0% found this document useful (0 votes)
239 views

ICT X Practice Questions

The document contains multiple choice questions, short answer questions requiring 2-4 line responses, and long answer questions requiring detailed 5 line responses on topics related to cyber security, HTML, CSS, and computer fundamentals.

Uploaded by

Yash Kohale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
239 views

ICT X Practice Questions

The document contains multiple choice questions, short answer questions requiring 2-4 line responses, and long answer questions requiring detailed 5 line responses on topics related to cyber security, HTML, CSS, and computer fundamentals.

Uploaded by

Yash Kohale
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3

Q1.

Multiple choice questions 1 Marks


1. ________ method is used to sent form data as URL variables.
(a) get (b) set (c) post (d) none of them
2. DHTML is a combination of _________ and __________.
(a) DOM and CSS (b) CSS and Conventional HTML (c) HTML and JavaScript (d) None of the above
3. Which element allows for the creation of groups of options in a select menu?
(a) <select> (b) <group> (c) <option> (d) <optgroup>
4. The units ‘px’ and ‘___’ make the font size absolute.
(a) ‘pr’ (b) ‘pn’ (c) ‘pz’ (d) ‘pt’
5. Which of the following is not an external threat to a computer or a computer network
(a) Ignorance (b) Trojan horses (c) Adware (d) Crackers
6. A _____ can be inserted in HTML document which can act as a container for all the input
elements.
(a)Textfield (b)Textarea (c)Form (d)Commandbutton
7. Which system uses only the digits 0 and 1?
(a) Bits (b) Binary number system (c) Secondary number system (d) Nibbles
8 ________ is a new branch of law and is growing very fast.
(a) Cyberspace (b) Cyber-law (c) Cyber safety (d) Cyber-Ethics
9. A software _________ is a legal agreement about an application
(a) Application (b) License (c) Contract (d) Copyright
10. ___________ are the transparent sheet one on the top of the others
(a) Layers (b) Style-sheet (c) Scale Layers (d) None of them
11. The ___________ property is used to set the size of the font
(a) font-size (b) font-weight (c) font-height (d) font-variation
12. There are ________ways to apply CSS to an HTML document
(a) Two (b) Three (c) Indefinite (d) Four

Note :Please see other MCQs at the back of Chapters

Q2. Define or Write short note on in 2 lines 2 Marks


1. Spyware
2. CSS
. 3. Malware
4. Cyber Crime
5. Worms
6.Software
7.Memory
8. Cookies
9. Open-Source
10. Layers
11.Ghost Cell
12. Hacker
13. Cracker
14. Virus.
15.Antivirus
16.Freeware
17.GPL
Q3. Answer the following questions in 3 to 4 lines 3 Marks
1.Which attributes are necessary to insert drop down list in a HTML page?
2.What is Deniel of Service attack? How it affects the systems performance?
3.What do you mean by font-variant? Give example of each.
4.Mention the properties of CSS used to insert Letter spacing in a line.
5.Differentiate between Get & Post methods of Form tag.
6.How text field and text area controls are different from each other?
7.What is the purpose of using Frames in HTML pages?
8.Differentiate between Get & Post methods of Form tag.
9.Which attributes are necessary to create form in a HTML page?
10.What is Cyber-law ?
11.What do you mean by rowspan and colspan? Give example of each.
12.Mention the attributes of Frame and Frameset only?

13.Explain the functionality of following tools


1.Shear tool 2Rotate tool .3.Flip tool 4 Blend tool 5 Blur/Sharpen tool. 6.Smudge tool 7.Dodge tool 8.Scale tool

14. Differentiate between <TH> and <Caption> tags.


15. How <TD> and <TR> are different from each other?
16. What is the purpose of using Frames in HTML pages?
17. Discuss all the tags with their attributes to create a frame.
18. What are the colour properties of CSS
19.What are the features of DHTML
20. What are the components of DHTML
21.What are limitations of CSS
22. Define CSS and What Advantages of CSS
23. How to apply Font properties in CSS.
24. List down the various font-family property ? Give an example of each.
25. What do you mean by font-variant? Give example of each.
26. Explain font-weight?
27. Mention the properties of CSS used to insert Letter spacing in a line.
28. How many types of text alignments can be included in a CSS page.
Q4. Answer the following question in detail 5 Marks
1.What are the categories of Cyber crime. Explain them.
2.Sometimes it is better to use the text area element instead of an input element of type text.
Write a short note to explain when and why?
3.Explain the CSS properties to set the foreground and background color of the WebPages.
4.Write a short note on your understanding of ‘cracking’ a software.
5.Explain the use of Radio buttons in HTML forms with the help of an suitable example.
6.Mention all the attributes of Check box. Justify how it is different from Radio button.
7.Explain the use of Radio buttons in HTML forms with the help of an suitable example.
8.Explain the functions of Operating System.?
9.What are the features of the GIMP?
10.Differentiate the categories of Memory?
11.Explain the properties to set the foreground and background color of the WebPages?
12.Write a short note on your understanding of ‘cracking’ software?
13.Explain the types of software licenses?
14..What does ‘n’ stands for in the following tags?
(a) <Table border=n>
(b) <Table bgcolor = “n”>
(c) <Td bgcolor = “n”>
(d) <Td width = n>
(e) <a href= “n”>

15. state different kinds of threats to cyber security


16. Differentiate between copyright and licensing
17.Name the different kinds of software licensing available
18. Differentiate between freeware and open source software
19. State how the use of shareware software is different from that of freeware software

You might also like