t he w eb p,igc, . ri ' " " r - '. f d fo r att n oule. n ~ .., c\.. 111 t::::> lne styl .
,
be spccl le
b
e shee
t ags and d 1ff0rc•n t st ytc s cc1n containing th e style rul es. It tf
. I CSS fil e can e . accept~
these t ;ig~ u~ing cs~ A Sin !{ (' url of th e .css file to be lin ked as th t•
finked to niany w eb p~gc s. All w eb pages ~ •,,,,
UNSOLVED EXERCISES
O BJECTIVE TYPE '1 UESTI0NS
e. Which of the following property I,, ,
1 . Tick (. l the correct option. to increase or decrease the size of ati:,.
a Which of th e following defines a
i. FONT-STYLE ii. FONT-FAMILf
measureme nt in centimetres?
f.FONT-S IZE iv. FONT-COLo:i
1 - % < -cm iii. - em iv. - ex
b. Wh ich of the following property is used 2. Answer the following as TRUE or FALSE.
to set t he background colour of an a. The <STYLE> tag is given inside ~-
element ? <BODY> tag. -t""
✓BAC KGROUND-COLOR b. The BACKGROU ND COLOR prope rty □":•
ii. BORDER-COLOR used with any HTML element to s~e:
iii. BACKGROUN D-IMAGE its background colour. T
iv. BACK-COLOR c. TYPE and H REF attributes are ·
c Whi ch of the following property specifies mandatory attributes of the <LINK> t:;
th e font co lour of an element? d. CSS enables to separate t he web c3g
i. FO NT-STYLE ii. FONT-FAMILY with the formatting tags. 1
iii. FO NT-SIZE ~ONT-CO LOR e. The OUTLINE property specifies a li:,r·-
d. W hich of the following outline style
be drawn around the elements. 1
applies a dotted outline? 3. Fill in the blanks.
i. dashed ~ dotted a. The .. ~ ... ...... propertyspec .-r'
ii1. so lid iv. All of these the left margin of an element.
186 Computer Appl ications-10
r<
SHORT ANSWER TYPE ~ UE!
2. Answer th e following as TRUE or FALSE. F What is the use of the
,1 A li c; t r iln no t br nrslc-d in another li st . l. <UI> </UL> attribute?
. J What is the use of the ALI
b l ht' . l /\r I ION ' ,111 I Ihut l' j<, lJ ',(' d to give
2
· working with a table?
t lllt' to ., t,d ilr• I
l ,1hlr, p11 .-1b l<' to :irrn nRr da t r1 In ;:, labu liJr 3. What do you call the tex1
place of image when the i1
fnrm - , f on a web page?
d . You ca nnot m erge th e co lu mn !) of a tab le.
4. H ow can you change the t
c You ca nnot cha~e th e start order o f an s. How can you give column
ordered li st. ,-
6 . What are nested lists?
f. You ca n on ly crea te numbered lists in 7 . Using which attribute yo
HTML. F colour of the visited link?
LONG ANSWER TYPE ~ UEO
g. You ca nnot change the background
colour of a table. F- 1 . How can you create-0-efirr
h. Linking can be done in two ways i.e ., Explain with the help of at
Internal and external_. ---r 2. State the difference betv.
i. The <ANCHOR> tag is used to create a and CELLSPACING .
hyperlink. I 3. How can you specify the I
j. The <A> tag is used to insert a table. F table? 71 \ 9
4. Discuss the differenc,
3. Fill in the blanks. ROWSPAN and COLSPAN
a. .. ~ ...... and ........ li..&;t,...... help of examples .
offer more effective and presentable way 5. What is the importance c
of organising data in HTML documents. Explain with the help of a,
b. .. ....... ~U...~...... tag creates a 6. How can you create a link
bulleted list. 7. How can you view the loc.
c. The default bullet style supported by
L
APPLICATION BASED ~UES'F
most web browsers is ..... d..lu.... bullet. 1. Harshita wants to add ar
d. ...~.T.A-.E..LV.allow you to arrange roman numerals starting
text in a tabular form on a web page . web page . Write an HTM i
e. .. ...... . P..L.A.~ .. L.. is the smallest same in order to help her.
element on the screen. 2. Arnav wants to write an I
f. ...CtJ.L..sPA.N...... attribute is used software can he use and v.
should he save his file?
inside the <TD> and </TD> tags to merge
the columns of a table .
3. Observe the statements
up the correct stateme
g. The . .Cr:21..1 ~ attribute
alternative text for an Ima
defines space bet~een tab ~ ells.
• <IMG SRC =
h . The <IMG> tag is .~ , - : , ~g. animalkingodm.com/
i. ,J..J.id;th..... and .... ~ .. .. .. . = "Bird image"/>
♦
attributes of <IMG> tag are used to <IMG SRC =
specify the width and height of an image. animalkingodm .com/
"Bird image"/>
j. . .. .. .. .~ .. .. .. .. .. .. attribute enables
you to specify the alignm ent such as left,
• <SRC = "http://ww
com/bird .jpg" altern
right, center of an image .
image "/>
150 Computer Appl ications-10 I
ty sp,,.c,f es 4.
. : .~ / c ;per
. . . .. ... .. .
b. The . f a b o r de
r.
ro
th e c o l o u is an H T M L tag at
··· ·. · . .. . .
· · · ·
c. A · · ·
b e a p p l i ed.
a s t y l e will as ti e
which s h e e t h
.. s t yle
--..... .
d.
a s t p r i o rity. e rt y is useo
le ~ . • ro p
~ an
,.r.t,,
,~~.a
.- i ~
~
o l o ... r o f
e. The nd c
. , -
b a ck g r o u
c i f y t h e
to spe
T M L t a g .
H
'? u e s n o Ns o ..
R T Y P E • r e 1 "'
R r A N S WE , ~-
Sr10 1 t h e : er r n
n d e r s t a n d b~
l ,Vvhat d o yo u u .. I \ D ( _"' ... ~"'R
· e BACK G RCJ
o f t h
s the use
2· Di scus
er r y. t 7 r ; g · h s.' ·~~
Pr o p e o f t o ,:.m
u wo =>
u s s t h e p b D'"- ~~e~
3· D, sc ~
..
2 \ \ rrn "'~
t: , h l i e v.,
t ,rs i
... , r 1' u 1
-
,..
c Wh c1t 1i. d form n f r ft ,, I rcmll 1il~n ~1t1,rp I.' r,~f',1/ ?, >@k l la w grants exclusi ve
?
1 J lled
rA intt:>IIPctual works .
r1Hftt ,, It>., v ,ir1r>ty
( l' I I I I I( ."I It ' 11 In c rypt1 0 11
111 r .1-.<, wn rd cJv Ol11 1t.1I <, ll"(natur P SHOAT ANI WEA TYPE 1 U£811 0NS
d Wh ,H IP~.1
1, ,1 1 d oc 11n1C' 11t that giv(l s th e 1
_, P r:.ornme rce 7 I?;,
1. How doe-. cybe reth1c w o rk ,n
111 vc-n t o 1 .,ole , 18ht s t o rn ake, sell or use
2. How Is Auth ent icity an import ant requ 1<,1t "! of
;rn mvc nt1on , ca ll ed ?
lra dema, k ii . Copyri ght e-comm erce? - -/ _9 0
1v. Logo 3. Wh at Is a digital signatu re? '
• m Patent
l' In wh ich of th e fo llowing plagiari sm types 4 . How does a Tradem ark work ?
,., the orig in al work edited, refram ed and 5. Defin e digita l proper ty rights.•
repro~ uced?
LONG ANSWER TYPE ~ UEs-TION S
~ osaic plagiar ism
J ......
11 Minima l plagiar ism 1. Discuss proprie tary softwa re licences •
11 1. Direct or comple te plagiar ism is the sign ificance of ethics in
2. What
1v. Substa ntial plagiar ism / .5'
compu ting? - +
2. Answe r the followi ng as TRUE or FALSE. 3. What are the protect ive measu res t o preven t
a Delay in the availab ility of informa tion plagiarism? t G :_
may incur loss in the business. -r 4. Discuss in detail the three w ays in w hich
b. Inform ation should be encryp ted and
F digital proper ty rights ca n be protec ted. •
decryp ted only by the unauth orised user.
c. The sender of the inform ation encryp ts 5. What are the popula r ope nsourc e lice nces? -- v
th e data using a secret code and the
APPLICATION BASED ~ UESTIONS
specifie d receive r only can decryp t the
data using the same or differe nt secret 1. How accord ing to you the gap betwee n
code . 1 the Digital divide and Digital un ite ca n be
d. IP law oes not grant the author of an reduce d?
1
intellec tual creatio n exclusive rights for
2. Which type of soc iety can be ca ll ed as
exploit ing and benefit ing from their
knowle dge-ba sed society?
creatio n . F
e. Softwa re develo pers may want to share 3. Why is the Indian govern ment encou raging
thei r softwa re with as few people as openso urce softwa re in schoo ls?
possi ble . F
IN THE I.AB ~ UESTIONS
Fill in the blanks.
a. Before the 20th ce ntury, the term 1. Create a PowerP oint presen tation on 'Ethics
~.. f2Mti,,d,g.. referred to the sets of in compu ting'.
people who had access to the telepho ne
2. Search an alterna te openso urce softwa re for
servi ces and wh o did not have.
Is the word - ... the softwa re that are in you r deskto p/ laptop .
b. ..F..~
fo r-word transcr iption of a section of 3. Downlo ad and insta ll OpenO ffice (an
someo n e else's w o rk, withou t making any operso urce softwa re) on your compu ter and
cha nges in th e origina l work. lea rn how to use it.
c. Openso urce llcence d softw are is mostly
4. Search th e protect ive measu res to preven t
availabl e .. ... .. £.?.c....tuz__ ........... ... .
plagiar ism on th e Interne t and p repare a
d. Open source licences co mply with the
poster in any openso urce softwa re .
-~ ..a..bd. ... ~
I Cyberethics 203
¥ ~ ~
~
10. 3fltlRtR '3'tFlWIWT
2s-30 ~ l l Rl~Q :
(cfi> ' }<lfc@ tllt;tl' ~ lfTtl fa1Yc1i tft ell 3flUl 'tfl«q Q"5cll ' - ~cfilR tR 3ftR
l'aillil ' mi- ~ ~-rr:r<Jr.JlTI tictl~ ' 'Qlo ~ ~ 1~1ct> '1 Rl~Q I
(~ ) '~, 3fltlR tR "3-::r ct>1
3ftFfi ~ i t ~ ct>il11 ~i(icli ~ ?
(Tfl •~ l,lql~ ~ , . 3Ri ! ' cfifa ~ ffi cfi) •~ l,lcll~, •~ 1
' JRi' qzj'fct>mi ? •~ . lR<P'R' ct>facli~3fTURtRR!~Q I
11. ~ Qldil g«ict> tR 3fT
.
'
~'3ilil ~ so - 60 ~itRl~Q :
(cfi) •mcrrct>13fi@ 1 1iitct> 4Toil d<9ct> 1 cl(if>idl1 tlitllil ~ Ql~cll~ct> q~~}<I ct>lijfi
~~~, ~JflH~lf ~~Q I
(~ ) 3iR ~ uiR tR cfi) ~ qqJ 3fcR 1~,C ~ ? ' 'tlRT-'tlRT
<Tf> Fa-t1~11-11 ~ ~ faw;1c it ~ cfi) ~<9ct>il d<9ct> ~ - ~ ~c11 lJTG ?
•* ~l Rl,iga1 ~, 'Qlo ~ 3ITTlR tR Rl~Q 1
u