0% found this document useful (0 votes)
217 views

Summative Assessment Answers - Developing For The Web - Y8

This document contains a 12 question summative assessment on developing for the web. The questions cover topics like HTML tags, CSS formatting, search engine optimization, and cybersecurity threats. Each question is multiple choice with a single correct answer. The resource is available online and licensed under the Open Government Licence.

Uploaded by

Han Yuan Yap
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
217 views

Summative Assessment Answers - Developing For The Web - Y8

This document contains a 12 question summative assessment on developing for the web. The questions cover topics like HTML tags, CSS formatting, search engine optimization, and cybersecurity threats. Each question is multiple choice with a single correct answer. The resource is available online and licensed under the Open Government Licence.

Uploaded by

Han Yuan Yap
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Year 8 – Developing for the Web Summative assessment answers

Save a copy

Spinning the web: answers


Q1. The main heading on a webpage should be formatted using which tag?

A. <h1>
B. <h2>
C. <b>
D. <u>

Q2. Which of the following lines of a HTML document is incorrect?

A. <h2 style="color:red;">Important</h2>
B. <p style="font-family:courier;">This is a paragraph.</p>
C. <p style="colour:blue;">Think calm thoughts.</p>
D. <h2>So it started on a cold wet Tuesday morning…</h2>

Q3. What is the alt attribute in img tags used for?

A. Provide an alternative image if the first doesn’t load.


B. Provide a textual description of the image.
C. Alters the image size.
D. Alerts the user that image has loaded.

Q4. What is displayed in a browser if the following line of HTML is used?

<p style="text-align:center;"><img src="MyPhoto.jpg"></p>

A. Text is wrapped around the left-hand side of the image MyPhoto.jpg.


B. The text MyPhoto.jpg is converted to centred text in a paragraph.
C. The image MyPhoto.jpg is added as a centred background on the page.
D. An image named MyPhoto.jpg is displayed in the centre of a new paragraph.

Q5. Which of the following is a benefit of using Cascading Style Sheets (CSS)?

A. Webpages load more quickly.


B. There will be fewer files created for the website.
C. All the formatting of a single tag can be adjusted in one file.
D. Search engines will be able to find the webpage more easily.

Page 1 Last updated: 27-05-20


Year 8 – Developing for the Web Summative assessment answers

Save a copy

Q6. What formatting would the following CSS lines apply to a HTML document?

body {
color: green;
}

A. The border around images will be green.


B. The title of the page will be green.
C. The background of the page will be green.
D. The text on the page will be green.

Q7. What is the name given to programs that find webpages for search engines?

A. Crawlers.
B. Webbers.
C. Searchers.
D. Indexers.

Q8. Which of the following statements is not part of a search engine’s ranking algorithm?

A. When the page was last updated.


B. Webpages that link to a found page.
C. Other webpages that a found page links to.
D. Words that are not on the page.

Q9. Which of the following search terms is likely to provide the most results?

A. Herman’s Hermits.
B. Herman’s OR Hermits.
C. “Herman’s Hermits”.
D. They all will give the same amount of results.

Q10. What is wrong with the following HTML hyperlink?

<a href="quiz.htm">What is your spirit animal?<a>

Page 2 Last updated: 27-05-20


Year 8 – Developing for the Web Summative assessment answers

Save a copy

A. It should be link and not href.


B. You cannot have text inside the tag.
C. "quiz.htm" does not need speech marks.
D. The tag is not closed.

Q11. What is the name of the technique used to steal people’s personal information using
fake emails from real organisations?

A. Phishing.
B. Oversharing.
C. Worming.
D. Cyberbullying.

Q12. What is the name of the type of malware that hides inside another file that looks
legitimate and useful?

A. Trick link.
B. Blagging.
C. Worm.
D. Trojan Horse.

Page 3 Last updated: 27-05-20


Year 8 – Developing for the Web Summative assessment answers

Save a copy

This resource is available online at ncce.io/net2-saa. Resources are updated regularly — please check that
you are using the latest version.

This resource is licensed under the Open Government Licence, version 3. For more information on this
licence, see ncce.io/ogl.

Page 4 Last updated: 27-05-20

You might also like