You are on page 1of 3

NAVNEET JUNIOR COLLEGE

ARTS/ SCIENCE/COMMERCE
XI(11th) 1st Semester Test
Total marks: 50
Information Technology
Time: 2 Hour
Notes: () Allquestions are compulsory.
(2) Figures to the right indicate full marks.
(3) Answers to every qucstion must be written on a new page.

Q1 FILL IN THE BLANKS 10

i
The type of operating system registered by Apple Corporation is
ii The network which covers smaller geographical area is
i
is a computer which services to another computer.
iv Activity such as decipher code or password and breaking security systems
for illegal reasons is called
V The data type used in DBMS to hold a fixed length string is

VÌ In a relationship of DBMS, one record in a table is associated with


one and only one record in another Table.
vii. Collection ofinterlinked web pages is known as

viii. In HTMLS is a semantic tag that defines content apart from the content

IX Container tags are also called as tags.

X Gaining access without the user's permission is called as

Q2 STATE WHETHER TRUE ORFALSE 05

The speaker is best example of Input unit.


ii. The category of SQL which a database administrator will use to modify atable is
DDL.

ii.A web browser is an application or a computer that sends web pages overthe internet
using the http protocol.
Iv. A protocol is aset of rules that governs the communications between thecomputers
on a network.
V. <input is a paircd tag.
Q3 MULTIPLE CHOICE SINGLE ANSWER 10

1 Internet is a, network connecting millions of computer.

a. Regional b. Global c. Local d. Virtual


isa type of primary memory.
a. RAM b. Harddisk c.Flash d. DVD
IOT is Internet of
a. Transmission b.Transpose c.Transcript d. Things
iV
tag is used todisplay horizontal ruled line.
a. <hr> b.<r> c. <ul» d.<br>

To remove access rights or privileges from the database object is


a. grant b. revoke C. remove d. delete

is the basic data storage unit in the relationai database.


a. Table b. Tuple c. Record d. Key

vii parselnt function is used to parse a string and convert it into a


a. New b. number C. pair d. post

vii In Javascript datatype can represent only two values.


a. Boolean b. string c. infinity d. DATE
ix In Javascript variable name can be limited upto. characters.
a. 256 b. 255 c.65,536 d. 128
X Gaining access without user's permission is
a. Cracking b. fishing c. unauthorized access d. software piracy
Q4 MULTIPLE CHOICE TWO CORRECT ANSWERS 06

and are the example of input units incomputer.


a. MICR b. Speaker c. OCR d. Printcr c. plotter
and are the examples of mobile operating system.
a. Chrome b. Android c. DOS d. ASHAe. firefoX
and are data manipulation command.
a. update b. grant c. delete d. revoke e. erase
Q5 MULTIPLE CHOICE THREE CORRECT ANSWERS 03

A database user will use and DDL SQL commands to


define and modify database.
a.create b. delete C. alter d. drop e. remOve f. revoke

Q6 ANSWER BRIEFLY (Any 5) 10


IExplain ALUand Control unit of a computer.

11 Explain client server network architecture.

Define 1.Primary key 2. Foreign key


1V Write any two differences between LAN andWAN.
V Define 1. Field 2. Table

vi Define 1.Ethics 2. Morals

vii Explain software piracy in brief.


vi Write any two DO's and Don't's for students in cyber world.
Q8A) i)Write a program in Javascript to find area of acircle. 6

OR

i) Write a program in Javascript to check whether the input number is even or odd
Q8B) i) Write aprogram in HTML to display any 5form elements to design a
Feedback form

OR 6

i) Write a program in HTML to display 4 rows and 3 columns

You might also like