Code: AT-15 Subject: INTERNET & WEB TECHNOLOGY
PART-I, VOL-I
TYPICAL QUESTIONS & ANSWERS
OBJECTIVE TYPE QUESTIONS
Each Question carries 2 marks.
Choose the correct or best alternative in the following:
Q.1 A header
in CGI script can specify
(A)
format of the document. (B) new
location of the document.
(C)
(A) & (B) both. (D) start
of the document.
Ans: A
A header in CGI script can specify- Format of the
document & New location of the document.
Q.2 All
exceptions in Java are subclasses of built in class called
(A)
Exception (B)
Error.
(C)
Throwable. (D)
Raise.
Ans: C
All
exception in Java are subclasses of built in class called Throwable.
Q.3 In 32bit
IP Addressing scheme all 1’s represent
(A)
this computer. (B)
directed broadcast.
(C)
limited broadcast. (D) loop
back.
Ans: C
In 32 bit IP Addressing scheme all 1’s represent
limited broadcast.
Q.4 DMSP
stands for
(A)
Distributed Mail
System Protocol
(B)
Distributed Message
System Protocol
(C)
Distributed Message
System Pool
(D)
Distributed Mail
System Pool
Ans: A
DMSP stands for – Distributed Mail system Protocol.
Code: AT-15 INTERNET & WEB TECHNOLOGY
Q.5 Which
Layer is not present in TCP/IP model?
(A) Application
Layer (B) Internet
Layer
(C) Transport Layer (D) Presentation
Layer
Ans: D
Presentation layer is not present in TCP/IP
Model.
Q.6 Let most
segment of a name inn DNS represents
(A) Individual
Network. (B) Individual
computer.
(C) Domain name (D) Network
type.
Ans: B
Left
Most segment of a name in DNS represents- Individual computer
Q.7 Address
192.5.48.3 belongs to
(A) class A. (B) class B.
(C) class C. (D) class D.
Ans: C
Address 192.5.48.3
belongs to class C.
Q.8 Unlike Ipv4, Ipv6 does not
include the following field in thee base header
(A)
Next Header field. (B) Field for
Fragmentation information
(B) Flow Label. (D) Kind field.
Ans: B
Unlike Ipv4, Ipv6 does not include the Field for Fragmentation information
in the base header.
Q.9 The term
byte stuffing refers to:
(A)
data stuffing used
with character oriented hardware.
(B)
data stuffing used
with bit oriented hardware.
(C)
data stuffing used
with both (A) & (B)
(D)
data stuffing used
with byte oriented hardware.
Ans: A
The term byte stuffing refers to
data stuffing used with character-oriented hardware.
Code: AT-15 INTERNET & WEB TECHNOLOGY
Q.10 FDDI
(Fiber Distributed Data Interconnect) is an example of
(A) token ring. (B) token bus
(C) star
topology (D) multipoint
network.
Ans: A
FDDI is an example of token ring.
Q.11 Hardware
that calculates CRC(Cyclic Redundancy Check) uses:
(A) Shift
register (B) Xor unit
(C) Both (A)
& (B) (D) Instruction
register
Ans: B
Hardware
that calculates CRC uses shift register and Xor unit.
Q.12 In TCP
protocol header “checksum” is of___________
(A) 8 bits (B) 16 bits
(C) 32 bits (D) 64 bis
Ans: B
In
TCP protocol header checksum is of 16
bits.
Q.13 In IP
addressing scheme, class used for multicasting is:
(A) Class A (B) Class B
(C) Class C (D) Class D
Ans: D
In
IP addressing scheme, class used for multicasting is class D.
Q.14 CIDR
stands for
(A)
Classified Internet
Domain Routing
(B)
Classless Inter Domain
Routing
(C)
Classless Internet
Domain Routing
(D)
Classified Inter
Domain Routing
Ans: B
CIDR
stands for Classless Inter Domain Routing.
Code: AT-15 INTERNET & WEB TECHNOLOGY
Q.15 The total
number of class of IP address are
(A) 3. (B) 4.
(C) 5. (D) 9.
Ans: C
The
total number of class of IP addresses are 5.
Q.16 Parent
class of all Java classes is
(A) java.lang.system (B) java.lang.object
(C) java.lang.class (D) java.lang.reflect.object
Ans: B
Parent
class of all Java classes is java.lang.object.
Q.17 Exceptions
of type error inn JAVA are handled by
(A) User program (B) Java run
time environment
(C) Operating
system kerne (D) Interrupt
Ans: B
Exceptions
of type error in JAVA are handled by JAVA run time environment.
Q.18 Error
detecting method that can detect more errors without increasing additional
information in each packet is
(A) checksum (B) even parity
mechanism
(C)
CRC (D) odd parity
mechanism.
Ans: C
Error detecting method that can detect more errors
without increasing additional information in each packet is CRC.
Q.19 A Network
uses a star topology if
(A)
Computers are arranged
in a closed loop.
(B)
All computers attach
to a central point.
(C)
All computers attach
to a single long cable.
(D)
Computers attach to
multiple hierarchical cables.
Ans: B
A
Network uses a star topology if all
computers attach to a central point.
Code: AT-15 INTERNET & WEB TECHNOLOGY
Q.20 MTU is
specified by
(A) IP Datagram
size (B) Hardware
technology
(C) TCP Segment
size (D) None of the
above.
Ans: B
MTU
is specified by hardware technology.
Q.21 Network
address prefixed by 1110 is a
(A) Class A
address (B) Multicast
address
(C) Class B address (D) Reserve
address.
Ans: B
Network
address prefixed by 1110 is a multicast address.
Q.22 FTP does
not use
(A)
Two transfer mode.
(B)
Control connection to
remote computer before file can be transferred.
(C)
User Datagram
Protocol.
(D)
Authorization of a
user through login and password verification.
Ans: C
FTP
does not use User Datagram Protocol.
Q.23 A Header
in CGI document can represent
(A)
format of the document
(B)
location if document
used to different URL
(C)
both (A) & (B)
(D)
None of the above.
Ans: B
A
header in CGI document can represent format of the document and the location if document used to different URL.
Q.24 127.0.0.1
is a
(A) limited
broadcast address (B) direct
broadcast address
(C) multicast
address (D) loop-back
address
Ans: D
127.0.0.1
is a loop-back address.
Code: AT-15 INTERNET & WEB TECHNOLOGY
Q.25 In cyclic
redundancy checking CRC is the
(A) divisor (B) quotient.
(C) dividend (D) remainder.
Ans: D
In
cyclic redundancy checking CRC is the remainder.
Q.26 Which one
of the following uses the greatest number of layers in the OSI model?
(A) Bridge (B) Repeater.
(C) Router. (D) Gateway.
Ans: D
Gateway
uses the greatest number of layers in the OSI model.
Q.27 Which of
the following 802 standard provides for a collision free protocol?
(A) 802.2 (B) 802.3
(C) 802.5 (D) 802.6
Ans: C
802.5
standards provides for a collision free protocol.
Q.28 The
addressing especially used by Transport Layer is
(A) Station
address (B) Network
address
(B) Application
port address (D) Dialog
address
Ans: B
The
addressing specially used by transport layer is application port address.
Q.29 Which one
of thee following is an error reporting protocol?
(A) ARP (B) ICMP
(C) TCP (D) UDP
Ans: B
ICMP
is an error reporting protocol.
Code: AT-15 INTERNET & WEB TECHNOLOGY
Q.30 Which type
of web document is run at the client site
(A) Static (B) Dynamic
(C) Active (D) All of the
above
Ans: C
Active
web document is run at client side.
Q.31 The main
function of a browser is to
(A) compile HTML (B) interpret
HTML
(C) de-compile
HTML (D) interpret
CGI programs
Ans: B
The
main function of a browser is to interpret HTML.
Q.32 Which of
the following is associated with SNMP
(A) SMI (B) BER
(C) DNS (D) MIB
Ans: D
MIB
is associated with SNMP.
Q.33 ATM is an
example of
(A) Ring
topology (B) Star
topology
(C) Bus topology (D) None of the
above.
Ans: B
Star topology
Q.34 The first
part of the address in electronic mailbox identifies:
(A) User’s
mailbox (B) Computer on
which mail box resides
(C) Both (A)
& (B) (D) None of the
above
Ans: A
User’s mailnbox.
Q.35 Protocol
used to monitor and control network devices operates at:
(A) Application
layer (B) Transport
layer
(C) Network
layer (D) Data Link
layer
Ans: A
Application layer.
Code: AT-15 INTERNET & WEB TECHNOLOGY
Q.36 DHCP
stands for
(A)
Dynamic Host Control
Protocol
(B)
Dynamic Host
Configuration Protocol.
(C)
Dynamic Host
Connection Protocol.
(D)
None of the above.
Ans: B
Dynamic Host Configuration Protocol.
Q.37 The
transport protocol used by TFTP (Trivial File Transfer Protocol) is:
(A) FTP (B) UDP
(C)
TCP (D) IP
Ans: B
UDP.
Q.38 The
Environment variable SCRIPT_NAME in CGI script specifies:
(A)
Domain name of the
computer running o server
(B)
The path of URL after
server name.
(C)
Name of the server
(D)
None of the above.
Ans: B
The path of URL after server name.
Q.39 Application
layer (layer 4) in TCP/IP model corresponds to:
(A) Layer 4 and
5 in OSI model (B) Layer 5 and
6 in OSI model
(C) Layer 6 and
7 in OSI model (D) Layer 1 and
2 in OSI model
Ans: C
Layer 6 and 7 in OSI model.
Q.40 UDP (User
Diagram Protocol) is
(A) Connectionless (B) Message
Oriented
(C) Connection
oriented (D) Both (A) and
(B)
Ans: D
Both (A) and (B).
Q.41 A network
address prefixed by 1000 is:
(A) Class A
address (B) Class B
address
(C) Class C
address (D) Class D
address
Ans: B
Class B address.
Code: AT-15 INTERNET & WEB TECHNOLOGY
Q.42 In Java
System.out is an object of type
(A) InputStream (B) PrintStream
(C) OutputStream (D) None of the
above.
Ans: B
PrintStream.
Code: AT-15 INTERNET & WEB TECHNOLOGY
PART-II, VOL-I
Q.1 What are the various parameters inside Applet tag in a HTML file? (6)
Ans:
<APPLET
[CODEBASE= codebaseURL]
CODE=applet file
[ALT=alternate text]
[NAME=applet instance name]
WIDTH=pixels HEIGHT= pixels
[ALIGN = alignment]
[VSPACE= pixels][HSPACE = pixels]
>
[<PARAM NAME = Attribute name VALUE =
Attribute value>]
……
</APPLET>
CODE BASE
Optional attribute used to specify the base URL of
the applet code, which is the Directory that will be searched for applet’s
executable class file. If the applet Resides in the same directory as HTML file
then this attribute is not required.
CODE
This is the requirement attribute used to specify
the name of the applet class to be loaded (name of the already compiled. class
file).
ALT
Optional attribute used to specify a short text
message that should be displayed If
browser understands the APPLET tag but can not currently run Java applets.
NAME
Optional attribute used to specify a name for applet
instance so that the other applets on the page may refer to this applet.
Optional attribute used for alignment
(LEFT, RIGHT, TOP, BOTTOM, MIDDLE)
Code: AT-15 INTERNET & WEB TECHNOLOGY
VSPACE specifies space in pixels above
and HSPACE in pixels on each side of applet.
Required attributes that give the size of display
area in pixels.
The PARAM tag allows you to specify applet specific
arguments in an HTML page.
Q.2 Write an applet which accepts two integers from the user and displays their sum in the following format. (8)
3 2
Input
a number in each box:
The
sum is : 5
Ans:
import
java .awt.*;
import java. Applet.*;
public class sum extends Applet
{
TextField text1,text2;
Public void init()
{
text1 = new
TextField(8);
text2 = new TextField(8);
add(text1);
add(text2);
text1.setText (“0”);
text2.setText (“0”);
}
public void paint (Graphics g)
{int x = 0, y= 0, z = 0;
String s1, s2,s;
g.drawstring(“Input a number in each
box”,10,50);
s1 = text1.getText();
x = Integer.parseInt(s1);
s2 = text2.getText();
y = Integer.parseInt(s2);
z = x+y;
Code: AT-15 INTERNET & WEB TECHNOLOGY
s = String.valueOf(z);
g.drawString(“The sum is :”,10,75);
g.drawString(s,100,75);
}
}
Q.3 What are the main differences between OSI and TCP/IP reference models? Explain briefly. (8)
Ans:
We will be
focusing only on the key differences between the two references
models.
Three concepts are central to OSI model: services, interfaces and protocols. OSI model makes the clear distinction between
these three concepts.
The TCP/IP model did not originally clearly
distinguish between services, interface, and protocol. For example the only
real services offered by the Internet layer are SEND IP packet and RECEIVE IP
packet.
The OSI reference model was devised before the
protocols were invented. This ordering means that model was not biased towards
one particular set of protocols, which made it quite general.
With TCP/IP reverse was true: the protocol came
first, and the model was really just a description of the existing protocols.
So problem was model did not fit for any other protocol stack.
Another difference is in the area of connectionless
versus connection-oriented communication. The OSI model supports both
connectionless and connection oriented communication in network layer, but only
connection oriented in the transport layer. The TCP/IP model has only
connection less mode in network layer but supports both the mode in transport
layer.
Q.4 Define a socket? How read and write is performed using sockets? (6)
Ans:
An application program interface specifies the
details of how an application program interacts with protocol software. Socket
API is a defacto standard. Once a socket has been established the application
can transfer information.
recv() and send() are used
to read and write the data.
recv(socket,
buffer, length, flags)
Code: AT-15 INTERNET & WEB TECHNOLOGY
The socket is the descriptor of the socket, buffer
specifies the address in memory where
incoming message should be placed and
length specifies the size of the buffer, flags allows the caller to control
details.
send(socket,
data, length, flags)
Here
data is the address of data to be sent and other arguments are same.
Sockets
also allows read() and write() to transfer data like send () and recv().
read() and write() have three arguments: a socket
descriptor, the location of the buffer in the memory and the length of the
memory buffer.
Q.5 How optimization is achieved in DNS? (7)
Ans:
There are two primary
optimizations used in DNS: replication and caching. Each root server is
replicated; many copies of the server exist around the world. When a new site
joins the internet, the site configures its local DNS server with a list of
root server. The site server uses whichever root server is most responsive at a
given point of time. In DNS caching each server maintains a cache of names.
Whenever it looks up a new name, the server places a copy of the binding in its
cache. Before contacting another server to request a binding , the server
checks its cache, if the cache contains the answer the server uses the cached
answer to generate a reply.
Q.6 How physical addressing is performed in WAN? (7)
Ans:
WAN networks operate
similar to a LAN. Each WAN technology defines the exact frame format a computer
uses when sending and receiving data. Each computer connected to a WAN is assigned
a physical address. When sending a frame to another computer, the sender must
supply the destination’s address.
Many WANs use a
hierarchical addressing scheme that makes forwarding more efficient.
Hierarchical addressing scheme divides an address into multiple parts. The
simplest scheme divides address in to two parts; the first part identifies
packet switch, and second part identifies computer attached to that packet
switch.
Switch 1 Switch 1
Address
[1,2] Address
[2,1]
Address
[1,5] Address
[2,6]
Code: AT-15 INTERNET & WEB TECHNOLOGY
The above figure shows each address as a pair of decimal integers. A computer connected to port 6 on packet switch 2 is assigned address [2,6].
Q.7 How do you make an image clickable in HTML? Give an example. (6)
Ans:
To make an image or text clickable hyperlinks are used, which use the <A> and </A> tags. This tag has various parameters, including HREF(the URL), NMAE(the hyperlink name), and METHODs(access methods).
As an example consider the following HTML fragment:
<A HREF = “http://www.foobar.com”> Foobar Home Page</A>
when a page with this fragment is displayed, following will appear on the screen:
Foobar
Home Page
If the user clicks on this, the browser immediately fetches the page whose URL is http://www.foobar.com and displays it. Now we put a image in place of text.
<A HREF = “http://www.foobar.com”> <IMG SRC = “img1.gif” ALT = “Foobar” </A>
when displayed this page shows a picture(img1.gif). clicking on the picture switches to foobar home page just as in previous example.
Q.8 Design a form for a publishing house called foobar that allows the books to be ordered via the Internet. The form should include the customer’s name, address, phone no. and Boo’s title, author and edition. Payment has to be made in cash on delivery so no credit card information is needed. (8)
Ans:
Book Title :
Author :
Edition :
Customer's Name :
Code: AT-15 INTERNET & WEB TECHNOLOGY
Address :
Phone Number :