100% found this document useful (1 vote)
1K views

Fyjc It Objectives

The document provides information about file and disc utilities through fill-in-the-blank questions, true/false questions, and multiple choice questions. The questions cover topics such as firewalls, file compression, disk fragmentation, viruses, and anti-virus software.

Uploaded by

Mayur Kundar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
1K views

Fyjc It Objectives

The document provides information about file and disc utilities through fill-in-the-blank questions, true/false questions, and multiple choice questions. The questions cover topics such as firewalls, file compression, disk fragmentation, viruses, and anti-virus software.

Uploaded by

Mayur Kundar
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 21

FYJC- IT

CHAPTER 5 - FILE AND DISC UTILITIES


Fill In The Blanks
1. Firewalls can be used for ___________

= Software

2. __________ Access is used for processing one record after the other.

= Sequential

3. An __________ access method is direct access

= Alternative

4. An__________ is a collection of files packaged together into one compressed file.

= Archive

5. ___________ compression is used to compress data at the time of writing onto the drive.

= Disk

6. In __________ compression, loss of information is acceptable.

= Lossy

7. In__________ compression, data is compressed without any loss of data.

= Lossless

8. __________ utility is used for compression files & transferred easily.

= Winzip

9. ___________ is the technique of converting a stream of text into coded format.

= Encryption

10. Plain text converted into ________ text using encryption.

= Cipher

11. __________ utility can be used to check the hard disk for logical and physical errors.

= Scandisk

12. The memory space is broken at the time of loaded and removed into different small
pieces is known as ______
13. _________ utility is designed to reorganize non-contiguous files into contiguous files.
14. A ________ makes copies of itself on computer.

=Fragmentation
=Disk Defragmenter
= Worms

15. ___________ Software is a program that is installed on the computer to protect


the system from viruses.
16. _______ is a barrier between two networks.

= Antivirus
= Firewall

True or False
1. Computer can store information in different forms.

True

2. Every file has a name and its referred by name.

True

3. File represents programs, source and data

True

4. Data files may be numeric, alphabetic

True

5. The files have no properties.

False

6. A direct access files are of great use for immediate access

True

7. Archives are files that contain other files.

True

8. In compression, ratio of compressed the file is 6:1

False

9. Fragment means the file is not stored in one place?

True

10. Trojan horse is used to control malicious attack on the computer.

True

11. Trap door is an open entry point into a program.

False

12. Memory resident viruses reside in the memory and eat up memory space.

True

13. Polymorphic viruses change Characteristics.

True

14. Boot sector viruses attack on the hardware.

True

15. A spyware will cause the computer to run slower.

True

Multiple Choice Question (One)


1. _________ virus attack on boot sector
(a) Boot sector virus (b) Polymorphic virus (c) Slow-fast infector virus (d) None of these
Ans: Boot sector virus
2. A ____ is piece of hardware and software that sits between the computers.
1. Firewall

2. Compression

3. Win Zip

4. Spyware

Ans: Firewall
3. ____________ utility is used to checked the hard disk for physical error.
1. Scan disk

2. Boot Disk

3. Disk defragmenter

4. None of these.

Ans: Scan Disk


4. _________ is used to convert plain text into cipher text.
1. Encryption

2. Decryption

3. Public Key

4. Private Key

Ans: Encryption
5. _________ is used to convert cipher text into plain text.
1. Encryption

2. Decryption

3. Public Key

4. Private Key

Ans: decryption
6. In _______________ compression, some loss of information is acceptable.
1. Lossy

2. Lossless

3. data

4. Dsik

Ans: Lossy
7. In ______________ compression, data is compressed without any loss.
1. Lossy

2. Lossless

3. data

4. Disk

Ans: Lossless
8. CVF stand for _________
1. Compressed volume file

2. Compress Volume form

2. Compression value format

4. Common volume file.

Ans: Compressed volume file


Multiple Choice Questions (Two)
1. ________ type of compression available for compress file and data.
1. Lossy
Ans: Lossy , Lossless

2. Lossless

3. Data

4. Disk

2. ___________ key are used for encryption and decryption.


1. Private

2. Public

3. Common

4. Cipher

Ans: Private , Public


3. ________ & _______ types are used for access the information.
1. Sequential

2. Direct

3. Straight

4. Cross

Ans:
4. __________ are Encryption utility.
1. Wincry

2. Clvercyst

3. Windowtp

4. Crywin

Ans: Wincry, Clvercyst


5. __________ types of viruses available in computer system.
1. Boot sector virus

2. Polymorphic virus 3. Commodity virus 4. Disk cluster virus.

Ans: Boot sector virus, Polymorphic virus


6. Firewall give protection for _________
1. Files

2. Software

3. Hardware

4. Folders

Ans: Software, Hardware


Multiple Choice Question(Three)
1. Approaches of antivirus is _______________
1.Detection

2. Modification

3.Transformation

4.Identification

5. Removal

Ans: Detection, Identification, removal


2. Sources of computer viruses are___________
1. Printer

2. E-mail

3. Floppy Disk

4. Network

5. Print

3. Boot sector

4. Slow & fast infector

Ans: Email, floppy Disk, Network


3. Following are the types of viruses______
1. Component resident

2. Memory resident

5. Circuit resident
Ans: Memory resident, Boot sector, Slow & fast infector
CHAPTER 6 BASIC DATABASE CONCEPTS
Fill In The Blanks
1. Any collection of related information grouped together as a single item is a__________
2. ____________ are collection of facts, unorganized but able to be organized into useful information.
3. Organization collection of related data is called _________

=database
= data
= database

4. A ________ is a graphical representation of a table.

= form

5. A ____ is a database object used to display a record on the screen for adding or editing.

= form

6. ___________ is a request presented by the user to the database and the database displays its response. = query

7. To get a specific information from a table _______ is used.

= query

8. A _________ is a request for information from one or more database tables.

= query

9. A _____ is used to search a database for a specific record.

= query

10. A ________ query display summarized information.

= crosstab

11. _______ are based on the table or query.

= reports

12. __________ are used to display records in the prescribed form.

= reports

13. A ___________ is a printable presentation of data gathered from a query on a database.

= report

14. _________ key constraints can be used to enforce uniqueness as well as referential integrity.

= primary

15. A foreign key is a field that contains a value matching another tables_________ key

= primary

16. Rows in database table are called___________ records

= records

17. ________ is a collection of fields.

= record

18. Access is a _______ database

= relational

19. To display records depending on collection ___________ is used in MS-Access.

= criteria

20._________ queries are used to display as column and row headings.

= crosstab

21. A column in a datasheet or database table is called__________

= field

22. ________ database management system supports multiuser system.


23. RDBMS stnds for______

= Relational

= Relational Database Management System

24. SQL stands for

= Structured Query Language

25. DML stands for ____________

= Data Manipulation Language

26. DDL stnds for___________

= Data Definition Language

27. DCL stnds for ___________

= Data Control Language

28. _________ is used to create, maintain and query a relational database and uses regular
English words for its commands

= SQL

29. ________ produces better security to the database compared to MS-Access

= SQL

30. Whenever you want to obtain data from a table in your database, you need to use _______ statement = Select
True Or False
1. Each column of table is related to other because they all contain same type of information.

= False

2. Access is one of the good application program for spreadsheet.

= False

3. Access is created for single user computer system.

= True

4. MS- Access is relational database management system (RDBMS)

= True

5. In Access, properties of fields are set in the design view.

= True

6. MS-Access has limitation to store the number of fields.

= True

7. Rows in database table are called fields

= False

8. YES/NO indicates true or false

= True

9. A database does not allow data validation

= True

10. Access automatically assigns a unique integer to the record when the data type is number

= False

11. A primary key is used to identify each table uniquely

= False

12. Primary key is compulsory in MS-Access

= False

13. Ms-Access can support as developer tool.

= False

14. In database application sorting is possible

= True

15. Primary key allows redundant value

= False

16. SQL stands for Stored Query Language

= False

17. SQL is multiuser computer system

= True

18. In SQL high level of security is provided

= True

19. SQL provides a high level of security than Ms- Access.

= True

20. SQL is designed for single user computer system.

= True

21. SQL is used to create a view for multi-user system so that many users can see the output

= True

22. In Ms-Access processing speed is high as compared to SQL

= False

23.DDL consists of set of commands to manipulate values, which are present in the table

= False

Multiple Choice Question(One)


1. _____ are collection of facts, unorganized but able to be organized into useful information.
(a) data

(b) information

(c) fields

(d) records

(c) fields

(d) records

Ans: (a)
2. The processed data is called__________
(a) data

(b) information

Ans: (b)
3. Primary key has importance of _______
(a) uniqueness

(b) deletation

(c) first preference

(d) none of these

Ans: (a)
4. Primary keys are __________
(a) not necessary

(b) always used

(c) only used in special circumstances

(d) none of above

Ans: (b)
5. Normalizing a database will __________
(a) help to prevent redundant data

(b) run queries automatically

(c) have no effect on the accuracy on the database

(d) none of the above

Ans: (a)
6. Primary key fields____________
(a) are assigned to only field per table

(b) is more rigid than relationship

(c) are not important in the creation of relationship between tables (d) are sometimes compound keys
Ans: (a)
7. In order to relate to tables and extract information from it, they can be linked using____________

(a) form

(b) report

(c) primary key

(d) secret key

Ans: (c)
8. Tables are ___________
(a) always stored in the same database as their forms, reports and queries
(b) Sometimes stored in separate database

(c) always available in separate

(d) none of the above


Ans: (a)
9. To display records depending on condition,________ is used.
(a) forms

(b) query

(c) report

(d) macros

Ans: (b)
10. ___________ is used to accept unique values and avoid null values
(a) unique key

(b) primary key

(c) foreign key

(d) composite key

Ans: (b)
11. A row is relational database table is called ____________
(a) tuple

(b) record

(c) entity

(d) both a & b

Ans: (d)
12. _________is generally used for multi user computer systems.
(a) SQL

(b) ACCESS

(c) ASP

(d) QBE

Ans: (a)
13. SQL statements are __________
(a) used to query unrelated tables

(b) never used in access

(c) used to query only related tables

(d) none of the above

Ans: (c)
14. _________ is the particular language for relational database management system standardized by ANSI.
(a) MS-Access

(b) excel

(c) SQL

(d) visual Basic

Ans: (c)
15. ______ language enable to create and operate on relational database.
(a) SQL

(b) VB

(c) ASP

(d) Javascript

Ans: (a)
16. Correct SQL statement is___________
(a) it is the slowest database

(b) it cannot support as a developer tool

(c) SQL is used with single-user computer system

(d) It provides security for the created tables structure

Ans: (d)
Multiple Choice Question(Two)

1. _________ are the parts of database.

(a) field

(b) dates

(c) record

(d) private key

Ans: (a) and (c)


2.________ are used to create database.
(a) Ms-Access

(b) excel

(c) ASP

(d) SQL

Ans: (a) and (d)


3. _________ are database objects.
(a) open

(b) design

(c) forms

(d) table

Ans: (c) and (d)


4. In Access, following are the attributes of fields.
(a) color

(b) alignment

(c) default value

(d) field size

Ans: (c) and (d)


5. To create a table ____________ components are a necessary requirement.
(a) description

(b) data type

(c) alignment

(d) field

Ans: (b) and (d)


6. _________ and ______ keys are used in Relational Database Management System.
(a) secondary

(b) primary

(c) foreign

(d) selected

Ans: (b) and (c)


7. Features of database.
(a) quick data analysis

(b) direct multiple sorting

(c) easy to add or delete record

(e) difficult to update record

Ans: (a) and (c)


8. Following are the SQL commands
(a) DDL

(b) DML

(c) DLL

(d) DLD

(c) select

(d) add

Ans: (a) and (b)


9. The SQL statements used are
(a) modify

(b) update

Ans: (b) and (c)


10. Correct statements about SQL
(a) it can be used with multi-user system
(c) it stands for structured question language

(b) it has limitation to store number of fields


(d)it has higher capacity to store data compare to Access

Ans: (a) and (d)


Multiple Choice Question(Three)
1. The opening screen of Ms-Access shows following options:
(a) database Wizard

(b) blank Access database

Ans: (a), (b) and (d)


2. Select the objects of Ms-Access _________

(c) datasheet view

(d)open an existing database

(a) Table

(b) Primary key

(c) Report

(d) Query

(e)View

(d) view

(e) forms

Ans: (a), (c) and (d)


3. Ms-Access database includes the following object
(a) table

(b) macro

(c) worksheet

Ans: (a), (b) and (e)


4. Different Relational Database Management System are __________
(a) Excel

(b) Access

(c) word

(d) oracle

(e) outlook express

(d) DNL

(e) DCL

Ans: (b), (d) and (f)


5. SQL commands can be categorized as________
(a) DLL

(b) DDL

(c) DML

(f) DMM

Ans: (b), (c) and (e)


CHAPTER 7 TALLY
Fill in the blanks
1. _________ is one of the most popular accounting software packages that is used to record day to day
transaction.

=Tally

2. A person who owes money to the business is_________ of the business.

= debtor

3. A person whom the business owes is _________ of the business.

=Creditor

4. Tally works on the principle of entry system.

=double

5. Golden rules of classification of accounts: __________ the Receiver, __________ the Giver.

=Debit, Crdit

6. The Gateway of Tally screen is divided into ________ parts

=4

7. In Tally,____________ keys are used into shut the company.

= Alt+F1

8. In Tally, Gateway of Tally can be activated by using Ctrl+_____ keys.

=M

9. For creating new company,_______ option is selected from company information menu.

=Create Company

10. In Tally,______ Key is used to modifying or altering company data.

= Alt+F3

11. In Tally ________ key is used to change the date

= F2

12. _________ are used for recording day to day transaction.

=Vouchers

True Or False
1. A person who owes money to the business is creditor.

= False

2. Title bar of the Tally displays information about software version, release, date and time.

= False

3. For maintaining accounts, Tally requires accounting code.

= False

4. User can delete or remove a particular company by pressing Alt+D when the company is opened
in alter mode

= False

5. In Tally, configuration option affects all companies maintained in the same directory.

= True

6. User can select more than one company at a time.

= True

7. After creating company, many cash accounts can be created.

= True

8. In Tally, button bar provides quick access to different options.

= True

9. To activate gateway of Tally press Ctrl+N as a shortcut key.

= False

10. F4 key is used to take the backup in tally.

= True

11. For shutting a company, press Alt+F3

= False

12. In Tally user cannot select more than one company at a time

= False

13. In Tally, features activated through F12 key are applicable to all companies.

= True

14. In Tally, F2 key is used to change the date.

= True

15. Alt+F2 key is used to change the period of the company

= True

16. Ctrl+F2 key is used to change the period of the company

= False

17. In Tally Alt+ P short key is used for printing

= True

18. Ledgers are very important for vouchers entries

= True

19. Ledgers can be deleted when there is no transaction recorded into ledger

= True

20. Ledgers are used for recording day to day transaction

= False

21. Vouchers are used for recording day to day transaction

= True

22. Paid salary Rs 5000. This transaction entry goes into payment voucher.

= True

Multiple Choice Questions(One)

1. Total amount invested by the proprietor is called as _________


(a) Capital

(b) Investment

(c) assets

(d) cost

Ans: (a)
2. A person who owes money to the business is called a___________
(a) Creditor

(b) debtor

(c) proprietor

(d) owner

Ans: (b)
3. _________ is short key to select any activated company.
(a) F1

(b) Alt+F1

(c) F10

(d) F2

Ans: (a)
4. Short key Alt+F1 is used for _________ company option.
(a) open

(b) copy

(c) shut

(d) select

Ans: (c)
5. Tally Provides set of _________numbers of predefined groups mainly based on the traditional methods of
accounting system.
(a) 15

(b) 28

(c) 32

Ans: (b)
6. In tally F4 functional key is used to recognize ________option.

(d) 30

(a) backup

(b) period

(c) date

(d) restore

Ans: (a)
7. To activate calculator of Tally, _______ shortcut key is used.
(a) Ctrl+N

(b) Ctrl+C

(c) Ctrl+M

(d) Ctrl+G

Ans: (a)
8. Alt+F1 key is used to which are active in desktop.
(a) Shut company

(b) Select Company (c) Delete Company (d) Alter Company

Ans: (b)
9. Which are the following is submenu under Company info?
(a) Delete Company (b) Select company

(c) Save Company

(d) Restore Company

Ans: (b)
10. To activate Gateway of tally_______ shortcut key is used.
(a) Ctrl+M

(b) Ctrl+P

(c) Ctrl+O

(d) Ctrl+G

Ans: (a)
11. Using F2 functional key ________option gets activated.
(a) Restore

(b) backup

(c) period

(d) date

(c) F12

(d) Alt+F12

(c) Payment

(d) Invoice

Ans: (d)
12. To configure a company, ______key is used
(a) F4

(b) F2

Ans: (c)
13. _________is the valid Vouchers type in Tally.
(a) Journal

(b) Receipt

Ans: (a)
14. The Entire ledger is summarized in the form of a _________
(a) Journal

(b) Balance Sheet

(c) Final account

(d) Trial Balance

Ans: (d)
15. In receipt voucher, cash A/c has _________type of balance.
(a) cash

(b) journal

(c) credit

(d) debit

Ans: (d)
16. In tally, F7 key is used to select ________ voucher type.
(a) Purchase

(b) Receipt

(c) Journal

(d) payment

Ans: (c)
17. In _______ types of voucher, only bank & cash A/c are used.
(a) Receipt
Ans: (c)

(b) Payment

(c) Contra

(d) cash

Multiple Choice Questions(TWO)


1. The features of Tally are:
(a) Price of package is high

(b) Codeless accounting package

(c) Shows monthly report with graph

(d) Very difficult to operate

Ans: (b), (c)


2. Operating Screen of Tally contains following elements:
(a) Work area

(b) Product Information

(c) Select

(d) Create

Ans: (a), (b)

3. Operating screen of Tally, shows following areas:


(a) Function button

(b) Account Info

(c) Gateway of Tally

(d) Voucher info

Ans: (a), (c)


4. Ledger is a summary of all cash and credit transaction taken from:
(a) Trial Balance

(b) Journal

(c) Balance Sheet

(d) Cash Book

Ans: (b), (d)

Multiple Choice Questions (Three)


1. Company configuration menu having the option:
(a) General

(b) Delete

(c) Numeric

(d) Voucher Entry

Ans: (a), (c), (d)


2. In tally, Company Information menu having following options:
(a) Alter Company

(b) Select Company (c) Create Company (d) Close Company

Ans: (a), (b), (c)


3. In Tally, Display menu shows following options:
(a) Trial Balance

(b) Account Books

(c) Ratio Analysis

Ans: (a), (b), (d)

Rearrange the following


1. Rearrange the following steps to create new company :
(a) Select option Create Company.
(b) Press Alt+F3 key to enter Company Info menu.
(c) Screen displays company creation menu
(d) Press Enter key to accept the details of company.
(e) Fill all the information about company
Ans: (b), (a),(c), (e), (d)
2. To select company, rearrange the following steps.

(d) Day Book

(a) Select the name of company whose books of account will be updated.
(b) Press Alt+F3 to invoke the Company info menu.
(c) Tally displays list of existing companies
(d) Select the option select company by pressing S key
(e) Now user can enter the transaction.
Ans: (b), (d), (c), (a), (e)

3. To alter and modify a company following steps are used:


(a) List of companies that have been already created will be displayed by Tally.
(b) Press Alt+F3 to invoke the Company Info menu.
(c) Select the company name and press enter.
(d) Press A key to select Alter option.
(e) Select the option select company by pressing S key
Ans: (b), (e), (a), (d), (c)

4. To delete a company following steps are used:


(a) Press A key to select Alter option
(b) Select the company name to delete from hard disk.
(c) Tally displays list of companies already created.
(d) Open Gateway of Tally.
(e) Press Alt+D
(f) Press Alt+F3 to invoke Company Info menu.
Ans: (d), (f), (a), (c), (b), (e)

5. In Tally, to display ledger, following steps are used:


(a) Select ledger from the list of accounts by pressing Enter key.
(b) From Gateway of Tally select Account Info.
(c) Select Display option from single ledger.
(d) From ledger menu select single ledger.
(e) Check and verify the list of accounts.
Ans: (b), (d), (c), (a), (e)

CHAPTER 8 HTML

Fill in the blanks


1. The abbreviation of Hyper Text Markup Language is ___________

Ans: HTML

2. Paired tag is also known as ______________ tag.

Ans: Container

3. __________ is the collection of the interrelated webpages.

Ans: Website

4. ____________ attribute of anchor tag specifies the URL of target hyperlink.

Ans: href

5. __________ tag is smallest heading tag

Ans: <h6>

6. _____________ tag is used to display the Preformatted block of text.

Ans: <pre>

7. Text is displayed as it is in a browser by using _______ tag.

Ans: <pre>

8. First page of website is known as __________

Ans: Homepage

9. The greatest value that can be assigned to the size attribute of the <FONT> tag is _____

Ans: 7

10. ___________ code is used for displaying symbol in html.

Ans: &copy;

11. __________ code is used to give a blank space.

Ans: &nbsp;

12. _________ tag is used to create hyperlinks.

Ans: <a>

13. Active link color can be set by ______ attribute

Ans: alink

14. The _____ tag is used to display enclosed text as superscript.

Ans: <sup>

15. Visited link color can be set by _____ attribute.

Ans: vlink

16. ________ attribute changes default color of hyperlink.

Ans: link

17. _____ tag is used to insert an image of web page

Ans: <img>

18. In HTML, comments can be placed within the ________ tag.

Ans:<comment>

19. ______ tag is used to scroll the text on the web page.

Ans: <marquee>

20. The default value of behaviour attribute of <marquee> tag in HTML is ______

Ans: scroll

21. The overall HTML document is written within _____ tags.

Ans: <html>

22. _____ tag is used to give a visual line break to your web document.

Ans: <hr>

23. The tag is used to give strike effect to text in html.

Ans: <strike>

24. _______ attribute is used to give color to the whole web page.

Ans: bgcolor

25. ________ element makes the text one size bigger than the previous size.

Ans: <big>

26. _____ tag is used to give a hidden line break in between two lines in a HTML document

Ans: <br>

27. Monospaced text can be viewed with the _____ physical style tag in html.

Ans: <tt>

28. ______ tag is used to give a description to the table.

Ans: <Caption>

29. ____ tag is used to display textual matter, if the browser is unable to open the image in screen Ans: alt
30. Face attribute is used in ____ tag.

Ans: <Font>

31. ______ first conceived hypertext in 1965.

Ans: Ted Nelson

32. _______ is document layout and hyperlink specification language.

Ans: HTML

33. The ______ are the instructions that are written directly into the text of the document.

Ans: tags

34. To add border size _________ attribute is used in <table> tag.

Ans: border

35. In table, rows is created by ______ tag.

Ans: <tr>

36. _______ specifies how many rows a cell should take up.

Ans: rowspan

37. _________ attribute of <A> tag is used to link within a same web page

Ans: href

38. ______ tag is used to create bulleted list.

Ans: <ul>

39. HTTP stands ________

Ans: Hyper Text Transfer Protocol

40. True type fonts can be embedded on the web page with the help of _______ tag

Ans: <font>

41. HTML code is written using special delimiters is known as ______

Ans: angle brackets

42. The symbols used with the tags are together known as __________

Ans: angle brackets

43. ________ tag is used to format the size, typerface and color of the enclosed text1

Ans: <font>

44. __________ does not allow data validation

Ans: HTML

45. _______ tag is a common supported tag used in <ol> and <ul>

Ans: <Li>

46. _________ used to display the greater than sign.

Ans: &gt;

47. _______ tag positions text on equal distance between the left and the right edges of the doc. Ans: <center>
48. ______ attribute in <HR> tag sets the color of the horizontal line.

Ans: color

49. HTML provides ______ levels of headings.

Ans: six

50. _____ is largest level of heading.

Ans: <H1>

51. ________ tag maintains the original link breaks and spacing inserted in the text.

Ans: <pre>

52. Using _____ attribute in ordered list, you can order the numbering options of the list.

Ans: start

53. The ______ tag is used to subscript the text

Ans: <sub>

54.The links created in HTML codes are called as _______

Ans: hyperlinks

55. _____ tag is used to give animation to the text in html

Ans: <Marquee>

56. The amount of spaces left between cell border and cell data can be increased with_______

Ans: Cellpadding

57. Anything between the <comment> tag is ignored only by ______ browser.

Ans: Internet Explorer

58. Default direction of marquee is _______

Ans: Right to Left

59. The _____ attribute of <font> tag changes the size of the text.

Ans: Size

60. ____ code is used for displaying < character in HTML.

Ans: &lt;

61. ____ code is used for displaying & character in HTML.

Ans: &amp;

62. ____ code is used for displaying @ character in HTML.

Ans: &#64;

63. ____ code is used for displaying symbol in HTML.

Ans: &reg;

64. ____ code is used for displaying character in HTML.

Ans: &quote;

65. ________ attribute of <Table> creates space between the cells

Ans: Cellspacing

66. ________ attribute of <Table> specifies the horizontal alignment of row or column

Ans: Align

67. ______ attribute of <td> tag specifies the number of columns that are spanned.

Ans: Colspan

68. _______ attribute gives color to the border of the table.

Ans; bordercolor

69. _______ attribute specifies the location of image

Ans: src

70. ______ tag is used to display the table heading

Ans: <th>

71. _______ tag is used to create the Bullet list

Ans: <OL>

72. _______ attribute of <Table> decides into the amount of spacing between each cell border
And the actual content of the cell
True or False

Ans: Cellpadding

1. vlink defines the color of active link in <body> tag.

Ans: False

2. bgcolor attribute used to change the text color

Ans: False

3. Background attribute is used with <body>

Ans: True

4. Perl stands for Practical Extraction report Language

Ans: True

5. In Html tables can be inserted

Ans: True

6. The thickness of horizontal line in html document cannot be changed

Ans: False

7. The hexadecimal code of the black color in html is #000000

Ans: True

8. HTML documents can be saved by .htm extension.

Ans: True

9. In HTML default font size is 3

Ans: True

10. To insert an inline image in HTML HTML the <img> tag is used.

Ans: True

11. Cols attribute is used to divide web page horizontally

Ans: False

12. VLINK is an attribute of <body> tag

Ans: True

13. The target attribute is used to display link in another window.

Ans: True

14. bgcolor is attribute of body tag

Ans: True

15. Information in HTML can not be commented

Ans: False

16. Most addresses have www after http://

Ans: True

17. <Li> tag is used to break the line

Ans: False

18. <TR> tag is used to create the table data.

Ans: False

19. Notepad is a program, which executes HTML page.

Ans: False

20. RCB uses hexadecimal numbering system.

Ans: True

21. information in HTML cannot be animated.

Ans: False.

22. RGB code is always six numbers.

Ans: True

23. In HTML can be nested.

Ans: True

24. <hr> tag displays 3 dimension bar

Ans: True

25. <S> is a physical style tag.

Ans: True

26. In HTML, tags are defined [] brackets

Ans: False

27. Tag symbol <> is utilized at the start of each HTML programming step

Ans: True

28. </> used to indicate termination of step in html document.

Ans: True

29. <p> is used to create new paragraph.

Ans: True

30. <> used to create header row

Ans: False

Multiple Choice Question (0ne)


1. A collection of linked webpage is called as ________.
(a) Website

(b) Weblink

(c) webworld

(d) Homepage

Ans: (a)
2. _______ attribute of <marquee> tag specifies the number of times the marquee to scroll.

(a) Number

(b) time

(c) repeat

(d) loop

Ans: (d)
3. Anything between tag is ignored by internet explorer _______
(a) <Ignore> (b) <tag>

(c) <comment>

(d) <body>

Ans: (c)
4. Which of the following is plain text editor.
(a) Wordpad (b) Notepad

(c) frontpage (d) Visual interder

Ans: Notepad
5. <Marquee> tag has following attribute
(a) Action

(b) start

(c) direction

(d) size

Ans: (c)
6. The language used to develop used to develop web page is
(a) HTML

(b) HTTP

(c) Browser

(d) Protocol

Ans: (a)
7. <a> tag requires ________ attribute, which specifies target URL.
(a) target

(b) src

(c) URL

(d) href

Ans: (d)
8. First page of website is called _______
(a) Webpage (b) homepage (c) front page (d) website
Ans: (b)
9. Correct syntax for adding background colour in HTML______
(a)<body bgcolour=Red> (b)<body bgcolor=Red>

(c)<body backgroundcolour=Red>

Ans: (b)
10. Correct syntax for adding background image in HTML______
(a)<body src= image.gif> (b) <body image= image.gif>

(c) <body background=image.gif>

Ans: (c)
11. <title> tag is used inside______ tag
(a) <Head>

(b) <body>

(c) outside the body tag

Ans: (a)
12. _______ is used to change the default color of a hyperlink that is already visited to the specified colour.
(a) alink

(b) Link

(c) vlink

(d) Hypertext

Ans: (c)
13. The text appearing between _____ and ______ will be displayed in italics.
(a) <I>,</I>

(b) <EM><EM>

(c) <U><U> (d) None of above

Ans: (a)

14. _____ tag is used to create new paragraph in HTML.

(a) <body>

(b) <P>

(c) <img>

(d)<para>

Ans: <P>
15. _________ code is used to create a hyperlink.
(a) <a> http: // www. w3schools.com</a>
(b) <a url= http://www.w3schools.com>w3schools.com</a>
(c) <a href = http://www.w3schools.com>w3schools.com</a>
(d)<a name= http://www.w3schools.com>w3schools.com</a>
Ans: (c)
16. The item of Unordered list is rendered by ________
(a) Alphabets (b) Special Characters

(c) Numbers (d) bullets

Ans: (d)
17. In _______ , the Broken image is shown with red color x sign.
Ans:

Internet Explorer

18. <bgsound> tag is supported in ________ Browser.


Ans: Internet Explorer.
19. _______ is an empty tag
(a) <>

(b) <OL>

(c) <Br>

(d)<HTML>

Ans: (c)<Br>
20. The default color of horizontal rule with <hr> tag is _____
(a) red

(b) green

(c) gray

(d)blue

Ans: (c)
21. To define a table row_____ tag is used
(a) <tr>

(b) <td>

(c) <row>

(d)<trow>

Ans: (a)
22. For adding image link following _______ tag is used.
(a) <p> img src= xyz.bmp</p>

(b) <a href=xyz.html><img src=micky.jpg></a>

(c) a src=xyz.html><img src=micky.jpg></a> (d) <a href=xyz.bmp>micky.jpg></a>


Ans: (b)
23. To display special characters, named entities begin with ______ symbol.
(a) @

(b) #

(c) __

(d) !

Ans: (b)
24. To horizontal line on web document ____ tag is used.
(a) <hr>

(b) <hm>

(c) <hl>

(d) <sl>

Ans: (a)
25. Anchor tag requires _____ attribute, which specifies target URL.
(a) HREF

(b) TARGET

(c) SRC

Ans: (a)
26. User can set starting value of ordered list by

(d) URL

(a) Start

(b) Type

(c) Compact

(d) Value

Ans: (a)
27. The <marquee> tag in html has attributhes.
(a) behavior

(b) bgcolor

(c) position

(d) both a & b

Ans: (d)
28. _____ tag includes blank line into the text in html document
(a) <>

(b) <tr>

(c) <br>

(d) <hr>

Ans: (c)
29. _____ A tag interprets blank space, paragraphs and line break as they appear in html source file.
(a) <pre>

(b) <tt>

(c) <html>

(d) <format>

Ans: <pre>
30. Which of the following HTML tags are related to tables.
(a) <table><tr><tt>

(b) <table><td><tr> (c) <table><td><tt> (d) <table><dt><tt>

Ans: (b)
31. The text appearing between _____ and _____ will be displayed in bold.
(a) <p>,<p>

(b) <b>,</b>

(c) <strong>,</strong>

(d) None of the above

Ans: (b)
32. The text enclosed in ______ and _____ will appear as strikethrough text.
(a) <strike>,</strike> (b)<s></s>

(c) a and b both

(d) a or b only

Ans: (c)
33. <Font> tag has following ______ attributes
(a) Type

(b) face

(c) value

(d) caption

Ans: (b)
Multiple Choice Questions (Two)
1. The align attribute is used with which of the following HTML pages.
(a) <a>

(b) <table>

(c) <marquee>

(d) <body>

Ans: (b) and (c)


2. The <marquee> tag has following attributes in HTML.
(a) Behavior (b) position

(c) Direction (d) align

Ans: (a) and (c)


3. The value of color is represented as _____
(a) #xxyyzz (where xx, yy, zz represents hex number)
(b) =xx yy zz (where xx, yy, zz represents hex number)
(c) color name
Ans: (a) and (c)
4. Which is valid physical style in HTML

(d) #EEGG (where EE,GG represents hex number)

(a) <big>

(b) <large>

(c) <small size>

(d) <i>

Ans: (a) and (d)


5. The following tags can be used as subtags for <table> tag
(a) <th>

(b) <hr>

(c) <br>

(d) <tr>

Ans: (a) and (d)


6. src attribute is used with the following tags.
(a) <frame>

(b) <img>

(c) <frameset>

(f) <marquee>

Ans: (a) and (d)


7. Following are the physical style tags
(a) <b>

(b) <ol>

(c) <em>

(d) <ss>

Ans: (a), (c)


8. Following are the attributes of <OL> tag
(a) align

(b) start

(c) type

(d) face

Ans: (b), (c)


9. Following are the attributes of <font> tag
(a) bgcolor

(b) size

(c) type

(d) face

Ans: (b), (d)


10. Following are the attributes of <hr> tag
(a) align

(b) shade

(c) width

(d) bgcolor

Ans: (a), (c)


11. Following are the attributes of <img> tag
(a) space

(b) hspace

(c) vspace

(d) size

Ans: (b), (c)


12. Following are used to define text in table cell
(a) <tt>

(b) <th>

(c) <td>

(d) <tc>

Ans: (b), (c)


13. Common attribute used in <table>, <tr> and <td> tag
(a) bgcolor

(b) color

(c) align

(d) bordercolor

Ans: (a), (c)


14. Following are the attributes of <table> tag
(a) bordercolorlight

(b) cellpadding

(c) vspace

(d) size

(c) rowspan

(d) colspan

Ans: (a), (b)


15. Following are the attributes of <th> tag
(a) bordercolorlight

(b) cellpadding

Ans: (c), (d)

Multiple Choice Question (Three)

1. The heading tags provide the alignment setting as


(a) Left

(b) Corner

(c) Center

(d) Right

(e) Bottom

(f) Top

(d) SRC

(e) MAP

(f) TARGET

(d) Black

(e) Blue

(f) Yellow

Ans: (a), (c) and (d)


2. The attributes of the <MAP> tag are as follows
(a) ALR

(b) COORDS (c) POINTS

Ans: (a), (d) and (f)


3. RGB contains following different colors
(a) Red

(b) Gray

(c) Green

Ans: (a), (c) and (e)


4. Following are the attributes of <body> tag
(a) background

(b) link

(c) color

(d) backgroundcolor (e) text

Ans: (a), (b) and (e)


5. Following are the attributes of <font> tag
(a) bgcolor

(b) size

(c) type

(d) face

(e) color

Ans: (b), (d) and (e)


6. Following are the possible value of type attribute of <OL> tag
(a) A

(b) z

(c) I

(d) 1

(e) II

(d) bgcolor

(e) size

(d) size

(e) alt

Ans: (a), (c) and (d)


7. Following are the attributes of <hr> tag
(a) align

(b) shade

(c) width

Ans: (a), (c) and (e)


8. Following are the attributes of <img> tag
(a) space

(b) hspace

(c) vspace

Ans: (b), (c) and (e)


9. Common attributes used in <table>,<tr> and <td> tag
(a) bgcolor

(b)color

(c) align

(d) border

Ans: (a), (c) and (e)


10. Following are the attributes of <table> tag
(a) bordercolorlight

(b) cellpadding

(c) vspace

(d) size

(e) bordercolordark

Ans: (a), (b) and (e)


Rearrange the following
1. The procedure to create and view HTML page
(a) Save the file with the HTML extension (b) Browse the file to view as web page
(c) Open any text editor i.e Notepad
Ans: (c), (e), (a), (d), (b)

(d) Open the bowser (e) Write appropriate HTML code.

2. The code for adding java applet.


(a) <applet code= Javaapplet.class>

(b) <html>

(c) </html>

(d) </applet>

(e) </body>

(f) <body>

(a) <img src=a.gif>

(b) </a>

(c) </body>

(d) <a href=france.htm>

(e) <body>

Ans: (b), (f), (a), (d), (e), (c)


3. Rearrange the following

Ans: (e), (d), (a), (b), (c)


4. Rearrange the following
(a) </th>

(b) <table>

(c) Information Technology

(e) <tr>

(f) </tr>

(g) </table>

(d) <th>

Ans: (b), (e), (d), (c), (a), (f), (g)


5. Rearrange the following
(a) <ol type=I>

(b) <li> <b> Web application<b></li>

(c) <li> A. Basic Tags <li>

(d) <ol type= 1>

(d) <li> B. Frame </li>

(g) <li> C. Hyperlinks </li>.

(f) </ol>

Ans: (a), (b), (d), (c), (e), (g), (f)


6. Rearrange the following
(a) <html><body>

(b) <table border=1>

(c)<tr><td>I</td><td>sac</td><td>23</td></tr>

(d) <tr><td>2</td>

(e) <td> raj </td><td>24</td></tr></table></body></hrml>


(f) <tr><th>Sr </th><th> Name</th><th>Age </th></tr>
(g)<tr><thcolspan=3>Student</th></tr>
Ans: (a), (b), (g), (f), (c), (d), (e)
7. Rearrange the following for the table containing image.
(a) <td>

(b) <img src=exam.bmp>

(e) <table border=1>

(c) <body>

(f) </table></body>

(d) </td></tr>

(g) <tr>

Ans: (c), (e), (g), (a), (b), (d), (f)


8. The code for displaying ordered list
(a) <head>

(b) <html>

(c) </head>

(g) </ol>

(h) <li> Fusion

(d) <body>

(e) </html>

(f) <ol>

(c) </html>

(d) <html>

(i) </body>

Ans: (b), (a), (c), (d), (f), (h), (g), (i), (e)
9. The code for inserting background image
(a) </body>
Ans: (d), (b), (a), (c)

(b) <body background=clouds.jpg>

You might also like