IT Sample Paper
IT Sample Paper
SECTION – A
2.1 An XML document can have only limited number of child elements..
2.2 A virus may corrupt or delete data on your computer.
2.3 No value is specified with ALT attribute of <IMG> tag.
2.4 ROWSPAN attribute with <TABLE > tag is used to merge more than one cell row
wise.
2.5 Unsolicited bulk emails are called spam.
2.6 Align and Valign are the attribute used with <TD> tag to set the alignment of data
in a table.
2.7 BORDER is an attribute of <A> tag.
2.8 XML stands for Extensive Markup Language.
2.9 XML is case sensitive.
2.10 Target attribute with <A> tag is used to open a link in a new window.
1
3. Carefully study the Webpage given below. Identify 10 tags (structural as well as formatting
tags) that have been utilized in creating this webpage and write the usage of each of them.
[15]
4.1 Shreenivasan is working for an IT firm where he needs to backup his data of around
200 MB to 400 MB at the end of each day. Each day backup needs to archived
separately for future reference. Suggest any two economic data backup devices,
which he can use for this purpose. [2]
4.2 Differentiate between Hacker and Cracker with reference to their intention and motive.
[2]
4.3 Name one specific software/tool for each of the following category: [5]
a. Antivirus Software
b. Data Recovery Tool
c. Online Backup Tool
d. Text Editor to create HTML pages
e. Open Source Web Browser
5. Do as directed : [10]
5.1 Draw the XML tree for code given below: [5]
<MOVIES>
<INDIAN>
<THRILLERS>
<DIRECTOR>ABC</DIRECTOR>
2
<DOR>1/10/2009</DOR>
</THRILLERS>
<FICTION>
<DIRECTOR>XYZ</DIRECTOR>
<DOR>15/10/2009</DOR>
</FICTION>
<INDIAN>
</MOVIES>
5.2 Write the HTML code to generate the following output of a table with the content exactly in
the same format as shown within the table: [5]
ADMNO SNAME NAME DOB
1110 MANJIT RANJIT 4-MAR-1988
SECTION – B
3
b) LINK
c) CELLPADDING
d) BOLD
7.2 To avoid problems while working with internet you should follow these precautions:
4
7.8 Choose the correct HTML tag to make the text bold?
a) <B>
b) <BOLD>
c) <STRONG>
d) Both a) and c)
5
c) It contains one or more elements
d) Must contain one or more elements and root element must contain all other
elements
7.14 Choose the correct HTML tag for the largest heading?
a) <H1>
b) <H6>
c) <H10>
d) <HEAD>
7.15 Out of the following, which one will be altered or modified by a computer virus?
a) Operating System
b) Speed of Network Connectivity
c) Application Software
d) All of the above
6
MARKING SCHEME
FOUNDATION OF INFORMATION TECHNOLOGY
Class X (Term II)
SECTION – A
1.1 .xml
1.2 href
1.3 quotes
1.4 <TR>
1.5 Spyware
1.6 Root
1.7 Viruses , trojans
1.8 Worm
1.9 Cracker
(1 Mark for each correct fill in the blank)
7
3. The 10 tags that have been utilized in creating the above webpage along with their
expansion and usage are as follows:
1. <HTML> - It is a structural tag used to mark the beginning and end of an HTML
document.
2. <BODY> - It is a structural tag that encloses all the visible content of a webpage.
3. <P> - It is a formatting tag used to mark the beginning of a new paragraph.
4. <U> - It is a formatting tag used to underline text on a webpage.
5. <CENTER> - It is a formatting tag used to centralize text on a webpage.
6. <H1> - It is a formatting tag used to mark text as biggest heading.
7. <IMG> - It is a formatting tag used to add inline images on a webpage.
8. <OL> - It is a formatting tag used to add numbered lists on a webpage.
9. <LI> - It is a formatting tag used to mark list items in a numbered list on a webpage.
10. <A> - It is a formatting tag used to add hyperlinks on a webpage.
(½ mark for identifying each tag and 1 mark each for their usage)
(1 mark each for correctly naming the two data backup devices)
4.2 A hacker is a person who is proficient with computers and/or programming and knows
all of the intricacies of a system. There is no illegality involved with being a hacker
whereas a cracker is a hacker who uses their proficiency for personal gains outside
of the law like: stealing data, changing bank accounts, distributing viruses etc. A
cracker is a technical person who masters the art of breaking systems to hamper the
system's security. A Hacker on the other hand breaks system to gain knowledge.
4.3 One specific software/tool for each of the following category are:
a) Antivirus Software - Vipre
b) Data Recovery Tool - NTFS-reader
c) Online Backup Tool - Dropbox
d) Text Editor to create HTML pages - Notepad2
e) Open Source Web Browser - Mozilla Firefox
8
5. MOVIES
5.1
INDIAN
THRILLERS FICTION
(5 marks for drawing the diagram correctly - 1 mark for each level and 1 mark for the
flow lines)
5.2
<HTML>
<BODY>
<TABLE>
<TR ALIGN=CENTER VALIGN=MIDDLE>
<TH>ADMNO</TH>
<TH>SNAME</TH>
<TH>FNAME</TH>
<TH>DOB</TH>
</TR>
<TR ALIGN=LEFT VALIGN=BOTTOM>
<TD>1110</TD>
<TD VALIGN=TOP>MANJIT</TD>
<TD ALIGN=RIGHT>RANJIT</TD>
<TD VALIGN=TOP>4-MAR-1988</TD>
</TR>
</TABLE>
</BODY>
</HTML>
9
(½ mark for correct usage of ALIGN attribute)
6.
<HTML>
<HEAD>
<TITLE>Eat healthy and live healthy</TITLE>
</HEAD>
<BODY LINK="Green" ALINK="Blue" VLINK="Red">
<CENTER>
<H1>
<FONT COLOR="maroon">KHAO PIYO RESTAURANT</FONT>
</H1>
</CENTER>
<IMG SRC="RESTAURANT. jpg" ALIGN="right" HEIGHT=225
WIDTH=250>
<FONT COLOR="purple" SIZE=5>
Collect information for
<UL>
<LI><A HREF="one.html">menus</A>
<LI><A HREF="two.html">reservation</A>
<LI><A HREF="three.html">catering</A>
<LI><A HREF="four.html">tours</A>
</UL>
</font>
<font size =5>
<CENTER>
<TABLE BORDER=2 BORDERCOLOR="blue" >
<font color =blue><CAPTION> Menus available are</CAPTION></font>
<TR>
<TD> 1
<TD> INDIAN
<TR>
<TD> 2
10
<TD> ITALIAN
<TR>
<TD> 3
<TD> CONTINENTAL
<TR>
<TD> 4
<TD> THAI
</TABLE>
</CENTER>
<BR>
For further enquiries and reservations <A HREF="mailto:[email protected]">Contact Us</A>
</font>
</BODY>
</HTML>
(½ mark for correct use of <HTML> tag)
(½ mark for correct use of <BODY> tag)
(½ mark for correct use of <TITLE> tag)
(1 mark for attributes of <BODY> tag)
(½ mark for correct use of <P> tag)
(½ mark for displaying the heading correctly in center)
(½ mark for correct use of <IMG> tag with the ALIGN attribute)
(1 mark for changing table border to 2 pixel thick and border color blue)
(1 mark for giving table <CAPTION> with correct colour)
(1 mark for correctly making the table)
(1 mark for correctly making the bulleted list)
(1 mark for correct use of <A> tag for creating first 3 links)
(1 mark for correctly creating the email link)
SECTION – B
11
7.5 (b)
7.6 (a)
7.7 (b)
7.8 (d)
7.9 (c)
7.10 (a)
7.11 (b)
7.12 (b)
7.13 (d)
7.14 (a)
7.15 (d)
7.16 (c)
12