Students must start practicing the questions from CBSE Sample Papers for Class 10 Computer Applications with Solutions Set 8 are designed as per the revised syllabus.
CBSE Sample Papers for Class 10 Computer Applications Set 8 with Solutions
Time : 2 hrs
Max. Marks : 50
Instructions
- This Question Paper has 5 Sections A-E.
- All Questions are compulsory. However, internal choices have been provided in some of the questions.
- Section A has 12 questions carrying 01 mark each.
- Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
- Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
- Section D has 1 Long Answer (LA) type question carrying 04 marks.
- Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Section A
(All questions are compulsory)
Question 1.
Which of the following terms describes the uneven distribution of ICT? [1]
(a) Cyber Ethics
(b) Digital divide
(c) Plagiarism
(d) Piracy
Answer:
(b) Digital divide
Question 2.
Copying a file from a host system to your computer is known as what? [1]
(a) Uploading
(b) Downloading
(c) Sharing
(d) Presentation
Answer:
(b) Downloading
Question 3.
What is the full form of SSH protocol? [1]
(a) Secure Shell
(b) Security Server
(c) Secure Transaction
(d) Secure Layer
Answer:
(a) Secure Shell
Question 4.
What is mobile technology? [1]
(a) A form of technology which includes GPRS, Multimedia Messaging, bluetooth, 3G etc.
(b) Downloading/uploading data on Internet
(c) A security protocol
(d) Only mobile data services
Answer:
(a) A form of technology which includes GPRS, Multimedia Messaging, bluetooth, 3G etc.
Question 5.
Which of the following is/are popular chat application(s)? [1]
(a) WhatsApp
(b) WeChat
(c) Tango
(d) All of these
Answer:
(d) All of these
Question 6.
What does the <B> tag do in HTML? [1]
(a) Creates a bold text
(b) Creates a bullet point
(c) Creates an italicized text
(d) Creates an underlined text
Answer:
(a) Creates a bold text
Question 7.
How to create a checkbox in HTML?[1]
(a) <input type=”checkbox”>
(b) <input type=”button” >
(c) <checkbox >
(d) <input type=”check” >
Answer:
(a) <input type=”checkbox”>
Question 8.
There are total ……… values for rules attribute in tag. [1]
(a) four
(b) three
(c) two
(d) five
Answer:
(d) five
Question 9.
Which attribute of tag is used to merge two or more columns to form a single column? [1]
(a) colspan
(b) rowspan
(c) colarrange
(d) row arrange
Answer:
(a) colspan
Question 10.
A CSS declaration always ends with a [1]
(a) dot(.)
(b) colon(:)
(c) semicolon(;)
(d) hash(#)
Answer:
(c) semicolon(;)
Directions (Q.Nos. 11 and 12) are Assertion and Reason types. Each question consists of two statements, namely Assertion (A) and Reason (R). Select the most suitable option considering the Assertion and Reason.
Question 11.
Assertion (A) E-learning is the mode of acquiring knowledge by means of Internet and computer based training programs.
Reason (R) E-learning can be done anywhere and at anytime. [1]
(a) Both A and R are true and R is a correct explanation of A.
(b) Both A and R are true but R is not a correct explanation of A.
(c) A is true and R is false.
(d) A is false and R is true.
Answer:
(b) Both A and R are true but R is not a correct explanation of A.
E-learning is mode of acquiring knowledge by means of Internet and they provide the easy way to learn anything. With the help of Internet and mobile or laptop, E-learning can be done anywhere or anytime. Hence, both A and R are true but R is not a correct explanation of A.
Question 12.
Assertion (A) mailto is an easy and fast way by which a visitor at a website can directly send mail to website owner.
Reason (R) mail to is used in href but it is unable to create a link to open default E-mail client. [1]
(a) Both A and R are true and R is a correct explanation of A.
(b) Both A and R are true but R is not a correct explanation of A.
(c) A is true and R is false.
(d) A is false and R is true.
Answer:
(b) Both A and R are true but R is not a correct explanation of A.
mailto is a value used with href attribute of < A> tag. It is an easy or fastest way by which a visitor at website can directly send mail to website owner. Hence, both A and R are true but R is not a correct explanation of A.
Section – B [2 Marks Each]
Question 13.
Karan uses a search engine to get detail regarding India’s struggle for freedom. [2]
(i) Define the word “search engine”.
(ii) Name any five common search engines.
Answer:
(i) Search engine is a bottom-up approach for finding your way around the web. You give to a search engine, a list of keywords or phrase (called a query) and it returns to you a list of web pages that contain those words or phrases.
(ii) Google, AltaVista, Excite, Web Crawler and Lycos.
Question 14.
What are E-groups? Describe. [2]
Or
Describe what is social networking?
Answer:
An E-group (Electronic group) or online clubbing is a group of persons or individuals who come together over the Internet for a specific or common purpose using the best Internet communication tools to share ideas, different opinions, experiences and to learn from each other. E-groups are Internet based discussion groups. A message posted in discussion is known as post. All the posts are visible to all the group members.
Or
Social networking is the grouping of individuals into specific groups, like small rural communities or a neighbourhood sub -division. This service is an online service, platform or site that focuses on facilitating the building of social networks or social relations among people e.g. who share interests, activities, backgrounds or real life connections.
When it comes to online networking, social networking Websites are commonly used. These Websites are known as social networking sites.
Question 15.
Why rowspan and colspan attributes are used? [2]
Answer:
Sometimes, a table cell is bigger than other. Its span is spread to more rows or columns. Such cells can be created with the help of rowspan and colspan attributes, rowspan and colspan are attributes of <TD> tag.
Question 16.
Using copyright, software piracy can be stopped. How? [2]
Or
What do you mean by privacy in E-Commerce?
Answer:
The copyright in the work of authorship immediately becomes the property of the author, who created the work. Only the author or those deriving their rights through the author, can rightfully claim copyright.
Or
The privacy in E-Commerce means the protection of privacy of the parties involved in trading through E-Commerce.
Trading in the online shop accessed through Internet between Business-to-Business (B2B), Business-to Consumer (B2C) and Consumer-to-Consumer (C2C) is the main purpose of E-Commerce. Parties involved in this kind of trading exchange information including private information like address, credit card number, etc, to complete a transaction.
Question 17.
What are empty elements in HTML? Give examples. [2]
Answer:
Empty elements are standalone tags, i.e. empty tags do not have to be wrapped around text or graphics and do not require a closing tag. In other words, HTML tags that include only On tag and there is no OFF tag then, these tags are known as empty tags.
e.g. <HR> inserts a horizontal line
<BR> adds a line break
Question 18.
Write HTML code to set the border around an image using border attribute. [2]
Or
What are container elements in HTML?
Answer:
<HTML> <HEAD><TITLE> Setting Image Border </TITLE> </HEAD> <BODY> <H1> Setting Image Border </H1> <CENTER> < IMG src="flower1.jpg” height="120” width="200" border="5"> </CENTER> </BODY> </HTML>
Output
Or
These types of HTML elements always wrap around the text or graphics which come in a set with an opening as well as a closing tag.
In other words, HTML tags that include both On and OFF tags are known as container tags, e.g. <HTML>…</HTML>
Question 19.
What is web server? [2]
Answer:
Web server is a computer program that serves requested HTML pages or files from the Web client. Every Web server that is connected to the Internet is associated with a unique address, i.e. IP address. Web server software generally requires a fairly robust operating system like Unix, Windows NT. Every Website need to be stored on a computer called the Web server from which it can be accessed.
Currently, there are five major Web servers commonly used for hosting Websites as follows
- Apache HTTP Server
- Internet Information Server
- Lighttpd
- Sun Java System Web Server
- Jigsaw Server
Section – C [3 Marks Each]
Question 20.
Digital divide is a huge problem to deal with. Write any three effects of digital divide. [3]
Answer:
There are various effects of digital divide as given below:
- Economic Inequality Digital divide creates economic inequality, because those who have access to modern technology can easily collect valuable economical information.
- Effect on Education It has an impact on education as student who have Internet access and computer, can acquire vast varieties of information from Internet very fast.
- Economic Growth Penetration of Internet enables people to engage in economically productive activities such as trade without much hassle. They can shop online and compare prices to get the best bargains, participate in online auctions and safely and securely transact online this translates to economic empowerment.
Question 21.
Give the HTML code to display following output. [3]
Answer:
<HTML> <BODY> <UL type = "disc"> <B><U>Gurudev Library </U></B> <LI><B>Academic</B> <OL type = "i"> <LI> CBSE Board <LI> UP Board </OL> <LI><B>Vacancy</B> <UL type="square"> <LI>UPSC </UL> <OL type ="a"> <LI>SSC CGL <LI> Banking <OL type ="1"> <LI> Clerk <LI> PO </OL> </OL> </UL> </BODY> </HTHL>
Question 22.
Write an HTML code to
(i) Create a link for garden.jpg located at D:\.
(ii) Display an inline image named pencil.jpg located at C:in the center of your web page. [3]
Or
Write the HTML code to embed Audio and Video elements in a web page.
Answer:
(i)
<HTML> <BODY> <A href = “D:/garden.jpg”>image</A> </BODY> </HTML>
(ii)
<HTML> <BODY> <CENTER> <IMG src = “C:/pencil.jpg”> </CENTER> </BODY> </HTML>
Or
The <AUDIO> element is used to embed sound content in documents. It may contain one or more audio sources, represented using the src attribute.
<HTML> <BODY> <H2> Embedding an audio file</H2> <AUDIO CONTROLS) <SOURCE src=‘‘Audio.mp3” type=“audio/mp3”> File Format Not supported </AUDIO> </BODY> </HTML> The <VIDEO> element allows us to embed video files into an HTML document, very similar to the way images are embedded. The HTML does not specify which video formats browser should support in the <VIDEO> tag, but most commonly used video formats are ogg, mpeg4. <HTML> <BODY> <H2> Embedding a video file</H2> <VIDEO width=“500” height=“400”controls autoplay> <SOURCE src=“videoplayback.mp4” type=“video/mp4.”> </VIDEO> </BODY> </HTML>
Question 23.
An artist has to prepare a table to showcase the type of paintings he has created, their quantity and their price. Help him to make the table. Observe the table and write the code to generate it. [3]
Answer:
<HTML> <HEAD> <TITLE>Table</TITLE> </HEAD> <BODY> <TABLE border="3" align ="center" bordercolor ="blue”> <CAPTION color =''red"> Available Paintings </CAPTION> <TR> <TD rowspan="5”> I <BR> N <BR> D <BR> I <BR> A <BR> N </TD> <TD colspan =”3"> PAINTING </TD> </TR> <TR> <TH> NAME </TH> <TH> QTY </TH> <TH> PRICE </TH> </TR> <TR> <TD> Oil Painting </TD> <TD> 4 </TD> <TD> 3000 </TD> </TR> <TR> <TD> Glass Painting </TD> <TD> 2 </TD> <TD> 5000 </TD> </TR> <TR> <TD> Canvas </TD> <TD> 2 </TD> <TD> 1000 </TD> </TR> </TABLE> </BODY> </HTML>
Section – D [4 Marks]
Question 24.
Write the HTML code to design the web page as shown below, considering the specifications that follow. You can write the code for given specifications. [4]
(i) Background color of page is yellow.
(ii) Font style for the page is arial.
(iii) Image used is gov.jpeg.
(iv) Text color of the paragraph is red.
(v) E-mail id for bottom message is [email protected].
Or
Write the HTML code to design the web page as shown below, considering the specifications that follow. You can write the code for given specifications.
(i) Link color is black, background color is yellow and visited link color is green.
(ii) Image used is “Computer.jpg”.
(iii) Caption of table is blue.
(iv) Table border is blue and of size 2. Showcasing the advantages of computers.
(v) The 4 links are monitor.html, system.html, mouse.html and keyboard.html.
Answer:
The HTML code is
<HTML> <BODY bgcolor="yellow” link ="black” vlink=''green"> <BASEFONT face = "arial"> <CENTER> <FONT color=''maroon''> <H1> National e-Governance Plan </H1> </FONT></CENTER> <HR> <P> <FONT color="red"> <IMG src="gov. jpeg" alt=''gov" align=''right”> The National E-Governance Plan of Indian Government'seeks to lay the foundation and provide the impetus for long-term growth of E-Governance within the country. The plan . seeks to create the right governance and institutional mechanisms, set up the core infrastructure and policies and implementation of a number of Mission Mode, Projects at the center, state and integrated service levels to create a citizen-centric and business-centric environment for governance. </FONT></P> <BR> <B>Visit<A href ="nation.html "> National e-Governance Plan</A> to know more about:<BR> <OL type ="1"> <LI>Central MMP's</LI> <LI>Implementation</LI> <LI>Components</LI> </OL></B><HR> <CENTER>For enquires <A href=''mailto:[email protected]">Mail to us </A> </CENTER> </BODY > </HTML>
Or
<HTML> <BODY> <H1 align=“center”><U><FONT color=“Red”> COMPUTER </FONT></U></H1> <BODY bgcolor=“yellow” link=“black” vlink=“green”> <FONT face=“Arial”> <P align=“left”><B> A computer is a machine that can be programmed to carry out sequences of arithmetic or logical operations automatically.<BR> Modern computers can perform generic sets of operations known as programs. <BR> These programs enable computers to perform a wide range of tasks.<BR></B> </P> <IMG src=“Computer.jpg” align=“right” height=“300” width=“300”> <P> Parts of a Computer: <UL type=”disc"> <LI> <A href=“monitor. html ”> Monitor </A></LI> <LI><A href=“system. html ”> System Cabinet</A></LI> <LI> <A href=“mouse. html ”> Mouse </AX/LI> <LI>A href=“keyboard.html”> Keyboard</A></LI> </UL> </P> <FONT color=“blue”> <CAPTION><CENTER><B> Advantages of Computers </B> </CAPTION> <TABLE border=“2px” width=“220” align=“center” cell spacing=“1” bordercolor=“Blue”> <TR> <TD>1</TD> </TR> <TD>Multi-tasking </TD> <TR> <TD>2</TD> <TD> High speed </TD> </TR> <TR> <TD>3</TD> <TD> Habitat Loss </TD> </TR> <TR> <TD>4</TD> <TD> Accuracy </TD> </TR> <TR> <TD>5</TD> <TD> Data security </TD> </TR> </TABLE> </CENTER> <CENTER> <FONT size=“4”> For further details <A href=“mail to:[email protected]”> Contact Us</A></FONT> </CENTER> </FONT> </BODY > </HTML>
Section – E (4 Marks Each)
Case Study-1
Question 25.
When Neeru visited her facebook account, she saw an update about a job opportunity. She sent her resume on the given E-mail address. When she went back home, she saw her mother talking to Vishwas on laptop, who live in US. They were discussing about blog written by him. She received a prepaid package from myntra.com, for which she has placed on order. Neeru lives to login in Yahoo! messenger to talk to her friends and is a member of various groups over Internet. [4]
Answer the following questions.
(i) Give the meaning of E-mail address.
(ii) Name the service with the help of it Neeru’s mother talked with Viswas.
(iii) Here is a term myntra.com. What is this?
(iv) Neeru is using Yahoo! Messenger to talk with her friends. Give any one advantage of using it.
Answer:
(i) An email address is a designation for an electronic mailbox that sends and receives messages, known as email, on a computer network.
(ii) Video conferencing
(iii) Myntra is one of the largest fashion e-commerce stores in India that deals with a wide range of fashion and lifestyle products for men, women, and kids.
(iv) Yahoo! Messenger includes live video chat and conferencing. Yahoo! Messenger also places no limit on the time you can spend using the video conferencing feature.
Case Study-2
Question 26.
Yamini recently tried logging in to her social media account. She was able to login and post updates on her account but a few days later when she tried to do the same, she couldn’t login and when she saw her account through someone else’s profile, she noticed that there were many spam posts and stories on her account which were not posted by her. She reported her complaint to the social media company, her account got deleted and she had to make a new one. [4]
Answer the following questions.
(i) What is the term for stealing of required information by seeding a weakness in a computer?
(ii) What had happened to Yamini’s account?
(iii) What does a hacker do?
(iv) Mention any two methods to prevent hacking.
Answer:
(i) Hacking
(ii) Yamini’s account got hacked and the hacker posted spam content on it.
(iii) A hacker appears with malicious intention and breaks into the owner’s system and steals the information.
(iv) Tp prevent hacking, following points are to be used
(a) Create complex passwords
(b) Log out of accounts when you are done with them.