MODEL
TEST PAPER
PART ONE
Q.1. Multiple Choice Question:-
1.1 Which type of network is most likely confined to a building or a campus
(A) Local area
(B) Metropolitan area
(C) Wide area
(D) Departmental
1.2 Which programming language always makes platforms-independent application
(A) Java
(B) Visual Basic
(C) C++
(D) C
1.3 Which best describes support over serial line communication under the TCP/IP Protocol.
(A) SLIP
(B) PPP
(C) Both A, B
(D) None
1.4 If a group of network computers connect to a central hub the network has what type of Physical Topology
(A) Ring
(B) Star
(C) Bus
(D) None
1.5 If a group of computer connected to a central concentrator the network has what type of logical Topology?
(A) Ring
(B) Star
(C) Bus
(D) None
1.6 The transport layer protocol is
(A) ALP
(B) PPX
(C) TCP
(D) None
1.7 The UDP is part of the which protocol suite
(A) TCP/IP
(B) IPX/SPX
(C) Apple Talk
(D) NetBEUI
1.8 JDK (Java Development Kit) include:
(A) Java
(B) Javac
(C) JDB
(D)All
1.9 Buffer over flow attacks means
(A) Collect and relay some data
(B) Get full system access
(C) Play and display advertisement
(D) Slow down system
1.10 A firewall can be
(A) A hardware
(B) A software
(C) Both software and hardware
(D) Network Engine
Q.2. True or False:-
2.1 The World Wide Web is a very large set of interlinked hypertext documents accessed viahe internet.
2.2 World Wide Web is a synonymous with Internet.
2.3 Packet switching is a network communications method that doesn’t groups all transmitted data, irrespective of content, type, or structure into suitably-sized blocks, called packets.
2.4 The ARPANET computer network made a large contribution to the development of the e-mail.
2.5 SMTP is the push protocol that cannot pull information from a remote server on demand.
2.6 Disaster recovery is the recovery of documents in case of destruction from fires, floods earthquake etc.
2.7 Streams can’t controlled the flow of data from one source to another.
2.8 The TCP/IP is slower than NetBEUI.
2.9 A user level access is less secure than share level access.
2.10 The ability of the new object to implement the base functionality of the parent object in new way is called inheritance.
Q.3. Match the following:-
3.1 |
Server would constantly send new data to the client through the initial connection, that remains open. |
A. |
Spoofing |
3.2 |
A kind of forgery, mail assume to be send from know person but actually they aren’t. |
B. |
SGML |
3.3 |
It is an application-layer internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. |
C. |
Drug trafficking |
3.4 |
It is an ISO standard metalanguage in which one can define markup languages for documents. |
D. |
Web server push |
3.5 |
The ability of a system or product to work with other system or product without much efforts. |
E. |
Web designing |
3.6 |
Encoding data to make them unintelligible to unauthorized persons. |
F. |
Thread |
3.7 |
Use of Internet to sell their illegal substances through encrypted e-mail and other Internet Technology. |
G. |
Interoperability |
3.8 |
Skill of designing hypertext presentation of content delivered to end user. |
H. |
Class Diagram |
3.9 |
It can be divided into linear and non linear technique categories. |
I. |
Scope |
3.10 |
A single path of execution that is a sub process of the main process. |
J. |
POP3 |
|
|
K. |
Encryption |
|
|
L. |
Multimedia |
|
|
M. |
nesting |
Q.4. Fill in the blanks:-
A. |
Cache |
B. |
URL |
C. |
Cyber terrorism |
D. |
Metadata, integration |
E. |
IMAP4 |
F. |
Enterprise data modelling outer jain |
G. |
Header, Body |
H. |
CASCADE |
I. |
Interleaved main memory |
J. |
Virtual memory |
K. |
bus |
L. |
website |
M. |
Applet |
|
|
|
|
|
|
4.1 Viewing a Web page on the World Wide Web normally begins by typing the ______ of the page into a Web browser.
4.2 Web page data may need not to be re-obtained from the source Web server. Almost all Web browsers ______ the recently obtained data on the local hard disk.
4.3 The internet email message consist of two major section that are _____ and ______.
4.4 _____ is one of the two most prevalent protocol for e-mail retrieval.
4.5 ______ is act of terrorism committed through the use of cyberspace or computer.
4.6 _____ and _____ are the part of the document management.
4.7 ______ collection of information about a particular topic or subject.
4.8 A class that has no direct instances, but whose descendants may have direct instances is called a _____ ______.
4.9 Java communicate with the web page through a special tag called ______.
4.10 In ______ topology all device connect to a common shared cable.
PART TWO
Q.5. (a) What was the various firewall technique.
(b) What is interoperability and how product or system achieve interoperability?
(c) Explain the advantages of Peer to Peer (P2P) network?
Q.6. (a) What is the difference between SLIP and PPP?
(b) Explain the difference between router, repeater and bridge.
(c) Explain FDDI.
Q.7. (a) What are the various network topologies explain with example.
(b) What is Net etiquette?
Q.8. (a) What do you understand with e-commerce explain with example.
(b) Define document management.
Q.9. (a) Explain Web template
system.
(b) What is World Wide Web? What is the contribution of Java to the WWW.
(c) What is token? List the various type of tokens supported by the Java.
✅👍👍👍
ReplyDelete