Q1. Fill in the blanks: 
1.1 To insert a table on a web page we use ___________ tag.
1.2 ___________ tag is used to create inline images.
1.3 ___________ attribute is used to span two or more columns in a table.
1.4 ___________ is used to describe data and ___________ is used to display data.
1.5 Any crime committed using computers & internet is termed as___________.
1.6 ___________ are programs that run independently and travel from computer to
computer across network.
1.7 ___________ is a software which is designed to prevent, scan and remove the
known computer viruses.
1.8 Digital code attached to a message that uniquely identifies the message is
called ___________ .
1.9 ___________ backup saves your data from natural disasters.
1.10 The electronic equivalent of junk mail is known as ____________.
Q2. State True or False: 
2.1 No value is specified with alt attribute of <img>tag.
2.2 Border is an attribute of <A>tag.
2.3 It is not possible to create link within current document.
2.4 Unordered list type creates a bulleted list.
2.5 Cellpadding is an attribute of <table>tag.
2.6 XML is a platform independent language.
2.7 A valid XML document that follows all grammar rules is well-formed document.
2.8 XML is Extensible Meta Language.
2.9 A worm is a self-replicating program which eats up the entire disk space.
2.10 A copy of data that can be used to restore and recover the data is called backup.
Q3. Expand the following terms: - (any 10) 
a) EDI b) E-BANKING c) PCI
d) SSL e) CSS f) W3C
g) XML h) GML i) URL
j) SGML k) DOS (in context to viruses)