QB - Ict
QB - Ict
Theory : 05 Marks
Textbook Questions
A. Multiple choice questions
1. The collection of unprocessed facts, figures and symbols is known as ____________.
(a) Information (b) Software (c) Data and Information (d) None of the above
Ans. (d) None of the above as the correct answer is data
2. ______________ is the processed form of data which is organized meaningful and
useful.
(a) Information (b) Software (c) Data (d) None of the above
Ans. (a) Information
3. Hardware is any part of the computer that has a physical structure that can be seen and
touched.
(a) True (b) False (c) Not sure (d) None of the above
Ans. (a) True
4. Components of computer hardware are ____________________________.
(a) Input devices and output devices (b) A system unit and storage devices
(c) Communication devices (d) All of the above
Ans. (d) All of the above
5. __________ devices accept data and instructions from the user.
(a) Output (b) Input (c) Components of hardware (d) Storage
Ans. (b) Input
6. Which disk is made up of a circular thin plastic jacket coated with magnetic material?
(a) Hard Disk (b) Compact Disk (c) DVD (d) Floppy Disk
Ans. (d) Floppy Disk
7. ___________ disks are used to store more than 25 GB of data with a very high speed in
less amount of time.
(a) Digital Versatile (b) Compact (c) Blue‐Ray (d) None of the above
Ans. (c) Blue‐Ray
8. Random Access Memory and Read Only Memory are examples of _______________.
(a) Primary Memory (b) Secondary Memory
(c) Auxiliary Memory (d) Both primary and secondary memory
Ans. (a) Primary Memory
9. Which system uses only the digits 0 and 1?
(a) Bits (b) Binary number system (c) Secondary number system (d) Nibbles
Ans. (a) Bits
10. There are two primary types of softwares namely _________ and __________.
(a) General Purpose and tailor made
(b) Operating System and utility software
(c) Application Software and System Software
(d) None of the above
Ans. (c) Application Software and System Software
11. Gimp, Adobe Photoshop, Corel Draw, Picasa etc. are examples of _________ softwares.
Spreadsheets
(a) Word Processors (b) Desktop publishing (c) Presentation
Ans. (b) Desktop publishing
12. Which generation computers used high level languages such as FORTRAN and COBOL and
also used transistors instead of vacuum tubes?
(a) I Generation (b) II Generation (c) III Generation (d) V Generation
Page 1 of 49
Ans. (b) II Generation
13. IBM notebooks, Pentium PCs‐Pentium 1/2/3/4/Dual core/Quad core, PARAM 10000 are
examples of which generation of computers?
(a) I Generation (b) IV Generation (c) III Generation (d) V Generation
Ans. (d) V Generation
14. According to the functioning of computers, they are divided into three categories namely
_____, ________ and ________.
(a) Mainframe, Supercomputer and Mini computer
(b) Analog, Digital and Hybrid
(c) Palmtop, PC and Desktop
(d) Micro‐computers, Digital and Hybrid
Ans. (b) Analog, Digital and Hybrid
15. ___________ is a cabling technology for transferring data to and from digital devices at
high speeds.
(a) S‐Video Port (b) FireWire (c) Ethernet Port (d) PS/2 Port
Ans. (b) FireWire
16. ______________ is used to connect the monitor to the computer which offers images at
higher resolutions.
(a) USB Port (b) Video Graphics Array (c) Parallel Port (d) None of the above
Ans. (b) Video Graphics Array
B. Answer the following questions
1. 1. Explain the following terms
(a) RAM (b) Nibble (c) Digital Computers (d) Ethernet Port
Ans.
(a) RAM: RAM is Random Access Memory which is a volatile memory and store the data
randomly. The data is erased from RAM when the computer is switched off.
(b) Nibble is the smallest unit of memory which store 4 bits.
(c) Digital Computers: These computers deal with data in the form of numbers. They
mainly operate by counting and performing arithmetic & logical operations on numeric
data. Such computers are ‘many problems’ oriented.
(d) Ethernet Port: Ethernet Port is a port in computer to connect to wired network.
2. Name any two utility softwares.
Ans. Text Editors, Compression Utilities, Disk Fragmentation, Scan Disk, Encryption or
Decryption
3. Why there is a need of Auxiliary Memory?
Ans. We need Auxiliary memory to store the data permanently even after switching off the
computer. It is cheaper as compared to Primary memory.
4. Differentiate the following
(a) Hardware vs Software
(b) RAM vs ROM
(c) Application Software vs System Software
(d) Digital vs Analog
Ans.
a)
Hardware Software
1. It is any part of the computer that has a 1. Software is intangible i.e., that cannot
physical structure that can be seen and be seen and touched
touched
2. Example: Input/Output Device, Storage 2. Example: Application and System
Device, CPU, Memory Software.
b)
RAM ROM
Page 2 of 49
1. RAM is Random Access Memory 1. ROM is Read Only Memory
2. It is a volatile memory and its contents 2. It is permanently built into the
gets erased after the Machine is turned computer at the time of production and its
off. contents cannot be erased.
c)
Application Software System Software
1. It includes programs that direct the 1. includes the programs that enable the
computer to carry out specific tasks. computer’s hardware to work with and run
the application software
2. The two types of application software 2. The two types of system software are
are General Purpose and Tailor Made or Operating System and Utility Software.
customized software.
3. Example: MS Word, Tally 3. Example: Windows OS, Linux, Text
Editor
d)
Digital Analaog
1. These computers deal with data in the 1. Analog computers process analog, i.e.
form of numbers continuously varying data like voltage,
temperature etc.
2. Example: Personal Computer, 1. Example: Flight Computer in aircraft.
Calculator, Laptop etc.
5. Explain the functions of operating systems .
Ans. The operating system, also referred to as the OS, is a computer program that
manages all the other programs on your computer, stores files in an organized manner,
and coordinates the use of the computer hardware such as the keyboard and mouse.
6. Explain in brief all the generations of computer .
Ans.
I Generation (1945 – 55) Bulky, vacuum based and costly, used assembly language
II Generation (1955 – 65) Smaller than vacuum based computers, but better
performance-wise, used transistors instead of vacuum tubes.
III Generation (1965 – 75) Small Scale Integration and Medium Scale Integration
technology were implemented in CPU, I/O processors etc. Faster processors with magnetic
core memories that were later replaced by RAM and ROM.
IV Generation (1975 – 89) Microprocessors were introduced where complete
processors and large section of main memory could be implemented in a single chip.
V Generation: 1989 to present Computers use extensive parallel processing, multiple
pipelines, multiple processors etc.
7. Draw and explain IPO cycle .
Ans.
Page 3 of 49
Mini computers provide more power than micro computers in terms of speed and storage
capacity. They are also less expensive. Their performance is also lower than that of
mainframes.
Mainframe computers can also process data at very high speeds, but less than that of
super computers. Normally, they are used in banking, airlines and railways etc. for their
applications.
A supercomputer is the fastest type of computer. They are employed for specialized
applications that require large amounts of mathematical calculations. Example: weather
forecasting, climate research, molecular modelling
10. Differentiate between Ethernet Port and USB .
Ans.
Ethernet Port USB
1. It is a port to connect to wired network 1. It is a port to connect to USB devices
like printers, USB drives, External hard
disk etc.
2. The computer comes with only one 2. Computer have more than one USB ports
inbuilt Ethernet port to connect multiple USB devices at one
time.
C. Lab Session
1. State whether the following statements are true or false
(a) The input device receives data in machine readable form - False
(b) The Arithmetic and Logic Unit and the Central Processing Unit are part of the Control
Unit - False
(c) The plotter is an input device - False
(d) RAM and the ROM storage is effected by the presence of electricity. - False
2. Justify the statement ‘Computers are used only to collect data for science and research’
as either true or false.
Ans. False, as computers are used for many purpose besides science and research like
Banking, E-Business, E-Learning etc.
3. Tanya is working on a project in her school. For the same, she wants to store multimedia
information in a portable storage device. Her information is subject to change as per her
needs. Which storage device would you recommend? Why?
Ans. It can be any storage device which is re-writable like USB drive, external hard disk,
memory card or CD-RW etc.
4. Prem Das is an editor and is currently working in a popular News House group. His job
includes writing stories and articles for his newspaper. For writing his documents, he uses
WordPad and Notepad, but is facing problems with the formatting of the document. He
is also not able to check the grammatical errors. Which type of software should he be
using and why?
Ans. To write error free documents he can use word processor software like MS Word or
Openoffice.org Writer
5. Mr. Shivank works in a multinational company. He often has to travel in and out of the
country in order to complete his tasks. He wants to buy a computer that is portable
and can be easily carried overseas. Which kind of computer should he buy to store his
important information and data?
Ans. He can either buy a palmtop or laptop as they both are portable and easy to carry.
6. Where do you store the set of instructions that gets the computer ready to receive
instructions? Discuss the different tasks performed by the OS.
Ans. ROM uses instructions stored in it to carry out a series of tasks automatically, before
we can actually use the computer.
The different tasks performed by OS are:
1) manages all the other programs on your computer,
2) stores files in an organized manner,
3) coordinates the use of the computer hardware
7. ‘Without prior knowledge, a user cannot interact with the computer’. Do you agree with
this statement? Justify your answer.
Page 4 of 49
Ans. No, by following the instructions on the screen one can operate computer.
Board Exam Questions – Previous Years / Sample Papers
1. Which of the following is not an input device?
i) Scanner ii) Microphone iii) Speaker iv) Trackball
Ans. iii) Speaker
2. ___________ acts as the nerve centre that sends control signal to all other units.
i) Control Unit ii) Software iii) ALU iv) Memory
Ans. i) Control Unit
3. Random Access Memory and Read Only Memory are examples of ____________.
i) Auxiliary Memory ii) Primary Memory iii) Secondary Memory iv) Both primary and
secondary memory
Ans. ii) Primary Memory
4. GIMP, Adobe Photoshop, Corel Draw, and Picasa are examples of _________ softwares. i)
Spreadsheets ii) Word Processors iii) Desktop publishing iv) Presentation
Ans. iii) Desktop publishing
5. What is the significance of System Software?
Ans.
System software includes the programs that enable the computer’s hardware to work with
and run the application software.
Or
System software is the interface between user, other programs and the computer’s
hardware.
Other Questions
Q1. What is Data?
Ans. Data is a collection of unprocessed facts, figures, and symbols.
Q5. Input devices, output devices, a system unit, storage devices, and communication devices
are all components of ___________________.
Ans. Computer Hardware
Page 5 of 49
Q9. What are the functions of output devices?
Ans. 1. It accepts the results produced by the computer which is in the coded form or
machine readable form.
2. It converts these coded results into human readable form.
3. It supplies the converted results to the user.
Q11. A ____________ is made up of a circular thin plastic jacket coated with magnetic
material. Its outer cover which is a hard plastic protects this plastic disk. It can hold 1.44
MB data.
Ans. Floppy disk.
Q12. ___________ is made up of a metal disk and coated with a metal oxide used to store bulk
of data.
Ans. Hard Disk
Q14. _____________is an optical storage disc similar to CD-ROM, as this is double sided with
dual layer disc and can hold 4.7 GB of data.
Ans. DVD (Digital Versatile Disc)
Q15. ____________are used to store more than 25 GB of data with a very high speed
in less amount of time.
Ans. Blue-Ray Disks
Q16. A single layer of Blue-Ray Disk can store _________ hours of video where as double layer
Blue-Ray Disk can store more than _______ hours of video.
Ans. 13 hours, 20 hours
Q18. ____________ is used in digital cameras, game consoles, mobile phones etc.
Ans. Memory Card or flash memory card
Q19. The ___________ is the box that protects the internal electronic components from damage
Ans. system unit
Q21. The ___________interprets and carries out the basic instructions that operate the
computer
Ans. CPU
Page 6 of 49
Q24. CPU consists of ______________ and _________________
Ans. ALU (Arithmetic and Logic Unit) and CU (Control Unit)
Q26. __________ acts as the nerve centre that sends control signal to all other units.
Ans. Control Unit
Q27. The control unit and ALU are usually many times ___________than other devices
connected to a computer system.
Ans. Faster
Q30. ____________ refers to memory that can be selected and used randomly.
Ans. RAM
Q31. The information stored in _____________ disappears the very moment the machine is
turned off. It is also referred to as volatile memory.
Ans. RAM
Q32. ____________ is permanently built into the computer at the time of production
Ans. Read Only Memory
Q33. ___________ permanently stores a set of instructions which instructs the computer how to
work.
Ans. ROM
Q34. Memory, storage, files and folder sizes are all measured in _________.
Ans. bytes.
Q39. 1 MB = ___________
Ans. 1024 Kilo Bytes
Q40 1 GB = ___________
Ans. 1024 Mega Bytes (MB)
Q41. 1 TB = ___________
Ans. 1024 Giga Bytes (GB)
Page 7 of 49
Q41. 1 PB (Peta Bytes) = __________
Ans. 1024 Tera Bytes (TB)
Q50. ____________ is the interface between user and the other programs and the computer’s
hardware.
Ans. System software
Q51. There are two categories of system software: ____________ and _____________.
Ans. Operating system and utility software.
Page 8 of 49
5. Data Storage – can store huge quantity of data
6. No Heuristics – doesn’t learn from its own mistakes
Q56. The first electronic computer was designed and built at the _____________based on
vacuum tube technology.
Ans. University of Pennsylvania
Q57. Computers have been divided into ____________ generations according to the
development of technologies
Ans. Five
Q61. In _____________ generation Small Scale Integration and Medium Scale Integration
technology were implemented in CPU, I/O processors etc. Faster processors with magnetic
core memories that were later replaced by RAM and ROM.
Ans. III Generation
Q63. _________ Generation Computers use extensive parallel processing, multiple pipelines,
multiple processors etc.
Ans V Generation
Q64. ________ computers deal with data in the form of numbers. They mainly operate by
counting and performing arithmetic & logical operations on numeric data. Such computers
are ‘many problems’ oriented.
Ans. Digital
Q67. ____________ computers are used in banking, airlines and railways etc. for their
applications.
Ans. Mainframe
Page 9 of 49
Q70. Differentiate between mainframe computer and super computer.
Ans Mainframe Super Computer
1. Process data at very high speeds, but 1. is the fastest type of computer
less than that of super computers
2. a mainframe uses its power to execute 2. A supercomputer
many programs at the same time. channels all its power into executing a few
programs at great speed.
3. Used in banking, airlines and railways 3. used in quantum mechanical physics,
etc. weather forecasting, climate research,
molecular modeling etc.
Q71. Draw a diagram of IPO.
Ans.
Q72. The _________ Ports are simple, 6-pin, low-speed serial connections
commonly used to connect a keyboard and mouse.
Ans. PS/2
Q73. ____________is used to connect the monitor to the computer. It offers images at higher
resolutions. It can produce as many as 256 colors at a time from a palette of 262,144
colors.
Ans. Video Graphics Array (VGA)
Q74. ___________means the device is capable of receiving more than one bit at a time.
Ans. Parallel
Q76. ___________ is a technology for transmitting video signals over a cable by dividing the
video information into two separate signals: one for color (chrominance), and the other
for brightness (luminance).
Ans. S-Video Port
Q78. ____________ is a protocol for transferring data to and from digital devices.
Ans. USB
Q79. ________ is a cabling technology for transferring data to and from digital devices at high
speeds.
Ans. FireWire
Q80. The process of decoding data that has been encrypted into secret format is called
_______________
Ans. Decryption
Q81. Most keyboards attach to the PC via _________ connector or _______ port.
Page 10 of 49
Ans. PS/2 or USB port
Q86. __________ permanently stores a set of instructions which instructs the computer how to
work. After we switch on the computer, it uses instructions stored here to carry out a
series of tasks automatically, before we can actually use the computer.
Ans. Read Only Memory
Page 11 of 49
GIMP (GNU Image Manipulation Program)
Theory : 10 Marks
Practical: 20 Marks
Textbook Questions
A. Multiple choice questions
1. _________ tool helps you to add a new layer to the image which is identical copy of the
active layer.
(a) Smudge Tool (b) Dodge Tool (c) Perspective Tool (d) Duplicate Layer
Ans. (d) Duplicate Layer
2. By default the mask is shown in ______, but you can change this if another mask colour
is more convenient.
(a) Red (b) Blue (c) Green (d) No colour
Ans. (a) Red
3. In _________ mode, the selection is shown as a translucent screen overlying ‐the image,
whose transparency at each pixel indicates the degree to which that pixel is selected.
(a) Default (b) Quickmask (c) Marching ants (d) Normal
(b) Quickmask
4. __________ are the transparent sheets one on top of the other.
(a) Masking (b) Tools (c) Layers (d) None of the above
Ans. (c) Layers
5. By default the extension of Gimp file is ______
(a) .XCf (b) .BMP (c) .TIFF (d) .PNG
Ans. (a) .XCf
6. GPL stands for
(a) General Private license (b) Great Pioneer License (c) General Public Limited (d) General
Public License
Ans. (d) General Public License
7. The image loses some of its quality by being _______
(a) Scaled (b) Merging (c) Renaming (d) Masking
Ans. (a) Scaled
8. In _______ mode, over‐application of the tool will produce noise.
(a) Sharpen (b) Blur (c) Dodge (d) Smudging
Ans. (a) Sharpen
9. ________ takes colour in passing and uses it to mix it to the next colours it meets.
(a) Sharpen (b) Blur (c) Dodge (d) Smudging
Ans. (d) Smudging
B. Answer the following questions:
1. Name the application areas where Gimp can be used.
Ans.
1. It can be used in DTP office to edit photographs.
2. It can be used to edit photos for website designing.
3. It can be used in Advertising agency to create photos.
4. It can be used by publishing house like magazine or newspaper office.
2. Mention all the features of Gimp.
Ans.
1. It can be used as a simple paint program
2. It can be used for expert photo retouching program
3. It can convert and save files in JPEG, GIF, TIFF etc.
4. It can be installed in different operating systems like MS Windows, Linux,
Mac OS etc.
Page 12 of 49
3. What do you understand by General Public License (GPL)?
Ans. It is a license issued for the open source software’s.
4. Which tool is used to align the objects placed on different layers? Explain all its options.
Ans. Align tool. The different options are left, right, horizontal middle, top,
bottom, vertical middle
5. Name the properties needs to be changed while scaling the image.
Ans. Height, Width, X and Y resolution, and Interpolation
6. Which tool is used to lighten the pixels in an image?
Ans. Dodge Tool
7. Which tool is used to darken the colour pixels in an image?
Ans. Burn Tool.
8. Differentiate between Shear and Perspective tool.
Shear Tool Perspective Tool
1. Shear tool is used to shift one part 1. Perspective tool is used to change
of the image in one direction and the the dimension of the image.
opposite part in opposite direction like
in horizontal shearing if the top part of
image moves to the left then the
bottom part of the image will move to
the right.
2.
9. What is the default background and foreground colour of image window?
Ans. Background – Black, Foreground – White
10. How is blur tool different from smudge tool?
Ans.
Blur Tool Smudge Tool
1. Blur Tool mixes the colours in 1. Smudge Tool mixes all the colours at
neighbouring pixels. distance it meets.
2. It increases the similarity of pixels. 2. It increases the similarity of colours
11. Name any four tools used for changing the pixel arrangement in an image.
Ans.
a. Scale Tool
b. Blur/Sharpen Tool
c. Brush & Pencil Tool
d. Eraser Tool
e. Blend Tool
f. Smudge
g. Dodge / Burn Tool
12. What is the difference between Blur tool and Sharpen tool?
Ans.
Blur Sharpen
1. It mixes the colours in neighbouring 1. It separates the colours in
pixel neighbouring pixel.
2. It increases the similarity of pixels. 2. It Increases the contrast of the
pixels.
13. How is flipping an image different from rotating an image?
Ans. Flipping means creating a mirror image of the selection or image or layer.
Fliiping can be either horizontal flipping or vertical flipping.
Rotating an image means revolving or spinning an image to a specific angle. Like 15
degree/ 30 degree etc.
14. Write the steps to apply blend effect on an image?
Page 13 of 49
Ans.
1. Change the background and foreground colour in the toolbox with the
colours that we want to blend. For Example if we want to mix blue with red
we will change the foreground colour to be blue and background colour to
be red.
2. Click on the blend tool in tool box.
3. Click on the image by left clicking on mouse button and drag the mouse to
the position in the image till which we want to blend colours.
4. Release the mouse left button to stop blending.
15. What are Layers? What is the purpose of using Layers?
Ans. Layers are the transparent sheets one on top of the other.
The purpose of layers is to work on one element of an images without disturbing others.
16. What is the need of merging the Layers?
Ans. if we want multiple layers to become one single layer then we can merge the
layers.
C. Identify the tools used for the following purpose:
1. To resize the layer/image Scale
2. To move layers Move
3. To align the layers with various objects Align
4. To create the mirror image Flip
5. To draw free hand drawings Pencil
6. To lighten the colour pixels of an image Dodge
7. To give wet paint effect in an image Smudge
8. To shift one part of an image/ a layer to a particular direction Shear
9. To apply different colours without effecting the original image Quickmask
10. To remove objects from the canvas Eraser
D. Application Oriented Questions
1 Shivank has collected pictures of his favourite superhero and wants to make a
collage of the superhero in action. Suggest him the way to make collage.
Ans. He can open all the images as a layer and then scale them on the canvas to make a
collage.
2 Amishi wants to change the background of her class photograph with the school \
building. Help her to do the same.
Ans. He can open the image of her and the school building as a layer and then bring her
photograph to the top of the building layer and then start masking.
3 Rudraksh has to send his photograph to the passport office for the processing of his
Passport but his photograph clicked by the photographer is very dark due to
insufficient light. Help him lighten the colour pixel of his photograph as per the
requirement.
Ans. He can use Dodge tool.
4 Geetanjali has got a project work in she has been given two images, where one
image depicts a girl walking on the grass and other one depicts an ocean. Now she
has to project as if the girl is walking on the water surface. Suggest her the way to
accomplish the task.
Ans. She can open both the images as layers and then bring the picture of grass layer
over the layer of ocean and then start masking.
5 Avni wants to change her coloured photograph into white/black photograph along
with the borders and corners of the image without affecting the original image.
Page 14 of 49
Help her to do the same.
Ans. She can open the image and then click Image Mode Grayscale
6 Bhuvi is working on her social science project work. She wants to add the image of
the Minister but the image is not in the required direction. She needs the mirror
image of the photograph. Suggest her the tool to perform the task.
Ans. She can use Flip tool
7 Mohit has got a hazy image. He wants to increase the contrast of the image.
Suggest him the tool to complete the task.
Ans. He can use Sharpen tool.
8 Vasu has inserted an image in a new file. He wants to duplicate the image on the
same layer. Suggest him the tool which will fulfil his requirement.
Ans. He can click on image menu Layer Duplicate Layer.
Board / Sample Papers Questions
1. Identify the tools used for the following purpose:
a. To lighten the colours in an image.
b. To shift one part of an image, a layer, a selection or a path to a direction and the other part to
the opposite direction.
Ans. a. Dodge tool
b. Shear tool
2. Name any four tools used for Retouching an image in GIMP.
Ans. a. Scale Tool
b. Blur/Sharpen Tool
c. Brush & Pencil Tool
d. Eraser Tool
e. Blend Tool
f. Smudge
g. Dodge / Burn Tool
3. Differentiate between Blur and Sharpen tool.
Ans. Blur Sharpen
Blur mode causes each pixel affected by the Sharpen mode causes each pixel to become
brush to be blended with neighbouring pixels, more different from its neighbours, it
thereby increasing the similarity of pixels increases contrast inside the brushstroke
inside the brushstroke area. area.
Blurring can be useful to soften some In “Sharpen” mode, the tool works by
element of the image that stands out too increasing the contrast where the brush is
much. applied.
4. What are Layers?
Ans. In GIMP terminology, each individual transparency is called a Layer. Layers are the transparent
sheets one on top of the other. You can see through transparent areas of a layer to the layers
below.
5. What is the purpose of using Layers?
Ans. Layers allows us to work with one element of an image without disturbing the others. Layer
provides a variety of effects that change the appearance of the image.
6. Abhay scanned a few photos but some of the scanned photos did not look colourful enough.
How can he improve their tonal range?
Ans. If some of the scanned photos do not look colourful enough, we can easily improve their tonal
range with the “Auto” button in the Levels tool (Colours→Levels).
7. What steps should Shikha perform to enlarge the image of the Medical prescription of her Aunt
Page 15 of 49
which she has opened in GIMP?
Ans. Step 1: Click on Image‐> Scale Image
Step 2: Set the required width and height and click on scale.
8. How is Flip tool different from Rotate tool?
Ans. Using a Flip tool on an image produces its mirror image.
Whereas ,
Rotate tool helps to rotate an image by different angles.
9. What is masking?
Ans. Masking effect allows you to create merge effects in an image.
10. Abhay scanned a few photos but some of the scanned photos have a colour casts. How can he
improve the colour cast?
Ans. If there are any color casts, you can correct them with the Curves tool (Colours→Curves).
11. Not all effects can be applied to all kinds of images. Explain.
Ans. Yes, This is indicated by a grayed‐out menu entry.
12. How can you change the image mode to RGB?
Ans. Image→Mode→RGB
13. How can you add an alpha channel?
Ans. Layer→Transparency→Add Alpha Channel
14. How can you flatten an image?
Ans. Image→Fla en Image
15. What are Retouching tools? Give Examples.
Ans. Retouching tools are used for the arrangement of pixels.
Example:
a. Scale Tool
b. Blur/Sharpen Tool
c. Brush & Pencil Tool
d. Eraser Tool
e. Blend Tool
f. Smudge
g. Dodge / Burn Tool
Page 16 of 49
Q5. Write the name of five of the tools to select a part of the image in GIMP.
Ans. Rectangle select tool, oval select tool, lasso tool, fuzzy select tool, select by color
Q6. The ___________ Select tool helps you to select areas of the current layer or
image based on colour similarity.
Ans. Fuzzy
Q8. The ____________ tool is used to remove areas of colour from the current layer or
from a selection of this layer.
Ans. Eraser
Q9. The Bucket Fill tool fills a selection with the current _____________ colour
Ans. Foreground
Q11. ___________ is used to select a specified area which you want to focus and
removes the unwanted parts or everything outside the selected area of a picture
Ans. Cropping
Q13. In GIMP, the __________ are virtually stacked up on top of each other
Ans. Layers
Q15. What is the use of Align tool? What are the different align options.
Ans. The Align tool is useful to align the image layers with various image objects. The
different align options are left edge, horizontal middle, right edge, top edge,
vertical middle, or bottom
Q16. The ________ Image command enlarges or reduces the physical size of the image
by changing the number of pixels it contains.
Ans. Scale
Page 17 of 49
of selection content or of a path.
Q26. The __________ Layer command adds a new layer to the image which is identical
copy of the active layer.
Ans. Duplicate
Q29. By default the mask is shown in ___________, but you can change this if another
mask colour is more convenient.
Ans. Red
Page 18 of 49
Ans. In Quickmask mode, the selection is shown as a translucent screen overlying the
image, whose transparency at each pixel indicates the degree to which that pixel
is selected.
Page 19 of 49
Tables and Frame
Theory : 06 - 08 Marks
Textbook Questions
A. Multiple choice questions
1. <TR> belongs to Frameset tag.
(a) <Table> (b) <DIV> (c) <Frameset> (d) <TD>
Ans. (a) <Table>
2. ______ tag is used to add columns to a table
(a) definition list (b) definition list term (c) definition list description (d) none of the
above
Ans. (d) none of the above as <td> or <th> tag is used to add a column
3. Which attribute is used to define cell contents to left ?
(a) VAlign (b) Align (c) GAlign (d) HAlign
Ans. (b) Align
4. Tag to add a row to a table.
(a) TR (b) TD (c) TH (d) TC
Ans. (a) TR
5. Which of the following is used to specify the beginning of a table’s row?
(a) TROW (b) TABLER (c) TR (d) ROW
Ans. (c) TR
6. In order to add border to a table, BORDER attribute is specified in which tag
(a) THEAD (b) TBORDER (c) TABLE (d) TR
Ans. (c) TABLE
7. Which of these tags are called table tags?
(a) <Thead><body ><tr> (b) <Table><tr><td>
(c) <Table><head><tfoot> (d) <Table><tr><tt>
Ans. <Table><tr><td>
8. ___________ tag is used to define the heading of a table
(a) TABLE (b) COLUMN (c) HEADING (d) TITLE
Ans. TH
9. Which HTML command is used to align the contents of the cell to right.
(a) <TR align= right-> (b) <TD align = right>
(c) <TD> align = right (d) All of the above
Ans. (b) <TD align = right>
10. Which of the following statements is incorrect:
(a) < frameset rows = “20% , 80 %”> (b) < frameset cols = “40% , 60 %”>
(c) < frameset rows = “60% , 60 %”> (d) < frameset rows = “60% , 40 %”>
Ans. c) < frameset rows = “60% , 60 %”>
B. Answer the following questions:
1. What attribute will be used on the CAPTION tag to put the table description at the bottom
of the table?
Ans. <caption align=”bottom”>
2. Write the code to display a ‘ghost cell’.
<table>
<tr>
<td>S.no</td>
<td>Name</td>
</tr>
<tr>
<td>1</td>
</tr>
</table>
3. Name the tag that defines how to divide the window into frames.
Ans. <frameset>
4. Name the tag that is used to put HTML document into frames.
Page 20 of 49
Ans. <frame src=”a.html”>
5. Where the text is displayed which is specified in the <caption> tag?
Ans. The <caption> tag is used to provide a text to the table so as to explain the contents
of the table. It is generally in bold, at center with respect to the table.
6. Which attribute will you use if you do not want frame windows to be resizable?
Ans. Noresize
7. Differentiate between <TH> and <Caption> tags.
Ans.
<TH> <Caption>
1. The TH element or <TH> tag creates the 1. The <caption> tag is used to provide a
header cell in table. text to the top or bottom of table.
2. Example: 2. Example:
S.No. Name List of students
1 XYZ S.No. Name
Here S.No. and Name is created using <th> 1 XYZ
element. Here the text “List of students”is a
caption.
8. How <TD> and <TR> are different from each other?
<TD> <TR>
1. <TD> tag is used to specify the table 1. <TR> tag is used to create a row in a
data. table.
2. Example: 2.
S.No. Name S.No. Name
1 XYZ 1 XYZ
Here 1 and XYZ is created using <td> tag Here in the able table there are two rows
which are created using <tr> tag.
9. What is the purpose of using Frames in HTML pages?
A frame divides the screen into separate windows with both vertical and horizontal scroll
bars. This allows the user to access different pages of a website from one screen.
10. Discuss all the tags with their attributes to create a frame.
Ans. The attributes used with the FRAMESET element are given in the table below:
The FRAMESET element works in conjunction with the FRAME tag whose attributes are
discussed below:
Page 21 of 49
11. What does ‘n’ stands for in the following tags?
(a) <Table border=n>
(b) <table bgcolor = “n”>
(c) <td bgcolor = “n”>
(d) <td width = n>
(e) <a href= “n”>
Ans. (a) here n stands for the table border thickness.
(b) here n is the background colour of table
(c) here n is the background colour of the cell
(d) here n is the width of the column
(e) here n is the hyperlinked reference file name
12. Which code snippet will display the following? Explain why
Ans. Option 2
<TABLE border=2>
<TR>
<TH>MERGEDROW</
TH>
<TH> </TH>
</TR>
<TR>
<TD>R2</TD>
<TD>1</TD>
</TR>
<TR>
<TD>R3</TD>
<TD>2</TD>
</TR>
<TR>
<TD>R4</TD>
<TD>3</TD>
</TR>
Page 22 of 49
</TABLE>
Board Exam Questions – Previous Years / Sample Papers
1. Explain the various values associated with “scrolling” attribute of FRAME tag.
Ans.
The scrolling attribute of FRAME tag can take 3 values:
Yes will insert both the scrolls irrespective of the size of the sub-window.
Auto will insert the scrolls only when the contents of the sub-window are not visible.
No will not insert any scrolls even when all the contents are not visible.
2. Write HTML code to display the following table :
Specifications:
The title of the webpage is “Schedule”
The Caption of the Table is Duty Chart.
8 AM, 10 AM, 12 AM are Headings given to the table.
Ans.
<HTML>
<HEAD>
<TITLE> Schedule </TITLE>
</HEAD>
<BODY>
<TABLE Border = 1>
<CAPTION>Duty Chart</CAPTION>
<TR>
<TH> 8 AM </TH>
<TH> 10 AM </TH>
<TH> 12 AM </TH>
</TR>
<TR>
<TD> KEVIN</TD>
<TD> KHUSHBOO </TD>
<TD> AMARJEET </TD>
</TR>
</TABLE>
</BODY>
</HTML>
3. Which of these tags are all <table> tags?
a) <table><head><tfoot>
b) <table><tr><td>
c) <table><tr><tt>
d) <thead><body><tr>
Ans. b) <table><tr><td>
4. Choose the correct HTML to left-align the content inside a table cell
a) <td valign="left">
b) <tdleft>
c) <td leftalign>
d) <td align="left">
Ans. d) <td align="left">
5. 14. Which of the following statements is true?
a) HTML documents involving frames should contain both the BODY and FRAMESET tag.
b) FRAME can be used in place of FRAMESET.
Page 23 of 49
c) HTML documents involving frames should contain only the BODY tag.
d) HTML documents involving frames should contain the FRAME-SET tag and not
the BODY tag.
Ans. d) HTML documents involving frames should contain the FRAME-SET tag and not the
BODY tag.
6. Which of the following is legal HTML syntax?
a) <FRAMESET COLS= "50%, 50%">
b) <FRAMESET ROW= "50%, 50%">
c) <FRAMESET COLUMNS= "50, 50">
d) <FRAME COLS= "50%, 50%">
Ans. a) <FRAMESET COLS= "50%, 50%">
Other Questions
1. Explain all tags and attributes for creating table.
Page 24 of 49
Forms
Theory : 06 - 08 Marks
Textbook Questions
A. Multiple choice questions
1. A _____ can be inserted in HTML document which can act as a container for all the input
elements.
(a) Text field (b) Teaxt area (c) Form (d) Command Button
Ans. (c) Form
2. ________ method is used to sent form data as URL variables.
(a) get (b) set (c) post (d) none of them
Ans. (a) get
3. ________ method is used to sent form data as HTTP post.
(a) get (b) set (c) post (d) none of them
Ans. (c) post
4. What is the purpose of a web form
(a) An outdated feature still used to help the page load faster
(b) An useful way to send information from the user directly to the search engines
(c) A way to input data into a website or an application
(d) To enable the user to navigate the website with ease
Ans. (c) A way to input data into a website or an application
5. Which element allows for the creation of groups of options in a select menu?
(a) <select> (b) <group> (c) <option> (d) <optgroup>
Ans. (a) <select>
6. Which of the option will be selected with the following code snippet?
<select>
<option selected value=”Fiat”>Fiat</option>
<option value=”selected”>Saab</option>
<option value=”opel”>selected</option>
<option value=”audi”>Audi</option>
</select>
(a) Fiat (b) Saab (c) Selected (d) Audi
Ans. (a) Fiat
B. Answer the following questions:
1. Why forms are used in web pages?
Ans. A form is an object that is used for collecting data from the user.
2. Explain all the attributes of Form tag.
Ans. The two main attributes of <form> tag are:
1) Method=POST/Get
2) Action=filename
The method attribute specifies how to send form-data
Action attribute specifies where to send form-data
3. Differentiate between Get & Post methods of Form tag.
Ans.
Get Post
1. Appends form-data into the URL in 1. Appends form-data inside the body of
name/value pairs the HTTP request (data is not shown is in
URL)
2. The length of a URL is limited (about 2. It has no size limitations
3000 characters)
3. Useful for form submissions where a 3. Form submissions with POST cannot be
user want to bookmark the result bookmarked
4. GET is better for non-secure data, like 4. POST is better for secure data like id
query strings in Google and password.
4. How text field and text area controls are different from each other?
Ans.
Page 25 of 49
Text Field Text Area
1. Text Field can take input only in a single 1. TextArea can take input in multiple
line lines.
2. Textfield control is created using 2. Textarea control can be created using
<input type=”text”> tag <textarea> tag
5. Explain the use of Radio buttons in HTML forms with the help of an suitable example
Ans. Radio button enables the selection of one of the options out of the many
6. Mention all the attributes of Check box. Justify how it is different from Radio button.
Ans.
The attributes of checkbox are: Name, Value, Checked
Check box Radio button
1. Checkbox allows for multiple selections 1. Radio button enables the selection of
of items. one of the options out of the many
2. It is Created using 2. It is Created using
<input type=”checkbox”> tag <input type=”radio”> tag
7. State the purpose of Submit and Reset button.
Ans.
Submit Reset
When activated, a submit button submits a When activated, a reset button resets all
form. controls to their initial values.
8. Which attributes are necessary to insert drop down list in a HTML page?
Ans. <select name=”country”>
<option value=”In”>India</option>
</select>
9. Sometimes it is better to use the text area element instead of an input element of type
text. Write a short note to explain when and why?
Ans. When we want to input text in multiple lines then we will use textarea.
Board Exam Questions – Previous Years / Sample Papers
1. Aayush wants to send highly sensitive form data such as username and password which
method out of GET/POST should he use to send the form data? Why?
Ans.
POST METHOD, as it appends form-data inside the body of the HTTP request and data is
not shown in URL
2. Carefully observe the following labeled screenshot and answer the questions that follow:
Page 26 of 49
a. Form element labeled as 1 is a Textbox and Form element labeled as 2 is a Textarea
b. Text areas are the fields that display multiple text lines at a time hence it has been
used to accept Address which also contains multiple lines of text.
c. <input type="radio" name="Ltype" value="DND">Do Not Disturb <br>
<input type="radio" name="Ltype" value="Vib">VIBRATE <br>
<input type="radio" name="Ltype" value="Act">Active <br>
d. Form element labeled as 3 is a Radio button .It enables the selection of one of the
options out of the many.
Whereas,
Form element labeled as 4 is a Checkbox. As compared to radio button, a checkbox allows
for multiple selections of items.
e. To highlight one item in a dropdown box ,“selected” clause is used in the <option> tag
as follows :
<option selected>
Eg:
<select>
<option>SINGAPORE</option>
<option selected>JAPAN</option>
<option>MALAYSIA</option>
</select>
3. Carefully read and answer the following questions with respect to HTML:
i. What is a Form?
ii. What does a Form consist of?
iii. Which tag is used to insert a Form in a HTML document? Is it a container or a non
container tag?
iv. What values can be used with the Method attribute of the Form?
v. How is a Submit button different from a Reset Button in a Form?
i. A Form is an object that is used for collecting data from the user.
ii. A Form consists of the elements of a form called the form fields. These fields may be
text field, text area, drop-down box, radio buttons, checkbox and/or a command button.
iii. <Form> </Form> tag is used to insert a Form in a HTML document.It is a container tag.
iv. The values that can be used with the Method attribute of the Form are:
Get
Post
v. When activated, a submit button submits the data collected through the form elements
in a form
Whereas when activated, a reset button resets all controls/form elements to their initial
values.
4. Observe the following code and answer the questions that follow:
<html>
<head>
<title>
Find Output
</title>
</head>
<body>
<select Multiple>
<Option> Science</Option>
<Option> Commerce</Option>
<Option> Humanities</Option>
</select>
</body>
</html>
Page 27 of 49
i. What is the use of <select> tag in the above code?
ii. Explain the purpose of Multiple attribute of <select> tag.
iii. What output will be produced when the above code is executed?
Ans. i. <select> tag is used to display list box
ii. Multiple attribute in <select> tag allows a user to select multiple options by using Ctrl
or Shift button & mouse click.
iii.
5. Name the attribute of the <input> tag that determines the category of controls
a) SRC b) value c) name d) type
Ans. d) type
6. Name the attribute that is specified to set the width of a text.
a) limit b) size c) value d) maxlength
Ans. b) size
7. Is it possible for the developer to restrict the values accepted in a text field by
specifying an attribute?
a) numeric b) integer c) value d)You cannot restrict text values using HTML.
Ans. d)You cannot restrict text values using HTML.
8. We mask the input typed into a text field by specifying an <input> tag as ________.
a) password b) secure c) invisible d) hidden
Ans. a) password
9. HTML provides an attribute for the <input> tag that allows you to encrypt data
to make it secure.
a) True b) False
Ans. b) False
10. Which of the following is correct?
a)
<input type=”radio” name=”animal” value=”Zebra”> Zebra
<input type=”radio” name=”animal” value=”Lion”> Lion
<input type=”radio” name=”animal” value=”Tiger”> Tiger
b)
<input type=”radio” name= ”Zebra”> Zebra
<input type=”radio” name=”Lion”> Lion
<input type=”radio” name=”Tiger”> Tiger
Ans. a)
<input type=”radio” name=”animal” value=”Zebra”> Zebra
<input type=”radio” name=”animal” value=”Lion”> Lion
<input type=”radio” name=”animal” value=”Tiger”> Tiger
11. Which of the following is most true?
a) The <option> tag does not have a value attribute. If selected, it passes its displayed
value.
b) The <option> tag only passes values through its value attributes. The displayed value is
never Passed.
c) The <option> tag passes values through the value tag if it is present, and passes the
value displayed if the value attribute is not given.
d) The purpose of the <option> tag is to specify the type of control to use, not to pass
values.
Ans. b) The <option> tag only passes values through its value attributes. The displayed
value is never Passed.
12. In order to clear the values in a form, the developer specifies an <input> tag as:
a) empty b) clear c) refresh d) reset
Ans. d) reset
13. What is the use of ‘‘Action’’ attribute of a form ?
Ans. To specify the filename as to where the data will be submitted.
Page 28 of 49
14. Which method of <form> has no limitation over data size get or post ?
Ans. POST
15. Which element in a form allows to create a drop down list ?
Ans. Select
16. <input type=text> is used in a form to create a textbox. Write the names of any other four
attributes which can be used here.
Ans. Size, maxlength, value, name, tabindex, align
17. Write the purpose of ‘‘Name’’ attribute with any form element.
Ans. It adds an internal name to the form element so the program that
handles the form can identify the element. The values of the submitted form goes with
the name.
18. Write the name of the attribute which is used to :
(a) Display text on a button
(b) Define the path where the form data should go
(a) Value
(b) Action
19. Write the output of the following code :
<html><head><title>Testform</Title></Head><Body><form>
Name<Input type=text><br>
Password<Input type=Password><br>
Gender Male<Input type=radio name=R1>
Female<Input type=radio name=R1><br>
Continent<Select value=please select></select><br>
Meals<input type=checkbox>Breakfast
<input type=checkbox>Lunch
<input type=checkbox>Dinner<br>
<Input type=submit value=send><Input type=reset value=cancel>
</form></body></html>
Ans.
20. Which attribute is needed to tell the form where its contents will be sent to?
Ans. action
21. Write HTML code to generate the following form.
Page 29 of 49
Ans. <html><head><title>Quiz</title></head>
<body>
<form method=”post”>
<b>15th August is celebrated as </b><br>
<input type=”radio” name=”q1” value=”Labour Day”>Labour Day<br>
<input type=”radio” name=”q1” value=”Independence Day”> Independence Day
<br><input type=”radio” name=”q1” value=”Republic Day”> Republic Day
</form>
</body>
</html>
22. Differentiate between checked and selected attribute
Ans.
Checked selected
1. This attribute is used with either radio 1. This attribute is used with <option> tag
button or checkbox inside <select> tag
2. It checks the radio button and check 2. It selects one of the item in a drop
box component on the form down list box.
23. What will the following HTML code produce
<HTML>
<body>
</p>
<form name="form1" method="post" action="">
<p>Outdoor Games You Play</p>
<p>
<input type="checkbox" name="game1" value="table tennis"> Table Tennis<br>
<br>
<input type="checkbox" name="game2" value="football">Foot Ball<br>
<br>
<input type="checkbox" name="game3" value="swimming">Swimming<br>
<br>
</p>
</form></form>
</body>
Ans.
Page 30 of 49
24. What is the correct HTML for making a checkbox?
a) <checkbox>
b) <input type="checkbox" >
c) <input type="check" >
d) <check>
Ans. <input type="checkbox" >
25. What is the correct HTML for making a text input field?
a) <input type="textfield" >
b) <textinput type="text" >
c) <textfield>
d) <input type="text" >
Ans. <input type="text" >
26. Which of the following is not a valid attribute of the INPUT tag?
a) TEXT b) NAME c) SIZE d) MAXLENGTH
Ans. a) TEXT
27. Which of the following is not a valid value for the TYPE attribute of the INPUT
tag?
a) checkbox b) radiobutton c) submit d) reset
Ans. b) radiobutton
28. Which of the following is syntactically correct HTML code?
a) <INPUT TYPE= "submit" VALUES = "reset,submit">
b) <INPUT TEXT = "submit" VALUE = "reset">
c) <INPUT TYPE = "submit" VALUE = "reset">
d) <INPUT TYPE = "reset" TEXT = "clear">
Ans. c) <INPUT TYPE = "submit" VALUE = "reset">
Other Questions
1. Write tag to create a form along with its attributes.
Ans. <form method=”POST/GET” action=”filename”>
2. Write the tag to create Text field
Ans. <input type=”text”>
3. Write and explain all attributes of textfield.
Ans. Size: It defines the width of the field. It contains no. of visible
characters.
Maxlength: It contains maximum no. of characters that can be entered in the field.
Name: It adds an internal name to the field
Value: It defines what will appear in the box as the default value
Align: It defines how the text field will be aligned on the form.
Valid entries are: TOP, MIDDLE, BOTTOM, RIGHT, LEFT, TEXTTOP, BASELINE, ABSMIDDLE,
ABSBOTTOM.
Tabindex: It defines in which order the different fields should be
activated when the visitor clicks the tab key.
4. Write tag to create a textarea.
Ans. <textarea></textarea>
5. Write all attributes of <textarea> tag.
Ans. Cols: cols indicate the length of the textarea
Page 31 of 49
Rows: rows indicate the number of rows with text that will
be visible at a time.
Name: It provides an internal name to the textarea field
Tabindex: It defines the order number of activation of this field.
Wrap: It helps in flowing the text to the next row in a paragraph when the text reaches
the right hand border of the text area.
It can take three types of values as discussed below:
(i) If the text is not wrapped, i.e. its value is set to “wrap off”,
(iii) The value Virtual recognizes the text with line breaks when
textarea is loaded on the web page.
(iv) Physical defines the format of the text. It will appear on the
webpage as inserted by the user.
6. Write the tag to create a radio button.
Ans. <input type=”radio” name=”r1”value=”abc”>
7. Write and explain all attributes of a radio button.
Ans. Name: It adds an internal name to the field
Value: It defines what will be submitted if checked.
Tabindex: It defines in which order the different fields should be activated
Checked: This attribute can have value (e.g., checked=”checked |
unchecked”)
8. Write code to create a checkbox.
Ans. <input type=”checkbox” name=”sweet” value=”Chocolate”>
9. Write all attributes of checkbox.
Ans. Name: It adds an internal name to the field
Value: It defines what will be submitted if checked.
Tabindex: It defines in which order the different fields should be activated
Checked: This attribute can have value (e.g., checked=”checked |
unchecked”)
10. Write code to create a submit button and Reset button.
Ans. <input type= “submit” value=”Save”>
<input type=”reset” value=”Clear”>
11. Write code to create a dropdown list
Ans. <select>
<option>Chocolate</option>
<option>Ladoo</option>
<option>Cake</option>
</select>
12. Explain all attributes of <select> tag.
Ans. Name: It adds an internal name to the field
Size: It defines the number of items to be visible
Multiple: It allows for multiple selections
13. Explain all attributes of <option> tag
Ans. Value: It defines what will be submitted to the computer when an item is selected
Selected: The item will be already selected when the form will be loaded/displayed
Page 32 of 49
DHTML & CSS
Theory : 06 - 08 Marks
Important CSS Properties
Property Values Usage
FONT-FAMILY “Arial”, “Times New Used to change the font
Roman”, “Tahoma”,
“serif”, “sans-serif”,
“monospace”
font-style normal, italic, Used to make the text in italicized or
oblique oblique
font-variant Normal, small-caps A small-caps font
display the smaller sized capitalized
letters (upper case) instead of lower
case letters
font-weight Normal, bold Used to make the text bold
font-size px, pt, %, em To set the size of text
ex. 5px, 50%, 12pt
text-indent px The text-indent property allows you to
ex. 40px add effects to text paragraphs by
applying an indent to the first line of
the paragraph
text-align Left, right, center, Aligns the text to either, left, right,
justify center or justified alignment.
text-decoration underline, overline, The text-decoration property makes it is
line-through possible to add different “decorations”
or “effects”to text. For example, you
can underline the text, have a line
through or above the text, etc.
letter-spacing px This property is used to give the
ex. 6px specified spacing between the text
characters.
text-transform Capitalize, Capitalize : Capitalizes the first letter
Uppercase, of each word. For example:
Lowercase, “information technology”
None will be “Information Technology
Uppercase : Converts all letters to
uppercase. For example: “ information
technology”
will be “INFORMATION TECHNOLOGY”.
Lowercase : Converts all letters to
lowercase. For example: “INFORMATION
TECHNOLOGY” will be “ information
technology”.
None : No transformations - the text is
presented as it appears in the HTML
code.
Color Color name or color The color property describes the
code foreground color of a text to be
Ex. Red, #ff0000; displayed in browser.
background-color Color name or color The background-color property
code describes the background color of
Ex. Red, #ff0000; browser window.
background-image url(“imagename.ext”) The background-image property is used
ex. url(“earth.gif”) to insert a background image in a web
page.
Page 33 of 49
background-repeat repeat-x, repeat-y, repeat-x: The image is repeated
repeat, no-repeat horizontally
repeat-y: The image is repeated
vertically
repeat: The image is repeated both
horizontally and vertically
no-repeat: The image is not repeated
Cascading Style Sheets (CSS) is a style sheet language used for describing the look and
formatting of a document written in a markup language. It is a way to provide style to HTML.
Whereas the HTML is the meaning or content, the style sheet is the presentation of that
document.
The advantages of using CSS are:
❖ It controls layout of many documents from one single style sheet.
❖ It has more precise control of layout.
❖ It applies different layouts to different media-types.
❖ It has numerous advanced and sophisticated techniques to be applied on web pages.
Textbook Questions
A. Multiple choice questions
1. Which property describes how bold or “heavy” a font should be presented?
(a) Font‐style (b) Font‐size (c) Font‐weight (d) Font‐variant
Ans. (c) Font‐weight
2. The units ‘___’ and ‘___’ allow the user to adjust the font size according to him/her.
(a) ‘#’ and ‘me’ (b) ‘%’ and ‘em’ (c) ‘$’ and ‘es’ (d) All of the above
Ans. (b) ‘%’ and ‘em’
3. The ________________ makes it is possible to add different “decorations” or “effects”
to text.
(a) Text Align property (b) Text Indent property
(c) Letter spacing property (d) None of the above
Ans. (d) None of the above
4. DHTML is a combination of _________ and __________.
(a) DOM and CSS (b) CSS and Conventional HTML
(c) HTML and JavaScript (d) None of the above
Page 34 of 49
Ans. (c) HTML and JavaScript
5. ________________________ is a style sheet language used for describing the look and
formatting of a document written in a markup language.
(a) Document Object Model (DOM) (b) Multimedia filters
(c) Cascading Style Sheets (CSS) (d) DHTML
Ans. (c) Cascading Style Sheets (CSS)
6. Which property is used to give the specified spacing between the text characters?
(a) Text Decoration (b) Letter Spacing
(c) Text Transform (d) None of the above
Ans. (b) Letter Spacing
7. The units ‘px’ and ‘___’ make the font size absolute.
(a) ‘pr’ (b) ‘pn’ (c) ‘pz’ (d) ‘pt’
Ans. (d) ‘pt’
8. The _______________ repeats the image both horizontally and vertically to cover the
entire screen.
(a) Background Image property (b) Foreground Color property
(c) Background Color property (d) Background Repeat property
Ans. (d) Background Repeat property
B. Fill in the blanks:
1. Font‐family style differentiates between _______,__________ and ________ font faces.
Ans. Seif, Sans-serif, monospace
2. The font‐variant property refers to the ___________ variant of the font face.
Ans. normal or small-caps
3. CSS uses a numeric scale of multiples of ______ to _________.
Ans. 100 to 900
4. The CSS specification also allows browser to render any ____ value as normal.
Ans. invalid
5. The text decoration has to rendered with _____________.
Ans. text
6. The _____________ property allows you to add effects to text paragraphs by applying
an indent to the first line of the paragraph
Ans. text-indent
7. Font variant property is used to select ___________ or ___________ variants of a font
Ans. normal, small-caps
8. The ______________ property describes the foreground color of a text to be displayed
in browser
Ans. color
9. The property font‐style defines the chosen font either in _______, ______ or
_________.
Ans. normal, oblique, italic
10. The property _____________ is used to apply prioritized list of fonts in a web page
Ans. font-family
11. The text‐transform property controls the _____________ of a text.
Ans. capitalization
12. The _______________ property describes the background color of browser window.
Ans. background-color
13. The ______________ property is used to insert a background image in a web page.
Ans. background-image
Page 35 of 49
Ans. Cascading Style Sheets (CSS) is a style sheet language used for describing the look and
formatting of a document written in a markup language. It is a way to provide style to HTML.
2. List some advantages and disadvantages of CSS.
Ans. The advantages of using CSS are:
❖ It controls layout of many documents from one single style sheet.
❖ It has more precise control of layout.
❖ It applies different layouts to different media-types.
❖ It has numerous advanced and sophisticated techniques to be applied on web pages.
The Limitations of CSS are: The problem with CSS is that it displays webpages very
differently in the different browsers.
3. What is the extension of a CSS file?
Ans. .css
4. Explain how would we embedded Style in your HTML.
Ans. Using three ways: Inline, Internal or external
5. List down the various font-family property ? Give an example of each.
Ans. The property font-family is used to apply prioritized list of fonts in a web page
Fonts family is divided into two categories:
1. Family-name
e.g. be “Arial”, “Times New Roman” or “Tahoma”.
2. Generic family
Generic families can be described as groups of family-names with uniformed appearances.
Eg. Serif, sans-serif, monospace
6. What do you mean by font-variant? Give example of each.
Ans. font-variant can be either normal or small-caps.
7. Explain font-weight?
Ans. Used to make the text bold face.
8. Mention the properties of CSS used to insert Letter spacing in a line.
Ans. letter-spacing
9. How many types of text alignments can be included in a CSS page.
Ans. left, right, center, justify
10. How the text in a webpage can be capitalized using CSS properties?
Ans. Using text-transform property
11. Explain the CSS properties to set the foreground and background color of the webpages.
Ans. To set the foreground color we can use color property and to change the background
color we can use background-color property.
12. Which property of CSS controls the repetition of image inserted in a web page as a
background?
Ans. background-repeat, it can have repeat-x, repeat-y, repeat or no-repeat values
Board Exam Questions – Previous Years / Sample Papers
1. Write the CSS code to:
i. Apply 50px indentation to all text paragraphs marked with <p>.
ii. Make the text in the paragraphs marked with <p> tag “italics”.
Ans.
p{
text-indent: 50px;
font-style: italic;
}
2. List the advantages of using CSS.
Ans.
❖It controls layout of many documents from one single style sheet.
❖ It has more precise control of layout.
❖ It applies different layouts to different media-types.
❖ It has numerous advanced and sophisticated techniques to be applied on web pages.
Page 36 of 49
3. Observe the following code carefully and answer the questions that follow:
<html>
<head>
<title>NETWORK SECURITY</title>
<style type="text/css">
li {
letter-spacing:10px ;
text-transform: lowercase;
}
</style>
</head>
<body> The Dos and Don’ts of network security
<ol>
<li> KEEP ANTI-VIRUS SOFTWARE UP TO DATE.</li>
<li> SAVE THE FILE TO COMPUTER OR A DISK.</li>
<li> RUN AN ANTI-VIRUS SCAN REGULARLY.</li>
</ol>
</body>
</html>
Predict the output of the above code while explaining the effects applied on <li> in the CSS code.
Ans.
The output of the above code will be:
As per the output it is evident that the list elements specified as li have been displayed in Lower case
due to :
text-transform: lowercase;
Also, there is a space of 10 pixels between each letter due to :
letter-spacing:10px ;
4. Body { background-image: url(“learn.gif”); background-repeat: repeat-x}
In reference with the above CSS code, explain the usage of background-repeat property. Also
mention the different values that can be used for background-repeat.
Ans.
With reference to the above CSS code the inserted background image learn.gif will repeat
horizontally on the browser screen.
The four different values for background-repeat are as follows:
background-repeat: repeat-x : The image is repeated horizontally.
background-repeat: repeat-y : The image is repeated vertically.
background-repeat: repeat : The image is repeated both horizontally and vertically
background-repeat: no-repeat : The image is not repeated
5. List any 3 items that can be created using DHTML
Ans.
DHTML can be used to create the following:
Animation
Pop-up menus
Inclusion of Web page content from external data sources
Elements that can be dragged and dropped within the Web page
6. Write the CSS code to insert the image of the butterfly with name btfly.gif as a background
image for a web page
Ans.
Body{ Background-image: url(“btfly.gif”); }
Page 37 of 49
7. Write the CSS code to change the foreground color of text to #ff0000 in h1 tags
Ans.
H1
{
color:#ff0000;
}
8. Write the CSS code to display the text of td tag in centre
Ans.
TD
{
Text-align: center;
}
9. Highlight the importance of DOM component of DHTML
Ans. Document Object Model (DOM) – The road map through which we can locate any
element in an HTML document and use a scripting DHTML 3 language, such as JavaScript, to
change the element’s properties
10. Consider the following CSS code:
h1 {font-family: arial, comic sans-serif, “Times New Roman”;}
Explain font-family.
Ans. font-family prioritize the font to be used in h1 tag. First it will look for arial tag, if it is
not available then the text in h1 will be displayed in comic sans-serif and if comic-sans serif
font is also not available then it will display the text in h1 in Times new roman font.
11. Observe the following code carefully and answer the questions that follow:
<html>
<head>
<title>Example</title>
<style type="text/css">
li {
letter-spacing:10px ;
text-transform:uppercase;
}
</style>
</head>
<body> Creation of a project
<ol>
<li>Analysis</li>
<li>Design </li>
<li>Coding</li>
<li>Testing</li>
<li>Maintenance</li>
</ol>
</body>
</html>
Predict the output of the above code while explaining the effects applied on
<li> in the CSS code.
Ans.
Output:
Example
Creation of a project
1. A N A L Y S I S
2. D E S I G N
3. C O D I N G
4. T E S T I N G
5. M A I N T E N A N C E
Page 38 of 49
Effect of css on li tag
In <li> tag the text is changed to upper case and there is a gap of 10 px between every letter
in the text in li
12. Which of the following property is used to create a small-caps effect?
a) font-family b) font-style c) font-variant d) font-weight
Ans. font-variant
13. Multiple external style sheets cannot be referenced inside a single HTML document
a) True b) False
Ans. b) False
14. Which of the following is correct CSS syntax for using font property?
a) <p style="font: italic, bold, 25px;"> ................ </p>
b) <p style="font-style: italic font-weight: bold font-size: 25px;">................... </p>
c) <p style="font: italic bold 25px;"> ....................... </p>
Ans. b) <p style="font-style: italic font-weight: bold font-size: 25px;">................... </p>
15. What are the three methods of implementing CSS?
a) Direct, Indirect, and External
b) Internal, External, and Embedded
c) Inline, Embedded, and External
Ans. c) Inline, Embedded, and External
16. table {color: blue;}
In the code snippet above, which part represents the property?
a) table b) color c) blue
Ans. b) color
17. Which of the following statements is TRUE for CSS
a) An external style sheet is ideal when the style is applied to many pages
b) An inline style sheet should be used when a single document has a unique style
c) Both A and B above
d) An external style sheet can be written in HTML
Ans. c) Both A and B above
18. Which CSS property describes the background image of a web page ?
Ans. Background-image
19. DHTML is a combination of which technologies ? Name them.
Ans. HTML and Javascript
20. What is the limitation of CSS ?
Ans. It is not browser compatible language and therefore displays different output in
different browers.
21. What is the difference in font-weight and font-style properties ?
Ans.
Font-Weight Font-Style
1. Make the text bold or normal. 1. Makes the text italic, oblique or normal
22. Write any two advantages of using CSS.
1. It can control layout of many documents using a single style sheet.
2. It has more precise control of layout.
3. It can apply different layout to different media-types.
4. It has numerous advanced techniques to be applied on webpages
23. Name the CSS property which is used to :
(a) Insert a background image
(b) Control the behaviour of a background image
a) background-image
b) background-repeat
24. Write the code using CSS to generate the following output :
(a)
This Will Be Capitalised
THIS WILL BE IN UPPERCASE
Page 39 of 49
This will have no effect
this will be in lowercase
(b)
The above text is normal, bold, 40 pt, Arial.
Background colour is yellow and font colour is maroon.
Ans.
a)
i) <p style=”text-transform:capitalize;”>This will be capitalized</p>
ii) <p stye=”text-transform:uppercase;”>This will be in uppercase</p>
iii) <p style=”text-transform:none;”>This will have no effect</p>
iv) <p style=”text-transform:lowercase”>This will be in lowercase</p>
b)
<p style=”font-weight:bold;font-size:40pt;font-family:arial;background-
color:yellow;color:maroon;”>This example is combining six css properties</p>
25. Create an external style sheet ‘‘style.css’’ with the following specifications :
<BODY> : Font is Arial , Text is in blue colour
<H1> : Overerline and right aligned
<P> : Text is italicized, Font-weight should be bold
Also, write the code of HTML file where this file should be linked.
Ans:
Filename: styles.css
Body
{
Font-family:Arial;
Color: blue;
}
H1
{
Text-decoration: overline;
Text-align: right;
}
P
{
Font-style: Italic;
Font-weight: Bold;
}
Filename: home.html
<html>
<head>
<title>This is Home Page</title>
<link rel=”stylesheet” type=”text/css” href=”styles.css” />
</head>
</html>
Page 40 of 49
(i) Static (ii) Dynamic (iii) Hyper (iv) Global
Ans. (ii) Dynamic
28. HTML is considered as a _________ language.
(i) Programming
(ii) OOP
(iii) High Level
(iv) Markup
Ans. (iv) Markup
29. The software that can read and render HTML documents is
(i) Server (ii) Compiler (iii) Interpreter (iv) Browser
Ans. (iv) Browser
30. ____________ connects web pages.
(i) Connector (ii) Link (iii) Hyperlink (iv) None of the above
Ans. (iii) Hyperlink
31. The different ways to associate styles with an HTML document is/are
(i) Embedded CSS with <style> element
(ii) Inline CSS style with attribute
(iii) External CSS with <link> element
(iv) All of the above
Ans. (iv) All of the above
32. __________ property can be used to increase or decrease the space between words.
(i) Space (ii) Word-spacing (iii) Word-space (iv) Both (ii) and (iii)
Ans. (ii) Word-spacing
33. __________ property specifies an image to use as the background of an element.
(i) Backg-img (ii) Backg-image (iii) Background-img (iv) Background-image
Ans. (iv) Background-image
34. CSS stands for
(i) Central Style Sheets (ii) Common Style Sheets
(iii) Cascading Style Sheets (iv) Control Style Sheets
Ans. (iii) Cascading Style Sheets
35. Advantage(s) of CSS is/are
(i) Separation of document contents from document program
(ii) Superior styles to HTML
(iii) High performance
(iv) All of the above
Ans. (iv) All of the above
36. Style sheet appears as a value of the ___________ attribute.
(i) Script
(ii) Sheet
(iii) Style
(iv) Jscript
Ans. (iii) Style
37. Name one scripting language that is used as part of DHTML.
Ans. Javascript
38. Write the full form of CSS.
Ans. Cascading Style Sheet
39. What is an internal style sheet
Ans.
It includes the CSS codes using the HTML tag <style>.
Example:
<html>
<head>
<title>Example</title>
<style type=”text/css”>
body {background-color: #0000FF ;}
</style>
</head>
Page 41 of 49
<body>
<p> The background is Blue.</p>
</body>
</html>
40. Which property in CSS describes how bold or “heavy” a font should be presented?
Ans. font-weight
41. Which property makes it is possible to add different “decorations” or “effects” to text.
Ans. text-decoration
42. Which property of CSS repeats the image both horizontally and vertically to cover the entire
Screen.
Ans. background-repeat: repeat;
43. Which property describes the foreground color of a text to be displayed in browser?
Ans. color: red;
44. Which property is used to apply prioritized list of fonts in a web page.
Ans. Font-family
45. Which property is used to select normal or small-caps variants of a font?
Ans. font-variant
46. Which property controls the capitalization of a text?
Ans. text-transfrom
47. Which property allows you to add effects to text paragraphs by applying an indent to the
first line of the paragraph?
Ans. text-indent
48. What is DHTML?
Ans. It is Dynamic Hypertext Markup Langauge. It is a combination of different technologies
like: HTML, Javascript, CSS
49. What is the purpose of using DHTML?
Ans. To make animations, Menu popups, drag/drop feature of elements on a webpage etc.
50. Write any two features of DHTML
1. DHTML makes documents dynamic
2. Web page reacts and change with the actions of the visitor.
3. DHTML helps to exactly position any element in the window
4. It can hide and show content as needed
51. Mention any two limitations of CSS
Ans.
1. CSS is very limited in browser compatibility
2. We cannot perform any arithmetic or logical task.
52. Which two categories Fonts family is divided into?
Ans. Generic, family name
53. What would be the impact of including css file with the following code
(a)
h1 {
text-decoration: underline;
}
(b)
h2 {
text-decoration: overline;
}
(c)
h3 {
text-decoration: line-through;
}
Ans. a) the text in h1 tag will be underlined.
b) The text in h2 tag will be overlined.
c) the Text in h3 tag will be striked through like hello
54. Write the values for background-repeat for the following
(a) The image is repeated horizontally
(b) The image is repeated vertically
Page 42 of 49
(c) The image is repeated both horizontally and vertically
(d) The image is not repeated
Ans.
a) background-repeat: repreat-x;
b) background-repeat: repeat-y;
c) background-repeat: repeat;
d) background-repeat: no-repeat;
55. What does HTML stand for?
a) Hyperlinks and Text Markup Language
b) Home Tool Markup Language
c) Hyper Text Markup Language
d) Hyper Text Mark Language
Ans. c) Hyper Text Markup Language
56. Choose the correct HTML tag for the largest heading
a) <h6> b) <heading> c) <head> d) <h1>
Ans. d) <h1>
57. What is the correct HTML tag for inserting a line break?
a) <br> b) <break > c) <lb> d) <hr>
Ans. a) <br>
58. What does vlink mean?
a) visited link b) vlink c) active link d) hyperlink
Ans. a) visited link
59. What is the correct HTML for creating a hyperlink?
a) <a name="">A</a>
b) <a>B</a>
c) <a href="http://www.example.com">example</a>
d) <a url="http://www.example.com">example</a>
Ans. <a href="http://www.example.com">example</a>
60. How can you create an e-mail link?
a) <mail href="a@b">
b) <mail>a@b</mail>
c) <a href="a@b">
d) <a href="mailto:[email protected]">
Ans. d) <a href="mailto:[email protected]">
61. How can you make a list that lists the items with numbers?
a) <ul> b) <list> c) <ol> d) <dl>
Ans. c) <ol>
62. What is the correct HTML for inserting an image?
a) <image src="image.gif" alt="MyImage" >
b) <img href="image.gif" alt="MyImage" >
c) <img src="image.gif" alt="MyImage" >
d) <img alt="MyImage">image.gif</img>
Ans. c) <img src="image.gif" alt="MyImage" >
Page 43 of 49
Network Security
Theory : 05 Marks
Textbook Questions
A. Multiple choice questions
1. Which of the following is not an external threat to a computer or a computer network
(a) Ignorance (b) Trojan horses (c) Adware (d) Crackers
Ans. (a) Ignorance
2. When a person is harrassed repeatedly by being followed, called or be written to he /
she is a target of
(a) Bullying (b) Identity theft (c) Stalking (d) Phishing
Ans. (c) Stalking
3. With genetic and genomic research which of the following issues is of specific concern
(a) Anonymity (b) Intellectual property
(c) Software piracy (d) Concerns about biochip implants
Ans. (b) Intellectual property
4. Which of the following is a class of computer threat
(a) Phishing (b) DoS attacks (c) Soliciting (d) Stalking
Ans. (b) DoS attacks
5. A lincense allows a user to use copyrighted material.
(a) True (b) False
Ans. (a) True
6. It is a program or hardware device that filters the information coming through an internet
connection to a network or computer system.
(a) Anti virus (b) Firewall (c) Cookies (d) Cyber safety
Ans. (b) Firewall
7. It allow a visited website to store its own information about a user on the user’s
computer.
(a) Spam (b) Malware (c) Cookies (d) Adware
Ans. (c) Cookies
8. It is stealing ideas or creations of others.
(a) Plagiarism (b) Piracy (c) Intellectual Property Rights (d) All of the above
Ans. (a) Plagiarism
9. Hacking a computer is always illegal and punishable by law.
(a) True (b) False
Ans. (a) True
10. Exploring appropriate and ethical behaviours related to online environments and digital
media.
(a) Cyber ethics (b) Cyber safety (c) Cyber security (d) Cyber law
Ans. (a) Cyber ethics
11. A license allows a user to use copyrighted material.
(a) In some situations this statement is correct
(b) This statement is not true at all.
(c) In is not necessary to use license.
(d) All the above statements are not applicable.
Ans. (a) In some situations this statement is correct
B. Answer the following questions:
1. Differentiate between a workstation license and a site license.
Workstation License Site License
1. It permits the installation of a software only 1. It permits the use of software in any number
Page 44 of 49
in one computer. of computers at a specified site.
2. Before installing on a different computer it 2. We can install the software in unlimited
must be uninstalled or removed from first number of computers if we have taken
computer. unlimited site license.
Page 45 of 49
3. Turn off the option to automatically download attachments from your emails
4. Save and scan any attachments before opening them. If you have to open an
attachment before you can verify the source, take the following steps:
i) Be sure your anti‐virus software is up to date.
ii) Save the file to your computer or a disk.
iii) Run an anti‐virus scan using your computer’s software
8. What is Deniel of Service attack? How it affects the systems performance?
Ans. Denial of service (DoS) attacks that are designed to prevent legitimate access to a
system. It restricts the working of many of the services of the computer like Internet, File
Access, Software access etc.
9. What is the difference between Shareware and Freeware softwares?
Ans.
Shareware Freeware
1. Copyright software’s which are available free 1. Copyright software which are available free
of cost but only for a limited period of time. of cost for unlimited time.
2. Needs to be purchased after the trial period 2. Need not be purchased as it is not time
have expired. limited.
Page 46 of 49
2. Do not use foul language. ‐ Ethical
3. Immediately report any suspect data or security breaches to your supervisor and/or
authorities. ‐ Safety
4. Install firewalls and antivirus softwares ‐ Security
5. Do not copy information from the Internet and claim it as yours (plagiarism). ‐ Ethical
6. Be wary of strangers and cautious of potentially misleading or false information. ‐ Safety
7. Manage your computer settings to allow only data that comes from a known or safe place
‐ Security
8. Do not download copyrighted materials. ‐ Ethical
9. Download only trusted applications from reputable sources or marketplaces ‐ Safety
10. Pay attention to the URLs of websites you visit ‐ Security
11. Do not use someone else’s password or break into his computer. ‐ Ethical
12. Restrict access and make personal information secure to prevent identity theft. ‐ Safety
Page 47 of 49
Ans. Phising is the process of trying to tempt the target to provide personal information
which can be used to perform illegal actions so it is a form of identity theft.
9. Proprietary software companies get a copyright for all of its software. What is its utility?
Ans. It helps the company to get exclusive rights for that software and protect the
software from being used illegally.
10. Name the two of the most common Web attacks that attempts to breach a website.
Ans. Session hijacking, DNS poisoning
11. Who is a Netizen?
Ans. Netizens are the inhabitants of the internet and use it as an extension of their
physical world.
12. Explain Workstation Licence.
Ans. It is a license given for a single computer. A software can only be installed in one
computer.
13. Differentiate between Open source , Freeware and Shareware.
Ans. Open source software are available free of cost along with the source code. They
can be modified and redistributed.
Freeware are copyrighted softwares available free of cost for unlimited time but without
any source code.
Shareware software are copyright software which are available free of cost but for a
limited time period.
14. List any 4 cyber safety guidelines which should be followed by all the Netizens.
Ans.
1. Set secure passwords and don’t share them with anyone.
2. Don’t share organizational data or personal information.
3. Immediately report any suspect data or security breaches to your supervisor and/or
authorities.
4. Download only trusted applications from reputable sources or marketplaces.
5. Be wary of strangers and cautious of potentially misleading or false information
15. Term to describe harassing, taunting, or teasing online is
a) Cyber bullying b) Flaming c) Trolling
Ans. a) Cyber bullying
16. Tricking users into revealing personal information such as passwords and bank account
numbers by way of emails pretending to be from actual companies
a) Phishing b) Spyware c) Bird Watch
Ans. a) Phishing
17. Using someone else's work and taking credit for it
a)Fair Use b)Ethical c)to plagiarize
Ans. c) to plagiarize
18. Malicious that enters a computer and tracks and gathers personal information
a) Phishing b) Spyware c) Malware
Ans. b) Spyware
19. What is meant by cyber laws?
Ans. Laws which protect the users against the cyber crime are cyber laws
20. What is cyber space ?
Ans. Cyberspace is a man made world that is constantly evolving. It differs from the static
physical world as it has no boundaries, no geographical mass, and of course, no gravity.
21. What all is covered under software copyright ?
Ans. A software copyright protects all source code, written text materials, graphic
images/ designs, drawings, any linked sound, video files or films.
22. What are cookies ?
Ans. Cookies allow a visited website to store its own information about a user on the
user’s computer.
23. What do you suggest a person must do, the actions he/she must take, in order to ensure
security of personal information at places like cyber cafe ?
(i) Do not use cyber cafe for transactions.
(ii) If possible, ensure you delete cookies and browser history.
(iii) No need to do anything.
Page 48 of 49
(iv) Both (i) and (ii)
Ans. (iv) Both (i) and (ii)
24. Which of the following is known as Malicious software ?
(i) Illegalware (ii) Badware (iii) Malware (iv) Maliciousware
Ans. (iii) Malware
25. To protect a computer from virus, you should install __________ in your computer.
(i) Backup wizard (ii) Disk cleanup (iii) Antivirus (iv) Disk defragmenter
Ans. (iii) Antivirus
26. Which of the following is/are threats for electronic payment systems ?
(i) Computer worms (ii) Computer virus (iii) Trojan horse (iv) All of the above
Ans. (iv) All of the above
27. Firewalls are used to protect against _________ .
(i) data driven attacks (ii) fire attacks (iii) virus attacks (iv) unauthorized access
Ans. (iv) unauthorized access
28. Which of the following describes the programs that can run independently from system to
system and disrupt computer communication?
(i) Viruses (ii) Trojans (iii) Droppers (iv) Worms
Ans. (iv) Worms
29. Name the following
1. The stored information that allow a visited website to store its own information
about a user on the user’s computer
2. A program that replicates itself. A computer virus attaches itself to a program or
file to help it spread from one computer to another.
3. It refers to computer software that is provided usually for free but contains
advertisements.
Ans.1. Cookies 2. Virus 3. Adware
Page 49 of 49