Set A: Vedant International Junior College of Science & Commerce Syjc Semester Exam Information Technology
Set A: Vedant International Junior College of Science & Commerce Syjc Semester Exam Information Technology
SET A Name :- AISHWARYA BHAT Roll no :- 1 Stream :- SCIENCE Q. 1 Fill in the Blank (8/10 mks) 1. HTML stands for ______________. Ans.HYPER TEXT MARKUP LANGUAGE Correct 2. Code of ethics supplies norms and ___________. Ans. Principles Correct 3. The receiving of product from originator is called as _____________. Ans. 4. In security procedure the password should contain more than _________ characters. Ans.8 Correct 5. CSS stands for ___________. Ans.CASCADING STYLE SHEET Correct 6. <Input type = "______"> creates a textbox on the web page. Ans.TEXTAREA
7. _____ tag is used with <option> to give list of options. Ans.<SELECT> Correct 8. HTTP stands for ______________. Ans.HYPER TEXT TRANSMISSION PROTOCAL Correct 9. The ___________ tag is used to define several form fields. Ans.<FORM> Correct 10. Converting the data into human readable format is called ______________. Ans.DECRYTION Correct Q.2 True or False (7/10 mks) 1. E- commerce is very reliable. Ans.FALSE Correct E-commerce is not very reliable because if the secruity level is improper then the data may be misused 2. Every browser supports all the HTML tags. Ans.FALSE Correct It depends on compatibility of the browser 3. Linux is a public domain software. Ans.FALSE Correct Linux is a freeware 4. Shareware programs can be copied. Ans.TRUE Correct 5. All browsers do not support frames. Ans.FALSE All browser support frames because frames divide the browser in different parts 6. As per IT act cheques cannot be in electronic form. Ans.TRUE Correct
7. URL is Uniform Source Locator Ans.FALSE URL is Universal Resource Locator 8. WWW stands for Wide World Web Ans.FALSE Correct WWW stands for World Wide Web 9. Digital certificate only uses private key. Ans.FALSE Digital signature uses private and public key. 10. In repeat trade cycle transaction between trading partner is irregular. Ans.FALSE Correct In repeat trade cycle transaction between trading partner is regular and repeated Q. 3 Multiple Choice Answer (One) (15/20 mks) 1.Improvement of trade will ___________ price of products. (a) rise (b) Fall (c) makes stable (d) None of these. Ans.(b)fall 2. Lower down tade will ____________ employment. (a) Increase (b) Decrease (c)Make stable (d) None of above Ans.(b)Decrease 3. _______________ software allows for anyone to use, copy and distribute it with modifications free of cost.
(a) Freeware (b) Public domain software (c)shareware (d)non- freeware. Ans.(a) Freeware Correct 4. A target = ____________ will cause the link to be loaded always in a new blank window. (a) _parent (b)_blank (c)_self (d)_top Ans.(b)_blank 5. <frameset cols = "*,*"> divides screen into ______________. (a)60%,40% (b) 70%,30% (c) 50%,50% (d)25%,75% Ans.(c)50%,50% Correct 6. _________ term is related with the originator who sends the products to the other person. (a)attribution (b) acknowledgement (c) user (d)System analyst. Ans.(b) acknowledgement 7. Improvement of trade will _______________ employment (a)Increase
(b)decrease (c) make stable (d) none of the above. Ans.(a) Correct 8. E - commerce means _____________ (a) education version of commerce (b) buying and selling products and service over the internet. (c) account (d) all of the above. Ans.(b) Correct 9. ________ is the last phase of trade cycle. (a)order (b)payment (c)wholeseller (d)aftersales Ans.(d) Correct 10. The _______ property of a field is used to specify the type of data. (a) Datatype (b) field name (c) Description (d) Size Ans.(a) Correct 11. QBE stands for ___________ (a) Query before extension (b) Query by example (c) Query before editing
(d) Query before expert Ans.(b) Correct 12. Code of ethics do not include _________ (a) Software Piracy (b) Fair treatment (c)Communication (d) Co-operation Ans.(a) Correct 13. Accessing data without permission is known as __________. (a) illegal access (b) unauthorized access (c)legal access (d) without permission Ans.(b) Correct 14. ________ detects and prevents known and unknown viruses which weakens the computer. (a) web browser (b) Email (c)record (d) anti virus Ans.(d) Correct 15. The legal and regulatory aspects of intenet refers to _________. (a) Cyber law (b) Cyber crime (c)Criminal law (d) IT act
Ans.(a) Correct 16. _________ is governed by a system of law and regulation called cyber law. (a) Cyber crime (b)Cyber space (c)Company law (d) Cyber law Ans.(b) Correct 17. A tag specifies how the screen is divided into frame is called ________ (a)HTML (b) document (c) frame (d) Frameset. Ans.(d) Correct 18. ________ value of the method sends information to the server. (a)post (b) submit (c) form (d) get. Ans.(b) 19. _________ element is used to check one element at a time (a) Radio (b) Menu (c) List (d) Checkbox
Ans.(a) Correct 20. Cross browser helps to know ________ (a) Design web page (b) Style of page (c) Difference in rendering of web page (d) Different web page. Ans.(c) Correct Q. 4 Multiple Choice Answer (Two) (10/10 mks) 1. __________ are remedies for stopping software piracy. (a) copying and distribution of software (b) purchasing legitimate licensed product (c)Purchasing Licensed product from the authorized seller (d) software without license. Ans.(b) and(c) Correct 2. E commerce means electronic trading of ___________. (a) services (b) Internet (c)goods (d)money Ans.(a) and(c) Correct 3. Security procedures in E- commerce are ________ (a) encryption (b) documents (c) firewall (d)protection Ans.(a) and(c) Correct
4. Which is a valid physical style in HTML ? (a)<big> (b)<large> (c)<small size> (d)<i> Ans.(d)and Correct 5. The following tags can be used as subtags for <table> tag. (a) <TH> (b)<HR> (c)<BR> (d) <TR> Ans.(a) and(d) Correct Q. 5 Multiple Choice Answer (Three) (6/6 mks) 1. Valid value for <Input type =" -------" > are (a)radio button (b) text (c) textbox (d) checkbox (e) radio Ans.(b),(d)and(e) Correct 2. Pirated software means _______ (a) software with license (b) copied software (c) Unauthorized Duplicate software (d) software without license
Ans.(b),(c)and (d) Correct 3. Execution and settlement phase of trade cycle consist of ___________ (a) search (b)order (c)payment (d)aftersale (e)delivery Ans.(b),(c) and (e) Correct Q. 6 Rearrange the following : (2/4 mks) 1. The procedure to create and view HTML page. (a) Save the file with the HTML extension. (b) Open any text editor i.e. Notepad (c) Open the Browser (d) Write appropriate HTML code. Ans.bdac Correct 2. Rearrange following (a) <img src="a.gif"> (b) </a> (c)</body> (d)<a href="frane.html"> (e)<body> Ans.dbeac Q. 7 Answer in brief :(6/8 mks) (1) What do you mean by frames ? How these can be created in
web page ? Ans.A frame is a specified region inside a web page.It divides the web page in many parts with the help of frameset tag. Eg:-<html> <head> <title> frames</title> </head> <frameset> <framset rows="*,*"> </frameset> </html> In the above html code the frameset rows="*,*" divides the web page into two equal frames. In this way we can use frames for inserting files in two different frames on the same web page. (2) What is a table tag ? Explain its subtags.. Ans.A table tag is tag which is used to create and design the table. The table tag has following subtags:<TH> tag-This tag is used inserting the heading inside the table. eg,Name,etc. <TR>tag -This tag is used for inserting table row inside the table. <TD> tag-This tag is used for typing and inserting the content inside table. CELLPADING and CELLSPACING are used for merging and giving space between the cells. Eg:-for preparing a marksheet by on the web page the following html codes are used:<html> <head> <title> TABLE</title> </head> <body> <table height="400" table width="500">
<tr> <th>Name </th> <td> aishwarya</td> <td> priya</td> </tr> <tr> <th>Subject </th> <td> IT</td> <td>IT</td> </tr> <tr> <th> Marks</th> <td> 95</td> <td> 80</td> </tr> </table> </body> </html> Q. 8 What is a form? Give different object of form with tags. (1/2 mks) Ans.Form is a data which contians text,audio,video,files,etc. objects of forms are as follows:i)textbox-the tag used is<TEXTBOX> ii)textarea-the tag used is <TEXTAREA> iii)textfield-the tag used is <TEXT> iv)checkbox-the tag used is <CHECKBOX> v)submit-the tag used is<SUBMIT> Q. 9 Write a program: (5/10 mks) 1. Write source code for the following
Ans.<html> <head> <title> CONTACT FORM </title> </head> <body> <hr> <h4><align="center">"Time is money and we value it"</align></h4> <hr> <h1><ul> CONTACT FORM </ul></h1> Name   <input type ="text"> </input> E-mail  <input type ="text"></input> Subject  <input type ="text"></input> Comment  <input type="textarea"></input> <input type "submit">Submit</input> <input type="reset">Reset</input>