Download Central Board of Secondary Education (CBSE) Class 10th (10th Board Exam) Computer Application 2021 Sample Paper
Computer Applications (Code 165)
Sample Question Paper (Theory)
Maximum Marks: 50
Time Allowed: 2 hours
General Instructions:
1. This question paper contains two parts A and B. Each part is compulsory.
2. Part A carries 20 marks while part B carries 30 marks.
3. Part-A consists very short answer and case based MCQ Questions and Part-B is Descriptive
Paper.
4. Both Part A and Part B have choices.
Part ? A:
1. It consists two sections- I and II.
2. Section I has 13 questions of very short answer type. An examinee is to attempt any 10 out of
13 questions.
3. Section II has two case studies. Each case study has 7 case-based sub-parts. An examinee is
to attempt any 5 out of 7 sub-parts.
Part ? B:
1. Question No. 16 to 20 are short answer Type (SA-I) questions of 2 mark each, Question No 21
to 25 are Short Answer Type (SA-II) questions of 3 marks each and Question No 26 is Long
Answer Type question of 5 marks.
2. Internal choice is provided in 1 question of 2 marks, 1 question of 3 marks and 1 question of 5
marks.
Question
Part-A
Marks
No.
allocated
Section-I
This section consists of 13 questions of very short
answer type. Question no. 4 to 8 are of 'fill in the blank'
type. Fill the blank with the most appropriate answer.
Attempt any 10 questions from question no 1 to 13.
1
What is a Homepage?
1
Page 1 of 9
2
Which heading element gives the most prominent
1
headings?
3
Give one use of anchor tag.
1
4
_____ tag is used for a horizontal line.
1
5
An empty HTML element has a _____ tag but no _____
1
tag.
6
_____ tag creates a bulleted list.
1
7
The code for inserting an image in an HTML page is
1
<imgsrc=" " alt=" ">. The alt attribute is used for _____
8
Ravi was trying to log-in to his net-banking account. He
1
noticed that the URL of the net banking starts with 'https'.
The 's' in 'https' stands for _____
9
Sarita is designing a webpage and wants to change the
1
name of the font (font-type) for certain text. Which attribute
of the FONT tag she should use.
10
What is the use of <br> tag in HTML Code?
1
11
What is the significance of the URL?
1
12
What is the importance of vlink attribute of <BODY> tag?
1
13
What is the method of using comment line in the HTML
1
code?
Section-II
Both the Case study based questions are compulsory.
Attempt any 5 questions (out of 7 questions) from each
case study. Each question carries 1 mark
14
Internet Protocols
For communication over the Internet, the communicating
devices must follow certain rules. These rules are called
Internet protocols. For email communication, we use SMTP
Page 2 of 9
and POP. For communication between browser and server
HTTP and HTTPS protocols are used. We can use
TELNET to access services available on a remote
computer.
(i)
Which of the following is an Internet Protocol.
1
a) HTTP
b) FTP
c) both (a) and (b)
d) None of the above
(i )
SMTP protocol is
1
a) used for composing an emailmessage.
b) used in receiving incoming emails by pul ing the
message from server to client
c) used in sending outgoing emails by pushing the
message from client to server
d) None of the above
(i i)
POP protocol is
1
a) used for composing an emailmessage.
b) used in receiving incoming emails by pul ing the
message from server to client
c) used in sending outgoing emails by pushing the
message from client to server
d) None of the above
(iv)
Which of the following internet protocols provides secure
1
data transmission between server and browser with the
help of encryption.
a) HTTP
b) HTTPS
c) TELNET
d) ARPANET
Page 3 of 9
(v)
The full form of POP (email protocol) is
1
a) Post Order Protocol
b) Push Order Protocol
c) Post Office Protocol
d) Pull Over Protocol
(vi)
Which of the following protocol is used for delivering data
1
from the source to the destination.
a) TCP
b) IP
c) SMTP
d) ARPANET
(vi )
The Ful Form of SMTP is
1
a) Secure Mail Transfer Protocol
b) Secure Mail Transmit Protocol
c) Simple Mail Transmit Protocol
d) Simple Mail Transfer Protocol
15
Secure data transmission
Secure data transmission means that data/information is
not being received or modified by an unauthorized person,
over a network, from source to destination. For secure data
transmission, we can convert an actual message (which is
in readable form) into an unreadable message (called an
encrypted message) with the help of the concept of
encryption. This unreadable message is sent through the
network to the destination. If a hacker tries to read this
message, he/she receives an unreadable message that
cannot be easily converted into the actual message. The
unreadable message can be converted to the original
message by the receiver at the destination.
Caesar Cipher is one of the common encryption
techniques. In this technique, each letter of the word is
replaced by a letter some fixed number of positions
(usually called as key) down the alphabet. For example, if
the key is 3, each 'A' will be replaced by 'D' (Letter 'D' is 3
positions down Letter 'A' in the alphabet), each 'B' wil be
Page 4 of 9
replaced by 'E' and similarly, each 'Z' wil be replaced by
'C'. The receiver can identify the original message by using
the reverse technique of encryption. This reverse technique
is called decryption.
(i)
.Secure data transmission means
1
a) Data can be accessed by any unauthorized person
during transmission.
b) Data can not be accessed by any unauthorized
person during transmission.
c) Transmission of data
d) None of the above
(i )
Which of the following techniques can be used for security
1
of data.
a) Authentication
b) Authorisation
c) Encryption
d) Al of the Above
(i i)
Caesar Cipher is
1
a) used for conversion of the actual message into an
encrypted message
b) an encryption technique
c) both (a) and (b)
d) None of the above
(iv)
Person 'X' has received an encrypted message and wants
1
to convert this message into the actual message (message
before encryption). The technique he should use is called
a) Conversion
b) Encryption
c) Decryption
d) None of the above
Page 5 of 9
(v)
A sender wants to send a message having the text as
1
'COMPUTER' to a receiver using 4 as the key. What wil be
the encrypted message?
a) GSQTZXIV
b) GSQTYXIV
c) GSXTYXIV
d) GSQSYXIV
(vi)
An encryption algorithm is used to transform a readable
1
message into:
a) Text message
b) Simple message
c) Converted message
d) Encrypted message
(vi )
In Ceaser Cipher, for which of the following values of key,
1
the encrypted message wil be the same as original
message.
a) 0
b) 26
c) both (a) and (b)
d) None of the above
Part ?B
All questions are compulsory. In case of internal
choices, attempt any one.
16
Sarvesh, a student of Class X, is not able to understand
2
the difference between web client and web-server. Help
him in understanding the same by explaining their role and
giving suitable example of each.
17
Write the full form of Cc and Bcc (used in
2
emailcommunication). Explain the difference between
Page 6 of 9
them.
18
What is the use of <sub> and <sup>tag. Explain with
2
suitable example.
19
Sunil wants to insert an image 'elearning.jpg' into a
2
webpage. Write the name and the syntax of the HTML Tag
she should use. The alternate text for the image should be
'E-learning Image'
20
Define the following
2
(i) Intellectual Property Rights
(i ) Plagiarism
OR
What is e-commerce? Write any two preventive
measuresto be taken for secure online transaction.
21
Shalini, a web designer, wants to create a webpage to
3
display a list where each item is listed by a number. Which
type of list she should use? Explain the role of start and
type attributes.
22
What are the roles of Rowspan and Colspan attribute?
3
Explain with suitable HTML example.
23
Saroj, a student of Class X, wants to represent a table in
3
webpage but she is unaware about the table tag. Explain
her the role of <th>, <tr> and <td> tag. Write HTML code of
a table and show the use of <th>, <tr> and <td> tag.
24
What is the digital divide? Write any two reasons for digital
3
divide in India.
25
Define Internet and write its two uses in our daily life. How
3
is it different from the World Wide Web (www).
OR
What is e-learning? Explain any two merits of e-learning.
Page 7 of 9
26
5
Write the HTML code to design the above-shown web page
considering the specifications as given below :
Background color of the page should be yellow.
Heading 'Our Country : India' should be the first
level of heading
The image named `India.jpg' should be placed at
the center.
Formatting style for the paragraph
o Font Size: 5
o Font Name: Times New Roman
o Color: Red
Superscript and subscript tags should be used
wherever required.
Facts (as shown in the above web-page) should be
written with the help of the unordered list.
OR
Answer the following
a. What is a Hypertext link?
b. Give the name and the syntax of the HTML Tag which is
used for creating a Hypertext Link.
Page 8 of 9
c. Neha wants to display a 'Click Here' message on her
webpage which, when clicked, opens a new webpage
'Chapter2.html'. Write the syntax of the HTML command
she should use.
d. On the same webpage, Neha whose email is
neha@xyz.com, wants to display a 'Contact us' message
which when clicked open theemail program and allows the
user to send a mail to Neha.Write the syntax of the HTML
command she should use.
e. Explain the use of the target attribute in the Hypertext
Link Tag.
Page 9 of 9
This post was last modified on 07 March 2021