KENDRIYA VIDYALAYA SANGATHAN

pogonotomyeyrarΔίκτυα και Επικοινωνίες

26 Οκτ 2013 (πριν από 3 χρόνια και 11 μήνες)

644 εμφανίσεις

1







AGRA REGION


Cumulative Learning Outcome (CLO)


CLASS XI
I



Informatics Practices


Convener

Mr. Mune
sh

Kumar

PRINCIPAL

Kendriya

Vidyalaya

No. 3 Agra Cantt,Agra

Contributors:

1.

Mr. AjeetYadav, PGT CS KV Murena

2.

Mr.
MukeshVerma, PGT CS KV NO.2 Agra Cantt

3.

Mr. Rahul Dev, PGT CS, KV No. 1 AFS Agar

4.

Mr. Sushil Kumar, PGT CS KV Mathura Cantt, Mathura

5.

Mr. Sushil Kumar, PGT CS KV Talbehat

6.

Mr. A. H. Khan, PGT CS KV Baran

KENDRIYA VIDYALAYA SANGATHAN

2



Table of Content

Sno.

Title

Page Number

1

Chapter 1

3

2

Chapter 2

12

3

Chapter 3

1
6

4

Chapter 4

21

5

Chapter 5

27

6

Chapter 6

30

7

Chapter 7

37

8

Chapter 8

40

9

Chapter 9

44

10

Chapter 10

47

11

Chapter 11

50

12

Chapter 12

56

13

Chapter 13

60

14

Chapter 14

65

15

Chapter 15

76

16

Chapter 16

78

17

Chapter 17

85

18

Chapter 18

91



3






4


Chapter 1

Networking and Open Standards

1)

A __________ is a set of computers that can be interconnected by one or more
transmission paths.

a)

Network


b) Topology

c)

ftp


d) IP Address


2)


A computer that facilities the sharing of data, software and hardware resources
on the network is called_________.

a)

Client

b) Dump Terminal

c) Printer

d) Server

3)

_________ refers to the ways in which the nodes of a network are physically
connected together
.

a)

Network Device


b) Network Topologies


c) Wireless Network


d) Bluetooth

4)

Advantages of networks are:
-

a)

Sharing Resources



b) Sharing Software


c)

Sharing Storage



d) All of These

5)

A 6 bytes of address with each byte separated by a colon, which refers
to:

a)

MAC Address


b) IP Address

c) Domain Name

d) url

6)

How we can trace a computer on worldwide network by:

a)

Domain Name

b)IP Address c) Mac Address

d) NIC

7)

What is the unique thing is assigned to a website?

a)

IP address

b) Domain Name c) URL


d)

Both B & C

8)

_________ refers to the process of obtaining corresponding IP address from a
domain name:

a)

Domain Name Resolution


b)

Domain Name


c) URL





d)

Media Access Control Address

9)

A small network that are confined to a loacalised area i.e. building, office, scho
ol
etc.

a)


LAN





b)

WAN

c)

WWW




d)

Network Topology

10)

In which topology a single cable is used, through which all data propagates and
which all nodes are connected are:
-

a)Ring Topology





b) Tree topology

c) Bus topology





d) Star topology

11)

Which topolo
gy is designed with each node connected directly to the server via
Hub or Switch:

5


a) Ring Topology





b) Tree topology

c) Bus topology





d) Star topology

12)

Which are the devices that sends the data directly to the computer rather than
everywhere within
the network.

a) Repeaters






b) Switch

c) Hub






d) Routers

13) Which devices that amplifies a signal being transmitted on the network?


a) Repeaters






b) Switch

c) Hub






d) Routers

14) The cable Television network is a example of:


a) LAN






b
) WAN

c) MAN






d) PAN

15) Sahil of Class X is sending some media files on Sajal’s mobile over Bluetooth ,
which type of networks he formed by them:

a) LAN






b) WAN


c) MAN






d) PAN

16) Which of them is not a internet Service?


a) E
-
mail






b) T
elNet


c) Video Chatting





d) Photo Morphing

17) A special type of cable i.e. CAT 5 or CAT 6, used in specific type of LAN is _______


a)USB Cable





b) Optical Fiber


c) VGA Cable





d) Ethernet Cable

18) Which transmission media guarantees a secured
transmission?


a) Telephone cable




b) Radio Waves


c) Coaxial Cable





d) Fiber Optics

19) Which transmission offers mobility?


a) Micro wave





b) Radio Wave

6



c) Coaxial Cable





d) Telephone Cable

20) In which transmission, Line of sight occurs?

a)

Micro wave





b) Radio Wave


c) Coaxial Cable





d) Telephone Cable

21) Which are the examples of Unguided Media (Wireless)?


a) Infrared






b) Laser


c) Bluetooth





d) All of these

22) The network devices that amplifies and restores the signal for
long distance
transmission?

a) Repeaters






b) Switch

c) Hub






d) Routers

23)The Network Device that is connected to connect two dissimilar networks?


a) Repeaters





b) Switch

c) Gateway






d) Routers

24) A system that is designed to prevent unaut
horized access to or from a private
network is:


a) Firewall






b) Proxy Server


c) Bridge






d) Router

25) Which Network Device works on MAC addresses& follows the same protocol to
connect different LAN segments?


a) Bridge






b) Router

c)

Gateway





d) Switches

26) Which Network Device works on IP Addresses&handle different protocols to
connect multiple networks?

a) Bridge






b) Router

c) Gateway






d) Switches

27) ___________ refers to unauthorized access of someone else’s data, email,
comput
er activity, or data communication.

7



a) Snooping





b) Eavesdropping


c) Firewall






d) Denial
-
of
-

service

28) The act of secretly listening/intercepting someone else’s private
communication/data/information is called.


a) Snooping





b) Eavesdropping


c) Firewall






d) Denial
-
of
-

service

29) The attacks that prevents the legitimate user of the system, from accessing or using
the resources, information or capabilities of the system are called.

a) Snooping





b) Eavesdropping


c) Firewall






d) Deni
al
-
of
-

service

30)Which of the following are the types of computer Networks?


a) LAN, WAN, NAN




b) WAN, ring,star, bus


c) Social Network




d) PAN, Internet, LAN, WAN

31) Which of the following in not a list of computer topologies?


a)star, bus, ring






b) star, ring , graph


c) Common bus, double ring, hexagon


d) ring, mesh, star, bus

32) Which network topologies has a central device, which brings all the signals
together?

a) Bus



b) star


c) ring


d) hybrid

33) Which network topologies require ter
minators at the end of lines?

a) Ring



b) bus


c) star


d) mesh

34) What topologies provides each device with a point to point connection to every
device in the network?

a) Hierarchical


b) bus


c) star


d) mesh

35) On a network, this is your computer’s

unique hardware number.


a) IP address


b) Mac Address

c) IMEI Number

d) SIM

36) The common threats to computer security are:


a) Virus

b) Spywares

c) adware


d) all of these

8


37) How we can protect a computer from common security threats:


a) Installat
ion of antivirus

b) Regular updating of Operating System


c) Firewall Setup



d) all of these

38) Neha is confused about this address 00:A3:03:51:0E:AC , which type of address is
this?

a) IP address

b) Mac Address

c) URL

d) Domain Address

39) Most
commonly used Search Engine ?

a) Google

b) You tube

c) Opera Mini

d) Mozilla

40) KV Agra is planning to connect all computers, each spread over distance within 40
meters. Suggest an economical cable type having reasonable high speed data transfer,
which

can be used to connect these computers:


a) Ethernet Cable

b) Coaxial Cable

c) Fiber Optics

d) USB Cable

41) Which of the following unit measures the speed with which data can be transmitted
from one node to another node of a network?

a)Mbps


b)kmph


c
)MGps

d) mph

42) Mrs. RiyaSahay wants to prevent unauthorized access to/from his company’s local
area network. Write the name of the system, which he should install to do the same.


a) Gateway


b) Firewall


c) Router


d) Bridge

43) Which of the following
is not a feature of a networking?

a) Resource sharing

b) Uninterrupted Power supply

c) Reduced cost


d) Reliability

44) Why would you prefer Switch over Hub?


a) High Speed



b) Communication with full Bandwidth


c)

Data packets



d) all of these

45) N
umbered address ( 4 parts separated by periods) of a website is called its
____________.

a. URL

b. IP Address

c. Web Address


d. Domain name

46) _____________ is said to be the future of Internet.

a. Intranet


b. Andriod


c. Interspace

d. Web drives

9


47) A
________ is a set of standardized rules for data packets, techniques for detecting
and correcting errors & so on.

a. Responsibility


b. IP Address

c. Protocol


d. Rules



Chapter No.
-
1

Home Assignment


Q1.Which of the following are types of computer

networks?

(a)

LAN,WAN,MAN

(b)

WAN , ring, star, bus

(c)

Old boys’ network, business associates

(d)

PAN, INTERNET, LAN, WAN


Q2. Which of the following is NOT a list of network topologies?

(a)

Star, Bus, Ring

(b)

Star, Ring, Hybrid

(c)

COMMON BUS, DOUBLE RING, HEXAGON

(d)

Ring, mesh,
star, bus.


Q3. Which network topology has a central device, which brings all the signals together?

(a)

Bus


(b)


STAR



(c)

Ring



(d)

Hybrid


Q4. Which network topology requires terminators at the ends of the lines?

(a)

Ring


(b)


BUS



(c)


star



(d)


mesh


Q5. What topology
provides each device with a point


to point connection to every
other device in the network?

(a)

Star


(b)


Bus



(c)


MESH


(d)

Hierarchical


Q6. A ……… is a number of computers linked together to allow them to share data and
/ or other resources.


Q7. What is being desc
ribed here: pairs of copper wires twisted around each other.


Q8. This cable uses light to transmit data instead of magnetic signals.


Q9.Which network topology has a central device which brings all the signals together?

10


a)

Bus

b)

Mesh

c)

Ring

d)

Hybrid

Q10.Which
network topology requires terminators at the ends of the line?

a)

Ring

b)

Bus

c)

Star

d)

Mesh

Q11.What topology provides each device with a point to point connection to every other
device in the network?

a)

Star

b)

Bus

c)

Mesh

d)

Hierarchical


Q12.What is being described here: pairs of copper wires twisted around each other.

a)

Optical cable

b)

Fiber cable

c)

Fiber optic cable

d)

Twisted pair cable

Q13 On a network, this is your computer’s unique hardware number.

a)

URL

b)

IP address

c)

MAC address

d)

Domain name

Q
14.Small computer networks that are confined to a localized area are called____?

a)

WAN

b)

MAN

c)

LAN

d)

PAN

Q15.MAN refers to

a)

Mega area network

b)

Metropolitan area network

c)

Mini area network

d)

Medium area network

11


Q16. Which of the following layer is not in OSI model?

a)

Physical layer

b)

Internet layer

c)

Network layer

d)

Transport layer


Q17. Collection of interconnected network sometimes called?

a)

Internet

b)

Wireless network

c)

Mobile network

d)

None of these


Q18. HTTP refers to ?

a)

Hypertext transfer protocol

b)

Hypertext transmission
protocol

c)

Hypertext tie protocol

d)

None of these

Q19. The mappings of keyboard’s keys to specific characters are known as

a)

Phonetic text

b)

Transliteration

c)

Keymap

d)

Vorbis

Q20. Which of the following is not a features of MYSQL?

a)

Open source

b)

Multithreaded

c)

Multiuse
r

d)

BSD style

Q21. Term for unauthorized access of someone else data, email, computer activity,
data communication is?

a)

Snooping

b)

Eaves dropping

c)

DoS attacks

d)

None of these

Q22. Which of the following satandards is open standard?

12


a)

AIFF

b)

ASX

c)

RM

d)

SVG

Q23. Which of
the following set of values can be assigned to a Boolean variable?

a)

Yes and no

b)

True and false

c)

High and low

d)

Zero and one

Q24. The smallest individual unit in a program is

a)

Expression

b)

Token

c)

Keyword

d)

Identifier

Q25. Execution of multiple cases after matching ta
ke place in a switch statement is

a)

Jump statement

b)

Looping statement

c)

Fall through

d)

Loop termination

Q26. Which of the following is not a component level container?

a)

jButton

b)

jLabel

c)

jRadioButton

d)

jDailogBox

Q27. What does getPassword () on a password field
returns?

a)

A string

b)

An integer

c)

A character array

d)

A character

Q28. An _________ class is the one that simply represented a concept and whose
objects can’t be created.

a)

Abstract

b)

Public

c)

Array

d)

Method

13



Chapter


2

FREE AND OPEN SOURCE SOFTWARE

1)

Which one is not the feature of free software

a) Freedom to run the program for any purpose.

b) Freedom to redistribute copies.

c) Freedom to study how the program works only and will not to modified.

d) Freedom to improve the program and release your imp
rovements to the public


2) Which software is free of cost but itssource code is not available?


a) FSF

b) GNU


c) Freeware


d) Proprietary software


3) Which software is neither open nor freely available?



a) FSF

b) Shareware

c) Freewa
re

d) Proprietary software


4) In which software after a certain period of time,license fee should be paid?



a) LINUX

b) Freeware

c) Shareware

d) FSF


5) Which software is a freeware and a free internet software suite that include a web
browser,
Email/IRC clientand HTML editor as well?



a) Mozilla

b) LINUX

c) Apache server


d) Netscape navigator


6) Which is the most popular open source database system and is part of world’s
popular set of LAMP program?



a) PostgreSQL

b) MySQL

c) Pango

d
) LINUX


7) Open source softwares are modifiable because



a) They are freely available



b) Source code is freely available



c) They are free to run



d) License is available

8) Standards for which users have to buy license to use them are?


a) Open
standards (ODF)

b) OGG Vorbis

c) Proprietary software

d)
PDF

9) When we type Indian language words in Phonetically in English script and tool will
convert them into corresponding language words is called as:

14



a) Transliteration


b) Keymap based entry

c
) phonetic based entry


d) Both a and c

10) _________ provides a unique number for every character, no matter what the
platforms, no matter what the program, no matter what the language?

a) OGG Vorbis

b) Unicode


c)ASCII


d)ISCII

11) Unicode can repres
ent ______ characters?

a) 65536


b)94999


c)94140


d) 90000

12) __________ is a new audio compression format which is open format and is
completely free?

a) OGG Vorbis

b) APE

c) MP3

d) WMA

13) ________ refers to unauthorized access to someone else’s data,

email, or computer
activity?

a) Snooping

b) Eavesdropping

c) Hacking


d) Cracking

14) ASCII stands for :

a) American standard code for information interchanging

b) American standard code for information interchange

c) American suitable code for informa
tion interchanging

d) American suitable code for information interchange.



15) The Indian script included in Unicode

a. Devnagri b. Telguc. Kannada d. All

16) A programming language primarily for server side applications and developing
dynamic web
content.


a. MySQL

b. LAMP

c. PHP

d. Linux

17) It refers to freely available file format for saving and exchanging office document
such as spreadsheets, database charts & presentation:


a. MS Office

b. PDF

c. ODF

d. DBMS


18)”Free Libre Open Source Software” is the full form of


a)

FLOSS

b)FOSS

c) OSS

d) FSF

15


19) Which of following is used as freely available operating system,which we can use it,
modify it & redistribute it.


a) Tom cat


b) LINUX


c) OSS

d) W
indow 7

20)SDLC stands for


a) System Development Life Cycle


b) Software Development Life Cycle


c) Software Developers Life Cycle


d) System Developers Life Cycle

21) Open Type Font is a _______ bits font.


a) 8


b) 1
6

c) 32


d) 64

22)The features that differentiate free software with freeware is/ are:


a) Modification in program


b) Availability of source code


c) Study how the program works


d) all of the above

23) In freeware the word “FREE” denotes:


a) Free

Availability through internet


b) Freedom to use, study, redistribute, and modify the software


c) Both a and b


d) None of the above

24) Example of shareware are :


a) MS
-
office

b) Avast antivirus


c) Adobe Photoshop


d) ALL

25) Which of them is

not a freeware/ OSS :


a) Open Office

16



b) MS Office


c) Linux


c) MySQL

Q26. Expand the following terms:
-

(i) SDLC

(ii) FlOSS


(iii) DDLC

(iv). GUI

(v) GNU

Q27. Which is not a Web Browser:
-

(i) Mozilla

(ii) Google Chrome

(iii) Windows Explorer

(iv) Netscape
Navigator

Q28. Which is a proprietary software:
-

(i) Open Office (ii) Fire Fox (iii) MS Office (iv) GNU





17


Chapter 03

Revision Tour I

1.

Which generation does Java programming language belongs:


a. Ist Generation

b. IInd Generation


c.

IIIrd Generation

d. IVth Generation

2.

The original name of Java was


a. Sun Java

b. C#


c. Oak

d. JDK

3.

What is true about java:


a. Platform Independent

b. Programming Language


c. Both Platform Independent &
Programming Language

d. Database

4.

Java solves the problem of platform independence by using


a. Source Code

b. Object Code


c. Machine Code

d. Byte Code

5.

The Process of converting a source code into machine code is called


a. Coercion

b. Compilation


c. Conversion

d. Execution

6.

The characteristics of Java Programming include(s):


a. Platform Independence

b. Object oriented Language


c. WORA

d. ALL

7.

Which code is not produced by Java compiler


a. Byte Code

b. Source Code


c. Native Executable code

d. None

8.

Programs
written in Java are compiled by Java Byte Code, which is then
interpreted by a special Java Interpreter which is known as


a. Java Virtual Machine

b. Java Byte Code


c. Java Compiler

d. Java Development Kit

18


9.

The ___________is a machine instruction for

a Java processor chip (JVM)
which is independent of the computer system it has to work upon


a. Java Virtual Machine

b. Java Byte Code


c. Java Compiler

d. Java APIs

10.

The per
-
programmed tools or controls used to visually design the interface
of
application.


a. Controls

b. Containers


c. Rapid Application
Development tool

d. Java APIs

11.

WORA denotes


a. Programs need to be written
once, which can be run
(executed) again on same
platform.

b. Programs need to be written once,
which can be run

on different platform
with slight changes.


c. Programs need to be written
once, which can be run on
different platform without any
changes.

d. Programs need to be written once,
which can be run again on same
platform without any changes.

12.

IDE
stands for


a. Integrated Developers
Environment

b. Integrated Development Environment


c. Inclusive Developers
Environment

d. In
-
built Development Environment

13.

Which is not a salient features of Netbeans IDE:


a. Free, Open Source

b. Cross platform

with JVM


c. Rapid Application Development
tool

d. CUI builder

14.

The primary workspace within which GUI design takes place in the IDE


a. GUI builder

b. Palette


c. Code Editor Window

d. Inspector window

15.

The Components objects as Text field, labels, list boxes etc. that are drawn
19


on frame to get data input or to display output.


a. Controls

b. Containers


c. Palette

d. Frames

16.

The window where we write Java code (i.e. statements, constants and
declaration) in our application.


a. GUI builder

b. Properties Window


c. Code Editor Window

d. Inspector window

17.

Example of GUI Application is


a. DOS

b. Windows BIOS


c. C++

d. MS Office

18.

In Event driven programming


a. The program does not

follow a
predetermined path

b. Executes different code sections
depending upon which events have
occurred.


c. The program responds to
user’s events

d. All of these.

19.

Events can occur through


a. Messages

b. User actions as mouse click, key
press


c. by executing program.

d. Window API’s

20.

The control which hold other controls within it.


a. Container Controls

b. JFrame


c. Child Controls

d. Widget (Window gadget)

21.

To design a Form which provide options i.e. to select various food items,
Rahul of Class XI will selects the following controls:


a. Check Box

b. List Box


c. Radio Button

d. Text Field

22.

Though Check box & Radio Button are same in functionality, yet there
is/are true as a difference between both of them :
-

20



a. Check box
is used to select
only one option

b. When a radio button is selected, all
other radio button in its group are
automatically unselected.


c. Radio button is used to select
multiple options

d. It is necessary to select at least one
check box from a given ch
oice.


23.

Hari of Class XI is confused, while designing GUI Form in order to give
choice as to select stream i.e. Science, Commerce or Humanities, which
control is best suitable to use:


a. Check Box

b. Label


c. Radio Button

d. Text Field

24.

The
major components that add functionality to GUI are


a. Event

b. Event Listener


c. The source of the Event

d. All

25.

When user clicks on a button, the button’s _________________ will
execute some code in respond to user’s action.


a. Event

b. Event
Listener


c. The source of the Event

d. Focus

26.

The component where the event occurred, is the ______________ of the
event.


a. Message

b. Event Listener


c. The source of the Event

d. Focus

27.

A component that can display multiple lies of Text.


a. Check Box

b. Label


c. Text Area

d. Text Field

28.

Label is different from Text Field as


a. Label can display colored text

b. Label displays uneditable text.


c. Label can display multiple line

d. Both controls are same.

29.

The attributes of
graphical controls

21



a. Method

b. Event


c. Properties

d. Class

30.

A program that is oriented around a GUI responding to events from the user
is called


a. Event Listener

b. Event driven


c. Event handler

d. Event source




22


Chapter 04

Revision Tour


I
I

1.

How many bytes does a Unicode character covers


a)

2 bytes


b)3 bytes


c) 4 bytes

d)1 bytes

2.

To refer to a particular Unicode character which escape sequence is used


a)
\
n

b)
\
u


c)
\
t

d)
\
a

3.

What is the smallest individual unit of a
program


a)variable

b)label


c) tokens

d) button

4.

Which of the following are tokens


a)keywords


b) literals



c) Punctuators

d) all of above

5.

Which of the following are not tokens?


a)keywords


b) literals


c) Punctuators

d) Variables

6.

What is null character?


a)

Keyword

b)

Literals


c)

Null literal

d)

B & C

7.

Which of the following are reserved words


a)

True

b)

False


c)

NULL

d)

All of the above

8.

Is java case sensitive?


a)

Yes

b)

No


c)

Partially Yes

d)

Partially NO

9.

Which kind of token is used to create fundamental building block of the
23


program?


a)

Keywords

b)

Identifier


c)

Literals

d)

Operators

10.

Which of the following is valid identifier?


a)

KV
-
AGRA

B) 12CLASS


c) break

d) RollNumber

11.

Literals are referred as:


a)variable

b) constant


c) labels

d) button

12.

What are integrals literals


a)

Whole number with fractional parts

b)

Whole number without
fractional part


c)

Whole number with irrational part

d)

Whole number with
rational part

13.

Which of the following are integer literals


a) Decimal

b)

Octal


c)

Hexadecimal

d)

All of the above

14.

Decimal integer literals do not begins with


a)

+1

b)

+


c)

-
1

d)

0

15.

Octal integer literals start with


a)

0

b)

1


c)

2

d)

3

16.

Octal integer literals should not
contain


a)

9

b)

0


c)

1

d)

4


24


17.

Hexadecimal integer literals are preceded by


a)

0x

b)

1


c)

2

d)

16

18.

Which pair of character is only used only for hexadecimal constants.


a)

0
-
9, A
-
F

b)

0
-
9, a
-
g


c)

0
-
8, a
-

d

d)

1
-
8 , A
-
X

19.

Unlike integer literals real literals contains


a)

Negative Part

b)

Fractional part


c)

Irrational Part

d)

Complex part

20.

A character Literals must be contained in


a)

Single Quotation Mark (‘)

b)

Punctuation Mark (!)


c)

Asterisk Sign (*)

d)

Hash Sign (#)

21

How can we represent a non
-
graphic character?


a)

String
Literals

b)

Escape Sequence


c)

By inverted comma

d)

By curly braces

22

String literals are surrounded by :


a)

Single inverted comma

b)

Double inverted
comma


c)

Backslash

d)

Colon

23

Java provides _______________ primitive data types:


a)

2

b)

3


c)

6

d)

8

24

Which of the following is not a reference data type:


a)

Classes

b)

Arrays

c)

Interface

d)

int

25.

A reference data type is used to store ________ address of an object.


a) memory

b) base

25



c)

none of the above

d)

all of the above

26.

Range of char is


a)

0
-
36589

b)

0
-
36897


c)

0
-
65536

d)

0
-
65538

27.

What is the value of a reference data element in java


a)

Address of a memory

b)

Value within memory


c)

A & B

d)

None of these

28.

A reference is called _____________.


a)

Enumeration

b)

Union


c)

Pointer

d)

None of the above

29.

A variable

is a :


a)

Named memory location

b)

Pointer


c)

Base address

d)

None

30.

Which method returns the current text stored in the text based GUI Component


a)

Parse() method

b)

getText() method


c)

None of these

d)

All of these

31.

Whose value of the following can be cannot be changed during program
execution.


a)

Variables

b)

Base address

c)

Constant

d)

Memory address

32.

Prefix increment and decrement operator uses
-


a)

Use then change rule

b)

Both A & D

c)

None of these

d)

Change then use rule

33

Evaluate this









if y=8 :


a)

21

b)

25

c)

27

d)

26

26


34

(4==4) || (5==8) Results into _________ because __________.


a)

True, second condition is true

b)

False, Second
condition is false

c)

True, both are true

d)

True, first is true

35

What is the Short hand

method for increasing the value of A by 10


a)

A=A+10

b)

A++

c)

A+=10

d)

All of the above

36

Why (?:) is also ternary operator


a)

It requires two operands

b)

It Requires three
Operands


c)

It requires 4 operands

d)

None of all

37

Which of the following operator can be

used to cast a value to the specified
type:


a)

Dot (.) operator

b)

( ) operator

c)

(type)

d)

New operator

38

How many types of expression are there:


a)

Three

b)

Four

c)

Six

d)

Eight

39

Which function returns smallest whole number greater than or equal to x


a)

Floor x

b)

rint x

c)

ceil (x)

d)

abs(x)

40

Process of converting one predefined data type into another is called


a)

Type casting

b)

Coercion


c)

Type conversion

d)

None Of These

41

A group of zero or more statement between balance braces is called


a)

Methods calls

b)

Empty
statement


c)

Block

d)

Coercion

27



42

Which of the following is a null statement


a)

Int i=0;

b)

;


c)

return x;

d)

void main()

43.

Which method is used to store or change text in a text based GUI Component

a)

Parse() method

b)

getText() method


c)

JOptionPane.showMessageDialog()

d)

setText() method

44

Reserved words represented by


a.

Identifier

b.

Void


c.

Keyword

d.

int

28


Chapter
05



Revision Tour II


1.

Why Program flow control statements are used?


a) To make repetitive actions

b) to make decisions


c.
Both of them

d. None of them

2.


Program flow control includes


a. Selection Statements

b. iterations statements


c. Jump Statements

d. All

3.

Selection Statement means?


a)Execution of statements
depending upon conditional test

b) Execution of
statements depending
upon total lines of program


c) Repetition of set of statements
depending upon condition test.

d. Execution of statements sequentially.

4.

Iteration Statement means?


a)Execution of statements
depending upon conditional test

b)
Execution of statements depending
upon total lines of program


c) Repetition of set of statements
depending upon condition test.

d. Execution of statements sequentially.

5.

Java provides two type of selection statements:


a. If and If … Else if
=
b⸠ff=
and⁓w楴捨
=
=
挮c䙯爠rnd=th楬e=op
=
c. While and Do … while loop
=

=
An⁡汴e牮r瑩te⁴o⁉f⁳=atemen琠楳
=
=
a. If … else if
=
b⸠䍯Cd楴楯ia氠lf
‿=㨠F
=
=
挮cpw楴捨⁓瑡tement
=
d⸠_o瑨=b…⁣
=

=
then⁡n⁩f
J
e汳攠s瑡temen琠楳ieva汵l瑥d㨠=
=
=
a⸠佮汹⁴he⁣=de=
a獳oc楡ied⁷楴i=
楦=o爠瑨e⁣=de⁡獳o捩慴ed⁷楴i=
e汳攠exe捵瑥sⰠneve爠ro瑨
=
b⸠_o瑨=exe捵瑥猠a琠the⁳=me⁴imeK
=
=
挮c佮汹⁩==exe捵瑥猠a汷ays
=
d⸠on汹⁥汳攠exe捵瑥猠a汷ays
=
29


8.

The braces ( { } ) are not required if _______ statements follows if or else.


a. O
nly one

b. Two


b. Three

d. None


9.

If we put a semicolon after the test condition in If statement,


a. The if statement ends there

b. The statements following are no more
part of If in such cases.


b. Infinite loop

d. Error occurs

10.

An if that
has another if in its if’s body or in its else’s body:


a. If … else

b. If ….. else if


c. Nested If

d. Dangling If

11.

This problem arises when in a nested if statement, number of ifs is more
than the number of else clauses.


a. If … else

b. If …..
else if


c. Nested If

d. Dangling If

12.

What is wrong about Conditional operator ( ? : )


a. Offers more concise, clean
and compact code

b. Can not be used in nested form


c. Generally used to conceal the
purpose of code.

d. an alternative to
If..else if statement.

13.

When a break statement is encountered in a switch statement, Program
execution jumps to


a. outside of switch statement.

b. Next following case


c. Default case

d. Exit the program

14.

The difference between If and switch
is/are


a. Switch can test for equality
only whereas if can evaluate a
relational or logical expression

b. Switch can not handle floating point
tests.


c. Swicthcan not handle ranges.

d. All

30


15.

Can a switch be nested?


a. Yes

b. No


c. Never

d.
Always

16.

The fall of control to the following cases of matching case (when break is
missing) , is called


a. If … else

b. If ….. else if


c. Fall


Through Problem

d. Dangling If Problem


17.

Java provides following loop(s):


a. For Loop

b. While
loop


c. Do..while loop

d. All

18.

Which one is Exit control loop


a. For Loop

b. While loop


c. Do..while loop

d. All

19.

Which one is Entry control loop


a. For Loop

b. While loop


c. Do..while loop

d. Both a & b

20.

In this type of loop, the
test expression is evaluated before entering into a
loop


a. Entry Controlled loop

b. Exit Controlled loop


c. Both

d. None

21.

In this type of loop, the test expression is evaluated after entering into a
loop


a. Entry Controlled loop

b. Exit
Controlled loop


c. In all loops

d. None



31


22.

In this type of loop, there are fixed number of iterations:


a. For Loop

b. While loop


c. Do..while loop

d. All

23.

The element that are the parts of a For loop:


a. Initialization

b. Condition/ Test
Expression


c. Update Expression

d. All

24.

The element that are the parts of a While loop:


a. Initialization

b. Condition/ Test Expression


c. Update Expression

d. All

25.

Ram Mohan Kapoor of Class XI has a task to computer factorial of a given
number, which flow of control is best suitable to be used by him to solve this
problem:


a. Selection Statements

b. Iterations statements


c. Jump Statements

d. Sequential Statements

26.

Varsha has written statement as :
for (j=20; j>=0;
--
j);

Identify t
he loop.


a. Infinite Loop

b. Empty Loop


c. Endless loop

d. None

27.

An infinite For loop can be created by omitting the _____________.


a. Break

b. Condition/ Test Expression


c. Update Expression

d. Both b and c

28.

Multiple initialization &

Update expressions can be given in a


a. Comma (,)

b. Semi Colon (;)


c. Pipe (|)

d. Increment/ decrement operator

29.

Which is optional expression in a for loop:


a. Initialization

b. Condition/ Test Expression


c. Update Expression

d. All are
optional but semi
-
colon
must be written.

32


30.

Which one of them runs at least once, from listed loops:


a. For Loop

b. While loop


c. Do
-
while loop

d. All

31.

A _____________ is the part of program within which you can access the
variable.


a.
Scalability

b. Variable Scope


c. Global Scope

d. Local Scope

32.

This loop(s) is/are more suitable in the situations where it is not known
before
-
hand when the loop body terminate.


a. For Loop

b. While loop


c. Do
-
while loop

d. Both b and c

33.

To
perform an unconditional branch, these statements are used:


a. return

b. Break


c. Continue

d. All

34.

The ___________ statement enables a program to skip over part of the
code.


a. return

b. Break


c. Continue

d. All

35.

Instead of forcing
termination, the __________ statement skips the rest of
the loop statements & causes the next iteration of the loop.


a. return

b. Break


c. Continue

d. All




33


MCQ/Graded Questions

Chapter 6: Classes And Libraries

Q 1) Which of the following is not a
feature of Object Oriented Programming?

a. Inheritance


b. Data Overloading

c. Polymorphism


d. Objects

Q 2) java.lang is a________

a)Class


b) Package

c) Method

d)Object

Q 3) Which one is default access specifier

a) public

b) private

c) protected

d)
package

Q 4) Identify which of the following are not valid examples of method overloading?

a. round()



b. substring()

c. subStr()



d. getText()

Q 5). Which of the following statements about the Java language is true?

a. Both procedural and OOP are sup
ported in Java

b. Java supports only procedural approach

c. Java supports only OOP approach

d. None of the above

Q 6) . Which of the following is an Abstract class?

a. JTextArea



b. String

c. Math



d. JFrame

Q 7). Which statements is not true about ob
jects?

a. Object is an instance of a class

b. Object is capable of storing data

c. Each object has its own copy of methods

d. None of the above

Q 8). An OOP concept of having a method with same name but different no. of


parameters or different
type of parameters is known as:

34






a. Method Overriding

b. Method Overloading




c. Method Invocating

d. Method Labelling



Q 9). Which of the following statement is true?

a. A super class is a subset of a sub class

b. class Second extends First means

First is a sub class

c. class Second extends First means Second is a super class

d. None of the above

Q 10) . Which feature(s) of Object Oriented Programming is illustrated in the following
code snippet:

String str1 = "Welcome to", str2 = "Java " ,str3=”P
rogramming”;

String C = str1 + str2+ str3;

int num1 = 10, num2 = 20;

int num3 = num1 + num2;

a. Method Overloading


b. Inheritance

c. Operator Overloading


d. None of the above


Q 11) Which method is used to extract a no.of characters from a string in Ja
va:



a. subStr()



b. substring()

c.getString()



d. subString()

Q 12) Which of the following method(s) does not accept any parameters?

a. charAt()



b.toLowerCase()

c. compareTo()


d. All of the above

Q 13) Which statement is true about the trim()

function?

a. The trim() method is used to trim a string by removing spaces from one side

b. The trim() method is used to trim a number by removing zeroes

35


c. The trim() method is used to trim a string by removing spaces from both sides.

d. The trim() metho
d is used to trim a string by removing extra characters.

Q 14) Which of the following is not a valid method of the String class?

a. length()



b. concat()

c. replace()



d. reverse()


Q 15) Which class contains set of mathematical functions and
constants?

a. Number


b. String

c. Math


d. Integer

Q 16) ____________ class objects are immutable and _______ class objects are
mutable.



a. String, StringBuffer


b.StringBuffer, String


c. Stringbuffer,String


d. string, StringBuffer

Q17. To calculate
x

to the power
y

we use function


a. Math.power(x,y)



b.power(x,y)


c. Math.pow(x,y)



d, pow(x,y)

Q18. The output of the following statement is


Math.round(
-
1.5)


a. 1





b. 0


c.
-
1





d. None of these

Q19. Packages are ________
_____


a. group of interrelated classes

b. set of classes and objects


c. a & b both




d. None of these.

Q20. Packages and their classes are imported through


a. use command



b. import command


c. Access command


d. None of these

Q21. _______ class ob
ject represents a specific instant in time.

36



a. Date




b Time


c. both a & b




d. None of them

Q22. What is the value of
result

after execution of the following code?



int count =5;


String S=”My String”;


StringBuffer result= new
StringBuffer(S.length() * count + “9”);


a. 99





b. 18


c. 53





d. 459

Q23. What will be the values of
X

and
Y

respectively after executing the following
code snippet?



StringBuffer S= new StringBuffer(25);


S= “Question Bank”;



int X= S.length();



int Y= S.capacity();



a. 13 and 13



b. 14 and 13


c. 25 and 25


d. 13 and 25

Q24. Objects can not have its own copy of


a. Local data members

b. Static data members


c. Final data members

d. Public data members

Q25. Math.ceil
(235.65) will return


a. 235



b. 236


c.235.70



d.None of these



37


Answer Key

1.

b.

2.

b.

3.

d

4.

c

5.

c

6.

c

7.

c

8.

b

9.

d

10.

c

11.

b

12.

b

13.

c

14.

d

15.

c

16.

a

17.

c

18.

c

19.

c

20.

b

21.

a

22.

d

23.

d

24.

b

25.

b






38


CHAPTER
-
7

CONCEPT OF INHERITANCE

Q1. If
there exist one base class and one derived class than this inheritance known as


a)

Class inheritance b) single inheritance c) Hybrid inheritance d) Object
inheritance

Q2.
. If
there exist two base class and one derived class than this inheritance know
n as

a)

Multiple inheritance b) single inheritance c) Hybrid inheritance d) Object
inheritance

Q3.
. If
there exist one base class and multiple derived class than this inheritance
known as

a)

Hierarchical inheritance b) single inheritance c) Hybrid i
nheritance d) Object
inheritance

Q4
. If
there exist combination of two or more inheritance known as

a)

Multiple inheritance b) single inheritance c) Hybrid inheritance d) Object
inheritance

Q5
.
the transitive nature is shown by

a)

Multiple inheritanc
e b) single inheritance c) Hybrid inheritance d) multilevel
inheritance

Q6 The class whose features are to be inherited is known as

a)Abstract class b) Derived Class c) Base Class d) friend class

Q7. If a class inherited privately than what

would happen to the Public member of
base class in derived class.

a)

Becomes public b) becomes private c) become friendly

Q8. Which type of inheritance is not supported by java.

a)Single b) Multiple c) Multilevel d) hybrid

Q9 If no access specifier is mentioned in class than by default it is

a)

Private b) Protected c) friendly d) Public

Q10. Private members of class can be accessible in

a)sub class b) non subclass c) all of them d)None of these

39


Q11. Public m
embers of class can be accessible in

a)sub class b) non subclass c) all of them d)None of these

Q12. Protected members of class can be accessible in

a)sub class b) non subclass c) all of them d)None of these

Q13. Friendly members of c
lass can be accessible in

a)sub class b) non subclass c) all of them d)None of these

Q14.I f methods of both base class and derived class in java having same signature
then this property known as

a)container ship b) Aggregation c) Inheritance

d) Method overriding

Q15 .Why we use inheritance

a)

To reuse existing class b) To elaborate a class c) to define a class d) None

Q16.If a functions are having same name with different behavior arguments known as

a)

Overriding b) inheritance c) Polymorphism

Q17. The example of polymorphism is

a)

Function overloading b) Constructor c) Package

Q18.The class whose object can not be created is known as

a)

Abstract Class b) Derived Class c) Base class

Q19

Constructor of Super class is not inheritable in

a)

Super class b) Sub class c) All

Q20. A Class animal has a sub class Mammals which of the following is true
-

a)

Class Mammal can have no sub class

b)

Class Mammal can have no other parent than animal

c)

Class
animal can have at most one sub class

d)

Class Mammal can have no sibling class.

Q21 State True or False

a)

A Sub Class inherits both member variables and member methods of super class

b)

A Class created with keyword abstract can have at most one object

c)

Over loading and overriding are similar concepts in java

d)

Java supports single inheritance only at multiple level of inheritance

e)

Interface are used for multiple inheritance

40


ANSWER KEY

1


B

2


A

3


A

4


C

5


D

6


C

7


D

8


D

9


C

10


D

11


C

12


A

13


A

14


D

15


A

16


C

17


A

18


A

19


B

20


B

21



A


T

B


F

C


F

D


T

E


F






41


CHAPTER
-
8

GUI Dialogs and Tables

Q1.Write the import statement required for using Joption pane Class


a)import Javax.Swing.JOption pane


b) import Javax. JOption pane

c) import Swing.JOption pane


d) import Java.Swing.JOption pane


Q2. How would you obtain Table model of a table MYTab1


a)MYTab1.Model()

b) MYTab1.getModel()

c) MYTab1.getTable()

d) MYTab1.getValueof Table()


Q3.What is th
e Function of JDialog


a)

Provide a variety of built in dialog style

b)

b) General purpose dialog

c)

Dialog for choosing color

d)


Dialog for choosing file

e)


Q4.Suresh want to get the input through Dialog but he is confused to choose the
following help him out to c
hoose the correct option


a)confirm dialog


b) Input dialog

c) Message Dialog


d) option Dialog


Q5. What is the message type property of JOption pan Dialog if input value is
-
1


a)JoptionPane .Error_Mesage()


b) JOptionPane.Plain_Message()

c)JOptionPane .Warning _Message()


Q6. What is the message type property of JOption pan Dialog if input value is 0


a)JoptionPane .Error_Mesage()


b) JOptionPane.Plain_Message()

c)JOptionPane .Warning _Message()

42



Q7 What is the message type property of J
Option pan Dialog if input value is 2


a)JoptionPane .Error_Mesage()


b) JOptionPane.Plain_Message()

c)JOptionPane .Warning _Message()


Q8 What is the message type property of JOption pan Dialog if input value is 1


a)JoptionPane .Error_Mesage()


b) JO
ptionPane.Plain_Message()

c)JOptionPane .Information_Message()

Q9. What is the message type property of JOption pan Dialog if input value is 3


a)JoptionPane .Question_Mesage()


b) JOptionPane.Plain_Message()

c)JOptionPane .Warning _Message()


Q10.What
is the function of getColumnCount()
---


a)

Return the number of row in the table

b)

Return the cell value at row and column

c)

Return the number of columns in the table

d)


Q11 What is the function of getRowCount()
----


a)

Return the number of rows in the table

b)

Retur
n the cell value at row and column

c)

Return the number of columns in the table

d)


Q12 Q10.What is the function of getModel()
-


a)

Return the number of row in the table

b)

Return the cell value at row and column

c)

Return the table model that provides the data displ
ayed by this JTable

d)


Q13.Which syntax is use to remove a row from table



a)<Default
-
table
-
model
-
object>.removeRow(<row’s index number>)

b) )<Default
-
table
-
model
-
object>.Rowsremove(<row’s index number>)

c) )<Default
-
table
-
model
-
object>.Rowremove(<row’s
index number>)


Q14
. What is showConfirmDialog ( ) method of JOptionPane class do ?

43



A: This method displays a dialog with several buttons and returns as int option
type

corresponding to the button pressed ( mostly one from Yes, No or Cancel)

B: This metho
d displays a dialog to the button pressed ( mostly all from Yes, No and
Cancel)

C: This method displays a dialog with several buttons and returns as Char option
type

corresponding to the button pressed ( mostly one from Yes, No or Cancel)



Q15. What is sh
owInputDialog ( ) method of JOptionPane class do ?


A: It displays one buttons : OK and Cancel.

b: It displays two buttons : OK and Cancel.

c: It displays three buttons : OK ,YES and Cancel.

d: none of these


Q16. What is the use of a dialog created with J
Dialog


A: The dialog created with JDialog can not be customised in any form the user wants.

B: The dialog created with JDialog can be customised in any form the user wants.

C: none of these


Q17. What is the USE a dialog created with

JOptionPane?


A:
JDialog, a window’s default cloasing behaviour is available with minimize,

maximaize buttons.

B: JDialog, a window’s default cloasing behaviour is available with minimize buttons.

C: JDialog, a window’s default cloasing behaviour is available with minimiz
e,

maximaize and close buttons.

D: none of these


Q18.Which syntax is use to Add a row in a table



a)<Default
-
table
-
model
-
object>.addRow(<row’s index number>)

b) )<Default
-
table
-
model
-
object>.Rowsadd(<row’s index number>)

c) )<Default
-
table
-
model
-
objec
t>.Rowadd(<row’s index number>)


Q19. Can you add or remove rows in a JTable object



a)Yes



b)No


c) None


d) both a and b

44



Q20 Can you insert /remove rows from an existing table
-



a)Yes



b)No


c) None

d) both a and b


ANSWER KEY


1


A

2


B

3


B

4


B

5


B

6


A

7


C

8


C

9


A

10


C

11


A

12


C

13


A

14


A

15


A

16


B

17


C

18


A

19


B

20


A









45


Graded Questions

Chapter 9: Java Database Connectivity


Q1. ____________ is used to develop the Front
-
End of an application.

a. GUI



b. Database

c. Table



d. None of the above

Q2.

The ____________ method is used to move to the next row of the result set.

a. next()



b. findNext()

c. movenext()


d. forward()

Q3. The ______________ method is used to retrieve data from a t
able.

a. execute()



b. queryExecute()

c. query()



d. executeQuery()

Q4. Which of the following class libraries are required for setting up a connection with
the database and to retrieve data?

a. DriverManager


b. Connection

c. Statement



d. All of t
he above

Q5. next() method belongs to which class ?



a. Connection


b. Statement


c. ResultSet



d. None of them

Q6. The _____________ is required to establish connectivity between the Java code
and the MySQL database.

a. JDBC API



b. JDBC Driver

c
JDBC DriverManager

d. All of the above


Q7. To execute SQL statements, you need to instantiate a ____________object using
the ______________ object.

a. Connection , Statement



46


b. Statement, Connection

c. JDBC Driver, Statement

d. JDBC DriverManager, Sta
tement


Q8. Which of the following statement is not correct?


a. rs.getString(“EmpCode”);

b. rs.getString(1);


c. rs.getInteger(2);



d. None of these

Q9. absolute(n) function is used to

a.

to move the cursor at the nth row irrespective of its current posit
ion.

b.

to move the cursor at the nth row respective of its current position.

c.

None of these

Q10. relative(n) function is used to

a.

to move the cursor at the nth row irrespective of its current position.

b.

to move the cursor at the nth row respective of its curren
t position.

c.

None of these


Q11. ODBC connectivity can be done with _______ language


a. Java




b. C++


c. Any





d. Python

Q12. By default port number of Local Host is


a. 3305




b. 3306


c. 3308




d. 3380

Q13. All the classes required for connectivity

are present in the Package


a. util





b. sql


c. lang





d None of these

Q14. The name of JDBC driver used for Connectivity of java with MySQL is


a. MySQL Connector/J


b.DriverManager


c. Conection




d.None of these

Q15. Condsider the Statement

47





Connection conn= DriverManager.getConnection


(“jdbc:mysql://localhost:3306/sample”,”KVS”,”Schools”);


What is sample, KVS, schools in the above statement.


a. username,database,password

b. database,tablename1,tablename2


c. da
tabase,username,password

d. None of these




Q16. What is not the work of the Close() method

a.

it disconnect the database resources

b.

it reset the ResultSet

c.

It close the connection between front end and backend.

d.

It close the Statement Object.




Answer Key


26.

a.

27.

a.

28.

d

29.

d

30.

c

31.

d

32.

b

33.

c

34.

a

35.

b

36.

c

37.

b

38.

b

39.

a

40.

c

41.

b




48


Chapter 10

Web Application Development

1

What does HTTP stands for:

(a) Hyper Text Transfer Protocol (b) High Text Transmission Protocol

(c) Higher Text Topology Protocol (d) Hyper Transfer Text Platform.


2

The Value of #FFFFFF is

(a) Black (b) White

(c) Red (d) None of the Above

3

The Value of #000000 is

(a) Black (b) White

(c) Red (d) None of the Ab
ove

4

What does SMTP means?

(a)

Simple Mark transmission program (b) Single mail Transfer Protocol

(c ) Simultaneous Mail Transfer Protocol (d) Simple Mail Transfer Protocol.

5

___________ is a repository of information linked together from points all over
the
world.

(a)The WWW (b) HTTP (c) HTML (d) None of the above

6

Which protocol is used to transfer file on a network?

(a) FTP (b) HTTP

(c) SMTP (d) All of these.

7

Which one is not a Web Browser?

(a)
Mozilla Firefox (b) Netscape Navigator

(c) Opera (d) None of the above.

8

What is full form of URL?

(a) Universal resource Locator (b) Uniform Resource locator

(c) Universe Route Locator (d) None of

These.

49


9

In a URL, the __________ is the full name of the file where the information is located.

(a) protocol (b) host (c) path (d) address

10

A Computer that navigates/requests for information is called.

(a) Server (b) Client

(c)protocol (d) All

11

What is DNS?

(a) Digital Naming System (b) Domain Navigation Server

(c ) Domain Name System (d) Digital novel server

12

A fixed

content document that is created and stored in a server. The client can get

a
copy of the document only.

(a) Static (b) active (c) Dynamic (d) None of the above

13

A technology that creates and handles dynamic documents.

(a) GIC (b) CGI (c) GCI (d) None of the Above

14

Dynamic documents are
sometimes referred to as __________ documents.

(a) Client
-
site (b) Server
-
site (c) both a and b (d) none of the above

15

Which protocol is used to send e
-
mail?

(a) HTTP (b) SMTP (c) FTP (d) TCP/IP

16

Server is:
-----

(a) Service provider

(b) Requester

(c) Both (d) None

17

Client is:
-------

(a) Service provider (b) Requester

(c) Both (d) None

18

Which is a Search
Engine?

(a) Google (b) Google Chrome

(c ) Mozilla Firefox (d) Netscape Navigator

19

Select the URL from given example.

(a) www.newslearning.com (b) abcd@gmail.com

50


(b) http://www.newslearning.com/index.ht
ml” (d) None of the Above

20

What does .com signifies in www.yahoo.com:

(a) Commercial (b) Educational

(c) Government (d) None of the Above

Answer Key

1

a

2

b

3

a

4

d

5

a

6

a

7

d

8

b

9

c

10

b

11

c

12

c

13

b

14

b

15

b

16

a

17

b

18

a

19

b

20

a


51


Chapter
-

11 HTML
-
I

================================================

Q1)

Full form of HTML is?

a)

Hyper Text Mark up language

b)

Hyper Text Machine up language

c)

Higher Text Mark up language

d)

Hyper Text Machine
language


Q2) What is use of TITLE tag in HTML?

a)

Set the tittle of web page

b)

Set the horizontal line in web page

c)


Increase the size of font

d)

Set the background color of web page

Q3)

Which is not true for HTML?

a)

Web Page Layout Language

b)

Hyperlink
Specification Language

c)


Markup Language

d)

Word Processing Tool

Q4)

Which one is not the heading type in Html?

a)

H1

b)

H2

c)


H8

d)

H6


Q5)
HTML Container Elements require a ……………..Tag .

a)

Starting tag

b)

Ending Tag

52


c)

Both

d)

None

Q6.Which one is not example of container tag.

a)

<
HTML> Tag

b)

<Head> Tag

c)

<br>

d)

<Title>

Q7.Which one is not example of Empty tag.

a)

<Head>

b)

<hr>

c)

<br>

d)

<img>

Q8…………………….Property of body tag set the background of web page.

a)

Bgcolor

b)

Background

c)

Text

d)

Link


Q9. Which of the following tag is used to set text as paragraph?

(a)

<p>

(b)


<br>

(c)

<hr>

(d)

<h1>


Q10. Which of the following tag is used to insert horizontal Line ?


(a) <p>


(b)<br>


(c)<hr>


(d)<h1>

53


Q11. Which of the following prop
erty is used to set the back ground color of document
?

(a)

face

(b)

bgcolor

(c)

background

(d)

lmg


Q12. Size attribute of <Basefont> tag can have absolute value between .

(a)

1
-
5

(b)

1
-
7

(c)

1
-
9

(d)

1
-
10


Q13. Which of the following tag identifies the document as an HTML


Document ?

(a)

<body>

(b)


<head>

(c)

<html>

(d)

<title>


Q14.
Comments in HTML are given by special……………..and………………….


markup element
.

(a)


//………………………….. //

(b)


<!
--

--

>

(c)


/ * ………………………………….. */

(d)

-

-


Q15.
………………………require a starting as well as an ending tag .

(a)

Empty element

(b)

Container element

(c)

BaseFont tag

(d)

BR tag



Q16.In which section of HTML document do you enter the <title> element.

(a)

Body Section

54


(b)

Footer Section

(c)

Style Sheet

(d)

Head Section


Q17.Which
tag in HTML is used to to print H
2
in HTML web page.

(a)

<sup> </sup>

(b)

<sub> </sub>


(c )<b> </b>


( d) <I > </i>



Q18.Which tag in HTML is used to to print H
2

in HTML web page.

(a)

<sup> </sup>

(b)

<sub> </sub>


(c )<b> </b>


( d) <I > </i>



Q19.Which one of the following is the HTML tag used to insert a horizontal


rule.



(a)

<h1>

(b)

<hr>


(c )<rule>


( d) <br>


Q20.Which escape sequence
character is used in html code to display & on web page.

(a)

&nbsp;

(b)

&amp;

(c)

&lt;

(d)


&gt


Q21.Which escape sequence character is used in html code to display < on web page

(a)

&nbsp;

(b)

&amp;

(c)

&lt;

(d)


&gt



Q22.Which escape sequence character is used in html code to display > on web page.

(a)

&nbsp;

(b)

&amp;

(c)

&lt;

(d)


&gt





55


Q23.
-----------------
Tag contain the information about document title,script used,Style
definition.

(a)


<body>

(b)


<head>

(c)

<html>

(d)

<font>

Q24. Vlink a
ttribute of Body tag refer to ……………………..

(a)active link

(b)visited link


(c) current page

(e) previous page

Q25. alink attribute of Body tag refer to ……………………..

(a)active link

(b)visited link


(c) current page

(e) previous page



56


QNO

Answer

1

A

2

A

3

d

4

c

5

c

6

c

7

A

8

B

9

A

10

c

11

B

12

B

13

C

14

B

15

B

16

D

17

B

18

A

19

B

20

B

21

C

22

D

23

B

24

B

25

A

57


Chapter No.
-
12

HTML


II

Q1. Name the tag of which is used in making a list

(i) OL


(ii) IL


(iii) DT


(iv) RT

Q2. Name
the tag which is not used in making a list

(i) LI


(ii) UL


(iii) DD


(iv) TR

Q3. Following tag used as a table construction tag

(i) Table

(ii) TR

(iii) Only (i)

(iv) Both (i) & (ii)

Q4. Correct code to add a logo picture is :
-

(i) <IMG SRC = “C:
\
Myp
ictures
\
logo.jpg” height


“400” width = “300” ALT = “KVS
Logo”>

(ii) <Picture SRC “C:
\
Mypictures
\
logo.jpg” height


“400” width = “300” ALT = “KVS
Logo”>

(iii) <IMAGE = “C:
\
Mypictures
\
logo.jpg” height


“400” width = “300” ALT = “KVS Logo”>

(iv) <body
background= “C:
\
Mypictures
\
logo.jpg” height


“400” width = “300” ALT =
“KVS Logo”>

Q5. What is use of a Named Anchor?

(i) It create a bookmark

(ii) It create a link to HTML Document

(iii) It helps in navigating to a link in a section inside HTML document

(iv) All of Above

Q6. Which is not a type of hyperlink

(i) External hyperlink

(ii) Internal Hyperlink

(iii) Local Hyperlink

(iv) Source
Hyperlink

Q7. Which attribute in the table used to control the distance between the cells

(i) Cell Margin

(ii) Cell
Spacing

(iii) Cell padding

(iv) Cell Reverence

Q8. What is not use of <A> tag?

(i) To create a link to another HTML document, by using the HREF attribute.

58


(ii) Not help to send a Email

(iii) To Navigate the website.

(iv) To create a bookmark inside a We