Class 10... · (c) The _____ tag provides additional information including title, scripts used,...

21
[P.T.O. Fill in the blanks : 5 (a) In XML an element which has no content is termed as ____. (b) A tag that requires an opening as well as a closing tag is called a _______ tag. (c) The _______ tag provides additional information including title, scripts used, etc. about a webpage. Please check that this question paper contains printed pages. Code number given on the right hand side of the question paper should be written on the title page of the answer+book by the candidate. Please check that this question paper contains questions. !" #$ %# & $! ’()$ * & +’" )*$ !(,- 15 minute time has been allotted to read this question paper. The question paper will be distributed at 10.15 a.m. From 10.15 a.m. to 10.30 a.m., the students will read the question paper only and will not write any answer on the answer+book during this period. Candidates must write the Code on the title page of the answerbook. Code No. Roll No. Downloaded from www.studiestoday.com Downloaded from www.studiestoday.com

Transcript of Class 10... · (c) The _____ tag provides additional information including title, scripts used,...

Page 1: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

[P.T.O.

��������������������

� ����� � ���� ����� ���� � ���

��������������� ������� ����������������������

����������

�� Fill in the blanks : 5

(a) In XML an element which has no content is termed as ____.

(b) A tag that requires an opening as well as a closing tag is

called a _______ tag.

(c) The _______ tag provides additional information including

title, scripts used, etc. about a webpage.

• Please check that this question paper contains �� printed pages.

• Code number given on the right hand side of the question paper should be

written on the title page of the answer+book by the candidate.

• Please check that this question paper contains � questions.

• � �!"��#$����%�#���&����$�! �'()�$��*��&��+'�"�����)�*�$��!���(,���-�

���

• 15 minute time has been allotted to read this question paper. The question

paper will be distributed at 10.15 a.m. From 10.15 a.m. to 10.30 a.m., the

students will read the question paper only and will not write any answer on

the answer+book during this period.

Candidates must write the Code on

the title page of the answer�book.�

�����������

� ��Code No.�

Roll No.

������

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 2: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

53/1 2

(d) _____ tag make a numbered list.

(e) ______ tag is used for inserting a background image.

(f) For displaying coloured text _______ tag is used.

(g) Any software designed to harm the computer, or disturb its

normal operations is known as _______ .

(h) You can make use of an ______ software to detect the

presence of virus.

(i) Quick heal is a type of ________.

(j) _____ is a tricky application that appears to be legitimate

and useful at first glance.

�� State True or False : 5�

� (a) An attribute defines a property of the element.

(b) XML elements can be defined as building blocks of an

XML.

(c) HTML tags tell a web browser how to render a web page.

(d) SRC attribute specifies an alternate text for an image, if the

image cannot be displayed.

(e) A hyperlink apply to text only.

(f) <th> tags always need to come at the start of a column.

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 3: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

53/1 [P.T.O. 3

(g) Unsolicited email attachments should not be opened as they

can be dangerous.

(h) Always use a same password for each website you log in to.

(i) Avoid pirated software as they are a security risk.

(j) Spyware is type of malicious program.

.� Short Answer Questions :

(a) What is the difference between cellspacing and cellpadding

attribute ? 2

(b) Write any two precautions to avoid spam. 2

(c) Write the HTML code to display image with red border. 2

(d) Write the full forms of :

(i) WWW

(ii) FTP

(iii) LI

(iv) HR 2

(e) Internet is a series of interconnected computers throughout

the world. 2

(i) Name any one of the services that is offered on

internet.

(ii) Name any one of the internet service provider.

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 4: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

53/1 4

(f) Mr. Gupta is a farmer who is using internet to improve his

crop production. He uses a search engine to collect the

information. 2

(i) Explain what is a search engine.

(ii) Give example of search engine.

/� Short Answer Questions : �

� (a) Draw the XML tree for the following code : 5

<Building>

<Furniture>

<Wooden>24</Wooden>

<Plastic>50</Plastic>

</Furniture>

<Furniture>

<Wooden>24</Wooden>

<Plastic>50</Plastic>

</Furniture>

</Building>

(b) Observe the following table and write the HTML code to

generate it : 5

�� '(���� �� '(���� �� '(��.�

Row 1 Cell 1 Row 1 Cell 2 Row 1 Cell 3

Row 2 Cell 2 Row 2 Cell 3

Row 3 Cell 1

(c) What is the meaning of backup and why is it essential ?

Name any four devices to take data backup. 5

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 5: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

53/1 [P.T.O. 5

(d) Identify which of the following is a tag or an attribute : 3

(i) Img

(ii) A

(iii) Align

(iv) Color

(v) Font

(vi) Noshade

(e) Sunila works in a MNC and works online from home also.

She needs a fast internet connection. Which type of internet

connection is best suited for her ? Also she needs to upload

and download the files from remote sites. Which proocol

will help her to perform this activity ? 2

0� Long Answer Question : 10�

� Observe the following output and write HTML code to generate it :

�,1!�2!3!$�

� ���'$��&�,,��-���%"�������%�$� ������*�

Availability of all possible leading brands. Guarantee of quality and price. Free home delivery.

We provide the following category of products.

1. Clothing & Accessories

♦ Men

♦ Women

♦ Kids

2. Household Appliances

3. Grocery

Shop Timings : 10.00 am to 8.00 pm

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 6: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

53/1 6

Consider the following points while generating the web page :

• The title of the page is “Shopping”

• The heading is in red colour

• Text colour is maroon

• Font of entire document is Arial

• Image used is “bazar.jpg”

• The pages linked are :

♦ Clothing & Accessories to cloth.html

♦ Household Appliances to “house.html”

♦ Grocery to “grocery.html”

• Bottom message is of size 2

��������2�

�� Multiple Choice Questions (Choose most appropriate option) : 18

(i) Is it easier to process XML than HTML ?

(a) Yes

(b) No

(c) Sometimes

(d) Can’t say

(ii) Well formed XML document means

(a) It contains a root element

(b) It contain an element

(c) It contains one or more elements

(d) Must contain one or more elements and root element

must contain all other elements

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 7: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

53/1 [P.T.O. 7

(iii) Which of the following strings are a correct XML name ?

(a) myElement

(b) my Element

(c) #myElement

(d) None of the above

(iv) XML uses the features of

(a) HTML

(b) XHTML

(c) VML

(d) SGML

(v) How can we make attributes have multiple values :

(a) <myElement myAttribute="value1 value2"/>

(b) <myElement myAttribute="value1" myAttribute="value2"/>

(c) <myElement myAttribute="value1, value2"/>

(d) attributes cannot have multiple values

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 8: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

53/1 8

(vi) The use of a DTD in XML development is :

(a) required when validating XML documents

(b) no longer necessary after the XML editor has been

customized

(c) used to direct conversion using an XSLT processor

(d) a good guide to populating a templates to be filled in

when generating an XML document automatically

(vii) <b> tag makes the enclosed text bold. What is other tag to

make text bold ?

(a) <strong>

(b) <dar>

(c) <black>

(d) <emp>

(viii) Which tag allows you to add a row in a table ?

(a) <td> and </td>

(b) <cr> and </cr>

(c) <th> and </th>

(d) <tr> and </tr>

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 9: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

53/1 [P.T.O. 9

(ix) What is the correct HTML tag for adding a background color ?

(a) <body color="yellow">

(b) <body bgcolor="yellow">

(c) <background>yellow</background>

(d) <body background="yellow">

(x) Choose the correct HTML tag for the smallest size heading ?

(a) <heading>

(b) <h6>

(c) <h1>

(d) <head>

(xi) What is the correct HTML tag for inserting a line break ?

(a) <br>

(b) <lb>

(c) <break>

(d) <newline>

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 10: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

53/1 10

(xii) Which of the following is not a pair tag ?

(a) <p>

(b) < u >

(c) <i>

(d) <img>

(xiii) To create HTML document you require a

(a) Web page editing software

(b) High powered computer

(c) Just a notepad can be used

(d) None of the above

(xiv) HTML documents are saved in

(a) Special binary format

(b) Machine language codes

(c) ASCII text

(d) None of the above

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 11: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

53/1 [P.T.O. 11

(xv) What have caused the rise in computer crimes and new

methods of committing old computer crimes ?

(a) Increased use of computer and expansion of the

internet and its services.

(b) New security methods of detecting computer crimes.

(c) Creation of new software.

(d) World wide web.

(xvi) What is a worm ?

(a) A weakness in security system that never copies itself

into a computer’s memory until no more space is left.

(b) A program that uses computer networks and security

holes to copy itself in the computer memory until no

more memory is left.

(c) Attaches itself to e+mails.

(d) Corrupts or replaces boot sector instructions.

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 12: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

53/1 12

(xvii) How are viruses spread ?

(a) Through firewalls

(b) Downloading infected programs and files from

internet

(c) Garbled information

(d) Install anti+virus

(xviii) How do users prevent and protect themselves against

viruses ?

(a) Do not open e+mail attachments, use an OS that has

virus security features, scan other users’ media storage

devices before using them on your computer.

(b) Missing files or folders should be deleted.

(c) Files with weird and obscene messages should not be

stored.

(d) Delete unwanted SPAM from your computer.

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 13: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)

Delhi Marking Scheme                                                        Important Note:  ● All answers provided in the Marking scheme are SUGGESTIVE.  ● Examiners are requested to accept all possible alternative correct answer(s). ● Wherever HTML Tags are asked – ignore the format/additional arguments if so given in the 

answer(s) ● Wherever multiple answers are suggested, they are in order of appropriateness   

 SUMMATIVE ASSESSMENT - II  FOUNDATION OF INFORMATION TECHNOLOGY 

     SECTION A    

Q1.    Fill in the blanks :  (½ Mark for writing each correct answer) 

  

(a)  In XML an element which has no content is termed as __________   

  Ans.  Empty     (b)  A tag that requires an opening as well as a closing tag is called a________ tag.    

  Ans.  Container     (c)   The_________tag provides additional information including title, scripts used, 

etc. about a webpage.   

  Ans.  Head     (d)  ____________tag make a numbered list.     Ans.  OL     (e)  ____________tag is used for inserting a background image.     Ans.  BODY     (f)  For displaying coloured text_____________ tag is used.     Ans.  FONT OR BODY     (g)  Any software designed to harm the computer, or disturb its normal operations is 

known as____________________    

  Ans.  MALWARE OR VIRUS OR Spyware OR any other correct answer     (h)  You can make use of an__________ software to detect the presence of virus.     Ans.  ANTIVIRUS      (i)  Quick heal is a type of____________     Ans.  ANTIVIRUS      (j)  ________is a tricky application that appears to be legitimate and useful at first 

glance.  

  Ans.  TROJAN HORSE  

 

Q2.    State True or False: (½ Mark for writing each correct option) 

  (a)  An attribute defines a property of the element.     Ans.  True     (b)  XML elements can be defined as building blocks of an XML.     Ans.  True     (c)   HTML tags tell a web browser how to render a web page.   

  Ans.  True     (d)  SRC attribute specifies an alternate text for an image, if the image cannot be 

displayed.  

  Ans.  False   

1/9

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 14: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)

Delhi Marking Scheme   (e)  A hyperlink apply to text only.     Ans.  False     (f)  <th> tags always need to come at the start of a column.      Ans.  False     (g)  Unsolicited email attachments should not be opened as they can be dangerous.     Ans.  True     (h)  Always use a same password for each website you log in to.     Ans.  False     (i)  Avoid pirated software as they are a security risk.     Ans.  True     (j)  Spyware is type of malicious program.     Ans.  True 

  

Q3.    Short Answer Questions:     (a)  What is the difference between cellspacing and cellpadding attribute ?  2   Ans.  Cellspacing Set the space between the cells 

 Cellpadding sets the space between cell wall and its content  (1 mark for each correct answer) 

 

  (b)  Write any two precautions to avoid spam.  2   Ans.  ● Never click on links that come from unknown sources. 

● Never, ever reply to a spam message. ● Don't forward an email from someone you don't know to a list of people. ● Use a spam filter. OR, any other correct precautions  (1 Mark each for  any two correct precautions) 

 

  (c)   Write the HTML code to display image with red border.  2   Ans.  <img src=”b.jpg” border=1 bordercolor=red>

 (1 mark for IMG Tag) ( 1 mark for border attribute)  Note: Ignore the bordercolor attribute  

 

  (d)   Write the full forms of : (i) WWW (ii) FTP (iii) LI (iv) HR  

  Ans.  (i)   WWW - World Wide Web (ii)  FTP - File Transfer Protocol (iii) LI - List Item (iv) HR   -  Horizontal Rule OR Horizontal Ruler  (½ mark for each correct full form) 

 

  (e)  Internet is a series of interconnected computers throughout the world. (i) Name any one of the services that is offered on internet. (ii) Name any one of the internet service provider.  

2/9

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 15: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)

Delhi Marking Scheme   Ans.  (i) eCommerce, eBusiness, eMail, WebBrowsing, eLearning, eGovernance or any 

other correct service  (ii) BSNL, MTNL, Airtel, Vodafone, Idea Cellular, Reliance Communications, Aircel, Tata Teleservices, Telenor India, Videocon, Atria Convergence Technologies or any other correct service provider name  (1 mark for any one correct service) (1 mark for any one correct ISP name) 

 

  (f)  Mr. Gupta is a farmer who is using internet to improve his crop production. He uses a search engine to collect the information.  (i)   Explain what is a search engine.  (ii)  Give example of search engine. 

  Ans.  Search engine is web based program that searches for and identifies items in a database that corresponds to keywords or characters specified by user.  Google, Bing, Yahoo, Baidu, AOL, ASK, Escite, DuckDuckGo, WolframAlpha, Yandex, Lycos, chacha or any other correct name of search engine  (1 mark for any correct definition/explanation of search engine) (1 mark for any one correct example of search engine) 

 

Q4.    Short Answer Questions:     (a)  Draw the XML tree for the following code: 

<Building> <Furniture> <Wooden>24</Wooden> <Plastic>50</Plastic> </Furniture> <Furniture> <Wooden>24</Wooden> <Plastic>50</Plastic> </Furniture> </Building>

  Ans. 

 

OR 

Any other similar representation for Tree

(1 mark for Root Element Building) (1 mark for Furniture) (1½ mark each for Elements Wooden (24), Plastic (50) under Furniture) 

 

3/9

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 16: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)

Delhi Marking Scheme   (b)  Observe the following table and write the HTML code to generate it. 

 

  Ans.  <TABLE> <TR> <TH>Column 1</TH> <TH>Column 2</TH> <TH>Column 3</TH> </TR> <TR> <TD ROWSPAN=2>Row 1 Cell 1</TD> <TD>Row 1 Cell 2</TD> <TD>Row 1 Cell 3</TD> </TR> <TR> <TD>Row 2 Cell 2</TD> <TD>Row 2 Cell 3</TD> </TR> <TR> <TD COLSPAN=3>Row3 Cell 1</TD> </TR> </TABLE> (1 mark for <table> </table>) (1 mark for all correct <tr> </tr>) (1 mark for all correct <td> with  correct values) (½ mark for all correct rowspan = “...”) (½ mark for all correct colspan = “...”) (1 mark for correct nesting of all <tr></tr> and <td> </td> tags)

 

  (c)   What is the meaning of backup and why is it essential ? Name any four devices to take data backup. 

  Ans.  Backup refers to Copying and Archieving data/information into an external permanent storage.  It is essential as we can restore original data in case of loss or accidental damage of data. HARD DISK, CD, DVD, Pen Drive, SD Card, Magnetic Tapes, Cloud, Google Cloud  

(½ Mark for correct definition/explanation of Backup) (½ Mark for correct explanation of Backup as a essential process) (1 Mark each for any four correct backup devices) 

 

  (d)  Identify which of the following is a tag or an attribute :  (i) Img (ii) A (iii) Align (iv) Color (v) Font (vi) Noshade  

4/9

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 17: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)

Delhi Marking Scheme   Ans.  (i) Img - TAG 

(ii) A - TAG (iii) Align - Attribute (iv) Color - Attribute (v) Font - TAG (vi) Noshade - Attribute  (½ Mark for each correct identification as TAG/Attribute) 

 

  (e)  Sunila works in a MNC and works online from home also. She needs a fast                             internet connection. Which type of internet connection is best suited for her ?                         Also she needs to upload and download the files from remote sites. Which                         protocol will help her to perform this activity ? 

  Ans.  DSL OR Broadband OR WiFi  FTP  (1 Mark for each correct answer) 

 

Q5.    Long Answer Question:     (a)  Observe the following output and write HTML code to generate it: 

 Consider the following points while generating the web page : • The title of the page is "Shopping" • The heading is in red colour • Text colour is maroon • Font of entire document is Arial • Image used is "bazar.jpg" • The pages linked are : ♦  Clothing & Accessories to cloth.html ♦  Household Appliances to "house.html" ♦  Grocery to "grocery.html" • Bottom message is of size   

10 

  Ans.  <html> <hesd> <title>Shopping</title> </hesd> <body text="maroon"> <font face="Arial">

 

5/9

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 18: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)

Delhi Marking Scheme

<h2> <center><font color=red>e-SHOPPING</font></center> </h2> <h2> <center>All Your Shopping Needs Met With Mouse Click </center> </h2> <p>Availability of all possible leading brands. Guarantee of quality and price. Free home delivery. <center><img src=images.jpeg></center> <p>We provide the following category of products. <ol> <li> <a href=”cloth.html”>Clothing & Accessories</a> <ul type=square> <li>Men <li>Women <li>Kids </ul> <li><a href=”house.html”>Household Appliances</a> <li><a href=”grocery.html”>Grocery</a> </ol> <hr> <p> <center> <font size=2>Shop Timings: 10am to 8.00 pm</font> </center> </p> </font> </body> </html> (1 Mark for the title of the page as "Shopping" ) (1 Mark for the heading in red colour ) (1 Mark for Text colour as maroon ) (1 Mark for the Font of the entire document as Arial ) (1 Mark for the Image used as "images.jpg" ) (1 Mark for linking Clothing & Accessories to "cloth.html" ) (1 Mark for linking Household Appliances to ''house.html'' ) (1 Mark for linking Grocery to "grocery .html" ) (1 Mark for Bottom message of size 2 ) (½ Mark for correct Ordered list) (½ Mark for correct Unordered list)  

NOTE:  ● Mark not to be deducted for not using the <hr> tag before the bottom 

message ● Mark not to be deducted for writing any extra tags which are not 

needed    

6/9

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 19: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)

Delhi Marking Scheme Q6                                             Section B 

Multiple Choice Questions (Choose most appropriate option):   (1 Mark for choosing each correct option) 

18 

  (i)   Is it easier to process XML than HTML ? (a) Yes (b) No (c) Sometimes (d) Can't say 

 

  Ans.  (a) Yes  

 

  (ii)  Well formed XML document means (a) It contains a root element (b) It contain an element (c) It contains one or more elements (d) Must contain one or more elements and root element must contain all other    elements 

 

  Ans.  (d) Must contain one or more elements and root element must contain all other    elements  

 

  (iii)   Which of the following strings are a correct XML name ?  (a) myElement  (b) my Element (c) #myElement (d) None of the above  

 

  Ans.   (a) myElement  

 

  (iv)  XML uses the features of (a) HTML (b) XHTML (c) VML (d) SGML   

 

  Ans.  (d) SGML   

 

  (v)  How can we make attributes have multiple values : (a) <myElement myAttribute="valuel value2"/> (b) <myElement myAttribute="value 1 " myAttribute="value2"/> (c) <myElement myAttribute="valuel, value2"/> (d) attributes cannot have multiple values  

 

  Ans.  (d) attributes cannot have multiple values   

 

.  (vi)  The use of a DTD in XML development is : (a) required when validating XML documents (b) no longer necessary after the XML editor has been customized (c) used to direct conversion using an XSLT processor (d) a good guide to populating a templates to be filled in when generating an XML document automatically  

 

  Ans.  (a) required when validating XML documents   

 

7/9

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 20: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)

Delhi Marking Scheme   (vii)  <b> tag makes the enclosed text bold. What is other tag to make text bold ? 

(a) <strong> (b) <dar> (c) <black> (d) <emp> 

 

  Ans.  (a) <strong>  

 

  (viii)   Which tag allows you to add a row in a table? (a) <td> and </td> (b) <cr> and </cr> (c) <th> and </th> (d) <tr> and </tr>  

  

  Ans.  (d) <tr> and </tr>   

 

  (ix)  What is the correct HTML tag for adding a background color? (a) <body color="yellow"> (b) <body bgcolor="yellow"> (c) <background>yellow</background> (d) <body background="yellow"> 

 

  Ans.  (b) <body bgcolor="yellow">  

  

  (x)  Choose the correct HTML tag for the smallest size heading ? (a) <heading> (b) <h6> (c) <h1> (d) <head>  

 

  Ans.  (b) <h6>  

 

  (xi)  What is the correct HTML tag for inserting a line break ? (a) <br> (b) <lb> (c) <break> (d) <newline>  

 

  Ans  (a) <br>  

 

  (xii)  Which of the following is not a pair tag ? (a) <p> (b) <u> (c) <i> (d) <img>  

 

  Ans.  (d) <img>   

 

  (xiii)  To create HTML document you require a (a) Web page editing software (b) High powered computer (c) Just a notepad can be used (d) None of the above  

 

  Ans.  (c) Just a notepad can be used    

 

8/9

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com

Page 21: Class 10... · (c) The _____ tag provides additional information including title, scripts used, etc. about a webpage. • Please check that this question paper contains ˙˛ printed

CBSE AISSE 2017 Foundation of Information Technology (Subject Code 165 Paper Code No. 53/1)

Delhi Marking Scheme   (xiv)  HTML documents are saved in 

(a) Special binary format (b) Machine language codes (c) ASCII text (d) None of the above  

 

  Ans.  (c) ASCII text  

 

  (xv)  What have caused the rise in computer crimes and new methods of committing old computer crimes ? (a) Increased use of computer and expansion of the internet and its services. (b) New security methods of detecting computer crimes. (c) Creation of new software. (d) World wide web.  

 

  Ans.  (a) Increased use of computer and expansion of the internet and its services.  

 

  (xvi)   What is a worm? (a) A weakness in security system that never copies itself into a computer's memory until no more space is left. (b) A program that uses computer networks and security holes to copy itself in the computer memory until no more memory is left. (c) Attaches itself to e-mails. (d) Corrupts or replaces boot sector instructions.  

 

  Ans.  (b) A program that uses computer networks and security holes to copy itself in the computer memory until no more memory is left.  

 

  (xvii)  How are viruses spread ? (a) Through firewalls (b) Downloading infected programs and files from internet  (c) Garbled information (d) Install anti-virus  

 

  Ans.  (b) Downloading infected programs and files from internet  

 

  (xviii)  How do users prevent and protect themselves against viruses ? (a) Do not open e-mail attachments, use an OS that has virus security features, scan other users' media storage devices before using them on your computer. (b) Missing files or folders should be deleted. (c) Files with weird and obscene messages should not be stored. (d) Delete unwanted SPAM from your computer.   

 

  Ans.  (a) Do not open e-mail attachments, use an OS that has virus security features, scan other users' media storage devices before using them on your computer.  

 

     

9/9

Downloaded from www.studiestoday.com

Downloaded from www.studiestoday.com