Home   »   CBSE Class 10 Computer MCQ

CBSE Class 10 Computer MCQ with Answers

Class 10 Computer MCQ

Class 10 Computer MCQ: Preparing for your Computer Applications does not require a large amount of time, but rather a little amount of effort and understanding of computers and their applications. Computer Applications, in contrast to more difficult subjects that demand consistency, hard work, and some skill, is a simple subject. We’ve got your back at Adda247. We’re all aware of how difficult it is for you to study for the exams. To help you reach your objectives, we’ve put up a selection of MCQs that will help you prepare for the CBSE Class 10  Computer MCQ. The solutions to the CBSE Class 10 Computer Science MCQs are also included in this post. Check out CBSE Class 10 Computer Applications Important MCQ Questions With Answers before you leave, and good luck on your CBSE Class 10 Computer Applications MCQ for exam!

CBSE Class 10 Computer MCQ

Q. General purpose computer are used for:

(A) Creating a small database

(B) Performs calculation

(C) Accounting

(D) All of the above

Answer: (D) All of the above

Q. The basic goal of the computer process is to convert data into:

(A) Graphs

(B) Files

(C) Tables

(D) Information

Answer: (D) Information

Q. The following has highest Access time:

(A) Magnetic disk

(B) Swapping devices

(C) Floppy disk

(D) Cache

Answer: (A) Magnetic disk

Q. Error detection at data link level is achieved by the following

(A) Equalization

(B) Bit stuffing

(C) Hamming code

(D) Cyclic redundancy codes

Answer: (D) Cyclic redundancy codes

Q. A hardware device that is capable of executing a sequence of instructions is called

(a) CU

(b) Processor

(c) CPU

(d) ALU

Answer: (b) Processor

Q. Computers that are portable and convenient for users who travel are known as

(A) Laptops

(B) File servers

(C) Supercomputers

(D) Minicomputers

Answer: (A) Laptops

Q. To transfer electronic mail from one machine to another, the following TCP/IP protocol is used

(A) RPC

(B) FTP

(C) SNMP

(D) SMTP

Answer: (D) SMTP

Q. High-resolution, bit-mapped displays are useful for displaying:

(A) more characters

(B) clearer characters

(C) graphics

(D) all of the above

Answer: (A) more characters

Q. The average number of comparisons in sequential search is:

(A) n2

(B) (n+1)/2

(C) n(n+2)/2

(D) n+2/2

Answer: (B) (n+1)/2

Q. The last DML statement processed during a commit transaction is?

(A) INSERT

(B) UPDATE

(C) DELETE

(D) POST

Answer: (A) INSERT

Q. Which of the following are computers that can be carried around easily?

(A) Laptops

(B) PCs

(C) Supercomputers

(D) Minicomputers

Answer: (A) Laptops

Q. The lowest level of input output control consist of

(A) Device drivers

(B) Interrupt handler

(C) both (a) and (b)

(D) None of these

Answer: (C) both (a) and (b)

Q. The following are the standard synchronous communication protocol except?

(A) SLIP

(B) SDLC

(C) PAS

(D) SMTP

Answer: (C) PAS

Q. The output of a lexical analyzer is:

(A) A parse tree

(B) Intermediate code

(C) Machine code

(D) A stream of tokens

Answer: (D) A stream of tokens

Q. Following is the Special software to create a job queue:

(A) Interpreter

(B) Linkage editor

(C) Spooler

(D) Drive

Answer: (C) Spooler

Q. First supercomputer developed in India is

(A) SHIVA

(B) PARAM

(C) ARYA BHATT

(D) BUDDHA

Answer: (B) PARAM

Q. The time required for a gate or inverter to change its state is called

(A) Propagation time

(B) Decay time

(C) Charging time

(D) Rise time

Answer: (A) Propagation time

Q. Standard for MODEM is drawn up by the following organisation:

(A) Hayes

(B) AT and T

(C) BELL

(D) CCITT

Answer: (D) CCITT

Q. The following topology has highest reliability:

(A) Ring

(B) Mesh

(C) Bus

(D) Star

Answer: (B) Mesh

Q. Which of the following is NOT associated with Computers?

(A) Screen

(B) Mouse

(C) Bit

(D) Pencil

Answer: (D) Pencil

Q. Supercomputer developed by Indian scientists

(A) Blue Gene

(B) Param

(C) Super301

(D) Compaq Presario

Answer: (B) Param

Q. Dirty bit is used to show the

(A) Page with corrupted data

(B) The wrong page in the memory

(C) Page that is modified after being loaded into cache memory

(D) Page that is less frequently accessed.

Answer: (C) Page that is modified after being loaded into cache memory

Q. The following is the unstable sorting method?

(A) Insertion sort

(B) Bubble sort

(C) Merge sort

(D) Heap sort

Answer: (D) Heap sort

Q. Personal computers can be connected together to form a: 

(A) Enterprise

(B) Network

(C) Supercomputer

(D) Server

Answer: (B) Network

Q. The garbage collector

(A) is critical for efficient virtual memory system

(B) Prevents fragmentation from occurring

(C) Is mostly used with fixed partition

(D) Collects fragmented areas of memory

Answer: (D) Collects fragmented areas of memory

Q. The correct HTML code to display(P+Q)2 is:

a.<SUB>(P+) 2</SUB>

b.P+Q<SUP> 2</SUP>

c.(P+Q)<SUP> 2</SUP>

d.<SUP>(P+Q) 2</SUP>

Q. Which HTML tags cause browsers to render text as italics?

a.<text style = “italics”></text>

b.<ital.></ital.>

c.<i></i>

d.<b></b>

Q. The correct HTML code for inserting an image is:

a.<img herf=”image.gif”>

b.<img>image.gif</gif>

c.<image src = “image.gif”>

d.<img src = “image.gif”>

Q. Which attribute is NOT valid for the <body>tag?

a.background

b.color

c.vlink

d.bgcolor

Q. ____________attribute is used to specify the location of an image file.

a.alt

b.src

c.align

d.name

Q. Which of the following is NOT an example of Intellectual Property rights?

a.Patent

b.Trademark

c.Password

d.Industrial Design

Q. The_________ attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason.

a.alt

b.alternate

c.tooltip

d.text

Q. While creating a Web document, which unit is used to express an image’s height and width?

a.Centimeters

b.Pixels

c.Dots per inch

d.Inches

Q. Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as________________

a.Encryption

b.Decryption

c.Plagiarism

d.Data Security

Q. The default alignment of images, that are inserted in Web page, is:

a.left

b.right

c.inline with text

d.middle

Q. Which of the following techniques can be used for security of data?

a.Authentication

b.Authorisation

c.Encryption

d.All of the Above

Q. Which of the following is not a cybercrime?

a.Plagiarism

b.Phishing

c.using licensed software

d.hacking

Q. _________ is a software for which exclusive rights of modification in the source code remain with the owner.

a.Free Open-Source Software

b.Freeware

c.Open-Source Software

d.Proprietary Software

Q. A _______________ is the right given by the government to an inventor to protect his/ her invention from being used/copied for a fixed period of time.

a.Copyright

b.Intellectual Property

c.Patent

d.Trademark

Q. Which of these is NOT an attribute of the font tag?

a.color

b.face

c.type

d.size

Q. The <_________><________> tag displays text in subscript form.

a.sub

b.sup

c.sups

d.subs.

Q. HTML tag to draw horizontal line:

a.<hl>

b.<hr>

c.<hline>

d.None of the above

Q. Secure data transmission means

a) Data is accessible by any unauthorized person during transmission.

b) Data can not be accessed by any unauthorized person during transmission.

c) Transmission of data happens easily

d) No one can access it

 

CBSE Class 10 Computer MCQ All Chapters

1 Which one of the following software comes under Open-Source Software category?

a.  Photoshop

b.  Ms-Paint

c.  Linux

d.  Windows

2 HTML tag to draw horizontal line:

a.  <hl>

b.  <hr>

c.  <hline>

d.  None of the above

3 Secure data transmission means

a)  Data is accessible by any unauthorized person during transmission.

b)  Data can not be accessed by any unauthorized person during transmission.

c)  Transmission of data happens easily

d)  Noone can access it

4 The correct HTML code to display(P+Q)2 is:

a.  <SUB>(P+) 2</SUB>

b.  P+Q <SUP> 2 </SUP>

c.  ( P + Q)<SUP> 2 </SUP>

d.  <SUP> (P+Q) 2</SUP>

5 Which HTML tags cause browsers to render text as italics?

a.  <text style = “italics”></text>

b.  <ital.></ital.>

c. <i></i>

d. <b></b>

6 The correct HTML code for inserting an image is :

a.  <img href=”image.gif”>

b.  <img> image.gif</gif>

c.  <image src = “image.gif”>

d.  <img src = “image.gif” >

 

7 Which attribute is NOT valid for the <body> tag?

a. background                                b. color

c. vlink                                           d. bgcolor

8                         attribute is used to specify the location of an image file.

a.  alt

b.  src

c.  align

d.  name

9 Which of the following is NOT an example of Intellectual Property rights?

a.  Patent

b.  Trademark

c.  Password

d.  Industrial Design

10 The                   attribute of <img> tag specifies an alternate text for an image, if the image cannot be displayed due to any reason.

a.  alt

b.  alternate

c.  tooltip

d.  text

11 While creating a Web document, which unit is used to express an image’s height and width?

a.  Centimeters

b.  Pixels

c.  Dots per inch

d.  Inches

12 Preeti needs to send a very confidential message to her colleague in office over a secure channel. She uses a technique wherein an actual message (which is in readable form) can be converted into an unreadable message. This concept is known as_                                                                                                   

a.  Encryption

b.  Decryption

c.  Plagiarism

d.  Data Security.

13 Which is the correct way to comment out something in HTML?

a.  Using ## and #

b.  Using <!– and –>

c.  Using </– and -/->

d.  Using <!– and -!>

14 The default alignment of images, that are inserted in Web page, is:

a.  left

b.  right

c.  inline with text

d.  middle

15 Which of the following techniques can be used for security of data?

a.  Authentication

b.  Authorisation

c.  Encryption

d.  All of the Above

 

16 Which of the following is not a cybercrime?

a.  Plagiarism

b.  Phishing

c.  using licensed software

d.  hacking

17                    is a software for which exclusive rights of modification in the source code remain with the owner.

a.  Free Open-Source Software

b.  Freeware

c.  Open-Source Software

d.  Proprietary Software

18. A                                is the right given by the government to an inventor to protect his/ her invention from being used/copied for a fixed period of time.

a.  Copyright

b.  Intellectual Property

c.  Patent

d.  Trademark

19 Which of these is NOT an attribute of the font tag?

a.  color

b.  face

c.  type

d.  size

20 The <                  > tag displays text in subscript form.

a.  sub

b.  sup

c.  sups

d.  subs.

Section-B

This section contains 20 questions. Answer any 16 questions.

21 Arun clicks on a link received in a message on his phone which promises him a complimentary trip to a destination of his choice. He forwarded this message to his friend, Panshul and asked him to do the same. But Panshul refuses and tells Arun that his personal and private information, such as online account names, login information and passwords can be stolen and he should be careful of such                                                  attacks.

a.     Phishing

b.     Spamming

c.     Scamming

d.     Plagiarism

 

22 Consider the following HTML code:

<ol type=’i’>

<li>First</li>

<li>Second</li>

<li>Third</li>

<li>Fourth</li>

</ol>

 

Choose the correct output that would be shown upon execution of the above code , from the choices given below:

 

a.         I.    First                               b.     i. First

II.       Second                                  ii. Second

III.  Third                                      iii. Third

IV.   Fourth                                    iv. Fourth

 

 

 

c.         I     First                              d.      i    First

II        Second                                  ii Second

III    Third                                     iii Third

IV     Fourth                                   iv Fourth

23 Charlene is an artist. She displays her artwork on the Internet using her website to attract buyers. One day while browsing the Internet she discovers that another artist has displayed her painting portraying it as his own. Which right of Charlene was infringed?

a.    Digital Privacy right

b.  Intellectual Property right

c.  Digital Property right

c. Intellectual Privacy right

24 Which of the following will result in the largest text size? a. <H3>                                 b. <H6>

c. <H2>                    d. <H4>

25 We can create a numbered list using the                      tag.

a. <UL>                   b. <list>

c. <OL>                   d. <DL>

26 Which of these is NOT an example of Cyber bullying?

a.  Copying a classmate’s personal photo against his/her permission from his social media account and sending it to other friends on their emails

b.  Bullying a classmate in the school corridor.

c.  Threatening someone on whatsapp.

d.  Posting mean messages about someone on their social media.

27 Identify which of the following type of list will create a bulleted list.

a. Unordered                             b. Ordered

c. Definition                               d. Numbered

 

28 Which sequence of HTML tags is correct?

a.  <html><head><title></title></head><body></body></html>

b.  <html><head><title><body></title></head></body></html>

c.  <html><head><title</head><body></body>></title></</html>

d.  <html><head><title><body></body ></title></head ></html>

29 Pratham is excited to use a new software which is freely available to download but he cannot modify or change the source code. Pratham is using

a.  Freeware

b.  Open-Source Software

c.  Both a and b

d.  None of the above

30 Priyanshu has written the following code snippet as part pf an HTML program.

 

<B> Mystery Moon </B>

 

Predict the output of the above from the following:

a.    Mystery Moon

b.  Mystery Moon

c.  Mystery Moon

d.  Mystery Moon

31 Consider the following code:

 

<img src=”Computers.jpg” width=”                  ” height=”                                                             ”>

Fill in the blanks to set the image size to be 250pixels wide and 400 pixels tall. a. 250, 400

b.400, 250

c. <250><400>

d. <400><250>

32 Tag (s) required to create Description lists in HTML:

a.  <DL>

b.  <DT>

c.  <DD>

d.  All of the above

33 Which of the following is NOT a reason for the digital divide in different demographic regions?

a.  Cost of Technology

b.  Lack of information

c.  Lack of access to high performance computers

d.  Lack of access to the disabled.

 

34 One of the most popular method of encrypting data is Ceaser cipher where original data is replaced by a key character like if key is -2 than ‘a’ will be replaced by ‘y’, ‘b’ is replaced by ‘z’ and so on.

If the key is 2 i.e. Every letter is replaced by its next to next letter means the letter ‘A’ will be replaced by ‘C’, the letter ‘B’ is replaced by ‘D’, and so on then what will be the replacement of the word ‘CoMpUtEr’.

a.  Eqorwvgt

b.  eQOrwVtG

c.  eqroWVTG

d.  EqOrWvGt

35 Consider the following form control in a HTML form:

Male       Female

Now choose the correct line of code for the above :

a.

<input type = “radio” name= “Gender” value= “male”>Male<br>

<input type = “radio” name= “Gender” value= “female”>Female<br> b.

<input type = “radiobutton” name= “Gender” value= “male”>Male<br>

<input type = “radiobutton” name= “Gender” value= “female”>Female<br> c.

<input type = “radio”, name= “Gender”>< value= “male”>Male

<input type = “radio”, name= “Gender”>< value= “female”>Female d.

<input type = “radio” name= “Gender” value= “male”><br>

<input type = “radio” name= “Gender” value= “female”><br>

36 Gagandeep has written the following code to display an image in the background of HTML document:

<BODY BgGround= “Animals.jpeg”>

but he is not getting the desired output. Help him in identifying correct code from the following

a.  <BODY Bg= “Animals.jpeg”>

b.  <BODY BACK= “Animals.jpeg”>

c.  <BODY BGIMAGE= “Animals.jpeg”>

d.  <BODY BACKGROUND= “Animals.jpeg”>

37 Which of the following is a way to avoid Plagiarism when using material from the Internet?

i.   Citing

ii.   Paraphrasing

iii.    Referencing

iv.   embedding

 

Choose the correct option:

a.  i and ii only

b.  Only i

c.  i, ii and iii only

d.  ii and iv only

 

38 Tag to create password field in HTML document:

a.  <password>

b.    <input>

c.  <pwd>

d.  <pword>

39 Which of the following tag is used to define options in a drop-down selection list?

 

a.  <select>

b.  <list>

c.  <dropdown>

d.  <option>

40 Which of the following is the correct way to create a list using the lowercase letters?

 

a.  <ol alpha = “a” >

b.  <ol type = “a”>

c.  <ol letter = “a”>

d.  None of the above

 

Section-C

Case study based questions

Section C consists of 10 questions. Any 8 questions are to be attempted.

Case Study –I

Geetika has recently created her social accounts. She is very excited as she waited so long to go online. She has recently also got admission in a prestigious high school and does not know many students.

When she logs into her social media a few days later, she finds that someone is posting negative, demeaning comments on her social media profile. She is also getting repeated mails from unknown people. Whenever she goes online, she is trolled by multiple unknown people.

 

Based on the given information, answer the questions NO. 41-45.

41 Geetika is a victim of                :

a.     Eavesdropping

b.     Plagiarism

c.     Phishing

d.     Cyber stalking

42 Which of the following is the most appropriate action she should take?

a.     She should stop going online and delete her social media accounts.

b.     She should NOT share this with anyone as she might face more of such kind of behaviour.

c.     She should file a complaint at the nearest police station.

d.     She should inform her parents and bring to the notice of school authorities.

 

43 After hearing her ordeal, the school decides to publish a set of moral principles that determines the appropriate behavior of students while using the internet. The school is referring

to                    

a.  Intellectual Property rights

b.  Internet Privacy

c.  Computer Ethics

d.  Cyber Ethics

44 Geetika is advised by her best friend, Seerat to protect her personal information from intentional or unintentional attacks by others. This is also known as            

a.     Digital right

b.     Copyright

c.     Data Privacy

d.     Intellectual property

45 The computer teacher of Geetika’s class decides to take an online session on the topic Netiquettes, which generally includes:

a.  safeguarding one’s passwords and sensitive online information

b.  logging out of social media accounts after the session

c.  not bullying or trolling anyone by disrespecting them or passing inappropriate remarks

d.  All of the above.

 

Consider the following code created by Sumantha for a webpage:

<html>

<body bgcolor=”yellow”>

<center>

<h1> Our Country : India <   >———————————— line1

<imgsrc=”india.jpg”>

</center>

<p>

<font color=”red” size=”5″         =”Times New Roman”>——— line2

India is spread over a large geographical area. In terms of area, it is the 7<sup>th</sup> largest country while in terms of population,

it is the 2<sup>nd</sup> largest country in the world.

Some facts about India are as follows<      ></p>————— line3

<ul>

<li>Area :Approx 3.28 million sq. km <_>————————- line4

<li>North to South extension :Approx 3,200 km</li>

<li>East to West extension :Approx 2900 km</li>

<   >——————————————————————– line5

</body>

</html>

 

Based on the given information, answer the questions NO. 46-50.

 

46 Choose the correct option from the following to fill up in line 1:

a.  \h1

b.  \h6

c.  /h6

d.  /h1

47 Choose the correct option from the following to fill up in line 2:

a.  font

b.  face

c.  type

d.  text

48 Choose the correct option from the following to fill up in line 3:

a.  </f>

b.  <f>

c.  </font>

d.  <font>

49 Choose the correct option from the following to fill up in line 4:

a.  <i>

b.  </li>

c.  <\li>

d.  <\i>

50 Choose the correct option from the following to fill up in line 5:

a.  ul

b.  <\ul>

c.  <ul>

d.  </ul>

Sharing is caring!

FAQs

Q. What is the duration of the exam Computer MCQ Class 10 Exam?

Ans. The timing to solve all Class 10 Computer MCQ is 90 minutes.

Q. How many questions are to be answered in Class 10 Computer Paper?

Ans. There will be 50 questions, out of which you have to attempt 40.