Class 10 PRACTICE PAPER Comp. Applications.docx
Class 10 PRACTICE PAPER Comp. Applications.docx
Class 10 PRACTICE PAPER Comp. Applications.docx
PRACTICE PAPER
Session: 2024-25
Class : X Subject: Computer Applications (165)
Time : 2 Hours Maximum Marks: 50
General Instructions:
1. This Question Paper has 5 Sections A-E.
2. All Questions are compulsory. However, internal choices have been provided in some of the questions.
3. Section A has 12 questions carrying 01 mark each.
4. Section B has 7 Short Answer (SA-I) type questions carrying 02 marks each.
5. Section C has 4 Short Answer (SA-II) type questions carrying 03 marks each.
6. Section D has 1 Long Answer (LA) type question carrying 04 marks.
7. Section E has 2 Source based /Case-based /Passage based Questions carrying 04 marks each.
A.Diksha B. Swayam
C. NPTEL D. flipkart
3. _______ allows remote accessing to the files which contain programs, technical, 1
handouts, reports etc.
A. FTP B. Chat
4. Which of the following tags is not used while creating a description list? 1
A. <TD> B. <DL>
C. <DD> D. <DT>
5. Which of the following tag is used to define options in a dropdown selection List? 1
A. <Select> B. <List>
6. The default alignment of an image that are inserted in web pages is:- 1
A. Left B. Middle
Page 1 of 4
7. Which of the following tag can be used to draw a horizontal line in a webpage? 1
A. <Line> B. <HR>
C. <HLine> D. <Rule>
A. H<SUP>2</SUP>O B. <SUP>H2O
C. H<SUB>2</SUB>O D. <SUP>H2</SUP>O
A. SRC B. Rowspan
C. LiNK D. Rowpadding
Questions No-11 & 12 are Assertion and Reason types. Each question consists of two
statements, namely Assertion (A) and Reason (R). Select the most suitable option
considering the Assertion & Reason.
A. Both Assertion (A) and Reason (R) are true and Reason (R) is a correct explanation of
Assertion (A).
B. Both Assertion (A) and Reason (R) are true but Reason (R) is not a correct explanation
of Assertion (A).
C. Assertion (A) is true and Reason (R) is false.
D. Assertion (A) is false and Reason (R) is true.
11. Assertion (A): Empty elements are also referred as void elements. 1
Reason (R): Empty elements are the tags which do not require a closing tag, for example
<BR> and <HR>.
12. Assertion (A): A web browser is an application software that is installed on a web client. 1
Reason (R): A web server sends the request for accessing a website through web browser
software only.
Section – B
14. A) How to you differentiate between a web address and an e-mail address? 2
OR
B) What is e-banking? Name any two advantages of e-banking.
15. 2
How can we reduce the digital divide? Give any two points.
Page 2 of 4
18. A) Write CSS internal code for : 2
1. Page background colour should be blue and text color should be red.
2. Second level Heading properties should be as follows.
a. text colour should be red.
b. left margin should be 25px.
OR
B) Write the html code to display the given list:
Computer
This is an Electronic Machine.
Mouse
This is an Input (pointing) device.
19. Explain the roles of rowspan and colspan attributes with examples. 2
Section – C
22. A) State the difference between the internal and external style sheet with the help of 3
their syntax.
OR
B) What is the use of BGCOLOR and BORDERCOLOR attributes with <TR>,<TD> and
<TH> tags?
23. Write suitable HTML statements to display the following text on a webpage: 3
List of the students
SUPW
Football 12 Boys
Section – D
24. A) Write the HTML code to design the web page as shown below: - 4
Page 3 of 4
Specifications :
● The background color of the page should be yellow and the text for the page should
be in blue color.
● Heading Home Services should be the first level of heading.
● The image named ‘service.png’ should be placed on the web page.
● Font size for the paragraph and the list of services should be 4 and Font face should
be Verdana. Superscript tags should be used wherever required.
● The services (as shown in the above web page) should be written with the help of the
unordered list.
● The bottom-most line of Queries : help@homeservices.com should be a s default mail
client to send queries to the mentioned email id.
Section – E
25. Geetika has recently created her social accounts. She is very excited as she waited so long 4
to go online. She has recently also got admission in a prestigious high school and does not
know many students. When she logs into her social media a few days later, she finds that
someone is posting negative, demeaning comments on her social media profile. She is also
getting repeated mails from unknown people. Whenever she goes online, she is trolled by
multiple unknown people.
Based on the above information answer the following question: -
I. Geetika is a victim of _______.
II. What appropriate action should she take?
III. After hearing her ordeal, the school decides to publish a set of moral principles
that determines the appropriate behavior of students while using the internet.
The school is referring to__________
IV. Geetika is advised by her best friend, Seerat to protect her personal information
from intentional or unintentional attacks by others. This is also known as
___________
26. Read the case study given below and attempt any 4 sub-questions (out of 5). Each 4
sub-question carries 1 mark.
Mr. Harish, an accountant, works in an IT firm and due to the pandemic, has been asked to
work from home. He has set up his online office at his home. He has purchased a laptop, web
camera and other accessories. Now he has started working from home and performs his
various duties online.
I. Mr. Harish wants to hold an online meeting with the company’s client such that he can
interact as well as see them. Which web service should he avail?
II. Mr. Pritish sends an email to Harish requesting him to prepare the balance sheet.
Which network protocol is involved during this email communication?
III. The company’s financial head needs to send some high security documents to Mr.
Harish. He uses an application which supports the ___________ protocol.
IV. In order to gather some information on latest accounting trends, Mr. Harish has to do
some research. He can do this by locating sites online using a _________.
V. Joseph, the company secretary sends a link to Mr. Harish which contains important
company files. What should he do in order to access the files?
Page 4 of 4