Solved : Internet Technology and Web Design Question Paper (July-16)
Q 1 : Each question below gives a multiple choice of answers. Choose the most appropriate one and enter in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
1.1 : FTP is
A) Server side encryption protocol
B) Control connection to remote computer to transfer files
C) User Datagram Protocol.
1.2 : Client-side extensions:
A) Add functionality to the script running on Server.
B) Add functionality to the script running on user Computer.
C) Add functionality to the script running on network devices
D) Add functionality to the script running on firewall devices
1.3 : To join on the Internet, the computer has to be connected through the
A) Internet architecture board
B) Internet society
C) Internet service provider
D) none of the mentioned
1.4 : protocol assigns IP address to the client connected in the Internet?
A) DHCP
B) IP
C) TCP
D) Telnet
1.5 : IRC stands for
A) Internet Related Chat
B) Internet Relay Chat
C) Internet Related Content
D) Internet Reliable Content
1.6 : An________is a series of unique numbers that identifies a computer connected to the Internet. Every computer that gets online has an Internet address.
A) Ethernet
B) Internet Protocol
C) Internet Address
D) Extranet Address
1.7 : Integrated Services for Digital Network (ISDN) is a set of communication standards for simultaneous digital transmission of:
A) voice
B) video
C) data
D) All of the above
1.8 : hyperlink to open in New Page in HTML
A) <a href=”http://www.aiims.edu” target=”Blank”>Click Here</a>
B) <a href=”http://www.aiims.edu” target=”_Blank”>Click Here</a>
C) <a href=”http://www.aiims.edu” target=”#Blank”>Click Here</a>
D) <a href=”http://www.aiims.edu” target=”New”>Click Here</a>
1.9 : Website means:
A) URL + Web Space + HTML Content
B) URL + Web Space + Name Resolution
C) URL + Web Space + Name Resolution + HTML Content
D) HTML Content + Web Space + Name Resolution
1.10 : A firewall is installed at the point where the secure internal network and un-trusted external network meet which point is known as
A) Choke point
B) Meeting point
C) Firewall point
D) Secure point
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and enter your choice in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
2.1 HTML Tags are case sensitive.
2.2 MIME stands for Multi-Program Internet Mail Extensions.
2.3 The Back and Forward buttons can be used to visit only pages from the same website.
2.4 Refresh button returns to home page.
2.5 E-mail is limited to text based messages.
2.6 Web browser lets you download while surfing the Internet.
2.7 In the ring topology, the network consists of a set of repeaters joined by point-to-point links in a closed loop.
2.8 Default port of SMTP is 25.
2.9 Back-end code runs on Client side and front- end on Server side.
2.10 ATM is Automatic Teller Machine in terms of Transfer Mode.
3. Match words and phrases in column X with the closest related meaning/ word(s)/phrase(s) in column Y. Enter your selection in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
X | Y | ||
3.1 | An application layer protocol that facilitatescommunication in the form of text. | A. | Electronic Commerce |
3.2 | Markup Language. | B. | (n-1)/2 |
3.3 | Number of links to connect n nodes in afully connected meshtopology is . | C. | n(n-1)/2 |
3.4 | D. | Workstation | |
3.5 | Server-side scripting language. | E. | JavaScript |
3.6 | A special computer designed for scientific applications. | F. | XML |
3.7 | that provides you with access to the Internet. | G. | Multimedia |
3.8 | The process of encoding messages or information in such a way that only authorized parties can read it. | H. | Network Architecture |
3.9 | Network topology is also referred as ..... | I. | Internet Relay Chat (IRC) |
3.10 | Combination of different content forms. | J. | DHCP |
K. | Active Server Pages (ASP) | ||
L. | Internet Service Provider (ISP) | ||
M. | Encryption |
4.Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Choose the most appropriate option, enter your choice in the “OMR” answer sheet supplied with the question paper, following instructions therein. (1x10)
A. | FTP | B. | ARPANET | C. | Hacking |
D. | Signature File | E. | Bus | F. | Hijacking |
G. | Search engines | H. | Client side | I. | Private Key |
J. | LAN | K. | Symmetric Cryptography | L. | POP3 |
M. | Asymmetric Cryptography |
4.1 Coaxial cable is suitable for_________topology.
4.2 A_____is a short text file you create to append at the end of your e-mail notes or Usenet messages.
4.3 ______is a standard protocol for receiving e-mail.
4.4 ______are programs that search documents for specified keywords and returns a list of the documents where the keywords were found.
4.5 Javascript is a _______ scripting language.
4.6 Control connection and Data Connection are used in ______ .
4.7 The ______ was an early packet switching network and the first network to implement the protocol suite TCP/IP.
4.8 ______ is known as Computer crime.
4.9 A _____ is a network that connects computers and other devices in a relatively small area, typically a single building or a group of buildings.
4.10 ______ is cryptography in which a pair of keys is used to encrypt and decrypt a message so that it arrives securely.