Table of contents | |
Class-X | |
Time: 90 | |
Minutes | |
M.M: 25 | |
Section - A | |
Section - B | |
Section - C |
General Instructions :
Read the following instructions very carefully and strictly follow them:
Q.1: Netiquette is short for:
(a) Network education terminology
(b) Internet inequities
(c) Internet etiquette
(d) Necessary teaching etiquette
Correct Answer is Option (c)
Netiquette is a combination of the words network and etiquette and is defined as a set of rules for acceptable online behavior.
Q.2: Choose the correct HTML tag for the largest heading.
(a) <h2>
(b) <h4>
(c) <h6>
(d) <h1>
Correct Answer is Option (d)
The <h1> tag is used to insert the main heading or the highest level heading.
Q.3: Which of the following property is used to set the height of an image?
(a) border
(b) height
(c) width
(d) moz-opacity
Correct Answer is Option (b)
The height attribute specifies the height of an image in pizels.
e.g.,- <img src = “image name” width
= “500” height = “600”>
Q.4: How do you change the font of an element?
(a) font-family
(b) font =
(c) f:
(d) font = family
Correct Answer is Option (b)
Font tag attribute font-family used to change the font. Some name of font-family are “Geneva”, “Times New Roman”, “Courier New”.
Q.5: In 1969 AT &T laboratories developed ________ which supported and worked on different hardware platforms.
(a) Linux
(b) Unix
(c) Windows
(d) Ubntu
Correct Answer is Option (b)
Unix is a family of multitasking, multiuser computer operating systems that derive from the original AT & T Unix, whose development started in the 1969s at the bell labs research center.
Q.6: The correct sequence of HTML tags for starting a webpage is:
(a) Head, Title, HTML, body
(b) HTML, Body, Title, Head
(c) HTML, Body, Head, Title
(d) HTML, Head, Title, Body
Correct Answer is Option (d)
The correct sequence of HTML tags to start a webpage is Html, Head, Title, Body.
Q.7: Which of the following element is responsible for making the text bold is HTML?
(a) <pre>
(b) <a>
(c) <b>
(d) <br>
Correct Answer is Option (c)
The <b> bold tag in HTML is used to display the written text in bold format.
Q.8: Intellectual property rights (IPRS) protect the use of information and ideas that are of
(a) Social value
(b) Moral value
(c) Commercial value
(d) Ethical value
Correct Answer is Option (c)
The economic and commercial value of Intellectual Property Rights(IPRS) as a means of protecting business interests, encouraging innovation and technology transfer.
Q.9: Which of the following tag is used to insert a line-break in HTML?
(a) <br>
(b) <a>
(c) <pre>
(d) <b>
Correct Answer is Option (a)
The <br> tag in the HTML document is used to create a line break in a text. If we place the <br> tag in HTML code, then it works the same as pressing the enter key in a word processor.
Q.10: How to create an unordered list (a list with the list items in bullets) in HTML?
(a) <ul>
(b) <ol>
(c) <li>
(d) <i>
Correct Answer is Option (a)
The <ul> tag in HTML is used to display the list items in a bulleted format. There can be four types of an unordered list: disc, circle, square and none.
Q.11: How to insert an image in HTML?
(a) <img href = “myimage.png“/>
(b) <img url = “myimage.png“/>
(c) <img link = “myimage.png“/>
(d) <img src = “myimage.png“/>
Correct Answer is Option (d)
The img tag and the src attribute is used to display an image on the webpage.
Q.12: How to add a background color in HTML?
(a) <body bg color: “red”>
(b) <body bg–color: “red”>
(c) <body bgcolor = “red”>
(d) <body color: “red”>
Correct Answer is Option (c)
<body bgcolor = “red”>
The bgcolor attribute is used to set the background color of an HTML element.
Q.13: The <hr> tag is HTML is used for
(a) new line
(b) verticle line
(c) new paragraph
(d) horizontal ruler
Correct Answer is Option (d)
The <hr> tag is used to specify a paragraph level thematic break in HTML document. It is called a horizontal rule and draw a horizontal line.
Q.14: What is concerned with that information an individual should have to reveal to others through the course of employment or through other transactions such as online shopping?
(a) Ethics
(b) Information privacy
(c) Digital divide
(d) Computer crime
Correct Answer is Option (b)
Information privacy, also called data privacy, is the aspect of IT that deals with the ability an organization or individual has to determine what data in a computer System can be shared with third parties.
Q.15: An HTML program is saved by using the ________ extension.
(a) .ht
(b) .html
(c) .hml
(d) none of these
Correct Answer is Option (b)
The .html or .htm extension both are used to save the HTML program. We can save our HTML file either by using the .html extension or by .htm extension.
Q.16: A technology that can help safeguard an internal network from intruders breaking in from the internet is a
(a) bridge
(b) hub
(c) firewall
(d) switch
Correct Answer is Option (c)
A firewall is a security device in the form of computer hardware or software.
Q.17: A program in HTML can be rendered and read by -
(a) web browser
(b) server
(c) interpreter
(d) none of the above
Correct Answer is Option (a)
HTML programs can be read and rendered by the web browser. A web browser can support several web pages.
Q.18: Which of the following tag is used to create a combo box (or drop-down box)?
(a) <list>
(b) <select>
(c) <input type>
(d) <ul>
Correct Answer is Option (b)
HTML <Select> tag is used to create a drop down list with multiple options. The <option> element is nested within the <select> tag to define options in a list.
Q.19: Which of the following are the attributes of the <form> tag?
(a) method
(b) action
(c) Both
(d) none of the above
Correct Answer is Option (c)
The <form> tag creates the HTML form for taking the input from the user. Both method and action are attributes of the <form> tag. The action attributes specifies where the form data is sent when the form is submitted.
Q.20: For using subscript in web document which tag is used?
(a) <sup> </sup>
(b) <sub> </sub>
(c) <subscript> </subscript>
(d) <superscript> </superscript>
Correct Answer is Option (b)
The <sub> tag is used to add a subscript text to the HTML document, eg., H2O, here 2 is v subscript tag <sub>2</sub>
Written by
Q.21: Riya is a student of class 10th. She got an assignment in which one question is based on the term that discusses the uneven distribution of information and communication technologies in society. Name the term.
(a) Digital divide
(b) Plagiarism
(c) Password
(d) Fraud
Correct Answer is Option (a)
Digital divide describes the uneven distribution of information and communication technologies in society. It encompasses the technical and financial ability to utilize available technology, along with access to the Internet.
Q.22: Consider the following HTML code:
<ul type = “circle”>
<li>Mango</li>
<li>Banana</li>
<li>Apple</li>
</ul>
Choose the correct output that would be shown upon execution of the above code, from the choices given below:
(a)
(b)
(c)
(d)
Correct Answer is Option (b)
<ul>tag defines the unordered list type attribute of <ul>tag define the type of list. <li>tag is used to define the list item. So, the correct output is
Q.23: Shreya is working in ABC company. She got a project for which, she needs a software. This software is used without violating copyrights. Which of the following is used for the same?
(a) Freeware software
(b) Shareware software
(c) Software license
(d) System software
Correct Answer is Option (c)
Software licenses typically provide end users with the right to one or more copies of the software without violating copyright. It is a document that provides legally binding guidelines for the use and distribution of software.
Q.24: Which of the following is a path to an image relative to the current location?
(a) Absolute URL
(b) Relative URL
(c) Both (a) and (b)
(d) None of these
Correct Answer is Option (b)
A relative URL is a path to an image relative to the current location. If the HTML file and image are placed in same folder then in coding defining the full path of an image is not necessary.
Q.25: We can create a bulleted list using the ________ tag.
(a) <OL>
(b) <UL>
(c) <DL>
(d) <LI>
Correct Answer is Option (b)
We can create a bulleted list using the <UL> tag. <UL> is unordered list, in which list item is defined by <LI>tag.
Q.26: Which of the following is not an example of fraud?
(a) Billing for services not provided
(b) Providing false information during enrollment
(c) Charges appear from unfamiliar or distant locations you haven’t visited
(d) Threatening someone on facebook
Correct Answer is Option (d)
Fraud is a deliberate act with the intention of obtaining an unauthorized benefit, either for oneself or for the institution, by using deception or false suggestions which are believed and relied upon by others.
Threatening someone on facebook is not an example of fraud.
Q.27: Identify which of the following tag is used to define the paragraph in HTML document?
(a) <paragraph>
(b) <p>
(c) <pr>
(d) <PRG>
Correct Answer is Option (b)
<P> tag is used to define the paragraph in HTML document. It is a container tag that has opening as well as closing tag.
Q.28: Which sequence of HTML tags for unordered list is correct?
(a) <html><body><ul><li></li></ul></body></html>
(b) <html><body><ul></ul><li></li></body></html>
(c) <html><body><ul></ul><li></li></html></body>
(d) <html><body><ul><li></li></ul></html></body>
Correct Answer is Option (a)
Unordered list is created the bulleted list and used <UL> tag and <LI> tag is used to add list item in unordered list.
So, the correct sequence for unordered list is
<html><body><ul><li></li> </ul></body></html>
Q.29: Anubhav is created a website for his sports academy and used a logo. He wants that his logo is not used by anyone. Which type of law will the use to stop logo piracy?
(a) Copyright
(b) Patent
(c) Trademark
(d) Renting
Correct Answer is Option (c)
Anubhav should use trademark law. Trademark is the registered word or text/logo depicting the identity of a product, work or company.
Q.30: Rahul has written the following code snippet as part of an HTML program
Hello <BR> World
Predict the output of the above from the following:
(a) Hello World
(b) hello World
(c) hello
world
(d) Hello
World
Correct Answer is Option (d)
<BR>tag is used to break the sentence or line. When we use <BR> tag that means word or sentence after <BR> tag will be display in next line.
So, the correct output is
Hello
World
Q.31: Consider the following code:
<img src =________ width=”100” height = “120”>
Fill in the blanks to set the image whose name is hello.jpg.
(a) hello.jpg
(b) “hello.jpg”
(c) “hello”
(d) All of these
Correct Answer is Option (b)
src is the attribute of <img>tag. This tag is used to set the image to whose name is given.
So, the correct given.
<img src = “hello.jpg” width=”100” height = “120”>
Q.32: Tag(s) required to create ordered list in HTML:
(a) <UL>
(b) <OL>
(c) <DL>
(d) <DT>
Correct Answer is Option (b)
Tag required to create ordered list in HTML is <OL>. This tag gives the numbered list in which list item is represented by <LI> tag.
Q.33: Which of the following is not a type of plagiarism?
(a) Inadvetently
(b) Collusion
(c) Word switch
(d) Digital divide
Correct Answer is Option (d)
Plagiarism refers to using some other person’s ideas and information without acknowledge that specific person as the source.
Inadvertently, collusion, word switch are the types of plagiarism.
Q.34: Why should we bridge the gap in ICT?
(a) For social mobility
(b) For overall economic growth
(c) For health democracy
(d) All of these
Correct Answer is Option (d)
We should bridge the gap in ICT for the following reasons:
For social mobility
For overall economic growth
For health democracy
Q.35: This attribute define the size of the text in the font element.
(a) type
(b) font
(c) face
(d) size
Correct Answer is Option (d)
Size attribute is used to define the size of the text in the font element. This attribute is used with <FONT>tag.
Q.36: Aayush wants to send highly sensitive form data such as username and password. Which method out of GET/POST should he use to send the form data?
(a) POST
(b) SET
(c) RESET
(d) URL
Correct Answer is Option (a)
Aayush should use POST method to send the form information in the HTTP environment.
Syntax
<form name = “form_name” action = “URL” method = “POST”>
Q.37: Ritwick wants to use a software but does not want to pay for it. Which type of software can he use?
(a) Freeware software
(b) Commercial source software
(c) Open source software
(d) Shareware software
Correct Answer is Option (c)
Ritwik can use open source software. Open source software is any kind of program where the developer behind it chooses to release the source code for free.
Q.38: The year in which HTML was first proposed ________ ?
(a) 1990
(b) 1995
(c) 1869
(d) 1992
Correct Answer is Option (a)
HTML stands for Hypertext markup language. The year in which HTML was first proposed 1990. This markup language is used for creating web pages.
Q.39: Which of the following tag is designed to fit on a single line of web page.
(a) <DD>
(b) <DL>
(c) <DT>
(d) <LI>
Correct Answer is Option (c)
DT stands for definition term. This tag (<DT>) is designed to fit on a single line of web page.
Q.40: What is the value of #FFFFFF ?
(a) Pink
(b) White
(c) Blue
(d) Black
Correct Answer is Option (b)
The value of #FFFFFF is white. It is hexadecimal code that specifies the text color.
Read the following text and answer the following questions on the basis of the same:
HTML stands for Hypertext Markup Language, and it is the most widely used language to write Web Pages.
Hypetext refers to the way in which web pages(HTML documents) are linked together. Thus, the link available on a webpage is called Hypertext.
As its name suggests, HTML is a Markup Language which means you use HTML to simply “mark-up” a text document with tags that tell a web browser how to structure it to display.
Originally, HTML was developed with the intent of defining the structure of documents like headings, paragraphs, lists and so forth to facilitate the sharing of scientific information between researchers.
Now, HTML is being widely used to format web pages with the help of different tags available in HTML language.
HTML is a markup language and makes use of various tags to format the content. These tags are enclosed within angle braces <Tag Name>. Except few tags, most of the tags have their corresponding closing tags. For example, <html> has its closing tag</html> and <body> tag has its closing tag</ body> tag etc.
Based on the given information, answer the Questions No. 41-45.
Q.41: Whenever you use the _________ element, anything following it starts from the next line.
(a) <BR />
(b) <IMG/>
(c) <IMG />
(d) <H/>
Correct Answer is Option (a)
Whenever you use the <br /> element, anything following it starts from the next line. This tag is an example of an empty element, where you do not need opening and closing tags, as there is nothing to go in between them.
The <br /> tag has a space between the characters br and the forward slash.
Q.42: Which of the following is used to visually break-up sections of a document?
(a) Paragraph
(b) Line break
(c) Horizontal line
(d) Heading
Correct Answer is Option (c)
Horizontal lines are used to visually break-up sections of a document. The <hr> tag creates a line from the current position in the document to the right margin and breaks the line accordingly. Again <hr/> tag is an example of the empty element, where you do not need opening and closing tags, as there is nothing to go in between them.
Q.43: In Hypertext Markup Language, what is the meaning of Hypertext?
(a) Web pages(HTML documents) are linked together
(b) mark-up a text document with tags
(c) defining the structure of documents
(d) None of these
Correct Answer is Option (a)
HTML stands for Hypertext Markup Language, and it is the most widely used language to write web pages. Hypetext refers to the way in which web page (HTML documents) are linked together. Thus, the link available on a webpage is called Hypertext.
Q.44: In HTML _________ tag is having three attributes called size, color, and face to customize your fonts.
(a) Body
(b) Title
(c) Head
(d) Font
Correct Answer is Option (d)
The font tag is having three attributes called size, color, and face to customize your fonts. To change any of the font attributes at any time within your webpage, simply use the <font> tag. The text that follows will remains changed until you close with the </font> tag. You can change one or all of the font attributes within one <font> tag.
Q.45: HTML tags are enclosed within
(a) [Tag name]
(b) {Tag name}
(c) <Tag name>
(d) (Tag name}
Correct Answer is Option (c)
HTML is a markup language and makes use of various tags to format the content. These tags are enclosed within angle braces <Tag Name>. Except few tags, most of the tags have their corresponding closing tags. For example, <html> has its closing tag </html> and <body> tag has its closing tag </body> tag etc.
Read the following text and answer the following questions on the basis of the same:
Secure data transmission means that data/information is not being received or modified by an unauthorized person, over a network, from source to destination. For secure data transmission, we can convert an actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he/she receives an unreadable message that cannot be easily converted into the actual message. The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each ‘A’ will be replaced by ‘D’ (letter ‘D’ is 3 positions down Letter ‘A’ in the alphabet), each ‘B’ will be replaced by ‘E’ and similarly, each ‘Z’ will be replaced by ‘C’. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption.
Based on the given information, answer the Questions No. 46-50.
Q.46: Secure data transmission means:
(a) Data can be accessed by an unatuorized person during transmission.
(b) Data can not be accessed by any unauthorized person during transmission.
(c) Transmission of data
(d) None of the above
Correct Answer is Option (b)
The transmitted data cannot be accessed or modified by an unauthenticated person.
Q.47: Which of the following techniques can be used for security of data?
(a) Authentication
(b) Authorisation
(c) Encryption
(d) All of the above
Correct Answer is Option (d)
Authentication: Sender and recipient must prove their identities to each other.
Authorisation: A particular sender/ receiver having the authority to send/ receive messages. Encryption: Encoding the message in order to send to the receiver.
Q.48: Caesar Cipher is:
(a) used for conversion of the actual message into an encrypted message
(b) an encryption technique
(c) both (a) and (b)
(d) None of the above
Correct Answer is Option (c)
The Caesar Cipher technique is one of the earliest and simplest method of encryption technique. It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter some fixed number of positions down the alphabet. For example with a shift of 1, A would be replaced by B, B would become C and so on. The method is apparently named after Julius Caesar who apparently used it to communicate with his officials.
Q.49: Person ‘X’ has received an encrypted message and wants to convert this message into the actual message (message before encryption). The technique he should use is called:
(a) Conversion
(b) Encryption
(c) Decryption
(d) None of the above
Correct Answer is Option (c)
Decryption is the technique to decode the encrypted message.
Q.50: In Ceaser Cipher, for which of the following values of key, the encrypted message will be the same as original message.
(a) 0
(b) 26
(c) both (A) and (B)
(d) None of the above
Correct Answer is Option (c)
For both 0 and 26 the key will be same for the encrypted message, using the Caesar Cipher technique.
303 docs|7 tests
|
|
Explore Courses for Class 10 exam
|