IT1403: Internet and World Wide Web Multiple Choice Question Paper

Size: px
Start display at page:

Download "IT1403: Internet and World Wide Web Multiple Choice Question Paper"

Transcription

1 UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2007/ st Year Examination Semester 1 IT1403: Internet and World Wide Web Multiple Choice Question Paper 02 nd March, 2008 (TWO HOURS) Important Instructions : The duration of the paper is 2 (two) hours. The medium of instruction and questions is English. The paper has 45 questions and 08 pages. All questions are of the MCQ (Multiple Choice Questions) type. All questions should be answered. Each question will have 5 (five) choices with one or more correct answers. All questions will carry equal marks. There will be a penalty for incorrect responses to discourage guessing. The mark given for a question will vary from 0 to +1 (All the correct choices are marked & no incorrect choices are marked). Answers should be marked on the special answer sheet provided. Note that questions appear on both sides of the paper. If a page is not printed, please inform the supervisor immediately. Mark the correct choices on the question paper first and then transfer them to the given answer sheet which will be machine marked. Please completely read and follow the instructions given on the other side of the answer sheet before you shade your correct choices. 1

2 1) Internet (a) always contains reliable information. (b) uses TCP/IP protocol. (c) transmits data by packet switching. (d) transactions are always safe and secure. (e) is sometimes called the information superhighway. 2) Common use(s) of the Internet is(are) (a) . (b) WWW. (c) Remote access. (d) Collaboration. (e) File sharing. 3) The first web browser with a graphical user interface was 4) ISPs (a) Internet Explorer (b) NCSA Mosaic (c) Firefox (d) Safari (e) Opera (a) provide access to the Internet and related services to consumers or businesses. (b) provide domain name registering and hosting service. (c) do not provide web hosting. (d) always provide their services free of charge. (e) pay upstream ISPs for Internet access. 5) Select the correct statements related to IP addresses. (a) is a valid IP address. (b) address can be used to give a message to everyone in a network. (c) Domain names can be used instead of IP addresses. (d) IP addresses need not be fixed. (e) IPv6 allows a lesser number of computers to connect to the Internet than IPv4. 6) Following shows a comparison between the items of A and those of B. A Britannica online Personnel websites Wikipedia Blogging B What could be A and B respectively? (a) Google 1.0 and Google 2.0 (b) Web 1.0 and Web 2.0 (c) IE 1.0 and IE 2.0 (d) Internet1 and Internet2 (e) Yahoo and Google 7) Select the correct statements about the Domain Name System (DNS). (a) DNS keeps the mapping between the names, such as and the IP addresses associated with these names. (b) Domain names must start with (c) All domain names must start with www. (d) In the URL the index.html is part of the domain name. (e) There is only one server in the DNS system. 2

3 8) The blanks (i), (ii), (iii), (iv), (v) and (vi) in the following passage have to be filled using appropriate words. Web pages are written in (i), a simple language that allows to create (ii).links from one page to another. The look and feel of web pages can be controlled by style sheets written in.(iii). The protocol between the.(iv). and the (v) is..(vi) Which of the following gives an appropriate filling? (a) (i).http (ii).css (iii).hypertext (iv).html (v).web server (vi). Web browser (b) (i).html (ii).css (iii).hypertext (iv). Web server (v).web browser (vi). FTP (c) (i) HTTP (ii).hypertext (iii).css (iv).web server (v).web browser (vi).html (d) (i).html (ii).hypertext (iii).css (iv).web browser (v).web server (vi). HTTP (e) (i).http (ii).hypertext (iii). HTML (iv). Web server (v).web browser (vi). CSS 9) Select the protocol(s) which is(are) NOT associated with sending an . (a) SMTP (b) POP3 (c) IMAP (d) FTP (e) TCP 10) The protocol that allows clients to read and remove from a mailbox that resides on a server machine is (a) SMTP. (b) POP3. (c) HTTP. (d) FTP. (e) TCP. 11) The URL is incomplete, but if one type this in the browser, it completes the URL by adding the default protocol. The completed URL is (a) ftp:// (c) (e) tcp:// (b) (d) smtp:// 12) http is a protocol used for (a) communication between the web servers and the web browsers. (b) communication between the web servers. (c) communication between the web servers and mail servers. (d) communication between the mail servers. (e) communication between the mail servers and the FTP servers. 13) An HTML document contains the following line <H3> Hello World </H3>. It instructs the browser to (a) display Hello World in 3pt font. (b) display Hello World in 30pt font. (c) display Hello World as a level 3 header. (d) display Hello World as a header in a font which is 3 times as large as the default font. (e) display Hello World three times. 3

4 14) Select the correct statements about HTML. (a) HTML is case insensitive about tags. (b) HTML ignores the case of text between the tags <H1> and </H1>. (c) HTML ignores extra white spaces in texts. (d) If an opening tag is in upper case, the corresponding closing tag should be in upper case. (e) HTML is case insensitive about the tags and all the texts in html pages. 15) Select web servers from among the following. 16) A cookie is a(an) (a) Apache (b) Safari (c) Firefox (d) Internet explorer (e) Microsoft Internet Information Server (IIS) (a) text string that the web server sends to the browser to be stored in the clients machine. (b) Virus. (c) web client. (d) Firefox plugin. (e) image used to attract visitors to a website. 17) Select the web browsers from among the following. (a) Firefox (b) Safari (c) Apache (d) httpd (e) Microsoft Internet Information Server (IIS) 18) Consider the following statements related to WWW. i. Some operating systems are more secure to host as web servers than the others. ii. Dreamweaver is an example of a web authoring tool. iii. JavaScript is a scripting language most often used for client-side scripts. Which of the above statements is(are) true? (a) only (i) (b) only (ii) (c) only (i) and (ii) (d) only (i) and (iii) (e) All 19) Select incompatible set of words from among the following. (a) Mozilla, Safari, Opera (c) Skype, Linux, Unix (e) HTTP, FTP, TCP (b) AltaVista, Excite, Lycos (d) Amazon, Dell, ebay 20) Select the correct statements. (a) A dialup connection allows the user to use the telephone while being connected to the Internet. (b) An ADSL connection allows the user to use the telephone while being connected to the Internet. (c) ADSL uses a separate pair of wires unlike the telephone line to connect to the ISP. (d) In ADSL, upload speed is lower than the download speed. (e) ADSL is a wireless technology. 4

5 21) Select the correct statements. 22) Select the correct statements. 23) Select the correct statements. (a) The system can handle only ASCII text messages and therefore, binary files have to be encoded and sent as attachments. (b) Uuencode can be used to encode attachments. (c) Any type of file can be sent directly (not as an attachment) without encoding over . (d) Only uuencode can be used to encode attachments. (e) Only the encoding programs which are known to the mail servers (SMTP servers) can be used to encode attachments. (a) Any file type can be sent as an attachment. (b) Only files with jpg, bmp, doc, ppt, and pdf can be sent as attachments. (c) The recipient should have an MS Word program to receive an MS word file as an attachment. (d) To send and receive attachments, the sender s client and the receiver s client should have compatible encoding/decoding programs. (e) To send and receive attachments, both the sender and the receiver must use the same operating system. (a) PHP scripts are processed in the web server and the resulting output is sent to the browsers. (b) Web browsers execute the PHP code in web pages. (c) Javascript is another name for Java. (d) Javascripts in the web pages are executed at the server before they are sent to the browsers. (e) HTML documents can contain embedded JavaScripts. 24) ABC (abc@bit.lk) sends an to XYZ (xyz@ucsc.lk) and includes PQR (pqr@bit.lk) in the BCC: line. Select the correct statement(s) about this scenario (a) XYZ can see PQR s address. (b) PQR can see XYZ s address. (c) Both PQR and XYZ can see ABC s address. (d) XYZ cannot see PQR s address but PQR can see XYZ s address. (e) PQR cannot see ABC s address because PQR is included in the Blind Carbon Copy (BCC) line. 25) ABC (abc@bit.lk) sends an to XYZ (xyz@ucsc.lk) and includes PQR (pqr@bit.lk) in the CC: line. Select the correct statements about this scenario. (a) XYZ can see that ABC has send a copy to PQR (b) PQR cannot see XYZ s address (c) XYZ can see only the name of PQR but not his address (d) Neither XYZ nor PQR can see each others addresses in the received by them. (e) PQR cannot see the sender s address because he has included in the CC: line and not in the TO: line. 5

6 26) ABC sends an to XYZ with an attachment. He includes PQR in the BCC: line and LMN in the CC: line. Select the correct statements about this scenario. (a) Only XYZ receives the attachment. (b) Only XYZ and LMN get the attachment. (c) All recipients get the attachment. (d) Only XYX and PQR get the attachment. (e) ABC cannot send attachments because he has included recipients in the CC: line and the BCC: line. 27) Video conferencing over the Internet (a) allows one to share files and data. (b) allows only two parties to meet together at a time. (c) provides a means for communication and collaboration. (d) cannot be used to hold presentations. (e) can be used in teaching. 28) Which of the following statement(s) is(are) correct related to the Usenet. 29) bin command in FTP is used to 30) FTP 31) A blog (a) Usenet can be used to publish weather reports. (b) Usenet is the same as mailing lists. (c) One need to have the Newsreader program to post and read articles on the Usenet. (d) Usenet is organized into different newsgroups. (e) Newsgroups are always unmoderated groups. (a) set path to bin. (b) permanently delete a file. (c) switch to binary mode. (d) check the mode of data. (e) temporarily delete a file. (a) allows sharing of files over a network. (b) clients are available for both Linux and Windows.. (c) allows binary file exchange only. (d) enables direct access to all the resources in computers. (e) provides a reliable data transfer mechanism between computers. (a) can be used to share facts, ideas and opinions directly. (b) can contain links to other blogs. (c) contains frequently updated content written by one person. (d) is like a diary maintained by an individual. (e) generally consists of text and images. 32) Select those network services which are based on client-server architecture. (a) FTP (b) SSH (c) VNC (d) (e) Usenet 6

7 33) Which of the following help(s) one to make online life safer in connection with privacy? (a) Use a spyware tracker to remove spyware from the computer. (b) Never write passwords on paper. (c) Allow the execution of the active content such as JavaScript, only when the website prompts to do so. (d) Never give information to un-trusted parties. (e) Reply to all unsolicited s. 34) Match column X with column Y X Y (A) PayPal i. Assurance provider (B) ebay ii. Safer payments and money transfers (C) Verisign iii. Online auction (D) Amazon iv. Social networking (E) Facebook v. Virtual book store (a) (A) iv (B) iii (C) v (D) ii (E) i (c) (A) ii (B) iv (C) i (D) v (E) iii (e) (A) ii (B) iii (C) i (D) v (E) iv (b) (A) ii (B) i (C) iii (D) iv (E) v (d) (A) iii (B) ii (C) v (D) iv (E) i 35) Select the correct statement(s) related to dot-com organizations. (a) A dot-com company has a virtual store and does business only through the web. (b) Amazon is a famous dot-com company. (c) Dot-com company websites use the same top level domain. (d) Dot-com failures became common in early (e) During the Dot-com bubble, stock market prices of these companies were generally low. 36) Which of the following technologies can be used in elearning? (a) Text chat (b) Discussion boards (c) (d) Blogs (e) Wiki 37) Consider the following statements related to elearning. i. elearning cannot be used in conjunction with face-to-face teaching. ii. SCORM makes elearning content reusable and sharable. iii. Storyboarding tools can be used in designing elearning content. Which of the above statements is(are) correct? (a) only (i). (b) only (ii). (c) only (i) and (ii). (d) only (ii) and (iii). (e) All. 38) RSS (a) stands for Really Simple Syndication. (b) is a convenient way to get the news and information. (c) readers are not available for free. (d) feeds are not used by BBC to provide their content. (e) is a family of web feed formats. 39) Which of the following statements is/are true about a firewall? (a) It protects computers from overheating. (b) It blocks unauthorized traffic going through it. (c) There are two types of firewalls, hardware firewalls and liveware firewalls. (d) Hardware firewalls can defeat worms. (e) It is required to have a separate firewall for each computer in a private network. 7

8 40) Which of the following is/are true about data encryption? (a) It is the process of correctly identifying the parties involved in a communication by each party. (b) Certification authority is a trusted agency whose responsibility is to correctly encrypt the data. (c) The secret key cryptography uses two different keys to encrypt and decrypt the data. (d) In public key cryptography, each public party must be given a separate public key to encrypt the data. (e) It can be used to ensure the integrity and confidentiality of data. 41) Which of the following sets contains only secure protocols? (a) SET, HTTP, SSL (b) SFTP, SSL, SET (c) MIME, S-HTTP, SSL (d) FTP, SMTP, SSL (e) SMTP, SET, MIME 42) What is a spam in the context of ? (a) It is a virus attached to a document, so that when the document is opened the virus gets activated. (b) It infects the boot sector and gets activated when the operating system is loaded. (c) It is a virus designed to attack anti-virus software. (d) It is a computer program designed to collect information about the activities of the user. (e) It is unsolicited . 43) Which of the following is/are true about computer viruses? (a) Some computer viruses can make copies of themselves. (b) They cannot spread through attachments. (c) They do not spread through read-only CDs. (d) They can operate even after a computer system is powered down. (e) They are different from biological viruses. 44) Which of the following is/are true about password security? (a) Dictionary attack is an approach used by intruders to detect passwords of legitimate users. (b) Encrypted login protocols, such as SSH, can prevent sniffing of passwords in a network. (c) A good password can be created by combining words from a dictionary. (d) Passwords whose lengths are greater than six characters are unbreakable. (e) A good password has a mix of all lower and upper case letters, punctuation marks and numbers. 45) Assume that you are a member of a large online newsgroup. Which of the following is/are the best practice when dealing with this mailing group? (a) Get involved in all the group discussions without considering their relevance. (b) Send periodic s to the mail group to show your interest in that group. (c) When forwarding a message to a third party, always forward only the parts which you consider as relevant. (d) When replying to a message, quote only the relevant parts. (e) If it seems as if others are not interested on your s, then change the case of the message to upper case to get attention. ******** 8

IT1403 Internet and World Wide Web Multiple Choice Question Paper

IT1403 Internet and World Wide Web Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2008/2009 1 st Year Examination Semester 1 IT1403 Internet

More information

IT1404: Internet and World Wide Web Multiple Choice Question Paper

IT1404: Internet and World Wide Web Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2010/2011 1 st Year Examination Semester 1 IT1404: Internet

More information

IT1404 Internet and World Wide Web Multiple Choice Question Paper

IT1404 Internet and World Wide Web Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2009/2010 1 st Year Examination Semester 1 IT1404 Internet

More information

IT1404: Internet and World Wide Web Multiple Choice Question Paper

IT1404: Internet and World Wide Web Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2011/2012 1 st Year Examination Semester 1 IT1404: Internet

More information

Elementary Computing CSC 100. M. Cheng, Computer Science

Elementary Computing CSC 100. M. Cheng, Computer Science Elementary Computing CSC 100 1 Internet (2) TCP/IP and IP Addresses Hostnames and Domain Name System Internet Services Client/Server and Peer- 2- Peer Applications SPAMs & Phishing, Worms, Viruses & Trojans

More information

Overview of the Internet

Overview of the Internet Overview of the Internet IVPR 1 Outline Goals and Objectives Topics headlines Introduction Internet and WWW Client/Server Model Diagnostic commands Evolution of Internet Transmission IP Addresses and Domain

More information

M3-R3: INTERNET AND WEB PAGE DESIGN

M3-R3: INTERNET AND WEB PAGE DESIGN M3-R3: INTERNET AND WEB PAGE DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF

More information

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved. Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,

More information

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks. Chapter 4: Networking and the 4.1 Network Fundamentals 4.2 The 4.3 The World Wide Web 4.4 Protocols 4.5 Security Network Classifications Scope Local area network (LAN) Metropolitan area (MAN) Wide area

More information

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Web Mechanisms Draft: 2/23/13 6:54 PM 2013 Christopher Vickery Introduction While it is perfectly possible to create web sites that work without knowing any of their underlying mechanisms, web developers

More information

Outline. Web browsers & Web servers

Outline. Web browsers & Web servers Web browsers & Web servers 1 Outline Goals and Objectives Topics headlines Introduction Finding a web page Browser Tasks Top browsers Browser window structure Internet Explorer Netscape / Mozilla Opera

More information

(electronic mail) is the exchange of computer-stored messages by telecommunication.

(electronic mail) is the exchange of computer-stored messages by telecommunication. What is email? E-mail (electronic mail) is the exchange of computer-stored messages by telecommunication. E-mail is one of the protocols included with the Transport Control Protocol/Internet Protocol (TCP/IP)

More information

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12 ELECTRONIC MAIL RAYMOND ROSE Computer Technology Department 2011/12 ELECTRONIC COMMUNICATION Systems for exchanging information and news were the first applications developed for network communication.

More information

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question. Name: Class: Date: The Internet and WWW True/False Indicate whether the sentence or statement is true or false. 1. A search engine is a program that performs keyword searches for information on the Internet.

More information

M3-R3: INTERNET AND WEB DESIGN

M3-R3: INTERNET AND WEB DESIGN M3-R3: INTERNET AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER

More information

1. Web Technology... 6

1. Web Technology... 6 TABLE OF CONTENTS 1. Web Technology... 6 1.1. Introduction (Hypertext, URL, Domain Name)...6 1.2. Web Browser and ISP...8 1.3. Upload and download files...10 1.4. Control of Internet...10 2. E-mail components

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 2015 Pearson Education Limited 2015 Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols

More information

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems Security+ Guide to Network Security Fundamentals, Third Edition Chapter 3 Protecting Systems Objectives Explain how to harden operating systems List ways to prevent attacks through a Web browser Define

More information

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES Specimen Answers Question 1 DOM Document Object Model CSS Cascading Style Sheets XSL extensible Stylesheet

More information

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the

More information

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued) Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World

More information

Chapter 4: Networking and the Internet

Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet Computer Science: An Overview Eleventh Edition by J. Glenn Brookshear Copyright 2012 Pearson Education, Inc. Chapter 4: Networking and the Internet 4.1 Network Fundamentals

More information

The internet and the web

The internet and the web 1 The internet and the web Internet lunched in 1969 National computer network called: Advanced Research Project Agency Network (ARPANET). The internet is : -Large network that connects together smaller

More information

An Overview of Webmail

An Overview of Webmail An Overview of Webmail Table of Contents What browsers can I use to view my mail? ------------------------------------------------------- 3 Email size and storage limits -----------------------------------------------------------------------

More information

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved. Discuss the origins of the Internet and the Web. Describe how to access the Web using providers and browsers. Discuss Internet communications, including e- mail, instant messaging, social networking, blogs,

More information

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security Consider 2. Based on DNS, identified the IP address of www.cuhk.edu.hk is 137.189.11.73. 1. Go to http://www.cuhk.edu.hk 3. Forward the

More information

e-commerce Study Guide Test 2. Security Chapter 10

e-commerce Study Guide Test 2. Security Chapter 10 e-commerce Study Guide Test 2. Security Chapter 10 True/False Indicate whether the sentence or statement is true or false. 1. Necessity refers to preventing data delays or denials (removal) within the

More information

Malware, , Database Security

Malware,  , Database Security Malware, E-mail, Database Security Malware A general term for all kinds of software with a malign purpose Viruses, Trojan horses, worms etc. Created on purpose Can Prevent correct use of resources (DoS)

More information

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ. Email: jh_zhang@hdu.edu.cn Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet

More information

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP) The Internet, Intranets, and Extranets 1 The Internet The Internet is a collection of interconnected network of computers, all freely exchanging information. These computers use specialized software to

More information

Secure Recipient Guide

Secure  Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

Computer networks 2013

Computer networks 2013 Chapter 4 EXERCISE 1 1 Describe what is meant by each of the following: a Router b Bridge c Proxy server Answers: see the Glossary. 2 Many small businesses have computer networks. a List three advantages

More information

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, 2016 * Sources include learnfree.org, PC World, wikpedia.com, techterms.com SOME QUESTIONS TO ASK YOURSELF. HAVE YOU.. 1. Googled yourself to see what

More information

STUDY GUIDE CHAPTER 7

STUDY GUIDE CHAPTER 7 STUDY GUIDE CHAPTER 7 True/False Indicate whether the statement is true or false. 1. Every Web page has a unique address called a(n) Uniform Resource Locator. 2. Web 3.0 refers to innovations like cloud

More information

Network Applications and Protocols

Network Applications and Protocols Network Applications and Protocols VoIP (Voice over Internet Protocol) Voice over IP (VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over

More information

MUSIC & THE INTERNET MUMT 301

MUSIC & THE INTERNET MUMT 301 MUSIC & THE INTERNET MUMT 301 Ichiro Fujinaga Schulich School of Music McGill University Plan Review of last class Introduction to the Internet The network Review of HTML Komodo Edit Assignment #1 Review

More information

Networks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35

Networks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35 Networks, WWW, HTTP Web Technologies I. Zsolt Tóth University of Miskolc 2018 Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP 2018 1 / 35 Table of Contents Networks Internet 1 Networks Internet

More information

FTP,HTTP. By Nidhi Jindal

FTP,HTTP. By Nidhi Jindal APPLICATION LAYER: SMTP, POP, IMAP, FTP,HTTP By Nidhi Jindal. MESSAGE TRANSFER AGENT: SMTP The actual mail transfer requires message transfer agents (MTAs). The protocol that defines the MTA client and

More information

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Introduction to Computer Science William Hsu Department of Computer Science and Engineering National Taiwan Ocean University Chapter 4: Networking and the Internet No one owns the Internet, and only one

More information

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning 6 Computer Networks 6.1 Foundations of Computer Science Cengage Learning Objectives After studying this chapter, the student should be able to: 6.2 Describe network criteria, physical structures and categories

More information

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce VISUAL SUMMARY The Internet, the Web, and Electronic Commerce INTERNET AND WEB Internet Launched in 1969 with ARPANET, the Internet consists of the actual physical network. Web Introduced in 1991 at CERN,

More information

Chapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc.

Chapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc. Chapter 4: Networking and the Internet Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3 The World Wide Web 4.4 Internet Protocols 4.5 Security 4-2 Network Classifications

More information

Connecting with Computer Science Chapter 5 Review: Chapter Summary:

Connecting with Computer Science Chapter 5 Review: Chapter Summary: Chapter Summary: The Internet has revolutionized the world. The internet is just a giant collection of: WANs and LANs. The internet is not owned by any single person or entity. You connect to the Internet

More information

IT1304 PC Applications Multiple Choice Question Paper

IT1304 PC Applications Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2011/2012 1 st Year Examination Semester 1 IT1304 PC Applications

More information

IT1305 Web Application Development I Multiple Choice Question Paper

IT1305 Web Application Development I Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY ( EXTERNAL) Academic Year 2016 1 st Year Examination Semester 1 IT1305 Web Application

More information

User Manual. version 1.6-r1

User Manual. version 1.6-r1 User Manual version 1.6-r1 Contents 1 What is Confixx? - General Information 4 1.1 Login................................ 4 1.2 Settings Lag............................ 5 2 The Sections of the Web Interface

More information

Discovering Computers Chapter 2 The Internet and World Wide Web

Discovering Computers Chapter 2 The Internet and World Wide Web Discovering Computers 2009 Chapter 2 The Internet and World Wide Web Chapter 2 Objectives Discuss the history of the Internet Describe the types of Web sites Explain how to access and connect to the Internet

More information

2. Introduction to Internet Applications

2. Introduction to Internet Applications 2. Introduction to Internet Applications 1. Representation and Transfer 2. Web Protocols 3. Some Other Application Layer Protocols 4. Uniform Resource Identifiers (URIs) 5. Uniform Resource Locators (URLs)

More information

Using the Control Panel

Using the Control Panel Using the Control Panel Technical Manual: User Guide Creating a New Email Account 3. If prompted, select a domain from the list. Or, to change domains, click the change domain link. 4. Click the Add Mailbox

More information

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Full file at   Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web TRUE/FALSE 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. T

More information

Getting Started With Web Mail

Getting Started With Web Mail INET002 October 2005 Getting Started With Web Mail ITS Staff Overview Overview... 1 Logon and Logout... 2 Basic Navigation... 3 Basic Tasks... 3 Using Folders... 5 Attachments... 6 Address Book... 7 Options

More information

Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number:

Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number: Unit 1: Your School Standards: 01.04, 02.01, 02.06 (School Website, Yearbook, Newspaper, Personnel Interviews) 1. List major clubs at your school: 2. What is the purpose of FBLA? 3. What services are available

More information

Unit 2 Assignment 2. Software Utilities?

Unit 2 Assignment 2. Software Utilities? 1 Unit 2 Assignment 2 Software Utilities? OBJECTIVES Identify software utility types and examples of common software Why are software utilities used? Identify and describe the various networking threats.

More information

Electronic Mail (SMTP)

Electronic Mail (SMTP) Electronic Mail (SMTP) Nowadays email is more popular than the paper letters called snail-mails. It is a form of network communication. Some of the other forms of network communication being voice-over-internet,

More information

Shankersinh Vaghela Bapu Institue of Technology

Shankersinh Vaghela Bapu Institue of Technology Branch: - 6th Sem IT Year/Sem : - 3rd /2014 Subject & Subject Code : Faculty Name : - Nitin Padariya Pre Upload Date: 31/12/2013 Submission Date: 9/1/2014 [1] Explain the need of web server and web browser

More information

Networks and Communications MS216 - Course Outline -

Networks and Communications MS216 - Course Outline - Networks and Communications MS216 - Course Outline - Objective Lecturer Times Overall Learning Outcomes Format Programme(s) The objective of this course is to develop in students an understanding of the

More information

Full file at

Full file at ch02 True/False Indicate whether the statement is true or false. 1. Computer networks and the Internet form the basic technology structure that underlies all electronic commerce. 2. The USENET was the

More information

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Chapter 2: Technology Infrastructure: The Internet and the World Wide Web Student: 1. Networks of computers and the Internet that connects them to each other form the basic technological structure that

More information

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1 Security and Privacy Xin Liu Computer Science University of California, Davis Introduction 1-1 What is network security? Confidentiality: only sender, intended receiver should understand message contents

More information

Creating your own Website

Creating your own Website Park Street Camera Club Creating your own Website What is a web site A set of interconnected web pages, usually including a homepage, generally located on the same server, and prepared and maintained as

More information

Fig (1) sending and receiving s

Fig (1) sending and receiving  s Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and

More information

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson How the Web Works Chapter 1 Modified by Marissa Schmidt 2015 Pearson Fundamentals ofhttp://www.funwebdev.com Web Development Objectives 1 Definitions and History 2 Internet Protocols 3 Client-Server Model

More information

The Internet and World Wide Web. Chapter4

The Internet and World Wide Web. Chapter4 The Internet and World Wide Web Chapter4 ITBIS105 IS-IT-UOB 2016 The Internet What is the Internet? Worldwide collection of millions of computers networks that connects ITBIS105 IS-IT-UOB 2016 2 History

More information

Debian/GNU Linux Mailing

Debian/GNU Linux Mailing Debian/GNU Linux Mailing Overview of the Mailing Károly Erdei October 15, 2014 Károly Erdei Debian/GNU Linux Mailing 1/67 Agenda 1 Mailing 2 Protocols 3 SPAM 4 Antispam 5 Thunderbird 6 TB-Preferences 7

More information

INTERNET SAFETY IS IMPORTANT

INTERNET SAFETY IS IMPORTANT INTERNET SAFETY IS IMPORTANT Internet safety is not just the ability to avoid dangerous websites, scams, or hacking. It s the idea that knowledge of how the internet works is just as important as being

More information

Outside the Box: Networks and The Internet

Outside the Box: Networks and The Internet Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts E-commerce 2015 business. technology. society. eleventh edition Kenneth C. Laudon Carol Guercio Traver Chapter 3 E-commerce Infrastructure: The Internet, Web, and Mobile Platform Copyright 2015 Pearson

More information

8 9 Before: Computers are categorized into three main categories from least to most powerful: microcomputers minicomputers mainframe computers Today:

8 9 Before: Computers are categorized into three main categories from least to most powerful: microcomputers minicomputers mainframe computers Today: 1 Computer, Internet, and Network Basics 2 Computer Basics A computer system includes a computer, peripheral devices, and software Computer refers to a device that accepts data as input, processes data,

More information

History and Backgound: Internet & Web 2.0

History and Backgound: Internet & Web 2.0 1 History and Backgound: Internet & Web 2.0 History of the Internet and World Wide Web 2 ARPANET Implemented in late 1960 s by ARPA (Advanced Research Projects Agency of DOD) Networked computer systems

More information

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY Published By: Fusion Factor Corporation 2647 Gateway Road Ste 105-303 Carlsbad, CA 92009 USA 1.0 Overview Fusion Factor s intentions for publishing an

More information

Unit 4 The Web. Computer Concepts Unit Contents. 4 Web Overview. 4 Section A: Web Basics. 4 Evolution

Unit 4 The Web. Computer Concepts Unit Contents. 4 Web Overview. 4 Section A: Web Basics. 4 Evolution Unit 4 The Web Computer Concepts 2016 ENHANCED EDITION 4 Unit Contents Section A: Web Basics Section B: Browsers Section C: HTML Section D: HTTP Section E: Search Engines 2 4 Section A: Web Basics 4 Web

More information

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

is still the most used Internet app. According to some studies around 85% of Internet users still use  for communication. 1 E-mail is still the most used Internet app. According to some studies around 85% of Internet users still use e-mail for communication. Electronic mail is a method to exchange digital messages from a

More information

Web Programming Paper Solution (Chapter wise)

Web Programming Paper Solution (Chapter wise) Introduction to web technology Three tier/ n-tier architecture of web multitier architecture (often referred to as n-tier architecture) is a client server architecture in which presentation, application

More information

Practice Examination 3

Practice Examination 3 Name Date Click here to enter text. Click here to enter text. Pearson BTEC Level 1 / Level 2 First Information and Creative Technology Unit 1: The Online World Practice Examination 3 This practice examination

More information

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the

More information

Chapter 1 Introduction to HTML, XHTML, and CSS

Chapter 1 Introduction to HTML, XHTML, and CSS Chapter 1 Introduction to HTML, XHTML, and CSS MULTIPLE CHOICE 1. The world s largest network is. a. the Internet c. Newsnet b. the World Wide Web d. both A and B A PTS: 1 REF: HTML 2 2. ISPs utilize data

More information

Developing Web Applications

Developing Web Applications Developing Web Applications Ralph Moseley Middlesex University IIICENTCNNIAL 1807 ewiley 2007 13ICCNTENNIAL John Wiley & Sons, Ltd Preface Introduction Features Additional Materials Trademarks Acknowledgments

More information

Binarytech Digital Education Karta Allahabad ( Notes)

Binarytech Digital Education Karta Allahabad ( Notes) Email Email is a service which allows us to send the message in electronic mode over the internet. It offers an efficient, inexpensive and real time mean of distributing information among people. E-Mail

More information

Internet Concepts ML Study Guide Created by Advisers

Internet Concepts ML Study Guide Created by Advisers Description of Internet Concepts ML: The written objective test may consist of general information about the Internet, world wide web, browsers, e-mail, computer security, ethics, and privacy. 1 It is

More information

Chapter 4 The Internet

Chapter 4 The Internet Chapter 4 The Internet Dr. Farzana Rahman Assistant Professor Department of Computer Science James Madison University Chapter 4: Networking and the Internet 4.1 Network Fundamentals 4.2 The Internet 4.3

More information

Lesson 4: Web Browsing

Lesson 4: Web Browsing Lesson 4: Web Browsing www.nearpod.com Session Code: 1 Video Lesson 4: Web Browsing Basic Functions of Web Browsers Provide a way for users to access and navigate Web pages Display Web pages properly Provide

More information

The process by which a user can associate specific permissions to each username.

The process by which a user can associate specific permissions to each username. Jargon Buster A Antispyware A program that detects and removes malicious programs on your computer called spyware. Once it is installed can collect information without the users consent, that can be almost

More information

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing Motivation For Networking Information access Interaction among cooperative application programs Resource sharing CS422 -- PART 1 13 2003 Practical Results E-mail File transfer/access Web browsing Remote

More information

CTS2134 Introduction to Networking. Module 08: Network Security

CTS2134 Introduction to Networking. Module 08: Network Security CTS2134 Introduction to Networking Module 08: Network Security Denial of Service (DoS) DoS (Denial of Service) attack impacts system availability by flooding the target system with traffic or by exploiting

More information

Electronic Mail

Electronic Mail Email Electronic Mail Electronic mail paradigm Most heavily used application on any network Electronic version of paper-based office memo Quick, low-overhead written communication Dates back to time-sharing

More information

Electronic Mail Paradigm

Electronic Mail Paradigm Electronic Mail Paradigm E-mail uses the client-server model. E-mail was designed as an electronic extension of the old paper office memo. - A quick and easy means of low-overhead written communication.

More information

Web site Owners Guide (including domains, web pages and )

Web site Owners Guide (including domains, web pages and  ) Hintlink Technology Web site Owners Guide (including domains, web pages and e-mail) Introduction Web sites and e-mail for different hosted domains at Hintlink Technology fall under the following categories:

More information

Introduction. Logging in. WebQuarantine User Guide

Introduction. Logging in. WebQuarantine User Guide Introduction modusgate s WebQuarantine is a web application that allows you to access and manage your email quarantine. This user guide walks you through the tasks of managing your emails using the WebQuarantine

More information

Chapter 002 The Internet, the Web, and Electronic Commerce

Chapter 002 The Internet, the Web, and Electronic Commerce Chapter 002 The Internet, the Web, and Electronic Commerce Multiple Choice Questions 1. Launched in 1969 as a U.S. funded project that developed a national computer network, the Internet was initially

More information

M+NetMail Client User Guide

M+NetMail Client User Guide M+NetMail Client User Guide Trademarks...M+NetMail TM, MyRealBox Apple Inc....Safari Microsoft Corporation...Outlook Express Mozilla... Thunderbird Novell, Inc...GroupWise QUALCOMM... Eudora Copyright

More information

Accessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message

Accessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message WebMail Help User Manual Index Accessing WebMail Logging In Check your Mail Main Mail Screen Reading Messages Search Sending a new message Address book Spelling Attaching files Html Text Managing addresses

More information

Dreamweaver is a full-featured Web application

Dreamweaver is a full-featured Web application Create a Dreamweaver Site Dreamweaver is a full-featured Web application development tool. Dreamweaver s features not only assist you with creating and editing Web pages, but also with managing and maintaining

More information

BEST PRACTICES FOR PERSONAL Security

BEST PRACTICES FOR PERSONAL  Security BEST PRACTICES FOR PERSONAL Email Security Sometimes it feels that the world of email and internet communication is fraught with dangers: malware, viruses, cyber attacks and so on. There are some simple

More information

Computer Networks. Wenzhong Li. Nanjing University

Computer Networks. Wenzhong Li. Nanjing University Computer Networks Wenzhong Li Nanjing University 1 Chapter 8. Internet Applications Internet Applications Overview Domain Name Service (DNS) Electronic Mail File Transfer Protocol (FTP) WWW and HTTP Content

More information

Basics of Web. First published on 3 July 2012 This is the 7 h Revised edition

Basics of Web. First published on 3 July 2012 This is the 7 h Revised edition First published on 3 July 2012 This is the 7 h Revised edition Updated on: 03 August 2015 DISCLAIMER The data in the tutorials is supposed to be one for reference. We have made sure that maximum errors

More information

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

Online Communication.  Chat Rooms Instant Messaging Blogging Social Media Online Communication E-mail Chat Rooms Instant Messaging Blogging Social Media Advantages: Reduces cost of postage Fast and convenient Eliminates phone charges Disadvantages: May be difficult to understand

More information

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies CNIT 129S: Securing Web Applications Ch 3: Web Application Technologies HTTP Hypertext Transfer Protocol (HTTP) Connectionless protocol Client sends an HTTP request to a Web server Gets an HTTP response

More information

Header- A Forensic Key to Examine an

Header- A Forensic Key to Examine an E-Mail Header- A Forensic Key to Examine an E-Mail Swapnil Gupta 1, Kopal Gupta 2, Dr. Anu Singla 3 1,2,3 Institute of Forensic Science & Criminology, Bundelkhand University, Jhansi (U.P.), India ---------------------------------------------------------------------***---------------------------------------------------------------------

More information

IT Information Systems & Technology Multiple Choice Question Paper

IT Information Systems & Technology Multiple Choice Question Paper UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY ( EXTERNAL) Academic Year 2012/2013 1 st Year Examination Semester 1 IT1104 - Information

More information

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011 Outside the Box: Networks and The Internet Don Mason Associate Director Copyright 2011 National Center for Justice and the Rule of Law All Rights Reserved Inside vs. Outside Inside the Box What the computer

More information