Name of the Board : Central Board of Secondary Education (CBSE)
Class : X STD
Document Type : Sample Question Paper
Subject : Computer Application
Term : 1 and 2
Year : 2021-22
Website : https://cbseacademic.nic.in/SQP_CLASSX_2021-22.html
CBSE X Computer Application Question Paper
CBSE Students can download the Computer Application Sample Question Paper Term 1 and 2 for the year 2021-22 from the website of CBSE Academic.
Related / Similar Question Paper : CBSE Academic Class X Social Science Sample Question Paper 2021-22
Sample Question Paper For CBSE X Computer Application
Section – A
This section consists of 20 questions of MCQ type. Answer any 16 questions.
1 Which one of the following software comes under Open-Source Software category?
a. Photoshop
b. Ms-Paint
c. Linux
d. Windows
2 HTML tag to draw horizontal line:
a. <hl>
b. <hr>
c. <hline>
d. None of the above
3 Secure data transmission means
a) Data is accessible by any unauthorized person during transmission.
b) Data can not be accessed by any unauthorized person during transmission.
c) Transmission of data happens easily
d) No one can access it
4 The correct HTML code to display(P+Q)2 is:
a. <SUB>(P+) 2</SUB>
b. P+Q <SUP> 2 </SUP>
c. ( P + Q)<SUP> 2 </SUP>
d. <SUP> (P+Q) 2</SUP>
5 Which HTML tags cause browsers to render text as italics?
a. <text style = “italics”></text>
b. <ital.></ital.>
c. <i></i>
d. <b></b>
6 The correct HTML code for inserting an image is :
a. <img href=”image.gif”>
b. <img> image.gif</gif>
c. <image src = “image.gif”>
d. <img src = “image.gif” >
7 Which attribute is NOT valid for the <body> tag?
a. background
b. color
c. vlink
d. bgcolor
8 ____________attribute is used to specify the location of an image file.
a. alt
b. src
c. align
d. name
9 Which of the following is NOT an example of Intellectual Property rights?
a. Patent
b. Trademark
c. Password
d. Industrial Design
10 The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason.
a. alt
b. alternate
c. tooltip
d. text
11 While creating a Web document, which unit is used to express an image’s height and width?
a. Centimeters
b. Pixels
c. Dots per inch
d. Inches
12 Preeti needs to send a very confidential message to her colleague in office over a secure channel.She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as________________
a. Encryption
b. Decryption
c. Plagiarism
d. Data Security.
13 Which is the correct way to comment out something in HTML?
a. Using ## and #
b. Using <!– and –>
c. Using </– and -/->
d. Using <!– and -!>
14 The default alignment of images, that are inserted in Web page, is:
a. left
b. right
c. inline with text
d. middle
15 Which of the following techniques can be used for security of data?
a. Authentication
b. Authorisation
c. Encryption
d. All of the Above
16 Which of the following is not a cybercrime?
a. Plagiarism
b. Phishing
c. using licensed software
d. hacking
17 _________ is a software for which exclusive rights of modification in the source code remain with the owner.
a. Free Open-Source Software
b. Freeware
c. Open-Source Software
d. Proprietary Software
18. A _______________ is the right given by the government to an inventor to protect his/ her invention from being used/copied for a fixed period of time.
a. Copyright
b. Intellectual Property
c. Patent
d. Trademark
19 Which of these is NOT an attribute of the font tag?
a. color
b. face
c. type
d. size
20 The <_________> tag displays text in subscript form.
a. sub
b. sup
c. sups
d. subs.
Section-B
This section contains 20 questions. Answer any 16 questions.
21 Arun clicks on a link received in a message on his phone which promises him a complimentary trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked him to do the same. But Panshul refuses and tells Arun that his personal and private information, such as online account names, login information and passwords can be stolen and he should be careful of such ____________ attacks.
a. Phishing
b. Spamming
c. Scamming
d. Plagiarism
22 Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers. One day while browsing the Internet she discovers that another artist has displayed her painting portraying it as his own. Which right of Charlene was infringed?
a. Digital Privacy right
b. Intellectual Property right
c. Digital Property right
c. Intellectual Privacy right
23 Which of the following will result in the largest text size?
a. <H3>
b. <H6>
c. <H2>
d. <H4>
24 We can create a numbered list using the __________ tag.
a. <UL>
b. <list>
c. <OL>
d. <DL>
25 Which of these is NOT an example of Cyber bullying?
a. Copying a classmate’s personal photo against his/her permission from his social media account and sending it to other friends on their emails
b. Bullying a classmate in the school corridor.
c. Threatening someone on whatsapp.
d. Posting mean messages about someone on their social media.
26 Identify which of the following type of list will create a bulleted list.
a. Unordered
b. Ordered
c. Definition
d. Number
Download CBSE X Computer Application Question Paper
Download CBSE X Computer Application Term 1 Question Paper Here :
https://www.pdfquestion.in/uploads/pdf2022/40331-Term1.pdf
Download CBSE X Computer Application Term 2 Question Paper Here :