SRV Computer Paper
SRV Computer Paper
❖
~: - COMPUTER
-------
Choose the correct option. (Each carries 1 Mark) (80)
1. Which of the following clement allows multi-line text input?
(I) Textarca (2) Input (3) Select and Option (4) Form
2. Which of the fi.)llowing element is used to create a drop down list or menu in a form?
(1) Input (2) Textarea (3) Select (4) form
3. Which of the following stands for "WYSIWYG"?
(1) When You See Is When You Get (2) What You See Is When You Get
(3) What You See Is What You Get (4) When You See Is What You Get
4. Which of the following is a container used to collect different kinds of inputs from the user?
(1) Form (2) Webpage (3) Text (4) Input
5. Which of the following is the tag used to implement form element?
(1) <form> ... </form> (2) <form > .. .<form> (3) </form> ... </form> (4) <frm> ... </frm>
6. Which of the following attribute of form is used to specify where to send the form data when the form
is submitted?
(1) method (2) action (3) submit (4) input
7. Which of the following method allows only a limited amount of information to be sent at a time?
(1) GET (2) POST (3) SET (4) PUT
8. Which of the following method sends the data as a block through the HTTP transaction?
(1) GET (2) SET (3) PUT (4) POST
9. Which of the following symbol signifies the start and end of a JavaScript block?
( 1) semicolon (2) square bracket (3) curly bracket (4) round bracket
10. Which of the following is a reusable block of code that performs a particular task?
(1) Array (2) Code (3) Program · (4) Function
11. Which of the following statement is used to return a value in a function?
(1) return (2) function . (3) select (4) send
12. Which of the following is generated by the browser due to interaction between the user and the web
page?
(1) Function (2) Response (3) Eve~t (4) Value
13. Which of the following is not an important point to be considered for developing a good website as
part of planning process?
(1) Purpose (2) Audience (3) Content (4) Input
14. Which of the following information should a website contain?
(1) Complete, Relevant (2) Complete, In·elevant
(3) Incomplete, Irrelevant (4) Incomplete, Relevant
15. Which of the following content provides an overview of the site, organization, products and services,
and other items?
(1) Detailed (2) Long (3) General · (4) Short
16. Which of the following is a collection of interlinked web pages?
(1) Webpage (2) Form (3) Kompzer (4) Website
17. Which of the following is the first page that opens when the user enters the URL address in the address
bar of the browser?
(1) Home page (2) Last page (3) Web page (4) First page
18. Which of the following filename is the home page of the website saved as?
(1) first.html (2) index.html (3) home.html (4) one.html
19. Which of the following is a variable that is stored on the user's computer?
(1) Integer (2) HTML (3) Cookie (4) Java
20. Which of the following stands for FTP?
(1) File Truncate Protocol (2) File Transfer Process
(3) Fine Tune Protocol (4) File Transfer Protocol
STD 12 COMPUTER EM Page 1 of 5
21. Which of the following allows specifying styles for the visual elements of the website?
(1) Cascading Style Sheets (2) Webpage
(3) Form (4) Animation
22. Which of the following is known as special symbol in the syntax of CSS?
(1) Rules (2) Selector (3) Declaration (4) Input
23. Which of the following are two main parts of CSS rule?
(1) Selector, declaration(2) Select, declaration
(3 )Selector, declare (4) Selection, declaration
24. Which of the following is an HTML element on which style can be applied?
(1) declaration (2) selector (3) select (4) declare
25. Which of the following is the syntax of CSS?
(1) select {property : value} (2) selector {value : property}
(3) selector {property: value} (4) selection {property : value}
26. Which of the following tag is used to insert JavaScript code into an HTML page?
(1) <script> .. . <script> (2) <script> .. . </script>
(3) <script> ... <//script> (4) </script> ... </script>
27. Which of the following E-commerce business model refers to E-commerce activities involving
transactions between and among the consumers? .
(1) Government to Business (G2B) (2) Consumer to Consumer (C2C)
(3) Business to Business (B2B) (4) Business to Consumer (B2C)
28. Which of the following e-commerce business model is also a part ofE-governance?
(I) Business to Business (B2B) (2) Consumer to Business (C2B)
(3) Consumer to Consumer (C2C) (4) Government to Citizen (G2C)
29. Which of the following E-commerce business model refers to online non-commercial communication
between the Governmen! agencies, organizations and depa1iments with other Government agencies,
organizations and departments? .
(I) Business to Business (B2B) (2) Consumer to Business (C2B)
(3) Government to Government (G2G) (4) Consumer to Consumer (C2C)
30. Which of the following refers to buying and selling of goods or services through the use of Internet
enabled wireless devices?
(I) Internet (2) M-commerce (3) M-banking (4) www
31. Which of the following stands for GPS?
(1) Global Positioning System (2) Global Postal System
(3) Grand Positioning System (4) Google Positioning System
32. Which of the following security aspect refers to the secrecy of the information so that unauthorized
user cannot read it?
( 1) Confidentiality (2) Integrity (3) Non-repudiation (4) Authorization
33. Which of the following security aspect ensures that the information must not be accidentally or
maliciously altered or tampered in transit?
(1) Confidentiality (2) Integrity (3) Non-repudiation (4) Authorization
34. Which of the following security aspect ensures that only authentic users are allowed to use the system?
(1) Authorization (2) Confidentiality (3) Non-repudiation (4) Integrity
35. Which of the following is a program that uses Internet to record information that passes through a
computer or router in transit from sender to receiver?
( 1) Sniffer (2) Denial of service attack
(3) Malicious code (4) Spoofing
36. Which of the following is an attack used to shut down a machine or network, making it inaccessible
to its intended users?
(1) Malicious code (2) Denial-of-Service (3) Spoofing (4) Cyber vandalism
MPlITER EM Page 4 of 5
76. What will expressio n sales.leng th return for an array sales [5] [12]?
(1)5 (2) 12 (3)60 (4) 120
77. When an array sales [5] [12] is declared without specifying initial values, what is the initial
value of
sales [O] [O]?
(1) 0 (2) default value (3) compilation error (4) 60
78. Which of the following should be within a catch block?
(1) finally block
(2) single statemen t that bandies Exception
(3) any number of statements to handle Exception
(4) throws keyword
79. What will happen when a try block does not generate an Exception and you have included
multiple
catch blocks?
( 1) they all execute (2) only the first matching one executes
(3) no catch block executes (4) only the first catch block executes
80. Which of the following methods can throw an Exception?
(1) methods with throws clause (2) methods with a catch block
(3) methods with a try block (4) methods with finally block
. ,