SEMESTER-1 GSEB CLASS-12 CH. NO 1 TO 5 (WITH ANSWERS HIGHLIGHTED)
Multiple Choice Questions
1)
Which of the following attribute of form
specifies the HTTP method to be used when sending the data?
a) method b)
action
c) submit d) input
c) submit d) input
2)
Which of the following values are used by method
attribute of Form element?
a) GET and SET b) SET
and POST
c) GET and POST d) GET and PUT
c) GET and POST d) GET and PUT
3)
Which of the following attribute of the input
element specifies the field that is to be created in the form?
a) Input b) Type
c) Name d) Value
c) Name d) Value
4)
Which of the following element allows multi-line
text input?
a) Input b) Select
and Option
c) Textarea d) Form
c) Textarea d) Form
5)
Which of the following element is used to create
a drop down list or menu in a form?
a) Input b) Select and Option
c) Textarea d) Form
c) Textarea d) Form
6)
Which of the following is a open source web
development IDE?
a) HTML b) Kompozer
c) Scite d) Base
c) Scite d) Base
7)
……………… can be done using CSS.
a) Control
the font types and colors b)
Background features
c) Control the position of elements d) All of these
c) Control the position of elements d) All of these
8)
CSS syntax uses ………… brackets.
(a) ( ) (b) { }
(c) [ ] (d)<>
(c) [ ] (d)<>
9)
CSS rules contains the …………………… part(s).
a) Property b)
Value for the property
c) Both (a) and (b) d) None of these
c) Both (a) and (b) d) None of these
10)
Which of the following is a container used to
collect different kinds of inputs from the user?
a) Webpage b) Text
c) Input d) Form
c) Input d) Form
11)
Which of the following attribute of form is used
to specify where to send the form data when for is submitted?
a) method b) action
c) submit d) input
c) submit d) input
12)
…………………… is the correct syntax of CSS.
a) Selector{Property;Value} b)
Selector{Property;Value:}
c) Selector {Property:Value;} d) Selector{Property:Value:}
c) Selector {Property:Value;} d) Selector{Property:Value:}
13)
CSS button is on the …………………… of KompoZer.
a) Standard
toolbar b) Composition toolbar
c) Format toolbar1 d) Format toolbar2
c) Format toolbar1 d) Format toolbar2
14)
…………… view is selected to see the source code of
CSS Stylesheet.
a) Design b)
Source
c) Split d) Normal
c) Split d) Normal
15)
………………. is the disadvantage of CSS.
a) Once CSS
is created, it can be used by various elements of HTML
b) Compatibility varies with different browsers
c) Both of these d) None of these
b) Compatibility varies with different browsers
c) Both of these d) None of these
16)
………….. company has developed the JavaScript.
a) Microsoft b)
ORACLE
c) Netscape d) Intel
c) Netscape d) Intel
17)
JavaScript can be used in for a ……………. in a
webpage.
a)
interactivity with the user b)
control the browser
c) dynamically create HTML content d) All of these
c) dynamically create HTML content d) All of these
18)
JavaScript is used to validate the data entered
in the HTML forms on the ……….. before sending it to the server.
a) Server
side b) Client
side
c) Both (a) & (b) d) None of these
c) Both (a) & (b) d) None of these
19)
Generally it is preferred that the JavaScript
code should be placed in the …………… tag.
a)
<body>……</body> b)
<head>……</head>
c) <title>…….<.title> d) <form>……</form>
c) <title>…….<.title> d) <form>……</form>
20)
Functions in JavaScript are defined within the
…………………… keyword.
a) function b)
class
c) main d) define
c) main d) define
21)
Values given in the function are known as……….
a) arguments b)
parameters
c) Both (a) & (b) d) None of these
c) Both (a) & (b) d) None of these
22)
When element such as button or text box becomes
active, it is known as …………………… event.
a) active b)
blur
c) focus d) select
c) focus d) select
23)
When user clicks the submit button of the form
is known as……………..
a) events b)
event handler
c) work d) process
c) work d) process
24)
…………………… is the false statement(s) in regards of
JavaScript.
a)
JavaScript is used to improve the design
b) JavaScript contains the advanced programming functionalities of language like C, C++ & Java.
c) JavaScript validates the form
d) Browser like Chrome and Safari support JavaScript
b) JavaScript contains the advanced programming functionalities of language like C, C++ & Java.
c) JavaScript validates the form
d) Browser like Chrome and Safari support JavaScript
25)
When mouse pointer is over the particular
object/ element, it is known as …………………… event.
a) select b) mouseover
c) submit d) load
c) submit d) load
26)
…………………… is not an event handler in JavaScript.
a) onclick (
) b)
onsubmit ( )
c) load ( ) d) onfocus ( )
c) load ( ) d) onfocus ( )
27)
…………………… means the storage for storing values in
JavaScript.
a) variable b) parameter
c) Identifier d) None of these
c) Identifier d) None of these
28)
…………………… is the builtin function is there to
work with numbers in JavaScript.
a) isNum() b) isNaN ()
c) notNum () d) None of these
c) notNum () d) None of these
29)
What is website?
a)
Collection of files b)
Group of directories
c) Interlinked collection of
webpages d) Collection of advertisements
30)
What kind of information should be there in the
website ?
a) Complete
and irrelevant b) Complete and relevant
c)
Incomplete and irrelevant d)
Complete, irrelevant and unattractive
31)
What is the advantage of having navigation in
the website?
a) Moving from one page to another is easy b) The user knows where he is
c) Easily get back to home page d) All of these
32)
The website design should scale for the devices
like ……….. .
a) Computers b)
Smart phones
c) Tablets d) All of these
c) Tablets d) All of these
33)
When Javascript is used in the webpage, the
details are separated using ..................
a) , (comma) b) ; (semi colon)
c) : (colon) d) # (hash)
c) : (colon) d) # (hash)
34)
.................. is used to insert a table in
KompoZer.
a) Table Insert Table b) Insert Table
c) Table Draw Table d)
Insert Draw Table
35)
The website should be designed keeping in mind
that it is well displayed in all the popular web browser like …………… .
a) Internet Explorer b) Mozilla
Firefox
c) Google Chrome d) All of these
c) Google Chrome d) All of these
36)
Which statement is wrong about the website?
a) It helps
in presenting the business to the world
b) It helps in attracting less
number of customers
c) It helps
in selling the products
d) It helps
in promoting the business
37)
…………. in the website will enable the company to
get the maximum amount of traffic, therefore making the maximum amount of
profit.
a) Website
is interactive b)
Website is user friendly
c) Website
is providing accurate and useful information
d) All of these
38)
The …………….. of the website is the first page
that opens when the user enters the URL address in the address bar of the
browser.
a) Home page b)
Contact us page
c) Main page d) None of these
c) Main page d) None of these
39)
Generally .................. name is given to
the home page.
a) Home html b) index.html
c) main.html d) None of these
c) main.html d) None of these
40)
We are converting the data into number by using
function ..................
a) Parsfloat () b) ParseFloat ()
c) Parseflot () d) Parsecarec ()
c) Parseflot () d) Parsecarec ()
41)
Publishing the website is known as ………..
a) Uploading b)
Downloading
c) Surfing d) None of these
c) Surfing d) None of these
42)
ISP stands for ..................
a) Internet Services Product b) Internet Service Provider
c) Internet Source Product d) Internet Source Provider
c) Internet Source Product d) Internet Source Provider
43)
FTP stands for ..................
a) File Transfer Procedure b) File Transfer Protocol
c) Format Transfer Program d) None of these
c) Format Transfer Program d) None of these
44)
URL stands for ...................
a) Universal Research Locator b) United Resource Location
c) Universal Resource Location d) United Resource Location
c) Universal Resource Location d) United Resource Location
45)
.................. is not the open source IDE
for web development.
a) KompoZer b)
Aptana Studio
c) Amaya d) Notepad
c) Amaya d) Notepad
46)
IDE stands for ..................
a) Internet Designing Environment b) Integrated Designing Environment
c) Integrated Development Environment d) Internet Development Engine
c) Integrated Development Environment d) Internet Development Engine
47)
What is BlueGriffon ?
a) WYSIWYG type general editor b) WYSIWYG type HTML editor
c) A facility for speed calling d) One open source communication
c) A facility for speed calling d) One open source communication
48)
W3C stands for ..................
a) World Wide Web Corporation b) World Wide Web Console
c) World Wide Web Consortium d) None of these
c) World Wide Web Consortium d) None of these
49)
.................. is not WYSIWYG type editor.
a) Amaya b)
BlueGriffon
c) Aptana Studio d) All of these
c) Aptana Studio d) All of these
50)
Amaya web editor can be download form
..................
51)
Which of the following is an example for online
bookstore?
a) irctc b) gmail
c) amazon d) yahoo
c) amazon d) yahoo
52)
Which of the following is newspaper that exists
on the internet in digital form?
a) I-Newspaper b) Internet
Newspaper
c) E-Newspaper d) Digital Newspaper
c) E-Newspaper d) Digital Newspaper
53)
Which of the following is known as the process
of conducting the banking transactions over the internet?
a) Banking Online b) Online
Transaction
c) Net banking d) Online Payment
c) Net banking d) Online Payment
54)
Which of the following is not an advantage of
E-commerce?
a) Lowest Cost b)
Conduct Business 24x7
c) Security d) No geographical limitations
c) Security d) No geographical limitations
55)
Which of the following is a disadvantage of
E-commerce?
a) Improved customer service b) Speed
c) Privacy d) Conduct Business 24x7
c) Privacy d) Conduct Business 24x7
56)
Which of the following e-commerce business model
is also a part of E-governance?
a) Government to Police (G2P) b) Government to Company
(G2C)
c) Government to Business (G2B) d) Government to User (G2U)
c) Government to Business (G2B) d) Government to User (G2U)
57)
The Gujarat Government has developed its own
network site:
a) www.gswan.gov b) www.gswan.com
c) www.gswan.gov.in d) www.gswan.in
c) www.gswan.gov.in d) www.gswan.in
58)
Consumers are individuals in ..................
model of E-commerce.
a) B2B b) B2C
c) C2C d) G2G
c) C2C d) G2G
59)
Which of the following is a good example of C2C
E-commerce model?
a) Online Purchasing b) Net
Banking
c) Online Auctions d) Information services
c) Online Auctions d) Information services
60)
Which of the following E-commerce business model
involves reverse auctions where the consumers determine the prices of the
products or services?
a) Business to Consumers(B2C) b) Government to Government
(G2G)
c) Consumers to Business (C2B) d) Business to Business (B2B)
c) Consumers to Business (C2B) d) Business to Business (B2B)
61)
.................. is the notices, reminders
sent to the customers by the companies or banks.
a) Online billing b) Support
Services
c) Information Services d) Net Banking
c) Information Services d) Net Banking
62)
Which of the following stands for GPS?
a) Global Positioning System b) Global Positioned Satellite
c) Google Positioning Server d) None of these
c) Google Positioning Server d) None of these
63)
Which of the following refers to buying and
selling of goods or services through the use of Internet enabled wireless
devices?
a) Internet b) M-Commerce
c) M-banking d) None of these
c) M-banking d) None of these
64)
Which of the following is the use of
technologies which provide the location information for business purpose?
a) E-Commerce b)
M-Commerce
c) L-Commerce d) None of these
c) L-Commerce d) None of these
65)
Which of the following security aspect refers to
the secrecy of the information so that unauthorized user cannot read it?
a) Confidentiality b)
Integrity
c) Non-repudiation d) Authorization
c) Non-repudiation d) Authorization
66)
Which of the following security aspect ensures
that the information must not be accidentally or maliciously altered or
tampered in transit?
a) Confidentialiaty b) Integrity
c) Non-repudiation d) Authorization
c) Non-repudiation d) Authorization
67)
Which of the following security aspect ensures
that only authentic users are allowed to use the system?
a) Confidentialiaty b)
Integrity
c) Non-repudiation d) Authorization
c) Non-repudiation d) Authorization
68)
Which ot the following security aspect ensures
that the sender of the message cannot deny that he/she has sent the message?
a) Confidentialiaty b)
Integrity
c) Non-repudiation d) Authorization
c) Non-repudiation d) Authorization
69)
Which of the following is a program that uses
Internet to record information that passes through a computer or router in
transit from sender to receiver?
a) Sniffer b) Denial of service attack
c) Malacious code d) Spoofing
c) Malacious code d) Spoofing
70)
Which of the following is an attack used to shut
down a machine or network, making it inaccessible to its intended users?
a) Malacious code b) Denial of service attack
c) Spoofing d) Cyber vandalism
c) Spoofing d) Cyber vandalism
71)
Which of the following is known as electronic
defacing of an existing website page?
a) Cyber vandalism b) Denial-of-Service
c) Spoofing d) Malicious Code
c) Spoofing d) Malicious Code
72)
Which of the following is pretending to be
someone you are not, or representing a website as authentic when it is actually
a fake
a) Cyber vandalism b) Denial-of-Service
c) Spoofing d) Malicious Code
c) Spoofing d) Malicious Code
73)
Which of the following is a computer program
that detects, prevents and takes action to remove the malicious codes like
viruses, worms and Trojan horses from the infected system?
a) Antivirus Software b)
Digital Certificate
c) Firewall d) Cryptography
c) Firewall d) Cryptography
74)
Which of the following is the transformation of
normal text known as “plain text” into
unreadable or secret text known as “cipher text” using encryption algorithm?
a) Firewall b) Encryption
c) Antivirus Software d) Digital Certificate
c) Antivirus Software d) Digital Certificate
75)
Which of the following is the transformation of
encrypted text back into normal text?
a) Firewall b)
Digital Certificate
c) Decryption d) Virus
c) Decryption d) Virus
76)
Which of the following is a protocol used for
securing web transactions on the Internet
a) TPC/IP b) HTTP
c) Bluetooth d) SSL
c) Bluetooth d) SSL
77)
Who developed SSL protocol?
a) Google b) Netscape
c) Yahoo d) Firefox
c) Yahoo d) Firefox
78)
Which of the following starting address
indicates that site is secured by SSL protocol?
a) http:// b) ssl://
c) https:// d) http-ssl://
c) https:// d) http-ssl://
79)
Which of the following provides the author with
a tool to protect his/her original work from being used or taken by others
without permission?
a) Trademark b) Copyright
c) Digital watermarking d) Steganography
c) Digital watermarking d) Steganography
80)
Which of the following is a specific logo, mark,
work, symbol, design, phrase or image which is used by an individual of a
company to distinguish a product or service from that of others in the market?
a) Trademark b)
Copyright
c) Digital watermarking d) Steganography
c) Digital watermarking d) Steganography
81)
Which of the following is the symbol for trademark?
a) TM, MT and C b)
TM, MS and ®
c) TM, SM and ® d) TM, SM and (C)
c) TM, SM and ® d) TM, SM and (C)
82)
Which of the following is the process of hiding
information within other information?
a) Squatting b)
Steganography
c) Name changing d) Copyright
c) Name changing d) Copyright
83)
Which of the following is a digital code
inserted into a digital image, audio or video file which can identify the
file’s copyright information?
a) Image mark b)
Digital mark
c) Code mark d) Water mark
c) Code mark d) Water mark
84)
Who issues the credit card and guarantees the
payment to the merchant?
a) Merchant b)
Issuing bank
c) Acquiring bank d) Customer
c) Acquiring bank d) Customer
85)
In object oriented methodology, the focus is on
which of the following entities?
a) Data b)
Function
c) Objects d) All of these
c) Objects d) All of these
86)
Which of the following test suits to Java?
a) A procedural programming
language b) An object oriented programming language
c) A Query language d) All of these
c) A Query language d) All of these
87)
Which of the following is used to distinguish
objects from each other?
a) Attributes b) State
c) Behavior d) All of these
c) Behavior d) All of these
88)
Which of the following is used to define common
features of similar objects?
a) Class
b)
Objects
c) Methods d) All of these
c) Methods d) All of these
89)
Which of the following is not a visibility
symbol?
a) ~ b) *
c) # d) -
c) # d) -
90)
Which of the following is provided using
encapsulation?
a) Data protection b)
Data sharing
c) Separation of data and methods d) All of these
c) Separation of data and methods d) All of these
91)
Which of the following is enabled by data
abstraction?
a) Data protection b) Data hiding
c) Data sharing d) All of these
c) Data sharing d) All of these
92)
With which of the following options polymorphism
cannot be achieved?
a) Method overloading b) Operator
overloading
c) Data hiding d) All of these
c) Data hiding d) All of these
93)
An aggregation model refers to which of the
following relationship?
a) ‘is-a’ relationship b) ‘has-a’
relationship
c) ‘a-part-of’ relationship d) All of these
c) ‘a-part-of’ relationship d) All of these
94)
An inheritance model refers to which of the
following relationships?
a) ‘is-a’ relationship b)
‘has-a’ relationship
c) ‘a-part-of’ relationship d) All of these
c) ‘a-part-of’ relationship d) All of these
95)
In class diagram, composition is represented
using which of the following symbols?
a) Empty diamond symbol b) Filled diamond symbol
c) Empty triangle symbol d) Filled triangle symbol
c) Empty triangle symbol d) Filled triangle symbol
96)
In class diagram, aggregation is represented
using which of the following symbols?
a) Empty diamond symbol b) Filled diamond symbol
c) Empty triangle symbol d) Filled triangle symbol
c) Empty triangle symbol d) Filled triangle symbol
97)
In object oriented terminology, a called to a method
is referred to as a ..................
a) Network b) Message
c) Note d) Group
c) Note d) Group
98)
Data abstraction is a concept that says:
a) how it does, but not what it
is done b) what it does, but not how it is done
c) Both (a) & (b) d) None of these
c) Both (a) & (b) d) None of these
99)
UML stands for ..................; which is used
to creat models of object-oriented software to help with design of an
application.
a) Unique Modeling Language b) Universal Modeling
Language
c) Unified Modeling Language d) Union Modeling Language
c) Unified Modeling Language d) Union Modeling Language
100)
The purpose of the .................. is to
model the static view of an application.
a) class objects b) class diagram
c) class plan d) class map
c) class plan d) class map
No comments
Post your comments