| Download, print and study this document offline |
Page 1
Sample Question Paper (Term 1)
Class: X Session: 2021-22
Computer Applications (Code 165)
Maximum Marks: 25 Time Allowed: 90 Minutes
General Instructions:
1. The Question Paper contains three sections A, B and C.
2. Section A has 20 questions. Attempt any 16 questions.
3. Section B has 20 questions. Attempt any 16 questions.
4. Section C has 10 questions. Attempt any 8 questions.
5. All questions carry equal marks.
6. There is no negative marking.
Q.N. Section-A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
1 Which one of the following software comes under Open-Source Software category?
a. Photoshop
b. Ms-Paint
c. Linux
d. Windows
2 HTML tag to draw horizontal line:
a. <hl>
b. <hr>
c. <hline>
d. None of the above
3 Secure data transmission means
a) Data is accessible by any unauthorized person during transmission.
b) Data can not be accessed by any unauthorized person during transmission.
c) Transmission of data happens easily
d) Noone can access it
4 The correct HTML code to display(P+Q)
2
is:
a. <SUB>(P+) 2</SUB>
b. P+Q <SUP> 2 </SUP>
c. ( P + Q)<SUP> 2 </SUP>
d. <SUP> (P+Q) 2</SUP>
5 Which HTML tags cause browsers to render text as italics?
a. <text style = “italics”></text>
b. <ital.></ital.>
c. <i></i>
d. <b></b>
6 The correct HTML code for inserting an image is :
a. <img href=”image.gif”>
b. <img> image.gif</gif>
c. <image src = “image.gif”>
d. <img src = “image.gif” >
Page 2
Sample Question Paper (Term 1)
Class: X Session: 2021-22
Computer Applications (Code 165)
Maximum Marks: 25 Time Allowed: 90 Minutes
General Instructions:
1. The Question Paper contains three sections A, B and C.
2. Section A has 20 questions. Attempt any 16 questions.
3. Section B has 20 questions. Attempt any 16 questions.
4. Section C has 10 questions. Attempt any 8 questions.
5. All questions carry equal marks.
6. There is no negative marking.
Q.N. Section-A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
1 Which one of the following software comes under Open-Source Software category?
a. Photoshop
b. Ms-Paint
c. Linux
d. Windows
2 HTML tag to draw horizontal line:
a. <hl>
b. <hr>
c. <hline>
d. None of the above
3 Secure data transmission means
a) Data is accessible by any unauthorized person during transmission.
b) Data can not be accessed by any unauthorized person during transmission.
c) Transmission of data happens easily
d) Noone can access it
4 The correct HTML code to display(P+Q)
2
is:
a. <SUB>(P+) 2</SUB>
b. P+Q <SUP> 2 </SUP>
c. ( P + Q)<SUP> 2 </SUP>
d. <SUP> (P+Q) 2</SUP>
5 Which HTML tags cause browsers to render text as italics?
a. <text style = “italics”></text>
b. <ital.></ital.>
c. <i></i>
d. <b></b>
6 The correct HTML code for inserting an image is :
a. <img href=”image.gif”>
b. <img> image.gif</gif>
c. <image src = “image.gif”>
d. <img src = “image.gif” >
7 Which attribute is NOT valid for the <body> tag?
a. background b. color
c. vlink d. bgcolor
8 ____________attribute is used to specify the location of an image file.
a. alt
b. src
c. align
d. name
9 Which of the following is NOT an example of Intellectual Property rights?
a. Patent
b. Trademark
c. Password
d. Industrial Design
10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot
be displayed due to any reason.
a. alt
b. alternate
c. tooltip
d. text
11 While creating a Web document, which unit is used to express an image’s height and width?
a. Centimeters
b. Pixels
c. Dots per inch
d. Inches
12 Preeti needs to send a very confidential message to her colleague in office over a secure channel.
She uses a technique wherein an actual message (which is in readable form) can be converted into
an unreadable message. This concept is known as________________
a. Encryption
b. Decryption
c. Plagiarism
d. Data Security.
13 Which is the correct way to comment out something in HTML?
a. Using ## and #
b. Using <!-- and -->
c. Using </-- and -/->
d. Using <!-- and -!>
14 The default alignment of images, that are inserted in Web page, is:
a. left
b. right
c. inline with text
d. middle
15 Which of the following techniques can be used for security of data?
a. Authentication
b. Authorisation
c. Encryption
d. All of the Above
Page 3
Sample Question Paper (Term 1)
Class: X Session: 2021-22
Computer Applications (Code 165)
Maximum Marks: 25 Time Allowed: 90 Minutes
General Instructions:
1. The Question Paper contains three sections A, B and C.
2. Section A has 20 questions. Attempt any 16 questions.
3. Section B has 20 questions. Attempt any 16 questions.
4. Section C has 10 questions. Attempt any 8 questions.
5. All questions carry equal marks.
6. There is no negative marking.
Q.N. Section-A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
1 Which one of the following software comes under Open-Source Software category?
a. Photoshop
b. Ms-Paint
c. Linux
d. Windows
2 HTML tag to draw horizontal line:
a. <hl>
b. <hr>
c. <hline>
d. None of the above
3 Secure data transmission means
a) Data is accessible by any unauthorized person during transmission.
b) Data can not be accessed by any unauthorized person during transmission.
c) Transmission of data happens easily
d) Noone can access it
4 The correct HTML code to display(P+Q)
2
is:
a. <SUB>(P+) 2</SUB>
b. P+Q <SUP> 2 </SUP>
c. ( P + Q)<SUP> 2 </SUP>
d. <SUP> (P+Q) 2</SUP>
5 Which HTML tags cause browsers to render text as italics?
a. <text style = “italics”></text>
b. <ital.></ital.>
c. <i></i>
d. <b></b>
6 The correct HTML code for inserting an image is :
a. <img href=”image.gif”>
b. <img> image.gif</gif>
c. <image src = “image.gif”>
d. <img src = “image.gif” >
7 Which attribute is NOT valid for the <body> tag?
a. background b. color
c. vlink d. bgcolor
8 ____________attribute is used to specify the location of an image file.
a. alt
b. src
c. align
d. name
9 Which of the following is NOT an example of Intellectual Property rights?
a. Patent
b. Trademark
c. Password
d. Industrial Design
10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot
be displayed due to any reason.
a. alt
b. alternate
c. tooltip
d. text
11 While creating a Web document, which unit is used to express an image’s height and width?
a. Centimeters
b. Pixels
c. Dots per inch
d. Inches
12 Preeti needs to send a very confidential message to her colleague in office over a secure channel.
She uses a technique wherein an actual message (which is in readable form) can be converted into
an unreadable message. This concept is known as________________
a. Encryption
b. Decryption
c. Plagiarism
d. Data Security.
13 Which is the correct way to comment out something in HTML?
a. Using ## and #
b. Using <!-- and -->
c. Using </-- and -/->
d. Using <!-- and -!>
14 The default alignment of images, that are inserted in Web page, is:
a. left
b. right
c. inline with text
d. middle
15 Which of the following techniques can be used for security of data?
a. Authentication
b. Authorisation
c. Encryption
d. All of the Above
16 Which of the following is not a cybercrime?
a. Plagiarism
b. Phishing
c. using licensed software
d. hacking
17 _________ is a software for which exclusive rights of modification in the source code remain
with the owner.
a. Free Open-Source Software
b. Freeware
c. Open-Source Software
d. Proprietary Software
18. A _______________ is the right given by the government to an inventor to protect his/ her
invention from being used/copied for a fixed period of time.
a. Copyright
b. Intellectual Property
c. Patent
d. Trademark
19 Which of these is NOT an attribute of the font tag?
a. color
b. face
c. type
d. size
20 The <_________> tag displays text in subscript form.
a. sub
b. sup
c. sups
d. subs.
Section-B
This section contains 20 questions. Answer any 16 questions.
21 Arun clicks on a link received in a message on his phone which promises him a complimentary
trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked
him to do the same. But Panshul refuses and tells Arun that his personal and private information,
such as online account names, login information and passwords can be stolen and he should be
careful of such ____________ attacks.
a. Phishing
b. Spamming
c. Scamming
d. Plagiarism
Page 4
Sample Question Paper (Term 1)
Class: X Session: 2021-22
Computer Applications (Code 165)
Maximum Marks: 25 Time Allowed: 90 Minutes
General Instructions:
1. The Question Paper contains three sections A, B and C.
2. Section A has 20 questions. Attempt any 16 questions.
3. Section B has 20 questions. Attempt any 16 questions.
4. Section C has 10 questions. Attempt any 8 questions.
5. All questions carry equal marks.
6. There is no negative marking.
Q.N. Section-A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
1 Which one of the following software comes under Open-Source Software category?
a. Photoshop
b. Ms-Paint
c. Linux
d. Windows
2 HTML tag to draw horizontal line:
a. <hl>
b. <hr>
c. <hline>
d. None of the above
3 Secure data transmission means
a) Data is accessible by any unauthorized person during transmission.
b) Data can not be accessed by any unauthorized person during transmission.
c) Transmission of data happens easily
d) Noone can access it
4 The correct HTML code to display(P+Q)
2
is:
a. <SUB>(P+) 2</SUB>
b. P+Q <SUP> 2 </SUP>
c. ( P + Q)<SUP> 2 </SUP>
d. <SUP> (P+Q) 2</SUP>
5 Which HTML tags cause browsers to render text as italics?
a. <text style = “italics”></text>
b. <ital.></ital.>
c. <i></i>
d. <b></b>
6 The correct HTML code for inserting an image is :
a. <img href=”image.gif”>
b. <img> image.gif</gif>
c. <image src = “image.gif”>
d. <img src = “image.gif” >
7 Which attribute is NOT valid for the <body> tag?
a. background b. color
c. vlink d. bgcolor
8 ____________attribute is used to specify the location of an image file.
a. alt
b. src
c. align
d. name
9 Which of the following is NOT an example of Intellectual Property rights?
a. Patent
b. Trademark
c. Password
d. Industrial Design
10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot
be displayed due to any reason.
a. alt
b. alternate
c. tooltip
d. text
11 While creating a Web document, which unit is used to express an image’s height and width?
a. Centimeters
b. Pixels
c. Dots per inch
d. Inches
12 Preeti needs to send a very confidential message to her colleague in office over a secure channel.
She uses a technique wherein an actual message (which is in readable form) can be converted into
an unreadable message. This concept is known as________________
a. Encryption
b. Decryption
c. Plagiarism
d. Data Security.
13 Which is the correct way to comment out something in HTML?
a. Using ## and #
b. Using <!-- and -->
c. Using </-- and -/->
d. Using <!-- and -!>
14 The default alignment of images, that are inserted in Web page, is:
a. left
b. right
c. inline with text
d. middle
15 Which of the following techniques can be used for security of data?
a. Authentication
b. Authorisation
c. Encryption
d. All of the Above
16 Which of the following is not a cybercrime?
a. Plagiarism
b. Phishing
c. using licensed software
d. hacking
17 _________ is a software for which exclusive rights of modification in the source code remain
with the owner.
a. Free Open-Source Software
b. Freeware
c. Open-Source Software
d. Proprietary Software
18. A _______________ is the right given by the government to an inventor to protect his/ her
invention from being used/copied for a fixed period of time.
a. Copyright
b. Intellectual Property
c. Patent
d. Trademark
19 Which of these is NOT an attribute of the font tag?
a. color
b. face
c. type
d. size
20 The <_________> tag displays text in subscript form.
a. sub
b. sup
c. sups
d. subs.
Section-B
This section contains 20 questions. Answer any 16 questions.
21 Arun clicks on a link received in a message on his phone which promises him a complimentary
trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked
him to do the same. But Panshul refuses and tells Arun that his personal and private information,
such as online account names, login information and passwords can be stolen and he should be
careful of such ____________ attacks.
a. Phishing
b. Spamming
c. Scamming
d. Plagiarism
22 Consider the following HTML code:
<ol type='i'>
<li>First</li>
<li>Second</li>
<li>Third</li>
<li>Fourth</li>
</ol>
Choose the correct output that would be shown upon execution of the above code , from the
choices given below:
a. b.
c. d.
23 Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers.
One day while browsing the Internet she discovers that another artist has displayed her painting
portraying it as his own. Which right of Charlene was infringed?
a. Digital Privacy right
b. Intellectual Property right
c. Digital Property right
c. Intellectual Privacy right
24 Which of the following will result in the largest text size?
a. <H3> b. <H6>
c. <H2> d. <H4>
25 We can create a numbered list using the __________ tag.
a. <UL> b. <list>
c. <OL> d. <DL>
26 Which of these is NOT an example of Cyber bullying?
a. Copying a classmate’s personal photo against his/her permission from his social media account
and sending it to other friends on their emails
b. Bullying a classmate in the school corridor.
c. Threatening someone on whatsapp.
d. Posting mean messages about someone on their social media.
27 Identify which of the following type of list will create a bulleted list.
a. Unordered b. Ordered
c. Definition d. Numbered
I. First
II. Second
III. Third
IV. Fourth
i. First
ii. Second
iii. Third
iv. Fourth
I First
II Second
III Third
IV Fourth
i First
ii Second
iii Third
iv Fourth
Page 5
Sample Question Paper (Term 1)
Class: X Session: 2021-22
Computer Applications (Code 165)
Maximum Marks: 25 Time Allowed: 90 Minutes
General Instructions:
1. The Question Paper contains three sections A, B and C.
2. Section A has 20 questions. Attempt any 16 questions.
3. Section B has 20 questions. Attempt any 16 questions.
4. Section C has 10 questions. Attempt any 8 questions.
5. All questions carry equal marks.
6. There is no negative marking.
Q.N. Section-A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
1 Which one of the following software comes under Open-Source Software category?
a. Photoshop
b. Ms-Paint
c. Linux
d. Windows
2 HTML tag to draw horizontal line:
a. <hl>
b. <hr>
c. <hline>
d. None of the above
3 Secure data transmission means
a) Data is accessible by any unauthorized person during transmission.
b) Data can not be accessed by any unauthorized person during transmission.
c) Transmission of data happens easily
d) Noone can access it
4 The correct HTML code to display(P+Q)
2
is:
a. <SUB>(P+) 2</SUB>
b. P+Q <SUP> 2 </SUP>
c. ( P + Q)<SUP> 2 </SUP>
d. <SUP> (P+Q) 2</SUP>
5 Which HTML tags cause browsers to render text as italics?
a. <text style = “italics”></text>
b. <ital.></ital.>
c. <i></i>
d. <b></b>
6 The correct HTML code for inserting an image is :
a. <img href=”image.gif”>
b. <img> image.gif</gif>
c. <image src = “image.gif”>
d. <img src = “image.gif” >
7 Which attribute is NOT valid for the <body> tag?
a. background b. color
c. vlink d. bgcolor
8 ____________attribute is used to specify the location of an image file.
a. alt
b. src
c. align
d. name
9 Which of the following is NOT an example of Intellectual Property rights?
a. Patent
b. Trademark
c. Password
d. Industrial Design
10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot
be displayed due to any reason.
a. alt
b. alternate
c. tooltip
d. text
11 While creating a Web document, which unit is used to express an image’s height and width?
a. Centimeters
b. Pixels
c. Dots per inch
d. Inches
12 Preeti needs to send a very confidential message to her colleague in office over a secure channel.
She uses a technique wherein an actual message (which is in readable form) can be converted into
an unreadable message. This concept is known as________________
a. Encryption
b. Decryption
c. Plagiarism
d. Data Security.
13 Which is the correct way to comment out something in HTML?
a. Using ## and #
b. Using <!-- and -->
c. Using </-- and -/->
d. Using <!-- and -!>
14 The default alignment of images, that are inserted in Web page, is:
a. left
b. right
c. inline with text
d. middle
15 Which of the following techniques can be used for security of data?
a. Authentication
b. Authorisation
c. Encryption
d. All of the Above
16 Which of the following is not a cybercrime?
a. Plagiarism
b. Phishing
c. using licensed software
d. hacking
17 _________ is a software for which exclusive rights of modification in the source code remain
with the owner.
a. Free Open-Source Software
b. Freeware
c. Open-Source Software
d. Proprietary Software
18. A _______________ is the right given by the government to an inventor to protect his/ her
invention from being used/copied for a fixed period of time.
a. Copyright
b. Intellectual Property
c. Patent
d. Trademark
19 Which of these is NOT an attribute of the font tag?
a. color
b. face
c. type
d. size
20 The <_________> tag displays text in subscript form.
a. sub
b. sup
c. sups
d. subs.
Section-B
This section contains 20 questions. Answer any 16 questions.
21 Arun clicks on a link received in a message on his phone which promises him a complimentary
trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked
him to do the same. But Panshul refuses and tells Arun that his personal and private information,
such as online account names, login information and passwords can be stolen and he should be
careful of such ____________ attacks.
a. Phishing
b. Spamming
c. Scamming
d. Plagiarism
22 Consider the following HTML code:
<ol type='i'>
<li>First</li>
<li>Second</li>
<li>Third</li>
<li>Fourth</li>
</ol>
Choose the correct output that would be shown upon execution of the above code , from the
choices given below:
a. b.
c. d.
23 Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers.
One day while browsing the Internet she discovers that another artist has displayed her painting
portraying it as his own. Which right of Charlene was infringed?
a. Digital Privacy right
b. Intellectual Property right
c. Digital Property right
c. Intellectual Privacy right
24 Which of the following will result in the largest text size?
a. <H3> b. <H6>
c. <H2> d. <H4>
25 We can create a numbered list using the __________ tag.
a. <UL> b. <list>
c. <OL> d. <DL>
26 Which of these is NOT an example of Cyber bullying?
a. Copying a classmate’s personal photo against his/her permission from his social media account
and sending it to other friends on their emails
b. Bullying a classmate in the school corridor.
c. Threatening someone on whatsapp.
d. Posting mean messages about someone on their social media.
27 Identify which of the following type of list will create a bulleted list.
a. Unordered b. Ordered
c. Definition d. Numbered
I. First
II. Second
III. Third
IV. Fourth
i. First
ii. Second
iii. Third
iv. Fourth
I First
II Second
III Third
IV Fourth
i First
ii Second
iii Third
iv Fourth
28 Which sequence of HTML tags is correct?
a. <html><head><title></title></head><body></body></html>
b. <html><head><title><body></title></head></body></html>
c. <html><head><title</head><body></body>></title></</html>
d. <html><head><title><body></body ></title></head ></html>
29 Pratham is excited to use a new software which is freely available to download but he cannot
modify or change the source code. Pratham is using
a. Freeware
b. Open-Source Software
c. Both a and b
d. None of the above
30 Priyanshu has written the following code snippet as part pf an HTML program.
<B> Mystery Moon </B>
Predict the output of the above from the following:
a. Mystery Moon
b. Mystery Moon
c. Mystery Moon
d. Mystery Moon
31 Consider the following code:
<img src="Computers.jpg" width=" ________ " height="________”>
Fill in the blanks to set the image size to be 250pixels wide and 400 pixels tall.
a. 250, 400
b.400, 250
c. <250><400>
d. <400><250>
32 Tag (s) required to create Description lists in HTML:
a. <DL>
b. <DT>
c. <DD>
d. All of the above
33 Which of the following is NOT a reason for the digital divide in different demographic regions?
a. Cost of Technology
b. Lack of information
c. Lack of access to high performance computers
d. Lack of access to the disabled.
Read More| 1. What is the structure of the CBSE Class 10 Computer Science Term I Sample Question Paper? | ![]() |
| 2. How can students prepare effectively for the CBSE Class 10 Computer Science exam? | ![]() |
| 3. What topics are generally included in the Class 10 Computer Science syllabus by CBSE? | ![]() |
| 4. Are there any specific guidelines for attempting the Term I Computer Science exam? | ![]() |
| 5. How can understanding previous exam patterns help in preparing for the CBSE Class 10 Computer Science exam? | ![]() |