Example: stock market

Sample Question Paper FOUNDATION OF INFORMATION …

1 Sample Question PaperFOUNDATION OF INFORMATION TECHNOLOGYC lass-X (TERM II)TIME : 3 HrsMM : in the blanks:[10] is the extension of an XML attribute is used with <A> tag to specify the URL of attribute value should always be enclosed in HTML while creating a table, we cannot use background attribute with_____ the software that is downloaded on your computer to track youractivities without your XML document can have only one _____ and _____ are the two types of a computer virus a _____ can replicate itself _____ is a person who attempts to maliciously hack computer orcomputer True and False:[10] XML document can have only limited number of child virus may corrupt or delete data on your value is specified with ALT attribute of <IMG> attribute with <TABLE > tag is used to merge more than one cell bulk emails are called and Valign are the attribute used with <TD> tag to set the alignment of datain a is an attribute of <A> stands for Extensive Markup is case Target attribute with <A> tag is used to open a link in a new study the Webpage given below.

1 Sample Question Paper FOUNDATION OF INFORMATION TECHNOLOGY Class-X (TERM II) TIME : 3 Hrs MM : 80. SECTION – A 1. Fill in the blanks: [10] 1.1 _____ is the extension of an XML file.

Tags:

  Information, Foundations, Technology, Class, Foundation of information, Foundation of information technology class

Information

Domain:

Source:

Link to this page:

Please notify us if you found a problem with this document:

Other abuse

Transcription of Sample Question Paper FOUNDATION OF INFORMATION …

1 1 Sample Question PaperFOUNDATION OF INFORMATION TECHNOLOGYC lass-X (TERM II)TIME : 3 HrsMM : in the blanks:[10] is the extension of an XML attribute is used with <A> tag to specify the URL of attribute value should always be enclosed in HTML while creating a table, we cannot use background attribute with_____ the software that is downloaded on your computer to track youractivities without your XML document can have only one _____ and _____ are the two types of a computer virus a _____ can replicate itself _____ is a person who attempts to maliciously hack computer orcomputer True and False:[10] XML document can have only limited number of child virus may corrupt or delete data on your value is specified with ALT attribute of <IMG> attribute with <TABLE > tag is used to merge more than one cell bulk emails are called and Valign are the attribute used with <TD> tag to set the alignment of datain a is an attribute of <A> stands for Extensive Markup is case Target attribute with <A> tag is used to open a link in a new study the Webpage given below.

2 Identify 10 tags (structural as well as formattingtags) that have been utilized in creating this webpage and write the usage of each of them.[15] the following Shreenivasan is working for an IT firm where he needs to backup his data of around200 MB to 400 MB at the end of each day. Each day backup needs to archivedseparately for future reference. Suggest any two economic data backup devices,which he can use for this purpose.[2] Differentiate between Hacker and Cracker with reference to their intention and motive.[2] Name one specific software/tool for each of the following category:[5] Recovery Backup Editor to create HTML Source Web as directed :[10] Draw the XML tree for code given below:[5]<MOVIES> <INDIAN> <THRILLERS> <DIRECTOR>ABC</DIRECTOR>3<DOR>1/10/2009</DOR> </THRILLERS> <FICTION> <DIRECTOR>XYZ</DIRECTOR> <DOR>15/10/2009</DOR> </FICTION> <INDIAN> </MOVIES> the HTML code to generate the following output of a table with the content exactly inthe same format as shown within the table: [5] the HTML code to generate the following output:[10]Note the following points while generating the Webpage: Link colour is green, active link colour is blue and visited link colour is red.

3 Title of the page is "eat healthy live healthy" Heading of the page is maroon Image used is " " Caption of table is blue Table border is blue and of size 2. The 4 links are , , and The email id for contact us is Choice Questions (Choose most appropriate option)[16] of the following is an attribute of <Table> tag?a)SRC4b)LINKc)CELLPADDINGd) avoid problems while working with internet you should follow these precautions:a)Install anti-Virus on your computerb)Take the back-up of your files regularlyc)Do not click on unknown linksd)All of the is the correct syntax in HTML for creating a link on a webpage?a)<LINK SRC= " ">b)<BODY LINK = " ">c)<A SRC = " " >d)< A HREF = " "> HTML tag would be used to display power in expression x2+y=10a)<SUP>b)<SUB>c)<B>d)<P> of XML document can be viewed in aa)Word Processorb)Web browserc)Notepadd)None of the independent computer program that copies itself from one computer to other in anetwork is called:a)Wormb)Trojanc)Bugd)Anti the correct HTML code to create an email link?

4 A)<A HREF = HREF = MAILHREF = the correct HTML tag to make the text bold?a)<B>b)<BOLD>c)<STRONG>d)Both a) and c) is the correct way of describing XML data?a)XML uses a DTD to describe datab)XML uses a description node to describe datac)XML uses XSL to describe the datad)XML uses a validator to describe the Which statement is true?a)An XML document can have one root elementb)An XML document can have one child elementc)XML elements have to be in lower cased)All of the is not a correct name for an XML element?a)<xmldocument>b)<7eleven>c)<phone number>d)<root> Is this a "well formed" XML document?<?xml version=" "?> <note> <to age="29">Tove</to> <from>Jani</from> </note>a)Yesb)Noc)Cannot be determined without the DTDd)None of the Well formed XML document meansa)It contains a root elementb)It contains an element6c)It contains one or more elementsd)Must contain one or more elements and root element must contain all Choose the correct HTML tag for the largest heading?

5 A)<H1>b)<H6>c)<H10>d)<HEAD> Out of the following, which one will be altered or modified by a computer virus?a)Operating Systemb)Speed of Network Connectivityc)Application Softwared)All of the Comments in XML document is given by:a)<?_ _ _ _>b)<!_ _ _ _!>c)<!_ _ _ _>d)</_ _ _ _>7 MARKING SCHEMEFOUNDATION OF INFORMATION TECHNOLOGYC lass X (Term II)Max Time: 3 hours Max Marks: 80 SECTION in the blanks: [10] . <TR> Viruses , Cracker(1 Mark for each correct fill in the blank) True and False:[10] True(1 Mark for correctly marking the statement as true or false) 10 tags that have been utilized in creating the above webpage along with theirexpansion and usage are as follows:1.<HTML> - It is a structural tag used to mark the beginning and end of an <BODY> - It is a structural tag that encloses all the visible content of a <P> - It is a formatting tag used to mark the beginning of a new <U> - It is a formatting tag used to underline text on a <CENTER> - It is a formatting tag used to centralize text on a <H1> - It is a formatting tag used to mark text as biggest <IMG> - It is a formatting tag used to add inline images on a <OL> - It is a formatting tag used to add numbered lists on a <LI> - It is a formatting tag used to mark list items in a numbered list on a <A> - It is a formatting tag used to add hyperlinks on a webpage.

6 ( mark for identifying each tag and 1 mark each for their usage) the following CD and DVD(1 mark each for correctly naming the two data backup devices) A hacker is a person who is proficient with computers and/or programming and knowsall of the intricacies of a system. There is no illegality involved with being a hackerwhereas a cracker is a hacker who uses their proficiency for personal gains outsideof the law like: stealing data, changing bank accounts, distributing viruses etc. Acracker is a technical person who masters the art of breaking systems to hamper thesystem's security. A Hacker on the other hand breaks system to gain knowledge.(2 marks for explaining the correct difference between the two) One specific software/tool for each of the following category are:a)Antivirus Software - Vipreb)Data Recovery Tool - NTFS-readerc)Online Backup Tool - Dropboxd)Text Editor to create HTML pages - Notepad2e)Open Source Web Browser - Mozilla Firefox(1 mark each for naming the correct software/tool) (5 marks for drawing the diagram correctly - 1 mark for each level and 1 mark for theflow lines) <HTML> <BODY> <TABLE> <TR ALIGN=CENTER VALIGN=MIDDLE> <TH>ADMNO</TH> <TH>SNAME</TH> <TH>FNAME</TH> <TH>DOB</TH> </TR> <TR ALIGN=LEFT VALIGN=BOTTOM> <TD>1110</TD> <TD VALIGN=TOP>MANJIT</TD> <TD ALIGN=RIGHT>RANJIT</TD> <TD VALIGN=TOP>4-MAR-1988</TD> </TR> </TABLE> </BODY> </HTML>( mark for correct usage of <HTML> tag)( mark for correct usage of <BODY> tag)( mark for correct usage of <TABLE> tag)(1 mark each for correct usage of <TR>, <TH> and <TD> tags) MOVIES THRILLERS INDIAN FICTION DIRECTOR DOR DIRECTOR DOR 10( mark for correct usage of ALIGN attribute)6.

7 <HTML> <HEAD> <TITLE>Eat healthy and live healthy</TITLE> </HEAD> <BODY LINK="Green" ALINK="Blue" VLINK="Red"> <CENTER> <H1> <FONT COLOR="maroon">KHAO PIYO RESTAURANT</FONT> </H1> </CENTER> <IMG SRC="RESTAURANT. jpg" ALIGN="right" HEIGHT=225 WIDTH=250> <FONT COLOR="purple" SIZE=5>Collect INFORMATION for<UL> <LI> <A HREF=" ">menus</A> <LI> <A HREF=" ">reservation</A> <LI> <A HREF=" ">catering</A> <LI> <A HREF=" ">tours</A> </UL> </font> <font size =5> <CENTER> <TABLE BORDER=2 BORDERCOLOR="blue" > <font color =blue> <CAPTION> Menus available are</CAPTION> </font> <TR> <TD> 1<TD> INDIAN<TR> <TD> 211<TD> ITALIAN<TR> <TD> 3<TD> CONTINENTAL<TR> <TD> 4<TD> THAI</TABLE> </CENTER> <BR>For further enquiries and reservations <A Us</A> </font> </BODY> </HTML>( mark for correct use of <HTML> tag)( mark for correct use of <BODY> tag)( mark for correct use of <TITLE> tag)(1 mark for attributes of <BODY> tag)( mark for correct use of <P> tag)( mark for displaying the heading correctly in center)( mark for correct use of <IMG> tag with the ALIGN attribute) (1 mark for changing table border to 2 pixel thick and border color blue)

8 (1 mark for giving table <CAPTION> with correct colour)(1 mark for correctly making the table)(1 mark for correctly making the bulleted list)(1 mark for correct use of <A> tag for creating first 3 links)(1 mark for correctly creating the email link)SECTION Choice Questions (Choose most appropriate option)[16] (c) (d) (d) (a) (b) (a) (b) (d) (c) (a) (b) (b) (d) (a) (d) (c)(1 Mark for each correct MCQ)


Related search queries