5. Markup languages are designed to create an appropriate markup scheme for an electronic document or web page.
The language specifies the code for formatting, both the layout and style, within a text file. HTML is an example of markup language.
6. Structural components of a web page are:
i. Title bar displays the title of the current web page.
ii. Menu or Navigational Links are the hyperlinks used to move between linked pages of the website.
iii. Header Area contains the company and logo, relevant text, & search box.
iv. Content Area contains the main content of the web page.
v. Footer Area contains copyright notices, website contact information, and privacy statements.
7. There are specific rules, which determine how the data should be transferred over the networks, compressed,
presented on the screen, and so on. These sets of rules are called Protocols.
8. TCP/IP stands for Transmission Control Protocol/Internet Protocol. It is a family of protocols defining conventions for
communication between computers over the Internet. It is the basic communication protocol of the Internet. TCP/IP
is a two-layer program. The higher layer, TCP, manages the breaking down and assembling of the data, whereas the
lower layer, IP, is responsible for the accurate delivery of the data over the Internet.
9. There are various types of blogs available on the web.
i. Personal blog: This is the most common and popular type of blog. It is a journal or diary that is on the Internet.
Personal blog encompasses personal views on any chosen subject like health, politics, travel, etc.
ii. Company blog: This category is used by professionals or companies to let their customers or clients know about
their upcoming products and the progress being made on some projects.
iii. Non-profit blog: This category incorporates the non-profit organisations which use blogging to create awareness
and raise money for their cause.
10. Two popular web browsers are Google Chrome and Mozilla Firefox.
11. The WWW (World Wide Web) commonly known as the Web, is a way of accessing information over the Internet. It
contains millions of documents called Web Pages. Sir Tim Berners Lee, along with Robert Cailliau, invented the
World Wide Web while working at CERN (European Council for Nuclear Research) in 1990.
12.
a. Network organisations – .net
b. Government agencies – .gov
13. Internet is called “Network of networks” because it is a network of millions of computers connected worldwide
through telephone lines or cables.
14.
a. ISP: Internet Service Provider
b. URL: Uniform Resource Locator
15. Hypertext is a system in which different types of documents/files, such as images, sound effects, and text are linked
to each other. The Hypertext Transfer Protocol (HTTP) is responsible for accessing hypertext documents on the
world wide web.
16. E-mail address is a unique electronic address where e-mails are received. You need an e-mail address to receive an
e-mail. It consists of two parts – a Username and a Domain Name, separated by the @ (‘at’) symbol.
On the other hand, the Uniform Resource Locator denotes the global address of the documents and other resources
on the World Wide Web. The communication between a web user and an Internet resource is possible by identifying
each resource on the Internet in a standardised manner.
SECTION 4: SHORT ANSWER TYPE QUESTIONS-(UNSOLVED)
1. Type, Name, Value, Size, Maxlength are a few attributes used with the <INPUT> tag.
2. The <SELECT> tag is used to define a selection list in a form. It should be placed within the <FORM> tag. The <OPTION> tag is used along with the <SELECT> tag to display a list of options.
3. Type attribute specifies the kind of form control that will be added to the form.
4. <TEXTAREA> tag adds a multi-line text box on the form area.
5. Forms can be divided into three sections namely:
i. Form Header
ii. Input Fields
iii. Action Buttons
6. A password form control is identical to a text box control, except that whatever the user enters into this field does not get displayed. Instead, dots or asterisks are shown on the screen so that no one can see the typed information.
7. A scroll bar will be added to the list to show that there are more elements in the combo box.
8. The Ctrl or Shift keys are used to select more than one element from the list.
SECTION 5: LONG ANSWER TYPE QUESTIONS-(UNSOLVED)
1. Method attribute specifies that the form information should be posted to the URL given in the action attribute.
Possible values are GET and POST.
Get: This is the default value. It is used whenever you wish to e-mail the form contents.
Post: You can make use of this value whenever you want to pass the information to the URL specified in the action
attribute.
2. Two Input elements are:
Text box and Check box
A text box allows a user to enter alphanumeric data that is a combination of characters and numbers. You can add a
text box to the form in the following way:
SYNTAX: <INPUT Type= “Text”>
A checkbox is like a toggle switch which helps the user to select or deselect one or more items. As with other form
controls, you have to type your label next to the checkbox.
Example: <INPUT Type= “Checkbox” Name= “Hobbies” Value= “Reading” Checked>
3.
i. Radio buttons are used when a user has to make a selection of only one option among the several possible
options. For example, while asking about the gender of a user, you need to specify two radio buttons “Male”
and “Female”, which belong to the same group called “Gender”. A user will be able to select either “Male” or
“Female” but not both the options.
On the other hand, a checkbox is like a toggle switch which helps the user to select or deselect one or more
items.
ii. By clicking on the Submit button, the data in all the fields will be sent to a server as a series of name and value
pairs. The “Name” being the name of the form element and the “Value” is input value entered by the user. The
data is sent to the page specified in the Action attribute of the <FORM> tag.
The Reset button is used to clear the contents and set the values of all the form elements to their initial state and
make them active.
4. Application areas of forms:
i. They are used for collecting names, addresses, telephone numbers, e-mail addresses, and other information of
students which is required by the websites to register them for an online course.
ii. They are used for gathering information for the purchase of an item.
iii. They are used for collecting feedback about a website.
iv. Users are required to fill out a form if they want to participate in a chat session or a discussion group.
5. i. Type: This attribute specifies what kind of form control will be added to the form. The default type for an input
element is Text. It defines only one line of text.
ii. Value: It specifies the initial value for the element.
iii. Size: It specifies the width of the input field.
6. Describe the Cols attribute and Rows attribute of the <TEXTAREA> tag.
Rows attribute of the <TEXTAREA> tag defines the height of the textarea, and Cols attribute defines the width of the
text area.
Example: <TEXTAREA Rows= 10 Cols= 60>
SECTION 6: APPLICATION BASED QUESTIONS-(UNSOLVED)
1. Rows attribute of the <TEXTAREA> tag defines the height of the textarea, and Cols attribute defines the width of the
text area.
Example: <TEXTAREA Rows= 10 Cols= 60>
2. <HTML>
<HEAD><TITLE>Order Pizza</TITLE></HEAD>
<BODY>
<FORM>
<P> Pizza Size:</P>
<INPUT Type=”Radio” Name= “Size” Value= “Small”>
Small <BR>
<INPUT Type=”Radio” Name= “Size” Value= “Medium” Checked> Medium<BR>
<INPUT Type=”Radio” Name= “Size” Value= “Large”> Large<BR>
<INPUT Type= “Submit” Value= “Click to order Pizza”>
<INPUT Type= “Reset” Value= “Click to Clear”>
</FORM></BODY></HTML>
3. <HTML>
<HEAD> <TITLE> Using drop-down list</TITLE></HEAD>
<BODY Bgcolor= “Lightgreen”> <FORM>
<P> Select your right destination: </P>
<SELECT Name= “Cities”>
<OPTION Selected> Chandigarh</OPTION>
<OPTION> Kolkata</OPTION>
<OPTION> Bhopal</OPTION>
<OPTION> Lucknow</OPTION>
<OPTION> Patna</OPTION>
<OPTION> Shimla</OPTION>
<OPTION> Delhi</OPTION>
<OPTION> Mumbai</OPTION>
<OPTION> Chennai</OPTION>
</SELECT></FORM>
</BODY></HTML>
SECTION 3: THEORETICAL QUESTIONS-(UNSOLVED)
1. The different components of DHTML are – HTML, Cascading Style Sheets (CSS), Scripting, and Document Object Model.
HTML: HTML defines the basic structure of a web page by using the essential elements, such as paragraphs, headings, forms, tables, and links.
CSS: CSS is a set of style sheet design principles that determine the visual layout of the content of a web page.
Scripting: This component of DHTML makes a web page dynamic. It provides a way to interpret the user’s actions and accordingly brings changes to a web page.
DOM: The DOM defines the logical structure of a web page. It arranges the web page content in a hierarchical way that allows the HTML elements, style sheets, and scripting languages to interact with each other.
2. In static web pages, the contents of the web page remain stationary. These web pages are loaded on the client’s browser exactly in the same way as they are stored on the web server. A user can only read the information but cannot make any modifications or interact with the data. Static web pages are created by using only HTML.
A Dynamic web page is generated when a user requests for the page. Each time it shows different content based on the user’s interaction. The page that a user views at a time exists only for him and for that very moment. If viewed by someone else at the same time or even by him at a slightly different time, he would get something different.
3. How can we set the margins for an element?
There are margin properties for setting the margin for each side of an element (top, right, bottom, and left).
To set the margin for each side of an element, we can make use of the following properties:
i. Margin-top: To specify the top margin of an element
ii. Margin-right: To specify the right margin of an element
iii. Margin-bottom: To specify the bottom margin of an element
iv. Margin-left: To specify the left margin of an element
4. Cascading means the hierarchical order in which different style sheet types are arranged so that the latest style sheet takes the precedence on the earlier ones. For example, if there are three definitions of <P> element in an HTML document, the first definition specifying the <P> properties precedes the second definition, which defines any other value for <P>, and this, in turn, precedes the third definition, which specifies the next value for <P>. The definition at the bottom will take precedence, and the paragraph will appear with the properties defined in the third
element.
5. Differentiate between External style sheets and Internal style sheets?
Internal styles are useful if you want to apply similar formatting for all the tags of the same type on a web page. To create an embedded or internal style sheet, we make use of <STYLE> tag in the Head section. As there are several style sheet technologies, so we must use, Type=”text/css” attribute with the <STYLE> tag to let the browsers know that we are using CSS as the document’s style sheet language. External Style Sheet is the most powerful and flexible method to define the layout for the web pages. When you need to apply a style sheet to multiple pages, it is often recommended to create an external style sheet and link it to various web pages. An external style sheet method incorporates two files: one file contains the style code only, and the other file contains the HTML code. The file which contains the style code is saved with the extension “.css”. The HTML file is linked with this CSS file using either the Link element or Import statement.
6. Scripting makes a web page dynamic. It provides a way to interpret the user’s actions and accordingly brings changes to a web page. For example, scripts can interpret the mouse actions (such as clicking or entering a value in a textbox) and respond to that action by using a set of predefined instructions (such as opening a page).
7. Font weight property specifies the weight or boldness of the font. Possible values for this property are 100-900, bold, bolder, lighter, and normal. The numeric values 100-900 specify font weights where each value is a little darker than its predecessor. The value 400 is taken as Normal font weight, whereas 700 is Bold font weight.
Syntax: Font-weight: value;
where value= Lighter|Normal|Bold|Bolder|100|200|300|400|500|600|700|800|900
Font-Variant property sets the text font in two variants: normal or small-caps. In small-caps, all the lowercase characters are converted into uppercase characters. However, they appear slightly smaller than the original uppercase characters when displayed in the output.
Syntax: Font-variant: value;
where value= small-caps | normal
8. We can also specify the margin for all the sides of an element in one single declaration by using the Margin shorthand property.
Syntax: Margin: top-value right-value bottom-value left-value
where value=length | percentage | auto
9. We can specify the padding areas for all the four sides as shown in the example below:
P {Padding-top:40%; Padding-bottom:100px; Padding-right:50px; Padding-left:50px;}
10. Identify the errors in the codes below and write the correct code:
i. import url (style_imp.css) – @ import url (style_imp.css)
ii. <STYLE> p{color:808080} </STYLE> – No Error
iii. <p style= “text:align: justify”> – <p style=”text-align: justify;”>
iv. P {font: arial 15px sans-serif;} – P {font: arial 15px, sans-serif;}
v. {p-color:red;} – P{color:red;}
SECTION 5: APPLICATION BASED QUESTIONS-(UNSOLVED)
1. Harsh can control the repetition of an image by using the background-repeat property by specifying one of the four given values.
Syntax: background-repeat: value;
where value= no-repeat | repeat-x | repeat-y | repeat
No-repeat – The image will be displayed only once.
Repeat-x – The image will be repeated horizontally in the form of tiles.
Repeat-y – The image will be repeated vertically in the form of tiles.
Repeat – Default value, the image is repeated in both the directions.
2. Ruby should make the changes in the code as given below:
<body style= “background-image: url (C:/Desktop/image-3.jpg); background-repeat: no-repeat;
background-position: 100% 100%; background-color: #cccccc”; >
3. Namrata should keep the style sheet code in comments. To comment out the style sheet, she should put “/*”
characters before the style code and “*/” characters at the end of the style code.
4.
Diya can use the universal selector in the head section of the HTML code as given below:
<STYLE Type = “text/css”>
*
{
Color:blue;
Font-size: 3;
}
</STYLE>
SECTION 3: THEORETICAL QUESTIONS – (UNSOLVED)
1. Failure to practice ethical code of conduct constitutes fraud. Fraud means purposefully representing facts to deceive another person for personal gains. The said gain may be in the form of money, goods, or information.
Reasons for Increase in Online Frauds are:
Ambiguity: Since the transaction does not happen face-to-face, the identity of the parties is easily concealed and is hard to verify.
Hacking: It is relatively easy for hackers to steal information and fraudsters to buy that information in the online black market.
2. Three netiquettes to be followed when online are:
i. When communicating online, always begin your message with a salutation and end it with your name or signature.
ii. Give a descriptive phrase in the subject line of the message header that conveys the purpose of the message.
iii. Be precise and catchy while drafting a message so that people can quickly read it.
3. Plagiarising means using or imitating the language and thoughts of some other person and projecting that representation as to your original work.
Three methods to prevent plagiarism are:
i. One must specify the source, which informs the reader about the basis of one’s ideas and the extent of one’s research.
ii. To avoid plagiarism, one should refer to several sources, understand the concept, and then pen down one’sunderstanding of the topic.
iii. Use quotation marks around all the quoted words to avoid plagiarism.
4. When someone else uses your online identity to create fraudulent messages or commit crimes, it is known as Identity theft. In other words, Identity theft is any kind of deception, scam, or crime that results in the loss of personal data such as, usernames, passwords, banking information, credit card numbers, Aadhar ID or Unique Identity Number (UID), which is then used without your permission to commit fraud and other crimes.
5. The software whose terms of distribution allow users to study, change, and distribute it is called free software. This type of software is also permitted to be used for any purpose. Redistribution of its versions must also be distributed with the original terms of free use, modification, and distribution (known as copyleft). The free software are free in the sense of freedom, and not “zero price”.
On the other hand, Open Source software refers to computer software whose source code is available to the public, and may be modified, improvised, or debugged. The original developers of the software may or may not charge a nominal fee for support and further development of the software.
6. Open source is a philosophy that promotes the free access and distribution of an end product, usually software or a program. It may extend to the implementation and design of other products.The OSI (Open Source Initiative) organisation outlines the following criteria for a program to qualify for an Open
Source Software:
i. Free Redistribution: There shall be no restriction on the sale or distribution of the software, partial or whole, and such a sale shall be free of any royalty charges or any other fee.
ii. Source Code: The distributed program must include the source code as well as its compiled form. In cases where it is not included, the source code must be easily accessible from public sources on the Internet.
iii. Derived Works: The licence must allow modifications and derived works. It must allow them to be distributed under the same terms as the licence of the original software.
iv. Integrity of the Author’s Source Code: The integrity of the author’s source code must be maintained. The licence may require derived works to carry a different name or version number from the original software.
7. Digital Property Rights refer to intellectual property rights given to persons over the digital property created by them. They usually give the creator an exclusive right over the use of his/her creation for a specific period.
8. The three ways to bridge the digital divide are:
i. The government should conduct awareness camps and classes for the elderly to address their hesitation of using information technology.
ii. All the government institutes must be encouraged to propose various computer courses at nominal fees.
iii. An individual can help someone in learning computers by assisting and conducting classes for them at regular intervals.
9. Proprietary software, also known as “closed-source software”, is copyrighted software. This software may not be freely used, modified, distributed, and is restricted by conditions predefined by its publisher, vendor, or developer.
Some features of Proprietary Software are:
i. It is primarily commercial software.
ii. It does not provide its source code.
iii. It can be purchased or licenced for a fee.
10. Copyleft licences offer users the right to run, study, share, modify, and distribute copies and modified versions of the
software with the condition that the same rights be preserved for its derivatives. Copyleft licences require that the
source code must be made available to the recipients. The source code files usually contain a copy of the licence
terms and acknowledge the authors.
SECTION 5: APPLICATION BASED QUESTIONS – (UNSOLVED)
1. Asmita should do the following:
i. She can help someone in learning computers by assisting and conducting classes for them at regular intervals.
ii. She can also give her old computer to a person who cannot buy a computer for himself.
2. The steps to prevent Abhay from becoming a victim of E-commerce fraud are:
i. Always use secured Internet connection and not a public Wi-Fi while purchasing something.
ii. Keep your antivirus software up-to-date to protect yourself from spyware, adware, and malware.
iii. Check that the lock icon is present in the address bar, and the URL has an ‘https’, before entering payment details into any website.
Chapter 4: Information Representation Method—HTML-II
