IT1403: Internet and World Wide Web Multiple Choice Question Paper
|
|
- Annice Anderson
- 6 years ago
- Views:
Transcription
1 UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2007/ st Year Examination Semester 1 IT1403: Internet and World Wide Web Multiple Choice Question Paper 02 nd March, 2008 (TWO HOURS) Important Instructions : The duration of the paper is 2 (two) hours. The medium of instruction and questions is English. The paper has 45 questions and 08 pages. All questions are of the MCQ (Multiple Choice Questions) type. All questions should be answered. Each question will have 5 (five) choices with one or more correct answers. All questions will carry equal marks. There will be a penalty for incorrect responses to discourage guessing. The mark given for a question will vary from 0 to +1 (All the correct choices are marked & no incorrect choices are marked). Answers should be marked on the special answer sheet provided. Note that questions appear on both sides of the paper. If a page is not printed, please inform the supervisor immediately. Mark the correct choices on the question paper first and then transfer them to the given answer sheet which will be machine marked. Please completely read and follow the instructions given on the other side of the answer sheet before you shade your correct choices. 1
2 1) Internet (a) always contains reliable information. (b) uses TCP/IP protocol. (c) transmits data by packet switching. (d) transactions are always safe and secure. (e) is sometimes called the information superhighway. 2) Common use(s) of the Internet is(are) (a) . (b) WWW. (c) Remote access. (d) Collaboration. (e) File sharing. 3) The first web browser with a graphical user interface was 4) ISPs (a) Internet Explorer (b) NCSA Mosaic (c) Firefox (d) Safari (e) Opera (a) provide access to the Internet and related services to consumers or businesses. (b) provide domain name registering and hosting service. (c) do not provide web hosting. (d) always provide their services free of charge. (e) pay upstream ISPs for Internet access. 5) Select the correct statements related to IP addresses. (a) is a valid IP address. (b) address can be used to give a message to everyone in a network. (c) Domain names can be used instead of IP addresses. (d) IP addresses need not be fixed. (e) IPv6 allows a lesser number of computers to connect to the Internet than IPv4. 6) Following shows a comparison between the items of A and those of B. A Britannica online Personnel websites Wikipedia Blogging B What could be A and B respectively? (a) Google 1.0 and Google 2.0 (b) Web 1.0 and Web 2.0 (c) IE 1.0 and IE 2.0 (d) Internet1 and Internet2 (e) Yahoo and Google 7) Select the correct statements about the Domain Name System (DNS). (a) DNS keeps the mapping between the names, such as and the IP addresses associated with these names. (b) Domain names must start with (c) All domain names must start with www. (d) In the URL the index.html is part of the domain name. (e) There is only one server in the DNS system. 2
3 8) The blanks (i), (ii), (iii), (iv), (v) and (vi) in the following passage have to be filled using appropriate words. Web pages are written in (i), a simple language that allows to create (ii).links from one page to another. The look and feel of web pages can be controlled by style sheets written in.(iii). The protocol between the.(iv). and the (v) is..(vi) Which of the following gives an appropriate filling? (a) (i).http (ii).css (iii).hypertext (iv).html (v).web server (vi). Web browser (b) (i).html (ii).css (iii).hypertext (iv). Web server (v).web browser (vi). FTP (c) (i) HTTP (ii).hypertext (iii).css (iv).web server (v).web browser (vi).html (d) (i).html (ii).hypertext (iii).css (iv).web browser (v).web server (vi). HTTP (e) (i).http (ii).hypertext (iii). HTML (iv). Web server (v).web browser (vi). CSS 9) Select the protocol(s) which is(are) NOT associated with sending an . (a) SMTP (b) POP3 (c) IMAP (d) FTP (e) TCP 10) The protocol that allows clients to read and remove from a mailbox that resides on a server machine is (a) SMTP. (b) POP3. (c) HTTP. (d) FTP. (e) TCP. 11) The URL is incomplete, but if one type this in the browser, it completes the URL by adding the default protocol. The completed URL is (a) ftp:// (c) (e) tcp:// (b) (d) smtp:// 12) http is a protocol used for (a) communication between the web servers and the web browsers. (b) communication between the web servers. (c) communication between the web servers and mail servers. (d) communication between the mail servers. (e) communication between the mail servers and the FTP servers. 13) An HTML document contains the following line <H3> Hello World </H3>. It instructs the browser to (a) display Hello World in 3pt font. (b) display Hello World in 30pt font. (c) display Hello World as a level 3 header. (d) display Hello World as a header in a font which is 3 times as large as the default font. (e) display Hello World three times. 3
4 14) Select the correct statements about HTML. (a) HTML is case insensitive about tags. (b) HTML ignores the case of text between the tags <H1> and </H1>. (c) HTML ignores extra white spaces in texts. (d) If an opening tag is in upper case, the corresponding closing tag should be in upper case. (e) HTML is case insensitive about the tags and all the texts in html pages. 15) Select web servers from among the following. 16) A cookie is a(an) (a) Apache (b) Safari (c) Firefox (d) Internet explorer (e) Microsoft Internet Information Server (IIS) (a) text string that the web server sends to the browser to be stored in the clients machine. (b) Virus. (c) web client. (d) Firefox plugin. (e) image used to attract visitors to a website. 17) Select the web browsers from among the following. (a) Firefox (b) Safari (c) Apache (d) httpd (e) Microsoft Internet Information Server (IIS) 18) Consider the following statements related to WWW. i. Some operating systems are more secure to host as web servers than the others. ii. Dreamweaver is an example of a web authoring tool. iii. JavaScript is a scripting language most often used for client-side scripts. Which of the above statements is(are) true? (a) only (i) (b) only (ii) (c) only (i) and (ii) (d) only (i) and (iii) (e) All 19) Select incompatible set of words from among the following. (a) Mozilla, Safari, Opera (c) Skype, Linux, Unix (e) HTTP, FTP, TCP (b) AltaVista, Excite, Lycos (d) Amazon, Dell, ebay 20) Select the correct statements. (a) A dialup connection allows the user to use the telephone while being connected to the Internet. (b) An ADSL connection allows the user to use the telephone while being connected to the Internet. (c) ADSL uses a separate pair of wires unlike the telephone line to connect to the ISP. (d) In ADSL, upload speed is lower than the download speed. (e) ADSL is a wireless technology. 4
5 21) Select the correct statements. 22) Select the correct statements. 23) Select the correct statements. (a) The system can handle only ASCII text messages and therefore, binary files have to be encoded and sent as attachments. (b) Uuencode can be used to encode attachments. (c) Any type of file can be sent directly (not as an attachment) without encoding over . (d) Only uuencode can be used to encode attachments. (e) Only the encoding programs which are known to the mail servers (SMTP servers) can be used to encode attachments. (a) Any file type can be sent as an attachment. (b) Only files with jpg, bmp, doc, ppt, and pdf can be sent as attachments. (c) The recipient should have an MS Word program to receive an MS word file as an attachment. (d) To send and receive attachments, the sender s client and the receiver s client should have compatible encoding/decoding programs. (e) To send and receive attachments, both the sender and the receiver must use the same operating system. (a) PHP scripts are processed in the web server and the resulting output is sent to the browsers. (b) Web browsers execute the PHP code in web pages. (c) Javascript is another name for Java. (d) Javascripts in the web pages are executed at the server before they are sent to the browsers. (e) HTML documents can contain embedded JavaScripts. 24) ABC (abc@bit.lk) sends an to XYZ (xyz@ucsc.lk) and includes PQR (pqr@bit.lk) in the BCC: line. Select the correct statement(s) about this scenario (a) XYZ can see PQR s address. (b) PQR can see XYZ s address. (c) Both PQR and XYZ can see ABC s address. (d) XYZ cannot see PQR s address but PQR can see XYZ s address. (e) PQR cannot see ABC s address because PQR is included in the Blind Carbon Copy (BCC) line. 25) ABC (abc@bit.lk) sends an to XYZ (xyz@ucsc.lk) and includes PQR (pqr@bit.lk) in the CC: line. Select the correct statements about this scenario. (a) XYZ can see that ABC has send a copy to PQR (b) PQR cannot see XYZ s address (c) XYZ can see only the name of PQR but not his address (d) Neither XYZ nor PQR can see each others addresses in the received by them. (e) PQR cannot see the sender s address because he has included in the CC: line and not in the TO: line. 5
6 26) ABC sends an to XYZ with an attachment. He includes PQR in the BCC: line and LMN in the CC: line. Select the correct statements about this scenario. (a) Only XYZ receives the attachment. (b) Only XYZ and LMN get the attachment. (c) All recipients get the attachment. (d) Only XYX and PQR get the attachment. (e) ABC cannot send attachments because he has included recipients in the CC: line and the BCC: line. 27) Video conferencing over the Internet (a) allows one to share files and data. (b) allows only two parties to meet together at a time. (c) provides a means for communication and collaboration. (d) cannot be used to hold presentations. (e) can be used in teaching. 28) Which of the following statement(s) is(are) correct related to the Usenet. 29) bin command in FTP is used to 30) FTP 31) A blog (a) Usenet can be used to publish weather reports. (b) Usenet is the same as mailing lists. (c) One need to have the Newsreader program to post and read articles on the Usenet. (d) Usenet is organized into different newsgroups. (e) Newsgroups are always unmoderated groups. (a) set path to bin. (b) permanently delete a file. (c) switch to binary mode. (d) check the mode of data. (e) temporarily delete a file. (a) allows sharing of files over a network. (b) clients are available for both Linux and Windows.. (c) allows binary file exchange only. (d) enables direct access to all the resources in computers. (e) provides a reliable data transfer mechanism between computers. (a) can be used to share facts, ideas and opinions directly. (b) can contain links to other blogs. (c) contains frequently updated content written by one person. (d) is like a diary maintained by an individual. (e) generally consists of text and images. 32) Select those network services which are based on client-server architecture. (a) FTP (b) SSH (c) VNC (d) (e) Usenet 6
7 33) Which of the following help(s) one to make online life safer in connection with privacy? (a) Use a spyware tracker to remove spyware from the computer. (b) Never write passwords on paper. (c) Allow the execution of the active content such as JavaScript, only when the website prompts to do so. (d) Never give information to un-trusted parties. (e) Reply to all unsolicited s. 34) Match column X with column Y X Y (A) PayPal i. Assurance provider (B) ebay ii. Safer payments and money transfers (C) Verisign iii. Online auction (D) Amazon iv. Social networking (E) Facebook v. Virtual book store (a) (A) iv (B) iii (C) v (D) ii (E) i (c) (A) ii (B) iv (C) i (D) v (E) iii (e) (A) ii (B) iii (C) i (D) v (E) iv (b) (A) ii (B) i (C) iii (D) iv (E) v (d) (A) iii (B) ii (C) v (D) iv (E) i 35) Select the correct statement(s) related to dot-com organizations. (a) A dot-com company has a virtual store and does business only through the web. (b) Amazon is a famous dot-com company. (c) Dot-com company websites use the same top level domain. (d) Dot-com failures became common in early (e) During the Dot-com bubble, stock market prices of these companies were generally low. 36) Which of the following technologies can be used in elearning? (a) Text chat (b) Discussion boards (c) (d) Blogs (e) Wiki 37) Consider the following statements related to elearning. i. elearning cannot be used in conjunction with face-to-face teaching. ii. SCORM makes elearning content reusable and sharable. iii. Storyboarding tools can be used in designing elearning content. Which of the above statements is(are) correct? (a) only (i). (b) only (ii). (c) only (i) and (ii). (d) only (ii) and (iii). (e) All. 38) RSS (a) stands for Really Simple Syndication. (b) is a convenient way to get the news and information. (c) readers are not available for free. (d) feeds are not used by BBC to provide their content. (e) is a family of web feed formats. 39) Which of the following statements is/are true about a firewall? (a) It protects computers from overheating. (b) It blocks unauthorized traffic going through it. (c) There are two types of firewalls, hardware firewalls and liveware firewalls. (d) Hardware firewalls can defeat worms. (e) It is required to have a separate firewall for each computer in a private network. 7
8 40) Which of the following is/are true about data encryption? (a) It is the process of correctly identifying the parties involved in a communication by each party. (b) Certification authority is a trusted agency whose responsibility is to correctly encrypt the data. (c) The secret key cryptography uses two different keys to encrypt and decrypt the data. (d) In public key cryptography, each public party must be given a separate public key to encrypt the data. (e) It can be used to ensure the integrity and confidentiality of data. 41) Which of the following sets contains only secure protocols? (a) SET, HTTP, SSL (b) SFTP, SSL, SET (c) MIME, S-HTTP, SSL (d) FTP, SMTP, SSL (e) SMTP, SET, MIME 42) What is a spam in the context of ? (a) It is a virus attached to a document, so that when the document is opened the virus gets activated. (b) It infects the boot sector and gets activated when the operating system is loaded. (c) It is a virus designed to attack anti-virus software. (d) It is a computer program designed to collect information about the activities of the user. (e) It is unsolicited . 43) Which of the following is/are true about computer viruses? (a) Some computer viruses can make copies of themselves. (b) They cannot spread through attachments. (c) They do not spread through read-only CDs. (d) They can operate even after a computer system is powered down. (e) They are different from biological viruses. 44) Which of the following is/are true about password security? (a) Dictionary attack is an approach used by intruders to detect passwords of legitimate users. (b) Encrypted login protocols, such as SSH, can prevent sniffing of passwords in a network. (c) A good password can be created by combining words from a dictionary. (d) Passwords whose lengths are greater than six characters are unbreakable. (e) A good password has a mix of all lower and upper case letters, punctuation marks and numbers. 45) Assume that you are a member of a large online newsgroup. Which of the following is/are the best practice when dealing with this mailing group? (a) Get involved in all the group discussions without considering their relevance. (b) Send periodic s to the mail group to show your interest in that group. (c) When forwarding a message to a third party, always forward only the parts which you consider as relevant. (d) When replying to a message, quote only the relevant parts. (e) If it seems as if others are not interested on your s, then change the case of the message to upper case to get attention. ******** 8
IT1403 Internet and World Wide Web Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2008/2009 1 st Year Examination Semester 1 IT1403 Internet
More informationIT1404: Internet and World Wide Web Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2010/2011 1 st Year Examination Semester 1 IT1404: Internet
More informationIT1404 Internet and World Wide Web Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2009/2010 1 st Year Examination Semester 1 IT1404 Internet
More informationIT1404: Internet and World Wide Web Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2011/2012 1 st Year Examination Semester 1 IT1404: Internet
More informationElementary Computing CSC 100. M. Cheng, Computer Science
Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans
More informationOverview of the Internet
Overview of the Internet IVPR 1 Outline Goals and Objectives Topics headlines Introduction Internet and WWW Client/Server Model Diagnostic commands Evolution of Internet Transmission IP Addresses and Domain
More informationM3-R3: INTERNET AND WEB PAGE DESIGN
M3-R3: INTERNET AND WEB PAGE DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF
More informationThe Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.
Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,
More informationChapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.
Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area
More informationWeb Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery
Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers
More informationOutline. Web browsers & Web servers
Web browsers & Web servers 1 Outline Goals and Objectives Topics headlines Introduction Finding a web page Browser Tasks Top browsers Browser window structure Internet Explorer Netscape / Mozilla Opera
More information(electronic mail) is the exchange of computer-stored messages by telecommunication.
What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)
More informationELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12
ELECTRONIC MAIL RAYMOND ROSE Computer Technology Department 2011/12 ELECTRONIC COMMUNICATION Systems for exchanging information and news were the first applications developed for network communication.
More informationName: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.
Name: Class: Date: The Internet and WWW True/False Indicate whether the sentence or statement is true or false. 1. A search engine is a program that performs keyword searches for information on the Internet.
More informationM3-R3: INTERNET AND WEB DESIGN
M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER
More information1. Web Technology... 6
TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols
More informationSecurity+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems
Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define
More informationTHE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers
THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES Specimen Answers Question 1 DOM Document Object Model CSS Cascading Style Sheets XSL extensible Stylesheet
More informationM2-R4: INTERNET TECHNOLOGY AND WEB DESIGN
M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the
More informationChapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World
More informationChapter 4: Networking and the Internet
Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals
More informationThe internet and the web
1 The internet and the web Internet lunched in 1969 National computer network called: Advanced Research Project Agency Network (ARPANET). The internet is : -Large network that connects together smaller
More informationAn Overview of Webmail
An Overview of Webmail Table of Contents What browsers can I use to view my mail? ------------------------------------------------------- 3 Email size and storage limits -----------------------------------------------------------------------
More informationThe Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.
Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,
More informationSEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security
SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security Consider 2. Based on DNS, identified the IP address of www.cuhk.edu.hk is 137.189.11.73. 1. Go to http://www.cuhk.edu.hk 3. Forward the
More informatione-commerce Study Guide Test 2. Security Chapter 10
e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the
More informationMalware, , Database Security
Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)
More informationJianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.
Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Email: jh_zhang@hdu.edu.cn Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet
More informationThe Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)
The Internet, Intranets, and Extranets 1 The Internet The Internet is a collection of interconnected network of computers, all freely exchanging information. These computers use specialized software to
More informationSecure Recipient Guide
Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...
More informationComputer networks 2013
Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages
More informationINTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com
INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, 2016 * Sources include learnfree.org, PC World, wikpedia.com, techterms.com SOME QUESTIONS TO ASK YOURSELF. HAVE YOU.. 1. Googled yourself to see what
More informationSTUDY GUIDE CHAPTER 7
STUDY GUIDE CHAPTER 7 True/False Indicate whether the statement is true or false. 1. Every Web page has a unique address called a(n) Uniform Resource Locator. 2. Web 3.0 refers to innovations like cloud
More informationNetwork Applications and Protocols
Network Applications and Protocols VoIP (Voice over Internet Protocol) Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over
More informationMUSIC & THE INTERNET MUMT 301
MUSIC & THE INTERNET MUMT 301 Ichiro Fujinaga Schulich School of Music McGill University Plan Review of last class Introduction to the Internet The network Review of HTML Komodo Edit Assignment #1 Review
More informationNetworks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35
Networks, WWW, HTTP Web Technologies I. Zsolt Tóth University of Miskolc 2018 Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP 2018 1 / 35 Table of Contents Networks Internet 1 Networks Internet
More informationFTP,HTTP. By Nidhi Jindal
APPLICATION LAYER: SMTP, POP, IMAP, FTP,HTTP By Nidhi Jindal. MESSAGE TRANSFER AGENT: SMTP The actual mail transfer requires message transfer agents (MTAs). The protocol that defines the MTA client and
More informationIntroduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University
Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one
More information6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning
6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories
More informationVISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce
VISUAL SUMMARY The Internet, the Web, and Electronic Commerce INTERNET AND WEB Internet Launched in 1969 with ARPANET, the Internet consists of the actual physical network. Web Introduced in 1991 at CERN,
More informationChapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc.
Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security 4-2 Network Classifications
More informationConnecting with Computer Science Chapter 5 Review: Chapter Summary:
Chapter Summary: The Internet has revolutionized the world. The internet is just a giant collection of: WANs and LANs. The internet is not owned by any single person or entity. You connect to the Internet
More informationIT1304 PC Applications Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2011/2012 1 st Year Examination Semester 1 IT1304 PC Applications
More informationIT1305 Web Application Development I Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY ( EXTERNAL) Academic Year 2016 1 st Year Examination Semester 1 IT1305 Web Application
More informationUser Manual. version 1.6-r1
User Manual version 1.6-r1 Contents 1 What is Confixx? - General Information 4 1.1 Login................................ 4 1.2 Settings Lag............................ 5 2 The Sections of the Web Interface
More informationDiscovering Computers Chapter 2 The Internet and World Wide Web
Discovering Computers 2009 Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet
More information2. Introduction to Internet Applications
2. Introduction to Internet Applications 1. Representation and Transfer 2. Web Protocols 3. Some Other Application Layer Protocols 4. Uniform Resource Identifiers (URIs) 5. Uniform Resource Locators (URLs)
More informationUsing the Control Panel
Using the Control Panel Technical Manual: User Guide Creating a New Email Account 3. If prompted, select a domain from the list. Or, to change domains, click the change domain link. 4. Click the Add Mailbox
More informationFull file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T
More informationGetting Started With Web Mail
INET002 October 2005 Getting Started With Web Mail ITS Staff Overview Overview... 1 Logon and Logout... 2 Basic Navigation... 3 Basic Tasks... 3 Using Folders... 5 Attachments... 6 Address Book... 7 Options
More informationEmerging Technology in Business (CIW) Course Review (1 semester class) Course Number:
Unit 1: Your School Standards: 01.04, 02.01, 02.06 (School Website, Yearbook, Newspaper, Personnel Interviews) 1. List major clubs at your school: 2. What is the purpose of FBLA? 3. What services are available
More informationUnit 2 Assignment 2. Software Utilities?
1 Unit 2 Assignment 2 Software Utilities? OBJECTIVES Identify software utility types and examples of common software Why are software utilities used? Identify and describe the various networking threats.
More informationElectronic Mail (SMTP)
Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,
More informationShankersinh Vaghela Bapu Institue of Technology
Branch: - 6th Sem IT Year/Sem : - 3rd /2014 Subject & Subject Code : Faculty Name : - Nitin Padariya Pre Upload Date: 31/12/2013 Submission Date: 9/1/2014 [1] Explain the need of web server and web browser
More informationNetworks and Communications MS216 - Course Outline -
Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the
More informationFull file at
ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the
More informationChapter 2: Technology Infrastructure: The Internet and the World Wide Web
Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that
More informationSecurity and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1
Security and Privacy Xin Liu Computer Science University of California, Davis Introduction 1-1 What is network security? Confidentiality: only sender, intended receiver should understand message contents
More informationCreating your own Website
Park Street Camera Club Creating your own Website What is a web site A set of interconnected web pages, usually including a homepage, generally located on the same server, and prepared and maintained as
More informationFig (1) sending and receiving s
Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and
More informationHow the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson
How the Web Works Chapter 1 Modified by Marissa Schmidt 2015 Pearson Fundamentals ofhttp://www.funwebdev.com Web Development Objectives 1 Definitions and History 2 Internet Protocols 3 Client-Server Model
More informationThe Internet and World Wide Web. Chapter4
The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History
More informationDebian/GNU Linux Mailing
Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Mailing 1/67 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 TB-Preferences 7
More informationINTERNET SAFETY IS IMPORTANT
INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being
More informationOutside the Box: Networks and The Internet
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More informationChapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts
E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson
More information8 9 Before: Computers are categorized into three main categories from least to most powerful: microcomputers minicomputers mainframe computers Today:
1 Computer, Internet, and Network Basics 2 Computer Basics A computer system includes a computer, peripheral devices, and software Computer refers to a device that accepts data as input, processes data,
More informationHistory and Backgound: Internet & Web 2.0
1 History and Backgound: Internet & Web 2.0 History of the Internet and World Wide Web 2 ARPANET Implemented in late 1960 s by ARPA (Advanced Research Projects Agency of DOD) Networked computer systems
More informationDONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY
DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an
More informationUnit 4 The Web. Computer Concepts Unit Contents. 4 Web Overview. 4 Section A: Web Basics. 4 Evolution
Unit 4 The Web Computer Concepts 2016 ENHANCED EDITION 4 Unit Contents Section A: Web Basics Section B: Browsers Section C: HTML Section D: HTTP Section E: Search Engines 2 4 Section A: Web Basics 4 Web
More informationis still the most used Internet app. According to some studies around 85% of Internet users still use for communication.
1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a
More informationWeb Programming Paper Solution (Chapter wise)
Introduction to web technology Three tier/ n-tier architecture of web multitier architecture (often referred to as n-tier architecture) is a client server architecture in which presentation, application
More informationPractice Examination 3
Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination
More informationM2-R4: INTERNET TECHNOLOGY AND WEB DESIGN
M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the
More informationChapter 1 Introduction to HTML, XHTML, and CSS
Chapter 1 Introduction to HTML, XHTML, and CSS MULTIPLE CHOICE 1. The world s largest network is. a. the Internet c. Newsnet b. the World Wide Web d. both A and B A PTS: 1 REF: HTML 2 2. ISPs utilize data
More informationDeveloping Web Applications
Developing Web Applications Ralph Moseley Middlesex University IIICENTCNNIAL 1807 ewiley 2007 13ICCNTENNIAL John Wiley & Sons, Ltd Preface Introduction Features Additional Materials Trademarks Acknowledgments
More informationBinarytech Digital Education Karta Allahabad ( Notes)
Email Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people. E-Mail
More informationInternet Concepts ML Study Guide Created by Advisers
Description of Internet Concepts ML: The written objective test may consist of general information about the Internet, world wide web, browsers, e-mail, computer security, ethics, and privacy. 1 It is
More informationChapter 4 The Internet
Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3
More informationLesson 4: Web Browsing
Lesson 4: Web Browsing www.nearpod.com Session Code: 1 Video Lesson 4: Web Browsing Basic Functions of Web Browsers Provide a way for users to access and navigate Web pages Display Web pages properly Provide
More informationThe process by which a user can associate specific permissions to each username.
Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost
More informationMotivation For Networking. Information access Interaction among cooperative application programs Resource sharing
Motivation For Networking Information access Interaction among cooperative application programs Resource sharing CS422 -- PART 1 13 2003 Practical Results E-mail File transfer/access Web browsing Remote
More informationCTS2134 Introduction to Networking. Module 08: Network Security
CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting
More informationElectronic Mail
Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing
More informationElectronic Mail Paradigm
Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.
More informationWeb site Owners Guide (including domains, web pages and )
Hintlink Technology Web site Owners Guide (including domains, web pages and e-mail) Introduction Web sites and e-mail for different hosted domains at Hintlink Technology fall under the following categories:
More informationIntroduction. Logging in. WebQuarantine User Guide
Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine
More informationChapter 002 The Internet, the Web, and Electronic Commerce
Chapter 002 The Internet, the Web, and Electronic Commerce Multiple Choice Questions 1. Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially
More informationM+NetMail Client User Guide
M+NetMail Client User Guide Trademarks...M+NetMail TM, MyRealBox Apple Inc....Safari Microsoft Corporation...Outlook Express Mozilla... Thunderbird Novell, Inc...GroupWise QUALCOMM... Eudora Copyright
More informationAccessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message
WebMail Help User Manual Index Accessing WebMail Logging In Check your Mail Main Mail Screen Reading Messages Search Sending a new message Address book Spelling Attaching files Html Text Managing addresses
More informationDreamweaver is a full-featured Web application
Create a Dreamweaver Site Dreamweaver is a full-featured Web application development tool. Dreamweaver s features not only assist you with creating and editing Web pages, but also with managing and maintaining
More informationBEST PRACTICES FOR PERSONAL Security
BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple
More informationComputer Networks. Wenzhong Li. Nanjing University
Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content
More informationBasics of Web. First published on 3 July 2012 This is the 7 h Revised edition
First published on 3 July 2012 This is the 7 h Revised edition Updated on: 03 August 2015 DISCLAIMER The data in the tutorials is supposed to be one for reference. We have made sure that maximum errors
More informationOnline Communication. Chat Rooms Instant Messaging Blogging Social Media
Online Communication E-mail Chat Rooms Instant Messaging Blogging Social Media Advantages: Reduces cost of postage Fast and convenient Eliminates phone charges Disadvantages: May be difficult to understand
More informationCNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies
CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response
More informationHeader- A Forensic Key to Examine an
E-Mail Header- A Forensic Key to Examine an E-Mail Swapnil Gupta 1, Kopal Gupta 2, Dr. Anu Singla 3 1,2,3 Institute of Forensic Science & Criminology, Bundelkhand University, Jhansi (U.P.), India ---------------------------------------------------------------------***---------------------------------------------------------------------
More informationIT Information Systems & Technology Multiple Choice Question Paper
UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY ( EXTERNAL) Academic Year 2012/2013 1 st Year Examination Semester 1 IT1104 - Information
More informationInside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011
Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer
More information