Lesson1.
Advanced Web Designing
Q.1 fill in the blanks
1. The............ Elemental sharing element HTML,it indicates that document type
definition being used by the document.
2. The........... Is it again HTML that describe some aspect of contents of a web
page.
3. The <ol> tag defines an ordered List
4. An ordered list is created using <ol> tag.
5. The ..........property is used to set position for an element.
6. The flute property defines the ...flow.....of content
7. .........Is used with elements that overlap with each other.
8.< input type="color"> define colour picker.
9. <input type="url"> defines the field for entering a URL.
10. <input type="datetimelocal"> define a date picker with year month and
day.
11.the max Attribute of< input> tag specifies the maximum value for an input
field.
12. the pattern Attribute of< input> tag specify the regular expression to check
the input values.
13. the placeholder Attribute of< input> tag act as a temporary label showing
the purpose of a text field without requiring a label tag.
14.the............. Attribute of< input> tag is used to apply CSS style to the
individual input element.
15. The...... Dark is used by search engine to search information that is
provided with the web page.
16. The name Attribute of <meta> tag specifies the name of the metadata.
17.The charset attribute of <meta> tag the character in coding used by the
document.
18.The http-equiv attribute of <meta> tag is used for http response message
headers.
19. < meta http-equiv="set cookies">, browser sends the cookies back to the
server.
20.......name.... Attribute of < meta> specifies the name of the metada with the
author keywords or description.
21. The .declaration .... Block can contain one or more declaration separated by
semicolon.
22...inline.. CSS is used to apply CSS on a single line of an element.
23. The.. ..external... Style sheet is used when you want to make changes on
multiple pages.
24. External Style sheet uses.......... Tag on every page.
25. In CSS.....color..... Property changes the colour of the text.
26. The....text decortion .. Properties used to add strike through marks,
underline ,overline etc.
27. The...font -family..... Properties used to control the fonts.
29. The ....background image..... Property is used to send an image as a
background of this page.
30. The....ID........ Selector select the ID attribute of an HTML element to select
a specific element.
31. The class selector is used with...period......... Character followed by the class
name.
32. The.Universal .. Selector is used as a wild card character.
33. The....ID.......... Selector select the ID attribute of an HTML element to select
a specific element.
34. The....static ... Positioning is not affected by the top, bottom, left and right
properties.
35. In CSS.....position ...... Property is used to set position for an element.
36. ....absolute...... Property positions the element at the co-ordinate relative to
your screen top left corner.
37. Universal selector is denoted by...*.... Character.
38. In HTML...... Is used to identify HTML element uniquely.
39. MPEG stands for...........
40. AAc stands for...........
41. The...... Attribute of < audio> tag say the audio will start over again, every
time it is finished.
42. The........ Attribute is used to add audio controls such as play pause and
volume.
43. The............ Attribute defines the link to video file.
44. The............ Attribute specifies an image to be shown while the video is
downloading.
45............. Value of Shape attribute of < area> tag specifies rectangular area.
46. Circle define the circular region which requires.......... Co-ordinates.
47.An image with multiple hyperlinks is called an...........
48 to create client side image map.......... Attribute of<img> tag is used.
49. The.......... Attitude specific the width of an <iframe>
50. The companies that provide web hosting services are called...........
51. The clickable region of an image are called as..........
52....... Tag is used to map the image.
53. The....... Attribute of < map> tag specifies name of the image used for client
side image map.
54. ........... Tag define specific clickable regions.
55. ...... Frames are often used in online advertising.
56. The ........ Attribute specifies the width of an iframe.
57. ......... hosting gives domain name to your website.
58. ....... Are paid hosting server for large website.
59. Affective method of web hosting is..........
60. ......... Provide you free hosting of the website for Limited of time.
Q.2 True or false
1.Google Chrome does not support the features of HTML5.
2. <input type="color"> define the colour picker. T
3.<input type="number"> define oh field for entering URL. F
4. <input type="time"> define the control for entering a week. F
5.<input type="file"> define file select field and a browse button for file
uploads. T
6. Max attribute specifies the maximum value for an input field. T
7. Read only attributes has that an import field is read only. T
8. Multiple attribute specifies that the user is allowed to enter more than one
value in the <input> element.
9.< meta> tag is used by search engines to search information that is provided
with the web page. T
10.< meta charset="UTF-8"> is for Indian characters.T
11. Values are send to CSS properties.
12. Each declaration contains a property name and value separated by
semicolon. T
13. Inline CSS is used to apply CSS in multiple lines or elements. F
14. Internal style sheet is also known as embedded style sheet. T
15. Internal CSS is written inside <style> tag within head section. T
16. Font family property used to control the fonts. T
17. Literate spacing property helps in controlling the horizontal spacing
between characters of text.
18. Margin left properties sets the margin Area on the left side of the element.
19. An ID is unique element. T
20. Class selected HTML element with specific class attribute.
21. Universal selector select single element on the web page. F
22. Relative positioning properties used to set the element relative to its
normal position.
23. Float: none is the default property.
24. Display properties specifies how they element is float.
25. In length value is used to display an element as an a block element.
26. Block values start on a new line, and takes up the whole wed of the
browser window.
27.<p style="color:blue"> hello CSS</p> in this CSS statement colour is referred
as value.
28.<ul type="disc"> set the list item marker to a bullet.
29. Items can be created in definition list with <dt> and <dd> tags.
30. Controls attribute is used to display audio controls.
31. Src attribute specifies the URL of the audio file.
32. Src attribute defines link to video file.
33. Width attribute sets the value in pixel.
34. Image map is used to connect links to different regions of the web page.
35. <map> is paired tag.
36. Alt attributes specify this day information about sea cable area.
37. Name attribute specifies name of an <iframe>.
38. web server offer interrupted internet connectivity.
Q.3 MCQ( Choose 1 correct option)
1. ............. Is currently used because it supports mobile technology.
a. Dom b.http c.hTML5 d.fTP
2.<input type="..........."> defines the field for entering a number.
a. Color b. Number c. Date d. Email
3.<input type="..........."> defines a field for entering a URL.
a. Color b. Image c. Email d. URL
4.<input type="..........."> defines a date picker with the year month and day.
a. Month b. Range c. Date d. Number
5.<input type="..........."> defines a control for entering a time.
a. Week b. Time c. Date d. Date time-local
6. Default range of range control is......
a. 0 to 100 b. 100 to 150 c. 90 to 100 d. 200 to 300
7. The..... attribute of <input> tag specifies whether a form or input field
should have autocomplete on or off
a. Required b. Max c. Autofocus d. Autocomplete
8.The..... attribute of <input> tag used to identify HTML element uniquely
through the document object model.
a. ID b. Class c. Relative d. Grouping
9.The..... attribute of <input> tag is used to apply CSS style to the individual
input element.
a. ID b. Class c. Relative d. Absolute
10. To collect different kind of user inputs......... controls are used .
a. Image b. Form c. Email d. Radio
11. For input restriction ........attribute of <input> tag is used to set the
maximum value for an input field.
a. Min b. Max c. Maximum d. Minimum
12. The ........... attribute of <meta> tag can have any textual matter related to
the name.
a. Http-equiv b. Name c. Content d. Charset
13. <meta charset="Big5"> is for .......... language.
a. Indian b. USA c. Chinese d. Italy
14. In CSS font-weight is used apply......face.
a. bold b. Italic c. Underline d. Strike through
15. Allows you to control the look and feel of several pages by changing the
single source.
a. ASP b. CSS c. PHP d. Dom
16. ..........indicates the HTML elements you want to style.
a. Selector b. Declaration c. Property d. Value
17. .... are assigned to CSS properties.
a. Selector b. Declaration c. Property d. Methods
18. ......... Style sheet uses the style attribute in the HTML start tag.
a. Internal b. Inline c. External d. Selector
19. Internal CSS is also called as........ CSS.
a. Internal b. Inline c. External d. Embedded
20. The.......... style sheet is used when you want to make changes on multiple
pages.
a. Internal b. Inline c. External d. Embedded
21. And external style sheet must be saved with ........extension.
a. .txt b. .html c. .js d. .CSS
22. The .......... Property changes the colour of text.
a. Color b. Background-color c. Font-color d. Text-color
23. The .......... Property is used to make the text bold.
a. font-Color b. Font-size c. Font-weight d. Font-style
24. The........ Value of text decoration properties used to over strike the text.
a. Overline b. Line through c. Underline d. Strike
25.The........ Properties used to control the horizontal alignment of any block
level.
a. Text-aline b. Text decoration c. Font size d. Text size
26.The........ Property allows you to control the size of the font.
a. Font style b. Font weight c. Font size d. Font family
27. The........ Property helps in controlling the horizontal spacing between
characters of text.
a. Letter spacing b. Spacing c. Padding d. Border
28. The ID selector is written with the................. Character followed by the ID
name.
a. Period(.) b. Asterisk(*) c. Hash(#) d. Copyright
29. The class name should not start with a.......
a. Text b. Character c. Number d. Special symbol
30. The........ Selector is used to select all the elements with the same style
definition.
a. Class b. Grouping c. ID d. Universal
31. The....... Element will not move even when the pages is scrolled
a. Absolute b. Relative c. Static d. Fixed
32. The........ Is the default value of type attribute of <ul> tag.
a. Disc b.square c. Circle d. Bullet
33. The....... Attribute of <audio> tag specifies the URL of the audio file.
a. Muted b. Loop c. Src d. Controls
34. The........... Attribute is used to add audio control such as play,pause and
volume.
a. Muted b. Loop c. Src d. Controls
35. ......... Is used to connect links to different regions on the web page.
a. Links b. Hotspots c. Image map d. Hyperlinks
36. To create a client side image map.......... Attribute of <img> tag is used.
a. Ismap b. Nomap c. Usemap d. Mymap
Lesson2. Introduction to SEO
Q 1. Fill in the blanks
1. SEO stands for Search Engine Optimization
2. ....... Is useful in increasing number of visitors to a website.
3. OnPage SEO include provision of good content good keyword.
4. Off Page SEO include ling building, increasing link popularity by submitting
open directory.
5. off page Is concern with how good is your network.
6. white hat SEO technique that search engine recommends as part of good
design.
7. The Black hat SEO technique is used to display duplicate content on a web
page.
8. One of the optimizing factor to improve images is by using alt Attribute.
9. ……… Tag with old attribute also contribute to Optimization.
10. Meta description should be between 70 and 160 Characters.
11. ........ Are the important words and phrases related to the developed
website content.
12. SEM stands for search engine marketing
13. .............. Is a powerful tool in promoting a website.
14. Keyword, research and analysis Is an important part of the Search Engine
Optimisation.
15. SMO stand for social media optimization.
16. Back links Are the links on the website that, when clicked take the user to
another side.
17. Robots.txt File tell search engine which page you want to exclude from
indexing.
18. Social bookmarking is very useful for on page SEO optimization.
19. ........ Is the process by which search engine scan a website.
20. SEO audit tool like SEOptimer and....... Are the tools to determine the
health of the website.
21........... Is used to analyze the website health.
Q.2 True or false
1. SEO is a technique used for designing and developing a website to be rank
high in search engine results.
2. Search engine is an offline program that helps users to search for
information on www.
3. Off page SEO Is concern with website-website relationship. T
Phone on pages you it concern with information that is displayed to the end
user.
4. White hand strategies include relevant content.
5. Black hat SEO technique are used for optimizing the website.
6. Six singular tag like <img> is should be self enclose like this <img/> .
7. Title content should be up to 60 characters.
8.Meta description should be used to Boost Your off page SEO.
9. Backlinks are the links on one website that when clicked take the user to
another website.
10. Mobile friendliness is only use for ranking the website.
11. SEOptimer provide clear and actionable Recommendation that can be taken
to improve your online presence.
Q.3 MCQ(1 Choice)
1. SEO is a subset of..........
a. Search Engine Optimisation
b. Search engine marketing.
c. Social media Optimisation
d. Search engine
2....... Include duplicate content.
a. Off-page SEO b. On-page SEO c. White Hat SEO d. Black Hat SEO
3. Clocking or redirecting the user to another side or page is.........
a. White Hat SEO b. Black Hat SEO c. RED Hat SEO d. Blue Hat SEO
4. ....... Are the techniques that search engine recommend as a part of good
design.
a. Off-page SEO b. On-page SEO c. White Hat SEO d. Black Hat SEO
5...........are Website link that are stored for future reference.
a. Web page b. Bookmark c. Website speed d. Media optimization
6............ Represent a " vote of confidence " from one side to another.
a. frontlinks b. Backlinks c. Blacklinks d. Whitelinks
7. Apart from this mobile friendliness which factor also rank the website higher.
a. Speed b. SEOptimer c. Social book marking d. Social marketing
8. Ranking factor for Google is.........
a. Speed of the website b. Robots.txt c. Mobile friendlines d.SHO
9. ...... To find out what could be done to improve ranking on search engine.
a. SEO search b.SEO audit c. SEO speed d.SEO optimization
10.SERP stands for.........
a. Search engine result page
b. Search engine resource page
c. Search engine rank page
d. Search engine represent page
Lesson 3. Advanced Javascript
Q.1 Fill in The blanks
1. In......... Scripting the script reside on the web server.
2. In......... Scripting the script results on the client computer.
3................ Scripts are used for validation purpose.
4. In javascript function is declared using............ Keyword.
5. At the back end..... Scripting is used.
6. JavaScript has a builtin multiway decision statement known as......
7. ................. Refers to the execution of statement or group of statements of
code for a fix number of times.
8. ........ Statement is used to jump out of loop.
9. When is necessary to skip statement block and take the control at the
beginning for next iteration............ Statement is used.
10. The....... Keyword is used to create new object in JavaScript.
11. DOM stands for.........
12. .......... Property of DOM object returns the <head> element of the
document.
13. ............ Method of DOM object writes HTML expressions or JavaScript code
to a document.
14. The............. Properties useful for getting HTML element and changing its
content.
15. .................... Property of Window object returns the location object for the
window.
16. .............. Method of string object returns the index of last occurrence of
specified character in a given string.
17............. Method of string object returns the index of the first occurrence of
specific character in a given string.
18. ........... Method of string object converts a string to lowercase.
19........... Method of string object converts a string to uppercase.
20. ......... method of math object returns the absolute value of a number.
21. ..................... Method of math object returns the square root of a number.
22. .......... Method of date object returns the day of a week.
23. .............. Method of date object returns the hour.
24. ............ Method of date object returns the seconds.
25. An............ is an object that can store a collection of items.
26. An ........... Is a special variable which can hold more than one value at a
time.
27. .......... Method of Array object joints two or more arrays and returns of
copy of the join array.
28.......... Method of Array object removes the last element of an array and
returns that element.
29........... Method of Array object rivers says the order of the elements in an
array.
30. .................. Method of date object returns the year.
Q.2 True or False
1.There is no need of special software to run JavaScript program.
2. JavaScript is not case sensitive language.
3. JavaScript helps the browser to perform input validation.
4. JavaScript cannot handle Date and time.
5. Functions are declared in JavaScript using var keyword.
6. JavaScript is platform independent scripting language.
7. There are two types of scripting.
8. Incline side scripting the script reside on client computer and that can run on
the client.
9. Server side scripting is used at the front end.
10. A Javascript object is an entity having state and behaviour.
11. Server side scripting is more secure than client side and scripting.
12. Client side scripting is used at the front end.
13. There should not be duplicity between the cases.
14. For loop will execute statement as long as condition becomes false.
15. Break statement is used to jump out of loop.
16. The default statement is not mandatory in switch case.
17. JavaScript is an object base scripting language.
18. JavaScript object is an entity having properties and objects.
19. JavaScript support four type of objects.
20. The new keyword is used to create new object in JavaScript.
21. DOM stands for Document Original Model.
22.NaN property of number of object returns not a number value.
23. parseInt() method of number object converts given string into an integer
number.
24. String object is used to store and manipulate numbers.
25. charAt() method of string object returns the character at the specified
position.
26. lastIndexOf() method of string object returns the index of the last
occurrence of specified character in given string.
27. ceil() method of math object returns the next integer greater than or equal
to a given number.
28. pow() method of math object return the base to the exponent power.
29. Date object is created using new keyword.
30. getHours() method of date object returns the month.
31. setMonth() method of date object sets month.
32. Index of first element of an array is 1.
33. Length property of an array object reflects number of elements in array.
34. indexOf() method of Array object search the array for an element and
Returns its position.
Q.3 MCQ(Choose 1 correct option)
1. .......... Is an interpreted scripting language.
a. PHP b. C++ c. HTML d. Javascript
2. The programs in JavaScript language are called...........
a. Website b. Script c. Web server d. Software
3. Dom stands for..........
a. Document object model b. Document one model
c. Design one model d. Document object manage
4. The way in which HTML document content is accessed and modified is called
as.........
a. Design object model b. Develop object model
c. Do object model d. Document object model
5. ............ Method of DOM object writes HTML expressions or JavaScript code
to
a document.
a. write() b. Read() c. Close() d. Readonly()
6. ................ Object is parent of all other objects.
a. Window b. Math c. String d. Number
7. ............... Object represents an open window in a browser.
a. Math b. Array c. String d. Window
8. .......... Property of Window object returns a boolean value indicating
whether a window has been closed or not.
a. Closed b. Status c. Document d. Name
9. ........... Method of Window object display the confirmed dialogue box
containing message with ok and cancel button.
a. Blur() b. Confirm() c. Print() d. Focus()
10. ............. Method of Window object this place dialogue box to get input
from the user.
a. Alert() b. Open() c. Confirm() d. Prompt()
11........ Method of number object determines whether the given value is
floating point number.
a. parseFloat() b. parseInt() c. isFixed() d. NaN
12. How to declare string variable?
a. var str-new str(), b. var a=I.T;
c. a=str.str d. var str="Information Technology";
13........ Object is used to store or manipulate text.
a. Maths b. Date c. Number d. String
14. ............ Method of string object returns the index of the first occurrence of
specified character in given string.
a. indexOf() b. substr() c. substring() d. trim()
15........... Method of string convert a string to lowercase.
a. toUpperCase() b. substr() c. trim() d. toLowerCase().
16. .............. Returns the highest value number in a list of numbers.
a. min() b. pow() c. sqrt() d. max()
17. .......... Method of math object returns random number between 0 and 1.
a. abs() b. random() c. pow() d. sqrt()
18. ........... Are used to hold more than one value at a time.
a. Number b. Math c. Array d. Date
19. The index of the first element of an array is...........
a. one b. two c. three d. zero 30
20 ............ Method of Array object joins two or more arrays, and return so copy
of the join array.
a. Find() b. concat() c. indexOf() d. Pop()
21........... Method of Array object rivers is the order of the elements in an array.
a. Find() b. Reverse() c. inarray() d. Pop()
L4. Emerging Technology
Q1. Fill in the blanks
1. IoT stands for........
2. The data collected using IoT devices can be used to take ..............
3. Smart home is an application of............
4............ Is a model for enabling convenient or demand network access to a
shared pool of computing resources.
5. SaaS stands for............
6. PaaS stands for...........
7. ........... Gives user access to storage networking server and other computing
resources why are the cloud.
8. Instead of purchasing hardware outright users pay for ........... On demand.
9. Amazon Web Services (AWS) is an example of.........
10........... Provide a platform with tools to test develop and host application in
the same environment.
11. ............ Enables organisation to focus on development without having
ovary about underlaying infrastructure.
12. In .......... In user do not install application on their local devices.
13. In SaaS the application reside on a remote cloud network access through
the........ Or an API.
14............ Wenders provide user with software and application via a
subscription model.
15. Users do not have to manage, install or update software............
Manage this.
16. Github is an example of........
17. ............... Cloud environment combines both public and private element.
18. .......... Computing solutions are in expensive than the actual overall
infrastructure setup for the IT services.
19. google computer engine(GCE) is an example of......... service.
20. Google cloud platform is an example of....... Cloud.
21. AI stands for...........
22. Machine learning is a subfield of ..........
23............... Imitate the brains array of interconnected neurons.
24. Chatbot is an example of .............
25. 5G stands for..............
26. 5G is the next generation of.......... Communication.
27. LTE stands for.............
28. 5G technology's may use of variety of.............
29.......... Is the faster method of data transfer.
30. .......... Networks are digital cellular network.
31......... Is the fifth generation of cellular Network Technology.
Q.2 State whether the statement is true or false.
1. The internet of things is the network of physical devices only.
2. IoT helps to minimize human efforts.
3. 3 time is the primary factors in automation which can be saved through iot
platforms.
4. The data collected using iot devices is used for taking decision.
5. Iot based security systems cannot make home or office environment secure.
6.IaaS provide automated and static environment.
7. In IaaS enterprise saves the cost of buying and maintaining their own
hardware.
8. PaaS do not provide collaborative work if teams works remotely.
9. In SaaS a service provider delivers software and application through the
internet.
10. SaaS provider manage install and update the software.
11. In private cloud all the services and supporting infrastructure is shared
among across the multiple users.
12. Hybrid cloud allows greater flexibility.
13. Cloud Computing solutions are more portable.
14. Microsoft Azure is not an example of public cloud.
15. Google's G suit is example of PaaS.
16. Official intelligence is an area of computer science that emphasizes on
creation of intelligent machines that work and react like human.
17. AI helps to take faster decision as compared to humans.
18. AI creates unemployment.
19. 4G is the next generation of wireless communication.
20. 5G Technology may use variety of spectrum bands.
Q.3 MCQ( choose 1 correct option)
1. The internet of things is the......... Of physical devices vehicles home
appliances etc.
a. Collection b. Network c. Relation d. Group
2. IoT devices can collect data from...........
a. Environment b. Internet c. Books d. Documents
3. Choose correct applicantion of IoT.
a. Smart lightning b. Lightning c. Manual lightning d. Big lightning
4. SaaS stands for.........
a. Software as a service b. Software as a self
c. Software as secure d. Software as a section
5.PaaS stands for.........
a. Platform as a service b. Platform as a self
c. Platform as secure d. Platform as section
6. IaaS stands for ........
a. Infrastructure as secure b. Infrastructure as a service
c. Infrastructure as self d. Infrastructure has a section
7. In............... cloud services all the data is protected behind the firewall.
a. Public b. Private c. Secure d. Hybrid
8. Choose correct example of public cloud.
a. Amazon AWS b. Linux c. DOS d. Xammp
9. In.......... Type of cloud computing all data is protected behind the firewall.
a. Public b. Private c. Common d. Hybrid
10....... imitate the brains array of interconnected neurons.
a.Machine learning b.Neural network c.Deep learning d. Computer
vision
11.......... emphasizes on creation intelligent machines that work and react like
human.
a. GCE b. AI c.IoT d.5G
12. ........... Is the next generation of wireless communication.
a. 5G b.4G c.3G d.6G
Lesson 5. Server Side Scripting
Q.1 Fill in the blanks
1. PHP is........... Scripting language.
2. PHP is........... Language i.e. there is no need for compilation.
3. A variable start with ........sign followed by variable name.
4. A ........ Is a computer system that serves as a central repository of data and
programs.
5. PHP files have extension.......
6. ......... keyword is used to display text on web page.
7. A variable declared outside a function has a....... Scope and can only be
accessed outside the function.
8. A variable declared within a function has......... Scope and can only be
accessed within that function.
9............ Functions return the length of a string.
10. ........ Function reverse a string.
11. ......... Function returns a part of a string.
12. ............. Function conversation to lowercase.
13. ......... Converts the first character of each word in a string to upper case.
14......... Function removes white space and other predefined characters from
both sides of a string.
15. A........ Is series of characters.
16. A ........ Is a block of statements that can be used repeatedly in a program.
17. An......... Is a special variable which can hold more than one value at a time.
18. The.......... Arrays are the arrays with numeric index.
19. The........... Arrays are there is with named key.
20. The............ Arrays are there is containing one or more arrays.
21. Information can be passed to functions through.............
22. The......... Statement is used to let a function return a value.
23. ........ Is an array of variables passed via the URL parameters.
24.......... Is an array of variables passed by the http post method.
25. Information send from a form with.......... Method is visible to everyone.
26.A ......... Is a small text file that the server sends on the users computer.
27........ Is used to identify user or its machine and track activities created on
the user computer.
28. When Browser request server page...... Are send along with the request.
29. ......... Helps wave application to maintain user information on all the pages.
30........... Is used to store user information on server to track user activities.
Q.2 State true or false
1. PHP is widely use open so general purpose scripting language.
2. PHP does not support data bases.
3. PHP run some client side.
4. Server side scripting is more secured and client side scripting.
5. PHP is easy to learn and runs efficiently on client side.
6. PHP is an interpreted language.
7.PHP runs on only Windows.
8. The server side environment that runs scripting languages is termed web
server.
9.There is no need of compilation for PHP code.
10. You need to pay for use of PHP.
11. PHP is case sensitive only and the time of variable declaration.
12. In PHP the Eco keyword is case sensitive.
13. PHP files are saved with .HTML extension.
14. Variables are used to store values.
15. A variable name can start with a number.
16. A variable declared outside a function has a global scope.
17. A variable declared within a function has local scope.
18. To check data type of a variable var_put() method is used.
19. Comments are the non executable statement in PHP code.
20.SteLength() function returns the length of a string.
21.Str_word_count() function counts the number of words in a string.
22.Strrev() function reverses a string.
23. Strpos() function returns string.
24.Substr() function returns part of a string.
25. PHP supports null data type.
26. PHP variable has three different scopes namely: Local, global and static.
27.gedit is example of text editor.
28. A string is a series of characters.
29. In PHP, string() returns the BOOLEAN value.
30. In PHP, array() function is used to create an Array.
31. In PHP there are six types of arrays.
32. Multidimensional arrays are the arrays with named key.
33. Associative arrays contents one or more arrays.
34. A function name cannot start with the number.
35. Argument are specified after the function name, inside the parentheses.
Q.3 MCQ(Choose 1 correct option)
1. The server side environment that Runs a scripting languages is
termed ...........
a. Browser b. Computer c. Web server d. Client
2. PHP files are saved with........ Extension
a. .HTML b. .xml c. .js d. .php
3. ... Keyword is used to display text on web page.
a. Echo b. Print c.write d.cin
4. PHP very good man cannot start with..........
a. Number b. Character c. Alphanumeric d. Dollar
5. Correct method of declaring PHP variable is ...........
a.#age b. $age c.@age d.age
6. A Variable declaration........ A function has a global scope.
a. Inside b. Middle c. Outside d. Topside
7. A variable declared............ A function has a local scope.
a. Inside b. Middle c. between d. within
8. PHP stores all ........ Variables in an array called $GLOBAL[Index]
a. Local b. Global c. Static d. Within
10.......... Are the statements in PHP code which are not visible in the output of
the program.
a. Method b. Comments c. Objects d. Values
11. How to add a single line comment in PHP?
a. // b. * c. $ d. @
12. Information can be passed to functions through ……….
a. Condition b. arguments c. array d.
variable.
Lesson 6 :E-Commerce and Governance
Q.1 Fill in the blanks
1. E-Commerce’s scope is …………..
2. A customer can do shopping …………. online using type of E-Commerce.
3. EDI is …………….. exchange of information.
4. E-Governance which provides safe and secure interrelationship between
domestic or foreign government is ……………
5. ….…………….. is the process of buying and selling of goods and services using
electronic medium.
6. .………… commerce focuses on the exchange of products and services
through personal interactions.
7. ….……… is also referred as paperless exchange of business information.
8. ….…………… commerce is limited to a particular geographical location.
9. In ………………. commerce scope is local.
10. ….…………. commerce is 24X7 it can be done anytime day and night.
11. B2C stands for ………………..
12. In …………… model business sells it’s products directly to a customer .
13. C2C stands for …………..
14. C2B stands for………………
15. A …………….. is the series of exchanges between a customer and a supplier
that takes place when a commercial exchange is executed.
16. The ………….. phase of trade cycle consists of two steps like search and
negotiate.
17. The …………. phase of trade cycle consists of order and delivery.
18. The …………. phase of trade cycle consists of invoice and payment.
19. The …………. phase of trade cycle consists of warranty and After-sales
services.
20. ……… is a type of electronic card which is used for transactions made online
through a computer or a smartphone.
21. E-wallet is protected with a ……………
22. An E-Wallet is protected with a ……………….
23. ………… is the buying and selling of the goods and services through wireless
handled device such as smartphones and tables.
24. EDI stands for…………..
25. The …………. is the process which allows one company to send information
to another company electronically rather than a paper.
26. E-Wallet is a type of …………. Account in which a user can store money for
any future online transaction.
27. ……………. Is computer-to-computer interchange of strictly formatted
documents via telecommunication or physically transported on electronic
storage media.
28. E-Governance is of ………… types.
29. G2C stands for ……………..
30. The …………… refers to the government service which enables citizens to get
access to wide variety of public services.
31. The …………… is the exchange of services between government and business
organization.
32. G2G stands for …………..
33. The ……………… refers to the interactions between different government
departments, organizations and agencies.
34. G2E stands for ……………….
35. The ………….. governance aims to bring employees together and improves
knowledge sharing.
36. ………………. Is the implementations of information technology in the
government process and function.
37. ……………… is widely used on the internet to protect user information being
sent between a browser and a server.
38. …………………. converts plain text in cipher text.
39. A ………………. Is also known as electronic signature.
40. A ……………. Is an electronic password that allows a person to exchange data
securely over the internet using public key infrastructure.
41. PKI stands for ………………
42. Encrypted text is also called as …………. Text.
Q.2 True or false
1. E-commerce stands for Electronic commerce.
2. Commerce means buying and selling of goods and services.
3. E-Commerce is a process of buying and selling of goods using internet.
4. Traditional commerce is manual.
5. E-commerce trading activities are online via internet.
6. Traditional commerce is limited to business hours.
7. E-commerce is 24x7.
8. E-commerce provides face to face interactions.
9. E-commerce is local.
10.Traditional Commerce’s Scope is global
11.E-Commerce reduces paperwork.
12.E-Commerce increases the cost of searching a product.
13.Setup cost of E-Commerce is expensive.
14.In B2C model business sales it’s product to an intermediate buyer who
then sells product to the final customer.
15.In B2C model Business sells its product directly to customer.
16.In C2C model consumer helps consumer to sell their assets by publishing
their information on website.
17.OLX, Quikr , Online Auction are the examples of B2B model.
18.In C2B model consumers have products and services of value that can
consume by business.
19.Type of E-Commerce are B2B, C2B, C2C etc.
20.Example of Business to Consumer is OLX.
21.Ebay is the example of Consumer to Business.
22.Ebay is the exchange of Consumer to Business.
23.Example of Business to Consumer is Amazon.
24.Trade cycle is the series of exchanges between a customer and a
supplier that takes pace when commercial exchange is executed.
25.Execution phase consists of two steps like search and negotiate.
26.The Execution phase consists of Order and Delivery.
27.The After-sales phase consists of Invoice and Payment.
28.Invoice means customer will receive a bill for purchased product.
29.After-sales phase consists of Warranty and After-sale services.
30.Mobile Payment apps are UPI, Paytm, Pay-pal etc.
31.NEFT,IMPS etc. are the example of bank transfer.
32.E-Wallet is a type of post-paid account.
33.State bank buddy, paytm wallet are the examples of E-Wallets.
34.Some common forms of E-Commerce are C2B,B2B,C2C etc
35.M-Commerce enables user to access online shopping by using a desktop
computer.
36.Social Commerce is a form of electronic commerce that involves online
media that supports social interaction.
37.EDI is the non electric interchange of business information using
standardized format.
38.EDI is the process which allows one company to send information to
another electronically rather than paper.
39.Two most common documents exchanged using EDI are purchase orders
and invoices.
40.The G2C refers to the government services which enables citizens to get
access to wide variety of public services.
41.License Renewals and Paying Tax are the example of G2C.
42.In G2G type of E-Governance , Government agencies can share the same
database using online communication.
43.G2E is the internal part of G2G sector.
44.Checking balance of holiday is example of G2E.
45.E-Mitra project,E-Seva project ,CET are he examples of successful
implementation of E-Governance.
46.Encryption is used to protect users information being sent between
browser and a server.
47.Conversion of Plain text into cipher text is known as decryption.
48.Encryption is of two types Symmetric and Asymmetric.
49.Digital Signature is also known as electronic signature.
50.Digital Signature is also known as public key certificate.
51.Digital Signature is an electronic password that allows organization to
exchange data securely over the internet using PKI.
52.Digital Signature are used in E-Commerce.
53.Cipher text means readable form of data.
54.Plain text means non readable form of data.