Class 10... · (c) The _____ tag provides additional information including title, scripts used,...
Transcript of Class 10... · (c) The _____ tag provides additional information including title, scripts used,...
[P.T.O.
�
�
�
�
�
��������������������
� ����� � ���� ����� ���� � ���
�
��������������� ������� ����������������������
����������
�� Fill in the blanks : 5
(a) In XML an element which has no content is termed as ____.
(b) A tag that requires an opening as well as a closing tag is
called a _______ tag.
(c) The _______ tag provides additional information including
title, scripts used, etc. about a webpage.
• Please check that this question paper contains �� printed pages.
• Code number given on the right hand side of the question paper should be
written on the title page of the answer+book by the candidate.
• Please check that this question paper contains � questions.
• � �!"��#$����%�#���&����$�! �'()�$��*��&��+'�"�����)�*�$��!���(,���-�
���
• 15 minute time has been allotted to read this question paper. The question
paper will be distributed at 10.15 a.m. From 10.15 a.m. to 10.30 a.m., the
students will read the question paper only and will not write any answer on
the answer+book during this period.
Candidates must write the Code on
the title page of the answer�book.�
�����������
� ��Code No.�
Roll No.
������
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
53/1 2
(d) _____ tag make a numbered list.
(e) ______ tag is used for inserting a background image.
(f) For displaying coloured text _______ tag is used.
(g) Any software designed to harm the computer, or disturb its
normal operations is known as _______ .
(h) You can make use of an ______ software to detect the
presence of virus.
(i) Quick heal is a type of ________.
(j) _____ is a tricky application that appears to be legitimate
and useful at first glance.
�
�� State True or False : 5�
� (a) An attribute defines a property of the element.
(b) XML elements can be defined as building blocks of an
XML.
(c) HTML tags tell a web browser how to render a web page.
(d) SRC attribute specifies an alternate text for an image, if the
image cannot be displayed.
(e) A hyperlink apply to text only.
(f) <th> tags always need to come at the start of a column.
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
53/1 [P.T.O. 3
(g) Unsolicited email attachments should not be opened as they
can be dangerous.
(h) Always use a same password for each website you log in to.
(i) Avoid pirated software as they are a security risk.
(j) Spyware is type of malicious program.
�
.� Short Answer Questions :
(a) What is the difference between cellspacing and cellpadding
attribute ? 2
(b) Write any two precautions to avoid spam. 2
(c) Write the HTML code to display image with red border. 2
(d) Write the full forms of :
(i) WWW
(ii) FTP
(iii) LI
(iv) HR 2
(e) Internet is a series of interconnected computers throughout
the world. 2
(i) Name any one of the services that is offered on
internet.
(ii) Name any one of the internet service provider.
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
53/1 4
(f) Mr. Gupta is a farmer who is using internet to improve his
crop production. He uses a search engine to collect the
information. 2
(i) Explain what is a search engine.
(ii) Give example of search engine.
�
/� Short Answer Questions : �
� (a) Draw the XML tree for the following code : 5
<Building>
<Furniture>
<Wooden>24</Wooden>
<Plastic>50</Plastic>
</Furniture>
<Furniture>
<Wooden>24</Wooden>
<Plastic>50</Plastic>
</Furniture>
</Building>
(b) Observe the following table and write the HTML code to
generate it : 5
�� '(���� �� '(���� �� '(��.�
Row 1 Cell 1 Row 1 Cell 2 Row 1 Cell 3
Row 2 Cell 2 Row 2 Cell 3
Row 3 Cell 1
(c) What is the meaning of backup and why is it essential ?
Name any four devices to take data backup. 5
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
53/1 [P.T.O. 5
(d) Identify which of the following is a tag or an attribute : 3
(i) Img
(ii) A
(iii) Align
(iv) Color
(v) Font
(vi) Noshade
(e) Sunila works in a MNC and works online from home also.
She needs a fast internet connection. Which type of internet
connection is best suited for her ? Also she needs to upload
and download the files from remote sites. Which proocol
will help her to perform this activity ? 2
0� Long Answer Question : 10�
� Observe the following output and write HTML code to generate it :
�,1!�2!3!$�
� ���'$��&�,,��-���%"�������%�$� ������*�
Availability of all possible leading brands. Guarantee of quality and price. Free home delivery.
We provide the following category of products.
1. Clothing & Accessories
♦ Men
♦ Women
♦ Kids
2. Household Appliances
3. Grocery
Shop Timings : 10.00 am to 8.00 pm
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
53/1 6
Consider the following points while generating the web page :
• The title of the page is “Shopping”
• The heading is in red colour
• Text colour is maroon
• Font of entire document is Arial
• Image used is “bazar.jpg”
• The pages linked are :
♦ Clothing & Accessories to cloth.html
♦ Household Appliances to “house.html”
♦ Grocery to “grocery.html”
• Bottom message is of size 2
��������2�
�� Multiple Choice Questions (Choose most appropriate option) : 18
(i) Is it easier to process XML than HTML ?
(a) Yes
(b) No
(c) Sometimes
(d) Can’t say
(ii) Well formed XML document means
(a) It contains a root element
(b) It contain an element
(c) It contains one or more elements
(d) Must contain one or more elements and root element
must contain all other elements
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
53/1 [P.T.O. 7
(iii) Which of the following strings are a correct XML name ?
(a) myElement
(b) my Element
(c) #myElement
(d) None of the above
(iv) XML uses the features of
(a) HTML
(b) XHTML
(c) VML
(d) SGML
(v) How can we make attributes have multiple values :
(a) <myElement myAttribute="value1 value2"/>
(b) <myElement myAttribute="value1" myAttribute="value2"/>
(c) <myElement myAttribute="value1, value2"/>
(d) attributes cannot have multiple values
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
53/1 8
(vi) The use of a DTD in XML development is :
(a) required when validating XML documents
(b) no longer necessary after the XML editor has been
customized
(c) used to direct conversion using an XSLT processor
(d) a good guide to populating a templates to be filled in
when generating an XML document automatically
(vii) <b> tag makes the enclosed text bold. What is other tag to
make text bold ?
(a) <strong>
(b) <dar>
(c) <black>
(d) <emp>
(viii) Which tag allows you to add a row in a table ?
(a) <td> and </td>
(b) <cr> and </cr>
(c) <th> and </th>
(d) <tr> and </tr>
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
53/1 [P.T.O. 9
(ix) What is the correct HTML tag for adding a background color ?
(a) <body color="yellow">
(b) <body bgcolor="yellow">
(c) <background>yellow</background>
(d) <body background="yellow">
(x) Choose the correct HTML tag for the smallest size heading ?
(a) <heading>
(b) <h6>
(c) <h1>
(d) <head>
(xi) What is the correct HTML tag for inserting a line break ?
(a) <br>
(b) <lb>
(c) <break>
(d) <newline>
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
53/1 10
(xii) Which of the following is not a pair tag ?
(a) <p>
(b) < u >
(c) <i>
(d) <img>
(xiii) To create HTML document you require a
(a) Web page editing software
(b) High powered computer
(c) Just a notepad can be used
(d) None of the above
(xiv) HTML documents are saved in
(a) Special binary format
(b) Machine language codes
(c) ASCII text
(d) None of the above
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
53/1 [P.T.O. 11
(xv) What have caused the rise in computer crimes and new
methods of committing old computer crimes ?
(a) Increased use of computer and expansion of the
internet and its services.
(b) New security methods of detecting computer crimes.
(c) Creation of new software.
(d) World wide web.
(xvi) What is a worm ?
(a) A weakness in security system that never copies itself
into a computer’s memory until no more space is left.
(b) A program that uses computer networks and security
holes to copy itself in the computer memory until no
more memory is left.
(c) Attaches itself to e+mails.
(d) Corrupts or replaces boot sector instructions.
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
53/1 12
(xvii) How are viruses spread ?
(a) Through firewalls
(b) Downloading infected programs and files from
internet
(c) Garbled information
(d) Install anti+virus
(xviii) How do users prevent and protect themselves against
viruses ?
(a) Do not open e+mail attachments, use an OS that has
virus security features, scan other users’ media storage
devices before using them on your computer.
(b) Missing files or folders should be deleted.
(c) Files with weird and obscene messages should not be
stored.
(d) Delete unwanted SPAM from your computer.
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)
Delhi Marking Scheme Important Note: ● All answers provided in the Marking scheme are SUGGESTIVE. ● Examiners are requested to accept all possible alternative correct answer(s). ● Wherever HTML Tags are asked – ignore the format/additional arguments if so given in the
answer(s) ● Wherever multiple answers are suggested, they are in order of appropriateness
SUMMATIVE ASSESSMENT - II FOUNDATION OF INFORMATION TECHNOLOGY
SECTION A
Q1. Fill in the blanks : (½ Mark for writing each correct answer)
5
(a) In XML an element which has no content is termed as __________
Ans. Empty (b) A tag that requires an opening as well as a closing tag is called a________ tag.
Ans. Container (c) The_________tag provides additional information including title, scripts used,
etc. about a webpage.
Ans. Head (d) ____________tag make a numbered list. Ans. OL (e) ____________tag is used for inserting a background image. Ans. BODY (f) For displaying coloured text_____________ tag is used. Ans. FONT OR BODY (g) Any software designed to harm the computer, or disturb its normal operations is
known as____________________
Ans. MALWARE OR VIRUS OR Spyware OR any other correct answer (h) You can make use of an__________ software to detect the presence of virus. Ans. ANTIVIRUS (i) Quick heal is a type of____________ Ans. ANTIVIRUS (j) ________is a tricky application that appears to be legitimate and useful at first
glance.
Ans. TROJAN HORSE
Q2. State True or False: (½ Mark for writing each correct option)
5
(a) An attribute defines a property of the element. Ans. True (b) XML elements can be defined as building blocks of an XML. Ans. True (c) HTML tags tell a web browser how to render a web page.
Ans. True (d) SRC attribute specifies an alternate text for an image, if the image cannot be
displayed.
Ans. False
1/9
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)
Delhi Marking Scheme (e) A hyperlink apply to text only. Ans. False (f) <th> tags always need to come at the start of a column. Ans. False (g) Unsolicited email attachments should not be opened as they can be dangerous. Ans. True (h) Always use a same password for each website you log in to. Ans. False (i) Avoid pirated software as they are a security risk. Ans. True (j) Spyware is type of malicious program. Ans. True
Q3. Short Answer Questions: (a) What is the difference between cellspacing and cellpadding attribute ? 2 Ans. Cellspacing Set the space between the cells
Cellpadding sets the space between cell wall and its content (1 mark for each correct answer)
(b) Write any two precautions to avoid spam. 2 Ans. ● Never click on links that come from unknown sources.
● Never, ever reply to a spam message. ● Don't forward an email from someone you don't know to a list of people. ● Use a spam filter. OR, any other correct precautions (1 Mark each for any two correct precautions)
(c) Write the HTML code to display image with red border. 2 Ans. <img src=”b.jpg” border=1 bordercolor=red>
(1 mark for IMG Tag) ( 1 mark for border attribute) Note: Ignore the bordercolor attribute
(d) Write the full forms of : (i) WWW (ii) FTP (iii) LI (iv) HR
2
Ans. (i) WWW - World Wide Web (ii) FTP - File Transfer Protocol (iii) LI - List Item (iv) HR - Horizontal Rule OR Horizontal Ruler (½ mark for each correct full form)
(e) Internet is a series of interconnected computers throughout the world. (i) Name any one of the services that is offered on internet. (ii) Name any one of the internet service provider.
2
2/9
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)
Delhi Marking Scheme Ans. (i) eCommerce, eBusiness, eMail, WebBrowsing, eLearning, eGovernance or any
other correct service (ii) BSNL, MTNL, Airtel, Vodafone, Idea Cellular, Reliance Communications, Aircel, Tata Teleservices, Telenor India, Videocon, Atria Convergence Technologies or any other correct service provider name (1 mark for any one correct service) (1 mark for any one correct ISP name)
(f) Mr. Gupta is a farmer who is using internet to improve his crop production. He uses a search engine to collect the information. (i) Explain what is a search engine. (ii) Give example of search engine.
2
Ans. Search engine is web based program that searches for and identifies items in a database that corresponds to keywords or characters specified by user. Google, Bing, Yahoo, Baidu, AOL, ASK, Escite, DuckDuckGo, WolframAlpha, Yandex, Lycos, chacha or any other correct name of search engine (1 mark for any correct definition/explanation of search engine) (1 mark for any one correct example of search engine)
Q4. Short Answer Questions: (a) Draw the XML tree for the following code:
<Building> <Furniture> <Wooden>24</Wooden> <Plastic>50</Plastic> </Furniture> <Furniture> <Wooden>24</Wooden> <Plastic>50</Plastic> </Furniture> </Building>
5
Ans.
OR
Any other similar representation for Tree
(1 mark for Root Element Building) (1 mark for Furniture) (1½ mark each for Elements Wooden (24), Plastic (50) under Furniture)
3/9
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)
Delhi Marking Scheme (b) Observe the following table and write the HTML code to generate it.
5
Ans. <TABLE> <TR> <TH>Column 1</TH> <TH>Column 2</TH> <TH>Column 3</TH> </TR> <TR> <TD ROWSPAN=2>Row 1 Cell 1</TD> <TD>Row 1 Cell 2</TD> <TD>Row 1 Cell 3</TD> </TR> <TR> <TD>Row 2 Cell 2</TD> <TD>Row 2 Cell 3</TD> </TR> <TR> <TD COLSPAN=3>Row3 Cell 1</TD> </TR> </TABLE> (1 mark for <table> </table>) (1 mark for all correct <tr> </tr>) (1 mark for all correct <td> with correct values) (½ mark for all correct rowspan = “...”) (½ mark for all correct colspan = “...”) (1 mark for correct nesting of all <tr></tr> and <td> </td> tags)
(c) What is the meaning of backup and why is it essential ? Name any four devices to take data backup.
5
Ans. Backup refers to Copying and Archieving data/information into an external permanent storage. It is essential as we can restore original data in case of loss or accidental damage of data. HARD DISK, CD, DVD, Pen Drive, SD Card, Magnetic Tapes, Cloud, Google Cloud
(½ Mark for correct definition/explanation of Backup) (½ Mark for correct explanation of Backup as a essential process) (1 Mark each for any four correct backup devices)
(d) Identify which of the following is a tag or an attribute : (i) Img (ii) A (iii) Align (iv) Color (v) Font (vi) Noshade
3
4/9
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)
Delhi Marking Scheme Ans. (i) Img - TAG
(ii) A - TAG (iii) Align - Attribute (iv) Color - Attribute (v) Font - TAG (vi) Noshade - Attribute (½ Mark for each correct identification as TAG/Attribute)
(e) Sunila works in a MNC and works online from home also. She needs a fast internet connection. Which type of internet connection is best suited for her ? Also she needs to upload and download the files from remote sites. Which protocol will help her to perform this activity ?
2
Ans. DSL OR Broadband OR WiFi FTP (1 Mark for each correct answer)
Q5. Long Answer Question: (a) Observe the following output and write HTML code to generate it:
Consider the following points while generating the web page : • The title of the page is "Shopping" • The heading is in red colour • Text colour is maroon • Font of entire document is Arial • Image used is "bazar.jpg" • The pages linked are : ♦ Clothing & Accessories to cloth.html ♦ Household Appliances to "house.html" ♦ Grocery to "grocery.html" • Bottom message is of size
10
Ans. <html> <hesd> <title>Shopping</title> </hesd> <body text="maroon"> <font face="Arial">
5/9
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)
Delhi Marking Scheme
<h2> <center><font color=red>e-SHOPPING</font></center> </h2> <h2> <center>All Your Shopping Needs Met With Mouse Click </center> </h2> <p>Availability of all possible leading brands. Guarantee of quality and price. Free home delivery. <center><img src=images.jpeg></center> <p>We provide the following category of products. <ol> <li> <a href=”cloth.html”>Clothing & Accessories</a> <ul type=square> <li>Men <li>Women <li>Kids </ul> <li><a href=”house.html”>Household Appliances</a> <li><a href=”grocery.html”>Grocery</a> </ol> <hr> <p> <center> <font size=2>Shop Timings: 10am to 8.00 pm</font> </center> </p> </font> </body> </html> (1 Mark for the title of the page as "Shopping" ) (1 Mark for the heading in red colour ) (1 Mark for Text colour as maroon ) (1 Mark for the Font of the entire document as Arial ) (1 Mark for the Image used as "images.jpg" ) (1 Mark for linking Clothing & Accessories to "cloth.html" ) (1 Mark for linking Household Appliances to ''house.html'' ) (1 Mark for linking Grocery to "grocery .html" ) (1 Mark for Bottom message of size 2 ) (½ Mark for correct Ordered list) (½ Mark for correct Unordered list)
NOTE: ● Mark not to be deducted for not using the <hr> tag before the bottom
message ● Mark not to be deducted for writing any extra tags which are not
needed
6/9
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)
Delhi Marking Scheme Q6 Section B
Multiple Choice Questions (Choose most appropriate option): (1 Mark for choosing each correct option)
18
(i) Is it easier to process XML than HTML ? (a) Yes (b) No (c) Sometimes (d) Can't say
Ans. (a) Yes
(ii) Well formed XML document means (a) It contains a root element (b) It contain an element (c) It contains one or more elements (d) Must contain one or more elements and root element must contain all other elements
Ans. (d) Must contain one or more elements and root element must contain all other elements
(iii) Which of the following strings are a correct XML name ? (a) myElement (b) my Element (c) #myElement (d) None of the above
Ans. (a) myElement
(iv) XML uses the features of (a) HTML (b) XHTML (c) VML (d) SGML
Ans. (d) SGML
(v) How can we make attributes have multiple values : (a) <myElement myAttribute="valuel value2"/> (b) <myElement myAttribute="value 1 " myAttribute="value2"/> (c) <myElement myAttribute="valuel, value2"/> (d) attributes cannot have multiple values
Ans. (d) attributes cannot have multiple values
. (vi) The use of a DTD in XML development is : (a) required when validating XML documents (b) no longer necessary after the XML editor has been customized (c) used to direct conversion using an XSLT processor (d) a good guide to populating a templates to be filled in when generating an XML document automatically
Ans. (a) required when validating XML documents
7/9
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)
Delhi Marking Scheme (vii) <b> tag makes the enclosed text bold. What is other tag to make text bold ?
(a) <strong> (b) <dar> (c) <black> (d) <emp>
Ans. (a) <strong>
(viii) Which tag allows you to add a row in a table? (a) <td> and </td> (b) <cr> and </cr> (c) <th> and </th> (d) <tr> and </tr>
Ans. (d) <tr> and </tr>
(ix) What is the correct HTML tag for adding a background color? (a) <body color="yellow"> (b) <body bgcolor="yellow"> (c) <background>yellow</background> (d) <body background="yellow">
Ans. (b) <body bgcolor="yellow">
(x) Choose the correct HTML tag for the smallest size heading ? (a) <heading> (b) <h6> (c) <h1> (d) <head>
Ans. (b) <h6>
(xi) What is the correct HTML tag for inserting a line break ? (a) <br> (b) <lb> (c) <break> (d) <newline>
Ans (a) <br>
(xii) Which of the following is not a pair tag ? (a) <p> (b) <u> (c) <i> (d) <img>
Ans. (d) <img>
(xiii) To create HTML document you require a (a) Web page editing software (b) High powered computer (c) Just a notepad can be used (d) None of the above
Ans. (c) Just a notepad can be used
8/9
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)
Delhi Marking Scheme (xiv) HTML documents are saved in
(a) Special binary format (b) Machine language codes (c) ASCII text (d) None of the above
Ans. (c) ASCII text
(xv) What have caused the rise in computer crimes and new methods of committing old computer crimes ? (a) Increased use of computer and expansion of the internet and its services. (b) New security methods of detecting computer crimes. (c) Creation of new software. (d) World wide web.
Ans. (a) Increased use of computer and expansion of the internet and its services.
(xvi) What is a worm? (a) A weakness in security system that never copies itself into a computer's memory until no more space is left. (b) A program that uses computer networks and security holes to copy itself in the computer memory until no more memory is left. (c) Attaches itself to e-mails. (d) Corrupts or replaces boot sector instructions.
Ans. (b) A program that uses computer networks and security holes to copy itself in the computer memory until no more memory is left.
(xvii) How are viruses spread ? (a) Through firewalls (b) Downloading infected programs and files from internet (c) Garbled information (d) Install anti-virus
Ans. (b) Downloading infected programs and files from internet
(xviii) How do users prevent and protect themselves against viruses ? (a) Do not open e-mail attachments, use an OS that has virus security features, scan other users' media storage devices before using them on your computer. (b) Missing files or folders should be deleted. (c) Files with weird and obscene messages should not be stored. (d) Delete unwanted SPAM from your computer.
Ans. (a) Do not open e-mail attachments, use an OS that has virus security features, scan other users' media storage devices before using them on your computer.
9/9
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com