Академический Документы
Профессиональный Документы
Культура Документы
DEPARTMENT OF COMPUTER SCIENCE AND ENGINEERING (UG & PG) Final Year Computer Science and Engineering, 8th Semester Subject Code & Name: OPEN SOURCE TOOLS & COMPONENTS Prepared by: Prof.T.KALAIKUMARN, Prof/CSE, Mrs.S.DHANALAKSHMI , AP/CSE,
Mr.D.PRABAKAR AP/CSE
UNIT I Part -A 1. What is Open source software? Open Source Software is software for which the underlying programming code is available to the users so that they may read it, make changes to it, and build new versions of the software incorporating their changes. There are many types of Open Source Software, mainly differing in the licensing term under which (altered) copies of the source code may (or must be) redistributed. 2. What is the Need of Open Source Systems? No initial cost No licensing issues Openness and Transparency Speed of Access Freedom of movement Portable Reliable Stable Security
3. What are the four important factors that led to the development of open source software? The following are the four important factors that lead to the development of Open Source Software: To diminish the high monopoly value of the Proprietary Software To avoid discrimination among persons like developers of the product and users of the product To enable the user finding and fixing the bugs themselves To allow customers to have control over the products they use and to redistribute the same with or without modifications. Page 1
5. Mention some Applications of Open Source Systems? Finance Educational Data Storage and Management Games Media Networking and Internet Graphics
6. What are the two phases in the evolution of Linux? A Development Phase: Here the Kernel is not reliable and the Process is to add functionality to it, Optimize it and to try new ideas. This Phase gives rise to odd-numbered version numbers, such as 1.1,1.3 etc., This is the time when the maximum amount of work is done on the kernel A Stabilization Phase: Where the aim is to produce as stable a kernel as possible. Only minor adjustments and modifications are made. The version numbers of so called Stable Kernels are even, such as 1.0,1.2 etc., 7. What are the advantages of Linux? Low-Cost Runs on old Hardware Choice Installation and GUI Security Open source 8. List the disadvantages of Linux Learning Lack of equivalent programs More technical ability needed Not all hardware compatible
Page 2
Proprietary software 1. Closed source commercial software 2. Proprietary ware (demos) 3. Shareware 4. Freeware 5. Abandon ware
Non-proprietary software 1. 2. 3. 4. 5. 6. Public domain Free Software (FS) Open Source (OSS) Commercial software Software licensed for a fee Both proprietary and nonproprietary.
Advantages
Disadvantages
31. Give different types of Library in LINUX. MicroLCS, Emilda Evergreen FireFly GNUTeca Avanti Koha OpenBiblio phpMyLibrary PMB PYTHEAS WEBLIS 32. Mention the some of SHELL Commands. /bin/csh - Executed after .cshrc when logging in with C shell as the login shell. Edit [file:] function - Edit helps in finding the line of program where execution was stopped. List: List command types the text of program in the vicinity where it is presently stopped. Function is name of function and file is name of file. SNSCT Department of Computer Science & Engineering (UG&PG) Page 6
33. What are the 2 stages in boot Process of Linux? The boot process in Linux has two stages: The boot loader stage The kernel stage. 34. What is PAM? Pluggable authentication modules (PAM) are a mechanism to integrate multiple low-level authentication schemes into a high-level application programming interface (API). It allows programs that rely on authentication to be written independent of the underlying authentication scheme. . 35. What are the functions of the TCP/IP? TCP/IP (Transport Control Protocol/Internet Protocol) is a protocol suite that is implemented in theOS you are using and is running on OSI-layer 3 and 4 the network and transport layer. TCP/IP is responsible for you having an IP-address and delivers the possibility to the computer to communicate with other systems using IP-addresses, a subnetmask, portnumbers and a default gateway. 36. Discuss about some of the Subdirectories. /root directory, starting point of the directory tree /home (private) directories of users /devDevice files that represent hardware components /etc Important files for system configuration /etc/init.d Boot scripts/usr/binGenerally accessible programs 37. What is the use of LINUX Directory Structure? Store drives Accessing data using folders Root directory: beginning of file system 38. What are strength and weakness of FOSS? Strength: Ability to fit local needs No restrictions on use Low cost & Innovation User-driven Collaboration &Transfer of Technical Know-How Weakness: Unanticipated Efforts Lack of Coordination Inadequate Technical Support & Risk of discontinuation SNSCT Department of Computer Science & Engineering (UG&PG) Page 7
Page 8
Intermittent connections. If you are not actively retrieving mail or browsing web pages, the ISP will break the connection. And, since it ties up the phone line, most individuals will wish to disconnect when not in use.
44. Define ISDN ISDN stands for Integrated Services Digital Network. This is a standard for digital communication that was established in the early 90s. It was to revolutionize Internet access when most of us were using 28K modems but it was difficult for the end user to get and slow to be adopted for a multitude of reasons. It is: Digital version of dial-up telephone Installed by local phone company Requires an ISDN card in the PC or an external modem A digital call is made at the time of need Reliable speeds of 64-128K Internet access (ISP) a separate cost Monthly fee: $45 base fee for metered use, $120 for unlimited use 45. Give the advantage of ISDN Fast dialing (~1.5 sec). The time it takes to make your initial connection is almost imperceptable. Easy to switch ISPs. All you have to do is call a different number. ISP can connect to you (extra cost) Available in some locations where alternatives are not 46. Give the disadvantage of ISDN Expensive Intermittent connections Requires additional hardware Requires new wiring Metered by phone company and sometimes the ISP Difficult to get installed Works only at the site of installation Limited availability 47. Define DSL DSL stands for Digital Subscriber Line. It is essentially a fixed digital connection between you and your ISP. Runs over ordinary telephone wires Digital signals use high frequencies not used by analog phones Installed by local phone company Reliable speeds of 144K to 7M Always on Internet access (ISP) a separate cost Costs from $22 for 256K to $275 for 7M 48. Give the DSL Advantages Always on Flat fee & Reliable Requires no new wiring. Will run over the standard phone wiring in your house. SNSCT Department of Computer Science & Engineering (UG&PG) Page 9
Does not tie up phone line. A telephone and the computer can share the same physical wire and be used simultaneously. Fixed IP available so you can use it to host your own domain for your practice Can be used to host a web site. Dial-up access when traveling often included
49. Give the DSL Disadvantages Can be tough to switch providers Requires additional hardware (DSL Router) Can be difficult to get installed but this has improved significantly in the past 2 years Works only at the site of installation Limited availability Fast upload speeds are available at an extra cost 50. What is Cable? Cable access to the Internet is provided by many cable TV companies and is the preferred method for high-speed access to the Internet from home. Runs over cable TV wiring Installed by cable company Download speeds of 768K to 3M and higher Upload speeds slower. These can vary from 256K up to 384K Always on Shared bandwidth. Just like the freeway, the more people who are trying to get somewhere, the slower it is. Unlimited use with Internet access (ISP) included in cost Costs about $50 per month 51. Give the Advantage of Cable Usually quite fast Always on in most installations Flat fee Somewhat reliable but this varies considerably Broader availability Does not interfere with TV 52. Give the Disadvantage of Cable Shared bandwidth. The more people that are using it, the slower it is but even at its worst it is much faster than a modem. Requires additional hardware (cable box) Works only at the site of installation Upload slower than download No choice in cable company or ISP when selecting service Dial-up access when traveling usually not included 53. Define Satellite Available from remote locations Available from two companies Direcway (www.direcway.com) (Windows only) and Starband (www.starband.com) Downloads up to 1M. Upload via up-link. Uplink speeds 100K SNSCT Department of Computer Science & Engineering (UG&PG) Page 10
Unlimited service $70/month. Hardware $500 for single Windows 98SE or newer machine, installation extra. Networked computers (Macm Win, Linux, Unix) unlimited service $150/month. Hardware $600
54. Give the Satellite Advantages Available from anyplace that has a view of the southern sky Always on Unlimited access 55. Give the Satellite Disadvantages Hardware and installation costs Monthly service fee Shared bandwidth. Speeds get slower as more users install the system Can be slow when using a Virtual Private Network (VPN) 56. What is Dedicated Leased Line A fixed digital connection with the phone company Bidirectional Internet access at guaranteed speeds Speeds range from 56K to T1 (1.5M) on up Always on, unmetered ISP separate charge Fees 56K $80/month + ISP $300/m. 1.5M T1 $250/m + ISP $1500/m 57. Give the Leased Line Advantages The most reliable connection to the Internet Guaranteed bandwidth and service levels Great for hosting a web site or for managing your own security and firewalls 56K lines available anyplace there is a telephone 58. Give the Leased Line Disadvantages Expensive T1 and higher access confined to metro. Extremely expensive in rural areas Difficult to get installed Not easy to switch ISPs Requires dedicated hardware 59. What are the ways to Sharing an Internet Connection? There are many ways to share an Internet connection among several machines. This technique has been around for years but has only recently become accessible to the average user. With the proper tools, one can have any number of machines share the same dial-up, DSL or Cable connection. 60. What way to Sharing a Dial-up connection and give the advantage & disadvantage Sharing a telephone line with any style of computer can easily be done with any number of products. The Apple Airport Base Station was the first to make this available to the consumer while other products such as the Lucent Orinoco RG-1000 are designed to work with any platform. Computers connect to the dial-up Internet via a local wired ethernet or wireless Wi-Fi network. SNSCT Department of Computer Science & Engineering (UG&PG) Page 11
Page 12
8. Explain some common system configuration files & log files. 9. Explain about Configuring networking, basics of TCP/IP networking and routing? 10. Explain about connecting to the Internet through i. ii. iii. iv. Dialup DSL Ethernet Leased line.
Page 13
2. What is the hardware requirements need for installing the LINUX? CPU Main memory Optical Drive Graphic card Hard Drive Sound Card 3. Give steps for Configuring Linux System. Selecting a language Choosing automatic or manual partitioning Type of software to install Choosing which drive to boot from Adjusting the time settings Configuring the hardware aspect of the system Creating the root password (for the Administrator), and user accounts Hardware configuration 4. Define IMAP? IMAP is an Internet Message Access Protocol. It is a method of accessing electronic mail messages that are kept on a possibly shared mail server. In other words, it permits a "client" email program to access remote message stores as if they were local. For example, email stored on an IMAP server can be manipulated from a desktop computer at home, a workstation at the office, and a notebook computer while travelling, without the need to transfer messages or files back and forth between these computers. IMAP uses TCP/IP port 143. 5. Define POP Short for Post Office Protocol, a protocol used to retrieve e-mail from a mail server. Most e-mail applications (sometimes called an e-mail client) use the POP protocol, although some can use the newer IMAP (Internet Message Access Protocol). There are two versions of POP. The first, called POP2, became a standard in the mid-80's and requires SMTP to send messages. The newer version, POP3, can be used with or without SMTP. POP3 uses TCP/IP port 110. SNSCT Department of Computer Science & Engineering (UG&PG) Page 14
Page 15
16. Give the Components of SMB smbd daemon: This provides the file and print services to SMB clients such as Windows NT or other Linux or Unix clients. smb.conf: This is the configuration file for smbd. nmbd daemon: This daemon provides NetBIOS nameserving and browsing support. smbclient: This is an smb client program that implement a simple FTP-like client on a Linux or Unix box. smbmount: This mounting program enables mounting of server directories on a Linux or Unix box. testparm: This utility is used to test the smb.conf configuration file. smbstatus: This programs lists the current Samba connections. SWAT: Swat allows a Samba administrator to configure the smb.conf file via a Web browser. smbpasswd: This allows the user to change the password used for their SMB sessions
Page 16
19. Define DHCP? DHCP (Dynamic Host Configuration Protocol) is a network service that enables clients to obtain network settings (IP Address, Subnet Mask, Default Gateway, DNS Server, Hostname and Domain) automatically from a central server The DHCP client sends a broadcast request to find the DHCP server and the DHCP server in the subnet responds with an IP address (and other common network parameters) from a pool of IP addresses The IP address can be bound to the MAC address of the client
20. What is process in LINUX? Processes are created in a hierarchical structure whose depth is limited only by the virtual memory available to the virtual machine A process may control the execution of any of its descendants by suspending or resuming it, altering its relative priority, or even terminating it Termination of a process by default causes termination of all its descendants; termination of the root process causes termination of the session Linux assigns a process ID (PID) to the process
21. Define Daemons. Background processes for system administration are referred to as daemons These processes are usually started during the boot process The processes are not assigned any terminals 22. Why is IP Masquerading HOT? Demand to share a single Internet address across multiple machines. Demand to save Internet IPv4 address space. Demand for better internal network security.
Page 17
24. What is a main objective of file sharing? File sharing lets you share files on your machine with others on the Network File sharing also lets you access files that are shared by others File services enable organizations to create and maintain central data stores File servers also allow complex access control to be applied to the data Stored on the server - so that only those who should have access to the data Can access it A file server could be used to share data with a Windows network or a Linux / UNIX network - Linux contains software to do both these things 25. Give two File sharing services on Linux. 1. Linux-with-Linux files sharing 2. Linux-with-Windows file sharing 26. Why we need SAMBA? Samba can be used with Linux to provide transparent access between Machines running Linux and machines running Windows. The basic architecture of Samba is that Samba itself runs on a Linux machine and makes shared files and printers available to Windows' machinesthe Windows machines see the shares on the Linux machine in the same way Windows machines see shares on other Windows machines or Windows servers. 27. List any 3 practical applications of SAMBA. Using a Linux server as a simple peer-to-peer server Using a Linux server as a member server on an existing Windows NT o Domain that has an existing domain controller Using a Linux server as a primary domain controller
Page 18
28. How to Test the Samba from Windows? Log into the machine as a local user Open up Network Neighbourhood and browse the complete network Locate the Workgroup that youve setup on your Linux machine and Click on it Inside this, select the machine that you want to use and test out It will prompt you for a password and then show you the shares that you Have defined in the Samba server Try doing some operations on the share to validate whether the access Control is happening correctly or not 29. How to manage the SAMBA users? Samba can only authenticate users against passwords stored in its own Database; it can not authenticate users again the Linux passwd file.However, it is necessary to have a mapping between Linux system users and Samba users - for each Samba user, a valid system user with the same name should also exist; otherwise Samba will not be able to lookup the user. 30. What is NFS? NFS is a file sharing protocol primarily used on the Linux/Windows world. It is completely transparent for a user or application - there is no change in the way a user or application would access a file on disk or over NFS. NFS is commonly implemented over UDP; it depends on RPC to perform most of its functions. On Debian, the NFS server package is called: nfskernel- server. Installing this package will install NFS on your Linux system. 31. What are things needs during sending the E-mail? Mail-Boxes User Agents Transfer-Agents Delivery agents Mailing lists and Aliases 32. List the features of SMTP. SMTP which stands for Simple Mail Transfer Protocol is the de facto standard for email receipt and delivery. SMTP used TCP/IP protocol to exchange email messages between two MTAs via intermediate MTAs using store and forward principle. Many SMTP servers are available for Linux such as Sendmail, Postfix, qmail, Exim. Today SMTP servers not only accept, relay and deliver email, but also perform other functions like Authentication, SPAM filtering and Access Control 33. What is the Role of DNS in Mail Delivery? DNS plays a very important role in delivering email Mail eXchanger (MX) records are Maintained by domain name servers (DNS) to tell MTAs where to send mail messages.
Page 19
Page 21
2. Explain about Understanding the OS boot up process? 3. Explain performing every day tasks using gnu/Linux i. Accessing the Internet ii. Playing music iii. Editing documents and spreadsheets iv. Sending and receiving email v. Copy files from disks and over the network vi. Playing games vii. Writing CDs 4. Explain: X Window system configuration and utilities i. Configure X windows ii. Detect display devices 5. Installing software from source code as well as using binary packages. 6. Explain: Setting up email servers i. using postfix (SMTP services) ii. courier (IMAP & POP3 services) iii. squirrel mail ( web mail services) 7. Explain: Setting up web servers using apache (HTTP services) 8. Explain and give an example program for php (server-side scripting)? 9. What is perl (CGI support)? 10. Explain about Setting up file services -- using samba and NFS? 11. Setting up proxy services -- using squid? 12. Setting up printer services - using CUPS and foomatic?
Page 22
15. Write the packet filtering rules Packet filtering rules or filters can be configured to allow or deny traffic based on one or more of the following variables Source IP address,Destination IP address Protocol type (TCP/UDP) Source port, Destination port 16. List the Strengths & weakness of packet filter Strength Faster than other packet screening methods have very little impact on overall network performance Packet filtering firewalls less expensive can be implemented transparently Weakness There are three common exploits to which packet filtering firewalls are susceptible. IP spoofing, Buffer overruns, ICMP tunneling. It allows a direct connection to be made between the two endpoints. 17. Define Stateful Packet Inspection Stateful packet inspection uses the same fundamental packet screening technique that packet filtering does. In addition, it examines the packet header information from the network layer of the OSI model to the application layer to verify that the packet is part of a legitimate connection and the protocols are behaving as expected. This method can make decisions based on one or more of the following: Source IP address, Destination IP address Protocol type (TCP/UDP) Source port, Destination port & Connection state
Page 25
22. Write the Applications of Iptables Build internet firewalls based on stateless and stateful packet filtering Use NAT and masquerading for sharing internet access if you don't have enough public IP addresses. Use NAT to implement transparent proxies Aid the tc and iproute2 systems used to build sophisticated QoS and policy routers Do further packet manipulation (mangling) like altering the TOS/DSCP/ECN bits of the IP header 23. Write the IPTables command options There are three built-in tables in the Linux kernel's netfilter, and each has built-in chains. the iptables command is used to configure these tables. 1. Filter A table that is used for routing network packets. This is default table, and is assumed by iptables if the -t parameter is not specified. INPUT Network packets that are destined for the server. OUTPUT Network packets that originate on the server. FORWARD Network packets that are routed through the server. 2. Nat A table that is used for NAT. NAT is a method of translating internal IP address To external IP addresses. PREROUTING- network packets that can be altered when they arrive at the server. OUTPUT- Network packets that originate on the server POSTROUTING Network packets that can be altered right before they are sent out. 3. Mangle A table that is used for altering network packets. INPUT Network packets that are destined for the server. OUTPUT Network packets that originate on the server. FORWARD Network packets that are routed through the server. PREROUTING- network packets that can be altered when they arrive at the server. POSTROUTING Network packets that can be altered right before they are sent out. Commands tell IPTables to perform a specific action, and only one command is allowed per iptables command string. Except for the help command, all Commands are written in upper-case characters. 24. Define Proxy Server A web proxy server is a useful service to have on your network, or between your network and the Internet, as it provide an extra security layer that insulates your users from the Internet. A proxy server can also act as a cache, allowing users to share SNSCT Department of Computer Science & Engineering (UG&PG) Page 27
2. Explain about using the GNU Compiler Collection GNU compiler tools i. The C preprocessor (cpp) ii. The C compiler (gcc) iii. The C++ compiler (g++) iv. Assembler (gas). 3. Explain about understanding build systems : i. Constructing make files and using make ii. Using autoconf and autogen.
4. Explain about using source code versioning and management tools - using CVS to manage source code revisions, patch & diff. 5. Discuss the CVS.
Page 28
7. What are the models of MDA? Computation Independent Model (CIM) Platform Independent Model (PIM) Platform Specific Model (PSM)
Page 29
8. Distinguish the advantages and disadvantages of MDA advantages Reduces the complexity of a system Allows easy adaptation to new technologies Standardization allows integration between different tools Simple models allow easier communication with the customer Automatic code generation disadvantages Manual changes in code Manual changes in lower level models How optimized will the generated code be Still unresolved standard issues Increased complexity of the modeling languages
9. Give some of the tools in MDA. Open-source : AndroMDA, Kermeta, MOFScript, ModFact, OpenMDX, XDoclet, OOMEGA 10. What are the benefits of using MDA? o Portability o Cross-platform Interoperability, o Platform Independence, Productivity 11. List the four principles from the OMG's view of MDA. Models expressed in a well-defined notation are a cornerstone to understanding systems for enterprise-scale solutions. The building of systems can be organized around a set of models by imposing a series of transformations between models, organized into an architectural framework of layers and transformations. A formal underpinning for describing models in a set of metamodels facilitates meaningful integration and transformation among models, and is the basis for automation through tools. Acceptance and broad adoption of this model-based approach requires industry standards to provide openness to consumers, and foster competition among vendors. 12. Why should we use MDA? MDA allows you to model the functionality and behavior only once.Therefore saves a lot of time.E.g. Carphone Warehouse were using Uniface Software and now are switching to Java.
Page 30
Model
a description or analogy used to help visualize something that cannot be directly observed models are used for describing, visualizing, and observing models describe a system from different viewpoints, for different stakeholders, at different levels of abstraction
Meta model
Metamodels describe models (i.e., metamodel instances) allowed metaelements, their properties and relationships well-formedness rules for the instantiated models in essence, an abstract syntax for models!
14. List an Adopted technologies in Object Management Group (OMG). Model Driven Architecture (MDA) Meta-Object Facility (MOF) Unified Modeling Language (UML) XML Metadata Interchange (XMI) Common Warehouse Metamodel (CWM) Common Object Request Broker Architecture (CORBA) 15. Define MOF. MOF(The Meta-Object Facility) defines an abstract language and a framework for specifying, constructing, and managing technology neutral metamodels (e.g. UML, MOF itself) 16. What is MOF specification? A formal definition of MOF meta-metamodel Abstract language for specifying MOF metamodels A mapping from arbitrary MOF metamodels to CORBA IDL Produces IDL interfaces for managing metadata A set of reflective CORBA IDL interfaces For representing and managing MOF metamodels An XMI format for MOF metamodel interchange 17. Differences between MOF and UML. MOF Binary associations No AssociationClasses or Qualifiers Direct References Generalization and Dependency are Associations No support for templates Subset of CORBA primitive data types and constructors UML N -ary associations AssociationClass, Qualifier Navigation through Associations Generalization and Dependency are metaclasses Template metaclass No CORBA awareness
Page 31
18. List the features of MOF MOF offers metamodeling and a metadata architecture implementation an industry standard support for existing and upcoming technologies aligned with UML a single reference point throughout the enterprise 19. Define the services provided by Web server. Web server: A webserver is a computer system that delivers web pages. Every web server has an IP address and possibly a domain name. for example an URL: http://www.niceindia.com/index.html in our browser. This sends a request to the server whose domain name is niceindia.com. the server fetches the page named index.html and sends back to our browsers. 20. What is Distributed Computing Environment? The Distributed Computing Environment is a set of standard pioneered by the open software foundation (OSF), includes a standard for RPC. Although the DCE standard has been around for some time, and was probably a good idea, it has never gained wide acceptance and exists today as little more than an historical curiosity.
21. What is patch file? Linux and UNIX source software often comes with security and other patches. Patch takes a patch file patchfile containing a difference listing produced by the diff program and applies those differences to one or more original files, producing patched versions. Normally the patched versions are put in place of the originals.
Part - B 1. 2. 3. 4. 5. How to configure of Apache web server? Explain the Model Driven Architecture? Make a comparison with Apache web server and IIS server. List the Features of Meta Object facility. Discuss the concept of UML.
Page 32
2. Define Window Managers Window managers: The metaphor of desktop is important for a user. By analogy, a user may choose to activate one of the tasks from many on his desk. The window managers are designed to provide this illusion. In other words, a window manager (WM in short) must provide facilities that can support such desk-oriented operation from the view on the screen. 3. List some X-Clients and its functionalities xclock: A clock display. It is possible to have a numerical or an analog display for the current time. xbiff: A Berkeley support program that displays mail status with a flag up, to Show the arrival of a new mail. xterm: It provides a user with a new terminal window. With -C option the window can receive and display console messages. 4. What Is Thin-Client/Server Computing? The thin-client/server computing model involves connecting thin-client software or a thin-client hardware device with the server side using a highly efficient network protocol such as Citrix's ICA. The thin-client/server architecture enables 100 percent server-based processing, management, deployment, and support for missioncritical,productivity, Web-based, or other custom applications across any type of connection to any type of client hardware, regardless of platform. The client hardware can include Windows-based terminals, PCs, NetPCs, network computers, Apple Macintosh computers, or UNIX devices. 5. Define Qt Programming. Qt is a library of C++ GUI application development software. Its purpose is to provide everything needed to develop the user interface portion of applications. It does this primarily in the form of a collection of C++ classes.
Page 33
14. Define Signal, Event and Callback. GTK+ library is an event driven system. All GUI applications are event driven. The applications start a main loop, which continuously checks for newly generated events. If there is no event, the application waits and does nothing. In GTK+ an event is a message from the X server. When the event reaches a widget, it may react to this event by emitting a signal. The GTK+ programmer can connect a specific callback to a signal. The callback is a handler function that reacts to a signal.
15. What is GTK+ dialogs? Dialog windows or dialogs are an indispensable part of most modern GUI applications. A dialog is defined as a conversation between two or more persons. In a computer application a dialog is a window which is used to "talk" to the application. A dialog is used to input data, modify data, change the application settings etc. Dialogs are important means of communication between a user and a computer program. 16. Define GTK+ Widgets. Widgets are basic building blocks of a GUI application. Over the years, several widgets became a standard in all toolkits on all OS platforms. For example a button, a check box or a scroll bars. The GTK+ toolkit's philosophy is to keep the number of widgets at a minimum level. More specialized widgets are created as custom GTK+ widgets. 17. Give ant 2 features of GKT+. GTK (GIMP Toolkit) is a library for creating graphical user interfaces. It is licensed using the LGPL license, so you can develop open software, free software, or even commercial non-free software using GTK without having to spend anything for licenses or royalties. GTK is essentially an object oriented application programmers interface (API). Although written completely in C, it is implemented using the idea of classes and callback functions (pointers to functions).
18. What is the Video LAN project? VideoLAN is a complete software solution for video streaming, developed by students of the Ecole Centrale Paris and developers from all over the world, under the GNU General Public License (GPL). VideoLAN is designed to stream MPEG videos on high bandwidth networks. SNSCT Department of Computer Science & Engineering (UG&PG) Page 35
Page 36
Prepared By
Prof.T.KALAIKUMARN, Prof/CSE, Mrs.S.DHANALAKSHMI, AP/CSE, Mr.D.PRABAKAR AP/CSE
Verified by
Prof.T.KALAIKUMARN, Prof/CSE,
Page 37