Selfstudys Com File
Selfstudys Com File
General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, internal choices have been provided in some of the questions.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
Page 1 of 7
5. Which protocol is used for video conferencing among multiple participants? 1
A. Telnet
B. Http
C. VoIP
D. SFTP
6. Select the correct option to fill in the blank: 1
A website may consist of _____
A. Static Webpages
B. Dynamic Webpages
C. Both a and b.
D. Domain.
7. Aman, a student of Class X, wants to create numbered list in HTML, which of the 1
following tag should he use?
A. <UL>
B. <OL>
C. <DL>
D. <list>
8. Making a copy of your webpage on the computer is known as …………...? 1
A. Uploading
B. Browsing
C. Downloading
D. None of the above.
9. Himani, a class X student, wants to remotely access a computer system far from her 1
house. Which protocol, out of the following, should she prefer to access or log in it
remotely?
A. FTP
B. SFTP
C. TCP/IP
D. TELNET
10. Anshu, a class X student, is writing CSS code for making all <span> elements bold. 1
Choose the correct code for getting the desired output from the following options:
A. span{text-size:bold}
B. span {font-weight:bold}
C. <span style="font-size:bold">
D. <span style="text-size:bold">
Page 2 of 7
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two statements, namely
Assertion (A) and Reason (R). Select the most suitable option considering the Assertion & Reason.
A. Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of Assertion (A).
B. Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation of Assertion
(A).
C. Assertion (A) is true and Reason (R) is false.
D. Assertion (A) is false and Reason (R) is true.
11. Assertion (A) : A set of rules, used over the networks, is called a Protocol. 1
Reason (R) : HTML is an example of a Protocol.
12. Assertion (A) :Chat and e-mail are live/real time conversation between 1
people/machines.
Reason (R) : We have to be online in both
Section – B
13. Mishika, a class X student, wants to use a software but does not want to pay for it. 2
Which type of software can she use? Write one example of this type of software.
14. A) Write any two differences between e-Banking and e-Commerce. 2
OR
B) What is e-learning? Name any one e-learning platform.
15. State whether the following statements are True or False: 2
I) HTML file extension is .tml.
II) Rowspan attribute is used to make a cell span multiple rows.
III) Unordered list type creates a bulleted list.
IV) HREF Stands for hyper reference.
16. A) Your best friend emails you and tells you that he/she has created a webpage on 2
an internet site having URL as: www.children.com/india/~abc.html
Now you want to create a link to this web page from your web page. Write the
HTML code to do this.
OR
B)
I) Write HTML code to display Horizontal line of red colour.
II) Write HTML Code to create a paragraph whose text colour is blue.
17. What is the purpose of HTML forms? Write HTML Code to create a Textbox in an HTML 2
form.
18. A) An incomplete CSS code within <head> . . . </head> is given below. Complete 2
this code by filling in the blanks as per the specifications that follow:
<head>
Page 3 of 7
<style>
body {________ : blue; } <!--line 1 -->
p {
________: green; <!--line 2 -->
________: Dotum; <!--line 3 -->
}
_____ <!--line 4 -->
{
Color : black;
}
</style>
</head>
Based on the above code fill in the blanks given in line 1, line2, line 3, and line 4 so
that Hemant’s webpage displays output correctly?
19. Write any two differences between SMS and MMS. 2
Section – C
Page 4 of 7
20. The following HTML statements are not written properly. Re-write the correct 3
statements with underlined corrections. The desired purpose of each statement is
mentioned under it.
I. <BODY color="red">
<!--Page background color should be red-->
II. <FONT type="arial">
<!--Type of Font should be Arial-->
III. <img source="img_girl.jpg" size="500" height="600">
<!—Image source should be img_girl.jpg, width and
height both should be 500-->
21. Consider the URL: https://www.cbse.gov.in and answer the following questions: 3
I. Which component identifies the protocol?
II. What is the significance of "s" in https?
III. Expand the terms URL and WWW?
22. A) Write any two ways to add an audio file in a web page using HTML? Explain with 3
sample code.
OR
B) Write any two ways to add a video file in a web page using HTML? Explain with
sample code.
23. Write suitable HTML statements to display the following text on a webpage: 3
I) NH3
II) X3
III) (A+B)3
Section – D
24. A) Write the HTML code to design the web page as shown below: - 4
Page 5 of 7
OR
B) Write the HTML code to design the web page as shown below (Table border
should be 2, height=100 and width=300 with cellpadding =20): -
Section – E
25. Mr. Anek comes from a village, which recently started seeing the digital revolution, 4
and now the people of his village have access to the internet. They can shop online,
make payments online, sell online and so on. Anek is also excited with these new
changes. He ordered some items online and entered his bank card details on the
webpage to make the payment.
But still after passing of the promised due date, he has not received his ordered
items. There is no way to contact the company as phones are unreachable and emails
are not being responded. He also noticed after some days that someone is sending
emails on his behalf, using his personal data.
Page 6 of 7
Based on the above information answer the following question: -
I. Mr. Anek is a victim of ____________.
II. Mr. Anek finds that his personal details are now leaked. This means his
______ is compromised.
III. While filling out details online, Mr. Anek should have checked _____ in
the URL.
IV. This type of incident will be recognized as a case of _________ (Specify
the type of crime)
26. Based on the following information, answer the questions which follows: 4
Shresth was a bright student who excelled in academics and extracurricular activities.
He intent to take some quotes and literature from internet to write an Article for
Newspaper.
I. Identify the type of ethical issue he will face, in case he copies the work
as discussed in the above case study.
II. Does the above incident described above can be considered as example of
IPR (Intellectual Property Rights) Violation?
III. How can he avoid this ethical issue?
IV. Suggest two netiquettes that Shresth’s classmates must be aware of.
Page 7 of 7
SQP-Computer Applications (Code 165)
Class: X Session: 2024-25
Marking Scheme (Theory)
Maximum Marks: 50 Time Allowed: 2 hours
QNo Answer Distribution of Total
Marks Marks
SECTION A
1. C. SCP (Secure Copy Protocol). 1 mark for the correct 1
answer
2. D. www.flipkart.com. 1 mark for the correct 1
answer
3. A. <strong> 1 mark for the correct 1
answer
4. C. Simple Mail Transfer Protocol. 1 mark for the correct 1
answer
5. C. VoIP. 1 mark for the correct 1
answer
6. C. Both a and b. 1 mark for the correct 1
answer
7. B. <OL> 1 mark for the correct 1
answer
8. C. Downloading 1 mark for the correct 1
answer
9. D. Telnet. 1 mark for the correct 1
answer
10. B. span {font-weight: bold} 1 mark for the correct 1
answer
11. C. Assertion (A) is True and Reason (R) is False. 1 mark for the correct 1
answer
12. D. Assertion (A) is false and Reason (R) is true. 1 mark for the correct 1
answer
SECTION B
13. Freeware or Free and Open-Source Software. 1 mark for correct type. 2
E.g. Open Office. (Any one example) 1 mark for any correct
example.
14. A) Difference between E-banking and E-commerce 1 mark for each correct 2
difference.
e-Banking e-Commerce
Note: Any other valid
Used for banking Used for commercial difference will also be
services only. services. considered.
It is the name given to It is the name given to
the process where a trading activities that are
customer is allowed to conducted using Internet
Page 1 of 5
use internet to access
his bank account
OR OR
B) E-LEARNING: Learning that takes place in an 1 mark for Correct
definition of e-learning
electronically simulated environment like web-based
1 mark for any correct
learning or trainings.
example.
Platforms example: DIKSHA Portal
15. I) False ½ mark for each correct 2
II) True response.
III) True
IV) True
16. <A href="http://www.children.com/india/~abc.html"> Click 1 mark for correct 2
Here </A> syntax of <A> </A>
tags.
1 Mark for correctly
using href attribute.
OR
OR
1 mark for each correct
I) <hr color=Red> answer.
II) <p><font color=Blue> Hello world</font></p>
17. HTML forms are means to collect information/ data from 1 mark for mentioning 2
the site visitor . correct purpose.
<input type="text" name="USERNAME" > 1 Mark for correct code
18. A) ½ mark each for filling 2
Line 1: bgcolor up each blank with
Line 2: color correct code.
Line 3: Font-family
Line 4: H1
OR
B) OR
½ mark each for filling
Line 1: </h1>
up each blank with
Line 2: type correct code.
Line 3: </li>
Line 4: </ul>
19. SMS MMS 1 mark for each correct 2
Short Message Service Multimedia message Service. difference.
One can send only It allows one to send Images,
plain text. Videos, Audio, GIF’s, PDF’s
and Text.
SECTION C
20. The correct code is 1 mark for each 3
I) <BODY bgcolor = "red" > correction.
II) <FONT face=arial>
III) <img src="img_girl.jpg" width="500"
height="600">
Page 2 of 5
21. I) https 1 mark for each correct 3
II) It signifies that the transmission of information over the answer.
network is secure.
III) URL: Uniform Resource Locator
WWW: World Wide Web
22. A) 1 mark for each correct 3
I. Using < EMBED > tag answer.
<EMBED SRC = "audio.mp3" > ½ mark each for
II. Using <Audio> tag correct code
< AUDIO controls>
<source src="horse.mp3" >
Horse.mp3
</AUDIO>
OR OR
B) 1 mark for each correct
I. Using <EMBED> tag answer.
<EMBED SRC = "WORDS.MP4" > ½ mark each for
II. Using <Video> tag correct code
< VIDEO controls>
<source src="horse.mp4" >
Horse.mp4
<//VIDEO>
23. I) NH<SUB>3</SUB> 1 mark for each 3
II) X<SUP>3</SUP> correct code.
III) (A+B)<SUP>3</SUP>
SECTION D
OR
<html> OR
<head> 1 mark for correct
<title> Working with table usage of html, title
</title> body opening and
</head> closing tags
<body>
<TABLE BORDER="2" HEIGHT="100" WIDTH="300" 1 Mark for correct
CELLPADDING="20" > usage of <table> tag
<TR><TH COLSPAN="3" ALIGN="CENTER">EMPLOYEE
TABLE</TH> </TR> 1 Mark for correct
<tr> usage of first <tr> tag
<td>EMPLOYEE ID </td> along with <th> tag
with colspan attribute
<td>EMPLOYEE NAME</td>
each.
<td>DEPARTMENT</td>
</tr>
1 Mark each for
<tr>
correct usage of <tr>,
<td>1</td> <th> and <td> to
<td>ANKIT</td> display each row.
<td>SALES</td>
</tr>
<tr>
<td>2</td>
<td>HEMA</td>
<td>HR</td>
</tr>
<tr>
<td>3</td>
<td>MANISH</td>
<td>FINANCE</td>
</td>
</body>
</html>
Page 4 of 5
SECTION E
25. I. I. Cybercrime / Online Fraud. 1 Mark for each correct 4
II. Privacy. response.
III. https.
IV. Identity Theft.
26. I. Plagiarism. 1 mark for each 4
II. No, it cannot be considered as an example of IPR correct part.
Violation. (for part IV: ½ mark
III. He can avoid it by acknowledging the sources and for each correct
giving credits to the sources. netiquette)
IV. Any two netiquettes:
i. One should respect others online.
ii. One should not bully anyone and avoid
heartful or hateful comments.
Page 5 of 5