Haryana Board (HBSE) Class 10 Computer Science Question Paper 2024 Answer Key. HBSE Class 10 Computer Science Question Paper 2024. Haryana Board Class 10th Computer Science Solved Question Paper 2024. HBSE Class 10 Question Paper 2024 PDF Download. HBSE Computer Science Solved Question Paper 2024 Class 10. HBSE 10th Computer Science Solved Question Paper 2024. HBSE Class 10 Computer Science Question Paper Download 2024. HBSE Class 10 Computer Science Solved Question Paper 2024.
HBSE Class 10 Computer Science Question Paper 2024 Answer Key
1. Explain table tag with its attributes.
Answer – HTML Tables allow you to arrange data into rows and columns on a web page. An HTML table is created using the <table> tag.
<tr> to define table rows
<th> for table headers
<td> for table data cells
Example :
<table>
<tr>
<th>Month</th>
<th>date</th>
</tr>
<tr>
<td>January</td>
<td>14/01/2025</td>
</tr>
</table>
• Table tag attributes : border, cellpadding, cellspacing, width, height, align, bgcolor, style.
OR
Explain image tag with its attributes.
Answer – The HTML <img> tag is used to embed an image in a web page. The <img> tag has two required attributes :
src – Specifies the path to the image
alt – Specifies an alternate text for the image
Syntax :
<img src=”url” alt=”alternatetext”>
<img src=”girl.jpg” alt=”girl image”>
<img src=”girl.gif” alt=”girlpic” width=”128″ height=”128″>
2. Explain FTP protocol.
Answer – FTP stands for File transfer protocol.
• FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from one host to another.
• It is mainly used for transferring the web page files from their creator to the computer that acts as a server for other computers on the internet.
• It is also used for downloading the files to computer from other servers.
Objectives of FTP :
• It provides the sharing of files.
• It is used to encourage the use of remote computers.
• It transfers the data more reliably and efficiently.
Control Connection : Through control connection, we can transfer a line of command or line of response at a time. The control connection is made between the control processes. The control connection remains connected during the entire interactive FTP session.
Data Connection : Data connection is made between data transfer processes. The data connection opens when a command comes for transferring the files and closes when the file is transferred.
OR
Explain TELNET.
Answer – TELNET stands for Teletype Network.
• Telnet is a protocol used to access a remote machine.
• Telnet allows users to virtually access a computer and provides a two-way collaborative and text-based communication channel between two machines.
• Telnet is commonly used by terminal emulation programs that allow you to log into a remote host.
• It can also be used for terminal-to-terminal and interprocess communication.
• Other protocols like FTP also use TELNET to establish a protocol control channel.
Uses of TELNET :
• Remote Administration and Management
• Network Diagnostics
• Understanding Command-Line Interfaces
• Automation and Scripting
Advantages of TELNET :
• It provides remote access to someone’s computer system.
• Telnet saves a lot of time.
• The oldest system can be connected to a newer system with telnet having different operating systems.
Disadvantages of TELNET :
• Data is sent here in the form of plain text, that’s why it is not so secure.
• Some capabilities are disabled because of improper interlinking of the remote and local devices.
3. Define Internet, Web Server and Web Page.
Answer : Internet – The Internet is a global system of interconnected computers that uses a standardized Internet Protocol suite for communication and information sharing. There are billions of computers and other electronic devices connected to the Internet on a worldwide scale.
• Web server – Web server is a program which processes the network requests of the users and serves them with files that create web pages.
• Web page – Web page is a document that contains information and content on a website, and is viewed in a web browser
OR
Write a note on E-mail and its structure.
Answer – Electronic mail is a computer-based application to exchange messages from one computer to another computer through the Internet.
• It allows us to send and receive messages, including attachments, organize and delete mail, and forward and reply to messages.
• Email is widely used for communication and information exchange.
• It is widely used in education, business, technical communication, etc.
• An email address can be assigned only to one user.
Every valid email address has 3 parts:
(i) Local part (username)
(ii) @ Symbol
(iii) Domain
Example :
[email protected], ABC is the local part, and gmail.com is the domain.
Gmail, Yahoo, and Outlook are mostly used emails.
4. Write a note on Malware and Adware.
Answer : Malware – Malware, short for malicious software, is any software intentionally designed to harm, exploit systems, mobile devices, networks, or data or even the servers. Cybercriminals use malware to steal sensitive information, gain unauthorized access, or demand ransoms from individuals or organizations.
• Adware – Adware is the software that automatically displays or downloads advertising material (pop up advertisements), often unwanted, when a user is online. It’s mostly used by companies to generate revenue by showing ads to the user, often within a web browser or during installation process of free software.
5. Write advantages of database.
Answer – The advantages of database management systems are :
• Data Security : A Database Management System (DBMS) provides a better platform for data privacy and security policies thus, helping companies to improve Data Security.
• Data integration : Due to the Database Management System we have access to well-managed and synchronized forms of data thus it makes data handling very easy and gives an integrated view of how a particular organization is working.
• Data abstraction : The major purpose of a database system is to provide users with an abstract view of the data.
• Reduction in data Redundancy : DBMS provides the feature to prevent the input of duplicate items in the database. e.g. – If there are two same students in different rows, then one of the duplicate data will be deleted.
• Data sharing : A DBMS provides a platform for sharing data across multiple applications and users, which can increase productivity and collaboration.
• Data consistency and accuracy : DBMS ensures that data is consistent and accurate by enforcing data integrity constraints and preventing data duplication.
• Data organization : A DBMS provides a systematic approach to organizing data in a structured way, which makes it easier to retrieve and manage data efficiently.
• Efficient data access and retrieval : DBMS allows for efficient data access and retrieval by providing indexing and query optimization techniques that speed up data retrieval.
• Concurrency and maintained Atomicity : If some operation is performed on one particular table of the database, then the change must be reflected for the entire database. The DBMS allows concurrent access to multiple users by using the synchronization technique.
6. Explain linking tag with its attributes.
Answer – The HTML anchor tag defines a hyperlink that links one page to another page. It can create hyperlink to other web page as well as files, location, or any URL. The “href” attribute is the most important attribute of the HTML a tag. and which links to destination page or URL.
Syntax :
<a href = “………..”> Link Text </a>
<a href=”next.html”>Click for next Page</a>
7. What are container and empty elements in HTML?
Answer – Container tags are those tags that have both opening and closing tags.
<html>…. </html>, <head>…</head>, <title>…</title>,
<h1>…. </h1>
to <h6>…</h6>, <body>…. </body>
• Empty tags – Empty tags are those tags that only have an opening tag. Elements with no closing tag are known as empty tag.
e.g. <br>, <link>, <img>, <hr>, <meta>, <source> etc.
8. What is Ransomware?
Answer – Ransomware is a type of malware which prevents you from accessing your device and the data stored on it, usually by encrypting your files. A criminal group will then demand a ransom in exchange for decryption.
OR
What is Trojan horse?
Answer – It is malicious code in nature and has the capacity to take control of the computer. This code is designed to steal, damage, or do some harmful actions on the computer. It tries to deceive the user to load and execute the files on the device. After its execution, this allows cybercriminals to perform many actions on the user’s computer like deleting data, modifying data, and more.
Features of Trojan Horse :
• It steals sensitive information like a password.
• It can be used to allow remote access to a computer.
• It can be used to delete data on the user’s computers.
9. Write a note on transmission media.
Answer – Transmission media is a communication channel that carries the information from the sender to the receiver. Data is transmitted through the electromagnetic signals. The main functionality of the transmission media is to carry the information in the form of bits through LAN (Local Area Network). It is a physical path between transmitter and receiver in data communication.
10. What is computer network? What is its need?
Answer – Computer network is defined as a collection of two or more computing devices linked together for transmitting and sharing information. A network connection between these computing devices can be established using cable or wireless media.
Need of computer network :
• Computer Networks provide better connectivity.
• Computer Networks help in operating virtually
• Integrate on a large scale.
• Fast response in case conditions change.
• Provides data security.
11. Explain LAN.
Answer – LAN stands for Local Area Network. It’s a network that connects computers and devices within a small geographical area, like a home, office, or school building.
12. Full form of HTML is …………… .
Answer – HyperText Markup Language
13. Full form of URL is …………… .
Answer – Uniform Resource Locator
14. Full form of Wi-Fi is …………… .
Answer – Wireless Fidelity
15. In database, …………… key is used to identify the row uniquely.
Answer – Primary
16. …………… tag is used to list items in HTML.
Answer : <li>
17. Forms is a component of MS-Access. (True / False)
Answer – True
18. There are …………… heading levels in HTML.
(a) 2
(b) 6
(c) 4
(d) 5
Answer – (b) 6
19. Bgcolor is an attribute of …………… tag.
(a) Body
(b) Image
(c) Title
(d) None
Answer – (a) Body
20. In HTML, …………… tag is used to make text bold.
(a) <Bo>
(b) <Bold>
(c) <B>
(d) <t>
Answer – (c) <B>
21. In HTML, size is an attribute of …………… tag.
(a) <Font>
(b) <TITLE>
(c) <Body>
(d) None
Answer – (a) <Font>