Trending ▼   ResFinder  

CBSE Class 10 Sample / Model Paper 2022 : Computer Applications - Term I (with Marking Scheme / Solutions)

11 pages, 51 questions, 0 questions with responses, 0 total responses,    0    0
CBSE 10
Kendriya Vidyalaya (KV), Kamla Nehru Nagar, Ghaziabad
+Fave Message
 Home > CBSE - main folder > SAMPLE / MOCK Question Papers : CBSE Board Class 10 >   F Also featured on: cbse10

Formatting page ...

Sample Question Paper (Term 1) Class: X Session: 2021-22 Computer Applications (Code 165) Maximum Marks: 25 Time Allowed: 90 Minutes General Instructions: 1. The Question Paper contains three sections A, B and C. 2. Section A has 20 questions. Attempt any 16 questions. 3. Section B has 20 questions. Attempt any 16 questions. 4. Section C has 10 questions. Attempt any 8 questions. 5. All questions carry equal marks. 6. There is no negative marking. Q.N. Section-A This section consists of 20 questions of MCQ type. Answer any 16 questions. 1 Which one of the following software comes under Open-Source Software category? a. Photoshop b. Ms-Paint c. Linux d. Windows 2 HTML tag to draw horizontal line: a. <hl> b. <hr> c. <hline> d. None of the above 3 Secure data transmission means a) Data is accessible by any unauthorized person during transmission. b) Data can not be accessed by any unauthorized person during transmission. c) Transmission of data happens easily d) Noone can access it 4 The correct HTML code to display(P+Q)2 is: a. <SUB>(P+) 2</SUB> b. P+Q <SUP> 2 </SUP> c. ( P + Q)<SUP> 2 </SUP> d. <SUP> (P+Q) 2</SUP> 5 Which HTML tags cause browsers to render text as italics? a. <text style = italics ></text> b. <ital.></ital.> c. <i></i> d. <b></b> 6 The correct HTML code for inserting an image is : a. <img href= image.gif > b. <img> image.gif</gif> c. <image src = image.gif > d. <img src = image.gif > 7 8 9 10 11 12 13 14 15 Which attribute is NOT valid for the <body> tag? a. background b. color c. vlink d. bgcolor ____________attribute is used to specify the location of an image file. a. alt b. src c. align d. name Which of the following is NOT an example of Intellectual Property rights? a. Patent b. Trademark c. Password d. Industrial Design The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason. a. alt b. alternate c. tooltip d. text While creating a Web document, which unit is used to express an image s height and width? a. Centimeters b. Pixels c. Dots per inch d. Inches Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as________________ a. Encryption b. Decryption c. Plagiarism d. Data Security. Which is the correct way to comment out something in HTML? a. Using ## and # b. Using <!-- and --> c. Using </-- and -/-> d. Using <!-- and -!> The default alignment of images, that are inserted in Web page, is: a. left b. right c. inline with text d. middle Which of the following techniques can be used for security of data? a. Authentication b. Authorisation c. Encryption d. All of the Above 16 Which of the following is not a cybercrime? a. Plagiarism b. Phishing c. using licensed software d. hacking 17 _________ is a software for which exclusive rights of modification in the source code remain with the owner. a. Free Open-Source Software b. Freeware c. Open-Source Software d. Proprietary Software 18. A _______________ is the right given by the government to an inventor to protect his/ her invention from being used/copied for a fixed period of time. a. Copyright b. Intellectual Property c. Patent d. Trademark 19 Which of these is NOT an attribute of the font tag? a. color b. face c. type d. size 20 The <_________> tag displays text in subscript form. a. sub b. sup c. sups d. subs. 21 Section-B This section contains 20 questions. Answer any 16 questions. Arun clicks on a link received in a message on his phone which promises him a complimentary trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked him to do the same. But Panshul refuses and tells Arun that his personal and private information, such as online account names, login information and passwords can be stolen and he should be careful of such ____________ attacks. a. Phishing b. Spamming c. Scamming d. Plagiarism 22 Consider the following HTML code: <ol type='i'> <li>First</li> <li>Second</li> <li>Third</li> <li>Fourth</li> </ol> Choose the correct output that would be shown upon execution of the above code , from the choices given below: a. c. 23 24 25 26 27 I. First II. Second III. Third IV. Fourth I II III IV First Second Third Fourth b. d. i. First ii. Second iii. Third iv. Fourth i ii iii iv First Second Third Fourth Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers. One day while browsing the Internet she discovers that another artist has displayed her painting portraying it as his own. Which right of Charlene was infringed? a. Digital Privacy right b. Intellectual Property right c. Digital Property right c. Intellectual Privacy right Which of the following will result in the largest text size? a. <H3> b. <H6> c. <H2> d. <H4> We can create a numbered list using the __________ tag. a. <UL> b. <list> c. <OL> d. <DL> Which of these is NOT an example of Cyber bullying? a. Copying a classmate s personal photo against his/her permission from his social media account and sending it to other friends on their emails b. Bullying a classmate in the school corridor. c. Threatening someone on whatsapp. d. Posting mean messages about someone on their social media. Identify which of the following type of list will create a bulleted list. a. Unordered b. Ordered c. Definition d. Numbered 28 Which sequence of HTML tags is correct? a. <html><head><title></title></head><body></body></html> b. <html><head><title><body></title></head></body></html> c. <html><head><title</head><body></body>></title></</html> d. <html><head><title><body></body ></title></head ></html> 29 Pratham is excited to use a new software which is freely available to download but he cannot modify or change the source code. Pratham is using a. Freeware b. Open-Source Software c. Both a and b d. None of the above 30 Priyanshu has written the following code snippet as part pf an HTML program. <B> Mystery Moon </B> Predict the output of the above from the following: a. Mystery Moon b. Mystery Moon c. Mystery Moon d. Mystery Moon 31 Consider the following code: <img src="Computers.jpg" width=" ________ " height="________ > Fill in the blanks to set the image size to be 250pixels wide and 400 pixels tall. a. 250, 400 b.400, 250 c. <250><400> d. <400><250> 32 Tag (s) required to create Description lists in HTML: a. <DL> b. <DT> c. <DD> d. All of the above 33 Which of the following is NOT a reason for the digital divide in different demographic regions? a. Cost of Technology b. Lack of information c. Lack of access to high performance computers d. Lack of access to the disabled. 34 35 One of the most popular method of encrypting data is Ceaser cipher where original data is replaced by a key character like if key is -2 than a will be replaced by y , b is replaced by z and so on. If the key is 2 i.e. Every letter is replaced by its next to next letter means the letter 'A' will be replaced by 'C', the letter 'B' is replaced by 'D', and so on then what will be the replacement of the word 'CoMpUtEr'. a. Eqorwvgt b. eQOrwVtG c. eqroWVTG d. EqOrWvGt Consider the following form control in a HTML form: Male Female 36 37 Now choose the correct line of code for the above : a. <input type = radio name= Gender value= male >Male<br> <input type = radio name= Gender value= female >Female<br> b. <input type = radiobutton name= Gender value= male >Male<br> <input type = radiobutton name= Gender value= female >Female<br> c. <input type = radio , name= Gender >< value= male >Male <input type = radio , name= Gender >< value= female >Female d. <input type = radio name= Gender value= male ><br> <input type = radio name= Gender value= female ><br> Gagandeep has written the following code to display an image in the background of HTML document: <BODY BgGround= Animals.jpeg > but he is not getting the desired output. Help him in identifying correct code from the following a. <BODY Bg= Animals.jpeg > b. <BODY BACK= Animals.jpeg > c. <BODY BGIMAGE= Animals.jpeg > d. <BODY BACKGROUND= Animals.jpeg > Which of the following is a way to avoid Plagiarism when using material from the Internet? i. Citing ii. Paraphrasing iii. Referencing iv. embedding Choose the correct option: a. i and ii only b. Only i c. i, ii and iii only d. ii and iv only 38 Tag to create password field in HTML document: a. <password> b. <input> c. <pwd> d. <pword> 39 Which of the following tag is used to define options in a drop-down selection list? a. <select> b. <list> c. <dropdown> d. <option> 40 Which of the following is the correct way to create a list using the lowercase letters? a. <ol alpha = "a" > b. <ol type = "a"> c. <ol letter = "a"> d. None of the above Section-C Case study based questions Section C consists of 10 questions. Any 8 questions are to be attempted. Case Study I Geetika has recently created her social accounts. She is very excited as she waited so long to go online. She has recently also got admission in a prestigious high school and does not know many students. When she logs into her social media a few days later, she finds that someone is posting negative, demeaning comments on her social media profile. She is also getting repeated mails from unknown people. Whenever she goes online, she is trolled by multiple unknown people. Based on the given information, answer the questions NO. 41-45. 41 Geetika is a victim of _______ : a. b. c. d. 42 Eavesdropping Plagiarism Phishing Cyber stalking Which of the following is the most appropriate action she should take? a. She should stop going online and delete her social media accounts. b. She should NOT share this with anyone as she might face more of such kind of behaviour. c. She should file a complaint at the nearest police station. d. She should inform her parents and bring to the notice of school authorities. 43 After hearing her ordeal, the school decides to publish a set of moral principles that determines the appropriate behavior of students while using the internet. The school is referring to__________ a. Intellectual Property rights b. Internet Privacy c. Computer Ethics d. Cyber Ethics 44 Geetika is advised by her best friend, Seerat to protect her personal information from intentional or unintentional attacks by others. This is also known as ___________ a. b. c. d. 45 Digital right Copyright Data Privacy Intellectual property The computer teacher of Geetika s class decides to take an online session on the topic Netiquettes, which generally includes: a. safeguarding one s passwords and sensitive online information b. logging out of social media accounts after the session c. not bullying or trolling anyone by disrespecting them or passing inappropriate remarks d. All of the above. Case Study II Consider the following code created by Sumantha for a webpage: <html> <body bgcolor="yellow"> <center> <h1> Our Country : India <__> -------line1 <imgsrc="india.jpg"> </center> <p> <font color="red" size="5" ____="Times New Roman"> -------line2 India is spread over a large geographical area. In terms of area, it is the 7<sup>th</sup> largest country while in terms of population, it is the 2<sup>nd</sup> largest country in the world. Some facts about India are as follows<___></p> -------line3 <ul> <li>Area :Approx 3.28 million sq. km <_> -------line4 <li>North to South extension :Approx 3,200 km</li> <li>East to West extension :Approx 2900 km</li> <__> -------line5 </body> </html> Based on the given information, answer the questions NO. 46-50. 46 47 48 49 50 Choose the correct option from the following to fill up in line 1: a. \h1 b. \h6 c. /h6 d. /h1 Choose the correct option from the following to fill up in line 2: a. font b. face c. type d. text Choose the correct option from the following to fill up in line 3: a. </f> b. <f> c. </font> d. <font> Choose the correct option from the following to fill up in line 4: a. <i> b. </li> c. <\li> d. <\i> Choose the correct option from the following to fill up in line 5: a. ul b. <\ul> c. <ul> d. </ul> Marking Scheme Class: X Session: 2021-22 Computer Applications (Code 165) Maximum Marks: 25 All Questions carry equal marks QN 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18. 19 20 Time Allowed: 90 Minutes Section-A Unit c. Linux b. <hr> b) Data can not be accessed by any unauthorized person during transmission. c. ( P + Q)<SUP> 2 </SUP> c. <i></i> d. <img src = image.gif > Cyber Ethics Html Cyber Ethics b. color b. src c. Password a. alt b. Pixels a. Encryption Html Html Cyber Ethics HTML HTML Cyber Ethics HTML b. Using <!-- and --> c. inline with text d. All of the Above c. using licensed software d. Proprietary Software c. Patent c. type a. sub Html Html Html HTML Cyber Ethics Cyber Ethics Cyber Ethics Cyber Ethics HTML HTML Section-B a. Phishing 21 22 b. 23 24 25 Cyber Ethics HTML i. First ii. Second iii. Third iv. Fourth b. Intellectual Property right c. <H2> c. <OL> Cyber Ethics HTML HTML 26 27 28 29 30 31 32 33 34 35 b. Bullying a classmate in the school corridor. a. Unordered a. <html><head><title></title></head><body></body></html> a. Freeware b. Mystery Moon a. 250, 400 d. All of the above c. Lack of access to high performance computers d. EqOrWvGt a. <input type = radio name= Gender value= male >Male<br> <input type = radio name= Gender value= female >Female<br> Cyber Ethics HTML HTML Cyber Ethics HTML HTML HTML Cyber Ethics Cyber Ethics HTML 36 37 38 d. <BODY BACKGROUND= Animals.jpeg > c. i, ii and iii only HTML Cyber Ethics HTML 39 40 b. <input> d. <option> b. <ol type = "a"> HTML HTML Section-C 41 d. Cyber stalking Cyber Ethics 42 d. She should inform her parents and bring to the notice of school Cyber Ethics authorities. 43 d. Cyber Ethics Cyber Ethics 44 c. Data Privacy Cyber Ethics 45 d. All of the above. Cyber Ethics 46 d. /h1 HTML 47 b. face HTML 48 c. </font> HTML b. </li> HTML d. </ul> HTML 49 50

Formatting page ...

Related ResPapers
CBSE Class 10 Sample / Model Paper 2022 : Computer Applications - Term I (with Marking Scheme / Solutions)
by cbse10 
CBSE Class 10 Sample / Model Paper 2021 : Computer Applications (with Marking Scheme / Solutions)
by cbse10 

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

Formatting page ...

 

  Print intermediate debugging step

Show debugging info


 


Tags : CBSE Board Examinations : Class X Previous Year Question Papers Class 10 Sample / Model Papers - with Solutions, INDIA - OUTSIDE DELHI, cbse class x, cbse 10, cbse 10th standard, cbse papers, cbse sample papers, cbse books, portal for cbse india, cbse question bank, central board of secondary education, cbse question papers with answers, prelims preliminary exams, pre board exam papers, cbse model test papers, solved board question papers of cbse last year, previous years solved question papers, free online cbse solved question paper, cbse syllabus, india cbse board sample questions papers, last 10 years cbse papers, cbse question papers 2017, cbse guess sample questions papers, cbse important questions, specimen / mock papers 2018.  


© 2010 - 2025 ResPaper. Terms of ServiceContact Us Advertise with us

 

cbse10 chat