CBSE Class 10 Foundation of Information Technology SET 4 Annual Question Paper 2017 (Delhi Scheme) PDF

Download as pdf or txt
Download as pdf or txt
You are on page 1of 12

Series HRK/1 SET-4

Code No. 53/1


Candidates must write the Code on
Roll No.
the title page of the answer-book.

• Please check that this question paper contains 12 printed pages.


• Code number given on the right hand side of the question paper should be
written on the title page of the answer-book by the candidate.
• Please check that this question paper contains 6 questions.
• Please write down the Serial Number of the question before attempting

m
it.

co
• 15 minute time has been allotted to read this question paper. The question
paper will be distributed at 10.15 a.m. From 10.15 a.m. to 10.30 a.m., the
students will read the question paper only and will not write any answer on
a.
the answer-book during this period.
di

SUMMATIVE ASSESSMENT-II
rin

FOUNDATION OF INFORMATION TECHNOLOGY


e

Time allowed : 3 hours ] [ Maximum marks : 70


re

Section-A
a

1. Fill in the blanks : 5


.c

(a) In XML an element which has no content is termed as ____.


w

(b) A tag that requires an opening as well as a closing tag is


w

called a _______ tag.


w

(c) The _______ tag provides additional information including


title, scripts used, etc. about a webpage.
[P.T.O.
(d) _____ tag make a numbered list.

(e) ______ tag is used for inserting a background image.

(f) For displaying coloured text _______ tag is used.

(g) Any software designed to harm the computer, or disturb its


normal operations is known as _______ .

(h) You can make use of an ______ software to detect the


presence of virus.

(i) Quick heal is a type of ________.

m
(j) _____ is a tricky application that appears to be legitimate
and useful at first glance.

co
a.
2. State True or False : 5
di

(a) An attribute defines a property of the element.


rin

(b) XML elements can be defined as building blocks of an


XML.
e
re

(c) HTML tags tell a web browser how to render a web page.
a

(d) SRC attribute specifies an alternate text for an image, if the


.c

image cannot be displayed.


w

(e) A hyperlink apply to text only.


w
w

(f) <th> tags always need to come at the start of a column.

53/1 2
(g) Unsolicited email attachments should not be opened as they
can be dangerous.

(h) Always use a same password for each website you log in to.

(i) Avoid pirated software as they are a security risk.

(j) Spyware is type of malicious program.

3. Short Answer Questions :

(a) What is the difference between cellspacing and cellpadding

m
attribute ? 2

co
(b) Write any two precautions to avoid spam. 2

(c) Write the HTML code to display image with red border. 2
a.
(d) Write the full forms of :
di

(i) WWW
rin

(ii) FTP

(iii) LI
e
re

(iv) HR 2

(e) Internet is a series of interconnected computers throughout


a
.c

the world. 2
w

(i) Name any one of the services that is offered on


internet.
w

(ii) Name any one of the internet service provider.


w

53/1 3 [P.T.O.
(f) Mr. Gupta is a farmer who is using internet to improve his
crop production. He uses a search engine to collect the
information. 2

(i) Explain what is a search engine.

(ii) Give example of search engine.

4. Short Answer Questions :

(a) Draw the XML tree for the following code : 5


<Building>

m
<Furniture>
<Wooden>24</Wooden>

co
<Plastic>50</Plastic>
</Furniture>
<Furniture>
a.
<Wooden>24</Wooden>
<Plastic>50</Plastic>
di
</Furniture>
</Building>
rin

(b) Observe the following table and write the HTML code to
generate it : 5
e
re

Column 1 Column 2 Column 3


a

Row 1 Cell 2 Row 1 Cell 3


Row 1 Cell 1
.c

Row 2 Cell 2 Row 2 Cell 3


w

Row 3 Cell 1
w

(c) What is the meaning of backup and why is it essential ?


w

Name any four devices to take data backup. 5

53/1 4
(d) Identify which of the following is a tag or an attribute : 3
(i) Img
(ii) A
(iii) Align
(iv) Color
(v) Font
(vi) Noshade

(e) Sunila works in a MNC and works online from home also.
She needs a fast internet connection. Which type of internet
connection is best suited for her ? Also she needs to upload

m
and download the files from remote sites. Which proocol

co
will help her to perform this activity ? 2

5. Long Answer Question : 10


a.
Observe the following output and write HTML code to generate it :
di
Apka Bazar
All Your Shopping Needs Met Under One Roof
rin

Availability of all possible leading brands. Guarantee of quality and price. Free
home delivery.
e
a re
.c

We provide the following category of products.


1. Clothing & Accessories
w

♦ Men
♦ Women
w

♦ Kids
2. Household Appliances
w

3. Grocery
Shop Timings : 10.00 am to 8.00 pm

53/1 5 [P.T.O.
Consider the following points while generating the web page :
• The title of the page is “Shopping”
• The heading is in red colour
• Text colour is maroon
• Font of entire document is Arial
• Image used is “bazar.jpg”
• The pages linked are :
♦ Clothing & Accessories to cloth.html
♦ Household Appliances to “house.html”
♦ Grocery to “grocery.html”
• Bottom message is of size 2

m
Section B

co
6. Multiple Choice Questions (Choose most appropriate option) : 18

(i) Is it easier to process XML than HTML ?


a.
(a) Yes
di

(b) No
rin

(c) Sometimes
e

(d) Can’t say


re

(ii) Well formed XML document means


a
.c

(a) It contains a root element


w

(b) It contain an element


w

(c) It contains one or more elements


w

(d) Must contain one or more elements and root element


must contain all other elements

53/1 6
(iii) Which of the following strings are a correct XML name ?

(a) myElement

(b) my Element

(c) #myElement

(d) None of the above

(iv) XML uses the features of

(a) HTML

m
(b) XHTML

(c) VML
co
a.
(d) SGML
di
rin

(v) How can we make attributes have multiple values :

(a) <myElement myAttribute="value1 value2"/>


e
re

(b) <myElement myAttribute="value1" myAttribute="value2"/>


a

(c) <myElement myAttribute="value1, value2"/>


.c

(d) attributes cannot have multiple values


w
w
w

53/1 7 [P.T.O.
(vi) The use of a DTD in XML development is :

(a) required when validating XML documents

(b) no longer necessary after the XML editor has been


customized

(c) used to direct conversion using an XSLT processor

(d) a good guide to populating a templates to be filled in


when generating an XML document automatically

m
(vii) <b> tag makes the enclosed text bold. What is other tag to
make text bold ?

(a) <strong>
co
a.
(b) <dar>
di

(c) <black>
rin

(d) <emp>
e

(viii) Which tag allows you to add a row in a table ?


re

(a) <td> and </td>


a
.c

(b) <cr> and </cr>


w

(c) <th> and </th>


w

(d) <tr> and </tr>


w

53/1 8
(ix) What is the correct HTML tag for adding a background color ?

(a) <body color="yellow">

(b) <body bgcolor="yellow">

(c) <background>yellow</background>

(d) <body background="yellow">

(x) Choose the correct HTML tag for the smallest size heading ?

(a) <heading>

m
(b) <h6>

co
(c) <h1> a.
(d) <head>
di

(xi) What is the correct HTML tag for inserting a line break ?
rin

(a) <br>
e

(b) <lb>
a re

(c) <break>
.c

(d) <newline>
w
w
w

53/1 9 [P.T.O.
(xii) Which of the following is not a pair tag ?

(a) <p>

(b) <u>

(c) <i>

(d) <img>

(xiii) To create HTML document you require a

m
(a) Web page editing software

co
(b) High powered computer
a.
(c) Just a notepad can be used
di

(d) None of the above


rin

(xiv) HTML documents are saved in


e
re

(a) Special binary format


a

(b) Machine language codes


.c
w

(c) ASCII text


w

(d) None of the above


w

53/1 10
(xv) What have caused the rise in computer crimes and new
methods of committing old computer crimes ?

(a) Increased use of computer and expansion of the


internet and its services.

(b) New security methods of detecting computer crimes.

(c) Creation of new software.

(d) World wide web.

m
co
(xvi) What is a worm ? a.
(a) A weakness in security system that never copies itself
di
into a computer’s memory until no more space is left.
rin

(b) A program that uses computer networks and security


e

holes to copy itself in the computer memory until no


re

more memory is left.


a

(c) Attaches itself to e-mails.


.c
w

(d) Corrupts or replaces boot sector instructions.


w
w

53/1 11 [P.T.O.
(xvii) How are viruses spread ?

(a) Through firewalls

(b) Downloading infected programs and files from


internet

(c) Garbled information

(d) Install anti-virus

(xviii) How do users prevent and protect themselves against

m
viruses ?

(a)
co
Do not open e-mail attachments, use an OS that has
a.
virus security features, scan other users’ media storage
di
devices before using them on your computer.
rin

(b) Missing files or folders should be deleted.

(c) Files with weird and obscene messages should not be


e
re

stored.
a

(d) Delete unwanted SPAM from your computer.


.c
w
w
w

53/1 12

You might also like