Check CBSE Class 10 Computer Applications Sample Question Paper for the Board Exam 2021. We have provided here the new sample paper and marking scheme for the Class 10 Computer Application subject for free PDF download. CBSE Board Question Paper will be entirely based on the format used in this latest sample paper. Also, the marks allotment during the evaluation of the candidates' answer sheets will be done according to that mentioned in the latest CBSE Class 10 Computer Applications Marking Scheme. Therefore, students are advised to practice with the CBSE sample paper and marking scheme to score well in their upcoming CBSE Class 10 Board Exam 2021.
CBSE Sample Paper for Class 10 Computer Applications (Code 165):
Maximum Marks: 50
Time Allowed: 2 hours
General Instructions:
1. This question paper contains two parts A and B. Each part is compulsory.

2. Part A carries 20 marks while part B carries 30 marks.
3. Part-A consists very short answer and case-based MCQ Questions and Part-B is Descriptive Paper.
4. Both Part A and Part B have choices.
Part – A:
1. It consists two sections- I and II.
2. Section I has 13 questions of very short answer type. An examinee is to attempt any 10 out of 13 questions.
3. Section II has two case studies. Each case study has 7 case-based sub-parts. An examinee is to attempt any 5 out of 7 sub-parts.
Part – B:
1. Question No. 16 to 20 are short answer Type (SA-I) questions of 2 mark each, Question No 21 to 25 are Short Answer Type (SA-II) questions of 3 marks each and Question No 26 is Long Answer Type question of 5 marks.
2. Internal choice is provided in 1 question of 2 marks, 1 question of 3 marks and 1 question of 5 marks.
Part-A
Section-I
This section consists of 13 questions of very short answer type. Question no. 4 to 8 are of 'fill in the blank' type. Fill the blank with the most appropriate answer. Attempt any 10 questions from question no 1 to 13.
1. What is a Homepage?
2. Which heading element gives the most prominent headings?
3. Give one use of anchor tag.
4. _____ tag is used for a horizontal line.
5. An empty HTML element has a _____ tag but no _____ tag.
6. _____ tag creates a bulleted list.
7. The code for inserting an image in an HTML page is <imgsrc=" " alt=" ">. The alt attribute is used for _____ .
8. Ravi was trying to log-in to his net-banking account. He noticed that the URL of the net banking starts with 'https'. The 's' in 'https' stands for _____.
9. Sarita is designing a webpage and wants to change the name of the font (font-type) for certain text. Which attribute of the FONT tag she should use.
10. What is the use of <br> tag in HTML Code?
11. What is the significance of the URL?
12. What is the importance of vlink attribute of <BODY> tag?
13. What is the method of using comment line in the HTML code?
Also Check: CBSE Class 10 Computer Applications Question Paper 2020
Section-II
Both the Case study based questions are compulsory. Attempt any 5 questions (out of 7 questions) from each case study. Each question carries 1 mark.
14. Internet Protocols For communication over the Internet, the communicating devices must follow certain rules. These rules are called Internet protocols. For email communication, we use SMTP Page 3 of 9 and POP. For communication between browser and server HTTP and HTTPS protocols are used. We can use TELNET to access services available on a remote computer.
(i) Which of the following is an Internet Protocol.
a) HTTP
b) FTP
c) both (a) and (b)
d) None of the above
(ii) SMTP protocol is
a) used for composing an email message.
b) used in receiving incoming emails by pulling the message from server to client
c) used in sending outgoing emails by pushing the message from client to server
d) None of the above
(iii) POP protocol is
a) used for composing an email message.
b) used in receiving incoming emails by pulling the message from server to client
c) used in sending outgoing emails by pushing the message from client to server
d) None of the above
(iv) Which of the following internet protocols provides secure data transmission between server and browser with the help of encryption.
a) HTTP
b) HTTPS
c) TELNET
d) ARPANET
(v) The full form of POP (email protocol) is
a) Post Order Protocol
b) Push Order Protocol
c) Post Office Protocol
d) Pull Over Protocol
(vi) Which of the following protocol is used for delivering data from the source to the destination.
a) TCP
b) IP
c) SMTP
d) ARPANET
(vii) The Full Form of SMTP is
a) Secure Mail Transfer Protocol
b) Secure Mail Transmit Protocol
c) Simple Mail Transmit Protocol
d) Simple Mail Transfer Protocol
15. Secure data transmission Secure data transmission means that data/information is not being received or modified by an unauthorized person, over a network, from source to destination. For secure data transmission, we can convert an actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he/she receives an unreadable message that cannot be easily converted into the actual message. The unreadable message can be converted to the original message by the receiver at the destination.
Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each 'A' will be replaced by 'D' (Letter 'D' is 3 positions down Letter 'A' in the alphabet), each 'B' will be replaced by 'E' and similarly, each 'Z' will be replaced by 'C'. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption.
(i) .Secure data transmission means
a) Data can be accessed by any unauthorized person during transmission.
b) Data can not be accessed by any unauthorized person during transmission.
c) Transmission of data
d) None of the above
(ii) Which of the following techniques can be used for security of data.
a) Authentication
b) Authorisation
c) Encryption
d) All of the Above
(iii) Caesar Cipher is
a) used for conversion of the actual message into an encrypted message
b) an encryption technique
c) both (a) and (b)
d) None of the above
(iv) Person 'X' has received an encrypted message and wants to convert this message into the actual message (message before encryption). The technique he should use is called
a) Conversion
b) Encryption
c) Decryption
d) None of the above
(v) A sender wants to send a message having the text as 'COMPUTER' to a receiver using 4 as the key. What will be the encrypted message?
a) GSQTZXIV
b) GSQTYXIV
c) GSXTYXIV
d) GSQSYXIV
(vi) An encryption algorithm is used to transform a readable message into:
a) Text message
b) Simple message
c) Converted message
d) Encrypted message
(vii) In Ceaser Cipher, for which of the following values of key, the encrypted message will be the same as original message.
a) 0
b) 26
c) both (a) and (b)
d) None of the above
.
.
.
Download the complete sample paper and its marking scheme from the following links:
Also Check:
CBSE Class 10 Sample Papers and Marking Scheme 2021 - All Subjects
Check CBSE Class 10 Complete Study Material & Preparation Guide for Board Exam 2021