Sample HTML Programs
1.
<html>
<head>
<title>My web page</title>
</head>
<body> <h1>Hello, world!</h1>
<p>This is my first web page.</p>
<p>It contains a <strong>main heading</strong> and <em> paragraph </em>. </p>
</body>
</html>
2.
<html >
<head>
<title>inline style attribute</title>
</head>
<body>
<li>sachin</li>
<li>sujay</li>
<li>Amraditya</li>
<li>shivam</li>
<li>Parth</li>
</body>
</html>
3.
<html>
<head>
<title>ordered list</title>
</head>
<body>
<h1>Example of ordered list whose type = "A"</h1>
<ol type="A">
<li>Sachin</li>
<li>Manoj</li>
</ol>
<h1>Example of reverse ordered list</h1>
<ol reversed>
<li>Parth</li>
<li>sujay</li>
</ol>
<h1>Example of ordered list start from 10</h1>
<ol start = "10">
<li>Pushpa</li>
<li>Purvi</li>
</ol>
</body>
</html>
Chapter 7- More on HTML5
A. Fill in the blanks.
1. List
2. Unordered
3. Border-spacing
4. Reversed
5. <img>
B. Write T for True and F for False.
1. False
2. True
3. False
4. True
5. True
C. Application-based questions.
1. Border-collapse
2. Alt attribute of <image> tag
D. Select the correct option.
1. a) bulleted
2. b) 1
3. a) list-style-position
4. b) <dd>
5. c) caption-side
E. Answer the following questions.
1. <ul> tag is used to define an unordered list where the items are not to be displayed
in any particular sequence. <ol> tag is used to define an ordered list where list items
follow a specific order.
2. A definition list, also called a description list consists of a term followed by its
definition. It is used to present a glossary, list of terms, or other name/value lists. It
starts and ends with <dl> and </dl> tag, respectively.
3. i) <table> tag - create a table. ii) inside the <table> tag, <tr> and <td> tags to create
rows and columns, respectively. Iii) <th> tag - specify a column heading in a table. iv)
<caption> tag is used to specify the title for the table.
4. There are two ways: Inline and External. The inline image is displayed when the web
page is opened and inserted within a line of text whereas the external images are
referenced externally and viewed separately by clicking on a link.
5. The <img> tag is used to add images in an HTML webpage. Attributes used:
a. src – To add and define the source of an image on a web page, the src attribute is
used. b. Alt – The Alt attribute displays text as an alternative to the image.
6. The Type attribute specifies the type of bullet used to mark items in the unordered
list. By default, its value is 'disc' for an unordered list.
For Unordered list: <ul type = "value"> where, value = disc|square|circle
7. Border-Spacing: This property is used to specify the distance between the borders of
the adjacent cells. Border-Collapse: With this property, one can specify whether the
table borders are to be collapsed into a single border or detached (as usual).
WORKSHEET: 2
A. Fill in the blanks.
1. Unordered
2. Timeline
3. Cyberbullying
4. Algorithm
B. Write T for True and F for False.
1. True
2. True
3. False
4. False
5. True
C. Give an example for each of the following.
1. Alexa
2. Disk Killer
3. Disc
4. Google Maps
5. Cyberstalking
TEST PAPER: 2
A. Select the correct option.
1. (a) Cybersquatting
2. (b) Backup
3. (b) Unordered
4. (c) <li>
B. Answer the following questions.
1. The <img> tag is used to add images in an HTML web page. It is an empty tag and
requires different attributes to be specified with it. E.g.<img src= “pic1.jpg”>.
2. Encryption is the process of converting your electronic data into a form that cannot be
easily understood by anyone.
3. Natural Language Processing is the field of AI by which the machine can easily
understand human language.
4. Google is widely used for searching information on the internet. While entering the
text in the search box, you must have observed that you get to see some search
related suggestions.
5. Computer vision is a field that deals with the idea of computers replicating human
vision. This technology is used to extract visual information from images and videos.
CHAPTER -10 – INTRODUCTION TO ARTIFICIAL INTELLIGENCE
A. Fill in the blanks.
1. Google Maps
2. Natural Language Processing
3. Computer Vision
4. Algorithm
B. Write T for True and F for False.
1. False
2. True
3. True
4. False
5. True
C. Answer the following questions.
1. a) Smart reply - Using AI, Gmail can read your email text and can give suggestions for a
quick reply. b) Google search engine makes use of AI for suggesting relevant search
topics.
2. Machine learning is a field, which deals with building technology that can be used to
program machines in a manner that the machines can learn independently.
3. Natural Language Processing is the field of AI by which the machine can easily
understand human language. Alexa, Google Assistant, Apple Siri are some AI-based
applications that use NLP for communication.
4. Google is widely used for searching information on the internet. While entering the text
in the search box, you must have observed that you get to see some search related
suggestions. Google search engine makes use of AI for suggesting relevant search topics.
5. Computer vision is a field that deals with the idea of computers replicating human
vision. This technology is used to extract visual information from images and videos.
CHAPTER 9 - CYBER THREATS AND SECURITY
A. Fill in the blanks.
1. Stalker
2. Cyber Bullying
3. Virus
4. Firewall
5. Biometrics
B. Write T for True and F for False.
1. True
2. True
3. False
4. False
5. True
C. Application-based questions.
1. Antivirus
2. Program file virus
D. Select the correct option.
1. (a) Vital Information Resources Under Seize
2. (b) Multipartite Virus
3. (c) Macro
4. (a) Antivirus
5. (b) Encryption
E. Answer the following questions.
1. A cybercrime is any illegal activity done through Internet. Hacking is an example of
cybercrime.
2. In cyber stalking, an attacker harasses the victim through e-mails, social media, chat
rooms instant messaging, etc. Cyber bullying includes sending insulting remarks and
threatening messages through email or spreading rumours about someone.
3. It is an act of sending an e-mail to users misleading them to believe that it is from a
trusted source. Users are asked to visit a website and update personal details. The
operators can then commit crimes on their names after stealing their identity.
4. Cyberextortion is a crime in which the victim is attacked first and then forced to pay
money to stop further attacks. Cyber extortion may be done by blocking the system
resource of the victim by some Ransomware or Denial of Service (DoS) attack.
5. 1. Install an Anti-Virus software and keep it updated.
2. Keep the Firewall on as it protects your computer by preventing unauthorised
users from gaining access.
6. Forgery is an act of imitating or making a false copy of a document like Birth
Certificate, Driving License, Currency notes, Cheque book, Passport, Mark Sheets
etc., with an intent to cheat an individual or organisation.
Chapter 8-APP DEVELOPMENT
A. Fill in the blanks.
1. Hybrid Apps
2. App
3. Permissions
4. Social Networking
5. Desktop
6. Banking
B. Write T for True and F for False.
1. False
2. True
3. True
4. True
5. True
C. Application-based questions.
1. BookMyShow App
2. WhatsApp
D. Select the correct option.
1. a) Reddit
2. a) MIT App Inventor
3. c) WhatsApp
4. b) Entertainment
5. c) E-Commerce
E. Answer the following questions.
1. Apps can be broadly classified as Desktop apps, Web apps, or Mobile apps.
Desktop apps: These apps can be used on a desktop or a laptop. Generally, they do
not need web access and run independently on a computer. Eg: Word Processors.
2. Web apps require an internet connection. They are usually browser-based and
stored on a remote server. These applications like Pixlr used for photo editing,
Facebook used for social networking and Google Maps for navigation.
3. Apps that are created keeping in mind the device specification are called Native App.
Hybrid Apps contain the feature of both Web Apps and Native Apps.
4. Desktop apps can be used on a desktop or laptop. Generally, they do not need web
access. Mobile apps run on a smartphone or table and have responsive web designs
to adapt to the much smaller screen sizes and orientations of mobile devices.
CHAPTER -6 Animation using Krita
A. Fill in the blanks.
1. Animation
2. Keyframe
3. Timeline
4. Layers
5. Play
B. Write T for True and F for False.
1. False
2. False
3. True
4. True
5. True
C. Answer in one word.
1. Play Speed
2. Frame Rate
3. Add blank frame button
4. Tools Panel
D. Application-based questions.
1. The Layers panel is available in the Toolbox.
2. To increase the speed of Animation she can use Frame Rate property.
E. Answer the following questions.
1. The easiest way is to change your workspace to Animation. This will make the animation
dockers (panels) appear on the workspace. To add the animation dockers, click on the
Choose Workspace button. This will display the Workspaces panel.
2. Animation is created with the help of frames. Each frame is defined as the little
rectangular cell that appears on the timeline. Every fifth frame displays a number.
Keyframes are special types of frames, where you define some changes to an object’s
properties for an animation, like position, colour, shapes, etc.
3. The Timeline is a rectangular window, which is present at the bottom of the stage. It is
the area where one controls the sequencing and timing of the graphics and the other
elements of animation. The major components of the Timeline are Layers, Frames, and
Playhead.
4. Layers are like transparent sheets stacked on top of one another; each containing a
different image that appears on the stage. You can draw and edit the objects on one
layer without affecting the objects on another layer.
5. You can rename a layer using the following steps:
• Double-click on the layer you want to rename in the Layers panel.
• Type the new name and press the Enter key.
4. More on Python
A. Fill in the blanks.
1. Precedence
2. Expression
3. +
4. Control
5. If-else
6. Colon
B. Write T for True and F for False.
1. False
2. False
3. True
4. True
5. False
6. True
C. Application-based questions.
1. % (Remainder) Operator
2. if... else control structure
D. Select the correct option.
1. (a) Operands
2. (b) false
3. (b) Sequential
4. (c) Iterative
5. (a) else
E. Answer the following questions.
1. Operators are symbols that perform arithmetic and logical operations on operands and
provide a meaningful result. The types: arithmetic operators, string operators,
assignment operator, relational operators, logical or Boolean operators.
2. / (Division) operator is used to divide the numbers and give an output in the decimal
form, e.g., Value of 5/2 is 2.5. whereas, // (Floor Division) divides the numbers and gives
an output in the integer form, e.g., Value of 5//2 is 2.
3. *' operator in a string manipulation is used to replicate a given string for a number of
times. It is also known as Replication Operator.
4. The Logical or Boolean operators are used to compare two or more expressions, and
evaluate to either True or False. Relational operators compare the values of the
variables and determine the result in a boolean expression either 'True' or 'False'.
5. The different types of control structures are Sequential statements, Conditional
statements, and Iterative statements.
6. The conditional statements cause the program control to transfer to a specific location
depending on the outcome of the conditional expression. The syntax of if statement is:
if <condition>:
Statement 1
Statement 2
...............
CHAPTER -5 Layers in Krita
A. Fill in the blanks.
1. Layers
2. Text
3. Unnamed
4. Import/Export
5. Remove Layer
B. Write T for True and F for False.
1. True
2. True
3. False
4. True
5. True
C. Application-based questions.
1. Sakshi can delete the layer from the Layers panel.
2. Aman can click on the Import/Export option and select the Import Layer option.
D. Answer the following questions.
1. Layers are like a stack in which the objects are placed one over the other or side-byside. An image consists of multiple layers and each layer can hold a single or multiple
objects. These objects can be edited individually.
2. To hide or show layers, click on the Eye icon shown before the layer name in the
Layers panel.
3. You can delete a layer by selecting the layer in the Layers panel and then by pressing
the Delete key from the keyboard. Or Right click on the layer you want to delete.
From the Context menu, select the Remove Layer option.
4. Text tool is used to add any text in the image, you can also edit font style and size,
etc., of the text using the formatting options available in the Edit Text dialog box.
Chapter- 3: ADVANCED FEATURES OF EXCEL
A. Fill in the blanks.
1. Chart
2. Data Series
3. Legend
4. Bar
5. Value Axis
6. Data, Formatting effects
B. Write T for True and F for False.
1. True
2. False
3. True
4. False
5. True
6. True
C. Application-based questions.
1. Pie Chart
2. Format Plot Area
D. Select the correct option.
1. (b) Axes Titles
2. (b) Pie
3. (a) Sort
4. (a) Shift
5. (c) Sparklines
E. Answer the following questions:
1. Chart is an effective way to display data in a pictorial form. Charts make it easier to draw
comparison and analyze the growth, relationship and trends among the values in a
range. It provides more accurate analysis of information.
2. A column chart displays the data in the form of vertical bars. It is used to show changes
in data over a period of time, However, Bar chart helps to display the data in the form of
bars horizontally or vertically. It displays comparison amongst the individual items.
3. The Chart area includes all the objects and elements in a chart. Plot area is a window
within a Chart area. It contains the actual chart and includes the plotted data, data
series, and category and value axis.
4. Grouping worksheets facilitates in editing multiple worksheets at the same time. By
grouping worksheets, you can enter common data, formatting effects, and formulas in
the grouped sheets.
5. Consolidation helps in combining the data of multiple worksheets. We can combine data
of various ranges either in the same sheet or in different sheets.
6. Sparklines are mini charts that fit into a single worksheet cell to provide a visual
representation of the data. These can be used to analyse the trends in your data. There
are three types of sparklines—Line, Column, and Win/Loss.
CHAPTER-2: FORMULAS AND FUNCTIONS
A. Fill in the blanks.
1. Equal to (=)
2. Cell reference
3. Absolute reference
4. Arguments
5. Parenthesis
6. &
B. Write T for True and F for False.
1. True
2. True
3. True
4. True
5. False
6. False
C. Application-based questions.
1. She should use the Max() and Min() function.
2. Formula to be used: Salary + Salary*10%
D. Select the correct option.
1. a. Textjoin()
2. c. Alt + =
3. c. Max ()
4. a. MOD
5. b. A3
E. Answer the following questions.
1. Formulas are used to perform calculations involving addition, subtraction, division,
and multiplication. It can include cell addresses, numbers, arithmetic operators, and
parenthesis. Eg. Formula for average of 4 values (value1+ value2+value3+ value 4)/4.
2. The cell address in a formula is known as the cell reference. References help in
finding the values or data in a worksheet, that you want to use in formula. Types of
cell references: Relative reference, Absolute reference, and Mixed reference.
3. Absolute reference is used when it is required to keep the address of the cell fixed
while copying the formula to another cell. To use absolute reference in a formula,
dollar sign ($) is used before the column and row number. Example: =$A$1+$A$2
4. Functions are the pre-designed formulas in Excel to perform both simple and
complex calculations. Functions save time and eliminate the chance to write wrong
formulas. Some examples are: SUM, AVERAGE, ODD, ROUND, etc.
5. The Concat() function is used to join two or more than two strings together.
Whereas, Textjoin() lets you join the text specified in a range of cells where you can
add words and a delimiter you specify between each text value.
Chapter-1: NUMBER SYSTEM
A. Fill in the blanks.
1. 2
2. Decimal number
3. 8
4. 1
5. Binary
6. Hexadecimal
B. Write T for True and F for False.
1. False
2. True
3. False
4. True
5. False
6. False
C. Select the correct option.
1. (c) Binary
2. (a) 2
3. (b) 10-15
4. (b) 1
5. (a) 2
D. Answer the following questions.
1. The number system is a set of values used to represent different quantities. Different
types: Decimal, Binary, Octal and Hexadecimal Number System.
2.
1) Divide the given decimal number with the base 2.
2) Write down the remainder
and divide the quotient again by 2.
3) Repeat the step 2 till the quotient is zero.
3. The concept of Octal numbers system came from the Native American. The Octal
number system consists of 8 digits: 0 to 7 with base 8.
4. A computer understands only the binary codes. Therefore, the data that is entered
into a computer is converted into its binary equivalent. It further converts the binary
results into their decimal equivalents for the output.