Test: Computer Science: CBSE Sample Question Paper- Term I (2021-22)


50 Questions MCQ Test CBSE Sample Papers For Class 10 | Test: Computer Science: CBSE Sample Question Paper- Term I (2021-22)


Description
Attempt Test: Computer Science: CBSE Sample Question Paper- Term I (2021-22) | 50 questions in 90 minutes | Mock test for Class 10 preparation | Free important questions MCQ to study CBSE Sample Papers For Class 10 for Class 10 Exam | Download free PDF with solutions
QUESTION: 1

Which one of the following software comes under Open-Source Software category?

Solution:

Linux is an open source software. Open source software (OSS) is a software that is distributed with its source code, making it available for use, modification and distribution with its original rights.

QUESTION: 2

HTML tag to draw horizontal line:

Solution:

<hr>tag is used to for horizontal rule. It is used to draw horizontal line in HTML. This tag is an empty tag and it does not require an end tag.

QUESTION: 3

Secure data transmission means

Solution:

Secure data transmission means data cannot be accessed by any unauthorized person during transmission. Secure means CANI i.e., confidentiality, authenticity, nonrepudiation and integrity.

QUESTION: 4

The correct HTML code to display(P+Q)2 is:

Solution:

<SUP> tag defines superscript text in an HTML document. In (P+Q)2, 2 is the superscript text. So, the HTML code of (P+Q)2 is (P+Q)<SUP>2</SUP>.

QUESTION: 5

Which HTML tags cause browsers to render text as italics?

Solution:

<i> </i> tags are used to render text as italics. It represents a change in mood or quality of text.

QUESTION: 6

The correct HTML code for inserting an image is :

Solution:

<img src = “image.gif ”> code is used for inserting an image and image’s name is ‘image’ with gif format.

QUESTION: 7

Which attribute is NOT valid for the <body> tag?

Solution:

Color is not a valid attribute for the <body> tag background attribute is used to specify a background image for a document. vlink attribute is used to specify the colour of a visited link in a document. bgcolor attribute is used to specify the background color of a document. 

QUESTION: 8

Attribute is used to specify the location of an image file.

Solution:

SRC attribute is required and contains the path to the image you want to embed. This attribute is used in <img> tag.

QUESTION: 9

Which of the following is NOT an example of Intellectual Property rights?

Solution:

Intellectual property rights are the rights given to persons over the creations of their minds. Patent, Trademark, Industrial design are examples of intellectual property rights.

QUESTION: 10

The attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason.

Solution:

alt attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason.

QUESTION: 11

While creating a Web document, which unit is used to express an image’s height and width?

Solution:

height and width attribute of <img> tag are used to define the height and width of the image. Values of these attributes are considered as pixel.

QUESTION: 12

Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as________

Solution:

Preeti should use the concept named encryption. Encryption is the method by which information is converted into secret code that hides the information’s true meaning.

QUESTION: 13

Which is the correct way to comment out something in HTML?

Solution:

The HTML comment tag is used to add text to an HTML document without including that text in the web page. Comment tag is shown with <! - - and - ->

QUESTION: 14

The default alignment of images, that are inserted in Web page, is:

Solution:

The default alignment of images that are inserted in web page is inline with text.

QUESTION: 15

Which of the following techniques can be used for security of data?

Solution:

There are various techniques used for security of data as Authentication, Authorization and Encryption. Authentication is the process of determining whether someone or something is, in fact, who or what it declares itself to be.
Authorization is the process of giving someone permission to do or have something.
Encryption is the method by which information is converted into secret code that hides the information’s true meaning.

QUESTION: 16

Which of the following is not a cybercrime?

Solution:

Cybercrime is criminal activity that either targets or uses a computer, a computer network or an networked device. Plagiarism, Phishing and hacking are cuber crime.
Using licensed software is not a cybercrime.

QUESTION: 17

________ is a software for which exclusive rights of modification in the source code remain with the owner.

Solution:

Proprietary software is a software for which exclusive rights of modification in the source code remain with the owner. Examples of proprietary software include Microsoft Windows, Adobe Flash Player, Adobe Photoshop, Google Earth etc. 

QUESTION: 18

A is the right given by the government to an inventor to protect his/ her invention from being used/ copied for a fixed period of time.

Solution:

A patent is the copy right given by the government to an inventor to protect his/her invention from being used/copied for a fixed period of time.

QUESTION: 19

Which of these is NOT an attribute of the font tag?

Solution:

type is not an attribute of the font tag. <font> tag defines the font size, color and face of text in the HTML document.

QUESTION: 20

The < __________ > tag displays text in subscript form.

Solution:

<sub> tag displays text is subscript form for example, in the chemical formula CO2, the number 2 is rendered as subscript which has a smaller font and appears with a lowered baseline.

QUESTION: 21

Riya wants to buy and sell goods online, which term is used to describe this process?

Solution:

Riya is used to describe the e-commerce process. E-commerce is the buying and selling of goods or services via the internet, and the transfer of money and data to complete the sales.

QUESTION: 22

Consider the following HTML code:
<input type = “radio” name = “gender” value = “male” checked>Male.
<input type = “radio” name = “gender” value = “Female” checked>Female.
<input type = “radio” name = “gender” value = “Others” checked>Others.
Choose the correct output that would be shown upon execution of the above code, from the choice given below:

Solution:

To create a radio button, <INPUT> tag is used in which type attribute includes radio as its value that defines the radio button.

QUESTION: 23

Raman is an employer of ABC company. He wants a software for which he paid what type of software is raman using?

Solution:

Raman is using proprietary software.
Proprietary software is available only after buying the proper license of the software. More over, it has proper copyright and license.

QUESTION: 24

Identify the HTML tag used to include numbered list in HTML web page.

Solution:

<OL> tag defines an ordered list. An ordered list can be numerical or alphabetical. The <LI> tag is used to define each list item.

QUESTION: 25

Which attribute is used to Insert an empty line in the webpage.

Solution:

<BR> tag is used to insert an empty line in the web page. This is an empty tag i.e., no need of closing tag. You can also use the <BR> tag to insert one or more blank lines.

QUESTION: 26

A _______ is defined as an exclusive right granted for an invention.

Solution:

Patent provides protection for novel technical solutions to problems. A patent provides patent owners with protection for their inventions. Patent applications are published after 18 months. A patent applies for a maximum of 20 years.

QUESTION: 27

Which of the following tag is required when the user has to give some input/data?

Solution:

The <INPUT> tag is requied when the user has to give some input/data. This tag is always used within the FORM tag. Thus, INPUT tag defines a FORM element which can receive user input. The Type attribute determines the specific sort of FORM element to be created i.e., this attribute specifies the type of input we want from the user.
It can be used to create the following type of interface elements:
(a) BUTTON
(b) CHECKBOX
(c) RADIO
(d) TEXT
(e) SUBMIT and RESET
(f) IMAGE
(g) FILE
<INPUT TYPE = “BUTTON”>: This will place a button on an HTML form.

QUESTION: 28

In HTML, the tag <HTML> is same as:

Solution:

Case sensitive means both uppercase and lowercase letters are treated as same. Thus, in HTML, tag and attributes are not case-sensitive.

QUESTION: 29

Which term is used for copying of data or computer software without the owner ’s permission?

Solution:

Software piracy means copying of data or computer software without the owner’s permission. However, most people are aware about piracy and know that it is illegal, yet the piracy is uncontrollable. This is simply the notation of intellectual property rights and right to privacy.

QUESTION: 30

An unordered list of items are marked with

Solution:

An unordered list is a bulleted list of items. The tags for an unordered list are <UL> and <UL>. It is used to create unordered list or bulleted list like to represent the list in the form of disc, square and circle. The data is defined under the <UL> tag, by using <LI> tag.
Syntax <UL>…</UL>

QUESTION: 31

What colours do #000000 denote?

Solution:

The colour which denotes #000000 is black. It is a hexadecimal code.

QUESTION: 32

The default colour of a hyperlink on a webpage is

Solution:

The default colour of a hyperlink on a web page is blue.

QUESTION: 33

Which of the following is a system for insuring the security of financial transactions on the intersect?

Solution:

SET(Secure Electronic Transaction) is a system for ensuring the security of financial transactions on the internet. It was supported initially by master card, visa, Microsoft, Netscape and others. SET is not some system that enables payment but it is a security protocol applied on those payments. It prevents merchants from seeing the customer payment information.

QUESTION: 34

FOIA stands for

Solution:

FOIA stands for Freedom of Information Act. It is a federal law that generally provider that any person has a right to obtain access to federal agency records. FOIA is intended to increase transparency. It does not provide access to all government documents.

QUESTION: 35

Sunil wants to insert an image “e-learning.jpg” into a web page. Identify the  name of tag he should use.

Solution:

<IMG> tag is used to insert an image. It is an inline element, that means text and other elements can wrap around it.

QUESTION: 36

_____ is a technology which keeps the message secret from unauthorized access.

Solution:

Encryption is the method by which information is converted into secret code that hides the information’s true meaning.

QUESTION: 37

Raj has written the following code to display an image in the background of HTML document:
<BODY BgGround = “Colours.jpeg”>
But he is not getting the desired output. Help him identifying correct code from the following.

Solution:

To display the image in the background of HTML document, BACKGROUND attribute is used which take image’s name with its format as value.
So, the correct code is
<BODY BACKGROUND = “Colours. jpeg”>

QUESTION: 38

Tag to create textarea filed in HTML document:

Solution:

Tag to create textarea field in HTML document is <TEXTAREA>.

QUESTION: 39

Which of the following is the correct way to create a list using the uppercase letters?

Solution:

<OL> tag is used to define the ordered or numbered list in HTML document. Type attribute of <OL> tag defines the type of ordered list. To create a list using the uppercase letters, the correct code is 
<OL type = “A”>

QUESTION: 40

Which attribute of <OPTION> tag is used to specify a shorter label for an option?

Solution:

Label attribute of <OPTION> tag is used to specify a shorter label for an option.
Syntax
<OPTION label = “text”>

QUESTION: 41

Read the following text and answer the following questions on the basis of the same:
In computer science, secure transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. It is related to our personal or professional lives. But if the information shared is not securely transferred to receiver, it can cause breach of privacy or embarrassment.
There are some top secure data transmission methods – Email Encryption, Website Encryption, FTP(File Transfer Protocol), Cloud services, Peer to Peer (P2P) communication, etc. Email encryption → This method is mostly web-based and works by sending the recipient a link, who then logs into a secure email-server after clicking it. Email-encryption can rely on public-key cryptography. Since 2000, the number of available encrypted email providers has increased significantly. Notable providers include: Hushmail, Mailfence, Proton Mail, Tutanota.

Q. Secure data transmission means

Solution:

Secure data transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. So, the correct answer is data can, be accessed by only authorized person.

QUESTION: 42

Read the following text and answer the following questions on the basis of the same:
In computer science, secure transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. It is related to our personal or professional lives. But if the information shared is not securely transferred to receiver, it can cause breach of privacy or embarrassment.
There are some top secure data transmission methods – Email Encryption, Website Encryption, FTP(File Transfer Protocol), Cloud services, Peer to Peer (P2P) communication, etc. Email encryption → This method is mostly web-based and works by sending the recipient a link, who then logs into a secure email-server after clicking it. Email-encryption can rely on public-key cryptography. Since 2000, the number of available encrypted email providers has increased significantly. Notable providers include: Hushmail, Mailfence, Proton Mail, Tutanota.

Q. Which of the following method can be used for security of data?

Solution:

Encryption is a means of securing digital data using one or more mathematical techniques, along with a password or “key” used to decrypt the information.

QUESTION: 43

Read the following text and answer the following questions on the basis of the same:
In computer science, secure transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. It is related to our personal or professional lives. But if the information shared is not securely transferred to receiver, it can cause breach of privacy or embarrassment.
There are some top secure data transmission methods – Email Encryption, Website Encryption, FTP(File Transfer Protocol), Cloud services, Peer to Peer (P2P) communication, etc. Email encryption → This method is mostly web-based and works by sending the recipient a link, who then logs into a secure email-server after clicking it. Email-encryption can rely on public-key cryptography. Since 2000, the number of available encrypted email providers has increased significantly. Notable providers include: Hushmail, Mailfence, Proton Mail, Tutanota.

Q. Which method is mostly web-based?

Solution:

Email encryption is encryption of email messages to protect the content from being ready by entities other than the intended recipients.

QUESTION: 44

Read the following text and answer the following questions on the basis of the same:
In computer science, secure transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. It is related to our personal or professional lives. But if the information shared is not securely transferred to receiver, it can cause breach of privacy or embarrassment.
There are some top secure data transmission methods – Email Encryption, Website Encryption, FTP(File Transfer Protocol), Cloud services, Peer to Peer (P2P) communication, etc. Email encryption → This method is mostly web-based and works by sending the recipient a link, who then logs into a secure email-server after clicking it. Email-encryption can rely on public-key cryptography. Since 2000, the number of available encrypted email providers has increased significantly. Notable providers include: Hushmail, Mailfence, Proton Mail, Tutanota.

Q. Email-Encryption can rely on which function?

Solution:

Email encryption is an amazing innovation in cybersecurity. It uses the technology of cryptography, which has been around for milleria, and adapts it to protect communications in the digital age.

QUESTION: 45

Read the following text and answer the following questions on the basis of the same:
In computer science, secure transmission refers to the transfer of data such as confidential or proprietary information over a secure channel. It is related to our personal or professional lives. But if the information shared is not securely transferred to receiver, it can cause breach of privacy or embarrassment.
There are some top secure data transmission methods – Email Encryption, Website Encryption, FTP(File Transfer Protocol), Cloud services, Peer to Peer (P2P) communication, etc. Email encryption → This method is mostly web-based and works by sending the recipient a link, who then logs into a secure email-server after clicking it. Email-encryption can rely on public-key cryptography. Since 2000, the number of available encrypted email providers has increased significantly. Notable providers include: Hushmail, Mailfence, Proton Mail, Tutanota.

Q. Some encrypted email providers has increased significantly. Out of the following which is not notable provider

Solution:

Email encryption have various notable providers, these are – Hushmail, Mailfence, Proton Mail, Tutanota, So, out of the giving options blackhat is not the notable provider.

QUESTION: 46

Read the following text and answer the following question on the basis of the same:
Consider the following code created by developer for a webpage:

Q. Choose the correct option from the following to fill up in line 1.

Solution:

</head> is used to fill up in line 1. It is the closing tag of <head>. The <head> tag contains other head elements such as <title>.

QUESTION: 47

Read the following text and answer the following question on the basis of the same:
Consider the following code created by developer for a webpage:

Q. Choose the correct option from the following to fill up in line 2?

Solution:

Type is used to fill up in line 2.
“text” is the value of type attribute which create the text box in document. 

QUESTION: 48

Read the following text and answer the following question on the basis of the same:
Consider the following code created by developer for a webpage:

Q. Choose the correct option from the following to fill up in line 3.

Solution:

Value is used to fill up in line 3. It is input tag attribute which is used to fill the value of content.

QUESTION: 49

Read the following text and answer the following question on the basis of the same:
Consider the following code created by developer for a webpage:

Q. Choose the correct option from the following to fill up in line 4.

Solution:

Radio is used to fill up in line 4. In input tag this is used as type attribute value, so that radio button is created on document.

QUESTION: 50

Read the following text and answer the following question on the basis of the same:
Consider the following code created by developer for a webpage:

Q. Choose the correct option from the following to fill up in line 5..

Solution:

</form> is used to fill up in line 5. This is the <form> closing tag. The form tag is used to create an HTML form for user input.

Use Code STAYHOME200 and get INR 200 additional OFF
Use Coupon Code