Download CBSE Class 10 ComputerApplication Marking Scheme 2021 Model Paper

Download Central Board of Secondary Education (CBSE) Class 10th (10th Board Exam) ComputerApplication Marking Scheme 2021 Model Paper

Class: X Session: 2020-21
Computer Applications (Code 165)
Sample Question Paper (Theory)
Marking Scheme
Maximum Marks: 50







Time Allowed: 2 Hours


Question
Part-A
Marks allocated
No.

Section-I

This section consists of 13 questions of very short
answer type. Question no. 4 to 8 are of 'fill in the blank'
type. Fill the blank with the most appropriate answer.
Attempt any 10 questions from question no 1 to 13.

1
What is a Homepage?
1
Ans
The default (first) page of a website is called a Homepage.
(1 Mark for the correct answer)
2
Which heading element gives the most prominent
1
headings?
Ans
<H1>
(1 Mark for the correct answer)
3
Give one use of anchor tag.
1
Ans
Anchor tag is used to create hyperlinks.
(1 Mark for the correct answer)
4
_____ tag is used for a horizontal line.
1
Ans
HR tag
(1 Mark for the correct answer)
5
An empty HTML element has a _____ tag but no _____
1
tag.
Ans
start, end
(1/2 Mark each for start and end)
6
_____ tag creates a bulleted list.
1
Ans
<UL>
(1 Mark for the correct answer)
Page 1 of 12

7
The code for inserting an image in an HTML page is
1
<imgsrc=" " alt=" ">. The alt attribute is used for _____
Ans
specifying alternate text for the image
(1 Mark for the correct answer)
8
Ravi was trying to log-in to his net-banking account. He
1
noticed that the URL of the net banking starts with 'https'.
The 's' in 'https' stands for _____
Ans
Secure
(1 Mark for the correct answer)
9
Sarita is designing a webpage and wants to change the
1
name of the font (font-type) for certain text. Which attribute
of the FONT tag she should use.
Ans
face
(1 Mark for the correct answer)
10
What is the use of <br> tag in HTML Code?
1
Ans
<br> tag is used to insert a single line break in a HTML
Document.
(1 Mark for the correct answer)
11
What is the significance of the URL?
1
Ans
URL specifies unique address of each document on the
internet.
(1 Mark for the correct answer)
12
What is the importance of vlink attribute of <BODY> tag?
1
Ans
vlink attribute specifies the color of visited links in a
document
(1 Mark for the correct answer)
13
What is the method of using comment line in the HTML
1
code?
Ans
<!-- Any text -->
(1 Mark for the correct answer)


Section-II
Both the Case study based questions are compulsory.
Attempt any 5 questions (out of 7 questions) from each
case study. Each question carries 1 mark

14

Internet Protocols
For communication over the Internet, the communicating
devices must follow certain rules. These rules are called
Internet protocols. For email communication, we use SMTP
and POP. For communication between browser and server
Page 2 of 12

HTTP and HTTPS protocols are used. We can use
TELNET to access services available on a remote
computer.
(i)
Which of the following is an Internet Protocol.
1
a) HTTP
b) FTP
c) both (a) and (b)
d) None of the above
Ans
c) both (a) and (b)
(1 Mark for the correct answer)
(i )
SMTP protocol is
1
a) used for composing an emailmessage.
b) used in receiving incoming emails by pul ing the
message from server to client
c) used in sending outgoing emails by pushing the
message from client to server
d) None of the above
Ans
c) used in sending outgoing emails by pushing the
message from client to server
(1 Mark for the correct answer)
(i i)
POP protocol is
1
a) used for composing an emailmessage.
b) used in receiving incoming emails by pul ing the
message from server to client
c) used in sending outgoing emails by pushing the
message from client to server
d) None of the above
Ans
b) used in receiving incoming emails by pul ing the
message from server to client
(1 Mark for the correct answer)
(iv)
Which of the following internet protocols provides secure
1
data transmission between server and browser with the
help of encryption.
a) HTTP
b) HTTPS
c) TELNET
d) ARPANET
Ans
b) HTTPS
(1 Mark for the correct answer)
(v)
The full form of POP (email protocol) is
1
a) Post Order Protocol
b) Push Order Protocol
c) Post Office Protocol
d) Pull Over Protocol
Page 3 of 12

Ans
c) Post Office Protocol
(1 Mark for the correct answer)
(vi)
Which of the following protocol is used for delivering data
1
from the source to the destination.
a) TCP
b) IP
c) SMTP
d) ARPANET
Ans
b) IP
(1 Mark for the correct answer)
(vi )
The Ful Form of SMTP is
1
a) Secure Mail Transfer Protocol
b) Secure Mail Transmit Protocol
c) Simple Mail Transmit Protocol
d) Simple Mail Transfer Protocol
Ans
d) Simple Mail Transfer Protocol
(1 Mark for the correct answer)
15
Secure data transmission
Secure data transmission means that data/information is
not being received or modified by an unauthorized person,
over a network, from source to destination.For secure data
transmission, we can convert an actual message (which is
in readable form) into an unreadable message (called an
encrypted message) with the help of the concept of
encryption. This unreadable message is sent through the
network to the destination. If a hacker tries to read this
message, he/she receives an unreadable message that
cannot be easily converted into the actual message. The
unreadable message can be converted to the original
message by the receiver at the destination.
Caesar Cipher is one of the common encryption
techniques. In this technique, each letter of the word is
replaced by a letter some fixed number of positions
(usually called as key) down the alphabet. For example, if
the key is 3, each 'A' will be replaced by 'D' (Letter 'D' is 3
positions down Letter 'A' in the alphabet), each 'B' wil be
replaced by 'E' and similarly, each 'Z' wil be replaced by
'C'. The receiver can identify the original message by using
the reverse technique of encryption. This reverse technique
is called decryption.
(i)
.Secure data transmission means
1
a) Data can be accessed by any unauthorized person
during transmission.
b) Data can not be accessed by any unauthorized
Page 4 of 12

person during transmission.
c) Transmission of data
d) None of the above
Ans
b) Data can not be accessed by any authorized person
during transmission
(1 Mark for the correct answer)
(i )
Which of the following techniques can be used for security
1
of data.
a) Authentication
b) Authorisation
c) Encryption
d) Al of the Above
Ans
d) Al of the Above
(1 Mark for the correct answer)
(i i)
Caesar Cipher is
1
a) used for conversion of the actual message into an
encrypted message
b) an encryption technique
c) both (a) and (b)
d) None of the above
Ans
c) both (a) and (b)
(1 Mark for the correct answer)
(iv)
Person 'X' has received an encrypted message and wants
1
to convert this message into the actual message (message
before encryption). The technique he should use is called
a) Conversion
b) Encryption
c) Decryption
d) None of the above
Ans
c) Decryption
(1 Mark for the correct answer)
(v)
A sender wants to send a message having the text as
1
'COMPUTER' to a receiver using 4 as the key. What wil be
the encrypted message?
a) GSQTZXIV
b) GSQTYXIV
c) GSXTYXIV
d) GSQSYXIV
Ans
b) GSQTYXIV
(1 Mark for the correct answer)
(vi)
An encryption algorithm is used to transform a readable
1
message into:
a) Text message
Page 5 of 12

b) Simple message
c) Converted message
d) Encrypted message
Ans
c) Encrypted message
(1 Mark for the correct answer)
(vi )
In Ceaser Cipher, for which of the following values of key,
1
the encrypted message wil be the same as original
message.
a) 0
b) 26
c) both (a) and (b)
d) None of the above
Ans
c) both (a) and (b)
(1 Mark for the correct answer)
Part ?B
All questions are compulsory. In case of internal
choices, attempt any one.

16
Sarvesh, a student of Class X, is not able to understand
2
the difference between web client and web-server. Help
him in understanding the same by explaining their role and
giving suitable example of each.
Ans
Web-Client: An application (Web Browser, Chatting
Program, etc.) that requests for services from a web-
server. Example: Web Browsers, Chatting Applications
Web-Server: Web-server is a software (or any dedicated
computer running this software) that serves the request
made by web-clients.
Example: Apache Server
(1/2 mark each for explaining the role of Web-Client and
Web-Server)
(1/2 mark each for example of web-client and web-server)
17
Write the full form of Cc and Bcc (used in
2
emailcommunication). Explain the difference between
them.
Ans
Cc : Carbon Copy: every recipient can check who else has
received the mail.
Bcc : Blind Carbon Copy: no recipient can check who else
has received the mail.
(1/2 mark each for full form of Cc and Bcc)
(1 mark for explaining the correct difference)
18
What is the use of <sub> and <sup>tag. Explain with
2
suitable example.
Page 6 of 12

Ans
<sub> : defines subscripted text
<sup> : defines superscripted text
Example
To write a2 : a<sup>2</sup>
To write CO2 : CO<sub>2</sub>
(1/2 mark each for explaining the use of <sub> and <sup>
tag)
(1/2 mark each for example of <sub> and <sup> tag)
19
Sunil wants to insert an image 'elearning.jpg' into a
2
webpage. Write the name and the syntax of the HTML Tag
she should use. The alternate text for the image should be
'E-learning Image'
Ans
Name of Tag : Image Tag (<img>)
Syntax of Tag :<imgsrc = "elearning.jpg" alt = "E-learning
Image">
(1/2 mark for correct name of tag)
(1/2 mark for correct use of img tag in syntax)
(1/2 mark for correct use of src attribute)
(1/2 mark for correct use of alt atribute)
20
Define the following
2
(i) Intellectual Property Rights
(i ) Plagiarism
OR
What is e-commerce? Write any two preventive
measuresto be taken for secure online transaction.
Ans
Intellectual Property Rights: rights given to creators for
creations of their minds.
Plagiarism: taking credit of ideas/words of another person
OR
e-commerce: Buying and selling of goods on the internet
Two preventive measures for secure online transaction
1. Never share OTP with anyone.
2. Before making an online payment, ensure that
connection is secure (HTTPS)
(1 mark each for the correct definition of Intellectual
Property Rights and Plagiarism)
OR
(1 mark for the correct definition of e-commerce)
(1/2 mark each for two preventive measures)
21
Shalini, a web designer, wants to create a webpage to
3
display a list where each item is listed by a number. Which
type of list she should use? Explain the role of start and
type attributes.
Ans
Ordered List
Page 7 of 12

Role
Start Attribute: specifies the start value of an ordered list
Type Attribute: specifies the type of the list item marker
(1 mark for the correct list type)
(1 mark each for explaining the correct role of start and
type attributes)
22
What are the roles of Rowspan and Colspan attribute?
3
Explain with suitable HTML example.
Ans
Rowspan : Combine Cells vertically
Colspan : Combine Cells horizontally
Example
<table border = '1'>
</tr>
<tr>
<td>Row-1 Column-1</td>
<td colspan="2">Row-1 Column-2and3</td>
<td rowspan="2">Row-1and2 Column-4</td>
</tr>
<tr>
<td>Row-2 Column-1</td>
<td>Row-2 Column-2</td>
<td>Row-2 Column-3</td>
</tr>
</table>
(1/2 mark each for explaining correct role of Rowspan and
Colspan)
(1 mark each for correct explaination of Rowspan and
Colspan using HTML example)
23
Saroj, a student of Class X, wants to represent a table in
3
webpage but she is unaware about the table tag. Explain
her the role of <th>, <tr> and <td> tag. Write HTML code of
a table and show the use of <th>, <tr> and <td> tag.
Ans
<tr> : defines table row.
<th> : defines table header.
<td> : defines table data/cell.
HTML Code
<table>
<tr>
<th>Roll Number</th>
<th>Name</th>
<th>Stream</th>
</tr>
<tr>
Page 8 of 12

<td>1</td>
<td>Ajay</td>
<td>Arts</td>
</tr>
<tr>
<td>2</td>
<td>Vijay</td>
<td>Commerce</td>
</tr>
<tr>
<td>3</td>
<td>Ramesh</td>
<td>Commerce</td>
</tr>
</table>
(1/2 mark each for explaining the correct role of <th>, <tr>
and <td> tag)
(1.5 mark for correct code of HTML table showing the use
of <th>, <tr> and <td> tag)
24
What is the digital divide? Write any two reasons for digital
3
divide in India.
Ans
Digital Divide refers to the differing amount of information
between those who have access to ICT and those who
don't have access.
Reasons
due to the unequal distribution of wealth, poverty is
higher in rural areas
Less Literacy rate in rural India
(1 mark for the correct definition of digital divide)
(1 mark each for any two correct reasons for the digital
divide in India)
25
Define Internet and write its two uses in our daily life. How
3
is it different from the World Wide Web (www).
OR
What is e-learning? Explain any two merits of e-learning.
Ans
The Internet is a worldwide network that links many smaller
computer-networks.
Uses of the Internet
1. e-learning
2. e-commerce
The difference between the internetandwww
www: It is a collection of various hypertext documents
available over the internet. www is a part of the internet.
internet: A worldwide network that provides various other
Page 9 of 12

services (apart from www) like email-communication, File
sharing, etc.
OR
e-learning: learning through the courses which are
delivered online.
Benefits :
1. Self Paced (Learn at your speed).
2. We can attend classes atanytime and anywhere.
(1 mark for the correct definition of the internet)
(1/2 mark each for writing two use of internet in daily life)
(1 mark for explaining the correct difference between
internet and www)
OR
(1 mark for the correct definition of e-learning)
(1 mark each for writing any two merits of e-learning)
26
5
Write the HTML code to design the above-shown web page
considering the specifications as given below :
Background color of the page should be yellow.
Heading 'Our Country : India' should be the first
level of heading
The image named `India.jpg' should be placed at
the center.
Formatting style for the paragraph
o Font Size: 5
o Font Name: Times New Roman
o Color: Red
Superscript and subscript tags should be used
wherever required.
Facts (as shown in the above web-page) should be
written with the help of the unordered list.
Page 10 of 12


OR
Answer the following
a. What is a Hypertext link?
b. Give the name and the syntax of the HTML Tag which is
used for creating a Hypertext Link.
c. Neha wants to display a 'Click Here' message on her
webpage which, when clicked, opens a new webpage
'Chapter2.html'. Write the syntax of the HTML command
she should use.
d. On the same webpage, Neha whose email is
neha@xyz.com, wants to display a 'Contact us' message
which when clicked open theemail program and allows the
user to send a mail to Neha.Write the syntax of the HTML
command she should use.
e. Explain the use of the target attribute in the Hypertext
Link Tag.
Ans
<html>
<body bgcolor="yellow">
<center>
<h1> Our Country : India </h1>
<imgsrc="india.jpg">
</center>
<p>
<font color="red" size="5" face="Times New Roman">
India is spread over a large geographical area. In terms of
area, it is the 7<sup>th</sup> largest country while in
terms of population, it is the 2<sup>nd</sup> largest
country in the world. Some facts about India are as
follows</font></p>
<ul>
<li>Area :Approx 3.28 mil ion sq. km </li>
<li>North to South extension :Approx 3,200 km</li>
<li>East to West extension :Approx 2900 km</li>
</ul>
</body>
</html>
OR
a. Hyperlink allows us to link HTML elements (text and/or
image) to another document or new section within the
current document.
b.Name : anchor tag, Syntax <a href="Link
Address">Hyperlink Text</a>
Page 11 of 12


c. <a href="Chapter2.html">Click Here</a>
d. <a href="mailto:neha@xyz.com">Contact us</a>
e.Specifies where to open the linked document when the
link is clicked.
(1/2 mark for the correct<html> structure )
(1/2 mark for the correct use of bgcolor attribute of <body>
)
(1/2 mark for the correct use of <H1> tag)
(1/2 mark for the correct use of image src tag)
(1/2 mark for the correct use of <center> or attribute align
= `middle' in <img>)
(1/2 mark for the correct use of font color)
(1/2 mark for the correct use of font size)
(1/2 mark for the correct use of font face)
(1/2 mark for the correct use of <sup> tag)
(1/2 mark for the correct use of unordered list)
OR
a. (1 mark for the correct definition of Hypertext link)
b. (1/2 mark each for name and writing syntax of anchor
tag)
c. (1 mark for correct syntax)
d. (1 mark for correct syntax)
e. (1 mark for explaining the use of target attribute)
Page 12 of 12

This post was last modified on 07 March 2021