Вы находитесь на странице: 1из 15

M3-R3 : Internet & Web Designing

NOTE:
1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions and
PART TWO contains FOUR questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS
TOTAL MARKS: 100
(PART ONE-40; PART TWO – 60)

PART ONE
(Answer all the questions)

1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 TCP is a commonly used protocol at


a) Application layer
b) Transport layer
c) Network layer
d) Physical layer

1.2 The process of keeping addresses in memory for future used is called
a) Caching
b) Routing
c) Resolving
d) RFC

1.3 The following is NOT an Internet search engine:


a) Google
b) WebCrawler
c) Excite
d) Scientia ans

1.4 The domain name in a URL refers to the


a) protocol
b) file name
c) server
d) directory
1.5 The World Wide Web integrates which of the following:
a) E-mail, Telnet, Usenet
b) Sound and movies files
c) A and B
d) All internet communication tools

1.6 All web addresses start with which of the following?


a) Htp
b) http://
c) http:/
d) www

1.7 Which of the following terms is a “browser”?


a) Netscape
b) World Wide web
c) Launcher
d) E-mail

1.8 Which of the following is not a method of accessing the web?


a) ISDN
b) MODEM
c) DSL
d) CPU

1.9 A word that is underlined on a web page is usually


a) Show emphasis
b) Recently added to the page
c) A link to another web page
d) The title of something

1.10 What is a cookie?


a) Computer code used to show animation and play sound.
b) Information sent to your computer that is used later to give information back to a visited web
site.
c) Computer code that automatically records all purchases and payments you make from your
computer.
d) An advertisement that will at some time be displayed on your computer screen.

2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and
ENTER in the “tear-off” sheet attached to the question paper, following instructions
therein. (1 x 10)

2.1 Telnet is the basic Internet service that was designed to transfer files from one computer system to
another.
2.2 When the cursor pointer changes to a hand you are over a hyperlink.
2.3 URL stands for Universal Resources Locator.
2.4 Tim Berner-Lee is the “Father” of the WWW.
2.5 A feature of using e-commerce is that consumers can make purchases directly from the business
on the Internet saving time for both parties.
2.6 Usenet is a set of acceptable behaviors that users should follow while on the Internet.
2.7 The term “thumbnail”, in relation to a Web site on the Internet refers to a small version of a larger
graphical image that you usually can click to display the full-sized image.
2.8 Software that may be used to help you locate Web pages on topics that you do not know the
addresses for is called search engines.
2.9 Download means to copy a file from your computer to another.
2.10 The two main file formats for images on the web are GIF and TIF.

3. Match words and phrases in column X with the closest related meaning/
word(s) / phrases in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y

3.1 System of electronically joined computers A. Cursor


3.2 Software that allows you to explore the internet B. Network
3.3 Movable indicator on computer screen C. Download
3.4 To shrink store data in less space D. Virus
3.5 To conform the identify of a computer user E. Browser
3.6 Connecting device between computers over a phone line F. Hit
3.7 Central computer sharing resources and data with other computers
on a network G. Authenticate
3.8 Basic unit of an-screen image H. Boot
3.9 To copy a file or program onto a personal computer I. Server
3.10 Related site on Internet J. Modern
K. Compress
L. Pixel
M. Link
N. Scanner

4. Each statement below has blank space to fit one of the word(s) or phrases in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

4.1 --------------------- is a program that allows the user to search for and use data on the Internet.
4.2 -------------------- is an acronym for the address of a document found on the Internet.
4.3 HTML, tag for creating a line break is -------------------.
4.4 ---------------- is a tool to help you find files on anonymous FTP servers.
4.5 --------------- is hardware or software designed to keep network hackers out.
4.6 -------------- is a worldwide collection of computer networks that allows people to find and use
information and communicate with others.
4.7 A (n) ---------- program is used to archive and compress files.
4.8 ------------------ uses links also called hyperlinks.
4.9 going from one place to another on the Internet is called --------------.
4.10 A huge collection of electronic pages containing information about many different subjects is
called -----------------------.
PART TWO
(Answer any FOUR questions)
5.
a) Write the HTML code for creating the following layout.

The EURO Cup Results

GAME BRAZIL GERMANY

1 3 2
2 4 1
3 0 8
4 8 7
5 2 1

b) What are the Internet security threats? What constitutes a good firewall system?
(7+8)
6.
a) Discuss the need for MIME? What are the five different headers specified in MIME?
b) What are the Web Publishing Tools? Discuss any two of them? (7+8)

7.
a) What are the web cookies? Why are they required?
b) Discuss the Bookmarks.
c) What is the function of the following buttons in internet Explorer Toolbar?
1) Search
2) History
3) Mail
4) Print
5) Refresh
(5+5+5)
8.
a) Describe the functions of a router and why it is important.
b) Describe the differences between star, ring and bus topologies.
c) The Domain Name System (DNS) plays an integral part in the functionally of the Internet.
Describe the functionally of DNS and its component parts.
(5+5+5)
9. Write short notes on any three of the following:
a) Major Internet Services.
b) TELNET
c) Search Engine
d) Java Script.
(5 x 3)
M3-R3: Internet & Web Designing

NOTE:

1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions and
PART TWO contains FOUR questions.

2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.

3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS
TOTAL MARKS: 100
(PART ONE-40; PART TWO – 60)

PART ONE
(Answer all the questions

1) Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “tear-off” answer sheet attached to the question paper, following
instructions therein. (1 x 10)

1.1 A HTML file starts with the tag


A) <TITLE>
B) <BODY>
C) <HEAD>
D) <HTML>

1.2 Computers on the Internet owned and operated by business organization form part of
the
A) com domain
B) edu domain
C) mil domain
D) gov domain

1.3 FTP is
A) A person
B) A file
C) A program for copying files from one computer to another
D) An Operating System

1.4 The Internet Protocol (IP)


A) Ensures that connections are maintained between computers.
B) Handles software computer addresses.
C) Finds the quickest route between two computers.
D) None of the above.

1.5 Main protocol used in Internet


A) IPX/SPX
B) TCP/IP
C) Token Bus
D) X.25

1.6 Web Pages are uniquely defined using


A) IP addresses
B) URL
C) Domain
D) Filename

1.7 For IP addresses, one of the following is not correct IP addresses


A) May be written as four decimal numbers separated by periods.
B) May be static.
C) May be dynamic.
D) May be random.

1.8 Which one of the following statement is not correct for Digital signature
A) It is a mechanism for authentication.
B) It is the scanned image of one’s signature.
C) It is created by encrypting information.
D) It cannot be duplicated.

1.9 Find the only statement in the following that is correct


A) JavaScript interpreter processes programs written in java.
B) JavaScript interpreter processes the commands in a script written in JavaScript.
C) Java and JavaScript are almost similar.
D) JavaScript cannot be embedded in HTML.

1.10 Indicate which one is correct


A) RealAudio is a plug-in.
B) Webcasting is one kind of firewall.
C) ASP is a protocol.
D) There is no difference between TCP and UDP.
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and
ENTER in the “tear-off” sheet attached to the question paper, following instructions
therein. (1 x 10)

2.1 Launcher is a Web browser.

2.2 All web addresses start with http://.

2.3 In star topology, any node can communication with any other node directly.

2.4 SMTP is associated with electronic mail.

2.5 FTP moves files between devices.


2.6 In HTML, the tag <H1> is used to indicate that http is being used.

2.7 IRC is used for the user authentication in the Telnet.

2.8 A datagram is an independent, self-contained message sent over the network whose arrival, arrival
time and content are not guaranteed.

2.9 JPEG is a lossless compression technique.

2.10 HTML does not allow a web page to include an image.

3. Match words and phrases in column X with the closest related meaning/
word(s) / phrases in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 A small program that can be embedded in another application.
A. Binary
3.2 When someone visits a web site, the server asks his browser to B. CGI
store a small amount of data so the server can identity him on the
next visit.

3.3 The electronic device in a modern that decodes an incoming signal C. Cookie
and extracts data.

3.4 A message from a trusted authority that is used during a secure D. Key
transmission.

3.5 A problem in computer networks that occurs when too many packets E. GUI
arrive at a point in the network.
3.6 A technology that uses a computer program to assemble a web page F. Congestion
whenever a user requests a page.

3.7 An interface that presents the user with pictures and icons rather G. Demodulator
than words.

3.8 A string, which is used to encrypt data to keep it secure.

3.9 A protocol used to access a mailbox and download e-mail that is H. Script
often used by ISP’s that offer dial-up access.

3.10 A security attack in which someone inside a company is tricked I. JPEG


into running a computer program that sends information from the
person’s computer to outsider. J. POP

K. MIME

L. Digital certificate

M. APPLET

N. Trojan horse

4. Each statement below has blank space to fit one of the word(s) or phrases in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

A. JavaScript F. Circuit switching K. Hypertext


B. Automated search G. DNS L. FTP
C. RFC H. Mail server M. TCP and IP
D. DAQ I. UDP N. ISP
E. Packet switching J. URL

4.1 The documents that define TCP/IP and related Internet technologies are called----------------------.

4.2 A (n) -------------------------- system permits multiple pairs of computers to communicate across a shared
network with minimal delay.

4.3 A company that offers Internet access is known as ----------------------.

4.4 A computer connected to the Internet needs both ------------------------ software.

4.5 A computer on the Internet only needs to know one ----------------------.

4.6 Menus embedded in text are called --------------------------------.

4.7 Given a valid ---------------------- a browser can go directly to the page without passing through other
documents.

4.8 Some public mailing lists and newsgroups maintain a file of ------------------- and answers.
4.9 -------------------------- is an active documents technology.

4.10 ------------------------- tools help users to find a set of pages that contain information related to a given topic.

PART TWO
(Answer any FOUR questions)

5.
a) What do you understand by the term URL? What are the different components that make an URL? Give an
example.

b) What are the difference between Internet and World Wide Web? Explain?

c) Why it takes a longer time to open a web page containing large number of icons, drawings and photographs?

6.
a) What is HTTP? What are the four basic operations specified by a browser that HTTP supports?

b) What is SLIP? What are the problems it has?

c) How the header output from a CGI program is interpreted by the server?

7.
a) Show, how a client can test a server using Telnet.

b) What is MIME? How does it help in scanning binary data via-e-mail message?

c) What is VRML? Write a program to enhance a Web page embedding a VRML like new.wrt.

8.
a) What do you understand by the term “Hierarchy” of Usenet Newsgroups? How do you identify a newsgroup?

b) Give the HTML, program segment for collecting information using forms. Information are name and
comment.

9.
a) What is encryption? Explain the Public Key Encryption technique.

b) Define a Firewall? What are its benefits?


July 2004

NOTE:

1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions and
PART TWO contains FOUR questions.
2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.
3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS
TOTAL MARKS: 100
(PART ONE-40; PART TWO – 60)

PART ONE
(Answer all the questions)

2. Each question below gives a multiple choice of answers. Choose the most
appropriateone and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

1.1 Which of the following networking solution is suitable for networking in a building?
A) WAN
B) MAN
C) LAN
D) All of the above

1.2 Cell based architecture is known as


A) LAN
B) FDDI
C) ATM
D) Client Server

1.3 The M in HTML stands for


A) Markup
B) Machine
C) Modeling
D) Margin

1.4 Which of the following is related to Internet security?


A) MIT
B) Firewall
C) DSL
D) W3C

1.5 Which of the following protocol is used by Internet mail?


A) TCP/IP
B) HTTP
C) FTP
D) PPP

1.6 IRC stands for


A) Internet Resources Channel
B) Internet Routing Channel
C) Internet Rights Council
D) Internet Relay Chat

1.7 Which of the following topology share a single channel on which all station can receive and
transmit?
A) Star
B) Tree
C) Bus
D) Ring

1.8 get command is found in


A) Telnet
B) TCP/IP
C) FTP
D) MAC

1.9 Which of the following technologies doesn’t help in creating dynamic Web pages?
A) ASP
B) JAVA
C) PERL
D) HTML

1.10 What is SSL?


A) The IP Protocol to dynamically assign IP addresses
B) It is a Web authoring tool
C) It allows secure connection
D) It is a scripting language
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and
ENTER in the “tear-off” sheet attached to the question paper, following instructions
therein. (1 x 10)

2.1 Sub netting is completely invisible to the outside world.


2.2 WAN is based on Ethernet.
2.3 IP always checks the datagram for errors before transmitting it.
2.4 IPv6 is 64 bytes in length.
2.5 Newsgroups provide a way to read articles pertaining to a general topic.
2.6 Guidelines that explain proper “behavior” when posting and replying to articles on Internet is
called Netiquella.
2.7 CSMA/CD access method is used in star networks.
2.8 There are up to six levels of header tag in HTML.
2.9 Confidentiality, integrity, and availability are basic requirement of Internet Security.
2.10 In copyright only expression is protected, not facts or ideas.

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrases in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)

X Y
3.1 Online documents that have to do with technical A. Star topology
standards for the Internet.

3.2 Map IP addresses onto Ethernet addresses. B. Ping

3.3 A network architecture that consists of a central hub to C. Shareware


Which all computers are connect is called.

3.4 Command used to checks the connectivity of a live network D. Value attribute
Is.

3.5 The automated system used to translate computer names E. IRC


Into equivalent IP address.

3.6 Combination of keyboard characters to express telling in F. Ring topology


e-mail communication.
3.7 Scrambling of a message for security. G. Client side

3.8 CGI programs run on. H. ARP

3.9 A local Area Network technology that uses fiber optics to I. Freeware
Interconnect stations in a ring topology is.

3.10 Software available for trial period which it must be J. Encryption


Registered to use.

K. Enoticons

L. GET

M. Server side

N. FDDI

4. Each statement below has blank space to fit one of the word(s) or phrases in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)

A. Baud Rate D. Maximum Transfer Unit

B. Spam E. Default Route

C. encryption F. WAN

G. Trojan horse H. Dynamic HYML pages

I. distribution J. IRC

K. Sniffer L. Security

M. Morris worm N. First in Report of Second Task

O. W97 Groviee P. Tags

Q. Misplaced R. VRML
4.1. The clock rate at which the pulses are transmitted by a serial device is called ---------

4.2 The maximum size of datagram that can be processed by that particular piece of hardware is
called -------------------.

4.3 PHP is a scripting language to create -----------------------.

4.4 ------------------- networks provide a mechanism for information to be transmitted bi-


directionally between computers on the Internet.

4.5 A packet ------------------- is a program that captures data from information packets as they
travel over the network.

4.6 In 1988, the ARPANET had its first automated network security incident, usually referred to as
the --------------------.

4.7 Unsolicated commercial e-mail is called --------------------.

4.8 The process of translating information from its original form into an encoded,
incomprehensible form is called -----------------------.

4.9 HTML commands surrounded by <and> are called ----------------.

4.10 Address 0.0.0.0 is called the ---------------------------.

PART TWO
(Answer any FOUR questions)

5.
a) Describe briefly the following:
1) Domain Name
2) Net Etiquette
3) Misuse of Internet

b) Describe in brief the actions (any five) that you will take to protect your PC that is
networked against virus invasion.

6.
a) How will you register a website on a search engine?
b) What is the difference between dynamic and static web sites?
7.
a) What is Intranet? Explain briefly their characteristics.
b) What is a search engine? Discuss with few examples.
c) What is web casting? Discuss it uses.

8.
a) Give an overview of SMTP. Discuss its drawbacks. Discuss the enhancements
available in MIME to overcome these drawbacks.
b) What is VRML? How does it differ from HTML.

9.
a) Write short notes on any Three of the following:
1) Levels of Internet Connectivity.
2) Usenet.
3) Telnet.
4) FTP

Вам также может понравиться