11th Annual Exam Paper2
11th Annual Exam Paper2
11th Annual Exam Paper2
Note :
a. In one-to-many relationship a field in one table can be associated with at more than one field in
another table.
b. Whoami command prints the name of the current user on terminal.
c. Asha is closed source O.S.
d. The default method of submitting from data is POST.
e. In SELECT statement ,FROM clause is optional.
f. Software are the parts which we can see, touch & feel.
g. <Textarea> tag is used to create multiple line textbox.
h. toLowerCase () string is used to convert the string into Uppercase letter.
i. Ethics also called moral philosophy is the discipline concerned with what is morally good and
bad, right or wrong.
j. Copyright gives protection to original work
Q3.Multiple choice question (Select One option) (Each question 1 mark) (10 Marks)
a. The …………..system is used to maintain information related to book name, issue date, author etc
i) Railway reservation ii)Library Management iii)Banking iv) Social Media sites
b. DDL stands for…………
i)Data Development language ii)Data Driven language
iii)Driven Definition language iv)Data Definition language.
c. The “all-or-none” property of database transaction is commonly referred to as
i)Isolation ii)Durability iii)Atomicity iv)None
d. ICT stands for………………….
i. Information Communication Technology ii)Information Convert technology
iii. Inbuilt Communication Technology iv)Ideal Conversion Technology.
e. In Linux ,All directories are stored under the……..
i). Root directory ii) Main directory iii)First directory iv)Primary directory
f. The ………………function returns true if given value is not a number.
i). isNaN() ii) isNumber() iii). isInt() iv).isFloat()
g. ………..event occurs when user clicks an element.
i). onMouseOver ii). onClick iii). onKeyPress iv) onMouseOver
h. The ……………..act attempts to change outdated Laws & provides way to deal with cyber crimes
i). IT act 2001 ii).IT act 2000 iii).IT act 2005 iv). IT act 2008
i. …………..is a criminal practice where an individual uses internet to systematically harass or
threaten someone
i). Cyber stalking ii). Cyberbully iii). cracking iv). Both a & b.
j. For protection of data the network should be protected with…..
i). Firewall ii). LAN iii). MAN iv). WAN
Q4.Multiple choice question (select two option) (Each question 2 mark) (20 Marks)
Q5.Multiple choice question (select three option) (Each question 3 mark) (6Marks)
a. Following protocols are used for send and receive email messages.
i) SMTP ii) IMAP iii) POP3 iv) FTP v)DNS
b. The data entry operator wants to insert .
1.Photograph 2.Write remarks about photograph 3.Underline heading.
He will use.:
i) <Image> ii) <Text> iii) <TextArea> iv)<Img> v)<U>
A. Column A Column B
a. Write a program using HTML to create table with 4 rows and 3 columns.
Sr.No Subject Marks
1 IT 96
2 Physics 56
3 Chemistry 43
b. Write a program in HTML to create login form.
Google Login
Enter Username:
Enter Password:
Submit Reset
a. Write JavaScript program to accept two numbers and display multiplication result.
b. Write JavaScript program to check number is even or odd.
Categories Names
Input Devices
Output Devices
f. Observe the field names of a database given below in ‘Column A’ related to Bus reservation. Write
suitable datatype for each field in front of the respective filed in ‘Column B’.