You are on page 1of 75

FOUNDATION OF INFORMATION

TECHNOLOGY

10

SOLUTION
Contents
1. The Internet 1

2. Internet and Web Services 7

3. Database Management Tool 14

4. Database Queries 21

5. Introduction to Web Page Designing Using HTML 26

6. More Elements in HTML 31

7. Lists, Tables and Anchors in HTML 37

8. Introduction to XML 46

9. Security Issues of IT 57

10. Benefits of ICT 65


1
The Internet
A. MCQs.
1. The first predecessor of Internet was __________________.
a. TAPnet b. NSFnet
c. ARPANET d. none of these
Ans. c. ARPANET
2. Name the technology upon which WWW is based upon?
a. Web servers and web browsers b. HTTP
c. HTML d. None of these
Ans. a. Web servers and web browsers
3. W
 hich of the following is best suited to define a web page which brings information
together from diverse sources in a uniform way?
a. Web server b. Website
c. Web Portal d. All of these
Ans. c. Web Portal
4. Which of the following is not a web browser?
a. Wikipedia b. Internet Explorer
c. Google Chrome d. Apple Safari
Ans. a. Wikipedia
5. Which of the following is not a protocol?
a. HTTP b. FTP
c. HTTPS d. HTML
Ans. d. HTML
6. What is the other name for URL?
a. Web Address b. Webpage
c. Web portal d. Web server
Ans. a. Web Address
7. Which of the following protocol is not used by Email?
a. POP b. IMAP
c. SMTP d. FTP
Ans. d. FTP

1
8. Internet is
a. a local computer network b. a world wide network of networks
c. a world wide Interconnected d. all of these
network of computers which
use a common protocol to
communicate with one another
Ans. b. a world wide network of networks
9. Each computer connected to the Internet must
a. be a Pentium machine b. have a unique IP address
c. have a web browser d. have a modem connection
Ans. b. have a unique IP address
10. World Wide Web
a. is another name for internet b. world wide connection for computers
c. a collection of worldwide d. a collection of linked information residing
information on computers connected by the internet
Ans. d
11. A web page is located using a
a. Universal Record Linking b. Uniform Resource Locator
c. Universal Record Locator d. Uniformly Reachable Links
Ans. b. Uniform Resource Locator

B. Fill in the blanks.


1. Computers that store the information we seek on the internet are called Servers.
2. A collection of related web pages forms a website.
3. Web sites are located on Webservers.
4. A Web browser is used to browse the web.
5. HTTP is a protocol used for transforming a web page from a web server to a browser.
6. Downloading refers to the process of loading from a web server to a local computer.
7. Another term used to refer to the web address is URL.
8. 192.168.1.141 is an example of IP Address.
9. The FTP protocol is used for transfer of files over the internet.

C. True (T) or False (F).


1. The first page that you see when you open a website is called the startup.-F
2. Google Chrome is the name of a web server.-F
3. Address bar is a space in a web browser where you can type out a web address.-T

2 Foundation of Information Technology – X (Solution)


4. The Stop button of a web browser allows you to stop loading a web pagein your web browser.-T
5. IP address is same as the URL.-F
6. The TCP/IP protocol is used for downloading or uploading a file.-F
7. HTML is the language used to build web-pages.-T
8. HTTP is a procedure used for transferring a web page from a web server to a web browser.-T
9. A blog is online digital diary, which is used to post messages for public viewing.-T
10. The term upload is used to transfer a file/webpage from a website/webserver to a local computer.-F

D. Answer the following.


1. What are the different hardware components of the Internet?
Ans. The hardware of the internet includes the cables that carry huge amount of data every second
to the computers in the network. Other hardware are routers, servers, cell phone towers,
satellites, radios, smart phones and other devices.
2. Name the protocol used for transferring files over the internet.
Ans. The protocol used for transferring files over the internet is FTP i.e. File Transfer Protocol.
3. What are the different ways in which you can connect to the Internet?
Ans. The different ways to connect to the Internet are using:
• Dial-Up Connection
• Broadband Connection which includes- Cable Modem, Digital Subscriber Line and Satellite.
• Leased Lines
• Wireless Connection which includes – Wi-Fi, Wi-Fi Hotspots, WiMax and Internet Dongles.
4. Name the technologies based upon which the World Wide Web is created.
Ans. The World Wide Web is based on these technologies:
• Web Servers and Web Browsers
• HTTP - Hypertext Transfer Protocol
• HTML - Hypertext Markup Language
5. What is a Web Page? Also state its relationship with a Website.
Ans. A
 web page is a document that stores information, which can be viewed in the internet using a
web browser. A Website is a collection of related web pages stored in a web server.
6. Explain the significance of a Web Browser.
Ans. A web browser is the software that facilitates the retrieval of information from a web server.
The information that is rendered by it may be text, images, videos or any other content and
sometimes third party plugins are used to display content inside web browsers. Some very
popular web browsers are Internet Explorer, Mozilla Firefox, Google Chrome and Opera.
Thus a web server and a web browser work in unison to achieve the satisfaction of the consumers.

The Internet 3
7. State the significance of IP Address in a network.
Ans. An IP Address is a group of numbers separated by full stops that identifies each computer using
the Internet Protocol to communicate over a network. Therefore an Internet Protocol address
governs online communication by identifying both initiating devices and various Internet
destinations, thereby making two-way communication possible.
8. Give the general syntax of an URL. Also explain each of its component.
Ans. The general form of a URL syntax is as follows:
Protocol://domain name/<directory path>/<object name>
For example:
https://www.openoffice.org/why/why_compliance.html
9. State one use of each of the following protocols:
a. HTTP
b. FTP
Ans.
a. HTTP: HTTP is a protocol used to transfer data over the World Wide Web.
b. FTP: FTP is a protocol to download/uploads a file from a server using the Internet or to upload
a file to a server.
10. Explain the significance of the text before and after @ an email address.
Ans. An email address, for example, Anubhav.sharma@example.com is made up of a user-name
(Anubhav.sharma), a @ symbol, then a domain part (example.com). The domain part is not
case-sensitive, but the user-name may be. In practice, the mail framework at example.com may
decide to treat Anubhav.sharma as equal anubhav.sharma or even anubhavsharma.
 ail frameworks regularly constrain their user’s decision of name to a subset of technically
M
characters and may sometimes additionally restrict which addresses it is conceivable to send
mails to.

Application Oriented Questions


1. M
 r Deepak has designed a website for a school which constantly updates the contents by
adding new pages and contents. This result in a difficulty for keeping track of changes of the
files in the server and the local computer where he does the development work. He wants a
software through which he can automatically update the site whenever changes are made and
when he is connected to the internet. Suggest the protocol and a software that Mr Deepak
requires.
Ans. Protocol: File Transfer Protocol
Software: Cute FTP, Filezilla or SmartFTP.

4 Foundation of Information Technology – X (Solution)


2. M
 r Rupam is the sales manager in Marocon International. He is always on the move and visits
different places every month to look after the business. His professional requirements makes it
mandatory for Mr Rupam to access the Internet. But the different places and hotels where he
stays in does not always provides the Internet facility. Suggest a method by which Mr Rupam
will be able to access the Internet on the move using his laptop.
Ans. Mr Rupam could use an Internet Dongle or a Wi-Fi Dongle to access the Internet on the run.
3. V
 ivekananda International Public School a very famous school in Birbhum is planning to coach
their students with the teachers of a reputed coaching centre for entrance examination. The
coaching centre is ready to teach the student with high speed broadband internet. But the
location of the school is such that there is hardly any such internet connectivity and the landline
company is unable to give a leased line to the school because of their poor infrastructure.
Suggest a suitable technology through which the school will be able access the online classes
of the coaching centre to facilitate learning.
Ans. The situation presents a situation such that terrestrial communications (using traditional
telephony grids) are not present or working optimally. Thus perhaps the best method of
communication would be to use VSAT (Very Small Aperture Terminal) for communication
through satellite.
4. Identify domain name(s) and URL(s) from the following list:
a. yoga@yoga.com
b. DoYogaEveryday.com
c. www.doYogaEveryday.com/old/index.html
d. 192.168.0.1
e. www.performingarts_school.org/backlink.htm
f. http://cbse.nic.in
Ans.
a. Domain Name: yoga.com
b. Domain Name: DoYogaEveryday.com
c. Domain Name: doYogaEveryday.com
URL: www.doYogaEveryday.com/old/index.html
d. IP Address
e. URL: www.performingarts_school.org/backlink.htm
Domain Name: performingarts_school.org
f. Domain Name: cbse.nic.in
URL: http://cbse.nic.in

The Internet 5
5. S ulekha has heard the term URL and IP address. But she does not understand the difference
between the two. Explain her the difference with examples.
Ans. The difference between URL and IP address are:
1. An IP address just specifies the location while a URL specifies location, protocol, and specific
resource
2. RL requires a DNS server while an IP address doesn’t
3. RLs are unlimited while IP addresses are limited
4. IP addresses and URLs have a one to many relationship
6. ABC company a news company wants to setup a web-site which will bring information from
diverse sources in a uniform way. What should the company build a) web server or b) Web
portal? Explain with reasons.
Ans. Web servers are computers that deliver (serves up) Web pages whereas a Web portal is a
specially designed website that brings information from diverse sources, like emails, forums
and search engines, together in a uniform way. Thus for the company the web portal would be
more preferable.

6 Foundation of Information Technology – X (Solution)


2
Internet and Web Services
A. MCQs.
1. Which among the following is a search engine?
a. Wikipedia b. Eblogger
c. Bing d. Rediffmail
Ans. c. Bing
2. Which keyword is used to get the meaning or definition of a word in google?
a. Meaning b. Dictionary
c. Define d. All of these
Ans. c. Define
3. Which of the following is used to sent a file in an email?
a. Inbox b. Outbox
c. Attachment d. Subject
Ans. d. Subject
4. Which among the following word is used in Google to see the dictionary?
a. Define b. Meaning
c. Both a & b d. None of these
Ans. a. Define
5. Which among the following is a Video Conferencing Software?
a. Gmail b. Skype
c. EBlogger d. RediffMail
Ans. b. Skype
6. Talking in real time using textual messages is called __________________.
a. chatting b. video conferencing
c. social networking d. none of these
Ans. a. chatting
7. Which of the following statements is true for ‘BCC’ of Mail Box?
a. You want the email address to be visible to ‘To’ and ‘Cc’.
b. You want the email address to be visible to ‘To’ but invisible to ‘Cc’.
c. You want the email address to be visible to ‘To’ but invisible to ‘Cc’.
d. You want the email address to be invisible to both ‘To’ and ‘Cc’.
Ans. d. You want the email address to be invisible to both ‘To’ and ‘Cc’.

7
8. Which of the following would you use to find people over the Internet?
a. Search on Google. b. Search on Social Networking Sites.
c. Search on Blogs d. All of these
Ans. d. All of these
9. Which among the following web services is required by students for learning?
a. E-Banking b. E-Commerce
c. E-Shopping d. E-Learning
Ans. d. E-Learning
10. Which among the following statements is true with respect to E-Shopping?
a. Talking about a product in a social networking site.
b. Search for book using a search engine.
d. Download a free book available over a public domain.
e. Buy or sell products online.
Ans. e. Buy or sell products online.
11. Name the popular service used for booking a seat in railways at the comfort of your home.
a. E-Commerce b. E-Banking
c. E-Reservation d. E-Learning
Ans. c. E-Reservation

B. Fill in the blanks.


1. Google is a search engine.
2. Use quotes to search for an exact word or set of words in Google.
3. To create an email account you need Signup first.
4. The Outbox of an Email account shows all mails that have been already sent by you.
5. The abbreviation cc in a mail box has the full form as Carbon Copy.
6. Wikipedia is the free online encyclopedia.
7. The Inbox of an Email account shows all mails that you have received in a table form.
8. Facebook is an example of Social Networking site.
9. Chatting is the process of talking by typing in text to other people at real time.
10. For sending files using Email Attachment is used.

C. True (T) or False (F).


1. You can type in a URL on the address bar of a web browser to jump to a particular site.-T
2. Searching in Google is case sensitive.-F
3. It is possible to use Google as an Unit Converter.-T
4. You can search for people using social networking.-T

8 Foundation of Information Technology – X (Solution)


5. Disposable Email is for people who wants a permanent email address.-F
6. While sending email, you cannot send files.-F
7. The Inbox shows all mails that is send from your mail box.-F
8. Using Google Map you can find a route for a destination.-T
9. Blogs may be used as a constantly updated website.-T
10. The first Newsgroup was Usenet.-T

D. Answer the following.


1. What is the significance of Wikipedia?
Ans. Wikipedia is an online free encyclopedia that allows people to show, add or edit information.
2. What is a search engine? Name any two popular search engines.
Ans. A search engine is a software that looks for and distinguishes things in a database that compare
to essential words or characters tagged by the users, utilized particularly for discovering specific
destinations on the World Wide Web. Example Google and Bing.
3. State the method by which you can find the following using Google:
a. Find the weather of a city.
b. Activate the calculator
c. Find the definition of a specific term.
d. Convert from a particular unit to another unit.
Ans.
a. Type “Weather” followed by the city name in the Google search field whose weather condition
you want to see for the past one week.
b. Type in any mathematical expression in the search field of Google, which in turn will start the
Google Calculator.
c. Type in “define” followed by the term whose definition, which you need to find.
d. Specify from any unit to any unit conversion. Try it out: 3km to inches
4. What is E-groups used for?
Ans. An e-group can be defined as a group of persons or individuals who come together online for a
specific or common purpose.
5. State the different method of searching for an individual over the internet.
Ans. To search for an individual you may use the following techniques:
a) Type in the name of the person in Google Search.
b) Go for a blog search in http://www.google.com/blogsearch
c) Search for the name in Social Networking Websites.
d) You may use an online “people” search engine/finder.
e) Try Myspace.com and BuddyFetch.com.

Internet and Web Services 9


6. W
 hat would you do when you want to avail a free service over the internet, but do not want to
part with your Email Address?
Ans. A disposable email address may be used in case you do not want to part with your email address.
7. How does a Captcha help in security?
Ans. A
 Captcha is a computer program or system intended to distinguish human from machine input,
typically as a way of thwarting spam and automated extraction of data from websites.
8. What are Attachments in a mail box?
Ans. Attachment is a term used in Email to send a file along with the email message.
9. State the difference between ‘Cc’ and ‘Bcc’ in a mailbox.
Ans. Cc stands for carbon copy which means that whose address appears after the Cc: header would
receive a copy of the message. Also, the Cc header would also appear inside the header of the
received message.
 cc stands for blind carbon copy which is similar to that of Cc except that the Email address
B
of the recipients specified in this field do not appear in the received message header and the
recipients in the To or Cc fields will not know that a copy sent to these address.
10. State two advantages and disadvatages of E-learning.
Ans.
Advantages of E-learning:
• Learners have the option to choose learning materials that meets their level of knowledge
and interest.
• Learners have the flexibility to choose their own time or schedule.
Disadvantages of E-learning:
• It has been seen that learners with low motivation or bad study habits may fall behind.
• Learners who are more used to with traditional teachers may get lost or confused about
course activities and deadlines.
11. What is E-shopping? State any advantage and disadvantage of E-shopping.
Ans. E-shopping is a form of e-commerce which allows consumers to directly buy goods or services
from a seller over the Internet using a web browser.
 dvantages of E-Shopping: Reduces Cost: Since the retailer do not require a showroom,
A
involving huge cost can pass on the benefit to the consumer by selling a product at a price lesser
than the market rate.
 isadvantage of E-Shopping: Since you are buying a product online, the product might not be
D
physically same as seen in the image. This might lead to dissatisfaction among online shoppers.

10 Foundation of Information Technology – X (Solution)


Application Oriented Questions
1. S hravan Joshi is a student of Political Science and is a keen researcher of political issues related
to various countries and states. He wants to share his research and his own opinion on these
issues on day-to-day basis with everyone on World Wide Web. He is also interested in collecting
views of others to enhance his research and knowledge related to his area of interest. He
belongs to a poor family and cannot afford his own website. Also being a nontechnical person
he cannot create a dynamic website to deal with day-to-day inputs.
a. Suggest an easy way for Shravan to achieve the same.
b. Name two popularly used free services that can help Shravan in this regard.
Ans.
a. Mr Shravan can run a Blog that is given as a free service over the Internet.
b. Eblogger and Wordpress
2. A
 s life gets busier, it becomes difficult for everyone to keep track with school and college
friends, old colleagues, old neighbours and favourite teachers. It is important to keep in touch
with all your near and dear ones. At times, people sitting miles away doing similar kind of
activity or solving similar kind of problem can help you achieve goals faster by sharing their
experiences. Similarly, people belonging to different socio-economic background can change
your perspective and enhance your understanding of various cultures.
a. Suggest the real time tools that are suitable for the above mentioned activities.
b. What is the generic name used for such tools?
Ans.
a. Real Time Tools like Facebook, Twitter, etc. may be used for posting messages, chatting and
video conferencing.
b. Social Networking Sites.
3. S ankit is a student at St. Thomas High School Guwahati and has got problems in learning
mathematics. He finds the teacher at school too fast and sometimes it happens that he can’t
even retain what he has studied. His parents are very concerned and wants to ensure he learn
mathematics at his own pace without any pressure and whenever he requires he can revise
previous topics until the concept becomes stronger. Suggest Sankit some methods through
which he will be able to learn at his own pace.
Ans.
F or Sankit the most preferable method of learning would be to use E-Learning. He can use the
following methodologies:
Buy a e-learning course in a CD/DVD from the market.
Go for quality free online courses on mathematics.
Get an online paid course or an online tutor.

Internet and Web Services 11


4. D
 r Saptark a neurosurgeon at Denkin’s Hospital Cochin is very popular among patients. Each
day he sees almost hundreds of patient, so much so he hardly gets time to relax and sometimes
even do not get time to have his lunch. Even though life is difficult he enjoys his work to the
fullest extent. Recently the medical Council of India (MCI) wanted to felicitate him at Delhi by
the President of India, for his selfless work and invited him. Being so busy he is unable to go to
the airlines booking office to book a ticket. Neither does he comprise on middlemen.
a. Suggest a method by which he will be able to book a ticket without physically standing in a
queue.
b. State two advantages and disadvantages of such a method.
Ans.
a. Dr Saptark can use the E-Reservation system to book an air-ticket at his own comfort.
b.
Advantages of E-Reservations:
1. In e-reservation system individuals don’t need to go anywhere to book a ticket, they can
easily book it at the comfort of their home.
2. E-reservation is a real time process for example, if you book a seat, it will automatically
update it so no one else can take that seat.
Disadvantages of E-Reservations:
1. For taking the advantage of e-reservation you need internet and PC experience, which is
hardly 10% in a country like India.
2. Because of the need for exchanging sensitive personal data, such as home addresses and
bank and credit card details, the online booking process is an attractive target for cyber
criminals looking to steal this information.
5. M
 r Gobind Sharma a retailer at Thiruvananthapuram is a chemist and does brisk business. The
only problem he faces is that when he wants to make payments to the distributors from whom
he gets the stock. He usually needs to visit State Bank of India, ICICI Bank or Axis Bank to make
money transfer, as the accounts of his distributors are in such banks.
a. Suggest method by which he can make such fund transfer at the comfort of his home.
b. What are the different methods of such transfers?
c. State two disadvantage of E-Banking.
Ans.
a. Mr Gobind Sharma may use E-Banking for transfer of inter- bank money at the comfort of his
home.
b. The different modes of inter-bank money transfer are:
• National Electronic Fund Transfer (NEFT)
• Real Time Gross Settlement (RTGS)

12 Foundation of Information Technology – X (Solution)


c. Disadvantages of E-Banking:
1. E-banking is generally secure, but it certainly isn’t always secure. Identity theft is running
uncontrolled, and banks are in no way, shape or form resistant. And once your information
is compromised, it can take months or even years to correct the damage.
2. Before using a banking site that you aren’t familiar with, check to make sure that they are
affiliated to Reserve Bank of India (RBI).
6. D
 inesh had created a project on e-shopping and wants to conclude it stating at least three
advantages and disadvantages of e-shopping in the following format:
Advantages
1.
2.
3.

Disadvantages
1.
2.
3.
Ans.
Advantages
1. Easy Start: It is easy to start a business, as the initial cost involved is low.
2. Round the Clock Services: Allows 24x7 services.
3. H
 elp Comparison: The digital middleman model allows consumers to compare products of the
same category before buying.

Disadvantages
1. You need to be very careful when shopping online. Before purchasing a product from such sites
you need to check for its authenticity. There are few fraudulent site which may get easy access
to your user id and password of your net banking account or debit card or credit card.
2. There may be hackers who might hack into your account and misuse it.
3. Since you are buying a product online, the product might not be physically same as seen in the
image. This might lead to dissatisfaction among online shoppers.
7. M
 rs Sudha a retail manager at New York who is always in move and hardly gets time to meet
his friends and cousins.
a. Suggest a method by which he will be able to connect to his friends without compromising
her time.
b. Suggest at least three examples of such sites.
Ans.
a. Mrs Sudha may use the Social Networking Websites for connecting with her friends.
b. Examples: Myspace, Friendwise, Friendfinder, Yahoo! 360, Facebook, Orkut and Classmates.
Internet and Web Services 13
3
Database Management Tool
A. MCQs.
1. OpenOffice Base is a _______________ package.
a. Word Processor b. Spreadsheet
c. Graphics d. Database
Ans. d. Database
2. Which among the following is not possible in DBMS?
a. The ability to update and retrieve data. b. Recovery of Data
c. Support Concurrent Updates d. Create different charts.
Ans. d. Create different charts.
3. Which among the following is used to uniquely identify a record?
a. Primary Key b. Candidate Key
c. Alternate Key d. Degree Key
Ans. a. Primary Key
4. The candidate key that do not form the primary key is called the _____________.
a. Primary Key b. Candidate Key
c. Alternate Key d. Degree Key
Ans. c. Alternate Key
5. The DBMS that forms the part of OpenOffice package is:
a. OpenOffice Writer b. OpenOffice Calc
c. OpenOffice Impress d. OpenOffice Base
Ans. d. OpenOffice Base
6. Which of the following is the extension of OpenOffice database?
a. .base b. .dbms
c. .odb d. .dbf
Ans. c. .odb
7. It is the left pane of OpenOffice window is called the ________________:
a. Objects Pane b. Database Pane
c. OpenOffice Writer Main window d. Forms Pane
Ans. b. Database Pane

14
8. Which of the following object cannot be created in the Database Pane?
a. Tables b. Forms
c. Queries d. Fields
Ans. d. Fields
9. N
 ame the object of a database that gives a windowed interface that you can create to manage or
manipulate data in a table or group of tables.
a. Tables b. Forms
c. Queries d. Reports
Ans. b. Forms
10. Which among the following is true for registered database?
a. It allows the database to be a data source for other OpenOffice packages.
b. It does not allow the database to be modified after creation.
c. It does not allow report to be created.
d. It does not allow queries to be created.
Ans. a. It allows the database to be a data source for other OpenOffice packages.

B. Fill in the blanks.


1. A Table is a collection of data arranged in the form of row and column.
2. The number of columns present in the table is called its degree.
3. More than one field which is eligible to form the primary key are called candidate keys.
4. Right-click on a Table icon in the Objects Pane and click on Edit option to modify.
5. Field Type is a way of dictating Base what kind of data will be stored in a field.
6. The Primary key uniquely identifies a record in a table.
7. The Record is a row of data in a table.
8. The Field is a column of data in a table.
9. The extension of an OpenOffice Base files is .odb.
10. The Task Pane shows what may be done for the corresponding selected object from the
Database Pane.

C. True (T) or False (F).


1. The number of records in a table is called its degree.-F
2. The Database Wizard helps you in creating a database in OpenOffice Base.-T
3. It is not possible to open an existing database using the Database Wizard.-F
4. Several databases collectively forms a table in a DBMS.-F
5. T he Task Pane of the OpenOffice window is used to show what may be done for the corresponding
selected object from the Database Pane.-T

Database Management Tool 15


6. Registering a database ensures that the data is available to other OpenOffice packages.-T
7. Data arranged in row is called a field.-F
8. The extension of a database file is .odx.-F
9. Alternate keys are the fields that form the primary keys.-F
10. The Cardinal number of a table is the number of fields in the table.-F

D. Answer the following.


1. What is a Database?
Ans. A Database refers to collection of data stored in an organized manner, which may be used
structurally to provide you with information.
2. What is a DBMS? Give few examples of DBMS.
Ans. A
 Database Management System (DBMS) is a software package that enables you to store,
modify, and extract information from a database.
Examples: OpenOffice Base, MySql, Microsoft Access etc.
3. State the difference between a record and a field in a table.
Ans. Each row in a table is called a record (or tuple), which contains data interrelated to each other.
The data content of a table represented by the column is called the field or attribute.
4. What is a table?
Ans. A Table is a collection of tabular data organized in the form of rows and columns.
5. “ There may be more than one field which can collectively form the primary key” Illustrate with
an example.
Ans. For example, look at the following Student Table:
Roll Class Section Name Phone No.
1 1 A Sailendra Roy 9833478932
2 2 B Unesh Barman 7345566983
3 1 A Tamal Sharma 9223445567
2 1 B Satish Gupta 8834567892
3 2 B Sameer Ahmed 8243769345
 s you can see field “Roll” cannot alone be the Primary key as it do not uniquely identify each
A
record. But if the fields “Roll”, “Class” and “Section” are combined, it can collectively able to
identify each record uniquely. Thus “Roll”, “Class” and “Section” collectively form the primary
key.
6. What is a relational database?
 Relational database is a collection of data organized as a set of structured tables from which
Ans. A
data can be accessed or reorganised with respect to relations between them in many distinct
ways without having to reassemble the database tables.

16 Foundation of Information Technology – X (Solution)


7. State the difference between Candidate and Alternate keys in a Table.
Ans. The fields which are eligible to become the primary key in a Table are called Candidate Keys.
Among the candidate keys that do not form the primary keys are called Alternate Keys.
8. State two functions of a Database Wizard.
Ans. The Database Wizard dialog of OpenOffice Base:
1. Allows you to quickly create a Database
2. Open an existing database file.
9. What are the different type of database objects you can create using the Database Pane?
Ans. There are 4 different Database objects you can create using the Database Pane viz.:
• Tables
• Forms
• Queries
• Reports
10. State the significance of registering a database in OpenOffice Base.
Ans. Registering a database ensures that the database be a data source for other OpenOffice
packages. For example in case you need to use a Base database as data source for addresses in
Writer for Mail Merge in OpemOffice Writer, you need to use a registered database.

Application Oriented Questions


1. S t. Lawrence school Amethi thought of computerizing the school into a database and has
thought of segregating the data into the following tables:
Students Teachers Non-Teaching Staff
a. Suggest at least five fields for the above tables.
b. State two advantages they would get in computerizing the school database.
c. The school also thought of computerising its library apart from the human resources.
Suggest at least 6 fields for the Library table.
Ans. a.
Table Student
Regno Name Class Section Address

Table Teachers
Tno Name Address PhoneNo Salary

Table Non-teaching Staffs


NT no Name Address PhoneNo Salary

Database Management Tool 17


b. Advantages of using computerised database:
i) Computerised database will take less space compared to paper database.
ii) Store student performance details and track their improvement.
c.
Table Library
Book_Code Book_Name Author Publisher Date_of_purchase Quantity
2. Identify the Primary Keys, Candidate Keys and Alternate Keys from the following table structures:
a. An estate agent uses a table called Properties to store details of all the properties for sale.
Property Id House Number Locality Carpet Area Price Loan Availability
Ans. Candidate Keys: Property Id, House Number
Primary Key: Property Id
Alternate Key: House Number
b. A school uses a table to store the marks obtained by the students.
Registration No. English Mathematics Science S. St. Percentage

Ans. Candidate Keys: Registration No.


Primary Key: Registration No.
Alternate Key: None
c. A school uses a table to store the information about students.
Class Section Roll no. Reg. No. Name Address Phone Number

Ans. Candidate Keys: Reg.No., (Class, Section, Roll)


Primary Key: Reg No.
Alternate Key: (Class, Section, Roll)
d. A bank stores the details of its customers in a table called Accounts.

Ac. No. Ac. Type Name Address Balance PAN No.

Ans. Candidate Keys: Ac. No., PAN No.


Primary Key: Ac. No..
Alternate Key: PAN No.

18 Foundation of Information Technology – X (Solution)


3. Study the given table and answer the following questions:
Roll Numbers Names Addresses
1 Aditi Sharma Kolkata
2 Trilok Dewan Mumbai
3 Aswin Thakur Delhi
4 Ashis Karmakar Chennai
5 Saurav Agarwal Mathura

a. What is the cardinality the above table?


b. What is the degree of the above table?
c. What will be the change in cardinality and degree if 4 more records are added and 2 more
fields are added to the table?
d. Identify the primary key in the table.
Ans.
a. Cardinality=5
b. Degree=3
c. Cardinality=9
Degree=5
d. Primary Key: Roll Numbers
4. Ms Poonam is the class teacher of III-C in a school. She is computer savvy and wants to keep
information about her students in a database. She needs this information for the following
purposes:
• She has to contact the parents frequently through phone calls or email.
• She has to keep comments about the students. These comments help her during PTMs.
Suggest any six fields and their data types to keep the relevant information.
Ans.
Field Name Data Type Description
Roll INT To store the roll number of the student.
Name VARCHAR Tos store the name of the student.
GName VARCHAR To store Guardian’s name
Phone BIGINT To store the Land Line Number if any
Mobile BIGINT To store the cell phone number if any.
Email VARCHAR To store the email-id if any.
Comments LONGVARCHAR or memo To store any comments about the child.

Database Management Tool 19


5. Look at the following fields which are used to keep voters’ ID card data in a table:
CardNo, VoterName, Address, FatherName, DOB
a. Suggest the data type for each of these columns.
b. Suggest the column name(s) which can be used as its primary key.
Ans. a)
Field Name Data Type
CardNo INT
Votername VARCHAR
Address VARCHAR
FatherName VARCHAR
DOB DATE
6. T he management of a medical store, GetWellSoon Medicos, decides to computerise its
inventory.
a. Suggest any two tables which must be present in the database. You also have to suggest
fields of the Tables along with their datatypes.
b. Mention any two benefits that the management will have by computerising the inventory.
Ans.
a. Table: Stock
Field Name Field Type Description
PID CHAR To store the product id.
PNAME VARCHAR To store the product name
QTY INT Quantity in stock.
REORDER INT Quantity to mark the reorder level.
PRICE FLOAT Cost Price of the product.

Table: Purchase
Field Name Field Type Description
PID CHAR To store the product id of the product being purchased.
DOP DATE To store the date of purchase.
QTY INT Quantity purchased.
PRICE FLOAT Price at which the product is purchased.
REMARKS VARCHAR Comments if any for the transaction

b. The two benefits of computerizing the inventory:


i) Keeps track of the amount of stock available currently.
ii) Keeps track of the product being purchased and also accordingly update the QTY in stock.

20 Foundation of Information Technology – X (Solution)


4
Database Queries
A. MCQs.
1. N
 ame the Object in an OpenOffice Base package that is used to create a condition depending
upon which data will be filtered out of a Table.
a. Query b. Report
c. Forms d. None of these
Ans. a. Query
2. Queries can be designed from:
a. Tables only b. Queries only
c. Both a and b d. None of these
Ans. c. Both a and b
3. Which of the following can be used for creating a Query?
a. Tables b. Save Button.
c. Reports d. Forms
Ans. a. Tables
4. E ntries in ____________ row of the Query Design view allows you to set multiple conditions
where multiple conditions are present but all needs to be satisfied.
a. Visible b. Function
c. Criterion d. Or
Ans. c. Criterion
5. The relational operator ____________ is used to check whether two quantity are unequal or not.
a. > b. Not equal
c. <> d. ><
Ans. c. <>
6. E ntries in ____________ row of the Query Design view allows you to set multiple conditions
where multiple conditions are present but either of them needs to be satisfied.
a. Visible b. Function
c. Criterion d. Or
Ans. d. Or
7. E ntries in ____________ row of the Query Design view allows you to select the field for viewing
in the query.
a. Visible b. Field
c. Criterion d. Or
Ans. b. Field
21
8. E ntries in ____________ row of the Query Design view allows you to specify whether a field will
be visible in the query or not when executed.
a. Visible b. Field
c. Criterion d. Or
Ans. a. Visible
9. A
 ____________ is used to design an interface for the user to enter or display data from
a database.
a. Form b. Table
c. Report d. none of these
Ans. a. Form
10. The ____________ object is used when it is required to print or view information online from the
database in a formatted and organized manner.
a. Forms b. Tables
c. Reports d. none of these
Ans. c. Reports

B. Fill in the blanks.


1. The Query object is used to filter out data from a table or a query.
2. The Visible option in the Query Design view allows you to see the field when the query is executed.
3. Double click on the query object to execute a query.
4. The Criterion row of the Query Design view allows you to insert a condition to filter out data.
5. The = relational operator is used to check for equality.
6. F ields which takes part in a Query for a condition, but whose content is not displayed is called
Virtual field.
7. The default name for a Query is Query1.
8. The Relational operator is used to set up a condition for the query.
9. The Or criteria is used when either of the condition(s) needs to be satisfied.
10. If you have conditions in the Criterion row for more than one field, it is said to have AND criteria.

C. True (T) or False (F).


1. Query is used to derive specific information from a database.-F
2. Click on the Queries button on the Database pane to create a query in OpenOffice Base.-T
3. You can click on the Insert button on the Add Table or Query dialog to add a query.-F
4. K
 eeping the Visible checkbox selected ensures that the field content is displayed when executing
the query.-T
5. Query1 is the default name of the first query that you create.-T

22 Foundation of Information Technology – X (Solution)


6. T he Condition row present in the Design mode of the query is used to provide a criteria to filter
out data from a table .-F
7. The AND criteria is used when either of the condition needs to be satisfied.-F
8. Virtual fields are displayed in a query.-F
9. Forms allow you to print a table.-F
10. Reports allow you to print a table.-T

D. Answer the following.


1. What is a Query?
Ans. A Query is a database object that searches for records that match the exact criteria you define.
2. S tate the advantage of creating a Query in Design View compared to creating a Query using
a Wizard.
Ans. Using Design View gives you the flexibility of defining the criteria(s) from scratch.
3. H
 ow many Tables can be added to a Query? Also state the process of adding a Table using the
Design View.
Ans. Y ou may add any number of tables to participate in a Query. To add a Table the following steps
are used:
a. Open the database for which you want to create the query.
b. Click on Queries object on the Database Pane and from the Tasks Pane click on Create Query
in Design View.
c. A new Query window appears showing the Add Table or Query dialog box. It shows all tables
in your database when you click on the Tables option button.
d. Select a table and click on Add button, which gets added to the Query window. In case you
want to add more tables you can continue doing so. Once done with the adding of tables in
the query, click on the Close button.
4. What does the Field entry of the Design View of a Query indicate?
Ans. It is used to specify the fields which will participate in designing the Query.
5. What happens when you remove the Checkbox from the Visible entry of the Design View?
Ans. In case the Visible entry is unchecked it will create a Virtual field, which is eligible to participate
in the query but do not show its content.
6. State the function of Alias entry.
Ans. The Alias is used to give alternative name to a Field which will be visible as column heading
when the query is executed.
7. What is the default name of a Query when saved?
Ans. The default name of a Query when saved is Query1.

Database Queries 23
8. State any one method of executing a Query.
Ans.
a. Open the database for which you want to create the query.
b. Click on Queries object on the Database Pane and double-click on the query.
9. State the process of editing a Query.
Ans. The following steps are used for editing a Query:
1. From the Database window click on the Queries object, which in turn displays the queries in
the Objects Pane.
2. From the Objects Pane right-click on it and select the Edit option, which in turn displays the
Query in Design View.
3. You can now make any changes to the Query design here.
10. State the difference between AND criteria and OR criteria.
Ans. T he AND criteria is used when there are multiple conditions, but all need to be satisfied for the
resultant to be true. The OR criteria on the other hand is used with multiple conditions, but only
one condition needs to be satisfied for the resultant to be true.

Application Oriented Questions


Mrs Sudeshna is the class teacher of class XI Science at Daisy Public School, Newtown Kolkata.
She wants to keep track of the performance (with respect to marks obtained) in Science (Physics,
Chemistry and Biology) by her students.
a. Suggest a Table structure to accomplice the above process. Specify the field name along
with the Data Type of the fields.
b. Which way of creating the Table would be more preferable, Table Wizard or Design View?
c. Assuming the data is inserted by Mrs Sudeshna perform the following:
i. Display the total marks obtained by each student. The marks in individual subject need
not be shown. State the Field entries to be displayed.
ii. State the Criterion entry for the fields to display all information of students who got
above 90 in Physics.
iii. State the Criterion entry for the fields to display all information of students who got
above 90 in all the subjects.
iv. Incase the marks of the students in the three subjects were the following:
Physics Chemistry Biology
78 86 55
97 82 78
63 52 88
91 73 54
And the Field entry in Design View was “Physics”+”Chemistry”+”Biology” and Alias entry
would be “Total”, Sort entry would be ascending and Visible entry is checked. What would
be output of the Query when executed?
24 Foundation of Information Technology – X (Solution)
Ans.
a.
Table: Student
Field Name Data Type Description
Roll INT To store the roll number of the student.
Name VARCHAR To store the name of the student.
Physics INT To store the marks obtained by a student in physics.
Chemistry INT To store the marks obtained by a student in chemistry.
Biology INT To store the marks obtained by a student in biology.
b. ‘Design View’ would be more preferable as it gives more flexibility in declaring the conditions
to filter out the data.
c.
i. Field entries of the Query from the ‘Student’ Table
Roll Name “Physics”+”Chemistry”+”Biology” with Alias entry as “Total”
ii. Physics > 90
iii. Physics > 90, Chemistry > 90, Biology > 90
iv.
Total
203
218
219
257

Database Queries 25
5
Introduction to Web Page Designing Using HTML
A. MCQs.
1. Which among the following may be used to write an HTML code?
a. Microsoft Excel b. OpenOffice Base
c. Notepad d. None of these
Ans. c. Notepad
2. Double-clicking on an HTML file will execute it in _____________.
a. Internet Explorer b. Mozilla Firefox
c. Google Chrome d. default browser
Ans. d. default browser
3. Comments in HTML are given using which tag?
a. <!-- --!> b. //
c. /* */ d. None of these
Ans. a. <!-- --!>
4. To fill up the background of a web page with a colour, which attribute of the BODY tag is used?
a. BACKGROUND b. BKGRND
c. BGCOLOR d. BG
Ans. c. BGCOLOR
5. The default colour of text in a web page is _________________.
a. BLACK b. WHITE
c. RED d. BLUE
Ans. a. BLACK
6. The default colour of unvisited link is _________________.
a. GREEN b. RED
c. PURPLE d. BLUE
Ans. d. BLUE
7. T he _____________attribute of the BODY tag is used to specify the amount of space that you
leave from the top of the web page.
a. TOPMARGIN b. ABOVEMARGIN
c. TOP d. UP
Ans. a. TOPMARGIN

26
8. Empty tags do not have a _________________.
a. Angular bracket <> b. Closing tag
c. Anchor element d. all of these.
Ans. b. Closing tag
9. The Quick Key combination _________________ is used to open a web page.
a. Ctrl+P b. Alt+O
c. Ctrl+O d. none of these
Ans. c. Ctrl+O
10. Which of the following is not an attribute of the anchor tag?
a. LINK b. ALINK
c. VLINK d. XLINK
Ans. d. XLINK
11. What is the default colour of the background of a web page?
a. WHITE b. BLUE
c. GREEN d. BLACK
Ans. a. WHITE

B. Fill in the blanks.


1. Hyperlink allows you to jump from one page to another in a web page.
2. Tags in HTML is used to separate out normal text from HTML code.
3. The <B> tag is used to change text to bold.
4. An html code always begins with <HTML> and ends with </HTML> tag.
5. Empty tags do not have a Closing tag.
6. The BGCOLOR attribute of the BODY tag is used to change the background colour.
7. The ALINK attribute of the BODY tag is used to change the colour of active link.
8. The TOPMARGIN attribute of the BODY tag is used to specify the amount of space that you leave
from the top of the web page.
9. The anchor tag is used to create a hyperlink.
10. The default BGCOLOR of the <BODY> tag is WHITE.

C. True (T) or False (F).


1. HTML is case sensitive.-F
2. Providing attributes with tags is optional.-T
3. The BODY tag is used to provide heading.-F
4. Simple text editors like Notepad may be used to write HTML code.-T
5. HTML files do not need extension.-F
6. LEFTMARGIN attribute is used to specify the amount of space to the left in the BR tag.-F
7. The VLINK attribute is used to specify the colour of visited link of the BODY tags. T

Introduction to Web Page Designing Using HTML 27


8. Comments in the HTML code is completely hidden from rendering in the browser.-T
9. The default colour of a font in a web page is WHITE.-F
10. The BACKGROUND attribute of the <BODY> tag is used to change the background colour of a
web page.-F

D. Answer the following.


1. Give the full form of HTML. What is the significance of using it?
Ans. HTML stands for Hyper Text Markup Language. It is the basic language through which websites
are built.
2. What does the term “Hypertext” mean in HTML?
Ans. H
 yperText is the method by which you move around on the web — by clicking on special text
called hyperlinks will bring you to the next page.
3. Where do you write HTML code and how do you execute that code?
Ans. HTML codes may be written in simple text editors like Notepad and should be saved using the
extension .html or .htm.
4. What are HTML tags? Classify them.
Ans. Tags in HTML are used to separate out normal text from HTML code, which are enclosed within
<angle-brackets>. This tags are used as HTML commands which makes the web browser perform
the given task.
5. State three rules for coding in HTML.
Ans. Rules for coding in HTML:
1. Every HTML tag should be surrounded by angular brackets < and >.
2. The words/letters between these two angular brackets are called elements. These are the
coded commands within HTML. Elements tell the browser how to display the web page.
3. HTML is also not case sensitive. That means, you can use either lowercase or uppercase
characters.
6. Explain with the help of an example the significance of having an attribute to a tag.
Ans. A HTML tags can also have attributes that provides additional information about an element.
For example, the BODY tag may have the BGCOLOR attribute:
<BODY BGCOLOR=“green”>

</BODY>
7. State the difference between the <HEAD> tag and the <BODY> tag.
Ans. The <HEAD> tag is used to provide header details i.e. it contains general information like the title
of your document. The <BODY> tag on the other hand holds all your content: words, pictures,
artwork and other stuff.
8. W
 hat is the extension of a HTML file? Also state atleast two methods of opening a HTML
document through your browser.

28 Foundation of Information Technology – X (Solution)


Ans. HTML files have .html or .htm extensions. You may use either of these methods to open a HTML
document in a web browser:
• Open Windows Explorer and now navigate your computer and click on the HTML document
you want to execute. Right click on it and from the popup menu that appears click “Open
With” and select your web browser.
• You may open any web browser and use the keyboard combination Ctrl+O to start the Open
dialog and select the relevant document.
9. What are comments in HTML? How is it given in a code?
Ans. Comments in HTML is used as a documentation for understanding the HTML code. It helps
programmers to understand the program. Comments in HTML always begin with <!-- and end
with --!>. The browser ignores any text placed inside the comment.
10. Explain the significance of the following attributes:
a. LINK
b. ALINK
c. VLINK
Ans.
a. The LINK attribute of the <A> tag is used to specify the color of unvisited links in a document.
b. The ALINK attribute of the <A> tag is used to specify the colour of an active link in a document.
c. The VLINK attribute of the <A> tag is used to specify the colour of the visited link.
11. What are the various margin attributes of the BODY tag? Briefly state each one of them.
Ans. The various margins of the attributes of the <BODY> tag are TOPMARGIN, BOTTOMARGIN,
LEFTMARGIN and RIGHTMARGIN.
T he TOPMARGIN attribute of the BODY tag is used to specify the amount of space that you
leave from the top of the web page. The BOTTOMARGIN attribute on the other hand specifies
the amount of space that will be left from the bottom of the web page. The LEFTMARGIN and
RIGHTMARGIN is used to specify the amount of space that will be at the left and right of the
web page respectively.

Application Oriented Questions


1. R
 anjit a student of class 10 has been allocated a duty to perform a workshop on creation of a
web page for class 8 students.
a. Before starting the workshop name the two software he requires to keep it at hand with
respect to:
i. Writing the HTML code.
ii. Seeing the output of the HTML code.
b. State the extension that is to be given to the HTML code during saving.
c. State any one procedure of executing the HTML code.

Introduction to Web Page Designing Using HTML 29


Ans.
a.
i. To write the HTML code Notepad may be used.
ii. To get the output of the HTML code a browser like Internet Explorer, Google Chrome,
Mozilla Firefox may be used.
b. The extension may be either .html or .htm.
c. Open Windows Explorer and now navigate your computer and click on the HTML document
you want to execute. Right-click on it and from the popup menu that appears click “Open
With” and select your web browser.
2. Answer the following questions:
a. Name the tag through which an HTML code should begin with.
b. Under which tag should the <TITLE> tag be placed.
c. Name the attribute of the BODY tag that is used to change the background colour.
d. Which attribute of the anchor tag is used to create a hyperlink?
e. Name the type of tag that has a starting and an end tag.
Ans.
a. <HTML>
b. <HEAD>
c. BGCOLOR
d. HREF
e. Container tag
3. Write HTML tags according to the following requirements:
a. Change the background colour of the web page to BLUE and text colour to RED.
b. Insert the image named “butterfly.jpg” as background image of a web page.
c. Add a comment “My first HTML page”.
d. Add a title “Programming in HTML” as title of the page.
e. Create a hyperlink for the website “facebook.com” when the text “Visit Facebook” is clicked.
f. Change the visited hyperlink default to GREEN.
g. Change the default right margin of your web page content to 80points.
Ans.
a. <BODY BGCOLOR =“BLUE” TEXT=“RED” >
b. <BODY BACKGROUND=“ butterfly.jpg”>
c. <!—My first HTML page -->
d. <TITLE> Programming in HTML </TITLE>
e. <A HREF=“facebook.com”>Visit Facebook</A>
f. <BODY VLINK=“GREEN”>
g. <BODY RIGHTMARGIN=“80”>

30 Foundation of Information Technology – X (Solution)


6
More Elements in HTML
A. MCQs.
1. The tag used to force a line break is ___________________.
a. <BR> b. <LINE>
c. <BREAK> d. <HR>
Ans. a. <BR>
2. The <STRONG>…</STRONG> tag is used to make a text ___________________.
a. Italics b. Underline
c. Bold d. Left Aligned
Ans. c. Bold
3. If the ALIGN attribute of the paragraph tag is missing then default alignment for the paragraph
tag would be ___________________.
a. JUSTIFY b. CENTER
c. RIGHT d. LEFT
Ans. d. LEFT
4. The number of header elements that can be used in a HTML file is ___________________.
a. 3 b. 4
c. 5 d. 6
Ans. d. 6
5. The default font for a page should be provided using ___________________ tag.
a. FONT b. BASEFONT
c. DEFAULTFONT d. none of these
Ans. b. BASEFONT
6. Which one of the following is an empty tag?
a. <P> b. <B>
c. <BR> d. <I>
Ans. c. <BR>
7. Which of the following tag is used to change the default font of a web page?
a. FONT b. DEFAULTFONT
c. BASEFONT d. FONTFACE
Ans. c. BASEFONT

31
8. Which of the following is not true for the <HR> tag?
a. It draws a horizontal line of certain width.
b. The default alignment of <HR> tag is CENTER.
c. The width of the horizontal rule cannot be changed.
d. The height of the horizontal rule can be changed.
Ans. c. The width of the horizontal rule cannot be changed.
9. Which of the following of the <HR> tag is used to create a horizontal rule without any shading?
a. TRANSPARENT b. SHADENO
c. NOFILL d. NOSHADE
Ans. d. NOSHADE
10. What should be the value of the ALIGN attribute that aligns both the left and right margin?
a. LEFT b. RIGHT
c. CENTER d. JUSTIFY
Ans. d. JUSTIFY

B. Fill in the blanks.


1. The SIZE attribute of the HR tag is used to specify the height.
2. The NOSHADE attribute of the <HR> tag is used to draw a horizontal rule without a shade.
3. The default alignment of a paragraph is LEFT.
4. There are six header elements that are used to provide headers in varied text sizes based on the
header level.
5. The U tag is used to underline a text.
6. The <STRONG> tag is used to make text Bold.
7. The header tag <H1> has the largest font in terms of size.
8. The JUSTIFY alignment gives a proportionate left and right margin.
9. The WIDTH attribute of the <HR> tag allows you to draw a horizontal line with lesser width.
10. The COLOR attribute of the <HR> tag is used to render a horizontal rule with a colour as specified
in this attribute.

C. True (T) or False (F).


1. You cannot change the default colour of the default font in html.-F
2. The FONT tag is used to specify the base font for the document to use.-F
3. You cannot change the size of a font in html.-F
4. The HR tag is used to force a line break in HTML.-F
5. The BODY tag is an empty tag.-F
6. You cannot change the default font of a page.-F

32 Foundation of Information Technology – X (Solution)


7. T he TRANSPARENCY attribute of the <HR> tag is used to draw a horizontal rule without any
shade.-F
8. The alignment of a paragraph is by default right-aligned.-F
9. There are six different levels of header tags.-T
10. The <BASEFONT> tag always supersedes the <FONT> tag.-T

D. Answer the following.


1. Name any three attributes of the FONT tag and its use.
Ans. The 3 attributes of the FONT tag are:
SIZE: It is used to specify the size of the font to be displayed.
COLOR: It is used to specify the colour of the font to be displayed.
FACE: It is used to specify the font to be used to display the text.
2. What is the difference between FONT and BASEFONT tags?
Ans. The BASEFONT tag is used to specify the base font for the document to use. This base font is
applied to complete document. Thus when the FONT tag is not used the attributes specified by
the BASEFONT is shown by default.
T hus the font specified with the <BASEFONT> tag is applied through out the page unless
superseded by the <FONT> tag.
3. Why is the <BR> tag called an empty tag?
Ans. The <BR> tag is called an empty tag because it does not have the closing tag.
4. Name any three attributes of the <HR> tag and their use.
Ans. The 3 attributes of the <HR> tag are:
SIZE: The SIZE attribute of the horizontal tag is used to specify the height of a horizontal rule in
pixels.
WIDTH: The WIDTH attribute of the horizontal tag is used to specify the width of the horizontal
rule in pixel or percentage.
ALIGN: The ALIGN attribute of the <HR> tag is generally used to align the horizontal rule either
at the LEFT, RIGHT or CENTER.
5. Explain the significance of the NOSHADE attribute of the <HR> tag.
Ans. The NOSHADE attribute of the <HR> tag is used to draw a horizontal rule without a shade unlike
which by default produces a shaded horizontal rule.
6. What are the tags used to emphasize text in HTML?
Ans. T he <B> tag is used to change the text to bold. The <I> tag is used to change the text to italics.
The <U> tag is used to underline the tag enclosed text.

More Elements in HTML 33


7. W
 hat are Headers? Write the header tag to display a level 2 heading “Computer” which should
be center aligned.
Ans. H
 eaders are a simple form of text formatting that allows us to give a heading to a page or
headings to a new section or subsection of a page. The six header elements (H1 through H6) are
used to provide headers in varied text sizes based on the header level.
<H2 ALIGN= “CENTER”> Computer </H2>
8. Write the tags required for displaying the following:
a. This text is normal whereas this is in bold.
b. This is in italics whereas this is underlined.
c. This text is underlined as well as bold.
d. This text is underlined.
But this text is in bold.
Ans.
a. This text is normal <B> whereas this is in bold</B>.
b. <I>This is in italics</I> <U>whereas this is underlined.</U>
c. <B><U>This text is underlined as well as bold.</U></B>
d. <U>This text is underlined.</U><BR>
<B>But this text is in bold.</B>
9. What is <IMG> tag used for?
Ans. The <img> tag defines an image in an HTML page. The <img> tag has two required attributes:
src and alt. Note: Images are not technically inserted into an HTML page, images are linked to
HTML pages. The <img> tag creates a holding space for the referenced image.
10. What do you understand by the terms ‘subscript’ and superscript?
Ans. T he superscript feature is used to raise a character or group of characters above a line of text on
the web page and in subscript is used to lower a character or group of characters below a line
of text on a web page. The <SUP> …</SUP> tag is used for superscripting and <SUB>…</SUB>
is used for subscripting.

Application Oriented Questions


Observe the following web page and write the HTML code to generate it.

34 Foundation of Information Technology – X (Solution)


HTML

HTML stands for Hyper-Text Mark-up language. It is a computer language which is devised for
website creation. These websites can be viewed by anyone else connected to the Internet with
a browser. It was developed in the year 1990 by scientist Sir Timothy John ‘Tim’ Berners-Lee of
England.

This is an example of Bookman Old Style of font size 14.

This is an example of Bold Text.

This text is in italics but right aligned.

This text is centered, underlined and bold.

Note the following points while generating the web page:


 Title of the page should be “Basic HTML Examples”.
 The default font style for the page should be “Times New Roman” of size 12 and BLUE
in colour.
 The text “HTML stands for … of England” should be defined in a paragraph of GREEN
colour and should be having JUSTIFY alignment.
 The Horizontal Rule should be RED in colour of height 2.
 The 4 lines just after the horizontal rule should be discrete lines (i.e. not in a paragraph)
but with line break having the following characteristics:
• The first line should be left aligned and should have the font style as “Bookman Old
Style” of size 14 and MAGENTA in colour.
• The second line should be left aligned but bold text in default font.
• The third line should be in italics but right aligned with the “Bookman Old Style”
font.
• The fourth line should be bold and underlined and should have the alignment
centered.
Ans.
<HTML>
<HEAD>
<TITLE>Basic HTML Examples</TITLE>
<BASEFONT FACE=“Times New Roman” COLOR=“BLUE” SIZE=“12”>
</HEAD>
<BODY>
<H1 ALIGN=“CENTER”>HTML</H1>
More Elements in HTML 35
<P ALIGN=“JUSTIFY”>
<FONT COLOR=“GREEN”>
 TML stands for Hyper-Text Mark-up language. It is a computer language which is devised for
H
website creation. These websites can be viewed by anyone else connected to the Internet with
a browser. It was developed in the year 1990 by scientist Sir Timothy John ‘Tim’ Berners-Lee of
England.
</FONT>
</P>
<HR SIZE=“2” COLOR=“RED”>
<FONT FACE=“Bookman Old Style” SIZE=“14”>
This is an example of Bookman Old Style of font size 14.
</FONT>
<BR>
<B>This is an example of Bold Text.</B>
<BR>
<P ALIGN=“RIGHT”>
<I>This text is in italics but right aligned.</I>
</P>
<BR>
<P ALIGN=“CENTER”>
<U><B>This text is centered, underlined and bold.</B></U>
</P>
</BODY>
</HTML>

36 Foundation of Information Technology – X (Solution)


7
Lists, Tables and Anchors in HTML
A. MCQs.
1. What are the different types of list that can be created in HTML?
a. Unordered List b. Ordered List
c. Definition List d. All of these
Ans. d. All of these
2. Which among the following list displays symbols as bullets for the list?
a. Unordered List b. Ordered List
c. Definition List d. All of these
Ans. a. Unordered List
3. Which among the following is not used as symbol for Unordered List?
a. Square b. Rectangle
c. Circle d. Disc
Ans. b. Rectangle
4. Which among the following is not used in Numbered List?
a. A b. a
c. i d. @
Ans. d. @
5. W
 hich among the following attributes changes the starting sequence of numbering in an Ordered
List?
a. BEGIN b. START
c. INDEX d. All of these
Ans. b. START
6. A list prefixed with a symbol before it is called _________________.
a. Unordered List b. Ordered List
c. Both a and b d. none of these.
Ans. a. Unordered List
7. W
 hich among the following symbols will be displayed if the TYPE attribute of the <UL> tag is given
the value as “DISC”?
a. • b. ○
c. d. □
Ans. a •

37
8. What is the default numbering of the ordered list?
a. 1, 2, 3… b. a, b, c,…
c. i, ii, iii… d. A, B, C…
Ans. a. 1, 2, 3…
9. Which attribute of the <A> tag is used to specify a name to an Anchor?
a. HREF b. NAME
c. TYPE d. None of these
Ans. b. NAME
10. Name the attribute which you used to specify the source of an image.
a. WIDTH b. HEIGHT
c. SRC d. SOURCE
Ans. c. SRC
11. The _______________ attribute is used to specify the border colour of a table.
a. BCOLOR b. BRCLR
c. BORDERCOLOR d. BC
Ans. c. BORDERCOLOR
12. The _____________attribute of the table tag is used to specify the distance between the adjacent
cells in a table.
a. SPACE b. CS
c. CELLSPACING d. none of these
Ans. c. CELLSPACING
13. The _____________attribute of the table is used to specify the distance between the cell content
and cell boundary.
a. CELLPADDING b. CELLSPACING
c. SPACING d. CELL
Ans. a. CELLPADDING
14. Which TARGET attribute value of the anchor <A> tag is used to specify that a web page is to be
loaded in a new window?
a. _SELF b. _BLANK
c. _PARENT d. _TOP
Ans. b. _BLANK
15. If we want an image to be the hyperlink, the correct syntax is:
a. <img src=image.gif><a href=try.html>click</a>
b. <a href=try.html><img src=image.gif>click</a>
c. <a href= image.gif ><img src= try.html>click</a>
d. <img src= try.html>
Ans. b. <a href=try.html><img src=image.gif>click</a>
38 Foundation of Information Technology – X (Solution)
16. Which attribute tells how many rows a cell should span?
a. COLSPAN=n b. ROWSPAN=n
c. Both a and b d. None of these
Ans. b. ROWSPAN=n
17. What is CELLSPACING attribute of the TABLE attribute used for?
a. It is used to specify the distance between the column-heading and the first row of a column.
b. It is used to specify the distance between the cell content of two adjacent cells.
c. It is used to specify the distance between the cell content and cell boundary.
d. It is used to specify the distance between the adjacent cells in a table.
Ans. d. It is used to specify the distance between the adjacent cells in a table.
18. Which tag is used to create a title for a table?
a. <CAPTION> b. <TITLE>
c. <HEADING> d. <TABLETITLE>
Ans. a. <CAPTION>

B. Fill in the blanks.


1. <UL> tag is used to define an Unordered lists.
2. The value circle of the TYPE attribute of the <UL> tag is used to display a hollow round bullet.
3. The <LI> tag is used to define the list item for both <UL> and <OL> tags.
4. The Definition list do not have a bullet or a number before it, instead it is indented.
5. The <TR> tag is used to insert a table row.
6. The CAPTION attribute is used to specify the title for the table.
7. The BORDER attribute of the TABLE tag is used specify the border size of a table.
8. Using the Anchor tag you can define hyperlinks for both text as well as images.
9. T o refer to a link to a particular segment of a web page you should specify the name of the Anchor
in the HREF attribute preceded by the # symbol.
10. The CELLSPACING attribute of the TABLE tag is used to specify the distance between the cell
content and cell boundary.
11. Text written with ALT attribute appears like a tool tip in Internet Explorer.
12. TARGET attribute with <A> tag is used to open a link in a new window.
13. The ALIGN attribute of the TABLE tag is used to specify the alignment of the table itself.
14. The CELLPADDING attribute of the TABLE tag is used to specify the distance between the adjacent
cells in a table.

C. True (T) or False (F).


1. You cannot insert bulleted text in a page.-F
2. Ordered Lists is also called Numbered Lists.-T

Lists, Tables and Anchors in HTML 39


3. <LI> stands for List Item.-T
4. <UL> tag is used to specify Unordered lists.-T
5. The default numbering style in a ordered lists is A, B, C …-F
6. The <LI> tag should always close with </LI> tag.-F
7. The START attribute of the Ordered List changes the sequence of numbering in an ordered list.-T
8. The TABLE data can be inserted using the DATA tag.-F
9. T he CELLSPACING attribute of the TABLE tag is used to specify the distance between the adjacent
cells in a table.-F
10. The HEIGHT and WIDTH of a table can never be changed in a TABLE.-F
11. You cannot hyperlink to the same page.-F
12. The BORDER attribute of the TABLE tag is used specify the border colour of a table.-T
13. Tables are used in HTML to display tabular data in the form of rows and columns.-T
14. The <TH>…</TH> tag to define a row heading.-T
15. The CELLPADDING attribute is used to specify the distance between the cell content and cell
boundary.-F
16. ROWSPAN=“two” will span through two rows.-F
17. The TARGET attribute of the <A> tag is used to specify the computer over a network where the
hyperlink would load.-F

D. Answer the following.


1. What is a List? What are the different categories of list that you can create using HTML?
Ans. Lists in HTML is used to arrange data containing bullets and numbering to produce an ordered
set of text. The different categories of list that can be created using HTML are:
a. Ordered List
b. Un-Ordered List
c. Definition List
2. State one difference between Ordered List and Unordered List.
Ans. Unordered Lists are used to display with bullets before each item in the list. Ordered Lists also
called Numbered Lists are used to specify numbers instead of bullets as in Unordered lists.
3. W
 hat is the significance of TYPE attribute in Unordered list in HTML? What are the different
possible TYPE attributes available for <UL> tag?
Ans. T he TYPE attribute of the UL tag is used to define the symbol for the bullets which may be disc,
circle or square.
4. W
 hat is <OL> tag used for? Write the <OL> tag along with its attributes to create a numbered
list, where numbering is done using alphabets starting from ‘e’.
Ans. Ordered Lists also called Numbered Lists are used to specify numbers instead of bullets as in
Unordered lists.
<OL TYPE=“a” START=“5”>
40 Foundation of Information Technology – X (Solution)
5. What is Definition List? What are tags associated with the Definition List?
Ans. A definition list is a list of terms and corresponding definitions. Definition lists are typically
formatted with the term on the left with the definition following on the right or on the next line.
The definition text is typically indented with respect to the term.
 definition list always begins with the <DL> tag and ends with the </DL> tag. The definition
A
term is tagged as <DT> and a definition description tagged as <DD>.
6. W
 hat is a Table? Define the Table tag to create a table consisting of GREEN background and RED
border colour.
Ans. Tables are used in HTML to display tabular data in the form of rows and columns.
<TABLE BORDER=4 BORDERCOLOR=RED BGCOLOR=GREEN>
7. State the difference between the <TD> and <TR> tags.
Ans. < TD>…</TD> tag to define a data cell. <TR>…</TR> tag on the other hand is used to define a
table row.
8. State the function of the <CAPTION> tag that is used with a table.
Ans. <CAPTION>…</CAPTION> tag to define a title or caption for the table.
9. State the meaning of each attribute of the table tag:
<TABLE BORDER=4 BORDERCOLOR=RED WIDTH=600 HEIGHT=200>
Ans. T his is to state that the table should be drawn with a border thickness of 4 pixels, having colour
of the border as red, with the width and height of the table as 600 and 200 respectively.
10. Write the complete <TABLE>…</TABLE> tag to create a table with the following contents.

E nsure that the background of each data cell should have the colour as specified in the
corresponding column heading.
Ans.
<TABLE>
<CAPTION>Colours</CAPTION>
<TH>RED</TH>
<TH>GREEN</TH>
Lists, Tables and Anchors in HTML 41
<TH>BLUE</TH>
<TH>ORANGE</TH>
<TH>CYAN</TH>
<TR>
<TD BGCOLOR=“RED” WIDTH=“100” HEIGHT=“50”></TD>
<TD BGCOLOR=“GREEN” WIDTH=“100” HEIGHT=“50”></TD>
<TD BGCOLOR=“BLUE” WIDTH=“100” HEIGHT=“50”></TD>
<TD BGCOLOR=“ORANGE” WIDTH=“100” HEIGHT=“50”></TD>
<TD BGCOLOR=“CYAN” WIDTH=“100” HEIGHT=“50”></TD>
</TR>
</TABLE>

Application Oriented Questions


1. Observe the following web page and write the HTML code to generate it.
Observe the following web page and write the HTML code to generate it.

MANGOES IN INDIA

Mangoes of India are well famous in the world for its sweetness, richness and flavor,
The land of India is the largest producer of mangoes and  most important fruit of the
country.

Most popular types of mangoes in India are:


□ Alphonsos
□ Badami
□ Chausa
□ Dasheri
Some other famous varieties of mango includes:
o Bombay Green
o Amrapali
o Kishenbhog
o Mankurad,Pairi
o Fazli.

42 Foundation of Information Technology – X (Solution)


Note the following points while generating the web page:
• Title of the page is “Indian Mangoes”.
• Font style for the page is Arial.
• Heading of the page is blue.
• Image used is mangoes.png.
Ans.
<HTML>
<HEAD>
<TITLE>Indian Mangoes</TITLE>
<BASEFONT FACE=“Arial”>
</HEAD>
<BODY>
<H1 ALIGN=“CENTER”> <FONT COLOR=“BLUE”>MANGOES IN INDIA </FONT></H1>
<P ALIGN=“JUSTIFY”>
Mangoes of India are well famous in the world for its sweetness, richness and flavor, the land of
India is the largest producer of mangoes and most important fruit of the country.
</P>
<IMG SRG=“mangoes.png”><BR>
Most popular types of mangoes in India are:<BR>
<UL TYPE=“SQUARE”>
<LI>Alphonsos
<LI>Badami
<LI>Chausa
<LI>Dasheri
</UL>
<BR>
Some other famous varieties of mango includes:<BR>
<UL TYPE=“SQUARE”>
<LI>Bombay Green
<LI>Amrapali
<LI>Kishenbhog
<LI>Mankurad,Pairi
<LI>Fazli.
</UL>
</BODY>
</HTML>
Lists, Tables and Anchors in HTML 43
2. Observe the following web page and write the HTML code to generate it.

Note the following points while generating the web page:


• Title of page is “Global Warming”
• Link colour is green
• Font style for the page is Arial
• Heading of the page is blue
• Image used is “warming.png”
• Table border is 2px and border colour is red
• Use links as:
o For Greenhouse gases as one.html
o For Particulates and soot as two.html
o For Solar activity as three.html
• E-mail id for bottom message is abc@xyz.com
Ans.
<HTML>
<HEAD>
<TITLE>Global Warming</TITLE>
<BASEFONT FACE=“Arial”>
</HEAD>
<BODY LINK=“GREEN”>
<H1 ALIGN=“CENTER”><FONT COLOR=“BLUE”>Global
Warming</FONT></H1>

44 Foundation of Information Technology – X (Solution)


<P ALIGN=“JUSTIFY”>
Global warming is the observed century-scale rise in the average temperature
of Earth’s climate system.
</P>
<P ALIGN=“JUSTIFY”>
Since the early 20th century, the global air and sea surface temperature has increased about
0.8 &deg C (1.4 &deg F), with about two-third of the increase occurring since 1980. Initial cause
of temperature changes:
</P>
<IMG SRC=“warming.png” ALT=”beautiful rose”” STYLE=”FLOAT:RIGHT;”>
<UL TYPE=“SQUARE”>
<LI><A HREF=“one.html”>Greenhouse gases</A>
<LI><A HREF=“two.html”>Particulates and soot</A>
<LI><A HREF=“three.html”>Solar Activity</A>
</UL>
<TABLE BORDER=“2”>
<CAPTION>Observed and expected environmental effects</CAPTION>
<TR>
<TD>Natural systems</TD>
<TD>Ecological systems</TD>
<TD>Long-term effects</TD>
<TD>Large-scale and abrupt impacts</TD>
</TR>
</TABLE>
<a href=“mailto:abc@xyz.com”>For more details</a>
</BODY>
</HTML>

Lists, Tables and Anchors in HTML 45


8
Introduction to XML
A. MCQs.
1. Attributes in XML should be enclosed within ________________.
a. single quotes b. double quotes
c. both a and b d. none of these
Ans. c. both a and b
2. Which among the following is not applicable in XML?
a. Attributes cannot contain multiple values.
b. Tags are not case sensitive.
c. Attributes cannot contain tree structures.
d. There should always be a root element.
Ans. b. Tags are not case sensitive.
3. The first line in a XML document is called a ________________.
a. preface b. prologue
c. starter d. prefix
Ans. b. prologue
4. The entity reference to define an apostrophe is ________________.
a. &phe b. & trophe
c. &apos d. & apostrophe
Ans. c. &apos
5. Which among the following is used to insert a comment in XML?
a. <!-- --> b. //
c. /* */ d. <comment> </comment>
Ans. a. <!-- -->
6. Which among the following is not true for a Well Formed XML document?
a. XML documents must have a root element.
b. XML elements must have a closing tag
c. XML tags are case sensitive
d. XML documents should always have comments.
Ans. d. XML documents should always have comments.

46
7. Is this a well formed XML document?
<?xml version = “1.0”?>
<note>
<to age = “29”> Tove </to>
<from> John </from>
a. Yes b. No
c. Can’t say d. None of these
Ans. b.No
8. V
 alidating an XML document refers to an XML document that is _____________________________.
a. well formed b. confirm to DTD
c. both a and b d. none of these
Ans. c. both a and b
9. The use of DTD in XML development is:
a. required when validating XML documents
b. no longer necessary after the XML editor has been customized
c. used to direct conversion using the XSLT processor
d. a good guide to populating a template to be filled in when generating an XML document
automatically.
Ans. a. required when validating XML documents
10. Valid XML document means
a. the document has root element
b. the document contains at least one or more root element
c. the XML document has DTD associated with it and it complies with that DTD
d. each element must nest inside any enclosing element properly
Ans. c. the XML document has DTD associated with it and it complies with that DTD
11. Which of the following XML fragments are well formed?
a. <element attribute=value>
b. <element attribute=“value”>
c. <element attribute=!value>
d. <element attribute=‘value’>
Ans. b. <element attribute=“value”>
12. XML document can be viewed in
a. word processor b. web browser
c. notepad d. all of these
Ans. d. all of these

Introduction to XML 47
13. How is an empty element defined in XML?
a. <name></name> b. <name/>
c. <name /> d. all of these
Ans. d. all of these

B. Fill in the blanks.


1. Every closing tag of an XML document is Prefixed with / (slash).
2. The root element encloses all other elements in XML.
3. Empty elements are starting and closing tags without any content.
4. XML attributes are used to provide additional information about elements.
5. XML attributes should always be enclosed within quotes.
6. An XML parser is the component that deciphers the XML code.
7. Validator is a software that is used to check the syntax of a XML document.
8. Comments are remarks that are not part of the code but a part of documentation.
9. The entity reference for the “greater than >” symbol is &gt;.
10. A tag within a tag is called a nested tag.

C. True (T) or False (F).


1. XML like HTML is not case sensitive.-F
2. XML can be utilized to store information.-T
3. It is possible to create your own tags in XML.-T
4. You may have empty tags in XML.-T
5. Every XML document may not have a root element.-F
6. <message /> is a valid example of an empty tag.-T
7. You may not enclose values for attributes of tags in quotes.-F
8. You may have multiple values for an attribute.-F
9. The first line is the XML declaration is called the prolog.-T
10. It is not possible to provide comments in XML documents.-F

D. Answer the following.


1. What is XML?
Ans. XML stands for eXtensible Markup Language (XML) which is a markup language that allows
encoding of documents using a predefined set of rules which is both human-readable and
machine-readable.
2. State three characteristics of XML.
Ans. The three charceteristics of HTML are:

48 Foundation of Information Technology – X (Solution)


1. XML is extensible. It permits the client to make his own tags and record structure.
2. XML can be utilized to store information. Applications could be composed to store and
recover data.
3. XML may be utilized to trade information.
3. State the differences between HTML and XML.
Ans. Difference between HTML and XML:
HTML XML
HTML is used to display data and to XML is used to describe data and focus on what
focus on formatting of data. data is.
HTML tags are predefined. XML tags are not predefined. It is possible to
create and define new tags as per your needs.
HTML tags may or may not have XML tags must have a closing tag. (only
closing tags. (Container tags and container tags are allowed)
Empty tags)
HTML tags are not case sensitive. XML tags are case sensitive.
4. What do you understand by the term XML element?
Ans. XML elements are tags that forms a XML document. There are no predefined tags in XML unlike
HTML. You need to define your own tags in XML.
5. “XML tags are case sensitive” explain the comment with the help of an example.
Ans. XML tags are case sensitive unlike HTML tags which are not case sensitive. For example in HTML
the tag <FONT> and <font> is one and the same. But in XML such tags are treated separately.
Thus the tag <Message> is different from the tag <MESSAGE>. Also note that the opening and
closing tags must be written with the same case. For example:
<Message>This is incorrect</message>
<MESSAGE>This is correct</ MESSAGE >
6. Explain with a help of an example how root elements are placed in a XML document.
Ans. XML documents must contain one element that is the parent of all other elements. This
element is called the root element. The root element encloses all other elements in XML. All
other elements inside the root elements form the child element. The child element may again
contain subchild elements and subsequently more nested elements may be inserted. The level
of nesting may be extended upto any level. The structure of the XML file should look like this:
<root>
<child>
<subchild>.....</subchild>
</child>
</root>
F or example in case you need to store information of students (i.e., first name and last name) of
a certain school using an XML document it should look like this:
Introduction to XML 49
<school>
<student>
<serial> 1 </serial>
<firstname> Shaahn </firstname>
<lastname> Kohli </lastname>
</student>
<student>
<serial> 2 </serial>
<firstname> Subham </firstname>
<lastname> Karki </lastname>
</student>
<student>
<serial> 3</serial>
<firstname> Rohit </firstname>
<lastname> Agarwal </lastname>
</student>
</school>
Y ou can see in the above example that the root element declared out here is <school> then
comes the child element <student> which in turn stores the <firstname> and <lastname> of the
student in the tags.
7. What are empty XML elements? Give an example.
Ans. An empty XML element document that is used to create a tag without any content.
F or example if the <message> tag is to be specified without any content. It is valid to write the
tags as:
<message></message>
It can be written like this as well:
<message />
This sort of element syntax is called self-closing.
8. State the naming rules of XML elements.
Ans. XML elements must follow these naming rules:
• Names can contain letters, numbers but no special characters. Thus <state1>, <sta1te>, and
<topper5> are valid but <state@>, <sta%te>, <tx,r> and <topper#> are invalid.
• Names cannot start with a number. Thus <1state> is invalid.
• Names cannot contain spaces. Thus <first name> and <last name> are invalid tags.
• Any name can be used, no words are reserved.

50 Foundation of Information Technology – X (Solution)


9. What are attributes in XML?
Ans. XML attributes are used to describe XML elements, or to provide additional information about
elements. As you have already seen that in HTML, attributes provide additional information
about elements. For example:
<BODY BGCOLOR=“GREEN”>
Y ou can see that the BGCOLOR attribute changes the background colour of the web page to
GREEN.
Y ou can even create your own attributes in XML. The attribute values in XML must always be
quoted, which may be either single or double quotes. For example in XML a person’s sex, can
be written as:
<person sex=“female”>
or written as:
<person sex=‘female’>
10. What is a XML prolog?
Ans. A
 XML Prolog is the section at the beginning of an XML document which includes everything
that appears before the document’s root element. The XML declaration, the DOCTYPE and any
processing instructions or comments may all be a part of it. Depending on your needs, you can
choose to include both, either, or neither of these items in your XML document.
11. What are entity references?
Ans. A
 n entity reference is an alternative name for a series of characters. You can use an entity in the
&name; format, where name is the name of the entity. There are some predefined entities in
XML, bfurthermore you can declare entities in a DTD (Document Type Definition). There are 5
predefined entity references in XML:
&lt; < less than
&gt; > greater than
&amp; & ampersand
&apos; ‘ apostrophe
&quot; “ quotation mark
12. What is comments used for? How are comments provided in a XML document?
Ans. Comments are lines which are used for documentation and is completely ignored by the browser
for interpretation always begins with <!—and ends with -->
13. What is DTD? What are the two ways to define DTD?
Ans. A Document Type Definition (DTD) is a file that defines the schema or structure of a document
encoded in XML. A DTD can be declared inline inside an XML document, or as an external
reference.
14. State the difference between SYSTEM and PUBLIC as used in DTD.
Ans. T he SYSTEM keyword is used when the XML and DTD resides in the same machine. The PUBLIC
keyword is used when the DTD file is in the public domain.
Introduction to XML 51
15. State the significance of +, * and ? symbols used after child elements in DTD.
Ans. The + sign after a child element indicates that the child element occurs one or more times inside
the element.
T he * sign after a child element indicates that the child element occurs zero or more times
inside the element.
T he ? sign after a child element indicates that the child element occurs zero or one time inside
the element.
16. State the different attribute values that you can provide along with their usage.
Ans. The attribute list declaration ensures that the XML document contains valid attribute list for an
element. It has the general syntax:
<!ATTLIST element-name attribute-name attribute-type attribute-value>
• element-name is the name of the element.
• attribute-name is the name of the attribute.
• attribute-type is the type of the attribute. Some common types used are:
Common Attribute Type Meaning
CDATA The value is character data.
ID The value is a unique ID.
NMTOKEN The value is a valid XML name.
ENTITY The value is an entity.
• attribute-value may be one of the following:
Value Explanation
value It is used to refer assign the default
value of the attribute.
#REQUIRED It is used to indicate that it is
compulsory to give the attribute.
#IMPLIED It is used to indicate that the attribute
is optional.
#FIXED value It is used to specify the fixed value
for the attribute.
17. What does “Well Formed XML document” mean?
Ans. XML documents that abide by the syntax rules of XML documents are called “Well Formed XML
document”. The syntax rules for XML are:
• XML documents must have a root element
• XML elements must have a closing tag
• XML tags are case sensitive
• XML elements must be properly nested
• XML attribute values must be quoted

52 Foundation of Information Technology – X (Solution)


18. How do you validate a XML document?
Ans. To validate an XML document a XML validator software is used. A XML validator is a software
that is used to check the syntax of your XML document.
19. What is an XML Parser?
Ans. A
 n XML parser provides vital information to the program on how to read the file. It is built in
within the web browser.
 n XML parser is the component that deciphers the XML code. Without a parser, your code
A
cannot be understood. Computers require instruction. An XML parser provides vital information
to the program on how to read the file. Parsers come in multiple formats and styles. They can
be freestanding software, libraries, modules and classes.
20. How do you view XML documents in a web browser?
Ans. It is possible for raw XML files to be viewed in all major browsers. But XML files are not displayed
as HTML pages but with colour-coded root and child elements. A plus (+) or minus sign (-) to
the left of the elements can be clicked to expand or collapse the element structure. To view the
raw XML source (without the + and - signs), select “View Page Source” or “View Source” from
the browser menu.
Y ou may double click on the XML document through My Computer ( or Computer as in Windows
7) to open it in the default browser.

Application Oriented Questions


1. X
 ML document structure can be divided in which two parts? What is meant by valid XML
document (write three points)? Write the code to create an XML document to present the
following data:
Name Job Department Cubicle
Srishti Programmer Engineer 5E
Aditi Designer Marketing 19T
Ans. The two parts of an XML document are XML Tree and DTD.
A Valid XML document abides by the following rules:
1. XML documents must have a root element
2. XML elements must have a closing tag
3. XML tags are case sensitive
<employees>
<emp>
<Name> Srishti</Name>
<Job>Programmer</Job>
<Department>Engineer</Department>
<Cubicle>5E</Cubicle>
</emp>

Introduction to XML 53
<emp>
<Name> Aditi</Name>
<Job> Designer </Job>
<Department> Marketing </Department>
<Cubicle>19T </Cubicle>
</emp>
</employee>
2. Draw the XML tree for the code given below:
<employees>
<employee sex= “male”>
<name>
<first> Harry </first>
<last> Potter </last>
</name>
</employee>
<employee sex= “female”>
<name>
<first>Linda</first>
<last> Ray </last>
</name>
</employee>
</employees>
Ans.

Attribute: “sex”

54 Foundation of Information Technology – X (Solution)


3. Draw the XML tree for the code given below:
<furniture>
<Table material= “wood”>
<Primary>100</Primary>
<Middle>150</Middle>
<Senior>150</Senior>
</Table>
<Table material= “plastic”>
<Primary>200</Primary>
<Middle>135</Middle>
<Senior>150</Senior>0
</Table>
</furniture>
Ans.

Attribute: “sex”

4. C
 reate a DTD for storing book information for a library. The DTD should contain details about
each book in terms of title, author (name, nickname), no.of copies, all of which can store
character data. The no.of copies should contain two attributes named ‘inhand’ and issued
which are both mandatory.

Introduction to XML 55
Ans.
<? xml version= “1.0” ?>
<!DOCTYPE LIBRARY[
<!ELEMENT LIBRARY (BOOK+)>
<!ELEMENT BOOK (TITLE, AUTHOR+, NOC)>
<!ELEMENT AUTHOR (NAME, NICKNAME)>
<!ELEMENT TITLE (#PCDATA)>
<!ELEMENT NAME (#PCDATA)>
<!ELEMENT NICNAME (#PCDATA)>
<!ELEMENT NOC (#PCDATA)>
<! ATTLIST NOC INHAND ISSUED CDATA #REQUIRED>
]>
5. Observe the DTD below and answer the following questions:
<? xml version= “1.0” ?>
<!DOCTYPE Company[
<!ELEMENT Company (Employee+)>
<!ELEMENT Employee (FirstName, LastName, ContactNo, Email)>
<!ELEMENT FirstName (#PCDATA)>
<!ELEMENT LastName (#PCDATA)>
<!ELEMENT ContactNo (#PCDATA)>
<!ELEMENT Email (#PCDATA)>
<! ATTLIST email address CDATA #REQUIRED>
]>
a.
Name the root element of the above XML document.
b.
How many child elements are there in the above DTD? Name them.
c.
What does the ‘+’ sign after the Employee element signify?
d.
Which of the element has an attribute associated with it? Name the element and also
the attribute associated with it.
e. What is the basic difference between the keywords PCDATA and CDATA?
Ans a. Company
b. Child Element: Employee, which again contains FirstName, LastName, ContactNo and Email.
c. It signifies that the Employee occur one or more times inside the element.
d. Element: email and attribute: address
e. PCDATA stands for Parsed Character Data and XML parsers normally parse all the text in an
XML document.
 DATA - (Unparsed) Character Data is used about text data that should not be parsed by the
C
XML parser.

56 Foundation of Information Technology – X (Solution)


9
Security Issues of IT
A. MCQs.
1. Programmers that break into secure systems for malicious purpose are
a. Crackers b. Hackers
c. Breakers d. Burglars
Ans. b. Hackers
2. A good way to safeguard access to your computers is to ________________ protect it.
a. deadbolt b. copyright
c. safemode d. password
Ans. d. password
3. The electronic equivalent of junk mail is known as
a. adware b. cyber fraud
c. spam d. packets
Ans. c. spam
4. Copy of data that can be used to restore and recover data is ________________.
a. the copied data b. backup
c. restoration data d. none of these
Ans. b. backup
5. A program designed to replicate and eat up a computer’s storage is called
a. Virus b. Spam
c. Worm d. Mail
Ans. c. Worm
6. A digital document issued to a site by a certification authority of internet
a. e-code b. digital certificate
c. digital signature d. digital id
Ans. b. digital certificate
7. To avoid problems while working with internet you should follow this precaution:
a. Install antivirus on your computer
b. Take the backup of your files regularly
c. Do not click on unknown links
d. All of these
Ans. d. All of these

57
8. A
 hardware or a software that filters the data that enters a system when connected to a network
is called:
a. Filter b. Encoder
c. Firewall d. Decoder
Ans. c. Firewall
9. Which among the following is not a Social Networking site?
a. Facebook b. Google+
c. Twitter d. Rediffmail
Ans. d. Rediffmail
10. Which among the following refers to the act of copying copyrighted material?
a. Hacking b. Cracking
c. Piracy d. Phising
Ans. c. Piracy

B. Fill in the blanks.


1. Malware is the general term to refer to infectious software such as virus, worm, spyware, etc.
2. Trojans is a program that appears harmless but actually performs malicious functions.
3. S pyware is a software that is downloaded onto your computer to track your activities without
your knowledge.
4. 
Anti-Virus protects a server, a network and an individual PC from attack by viruses from other
systems.
5. Both Pharming and Phising makes an imposter site look like a genuine site.
6. S hareware is software that is distributed free of cost usually for evaluation but requires to pay in
case it is in continued use after a specific period.
7. Differential backup copies all the files or data that has been changed since the last full backup.
8. I ncremental backup allows you to copy only those files which have been altered since the last full
backup.
9. B
 ackup is the act of duplicating documents or databases with the goal that they will be protected
if there should arise an occurrence of equipment failure or other calamity.
10. Quarantine refers to the act of moving infected files to a safe location that is managed by the
antivirus software.

C. True (T) or False (F).


1. Spyware is software that spies on a user’s activities on computer and reports it.-T
2. Backup is duplication of data for restoring purpose at a later time.-T
3. To avoid spam never click on links that come from someone you do not know.-T
4. H
 acker is a person who breaks security with mal-intention to start what we have stored on our
computers.-F
58 Foundation of Information Technology – X (Solution)
5. Local Backups allows various websites to backup your memory.-F
6. Browser Hijacker is a malicious program that hijacks your browser.-T
7. P
 hising refers to the use of electronic messaging systems to send unwanted bulk messages
(spam), especially advertising, indiscriminately.-F
8. S pyware programs secretly gather information from the computer it has infected and transmit
the information to a different location.-T
9. Mail worms are embedded as an e-mail attachment.-T
10. Polymorphic Viruses are made in such a way that makes it almost impossible to detect.-T

D. Answer the following.


1. State two reasons for having security in a Computer System.
Ans. The reasons for computer security are:
i. It is used to ensure data protections.
ii. It is used to ensure that the computer performs well and gives accessibility to only authorised
persons at any point of time.
2. What is a Virus? Name any two viruses.
Ans. V
 irus is a program, which is intended to disrupt the normal functioning of the computer system.
Example of viruses-Scott’s Valley, Seven Dust.
3. State the difference between Worms and Trojans.
Ans.
Virus Worms

The virus is the program code that attaches The worm is code that replicate itself in order
itself to application program and when to consume resources to bring it down.
application program run it runs along with it.

It inserts itself into a file or executable program. It exploits a weakness in an application or


operating system by replicating itself.

It has to rely on users transferring infected It can use a network to replicate itself to other
files/programs to other computer systems. computer systems without user intervention.

Infection effect may lead to deletion or Infection usually do not lead to deletion or
modification of files. Sometimes a virus also modification of files but only monopolize the
changes the location of files. CPU and memory.

The infection speed of virus is slower than Infection speed of worm is faster than virus.
worm. E.g. The code red worm affected 3 lack PCs in
just 14 Hrs.

Security Issues of IT 59
4. State any three ways through which a computer gets infected.
Ans. The three ways in which a virus can spread in a computer are:
• A virus can spread if you are using an infected media like Pen drives, CD, DVD, etc, which may
have itself got infected from some other computer.
• Certain virus may attach itself to other software thus every time you run the software, the
virus replicates by attaching itself to other software.
• Your computer may get infected when you boot your computer using an infected media.
5. What is a Boot Sector virus? Give two examples.
Ans. A
 boot sector virus is a computer virus that infects a storage device’s (usually hard disk) master
boot record (MBR). Thus the infected computer is unable to boot.
Example- Brain and Michelangelo
6. How are File viruses different from Macro Viruses?
Ans. File Virus or Parasitic Virus attaches itself to an arbitrary file. Therefore whenever the host file
gets executed the virus also gets executed. Macro Viruses on the other hand uses a programming
language embedded in certain software. Thus a document having the macro virus when opened
gets the macro virus executed.
7. Write short notes on:
a. Multipartite Virus
b. Polymorphic Virus
c. Stealth Virus
Ans.
i. Multipartite viruses infect both hard disk sectors along with the executable files. That is why
it is also called multipartite or hybrid virus. These viruses has complex mode of replicating
itself making it difficult to remove. Emperor, Tequilla and Natas are some examples of these
viruses.
ii. Polymorphic viruses have the capability of changing itself after infecting a computer. Thus
copies of viruses that are present in the computer may be slightly different from each other,
which make it difficult for anti-virus software to detect and remove it. Satan Bug, Elkern and
Proud are some examples of these viruses.
iii. Stealth viruses are made in such a way that makes it almost impossible to detect. Even if
they attach itself to a program, the program may appear normal, thus remaining undetected
by any anti-virus software. Whale and Zer Bug are some examples of stealth viruses.
8. What is a Spamming? State different ways of stopping spamming.
Ans. Spamming refers to the use of electronic messaging systems to send unwanted bulk messages
(spam), especially advertising, indiscriminately. The most widely recognized form of spam
is e-mail (electronic mail) spam. However the term is also applied to similar abuses in other
media: instant messaging spam, Usenet newsgroup spam, Web search engine spam, spam in
blogs, wiki spam, online classified ads spam, mobile phone messaging spam, Internet forum
spam, junk fax transmissions, social networking spam, social spam, television advertising and
file sharing spam.
60 Foundation of Information Technology – X (Solution)
S pamming remains economically viable because advertisers have very little or sometimes no
operating costs beyond the management of their mailing lists, and it is almost impossible to
hold senders accountable for their mass mailings. On the other hand it costs huge to the sender
and may sometime even get dubbed.
9. What is Spyware?
Ans. Spyware programs secretly gather information from the computer it has infected and transmit
the information to a different location. It may be used for identifying user habits and post
advertisements accordingly or sometimes even vital information like username or passwords
may be transmitted.
10. What is an Anti-Virus Software? Explain three options that you generally get with an Anti-Virus
software.
Ans. Antivirus software is used to remove viruses and other malware programs from your computer.
It uses two of these techniques to secure your computer.
• Scan files for known viruses that match with the virus definition list that is built within it.
But this requires you to continuously update your antivirus software to add new definition
to the list. Otherwise your antivirus software goes obsolete and will not be able to remove
newer viruses.
• Identifies suspicious behavior of a computer program that may had been infected.
The three options that you generally get with an Antivirus Software are:
• Fix: It cleans a file that is infected with a virus.
• Quarantine: Certain virus may be too difficult to be removed completely, this virus are
disabled and kept in a safe place so that it cannot infect other files.
• Delete: It deletes an infected file along with the virus. Since this option also deletes the
original file which got infected, it should only be used when the previous two options do not
work.
11. What does the term Backup mean? Name the different types of Backups.
Ans. B
 ackup is the action of duplicating documents or databases with the goal that they will be
protected if there should arise an occurrence of equipment failure or other calamity. Backup is
typically a routine piece of the operation of huge organizations with centralized servers and also
the administrators of more diminutive business machines.
12. How is incremental backup different from differential backup?
Ans. Incremental Backup creates copies of all the files, or parts of files that have changed since
previous backups of any type (full, differential or incremental).
F or example if you did a full backup on Sunday. An incremental backup made on Monday, would
only contain files changed since Sunday, and an incremental backup on Tuesday, would only
contain files changed since Monday, and so on.
 ifferential Backup on the other hand looks at which files have changed since you last did a full
D
backup. Then creates copies of all the files that are different from the ones in the full backup.
If you do a differential backup more than once, it will copy all the files, or parts of files that

Security Issues of IT 61
have changed since the last full backup, even if you already have identical copies of those files
in a previous differential backup. For restoring all the data, you will only need the the last full
backup, and the last differential backup.
13. Write short notes on:
a) Software Piracy
b) Cybercrime
Ans.
i. The activities involving unauthorized copying, reproduction, use, or manufacture of software
products is called software piracy. Most retail programs are licensed in such a way that it
may be used at just one computer or for use by only one user at any time. Whenever you
buy a software, you become a licensed user rather than an owner and therefore you are
only allowed to make copies of the program for backup purposes, but cannot give copies to
friends and colleagues, which is against the law.
ii. Cybercrime is a term which is used to refer to criminal activity performed using computers
and the Internet. This may include instigating or intimidating someone over the internet,
downloading illegal files and stealing millions of dollars from online bank accounts. Other
offences like creating and distributing viruses and/or malicious code on other computers
or posting confidential business information on the Internet are also part of cybercrime.
Conceivably the most prominent form of cybercrime is using the internet to steal personal
information from other users leading to identity theft. To do this they usually uses two
common methods phishing and pharming.
14. How is hacking different from cracking?
Ans. H
 acking, is the act of stealing personal or private data, without the owner’s knowledge or
consent, it could also include other things like stealing passwords, creating a bot net, or pretty
much any act that breaches someone’s privacy, without their knowledge, or consent. Cracking
on the other hand involves editing a program’s source code, or creating a program, like a key
generator (more commonly known as a ‘keygen’), patch, or some sort of application that tricks
an application in to thinking that a particular process has occurred. For example, a key generator
and a patch for the
 dobe Master Collection would trick the software in to thinking that the key entered is correct,
A
and not let it verify the key with the Adobe master server. Cracking is pretty much looking for a
back door in software, and exploiting it for malicious use or for a copyright breaching act.
T hus the difference is that a hacker is someone that uses their extensive knowledge of computer
logic and code for malicious purposes, while a cracker - looks for back doors in programs, and
exploits those back doors. Cracking is generally less harmful than hacking. Hackers are usually
involved with web related hacking, like MySQL interception, or phishing, other forms of hacking
would include things like brute force, or password lifting.
15. What is the significance of “Digital Certificate”?
Ans. A digital certificate is used to verify that a user sending a message is who he or she claims to
be, and to provide the receiver with the means to encode a reply. This is done over the Internet
using the public key infrastructure (PKI).
62 Foundation of Information Technology – X (Solution)
16. What is data encryption?
Ans. Data Encryption refers to scrambling information and utilizing it to secure data that is constantly
hung on a machine, replicated onto CDs or DVDs or transmitted over a system. It utilizes
innovations, for example, Virtual Private Networks(VPNs) and secure socket layers.

Application Oriented Questions


1. S hrinivasan is working for an IT firm where he needs to backup his data of around 200MB to
400MB at the end of each day. Each day backup needs to be archived separately for future
reference. Suggest any two economic data backup devices, which he can use for this purpose.
i. Differentiate between hacker and cracker with reference to their intention and motive.
ii. Name one specific software tool for each of the following categories:
a. Antivirus
b. Data recovery tool
c. Online backup tool
d. Text editor
Ans. He may either use a portable external hard disk or a pen drive to take backup.
i. Hacking, is the act of stealing personal or private data, without the owner’s knowledge or
consent, it could also include other things like stealing passwords, creating a bot net, or
pretty much any act that breaches someone’s privacy, without their knowledge, or consent.
Cracking on the other hand involves editing a program’s source code, or creating a program,
like a key generator (more commonly known as a ‘keygen’), patch, or some sort of application
that tricks an application in to thinking that a particular process has occurred. For example,
a key generator and a patch for the
Adobe Master Collection would trick the software in to thinking that the key entered is
correct, and not let it verify the key with the Adobe master server. Cracking is pretty much
looking for a back door in software, and exploiting it for malicious use or for a copyright
breaching act.
Thus the difference is that a hacker is someone that uses their extensive knowledge of
computer logic and code for malicious purposes, while a cracker - looks for back doors in
programs, and exploits those back doors. Cracking is generally less harmful than hacking.
Hackers are usually involved with web related hacking, like MySQL interception, or phishing,
other forms of hacking would include things like brute force, or password lifting.
ii.
a. QuickHeal
b. Hyper V Recovery Manager from Microsoft
c. Google Drive
d. Notepad

Security Issues of IT 63
2. Give any two shortcomings of online purchase.
i. What is encryption of data?
ii. Name one antivirus software/tool.
Ans. In case you have a spyware, your bank account details may be compromised.
1. The site may not be authentic and there may be Phising attack.
i. D
 ata Encryption refers to scrambling information and utilizing it to secure data that is
constantly hung on a machine, replicated onto CDs or DVDs or transmitted over a system.
It utilizes innovations, for example, Virtual Private Networks(VPNs) and secure socket
layers.
ii. QuickHeal

64 Foundation of Information Technology – X (Solution)


10
Benefits of ICT
A. MCQs.
1. The process of using electronic media for learning is called ________________.
a. E-learning b. Media-Learning
c. Learning d. Internet
Ans. a. E-learning
2. Which among the following is not a characteristics of E-learning?
a. Learners have the option to choose learning materials that meets their level of knowledge and
interest.
b. Learners do not have the flexibility to choose their own time or schedule.
c. Learners have the flexibility to study anywhere they have access to a computer and Internet
connection
d. Self-paced learning modules allow learners to work at their own pace.
Ans. b. Learners do not have the flexibility to choose their own time or schedule.
3. Which among the following e-learning sites is most suitable for web designing?
a. www.khanacademy.org b. http://ocw.mit.edu
c. www.w3schools.com d. www.math-bridge.org
Ans. c. www.w3schools.com
4. Which among the following is connected to e-health?
a. Health Information b. Education and Training
c. Health Systems Management d. All of these
Ans. d. All of these
5. A subsidiary of United Nations(UN) whose objective is to look after international health.
a. CMS b. eHospital
c. eHealth d. WHO
Ans. d. WHO
6. Which among the following is not the characteristics of ehealth?
a. It allows methods to access electronic medical records, and the ability to access information
about alternative approaches to medical treatment.
b. Saves on time one of the major constraints of conventional health care services.
c. It improves patient safety – a complete overview of clinical and medication history helps to
avoid potential errors and complications.
d. It cannot provide access to specialist care at distant geographic areas.

65
Ans. d. It cannot provide access to specialist care at distant geographic areas.
7. Which among the following is the national portal of India?
a. india.gov.in b. nationindia.gov.in
c. india.net.in d. india.nic.in
Ans. a. india.gov.in
8. What is the full form of DeitY?
a. Department of Electronics and Indian Technology
b. Development of Electronics and Information Technology
c. Digital Electronics and information Technology
d. Department of Electronics & Information Technology
Ans. d. Department of Electronics & Information Technology
9. Knowledge Economy combines knowledge and education into a _________________.
a. business Product b. productive Asset
c. either a or b d. none of these
Ans. c. either a or b
10. ______________________ refers to the disparity of classification of person according to their
knowledge of ICT and without it.
a. Digital Divide b. Digital Disparity
c. Developmental Delay d. Digital Unity
Ans. a. Digital Divide

B. Fill in the blanks.


1. In e-learning self-paced learning modules allow learners to work at their own pace.
2. 
E Health Points are units owned and operated by Healthpoint Services India (HSI) that provide
families in rural villages about various health issues.
3. A health insurance plan sold over the internet is called eHealthInsurance.
4. U
 sing ICT for making government services to every corner of the country 24x7 is called
e-governance.
5. 
Knowledge Economy refers to the combining of knowledge and education as a product.
6. Virtual schools are also called Cyber schools.
7. A
 knowledge based society refers to the type of society that is needed to compete and succeed
in the changing economic and political dynamics of the modern world.
8. Infomania refers to those individuals that have compulsive desire to check or accumulate news
and information.
9. 
Digital Unity refers to the collaboration of people at different geographical location to unite
together
10. People living in Remote areas do not get the benefits of e-governance because of the lack of
infrastructure.
66 Foundation of Information Technology – X (Solution)
C. True (T) or False (F).
1. E -governance has increased the transparency of the government by putting an end in corruption
by removing the middle-men and touts play.-T
2. E-governance services are available online and helpful for people having no internet connectivity.-F
3. L ack of literacy resulted in lack of awareness, which prevents people from benefitting from
e-governance.-T
4. E -health allows methods to access electronic medical records and the ability to access information
about alternative approaches to medical treatment.-T
5. WHO in general looks after the finance in United Nations.-F
6. T he E Health Point concept builds upon and combines proven models to achieve unique synergies
and efficiencies.-T
7. In e-learning the learners do not choose learning materials.-F
8. In e-learning, the user can choose their own flexible timings.-T
9. W3Schools is an e-learning sites that has a variety of video lessons for free.-F
10. E-learning gives the flexibility to learn as par his own time.-T

D. Answer the following.


1. How do you think ICT has helped in the field of education?
Ans. In recent years there has been a upsurge in the interest of how ICT can best be harnessed to
improve the efficiency and effectiveness of education at all levels and in both formal and non-
formal settings. Even though, ICT remain at its infancy in most developing nations, where books
or printed media remains the cheapest, most accessible and therefore most dominant delivery
mechanism. Thus developing countries, like India combine the use of print, recorded audio and
video, broadcast radio and television, and audio-conferencing technologies to cater to the need
of education.
2. What is e-learning? Mention names of two sites that provide e-learning for free.
Ans. Learning that occurs through electronic media, popularly over the Internet is called E-learning.
Websites: www.e-learningforkids.org and ocw.umb.edu
3. Give two advantages and disadvantages of e-learning.
Ans. Advantages of e-learning:
• Learners have the option to choose learning materials that meets their level of knowledge
and interest.
• Learners have the flexibility to choose their own time or schedule.
Disadvantages of e-learning:
• It has been that learners with low motivation or bad study habits may fall behind.
• Learners who are more used to with traditional teachers may get lost or confused about
course activities and deadlines.

Benefits of ICT 67
4. What is E-Health? What are areas in which E-Health encompasses?
Ans. The transfer of health-care resources by electronic means is termed as E-health.
The areas in which E-Health encompasses are:
• Health Information: The Internet and telecommunications plays a great role in delivering
health information to health professionals and health consumers.
• Education and Training: The education and training of health workers to improve public
health services using the power of IT and e-commerce.
• Health Systems Management: Usage of e-commerce and e-business practices in health
systems management.
5. H
 ow does ICT help the government in providing health care services? How does such services
help the common man?
Ans.
T he ageing of the population in general has resulted in number of citizens with chronic
diseases increasing, especially among elderly people throughout the world. Coupled with not
proportional amount health care services has made health a major issue for developing nations.
The challenge is to keep both the well-being of the citizens and the public health care systems
proper. Here where
ICT comes into the picture to provide health care solutions that solve much of the problems.
It helps the common man by:
1. It allows methods to access electronic medical records, and the ability to access information
about alternative approaches to medical treatment.
2. Saves on time one of the major constraints of conventional health care services.
3. It improves patient safety – a complete overview of clinical and medication history helps to
avoid potential errors and complications.
6. Give two advantages and disadvantages of e-health.
Ans.
Advantages
• It allows methods to access electronic medical records, and the ability to access information
about alternative approaches to medical treatment.
• Saves on time one of the major constraints of conventional health care services.
Disadvantages
• Too much of information, might in most situation, lead to confusion.
• Since physical presence of the health care consumers is mostly absent, they do not benefit
from the clinical experience of the physician.

68 Foundation of Information Technology – X (Solution)


7. What is e-governance? Name three sites that provides e-governance.
Ans. E-governance is the application of ICT for transferring of various government services to the
citizens of a country. The services are 24x7 and not bounded by any geographical region.
Sites:
• india.gov.in
• deity.gov.in
• passportindia.gov.in
8. State two advantages and disadvantages of e-governance.
Ans. Advantages of E-governance
• The efficacy of the administration and service delivery has drastically improved by
E-governance.
• Reduced waiting time is one of the benefits of e-governance.
Disadvantages of E-governance
• People living in remote areas do not get the benefits of e-governance because of the lack of
infrastructure.
• Completely computerization of all services is yet to be completed and therefore manual
methods are still prevalent.
9. What is Knowledge Economy?
Ans. K
 nowledge Economy is the combining the knowledge and education based on creating,
evaluating, and trading knowledge. Thus making it a business product and a productive asset.
10. State three ways in which ICT has affected our society.
Ans. The three ways in which ICT has changed our society are:
• Knowledge Based Society
• Digital Unity
• Digital Divide

Application Oriented Questions


1. M
 r Surendra is a Medical Representative in Zev Pharmaceuticals. He usually has to make heavy
travelling meeting different doctors and recommending them various medicines. As such he
hardly has much time left for leisure. He loves studies, particularly Chemistry. He had studied
Chemistry during his graduation and left studies after he joined as a Medical Representative. He
wants to pursue his studies in Chemistry.
a. What would you suggest him so that he can pursue his studies, without affecting his current
job profile?
b. Mention few resources for the above solution.
Ans. a. He can go for any online E-Learning Course.
b. MIT site and IGNOU site

Benefits of ICT 69
2. T he primary objective of e-health care is to provide different services related to health to
different people, even to the most remote areas. State three advantages of using e-health care
services. Also state three drawbacks of using such services.
Ans.
Advantages of E-health care services
• It allows methods to access electronic medical records, and the ability to access information
about alternative approaches to medical treatment.
• Saves on time one of the major constraints of conventional health care services.
• It improves patient safety – a complete overview of clinical and medication history helps to
avoid potential errors and complications.
Disadvantages of E-health care services
• Too much of information, might in most situation, lead to confusion.
• Since physical presence of the health care consumers is mostly absent, they do not benefit
from the clinical experience of the physician.
• First time users may sometimes find it difficult to access the health care services.
3. O
 ne of the major advantage of using ICT in providing government services to the mass is
e-governance. The efficacy of the administration and service delivery has drastically improved
by e-governance.
a. What is e-governance?
b. State at least three ways how it helps common people.
Ans.
a. E-governance is the application of ICT for transferring of various government services to the
citizens of a country. The services are 24x7 and not bounded by any geographical region.
b.
• The efficacy of the administration and service delivery has drastically improved by
E-Governance.
• Reduced waiting time is one of the benefits of e-governance.
• Citizens that benefit from e-governance does at a minimal cost or no cost at all.
4. I n traditional classrooms, it is often important for students to adopt a pace that suits the
classroom, so that no one lags behind others and no one gets too far ahead.
a. What is the alternative to traditional classrooms that takes ICT as its major tool?
b. State three advantages and disadvantages of using such a medium.
Ans.
a. Virtual Schools and E-learning are alternative to traditional classrooms.

70 Foundation of Information Technology – X (Solution)


b. Advantages:
1. In many cases, virtual schools allow families and educators to evaluate a student and
provide a customized education geared towards helping the student learn and develop.
2. Each child has unique educational strengths, weakness, needs and preferences, and
virtual schooling allows families and educators to address these differences.
3. Adopting an average pace is often important, in such cases, to keeping the flow of
learning consistent and preventing students from becoming bored and frustrated.
Disadvantages:
1. Virtual schools also lack the structure found in traditional schools.
2. They also have difficulties adapting to paper and pencil tests and assignments.
3. They also miss out on personal instruction from teachers as well as classroom discussion
Also, unlike brick and mortar schools, students are not under the constant supervision of
a teacher.

Benefits of ICT 71

You might also like