CBSE Class-10 Exam 2017 : Marking Scheme, Foundation of Information Technology

CBSE Class-10 Exam 2017 : Marking Scheme

Question Paper Foundation Of Information Technology

 

CBSE Class-10 Exam 2017 :  Foundation Of Information Technology (Delhi)

 

SUMMATIVE ASSESSMENT - II

FOUNDATION OF INFORMATION TECHNOLOGY

 

 

SECTION A

 

Q1.

 

Fill in the blanks :

(½ Mark for writing each correct answer)

5

 

(a)

In XML an element which has no content is termed as                      

 

 

Ans.

Empty

 

 

(b)

A tag that requires an opening as well as a closing tag is called a          tag.

 

 

Ans.

Container

 

 

(c)

The              tag provides additional information including title, scripts used, etc. about a webpage.

 

 

Ans.

Head

 

 

(d)

                  tag make a numbered list.

 

 

Ans.

OL

 

 

(e)

                  tag is used for inserting a background image.

 

 

Ans.

BODY

 

 

(f)

For displaying coloured text                    tag is used.

 

 

Ans.

FONT OR BODY

 

 

(g)

Any software designed to harm the computer, or disturb its normal operations is known as                          

 

 

Ans.

MALWARE OR VIRUS OR Spyware OR any other correct answer

 

 

(h)

You can make use of an               software to detect the presence of virus.

 

 

Ans.

ANTIVIRUS

 

 

(i)

Quick heal is a type of                    

 

 

Ans.

ANTIVIRUS

 

 

(j)

                  is a tricky application that appears to be legitimate and useful at first glance.

 

 

Ans.

TROJAN HORSE

 

Q2.

 

State True or False:

(½ Mark for writing each correct option)

5

 

(a)

An attribute defines a property of the element.

 

 

Ans.

True

 

 

(b)

XML elements can be defined as building blocks of an XML.

 

 

Ans.

True

 

 

(c)

HTML tags tell a web browser how to render a web page.

 

 

Ans.

True

 

 

(d)

SRC attribute specifies an alternate text for an image, if the image cannot be displayed.

 

 

Ans.

False

 

 

(e)

A hyperlink apply to text only.

 

 

Ans.

False

 

 

(f)

<th> tags always need to come at the start of a column.

 

 

Ans.

False

 

 

(g)

Unsolicited email attachments should not be opened as they can be dangerous.

 

 

Ans.

True

 

 

(h)

Always use a same password for each website you log in to.

 

 

Ans.

False

 

 

(i)

Avoid pirated software as they are a security risk.

 

 

Ans.

True

 

 

(j)

Spyware is type of malicious program.

 

 

Ans.

True

 

Q3.

 

Short Answer Questions:

 

 

(a)

What is the difference between cellspacing and cellpadding attribute ?

2

 

Ans.

Cellspacing

Set the space between the cells

 

 

 

Cellpadding sets the space between cell wall and its content

 

(1 mark for each correct answer)

 

(b)

Write any two precautions to avoid spam.

2

 

Ans.

●    Never click on links that come from unknown sources.

●    Never, ever reply to a spam message.

●    Don't forward an email from someone you don't know to a list of people.

●    Use a spam filter.

OR, any other correct precautions

 

(1 Mark each for any two correct precautions)

 

 

(c)

Write the HTML code to display image with red border.

2

 

Ans.

<img  src=”b.jpg”  border=1  bordercolor=red>

 

(1 mark for IMG Tag)

( 1 mark for border attribute)

 

Note: Ignore the bordercolor attribute

 

 

(d)

Write the full forms of :

(i) WWW (ii) FTP (iii) LI (iv) HR

2

 

Ans.

(i)  WWW - World Wide Web

(ii) FTP - File Transfer Protocol

(iii) LI - List Item

(iv) HR - Horizontal Rule OR Horizontal Ruler

 

(½ mark for each correct full form)

 

 

(e)

Internet is a series of interconnected computers throughout the world. (i) Name any one of the services that is offered on internet.

(ii) Name any one of the internet service provider.

2

 

 

Click Here to Download 

Courtesy: CBSE