UNIVERSITY OF COLOMBO, SRI LANKA UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL) Academic Year 2007/2008 1 st Year Examination Semester 1 IT1403: Internet and World Wide Web Multiple Choice Question Paper 02 nd March, 2008 (TWO HOURS) Important Instructions : The duration of the paper is 2 (two) hours. The medium of instruction and questions is English. The paper has 45 questions and 08 pages. All questions are of the MCQ (Multiple Choice Questions) type. All questions should be answered. Each question will have 5 (five) choices with one or more correct answers. All questions will carry equal marks. There will be a penalty for incorrect responses to discourage guessing. The mark given for a question will vary from 0 to +1 (All the correct choices are marked & no incorrect choices are marked). Answers should be marked on the special answer sheet provided. Note that questions appear on both sides of the paper. If a page is not printed, please inform the supervisor immediately. Mark the correct choices on the question paper first and then transfer them to the given answer sheet which will be machine marked. Please completely read and follow the instructions given on the other side of the answer sheet before you shade your correct choices. 1
1) Internet (a) always contains reliable information. (b) uses TCP/IP protocol. (c) transmits data by packet switching. (d) transactions are always safe and secure. (e) is sometimes called the information superhighway. 2) Common use(s) of the Internet is(are) (a) email. (b) WWW. (c) Remote access. (d) Collaboration. (e) File sharing. 3) The first web browser with a graphical user interface was 4) ISPs (a) Internet Explorer (b) NCSA Mosaic (c) Firefox (d) Safari (e) Opera (a) provide access to the Internet and related services to consumers or businesses. (b) provide domain name registering and hosting service. (c) do not provide web hosting. (d) always provide their services free of charge. (e) pay upstream ISPs for Internet access. 5) Select the correct statements related to IP addresses. (a) 192. 248.16. 05 is a valid IP address. (b) 0.0.0.0. address can be used to give a message to everyone in a network. (c) Domain names can be used instead of IP addresses. (d) IP addresses need not be fixed. (e) IPv6 allows a lesser number of computers to connect to the Internet than IPv4. 6) Following shows a comparison between the items of A and those of B. A Britannica online Personnel websites Wikipedia Blogging B What could be A and B respectively? (a) Google 1.0 and Google 2.0 (b) Web 1.0 and Web 2.0 (c) IE 1.0 and IE 2.0 (d) Internet1 and Internet2 (e) Yahoo and Google 7) Select the correct statements about the Domain Name System (DNS). (a) DNS keeps the mapping between the names, such as www.bit.lk and the IP addresses associated with these names. (b) Domain names must start with http://. (c) All domain names must start with www. (d) In the URL http://www.bit.lk/index.html the index.html is part of the domain name. (e) There is only one server in the DNS system. 2
8) The blanks (i), (ii), (iii), (iv), (v) and (vi) in the following passage have to be filled using appropriate words. Web pages are written in (i), a simple language that allows to create (ii).links from one page to another. The look and feel of web pages can be controlled by style sheets written in.(iii). The protocol between the.(iv). and the (v) is..(vi) Which of the following gives an appropriate filling? (a) (i).http (ii).css (iii).hypertext (iv).html (v).web server (vi). Web browser (b) (i).html (ii).css (iii).hypertext (iv). Web server (v).web browser (vi). FTP (c) (i) HTTP (ii).hypertext (iii).css (iv).web server (v).web browser (vi).html (d) (i).html (ii).hypertext (iii).css (iv).web browser (v).web server (vi). HTTP (e) (i).http (ii).hypertext (iii). HTML (iv). Web server (v).web browser (vi). CSS 9) Select the protocol(s) which is(are) NOT associated with sending an email. (a) SMTP (b) POP3 (c) IMAP (d) FTP (e) TCP 10) The protocol that allows clients to read and remove email from a mailbox that resides on a server machine is (a) SMTP. (b) POP3. (c) HTTP. (d) FTP. (e) TCP. 11) The URL www.bit.lk/index.html is incomplete, but if one type this in the browser, it completes the URL by adding the default protocol. The completed URL is (a) ftp://www.bit.lk/index.html. (c) http://www.bit.lk. (e) tcp://www.bit.lk. (b) http://www.bit.lk/index.html. (d) smtp://www.bit.lk/index.html. 12) http is a protocol used for (a) communication between the web servers and the web browsers. (b) communication between the web servers. (c) communication between the web servers and mail servers. (d) communication between the mail servers. (e) communication between the mail servers and the FTP servers. 13) An HTML document contains the following line <H3> Hello World </H3>. It instructs the browser to (a) display Hello World in 3pt font. (b) display Hello World in 30pt font. (c) display Hello World as a level 3 header. (d) display Hello World as a header in a font which is 3 times as large as the default font. (e) display Hello World three times. 3
14) Select the correct statements about HTML. (a) HTML is case insensitive about tags. (b) HTML ignores the case of text between the tags <H1> and </H1>. (c) HTML ignores extra white spaces in texts. (d) If an opening tag is in upper case, the corresponding closing tag should be in upper case. (e) HTML is case insensitive about the tags and all the texts in html pages. 15) Select web servers from among the following. 16) A cookie is a(an) (a) Apache (b) Safari (c) Firefox (d) Internet explorer (e) Microsoft Internet Information Server (IIS) (a) text string that the web server sends to the browser to be stored in the clients machine. (b) Virus. (c) web client. (d) Firefox plugin. (e) image used to attract visitors to a website. 17) Select the web browsers from among the following. (a) Firefox (b) Safari (c) Apache (d) httpd (e) Microsoft Internet Information Server (IIS) 18) Consider the following statements related to WWW. i. Some operating systems are more secure to host as web servers than the others. ii. Dreamweaver is an example of a web authoring tool. iii. JavaScript is a scripting language most often used for client-side scripts. Which of the above statements is(are) true? (a) only (i) (b) only (ii) (c) only (i) and (ii) (d) only (i) and (iii) (e) All 19) Select incompatible set of words from among the following. (a) Mozilla, Safari, Opera (c) Skype, Linux, Unix (e) HTTP, FTP, TCP (b) AltaVista, Excite, Lycos (d) Amazon, Dell, ebay 20) Select the correct statements. (a) A dialup connection allows the user to use the telephone while being connected to the Internet. (b) An ADSL connection allows the user to use the telephone while being connected to the Internet. (c) ADSL uses a separate pair of wires unlike the telephone line to connect to the ISP. (d) In ADSL, upload speed is lower than the download speed. (e) ADSL is a wireless technology. 4
21) Select the correct statements. 22) Select the correct statements. 23) Select the correct statements. (a) The email system can handle only ASCII text messages and therefore, binary files have to be encoded and sent as attachments. (b) Uuencode can be used to encode attachments. (c) Any type of file can be sent directly (not as an attachment) without encoding over email. (d) Only uuencode can be used to encode attachments. (e) Only the encoding programs which are known to the mail servers (SMTP servers) can be used to encode email attachments. (a) Any file type can be sent as an email attachment. (b) Only files with jpg, bmp, doc, ppt, and pdf can be sent as email attachments. (c) The recipient should have an MS Word program to receive an MS word file as an attachment. (d) To send and receive attachments, the sender s email client and the receiver s email client should have compatible encoding/decoding programs. (e) To send and receive email attachments, both the sender and the receiver must use the same operating system. (a) PHP scripts are processed in the web server and the resulting output is sent to the browsers. (b) Web browsers execute the PHP code in web pages. (c) Javascript is another name for Java. (d) Javascripts in the web pages are executed at the server before they are sent to the browsers. (e) HTML documents can contain embedded JavaScripts. 24) ABC (abc@bit.lk) sends an email to XYZ (xyz@ucsc.lk) and includes PQR (pqr@bit.lk) in the BCC: line. Select the correct statement(s) about this scenario (a) XYZ can see PQR s email address. (b) PQR can see XYZ s email address. (c) Both PQR and XYZ can see ABC s email address. (d) XYZ cannot see PQR s email address but PQR can see XYZ s email address. (e) PQR cannot see ABC s email address because PQR is included in the Blind Carbon Copy (BCC) line. 25) ABC (abc@bit.lk) sends an email to XYZ (xyz@ucsc.lk) and includes PQR (pqr@bit.lk) in the CC: line. Select the correct statements about this scenario. (a) XYZ can see that ABC has send a copy to PQR (b) PQR cannot see XYZ s email address (c) XYZ can see only the name of PQR but not his email address (d) Neither XYZ nor PQR can see each others email addresses in the email received by them. (e) PQR cannot see the sender s email address because he has included in the CC: line and not in the TO: line. 5
26) ABC (abc@bit.lk) sends an email to XYZ (xyz@ucsc.lk) with an attachment. He includes PQR (pqr@bit.lk) in the BCC: line and LMN (lmn@bit.k) in the CC: line. Select the correct statements about this scenario. (a) Only XYZ receives the attachment. (b) Only XYZ and LMN get the attachment. (c) All recipients get the attachment. (d) Only XYX and PQR get the attachment. (e) ABC cannot send attachments because he has included recipients in the CC: line and the BCC: line. 27) Video conferencing over the Internet (a) allows one to share files and data. (b) allows only two parties to meet together at a time. (c) provides a means for communication and collaboration. (d) cannot be used to hold presentations. (e) can be used in teaching. 28) Which of the following statement(s) is(are) correct related to the Usenet. 29) bin command in FTP is used to 30) FTP 31) A blog (a) Usenet can be used to publish weather reports. (b) Usenet is the same as mailing lists. (c) One need to have the Newsreader program to post and read articles on the Usenet. (d) Usenet is organized into different newsgroups. (e) Newsgroups are always unmoderated groups. (a) set path to bin. (b) permanently delete a file. (c) switch to binary mode. (d) check the mode of data. (e) temporarily delete a file. (a) allows sharing of files over a network. (b) clients are available for both Linux and Windows.. (c) allows binary file exchange only. (d) enables direct access to all the resources in computers. (e) provides a reliable data transfer mechanism between computers. (a) can be used to share facts, ideas and opinions directly. (b) can contain links to other blogs. (c) contains frequently updated content written by one person. (d) is like a diary maintained by an individual. (e) generally consists of text and images. 32) Select those network services which are based on client-server architecture. (a) FTP (b) SSH (c) VNC (d) email (e) Usenet 6
33) Which of the following help(s) one to make online life safer in connection with privacy? (a) Use a spyware tracker to remove spyware from the computer. (b) Never write passwords on paper. (c) Allow the execution of the active content such as JavaScript, only when the website prompts to do so. (d) Never give information to un-trusted parties. (e) Reply to all unsolicited emails. 34) Match column X with column Y X Y (A) PayPal i. Assurance provider (B) ebay ii. Safer payments and money transfers (C) Verisign iii. Online auction (D) Amazon iv. Social networking (E) Facebook v. Virtual book store (a) (A) iv (B) iii (C) v (D) ii (E) i (c) (A) ii (B) iv (C) i (D) v (E) iii (e) (A) ii (B) iii (C) i (D) v (E) iv (b) (A) ii (B) i (C) iii (D) iv (E) v (d) (A) iii (B) ii (C) v (D) iv (E) i 35) Select the correct statement(s) related to dot-com organizations. (a) A dot-com company has a virtual store and does business only through the web. (b) Amazon is a famous dot-com company. (c) Dot-com company websites use the same top level domain. (d) Dot-com failures became common in early 2000. (e) During the Dot-com bubble, stock market prices of these companies were generally low. 36) Which of the following technologies can be used in elearning? (a) Text chat (b) Discussion boards (c) email (d) Blogs (e) Wiki 37) Consider the following statements related to elearning. i. elearning cannot be used in conjunction with face-to-face teaching. ii. SCORM makes elearning content reusable and sharable. iii. Storyboarding tools can be used in designing elearning content. Which of the above statements is(are) correct? (a) only (i). (b) only (ii). (c) only (i) and (ii). (d) only (ii) and (iii). (e) All. 38) RSS (a) stands for Really Simple Syndication. (b) is a convenient way to get the news and information. (c) readers are not available for free. (d) feeds are not used by BBC to provide their content. (e) is a family of web feed formats. 39) Which of the following statements is/are true about a firewall? (a) It protects computers from overheating. (b) It blocks unauthorized traffic going through it. (c) There are two types of firewalls, hardware firewalls and liveware firewalls. (d) Hardware firewalls can defeat email worms. (e) It is required to have a separate firewall for each computer in a private network. 7
40) Which of the following is/are true about data encryption? (a) It is the process of correctly identifying the parties involved in a communication by each party. (b) Certification authority is a trusted agency whose responsibility is to correctly encrypt the data. (c) The secret key cryptography uses two different keys to encrypt and decrypt the data. (d) In public key cryptography, each public party must be given a separate public key to encrypt the data. (e) It can be used to ensure the integrity and confidentiality of data. 41) Which of the following sets contains only secure protocols? (a) SET, HTTP, SSL (b) SFTP, SSL, SET (c) MIME, S-HTTP, SSL (d) FTP, SMTP, SSL (e) SMTP, SET, MIME 42) What is a spam in the context of email? (a) It is a virus attached to a document, so that when the document is opened the virus gets activated. (b) It infects the boot sector and gets activated when the operating system is loaded. (c) It is a virus designed to attack anti-virus software. (d) It is a computer program designed to collect information about the activities of the user. (e) It is unsolicited email. 43) Which of the following is/are true about computer viruses? (a) Some computer viruses can make copies of themselves. (b) They cannot spread through email attachments. (c) They do not spread through read-only CDs. (d) They can operate even after a computer system is powered down. (e) They are different from biological viruses. 44) Which of the following is/are true about password security? (a) Dictionary attack is an approach used by intruders to detect passwords of legitimate users. (b) Encrypted login protocols, such as SSH, can prevent sniffing of passwords in a network. (c) A good password can be created by combining words from a dictionary. (d) Passwords whose lengths are greater than six characters are unbreakable. (e) A good password has a mix of all lower and upper case letters, punctuation marks and numbers. 45) Assume that you are a member of a large online newsgroup. Which of the following is/are the best practice when dealing with this mailing group? (a) Get involved in all the group discussions without considering their relevance. (b) Send periodic emails to the mail group to show your interest in that group. (c) When forwarding a message to a third party, always forward only the parts which you consider as relevant. (d) When replying to a message, quote only the relevant parts. (e) If it seems as if others are not interested on your emails, then change the case of the message to upper case to get attention. ******** 8