Recents in Beach

JESUS & MARY ACADEMY

Test Paper 1 ( based on chapters 1, 2, 3, 4, and 5)


 

A.     Tick the correct answers.                                                                         Page_no.: 76, 78.

1.     The base of decimal number is

a.     16.

b.     10.

c.      2.

Answer : (c. ) 2

2.     A network that is private to an orgainisation is known as

a.     Intranet.

b.     Interconnected.

c.      Internet.

Answer : (a. ) Intranet

3.     Which of the following cannot be the value of border-collapse property?

a.     Spearate

b.     Collapse

c.      Single

Answer : (c. ) Single

4.     Which of the following is used to define the source or the URL of the image?

a.     Src

b.     Alt

c.      Href

Answer : (a. ) src

5.     Which of the following is not an ethical behaviour?

a.     Remaining altert about various cyberattacks

b.     Using pirated softare

c.      Not sharing sensitive or confidential information online

Answer: ( b. ) Using pirated softare


B.     Fill in the blanks.

1.     The hexadecimal number system consist of digits from  0 to 9 .      [ 0 to 9 and A to F ]

2.     The computer or devices within a network that originate, route and terminate data are called

Nodes.

3.     Caption is the container tag used to define the title of the table.

4.     The <img> tag is used to add inline image.

5.     Unauthorised duplication of products which are protected by intellectual property laws is known as Copyright .

 

C.     Write T for True and F for False.

1.     Hexadecimal number system has 18 elements.  Answer : F

2.     RJ45 stands for Registered Jack 45. Answer : T

3.     Start attribute is used to define the start value of the first item in an ordered list. Answer : T

4.     HTML frames are used to create multiple tables in a browser window. Answer : F

5.     You should continue to communicate with a cyberbully. Answer : F

 

D.     Answer the following questions.

1.     What is a computer network? List a few hardware components used to establish a wired network.

Answer: A computer network is a set of computers sharing resources located on or provided by network nodes. The computers use common communication protocols over digital interconnections to communicate with each other.

Few hardware components used to establish a wired network are NIC, switch, cable, hub, router, and modem.
Cables and Connectors:

·       Twisted pair cable.

·       Coaxial cable.

·       Fibre-optic cable.

2.     Why is a switch preferred over a hub?

Answer: A switch is more intelligent than a hub. As a hub, a switch is the connection point for the computers (and other devices) in a network. However, a switch is more efficient at passing along traffic. It records the addresses of the computers connected to it in a table. When traffic comes through, the switch reads the destination address and sends that traffic to the appropriate computer rather than sending it to all the connected computers. If the destination address is not in the table, the switch sends the traffic to all the connected computers.

3.     Briefly explain any three properties of list.

Answer: There are many properties of list in that some of them are given bellow:

v List-style-image:-  It use in the sets an image as the item maker.

v List-style-position:- It specifies the position of the list item makers. It makes them appear inside or outside the content flow.

v List-style-type:- It sets the bullet style that will be used as the type of list item marker. 

4.     Differentiate between absolute URL and relative URL.

Answer:

Absolute URL

Relative URL.

It point to answer website and provides all the available data about a page’s location.

 

It points to a file within a website.

Example:  

<a href=”https://www.amazon.in”>click here</a>

Example:

<a href=”click.html”>click here</a>

1.     Explain any three cybercrimes against an organistation or society.

Answer :

 There are many cybercrimes against an organation or society are as following:

v Cyber Vandalism: The term Cyber Vandalism refers to an illegal act of destrouing or damaging digital data, rather than stealing or misusing it.

v Hacking : Hacking is a crime invloving cracking systems or networks to gain unauthorised access to the data stored in them.

v Cybersquatting: Cybersquatting is perpetrated against business houses, especially businesses that have a large web presence.

Post a Comment

5 Comments

If you have any doubts, Please let me know.