HBSE Class 10 Computer Science Question Paper 2025 Answer Key

Haryana Board (HBSE) Class 10 Computer Science Question Paper 2025 with a fully solved answer key. Students can use this HBSE Class 10 Computer Science Solved Paper to match their responses and understand the question pattern. This BSEH Computer Science Answer Key 2025 is based on the latest syllabus and exam format to support accurate preparation and revision for the board exams.

HBSE Class 10 Computer Science Question Paper 2025 Answer Key

1. Explain image tag with its attributes.
Answer – The image tag <img> is used in HTML to display images on a web page. It is an empty tag, meaning it does not require a closing tag. The most commonly used attributes are src, which specifies the path of the image file; alt, which provides alternative text if the image cannot be displayed; width and height, which define the size of the image; and border, which sets the border thickness around the image.

OR

Write note on transmission media.
Answer – Transmission media refers to the medium through which data is transmitted from one computer to another. It can be classified into guided media such as twisted pair cable, coaxial cable, and optical fibre, and unguided media such as radio waves, microwaves, and satellite communication. Transmission media plays an important role in determining speed, cost, and reliability of data communication.

2. Explain any four threats to computer.
Answer – Computer threats are harmful activities that can damage data or systems. Virus is a malicious program that replicates itself and corrupts files. Worm spreads automatically through networks without user action. Trojan horse appears as useful software but performs harmful activities in the background. Spyware secretly collects user information such as passwords and browsing habits without permission.

OR

Explain safety measures to be taken to prevent computer threats.
Answer – To prevent computer threats, users should install updated antivirus software and scan systems regularly. Strong passwords must be used and changed periodically. Unknown email attachments and untrusted websites should be avoided. Regular data backup should be maintained to prevent loss due to malware attacks.

3. Explain FTP protocol.
Answer – FTP (File Transfer Protocol) is a standard internet protocol used to transfer files between a client and a server over a network. It allows users to upload, download, delete, and rename files on a remote computer. FTP works on the client-server model and is commonly used for website file management.

OR

Explain TELNET protocol.
Answer – TELNET is a network protocol used to remotely access another computer over a network. It allows a user to log into a remote system and execute commands as if working locally. TELNET is text-based and is less secure because data is transmitted without encryption.

4. Write structure of E-mail.
Answer – An e-mail consists of two main parts: header and body. The header includes fields such as To, From, Subject, CC, and BCC. The body contains the actual message content, which may include text, images, or attachments. The structure helps in proper communication and message identification.

OR

Write note on search engine and blog.
Answer – A search engine is a software system that helps users find information on the internet using keywords, such as Google or Bing. A blog is an online platform where individuals or organizations publish articles or posts regularly. Blogs are commonly used for sharing knowledge, opinions, and updates.

5. What is cloud computing?
Answer – Cloud computing is a technology that provides computing resources such as storage, software, and processing power over the internet instead of local systems. It allows users to access data anytime and anywhere without installing applications locally.

6. What is computer network? What is its need?
Answer – A computer network is a group of interconnected computers that share data and resources. The need for networking includes data sharing, resource sharing like printers and internet, faster communication, and cost reduction.

7. Give advantages of Database.
Answer – A database provides efficient data storage and management. It reduces data redundancy, ensures data security, allows easy data retrieval, and supports multi-user access. Databases also help in maintaining data accuracy and consistency.

8. Write steps to create table in design view.
Answer – To create a table in design view, first open the database and select the Create option. Choose Table Design, then define field names and data types. Set the primary key if required and save the table with an appropriate name.

9. Explain body tag and its attributes.
Answer – The <body> tag contains the visible content of a web page. Its attributes include bgcolor for background color, text for text color, background for background image, and link or vlink for hyperlink colors.

OR

What are container and empty tags?
Answer – Container tags have both opening and closing tags, such as <html> and </html>. Empty tags do not have closing tags and perform a single function, such as <br> and <img>.

10. Explain anchor tag and its attributes.
Answer – The anchor tag <a> is used to create hyperlinks. Its main attributes are href, which specifies the link destination, target, which defines where the link opens, and title, which provides additional information on hover.

OR

Explain following attributes in ordered list : type and start.
Answer – The type attribute defines the numbering style of an ordered list, such as numbers or letters. The start attribute specifies the starting number of the list.

11. What is <TH> and <TR> tag?
Answer – The <TR> tag is used to create a row in an HTML table, while the <TH> tag defines a table heading cell, which appears bold and centered by default.

OR

What are attributes of font tag?
Answer – The font tag attributes include size to define text size, color to set text color, and face to specify font style. (Note: font tag is deprecated in modern HTML.)

12. What is Trojan horse?
Answer – A Trojan horse is a malicious program that disguises itself as legitimate software but performs harmful actions such as data theft or system damage when executed.

OR

What is anti-virus?
Answer – Antivirus is a security software designed to detect, prevent, and remove malicious programs from a computer system.

13. What is Bluetooth?
Answer – Bluetooth is a short-range wireless communication technology used to exchange data between devices such as mobile phones, laptops, and headphones.

14. Define primary key.
Answer – A primary key is a field in a database table that uniquely identifies each record. It cannot have duplicate or null values.

15. (i) Full form of HTML is ………….
Answer – Hyper Text Markup Language

(ii) Full form of URL is …………
Answer – Uniform Resource Locator

(iii) Full form of WAN is …………
Answer – Wide Area Network

(iv) The tags in HTML are case sensitive. (True / False)
Answer – False

(v) Spyware is a threat to computer. (True / False)
Answer – True

(vi) ………….. tag is used to make text bold.
Answer – <b>

(vii) …………. is the largest heading tag in HTML.
(A) H1
(B) H4
(C) H6
(D) H9
Answer – (A) H1

(viii) …………… tag is used to create unordered list.
(A) <li>
(B) <ol>
(C) <uo>
(D) <ul>
Answer – (D) <ul>

(ix) Communication protocol used by Internet is ………….
(A) HTTP
(B) WWW
(C) TCP/IP
(D) None
Answer – (C) TCP/IP

(x) Correct sequence of HTML tags for webpage is ………..
(A) HTML, HEAD, TITLE, BODY
(B) HTML, TITLE, HEAD, BODY
(C) HEAD, TITLE, HTML, BODY
(D) BODY, HEAD, HTML, TITLE
Answer – (A) HTML, HEAD, TITLE, BODY