0% found this document useful (0 votes)
5 views30 pages

Class 10 Comp

The document covers various topics related to Cascading Style Sheets (CSS), email structures, internet services, mobile technologies, HTML forms, and cyber ethics. It includes theoretical and application-oriented questions and answers about CSS properties, email address components, video conferencing, social networking sites, and online fraud. Additionally, it discusses the importance of privacy, intellectual property rights, and plagiarism in the context of e-commerce and digital content.

Uploaded by

4148gungunmishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views30 pages

Class 10 Comp

The document covers various topics related to Cascading Style Sheets (CSS), email structures, internet services, mobile technologies, HTML forms, and cyber ethics. It includes theoretical and application-oriented questions and answers about CSS properties, email address components, video conferencing, social networking sites, and online fraud. Additionally, it discusses the importance of privacy, intellectual property rights, and plagiarism in the context of e-commerce and digital content.

Uploaded by

4148gungunmishra
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 30

Chapter-5 Cascading Style Sheets (CSS)

Type A: Theoretical Questions

1. Which property is used to change the background color?

A a. Background-color

2. Which property is used to increase and decrease the text size?

A b. Font-size

3. What would this CSS rule do?


P { color:red;}

A c. Make the fonts of all the paragraphs red

4. What would this CSS rule do?


H2 { font-size:2em;}

A b. Make fonts in the h2 tags double in size.

5. How do you link an external stylesheet to a page?

A <link rel=”stylesheet” href=”somefile.css”>

6. Which one of these names and value declaration would not work?

A b. Margin;20px 30%

7. Which of the following CSS types is defined in the header of a web page and applies to
the entire Web page document?

A Internal

8. Which of the following type of CSS is coded in the body of the web page as an attribute
of HTML tag and applies ONLY to the specific element that contains it as an attribute?

A a. Inline

9. Where in an HTML document is the correct place to refer to an external style sheet?

A b. In Head section

1|Page
10. Use the CSS padding property to configure the cellpadding of a table.

11. What is the utility of dynamic websites?

A A dynamic website contains information that changes, depending on the viewer of the site,
the time of the day, the time zone, the native language of the country the viewer is in or many
other factors.
For example, a channel or newspaper website is a dynamic website as they keep updating
the stories, current time information, trends etc.

12. What are some features of dynamic websites?

A DHTML is combination of technologies like HTML, JavaScript, DOM (Document object


Model)
DHTML characteristics are:
• Animation of elements
• Mouse rollover effects
• Popup menus
• Search facility
• Comments
• Input/Feedback forms
• Customized information

13. What do you understand by stylesheets? How are these useful?

A A Style sheet is a file containing formatting guideline that define overall look of a document.
Benefits of Stylesheet:
• Pages download faster.
• Developers have to type less code, and the web pages are shorter and neater.
• The look of the site is kept consistent throughout all the pages.
• Updating the design and general site maintenance are made much easier.

2|Page
14. What is CSS style rule? How do you define it?

A A CSS rule is a grouping of one or more CSS properties which are to be applied to one or
more target HTML elements.
A CSS rule consist of a CSS selector and a set of CSS properties. The CSS property specify
what style to be applied to the HTML elements.
Following is the CSS rule example:
Div {property: property value}
Ex: P {border: 1px solid black; font-size:18px;}

15. What are three ways of creating style rules? Give examples of each?

A Three ways of creating Style rules are:


1. Inline Styles: Styles are embedded within the HTML code they effect.
<h3 style =”font-family:Arial”>
2. Internal Styles: Styles are placed within the header information of the web page and then
affect all corresponding tags on the page.
<HEAD>
<STYLE TYPE=”text/css”>
….CSS rules (style definitions) go here ….
</STYLE>
</HEAD>
3. External Style:External style sheet is contained in its own text file (having extension
.css),and then referenced from within the web page.
<link rel=”stylesheet” type=”text/css” href=”sample.css”>

Type B: Application Oriented Questions

1. How do you add a background color for all <h1> elements?

A H1{BACKGROUND-COLOR: #FC9804;}

3. How do you make each word in a text start with a capital letter?

A H1{TEXT-TRANSFORM: CAPITALIZE;}

3|Page
Chapter-2 Internet Services and Mobile Technologies

Type A: Theoretical Questions

2. What are the two parts of an e-mail address? Which character is used to separate
these two parts?

A An e-mail address has two parts separated by @ symbol.

1. Username – On the left side of @ separator is the user name. A user name cannot
have blanks.
2. Domain name for the host server – The portion to the right of @ identifies the
server or host or network that services your e-mail. It is sometimes also called
the e-mail server.
Ex. [email protected] – pacasa is the username and hotmail.com is the domain name.

7. Write the structure of an e-mail message. Also differentiate between Cc: and Bcc:
fields.

A An e-mail message can contain some or all the following components (Structure):

From, To, Cc, Bcc, Subject, Body, Attachments, Date, Message-Id.

Difference between CC: and BCC: fields

CC CC stands for Carbon Copy where the address/addresses of those to whom


you want to send a copy of the mail is specified. The CC recipient’s name
is visible to all recipients.

BCC BCC stands for Blind Carbon Copy. This people will also receive a copy of
the message. But a BCC recipient’s name is not visible to all recipients.

8. To find out about e-mail address of one of your friends, which utility will you use
and how?

A Finding people on the net utility is used. For Example : www.123people.com


9. What do you understand by video conferencing? What all things must be installed
on your computer in order to have video conferencing?

A A two-way videophone conversation among multiple participants is called video-


conferencing.

Following things must be installed on the computer to have video conferencing:

i. Multimedia PC with a camera


ii. Video compression hardware
iii. Access to Internet over an ordinary telephone line
iv. Videophone software.

10. Name some social networking sites.

A Some popular social networking software are:

Facebook, LinkedIn, MySpace, Twitter, YouTube, Flicker, WordPRess, Blogger

12. What are the uses and misuses of social networking sites?

A Uses of Social Networking Sites: -

● Easier to connect with people


● Easy to hold discussions and collect opinions
● Interactive involvement.
● Brings more awareness
Misuses of Social Networking Sites: -

● Misusing the data/information posted by innocent users.


● Credibility of Information
● Fake Profiles
● Bullying and Trolling

16. What is the utility of e-Learning?

A E-Learning is learning that takes place in an electronically simulated environment.

e-Learning enhances the learning experience and can be done anywhere and anytime.
17. What is E-Reservation?

A Making reservation of tickets or hotel rooms or tourist package etc., through internet is
known as E-Reservation.

18. Name some protocols that are used for remote logging on a server.

A Some protocols that are used for remote logging on a server

● TELNET- It is an Internet utility that lets to log in remote computer systems.


● SSH (Secure SHell) Protocol- It is a remote logging protocol that logs into
remote machine via a shell where all the data between the client and server is
encrypted.
● SCP (Secure CoPy) – It allows to transmit files from one machine to another
over Internet with encryption benefits of SSH.
● SFTP (Secure File Transfer Protocol) – It is a secure protocol for file transfer
and it ensures security od data based on SSH protocol.

21. What are commonly used Mobile technologies?

A Commonly used Mobile technologies are:

● SMS (Short Message Service) – It can be used to send text message of up to


160 characters to another mobile device.
● MMS (Multimedia Messaging Service) - It can be used to send various types
of media such as pictures, video, audio to another mobile device.
● 3G (Third Generation) – It can be used to connect to the Internet. 3G offers
data transfer of up to 384 kbps under normal conditions and up to 2Mbps in some
instances.
● 4G (Fourth Generation) - It can be used to connect to the Internet. 4G offers
data transfer of up to 100 Mbps under normal conditions and up to 1 Gbps in
some instances.
Type B: Application Oriented Questions

4. b. Juhi is researching Indian Freedom struggle history on the Internet. She uses a
search engine to help her.

i. The computer sometimes takes a long time to respond when Juhi enters a question
into the search engine. Give two reasons why this might happen.

A Two reasons why the computer takes more time to respond to the search query could be:

i. Due to slow internet connection


ii. Not using searching tips (For Ex. surround the query in double quotes)
HTML II – Forms

Type A : Theoretical Questions

1. What character is displayed on the password forms when the user inputs characters?
d. A dot
2. What attribute is used for radio buttons?
c. Radio
3. What attributes are valid for textarea input?
b. Name, cols and rows
4. What attributes can be used with the select form?
c. Name, multiple and size
5. Is the size attribute valid for the submit button?
b. No
6. The two most important attributes of a form are:
c. Action and method
7. A label’s for attribute should match the input’s _____
b. Id
8. Creates blank text field, but shows the text as asterisks
c. Type=”password”
9. Method attribute will always post data into the browser.
a. True
10. Checkbox buttons let users select on or more of a particular set of choices.
a. True
11. <input type=”submit” name=”submit” id=”submit” /> creates a reset button.
d. False
12. What are forms?
A. Forms means by which one can prompt the user for information.
13. What do you understand by controls in the form?
A. Users interact with the forms through the named objects called controls.
A control’s control name is given by its name attribute.
14. Name different control types supported by html form.
A. HTML defines the following control types:
i. Submit button
ii. Reset button
iii. Push button
iv. Checkboxes
v. Radio button
vi. Menus
vii. Password
viii. Text input
ix. Hidden controls
15. Write the tags to define the following
i. A textbox
ii. A text area
iii. A radio buttons
iv. A check box
v. A password box
vi. A pop-up box
vii. Submit button
viii. A label
A.
i. <INPUT TYPE=text NAME=name>
ii. <TEXTAREA ROWS=”5” COLS=”50”>
iii. <INPUT TYPE=radio NAME=name >
iv. <INPUT TYPE=checkbox NAME=name >
v. <INPUT TYPE=password NAME=name >
vi. <SELECT NAME=name> <OPTION VALUE=value>….</OPTION></SELECT>
vii. <INPUT TYPE=submit>
viii. <LABEL FOR=label>

16. Write HTML code to produce the following controls:


A.

<HTML>
<HEAD>
<TITLE>FORM CONTROLS</TITLE>
</HEAD>
<BODY>
Grade : &nbsp; &nbsp;
<INPUT type="radio" name="Grade" value="A">A &nbsp; &nbsp;
<INPUT type="radio" name="Grade " value="B">B &nbsp; &nbsp;
<INPUT type="radio" name="Grade " value="C">C &nbsp; &nbsp;
<BR>
<table>
<tr>
<td>Subjects: </td>
<td><INPUT type="checkbox" name="sub" value="eng">English </td>
<td><INPUT type="checkbox" name="sub" value="mat">Maths </td>
</tr>
<tr>
<td></td>
<td><INPUT type="checkbox" name="sub" value="com">Computer</td>
<td><INPUT type="checkbox" name="sub"
value="acc">Accounts<BR></td>
</tr>
<tr>
<td></td> <td><INPUT type="checkbox" name="sub "
value="eco">Economics<BR></td>
</tr>
<tr>
<td></td>
<td><INPUT type="checkbox" name="sub " value="bst">Business
Studies</td>
</tr>
</table>
</BODY>
17. Write HTML code to produce these controls
i. A text box
ii. A text area with 10 rows and 30 columns
iii. A password textbox
iv. A pop up box to choose class from it.
A.
i. <INPUT TYPE=text NAME=name>
ii. <TEXTAREA ROWS=”10” COLS=”30”>
iii. <INPUT TYPE=password NAME=”pwd”>
iv. <SELECT>
<OPTION>Class 1</OPTION>
<OPTION>Class 2</OPTION>
<OPTION>Class 3</OPTION>
<OPTION>Class 4</OPTION>
</SELECT>
Chapter-6 Cyber Ethics

Type A: Theoretical Questions

1. What do you understand by privacy of data in e-commerce context?

A Privacy is the protection of personal information given online. In e-commerce


especially, it is related to a company’s policies on the use of user data. The privacy of
users must be respected by ensuring that the data collected this way must not be used
in public domain or sold to irresponsible parties.

3. What is the responsibility of e-commerce merchant to ensure before getting


user’s consent about his/her details’ usage?

A The responsibility of e-commerce merchant to ensure before getting user’s


consent about his/her details’ usage are:
1. The merchant or the seller must clearly state about how the user data will be used
in terms and condition of its site.
2. The merchant and seller must ensure that the user has gone through the term and
condition given on its site prior to making any transaction.
3. The merchant must ensure the user about data safety by implementing proper data
safety and security measures such as https protocol and other security mechanism.

4. What is online fraud? Give some example.

A Fraud committed using the internet is called online fraud. It may occur in many forms
such as:
1. Non-existing companies
2. Stealing information
3. Fraudulent payments

5. What is credit card fraud?

A In credit card frauds, the credit card details of the users are stolen from his/ her online
activities and then some payment frauds are carried out with this stolen information.

6. What is identity theft?

A Identity theft is stealing someone else’s online identity, fraudulent posts and are
posted or some other malicious activity is carried out.

9. What is intellectual property? What do you understand by intellectual property


rights?

A Intellectual Property is the intangible property of the person that is the result of
creativity, such as patents, copyrights, etc.
Intellectual property rights are the rights of the owner of the information to decide
how much information is to be exchanged, shared, or distributed.
Also, it gives the owner a right to decide the price for doing so.
10. What is plagiarism? How can you avoid plagiarism while referring to someone
else’s creation?

A Plagiarism is stealing someone else’s intellectual work and representing it as your


own work without citing the source of information. To avoid Plagiarism, you must
give credit whenever you use,
● Another person’s idea, opinion, or theory
● Quotation of another person’s actual spoken or written words
● Paraphrase of another person’s spoken or written words

11. What is digital property? What are the threats to digital properties?

A Digital property refers to any information about you or created by you that exist in
digital form either online or on electronic storage device.
Threats to Digital Properties:
● Digital software penetration tools
● Stealing or plagiarizing codes of your digital properties

13. Expand the terms: OSI, FLOSS, FSF, GNU, GPL, W3C, OSS

A OSI -Open Source Initiative


FLOSS – Free Libre and Open Source Software
FSF – Free Software Foundation
GNU – GNU is Not UNIX
GPL – General Public License
W3C – World Wide Web Consortium
OSS – Open Source Software

15. Compare and Contrast:


1. Free Software and Open Source Software
2. OSS and FLOSS
3. Proprietary software and free software
4. Freeware and Shareware

A Free Software Open Source Software


Free software is the software that is Open Source Software is the software
freely accessible and can be freely used, that is freely accessible and can be
changed, copied and distributed by all. freely used, changed, copied and
No payments are needed to be made for distributed by all. It is not free of
free software. charge.
Ex : MySQL relational database; the Ex :Android OS and Apple's OS X
Apache web server.
OSS FLOSS
Open Source Software is the software FLOSS is used to refer to the software
that is freely accessible and can be which is both free software as well as
freely used, changed, copied and open source Software.
distributed by all. It is not free of charge.
Ex :Android OS and Apple's OS X Free/Libre and Open Source Software
PROPRIETARY SOFTWARE FREE SOFTWARE
Proprietary software is neither free nor Free software is the software that is
open. Source code of proprietary freely accessible and can be freely used,
software is not available. changed, copied and distributed by all.
Payments are needed. No payments are needed to be made for
Ex : Microsoft Office. free software.
Ex : MySQL relational database; the
Apache web server.
FREEWARE SHAREWARE
Free software is the software that is Shareware is software, which is made
freely accessible and can be freely used, available with the right to redistribute
copied but no modification is allowed. copies, but it is stipulated that if one
No payments are needed to be made for intends to use the software, often after a
free software. certain period of time, then the licence
Ex : Microsoft Internet Explorer should be paid.
Ex: Wondershare Filmora

16. What is Public Domain Software?

A Public Domain Software is free and can be used without restrictions. The term
Public Domain Software is often used incorrectly to include freeware, free software
that is nevertheless copyrighted.

18. What is GPL software license? How is it different from LGPL software license?

A The GPL grants and guarantees a wide range of rights to developer who work on open
source projects. Basically, it allows user to legally copy, distribute and modify the
software.
LGPL it offers lesser rights to work than a standard GPL License. The LGPL is used
to license free software; so that it can be incorporated into both free software and
proprietary software.

20. What are the major factors behind digital divide?

A A digital divide is an economic and social equality with regard to access to use of, or
impact of information and communication technologies.
Two major reasons behind digital divide in India are

i. Technological reach is not the same all across India, especially in rural and
remote areas.
ii. Due to digital illiteracy, people are not able to take benefit of technology.
Type B: Application Oriented Questions

1. Companies spend a lot on secure data transmission that requires enough


technical safeguards.
a. What do you understand by secure data transmission?
c. What are common technical safeguards that are applied to ensure
secure data transmission?

A a. Secure data transmission means applying technical safeguards so that data


travels safely to its target, without being compromised.
c. To ensure secure data transmission the following technical safeguards can be
applied
1. SSL secure data transmission
2. Data Encryption
3. Use safe protocols
Chapter-4
HTML-II: IMAGES, LINKS AND TABLES

Type A: Theoretical Questions

1. What is meant by inline images in HTML?

A Inline image means image display in line with the text i.e. the specified image is loaded
separately and placed into the text flow as if the image were some special character.

2. Name the various types of alignments available for images.

A The HTML standard specifies five image alignment attribute values. Left, right, top, middle
and bottom.

5. What for mailto function is used?

A Mailto function is used to open a separate email form that the user may fill out. The E-mail
is then sent automatically, to the email address specified in the link.

6. Write HTML code to create the following ordered list:


X. Xylophone
Y. Yak
Z. Zebra

A <HTML>
<BODY>
<OL TYPE = ‘A’ start = 24>
<LI> Xylophone
<LI> Yak
<LI> Zebra
</OL>
</BODY>
</HTML>
20. How is spacing in cells of table controlled?

A To control the spacing in cells, the CELLSPACING and CELLPADDING attributes can be
used.
CELLSPACING – gives the amount of space between cells.
CELLPADDING – gives the amount of space between the cell border and the cell contents.

22. What is the use of having a SUMMARY attribute in <TABLE> tag?

A SUMMARY attribute of <TABLE> tag lets you denote summary of table’s data.

25. Name the attributes used for following:


(i) Setting the cell width
(ii) Setting cell’s background image
(iii) Setting cell’s background colour
(iv) Changing the cell span
(v) Aligning cell contents vertically

A (i) Setting the cell width


<td width =300>
(ii) Setting cell’s background image
<td background = “image URL”>
(iii) Setting cell’s background color
<td bgcolor = yellow>
(iv) Changing the cell span
<TR rowspan=2 colspan>
(v) Aligning cell contents vertically
<td valign = top>

26. What for <TH> and <TR> tags are used?

A <TH> tag – It stands for table header. The contents declared as header are displayed in a
distinctive style e.g. boldfaced.
<TR> tag – It stands for table row. <TR> marks the beginning of the table row and </TR>
makes the end of the table row.
<TR> and <TH> uses similar attributes as that of TD except for ROWSPAN and COLSPAN.
Type B: Application Oriented Questions

2. Write HTML code to create tables as shown below:

A Solution:(a)
<HTML>
<BODY>
<TABLE BORDER = 1>
<TR>
<TD> 1 </TD>
<TD ROWSPAN =2> 2 </TD>
<TD> 3 </TD>
</TR>
<TR>
<TD> 4 </TD>
<TD> 6 </TD>
</TR>
<TR>
<TD> 7 </TD>
<TD> 8 </TD>
<TD> 9 </TD>
</TR>
</TABLE>
</BODY>
</HTML>

Solution:(c)
<HTML>
<BODY>
<TABLE BORDER = 1>
<TR>
<TD ROWSPAN = 3 align=center valign=middle>Column 1 </TD>
<TD align=center valign=middle > ROW 1 </TD>
</TR>
<TR>
<TD align=center valign=middle > ROW 2 </TD>
</TR>
<TR>
<TD align=center valign=middle > ROW 3 </TD>
</TR>
</TABLE>
</BODY>
</HTML>

Type C: Unsolved Examination Questions

7. Consider the HTML code


<A HREF = #intro> Introduction </A>
In the above code,
(i) What is the purpose of # ?
(ii) What will happen when the user clicks “Introduction” ?

A (i) # sign is used to mark the section of the webpage for internal hyperlink.
(ii) When the user clicks on “Introduction” link, it displays the section of the page
where the HTML section is named as “intro”.
Chapter-1 Internet Basics

Type A: Theoretical Questions

1. What is WWW?

A The World Wide Web is a set of programs, standards, and protocols that allow the
multimedia and hypertext files to be created, displayed and linked on the Internet.

2. What is a server? What is a web server?

A A server is a computer or device on a network that manages network resources.


A server serves requests mainly related to resources on the network such as for sharing a
resource like printer or sharing storage etc. There are many different types of servers such
as a file server or a mail server or a webserver etc.
Web servers are computers that deliver (servers up) Web pages. In technical terms, we
can say that they handle HTTP requests.
For example, if you enter the URL http://www.edupillar.com/index.html in your browser,
this sends a request to the web server whose domain name is edupillar.com. The server
then fetches the page named index.html and sends it to the browser.

3. Enlist some services provided by a server on a network.

A Services provided by a server on a network are:


1. Equipment/Resource Sharing
2. Centralized File Saving for Data Sharing
3. Centralized Virus Scanning
4. Centralized Backups

4. Enlist some services provided by a web server.

A Services provided by a Web Server are:


1. Serving Web Pages.
2. Running Gateway Programs (CGI) and Returning Output.
3. Controlling Access to the Server.
4. Monitoring and Logging all Access.
5. Server-Side Scripting.
5. Name some web server software prominently in use.

A Some web server software prominently in use are:


Apache Webserver, Apache Tomcat, Webserver IIS, Sun Java System web server etc.

6. Differentiate between a web page and a home page.

A Web page Home page

A document that uses HTTP. Top-level web page on website that gets
displayed upon opening a web-site.

7. How is a web site different from that of a web portal?

A Web Portal Website

Collection of launch webpages of array of Collection of webpages offering a


web services like email, search engine, specialized content pertaining to the need
weather, gaming, news etc. and goal of the organization owing the
website.

It is normally an entry point or gateway for It is often the final destination to access
using the offered web-services. and use the provided specific information.

Generally linked to many other websites that A website is generally linked to its own
provide these web-services. webpages.

A complete environment for managing and Caters to or delivers one specific type of
integrating a large no of diverse applications. application or content as per the goal of
the website.

Examples: Google, Yahoo, Rediff, MSN, Examples: edupillar.com,


AOL etc. cbseacademic.in, ncert.nic.in etc.

8. What are the components of a website?

A Following are the components of a website:


● Webhost – Hosting is where a website is physically located.
● Address – This is the address of the website (also called URL of the website).
● Homepage –It is the first web page that appears when viewers go to a website.
● Design – It is the overall look and feel the website has like navigation menus,
graphics, layout etc.
● Content – All the webpages contained in the website together make up the content
of the website.
● The Navigation Structure – The navigation structure of a website is the order of
the pages, the collection of what links to what.

9. What are the components of a webpage?

A Components of a web page are:


1. Content wise - Content wise the components of a webpage are: Hypertext and
Hyperlinks.
● Hypertext refers to a digital text, which include information in various
media formats such as: text, graphics, sound, images, video, and hyperlinks.
● Hyperlinks refers to a link from a hypertext file to another such file.
2. Structure wise – Structure wise the components of a web page are:
● Page Title
● Header
● Body of the web page
● Navigational Links
● Footer

10. The first page on a website that allows you to navigate to other page via menu system
or links, is known as
1. Front page
2. Home page
3. Main page
4. Primary page
5. First page

A Home page
11 What is blogging? What are its advantages and disadvantages?

A Blog is a kind of website where on-line journal entries are posted. A person who writes
and maintains a blog is called blogger and art of writing a blog is called blogging.

Advantages Disadvantages
Enables you to write down your thoughts on Whatever you publish is available for
anything that interests you. everyone to see.
Easy to set up; don’t need much technical Personal blogs may be biased or contain
knowledge. inaccurate information.
Easy and quick to update or add new posts. Blogs can be time-consuming. Finding time
to write regular updates can become a
chore.
People can leave comments on your blog. People may leave rude or inappropriate
comments.
If you want to read other people’s blogs There are many very dull blogs around. You
there are literally millions to choose from. may have to look at many before you find
some worth reading.

12 What is a URL? What are its components? Exemplify.

A URL – A location on a net server is called a URL (Uniform Resource Locator).


URL look like this:
type://address/path
Ex: http://encycle.msn.com/getinfo/style.asp
A file’s Internet address or URL is determined by the following:
● Type: The type of server or protocol(http)
● Address: The name/address of the server on the Internet (encycle.msn.com)
● Path: The location of the file on the server (encycle.msn.com/getinfo/style.asp)

13 What do you understand by protocols? What roles do various protocols play on


Internet?
A A protocol is a set of rules governing an operation or application.

Server Protocol Information It Provides


ftp File Transfer Protocol Text and binary files that are organized in a
hierarchical structure, much like a family
tree.
gopher Transfer Control Text and binary files that are organized in a
Protocol/Internet Protocol menu structure.
(TCP/IP)
http Hypertext Transfer Protocol Hypertext/hypermedia files (i.e. multimedia
documents that contain links to images,
sounds, or other multimedia documents on
the World Wide Web).
Mail • Post Office Protocol (POP- Messages sent via electronic mail.
receiving)
• Simple Mail Transfer
Protocol(SMTP-sending)
News Network News Transfer Newsgroups that are organized in a
Protocol (NNTP) hierarchical structure.

Type B: Application Oriented Questions

1. PJM Bank has a Head Office based in Bangalore and a large number of branches
nationwide. The Head Office and branches communicate using Internet.

Give two features of Internet.

A i. Internet helps to share information and various resources such as powerful


supercomputers and database.
ii. Internet also helps to effectively and inexpensively communicate with each
other.

3. Simon has a villa, which he rents to holiday makers. He creates a website to advertise
the villa. Simon chose an ISP to host his website.
The structure of his website is shown below
a. State what Simon should have on his home page to help users navigate his website.

A Simon should have hyperlink for photos, Price and Map on his home page to help users
navigate his website.

b. Simon uploads his website files to the ISP computer.

i State what ISP means.

A An Internet Service Provider (ISP) is a company that provides Internet access to users.

ii. Name the Internet service that Simon uses to upload his website files.

A FTP file Transfer Protocol is used to upload his website files.

iii. Name the type of data transmission that takes place when his files are transferred to
the host computer from Simon’s computer.

A FTP is often secured with SSL/TLS (FTPS)

c. The URL for the web page which has a map is:
http://www. Indiaisp.co.in/simonsvilla/map.html

i. State the domain name for this web page.

A www. indiaisp.co.in is the domain name for the web page.

ii. Describe the function of the Domain Name Service.

A DNS is character-based naming system by which servers are identified.

d. Simon registers details of his website with a search engine company.


State one reason why this will benefit Simon.

A Registering the website with a search engine company helps to list the website when user
enters keyword related to the website.
Chapter - 3 HTML-I Basic HTML Elements

Type A: Theoretical Questions

7. What is the basic structure of HTML file?

A The basic structure of HTML file is as follows


<HTML>
<HEAD>
<TITLE>……..</TITLE>
</HEAD>
<BODY>……………</BODY>
</HTML>

16. The default alignment of text is________default text color is ______and the default
background color is______

A The default alignment of text is left, default text color is black and the default background
color is white.

18. What is wrong in the following coding?


(i) <FONT name = “Arial”, type = “Bold” size = 3>
(ii) <Body Margin Top = 60 Left = 75>
Text with changed margin
</Body>
(iii) <HTML>
<HEAD>
<TITLE> New Page
</HEAD>
</TITLE>
</HTML>

A Correction:
(i) <FONT FACE = “Arial” size = 3>
<B>…….</B>
</FONT>
(ii) <Body TOPMARGIN= 60 LEFTMARGIN = 75>
Text with changed margin
</Body>
(iii) <HTML>
<HEAD>
<TITLE> New Page </TITLE>
</HEAD>
</HTML>

20. Differentiate between container and empty tags.

A Container Elements Empty Elements


1 Container elements are those which Empty elements are those that require only
require both opening and closing tag. opening tag and do not require a closing
tag.
2 Example: <BODY>…..</BODY>, Example: <BR>, <HR>, <IMG>
<FONT>..</FONT>

21. Differentiate between <BR> and <P> tag.

A <BR> <P>
1 <BR> tag is used to simply end one line <P> tag is used to end a line and show
and jump to the next line. blank line before beginning anything else.
2 It is an empty element. It is a container element.

22. List and define different types of heading tags.

A HTML has six levels of headings numbered 1 through 6, with 1 being the largest and 6
smallest.
i.e <Hn> .. </Hn> where n can take value from 1 to 6.

24. What is the difference between <basefont> and <font> tag?

A The <BASEFONT> tag is used to define basic font size for the HTML page. Once set, this
font size is applicable to all the text following it, for which no other size is specified.
The <FONT> tag on the other hand lets one define size, style and color of a short segment
of text. Once </FONT> is reached the following text is rendered in default font size set by
<BASEFONT>.

25. How can a 2D or 3D horizontal rule be displayed?

A By default, horizontal rule appear as 3D rule i.e. <HR size=5>


To have a flat 2D rule, noshade is added to <HR> tag. i.e. <HR size=5noshade>

26. What are Physical and Logical text styles?

A The Logical text styles render the text according to its meaning.
Example: <DFN>, <EM>, <CITE>, <KBD>
The Physical text styles are handled identically by all browsers.
Example: <B>, <I>, <TT>, <U> etc.

34. Differentiate between ordered and unordered lists.

A Ordered List Unordered List


1 The <OL> tag is used for defining The <UL> tag is used to define unordered
ordered list. In this list, a number or list. In this lists a special bullet symbol
letter appears in front of every list item. appears in front of every list item.
2 Example: Example:
<OL type=”A/a/I/i/1” start = value> <UL type = “square/disc/circle”>
…………. ……………
</OL> </UL>

36. Which three tags let you create the definition lists?

A <DL> - Definition List


<DT> - Definition Term
<DD> - Definition Description

Type B: Application Oriented Questions

2. Consider the following web page:


(a) The text at P is
(i) a web address
(ii) a postal address
(iii) an email address
(iv) an office address
(b) To follow a link to find information, the user should click at
(i) P
(ii) R
(iii) S
(iv) T
(c) The alignment of text at T is
(i) Left
(ii) right
(iii) center
(iv) same as alignment of pointer S
(d) The text at S provides a way to contact Ski Breaks Ltd using
(i) fax
(ii) post
(iii) email
(iv) telephone
(e) To use the Internet to find more websites about winter sports, the user should
use
(i) a book
(ii) an email
(iii) a CD ROM
(iv) a search engine

A Correct answer:
(a) (i) a web address
(b) (ii) R
(c) (i) Left
(d) (iii) e-mail
(e) (iv) a search engine
Type C: Unsolved Examination Questions

3. Write the extension of HTML code file.

A .html or .htm is the extension of html file.

10. What are comments in HTML? How are comments inserted in HTML code? Explain
with example.

A Comments are visible to anyone who view the page source code (HTML File), but are not
rendered when the HTML document is rendered by a browser.
Comments can be inserted
Using symbol as shown below,
<!-- Hello -->

22. Expand the following tags used in HTML:


(i) <LI> (ii) <VLINK> (iii) <HR> (iv) <P>

A (i) <LI> - List Item


(ii) <VLINK> - Visited Link
(iii)<HR> - Horizontal rule
(iv) <P> - Paragraph

23. Identify which of the following is a tag or an attribute:


i. Border ii. img iii. Alt iv. Src v. href

A i. Border – attribute ii. img - tag iii. alt - attribute


iv. src – attribute v. href - attribute

You might also like