Sample Question Paper (Theory)
Computer Applications (Code 165)

 

Class: X Session: 2024-25
Maximum Marks: 50 Time Allowed: 2 hours
General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, internal choices have been provided in some of the questions.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.

 

Question 1:

Shreya wants to securely copy files between two servers or two connected machines over the Internet. Which protocol should she prefer for getting her task completed?

Options:

A. FTP
B. HTTP
C. SCP
D. Telnet

Answer:
C. SCP

Explanation:
SCP (Secure Copy Protocol) is designed for secure file transfer over networks, utilizing encryption to ensure security.

  • FTP (File Transfer Protocol): Can transfer files, but it lacks encryption, making it insecure.
  • HTTP (Hypertext Transfer Protocol): Primarily used for transferring web pages; not meant for secure file transfer.
  • Telnet: A remote terminal protocol, not designed for file transfer.

Question 2:

Which of the following is not an e-governance project in India?

Options:

A. DRDO
B. Passport India
C. Income Tax India
D. Flipkart

Answer:
D. Flipkart

Explanation:

  • DRDO, Passport India, and Income Tax India are government platforms offering public services and part of India’s e-governance projects.
  • Flipkart is a private e-commerce company, not a government service.

Question 3:

Which tag, besides <b>, can be used to make the text bold in HTML?

Options:

A. <strong>
B. <dark>
C. <fat>
D. <i>

Answer:
A. <strong>

Explanation:

  • <strong> indicates text with strong emphasis, typically displayed as bold.
  • <b> also makes text bold but has no semantic meaning.
  • <dark>, <fat>, and <i> are not valid tags for bold text.

Question 4:

What is the full form of SMTP?

Options:

A. Simple Message Transmission Protocol
B. Secure Message Transfer Protocol
C. Simple Mail Transfer Protocol
D. Secure Mail Transmit Protocol

Answer:
C. Simple Mail Transfer Protocol

Explanation:
SMTP is the standard protocol used to send emails across networks, enabling communication between mail servers.

Question 5:

Which protocol is used for video conferencing among multiple participants?

Options:

A. Telnet
B. HTTP
C. VoIP
D. SFTP

Answer:
C. VoIP

Explanation:
VoIP (Voice over Internet Protocol) is used for transmitting voice, video, and multimedia communication over the internet. It’s widely used for video conferencing as well.

  • Telnet is a protocol used for remote access to computers but does not support multimedia.
  • HTTP is used for web page communication and is not for video conferencing.
  • SFTP is used for secure file transfer and has nothing to do with video conferencing.

Question 6:

Select the correct option to fill in the blank:
A website may consist of ______

Options:

A. Static Webpages
B. Dynamic Webpages
C. Both A and B
D. Domain

Answer:
C. Both A and B

Explanation:
A website can consist of both static and dynamic webpages:

  • Static Webpages are fixed content pages, whereas
  • Dynamic Webpages change content based on user interaction or other variables.
  • Domain is the address used to access a website but does not represent its content type.

Question 7:

Aman, a student of Class X, wants to create a numbered list in HTML. Which of the following tags should he use?

Options:

A. <UL>
B. <OL>
C. <DL>
D. <list>

Answer:
B. <OL>

Explanation:

  • <OL> (Ordered List) is used to create numbered lists in HTML.
  • <UL> (Unordered List) creates a bulleted list, not numbered.
  • <DL> (Description List) is used for definition lists, not for numbering.
  • <list> is not a valid HTML tag.

Question 8:

Making a copy of your webpage on the computer is known as ……………?

Options:

A. Browsing
B. Uploading
C. Downloading
D. None of the above

Answer:
C. Downloading

Explanation:

  • Downloading is the process of transferring a file from a remote server to your local machine (like copying a webpage to your computer).
  • Browsing refers to viewing websites.
  • Uploading refers to transferring files from your computer to a remote server.

Question 9:

Himani, a Class X student, wants to remotely access a computer system far from her house. Which protocol, out of the following, should she prefer to access or log into it remotely?

Options:

A. FTP
B. SMTP
C. TCP/IP
D. Telnet

Answer:
D. Telnet

Explanation:

  • Telnet allows for remote terminal access, enabling users to log into remote systems and interact with them.
  • FTP is used for file transfers, not remote access.
  • SMTP is used for sending emails, not for remote access.
  • TCP/IP is a suite of communication protocols used for network communication but does not specifically allow remote logins.

Question 10:

Anshu, a Class X student, is writing CSS code for making all <span> elements bold. Choose the correct code for getting the desired output from the following options:

Options:

A. span {text=weight: bold;}
B. span {font-weight: bold;}
C. <span style="text-size:bold">
D. <span style="font-size:bold">

Answer:
B. span {font-weight: bold;}

Explanation:

  • font-weight: bold; is the correct CSS property to make text bold.
  • text=weight: bold; and the other options are incorrect CSS syntax.
  • <span style="font-size:bold"> would incorrectly use the font-size property to make text bold, but that property controls text size, not weight.

Question 11:

Assertion (A): A set of rules, used over the networks, is called a Protocol.

Reason (R): HTML is an example of a Protocol.

Options:

A. Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
B. Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
C. Assertion (A) is true and Reason (R) is false.
D. Assertion (A) is false and Reason (R) is true.

Answer:
C. Assertion (A) is true and Reason (R) is false.

Explanation:

  • Assertion (A) is correct because a protocol is a set of rules used for communication between devices over a network.
  • Reason (R) is false because HTML (HyperText Markup Language) is not a protocol; it’s a markup language used for creating webpages, not for network communication.

Question 12:

Assertion (A): Chat and e-mail are live/real-time conversations between people/machines.
Reason (R): We have to be online in both.

Options:

A. Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
B. Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion (A).
C. Assertion (A) is true and Reason (R) is false.
D. Assertion (A) is false and Reason (R) is true.

Answer:
A. Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).

Explanation:

  • Assertion (A) is true: Chat and email can be considered real-time communications, though chat is more real-time, while email typically has some delay.
  • Reason (R) is also true: Both services generally require users to be online to exchange messages in real-time (chat) or to send and receive emails.

Section – B


Question 13:

Mishika, a class X student, wants to use a software but does not want to pay for it. Which type of software can she use? Write one example of this type of software.

Answer:

  • Type of software: Free and Open-Source Software (FOSS)
  • Example: LibreOffice (a free and open-source office suite)

Question 14:

A) Write any two differences between e-Banking and e-Commerce.

Answer:

  1. Focus:
    • e-Banking: Primarily deals with financial transactions, such as online payments, fund transfers, and bill payments.
    • e-Commerce: Involves buying and selling of goods and services, online marketing, and customer relationship management.
  2. Scope:
    • e-Banking: Generally restricted to financial institutions and their customers.
    • e-Commerce: Covers a wide range of business activities, including consumer retail, business-to-business sales, and customer service.

B) What is e-learning? Name any one e-learning platform.

Answer:

  • e-Learning: The process of using electronic technologies to access educational curriculum outside of a traditional classroom. It involves the use of the internet and software to deliver educational content.
  • Example: Khan Academy

Question 15:

State whether the following statements are True or False:

I) HTML file extension is .tml.
II) Rowspan attribute is used to make a cell span multiple rows.
III) Unordered list type creates a bulleted list.
IV) HREF Stands for hyper reference.

Answer:

I) False (The correct extension is .html)
II) True (Rowspan is used to make a table cell span across multiple rows)
III) True (Unordered lists use bullet points to list items)
IV) True (HREF stands for Hypertext Reference, used in anchor tags for links)


Question 16:

A) Your best friend emails you and tells you that he/she has created a webpage on an internet site having URL as: www.children.com/india/abc.html. Now you want to create a link to this webpage from your web page. Write the HTML code to do this.

Answer:

html

<a href="http://www.children.com/india/abc.html">Visit my friend's webpage</a>

 


B) i) Write HTML code to display a horizontal line of red color.

Answer:

html

<hr style="color:red;">

 

ii) Write HTML Code to create a paragraph whose text color is blue.

Answer:

html

<p style="color:blue;">This is a blue paragraph.</p>

 


Question 17:

What is the purpose of HTML forms? Write HTML Code to create a Textbox in an HTML form.

Answer:

  • Purpose of HTML Forms: Forms are used to collect user input. They allow users to submit data, make selections, and interact with a website.

HTML Code for a Textbox:

html

<form>

<label for=“fname”>First Name:</label><br>

<input type=“text” id=“fname” name=“fname”><br><br>

 

</form>

Question 18

A) An incomplete CSS code within <head>...</head> is given below. Complete this code by filling in the blanks as per the specifications that follow:

HTML

<head>
  <style>
    body {
      ___________________ ; 
    }

    p {
      ___________________ ;
      ___________________ ;
    }

    h1 {
      ___________________ ;
    }
  </style>
</head>

 

Answer:

HTML

<head>
  <style>
    body {
      background-color: blue; 
    }

    p {
      color: green; 
      font-family: Dotum;
    }

    h1 {
      color: black;
    }
  </style>
</head>

 

Explanation:

  • Line 1: background-color: blue; sets the background color of the entire webpage to blue.
  • Line 2: color: green; sets the color of the text within <p> (paragraph) tags to green.
  • Line 3: font-family: Dotum; sets the font family for the text within <p> tags to Dotum.
  • Line 4: h1 { color: black; } sets the color of the <h1> heading to black.

Section B

Question 18:

B) Hemant, a class X Student, is writing HTML code to create ordered and unordered lists for a webpage as follows:

HTML

<html>
  <body bgcolor="yellow">
    <h1>My First Heading</h1> 

    <p>
      <font color="red" size="5" ___________________ >SOME STATES IN INDIA</font>
    </p>

    <ol>
      <li>DELHI</li>
      <li>MUMBAI</li>
    </ol>

    <ul>
      <li>CHENNAI</li>
      <li>KOLKATA</li>
    </ul>
  </body>
</html>

 

Answer:

HTML

<html>
  <body bgcolor="yellow">
    <h1>My First Heading</h1> 

    <p>
      <font color="red" size="5" face="Times New Roman">SOME STATES IN INDIA</font>
    </p>

    <ol>
      <li>DELHI</li>
      <li>MUMBAI</li>
    </ol>

    <ul>
      <li>CHENNAI</li>
      <li>KOLKATA</li>
    </ul>
  </body>
</html>

 

Explanation:

  • Line 1: The closing tag </h1> is missing after the heading text.
  • Line 2: The correct attribute for specifying the font face is face, not font.
  • Line 3: The opening tag <ol> is missing to start the ordered list.
  • Line 4: The closing tag </li> is missing after “MUMBAI” to end the list item.

19. Write any two differences between SMS and MMS.

1. Content:

  • SMS (Short Message Service): Primarily designed for sending and receiving short text messages. It can also transmit small multimedia files like ringtones or logos, but its primary function is text-based communication.  

     

     

     

     

     

  • MMS (Multimedia Messaging Service): Allows for the transmission of multimedia content such as images, videos, audio files, and longer text messages.  

     

     

     

     

     

2. Size Limits:

  • SMS: Has strict size limitations, typically around 160 characters.  

     

     

     

     

     

  • MMS: Offers significantly larger file size limits, enabling the sharing of richer content.  

Question 20:

I. Desired Purpose: Page background color should be red

Incorrect: <BODY color="red">

Correct: <body bgcolor="red">

II. Desired Purpose: Type of Font should be Arial

Incorrect: <FONT type="arial">

Correct: <font face="arial">

III. Desired Purpose: Image source should be img_girl.jpg, width and height both should be 500

Incorrect: <img source-"img_girl.jpg" size="500" height="600">

Correct: <img src="img_girl.jpg" width="500" height="500">

Question 21:

Consider the URL: https://www.cbse.gov.in and answer the following questions:

I. Which component identifies the protocol?

Answer: https

II. What is the significance of “s” in https?

Answer: The “s” in “https” stands for “Secure.” It indicates that the connection is encrypted using SSL/TLS, ensuring secure communication between the user and the website.

III. Expand the terms URL and WWW?

Answer:

  • URL: Uniform Resource Locator
  • WWW: World Wide Web

Question 22:

A) Write any two ways to add an audio file in a web page using HTML? Explain with sample code.

Answer:

1. Using the <audio> tag:

HTML

<audio controls>
  <source src="audio.mp3" type="audio/mpeg">
  Your browser does not support the audio element.
</audio>

 

This code creates an audio player with controls (play, pause, etc.). The <source> tag specifies the path to the audio file and its type.

2. Using the <embed> tag (for older browsers):

HTML

<embed src="audio.mp3" autostart="false">

 

This tag embeds the audio directly in the page. autostart="false" prevents the audio from playing automatically.

OR

B) Write any two ways to add a video file in a web page using HTML? Explain with sample code.

Answer:

1. Using the <video> tag:

HTML

<video width="320" height="240" controls>
  <source src="video.mp4" type="video/mp4">
  Your browser does not support the video tag.
</video>

 

This code creates a video player with controls and specifies the width and height of the video. The <source> tag specifies the path to the video file and its type.

2. Using the <embed> tag (for older browsers):

HTML

<embed src="video.mp4" width="320" height="240">

 

This tag embeds the video directly in the page and specifies its width and height.

Question 23:

Write suitable HTML statements to display the following text on a webpage:

I) NH3

HTML

NH<sub>3</sub>

 

II) X

HTML

X<sup>2</sup>

 

III) (A+B)

HTML

(A+B)<sup>2</sup>

Question 25:

Mr. Anek comes from a village, which recently started seeing the digital revolution, and now the people of his village have access to the internet. They can shop online, make payments online, sell online, and so on. Anek is also excited with these new changes. He ordered some items online and entered his bank card details on the webpage to make the payment.

But after the promised due date, he has not received his ordered items. There is no way to contact the company as phones are unreachable and emails are not being responded to. He also noticed after some days that someone is sending emails on his behalf, using his personal data.

Based on the above information, answer the following questions:

I. Mr. Anek is a victim of _______________.
Answer: Online Fraud / Cybercrime

II. Mr. Anek finds that his personal details are now leaked. This means his _______________ is compromised.
Answer: Privacy is compromised.

III. While filling out details online, Mr. Anek should have checked _______________ in the URL.
Answer: Website authenticity

IV. This type of incident will be recognized as a case of _______________ (Specify).
Answer: Cybercrime (or Online Fraud)


Explanation:

  • Online Fraud / Cybercrime: Mr. Anek is a victim of online fraud where his personal data was misused, and he is a victim of cybercrime because of the theft of his bank card information and identity for malicious activities.
  • Privacy compromised: The leakage of Mr. Anek’s personal details means that his private information was exposed, compromising his privacy.
  • Website authenticity: Mr. Anek should have checked whether the website was legitimate, secure, and trustworthy (e.g., checking for HTTPS or verifying the website’s reputation).
  • Cybercrime (or Online Fraud): The actions described (fraudulent transaction and misuse of personal information) are typical of online fraud and cybercrime.

Question 26:

Shresth was a bright student who excelled in academics and extracurricular activities. He intended to take some quotes and literature from the internet to write an article for the newspaper.

I. Identify the type of ethical issue he will face, in case he copies the work as discussed in the above case study.
Answer: Plagiarism

II. Does the above incident described above can be considered as an example of IPR (Intellectual Property Rights) Violation?
Answer: Yes

III. How can he avoid this ethical issue?
Answer: Citing sources properly, paraphrasing or summarizing, and using his own original ideas.

IV. Suggest two netiquettes that Shresth’s classmates must be aware of.
Answer:

  1. Respecting online privacy (not sharing personal information without consent)
  2. Avoiding online harassment and bullying

Explanation:

  • Plagiarism: When Shresth copies work without giving proper credit to the original author, it constitutes plagiarism, which is the unethical practice of using someone else’s intellectual work as your own.
  • IPR (Intellectual Property Rights) Violation: Copying someone else’s work without permission or proper attribution is a violation of Intellectual Property Rights (IPR), which protects creators’ rights to their original works.
  • To avoid plagiarism, Shresth can properly cite sources, paraphrase, or summarize the work instead of copying it verbatim. He should also contribute his own ideas to the article.
  • Netiquettes refer to the guidelines for respectful and ethical behavior on the internet. Respecting privacy and avoiding harassment are essential for maintaining a safe and positive online environment.