MODEL ANSWER SHEET
Class X – Computer Applications (Code 165) • Session 2021–22 • Term 1 Sample Question Paper
Section A – MCQs (Q1–20)
| Q. No. |
Question (short) |
Correct Answer |
| 1 |
Which software is Open-Source? |
Linux |
| 2 |
HTML tag to draw horizontal line |
<hr> |
| 3 |
Secure data transmission means… |
Data cannot be accessed by any unauthorised person during transmission. |
| 4 |
Correct HTML for (P+Q)2 |
(P + Q)<sup>2</sup> |
| 5 |
HTML tag for italics |
<i>...</i> |
| 6 |
Correct image tag |
<img src="image.gif"> |
| 7 |
NOT valid attribute of <body> |
color |
| 8 |
Attribute for image location |
src |
| 9 |
NOT an Intellectual Property Right |
Password |
| 10 |
<img> attribute for alternate text |
alt |
| 11 |
Unit for image height/width |
Pixels |
| 12 |
Converting readable message to unreadable |
Encryption |
| 13 |
Correct way to write comment in HTML |
<!-- comment --> |
| 14 |
Default alignment of image |
Inline with text |
| 15 |
Technique(s) for data security |
All of the above (Authentication, Authorisation, Encryption) |
| 16 |
NOT a cybercrime |
Using licensed software |
| 17 |
Exclusive rights in source code remain with owner |
Proprietary Software |
| 18 |
Right given by government to protect an invention |
Patent |
| 19 |
NOT an attribute of <font> |
type |
| 20 |
Tag for subscript text |
<sub> |
Section B – Objective (Q21–40)
Q21. Arun clicked a free-trip link; friend warned about stealing personal data. Which attack?
Phishing
Q22. Output of <ol type='i'>…?
It will display a **numbered list with lowercase Roman numerals**:
i. First ii. Second iii. Third iv. Fourth
(Correct option: the one showing i., ii., iii., iv.)
Q23. Charlene’s painting was copied and shown as someone else’s work. Which right?
Intellectual Property Right
Q24. Largest text size among <H3>, <H6>, <H2>, <H4>?
<H2>
Q25. Tag to create numbered list
<ol> (Ordered List)
Q26. Which is NOT an example of cyber bullying?
Bullying a classmate **in the school corridor** (offline bullying).
Q27. Which type of list creates bulleted list?
Unordered list
Q28. Correct HTML structure sequence
<html><head><title></title></head><body></body></html>
Q29. Free to download but cannot modify source code.
Freeware
Q30. Output of <B> Mystery Moon </B>
The text Mystery Moon displayed in **bold**.
Q31. Fill width & height to make image 250×400.
<img src="Computers.jpg" width="250" height="400">
Q32. Tags to create Description list
<dl>, <dt>, <dd> → all of the above.
Q33. NOT a reason for digital divide?
Most appropriate: Lack of access to the disabled (option d) is NOT a standard reason stated this way.
Q34. Caesar cipher key=2, "CoMpUtEr" → ?
Shift each letter 2 places ahead: C→E, o→q, M→O, p→r, U→W, t→v, E→G, r→t
Result: EqOrWvGt.
Q35. Correct HTML code for Gender radio buttons.
<input type="radio" name="Gender" value="male"> Male<br>
<input type="radio" name="Gender" value="female"> Female<br>
Q36. Correct code to set background image.
<body background="Animals.jpeg">
Q37. Ways to avoid plagiarism:
Citing, Paraphrasing, Referencing → options i, ii and iii only.
Q38. Tag to create password field.
Use <input type="password"> → tag is <input>.
Q39. Tag to define options in dropdown.
<option>
Q40. Correct way to create list using lowercase letters.
<ol type="a">
Section C – Case Study I (Q41–45)
41. Geetika gets negative, demeaning comments & trolling online. She is a victim of:
Cyber stalking (online harassment & repeated negative behaviour).
42. Most appropriate action for Geetika?
Inform her parents and bring it to the notice of **school authorities**. (Option d)
43. School publishes moral principles for proper online behaviour. This is:
Cyber Ethics
44. Protecting personal information from attacks is called:
Data Privacy
45. Netiquettes session includes:
Safeguarding passwords, logging out, not bullying/trolling others → All of the above.
Section C – Case Study II (Q46–50)
46. Line 1 closing tag for <h1>
</h1>
47. Line 2: attribute in <font ... ____="Times New Roman">
face
48. Line 3: closing tag after text inside <font>...
</font>
49. Line 4: in list item "Area ... <_>"
</li>
50. Line 5: closing tag for unordered list
</ul>
End of Term-1 Model Answers • Use for practice & revision.