[go: up one dir, main page]

0% found this document useful (0 votes)
331 views19 pages

Question Bank of IT

The document provides a question bank for Chapter 3 of an IT exam on impressive web designing. It includes fill in the blank questions, true/false questions, multiple choice questions with single answers, multiple choice questions with multiple answers, and short answer questions. The questions cover topics like HTML, webpages, forms, variables, data types, functions, events, and HTML tags.

Uploaded by

Prascilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
331 views19 pages

Question Bank of IT

The document provides a question bank for Chapter 3 of an IT exam on impressive web designing. It includes fill in the blank questions, true/false questions, multiple choice questions with single answers, multiple choice questions with multiple answers, and short answer questions. The questions cover topics like HTML, webpages, forms, variables, data types, functions, events, and HTML tags.

Uploaded by

Prascilla
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 19

Question Bank of IT for term II

Chapter 3. ImpressIve web desIgnIng


Fill in the Blanks:
1. ___________ is a simple text file created using HTML. Answer: Webpage
2. ___________ documents are created in any text editor for and can be run(executed) on
any computer that has a web browser. Answer: Hypertext Markup Language
3. ___________ is used to specify the path of an image file. Answer: src
4. The ___________ attribute specifies the get or post method to be used when submitting
the form data. Answer: Method
5. ___________ allows more than one selection against multiple choices.
Answer: Checkbox
6. <Input type = “submit”> displays a button for ___________ the form data to a server.
Answer: Submitting
7. ___________ are used to generate dynamic Web pages on the Web. Answer: Scripts
8. ___________ name can be limited up to 255 characters. Answer: Variable.
9. _____________ provides data types to store and use different types of values.
Answer: JavaScript
10. ___________ data type can hold positive as well as negative values.Answer: Number
11. ___________ are used for storing text. Answer: Strings
12. ___________ are used to provide information or explanation about your programming
construct. Answer: Comments
13. ___________ is used to perform repetitive tasks whenever required. Answer: Function
14. ___________ function is used to parse a string and convert it into a number.
Answer: parseInt()
15. ___________ function is used when you want input value from user at the time of
program execution. Answer: prompt ()
True or False.
1) <article> tag defines a section in a document. FALSE
2) href attribute is used to specify the URL of source in <a> tag. TRUE
3) Web Browser is used to browse web pages. TRUE
4) Tag is a coded command. TRUE
5) <caption> tag is used to indicate the heading for table. TRUE
6) submit() method of form element submits the form. TRUE
7) Len() is only property of object, which returns length of string. TRUE
8) JavaScript allows the programmers to concatenate two literals of different types. TRUE
9) IsNaN() function returns true if returned value is not a number.TRUE
10) JavaScript applications are event driven. TRUE
Multiple Choice Questions: Choose one Answer
1. _______ tag is used to create definition list. Ans. a
a. <DL>
b. <IMG>
c. <UL>
d. <OL>

2. The growing demand for attractive presentation of information using electronic means
gave rise to the invention of _________ Ans. d
a. Online
b. Internet
c. Webpages
d. Websites
3. ____ tag is used to create each row of the table.Ans. c
a. <table>
b. <caption>
c. <tr>
d. <th>
4. ________ attribute specifies a short hint that describes the expected value of a textbox
or textarea. Ans. b
a. maxlength
b. placeholder
c. size
d. value
5. ________ attribute specifies the maximum number of characters which can be entered in
a textbox.Ans. a
a. maxlength
b. placeholder
c. size
d. type

6. Variable declared in JavaScript is with _________ keyword. Ans. b


a. dim
b. var
c. declare
d. let
7. How do you write a conditional statement for executing some statements only if I is NOT
equal to 5 in JavaScript?Ans. c
a. if(i<>5)
b. if<>5
c. if(i!=5)
d. if!=5 then
8. Internet programming is based on ___________Ans. a
a. client server model
b. stand alone
c. server model
d. client model
9. ________ method of Date object in JavaScript returns the weekday in number.Ans. d
a. date()
b. day()
c. dayName()
d. getday()
10. The ________ operator calculates the remainder by dividing two integers. Ans. d
a. / (divide)
b. rem
c. ^ (exponent)
d. % (modulus)
Multiple Choice Questions: Choose two Answer:
1. <!-- --> tag is used to _________
Ans. b d
a. Display text in the browsers window
b. Describe the text for web developers reference
c. Create hyperlinks
d. Write text which is not supposed to be displayed in the browsers window
e. Display headings.
2. The following are the attributes of <body> tag.
Ans. a c
a. background
b. align
c. vlink
d. width
e. <sub>
3. The attributes of used in <p> tag.
Ans. b c
a. face
b. align
c. style
d. text
e. bgcolor
4. Attributes of <img> tag:
Ans. a b
a. align
b. hspace
c. href
d. type
e. start
5. The values given for behavior attribute in <marquee> tag.
Ans. a b
a. slide
b. scroll
c. left
d. up
e. right
6. Following are the methods of form object.
Ans. b c
a. change()
b. reset()
c. submit()
d. put()
e. input()
7. The methods of window object are ____________
Ans. a b
a. confirm()
b. stop()
c. status()
d. name()
e. end()
8. Mouse events in JavaScript are __________
Ans. a d
a. onclick
b. onform
c. onchange
d. onMouseOver
e. onload
9. The properties of document object are __________
Ans. a d
a. title
b. write
c. bgcolour
d. URL
e. fgcolor
10. The methods of window object are _________
Ans. a b
a. confirm
b. stop
c. status
d. name
e. end
Multiple Choice Questions: Choose three Answer
1. The data entry operator wants to insert i) photograph ii) write remarks about the
photograph iii) underline the heading.
Ans. b c e
a. <image>
b. <img>
c. <textarea>
d. <UL>
e. <U>
f. <text>
2. _________ tags are the physical style tags.
Ans. b d e
a. <bl>
b. <i>
c. <style>
d. <u>
e. <sup>
f. <p>
3. The attributes of <body> tag are :
Ans. a d e
a. alink
b. align
c. color
d. bgcolor
e. text
f. width
4. Server side scripting is used for following purposes:
Ans. d e f
a. Data entry validation
b. Checking ranges and dates
c. For providing animation and validation users
d. Data access and heavy duty processing
e. optimizing performance of the server
f. improving response tiem to the user

5. Events in JavaScript are ________


Ans. b c d
a. link
b. click
c. doubleclick
d. abort
e. ttle
f. select
6. Built-in functions in JavaScript are _______
Ans. a d e
a. paseInt()
b. print()
c. msgbox()
d. parsefloat()
e. cint()
f. now()
Match the Following:
a. Specifies the way to submit form
Ans. 4 1.Action

b. Specifies the url of the form submission server 2. Name


Ans. 1
3.Form
c. Specfies the name of the form
Ans. 2 4.Method

d. Collection of different elements called controls 5.Size


Ans. 3
a. alert()
Ans. 5
1.To parse a string and convert into a number
b. prompt(
)
2.To display message box with ok and cancel buttons
Ans. 3
3.To display box for input a value with ok an cancel buttons
c. confirm
()
4.To display box with list options.
Ans. 2
5.To display alert popup box with OK button
d. parseInt
()
Ans. 1

Answer Briefly:
1. Discuss the attributes of the table.
Answer:
1. A border attribute is required to display a border for the entire table.
2. Border color displays borders in a specific color.
3. Aligns the table either to the left, right, or center.
4. Bgcolor sets the background color for the table.
2. Explain Creating hyperlinks in a web page and HTML Link colors.
Answer:
1. Hyperlinks are used to connect one document with another document.
2. In HTML, Links are created by using <a> tag.
3. A Hyperlink by default appears blue in colour with an underline.
4. A Visited link is underlined and purple.
5. An Active link is underlined and blue.
3. Explain Variables.
Answer:
1. A Variable is a basic unit of storage in a JavaScript program.
2. The variable name may consist of alphabets, digits and underscore, and dollar
characters with the following rules.
3. Standard keywords are not allowed as Variable names.
4. Variable names can be limited to up to 255 characters.
5. Variable name in javascript is declared with keyword ‘var’.
4. Explain Data Types.
Answer:
1. JavaScript provides data types to store and use different types of values.
2. Numerical value specially belongs to the ‘Number’ data type.
3. Number data types can hold positive as well as negative values.
4. Strings are used for storing text.
5. Boolean type represents only two values ‘true’ and ‘false’.
6. JavaScript returns ‘Undefined’ when a variable is declared but not assigned.

5. What are User Defined Functions?


Answer:
1. A Function in any scripting and programming language is small part of a program
that we require again and again.
2. A Function is a subprogram designed to perform a particular task.
3. Functions can be called either by an event or by giving a call to that function.
6. Explain Event Handling.
Answer:
1. JavaScript is an event-driven language.
2. An event is an action done by the user or an application.
3. JavaScript lets you execute a code when events are detected.
7. Explain Event Handler.
Answer:
1. onMouseOut when the user moves the mouse away from an element.
2. onClick when the user clicks an element.
3. onMouseOver when the user moves the mouse over an element.
4. onMouseUp when the user releases a mouse button over an element.
8. Write down the classification of HTML Tags.
Answer:
HTML tags are categorized as Container tags & Empty tags
1. Container Tags are also called paired tags.
2. Container Tags have a beginning tag and an end tag.
3. Empty Tags are standalone tags and do not have an end tag.
9. Explain Heading levels.
Answer:
1. HTML provides six levels of heading tags.
2. The <H1> tag displays text in bold and with the largest heading level.
3. The <H6> tag displays text in the smallest heading level.
10. What is HTML?
Answer:
1. Hypertext Markup Language is a standard language for developing and creating
interactive websites, introduced by Tim Berners Lee.
2. Hypertext Markup Language documents are created in any text editor and can be
run(executed) on any computer that has a web browser.
3. Hypertext Markup Language is compatible with most web browsers.
Write codes in HTML.
1. Create a table in HTML which contains 4 rows and 3 columns.
Answer:
<!DOCTYPE html>
<html>
<head>
<title>Table with 4 rows and 3 columns</title>
</head>
<body>
<table border=”2″>
<tr>
<th>Sr. No.</th>
<th>Input Device</th>
<th>Output Device</th>
</tr>
<tr>
<td>1</td>
<td>Keyboard</td>
<td>Monitor</td>
</tr>
<tr>
<td>2</td>
<td>Mouse</td>
<td>Printer</td>
</tr>
<tr>
<td>3</td>
<td> Joystick</td>
<td>Plotter</td>
</tr>
</table>
</body></html>
2. Create a Form with input elements in HTML.
Answer:
<!DOCTYPE html>
<html>
<head>
<title>Form with Input elements</title>
</head>
<body bgcolor=”orange”>
<h1>use of form</h1>
<form>
Enter your name
<input type=”text” Name-‘n1″ max length=”20″><Br>
Enter your standard:
<input type=”radio” name=”r1″ value =”11″>
11<sup>th</sup>
<input type=”radio” name=”r1″ value=”12″>
12<sup>th</sup><br>
Choose your optional subjects : <br>
<input type=”checkbox” name=”c1″ Value=”Hindi”>Hindi<br>
<input type=”checkbox” name=”c1″ Value=”German”>German<br>
<input type=”checkbox” name=”c1″ Value=”Biology”>Biology<br>
<input type=”checkbox” name=”c1″ Value=”IT”>IT<br>
<input type=”submit” value=”Submit”><br>
</form>
</body>
</html>
3. Write down the HTML program which provides six levels of the heading tags.
Answer:
<!DOCTYPE html>
<html>
<head>
<title>Heading levels</title>
</head>
<body bgcolor=skyblue>
<H1>Heading level 1 Text is largest in size</H1>
<H2>Heading level 2</H2>
<H3>Heading level 3</H3>
<H4>Heading level 4</H4>
<H5>Heading level 5</H5>
<H6>Heading level 6 Text is smallest in size</H6>
</body>
</html>
Write a program in Javascript.
1. Write a JavaScript program to calculate the multiplication of two numbers.
Answer:
<!DOCTYPE html>
<html>
<head>
<title>multiplication of two numbers</title>
</head>
<body bgcolor=”yellow”>
<h1>Program to calculate multiplication of two numbers </h1>
<script language=”javascript”>
var a,b,c;
a=75; b=100.45;
c=a*b;
document.write(“<br><h1>multiplication of two numbers : “+c+”</h1>”);
</script>
</body>
</html>
2. Write a Program to check number is even or odd.
Answer:
<!DOCTYPE html>
<html>
<head>
<title>Program to check number is even or odd</title>
</head>
<body bgcolor=”green”>
<h1> Program to check number is even or odd </h1>
<script language=”javascript”> var a,b
a=prompt(“Enter your value:-“);
b=parseInt(a);
// input is converted into number data type
if(b%2==0)
alert(“Number is even”); else
alert(“Number is odd”);
</script>
</body>
</html>
3. Write a program to calculate the area of a circle.
Answer:
<!DOCTYPE html>
<html>
<head>
<title>Area of circle</title>
</head>
<body bgcolor=yellow>
<h1> Program to calculate area of circle </h1>
<script language=”javascript”>
var r,area;
r=prompt(“Enter the radius of circle”);
area=3.14*r*r;
document.write(“<h1>you entered radius value: </h1>” +r);
document.write(“<h1>Area of circle is: </h1>”+area);
</script>
</body>
</html>

Chapter 4. Cyber Law


Fill in the blanks:

1. must obey ethics and laws while developing their software. Answer:-
Computer Professional

2. fi is a symbol. Answer:- Copyright

3. is the part of the overall legal system that deasl with the Internet
cyberspace. Answer:- Cyber Law

4. includes policies, procedures, tools and techniques designed to protect company


computer assets from accidental damage and unlawful use. Answer:- Cyber Security

5. Conversion of data into secured format is known as Answer:- Encryption

6. is the art of determining what is right and wrong and then doing the right
thing. Answer:- Ethics
7. Ethical principal based on value. Answer:- moral

8. OTP stands for Answer:- One Time Password

9. Extracting confidential information by email. Answer:- Phishing

10. means the key of a key pair used to create a digital signature. Answer:- Private
key

11. means the key of a key pair used to verify a digital signature and listed in the Digital
Signature Certificate. Answer:- Public key

12. SSL stands for Answer:- Secure Socket Layer


13. is a unauthorized duplication, distribution and use of computer
software. Answer:- Software piracy

14. Copyright violation of software created originally by an individual. Answer:-


Software piracy

15. Gaining access without the users permission. Answer:- unauthorized access

16. Intentionally trying to log to other's computers or accessing of data without


having permission is called Answer:- unauthorized access

17. __________is a barrier between two networks. Answer:- Firewall

18. Ethics was invented by Answer:- Immanuel Kant

True or False:

1. Cyberstalking is a criminal practice to harass or threaten someone over Internet


Answer:- TRUE.
2. IT Act of India was passed in the year 2000. Answer:- TRUE
3. It is a good practice for Users to save their usernames and passwords on browser. Answer:-
FALSE
4. Pirated software means software without license. Answer:- TRUE
5. Right things does not depend upon moral principles. Answer:- FALSE
6. Students should report online bullying immediately to the teacher and parents. Answer:-TRUE
7. Trying to logo on to others computer system is authorized access. Answer:- FALSE
8. Users can send their pictures to unknown sources or share them on social media. Answer:-TRUE
9. Users has rights to receive or use unauthorized copies of software. Answer:- FALSE.
10. With software is pirated, consumers have risk of viruses. Answer:- TRUE

Multiple Choice Questions (Select 1 Answer):


1. ensures that the document originated with the person signing it and that was not
tampered with after the signature was applied. Answer:- a
a) Digital Signature b) coded signature c) Double Signature d) simple Signature
2. detects and prevents known and unknown viruses which weakens the
computer. Answer:- d
a) Web browser b) Email c) Record d) Anti-virus
3. is the safe and responsible use of information and communication
technology. Answer:- c
a) Cyber Crime b) IT Act c) Cyber safety d) Cracking
4. key means the key of a key pair used to create a digital signature. Answer:- a
a) Private key b) Public c) a and b both d) Security key
5. means the key of a key pair used to verity a digital signature ad listed in digital
simature certificate. Answer:- b
a) Private key b) Public key c) License d) Security key
6. is presenting someone else work as your own withouit their
consent. Answer:- b
a) Phishing b) Plagarism c) Cyberbully d) Cracking
7. provides legal recognition of transaction carried out by means of electronic
commerce. Answer:- a
a) IT act b) Cyber Crime c) Copyright d) fairuse
8. were used for authentication and security of documents. Answer:- d
a) Cyber Crime b) IT Act c) Cyber safety d) Digital Signature
9. is typically carried out by email spoofing. Answer:- a
a) Phishing b) Plagiarism c) Cyberbully d) Cracking

10. Generally accepted standards of right and wrong in a society is called as _______Answer:- a
a) moral b) ethics c) guideline d) code of standard

Multiple Choice Questions (Select 2 Answers):

1. are the remedies for stopping software piracy Answers:- b & c


a) copying and distribution of software b) purchasing legitimate licensed product c)
purchasing licensed product from the authorized seller d) software without license e) all the above

2. text which can be read by human while text is unreadable to


humans. Answers:- a & b
a) Simple b) Cipher c) Internet d) Software Piracy e) Cyber Ethics

3. and keys are used to create and verify Digital


certificate. Answers:- b & c
a) Primary key b) Private key c) Public Key d) Security Key e) License Key

4. Pirated Software means Answers:- a & c


a) Duplicate software b) Power of Attorney c) copied software d) Software with
license e) Opens Source Software

5. Security procedures are Answers:- b & c


a) documentation b) encryption c) firewall d) protection e) decryption

6. A criminal practice where an individual uses the net to harass or threatten


someone. Answers:- c & d
a) Phishing b) Plagarism c) Cyberbully d) Cyberstalking e) Cracking

7. Donts for students in Cyber world are and Answers:- b & c


a) Connect with known individuals b) Steal others information c) Share your OTP
with any one d) Use strong and unique passwords e) Obtain software from truste sources

8. Dos for students in Cyber world are and Answers:- a & e


a) Adhere to copyright restrictions while downloading.
b) steal others information
c) share your OTP with any one
d) share your personal information
e) Obtain software from trusted sources

9. To Protect data and Answers:- a & d


a) Protect network with firewall b) Download sotiware from untrusted sources c)
Use same login and password on all sites. d) Protect wifi connection with WEP
encryption e) Share personal information on public network

10. Examples of Cyber’ Crime Answers:- a & d


a) Cyberbully b) copyright c) Cyber safety d) Cracking e) Licensed Software

Multiple Choice Questions (Select 3 Answers):

1. Types of Software piracy include Answers:- c, d, e


a) Buying original software with license copy
b) Selling original software with license copy
c) Borrowing and installing a copy of a software application from a person
d) Duplicating and selling copyrighted programs
e) Downloading software illegally from peer-to-peer network, internet auction or blog
2. Dos for students in the cyber world. Answers:- a, b, c
a) Obtain software from trusted sources
b) Report to the service provider if account is hacked.
c) Adhere to copyright restrictions while downloading from internet
d) Install pirated software
e) e) Use weak password
3.Dos for students in the cyber world. Answers:- c, d, e
a) Obtain sofware from untrusted sources
b) Login to other users computer
c) Use strong and unique passwords
d) Install pirated software
e) Connect to only to known individuals
4.Security procedures includes : Answers:- b, c, e
a. Plagarism b) Firewall c) SSL d) Cracking e) Encryption

Answer Briefly:

1. Define the term Moral, Ethics and Cyber Law


Ethics - Also called moral philosophy is the discipline concerned with what is morally good and
bad, right or wrong.
Morals: The standards of behaviour; principles of right and wrong behaviour. Thus morals are
dictated by society, culture or religion while ethics are chosen by the person himself which
governs his life.
Cyber Law — Cyber law is the area of law that deals with the Internet's relationship to
technological and electronic elements, including computers, software, hardware and information
systems (IS).
2. Write any three advantages of Cyber Law.
People can perform transactions over the Internet through credit cards without fear of misuse.
The IT Act offers the much-needed legal framework so that information is not denied legal
effect, validity or enforceabilityy, solely on the ground that it is in the form of electronic records.
The Act seeks to empower government departments to accept filing, creating and retention of
official documents in the digital format.
The IT Act has also proposed a legal framework for the authentication and origin of electronic
records/communications through digital signature.
3. Explain Software Piracy.
Software piracy is nothing, but copyright violation of software created originally by an
individual or an institution. It includes stealing of codes/ programs and other information
illegally and creating the imitated copy by unauthorized means and utilizing this data either for
own benefit or for profit making. For example, downloading same from a file sharing
website without paying for it, it is a software piracy.
4. Write a note on Unauthorized Access.
Gaining access without the users' permission is known as unauthorized access.
Attempting to get information (like emails, bank account, intellectual or any other personal and
confidential information) from unauthorized person is known as accessing the machine illegally.
5. Explain plagiarism and Hacking.
Hacking: Hacking refers to unauthorized intrusion into a computer or a network. Hacker is a
person intensely interested in the deep and hidden or concealed working of any computer
operating system and programming language. They might discover loopholes within systems
and reasons for such loopholes.
Plagiarism: Plagiarism is presenting someone else's work or idea as your own without their
consent. The widespread use of computers and the advent of the internet has made it easier to
plagiarize the work of others. For example, plagiarism is found in document such as essay,
reports etc.

6. Define Cyber Crime and give examples.


Computer Crime is alternatively referred to as cybercrime, e-crime, (electronic crime) or hi-tech
crime. Computer crime is an act performed by a knowledgeable computer user, sometimes
referred te as a hacker who illegally browses or steals a company's or individuals private
information. Cybercrimes can involve criminal activities that are traditional in nature, such as
theft, fraud, forgery, defamation and mischief, all of which are subject to the Indian Penal Code.
Examples : Software Piracy, Unauthorized access, Copyright violation, Cyberbully or Cyber
stalking, Phishing, plagiarism, Hacking, etc..
7. Explain Cyber Safety.
Cyber safety is the safe and responsible use of information and communication technology. It is
not just about keeping information safe and secure, but also about being responsible with that.

Information, being respectful of other people online, and practicing good 'netiquette' (internet
etiquette). In recent years, all systems are exposed to Internet; hence there is increased challenges
in maintaining and protecting them from the attackers.

8. Explain Encryption and SSL.


Encryption: It is a method of converting the original message into random text, which should be
complex to understand and difficult for a hacker to decode. The idea is to ensure security and safety of
data and its transmission.
SSL (Secure Socket Layer): It is the most consistent security model. Through the SSL,
transmission of data is encrypted, client-server information is authenticated and message integrity for
TCP/IP connections secured

You might also like