Class 10th CBSE Term 1, Computer Application Sample Question Paper and Answers Key 2021-22
- SUBJECT- Business Studies
- Term- I
- Time allowed- 90 minutes
- Maximum Marks- 40
1. Which one of the following software comes under Open-Source Software category?
a.Photoshop
b.Ms-Paint
c.Linux
d.Windows
The correct answer is: Linux
2. HTML tag to draw horizontal line:
a.<hl>
b.<hr>
c.<hline>
d.None of the above
The correct answer is: <hr>
3. Secure data transmission means
a) Data is accessible by any unauthorized person during transmission.
b) Data can not be accessed by any unauthorized person during transmission.
c) Transmission of data happens easily
d) No one can access it
The correct answer is: Data can not be accessed by any unauthorized person during transmission.
4. The correct HTML code to display(P+Q)2 is:
a.<SUB>(P+) 2</SUB>
b.P+Q<SUP> 2</SUP>
c.(P+Q)<SUP> 2</SUP>
d.<SUP>(P+Q) 2</SUP>
The correct answer is: (P+Q)<SUP> 2</SUP>
5. Which HTML tags cause browsers to render text as italics?
a.<text style = “italics”></text>
b.<ital.></ital.>
c.<i></i>
d.<b></b>
The correct answer is: <i></i>
6. The correct HTML code for inserting an image is:
a.<img herf=”image.gif”>
b.<img>image.gif</gif>
c.<image src = “image.gif”>
d.<img src = “image.gif”>
The correct answer is: <img src = “image.gif”>
7. Which attribute is NOT valid for the <body>tag?
a.background
b.color
c.vlink
d.bgcolor
The correct answer is: color
8. ____________attribute is used to specify the location of an image file.
a.alt
b.src
c.align
d.name
The correct answer is: src
9. Which of the following is NOT an example of Intellectual Property rights?
a.Patent
b.Trademark
c.Password
d.Industrial Design
The correct answer is: Password
10. The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason.
a.alt
b.alternate
c.tooltip
d.text
The correct answer is: alt
11. While creating a Web document, which unit is used to express an image’s height and width?
a.Centimeters
b.Pixels
c.Dots per inch
d.Inches
The correct answer is: Pixels
12. Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as________________
a.Encryption
b.Decryption
c.Plagiarism
d.Data Security
The correct answer is: Encryption
14. The default alignment of images, that are inserted in Web page, is:
a.left
b.right
c.inline with text
d.middle
The correct answer is: right
15. Which of the following techniques can be used for security of data?
a.Authentication
b.Authorisation
c.Encryption
d.All of the Above
The correct answer is: All of the Above
16. Which of the following is not a cybercrime?
a.Plagiarism
b.Phishing
c.using licensed software
d.hacking
The correct answer is: using licensed software
17. _________ is a software for which exclusive rights of modification in the source code remain with the owner.
a.Free Open-Source Software
b.Freeware
c.Open-Source Software
d.Proprietary Software
The correct answer is: Proprietary Software
18. A _______________ is the right given by the government to an inventor to protect his/ her invention from being used/copied for a fixed period of time.
a.Copyright
b.Intellectual Property
c.Patent
d.Trademark
The correct answer is: Intellectual Property
19. Which of these is NOT an attribute of the font tag?
a.color
b.face
c.type
d.size
The correct answer is: type
20. The <_________><________> tag displays text in subscript form.
a.sub
b.sup
c.sups
d.subs.