Code: T-15                                                          Subject: INTERNET & WEB TECHNOLOGY

Time: 3 Hours                                               June 2006                                                       Max. Marks: 100

 

NOTE: There are 9 Questions in all.

·      Question 1 is compulsory and carries 20 marks. Answer to Q. 1. must be written in the space provided for it in the answer book supplied and nowhere else.

·      Out of the remaining EIGHT Questions answer any FIVE Questions. Each question carries 16 marks.

·      Any required data not explicitly given, may be suitably assumed and stated.

 

 

Q.1       Choose the correct or best alternative in the following:                                         (2x10)

       

a.       A dynamic web page technology used to embed SQL database queries in a web page is  

 

                   (A)  ASP.                                            (B)  JSP.

(C)    PHP.                                           (D)  Cold Fusion.

       

b.      Ports are represented by 

 

(A)    8-bit numbers.                              (B)  16-bit numbers.

(C)  32-but numbers.                           (D)  64-bit numbers.

            

             c.   Port used by FTP for control connection is 

                  

(A)     21.                                              (B)  25.

(C)  20.                                               (D)  30.

 

             d.   802.11 networks use

 

(A)    CSMA.                                      (B)  CSMA/CD.

(C)  CSMA/CA.                                (D)  None.

 

             e.   If first four bits of an address contains 1010, it belongs to

                  

(A)     Class A                                        (B)  Class B

(C)  Class C                                        (D)  Class D

 

             f.    The right most part of an address in a DNS specifies

 

(A)     Name of the individual computer  

(B)     Top level domain

(C)     Address of the individual computer    

(D)    Name of the server


 

             g.   To prevent a file to be accessed out side the package in java, the following access specifier must be used

 

(A)     Public                                          (B)  Private

(C)  Protected                                     (D)  Default           

 

             h.   XML does not specify 

 

(A)    Structure of the data                     (B) Format of the data

(C) Both (A) and (B)                           (D) None

 

             i.    MIB is associated with

 

(A)   ICMP                                          (B) SNMP

(C) ARP                                             (D) RARP

 

             j.    CORBA is

 

(A)  A dynamic web document technology

(B)  An object oriented middleware technology

(C)  An object oriented programming language      

(D)  A database tool

 

 

Answer any FIVE Questions out of EIGHT Questions.

Each question carries 16 marks.

 

  Q.2     a.   Describe HTTP features that make caching possible in a web browser.               (8)

       

             b.   What are the advantages of dynamic document technologies like ASP and JSP over CGI?              (8)

 

  Q.3     a.   How does UDP distinguish among various application programs?                        (5)

 

             b.   During a file transfer, server does not need to specify the client the file size in advance.  Explain.                                                                 (5)                                                             

 

             c.   Some Networks technologies do not include a type field in the frame header.  How can computers connected to such Networks know the type of data in each field?                                       (6)

 

  Q.4     a.   How does Ipv6 handle multiple headers?                                                            (5)

 

             b.   Explain Exception handling in Java with the help of suitable example.                   (7)

 

             c.   What is an applet?  How does it differ from a simple application program?          (4)

 

  Q.5     a.   How does a DNS server know which other DNS server is the authority for a given name?  Explain with the help of suitable example.                      (7)

       

             b.   In addition to filtering, bridge hardware used with long distance connections must perform buffering.  True or False?  Justify your answer.                  (6)

 

             c.   Describe the concept of virtual packets in brief?                                                  (3)          

 

  Q.6     a.   Why optimisation for multiple recipients is important during mail transfer?            (6)

 

             b.   In what kinds of errors are CRC more useful than simple checksum?                   (6)

 

             c.   How does token passing scheme guarantee a fair access in ring topology?           (4)

 

  Q.7     a.   How does public key encryption scheme ensure the confidentiality? Explain.                       (6)   

 

             b.   What is the use of default routes in WAN?                                                         (3)

 

             c.   What are the META tags in HTML?  Explain with the help of suitable example.                  (7)

 

  Q.8           Write short notes on any FOUR:

 

(i)                  E-commerce.

(ii)                Firewall.

(iii)               ICMP.

(iv)              Middleware.

(v)                Bridges and repeaters. (4 x 4)

 

  Q.9     a.   Write down the main differences between HTML and XML.                              (7)

 

             b.   What are the essential elements of EDI?  Explain in brief.                                    (5)

 

             c.   What is WAP?  Explain its features in brief.                                                        (4)