Download as pdf or txt
Download as pdf or txt
You are on page 1of 5

Annual Exam –SET B

Subject:-Information Technology Class :-11th Science &Commerce


Date :- Time:- 3hr Total Marks:-80
-------------------------------------------------------------------------------------------------------------------------------------------

Note :

(i) All questions are compulsory.


(ii) Answer the questions after carefully reading the text.

Q1. Fill in the Blanks (Each question1 mark) (10 marks)

a. ………..tags are used to specify a line break.


b. In <a> tag …………attribute is used to specify address of file.
c. The ……….part of CPU performs arithmetic operations.
d. GUI stands for…………………………..
e. The……….is defined as global network connecting millions of computers.
f. Find the result of . 20+ ‘4’ +’9’ =…………
g. When you download a copy of licensed software that is known as………………….
h. …………….statements are used for managing data within tables.
i. ……….is property of string object used to calculate length of string.
j. ………SQL command deletes database table (structure).

Q2.State True or false. (Each question1 mark) (10 Marks)

a. A protocol is a set of rules that governs the communication between the computers on a network.
b. Speaker is input device.
c. Javascript is case sensitive programming language.
d. The default color of hyperlink is blue.
e. Using change directory command control goes to different directory.
f. Input type=”radio” display a button.
g. The content within a title tag is displayed in a title tag
h. SQL stands for structured query language.
i. <Textarea> tag is used to create multiple line textbox.
j. /*…*/ used for multiple line comments in javascript

Q3.Multiple choice question (Select One option) (Each question 1 mark) (10 Marks)

a. Collection of operations that form a single logical unit of work against database is called….
i) views ii) Networks iii) Units iv) Transactions
b. DML stands for…………
i)Data Modification language ii)Data multiplication language
iii)Driven method language iv)Data myself language.
c. What is ACID properties of transactions..
i)Atomicity,consistency,Isolation,Database ii) Atomicity,Consistency,isolation,Durability
iii)Atomicity,consistency,inconsistent,Durability iv)Atomicity,concurrency,isolation,data.
d. …………….is the delivery of computing services,servers,storage,networking etc
i. Cloud computing ii)Block chain iii)Big data iv)Machine learning
iii. Inbuilt Communication Technology iv)Ideal Conversion Technology.
e. …………protocol is used for sending e-mail message to server
i). SMTP ii) HTTP iii)FTP iv) DNS
f. Which arithmetic expressions are valid in Javascript
i).a+b =10 ii) a+b = c+d iii). 10= x iv). X=10
g. Morals are………….
i). Laws for governing bodies ii). Set of things to be done
iii). Set of standards iv) Set of standards which decide right or wrong
h. Hacking bank account related information is an example of……………
i). software piracy ii). Unauthorized access iii).Cyber law iv).fair use
i. What is updated version of the IT at 2000
i).IT act 2007 ii). Advanced IT act 2007 iii). IT act,2008 iv)IT act 2005
j. Choose the correct HTML element for the largest heading
i). <H1>…</H1> ii). <H6>….</H6> iii)<H2>…</H2> iv) <H3>….</H3>

Q4.Multiple choice question (select two option) (Each question 2 mark) (20 Marks)

a. Steps to stop software piracy ………………………


i) installing Licensed software ii)Purchase software without license
iii) Purchase software with license iv)Installing Pirated Software
b. Primary key field is
i)duplicate ii) Unique iii)Blank iv)Not Null
c. Examples of Input unit are
i) Keyboard ii) Speaker iii) OCR iv).Monitor
d. Various career opportunities available for IT professions are
i) Data center ii)Electronic publishing iii)Cyber advisor iv)Software developer
e. In Ubuntu, there are two ways to interact with the computer they are………
i) Command line Interface ii).My Interface iii)Common Interface

iv)Graphical user Interface

f. Following are relational operator used in Javascript.


i).>= ii).<= iii). ++ iv). –
g. <Script> tag can be placed inside ……or…………….section of html.
i).<title> ii). <script> iii).<head> iv).<Body>
h. Computer crime is alternatively referred to as……………,……………or hi-tech crime.
i). Laws ii). Cyber Crime iii)Cyber Law iv)E-crime
i. Following are the examples of paired tags.
i).<table> ii)<br> iii)<img> iv)<p> v)<hr>
j. One shouldn’t save your………………..and ………………….on the browser.
i). Username ii). Copyright iii). Password iv). Person

Q5.Multiple choice question (select three option) (Each question 3 mark) (6Marks)

a. Following tags used in HTML5


i) <header> ii) <footer> iii) <smaller> iv) <article> v)<novel>
b. Choose correct Output devices
i) Monitor ii) Printer iii) Keyboard iv)Speaker v)Barcode reader.

Q6. Match the following (4Marks)

A. Column A Column B

a. ls i) Logical operator

b. Primary Key ii) Cyber crime

c. && iii) list directory

d. Plagiarism iv) Uniquely identifies records.

Q7. A Write code in HTML(any one ) (5 Marks)

a. Write a program using HTML to create table with 4 rows and 3 columns.
Sr.No Input devices Output Devices
1 Keyboard Printer
2 OCR Speaker
3 Mouse Monitor
b. Write a program in HTML to create Application form and submit it with personal data like name,
gender ,address and hobbies.

Application Form

Q7. B Write a program in JavaScript (any one ) (5 Marks)

a. Write JavaScript program to accept radius and display area of circle


b. Write JavaScript program to accept string and convert it into Uppercase format using onClick
function

Q8 . Answer briefly (any 5) (10 Marks)

a. Explain paired tags in HTML, give examples. (any4)


b. Explain how Linux is different from windows .
c. Explain relational operators in JavaScript.
d. What is storage unit ?Explain types of Primary memory storage.
e. Explain Do’s to follows for students in cyber world.
f. Explain unauthorized access with its examples.
g. Write down difference between Data and information.
h. What are advantages of database.

You might also like