11th Final Annual IT

Download as pdf or txt
Download as pdf or txt
You are on page 1of 15

1

1. Feedback is the final component in the process of communication as it defines the response given
by the receiver to the sender.
a) Response b) Request
c) Feedback d) Notice

2. Select the answer that describes assertive way of communication When walking into a crowded room:
a.I want to hide my face.
b. I don’t mind pushing my way through the crowd.
c. I may push someone out of my way and then blame it on someone else.
d. I smile and say “hi” to others and respect other people’s space.

3. Having conscious knowledge of your own self, capabilities, feelings and one’s own character is called .
A. Self‐awareness
B. Self‐motivation
C. Self‐control
D. Independence

4. refers to focusing human efforts for maintaining a healthy body and mindcapable of better
withstanding stressful situations.
A. Mental Health
B. Emotional Health
C. Self‐Management
D. Stress Management

5. Undo, cut, copy and paste are commands.


b) View b) Edit
c) Styles d) File

6. A is a software program that attaches itself to other programs and alters their behavior.
a)Operating system b) Firewall
c) Antivirus d) Computer Virus

7. Which of the following options are word processors? Select all the correct options.
(a) Google Docs
(b) LibreOffice Writer
(c) Microsoft Word
(d) All of the above
8. Choose the correct example of oral communication.
(a) Reports
(b) Newspapers
(c) Face-to-face interaction
(d) Notes

1
2

9. What makes you complete your work or studies without others cheering you?
(a) Self-confidence
(b) Communication
(c)Self-motivation
(d) Self- esteem

10. Mr. Ramesh is telling a story to all his students. He made it an interesting activity by
involving all the students. Identify the skill being developed by the teacher in students:
(a) Problem solving
(b) Active listening
(c) Trust building
(d) Writing Skills

11. Extension of an OpenOffice Calc file is .


(a) .doc
(b) .ods
(c) .odp
(d) .odc
12. Charmi makes audio and video calls using WhatsApp, FaceBook Messenger, Skype,
Google Duo, Zoom etc. to greet her friends and relatives. This enables her to see them when
she is unable to travel to meet them. Which technology is she using?
(a) IM
(b) VoIP
(c) E-mail
(d) None of the above

13. Which of the following devices would you suggest to be implemented for connecting
computers within office units of a school?
(a) Switch/Hub
(b) Modem
(c) Repeater
(d) Gateway
14. What is the approximate bandwidth of a typical voice signal?
(a) 2KHz
(b) 2MHz
(c) 3KHz
(d) 3MHz

15. Which one of the following is not in the category of communication channels?
(a) narrow band
(b) broadband
(c) light band
(d) voice band

2
3

16. Data transfer rate is often measured in


(a) Mbps
(b) Kbps
(c) Bps
(d) gbps

17. Home Wi-fi networks and small business networks are examples of:
(a) LAN
(b) MAN
(c) WAN
(d) PAN

3
4

Answer any 5 out of the given 7 questions (1 x 5 = 5 marks)

18. Any computer attached on the network is called a _ _ _ _ _ _ _


a)Node b) Server
c) Client d) workstation

19. Which one of the following is not in the category of communication channels?
a) narrow band b) broadband
c) light band d) voice band

20. This topology has a long cable, called Backbone Cable/Backbone. Identify the topology.
A. Star Topology
B. Ring Topology
C. Bus Topology
D. Mesh topology

21. Rohit found a new mobile being launched on Amazon. He purchased it in an exchange offer. The Mobile was
delivered and the delivery agent took the old mobile for an exchange. Which of the following should be done for
data protection?
A. Logout of all E‐mail ID’s.
B. Log out of all social media accounts and delete the applications.
C. Delete all the saved usernames and passwords in Web Browsers
D. All of the above
22 Home Wi‐fi networks and small business networks are examples of:
A. LAN
B. MAN
C. WAN
D. PAN

23. Full form of HTML


A. Hyper Text Medium Language
B. Hybrid Text Medium Language
C. Hyper Text Markup Language
D. Hybrid Text Markup Language

24. Data transfer rate is often measured in


a)Mbps b) Kmps
c) mps d) KHz

Answer any 6 out of the given 7 questions (1 x 6 = 6 marks)

25. is a malicious program that attaches itself to the host program.


a) Worm c) Trojan Horse
c) Virus d) Spam

26. A device that enables a computer to transmit data over, telephone or cable lines.
a) Modem c) Switch

4
5

d) Router d) Firewall

27. address is a unique 12 digits (6 digits for manufacturer code and 6 digits for serialnumber)
hexadecimal number assigned to each NIC.
a) IP b) TCP c) MAC d) Email

5
6

28. is the process of getting corresponding IP address from a domain name.


a) Hacking c) Trojan Horse
b) Cracking d) Domain Name Resolution

29. The term was used for people who engaged themselves in harmless technical experiments and fun
learningactivities.
A. Cracking
B. Firewall
C. Hacking
D. Spam

30. Referring to the code given below:


<a href=’#Top’ >Top </a>
Which type of linking does it exhibit?
A. Internal Linking
B. External Linking
C. Web Link
D. None of the above

31. Which of the following devices would you suggest to be implemented for connecting computers within office
units of a school?
A. Switch/Hub
B. Modem
C. Repeater
D. Gateway

Answer any 5 out of the given 6 questions (1 x 5 = 5 marks)

32. Which code should be written to insert a comment line in


HTML code?
a) <!>
b) <‐‐!‐‐!>
c) <!!>
d) <!‐‐!>

33 Which code should be written to insert a comment multiple lines in


CSS code?
a.*// //*
b.*/* */*
c. // //
d. /* */

34. A multiport intelligent device used for connecting two or more local area networks which exercise discretion
whileforwarding data to the outgoing line leading to the destination.
A. Switch
B. Bridge
C. Hub
D. Router
6
7

35. For publishing on a Website which of the following statements stands True.
A. To place your pages on the web you need a web server.
B. To place your pages on the web you need a web server.
C. Commonly called hosts, web servers allow you to transfer and store files including HTML documents
only.
D. To place your pages on the web you need not have a web server.
36. Full Form of HTTP
A. Hybrid Text Transmission Protocol
B. Hyper Text transmission Protocol
C. Hyper Text transfer Protocol
D. Hybrid Text transfer Protocol

37. allow users to transfer files from one machine to another.


a. FTP b. SMTP
c. PPP d. IP

38. Identify valid IPv4


address
a) 192.168.300.512
b) 78:98:67:78:98:11
c) 1122:32ff:4566:ab
d) 202.202.202.202

39. is an eight wired connector that is used to connect computers on a local area network (LAN)
a)RJ‐11 b) RJ‐45
d) RJ‐46 d) RJ‐76

40. Identify the topology from diagram below

a) BUS Topology b) Ring Topology


c) Star Topology d) Mesh Topology

41. Identify the device

7
8

A) Switch b) router
c) Hub d) gateway

42. refers to the range of frequencies available for transmission of data.


a) Radio waves c) Broadcast
b) Bandwidth d) Frequency width

43. Give a JavaScript statement for each of the following:


a. A variable ‘s’ that stores the sum of variables ‘x’ and ‘y’
b. To find square root of x .
c. To print data type of variable ‘n’.

Ans.
a. s= x + y
b. Math.sqrt(x)
c. typeof(n)

44. Dr. Navjot has a beautiful idea of integrating Artificial Intelligence into Cyber Security to protect individuals from
spam messages. She has safeguarded her idea by proposing the correct method to the authorities. Which of the
following method she must have chosen?
A. Patent
B. Copyright
C. Trademark
D. License

45. Which one is incorrect way of applying background color to web page?
a. body bgcolor=“#000000”
b. < body bgcolor=“#black”>
c. < body bgcolor=“rgb(0,0,0)”>
d. <body bgcolor=“black”>

46. Name the tool in GIMP to crop the unwanted part of the image.
Crop

47. #black {color: #000000;} is an example of selector


a) ID b) class

8
9

c) Universal d) type

48. Explain the role of case sensitivity in Java Script.


Ans. Case Sensitivity: JavaScript is case sensitive i.e., upper case letter and lower-case letter has differentmeaning. For
example, the word “alert” has a lower case “a”. so, ifwe type the wordwith an uppercase “a” then JavaScript will show an
error and the alert box will not be displayed.

49. What is smudging and stamping in GIMP?


Smudge tool , is used for smearing color pixels on a selected layer. Smudging is used to soften color transitions, make the
image blurry, hide objects, and to create textures. smudge When a smudge tool is applied on an image, it selects the
available color and merges it with the other colors present on the image.

50. Write two to three lines you would use to introduce yourself.

51. Write any two Benefits of Teamwork.


 Better problem solving. ...
 Happier team members. ...

52. In SMART goals, what does ‘S, M, A, R and T’ stand for?


Ans. S- specific
M- measurable
A- achievable
R- realistic
T- time-bound

53. List any two advantages of using a word processor to write a letter.
a. A document can be stored in a computer for future reference.
b. Have special editing tools eg spelling and grammar checkers.
c. One can easily insert or replace a word or phrase without affecting the neatness of a document.

54. What is the advantage of using a header or a footer in a word processor document?
Ans. One of the advantages of headers and footers is that important information is repeated across each page or
section. This helps readers to navigate a long document and find the information they need quickly. Page numbering is
9
10

an example of this and is essential in any long document.


55. What is a network? Give any two uses of having a network in your school computer lab.
Ans. Network is a group of two or more computers or other electronic devices that are interconnected for the
purpose of exchanging data and sharing resources.
two uses of having a network in your school computer lab.
a. School networks allow students to access their files from computers throughout the school.
b. You can use the network to save copies of your important data on a different computer, examples share photos,
music files and documents.

56. What is variable? Write its example also.


Variables can be thought of as named containers in the computer’s memory. You can place data in these containers
and refer to the value using the name.
Example var y = 100; var b=” sahil”;
57. Write any 2 advantages of using CSS.

a. CSS saves time – You can write CSS once and then reuse same sheet in multipleHTML pages. You can define a style
for each HTML element and apply it to asmany Web pages as you want.
b. Pages load faster – If you are using CSS, you do not need to write HTMLtag attributes every time. Just write one
CSS rule of a tag and apply to all the occurrences of that tag. So less code means faster download times.
58. Explain the role of case sensitivity in JavaScript?
Case Sensitivity: JavaScript is case sensitive i.e., upper case letter and lower-case letter has differentmeaning. For
example, the word “alert” has a lower case “a”. so, if we type the wordwith an uppercase “a” then
JavaScript will show an error and the alert box will not be displayed.

59. Write a program in JavaScript to swap two variable values.


<html>
<head>
<title>JavaScript function to Swap two variables</title>
</head>
<body>
<script>
var x = 20;
var y = 40;
var z;
z=x;
x=y;
y=z;
document.write(“ Value of X after swapping ”, x);
document.write(“ Value of Y after swapping ”, y);

</script>
</body>
</html>
10
11

60. List out any three popular web browsers?


Ans. Google Chrome, Mozilla Firefox, Internet Explorer.
61. How do you insert an image in the HTML page? What are HTML Character Entities?
We should use the <img> tag inside <body>… </body> tag. The <img> tag specifies an image to be displayed in an
HTML document. The src attribute is used to add the image source which is the URL of the image(location of the
file).
A character entity has three parts: an ampersand (&), an entity name or an entity number, and finally a semicolon (;). The
& means we are beginning a special character, the; means ending a special character and the letters in between are sort
of an abbreviation for what it’s for.
62. What does GIMP stand for? What is GIMP’s default graphics file format?
 GIMP is stands for GNU Image Manipulation Program.
 XCF is GIMP’s default graphics file format
63. What is a Website? Give example of any one Website.
A website (also written as web site) is a collection of web pages and related content that is identified by a common
domain name and published on at least one web server. Notable examples are google.com, and amazon.com.

64. What are the layer masks and Channels in GIMP?


Layer masks in GIMP offer an elegant way to edit specific portions of images placed in layers within a GIMP
document. It may produce more attractive outputs by refining selections. layer mask is applied to an image over
the layer, the mask makes parts of the layer transparent so that any layers below are shown through.

Channels in GIMP are very similar to layers; however, each layer corresponds to a particular level in the color model
of the image (RGB, HSV or CMYK). Channels dialogues can be selected in any combination, and appear as gray shaded, if
currently active. The purpose of ‘Channels’ is to process color channels (applied to images) and maintain selection masks.

65. What is the purpose of alpha channels in GIMP?


alpha channel (also called alpha planes) is a color component that represents the degree of transparency (or
opacity) of a color (i.e., the red, green and blue channels). It is used to determine how a pixel is rendered when
blended with another.

66. Aishwarya is preparing a portrait design for her grandma in which she has merged images of her village, town
andgrandmother in GIMP. Explain following tools that she can use to make the appearance of her
image betterand merge the boundaries neatly.
a. Smudge Tool:
b. Handle Transformation Tool:
c. Color Picker Tool
d. Distort Filter Emboss:
Ans.
a. Smudge tool is used for smearing color pixels on a selected layer. Smudging is used to soften color
transitions, make the image blurry, hide objects, and to create textures. smudge
b. Handle Transformation Tool: This tool allows you to apply moving, rotating, shearing, perspective and
scaling corrections using handles placed on canvas.
c. Color Picker Tool is used to select a color from an image opened on the screen, by clicking on the
particular color of the image
d. Distort Filter Emboss : It simulates embossing on the image. It sets azimuth (lighting component),
11
12

elevation and depth of an image using option settings.Read more on Sarthaks.com -


https://www.sarthaks.com/2844617/aishwarya-preparing-portrait-design-grandma-which-merged-
images-village-town-grandmother

67. Create a JavaScript program that prompts the user for a phone number and then asks the user for confirmation.

<html>
<head>
<title>Example of prompt box</title>
</head>
<body>
<script type = "text/javascript">
var Mobile=prompt("enter your mobile no. ");

</script>
</body>
</html>

68. What does <cite> and <pre> tag mean?


Ans. <cite = Defines Citation
<pre> = defies preformated text.

69. What do you mean by an anchor tag?

Ans. An anchor can point to any resource on the Web: an HTML page, an image, a sound
file, a movie, etc.
The syntax of creating an anchor:
<a href=“url”>Text to be displayed</a>

70. What do you understand by Cookies?


Cookies: This small text file is a cookie. Generally a cookie contains the name of
the website that it has come from and a unique ID tag.
71. Differentiate between Worm and Virus
Worm: Worm is also a malicious program like a virus. But unlike viruses, it does
not need to attach.
Virus: Virus is a malicious program that attaches itself to the host program. It is
designed to infect the host program and gain control over the system without the
owner's knowledge.
72. What do you understand by Phishing?
Phishing refers to the act of stealing a user's personal information through fraud mails.
These emails eit4er entail personal information through embedded forms, or contain links to the web page that
may prompt you to provide this information. Information attempted to be stolen may include bank account
number, debit/credit card number, passwords or any other valuable data
73. Differentiate between FTP and HTTP.
● File Transfer Protocol (FTP): It is used for transferring files from one system to another on the internet.
● HyperText Transfer Protocol (HTTP): It is the protocol that is used for transferring hypertext files on the World
12
13

Wide Web.

74. Why are universal and type selectors used?


The Universal Selectors = Rather than selecting elements of a specific type, the universal selector quite simply
matches the name of any element type :
{
Color : #000000;
}

This rule renders the content of every element in our document in black.
The Type Selectors
This is the same selector we have seen above. Again one more example to give a
Color to all level 1 headings:
h1 {
color: #36CFFF;
}

75. Explain any two types of network?


● Local Area Network
Local Area networks (LAN) are private networks and can span a radius of up to 1 Km. They are generally established
within a building or campus.LANs operate at a speed in
the range 10 Mbps to 1 Gbps.
● Wide Area Network
Wide Area Network (WAN) spans about 1000 Km. They are used for long distance communication and are well suited for
connecting remote areas. They establish links within a country or continent. A WAN may be owned and managed by
several organizations. It connects various local and metropolitan area networks.

76. Explain any two topologies?

Star Topology :
Star topology is used for Local Area networks in which all nodes are connected to a central point called Hub,
which connects them to the communication channel. The connections are in such a manner that n number of
wires are required to connect n number of end devices or nodes. Traffic is generated from the central hub of
the star.

2. Bus Topology :
Bus topology is a type of network topology in which all the devices are connected to a single cable which is
called the backbone of the network. It consists of a terminator at each end of the cable.

13
14

77. Explain cyber crime?


Cyber Crime: Cybercrime is defined as a crime in which a computer and internet
is used in an illegitimate way to harm the user.
78. Explain webpage, website and webserver?

web page

A document which can be displayed in a web browser such as Firefox, Google Chrome, Opera, Microsoft Internet
Explorer or Edge, or Apple's Safari. These are also often called just "pages."

website

A collection of web pages which are grouped together and usually connected together in various ways. Often
called a "web site" or a "site."

web server

A computer that hosts a website on the Internet.

79. State difference between inline, internal & external style sheets?

 Inline CSS: Requires the style attribute placed inside an HTML element.
 Internal CSS: Requires the <style> element placed inside the head section of an HTML file.
 External CSS: Requires the <link> element placed inside the head section of an HTML file.

80. Write in brief about the types of web architecture.


Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked together with equal privilege and
responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10 computers.

Client/Server Network
o Client/Server network is a network model designed for the end users called clients, to access the resources such
as songs, video, etc. from a central computer known as Server.
o The central controller is known as a server while all other computers in the network are called clients.
14
15

81. Explain in brief about any 4 types of Network Protocols.

 Transmission Control Protocol(TCP): It breaks the data into packets that the
network can handle efficiently.
 Internet protocol(IP): It gives distinct addresses (called IP address) to each data
packet.
 File Transfer Protocol (FTP): It is used for transferring files from one system to
another on the internet.
 HyperText Transfer Protocol (HTTP): It is the protocol that is used for transferring
hypertext files on the World Wide Web.

82. Difference between Circuitswitching and Packet switching.

Circuit switching: A technique in which a dedicated and complete physical


connection is established between two nodes for communication.
Packet switching: A switching technique in which packets are routed between
nodes over data links shared with other traffic

83. List any two advantages and any two disadvantages of Star topology.

 Advantage :
Easy to install and wire.
Easy to detect faults and to remove parts.
 Disadvantage :
Requires more cable length than a linear topology.
More expensive than linear bus topologies because of the cost of the hubs, etc.

84. What is HTML? Write a program to create a simple webpage using html tags and save the file as “My first
webpage”.

HTML stands for Hyper Text Markup Language


An HTML file is a text file containing small markup tags
The markup tags tell the Web browser how to display the page
An HTML file must have an htm or html file extension

<html>
<head>
<title>My First Webpage</title>
</head>
<body>
This is my first homepage. <b>This text is bold</b>
</body>
</html>
15

You might also like