IT1403: Internet and World Wide Web Multiple Choice Question Paper

Similar documents
IT1403 Internet and World Wide Web Multiple Choice Question Paper

IT1404: Internet and World Wide Web Multiple Choice Question Paper

IT1404 Internet and World Wide Web Multiple Choice Question Paper

IT1404: Internet and World Wide Web Multiple Choice Question Paper

Elementary Computing CSC 100. M. Cheng, Computer Science

Overview of the Internet

M3-R3: INTERNET AND WEB PAGE DESIGN

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Web Mechanisms. Draft: 2/23/13 6:54 PM 2013 Christopher Vickery

Outline. Web browsers & Web servers

(electronic mail) is the exchange of computer-stored messages by telecommunication.

ELECTRONIC MAIL RAYMOND ROSE. Computer Technology Department 2011/12

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

M3-R3: INTERNET AND WEB DESIGN

1. Web Technology... 6

Chapter 4: Networking and the Internet

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 3 Protecting Systems

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

The internet and the web

An Overview of Webmail

The Internet, the Web, and Electronic Commerce The McGraw-Hill Companies, Inc. All rights reserved.

SEEM4540 Open Systems for E-Commerce Lecture 03 Internet Security

e-commerce Study Guide Test 2. Security Chapter 10

Malware, , Database Security

Jianhui Zhang, Ph.D., Associate Prof. College of Computer Science and Technology, Hangzhou Dianzi Univ.

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)

Secure Recipient Guide

Computer networks 2013

INTERNET SAFETY* GALEN GARRETSON RASCAL MARCH 2-3, * Sources include learnfree.org, PC World, wikpedia.com, techterms.com

STUDY GUIDE CHAPTER 7

Network Applications and Protocols

MUSIC & THE INTERNET MUMT 301

Networks, WWW, HTTP. Web Technologies I. Zsolt Tóth. University of Miskolc. Zsolt Tóth (University of Miskolc) Networks, WWW, HTTP / 35

FTP,HTTP. By Nidhi Jindal

Introduction to Computer Science. William Hsu Department of Computer Science and Engineering National Taiwan Ocean University

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

VISUAL SUMMARY ACCESS INTERNET AND WEB. The Internet, the Web, and Electronic Commerce

Chapter 4: Networking and the Internet. Copyright 2015 Pearson Education, Inc.

Connecting with Computer Science Chapter 5 Review: Chapter Summary:

IT1304 PC Applications Multiple Choice Question Paper

IT1305 Web Application Development I Multiple Choice Question Paper

User Manual. version 1.6-r1

Discovering Computers Chapter 2 The Internet and World Wide Web

2. Introduction to Internet Applications

Using the Control Panel

Full file at Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Getting Started With Web Mail

Emerging Technology in Business (CIW) Course Review (1 semester class) Course Number:

Unit 2 Assignment 2. Software Utilities?

Electronic Mail (SMTP)

Shankersinh Vaghela Bapu Institue of Technology

Networks and Communications MS216 - Course Outline -

Full file at

Chapter 2: Technology Infrastructure: The Internet and the World Wide Web

Security and Privacy. Xin Liu Computer Science University of California, Davis. Introduction 1-1

Creating your own Website

Fig (1) sending and receiving s

How the Web Works. Chapter 1. Modified by Marissa Schmidt Pearson

The Internet and World Wide Web. Chapter4

Debian/GNU Linux Mailing

INTERNET SAFETY IS IMPORTANT

Outside the Box: Networks and The Internet

Chapter 3. E-commerce The Evolution of the Internet 1961 Present. The Internet: Technology Background. The Internet: Key Technology Concepts

8 9 Before: Computers are categorized into three main categories from least to most powerful: microcomputers minicomputers mainframe computers Today:

History and Backgound: Internet & Web 2.0

DONE FOR YOU SAMPLE INTERNET ACCEPTABLE USE POLICY

Unit 4 The Web. Computer Concepts Unit Contents. 4 Web Overview. 4 Section A: Web Basics. 4 Evolution

is still the most used Internet app. According to some studies around 85% of Internet users still use for communication.

Web Programming Paper Solution (Chapter wise)

Practice Examination 3

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Chapter 1 Introduction to HTML, XHTML, and CSS

Developing Web Applications

Binarytech Digital Education Karta Allahabad ( Notes)

Internet Concepts ML Study Guide Created by Advisers

Chapter 4 The Internet

Lesson 4: Web Browsing

The process by which a user can associate specific permissions to each username.

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

CTS2134 Introduction to Networking. Module 08: Network Security

Electronic Mail

Electronic Mail Paradigm

Web site Owners Guide (including domains, web pages and )

Introduction. Logging in. WebQuarantine User Guide

Chapter 002 The Internet, the Web, and Electronic Commerce

M+NetMail Client User Guide

Accessing WebMail. Logging In. Check your Mail. Main Mail Screen. Reading Messages. Search. Sending a new message

Dreamweaver is a full-featured Web application

BEST PRACTICES FOR PERSONAL Security

Computer Networks. Wenzhong Li. Nanjing University

Basics of Web. First published on 3 July 2012 This is the 7 h Revised edition

Online Communication. Chat Rooms Instant Messaging Blogging Social Media

CNIT 129S: Securing Web Applications. Ch 3: Web Application Technologies

Header- A Forensic Key to Examine an

IT Information Systems & Technology Multiple Choice Question Paper

Inside vs. Outside. Inside the Box What the computer owner actually has possession of 1/18/2011

Transcription:

UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2007/2008 1 st Year Examination Semester 1 IT1403: Internet and World Wide Web Multiple Choice Question Paper 02 nd March, 2008 (TWO HOURS) Important Instructions : The duration of the paper is 2 (two) hours. The medium of instruction and questions is English. The paper has 45 questions and 08 pages. All questions are of the MCQ (Multiple Choice Questions) type. All questions should be answered. Each question will have 5 (five) choices with one or more correct answers. All questions will carry equal marks. There will be a penalty for incorrect responses to discourage guessing. The mark given for a question will vary from 0 to +1 (All the correct choices are marked & no incorrect choices are marked). Answers should be marked on the special answer sheet provided. Note that questions appear on both sides of the paper. If a page is not printed, please inform the supervisor immediately. Mark the correct choices on the question paper first and then transfer them to the given answer sheet which will be machine marked. Please completely read and follow the instructions given on the other side of the answer sheet before you shade your correct choices. 1

1) Internet (a) always contains reliable information. (b) uses TCP/IP protocol. (c) transmits data by packet switching. (d) transactions are always safe and secure. (e) is sometimes called the information superhighway. 2) Common use(s) of the Internet is(are) (a) email. (b) WWW. (c) Remote access. (d) Collaboration. (e) File sharing. 3) The first web browser with a graphical user interface was 4) ISPs (a) Internet Explorer (b) NCSA Mosaic (c) Firefox (d) Safari (e) Opera (a) provide access to the Internet and related services to consumers or businesses. (b) provide domain name registering and hosting service. (c) do not provide web hosting. (d) always provide their services free of charge. (e) pay upstream ISPs for Internet access. 5) Select the correct statements related to IP addresses. (a) 192. 248.16. 05 is a valid IP address. (b) 0.0.0.0. address can be used to give a message to everyone in a network. (c) Domain names can be used instead of IP addresses. (d) IP addresses need not be fixed. (e) IPv6 allows a lesser number of computers to connect to the Internet than IPv4. 6) Following shows a comparison between the items of A and those of B. A Britannica online Personnel websites Wikipedia Blogging B What could be A and B respectively? (a) Google 1.0 and Google 2.0 (b) Web 1.0 and Web 2.0 (c) IE 1.0 and IE 2.0 (d) Internet1 and Internet2 (e) Yahoo and Google 7) Select the correct statements about the Domain Name System (DNS). (a) DNS keeps the mapping between the names, such as www.bit.lk and the IP addresses associated with these names. (b) Domain names must start with http://. (c) All domain names must start with www. (d) In the URL http://www.bit.lk/index.html the index.html is part of the domain name. (e) There is only one server in the DNS system. 2

8) The blanks (i), (ii), (iii), (iv), (v) and (vi) in the following passage have to be filled using appropriate words. Web pages are written in (i), a simple language that allows to create (ii).links from one page to another. The look and feel of web pages can be controlled by style sheets written in.(iii). The protocol between the.(iv). and the (v) is..(vi) Which of the following gives an appropriate filling? (a) (i).http (ii).css (iii).hypertext (iv).html (v).web server (vi). Web browser (b) (i).html (ii).css (iii).hypertext (iv). Web server (v).web browser (vi). FTP (c) (i) HTTP (ii).hypertext (iii).css (iv).web server (v).web browser (vi).html (d) (i).html (ii).hypertext (iii).css (iv).web browser (v).web server (vi). HTTP (e) (i).http (ii).hypertext (iii). HTML (iv). Web server (v).web browser (vi). CSS 9) Select the protocol(s) which is(are) NOT associated with sending an email. (a) SMTP (b) POP3 (c) IMAP (d) FTP (e) TCP 10) The protocol that allows clients to read and remove email from a mailbox that resides on a server machine is (a) SMTP. (b) POP3. (c) HTTP. (d) FTP. (e) TCP. 11) The URL www.bit.lk/index.html is incomplete, but if one type this in the browser, it completes the URL by adding the default protocol. The completed URL is (a) ftp://www.bit.lk/index.html. (c) http://www.bit.lk. (e) tcp://www.bit.lk. (b) http://www.bit.lk/index.html. (d) smtp://www.bit.lk/index.html. 12) http is a protocol used for (a) communication between the web servers and the web browsers. (b) communication between the web servers. (c) communication between the web servers and mail servers. (d) communication between the mail servers. (e) communication between the mail servers and the FTP servers. 13) An HTML document contains the following line <H3> Hello World </H3>. It instructs the browser to (a) display Hello World in 3pt font. (b) display Hello World in 30pt font. (c) display Hello World as a level 3 header. (d) display Hello World as a header in a font which is 3 times as large as the default font. (e) display Hello World three times. 3

14) Select the correct statements about HTML. (a) HTML is case insensitive about tags. (b) HTML ignores the case of text between the tags <H1> and </H1>. (c) HTML ignores extra white spaces in texts. (d) If an opening tag is in upper case, the corresponding closing tag should be in upper case. (e) HTML is case insensitive about the tags and all the texts in html pages. 15) Select web servers from among the following. 16) A cookie is a(an) (a) Apache (b) Safari (c) Firefox (d) Internet explorer (e) Microsoft Internet Information Server (IIS) (a) text string that the web server sends to the browser to be stored in the clients machine. (b) Virus. (c) web client. (d) Firefox plugin. (e) image used to attract visitors to a website. 17) Select the web browsers from among the following. (a) Firefox (b) Safari (c) Apache (d) httpd (e) Microsoft Internet Information Server (IIS) 18) Consider the following statements related to WWW. i. Some operating systems are more secure to host as web servers than the others. ii. Dreamweaver is an example of a web authoring tool. iii. JavaScript is a scripting language most often used for client-side scripts. Which of the above statements is(are) true? (a) only (i) (b) only (ii) (c) only (i) and (ii) (d) only (i) and (iii) (e) All 19) Select incompatible set of words from among the following. (a) Mozilla, Safari, Opera (c) Skype, Linux, Unix (e) HTTP, FTP, TCP (b) AltaVista, Excite, Lycos (d) Amazon, Dell, ebay 20) Select the correct statements. (a) A dialup connection allows the user to use the telephone while being connected to the Internet. (b) An ADSL connection allows the user to use the telephone while being connected to the Internet. (c) ADSL uses a separate pair of wires unlike the telephone line to connect to the ISP. (d) In ADSL, upload speed is lower than the download speed. (e) ADSL is a wireless technology. 4

21) Select the correct statements. 22) Select the correct statements. 23) Select the correct statements. (a) The email system can handle only ASCII text messages and therefore, binary files have to be encoded and sent as attachments. (b) Uuencode can be used to encode attachments. (c) Any type of file can be sent directly (not as an attachment) without encoding over email. (d) Only uuencode can be used to encode attachments. (e) Only the encoding programs which are known to the mail servers (SMTP servers) can be used to encode email attachments. (a) Any file type can be sent as an email attachment. (b) Only files with jpg, bmp, doc, ppt, and pdf can be sent as email attachments. (c) The recipient should have an MS Word program to receive an MS word file as an attachment. (d) To send and receive attachments, the sender s email client and the receiver s email client should have compatible encoding/decoding programs. (e) To send and receive email attachments, both the sender and the receiver must use the same operating system. (a) PHP scripts are processed in the web server and the resulting output is sent to the browsers. (b) Web browsers execute the PHP code in web pages. (c) Javascript is another name for Java. (d) Javascripts in the web pages are executed at the server before they are sent to the browsers. (e) HTML documents can contain embedded JavaScripts. 24) ABC (abc@bit.lk) sends an email to XYZ (xyz@ucsc.lk) and includes PQR (pqr@bit.lk) in the BCC: line. Select the correct statement(s) about this scenario (a) XYZ can see PQR s email address. (b) PQR can see XYZ s email address. (c) Both PQR and XYZ can see ABC s email address. (d) XYZ cannot see PQR s email address but PQR can see XYZ s email address. (e) PQR cannot see ABC s email address because PQR is included in the Blind Carbon Copy (BCC) line. 25) ABC (abc@bit.lk) sends an email to XYZ (xyz@ucsc.lk) and includes PQR (pqr@bit.lk) in the CC: line. Select the correct statements about this scenario. (a) XYZ can see that ABC has send a copy to PQR (b) PQR cannot see XYZ s email address (c) XYZ can see only the name of PQR but not his email address (d) Neither XYZ nor PQR can see each others email addresses in the email received by them. (e) PQR cannot see the sender s email address because he has included in the CC: line and not in the TO: line. 5

26) ABC (abc@bit.lk) sends an email to XYZ (xyz@ucsc.lk) with an attachment. He includes PQR (pqr@bit.lk) in the BCC: line and LMN (lmn@bit.k) in the CC: line. Select the correct statements about this scenario. (a) Only XYZ receives the attachment. (b) Only XYZ and LMN get the attachment. (c) All recipients get the attachment. (d) Only XYX and PQR get the attachment. (e) ABC cannot send attachments because he has included recipients in the CC: line and the BCC: line. 27) Video conferencing over the Internet (a) allows one to share files and data. (b) allows only two parties to meet together at a time. (c) provides a means for communication and collaboration. (d) cannot be used to hold presentations. (e) can be used in teaching. 28) Which of the following statement(s) is(are) correct related to the Usenet. 29) bin command in FTP is used to 30) FTP 31) A blog (a) Usenet can be used to publish weather reports. (b) Usenet is the same as mailing lists. (c) One need to have the Newsreader program to post and read articles on the Usenet. (d) Usenet is organized into different newsgroups. (e) Newsgroups are always unmoderated groups. (a) set path to bin. (b) permanently delete a file. (c) switch to binary mode. (d) check the mode of data. (e) temporarily delete a file. (a) allows sharing of files over a network. (b) clients are available for both Linux and Windows.. (c) allows binary file exchange only. (d) enables direct access to all the resources in computers. (e) provides a reliable data transfer mechanism between computers. (a) can be used to share facts, ideas and opinions directly. (b) can contain links to other blogs. (c) contains frequently updated content written by one person. (d) is like a diary maintained by an individual. (e) generally consists of text and images. 32) Select those network services which are based on client-server architecture. (a) FTP (b) SSH (c) VNC (d) email (e) Usenet 6

33) Which of the following help(s) one to make online life safer in connection with privacy? (a) Use a spyware tracker to remove spyware from the computer. (b) Never write passwords on paper. (c) Allow the execution of the active content such as JavaScript, only when the website prompts to do so. (d) Never give information to un-trusted parties. (e) Reply to all unsolicited emails. 34) Match column X with column Y X Y (A) PayPal i. Assurance provider (B) ebay ii. Safer payments and money transfers (C) Verisign iii. Online auction (D) Amazon iv. Social networking (E) Facebook v. Virtual book store (a) (A) iv (B) iii (C) v (D) ii (E) i (c) (A) ii (B) iv (C) i (D) v (E) iii (e) (A) ii (B) iii (C) i (D) v (E) iv (b) (A) ii (B) i (C) iii (D) iv (E) v (d) (A) iii (B) ii (C) v (D) iv (E) i 35) Select the correct statement(s) related to dot-com organizations. (a) A dot-com company has a virtual store and does business only through the web. (b) Amazon is a famous dot-com company. (c) Dot-com company websites use the same top level domain. (d) Dot-com failures became common in early 2000. (e) During the Dot-com bubble, stock market prices of these companies were generally low. 36) Which of the following technologies can be used in elearning? (a) Text chat (b) Discussion boards (c) email (d) Blogs (e) Wiki 37) Consider the following statements related to elearning. i. elearning cannot be used in conjunction with face-to-face teaching. ii. SCORM makes elearning content reusable and sharable. iii. Storyboarding tools can be used in designing elearning content. Which of the above statements is(are) correct? (a) only (i). (b) only (ii). (c) only (i) and (ii). (d) only (ii) and (iii). (e) All. 38) RSS (a) stands for Really Simple Syndication. (b) is a convenient way to get the news and information. (c) readers are not available for free. (d) feeds are not used by BBC to provide their content. (e) is a family of web feed formats. 39) Which of the following statements is/are true about a firewall? (a) It protects computers from overheating. (b) It blocks unauthorized traffic going through it. (c) There are two types of firewalls, hardware firewalls and liveware firewalls. (d) Hardware firewalls can defeat email worms. (e) It is required to have a separate firewall for each computer in a private network. 7

40) Which of the following is/are true about data encryption? (a) It is the process of correctly identifying the parties involved in a communication by each party. (b) Certification authority is a trusted agency whose responsibility is to correctly encrypt the data. (c) The secret key cryptography uses two different keys to encrypt and decrypt the data. (d) In public key cryptography, each public party must be given a separate public key to encrypt the data. (e) It can be used to ensure the integrity and confidentiality of data. 41) Which of the following sets contains only secure protocols? (a) SET, HTTP, SSL (b) SFTP, SSL, SET (c) MIME, S-HTTP, SSL (d) FTP, SMTP, SSL (e) SMTP, SET, MIME 42) What is a spam in the context of email? (a) It is a virus attached to a document, so that when the document is opened the virus gets activated. (b) It infects the boot sector and gets activated when the operating system is loaded. (c) It is a virus designed to attack anti-virus software. (d) It is a computer program designed to collect information about the activities of the user. (e) It is unsolicited email. 43) Which of the following is/are true about computer viruses? (a) Some computer viruses can make copies of themselves. (b) They cannot spread through email attachments. (c) They do not spread through read-only CDs. (d) They can operate even after a computer system is powered down. (e) They are different from biological viruses. 44) Which of the following is/are true about password security? (a) Dictionary attack is an approach used by intruders to detect passwords of legitimate users. (b) Encrypted login protocols, such as SSH, can prevent sniffing of passwords in a network. (c) A good password can be created by combining words from a dictionary. (d) Passwords whose lengths are greater than six characters are unbreakable. (e) A good password has a mix of all lower and upper case letters, punctuation marks and numbers. 45) Assume that you are a member of a large online newsgroup. Which of the following is/are the best practice when dealing with this mailing group? (a) Get involved in all the group discussions without considering their relevance. (b) Send periodic emails to the mail group to show your interest in that group. (c) When forwarding a message to a third party, always forward only the parts which you consider as relevant. (d) When replying to a message, quote only the relevant parts. (e) If it seems as if others are not interested on your emails, then change the case of the message to upper case to get attention. ******** 8