Computer worksheet
Computer worksheet
REVISION
COMPUTER LITERACY
Ans <form>
<label for="salutation">Salutation:</label>
<select id="salutation">
<option value="">--None--</option>
</select><br><br>
<label for="firstName">First name:</label>
<input type="text" id="firstName"><br><br>
<label>Gender:</label>
<input type="radio" id="male" name="gender" value="male">
<label for="male">Male</label>
<input type="radio" id="female" name="gender" value="female">
<label for="female">Female</label><br><br>
<label for="email">Email:</label>
<input type="email" id="email"><br><br>
<label for="address">Address:</label><br>
<textarea id="address" rows="4" cols="50"></textarea><br><br>
Ans<!DOCTYPE html>
<html>
<head>
<title>News Page</title>
</head>
<body>
<h1>TREATING NEWS</h1>
<h2>INCOMING EVENTS</h2>
<h2>CONTACT</h2>
<p>Transport Chew: Grandmaster</p>
<p>Acquired by some first member and I’ll show Althompson Mobile has
become the smallest a program editor. Grandmaster (HMS) 14 years has dated
O4 across its proven corporate life-longer, the support of the European Union
of Hungary Airlines – working out what he created it for US!</p>
<h2>TRENDING</h2>
<ul>
<li>Bacteria to stop Dengue</li>
<li>Geological activity on Venus</li>
<li>The Fifth Ocean on Earth</li>
</ul>
</body>
</html>
Q4. Write the code to get the following output: -
INTERNET WORLD
ISP IN INDIA
1. MTNL
2. BSNL
3. EXCITEL
4. JIO
5. AIRTEL
USES OF INTERNET
Access to information
Communication
Business
Shopping
Education
Entertainment
Ans<h1>INTERNET WORLD</h1>
<h2>ISP IN INDIA</h2>
<ol>
<li>MTNL</li>
<li>BSNL</li>
<li>EXCITEL</li>
<li>JIO</li>
<li>AIRTEL</li>
</ol>
<h2>USES OF INTERNET</h2>
<ul>
<li>Access to information</li>
<li>Communication</li>
<li>Business</li>
<li>Shopping</li>
<li>Education</li>
<li>Entertainment</li>
</ul>
b) Defines a hyperlink
c) Deletes a hyperlink
d) Accuses a hyperlink
Q11. How can you make a numbered list?
a) <ol>
b) <list>
c) <ul>
d) <dl>
Q12. How can you make a bulleted list?
a) <dl>
b) <ul>
c) <ol>
d) <list>
Q13. What is the correct HTML tag for making a drop-down list?
a) <list>
b) <select>
c) <input type = “list”>
d) <input type= “dropdown”>
Q14. html documents have the extension ______________.
Ans .html
Q15. __________ tag is used to display the list of items in the numbered list.
Ans <ol>
Q16. Which tag is used to make a text bold?
<strong>
<bold>
<b>
<em>
Q17. What is the purpose of the HTML <head> element?
a) It holds the primary navigation links
b) It defines the main content of the web page
c) It specifies the page's title, character encoding, and other meta
information
d) It creates a visible header on the webpage
Q18. Which HTML attribute specifies the base URL/target for all relative URLs in
a document?
a) target
b) href
c) base
d) url
Q 19. Which attribute is used to define the alternative text for an image,
providing text for screen readers and in case the image cannot be displayed?
a) title
b) alt
c) description
d) src
Q 20. What is the purpose of the HTML <a> element's "target" attribute?
a) It specifies the destination of the hyperlink
b) It defines the text colour of the link
c) It controls the font size of the link text
d) It decides how the link should be displayed (e.g., in a new window or the
same window)
Q 21. HTML tags are enclosed in
a) curly brackets
b) square brackets
c) double quotes
d) angular brackets
Q22. Which sequence of HTML tags is correct?
a) <html><head></head><body></body></html>
b) <html><head><body></body></head></html>
c) <html><head></body></body></head></html>
d) <html><<head></head></body></body></html>
Q 23. In an ordered list, each item cannot be preceded with
1. Alphabets
2. Arabic numbers
3. Roman numerals
4. Bullets
Q 24. Which character is used to represent the closing of a tag in HTML?
a) \
b) !
c) /
d) .
Q 25. Which of the following element is responsible for making the text italic in
HTML?
a) <i>
b) <italic>
c) <it>
d) <pre>
Q 26. Match the terms to their correct definitions:
1. Virus D a. A type of software designed to harm or
exploit any programmable device or
network.
Q 27. What are the several types of cyber security threats? Write their names.
1.Phishing
2.Malware
3.Ransomware
4.Man in the middle attack
5.Password Attack
Q 28. Write the examples of the following:
1. Phishing – Fake emails pretending to be from a bank asking for login details.
2. Man-in-the-Middle (MitM) attack – Intercepting Communication between 2
parties.
3. Malware – Trojan horse, Ransomware, Spyware
4. Virus Scan/Anti – Virus - Norton, McAfee, Avast
5. Password Attack – Brute force attack, dictionary attack
a) <table>
b) <tab>
c)<grid>
d)<data−table>