Class - X - Practical & Project File - Session - 2024-25
Class - X - Practical & Project File - Session - 2024-25
PRACTICAL FILE
CUM
PROJECT WORK
SESSION (2024-25)
Roll No:
__________ _________
Signature of Signature of
External examiner Internal examiner
_________________
Seal/ Signature of Principal
Acknowledgement
In the accomplishment of this practical file/
project successfully, many people have best
owned upon us their blessings and the heart
pledge support, this time we are utilizing to
thank all the people who have been
concerned with this project. Primarily we
would like to thank god for being able to
complete this project with success. Then we
would like to thank my principal Mrs Sarika
Sharma ma'am and our Computer science
teacher Mr. Bharat Vyas sir whose valuable
guidance has been the ones that helped us
patch this project and make it full proof
success, his suggestions and instruction has
served as the major contribution towards the
completion of this project. Then we would
like to thank our parents who have helped us
with their valuable suggestions and guidance
has been very helpful in various phases of the
completion of the practical file/ project.
S.No. Contents Page No.
1. HTML code to create static web pages.
2. HTML code to use CSS technique using external
style sheets to enforce a format in an HTML page.
3. HTML code to embed pictures, audio and videos in
an HTML page.
4. HTML code to add tables and frames in an HTML page.
5. HTML code to decorate web pages using graphical
elements.
6. HTML code to for using various HTML form elements
(textbox, radio button, password, list, etc.)
7. HTML code to create a blog discussing viruses, malware,
spam, antiviruses
8. Create a web page discussing plagiarism. List some reported cases
of plagiarism and the consequent punishment meted out. Explain
the nature of the punishment in different countries as per their
IP laws.
9. HTML code to create static web pages
10. HTML code to implement the concept of form.
____________
TEACHER'S SIGN
Program 1: HTML code to create static web pages.
Code:-
<!DOCTYPE html>
<html lang="en">
<head>
<meta charset="utf-8">
<link href="https://maxcdn.bootstrapcdn.com/bootstrap/3.3.6/css/bootstrap.min.css"
rel="stylesheet">
</head>
<body>
<div class="container">
<nav>
<ul class="nav nav-pills pull-right">
<li><a href="#">About</a></li>
<li><a href="#">Contact</a></li>
</ul>
</nav>
<ol class="breadcrumb">
<li><a href="#">Home</a></li>
</ol>
</header>
<div class="page-heading">
<h1>Page Heading</h1>
</div>
<div class="row">
<div class="col-sm-3">
<ul>
</ul>
</li>
<li><a href="#">Level 2</a></li>
</ul>
</div>
<div class="col-sm-6">
<div class="page-contents">
<h2>Sub Heading</h2>
<p>Donec id elit non mi porta gravida at eget metus. Maecenas faucibus mollis interdum.</p>
<h4>Sub Heading</h4>
<p>Morbi leo risus, porta ac consectetur ac, vestibulum at eros. Cras mattis consectetur
<h4>Sub Heading</h4>
<p>Maecenas sed diam eget risus varius blandit sit amet non magna.</p>
</div>
</div>
<div class="col-sm-3">
<h2>Login</h2>
<h2>Search</h2>
</div>
</div>
<footer class="footer">
<p class="pull-right">
</p>
</footer>
</html>
Output 1:
Program 2: HTML code to use CSS technique using external style sheets to enforce a
format in an HTML page.
Code:
<html>
<head>
<title>EXTERNAL STYLES</title>
<link type="text/css" rel="stylesheet" href="EXTERNAL.CSS" />
</head>
<body>
<h1> Using External Stylesheet</h1>
<table>
<tr>
<th>Writer</th>
<th>Primary Genre</th>
</tr>
<tr><td>Arora</td><td>Technical (Multimedia)</td></tr>
<tr><td>Roy</td><td>Fiction</td></tr>
<tr>
<td>Yunus</td>
<td>Non-Fiction</td>
</tr>
</table>
<p>Another table follows
<table>
<tr>
<th>Writer</th>
<th>Primary Genre</th>
</tr>
<tr><td>Singh</td><td>Technical</td></tr>
<tr><td>Paulo</td><td>Fiction</td></tr>
<tr>
<td>Oslo</td>
<td>Non-Fiction</td>
</tr>
</table>
</body>
</html>
Output 2:
<!DOCTYPE html>
<html>
<head>
<title>Page Title</title>
</head>
<body>
</body>
</html>
Output 3.1:
<!DOCTYPE html>
<html>
<head>
<title>Page Title</title>
</head>
<body>
</body>
</html>
Output 3.2:
<!DOCTYPE html>
<html>
<head>
<style>
img {
width: 100%;
}
</style>
</head>
<body>
</body>
</html>
Output 3.3:
<!DOCTYPE html>
<html>
<body>
<p><b>Note:</b> The frame attribute is not supported in HTML5. Use CSS instead.</p>
<table frame="box">
<tr>
<th>Month</th>
<th>Savings</th>
</tr>
<tr>
<td>January</td>
<td>$100</td>
</tr>
</table>
<table frame="above">
<tr>
<th>Month</th>
<th>Savings</th>
</tr>
<tr>
<td>January</td>
<td>$100</td>
</tr>
</table>
<table frame="below">
<tr>
<th>Month</th>
<th>Savings</th>
</tr>
<tr>
<td>January</td>
<td>$100</td>
</tr>
</table>
<table frame="hsides">
<tr>
<th>Month</th>
<th>Savings</th>
</tr>
<tr>
<td>January</td>
<td>$100</td>
</tr>
</table>
<table frame="vsides">
<tr>
<th>Month</th>
<th>Savings</th>
</tr>
<tr>
<td>January</td>
<td>$100</td>
</tr>
</table>
</body>
</html>
Output 4:
Program 5: HTML code to decorate web pages using graphical elements
Using SVG:
<!DOCTYPE html>
<html>
<body>
</svg>
</body>
</html>
Output 5:
Program 6: HTML code for using various HTML form elements like- text box, radio buttons,
checkbox, password, list, combo box.
Code:
Output:
2. For Password:
<form>
<label for="pwd">Password:</label>
</form>
Output:
3. For Radio Buttons:
<label for="male">Male</label>
<label for="female">Female</label>
Output:
4. For Checkbox:
Output:
5. For Listbox:
</select>
Output:
<select class="combobox">
<option value="Select">Select....</option>
<option value="php">php</option>
<option value="html">html</option>
<option value="javascript">Javascript</option>
<option value="CPP">CPP</option>
<option value="Python">Python</option>
<option value="vue">Vue</option>
<option value="7">Cobobl</option>
<option value="responsive">Responsive</option>
<option value="script">scripting</option>
<style>
.combobox{
padding:8px;
}
</style>
Output:
Program 7. Write a blog using HTML pages discussing Viruses, Malware, Spam and
Antiviruses.
Code:
<html>
<head>
</head>
<body background="B1.JPG">
<h1> <font color="green" size="65"><B> <U> VIRUSES </B> </U> </font> </h1>
<p> <font color="blue" size="15">A computer virus is a type of malicious software, or malware, that
spreads between computers and causes damage to data
and software.
Computer viruses aim to disrupt systems, cause major operational issues, and result in data loss and
leakage.
A key thing to know about computer viruses is that they are designed to spread across programs and
systems.
Computer viruses typically attach to an executable host file, which results in their viral codes
executing when a file is opened.
The code then spreads from the document or software it is attached to via networks, drives, file-
sharing programs, or infected email attachments.</font></p>
<br><br><br><br><br><br><br><br><br><br>
<br><br><br>
A resident virus achieves this by infecting applications as they are opened by a user.
A non-resident virus is capable of infecting executable files when programs are not
running.</font></p>
<br><br>
<p><font color="red" size="15">A multipartite virus uses multiple methods to infect and spread
across computers.
It will typically remain in the computer’s memory to infect the hard disk, then spread through and
infect more drives by altering the content of applications. This results in performance lag and
application memory running low.</font> </p>
<br><br>
<p><font color="red" size="15">A direct action virus accesses a computer’s main memory and
infects all programs, files, and folders located in the autoexec.bat path, before deleting itself. This
virus typically alters the performance of a system but is capable of destroying all data on the
computer’s hard disk and any USB device attached to it. Direct action viruses can be avoided through
the use of antivirus scanners. They are easy to detect, as is restoring infected files.</font> </p>
<br><br>
<p><font color="red" size="15">A browser hijacker manually changes the settings of web browsers,
such as replacing the homepage, editing the new tab page, and changing the default search engine.
Technically, it is not a virus because it cannot infect files but can be hugely damaging to computer
users, who often will not be able to restore their homepage or search engine. It can also contain
adware that causes unwanted pop-ups and advertisements.</font> </p>
<br><br>
<p><font color="red" size="15">Overwrite viruses are extremely dangerous. They can delete data
and replace it with their own file content or code. Once files get infected, they cannot be replaced,
and the virus can affect Windows, DOS, Linux, and Apple systems. The only way this virus can be
removed is by deleting all of the files it has infected, which could be devastating. The best way to
protect against the overwrite virus is to use a trusted antivirus solution and keep it updated.</font>
</p>
<br><br>
<p><font color="red" size="15">A web scripting virus attacks web browser security, enabling a
hacker to inject web-pages
with malicious code, or client-side scripting. This allows cyber criminals to attack major websites,
such as social networking sites,
email providers, and any site that enables user input or reviews. Attackers can use the virus to send
spam, commit fraudulent activity, and damage server files.</font> </p>
<br><br>
<p><font color="red" size="15">A file infector is one of the most common computer viruses. It
overwrites files when they are opened and can quickly spread across systems and networks. It
largely affects files with .exe or .com extensions.
The best way to avoid file infector viruses is to only download official software and deploy an
antivirus solution.</font></p>
<br><br>
<p><font color="red" size="15">Network viruses are extremely dangerous because they can
completely cripple entire computer networks. They are often difficult to discover, as the virus could
be hidden within any computer on an infected network. These viruses can easily replicate and
spread by using the internet to transfer to devices connected to the network.
Trusted, robust antivirus solutions and advanced firewalls are crucial to protecting against network
viruses.</font> </p>
<br><br>
<p><font color="red" size="15">A boot sector virus targets a computer’s master boot record (MBR).
The virus injects its code into a hard disk’s partition table, then moves into the main memory when a
computer restarts. The presence of the virus is signified by boot-up problems, poor system
performance, and the hard disk becoming unable to locate. Most modern computers come with
boot sector safeguards that restrict the potential of this type of virus.</font> </p>
<br><br><br><br><br><br><br><br><br><br><br><br><br><br>
<br><br>
<BR><BR><BR><BR><BR><BR><BR><BR><BR><BR><BR><BR>
<br><br><br>
<p><font color="red" size="15">Is the most common type of malware that can execute itself and
spread by infecting other programs or files.</font> </p>
<br><br>
<p><font color="red" size="15">It can self-replicate without a host program and typically spreads
without any interaction from the malware authors.</font> </p>
<br><br>
Once activated following installation, Trojans can execute their malicious functions.</font> </p>
<br><br>
<p><font color="red" size="15">It collects information and data on the device and user, as well as
observes the user's activity without their knowledge.</font> </p>
<br><br>
<p><font color="red" size="15">It infects a user's system and encrypts its data. Cybercriminals then
demand a ransom payment from the victim in exchange for decrypting the system's data.</font>
</p>
<br><br>
<p><font color="red" size="15">It obtains administrator-level access to the victim's system. Once
installed, the program gives threat actors root or privileged access to the system.</font> </p>
<br><br>
<br><br>
<p><font color="red" size="15">It tracks a user's browser and download history with the intent to
display pop-up or banner advertisements that lure the user into making a purchase. For example, an
advertiser might use cookies to track the webpages a user visits to better target advertising.</font>
</p>
<br><br>
<p><font color="red" size="15">It track nearly everything a user does on their computer. This
includes emails, opened webpages,programs and keystrokes.
<br><br><br><br><br>
<p> <font color="blue" size="15">Spam(stupid pointless annoying malware, for instance) is any kind
of unwanted, unsolicited digital communication that gets sent out in bulk. Often spam is sent via
email, but it can also be distributed via text messages, phone calls, or social media.</font> </p>
<br><br>
<br><br>
<p><font color="red" size="15">Phishing emails are a type of spam cybercriminals send to many
people, hoping to “hook” a few people. Phishing emails trick victims into giving up sensitive
information like website logins or credit card information.
</font> </p>
<p><font color="red" size="15">Spoofed emails mimic, or spoof, an email from a legitimate sender,
and ask you to take some sort of action. Well-executed spoofs will contain familiar branding and
content, often from a large well-known company such as PayPal or Apple.</font> </p>
<br><br><br><br><br>
<p> <font color="blue" size="15">Antivirus software is a type of program designed and developed to
protect computers from malware like viruses, computer worms, spyware, botnets, rootkits,
keyloggers and such. Antivirus programs function to scan, detect and remove viruses from your
computer. </font> </p>
<br><br>
<br><br>
<br><br>
<br><br>
<br><br>
<br><br>
<br><br>
<br><br>
</body>
</html>
OUTPUT:
Program 8 : Create a web page discussing plagiarism. List some reported cases of
plagiarism and the consequent punishment meted out. Explain the nature of the
punishment in different countries as per their IP laws.
Code:
<html>
<head>
<title>PLAGIARISM</title>
</head>
<body bgcolor="#808080">
<p><font color="red" size="15">Plagiarism means using someone else’s work without giving them
proper credit. In academic writing, plagiarizing involves using words, ideas, or information from a
source without citing it correctly.
<br><br><br><br><br><br><br><br><br><br>
<br><br><br>
<p><font color="blue" size="15">Copying parts of a text word for word, without quotation
marks</font></p>
<p><font color="blue" size="15">Quoting so much from a source that it makes up the majority of
your text</font></p>
<p><font color="blue" size="15">Reusing work you’ve submitted for a previous assignment, without
citing yourself</font></p>
<p><font color="blue" size="15">Submitting a text written entirely by someone else (e.g., a paper
you bought from a ghostwriter)</font></p>
<BR><BR><BR><BR><BR><BR><BR><BR><BR>
<br><br><br><br>
<br><br>
<br><br>
<p><font color="red" size="15">means rephrasing someone else’s ideas to present them as your
own.</font></p>
<br><br>
<p><font color="red" size="15">means stitching together parts of different sources to create your
text.
<br><br><br><br><br><br><br><br>
<font color="green" size="45"><B> <U> REPORTED CASES OF PLAGIARISM AND THE CONSEQUENT
PUNISMENT METED OUT</B> </U> </font>
<br><br>
<p><font color="red" size="15">In 2006, Kaavya Viswanathan published a young adult book. It was
later discovered that Viswanathan plagiarized heavily from books by Megan McCafferty, among
others.
Viswanathan claims that the plagiarism was unintentional. However, her book was recalled from
stores and taken out of print and Viswanathan lost her contract for a second book.</font> </p>
<br><br>
<p><font color="red" size="15">Jonah Lehrer recently resigned as a writer for the New Yorker after
he was caught self-plagiarizing on a number of occasions and fabricating quotes for a book.</font>
</p>
<br><br>
<p><font color="red" size="15">Doris Kearns Goodwin is a historian who won the Pulitzer Prize in
1995. It was later discovered that Goodwin plagiarized in her 1987 book, The Fitzgeralds and the
Kennedys.
Once her plagiarism was discovered, Goodwin had to leave her position as a guest pundit on the PBS
NewsHour program and resigned from the Pulitzer Board.</font> </p>
<br><br>
</body>
</html>
OUTPUT:
Program 9: HTML code for implementing the external style sheet concept (CSS).
Code:
<html>
<head>
</head>
<body>
<p>
It's never too late to start over. If you weren't happy with yesterday, try something different today.
Don't stay stuck. Do better.
<ul>
</ul>
</p>
</body>
</html>
Output:
Program 10: HTML code to implement the concept of form.
Code:
<HTML>
<BODY>
</P>
<P>Person's NAME:
</P
<P>Password:
</P>
</P>
</SELECT>
</P>
</P>
<P>Comments : <br>
<TEXTAREAS ROWS = "5" COLS = "50" NAME = "comments"> This is text that can be defaulted
into the text areas field </TEXTAREA>
</P>
<P>
</P>
</FORM>
</BODY>
</HTML>
Output:
PROJECT
HTML CODE TO CREATE A WEBSITE USING SEVERAL WEBPAGES
Code:
<!-- 1 -->
<!DOCTYPE html>
<html>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1">
<link rel="stylesheet" href="https://www.w3schools.com/w3css/3/w3.css">
<body>
</body>
</html>
<!-- 2 -->
<!-- Navigation -->
<nav class="w3-bar w3-black">
<a href="#home" class="w3-button w3-bar-item">Home</a>
<a href="#band" class="w3-button w3-bar-item">Band</a>
<a href="#tour" class="w3-button w3-bar-item">Tour</a>
<a href="#contact" class="w3-button w3-bar-item">Contact</a>
</nav>
<!-- 3 -->
<!-- Slide Show -->
<section>
<img class="mySlides" src="img_la.jpg" style="width:100%">
<img class="mySlides" src="img_ny.jpg" style="width:100%">
<img class="mySlides" src="img_chicago.jpg" style="width:100%">
</section>
<!-- 4 -->
// Automatic Slideshow - change image every 3 seconds
var myIndex = 0;
carousel();
function carousel() {
var i;
var x = document.getElementsByClassName("mySlides");
for (i = 0; i < x.length; i++) {
x[i].style.display = "none";
}
myIndex++;
if (myIndex > x.length) {myIndex = 1}
x[myIndex-1].style.display = "block";
setTimeout(carousel, 3000);
}
<!-- 5 -->
<section class="w3-container w3-center" style="max-width:600px">
<h2 class="w3-wide">THE BAND</h2>
<p class="w3-opacity"><i>We love music</i></p>
</section>
<!-- 6 -->
<section class="w3-container w3-content w3-center" style="max-
width:600px">
<p class="w3-justify">
We have created a fictional band website. Lorem ipsum dolor sit amet,
consectetur adipiscing elit, sed do eiusmod tempor incididunt ut labore
et dolore magna aliqua.</p>
</section>
<!-- 7 -->
<section class="w3-row-padding w3-center w3-light-grey">
<article class="w3-third">
<p>John</p>
<img src="img_bandmember.jpg" alt="Random Name" style="width:100%">
</article>
<article class="w3-third">
<p>Paul</p>
<img src="img_bandmember.jpg" alt="Random Name" style="width:100%">
</article>
<article class="w3-third">
<p>Ringo</p>
<img src="img_bandmember.jpg" alt="Random Name" style="width:100%">
</article>
</section>
<!-- 8 -->
<!-- Footer -->
<footer class="w3-container w3-padding-64 w3-center w3-black w3-
xlarge">
<a href="#"><i class="fa fa-facebook-official"></i></a>
<a href="#"><i class="fa fa-pinterest-p"></i></a>
<a href="#"><i class="fa fa-twitter"></i></a>
<a href="#"><i class="fa fa-flickr"></i></a>
<a href="#"><i class="fa fa-linkedin"></i></a>
<p class="w3-medium">
<!-- 9 -->
Powered by
<a href="https://www.demowebsite.com/w3css/default.asp" target="_blank"
>w3.css</a>
</p>
</footer>
<!-- 10 -->
<link rel="stylesheet" href="https://cdnjs.cloudflare.com/ajax/libs/fon
t-awesome/4.6.3/css/font-awesome.min.css">
Output: