0% found this document useful (0 votes)
13 views11 pages

It Final Ans

The document is an 11th-grade final exam for Information Technology, consisting of various sections including fill-in-the-blanks, true or false statements, multiple choice questions, and matching exercises. It covers topics such as computer memory, operating systems, SQL, HTML, and JavaScript. The exam is designed to assess students' knowledge and understanding of key IT concepts and practices.

Uploaded by

kundanwadekar122
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views11 pages

It Final Ans

The document is an 11th-grade final exam for Information Technology, consisting of various sections including fill-in-the-blanks, true or false statements, multiple choice questions, and matching exercises. It covers topics such as computer memory, operating systems, SQL, HTML, and JavaScript. The exam is designed to assess students' knowledge and understanding of key IT concepts and practices.

Uploaded by

kundanwadekar122
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

11th Final Exam IT

(INFORMATION TECHNOLOGY)

Q.1 Fill in the Blanks:


1. 1024 bytes equal to 1 kilobyte.

2. The Unix operating system was developed at Bell Labs.

3. FTP stands for File Transfer Protocol.

4. In order to extract data from table using SQL, SELECT command is used.

5. Data model defines how the logical structure of a database is modeled.

6. Data is a raw and unorganized fact that requires to be processed to make it meaningful.

7. <h1> is largest level of heading.

8. In table, the rowspan attribute specifies how many rows a cell should merge/span.

9. GUI stands for Graphical User Interface.

10. SQL stands for Structured Query Language.

-Kundan Wadekar
Q.2 State True or False:
1. RAM is a permanent memory. – False

2. Unix operating system is a proprietary software operating system. – False (It is


open-source)

3. A WAN is quite smaller network than the LAN. – False

4. DBMS stands for Data Base Manipulation System. – False (Correct: Database
Management System)

5. Each student in a class has unique registration number is one-to-one relationship. – True

6. A transaction is a unit of a work that is performed against a database. – True

7. <br> is a singular tag. – True

8. // is used for single line comment in JavaScript. – True

9. && is the logical operator used to join two or more conditions. – True

10. Software piracy is nothing but copyright violation of original work. – True

Q.3: Multiple Choice – One Correct Answer

1. ________ is an input device.

-Kundan Wadekar
(A) Printer
(B) Screen
(C) MICR
(D) Project

Answer: (C) MICR – is an input device.

2. Windows is a series of operating systems developed by ________.

(A) Microsoft
(B) Oracle
(C) Nokia
(D) IBM

Answer: (A) Microsoft – Windows is developed by Microsoft.

3. ________ covers smaller geographical area.

(A) PAN
(B) WAN
(C) MAN
(D) LAN

Answer: (D) LAN – covers smaller geographical area.

4. Each row in a relational database contains unique value and it is called as ________.

(A) Data
(B) Domain
(C) Field
(D) Tuple

Answer: (D) Tuple – Each row in RDBMS is called a tuple.

5. ________ SQL statement is used to delete record in table.

(A) DELETE
(B) SELECT
(C) UPDATE
(D) INSERT

-Kundan Wadekar
Answer: (A) DELETE – is used to delete record in SQL.

6. DCL stands for ________.

(A) Data Confirmation Language


(B) Data Consumption Language
(C) Data Cancellation Language
(D) Data Control Language

Answer: (D) Data Control Language – DCL stands for.

7. The Assignment Operator can be used as ________.

(A) Counter = 1
(B) Counter == 1
(C) Counter != 1
(D) Counter++

Answer: (A) Counter = 1 – is the correct assignment operator.

8. The command for writing output to a standard JavaScript page is ________.

(A) alert()
(B) document.write()
(C) document.print()
(D) prompt()

Answer: (B) document.write – outputs content to HTML page.

9. ________ attribute specifies the location of the image.

(A) HREF
(B) Target
(C) SRC
(D) Attribution

Answer: (C) SRC – specifies image location in HTML.

-Kundan Wadekar
10. ________ attempts to block the spread of computer attacks.

(A) Copyright
(B) Firewall
(C) Fair use
(D) Chatting

Answer: (B) Firewall – blocks the spread of attacks.

Q.4: Multiple Choice – Two Correct Answers


1. The CPU has following main components.

(A) ALU
(B) Disk Drive
(C) I/O Devices
(D) CU
(E) CD-ROM

Answer: (A) ALU, (D) CU – are components of CPU.

2. Following are the examples of application software.

(A) Windows
(B) Unix
(C) DOS
(D) Tally
(E) MS-PowerPoint

Answer: (D) Tally, (E) MS-PowerPoint – application software.

3. A single entry in a table is called as:

(A) Record
(B) Domain
(C) Field
(D) Row
(E) Value

-Kundan Wadekar
Answer: (A) Record, (D) Row – both represent a single table entry.

4. SQL consists of:

(A) DCL
(B) DOL
(C) DSL
(D) DOM
(E) DDL

Answer: (A) DCL, (E) DDL – are parts of SQL.

5. Logical operators used in JavaScript are:

(A) &&
(B) ||
(C) ##
(D) <>
(E) ++

Answer: (A) &&, (B) || – logical operators in JS.

6. The form submission methods are:

(A) Submit
(B) Get
(C) Off
(D) On
(E) Post

Answer: (A) GET, (E) POST – form submission methods.

7. HTML5 offers following new semantic elements.

(A) <header>
(B) <font>
(C) <aside>
(D) <body>
(E) </bold>

-Kundan Wadekar
Answer: (A) <header>, (C) <aside> – new semantic HTML5 elements.

8. The pirated software means:

(A) Copied software


(B) Software with copyright
(C) Software with digital signature
(D) Software without license
(E) Software with fair use

Answer: (A) Copied software, (D) Software without license – are pirated software.

9. Most common cybercrimes are:

(A) Software piracy


(B) E-Commerce
(C) Copyright
(D) Chatting
(E) Unauthorized access

Answer: (A) Software piracy, (E) Unauthorized access – common cybercrimes.

10. Select the security procedures to protect data in an organization:

(A) Blockchain
(B) Encryption
(C) Big Data
(D) Firewall
(E) IoT

Answer: (B) Encryption, (D) Firewall – protect organizational data.

Q.5: Multiple Choice – Three Correct Answers


1. ________ are the Data Models.

(A) Network model


(B) Transaction model

-Kundan Wadekar
(C) Server model
(D) Hierarchical model
(E) Security model
(F) Relational model

Answer: (A) Network model, (D) Hierarchical model, (F) Relational model – are data models.

2. To create a table using HTML, following tags are used:

(A) <caption>
(B) <data>
(C) <record>
(D) <tr>
(E) <insert>
(F) <table>

Answer: (A) <caption>, (D) <tr>, (F) <table> – used to create HTML tables.

Q.6 Match the Following:

Column A Answer

1. Encryption c) Encoding information

2. SSL a) Security for web based applications

3. Firewall b) Monitors incoming and outgoing network


traffic

4. IT Act d) Provide legal recognition for electronic


transaction

-Kundan Wadekar
Q.8A Html:- Match Scorecard
<!DOCTYPE html>
<html>
<head>
<title>Cricket Scoreboard</title>
</head>
<body>
<table border="1" cellspacing="0" cellpadding="10">
<tr>
<td rowspan="3"><b>India<br>357/1</b></td>
<td>R Shrma 141*</td>
</tr>
<tr>
<td>D Dhawan 95</td>
</tr>
<tr>
<td>Australia<br>S Watson 5</td>
</tr>
<tr>
<td>Over 43.3</td>
<td>S Watson 5</td>
</tr>
<tr>
<td colspan="2">To win: 2 run in 6.3 over</td>
</tr>
</table>
</body>
</html>

Html:- Login form


<!DOCTYPE html>
<html>
<body>
<h2>Login Form</h2>

<form>
Username:
<input type="text" id="username"><br><br>

-Kundan Wadekar
Password:
<input type="password" id="password"><br><br>

<input type="submit" value="Submit">


<input type="reset" value="Clear">
</form>
</body>
</html>

Q.8B:- JavaScript :- Largest Number


<!DOCTYPE html>
<html>
<body>
<script>
function display() {
var num1 = parseFloat(document.getElementById("n1").value);
var num2 = parseFloat(document.getElementById("n2").value);

var largest;
if (num1 > num2) {
largest = num1;
} else {
largest = num2;
}

document.write("The largest number is " + largest);


}
</script>

Enter First Number: <input type="text" id="n1"><br><br>


Enter Second Number: <input type="text" id="n2"><br><br>

<input type="button" value="Find Largest" onclick="display()">


</body>
</html>

JavaScript:- Area of Triangle

-Kundan Wadekar
<!DOCTYPE html>
<html>
<body>
<script>
function display() {
var base = document.getElementById("t1").value;
var height = document.getElementById("t2").value;

var area = 0.5 * base * height;

document.write("Area of Triangle is " + area);


}
</script>

Enter the Base: <input type="text" id="b1"><br><br>


Enter the Height: <input type="text" id="h1"><br><br>

<input type="button" value="Calculate" onclick="display()">


</body>
</html>

-Kundan Wadekar

You might also like