SAMPLE QUESTION PAPER - 4
Computer Applications (165)
                                        Class X (2024-25)
Time Allowed: 2 hours                                                   Maximum Marks: 50
General Instructions:
         1. This Question Paper has 5 Sections A-E.
         2. All Questions are compulsory. However, an internal choice of approximately 30%
           is provided.
         3. Section A has 12 questions carrying 01 mark each.
         4. Section B has 7 Very Short Answer (VSA) type questions carrying 02 marks each.
         5. Section C has 4 Short Answer (SA) type questions carrying 03 marks each.
         6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
         7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04
           marks each.
                                           Section A
  1.   Which of the following is not considered as netiquette?                              [1]
         a) Avoid posting offensive           b) Avoid trolling people by your
           comments                               comments
         c) Sending unsolicited email         d) Respect other people’s privacy
  2.   The words typed in search box are called                                             [1]
         a) Phrases                           b) Answer
         c) Keywords                          d) earch words
  3.   Select the e-commerce fraud from the folloiwng list:                                 [1]
         a) phishing                          b) All of these
         c) identity theft                    d) payment fraud
  4.   IP addresses of two computers on a network:                                          [1]
         a) are not defined                   b) can be the same
        c) cannot be the same                 d) must match with a third
                                                computer
 5.   Which of the following agencies initially started the project Internet?       [1]
        a) NSA                                b) NSF
        c) ARPA                               d) .NET
 6.   Following tag stands for - <a>                                                [1]
        a) Anchor Tag                         b) Additional Tag
        c) Active Tag                         d) Action Tag
 7.   The <A> tag is:                                                               [1]
        a) a container tag                    b) a open tag
        c) an empty tag                       d) a closing tag
 8.   The full form of CSS is:                                                      [1]
        a) Coloured Style Sheet               b) Common Style Sheets
        c) Cascading Style Sheets             d) Cascading Sample Sheets
 9.   Priyanka has developed two separate webpages. Now she wants to link the two   [1]
      pages. What is this type of linking called?
        a) Internal linking                   b) External Linking
        c) Hyper linking                      d) Web linking
10.   Which of the following tags is used to position the images in a web page?     [1]
        a) <ALIGN>                            b) <SRC>
        c) <IMG>                              d) <ALT>
11.   Assertion (A): The external style sheet is the one that we define in the same HTML [1]
      page in which we want to use the styles.
      Reason (R): The styles can even be defined in the HTML code along with the code
      for which we want to define styles. Such style sheets are known as inline style
      sheets.
        a) Both A and R are true and R is     b) Both A and R are true but R is
          the correct explanation of A.          not the correct explanation of
                                                 A.
        c) A is true but R is false.          d) A is false but R is true.
12.   Assertion (A): A web browser is an application software that lets you open and     [1]
      visit websites on the devices like computers, laptops, tablets and smartphones.
      Various types of web browsers are the Microsoft Internet Explorer, Google
      Chrome, UC Browser, etc.
      Reason (R): Markup means to instruct the web browser program. HTML tags are
      actually HTML commands that mark up or instruct a web browser how to display
      the page in the web browser view.
        a) Both A and R are true and R is     b) Both A and R are true but R is
          the correct explanation of A.          not the correct explanation of
                                                 A.
        c) A is true but R is false.          d) A is false but R is true.
                                            Section B
13.   Search engine maintains an index of searched pages. Define indexing in terms of    [2]
      search engine.
14.   Newsgroups and emails both can be used to communicate. How is newsgroup            [2]
      different from E-mail messages?
                                                 OR
      Write two advantages of 4G over 3G Mobile communication technologies in terms of
      speed and services.
15.   Explain the given command:                                                         [2]
      <A HREF ="wild.html">Click Here for wild animals</A>
16.   Name two types of software in terms of licensing.                                  [2]
                                                 OR
      Sunita wants to buy and sell goods online. Which term is used to describe this process?
17.   Mention the properties of CSS used to insert Letter spacing in a line.               [2]
18.   Which three tags are used to create definition lists?                                [2]
                                                 OR
      Name the attribute of the anchor tag that specifies where to open the linked document.
19.   Name the attributes of <SELECT> tag which are used to create drop-down menus.        [2]
                                             Section C
20.   What do you understand by the term secure data transmission? Mention any two         [3]
      main points to ensure secure data transmission in e-commerce.
21.   Define the following terms:                                                          [3]
       i. Wink
      ii. Pipl
      iii. PeekYou
22.   Explain the text-transform property with all its values.                             [3]
                                                 OR
      Discuss different border properties.
23.   What can you do to avoid plagiarism? Write any three points.                         [3]
                                             Section D
24.   Identify the errors in the following HTML code and write the correct code with       [4]
      each correction underlined.
      <HTML>
      <TITLE> IMAGES </HEAD>
      <BODY bgcolor ="PICI.JPG">
      <IMG href="ABC.JPG">
      HERE IS MY IMAGE FILE
      </BGCOLOR>
      </HTML>
                                                 OR
         Create a web page to demonstrate how to create a link within the same page.
                                              Section E
25.      Read the text carefully and answer the questions:                                      [4]
         Outline Property: The outline property specifies a line to be drawn around
         elements. The line is drawn outside the borders to make the element 'stand out' and
         to enhance its impact. Different types of outline properties such as outline-style,
         outline-colour, outline-width can be specified for an HTML tag.
  (i)      Which property applies an outline that makes the box look like it is embedded in
           the page?
  (ii)     Why the Outlines are different from the borders?
  (iii) Which property applies an outline that makes the box look like it is coming out of
           the canvas?
  (iv)     What are the different types of outline properties which can be specified for an
           HTML tag?
26.      Read the text carefully and answer the questions:                                      [4]
         Zeeshan is a student of XYZ school and is an excellent poet. He decides to upload
         some of his poems on his blog. After few days, he notices that his classmate, Antara
         has uploaded Zeeshan's poem on her Facebook page, mentioning Antara as its poet.
  (i)      Identify the type of cybercrime, Zeeshan is a victim of.
  (ii)     Zeeshan informs his class teacher about the incident. The school decides to hold a
           seminar for its students to make them aware of moral principles that determine
           behaviour of students when they are online. These are called ________.
  (iii) The ________ rights of Zeeshan have been violated.
  (iv)     One of the students requests the expert to give tips on using their email account in a
           secure manner. The expert advises the students to never share their ________ with
           anyone.
                                             Solution
                                 SAMPLE QUESTION PAPER - 4
                                  Computer Applications (165)
                                        Class X (2024-25)
                                            Section A
1.
     (c) Sending unsolicited email
     Explanation:
     Sending unsolicited email
2.
     (c) Keywords
     Explanation:
     The queries or terms entered to search a particular information in search engine are called
     keywords.
3.
     (b) All of these
     Explanation:
     All of these
4.
     (c) cannot be the same
     Explanation:
     cannot be the same
5.
     (c) ARPA
     Explanation:
     ARPA
6. (a) Anchor Tag
     Explanation:
     Anchor Tag
7. (a) a container tag
     Explanation:
     a container tag
8.
     (c) Cascading Style Sheets
     Explanation:
     Cascading Style Sheets
9.
     (b) External Linking
      Explanation:
      External Linking
10. (a) <ALIGN>
      Explanation:
      <ALIGN>
11.
      (d) A is false but R is true.
      Explanation:
      A is false but R is true.
12.
      (b) Both A and R are true but R is not the correct explanation of A.
      Explanation:
      Both A and R are true but R is not the correct explanation of A.
                                               Section B
13. Indexing is the process to store and organize the content found during the crawling
      process. Once a page is in the index, it’s in the running to be displayed as a result to
      relevant queries.
14.                       Email                                      Newsgroups
      Email is used to send written messages
                                                  A newsgroup is like a community bulletin
      between individuals or groups of
                                                  board.
      individuals.
      Only the users marked as recipient can      Every message sent by any user is posted by
      read a mail message.                        the news server for everyone to read.
                                                  One can send message or read a message on a
      We can send/recieve message from any
                                                  particular newsgroup for which he/she has
      of the mail server applications.
                                                  subscribed.
                                                   OR
      Speed: 4G offers speed of more than 10 Mbps while 3G around 3 Mbps.
      Services: It can prioritise services to offer flawless performance. Ex: VoIP is prioritised
      over other data to offer flawless calling experience.
15. In this command, anchor <a> tag and its href attribute is included. The text (Click Here for
      wild animals) will appear underlined and indicates that clicking the text activates the
      hypertext link.
      The address of the referenced document can be specified by an absolute or relative URL.
      Thus, "wild.html" is an URL or Web page address and Click Here for wild animals is the
      hyperlinked text.
16. The two types of software are: Open source software and Proprietary software.
                                                   OR
   E-commerce is the term used to describe this process.
17. Letter-spacing property is used to insert Letter spacing in a line.
18. i. <dl> (Definition List)
   ii. <dt> (Definition Term)
   iii. <dd> (Definition Description)
                                                   OR
   The target attribute of the anchor tag specifies where to open the. linked document.
19. There are various attributes of <SELECT> tag
    Attribute Use                                                                  Syntax
                                                                                   <SELECT name
    name       It shows the name of drop-down
                                                                                   ="name">
               It displays height of the list. If it is 1 (or omitted), the list   <SELECT size
    size
               is a drop-down menu, otherwise it is a scrolled list.               ="value">
               This attribute specifies that a drop-down list should be            <SELECT
    disabled
               disabled.                                                           disable>
                                              Section C
20. Secure data transmission refers to the protection of data during its transfer from one
   location to another, ensuring confidentiality and integrity. Two main points to ensure
   secure data transmission in e-commerce are implementing encryption technologies like
   SSL/TLS and using secure communication protocols like HTTPS, which encrypt and
   authenticate the data exchanged between the client and the server.
21. i. Wink: It searches across what we would find using a regular search engine as well as
      across social communities, online profiles, etc. We can also use Wink to manage our
      online presence by creating a Wink profile.
   ii. Pipl: It is a people search engine that is used to find information about people.
   iii. PeekYou: It checks the databases of websites like Pinterest, Linkedin, Instagram and
      more and thus helps in giving the search results.
22. The text-transform property changes the capitalization of text within an element. lt can be
   used to make text appear in all-uppercase or all-lowercase, or with each word capitalized.
   Following are the possible values for text-transform property:
    i. capitalize - The first letter of each word in the element’s text will be capitalized.
   ii. uppercase - All of the characters in the element’s text will be uppercase (capital letters).
   iii. lowercase - All of the characters in the element’s text will be lowercase.
   iv. none - The capitalization of the element’s text should not be altered.
                                                 OR
   The border properties are used to specify the border-style, border-color, border-width, etc.
   Different border-style properties are as follows:
    i. Border-color: This property specifies the colour of a border.
   ii. Border-style: This property specifies whether a border should be solid, dashed line,
      double line or one of the other possible values.
   iii. Border-width: This property specifies the width of a border.
23. To avoid Plagiarism one should follow these guidelines:
    i. Give credit to the creator if someone’s original or intellectual work is used.
   ii. Use quotation marks for another person’s actual spoken or written words.
   iii. Take the permission of the author or owner wherever required.
                                            Section D
24. Error 1 The <TITLE> tag must be within <HEAD> tag.
   Error 2 bgcolor attribute of BODY element supports a color like red, green or its color
   value.
   Error 3 <IMG> tag needs a source attribute src to place an href.
   Error 4 BODY element must be closed not bgcolor attribute.
   The correct code is as follows:
   <HTML>
   <HEAD>
   <TITLE>IMAGES</TITLE>
   </HEAD>
   <BODY bgcolor ="yellow">
   <IMG src="ABC.JPG">
   HERE IS MY IMAGE FILE
   </BODY>
   </HTML>
                                                 OR
   <!DOCTYPE html>
   <html>
      <body>
        <h2><a id="top"> Laws of motion</a></h2>
        <h2>First Law of Motion</h2>
        <p>An Object continues to be in a state of rest or of uniform motion along a straight l
        <h2>Second Law of Motion</h2>
        <p>The rate of change of momentum of an object is proportional to the applied unbala
        <h2>Third Law of Motion</h2>
        <p>To every action, there is an equal and opposite reaction and they act on two differe
        <br />
        <a href="top">Go to top</a>
     </body>
   </ht l>
   OBJECT:
                                           Section E
25. Read the text carefully and answer the questions:
   Outline Property: The outline property specifies a line to be drawn around elements. The
   line is drawn outside the borders to make the element 'stand out' and to enhance its impact.
   Different types of outline properties such as outline-style, outline-colour, outline-width
   can be specified for an HTML tag.
  (i) Inset property.
  (ii) The outlines are different from the borders because of the following reasons:
      i. An outline does not take up space.
      ii. The outlines do not have to be rectangular.
     iii. The outline is always the same on all sides.
  (iii)Outset property.
  (iv)The different types of outline properties which can be specified for an HTML tag are as
      follows:
      i. Outline-style
      ii. Outline-color
     iii. Outline-width
26. Read the text carefully and answer the questions:
   Zeeshan is a student of XYZ school and is an excellent poet. He decides to upload some of
   his poems on his blog. After few days, he notices that his classmate, Antara has uploaded
   Zeeshan's poem on her Facebook page, mentioning Antara as its poet.
(i) In this scenario, Zeeshan is a victim of plagiarism, a form of intellectual property theft.
   Antara is claiming Zeeshan's work as her own, which constitutes a violation of his
   creative ownership and rights.
(ii) Digital Citizenship.
(iii)intellectual property
(iv)passwords