1557119001-0llcomputer Applications CBSE 10th Answer
1557119001-0llcomputer Applications CBSE 10th Answer
1557119001-0llcomputer Applications CBSE 10th Answer
Solution
X
Chapter 1
The Internet
A. A. 1. d 2. a 3. a 4. c 5. c 6. c 7. a 8. d 11. b 12. d
B. 1. servers 2. SSH 3. TELNET 4. website 5. four
6. FTP 7. web servers 8. web browser 9. IP Address 10. HTTPS
C. 1. F 2. F 3. T 4. T 5. F 6. T 7. F
D. 1. The hardware of the internet includes the cables that carry huge amount of data every second
to the computers in the network. Other hardware are routers, servers, cell phone towers,
satellites, radios, smart phones and other devices.
2. A protocol is a set of rules and guidelines for communicating data. The protocol used for
transferring files over the internet is FTP i.e. File Transfer Protocol.
3. The different ways to connect to the Internet are using:
• Dial-Up Connection
• Broadband Connection which includes- Cable Modem, Digital Subscriber Line and Satellite.
• Leased Lines
• Wireless Connection which includes – Wi-Fi, Wi-Fi Hotspots, WiMax and Internet Dongles.
4. The World Wide Web is based on these technologies:
• Web Servers and Web Browsers
• HTTP - Hypertext Transfer Protocol
• HTML - Hypertext Markup Language
5. A web page is a document that stores information, which can be viewed in the internet using a
web browser. A Website is a collection of related web pages stored in a web server.
6. A web browser is the software that facilitates the retrieval of information from a web server.
The information that is rendered by it may be text, images, videos or any other content and
sometimes third party plugins are used to display content inside web browsers. Some very
popular web browsers are Internet Explorer, Mozilla Firefox, Google Chrome and Opera.
Thus a web server and a web browser work in unison to achieve the satisfaction of the consumers.
7. The general form of a URL syntax is as follows:
Protocol://domain name/<directory path>/<object name>
For example:
http://www.cbse.nic.in/newsite/index.html
The elements of this syntax are as follows:
Advantages of e-shopping
14.
• Reduces Cost: Since the retailer do not require a showroom, involving huge cost can pass
on the benefit to the consumer by selling a product at a price lesser than the market rate.
A. 1. d 2. a 3. b 4. d 5. b 6. a 7. b 8. a 9. a 10. c
B. 1. <UL> 2. circle 3. <LI> 4. Definition 5. nested
6. <SUP> 7. TYPE 8. JPG 9. HREF 10. <SUB>
C. 1. F 2. T 3. T 4. T 5. F 6. F 7. F 8. F 9. T 10. T
D. 1. Lists in HTML is used to arrange data containing bullets and numbering to produce an ordered
set of text. The different categories of list that can be created using HTML are:
a) Ordered List
b) Un-Ordered List
c) Definition List
2. Unordered Lists are used to display with bullets before each item in the list. Ordered Lists also
called Numbered Lists are used to specify numbers instead of bullets as in Unordered lists.
3. The TYPE attribute of the UL tag is used to define the symbol for the bullets which may be disc,
circle or square.
4. Ordered Lists also called Numbered Lists are used to specify numbers instead of bullets as in
Unordered lists.
<OL TYPE=“a” START=“5”>
5. A definition list is a list of terms and corresponding definitions. Definition lists are typically
formatted with the term on the left with the definition following on the right or on the next line.
The definition text is typically indented with respect to the term.
A definition list always begins with the <DL> tag and ends with the </DL> tag. The definition term
is tagged as <DT> and a definition description tagged as <DD>.
6. A list within a list is called a nested list.
Example,
<UL>
<LI> West Bengal
<UL TYPE=”square”>
<LI> Darjeeling
<LI> Bankura
A. 1. b 2. b 3. b 4. a 5. a 6. c 7. c 8. a 9. d 10. b
B. 1. <TR> 2. CAPTION 3. BORDER 4. text 5. #
6. CELLPADDING 7. ALT 8. TARGET 9. ALIGN 10. CELLSPACING
C. 1. F 2. T 3. F 4. F 5. F 6. T 7. F 8. T 9. T 10. T
D. 1. Tables are used in HTML to display tabular data in the form of rows and columns.
<TABLE BORDER=4 BORDERCOLOR=RED BGCOLOR=GREEN>
2. <TD>…</TD> tag to define a data cell. <TR>…</TR> tag on the other hand is used to define a
table row.
3. <CAPTION>…</CAPTION> tag to define a title or caption for the table.
4. This is to state that the table should be drawn with a border thickness of 4 pixels, having colour
of the border as red, with the width and height of the table as 600 and 200 respectively.
5. <TABLE>
<CAPTION>Colours</CAPTION>
<TH>RED</TH>
<TH>GREEN</TH>
<TH>BLUE</TH>
<TH>ORANGE</TH>
<TH>CYAN</TH>
<TR>
<TD BGCOLOR=”RED” WIDTH=”100” HEIGHT=”50”></TD>
<TD BGCOLOR=”GREEN” WIDTH=”100” HEIGHT=”50”></TD>
<TD BGCOLOR=”BLUE” WIDTH=”100” HEIGHT=”50”></TD>
<TD BGCOLOR=”ORANGE” WIDTH=”100” HEIGHT=”50”></TD>
<TD BGCOLOR=”CYAN” WIDTH=”100” HEIGHT=”50”></TD>
</TR>
</TABLE>
A. 1. d 2. a 3. a 4. a 5. b 6. c 7. d 8. a 9. d 10. a
B. 1. Submit 2. form-handler
3. TEXTAREA 4. <SELECT>
5. Radio 6. Checkbox
7. Face 8. Frames
9. FRAMEBORDER 10. MARGINWIDTH
C. 1. T 2. T 3. F 4. T 5. F 6. F 7. T 8. T 9. T 10. F
D. 1. <HTML>
<HEAD>
<TITLE>Lab Exercises</TITLE>
</HEAD>
<BODY>
<form>
Select Games:<br>
<input type=”checkbox” name=”games1” value=”Football”> Football<br>
<input type=”checkbox” name=”games2” value=”Cricket”>Cricket<br>
<input type=”checkbox” name=”games3” value=”Badminton”>Badminton<br>
<input type=”checkbox” name=”games4” value=”Basketball”>Basketball<br>
</form>
</BODY>
</HTML>
2. <HTML>
<HEAD>
<TITLE>Lab Exercises</TITLE>
</HEAD>
<BODY>
The selector points to the HTML element you want to style.
The declaration block contains one or more declarations separated by semicolons.
Each declaration includes a CSS property name and a value, separated by a colon.
4. Internal or Embedded styles are placed at the top of each web page document, before any of
the content is listed.
5. The HREF attribute of the LINK tag is used to specify the path of the CSS external file. The REL
stands for “relationship”, where the value denotes how the item being linked to is related to the
containing document.
6. The Descendant Selectors are used in case you want to apply a style rule to a particular element
only when it lies inside a particular element. As given in the following example, style rule will
apply to <em> element only when it lies inside <ul> tag.
ul em {
color: green;
}
28 Computer Applications – X (CBSE Course) Answers
7. Grouping Selectors are used to apply a style to many selectors. This is done by separating the
selectors with a comma, as given in the following example −
h1, h2, h3 {
color: #36C;
font-weight: normal;
letter-spacing: .4em;
margin-bottom: 1em;
text-transform: lowercase;
}
This define style rule will be applicable to h1, h2 and h3 element as well. The order of the list is
irrelevant. All the elements in the selector will have the corresponding declarations applied to
them.
8. The 3 values are:
Value Description
A. 1. A 2. C 3. C 4. B 5. A 6. D 7. A 8. D 9. A 10. C
B. 1. Intellectual property 2. privacy 3. Spamming 4. Piracy
5. Cybercrime 6. Worms 7. Adware 8. Hijack This
9. Spyware 10. warez
C. 1. T 2. T 3. F 4. F 5. T 6. T 7. F 8. T 9. F 10. T
D. 1. Computer ethics deals with the procedures, values and practices that govern the process of
consuming computing technology and its related disciplines without damaging or violating the
moral values and beliefs of any individual, organization or entity.
2. Netiquette is short for “Internet etiquette.” Just like etiquette is a code of polite behaviour in
society, netiquette is a code of good behaviour on the Internet.
3. Software piracy is defined as illegally copying software that does not belong to you in a manner
that violates the copyright.
Shareware is built on the concept of “try it before you buy it.” A version of the software that is
missing features or cannot be used more than a certain number of times or days is distributed
freely. This gives the user the opportunity to try the software, and determine if it fits their
needs.
4. As the license for using software is high therefore in developing countries like India it is difficult
to stop piracy.
5. If you become a software developer and wish to prevent software piracy you must keep the
following in mind :
• Educate your staff on the licensing requirements of your software purchases
• Conduct a self-audit of your software licenses
• Acquire any licenses needed for full compliance
• The most widely used method is the license key; code that is built into an application to
require a valid key to unlock the software.
6. Spamming remains economically viable because advertisers have very little or sometimes no
operating costs beyond the management of their mailing lists, and it is almost impossible to hold
senders accountable for their mass mailings. On the other hand it costs huge to the sender and
may sometime even get dubbed.
A. 1. C 2. D 3. A 4. C 5. D 6. C 7. A 8. C 9. A 10. A
B. 1. Script 2. Stage 3. Sounds 4. Untitled 5. Looks
6. Green 7. .sb2 8. Control 9. Repeat 10. 480
C. 1. T 2. F 3. T 4. F 5. T 6. T 7. F 8. T 9. T 10. T
D. 1. A set of instructions given to the computer to perform a certain task is called a program.
2. Pen Up, Pen Down, Clear
3. forever
4. Sprites are the images or characters on a Scratch stage that is either user-created, uploaded, or
found in the sprites library, that perform actions in a project using a set of instructions called
script.
5. Motion
6. Scripts, Costumes, Sounds
7. The Scripts Area is an area on the right side of the editor where scripts could be stored. A script
is a collection or stack of blocks that all interlock with one another. The blocks and their order
are very important, as they determine how sprites interact with each other and the backdrop.
8. The stage is where a Scratch project is physically run, so when one plays a game, the Stage is the
window in which it is run. By default, the Scratch Cat is on the stage.
9. File, Edit, Tips and About.
10. An example backdrop that comes with Scratch. A backdrop is one out of possibly many frames,
or backgrounds, of the Stage. It is located in the backdrops library. The Stage can change its look
to any of its backdrops.
Application based questions
1. The steps are:
i. Click on the File->Save menu.
ii. The ‘Save Project’ dialog appears, where select the D drive and the “projects” folder.
iii. Provide a Filename and click on the “Save” button.
2.
4.
A. 1. B 2. D 3. A 4. B 5. B
B. 1. break 2. continue 3. = 4. // 5. Comments
C. 1. F 2. F 3. T 4. F 5. T
D. Answer the following questions.
1. a. int b. float c. str d. str
2. a. One
Two
Three
b. invalid syntax in the second line
c. One Two=Three
d. 5+6:11
7*6*5=210
Three
3. A variable is a name given to a memory location that can contain a data value.
4. Conditional statements are specific statements that allow us to check a condition and execute
certain parts of code depending on whether the condition is true or false.
The different conditional statements are: if, if-else, if-elif-else
5. The body of the conditional statement is indicated by the indentation. Body starts with an
indentation and the first un-indented line marks the end.
6. Relational operators are used to compare the relationship between two data-items in a
conditional expression.
7. The = is an assignment operator and is used to assign a value to a variable. The == is a relational
operator and is used to compare two values for equality.
8. Logical operators are used to join more than one relational expression. The following table
shows the different logical operators: