Class 10 Exam  >  Class 10 Notes  >  Information & Computer Technology (Class 10) - Notes & Video  >  Sample paper - 1 Computer Science (Information & Computer Technology) Class 10

Sample paper - 1 Computer Science (Information & Computer Technology) Class 10 | Information & Computer Technology (Class 10) - Notes & Video PDF Download

SECTION A

Q1) Fill in the blanks: 

i) Viruses, worms and trojans are collectively named ________________.
Ans: Malware

ii) Cellspacing attribute is used with ______________ tag.
Ans: <table>

iii) _____________ is a program which allows you view information on the World Wide Web.
Ans: Web browser

iv) Collection of Web Pages is called _____________.
Ans: 
Website

v) Columns of a table are specified using __________tag.
Ans:  <td>

vi) _________ can replicate itself automatically.
Ans: Worm

vii) _________ attribute is used with <A> tag to specify the URL of link.
Ans: href

viii) ___________ is type of program that is installed on a user’s computer to collect information about user.
Ans: Spyware

ix) XML attribute value should always be enclosed in _______________ .
Ans: Quotes

x) ______________is a program that appears harmless but actually performs malicious functions.
Ans: Trojan Horse


Q2) State True or False: 

i) The World Wide Web Consortium was founded to develop common standards.
Ans: True

ii) An XML document can have any number of child elements.
Ans: True

iii) No value is specified with border attribute of <img> tag.
Ans:  False

iv) COLSPAN attribute of <TD> tag is used to merge more than one column of table.
Ans: True

v) Unsolicited bulk emails are called spam.
Ans: True

vi) Malware is Antivirus software.
Ans: False

vii) Because each computer differs in terms of what fonts it can display, each individual browser determines how text is to be displayed.
Ans: True

viii) Xml is Extended Markup Language
Ans:False

ix) Software piracy is crime.
Ans:True

x) A cracker is a malicious programmer who break into secure systems.
Ans:True


Q3) Short Answer Questions –

i. What does an anti-virus software do?
Ans: Anti Virus software are used to prevent, detect and remove malicious programs.

ii. What is full form of HTTP and what is its use?
Ans: HyperText Transfer/Transmission Protocol. Hypertext Transfer Protocol is the main protocol of the World Wide Web. When you request a web page by typing its address into your web browser, that request is sent using HTTP. The browser is an HTTP client, and the web page server is an HTTP server.

iii. Write the HTML code to display links of a web page in yellow colour. 
Ans: <Body link = “yellow”>

iv. Write the full forms of 1. URL 2. <LI> 3. <TD> 4. HTML
Ans: 
1. Uniform Resource Locator
2. List Item
3. Table Data
4. HyperText Markup Language

v. As life gets busier, it becomes difficult for everyone to keep a track with school & college friends, old colleagues, old neighbours and favourite teachers. It is important to keep in touch with all your near and dear ones. At times, people sitting miles away doing similar kind of activity or solving similar kind of problems can help you to achieve goals faster by sharing their experiences. Similarly people belonging to different socio-economic background can change your perspective and can enhance your understanding of various cultures. 

a. Suggest two real time tools that are suitable for the above-mentioned activities.
Ans:  Facebook and Twitter

b. What is the generic name used for such tools?
Ans:  Social Networking

vi. Laleema Chakradhar wants a broadband connection for accessing her mails and staying informed about the latest happenings in the field of Biotechnology. Can you suggest two Internet Service Providers of India to be approached for the same? 
Ans: VSNL, Airtel etc.


Q4) Short Answer Questions –

i. Draw the XML tree for the code given below:

<employees>

<employee>

<name>

<first>Harry</first>

<last>Potter</last>

</name>

</employee>

<employee>

<name>

<first>Linda</first>

<last>Ray</last>

</name>

</employee>

</employees>
Ans: 

employees

first

employee

last

name

ii. What is the meaning of backup and why the data backup is essential? Also name 4 devices to take data backup.
Ans: In information technology, a backup, or the process of backing up, refers to the copying

and archiving of computer data so it may be used to restore the original after a data loss event.
Data Backup protect us against failures like:
Hardware failure
Media Failure
Accidental file deletion
Theft and natural disaster
Virus attack
Following are some storage devices to take backup:
External hard disk
CD
DVD
USB Flash drive
Online Backup

iii. Write any two attributes for each tag: [3]

a) <img>

b) <Table>

c) <A>
Ans:
 img tag-src, alt, height, width
table tag- align, bgcolor, border, cellpadding, cellspacing
a tag- href, name

iv. Sharvan Joshi is a student of political science and a keen researcher of political issues related to various countries and states. He wants to share his research and his own opinion on these issues on day -to-day basis with everyone on the World Wide Web. He is also interested in collecting the views of others to enhance his research and knowledge related to his area of interest. He belongs to a middle-class family and can’t afford his own website. Also being a non-technical person he can’t create a dynamic website to deal with day-to-day inputs. 

a) Suggest an easy way for Shravan to achieve the same.
Ans: Shravan should develop a blog.

b) Also name any two popular websites providing free services that can help Shravan in this regard.
Ans:Blogger.Com


Q5) Long Answer Questions –

Observe the following web page and write HTML code to generate it. 

Note the following points while generating the Webpage:

· Link colour is black, background colour is yellow and visited link colour is green

· Title of the page is “wild life in India”

· Heading of the page is maroon

· Image used is “elephant.png”

· Caption of table is blue

· Table border is blue and of size 2

· The 4 links are one.html, two.html, three.html and four.html

· The email id for contact us is abc@xyz.com

Ans: <HTML>

<HEAD><TITLE> wild life in India </TITLE></HEAD>

<BODY bgcolor=yellow LINK="black" VLINK="green">

<CENTER><H1> <FONT COLOR="maroon">INDIAN ELEPHANT</FONT>

</H1></CENTER>

<IMG SRC="elephant.png" ALIGN="right" HEIGHT=225 WIDTH=250>

<p>The Indian elephant (Elephas maximus indicus) is one of three recognised subspecies of the

Asian elephant and native to mainland Asia. Since 1986, Elephas maximus has been listed as

Endangered by IUCN as the population has declined by at least 50% over the last three

generations, estimated to be 60–75 years. Asian elephants are threatened by habitat loss,

degradation and fragmentation".

<p> See Also :

<UL>

<LI><A HREF="one.html">Sri Lankan Elephant</A>

<LI><A HREF="two.html">sumatran Elephant</A>

<LI><A HREF="three.html">Borneo Elephant</A>

<LI><A HREF="four.html">African elephant</A>

</UL>

<CENTER>

<TABLE BORDER=2 BORDERCOLOR="blue" width=25% height=175>

<font color =blue><CAPTION>Threats To Elephants</CAPTION></font>

<TR> <TD> 1<TD> Illegal Hunting</TR>

<TR><TD> 2<TD>Industrialisation</TR>

<TR><TD> 3<TD> Habitat Loss</TR>

<TR><TD> 4<TD> Fragmentation</TR>

<TR><TD> 5<TD>Disease</TR>

</TABLE><BR>For further enquiries and reservations <A

HREF="mailto:abc@xyz.com">Contact Us</A>

</CENTER></BODY></HTML>


SECTION B

Q6) Multiple Choice Questions (Choose most appropriate option): 

i. What does URL stand for?
 a) United Route Line

b) Uniform Resource Locator

c) Unknown Redirection Link

d) Upload Redirection Link
Ans: b) Uniform Resource Locator

ii. XML uses

a) Only 6 tags

b) Predefined tags

c) Custom tags

d) HTML tags
Ans: c) Custom tags

iii. Copy of data created for safe storage is

a) Saved copy

b) Backup

c) Dcopy

d) Stored copy
Ans: b) Backup

iv. XML uses the features of

a) SGML

b) HTML

c) XHTML

d) DHTML
Ans: a) SGML

v. Which of the following is not the source of virus?

a) Email attachments

b) Pen drives

c) Typing through key board

d) Downloading files
Ans: c) Typing through key board

vi. Which of them is correct XML tag

a) <first name>

b) <6class>

c) <name>

d) All of the above
Ans: c) <name>

vii. A good way to safeguard access to your computer is to _________ protect it.

a) A deadbolt

b) Copyright

c) Safemode

d) Password
Ans: d) password

viii. Which one of these is correct processing instruction (PI) of a XML document?

a) <?xml version = “1.0”?>

b) <?xml version = “1.0”>

c) </xml version = “1.0”>

d) <xml version = “1.0”?>
Ans: a) <?xml version = “1.0”?>

ix. Which statement is true?

a) All XML elements must have a closing tag.

b) All XML elements must be in lower case.

c) All XML document must have a DTD.

d) All of the above
Ans: d) All of the above

x. Out of the following, which one will be altered or modified by a computer virus?

a) Operating System

b) Speed of Network Connectivity

c) Application Software

d) All of the above
Ans: d) All of the above

xi. Google (www.google.com) is a

a) Search Engine

b) Number in Math

c) Chat service on the web

d) Directory of images
Ans: a) Search Engine

xii. Border, cellspacing, cellpadding, align are the attributes of

a) <body>

b) <img>

c) <table>

d) None of these
Ans: c) <table>

xiii. Mozilla Firebox is a

a) Web Browser

b) News Website

c) Graphing Package

d) Word Processor
Ans:a) Web Browser

xiv. Which of these are all table tags?

a) <thead>, <body>, <tr>

b) <table>, <tr>, <td>

c) <table>, <head>, <title>

d) <table>, <tr>, <tt>
Ans: b) <table>, <tr>, <td>

xv. Valid XML document means

a) The document has one root element

b) The document contains one or more root element

c) The document has a DTD and complies to it

d) Each element must be in capital letter
Ans: c) The document has a DTD and complies to it

xvi. When creating a Web document, what format is used to express an image's height

and width?

a) Centimeters

b) Pixels

c) Dots per inch

d) Inches
Ans:b) Pixels

xvii. What can you do with the Internet?

a) Exchange information with friends and colleagues

b) Access pictures, sounds, video clips and other media elements

c) Find diverse perspective on issues from a global audience

d) All of the above
Ans: d) All of the above

xviii. Which command we use to link a page with an HTML page?

a) <a link="url">link text</a>

b) <a href="url">link text </a>

c) <a connect="url">link text </a>

d) <a attach="url">link text </a>

from www.studiestoday.com
Ans: b) <a href="url">link text </a>

The document Sample paper - 1 Computer Science (Information & Computer Technology) Class 10 | Information & Computer Technology (Class 10) - Notes & Video is a part of the Class 10 Course Information & Computer Technology (Class 10) - Notes & Video.
All you need of Class 10 at this link: Class 10
15 videos|27 docs|6 tests

FAQs on Sample paper - 1 Computer Science (Information & Computer Technology) Class 10 - Information & Computer Technology (Class 10) - Notes & Video

1. What is computer science?
Ans. Computer science is a field of study that focuses on the design, development, and use of computer systems. It involves the study of algorithms, programming languages, software development, and the theoretical foundations of computing. Computer science professionals have expertise in solving complex problems using computers and developing new technologies.
2. What is the importance of computer science in information and computer technology?
Ans. Computer science plays a crucial role in information and computer technology. It provides the foundation for designing and developing various software applications, computer networks, and systems. It helps in data analysis, storage, and retrieval, ensuring the efficient management of information. Computer science also enables the development of new technologies and innovations in the field of IT.
3. What are the career opportunities in computer science (information and computer technology)?
Ans. Computer science offers a wide range of career opportunities in information and computer technology. Some popular career options include software development, web development, system administration, network engineering, data analysis, cybersecurity, artificial intelligence, and machine learning. With the increasing reliance on technology, the demand for computer science professionals is constantly growing.
4. How can one pursue a career in computer science (information and computer technology)?
Ans. To pursue a career in computer science (information and computer technology), one can start by obtaining a bachelor's degree in computer science or a related field. It is important to gain knowledge and skills in programming languages, algorithms, data structures, and software development. Additionally, gaining practical experience through internships, projects, and certifications can enhance career prospects in this field.
5. What are the key skills required for a successful career in computer science (information and computer technology)?
Ans. Several key skills are essential for a successful career in computer science (information and computer technology). These include proficiency in programming languages such as Java, C++, or Python, strong problem-solving and analytical skills, understanding of algorithms and data structures, knowledge of computer networks and database management, ability to work in teams, and continuous learning and adaptability to new technologies and advancements.
Related Searches

Sample paper - 1 Computer Science (Information & Computer Technology) Class 10 | Information & Computer Technology (Class 10) - Notes & Video

,

Summary

,

MCQs

,

Important questions

,

ppt

,

shortcuts and tricks

,

study material

,

Sample paper - 1 Computer Science (Information & Computer Technology) Class 10 | Information & Computer Technology (Class 10) - Notes & Video

,

Semester Notes

,

Previous Year Questions with Solutions

,

Viva Questions

,

past year papers

,

Exam

,

Free

,

video lectures

,

Sample Paper

,

practice quizzes

,

mock tests for examination

,

pdf

,

Sample paper - 1 Computer Science (Information & Computer Technology) Class 10 | Information & Computer Technology (Class 10) - Notes & Video

,

Extra Questions

,

Objective type Questions

;