Q13: Following are malicious programs except:
(A) Back doors
(B) Trojan Horses
(C) Firewalls
(D) Worms
Answer: C – Firewalls
Q14: Which specifies the space left between the edge of an image and the items to the left or right of it?
(A) FRAMESPACING
(B) HSPACE
(C) CELLSPACING
(D) CELLPADDING
Answer: B – HSPACE
Q15: The process of scrambling a message with the help of a key is called:
(A) Cryptography
(B) Filtering
(C) Transposition
(D) Encryption
Answer: D – Encryption
Q16: How many characters does a MAC address consist of?
(A) 11
(B) 12
(C) 13
(D) 14
Answer: B – 12
Q17: What are two types of twisted pair cables used for networking?
Answer:
- Unshielded Twisted Pair (UTP)
- Shielded Twisted Pair (STP)
Q18: Explain the purpose of the following HTML tags:
- <big> and </big> – Makes the text larger than the surrounding text.
- <u> and </u> – Underlines the text enclosed by these tags.
Q19: What does PPTP stand for?
Answer: Point-to-Point Tunneling Protocol
Q20: What is the purpose of the href tag in HTML? Give an example.
Answer:
The href attribute is used in the <a> tag to define the URL of the page the link goes to.
Example: <a href=”https://www.example.com”>Visit Example</a>
Q21: What is the purpose of the <marquee> tag? Give an example.
Answer:
The <marquee> tag is used to make text or images scroll horizontally or vertically across the webpage.
Example: <marquee>Welcome to our website!</marquee>
Q22: Write a program to collect student information in text boxes with validation.
Answer (concept in plain English):
- Create text boxes for student ID, name, father’s name, course name, and postal address.
- When the user submits, check if any text box is empty.
- If any field is empty, display an alert box asking the user to fill all fields.
- Only allow submission when all fields are completed.