The document contains multiple choice questions, short answer questions requiring 2-4 line responses, and long answer questions requiring detailed 5 line responses on topics related to cyber security, HTML, CSS, and computer fundamentals.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
239 views
ICT X Practice Questions
The document contains multiple choice questions, short answer questions requiring 2-4 line responses, and long answer questions requiring detailed 5 line responses on topics related to cyber security, HTML, CSS, and computer fundamentals.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 3
Q1.
Multiple choice questions 1 Marks
1. ________ method is used to sent form data as URL variables. (a) get (b) set (c) post (d) none of them 2. DHTML is a combination of _________ and __________. (a) DOM and CSS (b) CSS and Conventional HTML (c) HTML and JavaScript (d) None of the above 3. Which element allows for the creation of groups of options in a select menu? (a) <select> (b) <group> (c) <option> (d) <optgroup> 4. The units ‘px’ and ‘___’ make the font size absolute. (a) ‘pr’ (b) ‘pn’ (c) ‘pz’ (d) ‘pt’ 5. Which of the following is not an external threat to a computer or a computer network (a) Ignorance (b) Trojan horses (c) Adware (d) Crackers 6. A _____ can be inserted in HTML document which can act as a container for all the input elements. (a)Textfield (b)Textarea (c)Form (d)Commandbutton 7. Which system uses only the digits 0 and 1? (a) Bits (b) Binary number system (c) Secondary number system (d) Nibbles 8 ________ is a new branch of law and is growing very fast. (a) Cyberspace (b) Cyber-law (c) Cyber safety (d) Cyber-Ethics 9. A software _________ is a legal agreement about an application (a) Application (b) License (c) Contract (d) Copyright 10. ___________ are the transparent sheet one on the top of the others (a) Layers (b) Style-sheet (c) Scale Layers (d) None of them 11. The ___________ property is used to set the size of the font (a) font-size (b) font-weight (c) font-height (d) font-variation 12. There are ________ways to apply CSS to an HTML document (a) Two (b) Three (c) Indefinite (d) Four
Note :Please see other MCQs at the back of Chapters
Q2. Define or Write short note on in 2 lines 2 Marks
1. Spyware 2. CSS . 3. Malware 4. Cyber Crime 5. Worms 6.Software 7.Memory 8. Cookies 9. Open-Source 10. Layers 11.Ghost Cell 12. Hacker 13. Cracker 14. Virus. 15.Antivirus 16.Freeware 17.GPL Q3. Answer the following questions in 3 to 4 lines 3 Marks 1.Which attributes are necessary to insert drop down list in a HTML page? 2.What is Deniel of Service attack? How it affects the systems performance? 3.What do you mean by font-variant? Give example of each. 4.Mention the properties of CSS used to insert Letter spacing in a line. 5.Differentiate between Get & Post methods of Form tag. 6.How text field and text area controls are different from each other? 7.What is the purpose of using Frames in HTML pages? 8.Differentiate between Get & Post methods of Form tag. 9.Which attributes are necessary to create form in a HTML page? 10.What is Cyber-law ? 11.What do you mean by rowspan and colspan? Give example of each. 12.Mention the attributes of Frame and Frameset only?
14. Differentiate between <TH> and <Caption> tags.
15. How <TD> and <TR> are different from each other? 16. What is the purpose of using Frames in HTML pages? 17. Discuss all the tags with their attributes to create a frame. 18. What are the colour properties of CSS 19.What are the features of DHTML 20. What are the components of DHTML 21.What are limitations of CSS 22. Define CSS and What Advantages of CSS 23. How to apply Font properties in CSS. 24. List down the various font-family property ? Give an example of each. 25. What do you mean by font-variant? Give example of each. 26. Explain font-weight? 27. Mention the properties of CSS used to insert Letter spacing in a line. 28. How many types of text alignments can be included in a CSS page. Q4. Answer the following question in detail 5 Marks 1.What are the categories of Cyber crime. Explain them. 2.Sometimes it is better to use the text area element instead of an input element of type text. Write a short note to explain when and why? 3.Explain the CSS properties to set the foreground and background color of the WebPages. 4.Write a short note on your understanding of ‘cracking’ a software. 5.Explain the use of Radio buttons in HTML forms with the help of an suitable example. 6.Mention all the attributes of Check box. Justify how it is different from Radio button. 7.Explain the use of Radio buttons in HTML forms with the help of an suitable example. 8.Explain the functions of Operating System.? 9.What are the features of the GIMP? 10.Differentiate the categories of Memory? 11.Explain the properties to set the foreground and background color of the WebPages? 12.Write a short note on your understanding of ‘cracking’ software? 13.Explain the types of software licenses? 14..What does ‘n’ stands for in the following tags? (a) <Table border=n> (b) <Table bgcolor = “n”> (c) <Td bgcolor = “n”> (d) <Td width = n> (e) <a href= “n”>
15. state different kinds of threats to cyber security
16. Differentiate between copyright and licensing 17.Name the different kinds of software licensing available 18. Differentiate between freeware and open source software 19. State how the use of shareware software is different from that of freeware software