0% found this document useful (0 votes)
48 views9 pages

IT Question Bank 2nd Sem 2024-25 - XI Commerce and Science

The document is a question bank for a 2nd semester examination for XI Science/Commerce, covering various topics in Information Technology, including definitions, true/false questions, matching exercises, and HTML programming. It includes fill-in-the-blank questions, true or false statements, and explanations of key concepts such as hardware, software, databases, and cyber law. Additionally, it provides HTML code examples for displaying text with different formatting.

Uploaded by

killerboy9474
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
48 views9 pages

IT Question Bank 2nd Sem 2024-25 - XI Commerce and Science

The document is a question bank for a 2nd semester examination for XI Science/Commerce, covering various topics in Information Technology, including definitions, true/false questions, matching exercises, and HTML programming. It includes fill-in-the-blank questions, true or false statements, and explanations of key concepts such as hardware, software, databases, and cyber law. Additionally, it provides HTML code examples for displaying text with different formatting.

Uploaded by

killerboy9474
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Question Bank for 2nd Semester Examination

XI SCIENCE / COMMERCE

Q.1) Fill in The Blanks:


1. Writer is a word processing application in LibreOffice Suite.
2. Title Bar is the topmost bar present on the screen of Libre Writer.
3. Menu Bar is present below the title bar in Libre Writer Application.
4. Information Technology has great influence on all aspects of life.
5. Data can be any character, text, word, number or raw facts.
6. DOS stands for Disk Operating System.
7. LAN stands for Local Area Network.
8. GUI stands for Graphical User Interface.
9. ICT stands for Information and Communication Technology.
10. Information is required to take short term and long term decisions in an organization.
11. FTP protocol is used to transfer and manipulate files on the internet.
12. A set of instructions given to the computer is known as software.
13. Internet is the highway of information.
14. Secondary memory is an External memory of computer.
15. Primary memory is an internal memory of computer.
16. Internet is the Global Network connecting millions of computers.
17. Control unit is the backbone of computers.
18. A Group of 4 bits is called a Nibble.
19. A Group of 8 bits is called a Byte.
20. Hardware is the parts of computer which we can see, touch and feel.
21. Local Area Network covers small geographical area.
22. Metropolitan Area Network covers larger area than that of a LAN and smaller area as
compared to WAN.
23. RAM is also called as Volatile memory.
24. ROM is also called as Non-Volatile memory.
25. Internet means connecting a computer to any other computer in the world.
26. Chrome operating system is an open-source operating system created by Google.
27. A computer would not be able to function correctly without an Operating System.
28. FTP stands for File Transfer Protocol
29. In peer-to-peer network each computer is called as peer/peers.
30. Cyber law is the part of the overall legal system that deals with the cyberspace and its legal issues.
31. Ethics is concerned with what is morally good and bad, right or wrong.
32. Ethics is also called as moral philosophy.
33. Computer Crime is an act performed by a hacker who illegally steals company’s or individual
private information.
34. Hacker is a computer user who illegally browses or steals information.
35. Morals are the standards of behavior, principles of right and wrong.
36. Software Piracy is nothing but copyright violation of software.
37. Firewall attempts to block the spread of computer attack.
38. Gaining access without the user’s permission is known as Unauthorized Access.
39. A Copyright is a legal right that gives the creator the sole right to publish and sell that work.
40. Hacking is an unauthorized intrusion into a computer or a network.
41. Cyber Safety is the safe and responsible use of information and communication technology.
42. Encryption is a method of converting the original message into random text.
43. OTP stands for One Time Password.
44. SSL stands for Secure Socket Layer.
45. Open Source software is freely available to copy & modify.
46. Calc is another name for a spreadsheet.
47. Total number of rows in Calc are 1048576.
48. Total number of columns in Calc are 1024.
49. Chart is the graphical representation of numeric data
50. Sort option is used to arrange the records in the alphabetical order.
51. Extensions of LibreOffice :
Writer .odt
Calc .ods
Impress .odp
Base .odb
52. A Data is raw facts.
53. Database is collection of interrelated data.
54. Information is processed data.
55. The most popular data model in DBMS is Relational Model.
56. A Database is a collection of organized information.
57. A table consists of information which is stored under different headings, called as Fields.
58. A Record is also called as Tuple.
59. The Table is the basic data storage unit in a relational database.
60. A record is composed of fields.
61. HTML is short of / stands for Hyper Text Markup Language.
62. HTML Tags are keywords enclosed within angular brackets.
63. Commands in HTML are known as Tags.
64. <H1> tag displays text in bold and largest heading level.
65. <H6> tag displays text in bold and smallest heading level.
66. HTML provides 6 levels of headings.
67. The <SUB> tag is used to subscript the text.
68. <Head> tag includes <Title> tag within it.
69. Height attribute specifies the height of image in pixels.
70. Width attribute specifies the width of image in pixels.
71. The Internet is a powerful media to transmit information.
72. The pages of information displayed on the internet are known as Webpags.
73. WWW stands for World Wide Web.
74. Website is collection of interlinked web pages.
75. Web Browser is a software used to view web pages or websites available on the internet.
76. Web Server is an application or a computer that sends web pages over the internet.
77. URL is an address of a web page on the internet.
78. HTTP stands for Hyper Text Transfer Protocol
79. URL stands for Uniform Resource Locator.
80. HTML is a standard language used for developing web pages.
81. Attribute defines a property for an element.
82. Container tags are called as paired tags.
83. Empty tags are standalone tags which do not having end tag.
84. <BR> tag is used to specify a line break.
85. The content within the <Title> tag are displayed on the title bar of web browser.
86. <B> tag display text in bold.
87. <I> tag display text in Italic.
88. <U> tag display text in Underline.
89. <IMG> tag is used to insert an image within a web page.
90. SRC attribute of <IMG> tag is used to specify the path of an image file.
91. <TABLE> tag is used for creating tables in HTML.
92. <HR> tag is used to display horizontal ruled line.

Q.2) True or False:


1. Libre Office Writer is closed source word processor component of libre office software package.
False
2. Shortcut for cut command is Ctrl + C. False
3. Formatting tool bar consists of different icons which are used for formatting selected text. True
4. Bullets and numbering appears in the standard toolbar in LibreOffice writer. False
5. LAN is difficult to setup. False
6. Man covers larger area than WAN. False
7. A Peer-to-Peer does not have server. True
8. Protocol is a set of rules that governs the communication between computers on a network. True
9. Hardware is a set of instructions or program instructing a computer to do specific tasks. False
10. WAN covers smaller geographical area and are privately owned. False
11. Operating system is application software. False
12. A computer would not be able to function correctly without an operating system. True
13. RAM is a permanent type memory. False
14. ROM is a permanent type memory. True
15. Secondary memory is the main memory of computer. False
16. An operating system usually comes preloaded on any computer, Laptop & cell phone. True
17. It is necessary to used licensed operating system. True
18. Apple corporations registered software is called Chrome. False
19. Android is a free and open source operating system provided by Google. True
20. WAN uses high speed technology and is relatively expensive. True
21. A group of 8 bits is known as Nibble. False
22. Hardware is a set of instructions or program instructing a computer to do specific tasks. False
23. An operating system boots up the computer and makes sure that everything is operational. True
24. ISP stands for Internet Service Provider. True
25. Internet is generally defined as a global network connecting millions of Computers. True
26. A computer which is seeking any resource from another computer is a client computer. True
27. RAM Read Access Memory. False
28. RAM is known as Read/Write memory. True
29. RAM is temporary memory. True
30. ROM stands for Read Only Memory. True
31. Closed Source Software is similar to Open Source Software. False
32. Information Technology Act, 2000 aims to provide for the legal framework. True
33. The IT Act 2000 was amended in the year 2008 and 2011. True
34. The IT Act does not include rules for cyber café, cyber security. False
35. Every computer user must follow the Do’s and Don’ts to live in this cyber world. True
36. Cyber law is the area of law that deals with internet, cyberspace and their legal Issues. True
37. IT Act does not provide a legal framework for the authentication of electronic Record. False
38. Cyber Crime is referred to as cybercrime, e-crime, or hi-tech crime. True
39. Ethics defines standards of behavior and principles of right and wrong behavior. False
40. Hacker’s are those who illegally browses or steal a company’s or individual’s Private information
True
41. Software piracy is nothing but copyright violation of software created originally by an individual or
institution. True
42. Gaining access without the users permission is known as authorized access. False
43. Causing intentional irritation to other users by means of damaging software is an example of
unauthorized access. True
44. Hacking refers to authorized entry into a company. False
45. Use only verified open source or licensed software and operating systems. True
46. One should always obtain software from trusted sources. True
47. One should never save username and password on the browser. True
48. FTP stands for File Transaction Protocol. False
49. Libre Office Writer is closed word processor component of libre office. False
50. A-many-to-many relationship occurs when multiple records in a table are associated with multiple
records in another table. True
51. Database does not allow retrieving or updating any record. False
52. Information helps in decision making. True
53. DBMS applications are used in Railway Reservation system, Banking, Social media Sites. True
54. The table is the basic data storage unit in a Relational database. True
55. Unauthorized users should be allowed to access the database under any circumstances. False
56. A field is called as a record. False
57. A table is made up of only one column. False
58. Primary key can uniquely identify each record in table. True
59. WWW stands for World Wide Web. True
60. URL stands for University Resource Locator. False
61. HTTP stands for Hyper Text Transfer Protocol. True
62. HTML tags are case sensitive. False
63. <BR> is singular tag. True
64. <BR> tag is used to specify line break. True
65. A collection of interlinked websites is known as web pages. False
66. A web browser is software used to view websites on the internet. True
67. HTTP is a protocol used by WWW for client server communication. True
68. Container tags are also called as empty tags. False
69. Container tags do not have an end tag. False
70. <H6> tag displays text in smallest heading level. True
71. Empty tag also have its closing tag. False
72. <IMG> tag is used to insert an image within a web page. True
73. Alt is referred as alternate text. True
74. <HR> is singular tag. True
75. <TR> is used to specify a table heading. False
76. <TH> tag display the content of the table in bold format. True
77. Bgcolor attribute sets the background color. True
78. HTML tags are case sensitive. False

Note : For Q3,Q4 & Q5 refer Textbook and Objective Hand Book.

Q.6) Match the following:

Group A Group B (Answer)

1) Data a) Raw & unorganized facts

2) Information b) Processed Data

3) Arithmetic Operations c) ALU

4) RAM & ROM d) Primary Memory

5) Pen drive & Hard disk e) Secondary Memory

6) Open Source Software f) Linux

7) Closed Source Software g) Windows

8) Web Browser h) Application Software

9) Android i) Mobile Operating System

10) CLI j) Command Line Interface


11) GUI k) Graphical User Interface

12) Cyber Crime l) Software Piracy

13) Software Piracy m) Stealing of Codes/Programs


illegally
14) Unauthorized access n) Illegal use/break of password

15) Hacking o) Unauthorized entry into a


network
16) Firewall p) Network Security

17) Encryption q) converting the original text


into random text
18) IT Act 2000 r) legal recognition for online
transaction
19) Database s) Collection of related data

20) DBMS t) Create database, store data in it

21) Web browser u) Application to view websites

22) URL v) Address of website

23) HTTP w) Protocol

24) HTML x) Create web pages

25) <H1> y) Largest Heading

26) <IMG> z) To insert image in web page

27) <H6> aa) Smallest Heading

28) <BR> ab) Singular ta

Q.6) Answer the following:


1. Describe the terms : a) Hardware b) Software
Hardware : Hardware are the parts of computer which we can see , touch and feel them.
Software : A set of instructions given to the computer is known as a program. Program or set of
programs are called as software.

2. What is secondary memory? Name any four secondary storage devices.


Secondary memory is an external memory of the computer. It is used to store the huge amount
of different programs and information.
The secondary storage devices are:
a) Magnetic disk d) Magnetic tapes
b) Pen drive e) Flash memory
c) Optical Disk (CD , DVD) f) SSD etc.
3. Explain Primary Key and Foreign Key:
Primary Key : the group of one or more columns used to uniquely identify each row of a relation
is called as primary key.
Foreign Key : it is afield in one table that refers to the Primary Key of another table.

4. Define Database:
Database is collection of interrelated data which helps in efficient retrieval, inserting and
deleting data.

5. Which are applications of DBMS :


Applications of DBMS are:
a) Railway reservation system
b) Library Management System
c) Banking
d) Universities and Colleges
e) Credit card transactions
f) Social media site

6. What do you mean by Encryption?


Encryption is a method of converting the original message into random text.

7. What is Firewall?
Firewall refers to network security system which blocks certain type of information forming a
barrier between a trusted and untrusted network. It attempts to block the spread of computer
attacks.

8. Give four examples of unauthorized access:


a. Hacking financial / bank account related information.
b. Steading organizational/ intellectual information.
c. Illegal monitoring of information owned by other users.
d. Illegal use/break of login and password of other users.

9. Define the terms: a) Moral b) Ethics.


Moral: the standard of behavior, principles of right and wrong behavior.
Ethics: Ethics also called moral philosophy is the discipline concerned with what is morally good
and bad, right or wrong.
Q.8) HTML programs:
1. Write the HTML code to display the text “HELLO WORLD” by using Heading Tags.

<!DOCTYPE HTML>
<HTML>
<HEAD>
<TITLE>HEADING TAGS </TITLE>
</HEAD>
<BODY>
<H1>HELLO WORLD</H1>
<H2>HELLO WORLD</H2>
<H3>HELLO WORLD</H3>
<H4>HELLO WORLD</H4>
<H5>HELLO WORLD</H5>
<H6>HELLO WORLD</H6>
</BODY>
</HTML>

2. Write the HTML code to display the text “GOD IS GREAT” In BOLD, ITALIC and UNDERLINE
format.

<!DOCTYPE HTML>
<HTML>
<HEAD>
<TITLE>HEADING TAGS </TITLE>
</HEAD>
<BODY>
<B>GOD IS GREAT</B>
<I>GOD IS GREAT</I>
<U>GOD IS GREAT</U>
</BODY>
</HTML>

3. Write the HTML code to display your STD in Bold, STREAM in Italic & DIV in Underline format.

<!DOCTYPE HTML>
<HTML>
<HEAD>
<TITLE>HEADING TAGS </TITLE>
</HEAD><BODY>
<B>STD – XI </B>
<I>STREAM – SCIENCE / COMMERCE</I>
<U>DIV –A </U></BODY></HTML>
4. Write the HTML code to display : Background color should be red, text should be yellow,
heading should be large in size “MY FIRST WEB PAGE”. Display a blue horizontal line and display
your name in bold, address in italics.

<!DOCTYPE HTML>
<HTML>
<HEAD>
<TITLE>HEADING TAGS </TITLE>
</HEAD>
<BODY>
<H1 ALIGN=CENTER>MY FIRST WEB PAGE</H1>
<HR COLOR=BLUE SIZE=5>
<B>NAME – AKASH GANGA </B>
<I>ADDRESS – AMBETKAR CHOWK, <BR>
ULHASNAGAR - 4</I>
</BODY>
</HTML>

5. Write the HTML code to display the following output background color as pink and text color as
blue : X2+2XY+Y2=0

<!DOCTYPE HTML>
<HTML>
<HEAD>
<TITLE>HEADING TAGS </TITLE>
</HEAD>
<BODY BGCOLOR=PINK TEXT=BLUE>
X<SUP>2</SUP>+2XY+Y<SUP>2</SUP>=0
</BODY>
</HTML>

6. Write the HTML code to display the following output background color as yellow and text color
as red : (a+b)2=a2+2ab+b2

<!DOCTYPE HTML>
<HTML>
<HEAD>
<TITLE> </TITLE>
</HEAD>
<BODY BGCOLOR=YELLOW TEXT=RED>
(a+b)<SUP>2</SUP>=a<SUP>2</SUP>+2ab+b<SUP>2</SUP>
</BODY></HTML>

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy