HBSE 10th Model Paper Computer Science | Haryana Board 10th Computer Science Sample Paper
Looking for HBSE 10th Model Paper Computer Science Pdf? If Yes, here we have published HBSE 10th 2023 Model Question Paper Solution for Computer Science Subject.
Students of SSC (10th) Board can download from here www.bseh.org.in Model Paper Computer Science. Haryana 10th Class Computer Science Model Paper / Sample Paper will help students to prepare for Board Exam 2023.
COMPUTER SCIENCE
SECTION-A
Q1) HTML tags are enclosed between:
a) # #
b) < >
c) ! !
d) ( )
Ans- b) < >
Q2) Which of following will result largest text size:
a) <H3>
b) <H6>
c) <H2>
d) <H4>
Ans- c) <H2>
Q3) Each webpage has its own unique address known as:
a) Uniform resource locator
b) Universal resource location
c) Universal resource locator
d) None of these
Ans- a) Uniform resource locator
Q4) A website is a collection of?
a)images
b) files
c) data
d) Webpages
Ans- d) Webpages
Q5) __________Tag is used to bring the text to new line.
Ans- <BR> Tag.
Q6) Full form of WAN is__________________.
Ans- WAN stands for Wide Area Network.
Q7) Bluetooth can be used for long distance Communication. (T/F)
Ans- False
Q8) For Email, Sender & Recipient need not to be online at same time. (T/F)
Ans- True
Direction for questions 9 & 10: In the questions given below, there are two statements marked as Assertion (A) and Reason (R). Choose the correct option out of the choices given below in each question:
a) Both (A) and (R) are correct and (R) is correct explanation of (A). b) Both (A) and (R) are correct and (R) is not the correct explanation of (A). c) (A) is true but (R) is false. d) (A) is false but (R) is true.
Q9) Assertion: The ul element is used to create an ordered list in HTML. 1 Reason: the ul element stands for “unordered list” and is used to create a bulleted list in HTML.
Ans- d) (A) is false but (R) is true.
Q10) Assertion: Password help us to protect our digital accounts. 1 Reason: Third party may spam into our digital accounts.
Ans- a) Both (A) and (R) are correct and (R) is the correct explanation of (A).
SECTION-B
Q11) How you can insert an image in HTML?
Ans- The <img> tag is used to add images in an HTML webpage. It is an empty tag and requires different attributes to be specified with it. The different attributes of <img> tag are- src, alt, height, width, etc. Src attribute Specifies the URL of image.
Example:
<img src=”D:\kanika.jpg” alt=”not found” width=”128″ height=”128″ align=”middle” >
Q12) What do you mean by tag in HTML?
Ans- The <hr> tag in HTML stands for horizontal rule and is used to insert a horizontal rule in an HTML page to divide or separate document sections. The <hr> tag is an empty tag, and it does not require an end tag.
Example:
<p>There is a horizontal rule below this paragraph.</p>
<hr>
<p>This is a horizontal rule above this paragraph.</p>
Q13.) How we can take print of Table in MS Access.
Ans- Steps to take print of Table in MS Access:
i) Open the table you want to print.
ii) Click FILE tab
iii) Click print option
iv) See print preview there.
v) Select printer name and set properties like copies, page size etc.
vi) Click print button.
Q14) What is MAN in communication Technology?
Ans- MAN (Metropolitan Area Network): A Metropolitan Area Network (MAN) is a type of network that covers a larger geographical area than a local area network (LAN) but is smaller than a wide area network (WAN). MANS typically cover a city or a large campus. They connect multiple LANS within a specific geographic area, which gives high-speed connectivity.
Characteristics of MAN:
i.) MAN cover a larger geographical area, such as a city.
ii.) MAN gives high-speed data transfer within the defined geographic area.
iii.)MAN are created with multiple LANs.
Q15) What do you mean by internet? Write the requirements for internet.
Ans- Internet:
Internet is the technology by which millions of computers in the world are connected to one another to share information. A computer is connected to the Internet by the means of cables or some wireless media of communication. The computers connected to the Internet can easily access the information available from all around the world. Internet is largest network. It is network of networks.
Requirements For Internet Connection:
To connect your computer to the Internet, you need the following things:
- A computer or a device
- A cable line or wi-fi.
- A modem or a network card
- A company providing Internet connection (ISP)
- Software (Web browser)
Or
Explain SMTP Protocol?
Ans- SMTP:
SMTP is acronym for Simple Mail Transfer Protocol. It is a TCP/IP protocol used for sending and receiving emails. SMTP is used most commonly by email clients, including Gmail, Outlook, Apple Mail and Yahoo Mail.
SMTP can send and receive email, but email clients typically use a program with SMTP for sending email.
SECTION-C
Q16 Define the following:
a) Wi-Fi
Ans- Wi-Fi is a popular wireless networking technology. Wi-Fi stands for “wireless fidelity”. Wi-Fi was invented by NCR Corporation/AT&T in the Netherlands in 1991. By using this technology, we can exchange information between two or more devices. Wi-Fi has been developed for mobile computing devices, such as laptops, but it is now extensively using for mobile applications and consumer electronics like televisions, DVD players, and digital cameras. It is commonly called a wireless LAN (local area network).
b) Bluetooth
Ans- Bluetooth simply follows the principle of transmitting and receiving data using radio waves. It can be paired with the other device which has also Bluetooth but it should be within the estimated communication range to connect. When two devices start to share data, they form a network called piconet which can further accommodate more than five devices.
Points to remember for Bluetooth:
- Bluetooth Transmission capacity 720 kbps.
- Bluetooth is Wireless.
- Bluetooth is a Low-cost short-distance communications standard.
- Bluetooth is robust and flexible.
- Bluetooth is cable replacement technology that can be used to connect almost any device to any other device.
- The basic architecture unit of Bluetooth is a piconet.
Q17.) Differentiate between website & web portal.
Ans-
SL No. | Website | Web Portal |
1 | Website is a collection of interlinked webpages | Web Portal generally has links to different websites |
2 | It is source of similar type of information. | It is source of diverse nature information. |
3 | Websites are generally public in nature. | Web Portals are generally private in nature. |
4 | Generally, no Login required. | Generally, Login required. |
5 | Website content is same for all users. | Web Portal content can be different for different users |
Q18.) Describe Font tag & its attributes in HTML.
Ans- HTML <font> Tag:
The <font> tag in HTML plays an important role in the web page to create an attractive and readable web page. The font tag is used to change the color, size, and style of a text. The <font> tag comes in pairs. The text that follows the opening <font> tag will remain changed until the closing </font> tag. The font tag is used to set all the text to the same size, color and face.
Syntax: <font attribute = “value”> Content </font>
Font Tag Attributes:
The <font> tag has three attributes: Size, Color, Face.
Size: Used to define a specific size for text between 1 to 7.
Face: This attribute is used to define the font type for the included text.
Color: This attribute is used to show enclosed text in a different Color.
Example:
<p>
<font face = “courier” size=”2″ color=”green”> It is a courier font, a size smaller and black in color. </font>
</p>
Q19.) Define primary key with its characteristics. How we can set any field as primary key in MS access.
Ans- PRIMARY KEY:
It is a field or collection of fields which identifies every record uniquely. A primary key is used to uniquely identify records in a table. A primary key field should always contain a value and should rarely or never change
Characteristics of a Primary Key:
- A relation can contain only one primary key.
- Primary key field could not contain NULL value.
- It could not have same value in different records.
For example: we can set Aadhar no, employee id, regn. no, admission no. fields as primary key in a table.
Steps to make any field as a primary key in MS Access:
1.) Open a table in Design View.
2.) Select the field or fields you want to use as the primary key.
3.) Click Design tab.
4.) Click Primary Key symbol from Tools group.
Now that field will work as primary key to the selected table.
Or
Explain various data types in MS Access.
Ans- Data type:
Data type specifies the type of value that can be stored in any given field. The most important property for a field is its data type.
Different data types available in MS Access are following:
i.) Text: It allows short text up to 255 alphanumeric characters.
ii.) Number: It allows to store only numeric data. Example 16, 690 etc.
iii.) Date/Time: This data type stores date and time. for example: 21/10/1990, 11:51am, etc.
iv.) Currency: it stores Currency values with one to four decimal places.
v.) AutoNumber: Automatically generates a numeric counter that can be used to identify each record in a table.
vi.) Yes/No: used for Boolean data i.e., 0 or 1, true or false.
vii.) MEMO: A memo field consists of long text(sentence) with multiple kinds of data. For example Hi! I am Ruby from Delhi; I arrived at 10:30 am by bus etc.
SECTION-D
Q20.) What is HTML? Explain basic structure of html with example.
Ans- HTML stands for HYPERTEXT MARKUP LANGUAGE. HTML is a language of the web. It’s used to design the web pages. Html is not a case sensitive language. Case insensitive means there is no difference in upper case and lower case.
<!DOCTYPE html> <html>
<head>
<title>Page Title</title>
</head>
<body>
<h2>Heading Content</h2>
<p>Paragraph Content</p>
</body>
</html>
<HTML> Tag: This tag is used to tell the browser that it is a kind of html document. Opening tag <html> is written on the top and closing tag </html> written in last of the document.
Syntax:
<html> …………….</html>
<HEAD> Tag: The <head> element is a container for metadata (data about data) and is placed between the <html> tag and the <body> tag.
Syntax:
<head>. …</head>
<TITLE> Tag: The HTML <title> element is used to define the title of the document. The <title> element must be placed between <head> element, and one document can only have one title element.
Syntax:
<head> <title> title name </title> </head>
<BODY> Tag: HTML <body> tag defines the main content of an HTML document which displays on the browser. It can contain text content, paragraphs, headings, images, tables, links, videos, etc.
Syntax
<body> Place your Content here……..</body>
Or
Explain Description/Definition list in HTML with example.
Ans- Description/Definition Lists:
A definition list is a list of terms and corresponding definitions. Definition lists are typically formatted with the term on the left with the definition following on the right or on the next line. The Definition List is created using the (Definition List) element. The , and tags are used to define description list. The 3 HTML description list tags are given below:
<dl>tag defines the description list.
<dt>tag defines data term.
<dd>tag defines data definition (description).
Example:
<html>
<body>
<h1>The dl, dd, and dt elements</h1>
<p>These three elements are used to create a description list:</p>
<dl>
<dt>Coffee</dt>
<dd>Black hot drink</dd>
<dt>Milk</dt>
<dd>White cold drink</dd>
</dl>
</body>
</html>
Output:
The dl, dd, and dt elements
These three elements are used to create a description list:
Coffee
Black hot drink
Milk
White cold drink
Q21.) Discuss the importance of safety measures in protecting computer systems from malware and unauthorized access. Also explain the role of Anti-Virus Software.
Ans- As there is very important and personal information is kept in our computer system so it becomes more necessary to use safety measures to protect our computer system from various malwares.
Protection From Malware:
1.) Protect your devices.
2.) Update your operating system and software.
3.) Never click on a popup’s link.
4.) Don’t install too many apps on your devices. Install only the apps you believe you will regularly use and need.
5.) Be cautious when using the internet.
6.) Do not click on unidentified links. If a link seems suspicious, avoid clicking it whether it comes from an email, social networking site, or text message.
7.) Choose the safe websites.
8.) Make sure your passwords are well-chosen and protected.
9.) Don’t use USBs or other external devices unless you own them.
10.) Use a firewall.
11.) Emails requesting personal information should be avoided.
12.) Only Use Trusted Antivirus.
13.) Rely Only on Secure Networks (Encrypted)
14.) Keep a Tight Grip on Your Personal Information.
15.) Stay Up-to-Date on the Latest Attacks.
Antivirus Software:
Antivirus software (computer protection software) is a program(s) that is created to search, detect, prevent and remove software viruses from your system that can harm your system.
Here are some popular antivirus software’s are as follows:
McAfee, Norton, avast, avg, kespersky, bitdefender etc.
Or
What is Malware? Explain any three types of malwares.
Ans- Malware: Malware is short for malicious software and refers to any software that is designed to cause harm to computer systems, networks, or users. Malware can take many forms. It’s important for us to be aware of the different types of malware and take steps to protect our systems, such as using antivirus software, keeping software and systems up-to-date, etc.
Types of Malwares:
i.) Viruses – A virus is a type of malware that copies itself to spread to other devices. The virus spreads when an infected file is passed from system to system. Viruses can be harmless or they can modify or delete data. Opening a file can trigger a virus. Once a program virus is active, it will infect other programs on the computer.
ii.) Adware – Adware is a type of malware that displays unwanted advertisements on computers and mobile devices. It displays unwanted ads and pop-ups on the computer. It comes along with software downloads and packages.
iii.) Ransomware: – Ransomware is a type of malware that can lock your files and computer and then demand a ransom for its release. The user has to pay a ransom (price) to the criminals to retrieve data. Once the amount is paid the victim can resume using his/her system.
Computer Science Marking Scheme 1 | |
Computer Science Model Paper 2 | |