MCQ Questions for Class 10 Computer Applications Chapter 8 Cyber Ethics

Cyber Ethics Class 10 MCQ Questions with Answers

Question 1

Intellectual property is an :

(A) Industrial property
(B) Copyright property
(C) Free property
(D) Both (A) and (B)
Answer:
(D) Both (A) and (B)

Explanation:
Intellectual Property Rights are the rights given to the persons over the creation of their mind. Intellectual property rights reward creativity and human endeavor, which fuel the progress of humankind. The purpose of Intellectual property right is the giving of copyright to the creator of created idea, product, etc.

MCQ Questions for Class 10 Computer Applications Chapter 8 Cyber Ethics

Question 2.

Trojan Horse is a

(A) Virus
(B) Worm
(C) Spyware
(D) Adware
Answer:
(A) Virus

Explanation:
Trojan horse is a program or file that a user allows or invites onto his or her system, believing that the program or file is normal software, benign, and compliant.

Question 3.

Which of the following is a type of plagiarisim?

(A) Partial
(B) Collusion
(C) Self
(D) All of these
Answer:
(D) All of these

Explanation:
The word plagiarism comes from the Latin word for kidnapping. You know that kidnapping is called as abducting a person. In the same way, lagiarism is called as stealing a person’s ideas and writing. In Plagiarism, you steal author’s ideas, experience, thought, language, etc.

Question 4.

Using someone else’s twitter handle to post something will be termed as :

(A) Fraud
(B) Identity theft
(C) Online stealing
(D) Violation
Answer:
(B) Identity theft

Explanation:
Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases.

Question 5.

E-Commerce means :

(A) Doing business online via the Internet
(B) Doing business off-line
(C) studying commerce via electronic media
(D) None of these
Answer:
(A) Doing business online via the Internet

Explanation:

E-commerce means buying and selling of goods online.

MCQ Questions for Class 10 Computer Applications Chapter 8 Cyber Ethics

Question 6.

Fraud is :

(A) cheating others
(B) an intentionally false representation of a fact
(C) to deceive another party in order to obtain a profit
(D) All of these
Answer:
(B) an intentionally false representation of a fact

Explanation:
One who is online may open up the possibility for hackers to commit fraud and launch spam and virus attacks.

Question 7.

Intellectual property does not include :

(A) Creation of mind
(B) Artistic work
(C) Literary
(D) None of these
Answer:
(D) None of these

Explanation:
Intellectual property right are the rights for the creations of human intellect including inventions; literary and artistic works; and symbols, names and images etc.

Question 8.

A…………is defined as an exclusive right granted for an invention.

(A) Patent
(B) Copyright
(C) Trademark protection
(D) Design protection
Answer:
(A) Patent

Explanation:
Patent provides protection for novel technical solutions to problems. A patent provides patent owners with protection for their inventions. Patent applications are ‘ published after 18 months. A patent applies for a maximum of 20 years.

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion (A): Digital rights are the process of relationship between copyrighted digital works and user permissions and rights related to computers, networks and electronic devices.
Reason (R): Certain digital right/digital rights management (DRM) subcategories are of growing concern such as information/Internet privacy and freedom of information.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
Digital rights are defined as the process of accessing and controlling of digital information. Digital rights advocacy groups include:
(A) Entertainment Consumers Association (ECA): It is a U.S based non-profit organization that is dedicated to the interests of computer and video game players in the U.S. and Canada.
(B) Free Software Foundation (FSF): It is a Non profit organization and supports the free software movement.
(C) Electronic Frontier Foundation (EFF): It is an International non-profit organization that oversees digital rights advocacy and legal affairs.
(D) Digital Rights Ireland (DRI): It works for civil liberties related to digital rights.
(E) European Digital Rights (EDRi): It is focused on copyright, security, privacy and freedom of expression.

(F) Open Rights Group (ORG): It is focused on controlling issues like censorship, knowledge access, privacy, freedom of information and electronic voting.

MCQ Questions for Class 10 Computer Applications Chapter 8 Cyber Ethics

Question 2.

Assertion (A): Freedom of information is used to access information of a citizen’s right that is held by the state.
Reason (R): In some countries, this freedom is supported as a constitutional right.

Answer:
(B) Free Software Foundation (FSF): It is a Non profit organization and supports the free software movement.

Explanation:
Freedom of information is defined as the citizen rights to be informed in writing if a governmental agency holds certain information and to request its disclosure. It was recognized for transparency, government accountability, education and general public protection against mismanagement and corruption. More than 70 countries with government representation approved the original freedom of information legislation. Related human rights contain freedom of expression, data protection (privacy), freedom of association and right to development.

Question 3.

Assertion (A): Digital Divide includes the imbalance both in physical access to technology and the resources and skills needed to effectively participate as a digital citizen.
Reason (R): The term global digital divide refers to similarities in access between countries in regards to the Internet and its means of information flow.

Answer:
(C) A is true and R is false

Explanation:
Digital Divide refers to the gap between individuals, households, businesses and geographic areas at different socio-economic levels with regard both to their opportunities to access Information and Communications Technologies (ICT’s) and to their use of the Internet for a wide variety of activities.

Question 4.

Assertion (A): E-commerce security is defined as a set of protocols that safely guide ecommerce transactions.
Reason (R): Security is an important part of any transaction that takes place over the internet.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
Most ecommerce merchants leave the mechanics to their hosting company or IT staff, but it helps to understand the basic principles. Any system has to meet four requirements:

  • Privacy: Information must be kept from unauthorized parties.
  • Integrity: Message must not be altered or tampered with.
  • Authentication: Sender and recipient must prove their identities to each other.
  • Nonrepudiation: Proof is needed that the message was indeed received.

Question 5.

Assertion (A): Digital signature is an e-signature that is valid through encryption.
Reason (R): Digital signatures does not meet the need for authentication and integrity.

Answer:
(C) A is true and R is false

Explanation:
Digital signature is a process that verify the authenticity of the message (i.e. the message has not been altered by someone.)

Question 6.

Assertion (A): Credit card details can be safely sent with SSL(Secure Socket Layer), but then also it is not save.
Reason (R): Once the details are stored on the server they are vulnerable to outsiders hacking into the server and accompanying network.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
SSL uses PKI(Public Key Infrastructure) and digital certificates to ensure privacy and authentication. The procedure is something like this: the client sends a message to the server, which replies with a digital certificate. Using PKI, server and client negotiate to create session keys, which are symmetrical secret keys specially created for that particular transmission. Once the session keys are agreed upon communication continues with these session keys and the digital certificates.\

Case- Based MCQs

Attempt any ? sub-parts from each question. Each sub-part carries 1 mark.
I. Secure Data Transmission Secure data transmission means that data/ information is not being received or modified by an unauthorized person, over a network, from source to destination. For secure data transmission, we can convert an actual message (which is in readable form) into an unreadable message (called an encrypted message) with the help of the concept of encryption. This unreadable message is sent through the network to the destination. If a hacker tries to read this message, he/she receives an unreadable message that cannot be easily converted into the actual message. The unreadable message can be converted to the original message by the receiver at the destination. Caesar Cipher is one of the common encryption techniques. In this technique, each letter of the word is replaced by a letter some fixed number of positions (usually called as key) down the alphabet. For example, if the key is 3, each ‘A’ will be replaced by ‘D’ (Letter ‘D’ is 3 positions down Letter ‘A’ in the alphabet), each ‘B’ will be replaced by ‘E’ and similarly, each ‘Z’ will be replaced by ‘C’. The receiver can identify the original message by using the reverse technique of encryption. This reverse technique is called decryption.

Question 1.

Secure data transmission means :

(A) Data can be accessed by any unauthorized person during transmission.
(B) Data can not be accessed by any unauthorized person during transmission.
(C) Transmission of data
(D) None of the above
Answer:
(B) Data can not be accessed by any unauthorized person during transmission.

Explanation:
The transmitted data cannot be accessed or modified by an unauthenticatcd person.

Question 2.

Which of the following techniques can be used for security of data ?

(A) Authentication
(B) Authorisation
(C) Encryption
(D) All of the Above
Answer:
(D) All of the Above

Explanation:
Authentication: Sender and recipient must prove their identities to each other.
Authorisation: A particular sender/receiver having the authority to send/receive messages. Encryption: Encoding the message in order to send to the receiver.

MCQ Questions for Class 10 Computer Applications Chapter 8 Cyber Ethics

Question 3.

Caesar Cipher is :

(A) used for conversion of the actual message into an encrypted message
(B) an encryption technique
(C) both (A) and (B)
(D) None of the above
Answer:
(C) both (A) and (B)

Explanation:
The Caesar Cipher technique is one of the earliest and simplest method of encryption technique. It’s simply a type of substitution cipher, i.e., each letter of a given text is replaced by a letter some fixed number of positions down the alphabet. For example with a shift of 1, A would be replaced by B,
B would become C, and so on. The method is apparently named after Julius Caesar, who apparently used it to communicate with his officials.

Question 4.

Person ‘X1 has received an encrypted message and wants to convert this message into the actual message (message before encryption). The technique he should use is called :

(A) Conversion
(B) Encryption
(C) Decryption
(D) None of the above
Answer:
(C) Decryption

Explanation:
Decryption is the technique to decode the encrypted message.

Question 5.

A sender wants to send a message having the text as ‘COMPUTER’ to a receiver using 4 as the key. What will be the encrypted message?

(A) GSQTZXIV
(B) GSQTYXIV
(C) GSXTYXIV
(D) GSQSYXIV
Answer:
(B) GSQTYXIV

Question 6.

An encryption algorithm is used to transform a readable message into:

(A) Text message
(B) Simple message
(C) Converted message
(D) Encrypted message
Answer:
(D) Encrypted message

Explanation:
Encrypted message is the message that is formed by using the encryption technique.

Question 7.

In Ceaser Cipher, for which of the following values of key, the encrypted message will be the same as original message.

(A) 0
(B) 26
(C) both (A) and (B)
(D) None of the above
Answer:
(C) both (A) and (B)

Explanation:
For both 0 and 26 the key will be same for the encrypted message, using the Caesar Cipher technique.

II. Cyber Ethics
Understanding the importance of cyber ethics in daily life has become essential than ever before. Similarly, it is crucial to know how to tackle the situation if you or your kid is being victimized. It is especially hard to talk to teens because they do not want to be lectured about what is right and wrong. They seem to think they have it all sorts out. That is why it is important to instil appropriate cyber etiquette at an early age but if you haven’t there is still time to tell to your child. Cyber ethics concerns to the code of responsible behaviour on the Internet. Just as we are taught to act responsibly in our everyday life. The responsible behaviour on the internet in many ways aligns with all the right behaviour in everyday life, but the results can be significantly different. Some people try to hide behind a false sense of obscurity on the internet, believing that it does not matter if they behave badly online because no one knows who they are or how to search them. That is not all the time true; browsers, computers and internet service providers may keep logs of their activities which can be used to spot illegal or inappropriate behaviour. The Government has taken a positive role in making resources for parents and children to learn about cyber ethics. This is a growing problem and without parents and teachers using the resources available nothing can be done to prepare future generations of internet users from being safe online.

Question 1.

What type of behaviour on the Internet does Cyber Ethics concern?

(A) Active
(B) Responsible
(C) Emotional
(D) Exploratory
Answer:
(B) Responsible

Explanation:
While online, one should follow responsible behaviour. Protecting yourself while online means identifying and taking preventive measures against a number of security and privacy issues.

Question 2.

Who positive role in making resources for parents and children to learn about cyber ethics?

(A) Children
(B) Parents
(C) W3C
(D) Government
Answer:
(D) Government

Explanation:
Government takes preventive measures so that a person while online does not faces any problem.

MCQ Questions for Class 10 Computer Applications Chapter 8 Cyber Ethics

Question 3.

Some people try to hide behind a sense of obscurity on the internet.

(A) False
(B) True
(C) Either (A) or (B)
(D) None of the above
Answer:
(A) False

Explanation:
Some people try to hide behind a false sense of obscurity on the internet, believing that it does not matter if they behave badly online because no one knows who they are or how to search them. That is not all the time true; browsers, computers and internet service providers may keep logs of their activities which can be used to spot illegal or inappropriate behavior.

Question 4.

Why it is crucial to know how to tackle the situation if your kid is being victimized?

(A) Because they don’t have deep knowledge about it
(B) Because they are afraid to be penalized
(C) Because they do not want to be lectured about what is right and wrong
(D) None of the above
Answer:
(C) Because they do not want to be lectured about what is right and wrong

Explanation:
Parents should guide/guard their children while they are online. Parents should refrain their children to abuse others while online.

Question 5.

Why it is important to instil appropriate cyber etiquette at an early age?

(A) Because of increasing Internet usage worldwide decreases user data privacy
(B) Because of weak firewall and antiviruses protection
(C) Because of people’s insecurities
(D) All of the above
Answer:
(D) All of the above

Explanation:
Cyber etiquettes were recognized for transparency, government accountability, education and general public protection against mismanagement and corruption.

Question 6.

How to prepare future generations of internet users from being safe online?

(A) By instilling appropriate cyber etiquette at an early age
(B) with parents and children using the resources available to learn about cyber ethics
(C) By concerning to the code of responsible behaviour on the Internet
(D) All of the above
Answer:
(D) All of the above

Explanation:
Parents should guide their children to be responsible while using internet. Tell them not to abuse anyone, not to click on any link which can be suspicious.

Question 7.

Why is it important for browsers, computers and internet service providers to keep logs of people’s activities?

(A) So the people can remember what they have searched on the Internet
(B) So the servers can remember who have accessed the stored data
(C) To spot people’s illegal or inappropriate behaviour
(D) None of the above
Answer:
(C) To spot people’s illegal or inappropriate behaviour

Explanation:
It very important to keep track of their users, their activities, their search topic, etc. If any doubt is their about someone’s online behaviour, the ISPs or search engines can inform the authority regarding the same.

III. Plagiarism
Plagiarism is presenting someone else’s work or ideas as your own, with or without their consent, by incorporating it into your work without full acknowledgement. All published and unpublished material, whether in manuscript, printed or electronic form, is covered under this definition. Plagiarism may be intentional or reckless, or unintentional. Under the regulations for examinations, intentional or reckless plagiarism is a disciplinary offence. Considering the pattern, plagiarism can be of different types. They are : Direct Plagiarism, Mosaic Plagiarism, Accidental Plagiarism, Self-Plagiarism and Paraphrasing Plagiarism. Self-plagiarism and mosaic plagiarism are the two most common forms of plagiarism.

Question 1.

………. is presenting someone else’s as your own.

(A) Plagiarism
(B) Hacking
(C) Cracking
(D) All of these
Answer:
(A) Plagiarism

Explanation:
The word plagiarism comes from the Latin word for kidnapping. Plagiarism is called as stealing a person’s ideas and writing. In Plagiarism, you steal author’s ideas, experience, thought, language, etc.

Question 2.

Which types of work are covered in plagiarism?

(A) Published
(B) Unpublished
(C) Manuscript
(D) All of these
Answer:
(D) All of these

Explanation:
Plagiarism occurs when you use other’s words, ideas, data, or figures and do not acknowledge that you have done so. If you use the words, ideas, or phrasing of another person or from published material, ‘ you must

  • Use quotation marks around the words and cite the source, or
  • Paraphrase or summarize acceptably and Cite the source.

Question 3.

Plagiarism may be………..

(A) Intentional
(B) Reckless
(C) Noncontractile
(D) Any of these
Answer:
(D) Any of these

Explanation:
Plagiarism can be intentional, reckness and uncontractile. Plagiarism may have become a habit of students due to online learning.

MCQ Questions for Class 10 Computer Applications Chapter 8 Cyber Ethics

Question 4.

Which of the following is/are most common form(s) of plagiarism?

(A) Self plagiarism
(B) Mosaic plagiarism
(C) Both (A) and (B)
(D) None of these
Answer:
(C) Both (A) and (B)

Explanation:
Self-plagiarism: It is commonly described as recycling or reusing one’s own specific words from previously published texts. Mosaic plagiarism: It is a combination of both direct and paraphrase plagiarism. It involves incorporating various words, phrases, and sentences into your essay without providing quotation marks or attributions.

Question 5.

Plagiarism is a/an offence.

(A) Criminal
(B) Technology
(C) Technical
(D) Disciplinary
Answer:
(D) Disciplinary

Explanation:
Plagiarism is the practice of using someone else’s work and pretending that it is your own. In other words, plagiarism is an act of fraud.
It involves both stealing someone else’s work and lying about it afterward. It is a disciplinary action not a crime.

Question 6.

Which of the following is not a type of plagiarism?

(A) Direct plagiarism
(B) Mosaic plagiarism
(C) Accidental plagiarism
(D) Indirect plagiarism
Answer:
(D) Indirect plagiarism

Explanation:
Direct Plagiarism: It is the act of copying other person’s work word to word without changing a single word. Paraphrase plagiarism: It involves making a few changes to someone else’s work, then passing it off as your own. Accidental plagiarism: It occurs when citations are missing or sources are cited incorrectly.

Question 7.

What factor could be included for plagiarism?

(A) Having knowledge
(B) Competition
(C) Hard working
(D) Management skills
Answer:
(B) Competition

Explanation:
To avoid plagiarism, you should follow some rules:

    • Instead of copying the language of the book as it is, try to put it in your own language/ words.
    • One should have a clear understanding of Plagiarism.
    • If copying someone else’s work is your task, word to word, then do not forget enclosing it in quotes and also mention its source.
    • If you are not sure that you are documenting your sources correctly (whether by using parenthetical references or a fully formatted bibliography), ask your instructor.

MCQ Questions for Class 10 Computer Applications with Answers

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Advanced HTML Class 10 MCQ Questions with Answers

Question 1.

A can be inserted in HTML document which can act as a container for all the input elements.

(A) Text field
(B) Text area
(C) Form
(D) Command Button
Answer:
(C) Form

Explanation:
HTML Form is a document which stores information of a user on a web server using interactive controls.

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 2

……… method is used to sent form data as URL variables.

(A) Get
(B) Set
(C) Post
(D) None of these
Answer:
(A) Get

Explanation:
Some other features of GET requests are:

  • GET requests can be cached.
  •  GET request remains in the browser history.

Question 3.

Which of the following tag is used to link the URL ?

(A) <hyperlink>
(B) <link>
(C) <a>
(D) <style>
Answer:
(C) <a>

Explanation:
An anchor element is used to create a hyperlink in a webpage. The word anchor has come from the function performed by anchor in a ship.

Question 4.

Link URL in HTML is specified using attribute.

(A) Src
(B) href
(C) rel
(D) link
Answer:
(B) href

Explanation:
The HREF attribute is used to contain the URL of the link to be loaded by the browser.

Question 5.

Following tag stands for – <a>

(A) Action Tag
(B) Additional Tag
(C) Anchor Tag
(D) Active Tag
Answer:
(A) Action Tag

Explanation:
The < A> tag is used to link with other webpages. The <A> tag is called anchor tag.

Question 6.

Value of attribute “href” is also called as of the destination webpage.

(A) URS
(B) URK
(C) URL
(D) URM
Answer:
(C) URL

Explanation:
URL stands for Uniform Resource Locator.lt is the address of the webpage to be loaded by the browser.

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 7.

URL in HTML stands for……….

(A) Universal Resource Locator
(B) Uniform Resource Locator
(C) Uni Resource Locator
(D) None of these
Answer:
(B) Uniform Resource Locator

Explanation:
URL is the address of the website webpage to be loaded by die browser.

Question 8.

Link in HTML can be of following type(s).

(A) Unvisited
(B) Visited
(C) Active
(D) All are these
Answer:
(D) All are these

Explanation:
Links in HTML can be unvisited, visited and active. Unvisited links are those links that are never visited by the user. Visited links are those links that are already visited by the user. Active links are those links which the user had clicked.

Question 9.

Default Style and Color of unvisited link in any browser is……..

(A) Underline and Magento
(B) Normal and Blue
(C) Underline and Pink
(D) Underlined and Blue
Answer:
(D) Underlined and Blue

Explanation:
The unvisited links are displayed as underlined and in blue color.

Question 10.

Which of the attribute(s) cannot be present if the href attribute is not present ?

(A) hreflang
(B) rel
(C) target
(D) All of these
Answer:
(D) All of these

Explanation:
The attributes like hreflang, rel and target will not be present if the href attribute is not available.

Question 11.

<TR> belongs to ….. tag.

(A) <Table>
(B) <DIV>
(C) < Frameset >
(D) <TD>
Answer:
(A) <Table>

Explanation:
Some other features of GET requests are:

  • GET requests can be cached.
  • GET request remains in the browser history.

Question 12.

………… tag is used to add columns to a table.

(A) definition list
(B) definition list term
(C) definition list description
(D) none of the above
Answer:
(D) none of the above

Explanation:
A definition list can have multiple terms for a given definition as well as multiple definitions for a given term. A definition list has two pieces for each item, a term and a definition. The <DT> tag stands for Definition List Term. The <DD> tag stands for Definition List Description.

Question 13.

Which attribute is used to define cell contents to left ?

(A) Valign
(B) Align
(C) Galign
(D) Halign
Answer:
(B) Align

Explanation:
The Align attribute of <TABLE> tag is used to align the contents of a cell to left, right and centre.

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 14.

Which tag is used to add a row to a table?

(A) TR
(B) TD
(C) TH
(D) TC
Answer:
(A) TR

Explanation:
The <TR> tag is used to add a new row to a table. It is used inside the < TABLE > tag.

Question 15.

Which of the following is used to specify the beginning of a,table’s row?

(A) TROW
(B) TABLER
(C) TR
(D) ROW
Answer:
(C) TR

Explanation:
The <TR> tag is used to specify the table row. The number of <TR> tag in the <TABLE> tag specifies the number of rows in that table.

Question 16.

In order to add border to a table, BORDER tag is specified in which tag

(A) THEAD
(B) TB ORDER
(C) TABLE
(D) TR
Answer:
(C) TABLE

Explanation:
The BORDER attribute is used with the < TABLE > tag to specify a border to a table. If the <TABLE> tag is without the BORDER attribute, then the table will appear without any border.

Question 17.

Which of these tags are called table tags?

(A <Theadxbody><tr>
(B) <Tablextrxtd>
(C) <Tablexheadxtfoot>
(D) <Tablextrxtt>
Answer:
(B) <Tablextrxtd>

Explanation:
The < TABLE >, <TR> and <TD> are all tags related to creating a table. The < TABLE > tag defines a table.Inside it, appears the <TR> tag that defines the row, Inside <TR> tag appears the <TD> tag that specifies the column of a table. The tags are closed according to the sequence they are opened.

Question 18.

Which HTML command is used to align the contents of the cell to right?

(A) <TR align = “right-” >
(B) <TD align=”right” >
(C) <TD> align=right
(D) All of the above
Answer:
(B) <TD align=”right” >

Explanation:
The <TD align=”right”> align its content to the right of the cell of a table.

Question 19.

The two common attributes of IMG and TABLE tag are :

(A) SRC and HEIGHT
(B) HEIGHT and WIDTH
(C) BORDER and SRC
(D) None
Answer:
(B) HEIGHT and WIDTH

Explanation:
The HEIGHT attribute specifies the height of the rows. It is calculated in pixels. The Width attribute specifies the width of the row.

Question 20.

Which of the following is not an attribute of < table > tag?

(A) Border
(B) Background
(C) Bgcolor
(D) SRC
Answer:
(D) SRC

Explanation:
The SRC attribute is not one of the 1 attributes of <TABLE > tag. It is the attribute of <IMG> and <A> tags.

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 21.

rowspan=n and colspan=n can be added to …….tag

(A) <hr>
(B) <table >
(C) <td>
(D) <tr>
Answer:
(C) <td>

Explanation:
Colspan is used only with <TD> tag and it extends the cells horizontally. Rowspan is used only with <TD> tag and it extends the cell vertically. Its value can be a number.

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion (A): The SUBMIT or RESET buttons that sends all the collected information to the server orclears the form information respectively.
Reason (R): The information is then processed and give the output.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
The syntax to use SUBMIT is: <FORM> ” < INPUT type=”SUBMlT” value=”SUBMIT”> </FORM> Using the above statement, a form appears with a button named as SUBMIT.

Question 2.

Assertion (A): It is not possible to have a form inside a form.
Reason (R): A form cannot be nested.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
It is possible to add all kinds of HTML tags between the <FORM> and </ FORM> tags. This means that a form can easily include a table or an image along with the actual elements. The <FORM> tag cannot have another <FORM> tag inside it. A form cannot have a subform as it cannot be nested.

Question 3.

Assertion (A): The <FORM NAME=”Form Name”> specifies the name of the Form.
Reason (R): The form name is always displayed on the Form.

Answer:
(C) A is true and R is false

Explanation:
The name of the form is not displayed on the form. As the user can have more than one FORM tags in an HTML document, so to differentiate one Form from another, a name is required to be given. Name attribute is optional if only one <FORM> tag is used.

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 4.

Assertion (A): Data cannot be encrypted in the form.
Reason (R): The ENCTYPE attribute specifies how the data is sent to the destination.

Answer:
(D) A is false and R is true

Explanation:
The <FORM ENCTYPE=”PLAIN/ TEXT”> specifies how the data is sent to the destination. It encrypts the data and sends it as it is to the destination place.

Question 5.

Assertion (A): The <INPUT> tag is required when the user has to give some input/data.
Reason (R): The <INPUT> tag is not a compulsory tag used withinthe FORM tag.

Answer:
(C) A is true and R is false

Explanation:
The < INPUT > tag is required when the user has to give some input/data. This tag is always used within the FORM tag. Thus, INPUT tag defines a FORM element which can receive user input. The TYPE attribute determines the specific sort of FORM element to be created i.e. this attribute specifies the type of input we want from the user. It can be used to create the following type of interface elements:
(A) BUTTON
(B) CHECKBOX
(C) RADIO
(D) TEXT
(E) SUBMIT and RESET
(F) IMAGE
(G) FILE
< INPUT TYPE=”BUTTON” >: This will place a button on an HTML form.

Question 6.

Assertion (A): External links which link your pages to other web page. i.e. linking between two different documents.
Reason (R): In order to create an external link to another website, you need to know the other website’s URL with full path.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
External links is used to link a document to external web page. This link may be absolute path or relative link path. If you want to create an external link from your website to google.com page, you can code like this: < AHREF = ” http://www.goo gle.com/” > Google Home</A>

Question 7.

Assertion (A): The full form of HREF is Higher Text Reference.
Reason(R): The value of the HREF attribute is the location (URL) of the external resource.

Answer:
(D) A is false and R is true

Explanation:
The full form of HREF is HyperText Reference. The HREF attribute of the <A> tag is used to create a hyperlink. The HREF attribute is used to address the document to link to and the words between the open and close of the anchor tag will be displayed as a hyperlink. The syntax of creating an anchor text is as follows: <A HREF=” URL” > Text to be displayed </A>

Question 8.

Assertion (A): The mailto link is a type of HTML link that activates the default mail client on the computer for sending an e-mail..
Reason (R): The web browser requires a default e-mail client software installed on his computer in order to activate the e-mail client.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
The mailto link is written in the same format as a hyperlink except you use mailto: in place of the http:// and your e-mail address in place of the page address or URL. The syntax of mailto link is as follows: < A HREF=”mailto: < emaillD” >…. </A>

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 9.

Assertion (A): The CONTROLS attribute of < VIDEO > tag takes Boolean value(True or False), thus.
Reason (R): The user had to give the value as True or False to CONTROLS attribute.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
If the CONTROLS attribute is set to True, the video will appear with controls like play, pause and volume. If this attribute is omitted, then the browser will not display the default controls.

Question 10.

Assertion (A): Cellspacing in a table is used to put more space around each cell. It defines the space between cells.
Reason (R): By default, cellspacing width is 2 pixels.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A
Explanation:
An example of cellspacing is given below:
<HTML>
<HEAD>
< TITLE > TABLE Example </TITLE>
</HEAD>
<BODY>
< TABLE BORDER=”5″ BORDERCOLOR= “BLUE” CELLSPACING=”8″ >
<TR>
<TD>Serial Number</TD>
<TD> Teacher Names <//TD>
<TD> Phone Number </TD>
<TD> Address </TD>
</TR>
</TABLE>
</BODY>
</HTML> ‘

Question 11.

Assertion (A): you can have rows with different columns.
Reason (R): The COLSPAN attribute of <TABLE> tag is used to merge two or more columns in one.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
Colspan is used to merge multiple columns. Minimum value for COLSPAN is 2 and default value is Syntax to use the COLSPAN attribute is: <TDCOLSFAN=X>Where X is the number of cells it extends horizontally.

Question 12.

Assertion (A): When data is arranged in a table, it gives a more flexible and attractive way to represent information.
Reason (R): A table is used to arrange data in the form of rows and columns.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
Representing the data in tabular manner makes it easier to perform the comparative analysis of data.

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 13.

Assertion (A): The BORDER attribute in <TABLE>is used to specify the border of the table.
Reason (R): If the BORDER attribute is not specified then the table will appear without any border.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
The Border attribute is used to display a table with border. If the value of the BORDER attribute is 0, then the table will appear without any border.

Question 14.

Assertion (A): The valign attribute specifies the alignment of the cell contents vertically.
Reason (R):The value of the valign attribute can be Top, Middle or Bottom.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
The syntax to define the valign attribute of <TABLE> tag is:
<TABLE>
<TR Valign=”Top/Middle/Bottom”>
<TD Valign=”Top/Middle/Bottom” >
</TABLE>

Question 15.

Assertion (A): The width attribute specifies the height of a table.
Reason (R): The width attribute of < TABLE > is not supported in HTML5.

Answer:
(D) A is false and R is true

Explanation:
The width attribute specifies the width of a table. If the width attribute is not set, a table takes up the space it needs to display the table data. Syntax:
<TABLE WIDTH=”pixels | %”> Where the value of the WIDTH attribute can be the number of pixels or percentage value. The <TH> tag defines the header of the table.

Question 1.

A table is used to arrange data in the form of

(A) Rows
(B) Columns
(C) Both (a) and (b)
(D) None of these
Answer:
(C) Both (a) and (b)

Explanation:
A table is used to arrange data in the form of rows and columns. Rows are the horizontal portion and columns are the vertical portion of a table.

Question 2.

The tag <TR> me

(A) Table Row
(B) Table Data
(C) Table Column
(D) None of these
Answer:
(A) Table Row

Explanation:
To define a table row, a user use 1 <TR>tag.

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 3.

Each table may have a caption relevant to the information which is represented by tag.

(A) <TR>
(B) <TH>
(C) <TD>
(D) <CAPTION>
Answer:
(D) <CAPTION>

Explanation:
The <CAPTION > tag defines a suitable caption of a table.

Question 4.

Which of the following statements is/are TRUE?

(A) When data is arranged in a table, it gives a more flexible and attractive way to represent information.
(B) The contents of a row are divided into data cells.
(C) Representing the data in tabular manner makes it easier to perform the comparative analysis of dat(A)
(D) All of these
Answer:
(D) All of these

Explanation:
A table is an arrangement of data in rows and columns, or possibly in a more complex structure. Tables are widely used in communication, research, and data analysis. Tables appear in print media, handwritten notes, computer software, architectural ornamentation, traffic signs, and many other places.

Question 5.

The <TABLE> tag is used to create a ……

(A) Row
(B) Column
(C) Table
(D) None of these
Answer:
(C) Table

Explanation:
The < TABLE > tag is used to define a table.Tables provide you a way to arrange the data in the form of rows and columns.

Question 6.

The tag to define the header of the table is…….. tag.

(A) <TR>
(B) <TD>
(C) <TH>
(D) <CAPTION>
Answer:
(C) <TH>

Explanation:
The <TH> tag defines the header cell in a table. It is placed inside the <TABLE> and <TR> tags.

Question 7.

Which of the following defines the correct sequences of steps of the syntax to create a table?

(A) < TABLE >
<CAPTION>
<TR>
<TH> </TH>
</TR>
<TR>
<TD> …. </TD>
</TABLE>

(B) <TABLE>
< CAPTION > </ CAPTION >
<TH> </TH> ”
</TR>
<TR>
<TD> …. </TD>
</TR>

(C) <TABLE>
< CAPTION > </ CAPTION >
<TR>
<TH> </TH>
</TR>
<TR>
<TD> …. </TD>
</TR> ‘
</TABLE>

(D) None of these
Answer:
(C) <TABLE>
< CAPTION > </ CAPTION >
<TR>
<TH> </TH>
</TR>
<TR>
<TD> …. </TD>
</TR> ‘
</TABLE>

Explanation:
In the syntax, the <TABLE> tag comes first followed by <CAPTION> tag. To define the row, <TR> tag and if table header is to be defined then <TH> tag is used. The <TD> tag is used to define the data of the row.

I. Inline and Embedded Style Sheet
Inline style sheets are used to add styles to a particular tag or group of tags. The style information is included within the tag of an HTML element. They do not affect only the single element or individual occurrence of the tag to which the style is applied. The style information of an HTML element is specified using STYLE attribute within the element tag. The style information is enclosed in double quotes and semi-colon(;) to separate multiple style properties. A colon is used to assign value to individual property. Internal or embedded style sheets are used to define unique styles for the elements of a single HTML document. The internal styles are defined in the HEAD section of HTML document by using the < STYLE > tag. This specifies the style sheet area within the HTML document. The TYPE attribute of < STYLE > tag specifies the type of style sheet being used.

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 1.

…………. style sheets are used to add styles to a particular tag or group of tags.

(A) Inline
(B) Embedded
(C) Outline
(D) None of these
Answer:
(A) Inline

Explanation:
The inline style is specific to the tag itself. It uses the HTML “style” attribute to style a specific tag.

Question 2.

A………..is used to assign value to individual property.

(A) Semi-colon
(B) Comma
(C) Colon
(D) Inverted comma
Answer:
(C) Colon

Explanation:
CSS has now become a very important part of building blogs and websites. The use of colon is given as: < STYLE type=”text/css” > Hl{ Color: Sienna;
Text-align: Center } </STYLE>

Question 3.

…………..style sheets are used to define unique styles for the elements of a single HTML document.

(A) Internal
(B) Embedded
(C) Both (A) or (B)
(D) None of these
Answer:
(C) Both (A) or (B)

Explanation:
In Embedded CSS, you can put your CSS rules into an HTML document using the < style > element. This tag is placed inside the <head>…</head> tags. Rules defined using this syntax will be applied to all the elements available in the document.

Question 4.

The internal styles are defined in the section of HTML document by using the < STYLE > tag.

(A) HEAD
(B) BODY
(C) TITLE
(D) None of these
Answer:
(A) HEAD

Explanation:
The syntax of using < STYLE > tag is:
<head>
<style type=”text/css” media=”…”>
Style Rules </style>
</head>

Question 5.

The ……..attribute of < STYLE > tag specifies the type of style sheet being used.

(A) START
(B) CSS
(C) TYPE
(D) HREF
Answer:
(C) TYPE

Explanation:
The type attribute of the <STYLE> tag gives information about the type of document to the browser.

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 6.

The style information is enclosed in and ……..to separate multiple style properties.

(A) Double quotes
(B) Semi-colon(;)
(C) Both (A) and
(B) (D) None of these
Answer:
(C) Both (A) and

Explanation:
The use of double-quotes and semi-colon can be easily understandable by going through the following code:
<!DOCTYPE html>
<html>
<head>
< title > Learning HTML </title>
</head>
<body>
<p sty!e=”font-size: xx-large; colonmaroon; text-align:ccn ter; border: groove 5px orange” > Learning HTML </p>
<p sty!e=”font-size: x-large; colongreen; text-align:right; border:ridge 3 px maroon” >
Learning HTML </p>
<p style=”font-size: medium; colonnavy; text-align:left; bordendashed 4 px green” > Learning HTML </p>
</body> </html>

Question 7.

What is the type of the CSS code in the following code?

<html>
<BODY>
< HI style=”Color:Red;Text-align:Center” >
Welcome </Hl>
<P style=”Font-size:18pt”>This is a style.</P> <H2 style=”Color: Blue;Font-size:24pt”> Using STYLE attribute </H2>
</body> .
</html>
(A) Inline style sheet
(B) Embedded style sheet
(C) Both (A) and (B)
(D) None of these
Answer:
(A) Inline style sheet

Explanation:
An inline style may be used to apply a unique style for a single element. To use inline styles, add the style attribute to the relevant element. The style attribute can contain any CSS property. Inline styles are defined within the “style” attribute.

II. CSS AND THE STEPS TO WRITE IT
A CSS is basically a tool that allows adding style to a web page. A style sheet consists of a set of instructions or rules that are made up of two parts given as:

  • A selector
  • A set of properties

The main aim of CSS is to increase the style of the page. Therefore, CSS appears to be visual-based. One of the main properties of CSS’s is that all the images, pages, object and style have to be saved in the same directory. The author of the page has to create a style sheet in the text editor being used.
To write a style sheet,

  • The header of the HTML file being written for the web page has a link to the style sheet.
  • The next step involves writing a set of rules. The rules consist of selectors and the actions that they have to perform.
  • A selector for an element or a tag is the text that appears within the tag (i.e. the selector for the <P> tag is P).
  • Then within braces the property is written. This consists of a property separated by its value with a colon and a space.

Question 1.

The full form of CSS is……….

(A) Cascading Style Sheet
(B) Concatenate Style Sheet
(C) Convey Style Sheet
(D) Conclusive Style Sheet
Answer:
(A) Cascading Style Sheet

Explanation:
Cascading style sheet is a list of statements that can assign various rendering properties to HTMLelements.

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 2.

The main aim of CSS is to increase the of the page.

(A) Style
(B) Length
(C) Breadth
(D) Size
Answer:
(A) Style

Explanation:
Cascading Style Sheet (CSS) is a simple mechanism for adding style (e.g., fonts, colors, spacing) to Web documents.

Question 3.

A for an element or a tag is the text that appears within the tag.

(A) Attribute
(B) Style
(C) Selector
(D) Property
Answer:
(C) Selector

Explanation:
Embedding style sheet requires more coding than linking it from the HTML file. If the style sheet is not embedded then the required page to be downloaded or viewed offline would not be correct. CSS is not supported by some of the editors, as editors don’t recognize some of the HTML codes that are generated while making CSS.

Question 4.

What is the difference between HTML and CSS?

(A) HTML is the markup language used to develop web pages while CSS adds style to the web page.
(B) HTML adds style to the web page while CSS is the markup language to develop web pages.
(C) Both are incorrect statements
(D) None of these
Answer:
(A) HTML is the markup language used to develop web pages while CSS adds style to the web page.

Explanation:
Maintenance of the web page is easy. To make a global change, simply change the style, and all elements in all the web pages will be updated automatically.

Question 5.

The parts of style sheet is/are:

(A) A selector
(B) A set of properties
(C) Both (A) and (B)
(D) None of these
Answer:
(C) Both (A) and (B)

Explanation:
Using CSS, the number of times a background image is to appear or whether the tiles are to be placed horizontally or vertically can be specified.

Question 6.

What does the following statement correspond to? BODY background-color: Red ?

(A) This defines the font color of the text as red.
(B) This defines the background of the body to be in red.
(C) There is an error in the statement
(D) None of these
Answer:
(B) This defines the background of the body to be in red.

Explanation:
CSS Background-color property define the background color of an element. Its value is a color name or color code.

MCQ Questions for Class 10 Computer Applications Chapter 7 Advanced HTML

Question 7.

What does the following statement correspond to? HI {Color: Red}

(A) This defines the background of the body to be in red.
(B) This defines the font color of HI as red.
(C) This defines the background color of HI as red.
(D) None of these
Answer:
(B) This defines the font color of HI as red.

Explanation:
The COLOR property is used to give color to the element present on the web page. Its value is the color name or color code.

MCQ Questions for Class 10 Computer Applications with Answers

MCQ Questions for Class 10 Computer Applications Chapter 6 HTML Advanced-Tables, Lists and Links

HTML Advanced-Tables, Lists and Links Class 10 MCQ Questions with Answers

Question 1.

In <OL> and <UL>, the style of bullet or number is defined by:

(A) type attribute
(B) style attribute
(C) both (A) and (B)
(D) None of the these
Answer:
(A) type attribute

Explanation:
The type attribute of <OL> and <UL> tags is used to define the type of bulleted and numbered list required by the user,

MCQ Questions for Class 10 Computer Applications Chapter 6 HTML Advanced-Tables, Lists and Links

Question 2.

Which of the following will produce a solid circle bullet when given as a type for <UL>?

(A) circle
(B) square
(C) disc
(D) none of these
Answer:
(C) disc

Explanation:
The syntax <UL type=”disc”> will display a bulleted list with disc.

Question 3.

A …….. can be inserted in HTML document which can act as a container for all the input elements.

(A) Text field
(B) Text area
(C) Form
(D) Command Button
Answer:
(C) Form

Explanation:
HTML Form is a document which stores information of a user on a web server using interactive controls.

Question 4.

………. method is used to sent form data as URL variables.

(A) Get
(B) Set
(C) Post
(D) None of these
Answer:
(A) Get

Explanation:
Some other features of GET requests are: GET requests can be cached. GET request remains in the browser history.

Question 5.

…………… method is used to sent form data as HTTP Post.

(A) Get
(B) Set
(C) Post
(D) None of these
Answer:
(C) Post
Explanation:
Some features of POST requests are:

  • POST requests are never cached.
  • POST requests do not remain in the browser history.

Question 6.

What is the purpose of a web form ?

(A) An outdated feature still used to help the page load faster
(B) An useful way to send information from the user directly to the search engines
(C) A way to input data into a website or an application
(D) To enable the user to navigate the website with ease
Answer:
(C) A way to input data into a website or an application

Explanation:
Web Forms are pages that your users request using their browser.

MCQ Questions for Class 10 Computer Applications Chapter 6 HTML Advanced-Tables, Lists and Links

Question 7.

Which element allows for the creation of groups of options in a select menu?

(A) <select>
(B) < group >
(C) < option >
(D) <optgroup>
Answer:
(C) < option >

Explanation:
The <OPTION> tag specifies an option in a selection list. < OPTION > tag is used inside a SELECTION tag.

Question 8.

Which option will be selected with the following code snippet?

<select>
<option selected value=”Fiat”>Fiat</option>
< option value=” selected” > Saab </option >
< option value=”opel” > Selected </option >
< option value=” audi” > Audi </option > </select>
(A) Fiat
(B) Saab
(C) Selected
(D) Audi
Answer:
(A) Fiat
Explanation:
The <SELECT> tag defines a selection list on an HTML FORM. A selection list displays alist of options from which the user can select an item. From a selection list, one or morethan one item can be selected at a time.

Question 9.

The attribute specifies the page which handles the input from the user.

(A) method
(B) frame
(C) action
(D) target
Answer:
(C) action

Explanation:
The ACTION attribute specifies where the information will be ‘ sent for processing. Information processing destinations can be CGI programs, JavaScript functions or an email address.

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion (A): An unordered list is a list in which there is no definite order to the items.
Reason (R): As, an unordered list of items are marked with bullets.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
An unordered list is a bulleted list of items. The tags for an unordered list are <UL> and </UL>. It is used to create unordered list or bulleted list, like to represent the list in the form of disc, square and circle. The data is defined under the <UL> tag, by using <LI> tag. Syntax <UL>…</UL>

MCQ Questions for Class 10 Computer Applications Chapter 6 HTML Advanced-Tables, Lists and Links

Question 2.

Assertion (A): A definition list is not a list of items.
Reason (R): A definition list is a list of terms and explanation of the terms.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
A definition list has two pieces for each item, a term and a definition. Each definition-list term starts with the <Dy>tag. Each definition-list definition starts with the < DD>tag. It is used to create a list of definition terms.

Question 3.

Assertion (A): The SUBMIT or RESET buttons that sends all the collected information to the server or clears the form information respectively.
Reason (R): The information is then processed and give the output

Answer:
(B) Both A and R are true but R is Not the correct explanation of AOption (B) is correct.
Explanation:
The syntax to use SUBMIT is: <FORM> < INPUT type=”SUBMIT” value=”SUBMIT”> </FORM > Using the above statement, a form appears with a button named as SUBMIT.

Question 4.

Assertion (A): It is not possible to have a form inside a form.
Reason (R): A form cannot be nested.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
It is possible to add all kinds of HTML tags between the <FORM> and </ FORM> tags. This means that a form can easily include a table or an image along with the actual elements. The <FORM> tag cannot have another <FORM> tag inside it. A form cannot have a subform as it cannot be nested.

MCQ Questions for Class 10 Computer Applications Chapter 6 HTML Advanced-Tables, Lists and Links

Question 5.

Assertion (A): The <FORM NAME=”Form Name”> specifies the name of the Form.
Reason (R): The form name is always displayed on the Form.

Answer:
(C) A is true and R is false

Explanation:
The name of the form is not displayed on the form. As the user can have more than one FORM tags in an HTML document, so to differentiate one Form from another, a name is required to be given. Name attribute is optional if only one <FORM> tag is used.

Question 6.

Assertion (A): Data cannot be encrypted in the form.
Reason (R): The ENCTYPE attribute specifies how the data is sent to the destination.

Answer:
(D) A is false and R is true
Explanation: The < FORM ENCTYPE=”PLAIN/ TEXT”> specifies how the data is sent to the destination. It encrypts the data and sends it as it is to the destination place.

Question 7.

Assertion (A): Data cannot be encrypted in the form.
Reason (R): The ENCTYPE attribute specifies how the data is sent to the destination.

Answer:
(D) A is false and R is true

Explanation:
The < FORM ENCTYPE=”PLAIN/ TEXT”> specifies how the data is sent to the destination. It encrypts the data and sends it as it is to the destination place.

Question 8.

Assertion (A): The <INPUT> tag is required when the user has to give some input/data.
Reason (R): The <INPUT> tag is not a compulsory tag used within the FORM tag.

Answer:
(C) A is true and R is false

Explanation:
The <INPUT> tag is required when the user has to give some input/data. This tag is always used within the FORM tag. Thus, INPUT tag defines a FORM element which. can receive user input. The TYPE attribute determines the specific sort of FORM element to be created i.e. this attribute specifies the type of input we want from the user. It can be used to create the following type of interface elements:

(A) BUTTON
(B) CHECKBOX
(C) RADIO
(D) TEXT
(E) SUBMIT and RESET
(F) IMAGE
(G) FILE
<INPUT TYPE=”BUTTON” >: This will place a button on an HTML form. information. These programs then manipulate the information, store data and send a feedback page to the viewer. To do so, a tag is available called as <FORM> tag.

Case- Based MCQs

Attempt any ? sub-parts from each question. Each sub-part carries 1 mark.
I. HTML Forms
Forms are one of the most powerful parts of a web page. In the structure of an HTML document, comes the basic tags like <HTML>, <HEAD> and <BODY>.HTML Forms are elements responsible for adding interactivity to web documents. Forms can be used to add to your web pages a guest book, order forms, surveys, get feedback, etc. A form allows you to gather information from a visitor or customer for immediate or for later use. The role of Forms is to gather different kinds of user input, i.e. fields to type in text, menus to select items from, radio buttons to choose items. The web browser accepts this information, and sends it directly to a web server, where a customized program is invoked to handle the form information. These programs then manipulate the information, store data and send a feedback page to the viewer. To do so, a tag is available called as <FORM> tag.

Question 1.

In the term HTML, what does M stands for?

(A) Markup
(B) Mashup
(C) Meaningful
(D) Most
Answer:
(A) Markup

Explanation:
HTML is a markup language used to build web pages and web applications. HTML is not a programming language, but rather a markup language.The major limitation of HTML is that it can create only static and plain pages so if you need dynamic pages then HTML is not useful.

MCQ Questions for Class 10 Computer Applications Chapter 6 HTML Advanced-Tables, Lists and Links

Question 2.

……………. are the most powerful parts of a webpage.

(A) Links
(B) Forms
(C) Images
(D) Scripting
Answer:
(B) Forms

Explanation:
HTML Form is a document which stores information of a user on a web server using interactive controls. An HTML form contains different kind of information such as username, password, contact number, email id etc. In HTML, a form is a window that consists of the elements of a form called the form fields. These fields may be text field, text area, drop¬down box, radio buttons, checkbox and/or a command button.

Question 3.

Which of the following statements is/are True?

(A) Forms can be used to add to your web pages a guest book, order forms, surveys, get feedback, etc.
(B) Forms are elements responsible for adding interactivity to web documents.
(C) Both (A) and (B)
(D) None of these
Answer:
(C) Both (A) and (B)

Explanation:
When the form is displayed in a web browser, the user can make a choice and some text can be entered using the interface elements. This form made can finally be submitted to a destination point whenever required.

Question 4.

Which of the following tag is used to display the body of the webpage?

(A) <CSS>
(B) <HEAD>
(C) <BODY>
(D) < TITLE >
Answer:
(C) <BODY>

Explanation:
The <BODY> tag appears in between the <HTML> and </HTML> tags. It displays the text to be displayed on the web browser.

Question 5.

Which of the following defines the role of a form?

(A) Displaying various kind of information to the user
(B) Gather different kinds of user input
(C) Both (A) and (B)
(D) None of these
Answer:
(C) Both (A) and (B)

Explanation:
The for takes information from the user, processes it and then give the output to be displayed.

Question 6.

Which tag is used to create a form in a webpage?

(A) <FORM>
(B) < TITLE >
(C) <HEAD>
(D) None of these
Answer:
(A) <FORM>

Explanation:
The <FORM> tag tells the browser where a form starts and </FORM> denotes where the form ends. A <FORM> tag is thus a container element. Everything . contained between these opening and closing tags is a part of the form.

Question 7.

What are the different buttons that a form contains?

(A) Checkbox
(B) Radio button
(C) Post/Submit button
(D) All of these
Answer:
(D) All of these
Explanation:
The basic construction of an HTML Form includes:

  •  The beginning and ending <FORM> tag.
  •  The actual form elements where the visitor enters the information like text box, checkbox, radio buttons, etc.
  •  The SUBMIT or RESET buttons that sends all the collected information to the server or clears the form information respectively

II. ORDERED LISTS
HTML ordered list or Numbered list displays elements in a numbered format. The HTML <OL> tag is used for creating ordered list. Ordered list can be used to represent items either in numerical order or alphabetical order format or in any format where an order is emphasized.The data item is defined under the <OL> tag by using <LI> tag. The <OL> consists of the Attributes START and TYPE.

MCQ Questions for Class 10 Computer Applications Chapter 6 HTML Advanced-Tables, Lists and Links

Question 1.

HTML ordered list or Numbered list displays elements in a……… format.

(A) Numbered
(B) Bulleted
(C) Both (A) and (B)
(D) None of these
Answer:
(A) Numbered

Explanation:
Numbered list is an ordered list that is numbered as ‘1,11,111’, ‘a,b,c’, ‘i, ii, iii’.By default, an ordered list shows the item in the ascending order.

Question 2.

The HTML …….. tag is used for creating ordered list.

(A) <UL>
(B) <OL>
(C) Both (A) and (B)
(D) None of these
Answer:
(B) <OL>

Explanation:
An ordered list is a list where 1 the items in the list are held in some kind of sorted order. The <OL> tag is used to define I an ordered list. OL stands for Ordered List.

Question 3.

The attribute is used to specify the start of the ordered lists.

(A) Start
(B) St
(C) Face
(D) Size
Answer:
(A) Start

Explanation:
To clarify the use of START attribute view the example given below:
<HTML>
<HEAD>
< TITLE > START ATTRIBUTE </TITLE>
</HEAD>
<BODY>
<OL START=” 4 “>
<LI>Six</LI>
< LI > Seven </LI >
< LI > Eight </LI>
</BODY >
</HTML >

Question 4.

What does <LI> stands for?

(A) LIST ITEM
(B) LAST ITEM
(C) LONG ITEM
(D) LENGTH ITEM
Answer:
(A) LIST ITEM

Explanation:
Both ordered and unordered lists require start and end tags as well as the use of a special element to indicate where each list item begins (the <LI> tag).

MCQ Questions for Class 10 Computer Applications Chapter 6 HTML Advanced-Tables, Lists and Links

Question 5.

Which of the following is not an attribute of <OL> tag?

(A) TYPE
(B) START
(C) BACKGROUND
(D) None of these
Answer:
(C) BACKGROUND

Explanation:
To understand the use of START and TYPE attributes, view the following example:
<HTML>
<HEAD>
< TITLE > START and TYPE ATTRIBUTES </ TITLE >
</HEAD>
<BODY>
<OL TYPE=” i” START=” 4 “>
<H2>MY FAVOURITE FRUITS: </H2>
<FONT FACE=”Monotype Corsiva” SIZE=”6″ COLOR=”Red” >
< LI > Apple </LI >
< LI > Strawberry </LI >
< LI> Blueberry </LI >
</FONT>
</OL>
</BODY>
</HTML>

Question 6.

What is the syntax of OL tag with TYPE attribute?

(A) <OL TYPE=”l/a/A/i/r>
(B) < OL TYPE=”square” >
(C) <OL TYPE=”disc” >
(D) <OL TYPE=”circle” >
Answer:
(A) <OL TYPE=”l/a/A/i/r>
Explanation:
TheTYPEattributeaUowsyoutospedfythenumbering system you want to use. Arabic numbers are the default. View the example given below to understand the use of TYPE attribute.
<FITML>
<HEAD>
< TITLE > TYPE ATTRIBUTE </TITLE>
</HEAD>
<BODY>
<OLTYPE=T>
< LI > LOTUS TEMPLE </Ll >
<LI>TAJ MAHAL </LI>
< LI > INDIA GATE</LI>
</BODY>
</HTML>

Question 7.

Which of the following statement(s) is/are true?

(A) Lists create well-structured, accessible, easy- to-maintain documents.
(B) They provide individualized elements to which you can hook on CSS styles.
(C) Systematic lists help viewers to read your website.
(D)All of these
Answer:
(D)All of these

Explanation:
There are three main types of lists: unordered lists, ordered lists and definition lists. Ordered lists are numbered in some fashion, while unordered lists are bulleted. Definition lists consist of a term followed by its definition.

III. CHECKBOXES
<INPUT TYPE=”CHECKBOX” >: Checkboxes are used when the visitor can select multiple options from a set of alternatives. There can be more than one checkboxes from which the user can select one or more options. Note that every checkbox has a unique name. If there is no check in the box, clicking it will place a check mark (“X” orthere. If the box is checked, clicking it again will remove the mark. The value sent in the web form is the value of the checkbox if it was selected; otherwise the value will be empty. Adding the option CHECKED to a checkbox will make that checkbox highlight when the page loads.

Question 1.

Checkboxes are used when the visitor can select ………. options from a set of alternatives.

(A) One
(B) Multiple
(C) Both (A) and (B)
(D) None of these
Answer:
(C) Both (A) and (B)

Explanation:
The checkboxes are used where the user can select more than one or more than one options like ‘Number of languages known’, ‘Names of the cities visited’, etc.

Question 2.

What happen when the syntax of the code is: <INPUT TYPE = “CHECKBOX” CHECKED>?

(A) Will make that checkbox highlight when the page loads.
(B) The page will never be loaded.
(C) Will make that checkbox dormant when the page loads.
(D) None of these
Answer:
(A) Will make that checkbox highlight when the page loads.

Explanation:
That particular checkbox will be highlighted whose code is given as clNPUT TYPE=”CHECKBOX” CHECKED >, when that particular webpage will be loaded by the browser.

MCQ Questions for Class 10 Computer Applications Chapter 6 HTML Advanced-Tables, Lists and Links

Question 3.

What is the meaning of the syntax of the code is: < INPUT TYPE=”CHECKBOX” Name= “Checkboxl” CHECKED >?

(A) That particular checkbox having the name ‘Checkbox’ will be highlighted, when that particular webpage will be loaded by the browser.
(B) That particular checkbox having the name ‘Checkboxl’ will be highlighted, when that particular webpage will be loaded by the browser.
(C) That particular checkbox having the name ‘Checkboxl’ will not be loaded by the web browser.
(D) There is an error in the syntax.
Answer:
(B) That particular checkbox having the name ‘Checkboxl’ will be highlighted, when that particular webpage will be loaded by the browser.

Explanation:
The Name attribute of <INPUT> tag specifies the name of the INPUT element. This attribute is required to differentiate between checkboxes. The name is not displayed on the form.

Question 4.

What is/are the difference between checkbox and radio button?

(A) Checkbox appears to be rectangular/square in shape whereas radio button appears to be round.
(B) Checkbox is used when multiple options can be selected whereas radio button is used only when one option can be selected.
(C) Both (A) and (B)
(D) None of these
Answer:
(C) Both (A) and (B)

Explanation:
Here, an example is given to show radio buttons on the form.
<HTML>
<HEAD>
<TITLE>Radio Button example</TITLE> c/HEAD >
<BODY>
<TIl>Please select the gender</Hl>
<FORM>
< INPUT TYPE=”RADIO” NAME=”R1″> MALE
<BR> .
< INPUT TYPE=”RADIO” NAME=”R2″> FEMALE
<BR>
< INPUT TYPE=”RADIO” NAME=”R3″> TRANS GENDER
<BRxBR>
< IN PUTTYPE=”SU BMIT” VALUE=”Submit” > </FORM>
</BODY >
</HTML>
After the above code is processed, three radio buttons will be displayed on the form.

Question 5.

Which tag is used to insert a checkbox on the form?

(A) < INPUT >
(B) <CHECKBOX>
(C) <TYPE>
(D) None of these
Answer:
(A) < INPUT >

Explanation:
The < INPUT > tag is required when the user has to give some input/data. This tag is always used within the FORM tag. Thus, INPUT tag defines a FORM element which can receive user input. The TYPE attribute determines the specific sort of FORM element to be created i.e. this attribute specifies the type of input we want from the user.

Question 6.

In which of the following checkboxes can be used?

(A) Names of countries visited
(B) Names of food items loved
(C) Names of languages known
(D) All of these
Answer:
(C) Names of languages known

Explanation:
Checkbox is used when multiple options can be selected.

MCQ Questions for Class 10 Computer Applications Chapter 6 HTML Advanced-Tables, Lists and Links

Question 7.

Which tag should be there before the < INPUT > tag to designate a form?

(A) <FORM>
(B) < TABLE >
(C) <B>
(D) <HR>
Answer:
(A) <FORM>

Explanation:
The <FORM> tag tells the browser where a form starts and </FORM> denotes where the form ends. A <FORM> tag is thus a container element. Everything contained between these opening and closing tags is a part of the form.

MCQ Questions for Class 10 Computer Applications with Answers

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

HTML Basics Class 10 MCQ Questions with Answers

Question 1.

HTML is what type of language?

(A) Scripting Language
(B) Markup Language
(C) Programming Language
(D) Network Protocol
Answer:
(B) Markup Language

Explanation:
HTML is a markup language 1 used to build web pages and web applications.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 2.

Apart from <b> tag, what other tag makes text bold?

(A) <fat>
(B) <strong>
(C) <black>
(D) <emp>
Answer:
(B) <strong>

Explanation:
The HTML <strong> tag gives text a strong emphasis which traditionally means that the text is displayed as bold by the browser. This tag is also commonly referred to as the <strong> element.

Question 3.

How is a tag enclosed?

(A) ()
(B) <>
(C) []
(D) {>
Answer:
(B) <>

Explanation:
A tag is an HTML code that defines every structure on an HTML page. They also define the placement of text, images, links in an HTML document. HTML tags begins with “less-than” symbol (<) and end with “greater-than” symbol (>). These symbols are also called angular brackets. A start tag marks the beginning of a tag and its syntax is: <TAGNAME>. An end tag marks the end of a tag and its syntax is: </i’AGNAME>.

Question 4.

We can view the source code of html document in:

(A) Notepad
(B) PowerPoint
(C) Excel
(D) Paint
Answer:
(A) Notepad

Explanation:
Text editors are used by the users who have complete knowledge of HTML. The source code to create a web page are to be written in text editors. The two most commonly used text editors are Notepad and WordPad.

Question 5.

The value of #EFFFFFis .

(A) Green
(B) Black
(C) White
(D) Yeiiow
Answer:
(C) White

Explanation:
The RGB code for black is #000000 The RGB code for green is #008000 1 The RGB code for yellow is #FFFF0O

Question 6.

Which attribute does not come in <HR> tag?

(A) Size
(B) Color
(C) Width
(D) Length
Answer:
(D) Length

Explanation:
The short form of Horizontal Rule tag is <HR> tag. It draws a horizontal line through the part of the page to divide the page into two sections. The <HR> tag is an empty tag that creates a shaded horizontal rule (line) between text.

Question 7.

To display (x+y)2, correct HTML code is

(A) <SUB> (X+Y)2</SUB>
(B) X+Y < SUP> 2 </SUP >
(C) (X+Y) <SUP> 2 </SUP>
(D) <SUP> (X+Y)2</SUP>
Answer:
(C) (X+Y) <SUP> 2 </SUP>

Explanation:
The <SUP> tag is used to display the text as superscript. The superscript text will appear half a character height above the other characters.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 8.

The………….. tag is used to display the text as subscript.

(A) <ins>
(B) <SUB>
(C) <em>
(D)<strong>
Answer:
(B) <SUB>

Explanation:
The subscript text will appear half a character height beneath the other characters.

Question 9.

……………. defines the largest heading.

(A) <H1>
(B) <H2>
(C) <H3>
(D) <H4>
Answer:
(A) <H1>

Explanation:
<H1> is the largest heading and <H6> is the smallest heading.

Question 10.

BACKGROUND is an attribute of:

(A) <BODY> tag
(B) <FONT> tag
(C) <IMG> tag
(D) <A> tag
Answer:
(A) <BODY> tag

Explanation:
The <body> element contains the entire content of a web page. This tag is also commonly referred to as the <body> element. It must be the second element inside of the parent <html> element, following only the <head> element.

Question 11.

Which of the following is not a browser?

(A) Microsoft Bing
(B) Netscape Navigator
(C) Mozilla Firefox
(D) Opera
Answer:
(A) Microsoft Bing

Explanation:
Microsoft Bing is a web search engine owned and operated by Microsoft. The service has its origins in Microsoft’s previous search engines: MSN Search, Windows Live ‘ Search and later Live Search.

Question 12.

The tag contains the title of the document.

(A) HTML
(B) HEAD
(C) BODY
(D) < TITLE >
Answer:
(D) < TITLE >

Question 13.

The value of #0000FF is:

(A) Blue
(B) White
(C) Red
(D) none of the above
Answer:
(A) Blue

Explanation:
The RGB color code of white is #FFFFFF The RGB color code of red is

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion(A): The source code to create a web page are to be written in text editors.
Reason(R): Text editors are used by the users who have complete knowledge of HTML.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
In the text editors, the user who had the complete knowledge of HTML code used them. The two most commonly used text editors are Notepad and WordPad.

Question 2.

Assertion(A): The <!DOCTYPE> declaration is not an HTML tag.
Reason(R): The <!DOCTYPE> is an instruction to the web browser about what version of HTML the page is written in.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
The <!DOCTYPE> dedarationmustbethevery first thing in your HTML document, before the <html> tag. It must be present at the top of the document and should be written as follows: c.’DOCTYPE htmi>

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 3.

Assertion(A): With HTML, you can develop and publish documents and data with headings, text, tables, lists, hyperlinks, photos, etc., in static form.
Reason(R): You can create forms for managing transactions, for use in searching the information, making reservations, ordering products, etc.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
HTML is used to design and create a web page. It is used as a scripting language. Besides HTML, there are other languages also like Java, PHP .NET, etc. using which websites can be created. With the commands or tags available in HTML you can add spreadsheets, video clips, sound clips, presentations and other applications directly in the web page.

Question 4.

Assertion(A): HTML is a platform independent language.
Reason(R): As the same HTML program works on any operating system without any modification.

Answer:
(A) Both A and R are true and R is the correct explanation of A
Explanation:
In computing, cross-platform software is a computer software that is implemented on multiple computing platforms.

Question 5.

Assertion(A): In HTML, the tag <HTML>is same as <html>.
Reason(R): HTML is not a case sensitive language

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
Case sensitive means both uppercase and lowercase letters are treated as same. Thus, in HTML, tag and attributes are not case-sensitive.

Question 6.

Assertion(A): Attributes provides additional information about HTML elements used to create a web page.
Reason(R): Attributes are always mentioned in the end tag.

Answer:
(C) A is true and R is false

Explanation:
Attributes gives some additional information about the tag. All HTML elements can have their own attributes. Attributes are always mentioned in the start tag.

Case-Based MCQs

Attempt any ? sub-parts from each question. Each sub-part carries 1 mark.
I. HTML can be used to insert images in the following formats: GIF (Graphics Interchange Format) XBM (X Bitmap) JPG or JPEG (Joint Photographic Experts Group) PNG (Portable Network Graphics) The <IMG> tag is used to insert an image in a web page. It is very important to know that images are not technical part of the web page file, they are separate files which are inserted into the web page, when it is viewed by a browser.
So, a simple web page with one image is actually two files. When an HTML file is displayed in a browser, it requests the image file and places it on the web page where the tag appears.

Question 1.

Web browsers display images in the following format

(A) XBM
(B) JPEG
(C) GIF
(D) All of these
Answer:
(D) All of these

Explanation:
HTML supports various formats of the images, like Graphics Interchange Format (GIF), Joint Photographic Experts Group (JPEG), etc. GIF is limited to an 8-bit palette or 256 colors. This makes the GIF format suitable for storing graphics with relatively few colors such as simple diagrams, shapes, logos and cartoon style images whereas JPEG is the best format for photographers. It contains million colors.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 2.

Which tag is used to insert an image in web page?

(A) <A>
(B) <TABLE>
(C) <IMG>
(D) <P>
Answer:
(C) <IMG>

Explanation:
Images can enhance the appearance and the design of a web page. In HTML, the <IMG> tag is used to define images. The <IMG> tag at a minimum, takes two attributes, ALT and SRC.

Question 3.

The correct HTML code for inserting an image is :

(A) <IMG href=”image.gif”>
(B) <IMG> image.gif</gif>
(C) < IMG src = “image.gif “>
(D) cIMAGE src = “image.gif”>
Answer:
(C) < IMG src = “image.gif “>

Explanation:
The syntax of inserting an image in a web page is: <IMG SRC=”URL”> The URL points to the location where the image is stored. The browser puts the image where the image tag occurs in the document.

Question 4.

src attribute used with <IMG> tag stands for :

(A) screen
(B) screen resolution count
(C) source
(D) structure
Answer:
(C) source

Explanation:
The SRC attribute is used to specify the URL of the image. The SRC attribute is mandatory to insert an image.

Question 5

attribute is used to specify the location of an image file.

(A) alt
(B) src
(C) align
(D) name
Answer:
(B) src

Explanation:
The SRC attribute is used to give te URL of an image. It is compulsory to use this attribute to insert an image.

Question 6.

The alternate text of an image can be displayed by using the <IMG> tag.

(A) src
(B) alt
(C) align
(D) None of these
Answer:
(B) alt

Explanation:
The Alt attribute contains the alternate text for an image. It appears on the web page if image does not appear on the web page due to some reason.
Syntax: <IMG SRC=”URL” ALT=”Text” >

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 7.

alt attribute allows

(A) addition of an alternate hyperlink
(B) addition of a border to image
(C) use of an alternate image in place of the specified image
(D) addition of alternate text about an image Answer:Option (D) is correct.

Explanation:
The text in the ALT attribute appears whenever the image is not shown by the browser for some reason.

II. HTML Structure
HTML document is a combination of various tags, which define the structure and appearance of the web page. Following four basic elements are always present in every HTML document:

The <HTML> tag tells the browser that this is an HTML document. You must begin your html files with this tag and must end your HTML file with matching closing tag.

The <HEAD > tag is used for text and tags that do not appear directly on the web page. It acts as a header of file and contains some information like setting the title of the web page.

The < TITLE > tag contains the document title. This tag lies between <HEAD> and </HEAD > tags. The title specified inside this tag appears on the browser’s title bar.

The <BODY> tag is used for text and tags that appears directly on the web page. It helps us to create a look and feel of the web page. It holds all your content words, pictures and other stuff.

Question 1.

An example of HTML editor is :

(A) Notepad
(B) Dreamweaver
(C) Microsoft frontpage
(D) All of these
Answer:
(D) All of these

Explanation:
Both Dreamweaver and Microsoft Frontpage areWYSIWYG editors. Notepad is a text editor.

Question 2.

The meaning of M in HTML is :

(A) Management
(B) Markup
(C) Modified
(D) Machine
Answer:
(B) Markup

Explanation:
HTML is a HyperText Markup Language which is the most widely used language to create web pages of a website.

Question 3.

Which of the following is the correct code of HTML page?

(A) <HTML>
(B) <HTML>
<HEAD> <TITLE> Hello
</HEADS >
</HTML>
(C) <HTML>
<BODY> Hello
</HTML>
(D) <HTML>
<HEAD> Hello <BODYs </HTMLs
Answer:
(B) <HTML>
<HEAD> <TITLE> Hello
</HEADS >
</HTML>

Explanation:
The structure of a HTML page is: <HTML>
<HEAD>
< title > Document header </title>
</HEAD>
<BODY>
Contents
</body>
</html>

Question 4.

Tags and text that do not display directly on the web page are placed in :

(A) BODY
(B) TABLE
(C) HEAD
(D) TITLE
Answer:
(C) HEAD

Explanation:
The <HEAD> tag defines the document header. It contains the information about a document’s title and style descriptions. It is written inside HTML tag. Syntax: <HEAD>…………</HEAD>

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 5.

A web page normally consists of:

(A) head and body
(B) top and bottom
(C) body and font
(D) body and title
Answer:
(A) head and body

Explanation:
An HTML document contains two distinct parts, the head section and the body section. The head section contains information about the document that is not displayed on the screen. The body section contains the elements that are to be displayed on the web page. Every HTML document should start by declaring that it is an HTML document.

Question 6.

Where do you place the < TITLE > tag in a HTML?

(A) BODY
(B) HEAD
(C) TITLE
(D) FONT
Answer:
(B) HEAD

Explanation:
The <TITLE> tag contains the title of the document. The title is displayed in the title bar at the top of the web browser. The title must be contained in the head section. Syntax: < TITLE > </title>

Question 7.

Which section is used for text and tags that are shown directly on your web pages?

(A) Meta
(B) Head
(C) Body
(D) Table
Answer:
(C) Body

Explanation:
The <body> element contains the entire content of a web page. This tag is also commonly referred to as the <body> element. It must be the second element inside of the parent <html> element, following only the <head> element. Syntax: <body> </body>

III. HTML AND ITS CAPABILITIES
HTML is the most widely used language to create web pages of a website. With CSS and JavaScript, it forms a pillar of web technologies for the World Wide Web. With HTML, you can develop and publish documents and data with headings, text, tables, lists, hyperlinks, photos, etc., in static form. You can create forms for managing transactions, for use in searching the information, making reservations, ordering products, etc.
HTML is an ideal software used to design and create a web page. It is used as a scripting language. Besides HTML, there are other languages also like Java, PHE .NET, etc. using which websites can be created. With the commands or tags available in HTML you can add spreadsheets, video clips, sound clips, presentations and other applications directly in the web page. HTML is a platform independent language. It is not a case sensitive language.

Question 1.

The full for of HTML is………….

(A) Hyper Text Markup Language
(B) Hyper Text Makeup Language
(C) Higher Text Markup Language
(D) Hyper Text mashup Language
Answer:
(A) Hyper Text Markup Language

Explanation:
HTML is a format that tells a computer how to display a web page. The documents themselves are plain text files with special “tags” or codes that a web browser uses to interpret and display information on your , computer screen .

Question 2.

The full form of CSS is ………..

(A) Categorised Style Sheet
(B) Console Style Sheet
(C) Cascading Style Sheet
(D) Cascading Settle Sheet
Answer:
(C) Cascading Style Sheet

Explanation:
CSS stands for Cascading Style Sheets.CSS describes how HTML elements are to be displayed on screen, paper, or in other media.CSS saves a lot of work. It can control the layout of multiple web pages all at once. External stylesheets are stored in CSS files.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 3.

Which of the following statement is/are TRUE?

(A) HTML is an ideal software used to design and create a web page.
(B) HTML is used as a scripting language.
(C) HTML forms a pillar of web technologies for the World Wide Web.
(D) All of these
Answer:
(D) All of these

Explanation:
HTML was invented in November 1990 by a scientist called Tim Berners Lee. The purpose was to make it easier for scientists at different universities to gain access to each

Question 4.

HTML program works on any operating system without any modification which means it is a language.

(A) Platform independent
(B) Platform dependent
(C) Case-sensitive
(D) None of these
Answer:
(A) Platform independent

Explanation:
HTML is a platform independent language as it can be operated on various operating systems.

Question 5.

The tag <HTML>is same as <html> which means HTML is a……language.

(A) Case sensitive
(B) Not a case sensitive language
(C) Platform dependent
(D) Platform independent
Answer:
(B) Not a case sensitive language

Explanation:
HTML is not a case-sensitive language as uppercase and lowercase letters are treated as same.

Question 6.

Which of the following is not a scripting language?

(A) PHP
(B) Java
(C) NET
(D) MS Office
Answer:
(D) MS Office

Explanation:
Microsoft Office, or simply Office, is a family of client-server software, and services developed by Microsoft. Initially a marketing term for an office suite (bundled set of productivity applications), the first version of Office contained Microsoft Word, Microsoft Excel, and Microsoft PowerPoint.

Question 7.

Which of the following function a user can perform using HTML?

(A) With HTML, you can develop and publish documents and data with headings, text, tables, lists, hyperlinks, photos, etc., in static form.
(B) You can create forms for managing transactions, for use in searching the information, making reservations, ordering products, etc.
(C) With the commands or tags available in HTML you can add spreadsheets, video clips, sound clips, presentations and other applications directly in the web page.
(D) All of these
Answer:
(D) All of these

Explanation:
With HTML, you can develop and publish documents and data with headings, text, tables, lists, hyperlinks, photos, etc., in static form, you can create forms for managing transactions, for use in searching the information, making reservations, ordering products, etc.

I. INSERTING IMAGES in HTML
Images can enhance the appearance and the design of a web page. In HTML, the <IMG> tag is used to define images. The <IMG> tag at a minimum, takes two attributes, ALT and SRC. <IMG> tag is empty tag. The attribute which specifies the URL (web address) of the image is SRC. The ALT attribute furnishes an alternate text for an image, if the user for some reason cannot view it (because of slow connection, or if the user uses a screen reader, an error in the SRC attribute). It supports various formats of the images, like GIF, JPEG, etc. GIF is limited to an 8-bit palette or 256 colors.
This makes the GIF format suitable for storing graphics with relatively few colors such as simple diagrams, shapes, logos and cartoon style images whereas JPEG is the best format for photographers. It contains 1 million colors.

Question 1.

What is the full form of JPEG?

(A) Joint Photographic Experts Group
(B) Zone Photographic Experts Group
(C) Joint Photography Experts Group
(D) Joint Photographic Excel Group
Answer:
(A) Joint Photographic Experts Group

Explanation:
The attribute which is used to enumerate the location where the linked text, phrase or image is going to open is called the target attribute.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 2.

The full form of GIF is……..

(A) Graphics Interchange Formation
(B) Graphical Interchange Format
(C) Graphics Interchange Format
(D) Graphics Interconnected Format
Answer:
(C) Graphics Interchange Format

Explanation:
The Graphics Interchange Format i is a bitmap image formal that was developed bv a team at the online services provider CompuServe led by American computer scientist Stove Wilhite and released on 15 June 1987.

Question 3.

The attributes of <IMG> tag is/are

(A) ALT
(B) SRC
(C) Both (A) and (B)
(D) None of these
Answer:
(C) Both (A) and (B)

Explanation:
Both SRC and ALT are the attributes of <IMG> tag.The SRC attribute is used to specify the URL of the image. The SRC attributeis mandatory to insert an image.The Alt attribute contains the alternate text for an image.

Question 4.

< IMG > is an empty tag which means

(A) It does not have opening tag
(B) It does not have closing tag
(C) It does not support any attribute
(D) None of these
Answer:
(B) It does not have closing tag

Explanation:
An empty tag is a tag which does not hold an end tag which means only starting tag is there in <IMG>. The </IMG> is not required.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 5.

In HTML, the < IMG > tag is used to define

(A) Website
(B) Webpages
(C) Images
(D) None of these
Answer:
(C) Images

Explanation:
In HTML, <IMG> tag is used to insert an image on the webpage. It used the SRC attribute.

Question 6.

Which of the following statements is/are FALSE?

(A) JPEG contains 256 colors.
(B) GIF is limited to an 8-bit palette or 1 millioncolors.
(C) GIF format is best suited for photographers.
(D) All of these
Answer:
(D) All of these

Explanation:
HTML supports various formats of the images, like Graphics Interchange Format (GIF), Joint Photographic Experts Group (JPEG), etc. GIF is limited to an 8-bit palette or 256 colors.Most graphical web browsers can display both GIF and JPG images inline.

MCQ Questions for Class 10 Computer Applications Chapter 5 HTML Basics

Question 7.

The ALT attribute is used to………..

(A) Specifies the URL.
(B) Furnish an alternate text for an image.
(C) Form diagrams, shapes, logos and cartoon style images.
(D) None of these
Answer:
(B) Furnish an alternate text for an image.

Explanation:
The <ALT> attribute is used to display text when the iipage is riot loaded by the browser.

MCQ Questions for Class 10 Computer Applications with Answers

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Mobile Technologies Class 10 MCQ Questions with Answers

Question 1.

Which is the world’s most widely used cellphone technology?

(A) GPS
(B) GPRS
(C) GSM
(D) CDMA
Answer:
(C) GSM

Explanation:
The Global System for Mobile Communications is a standard developed by the European Telecommunications Standards Institute to describe the protocols for second- generation digital cellular networks used by mobile devices such as mobile phones and tablets. It was first deployed in Finland in December 1991.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 2.

CDMA uses ……….waves.

(A) Radio
(B) Micro
(C) Infrared
(D) Electromagnetic
Answer:
(D) Electromagnetic

Explanation:
Code-division multiple access is a channel access method used by various radio communication technologies. CDMA is an example of multiple access, where several transmitters can send information simultaneously over a single communication channel.

Question 3.

Which technology is used to connect subscriber to nearest telephone exchange through using radio link?

(A) CDMA
(B) WLL
(C) GSM
(D) Wi-Fi
Answer:
(B) WLL

Explanation:
Wireless local loop, is the use of a wireless communications link as the “last mile / first mile” connection for delivering plain old telephone service or Internet access to telecommunications customers.

Question 4.

In TDMA, T stands for :

(A) Time
(B) Third
(C) Technology
(D) Triple
Answer:
(A) Time
Explanation:
Time-division multiple access is a channel access method for shared-medium networks. It allows several users to share the same frequency channel by dividing the signal into different time slots.

Question 5.

…………… is a mode of sending and receiving short messages from one phone to another.

(A) SMS
(B) MMS
(C) CDMA
(D) GSM
Answer:
(A) SMS

Explanation:
SMS text messaging supports languages internationally. It works fine with all languages supported by Unicode, including Arabic, Chinese, Japanese and Korean.

Question 6.

Multimedia messaging is also known as………

(A) Color messaging
(B) Picture messaging
(C) Text messaging
(D) None of these
Answer:
(B) Picture messaging

Explanation:
MMS permits mobile subscribers to send multimedia files su ch as images, videos, audios, etc., as a message.

Question 7.

………. refers to the third generation of mobile telephony technology.

(A) 2G
(B) 3G
(C) 4G
(D) 5G
Answer:
(B) 3G

Explanation:
3G is generally used in phones i and handsets as a means to connect the phone ! to the internet in order to make voice and video calls, to download and upload data, and I to surf the Web.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 8.

SMS appeared on the wireless scene in 1991 in

(A) USA
(B) London
(C) Turkey
(D) Europe
Ans.
(D) Europe

Explanation:
An SMS message is sent from a device to a Short Message Service Center (SMSC), which, in turn, communicates with mobile networks to determine the subscriber’s location. Then, the message is forwarded as a small data packet to the destination device. Subsequent messages sent by the original source device undergo the same process, also known as store and forward.

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion(A): SMS messages are also sent via web-based browser applications, instant message (IM) applications and Voice over Internet Protocol (VoIP) applications, such as Skype.
Reason(R): SMS works fine with only English language.

Answer:
(C) A is true and R is false

Explanation:
SMS text messaging supports languages internationally. It works fine with all languages supported by Unicode, including Arabic, Chinese, Japanese and Korean.
Question 2.

Assertion(A): MMS supports attachments just as e-mail does.
Reason(R): MMS is a store-and-forward method of transmitting graphics, video clips, sound files and short text messages over wireless networks via WAP protocol.

Answer:
(D) A is false and R is true

Explanation:
MMS is based on the concept of multimedia messaging. MMS does not support attachments as e-mail does. The important use of MMS is for communication between mobile phones.

Question 3.

Assertion(A): 3G offers higher data speed.
Reason(R): 3G does not support videoconferencing.

Answer:
(C) A is true and R is false
Explanation:
The International Telecommuni-cations Union (ITU) defined the third genera-tion (3G) of mobile telephony standards IMT- 2000 to facilitate growth, increase bandwidth, and support more diverse applications.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 4.

Assertion(A): 4G is a mobile multimedia, available anytime anywhere.
Reason(R): 4G is easier to standardize and it offers affordability.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
4G wireless technology is also referred to by “MAGIC” which stands for Mobile multimedia, Any-where, Global mobility solutions over, Integrated wireless and Customized services.

Question 5.

Assertion(A): The cost of upgrading to 3G device is expensive.
Reason(R): It requires closer base stations that is very expensive.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
3G refers to the third generation of cellular technology that enables mobile telephony. The third-generation standard follows two earlier generations that were deployed on mobile networks and across mobile phones.

Question 6.

Assertion(A): Class 0 SMS is displayed on the mobile screen without being saved in the message store or on the SIM card.
Reason(R): As Class SMS disappears after reading it.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
Class 0 SMS (Short Message Service) text messages aren’t stored in the memory of the message recipient’s cell phone. Unless saved upon review by the message ? recipient, Class 0 SMS text messages disappear after being read. Class 0 messages can also be used to “ping” another cell phone. They can receive confirmation of a recipient’s messaging capabilities without the recipient even knowing they were pinged. While Class 0 messages can be abused, they can also be an effective troubleshooting tool for SMS communication

Case- Based MCQs

Attempt any four sub-parts from each question. Each sub-part carries 1 mark.
I. Mobile Technology
Mobile technology is a technology where the user uses mobile phone to do the operations related to communication system, for example to establish communication with friends, relatives and others. It uses to transmit the data from one system to others. Mobile Technology consists of portable two-way communications systems, computing devices, and the related networking equipment. Mobile technology is a technology which is used primarily in cellular communication system and other related aspects. It uses a network type in which several transmitters are able to send data on a single channel at the same time. This model is known as Code-Divisions Multiple Accesses (CDMA). This platform allows many users to use single frequencies, as it limits the possibility of frequency interference from two or more sources.

Over the years, the channel has grown. Mobile technology is evolving rapidly; its applications are becoming increasingly diverse over the years and are gradually replacing some similar sources on the market that are also used for communication, e.g. post office and land lines. Mobile technology has improved from a basic phone call and texting device into a multi-tasking system used for GPS navigation, internet browsing, gaming, instant messaging, etc. With the rise, professionals argue that computer technology’s future depends on wireless networking and mobile computing. Mobile technology is becoming more and more popular through tablets and portable computers. Mobile Technology is characterized as any device with internet capabilities that can be accessed from wherever the user is. Current devices in this class contain devices like smartphones, tablets, some iPods and laptops, although this list will certainly increase in the coming years.

Following are the key mobile technologies,
1. SMS: “SMS” means Short Message Service. It is now a days the oldest and most commonly used text messaging service. SMS was initially designed for phones using GSM (Global System for Mobile Communications) communication, but it is now supported by all major cellular phone systems.

2. MMS: MMS messaging known as Multimedia Messaging Service is a standard way to deliver multimedia content-including messages. In comparison to SMS, MMS can offer a variety of media including up to 40 seconds of video, one picture, a multi-image slideshow, or audio.

3. 3G: Number three in 3G’s name means third generation access technology which allows mobile phones to be connected to the internet. Every new technology has new frequency bands and higher rates of data transmission.

4. 4G: 4G is the fourth generation of mobile networking technology. It carries on from mobile technology of 3G and 2G. Compared with 3G, the 4G networks are very good. Premium 4G provides download speeds of about 14 Mbps, which is almost five times faster than that provided by its predecessor, the 3G network. Currently, 4G networks can reach speeds as high as 150 Mbps, enabling users to download gigabytes of data in minutes or even seconds, rather than hours like with 3G networks.

Question 1.

In which one of the following codes with specific characteristics can be applied to the transmission?

(A) CDMA
(B) GPRS
(C) GSM
(D) All of the above
Answer:
(A) CDMA

Explanation:
Code Division Multiple Access (CDMA) is a sort of multiplexing that facilitates various signals to occupy a single transmission channel. It optimizes the use of available S bandwidth. The technology is commonly used in ultra-high-frequency (UHF) cellular telephone systems, bands ranging between the 800-MHz and 1.9-GHz.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 2.

Write the full form of CDMA.

(A) Character-Divide Multiple Accesses
(B) Code-Divide Multiple Accesses
(C) Character-Divisions Media Accesses
(D) Code-Divisions Multiple Accesses
Answer:
(D) Code-Divisions Multiple Accesses

Explanation:
Code Divisions Multiple Access system is very different from time and frequency multiplexing. In this system, a user has access to the whole bandwidth for the entire duration. The basic principle is that different CDMA codes are used to distinguish among the different users.

Question 3.

Which of the following offers packet mode data transfer service over the cellular network?

(A) TCP
(B) GPRS
(C) GSM
(D)None of the above
Answer:
(B) GPRS

Explanation:
General Packet Radio System is also known as GPRS is a third-generation step toward internet access. GPRS is also known as GSM-IP that is a Global-System Mobile Communications Internet Protocol as it keeps the users of this system online, allows to make voice calls, and access internet on-the-go. Even Time-Division Multiple Access (TDMA) users benefit from this system as it provides packet radio access.

Question 4.

Which one of the following enables us to use the entire bandwidth simultaneously?

(A) TDMA
(B) CDMA
(C) FDMA
(D) All of the above
Answer:
(B) CDMA

Explanation:
CDMA allows up to 61 concurrent users in a 1.2288 MHz channel by processing each voice packet with two PN codes.

Question 5.

Mobile Computing allows transmission of data from one wireless-enabled device to another

(A) Any device
(B) Wired device
(C) Wireless-enabled device
(D) One of the above
Answer:
(C) Wireless-enabled device

Explanation:
Mobile technology is a form of technology and it is mostly used in cellular communication and other related aspects. It includes SMS, MMS, 3G and 4G. It is a portable electronic device and allows you to share the data from one phone to another.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 6.

Which of the following is supported data rates of 4G Networks?

(A) 1024 kbps
(B) 150 mbps
(C) 200 mbps
(D) None of the above
Answer:
(B) 150 mbps

Explanation;
4G is a mobile multimedia, available anytime anywhere, Global mobility support, integrated wireless solution, and customized personal service network system.

Question 7.

Write the full form of GSM.

(A) Globe System for Mobile Communications
(B) Global System for Media Communications
(C) Global System for Mobile Communications
(D) Global System for Mobile Characteristics Answer:Option (C) is correct.

Explanation:
GSM stands for Global System for Mobile Communications. It is a digital cellular technology used for transmitting mobile voice and data services.

II. First Generation
1G (First Generation) was introduced in 1980 and was based on narrow band analog cellular technology. It used circuit switching and only voice calls were available. It used radio waves for transmission. 1G used CDMA (Code Division Multiple Access). Each user was allocated a unique code sequence. The sender encoded the signal using the given code. The receiver also had the unique code and used it to decode the data. 2G (Second Generation) was introduced in 1990s and was based on GSM technology. It is used circuit switching but provided paging, SMS, voicemail and fax services. GSM (Global System for Mobile communications) is a combination of FDMA and TDMA. SIM (Subscriber Identification Module) cards are interchangeable modules which store subscriber and wireless provider information.

Question 1.

1G was introduced in………

(A) 1979
(B) 1980
(C) 1981
(D) 1982
Answer:
(B) 1980

Explanation:
Launched by Nippon Telegraph and Telephone in 1980,1G was first introduced to the citizens of Tokyo. By 1984, the first generational network covered all of Japan, making it the first country to have 1G service nationwide.

Question 2.

First Generation technology was based on narrow band technology.

(A) Cellular
(B) Digital
(C) Global
(D) None
Answer:
(A) Cellular

Explanation:
Wireless networks based on analog frequency division multiple access technologies. Many systems were individually tailored, country-specific solutions, including technologies such as AMPS, Nordic Mobile Telephone (NMT) and total access communications system (TACS).

Question 3.

1G technology uses for transmission.

(A) Wires
(B) Plugs
(C) Radio waves
(D) Optical fiber
Answer:
(C) Radio waves

Explanation:
Radio waves are a type of electromagnetic radiation with wavelengths in the electromagnetic spectrum longer than infrared light. Radio waves have frequencies as high as 300 gigahertz (GHz) to as low as 30 hertz (Hz).

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 4.

In CDMA, C stands for………

(A) Cost
(B) Count
(C) Code
(D) Coast
Answer:
(C) Code

Explanation:
Code Division Multiple Access (CDMA) is an alternative cell phone technology to GSM. CDMA uses a “broad -spectrum” electromagnetic waves for signaling with wider bandwidth. This allows multiple people on multiple cell phones to be “communicated” over the same channel to share a bandwidth of frequencies.

Question 5.

Second Generation was based on……….

(A) GSM technology
(B) SIM technology
(C) Both (A) and (B)
(D) None of these
Answer:
(A) GSM technology

Explanation:
Global System for Mobile communications (GSM) is world’s most widely used cell phone technology having 80% mobile phone users. It is a standard developed by the European Telecommunications Standards Institute (ETSI) to describe protocols for second generation (2G) digital cellular networks for mobile phones.

Question 6.

…………..is a combination of FDMA and TDMA.

(A) 1G
(B) 2G
(C) GSM
(D) SIM
Answer:
(C) GSM

Explanation:
The Global System for Mobile Communications is a standard developed by the European Telecommunications Standards Institute to describe the protocols for second generation digital cellular networks used by mobile devices such as mobile phones and tablets. It was first deployed in Finland in December 1991.

Question 7.

……………. are interchangeable m odules which store subscriber……..and wireless provider information.

(A) 1G
(B) 2G
(C) GSM
(D) SIM
Answer:
(D) SIM

Explanation:
SIM (Subscriber Identification Module) are inter- changeable modules which store subscriber and wireless provider information.

III. 3G and 4G
3G is the third generation of Wireless & Mobile technologies. The “G” in 3G stands for generation. 3G networks reach 2mbps. It comes with enhancements over previous wireless technologies, like high-speed transmission, advanced multimedia access and global roaming. 3G is mostly used with mobile phones and handsets as a means to connect the phone to the internet. 3G allows connection with other IP networks in order to make voice and video calls, to download and upload data and to surf the net. 4G is fourth-generation of wireless service, which refers to the next wave of high-speed mobile technologies that will be used to replace current 3G networks. 4G wireless network is next step of 3G, which is currently the most widespread, high-speed wireless service.

Question 1.

………….. is the Wireless & Mobile technologies.

(A) 1G
(B) 2G
(C) 3G
(D) 4G
Answer:
(C) 3G

Explanation:
3G is the third generation of Wireless & Mobile technologies. It comes with enhancements over previous wireless technologies, like high-speed transmission, advanced multimedia access and global roaming. 3G is mostly used with mobile phones and handsets as a means to connect the phone to the internet or other IP networks in order to make voice and video calls, to download and upload data and to surf the net.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 2.

………. refers to the next wave of high speed mobile technologies of 3G.

(A) 3G
(B) 4G
(C) Both (A) arid (B)
(D) None of these
Answer:
(B) 4G

Explanation:
4G is the fourth generation of mobile networking technology. It carries on from mobile technology of 3G and 2G. Compared with 3G, the 4G networks are very good. Premium 4G provides download speeds of about 14 Mbps, which is almost five times faster than that provided by its predecessor, the 3G network.

Question 3.

3G is mostly used with mobile phones and handsets as a means to connect the phone to the

(A) Wireless
(B) Internet
(C) Other Mobiles
(D) Network
Answer:
(B) Internet

Explanation:
Number three in 3 G’s name means third generation access technology which allows mobile phones to be connected to the internet. Every new technology has new frequency bands and higher rates of data transmission.

Question 4.

The “G” in 3G stands for ………

(A) Generation
(B) Genres
(C) Genetic
(D) Generator
Answer:
(A) Generation

Explanation:
It allows mobile operators to offer more service options to their users, including mobile broadband. 3G broadband offers greater flexibility and services by making more efficient use of mobile bandwidth. It is also known as IMT-2000.

Question 5.

3G allows connection with other IP networks in order to make .

(A) Voice
(B) Video calls
(C) Both (A) and (B)
(D) None of these
Answer:
(C) Both (A) and (B)

Explanation:
3G networks succeed 2G ones, offering faster data transfer rates and are ? the first to enable video calls. This makes , them especially suitable for use in modern ; smart phones, which require constant high- % speed internet connection for many of their if applications.

Question 6.

3G allows connection with other networks.

(A) IP
(B) MAC
(C) TCP
(D) HTTP
Answer:
(A) IP

Explanation:
The Internet Protocol (IP) is the principal communications protocol in the Internet protocol suite for relaying datagrams across network boundaries.

MCQ Questions for Class 10 Computer Applications Chapter 4 Mobile Technologies

Question 7.

3G networks reach ……….

(A) 2Mbps
(B) 4Mbps
(C) 6Mbps
(D) 8Mbps
Answer:
(A) 2Mbps

Explanation:
3G is the third generation of wireless mobile telecommunications ‘ technology. It is the upgrade for 2.5G GPRS ’ and 2.75G EDGE networks, for faster data transfer.

MCQ Questions for Class 10 Computer Applications with Answers

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Internet and Web Services Class 10 MCQ Questions with Answers

Question 1.

A website used to provide online information and services to the citizens is an example of :

(A) e-Business
(B) e-Mail
(C) e-Governance
(D) e-Learning
Answer:
(C) e-Governance

Explanation:
Electronic governance or e-governance is the application of Information and Communication Technology (ICT) for delivering government services, exchange of information, communication Transactions, integration of various stand-alone systems and services between government-to-customer (G2C), government-to-business (G2B), government-to-government (G2G) as well as back office processes and interactions within the entire government framework.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 2.

The website of an electricity supply company which allows its customers to pay bills online is an example of:

(A) e-Business
(B) e-Mail
(C) e-Governance
(D) e-Learning
Answer:
(A) e-Business

Explanation:
Through online marketing (e-business), they can reach to many customers of far away places in a cost effective manner. Also, there is no need to incur huge cost of j setting up a shop/store to sell items.

Question 3.

The website of a school which allows the students to go through various lessons in their subjects is an example of:

(A) e-Business
(B) e-Mail
(C) e-Governance
(D)e-Learning
Answer:
(D)e-Learning

Explanation:
e-learning is used to describe a means of learning through technology such as a network, browser, CD-ROM or DVD multimedia platforms. e-Learning enables persons to learn at their own place.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 4.

Web address of national portal of India is :

(A) India.gov.in
(B) GOI.gov.in
(C) ncert.nic.in
(D) None of the above
Answer:
(A) India.gov.in

Explanation:

e-Governance involves applications which are used by government agencies/ organisations to provide better governance, http://india.gov.in is the national portal of India. A number of services have been launched by the government of India under the Digital India initiative to transform India into a digitally empowered society.

Question 5.

An email address is made up of:

(A) Four parts
(B) Two parts
(C) Single part
(D) Three parts
Answer:
(B) Two parts

Explanation:
The two main parts of an email address are: (i) Username (ii) Domain name of host server

Question 6.

e-Mails are stored in this folder before they are sent.

(A) Inbox
(B) Sent
(C) Outbox
(D) Message box
Answer:
(C) Outbox

Explanation:
Before the message is sent to the receiver, it is stored in the Outbox.

Question 7.

Which one of the following is an e-shopping website?

(A) Flipkart
(B) Amazon
(C) Snapdeal
(D) All of the above
Answer:
(D) All of the above

Explanation:
>e-Shopping is the action or activity of buying goods or services over the internet.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 8.

The full from of Bcc is ……….

(A) Broad Carbon Copy
(B) Blink Carbon Copy
(C) Blind Carbon Copy
(D) Best Carbon Copy
Answer:
(C) Blind Carbon Copy

Explanation:
Blind carbon copy enables you to send copy of e-mail but in this case, Bcc recipients are not visible to anyone.

Assertion and Reason Based MCQs

Directions: In the following questions, A statement of Assertion (A) is followed by a statement of Reason (R). Mark the correct choice as.
(A) Both A and R are true and R is the correct explanation of A
(B) Both A and R are true but R is Not the correct explanation of A
(C) A is true and R is false
(D) A is false and R is true

Question 1.

Assertion(A): People may use the ATM cards for withdrawing the cash amount from their accounts.
Reason(R): People can also transfer money online from one bank to another bank.

(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
Advanced transactional e-banking/ websites that allow bank customers to electronically transfer funds to/from their accounts, pay bills, and conduct other banking transaction online. An Automated Teller Machine (ATM) is an electronic banking outlet that allows customers to complete basic transactions without the aid of a branch representative or teller. Anyone with a credit card or debit card can access cash at most ATMs.

Question 2.

Assertion(A): E-learning refers to the use of the network and communication technology in teaching and learning. The letter “e” in e-learning stands for the word electronic. You can use the information from the internet in your work.
Reason(R): It is not easy for students to access the study material any time and at any place.

Answer:
(C) A is true and R is false

Explanation:
E-learning or “electronic learning” describes education using electronic devices and digital media. It increases your knowledge and skills. E-learning has now been used by various companies, organisations and schools to educate and upgrade the abilities of their employees and students. The term E-learning is used also in further and higher education to describe the use of the web and other Internet technologies to enhance the teaching and learning experience.

Question 3.

Assertion(A): E-banking saves time of the customer for doing bank transactions.
Reason(R): E-Banking allows you to access your accounts on the Internet from anywhere in the world at any time. It provides secure transaction on the Internet.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
E-Banking stands for Electronic Banking. This is a service which is provided via the banks in which you have an account. To access this service, you need to contact the bank. The bank provides a Username and a Password through which you can login on the e-portal of the bank. The e-portal of the bank provides various services to us, like you can maintain an account, transfer electronic currency, etc. E-Banking is used to access cash through an Automated Teller Machine (ATM) or Direct Deposit of paychecks into checking or savings accounts.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 4.

Assertion(A): One can do videoconferencing anytime anywhere according to his/her convenience unless the device is connected to the internet.
Reason(R): All videoconferences must have these three basic elements, however simple or complex. The conference can always be synthesised into environment, equipment and network.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
Video conference is a technology that allows you to do conversation between multiple people among the same or different locations. Videoconferencing can save significant amounts of money in terms of both travel costs and time. It can also open up new methods of communication for example linking several schools together to enhance the learning experience.

Question 5.

Assertion(A): E-commerce saves time as with just a couple of clicks of the mouse, you can purchase your shopping orders and instantly move to other important things, which can save time.
Reason(R): Going through market requires a lot of time and efforts. And, also there is not guarantee whether the things will be best suited or not.

Answer:
(B) Both A and R are true but R is Not the correct explanation of A

Explanation:
Online shopping or E-shopping is the process that consumers go through to purchase products or services over the Internet.

Question 6.

Assertion(A): E-Reservation is a process of booking tickets online. It is also called E-ticketing.
Reason(R): An E-ticket (electronic ticket) is a paperless electronic document used for ticketing passengers, particularly in the commercial airline industry.

Answer:
(A) Both A and R are true and R is the correct explanation of A

Explanation:
When a customer books a flight by telephone or using the web, the details of the reservation are stored in a computer. The customer can request that a hardcopy confirmation be sent by postal mail, but it is not needed at the check-in desk. A confirmation number is assigned to the passenger, along with the flight number(s), date(s), departure location(s), and destination location(s). When checking in at the airport, the passenger simply presents positive identification. Then necessary boarding passes are issued, and the passenger can check luggage and proceed through security to the gate area.
Case- Based Mcqs

Attempt any 5 sub-parts from each question. Each sub-part carries 1 mark.
I. An email is a service of sending or receiving emails or messages in the form of text, audio, video, etc over the internet. Various service providers are providing email services to users. The most popular service providers in India are Gmail, Yahoo, Hotmail, Rediff, etc. An email address for an email account is a unique ID. This email ID is used to send and receive mails over the Internet. Each email address has two primary components: username and domain name. The username comes first, followed by the (@) symbol and then the domain name.

Question 1.

MIME stands for

(A) multipurpose internet mail extensions
(B) multipurpose internet mail email
(C) multipurpose internet mail end
(D) multipurpose internet mail extra
Answer:
(A) multipurpose internet mail extensions

Explanation:
Multipurpose Internet Mail Extensions is an Internet standard that extends the format of email messages to support text in character sets other than ASCII, as well as attachments of audio, video, images, and application programs.

Question 2.

When sender and receiver of an email are on same system, we need only two

(A) IP
(B) domain
(C) servers
(D) user agents
Answer:
(D) user agents

Explanation:
E-mail is a digital mechanism for exchanging messages through Internet or intranet communication platforms. A user agent is any software that retrieves and presents Web content for end users or is implemented using Web technologies.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 3.

Which of the following is the correct format of email address?

(A) [email protected]@info
(B) [email protected]
(C) www.nameofwebsite.com
(D) name.website.com
Answer:
(B) [email protected]

Explanation:
Each email address has two primary components: username and domain name. The username comes first, followed by the (@) symbol and then the domain name.

Question 4.

Unsolicited e-mail advertising is known as……….

(A) newsgroup
(B) junk ads
(C) spam
(D) none of the above
Answer:
(C) spam

Explanation:
Spam is an unsolicited mail sent in bulk.

Question 5.

NVT stands for:

(A) network virtual transmission
(B) network virtual test
(C) network virtual terminal
(D) network virtual tell
Answer:
(C) network virtual terminal

Explanation:
A network virtual terminal is a communications concept describing a variety of data terminal equipment (DTE), with different data rates, protocols, codes and formats, accommodated in the same network.

Question 6.

Mail access starts with client when user needs to download e-mail from the……….

(A) mail box
(B) mail server
(C) IP server
(D) internet
Answer:
(A) mail box

Question 7.

Which of the following is not an e-mail service provider?

(A) Yahoo
(B) Hotmail
(C) Rediff
(D) Pinterest
Answer:
(D) Pinterest

Explanation:
Pinterest is an American image sharing and social media service designed to enable saving and discovery of information on the internet using images and, on a smaller scale, animated GIFs and videos, in the form of pinboards.

II. e-GOVERNMENT
Due to the rapid rise of the internet and digitization, Governments all over the world are initiating steps to involve IT in all governmental processes. This is the concept of e-government. This is to ensure that the Govt, administration becomes a swifter and more transparent process. It also helps to saves huge costs.
E-Group is a feature provided by many social network services which helps you create, post, comment to and read from their “own interest” and “niche-specific forums”, often over a virtual network. “Groups” create a smaller network within a larger network and the users of the social network services can create, join, leave and report groups accordingly. “Groups” are maintained by “owners, moderators, or managers”, who can edit posts to “discussion threads” and “regulate member behavior” within the group.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 1.

Privacy law is intended to protect the personal information about:

(A) Individuals in society
(B) computer networks
(C) Employees
(D) students
Answer:
(C) Employees

Explanation:
Privacy law is the body of law that deals with the regulation, storing, and using of personally identifiable information, personal healthcare information, and financial information of individuals, which can be collected by governments, public or private organisations, or other individuals.

Question 2.

Which of the following has E-groups?

(A) Instagram
(B) Twitter
(C) Yahoo
(D) WhatsApp
Answer:
(C) Yahoo

Explanation:
e-groups is a free email group service that allows us to easily create and join email groups, e-mail groups offer a convenient way to connect with others who share the same interests and ideas.

Question 3.

Whenever a new comment is posted, users of the e-group receive notification that there is a new contribution to the discussion.

(A) SMS
(B) E-mail
(C) WhatsApp
(D) Call
Answer:
(B) E-mail

Explanation:
Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people.

Question 4.

e-Government:

(A) can be defined as the “application of e-commerce technologies to government and public services.”
(B) is the same as internet governance.
(C) can be defined as “increasing the participation in internet use by socially excluded groups”.
(D) none of the above.
Answer:
(A) can be defined as the “application of e-commerce technologies to government and public services.”

Explanation:
This is to ensure that the Govt, administration becomes a swifter and more transparent process. It also helps to save huge costs.

Question 5.

What does TAN stand for?

(A) Tax Deduction Account Number
(B) Tax Deduction and Collection Account Number
(C) Taxable Account Number
(D) Tax Account Number
Answer:
(B) Tax Deduction and Collection Account Number

Explanation:
Tax Deduction Account Number or Tax Collection Account Number is a 10-digit alpha- numeric number issued by the Income- tax Department (we will refer to it as TAN). TAN is to be obtained by all persons who are responsible for deducting tax at source (TDS) or who are required to collect tax at source (TCS).

Question 6.

An e-group is a collection of users.

(A) who conduct seminars
(B) who get together on weekends
(C) who have regular video conferences
(D) having the ability to access and contribute to forum topics
Answer:
(D) having the ability to access and contribute to forum topics

Explanation:
E-group refers to an online environment where users sharing common views and ideas can come together to meet and discuss topics of interest.

Question 7.

e-Group is a feature provided by many social network services which helps you create, post, comment to and read from their “own interest” and “niche-specific forums”, often over a………..

(A) Virtual Network
(B) Public Network
(C) Common Network
(D) Private Network
Answer:
(A) Virtual Network

Explanation:
A virtual network is a network where all devices, servers, virtual machines, and data centers that are connected are done so through software and wireless technology. This allows the reach of the network to be expanded as far as it needs to for peak efficiency, in addition to numerous other benefits.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

III. e-BUSINESS
e-business, commonly known as electronic or online business is a business where an online transaction takes place. In this transaction process, the buyer and the seller do not engage personally, but the sale happens through the internet. In 1996, Intel’s marketing and internet team coined the term “E-business
e-Commerce stands for electronic commerce and is a process through which an individual can buy, sell, deal, order and pay for the products and services over the internet. In this kind of transaction, the seller does not have to face the buyer to communicate. Few examples of e-commerce are online shopping, online ticket booking, online banking, social networking, etc.

Question 1.

Which of the following describes e-commerce?

(A) doing business
(B) sale of goods
(C) doing business electronically
(D) all of the above
Answer:
(C) doing business electronically

Explanation:

e-Commerce means buying and selling products online. People find it convenient to compare different products and buy them from the comforts of their home.

Question 2.

Which of the following is not considered to be one of the three phrases of e-commerce?

(A) innovation
(B) consolidation
(C) preservation
(D) reinvention
Answer:
(C) preservation

Explanation:
Preservation is not considered to be one of the three phases of e-commerce. The act of keeping something the same or of preventing it from being damaged is basically preservation.

Question 3.

Which segment do eBay and Amazon belong to?

(A) B2B
(B) B2C
(C) C2B
(D) C2C
Answer:
(B) B2C

Explanation:
Electronic commerce or e-commerce consists primarily of the distributing, buying, selling, marketing, and servicing of products or services over electronic systems such as the Internet and other computer networks. Amazon.com launched its online shopping site in 1996 and eBay was introduced in 1995.

Question 4.

Which of the following is not a key element of a business model?

(A) value proposition
(B) competitive advantage
(C) market strategy
(D) universal standards
Answer:
(B) competitive advantage

Explanation:
The key elements of a business model are: Key partners Key activities Value proposition Customer relationship Customer segment Key resource Distribution channel Cost structure Revenue stream

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 5.

The primary source of financing during the early years of e-commerce was

(A) bank loans
(B) large retail films
(C) venture capital funds
(D) initial public offerings
Answer:
(C) venture capital funds

Explanation:
Venture capital is a form of private equity financing that is provided by venture capital firms or funds to startups, early-stage, and emerging companies that have been deemed to have high growth potential or which have demonstrated high growth.

Question 6.

Which of the following is not a major type of e-commerce?

(A) C2B
(B) B2C
(C) B2B
(D) C2C
Answer:
Option (A) is correct.

Explanation:
Consumer-to-business is a business model in which consumers create value and businesses consume that value. For example, when a consumer writes reviews or when a consumer gives a useful idea for new product development then that consumer is creating value for the business if the business adopts the input.

MCQ Questions for Class 10 Computer Applications Chapter 3 Internet and Web Services

Question 7.

The best products to sell in B2C e-commerce are:

(A) small products
(B) digital products
(C) speciality products
(D) fresh products
Answer:
(D) fresh products

Explanation:
Direct-to-consumer or business- to-consumer refers to selling products directly to customers, bypassing any third-party retailers, wholesalers, or any other middlemen

MCQ Questions for Class 10 Computer Applications with Answers

error: Content is protected !!