Class 10  >  CBSE Sample Papers For Class 10  >  Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1

Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 Notes | Study CBSE Sample Papers For Class 10 - Class 10

Document Description: Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 for Class 10 2022 is part of CBSE Sample Question Papers for 2021-22 for CBSE Sample Papers For Class 10 preparation. The notes and questions for Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 have been prepared according to the Class 10 exam syllabus. Information about Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 covers topics like Class-X, Time: 90 , Minutes, M.M: 25, Section - A, Section - B, Section - C and Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 Example, for Class 10 2022 Exam. Find important definitions, questions, notes, meanings, examples, exercises and tests below for Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1.

Introduction of Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 in English is available as part of our CBSE Sample Papers For Class 10 for Class 10 & Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 in Hindi for CBSE Sample Papers For Class 10 course. Download more important topics related with CBSE Sample Question Papers for 2021-22, notes, lectures and mock test series for Class 10 Exam by signing up for free. Class 10: Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 Notes | Study CBSE Sample Papers For Class 10 - Class 10
Table of contents
Class-X
Time: 90 
Minutes
M.M: 25
Section - A
Section - B
Section - C
1 Crore+ students have signed up on EduRev. Have you?

Class-X

Time: 90 Minutes
M.M: 25

General Instructions :
Read the following instructions very carefully and strictly follow them:

  1. The Question Paper contains three sections A, B and C. 
  2. Section A has 20 questions. Attempt any 16 questions. 
  3. Section B has 20 questions. Attempt any 16 questions.
  4. Section C has 10 questions. Attempt any 8 questions. 
  5. All questions carry equal marks. 
  6. There is no negative marking.
Section - A

Q.1: _________ is the type of e-Commerce that involves the electronically facilitated transactions between consumers through third party.
(a) Consumer to business
(b) Consumer to consumer
(c) Business to government
(d) Business to consumer

Correct Answer is Option (b)
Consumer to consumer is the type of E-commerce that involves the electronically facilitated transactions between consumers through third party. A common example is the online auction, in which a consumer posts an item for a sell and other consumers bid to purchase it a third party generally charges a commission.

Q.2: The word plagiarism has emerged from a latin word.
(a) Plague
(b) Plagiar
(c) Plagiarius
(d) None of these

Correct Answer is Option (c)
The word plagiarism has emerged from a latin word plagiarius, which means kidnapping. Plagiarism is an act of copying another person’s idea, words or work and pretend that they are our own.

Q.3: In which fraud, fraudster using a stolen credit card makes an overpayment an purchase?
(a) Refund
(b) Merchant
(c) Fraud via identity theft
(d) Friendly

Correct Answer is Option (a)
In refund fraud case, fraudster using a stolen credit card makes an overpayment on purchase. He will ask to refund of the excess amount, claiming his credit card is closed so they need to send the money using an alternative method. That means that the original charge of the credit card is not refunded.

Q.4: Which of the following is the buying and selling of goods and services on the internet?
(a) Digital divide
(b) Software license
(c) Domain name
(d) e-Commerce

Correct Answer is Option (d)
e-commerce (Electronic commerce) is the buying and selling of goods and services on the Internet. It draws on technologies such, as mobile commerce, electronic funds transfer, supply chain management, intenet marketing, online transaction processing, electronic data interchange, invertory management systems and automated data collection systems.

Q.5: Effect(s) of digital divide is/are
(a) Economic inequality
(b) Effect on education
(c) Economic growth
(d) All of these

Correct Answer is Option (d)
Digital divide is a term that describes the uneven distribution of information and communication technologies (ICTs) in society. Effects of digital divide are economic inequality, effect on education, economic growth, democracy, social mobility.

Q.6: HTML tags that include both on and off tags are known as
(a) Container tags
(b) Empty tags
(c) Special tags
(d) None of these

Correct Answer is Option (a)
Container tags always wrap around the text or graphics which come in a set with an opening as well as closing tag HTML tags that include both on and off tags are known as container tags.

Q.7: Which tag defines the document’s body?
(a) <TITLE> tag
(b) <HEAD> tag
(c) <BODY> tag
(d) <HTML> tag

Correct Answer is Option (c)
<BODY>tag defines the document’s body. It is used to set the basic page characteristics. It contains all the necessary contents of a HTML document, such as text, hyperlinks, images, tables, lists etc. The content of your web page is placed in between the opening <BODY> and closing </BODY> tags.

Q.8: Which attribute of <FONT> tag specifies the size of the text inside a <FONT> tag?
(a) face
(b) size
(c) type
(d) format

Correct Answer is Option (b)
Size attribute of specifies the size of the text inside a <FONT> tag. The range of accepted values goes from 1 (the smallest) to 7 (the largest) we can also set the relative size to the current size using (+)ve or (–) ve sign.

Q.9: This tag is used to insert comments in the source code of the web page.
(a) <H1>
(b) <BR>
(c) <IMG>
(d) <!- -….- ->

Correct Answer is Option (d)
<!- - …. - -> tag is used to insert comments in the source code of the web page. Comments are not displayed in the browser’s window. All the text inserted inside this tag (<!- - …. - >) will be ignored by the browser that made invisible for the user.

Q.10: Which of the following tag is used to make the text in italic form?
(a) <I>
(b) <II>
(c) <Italic>
(d) <IA>

Correct Answer is Option (a)
<I> tag is used to make the text in italic form. It is also a container element. This is also used for text formatting.

Syntax
<I> ……. </I>

Q.11: Find the output of following code
<HTML>
<BODY>
<UL type = “disc”> 
<LI>Hello</LI> 
<LI>World</LI> 
</UL>
</BODY>
</HTML>
(a) 
Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 Notes | Study CBSE Sample Papers For Class 10 - Class 10
(b) 

Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 Notes | Study CBSE Sample Papers For Class 10 - Class 10
(c) 
Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 Notes | Study CBSE Sample Papers For Class 10 - Class 10
(d) 

Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 Notes | Study CBSE Sample Papers For Class 10 - Class 10

Correct Answer is Option (a)
<UL>tag represents the unordered list and each list item starts with the <LI>tag.

“type” attribute is used to change the bulleted symbol in a list. The attribute may have a value of circle, disc or square.

Q.12: Which list is a list of items, with a description of each item?
(a) Unordered list
(b) Ordered list
(c) Definition list
(d) None of these

Correct Answer is Option (c)
Definition list is a list of items, with a description of each item. HTML definition list (<DL>) are indented list without any bullet symbol or any number in front of each item. This list elements have a unique array of bags or elements.

Q.13: The default size of a rule is _______ pixels.
(a) 2
(b) 3
(c) 4
(d) 5

Correct Answer is Option (b)
Size attribute of horizontal rule specifies the height of the rule in pixels. Its default role depends directly on the browser. Generally, the default size of a rule is 3 pixels.

Q.14: To add a single line of space, you can use a line break.
(a) <BREAK> tag
(b) <B> tag
(c) <BR> tag
(d) <BRK> tag

Correct Answer is Option (c)
To add a single line of space, you can use a line break <BR>tag. This is an empty tag, i.e., no need of closing tag. You can also use the <BR>tag to insert one or more blank lines.

Q.15: Which of the following tag is used to insert an image in a web page?
(a) <IMG>
(b) <IMAGE>
(c) <I>
(d) <IG>

Correct Answer is Option (a)
<IMG>tag is used to insert an image in a web page. It is very important to know that images are not technical part of the web page file, they are separate files which are inserted into the web page, when it is viewed by a browser.

Q.16: An image that is displayed in the same line of the text is called
(a) inline image
(b) external image
(c) outline image
(d) None of these

Correct Answer is Option (a)
An image that is displayed in the same line of the text is called inline image. Inline images can occur within headings and paragraphs. The <IMG> tag is used to insert inline images into paragraphs and headings.

Q.17: Which attribute of <IMG> tag is used to provide alternate text when an image on a web page cannot be displayed?
(a) src
(b) align
(c) alt
(d) alternate

Correct Answer is Option (c)
Alt attribute of <IMG> tag is used to provide altnerate text when an image on a web page cannot be displayed. The alternate text is the text associated with an image that serves the same purpose and coveys the same essential message. As per HTML standard, alt attribute is optional but is highly recommended.

Q.18: Netiquette is
(a) An internet language
(b) Proper manners and behavior online
(c) Only applicable to email
(d) Only important in business

Correct Answer is Option (b)
Netiquette is proper manners and behavior online. It is a combination of the words networks and etiquette and is defined as a set of rules for acceptable online behavior.

Q.19: Secret words or numbers used for protection of devices is called
(a) biometrics data
(b) backup
(c) passwords
(d) private words

Correct Answer is Option (c)
Secret words or numbers used for protection of devices is called passwords. In general, a password is an arbitrary string of characters including letters, digits or other symbols.

Q.20: When a person is harassed repeatedly by being followed, called or be written to he/she is a target of
(a) Bullying
(b) Stalking
(c) Identity theft
(d) Phishing

Correct Answer is Option (b)
Stalking is unwanted or repeated surveillance by an individual or group towards another person. Stalking behaviors are interrelated to harassment and intimidation and may include following the victim in person or monitoring them.


Section - B

Q.21: Which of the following is/are the form(s) of software piracy?
(a) Soft lifting
(b) Renting
(c) Hard disk, loading
(d) All of these

Correct Answer is Option (d)
Software piracy means copying of data or computer software without the owner’s permission. However, most peoples are aware about piracy and know that it is illegal, yet the piracy is uncontrollable.

Q.22: Which of the following is a license agreement that gives an individual company or organization permission to use a software program?
(a) Software license
(b) Program license
(c) Digital license
(d) None of these

Correct Answer is Option (a)
A software license is a license agreement that gives an individual, company or organization permission to use a software program. It typically provide end users with the right to one or more copies of the software without violating copyrights.

Q.23: One example of such a proprietary software license is
(a) the license for Microsoft Windows
(b) the license for OpenOffice.org
(c) the license for Python
(d) None of these

Correct Answer is Option (a)
The half mask of propricitary software license is that the software publisher grants the use of one or more copies of software under the End user license agreement (EULA), but the ownership of those copies remains proprietary software license is the license for Microsoft windows.

Q.24: Example(s) of permissive free software licenses are
(a) BSD license
(b) MIT license
(c) Both A and B
(d) None of these

Correct Answer is Option (c)
Examples of permissive free software licenses are the BSD license and the MIT license, which give unlimited permission to use, study and privately modify the software and includes only minimal requirements on redistribution.

Q.25: _______ is the moral, legal and social issues relating to cyber technology.
(a) Plagiarism
(b) Netiquettes
(c) Cyber ethics
(d) Mocking

Correct Answer is Option (c)
Cyber ethics is the moral, legal and social issues relating to cyber technology. It examines the impact that cyber technology has for social, legal and moral systems. It also emulates the social policies and laws that have been framed in reply to issues generated by the development and use of cyber technology.

Q.26: We can view the source code of html document in:
(a) Notepad
(b) Power Point
(c) Excel
(d) Paint

Correct Answer is Option (a)
Text editors are used  by the users who have complete knowledge of HTML. The source code to create a web page are to be written in text create a web page are to be written in text editors. The two most commonly used text editors are Notepad and Wordpad.

Q.27: The value of #FFFFFF is _________.
(a) Green
(b) Black
(c) White
(d) Yellow

Correct Answer is Option (c)
The RGB code for black is #000000

The RGB code for green is #008000
The RGB code for yellow is #FFFF00

Q.28: Which attribute does not come in <HR> tag?
(a) Size
(b) Color
(c) Width
(d) Length

Correct Answer is Option (d)
The short form of Horizontal Rule tag is <HR> tag. It draws a horizontal line through the part of the page to divide the page into two sections. The <HR> tag is an empty tag that creates a shaded horizontal rule (line) between text.

Q.29: In <OL> and <UL>, the style of bullet or number is defined by:
(a) type attribute
(b) style attribute
(c) both (a) and (b)
(d) None of these

Correct Answer is Option (a)
The type attribute of <OL> and <UL> tags is used to define the type of bulleted and numbered list required by the user.

Q.30: Which of the following will produce a solid circle bullet when given as a type for <UL>?
(a) circle
(b) square
(c) disc
(d) none of these

Correct Answer is Option (c)
The syntax <UL type = “disc”> will display a bulleted list with disc.

Q.31: A ________ can be inserted in HTML document which can act as a container for all the input elements.
(a) Text field
(b) Text area
(c) Form
(d) Command Button

Correct Answer is Option (c)
HTML form is a document which stores information of a user on a web server using interactive controls.

Q.32: _______ method is used to sent form data as URL variables.
(a) Get
(b) Set
(c) Post
(d) None of these

Correct Answer is Option (a)

Some other features of GET requests are: 

GET requests can be cached.

GET request remains in the browser history.

Q.33: The _________ tag is used to display the text as subscript.
(a) <ms>
(b) <SUB>
(c) <em>
(d) <strong>

Correct Answer is Option (b)

The subscript text will appear half a character height beneath the other characters.

Q.34: Which of the following is not a browser?
(a) Microsoft Bing
(b) Netscape Navigator
(c) Mozilla Firefox
(d) Opera

Correct Answer is Option (a)

Microsoft Bing is a web search engine owned and operated by Microsoft. The service has its origins in Microsoft’s previous search engines: MSN Search. Windows live search and later live search.

Q.35: The __________ tag contains the title of the document.
(a) <HTML>
(b) <HEAD>
(c) <BODY>
(d) <TITLE>

Correct Answer is Option (d)

The title is displayed in the title bar at the top of the web browser. The title must be contained in the head section.

Q.36: Which element allows for the creation of groups of options in a select menu?
(a) <select>
(b) <group>
(c) <option>
(d) <optgroup>

Correct Answer is Option (c)

The <OPTION> tag specifies an option in a selection list. <OPTION> tag is used inside a SELECTION tag.

Q.37: Digital property rights disputes arise when some form of _______ occurs between companies.
(a) privacy
(b) piracy
(c) hacking
(d) plagiarism

Correct Answer is Option (b)

Digital property includes data, internet accounts and other rights in the digital world, including contractual rights and intellectual property rights. 

Digital property rights disputes arise when some form of counterfiling or piracy occurs between companies. Some digital property rights are domain name, context management system, site hosting, social media pages.

Q.38: Riya is an student of class 10th. Her teacher asked her one question that Priceline.com is an example of what type of e-commerce?
(a) B2B
(b) B2C
(c) C2B
(d) C2C

Correct Answer is Option (c)

C2B(consumer to Business) applies to any consumer that sells a product or service to a business over the internet. One example of C2B model is priceline.com, where bidders (or customers) set their prices for items such as airline tickets or hotel rooms and a sellers decide whether to supply them.

B2B (Business to Business) applies to business buying from and selling to each other over the internet.

Q.39: <OPTION> tag is used inside the ________ tag that displays the options in the list.
(a) <INPUT>
(b) <SELECT>
(c) <TEXTAREA>
(d) <CHECKBOX>

Correct Answer is Option (b)

Combo box in HTML is used to display a drop down list of some options from which one can be selected. <SELECT> tag is supported in all the web browsers. <OPTION> tag is used inside the <SELECT> tag that displays the options in the list.

Q.40: Which attribute of FORM specifies the name of the form?
(a) detail
(b) information
(c) form name
(d) name

Correct Answer is Option (c)

HTML forms are very effective because they can easily collect data from the Internet and utilize that information in other web page, name attribute specifies the name of the form. The name attribute is optional if these is only one form on the web page.

Section - C

I. Read the passage given below.
Geetika has recently created her social accounts. She is very excited as she waited so long to go online. She has recently also got admission in a prestigious high school and does not know many students.
When she logs into her social media a few days later, she finds that someone is posting negative, demeaning comments on her social media profile. She is also getting repeated mails from unknown people. Whenever she goes online, she is trolled by multiple unknown people.

Based on the given information, answer the Questions No. 41-45.

Q.41: Geetika is a victim of __________ :
(a) Eavesdropping
(b) Plagiarism
(c) Phishing
(d) Cyber stalking

Correct Answer is Option (d)
Geetika is a victim of cyber stalking.
Cyber stalking refers to the use of the Internet, e-mail or other telecommunication technologies to harass or stalk another person online.

Q.42: Which of the following is the most appropriate action she should take?
(a) She should stop going online and delete her social media accounts.
(b) She should NOT share this with anyone as she might face more of such kind of behaviour.
(c) She should file a complaint at the nearest police station.
(d) She should inform her parents and bring to the notice of school authorities.

Correct Answer is Option (d)
She should inform her parents ad bring to the notice of school authorities. So, she could be safe from cyber stalking.

Q.43: After hearing her ordeal, the school decides to publish a set of moral principles that determines the appropriate behavior of students while using the internet. The school is referring to __________ 
(a) Intellectual Property rights 
(b) Internet Privacy 
(c) Computer Ethics 
(d) Cyber Ethics

Correct Answer is Option (d)
The school is referring to cyber ethics.
Cyber ethics is the study of ethics pertaining to computers, covering user behavior and what computers are programmed to do and how this affects individuals and society.

Q.44: Geetika is advised by her best friend, Seerat to protect her personal information from intentional or unintentional attacks by others. This is also known as ___________ 
(a) Digital right 
(b) Copyright 
(c) Data Privacy 
(d) Intellectual property

Correct Answer is Option (d)
This is also known as data privacy.
Data privacy is a guideline for how data should be collected or handled, based on its sensitivity and importance.

Q.45: The computer teacher of Geetika’s class decides to take an online session on the topic Netiquettes, which generally includes:
(a) safeguarding one’s passwords and sensitive online information 
(b) logging out of social media accounts after the session 
(c) not bullying or trolling anyone by disrespecting them or passing inappropriate remarks 
(d) All of the above.

Correct Answer is Option (d)
Netiquette is a set of rules that encourage appropraite and courteous online behavior. It generally includes safeguarding one’s password and sensitive online information, logging out of social media accounts after the session and not bullying or trolling anyone by disrespecting them or passing inappropriate remarks.

II. Read the passage given below.
Consider the following code created by Sumantha for a webpage:
<html>
<body bgcolor="yellow">
<center>
<h1> Our Country : India < _____ >                                                                          ............... line1
<imgsrc="https://edurev.gumlet.io/ndia.jpg">
</center>
<p>
<font color="red" size="5" _______ = "Times New Roman">                    ............... line 2
India is spread over a large geographical area. In terms of area, it is the 7<sup>th</sup> largest country while in terms of population, it is the 2<sup>nd</sup> largest country in the world.
Some facts about India are as follows<______></p>                                      ............... line 3
<ul>
<li>Area :Approx 3.28 million sq. km <_>                                                           ............... line 4
<li>North to South extension : Approx 3,200 km</li>
<li>East to West extension : Approx 2900 km</li>
< _______ >                                                                                                                                ............... line 5
</body>
</html>

Based on the given information, answer the questions NO. 46-50.

Q.46: Choose the correct option from the following to fill up in line 1:
(a) \h1
(b) \h6
(c) /h6
(d) /h1

Correct Answer is Option (d)
/h1 is used to fill up in line 1. It is the closing tag of <h1>. <h1> is a container tag so its closing tag must be required.

Q.47: Choose the correct option from the following to fill up in line 2:
(a) font

(b) face
(c) type
(d) text

Correct Answer is Option (b)
face is used to fill up in line 2. :Times New Roman” is the value of font type which is defined by face attribute.

Q.48: Choose the correct option from the following to fill up in line 3:
(a) </f>

(b) <f>
(c) </font>
(d) <font>

Correct Answer is Option (c)
</font> is used to fill up in line 3. </p> is the closing tag of <p>. It is used here but <font> tag has used after <p>. so it must be closed before </p>.

Q.49: Choose the correct option from the following to fill up in line 4:
(a) <i>

(b) </li>
(c) <\li>
(d) <\i>

Correct Answer is Option (b)
</li> tag is used to enter the list item so at the end of this line, its closing tag must be required as </li>.

Q.50: Choose the correct option from the following to fill up in line 5:
(a) ul

(b) <\ul>
(c) <ul>
(d) </ul>

Correct Answer is Option (d)
</ul> is used to fill up in line 5. <ul> tag is used to create unordered list. It must be closed before closing tag of Body. 

The document Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 Notes | Study CBSE Sample Papers For Class 10 - Class 10 is a part of the Class 10 Course CBSE Sample Papers For Class 10.
All you need of Class 10 at this link: Class 10

Related Searches

Extra Questions

,

video lectures

,

Objective type Questions

,

Viva Questions

,

shortcuts and tricks

,

Previous Year Questions with Solutions

,

Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 Notes | Study CBSE Sample Papers For Class 10 - Class 10

,

mock tests for examination

,

Summary

,

Free

,

Important questions

,

Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 Notes | Study CBSE Sample Papers For Class 10 - Class 10

,

ppt

,

Semester Notes

,

Class 10 Computer Science: CBSE Sample Question Paper- Term I (2021-22) - 1 Notes | Study CBSE Sample Papers For Class 10 - Class 10

,

MCQs

,

pdf

,

past year papers

,

study material

,

Exam

,

practice quizzes

,

Sample Paper

;