Trending ▼   ResFinder  

CBSE Class 10 Sample / Model Paper 2021 : Computer Applications (with Marking Scheme / Solutions)

21 pages, 45 questions, 0 questions with responses, 0 total responses,    0    0
CBSE 10
Kendriya Vidyalaya (KV), Kamla Nehru Nagar, Ghaziabad
+Fave Message
 Home > CBSE - main folder > SAMPLE / MOCK Question Papers : CBSE Board Class 10 >   F Also featured on: cbse10

Instantly get Model Answers to questions on this ResPaper. Try now!
NEW ResPaper Exclusive!

Formatting page ...

Class: X Session: 2020-21 Computer Applications (Code 165) Sample Question Paper (Theory) Maximum Marks: 50 Time Allowed: 2 hours General Instructions: 1. This question paper contains two parts A and B. Each part is compulsory. 2. Part A carries 20 marks while part B carries 30 marks. 3. Part-A consists very short answer and case based MCQ Questions and Part-B is Descriptive Paper. 4. Both Part A and Part B have choices. Part A: 1. It consists two sections- I and II. 2. Section I has 13 questions of very short answer type. An examinee is to attempt any 10 out of 13 questions. 3. Section II has two case studies. Each case study has 7 case-based sub-parts. An examinee is to attempt any 5 out of 7 sub-parts. Part B: 1. Question No. 16 to 20 are short answer Type (SA-I) questions of 2 mark each, Question No 21 to 25 are Short Answer Type (SA-II) questions of 3 marks each and Question No 26 is Long Answer Type question of 5 marks. 2. Internal choice is provided in 1 question of 2 marks, 1 question of 3 marks and 1 question of 5 marks. Part-A Question No. Marks allocated Section-I This section consists of 13 questions of very short answer type. Question no. 4 to 8 are of 'fill in the blank' type. Fill the blank with the most appropriate answer. Attempt any 10 questions from question no 1 to 13. 1 What is a Homepage? 1 Page 1 of 9 2 Which heading element gives the most prominent headings? 1 3 Give one use of anchor tag. 1 4 _____ tag is used for a horizontal line. 1 5 An empty HTML element has a _____ tag but no _____ tag. 1 6 _____ tag creates a bulleted list. 1 7 The code for inserting an image in an HTML page is <imgsrc=" " alt=" ">. The alt attribute is used for _____ 1 8 Ravi was trying to log-in to his net-banking account. He noticed that the URL of the net banking starts with 'https'. The 's' in 'https' stands for _____ 1 9 Sarita is designing a webpage and wants to change the name of the font (font-type) for certain text. Which attribute of the FONT tag she should use. 1 10 What is the use of <br> tag in HTML Code? 1 11 What is the significance of the URL? 1 12 What is the importance of vlink attribute of <BODY> tag? 1 13 What is the method of using comment line in the HTML code? 1 Section-II Both the Case study based questions are compulsory. Attempt any 5 questions (out of 7 questions) from each case study. Each question carries 1 mark 14 Internet Protocols For communication over the Internet, the communicating devices must follow certain rules. These rules are called Internet protocols. For email communication, we use SMTP Page 2 of 9 and POP. For communication between browser and server HTTP and HTTPS protocols are used. We can use TELNET to access services available on a remote computer. (i) Which of the following is an Internet Protocol. 1 a) HTTP b) FTP c) both (a) and (b) d) None of the above (ii) SMTP protocol is 1 a) used for composing an emailmessage. b) used in receiving incoming emails by pulling the message from server to client c) used in sending outgoing emails by pushing the message from client to server d) None of the above (iii) POP protocol is 1 a) used for composing an emailmessage. b) used in receiving incoming emails by pulling the message from server to client c) used in sending outgoing emails by pushing the message from client to server d) None of the above (iv) Which of the following internet protocols provides secure data transmission between server and browser with the help of encryption. 1 a) HTTP b) HTTPS c) TELNET d) ARPANET Page 3 of 9 (v) The full form of POP (email protocol) is 1 a) Post Order Protocol b) Push Order Protocol c) Post Office Protocol d) Pull Over Protocol (vi) Which of the following protocol is used for delivering data from the source to the destination. 1 a) TCP b) IP c) SMTP d) ARPANET (vii) The Full Form of SMTP is 1 a) Secure Mail Transfer Protocol b) Secure Mail Transmit Protocol c) Simple Mail Transmit Protocol d) Simple Mail Transfer Protocol 15 Secure data transmission Secure data transmission means that data/information is not being received or modified by an unauthorized person, over a network, from source to destination. For secure data transmission, we can convert an actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he/she receives an unreadable message that cannot be easily converted into the actual message. The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each 'A' will be replaced by 'D' (Letter 'D' is 3 positions down Letter 'A' in the alphabet), each 'B' will be Page 4 of 9 replaced by 'E' and similarly, each 'Z' will be replaced by 'C'. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption. (i) .Secure data transmission means 1 a) Data can be accessed by any unauthorized person during transmission. b) Data can not be accessed by any unauthorized person during transmission. c) Transmission of data d) None of the above (ii) Which of the following techniques can be used for security of data. 1 a) Authentication b) Authorisation c) Encryption d) All of the Above (iii) Caesar Cipher is 1 a) used for conversion of the actual message into an encrypted message b) an encryption technique c) both (a) and (b) d) None of the above (iv) Person 'X' has received an encrypted message and wants to convert this message into the actual message (message before encryption). The technique he should use is called 1 a) Conversion b) Encryption c) Decryption d) None of the above Page 5 of 9 (v) A sender wants to send a message having the text as 'COMPUTER' to a receiver using 4 as the key. What will be the encrypted message? 1 a) GSQTZXIV b) GSQTYXIV c) GSXTYXIV d) GSQSYXIV (vi) An encryption algorithm is used to transform a readable message into: 1 a) Text message b) Simple message c) Converted message d) Encrypted message (vii) In Ceaser Cipher, for which of the following values of key, the encrypted message will be the same as original message. 1 a) 0 b) 26 c) both (a) and (b) d) None of the above Part B All questions are compulsory. In case of internal choices, attempt any one. 16 Sarvesh, a student of Class X, is not able to understand the difference between web client and web-server. Help him in understanding the same by explaining their role and giving suitable example of each. 2 17 Write the full form of Cc and Bcc (used in emailcommunication). Explain the difference between 2 Page 6 of 9 them. 18 What is the use of <sub> and <sup>tag. Explain with suitable example. 2 19 Sunil wants to insert an image 'elearning.jpg' into a webpage. Write the name and the syntax of the HTML Tag she should use. The alternate text for the image should be 'E-learning Image' 2 20 Define the following 2 (i) Intellectual Property Rights (ii) Plagiarism OR What is e-commerce? Write any two preventive measuresto be taken for secure online transaction. 21 Shalini, a web designer, wants to create a webpage to display a list where each item is listed by a number. Which type of list she should use? Explain the role of start and type attributes. 3 22 What are the roles of Rowspan and Colspan attribute? Explain with suitable HTML example. 3 23 Saroj, a student of Class X, wants to represent a table in webpage but she is unaware about the table tag. Explain her the role of <th>, <tr> and <td> tag. Write HTML code of a table and show the use of <th>, <tr> and <td> tag. 3 24 What is the digital divide? Write any two reasons for digital divide in India. 3 25 Define Internet and write its two uses in our daily life. How is it different from the World Wide Web (www). 3 OR What is e-learning? Explain any two merits of e-learning. Page 7 of 9 26 5 Write the HTML code to design the above-shown web page considering the specifications as given below : Background color of the page should be yellow. Heading 'Our Country : India' should be the first level of heading The image named India.jpg should be placed at the center. Formatting style for the paragraph o Font Size: 5 o Font Name: Times New Roman o Color: Red Superscript and subscript tags should be used wherever required. Facts (as shown in the above web-page) should be written with the help of the unordered list. OR Answer the following a. What is a Hypertext link? b. Give the name and the syntax of the HTML Tag which is used for creating a Hypertext Link. Page 8 of 9 c. Neha wants to display a 'Click Here' message on her webpage which, when clicked, opens a new webpage 'Chapter2.html'. Write the syntax of the HTML command she should use. d. On the same webpage, Neha whose email is neha@xyz.com, wants to display a 'Contact us' message which when clicked open theemail program and allows the user to send a mail to Neha.Write the syntax of the HTML command she should use. e. Explain the use of the target attribute in the Hypertext Link Tag. Page 9 of 9 Class: X Session: 2020-21 Computer Applications (Code 165) Sample Question Paper (Theory) Marking Scheme Maximum Marks: 50 Question No. Time Allowed: 2 Hours Part-A Marks allocated Section-I 1 Ans 2 Ans 3 Ans 4 Ans 5 Ans 6 Ans This section consists of 13 questions of very short answer type. Question no. 4 to 8 are of 'fill in the blank' type. Fill the blank with the most appropriate answer. Attempt any 10 questions from question no 1 to 13. What is a Homepage? 1 The default (first) page of a website is called a Homepage. (1 Mark for the correct answer) Which heading element gives the most prominent headings? <H1> (1 Mark for the correct answer) Give one use of anchor tag. Anchor tag is used to create hyperlinks. (1 Mark for the correct answer) _____ tag is used for a horizontal line. HR tag (1 Mark for the correct answer) An empty HTML element has a _____ tag but no _____ tag. start, end (1/2 Mark each for start and end) _____ tag creates a bulleted list. <UL> (1 Mark for the correct answer) 1 1 1 1 1 Page 1 of 12 7 Ans 8 Ans 9 Ans 10 Ans 11 Ans 12 Ans 13 Ans The code for inserting an image in an HTML page is <imgsrc=" " alt=" ">. The alt attribute is used for _____ specifying alternate text for the image (1 Mark for the correct answer) Ravi was trying to log-in to his net-banking account. He noticed that the URL of the net banking starts with 'https'. The 's' in 'https' stands for _____ Secure (1 Mark for the correct answer) Sarita is designing a webpage and wants to change the name of the font (font-type) for certain text. Which attribute of the FONT tag she should use. face (1 Mark for the correct answer) What is the use of <br> tag in HTML Code? <br> tag is used to insert a single line break in a HTML Document. (1 Mark for the correct answer) What is the significance of the URL? URL specifies unique address of each document on the internet. (1 Mark for the correct answer) What is the importance of vlink attribute of <BODY> tag? vlink attribute specifies the color of visited links in a document (1 Mark for the correct answer) What is the method of using comment line in the HTML code? <!-- Any text --> (1 Mark for the correct answer) 1 1 1 1 1 1 1 Section-II Both the Case study based questions are compulsory. Attempt any 5 questions (out of 7 questions) from each case study. Each question carries 1 mark 14 Internet Protocols For communication over the Internet, the communicating devices must follow certain rules. These rules are called Internet protocols. For email communication, we use SMTP and POP. For communication between browser and server Page 2 of 12 (i) Ans (ii) Ans (iii) Ans (iv) Ans (v) HTTP and HTTPS protocols are used. We can use TELNET to access services available on a remote computer. Which of the following is an Internet Protocol. a) HTTP b) FTP c) both (a) and (b) d) None of the above c) both (a) and (b) (1 Mark for the correct answer) SMTP protocol is a) used for composing an emailmessage. b) used in receiving incoming emails by pulling the message from server to client c) used in sending outgoing emails by pushing the message from client to server d) None of the above c) used in sending outgoing emails by pushing the message from client to server (1 Mark for the correct answer) POP protocol is a) used for composing an emailmessage. b) used in receiving incoming emails by pulling the message from server to client c) used in sending outgoing emails by pushing the message from client to server d) None of the above b) used in receiving incoming emails by pulling the message from server to client (1 Mark for the correct answer) Which of the following internet protocols provides secure data transmission between server and browser with the help of encryption. a) HTTP b) HTTPS c) TELNET d) ARPANET b) HTTPS (1 Mark for the correct answer) The full form of POP (email protocol) is a) Post Order Protocol b) Push Order Protocol c) Post Office Protocol d) Pull Over Protocol 1 1 1 1 1 Page 3 of 12 Ans (vi) Ans (vii) Ans 15 (i) c) Post Office Protocol (1 Mark for the correct answer) Which of the following protocol is used for delivering data 1 from the source to the destination. a) TCP b) IP c) SMTP d) ARPANET b) IP (1 Mark for the correct answer) The Full Form of SMTP is 1 a) Secure Mail Transfer Protocol b) Secure Mail Transmit Protocol c) Simple Mail Transmit Protocol d) Simple Mail Transfer Protocol d) Simple Mail Transfer Protocol (1 Mark for the correct answer) Secure data transmission Secure data transmission means that data/information is not being received or modified by an unauthorized person, over a network, from source to destination.For secure data transmission, we can convert an actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he/she receives an unreadable message that cannot be easily converted into the actual message. The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each 'A' will be replaced by 'D' (Letter 'D' is 3 positions down Letter 'A' in the alphabet), each 'B' will be replaced by 'E' and similarly, each 'Z' will be replaced by 'C'. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption. .Secure data transmission means 1 a) Data can be accessed by any unauthorized person during transmission. b) Data can not be accessed by any unauthorized Page 4 of 12 Ans (ii) Ans (iii) Ans (iv) Ans (v) Ans (vi) person during transmission. c) Transmission of data d) None of the above b) Data can not be accessed by any authorized person during transmission (1 Mark for the correct answer) Which of the following techniques can be used for security of data. a) Authentication b) Authorisation c) Encryption d) All of the Above d) All of the Above (1 Mark for the correct answer) Caesar Cipher is a) used for conversion of the actual message into an encrypted message b) an encryption technique c) both (a) and (b) d) None of the above c) both (a) and (b) (1 Mark for the correct answer) Person 'X' has received an encrypted message and wants to convert this message into the actual message (message before encryption). The technique he should use is called a) Conversion b) Encryption c) Decryption d) None of the above c) Decryption (1 Mark for the correct answer) A sender wants to send a message having the text as 'COMPUTER' to a receiver using 4 as the key. What will be the encrypted message? a) GSQTZXIV b) GSQTYXIV c) GSXTYXIV d) GSQSYXIV b) GSQTYXIV (1 Mark for the correct answer) An encryption algorithm is used to transform a readable message into: a) Text message 1 1 1 1 1 Page 5 of 12 Ans (vii) Ans b) Simple message c) Converted message d) Encrypted message c) Encrypted message (1 Mark for the correct answer) In Ceaser Cipher, for which of the following values of key, the encrypted message will be the same as original message. a) 0 b) 26 c) both (a) and (b) d) None of the above c) both (a) and (b) (1 Mark for the correct answer) 1 Part B All questions are compulsory. In case of internal choices, attempt any one. 16 Ans 17 Ans 18 Sarvesh, a student of Class X, is not able to understand 2 the difference between web client and web-server. Help him in understanding the same by explaining their role and giving suitable example of each. Web-Client: An application (Web Browser, Chatting Program, etc.) that requests for services from a webserver. Example: Web Browsers, Chatting Applications Web-Server: Web-server is a software (or any dedicated computer running this software) that serves the request made by web-clients. Example: Apache Server (1/2 mark each for explaining the role of Web-Client and Web-Server) (1/2 mark each for example of web-client and web-server) Write the full form of Cc and Bcc (used in 2 emailcommunication). Explain the difference between them. Cc : Carbon Copy: every recipient can check who else has received the mail. Bcc : Blind Carbon Copy: no recipient can check who else has received the mail. (1/2 mark each for full form of Cc and Bcc) (1 mark for explaining the correct difference) What is the use of <sub> and <sup>tag. Explain with 2 suitable example. Page 6 of 12 Ans 19 Ans 20 Ans 21 Ans <sub> : defines subscripted text <sup> : defines superscripted text Example To write a2 : a<sup>2</sup> To write CO2 : CO<sub>2</sub> (1/2 mark each for explaining the use of <sub> and <sup> tag) (1/2 mark each for example of <sub> and <sup> tag) Sunil wants to insert an image 'elearning.jpg' into a webpage. Write the name and the syntax of the HTML Tag she should use. The alternate text for the image should be 'E-learning Image' Name of Tag : Image Tag (<img>) Syntax of Tag :<imgsrc = "elearning.jpg" alt = "E-learning Image"> (1/2 mark for correct name of tag) (1/2 mark for correct use of img tag in syntax) (1/2 mark for correct use of src attribute) (1/2 mark for correct use of alt atribute) Define the following (i) Intellectual Property Rights (ii) Plagiarism OR What is e-commerce? Write any two preventive measuresto be taken for secure online transaction. Intellectual Property Rights: rights given to creators for creations of their minds. Plagiarism: taking credit of ideas/words of another person OR e-commerce: Buying and selling of goods on the internet Two preventive measures for secure online transaction 1. Never share OTP with anyone. 2. Before making an online payment, ensure that connection is secure (HTTPS) (1 mark each for the correct definition of Intellectual Property Rights and Plagiarism) OR (1 mark for the correct definition of e-commerce) (1/2 mark each for two preventive measures) Shalini, a web designer, wants to create a webpage to display a list where each item is listed by a number. Which type of list she should use? Explain the role of start and type attributes. Ordered List 2 2 3 Page 7 of 12 22 Ans 23 Ans Role Start Attribute: specifies the start value of an ordered list Type Attribute: specifies the type of the list item marker (1 mark for the correct list type) (1 mark each for explaining the correct role of start and type attributes) What are the roles of Rowspan and Colspan attribute? Explain with suitable HTML example. Rowspan : Combine Cells vertically Colspan : Combine Cells horizontally Example <table border = '1'> </tr> <tr> <td>Row-1 Column-1</td> <td colspan="2">Row-1 Column-2and3</td> <td rowspan="2">Row-1and2 Column-4</td> </tr> <tr> <td>Row-2 Column-1</td> <td>Row-2 Column-2</td> <td>Row-2 Column-3</td> </tr> </table> (1/2 mark each for explaining correct role of Rowspan and Colspan) (1 mark each for correct explaination of Rowspan and Colspan using HTML example) Saroj, a student of Class X, wants to represent a table in webpage but she is unaware about the table tag. Explain her the role of <th>, <tr> and <td> tag. Write HTML code of a table and show the use of <th>, <tr> and <td> tag. <tr> : defines table row. <th> : defines table header. <td> : defines table data/cell. 3 3 HTML Code <table> <tr> <th>Roll Number</th> <th>Name</th> <th>Stream</th> </tr> <tr> Page 8 of 12 24 Ans 25 Ans <td>1</td> <td>Ajay</td> <td>Arts</td> </tr> <tr> <td>2</td> <td>Vijay</td> <td>Commerce</td> </tr> <tr> <td>3</td> <td>Ramesh</td> <td>Commerce</td> </tr> </table> (1/2 mark each for explaining the correct role of <th>, <tr> and <td> tag) (1.5 mark for correct code of HTML table showing the use of <th>, <tr> and <td> tag) What is the digital divide? Write any two reasons for digital divide in India. Digital Divide refers to the differing amount of information between those who have access to ICT and those who don't have access. Reasons due to the unequal distribution of wealth, poverty is higher in rural areas Less Literacy rate in rural India (1 mark for the correct definition of digital divide) (1 mark each for any two correct reasons for the digital divide in India) Define Internet and write its two uses in our daily life. How is it different from the World Wide Web (www). OR What is e-learning? Explain any two merits of e-learning. The Internet is a worldwide network that links many smaller computer-networks. Uses of the Internet 1. e-learning 2. e-commerce The difference between the internetandwww www: It is a collection of various hypertext documents available over the internet. www is a part of the internet. internet: A worldwide network that provides various other 3 3 Page 9 of 12 services (apart from www) like email-communication, File sharing, etc. OR e-learning: learning through the courses which are delivered online. Benefits : 1. Self Paced (Learn at your speed). 2. We can attend classes atanytime and anywhere. (1 mark for the correct definition of the internet) (1/2 mark each for writing two use of internet in daily life) (1 mark for explaining the correct difference between internet and www) OR (1 mark for the correct definition of e-learning) (1 mark each for writing any two merits of e-learning) 26 5 Write the HTML code to design the above-shown web page considering the specifications as given below : Background color of the page should be yellow. Heading 'Our Country : India' should be the first level of heading The image named India.jpg should be placed at the center. Formatting style for the paragraph o Font Size: 5 o Font Name: Times New Roman o Color: Red Superscript and subscript tags should be used wherever required. Facts (as shown in the above web-page) should be written with the help of the unordered list. Page 10 of 12 Ans OR Answer the following a. What is a Hypertext link? b. Give the name and the syntax of the HTML Tag which is used for creating a Hypertext Link. c. Neha wants to display a 'Click Here' message on her webpage which, when clicked, opens a new webpage 'Chapter2.html'. Write the syntax of the HTML command she should use. d. On the same webpage, Neha whose email is neha@xyz.com, wants to display a 'Contact us' message which when clicked open theemail program and allows the user to send a mail to Neha.Write the syntax of the HTML command she should use. e. Explain the use of the target attribute in the Hypertext Link Tag. <html> <body bgcolor="yellow"> <center> <h1> Our Country : India </h1> <imgsrc="india.jpg"> </center> <p> <font color="red" size="5" face="Times New Roman"> India is spread over a large geographical area. In terms of area, it is the 7<sup>th</sup> largest country while in terms of population, it is the 2<sup>nd</sup> largest country in the world. Some facts about India are as follows</font></p> <ul> <li>Area :Approx 3.28 million sq. km </li> <li>North to South extension :Approx 3,200 km</li> <li>East to West extension :Approx 2900 km</li> </ul> </body> </html> OR a. Hyperlink allows us to link HTML elements (text and/or image) to another document or new section within the current document. b.Name : anchor tag, Syntax <a href="Link Address">Hyperlink Text</a> Page 11 of 12 c. <a href="Chapter2.html">Click Here</a> d. <a href="mailto:neha@xyz.com">Contact us</a> e.Specifies where to open the linked document when the link is clicked. (1/2 mark for the correct<html> structure ) (1/2 mark for the correct use of bgcolor attribute of <body> ) (1/2 mark for the correct use of <H1> tag) (1/2 mark for the correct use of image src tag) (1/2 mark for the correct use of <center> or attribute align = middle in <img>) (1/2 mark for the correct use of font color) (1/2 mark for the correct use of font size) (1/2 mark for the correct use of font face) (1/2 mark for the correct use of <sup> tag) (1/2 mark for the correct use of unordered list) OR a. (1 mark for the correct definition of Hypertext link) b. (1/2 mark each for name and writing syntax of anchor tag) c. (1 mark for correct syntax) d. (1 mark for correct syntax) e. (1 mark for explaining the use of target attribute) Page 12 of 12

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 


Tags : CBSE Board Examinations : Class X Previous Year Question Papers Class 10 Sample / Model Papers - with Solutions, INDIA - OUTSIDE DELHI, cbse class x, cbse 10, cbse 10th standard, cbse papers, cbse sample papers, cbse books, portal for cbse india, cbse question bank, central board of secondary education, cbse question papers with answers, prelims preliminary exams, pre board exam papers, cbse model test papers, solved board question papers of cbse last year, previous years solved question papers, free online cbse solved question paper, cbse syllabus, india cbse board sample questions papers, last 10 years cbse papers, cbse question papers 2017, cbse guess sample questions papers, cbse important questions, specimen / mock papers 2018.  

© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

cbse10 chat