CBSE 2021-22 Exam: Computer Applications (Code 165) Class 10 Sample Question Paper Term 1 and Answer Key/Solution

cbse

Sample question paper and answer key for Computer Applications class 10 CBSE Term 1 exam. Study these important questions for class 10th Computer Applications exam.

  • Sample Question Paper (Term 1) and Answer Key
  • Class: X Session: 2021-22
  • Subject: Computer Applications (Code 165)
  • Maximum Marks: 25 Time Allowed: 90 Minutes

General Instructions:
1. The Question Paper contains three sections A, B and C.
2. Section A has 20 questions. Attempt any 16 questions.
3. Section B has 20 questions. Attempt any 16 questions.
4. Section C has 10 questions. Attempt any 8 questions.
5. All questions carry equal marks.
6. There is no negative marking.

Section-A

This section consists of 20 questions of MCQ type. Answer any 16 questions.

1. Which one of the following software comes under Open-Source Software category?

a. Photoshop
b. Ms-Paint
c. Linux
d. Windows

The answer is Linux. Linux software comes under Open-Source Software category.

2. HTML tag to draw horizontal line:

a. <hl>
b. <hr>
c. <hline>
d. None of the above

The answer is <hr>. <hr> tag to draw horizontal line.

3. Secure data transmission means

a) Data is accessible by any unauthorized person during transmission.
b) Data can not be accessed by any unauthorized person during transmission.
c) Transmission of data happens easily
d) Noone can access it

The answer is ‘Data can not be accessed by any unauthorized person during transmission.’ Secure data transmission means, Data can not be accessed by any unauthorized person during transmission.

4. The correct HTML code to display(P+Q)2 is:

a. <SUB>(P+) 2</SUB>
b. P+Q <SUP> 2 </SUP>
c. (P + Q)<SUP> 2 </SUP>
d. <SUP> (P+Q) 2</SUP>

The answer is (P + Q)<SUP> 2 </SUP>.

5. Which HTML tags cause browsers to render text as italics?

a. <text style = “italics”></text>
b. <ital.></ital.>
c. <i></i>
d. <b></b>

The answer is <i></i>. The HTML tags ‘<i></i>‘ cause browsers to render text as italics

6. The correct HTML code for inserting an image is:

a. <img href=”image.gif”>
b. <img> image.gif</gif>
c. <image src = “image.gif”>
d. <img src = “image.gif”>

The answer is <img src = “image.gif”>. The correct HTML code for inserting an image is <img src = “image.gif”>.

7. Which attribute is NOT valid for the <body> tag?

a. background
b. color
c. vlink
d. bgcolor

The answer is color.

8. ____________attribute is used to specify the location of an image file.

a. alt
b. src
c. align
d. name

The answer is SRC. SRC attribute is used to specify the location of an image file.

9. Which of the following is NOT an example of Intellectual Property rights?

a. Patent
b. Trademark
c. Password
d. Industrial Design

The answer is Password. ‘Password’ is NOT an example of Intellectual Property rights.

10. The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason.

a. alt
b. alternate
c. tooltip
d. text

The answer is ALT. The ALT attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason.

11. While creating a Web document, which unit is used to express an image’s height and width?

a. Centimeters
b. Pixels
c. Dots per inch
d. Inches

The answer is Pixels. While creating a Web document, Pixels unit is used to express an image’s height and width.

12. Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as________________

a. Encryption
b. Decryption
c. Plagiarism
d. Data Security.

The answer is Encryption. The concept is known as Encryption.

13. Which is the correct way to comment out something in HTML?

a. Using ## and #
b. Using <!– and –>
c. Using </– and -/->
d. Using <!– and -!>

The answer is ‘Using <!– and –>’. Using ‘<!– and –>’ is the correct way to comment out something in HTML

14. The default alignment of images, that are inserted in Web page, is:

a. left
b. right
c. inline with text
d. middle

The answer is inline with text. The default alignment of images, that are inserted in a Web page, is inline with text.

15. Which of the following techniques can be used for security of data?

a. Authentication
b. Authorisation
c. Encryption
d. All of the Above

The answer is All of the Above.

16. Which of the following is not a cybercrime?

a. Plagiarism
b. Phishing
c. using licensed software
d. hacking

The answer is ‘using licensed software’.

17. _________ is a software for which exclusive rights of modification in the source code remain with the owner.

a. Free Open-Source Software
b. Freeware
c. Open-Source Software
d. Proprietary Software

The answer is Proprietary Software. Proprietary Software is software for which exclusive rights of modification in the source code remain with the owner.

18. A _______________ is the right given by the government to an inventor to protect his/ her invention from being used/copied for a fixed period of time.

a. Copyright
b. Intellectual Property
c. Patent
d. Trademark

The answer is Patent. A Patent is a right given by the government to an inventor to protect his/ her invention from being used/copied for a fixed period of time.

19. Which of these is NOT an attribute of the font tag?

a. color
b. face
c. type
d. size

The answer is Type.

20. The <_________> tag displays text in subscript form.

a. sub
b. sup
c. sups
d. subs.

The answer is sub. The <sub> tag displays text in subscript form.

Section-B: This section contains 20 questions. Answer any 16 questions.

21. Arun clicks on a link received in a message on his phone which promises him a complimentary trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked him to do the same. But Panshul refuses and tells Arun that his personal and private information, such as online account names, login information and passwords can be stolen and he should be careful of such ____________ attacks.

a. Phishing
b. Spamming
c. Scamming
d. Plagiarism

The answer is Phishing.

22. Consider the following HTML code:

<ol type=’i’>
<li>First</li>
<li>Second</li>
<li>Third</li>
<li>Fourth</li>
</ol>

Choose the correct output that would be shown upon execution of the above code, from the choices given below:

22 Consider the following HTML code

The answer is ‘i. First, ii. Second, iii. Third, iv. Fourth’.

23. Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers. One day while browsing the Internet she discovers that another artist has displayed her painting portraying it as his own. Which right of Charlene was infringed?

a. Digital Privacy right
b. Intellectual Property right
c. Digital Property right
d. Intellectual Privacy right

The answer is Intellectual Property right.

24. Which of the following will result in the largest text size?

a. <H3>
b. <H6>
c. <H2>
d. <H4>

The answer is <H2>.

25. We can create a numbered list using the __________ tag.

a. <UL>
b. <list>
c. <OL>
d. <DL>

The answer is <OL>. We can create a numbered list using the <OL> tag.

26. Which of these is NOT an example of Cyber bullying?

a. Copying a classmate’s personal photo against his/her permission from his social media account and sending it to other friends on their emails
b. Bullying a classmate in the school corridor.
c. Threatening someone on whatsapp.
d. Posting mean messages about someone on their social media.

The answer is ‘Bullying a classmate in the school corridor.’

27. Identify which of the following type of list will create a bulleted list.

a. Unordered
b. Ordered
c. Definition
d. Numbered

The answer is Unordered.

28. Which sequence of HTML tags is correct?

a. <html><head><title></title></head><body></body></html>
b. <html><head><title><body></title></head></body></html>
c. <html><head><title</head><body></body>></title></</html>
d. <html><head><title><body></body ></title></head ></html>

The answer is <html><head><title></title></head><body></body></html>.

29. Pratham is excited to use a new software which is freely available to download but he cannot modify or change the source code. Pratham is using

a. Freeware
b. Open-Source Software
c. Both a and b
d. None of the above

The correct answer is Freeware.

30. Priyanshu has written the following code snippet as part pf an HTML program.

<B> Mystery Moon </B>, Predict the output of the above from the following:
a. Mystery Moon
b. Mystery Moon
c. Mystery Moon
d. Mystery Moon

The answer is B. Mystery Moon.

31. Consider the following code: <img src=”Computers.jpg” width=” ________ ” height=”________”>

Fill in the blanks to set the image size to be 250pixels wide and 400 pixels tall.

a. 250, 400
b.400, 250
c. <250><400>
d. <400><250>

The answer is 250, 400.

32. Tag (s) required to create Description lists in HTML:

a. <DL>
b. <DT>
c. <DD>
d. All of the above

The answer is All of the above.

33. Which of the following is NOT a reason for the digital divide in different demographic regions?

a. Cost of Technology
b. Lack of information
c. Lack of access to high-performance computers
d. Lack of access to the disabled.

The answer is Lack of access to high-performance computers.

34. One of the most popular method of encrypting data is Ceaser cipher where original data is replaced by a key character like if key is -2 than ‘a’ will be replaced by ‘y’, ‘b’ is replaced by ‘z’ and so on.

If the key is 2 i.e. Every letter is replaced by its next to next letter means the letter ‘A’ will be replaced by ‘C’, the letter ‘B’ is replaced by ‘D’, and so on then what will be the replacement of the word ‘CoMpUtEr’.

a. Eqorwvgt
b. eQOrwVtG
c. eqroWVTG
d. EqOrWvGt

The answer is EqOrWvGt.

35. Consider the following form control in a HTML form:

Male

Female

Now choose the correct line of code for the above :
a. <input type = “radio” name= “Gender” value= “male”>Male<br> <input type = “radio” name= “Gender” value= “female”>Female<br>
b. <input type = “radiobutton” name= “Gender” value= “male”>Male<br> <input type = “radiobutton” name= “Gender” value= “female”>Female<br>
c. <input type = “radio”, name= “Gender”>< value= “male”>Male <input type = “radio”, name= “Gender”>< value= “female”>Female
d. <input type = “radio” name= “Gender” value= “male”><br>
<input type = “radio” name= “Gender” value= “female”><br>

The answer is (A) <input type = “radio” name= “Gender” value= “male”>Male<br> <input type = “radio” name= “Gender” value= “female”>Female<br>.

36. Gagandeep has written the following code to display an image in the background of HTML document:

<BODY BgGround= “Animals.jpeg”> but he is not getting the desired output. Help him in identifying correct code from the following

a. <BODY Bg= “Animals.jpeg”>
b. <BODY BACK= “Animals.jpeg”>
c. <BODY BGIMAGE= “Animals.jpeg”>
d. <BODY BACKGROUND= “Animals.jpeg”>

The answer is <BODY BACKGROUND= “Animals.jpeg”>.

37. Which of the following is a way to avoid Plagiarism when using material from the Internet?

i. Citing
ii. Paraphrasing
iii. Referencing
iv. embedding

Choose the correct option:
a. i and ii only
b. Only i
c. i, ii and iii only
d. ii and iv only

The answer is i, ii and iii only.

38. Tag to create password field in HTML document:

a. <password>
b. <input>
c. <pwd>
d. <pword>

The answer is <input>.

39. Which of the following tag is used to define options in a drop-down selection list?

a. <select>
b. <list>
c. <dropdown>
d. <option>

The answer is <option>. <option> is tag used to define options in a drop-down selection list.

40. Which of the following is the correct way to create a list using the lowercase letters?

a. <ol alpha = “a” >
b. <ol type = “a”>
c. <ol letter = “a”>
d. None of the above

The answer is <ol type = “a”>. <ol type = “a”> is the correct way to create a list using the lowercase letters.

Section-C: Case study based questions
Section C consists of 10 questions. Any 8 questions are to be attempted.

Case Study –I
Geetika has recently created her social accounts. She is very excited as she waited so long to go online. She has recently also got admission in a prestigious high school and does not know many students.
When she logs into her social media a few days later, she finds that someone is posting negative, demeaning comments on her social media profile. She is also getting repeated mails from unknown people. Whenever she goes online, she is trolled by multiple unknown people.

Based on the given information, answer the questions NO. 41-45.

41. Geetika is a victim of _______ :

a. Eavesdropping
b. Plagiarism
c. Phishing
d. Cyber stalking

The answer is Cyber stalking. Geetika is a victim of Cyber stalking.

42. Which of the following is the most appropriate action she should take?

a. She should stop going online and delete her social media accounts.
b. She should NOT share this with anyone as she might face more of such kind of behaviour.
c. She should file a complaint at the nearest police station.
d. She should inform her parents and bring to the notice of school authorities.

The answer is ‘She should inform her parents and bring to the notice of school authorities.’

43. After hearing her ordeal, the school decides to publish a set of moral principles that determines the appropriate behavior of students while using the internet. The school is referring to__________

a. Intellectual Property rights
b. Internet Privacy
c. Computer Ethics
d. Cyber Ethics

The answer is Cyber Ethics. After hearing her ordeal, the school decides to publish a set of moral principles that determines the appropriate behavior of students while using the internet. The school is referring to Cyber Ethics.

44. Geetika is advised by her best friend, Seerat to protect her personal information from intentional or unintentional attacks by others. This is also known as ___________

a. Digital right
b. Copyright
c. Data Privacy
d. Intellectual property

The answer is Data Privacy. Geetika is advised by her best friend, Seerat to protect her personal information from intentional or unintentional attacks by others. This is also known as Data Privacy.

45. The computer teacher of Geetika’s class decides to take an online session on the topic Netiquettes, which generally includes:

a. safeguarding one’s passwords and sensitive online information
b. logging out of social media accounts after the session
c. not bullying or trolling anyone by disrespecting them or passing inappropriate remarks
d. All of the above.

The correct option is ‘All of the above’.

Case Study –II

Consider the following code created by Sumantha for a webpage:
<html>
<body bgcolor=”yellow”>
<center>
<h1> Our Country : India <__>
——-line1
<imgsrc=”india.jpg”>
</center>
<p>
<font color=”red” size=”5″ ____=”Times New Roman”>
——-line2
India is spread over a large geographical area. In terms of area, it is the 7<sup>th</sup> largest country while in terms of population, it is the 2<sup>nd</sup> largest country in the world.
Some facts about India are as follows<___></p>
——-line3
<ul>
<li>Area :Approx 3.28 million sq. km <_>
——-line4
<li>North to South extension :Approx 3,200 km</li>
<li>East to West extension :Approx 2900 km</li>
<__>
——-line5
</body>
</html>

Based on the given information, answer the questions NO. 46-50.

46. Choose the correct option from the following to fill up in line 1:

a. \h1
b. \h6
c. /h6
d. /h1

The answer is (D) /h1.

47. Choose the correct option from the following to fill up in line 2:

a. font
b. face
c. type
d. text

The answer is the face.

48. Choose the correct option from the following to fill up in line 3:

a. </f>
b. <f>
c. </font>
d. <font>

The answer is </font>.

49. Choose the correct option from the following to fill up in line 4:

a. <i>
b. </li>
c. <\li>
d. <\i>

The answer is </li>.

50. Choose the correct option from the following to fill up in line 5:

a. ul
b. <\ul>
c. <ul>
d. </ul>

The answer is </ul>.