M3-R3: INTERNET AND WEB PAGE DESIGN

Similar documents
M3-R3: INTERNET AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

M2-R4: INTERNET TECHNOLOGY AND WEB DESIGN

Chapter 27 WWW and HTTP Copyright The McGraw-Hill Companies, Inc. Permission required for reproduction or display.

M4.3-R4: INTRODUCTION TO ICT RESOURCES

B2.52-R3: INTRODUCTION TO OBJECT ORIENTATED PROGRAMMING THROUGH JAVA

M1-R4: IT TOOLS AND BUSINESS SYSTEMS

B1.1-R3: IT TOOLS AND APPLICATIONS

M4.3-R4: INTRODUCTION TO ICT RESOURCES

Internet Concepts ML Study Guide Created by Advisers

COMPUTER TECHNIQUE. ( Vocational Stream ) Paper : V. ( Computer Network ) ( Theory )

M4.2-R4: INTRODUCTION TO MULTIMEDIA

FBCA-03 April Introduction to Internet and HTML Scripting (New Course)

3. WWW and HTTP. Fig.3.1 Architecture of WWW

A1-R3: IT TOOLS & APPLICATIONS

06/02/ Local & Metropolitan Area Networks 0. INTRODUCTION. 1. History and Future of TCP/IP ACOE322

M4.3-R4: INTRODUCTION TO ICT RESOURCES

Chapter 27. HTTP and WWW

6 Computer Networks 6.1. Foundations of Computer Science Cengage Learning

Chapter 4: Networking and the Internet. Network Classifications. Network topologies. Network topologies (continued) Connecting Networks.

Chapter Ten. From Internet to Information Superhighway

CPET 499/ITC 250 Web Systems. Topics

Internet. Class-In charge: S.Sasirekha

IT430- E-COMMERCE Solved MCQ(S) From Midterm Papers (1 TO 22 Lectures) BY Arslan Arshad

Connecting with Computer Science Chapter 5 Review: Chapter Summary:

M4.1-R3: PROGRAMMING AND PROBLEM SOLVING THROUGH C LANGUAGE

How to open ports in the DSL router firmware version 2.xx and above

Outline. Internet and World Wide Web. History of the Internet. What is the Internet? How Does Data Travel Through the Internet?

M1-R4: IT TOOLS AND BUSINESS SYSTEMS

CCNA 1 v3.11 Module 11 TCP/IP Transport and Application Layers

M1-R4: Introduction to ICT Resource (JULY 2018)

Application Layer: OSI and TCP/IP Models

4. BOOLEAN ALGEBRA 8 5. NETWORKING AND OPEN SOURCE SOFTWARE 10

Chapter 4: Networking and the Internet. Figure 4.1 Network topologies. Network Classifications. Protocols. (continued)

Chapter 4: Networking and the Internet

Revision for Grade 7 ASP in Unit :1&2 Design & Technology Subject

A6-R3: DATA STRUCTURE THROUGH C LANGUAGE

The Internet The Internet

The Internet Advanced Research Projects Agency Network (ARPANET) How the Internet Works Transport Control Protocol (TCP)

Copyleft 2005, Binnur Kurt. Objectives

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space provided.

VII. Corente Services SSL Client

200AE1 Network Services Gateway

KENDRIYA VIDYALAYA SANGATHAN. Regional Office Delhi Split-up Syllabus Session Subject:-Computer Science Subject Code:-083

ก ก Information Technology II

Name: Class: Date: Multiple Choice Identify the letter of the choice that best completes the statement or answers the question.

1. The basic building block of an HTML document is called a(n) a. tag. b. element. c. attribute. d. container. Answer: b Page 5

2. Introduction to Internet Applications

CHAPTER2. 1. The Internet was launched in 1969 and was originally called

A3-R3: PROGRAMMING AND PROBLEM SOLVING THROUGH 'C' LANGUAGE

EdgeMarc 250W Network Services Gateway

How does the Internet Work? The Basics: Getting a Web Page. The Basics: Getting a Web Page. Client-Server model. The Internet: Basics

TCP / IP. Isidro Martinez Director, Latin Amèrica

Why Firewalls? Firewall Characteristics

Core Course CC-103 Introduction to Internet and HTML

THE BCS PROFESSIONAL EXAMINATIONS BCS Level 5 Diploma in IT PRINCIPLES OF INTERNET TECHNOLOGIES. Specimen Answers

Web Engineering (CC 552)

First Steps. DNP/SK18 Embedded Linux Starter Kit

WEB ADMINISTRATION AND MANAGEMENT. Internetworking: Concepts, Principles and Application

Your computer, the internet, and the web. A brief overview

ch02 True/False Indicate whether the statement is true or false.

Objectives. Connecting with Computer Science 2

Chapter 15 Networks. Chapter Goals. Networking. Chapter Goals. Networking. Networking. Computer network. Node (host) Any device on a network

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

SUMMATIVE ASSESSMENT I FOUNDATION OF INFORMATION TECHNOLOGY (CODE- 165) X Time 3Hrs M.M. 90

Motivation For Networking. Information access Interaction among cooperative application programs Resource sharing

Java Applets, etc. Instructor: Dmitri A. Gusev. Fall Lecture 25, December 5, CS 502: Computers and Communications Technology

System Programming. Introduction to computer networks

Web Technology. COMP476 Networked Computer Systems. Hypertext and Hypermedia. Document Representation. Client-Server Paradigm.

ZENworks for Desktops Preboot Services

Time: 3 hours. Full Marks: 70. The figures in the margin indicate full marks. Answer from all the Groups as directed. Group A.

Introduction to internetworking, OSI, TCP/IP and Addressing.

1.264 Lecture 12. HTML Introduction to FrontPage


The Applications and Gaming Tab - Port Range Forward

Chapter 7: The Internet

M4.3-R4: INTRODUCTION TO ICT RESOURCES. Objective of the Course

TCP/IP Protocol Suite and IP Addressing

Avaya Port Matrix: Avaya Proprietary Use pursuant to the terms of your signed agreement or Avaya policy.

Concept Questions Demonstrate your knowledge of these concepts by answering the following questions in the space that is provided.

General Important Protocols for Examination of IA Examination 2018

The Internet, Intranets, and Extranets Chapter 7

UNIT V Introduction to Application Layer HTTP Non persistent versus Persistent Connections Non persistent Connections

EdgeMarc 4552 Networking Gateway

IT1403: Internet and World Wide Web Multiple Choice Question Paper

F.A.Q for TW100-S4W1CA

WEB TECHNOLOGIES CHAPTER 1

Chapter 2. Application Layer

A HTML document has two sections 1) HEAD section and 2) BODY section A HTML file is saved with.html or.htm extension

4562 Converged Networking Router

M3-R4: PROGRAMMING AND PROBLEM SOLVING THROUGH C LANGUAGE

SpamCheetah manual. By implementing protection against botnets we can ignore mails originating from known Bogons and other sources of spam.

1. Web Technology... 6

Application Level Protocols

Contents 1 INTRODUCTION TO COMPUTER NETWORKS...

KENDRIYA VIDYALAYA SANGATHAN

Unit 28 Website Production ASSIGNMENT 1

M4.1-R4: APPLICATION OF.NET TECHNOLOGY

SSL VPN Reinstallation

Chapter 4: Networking and the Internet

Transcription:

M3-R3: INTERNET AND WEB PAGE DESIGN NOTE: 1. There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions and PART TWO contains FIVE questions. 2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the question paper, as per the instructions contained therein. PART ONE is NOT to be answered in the answer book. 3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be supplied at the table when the answer sheet for PART ONE is returned. However, candidates, who complete PART ONE earlier than one hour, can collect the answer book for PART TWO immediately after handing over the answer sheet for PART ONE. TOTAL TIME: 3 HOURS TOTAL MARKS: 100 (PART ONE 40; PART TWO 60) PART ONE (Answer all the questions) 1. Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the tear-off answer sheet attached to the question paper, following instructions therein. (1 x 10) 1.1 Computers on the internet owned and operated by research institutions form part of the A) com domain B) edu domain C) mil domain D) None of the above. 1.2 Linux is A) A person B) A file C) A program for copying files from one computer to another D) An Operating system. 1.3 All web addresses start with which of the following? A) htp B) http:// C) http:/ D) www 1.4 The method of transferring files with roots in Unix is A) Bin Hex B) Unencoding C) FTP D) Telnet M3-R3 Page 1 of 5 July, 2006

1.5 In HTML language the tag <U> displays text as A) Boldface B) Italics C) Underlined D) Colored 1.6 The H in HTML stands for A) Hypo B) High C) Higher D) Hyper 1.7 SMTP is a simple A) TCP protocol B) TCP/IP protocol C) IP protocol D) None of the above. 1.8 Main protocol used in Internet A) IPX/SPX B) TCP/IP C) Token Bus D) X.25 1.9 Web pages are uniquely defined using A) IP addresses B) URL C) Domain D) Filename 1.10A word that looks underlined on a web page is usually A) an important word B) the web address C) a link to another web page D) a mistake M3-R3 Page 2 of 5 July, 2006

2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and ENTER in the tear-off sheet attached to the question paper, following instructions therein. (1 x 10) 2.1 Telnet is commonly used for remotely configuring routers or running applications on different hosts on a network. 2.2 Unsolicited commercial e-mails are called SPAM. 2.3 The two parts of e-mil address is separated by @ symbol. 2.4 URL is simply an address of a document on the Internet. 2.5 IP addresses are unique. 2.6 SNMP is used for e-mail services on the Internet. 2.7 ASCII is used for designing web pages. 2.8 Browser is a program that searches documents for specific key words and returns a list of documents. 2.9 HTML does not allow a web page to include an image. 2.10Firewalls cannot protect against viruses. 3. Match words and phrases in column X with the closest related meaning/ word(s)/phrase(s) in column Y. Enter your selection in the tear-off answer sheet attached to the question paper, following instructions therein. (1 x 10) X Y 3.1 Web browser A. CGI 3.2 Colors that change like a sparkling rainbow effect is called 3.3 A small program that can be embedded in another application B. VT-100 C..mil 3.4 Telnet D. Applet 3.5 An accepted standard for interfacing web servers and external applications. 3.6 An equipment used for establishing dialup connections to the internet E. FTP F. View information on Internet 3.7 A most common type of terminal emulation G. Iridescence 3.8 Front page H. remote login sessions 3.9 Domain names for military institutions I. Modem 3.10 A protocol used for transferring files on the Internet J. develop web sites K. create database L..edu M. IRC N..gov M3-R3 Page 3 of 5 July, 2006

4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Enter your choice in the tear-off answer sheet attached to the question paper, following instructions therein. (1 x 10) A. VB Script B. four C. <//body) D. methods E. </A> F. Java Script G. URL H. firewall I. V-Chat J. applet K. <BR> L. three M. <UL> N. attachment 4.1 Typing the correctly is essential to find web sites. 4.2 HTML tag for creating a line break is. 4.3 The tag is used for bulleted, unordered list. 4.4 One of the IRC programs offered by Microsoft is. 4.5 is a derivative of visual basic language. 4.6 A(n) is a document that can be sent along with e-mail. 4.7 There are octets in an IP address. 4.8 A(n) is a small java program that can be embedded in another application. 4.9 In an object oriented system, a class is a collection of data and that operate on that data. 4.10 stops unwanted traffic from entering the network. M3-R3 Page 4 of 5 July, 2006

PART TWO (Answer any four questions) 5. a) What is a Local Area Network (LAN)? What are its advantages? b) Briefly explain a Wide Area Network (WAN)? c) What does the term Usenet mean? 6. a) Define the Word Wide Web? What are the various features of World Wide Web? b) What is the difference between Internet and worldwide web? Explain? 7. a) What are the Internet security Threats? Explain them? b) Define a firewall and what are its benefits? (8+4+3) 8. a) What is the main purpose of Telnet? What model does Telnet follow? Write a short note how does it operate? b) What is a Proxy Server? What are the advantages of a Proxy Server? 9. Write short note on the following: a) Public Key and Private Key b) Domain Name Servers c) Browser (5x3) M3-R3 Page 5 of 5 July, 2006