Академический Документы
Профессиональный Документы
Культура Документы
NOTE:
1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions and
PART TWO contains FOUR questions.
2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.
3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS
TOTAL MARKS: 100
(PART ONE-40; PART TWO – 60)
PART ONE
(Answer all the questions)
1. Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)
1.2 The process of keeping addresses in memory for future used is called
a) Caching
b) Routing
c) Resolving
d) RFC
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and
ENTER in the “tear-off” sheet attached to the question paper, following instructions
therein. (1 x 10)
2.1 Telnet is the basic Internet service that was designed to transfer files from one computer system to
another.
2.2 When the cursor pointer changes to a hand you are over a hyperlink.
2.3 URL stands for Universal Resources Locator.
2.4 Tim Berner-Lee is the “Father” of the WWW.
2.5 A feature of using e-commerce is that consumers can make purchases directly from the business
on the Internet saving time for both parties.
2.6 Usenet is a set of acceptable behaviors that users should follow while on the Internet.
2.7 The term “thumbnail”, in relation to a Web site on the Internet refers to a small version of a larger
graphical image that you usually can click to display the full-sized image.
2.8 Software that may be used to help you locate Web pages on topics that you do not know the
addresses for is called search engines.
2.9 Download means to copy a file from your computer to another.
2.10 The two main file formats for images on the web are GIF and TIF.
3. Match words and phrases in column X with the closest related meaning/
word(s) / phrases in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)
X Y
4. Each statement below has blank space to fit one of the word(s) or phrases in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)
4.1 --------------------- is a program that allows the user to search for and use data on the Internet.
4.2 -------------------- is an acronym for the address of a document found on the Internet.
4.3 HTML, tag for creating a line break is -------------------.
4.4 ---------------- is a tool to help you find files on anonymous FTP servers.
4.5 --------------- is hardware or software designed to keep network hackers out.
4.6 -------------- is a worldwide collection of computer networks that allows people to find and use
information and communicate with others.
4.7 A (n) ---------- program is used to archive and compress files.
4.8 ------------------ uses links also called hyperlinks.
4.9 going from one place to another on the Internet is called --------------.
4.10 A huge collection of electronic pages containing information about many different subjects is
called -----------------------.
PART TWO
(Answer any FOUR questions)
5.
a) Write the HTML code for creating the following layout.
1 3 2
2 4 1
3 0 8
4 8 7
5 2 1
b) What are the Internet security threats? What constitutes a good firewall system?
(7+8)
6.
a) Discuss the need for MIME? What are the five different headers specified in MIME?
b) What are the Web Publishing Tools? Discuss any two of them? (7+8)
7.
a) What are the web cookies? Why are they required?
b) Discuss the Bookmarks.
c) What is the function of the following buttons in internet Explorer Toolbar?
1) Search
2) History
3) Mail
4) Print
5) Refresh
(5+5+5)
8.
a) Describe the functions of a router and why it is important.
b) Describe the differences between star, ring and bus topologies.
c) The Domain Name System (DNS) plays an integral part in the functionally of the Internet.
Describe the functionally of DNS and its component parts.
(5+5+5)
9. Write short notes on any three of the following:
a) Major Internet Services.
b) TELNET
c) Search Engine
d) Java Script.
(5 x 3)
M3-R3: Internet & Web Designing
NOTE:
1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions and
PART TWO contains FOUR questions.
2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.
3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS
TOTAL MARKS: 100
(PART ONE-40; PART TWO – 60)
PART ONE
(Answer all the questions
1) Each question below gives a multiple choice of answers. Choose the most appropriate
one and enter in the “tear-off” answer sheet attached to the question paper, following
instructions therein. (1 x 10)
1.2 Computers on the Internet owned and operated by business organization form part of
the
A) com domain
B) edu domain
C) mil domain
D) gov domain
1.3 FTP is
A) A person
B) A file
C) A program for copying files from one computer to another
D) An Operating System
1.8 Which one of the following statement is not correct for Digital signature
A) It is a mechanism for authentication.
B) It is the scanned image of one’s signature.
C) It is created by encrypting information.
D) It cannot be duplicated.
2.3 In star topology, any node can communication with any other node directly.
2.8 A datagram is an independent, self-contained message sent over the network whose arrival, arrival
time and content are not guaranteed.
3. Match words and phrases in column X with the closest related meaning/
word(s) / phrases in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)
X Y
3.1 A small program that can be embedded in another application.
A. Binary
3.2 When someone visits a web site, the server asks his browser to B. CGI
store a small amount of data so the server can identity him on the
next visit.
3.3 The electronic device in a modern that decodes an incoming signal C. Cookie
and extracts data.
3.4 A message from a trusted authority that is used during a secure D. Key
transmission.
3.5 A problem in computer networks that occurs when too many packets E. GUI
arrive at a point in the network.
3.6 A technology that uses a computer program to assemble a web page F. Congestion
whenever a user requests a page.
3.7 An interface that presents the user with pictures and icons rather G. Demodulator
than words.
3.9 A protocol used to access a mailbox and download e-mail that is H. Script
often used by ISP’s that offer dial-up access.
K. MIME
L. Digital certificate
M. APPLET
N. Trojan horse
4. Each statement below has blank space to fit one of the word(s) or phrases in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)
4.1 The documents that define TCP/IP and related Internet technologies are called----------------------.
4.2 A (n) -------------------------- system permits multiple pairs of computers to communicate across a shared
network with minimal delay.
4.7 Given a valid ---------------------- a browser can go directly to the page without passing through other
documents.
4.8 Some public mailing lists and newsgroups maintain a file of ------------------- and answers.
4.9 -------------------------- is an active documents technology.
4.10 ------------------------- tools help users to find a set of pages that contain information related to a given topic.
PART TWO
(Answer any FOUR questions)
5.
a) What do you understand by the term URL? What are the different components that make an URL? Give an
example.
b) What are the difference between Internet and World Wide Web? Explain?
c) Why it takes a longer time to open a web page containing large number of icons, drawings and photographs?
6.
a) What is HTTP? What are the four basic operations specified by a browser that HTTP supports?
c) How the header output from a CGI program is interpreted by the server?
7.
a) Show, how a client can test a server using Telnet.
b) What is MIME? How does it help in scanning binary data via-e-mail message?
c) What is VRML? Write a program to enhance a Web page embedding a VRML like new.wrt.
8.
a) What do you understand by the term “Hierarchy” of Usenet Newsgroups? How do you identify a newsgroup?
b) Give the HTML, program segment for collecting information using forms. Information are name and
comment.
9.
a) What is encryption? Explain the Public Key Encryption technique.
NOTE:
1. There are TWO PARTS in this Module/paper. PART ONE contains FOUR questions and
PART TWO contains FOUR questions.
2. PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.
3. Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will be
supplied at the table when the answer sheet for PART ONE is returned. However,
candidates who complete PART ONE earlier than one hour, can collect the answer book for
PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS
TOTAL MARKS: 100
(PART ONE-40; PART TWO – 60)
PART ONE
(Answer all the questions)
2. Each question below gives a multiple choice of answers. Choose the most
appropriateone and enter in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)
1.1 Which of the following networking solution is suitable for networking in a building?
A) WAN
B) MAN
C) LAN
D) All of the above
1.7 Which of the following topology share a single channel on which all station can receive and
transmit?
A) Star
B) Tree
C) Bus
D) Ring
1.9 Which of the following technologies doesn’t help in creating dynamic Web pages?
A) ASP
B) JAVA
C) PERL
D) HTML
3. Match words and phrases in column X with the closest related meaning/
word(s)/phrases in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1 x 10)
X Y
3.1 Online documents that have to do with technical A. Star topology
standards for the Internet.
3.4 Command used to checks the connectivity of a live network D. Value attribute
Is.
3.9 A local Area Network technology that uses fiber optics to I. Freeware
Interconnect stations in a ring topology is.
K. Enoticons
L. GET
M. Server side
N. FDDI
4. Each statement below has blank space to fit one of the word(s) or phrases in the list
below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1 x 10)
C. encryption F. WAN
I. distribution J. IRC
K. Sniffer L. Security
Q. Misplaced R. VRML
4.1. The clock rate at which the pulses are transmitted by a serial device is called ---------
4.2 The maximum size of datagram that can be processed by that particular piece of hardware is
called -------------------.
4.5 A packet ------------------- is a program that captures data from information packets as they
travel over the network.
4.6 In 1988, the ARPANET had its first automated network security incident, usually referred to as
the --------------------.
4.8 The process of translating information from its original form into an encoded,
incomprehensible form is called -----------------------.
PART TWO
(Answer any FOUR questions)
5.
a) Describe briefly the following:
1) Domain Name
2) Net Etiquette
3) Misuse of Internet
b) Describe in brief the actions (any five) that you will take to protect your PC that is
networked against virus invasion.
6.
a) How will you register a website on a search engine?
b) What is the difference between dynamic and static web sites?
7.
a) What is Intranet? Explain briefly their characteristics.
b) What is a search engine? Discuss with few examples.
c) What is web casting? Discuss it uses.
8.
a) Give an overview of SMTP. Discuss its drawbacks. Discuss the enhancements
available in MIME to overcome these drawbacks.
b) What is VRML? How does it differ from HTML.
9.
a) Write short notes on any Three of the following:
1) Levels of Internet Connectivity.
2) Usenet.
3) Telnet.
4) FTP