You are on page 1of 7

THE SOVEREIGN SCHOOL

(Learning Unlike Any Other)


PERIODIC TEST-II (2021-22)

SUBJECT: COMPUTER APPLICATIONS


CLASS: X

Time Allowed: 90 Minutes Maximum Marks: 25

Name: ________________ Date: ________ Class & Section: ________ Roll No: ________

General Instructions:
1. The question paper is divided into 3 Sections - A, B and C.
2. Section A, consist of 20 Questions (1-20). Attempt any 16 questions.
3. Section B, consist of 20 Questions (21-40). Attempt any 16 questions.
4. Section C, consist of 10 Questions (41-50). Attempt any 8 questions.
5. All questions carry equal marks.

Q. No. Section A
This section consists of 20 Questions (1-20). Attempt any 16 questions
from this section. Choose the best possible option.
1. HTML uses
a. User defined tags
b. Pre-specified tags
c. Fixed tags defined by the language
d. Tags only for linking
2. The two most important attributes of a form are
a. ID and Action
b. Class and method
c. Action and Method
d. Method and ID
3. What is the mean of DTD?
a. Document type data
b. Document type definition
c. Data type definition
d. Definition type document
4. When creating a Web document, what format is used to express an image’s
height and width?
a. Pixel
b. Centimeter
c. Inches
d. Dots per inch
5. ASCII stands for______.
a. American standard code for internal interchange
b. American standard code for information Interchange
c. American standard code for information Internal
d. None of them
6. While searching on the Internet, you decide to check in more than one
searchengine because
a. all web users prefer this technique
b. they will avoid repetition of information
c. each engine produces different results
d. they will avoid false information
7. What is the correct syntax for making a Superscript of text?
a. <sup>x2
b. x<sup>2</sup>
c. x<sub>2</sub>
d. Both a and b
8. Which of the following is not a style tag
a. <b>
b. <tt>
c. <i>
d. All of Above
9. Tags and Text are not directly displayed on the pageare written in which
section.
a. <title>
b. <head>
c. <Body>
d. All of them.
10. What is the general syntax for inline image?
a. <src=img>
b. <src=image>
c. <img =file>
d. <image src =”file”>
11. The _______________________ specifies how customers and visitors data
will be collected and used.
a. Ethics Codes
b. License
c. Privacy Policy
d. Security Policy
12. Which of the following techniques is used for security of data?
a. Authentication
b. Authorization
c. Encryption
d. All of the Above
13. Which of the following is not a part of the definition list tag?
a) DL
b) DD
c) DT
d) DC
14. The factor that is used to check the authenticity of the website.
a. HTTPS
b. HTTP
c. Padlock
d. Both Https and Padlock
15. The attribute alt is defined in which tag.
a. <Font>
b. <img>
c. <src>
d. <ol>
16. _____ is a type of software designed to help the user's computer detect
viruses and avoid them.
a. Malware
b. Adware
c. Antivirus
d. Both Adware and Antivirus
17. Which of below is not an attribute of font?
a. Face
b. Color
c. Character
d. size
18. We can view the source code of a web page in
a. Internet Explorer
b. Google chrome
c. Firefox
d. All of them
19. Which of the following refers to exploring the appropriate, ethical
behaviors related to the online environment and digital media platform?
a. Cyber law
b. Cyber Ethics
c. Cyber Security
d. Cyber Safety
20. The default alignment of images, that are inserted in in the web page is
_____________
a. Left
b. Right
c. Middle
d. In line with text.
Section B

This section consists of 20 Questions (21-40). Attempt any 16 questions.


21. To create a list using upper case letter and starts with “E”.
a. <ol type=”A” start=1>
b. <ol type = “a” start=5>
c. <ol type =”A” start =5>
d. None of them
22. Which tag is used for define the defining the titles of books, films etc.
a. <Em>
b. <KBD>
c. <Cite>
d. <Var>
23. _______________ is the protection of personal information given online.
a. Security
b. Authenticity
c. Privacy
d. Plagiarism
24. Credit card fraud may include _____
a. Stealing of credit card
b. stealing of information
c. Unauthorized and illegal use of credit card.
d. Phishing
25. Identity the given attribute from the given below:
a. img
b. ol
c. background
d. dl
26. All heading tag differentiated on the basis of
a. Typeface
b. Point size
c. Space
d. All of them
27. _________ informs us about the right and Wrong aspects of anything.
a. Ethics
b. Cyber _Ethics
c. Cyber laws
d. IPR
28. What is the full form of FLOSS.
a. Free Livre and open source software
b. Free Live and open source software
c. Free Logical and open source software
d. Front live open source software
29. To add the image at the back of web page we use __________ attribute.
a. Bgcolor
b. Background
c. Background image
d. All of them
30. The right of the owner of information to decide how much information is to
be shared /exchanged/distributed are collectively known as-----
a. Intelligent Property Right
b. Intellectual Property Right
c. Interactive Property Right
d. Instance Property right
31. Any crime committed using computer and internet is termed as _________.
a. Cyber crime
b. Cyber law
c. Cyber Society
d. None of above
32. _______________ refers to right to access information available in public
platform.
a. Freedom of Internet
b. Freedom of Data
c. Freedom of Information
d. Freedom of communication
33. Why it is important to specify an image width and height in an <img> tag?
a. The image will not render if these attributes are left out.
b. Specifying these dimensions help the browser to read page fast.
c. It insure the user will not be able to copy the image to their
computer.
d. These attributes constrain the image proportion’s.
34. Which of the following is not a intellectual property
a. Company Logo
b. Software
c. Composed Music
d. All of Above
35. The attribute is used to define the thickness of the horizontal rule.
a. Size
b. Width
c. Length
d. None of above
36. Ritwik wants to use software but does not want to pay for it. Which type of
software can he use?
a. Proprietary Software
b. Open Source Software
c. Both a and b
d. None of them
37. A__________ is a technical person who breaks through the system
security with malicious intention.
a. Hacker
b. Cracker
c. Tracker
d. None of them.
38. A term "Intellectual Property Right" covers-
a. Copyright
b. Trademarks
c. Patents
d. All of Above
39. Which of these will bring the text to the next line?
a. <hr>
b. <br>
c. <li>
d. <p>
40. A _____________ software allows its use, reuse, modification and
distribution
a. Proprietary
b. Free Software
c. Open Source Software
d. Both a and b
Section C

Case study based questions


This section consists of 10 Questions (41-50). Attempt any 8 questions.

Case Study I

Rajat wants to create a website on HTML And start creating various WebPages in it. He is
confused about the tags and the output generated by it. Help him to use the correct tags and
its attributes so that the correct output is formed.
41. Which of these attribute are not used for creating webpage in HTML?
a. Bgcolor
b. Background
c. Style
d. src
42. In Which Software Rajat view the source code of a web page
a. Ms Power Point
b. Authorizations
c. Ms Excel
d. Notepad
43. Which tag is used to Create Single line Text in forms of HTML?
a. <input type=”textarea”>
b. <input type=”text”>
c. <input =”textarea”>
d. None of these
44. Anything that is written between <! – and -- >in HTML named as_______
a. Commentary
b. Reply
c. Comment
d. All of Above
45. Which format usually works best for photos?
a. HTML
b. GIF
c. JPG
d. All of the above
Case study II

Rajat student of class x wants to create a web page using HTML .He wants to display
the output of the page similar to image given below .Help him to use the correct tag so
that the given output is formed.

46. Name the tag used by him to create list


a. <ol>
b. <ul>
c. <dl>
d. All of above
47. What is the use of start attribute in list
a. Start attribute starts the ordered list with particular value
b. Start attribute starts the Unordered list with particular value
c. Start attribute starts the ordered as well as Unordered list with
particular value
d. None of these
48. List the attribute of “ khaopiyo ” image.
a. Weight
b. Height
c. Both Height and width
d. None of these
49. Which attribute is used for image in above webpage?
a. img
b. Src
c. Source
d. None of Above
50. Which attribute of list used to define the list in number.
a. Start
b. Type
c. Data
d. None of Above

You might also like