QUESTION PAPER , JANUARY
2009
PART
ONE
Q.1.
Multiple Choice Question:-
1.1 Secure Socket Layer, a protocol developed by
(A) IETF
(B) Apple
(C) Netscape
(D) HP
1.2 What is a good way to protect sensitive information sent via e-mail?
(A) Encrypt it
(B) Write it in another language
(C) Don’t include your return address
(D) All of the above
1.3 Which TCP port is used by a web server to serve web pages?
(A) 8
(B) 80
(C) 25
(D) 23
1.4 What does IRC stand for?
(A) Internet Real-Time chat
(B) Internet Resource Centre
(C) Internet Relay chat
(D) Internet Real-Time clock
1.5 Choose the correct html tag for the largest heading.
(A) <h1>
(B) <heading>
(C) <h6>
(D) <head>
1.6 To search the largest collection of Web pages for information on ‘black holes’, you would probably use?
(A) encyclopedia
(B) search engine
(C) web portal
(D) wikipedia
1.7 To ownership rights as related to content on the web are governed under
(A) Copyright law
(B) Patent law
(C) Data protection law
(D) Privacy law
1.8 A spider is
(A) A computer virus
(B) A browser
(C) A program that catalogs web site
(D) A hacker community who hacks web site
1.9 VRML is
(A) Visual Reality Markup Language
(B) Virtual Reality Markup Language
(C) Virtual Reality Modeling Language
(D) Visual Reality Modeling Language
1.10 Valid IP address for a computer is
(A) 130.300.5.34
(B) 130.0.0.255
(C) 130.128.260.6
(D) 130.1.1.1
Q.2.
True or False:-
2.1 SMTP protocol is used by a mail client to fetch mail from mail server.
2.2 SSH is a protocol that allows computers to communicate with each other over encrypted connections.
2.3 USENET messages are transmitted to subscribers via e-mail.
2.4 When you save a document in FrontPage, the file extension is ftg.
2.5 The INTERNET is managed by US Government.
2.6 JPEG is used to compress images.
2.7 FTP uses the services of UDP.
2.8 Instant messaging (IM) is a great way to chat with friends online without having to worry about viruses.
2.9 You cannot use JavaScript an ASP.
2.10 Firewall systems can be used both for separating an organization from the outside world and dividing departments within an organization.
Q.3.
Match the following:-
|
3.1 |
Serving dynamic documents |
A. |
Telnet |
|
3.2 |
Telecommunication network |
B. |
Internet |
|
3.3 |
An encryption system that use two keys |
C. |
UDP |
|
3.4 |
Send information to web server |
D. |
PVN |
|
3.5 |
HTTP service |
E. |
Autorun |
|
3.6 |
Gateway |
F. |
Conn |
|
3.7 |
Private network |
G. |
Network traffic |
|
3.8 |
Bulletin Board |
H. |
Public Domain Area |
|
3.9 |
Live communication |
I. |
|
|
3.10 |
Search Engine |
J. |
PKI |
|
|
|
K. |
VPN |
|
|
|
L. |
TCP |
|
|
|
M. |
Post |
|
|
|
N |
CGI |
|
|
|
O. |
Compiler |
|
|
|
P. |
Chat |
Q.4.
Fill in the blanks:-
|
A. |
Video |
B. |
Audio |
C. |
History |
D. |
Autorun |
|
E. |
CONN |
F. |
Networks |
G. |
TELNET |
H. |
MPUT |
|
I. |
RLN |
J. |
Copy |
K. |
Table |
L. |
Internet |
|
M. |
Server |
N. |
Hosts |
O. |
Spyware |
P. |
Seven |
|
Q. |
Channel |
R. |
Open |
S. |
Favorites |
T. |
Five |
|
U. |
DES |
|
|
|
|
|
|
4.1 A(n) ______ is a grid of rectangles, each of which can hold text and images.
4.2 ________ is used for remote login.
4.3 MPEG is a ______file format.
4.4 In the original ARPANET, _______ were directly connected together.
4.5 The OSI model consists of _____layers.
4.6 ______ perform task on your computer without your control.
4.7 If you are in the telnet application but not logged onto any other machine, the command to log into the remote system is _______.
4.8If you want to use ftp to copy all your files at a remote site, the ftp command you should use is _______.
4.9 To join a chat you must first connect to a chat ________.
4.10 ______ feature of browser used to re-visit Web sites visited during a given session.
PART
TWO
Q.5. (a) How does the Web work? Give two examples of web servers.
(b) Discuss various network topologies along with their advantages and disadvantages.
(c) What is DNS? What type of information DNS provides? How to find the IP address of a web server?
Q.6. (a) What is the
structure of a web page? Design a web form to gather information as shown
below.
Your name:
![]()
Type a secret code:
![]()
What is your gender? Female
Male
![]()
![]()
![]()
Select one or more sports that interest your : Tennis Football Basketball
Cricket
Zero
![]()
How many children do
you have?

Enter any additional comments you may have:
[Note: The form should accept 40 characters string as name , 8 characters secret string, a gender, to select one of the four sports, number of children (zero, one, two, three, more than three), and additional comments of 4*60 width.]
Q.7. (a) What are applets? What is JavaScript? What are the advantages and disadvantages of JavaScript?
(b) What is symmetric-key cryptography? What are the advantages and disadvantages of this system with respect to key distribution and and performance? Which is the most popular symmetric-key system in use?
Q.8. (a) Explain the structure of a URL? Give two examples for each part of the URL.
(b) Write a HTML program to display screen as follows:
v Coffee
§ Cappuccino
§ Black coffee
v Tea
§ Black tea
§ Green tea
v Milk
§ Flavoured Milk
§ Soya Milk
Q.9. Answer any three of the following:
(a) What is the Client-Server architecture? Give three examples of Client-Server applications.
(b) Give a command sequence to transfer a file ‘pic.jpg’, to ftp server ‘ftp.ibm.com’ under the directory ‘upload’. [Note: ftp client is to be considered as a command based client]
(c) Explain the basic types of firewalls?
(d) What are the advantages of customization of browsers.
No comments:
Post a Comment