Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

computer science 9 class, Schemes and Mind Maps of Computer science

this note help for study of exam paper you 1000 percent mask in exam but you download the note with you will come back and downloads the note it can easy short question

Typology: Schemes and Mind Maps

2011/2012

Uploaded on 07/31/2023

subhan-naveed-1
subhan-naveed-1 🇵🇰

1 document

1 / 56

Toggle sidebar

Related documents


Partial preview of the text

Download computer science 9 class and more Schemes and Mind Maps Computer science in PDF only on Docsity! COMPUTERSCIENCE: - CLASS NO 9: - NOTE OF COMPUTER: - Unit NUMBER 1: - PROBLEM SOLVING: - Question no 1: - List of the problem-solving steps: -  Defining a problem  Understanding the problem  Planning a solution  Define candid solution  Selecting the best solution. Question no 2: - What is a problem solving: - Problem solving is the act of defining a problem; determining the cause of the problem; identifying, prioritizing, and selecting alternatives for a solution; and implementing a solution. Question no 2: - Defining a problem: - In everyday language, a problem is a question proposed for solution, a matter stated for examination or proof. In each case, a problem is considered to be a matter which is difficult to solve or settle, a doubtful case, or a complex task involving doubt and uncertainty. Question no 3: - What is a Gain Background Knowledge: - Background knowledge is a reader's understanding of the specific concepts, situations and problems associated with the words encountered in the text. Knowledge of the topic provides readers enough understanding to make meaning and build onto what they currently know. Question no 4: - Question no 11: - Prototype (draw): - A prototype is an early version of a product from which future versions are developed. Engineers and product developers often create these test versions of a new product, service or device before releasing it. Prototypes aren't the final product or service. Question no 12: - Defining candid solution: - A candid solution is an honest and straightforward approach or proposal to solve a problem or address a challenge. It involves providing a sincere and genuine response or action without any hidden agenda or ulterior motive. A candid solution aims to tackle issues directly, without sugarcoating or evading the underlying problems. By being candid, a solution demonstrates transparency, openness, and authenticity. It promotes clear communication, trust-building, and effective problem-solving. Candid solutions often involve presenting the facts, acknowledging any limitations or potential drawbacks, and proposing practical and realistic strategies or resolutions. In summary, a candid solution is an approach that is sincere, straightforward, and transparent in addressing problems or challenges, fostering open communication and trust. Question no 13: - What is a selecting the best solution: - Selecting the solution Step 1: eliminate unsuitable options by passing them through a screening process. In this process we need to identify if the solutions meet all the necessary and sufficient conditions, and if they are feasible or not. Step 2: compare remaining solutions to figure out which should be implemented. Flowchart: - Flowcharts are helpful to know about the step used to solve a problem Question no 14: - Definition flowchart: - A flowchart is a diagram depicting a process, a system or a computer algorithm. It is a diagrammatic representation of the solution to a given problem but, more importantly, it provides a breakdown of the essential steps to solving the problem. Question no 15: - Important of flowchart in problem solving: - A flowchart is a diagram depicting a process, a system or a computer algorithm. It is a diagrammatic representation of the solution to a given problem but, more importantly, it provides a breakdown of the essential steps to solving the problem. Question no 16: - Determining requirement for a flowchart: - A few Best Practices in Flowcharting Proper Form is Essential: In drawing a proper flowchart, all necessary requirements should be listed out in a logical order. 2. Clarity is Paramount: The flowchart should be clear, neat and easy to follow. There should not be any room for ambiguity in understanding the flowchart. Question no 17: - What is a flowchart symbols: - Flowchart symbols are standardized graphical representations used in flowcharts to depict different elements and actions within a process. These symbols help to visually convey the meaning and function of each step or decision point in the flowchart. Here are some commonly used flowchart symbols: 1. Terminal or Start/End Symbol: Represented by an oval or rounded rectangle, it indicates the beginning or end of the flowchart. 2. Process Symbol: Depicted as a rectangle with rounded corners, it represents a specific action or task within the process. 3. Decision Symbol: Represented by a diamond shape, it indicates a branching point in the process where a decision needs to be made. The flow can take different paths based on the outcome of the decision. 4. Input/Output Symbol: Shown as a parallelogram, it represents the input or output of data, information, or materials in the process. Overall, an algorithm is a systematic and logical procedure that provides a clear and structured approach to problem-solving or task execution. Question no 19: - Formulation of an algorithm: - Description. A flowchart is a graphical representation of the steps a program takes to process data. In this, we can use several geometric patterns to illustrate the numerous actions the program carries out. An algorithm is a procedure or set of rules that defines how a program is to be executed. Question no 20: - Efficiency of algorithms: - . An algorithm is considered efficient if its resource consumption, also known as computational cost, is at or below some acceptable level. Roughly speaking, 'acceptable' means it will run in a reasonable amount of time or space on an available computer, typically as a function of the size of the input. Question no 21: - Difference between an algorithm a flowchart: - An algorithm and a flowchart are different in terms of their nature, representation, and purpose. Here's a breakdown of the key differences between the two: 1. Nature: - Algorithm: An algorithm is an abstract, step-by-step procedure or set of rules that defines how to solve a problem or perform a task. It focuses on the logical and computational steps required to achieve a specific outcome. - Flowchart: A flowchart is a visual diagram that represents the flow of steps, decisions, and processes within an algorithm or any other system. It provides a graphical representation of the algorithm's logic and structure. 2. Representation: - Algorithm: Algorithms can be expressed in various forms, including natural language, pseudocode, or programming languages. They are typically presented in textual format, providing a clear and precise description of the steps and operations. - Flowchart: Flowcharts use standardized symbols and arrows to represent the steps, decisions, and connections within an algorithm. They provide a visual representation of the algorithm's flow, making it easier to understand and analyze. 3. Purpose: - Algorithm: The main purpose of an algorithm is to provide a systematic and logical approach to problem-solving or task execution. It defines the sequence of steps and operations needed to achieve a desired outcome. - Flowchart: Flowcharts serve as a visual aid to understand and communicate the logical flow of an algorithm or any other process. They help in visualizing the structure, decision points, and overall flow of steps in a clear and intuitive manner. 4. Abstraction: - Algorithm: Algorithms are often more abstract and focused on the underlying logic and operations, without the need for detailed visual representation. - Flowchart: Flowcharts provide a more concrete and visual representation, allowing for easier understanding and communication of the algorithm's structure and flow. In summary, an algorithm is an abstract set of instructions or rules, while a flowchart is a visual representation of the steps and flow within an algorithm. Algorithms focus on the logical and computational aspects, while flowcharts provide a visual aid to understand and communicate the algorithm's flow and structure. Both are valuable tools in problem-solving and algorithmic design, serving different purposes in representing and analyzing processes and solutions. Question no 22: - What is a test data: - It represents data that affects or is affected by software execution while testing. Test data is used for both positive testing to verify that functions produce expected results for given inputs and for negative testing to test software ability to handle unusual, exceptional or unexpected inputs Question no 23: - Important of testing: - According to Glenn, test data is very important in testing, because it determines if an application works as expected and it also helps in catching bugs if the data entered is alphanumeric, but the requirements only say it should only accept numbers then the application did not throw an error. Question no 2: - What is a Decimal: - A decimal is a number that consists of a whole and a fractional part. Decimal numbers lie between integers and represent numerical value for quantities that are whole plus some part of a whole. For example, in the given image, we have one whole pizza and a half of another pizza. Question no 3: - What is a Binary: - In mathematics and in computing systems, a binary digit, or bit, is the smallest unit of data. Each bit has a single value of either 1 or 0, which means it can't take on any other value. Computers can represent numbers using binary code in the form of digital 1s and 0s inside the central processing unit (CPU) and RAM. Question no 4: - What is a hexadecimal: The hexadecimal number is a number to the base (or radix) 16, and its magnitude is the sum of the product of the value of each digit in the number (h) and its position (n). This allows the creation of numbers with digits in the set: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, F. Question no 5: - Number system conversion: - Number system conversions deal with the operations to change the base of the numbers. For example, to change a decimal number with base 10 to binary number with base 2. We can also perform the arithmetic operations like addition, subtraction, multiplication on the number system. Question no 6: - Decimal to binary: - Take decimal number as dividend. Divide this number by 2 (2 is base of binary so divisor here). Store the remainder in an array (it will be either 0 or 1 because of divisor 2). Repeat the above two steps until the number is greater than zero Question no 7: - Bimary to decimal: - How to convert binary to decimal. The decimal number is equal to the sum of binary digits (dn) times their power of 2 (2n): decimal = d0×20 + d1×21 + d2×22 + . Question no 8: - Decimal to hexdecimal: - Go through the steps given below to learn how to convert the numbers from decimal to hex. Step 1: First, divide the decimal number by 16, considering the number as an integer. Step 2: Keep aside the remainder. Step 3: Again divide the quotient by 16 and repeat till you get the quotient value equal to zero. Question no 9: - Hexadecimal to decimal: Go through the steps given below to learn how to convert the numbers from decimal to hex. Step 1: First, divide the decimal number by 16, considering the number as an integer. Step 2: Keep aside the remainder. Step 3: Again divide the quotient by 16 and repeat till you get the quotient value equal to zero. Question no 10: - j How many hexadecimal in binary? Converting between hex and binary is easy, because each digit of a hexadecimal number "maps" to four bits (a bit being an individual binary digit) of a binary value. So a byte -- eight binary digits -- can always be represented by two hexadecimal digits Question no 11: - Binary to hexadecimal: - Convert binary number 1101010 into hexadecimal number. First convert this into decimal number: = (1101010)2 = 1x26+1x25+0x24+1x23+0x22+1x21+0x20 = 64+32+0+8+0+2+0 = (106)10 Then, convert it into hexadecimal number = (106)10 = 6x161+10x160 = (6A)16 which is answer. Question no 12: - What is a memory: - Memory is the process of taking in information from the world around us, processing it, storing it and later recalling that information, sometimes many years later. Human memory is often likened to that of a computer memory system or a filing cabinet. Question no13: - What is a volatile memory: - Question no 21: - What is a AND Operator: - The && (logical AND) operator indicates whether both operands are true. If both operands have nonzero values, the result has the value 1. Otherwise, the result has the value 0. The type of the result is int. Both operands must have an arithmetic or pointer type. Question no 22: - What is a OR operator: - || (OR) The “OR” operator is represented with two vertical line symbols: result = a || b; In classical programming, the logical OR is meant to manipulate Boolean values only. If any of its arguments are true, it returns true, otherwise it returns false Question no 23: - What is a not operator If the result of an expression is non-zero or true, the result will be reversed as zero or false value. Similarly, if the condition's result is false or 0, the NOT operator reverses the result and returns 1 or true. For example, suppose the user enters a non-zero value is 5, the logical NOT (!) Question no 24: - What is a truth table: - A truth table provides a method for mapping out the possible truth values in an expression and to determine their outcomes. The table includes a column for each variable in the expression and a row for each possible combination of truth values. It also includes a column that shows the outcome of each set of values. Question no 25: Law of Boolean Algebra: - A law of Boolean algebra is an identity such as x (y z) = (x ∨ ∨ ∨ y) z between two Boolean terms, where a Boolean term is defined as ∨ an expression built up from variables and the constants 0 and 1 using the operations , , and ¬.∧ ∨ Question no 26: - What is a communtative law: - The commutative law states that when two numbers are added or multiplied, the final value remains the same regardless of the position of the two numbers. Or, to put it another way, the sequence in which we add or multiply any two real numbers has no effect on the outcome. Question no 27: - What is an Associative law: - Associative law states that when three real numbers are added or multiplied together, then the grouping of the numbers does not matter. Question no 28: - What is a Distributive law: - distributive law, also called distributive property, in mathematics, the law relating the operations of multiplication and addition, stated symbolically as a(b + c) = ab + ac; that is, the monomial factor a is distributed, or separately applied, to each term of the binomial factor b + c, resulting in the product ab + . Question no 29: - What is a identity law: - In logic, the law of identity states that each thing is identical with itself. It is the first of the historical three laws of thought, along with the law of noncontradiction, and the law of excluded middle. Question no 30: - What is a logical expressions: - A logical expression is a statement that can either be true or false. For example, a < b is a logical expression. It can be true or false depending on what values of a and b are given. Note that this differs from a mathematical expression which denotes a truth statement. Chapter number 3: - Networks: - Question no 1: - What is a communication channel: - In a nutshell, communication channels are mediums through which you can send a message to its intended audience. For example, phone calls, text messages, emails, video, radio, and social media are all types of communication channels. In a company, communication channels keep information flowing efficiently Question no 2: - What is a computer system: - A computer system is a set of integrated devices that input, output, process, and store data and information. Computer systems are currently built around at least one digital processing device. There are five main hardware components in a computer system: Input, Processing, Storage, Output and Communication devices. Question no 3: - What is function of network: - What is client process: - A client is a process that accesses a service provided by a server. For example interface to carry out actions, like giving username and password .it forwards requests to the server, which in return provides the required service. Question no 13: - What is server: - Client-server is a relationship in which one program, the client, requests a service or resource from another program, the server. The label client-server was previously used to distinguish distributed computing by PCs from the monolithic, centralized computing model used by mainframes. Question no 14: - How can classity physical struction of network: - Physical structure of network can be classified in terms of type of connection and topology. Question no 15: - What are the type of connection: - Two device can communicate with each other when they are connectedin some way to the link at the same time.  Point to point connection  Multipoint connection Question no 16: - Piont-to-piont connection: - A point-to-point connection is a secure link between two or more private data service sites. A point-to-point connection is network data transport service that does not use the Internet and is intrinsically safe, eliminating the need for data encryption. Question no 17: - Multipiont connection: - The multipoint connection is a connection established between more than two devices. The multipoint connection is also called multidrop line configuration. In multipoint connection, a single link is shared by multiple devices. Question no 18: - What are network topologies: - Topology of a network is a geometric representation of the relation ship among the interconnected devices  Bus topology  Star topology  Ring topology  Mesh topology Question no 19: - What is bus topology: - Bus Topology provides one of the simplest network structures. In this topology all nodes are connected together to the parallel cable by drop lines and taps / T- connectors. The cable is arranged in a straight line and each node connects to the cable with a T-connector. Question no 20: - What is star topology: - Star topology is a network topology in which each network component is physically connected to a central node such as a router, hub or switch. In a star topology, the central hub acts like a server and the connecting nodes act like clients. Question no 21: - What is mesh topology: - Mesh topology is a type of network topology in which all devices in the network are interconnected. In a mesh topology, data can be transmitted by routing (sent the shortest distance) and flooding (sent to all devices). Question no 22: - What is Ring topology: - Ring topology is a type of network topology in which each device is connected to two other devices on either side via an RJ-45 cable or coaxial cable. This forms a circular ring of connected devices which gives it its name. Data is commonly transferred in one direction along the ring, known as a unidirectional ring. Question no 23: - Base of data communication: - A database connection is a facility in computer science that allows client software to talk to database server software, whether on the same machine or not. A connection is required to send commands and receive answers, usually in the form of a result set. Connections are a key concept in data-centric programming. Question no 24: - Component of a communication system: - The essential components of data communication are: Message: Information (data) to be communicated (e.g., text, numbers, pictures, video) Sender: The device that sends the data message (e.g., computer, video camera) Receiver: The device that receives the message (e.g., a computer, workstation, television) Question no 25: - What is sender in communication sustem: - Sender is a device that initiates the communication process. It messages consisting of text, number,pictures etc.it is also called source or transmitter.Normally,computer is used as a sender in a communication system. Question no 35: - What is network layer: - The network Layer is the third layer in the OSI model of computer networks. Its main function is to transfer network packets from the source to the destination. It is involved both the source host and the destination host. Question no 36: - What is data link layer: - The data link layer is the protocol layer in a program that handles the moving of data into and out of a physical link in a network. Question no 37: - What is physical layer: - Is about the physical medium used in communication, linke cabling etc. Question no 38: - What is encapsulation: - Encapsulation is a way to restrict the direct access to some components of an object, so users cannot access state values for all of the variables of a particular object. Encapsulation can be used to hide both data members and data functions or methods associated with an instantiated class or object. Question no 39: - What is FTP: - FTP (File Transfer Protocol) is a standard network protocol used for the transfer of files from one host to another over a TCP-based network, such as the Internet. FTP works by opening two connections that link the computers trying to communicate with each other. Question no 40: - What is HTTP: - theHypertext Transfer Protocol is an application protocol for distributed, collaborative, hypermedia informa tion systems that allows users to communicate data on the World Wide Web. Question no 41: - what is SMTP: - Simple Mail Transfer Protocol (SMTP) The SMTP describes how an Internet e-mail client transfers e-mail to an Internet e-mail server, and how Internet e-mail servers transfer e-mail between themselves. SMTP is a text-based standard. SMTP is defined by a number of IETF standards documents. Question no 42: - What there is addressing of network: - A packet is the uint of data sent from one device to another. It requoire its destination address just like we write address on an envelope while sending a letter. Question no 43: - What port number: - If there are more than one application ready to asspect a packet ten a number called port number distinguishions the targeted application from the other application. Question no 44: - Why is address in a important of network: - In essence, IP addresses are the identifier that allows information to be sent between devices on a network: they contain location information and make devices accessible for communication. The internet needs a way to differentiate between different computers, routers, and websites. Question no 45: - What is different between static ip: - A static method is a class method and belongs to the class itself. This means you do not need an instance in order to use a static method. A non-static method is an instance method and belongs to each object that is generated from the class. Question no 46: - What is ip addressing. An IP address is a unique address that identifies a device on the internet or a local network. IP stands for "Internet Protocol," which is the set of rules governing the format of data sent via the internet or local network. Question no 47: - What is router: - A router is a gateway that passes data between one or more local area networks (LANs). Routers use the Internet Protocol (IP) to send IP packets containing data and IP addresses of sending and destination devices located on separate local area networks. Question no 48: - How does router work? A router analyses the destination ip address of an incoming data packet determine the best route to forward the packet and then send it accordimg Question no 49: - What is it provider internet service: - The term “internet service provider (ISP)” refers to a company that provides access to the internet to both personal and business customers. Brrowing and installing a copy of a software application from a colleague. Question no7: - What is client-server overuse: - Installing more copies of the software than you have licenses for. Question no 8: - What is hard –disk loading: - Installing and selling unauthorized copies of software on refurbished or new computers. Question no 9: - What is counterfeiting: - Duplication and selling software having copyrigth. Question no 10: - What is Online piracy: - Typically involves dowloading illegal software. Question no 11: - What is the difference between fraud and misuse: - Fraud is the intentional deception or misrepresentation that an individual knows to be false, when that individual knows the deception could result in some unauthorized benefit or payment. Abuse involves actions that are inconsistent with accepted, sound medical, business, or fiscal practices. Question no 12: - What is patent: - A patent for an invention is granted by government to the inventor, giving the inventor the right to stop others, for a limited period, from making, using or selling the invention without their permission. Question no 13: - What is copyrigth law: - Copyright refers to the legal right of the owner of intellectual property. In simpler terms, copyright is the right to copy. This means that the original creators of products and anyone they give authorization to are the only ones with the exclusive right to reproduce the work. For example: - A copyrigth could cover a writtern description of a machine, but the actual machine itself is not covered. Question no 14: - What is trade secerts: - Trade secrets encompass both technical information, such as information concerning manufacturing processes, experimental research data, software algorithms and commercial information such as distribution methods, list of suppliers and clients, and advertising strategies. Question no 15: - What is sabotage: - Sabotage is a serious attack on a computer system some mlicious user can attack the system while sitting remotely. One can send virus with some free software. For example: - to damage or destroy equipment, weapons, or buildings in order to prevent the success of an enemy or competitor: The rebels had tried to sabotage the oil pipeline. Question no 16 : - What is computer virus : - A virus is a computer program writter with negative intention.it can change/destroy an information or sabotage a precious data. Question no 17: - What is the purpose of notice boards: - The purpose of such notice is to alarm you about your privacy you within certain rules and regulations.simlarly, speed cameras are announced before taking your picture or recoding your video. These step are just to safeguard your privacy. Question no 18 : -Why is safeguarding important? Safeguarding means protecting a citizen's health, wellbeing and human rights; enabling them to live free from harm, abuse and neglect. It is an integral part of providing high-quality health care. Safeguarding children, young people and adults is a collective responsibility. Question no 19: - Importance of data privac: - Data privacy helps you control what information you choose to keep personal. All individuals have the right to prevent their personal information from being used or shared without their consent, even if this sharing wouldn't potentially lead to data theft or other cybercrimes. Question no 20: - What can do you mean confidententiality: - It mean that we want to keep our data as confidententiality we do not want share it with unintended persons. Question no 21: - What do you mea integrity: - It mean that we want to keep the data correct Question no 22: - What do you mean avilability: - It mean that we want to have access to the data when we want. If data is not avilability when needed then in some cases it becomes useless. Question no 23: - Substitution Ciphers. Substitution ciphers encrypt the plaintext by swapping each letter or symbol in the plaintext by a different symbol as directed by the key. Perhaps the simplest substitution cipher is the Caesar cipher, named after the man who used it. Question no 35: - What is caesar cipher: - A Caesar cipher is a simple method of encoding messages. Caesar ciphers use a substitution method where letters in the alphabet are shifted by some fixed number of spaces to yield an encoding alphabet. Question no 36: - What is vigenere ciphere: The Vigenère Cipher, invented by the French cryptographer Blaise de Vigenère in the 16th century, is a method of encrypting and decrypting messages. It is a polyalphabetic substitution cipher, which means that it uses multiple cipher alphabets to encrypt the plaintext. Question no 37: - What is cryptanalysis: - Cryptanalysis is the study of ciphertext, ciphers and cryptosystems with the aim of understanding how they work and finding and improving techniques for defeating or weakening them. Question no 38: - What is encryption message: - Paswords are used for authentication to enter a system whereas cryptographic keys are used to read an encrypted message. Question no 39: Cryptographic algorithm: - A key is used by the software or human to process a meessage by using that key and the cryptographic algorithm. Question no 40: - Characteristics of a good password: - A strong password is: At least 12 characters long but 14 or more is better. A combination of uppercase letters, lowercase letters, numbers, and symbols. Not a word that can be found in a dictionary or the name of a person, character, product, or organization  At least 12 characters (required for your Muhlenberg password) —the more characters, the better.  A mixture of both uppercase and lowercase letters.  A mixture of letters and numbers.  Inclusion of at least one special character, e.g., @ #?] Question no 41: - What was cybercrime: - Cybercrime refers to illegal activities conducted in cyberspace, targeting computer systems, networks, and individuals for financial gain or disruption. These nefarious activities include phishing, ransomware attacks, identity theft, hacking, and distributed denial-of-service (DDoS) attacks, among others. Question no 42: - What is identity theft: - Identity theft is the crime of obtaining the personal or financial information of another person to use their identity to commit fraud, such as making unauthorized transactions or purchases. Question no 43: - What is transaction fraud: - Transaction fraud can be any type of purchase which was not authorized by a legitimate user. With credit cards, for instance, transaction fraud usually involves unauthorized use of a victim's credit card to make purchases. This would include purchases on lost or stolen cards, or on cards that were illegally obtained. Question no 44: - What is device advance fee farud: - Advance fee frauds ask investors to pay a fee up front – in advance of receiving any proceeds, money, stock, or warrants – in order for the deal to go through. The advance payment may be described as a fee, tax, commission, or incidental expense that will be repaid later. Question no 45: - What is hacking: - Another cybercrime is the practice of hacking,illegally accessing someone else‘s computer .this happens mostly when you download some file from internet and excute it without knowing. Question no 46: - What is piracy: - Priacy is also a type of a cybercrime.detail about piracy already discussed. Question no 47: - Characteristics of phishing email: - The most common indicators of a phishing attempt usually involve tone, grammar and urgency in an email message and subject line. Major warning signs in an email are: An unfamiliar greeting. Grammar errors and misspelled words. For example: - Creating first webpage and displaying : - Step 1: Open Notepad (PC) Windows 8 or later: ... Step 1: Open TextEdit (Mac) Open Finder > Applications > TextEdit. ... Step 2: Write Some HTML. Write or copy the following HTML code into Notepad: ... Step 3: Save the HTML Page. ... Step 4: View the HTML Page in Your Browser. Question no 6: - Identifying the tage used to markup html elements: - There are two type of tage in an html document  Paired tags  singular tags. Question no 7: - What is paired tags: - A tag is said to be a paired tag if the text is placed between a tag and its companion tag. In paired tags, the first tag is referred to as Opening Tag and the second tag is referred to as Closing Tag. Question no 8: - What is singular tage: - Some tags do not closing tage and they are called singular tage or empty tags. Question no 9: - What is Attributes in HML tage: - The <a> tag defines a hyperlink, which is used to link from one page to another. The most important attribute of the <a> element is the href attribute, which indicates the link's destination. By default, links will appear as follows in all browsers: An unvisited link is underlined and blue. Question no 10: - Main section in a webpage: - Html: - The html document begins with the tage <html> and end with <\ html>.it is the top level tagthat contains the whole contents of a webpage  Head section  Body section Question no 11: - What is head section: - The head tag is an HTML element used to define the head section of an HTML document. The head section contains metadata, which simply means data about data. This means information in the head tag is not displayed on the page but the information is used by browsers and by search engines. Question no 12: - What is body section: - A C++ function consist of two parts: Declaration: the return type, the name of the function, and parameters (if any) Definition: the body of the function (code to be executed) Question no 13: - Text formatting: - Text formatting is a feature in word processors used to change a text's appearance, such as its size and color. Most apps display these formatting options in the top toolbar and follow similar steps. Question no 14: - Content formatting in html: - A content format is an encoded format for converting a specific type of data to displayable information. Content formats are used in recording and transmission to prepare data for observation or interpretation. This includes both analog and digitized content. Question no 15: - What is Creating a paragraph: - A paragraph is a self-contained portion of your argument. Paragraphs will begin by making a claim that connects back to your thesis. The body of the paragraph will present the evidence, reasoning and conclusions that prove that claim. Question no 16: - What is insert line breaks: - The<br>element inserts a line break without starting a new paragraph. Question no 17: - What is insert spaces: - If you insert multiple spaces in a text,HTMLonly considers one space and ignores the other. Question no 18: - Add heading\sub-heading: - Heading are defined with the <h1> to <h6>tags.<h1> defined the most important heading.<h6> define the least important heading. Question no 19: - describe font size and font colour font face tag in html: - The font tag in HTML is used to set the font size, color, and face of the text in an HTML document. The font tag in HTML is used inside the <body> tag. The syntax of font tag in html is very simple : <font size=" " color=" " face=" "> Our Text </font>. The font tag in HTML supports all the Global Attributes. Question no 20: - What creating tables: - A Table is a combination of rows and columns. For creating a table we have to define the structure of a table by adding names to columns and providing data type and size of data to be stored in columns. Syntax: CREATE table table_name. End computer of note .
Docsity logo



Copyright © 2024 Ladybird Srl - Via Leonardo da Vinci 16, 10126, Torino, Italy - VAT 10816460017 - All rights reserved