Simple Mail Transfer Protocol) It distributes E-mail messages and attached files to one or more electronic mail boxes.
(iv) ADSL (Asymmetrical Digital Subscriber Line) A data communication technology that enables faster data transmission over copper telephone lines than a conventional voice band modem can provide.
Case Study-2
Question 26.
Raghav met a friend and while conversating, he told him that he needed a software upgrade. His friend told him that it would be very expensive and Raghav can easily get a copy of that software without paying for it. Raghav got convinced and bought the copy of that software from his friend.
Later on, his uncle who worked in Tech business told him that Raghav had a fake software and he could be arrested for this crime. [4]
Answer the following questions.
(i) What is the term which means copying of data or computer software without owner’s permission?
(ii) Piracy is the violation of which right?
(iii) Write any two forms of software piracy.
(iv) What are the laws that are there to stop piracy?
Answer:
(i) Software piracy
(ii) Intellectual Property Rights
(iii) Two forms of software piracy are
(a) Software counterfeiting This type of software piracy that occurs when fake copies of software are produced in t such a way that they appear to be authentic.
(b) Softlifting Purchasing only one licensed copy of a software and distributing and loading it onto multiple systems is called softlifting.
(iv) In order to stop software piracy, two types of laws are formulated as follows
(a) Copyright is an exclusive right of the developer or author to protect their works which is granted by law.
(b) Patent is the special power of monopoly granted by the law. The work cannot be used or reproduced without obtaining a license from patent holder.