0% found this document useful (0 votes)
80 views2 pages

XI Information Technology

Uploaded by

Imran Shaikh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
80 views2 pages

XI Information Technology

Uploaded by

Imran Shaikh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Shalom International School Jr.

College
FIRST SEMESTER EXAM 2023-24
STANDARD. XI SUBJECT: INFORMATION TECHNOLOGY MARKS: 80

Q.1.A] Re-write senesces with correct answers. 5


1. is largest heading tag. [H2, H1, H6, H4,H5, H3]
2. is a global network of computers.[ WAN, ARPANET, Internet ]
3. is copyright symbol. [ TM, ©, ® , $ ]
4. Internet was developed by as a research experiment by the Army. [ US, Indian, UK, Germany ]
5. is Free and Open Source operating system fro mobile phones. [ Windows, Linux, iOS, Android ]

B] Choose one correct answer from multiple answers. 10


1. is a computer that serves information to another computer
(a) Client (d) Server (c) PC

2. . tag is used to insert image in a webpage.


a) <img> b) <td> (c) <map> (d) <usemap>

3. Gaining access without the users' permission is known as .


(a) Authorized access (b) Un authorized access (c) Log in (d) Piracy

4. <IMG src="Desert.jpg" height="400" width="400" alt="Desert image">


The heighth and width of image in above string is called .
(a) Tag (b) Source (c) Attribute (d) Pixels

5. is a open source operating system for mobile devices.


(a) iOS (b) iPhone (c) Android (d) DroidOS

Q2 A Write the names of common Internet B. Complete the following 10


protocols.
Q.3 Choose Two correct answers from the given options. 10

1. Tags declaring the document is a webpage are and .

a) <DOCTYPE> b) <!DOCTYPE html> c) <php> d) <html> e) None of these

2. Valid attributes of IMG tag are and

a) Height b) Src c) Width d) Size e) block

3. Input types for text data in a form can be and

a) <input type=“text”> b) <input type=“tel”> c) <input type=“url”> d) <input type=“textarea”>

4. Attributes of <area> tag are and _

a) href b) src c) coords d) data e) alt

5. <input type="text"> can be used to create and form fields


a) email b) password c) First name d) Last name e) password

6. and are cyber crimes under IT Act of India 2000.

a) Software Piracy b) Spamming c) Un-authorized access d) Authorized access

7) and must not be shared with anyone.

a) Credit or Debit card number b) Card CVV c) email ID d) OTP

8. and are un-written codes of conduct.

a) Morals b) Cyber Laws c) Ethics d) Rues e) Policies

9. Social commerce involves the use of social media platforms like and

a) Facebook b) Instagram c) gmail d) whatsapp

10. and are the logical operators in JavaScript


a) AND b) && c) $ d) OR e) ++

Q.4 Write code for ANY 3 programs. 18


1. What is cyber crime? What are its examples?
2. What is copyright? Explain the violation of copyright by giving examples.
3. Define the term Hacker. What are examples of hacking?

Q.5 Write code for following practical topics. 12

SOP 1. Insert image of tulips in webpage with 600 pixels height and 600 width,
give heading titl, write a paragraph about tulip flowers label the image it with proper alt description.

SOP2. Create a skeleton of HTML page having Header, Article and Footer Section with demo content
Apply styling to HTMl elements within body section.

Q.6 Write code to create a ordered list of 6 subjects you study. 10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy