MODEL ANSWER SHEET

Class X – Computer Applications (Code 165) • Session 2021–22 • Term 1 Sample Question Paper
Section A – MCQs (Q1–20)
Q. No. Question (short) Correct Answer
1 Which software is Open-Source? Linux
2 HTML tag to draw horizontal line <hr>
3 Secure data transmission means… Data cannot be accessed by any unauthorised person during transmission.
4 Correct HTML for (P+Q)2 (P + Q)<sup>2</sup>
5 HTML tag for italics <i>...</i>
6 Correct image tag <img src="image.gif">
7 NOT valid attribute of <body> color
8 Attribute for image location src
9 NOT an Intellectual Property Right Password
10 <img> attribute for alternate text alt
11 Unit for image height/width Pixels
12 Converting readable message to unreadable Encryption
13 Correct way to write comment in HTML <!-- comment -->
14 Default alignment of image Inline with text
15 Technique(s) for data security All of the above (Authentication, Authorisation, Encryption)
16 NOT a cybercrime Using licensed software
17 Exclusive rights in source code remain with owner Proprietary Software
18 Right given by government to protect an invention Patent
19 NOT an attribute of <font> type
20 Tag for subscript text <sub>
Section B – Objective (Q21–40)
Q21. Arun clicked a free-trip link; friend warned about stealing personal data. Which attack?
Phishing
Q22. Output of <ol type='i'>…?
It will display a **numbered list with lowercase Roman numerals**:
i. First   ii. Second   iii. Third   iv. Fourth (Correct option: the one showing i., ii., iii., iv.)
Q23. Charlene’s painting was copied and shown as someone else’s work. Which right?
Intellectual Property Right
Q24. Largest text size among <H3>, <H6>, <H2>, <H4>?
<H2>
Q25. Tag to create numbered list
<ol> (Ordered List)
Q26. Which is NOT an example of cyber bullying?
Bullying a classmate **in the school corridor** (offline bullying).
Q27. Which type of list creates bulleted list?
Unordered list
Q28. Correct HTML structure sequence
<html><head><title></title></head><body></body></html>
Q29. Free to download but cannot modify source code.
Freeware
Q30. Output of <B> Mystery Moon </B>
The text Mystery Moon displayed in **bold**.
Q31. Fill width & height to make image 250×400.
<img src="Computers.jpg" width="250" height="400">
Q32. Tags to create Description list
<dl>, <dt>, <dd> → all of the above.
Q33. NOT a reason for digital divide?
Most appropriate: Lack of access to the disabled (option d) is NOT a standard reason stated this way.
Q34. Caesar cipher key=2, "CoMpUtEr" → ?
Shift each letter 2 places ahead: C→E, o→q, M→O, p→r, U→W, t→v, E→G, r→t Result: EqOrWvGt.
Q35. Correct HTML code for Gender radio buttons.
<input type="radio" name="Gender" value="male"> Male<br>
<input type="radio" name="Gender" value="female"> Female<br>
Q36. Correct code to set background image.
<body background="Animals.jpeg">
Q37. Ways to avoid plagiarism:
Citing, Paraphrasing, Referencing → options i, ii and iii only.
Q38. Tag to create password field.
Use <input type="password"> → tag is <input>.
Q39. Tag to define options in dropdown.
<option>
Q40. Correct way to create list using lowercase letters.
<ol type="a">
Section C – Case Study I (Q41–45)
41. Geetika gets negative, demeaning comments & trolling online. She is a victim of:
Cyber stalking (online harassment & repeated negative behaviour).
42. Most appropriate action for Geetika?
Inform her parents and bring it to the notice of **school authorities**. (Option d)
43. School publishes moral principles for proper online behaviour. This is:
Cyber Ethics
44. Protecting personal information from attacks is called:
Data Privacy
45. Netiquettes session includes:
Safeguarding passwords, logging out, not bullying/trolling others → All of the above.
Section C – Case Study II (Q46–50)
46. Line 1 closing tag for <h1>
</h1>
47. Line 2: attribute in <font ... ____="Times New Roman">
face
48. Line 3: closing tag after text inside <font>...
</font>
49. Line 4: in list item "Area ... <_>"
</li>
50. Line 5: closing tag for unordered list
</ul>

End of Term-1 Model Answers • Use for practice & revision.