Professional Documents
Culture Documents
new topic. Now we can see rate list of cloths, dolls, map of any place etc. easily on
Internet.
5. Describe the Web as a huge global market. What makes the prospect so bright?
Ans. On web we can see any information related with any company or firm. People all
over the world can access web site of a company at a time. If someone wants to make him
available to everyone, everywhere and anytime then Internet is the best way. Through it
we can easily advertise about any product and can also gain information about the market
for selling our product or service. For unemployed person it is the best way to search a Job
for him. Many companies also search good employee through the web site. A student can
gain much information from searching the WWW for their specific requirement.
There are so many probabilities to improve the market of Internet. In future if one
wants to start him own firm, then he can manage all the things like staffs, raw materials,
machines etc. through the Internet. He can easily advertise for his new product. New
developer and programmer will get job if the web page market will developed. Not only for
developing, but also for managing the web site, it requires so many web programmers
who will be benefited. In future if any other services will arrive, then it is not possible that,
that will not use the Internet or Web.
6. HTML is more of a script than a language. Do you agree? Give reasons.
Ans. Yes, I am agree with this concept. Because every language have their own
grammar, in case of computer every language have their own syntaxes and rule of
looping, iteration, constructor etc. but HTML document have no any concept of iteration,
branching etc. We need not declare variables in HTML. It is used only for presenting any
text in formatted way on the browser. So, we have to learn only some mechanism to
publish our text and graphics on the browser. HTML can't validate data, can't give error
message but in a programming language all these are compulsory. So, we can say it just
like a script not a language.
21. What is a search engine? Discuss with few examples.
7. Name some of the search tools (engines)?
Ans. Search engine are those website used to search a given topic on WWW. As we
know there are billions of web pages all around the world with lot of information of
different types. So, it is not easy to get a proper name of any web site for our required
information. The same type of information may live on several web sites. There are no any
centralize mechanism to find such web sites having same information. So we need a
search engine. Actually a search engine has a large database containing details of much
more web sites name, content on the web site, visiting attacks on web site etc.
a) Google
b) Altavista
c) Yahoo Search
d) Rediff Search
e) MSN Search etc.
8. Discuss the HTML features not supported by all browsers?
Ans. There may be a browser who only works in text mode - like Lynx. So, this type of
browser will not support Graphic. It is also possible that animation, pictures, OLE (Object
Linking and Embedding) object etc. may not appear on many browsers. It is also possible
that some browser may not support full color to show a picture etc. It is also possible that
some browser will not show Frames.
9. What is an interlaced and Inline image?
Ans. Interlaced image are those image who are used to keep in background of any web
page. It should specify at the time of declaration of "Body" Tag.
<Body Background="C:\Photo\Kareena.jpg">
------
</Body>
While we will see the page in browser this image will automatically tiled on the full
screen.
While we are typing some text and the same time if specify any image source then
the image appears as inline, i.e. text and image have same baseline.
<Body>
My Photo
<Img Src = "C:\Photo\Kareena.jpg">
Internet & Web Page Designing - Long Type Questions - Rajeev Ranjan Kumar/3
</Body>
17. Discuss IMAP as a replacement for POP.
10. Differentiate between POP and IMAP?
POP supports only 7 bit ASCII characters. So, if we want to exchange messages in
English then it is a good medium. But if someone wants to mail and receive mail in other
language then it is not a good medium. To do so it needs some extra header information
with the mail, like - coding system, language details, files attached with mail, date and
time of sending mail etc. This type of Header information is only possible through IMAP
(Internet Multipurpose Access Protocol). IMAP uses MIME header to achieve its goal.
11. Write a short note about Usenet.
Ans. Usenet stands for User Network. It is an international, Non-commercial network,
linking many thousands of Unix sites. It is the world's largest electronic discussion forum,
and provides a way for messages to be sent among computers across the entire Internet.
People from all over the world participate in discussion on thousands of topics in specific
areas of interest called News Groups.
Like the Internet, usenet has no central governing body. Usenet is run by the
people who use it. With well over 10,000 different Newsgroups, Usenet is accessed by
millions of peoples everyday, In more than 100 counties.
13. What is IP Masquerading?
Ans. IP masquerading is a feature recently introduced into the Linux kernel that allows you to
use one network interface, be it an Ethernet, SLIP, PPP, or other TCP/IP interface, using an
internal network number. Clients on the masqueraded network use IP numbers (usually
something like 10.0.0.x or 192.168.0.x) which are designated as internal network numbers
on the Internet and have no real computers attached to them. The masquerading Linux
server restamps all outgoing packets with its own real IP address and an alternate port,
and restamps all incoming packets with the masqueraded addresses and sends them over
the masqueraded network to the client. The client system has no way of knowing whether
or not it is actually on the Internet, except that operations that involve the client taking
the role of a host do not work with IP masquerading, since the IP address of the client is
not a real, valid IP address.
14. What is a proxy Server?
Ans. Proxy Server is a security mechanism in which a programmer keeps the data away from
direct accessing from the internet. To do so we have to use Three tier architecture. User
can send his instruction from a remote server, but first of all he have to authenticate
himself. He sends username and password to the application server who checks the
availability of user on the network and also authorizes him for instructed data or services
from the server. After completing authentication and knowing about authorization, the
application server connects the user to the Data server and only then the user can access
any type of information. This mediator Application server through which data and
instructions have to pass first is known as Proxy Server.
15. What is firewall? What are its uses?
Ans. Firewall is invisible wall between user and a website having important data or information
which is not available for everyone. Generally in a Client - Server architecture client
queries and server replies, but sometimes it made some provision for server that no every
client can queries from server, i.e. query have to checked first and if it is from valid source
then only it will be send to server. These middle wall is known as firewall. Sometimes it
may be any ISP, who have instructed by a Web Server to not give access to everyone to
him. In this situation the Web site have to specify the valid sources (IP address), of which
request it will listen. Another method may be a proxy server who first authenticate the
valid user and then give permission to access the Web Site.
18. Discuss the communication architecture with reference to OSI reference model.
Ans. OSI Model
• In 1977, the Geneva based International Organization for Standardization set forth the
Open System Inter- connection (OSI) model. A master plan for computer to computer
dialogue, the OSI model divides the communications process into seven layers.
• OSI Model (open system interconnecting) -> The OSI is a communications reference
model that has been defined by the International Standards Organization (ISO). It is a
seven -layer communications protocol intended as a standard for the development of
Internet & Web Page Designing - Long Type Questions - Rajeev Ranjan Kumar/4
Physical Layer
• A physical layer makes a physical circuit with electrical, optical or radio signals Passive
hubs, simple active hubs, terminators, couplers, cables and cabling, connectors,
repeaters, multiplexers, transmitters, receivers, and trans-receivers are devices
associated with the physical layer.
• May be compared with Ship, aeroplane etc. who actually delivering the letter.
Data Link Layer
• The data link layer is responsible for gaining access to the network and
transmitting the physical block of data from one device to another. It includes the error
checking necessary to ensure an accurate transmission.
• May be compared with shipment of letter through Post office or courier company,
I.e. letter leave the PO and ready to start deliver.
Network Layer
• The network layer makes routing decisions and forwards packets for devices that are
farther away than a single link. A link connects to network devices and is implemented
by the data link layer. Routers and gateways operate in the network layer.
• May be compared with selecting right path to deliver the letter, i.e. handovering the
letter to the postoffice or courier company to deliver it to destination.
Transport Layer
• It establishes and terminates the session, queues of the incoming messages and is
responsible for recovering from an abnormally terminated session. This layer provides
dialog between application programs.
• May be compared with dividing a letter into small pieces.
Presentation Layer
• The presentation layer does protocol conversion, data translation, compression and
encryption,character set conversion, and the interpretation of graphics commands. A
network redirector is what makes the files on file server visible to the client computer.
The network redirector operates at presentation layer.
• May be compared with Re-Writing letter in any common language.
Application Layer
• This topmost layer provides services that directly support user applications, such as
database access, e-mail, and file transfers. This layer provides for the connection of
application programs on separate machines.
• We can compare this layer with Writing Letter in Postal Model.
Ans. As the internet developed, as with every community, a set of unwritten rules
evolved with it. Sheer numbers of users has long since necessitated a more formal system,
and netiquette has been committed to page many times.Netiquette is enforced only by
social pressure and agreement; the internet has no formal means of enforcing such rules.
Netiquette mostly applies to email and newsgroups, but there are aspects relevant to the
World Wide Web.
When you enter any new culture -- and cyberspace has its own culture -- you're
liable to commit a few social blunders. You might offend people without meaning to. Or
you might misunderstand what others say and take offense when it's not intended. To
make matters worse, something about cyberspace makes it easy to forget that you're
interacting with other real people -- not just ASCII characters on a screen, but live human
characters.
So, partly as a result of forgetting that people online are still real, and partly
because they don't know the conventions, well-meaning cybernauts, especially new ones,
make all kinds of mistakes.
23. What is flaming? How is it different from spamming?
Ans. Flaming has come to refer to almost any mail insult. Originating in usenet, flames
were carefully honed responses to real or perceived insults; sarcastic, artistic, often
literary in allusion. The art has long since disappeared, and flame wars can be abusive,
aggressive and unpleasant exchanges in newsgroups, mailing lists and email. They are a
serious reminder that it is vital to think before mailing; an insult cannot be withdrawn.
Spam of the email variety is easy to spot. It's a message (sometimes two or three!)
from someone you've never heard of, advertising something that you'd never use or
touting some opinion that you would rather do without, and, while it appears in your
inbox, it isn't actually addressed to you.
And we all also agree on what we want done about spam -- we want to get rid of it
and never get any more. The first step is hitting the delete button. But would you like to
do something more active? Don't send a flaming reply; that won't accomplish anything,
except to confirm that your email address is a good one. What's the right way? Read on
for instructions on how to complain about spam and for hints on how to avoid it.
28. What is a push technology? Give examples.
Ans. Repeatedly searching the Web for information on a particular topic can be both
time-consuming and frustrating. But a set of technologies collectively referred to as "push"
technology may help by delivering or pushing information directly to your desktop.
Push technology work such as. - Configuring your PC to receive pushed information
is relatively easy, often requiring you to simply download and install the push vendor's
software from a Web site such as BackWeb's Polite Agent or Marimba Inc.'s Castanet.
Some vendors even push their services without requiring anything on the user's end but a
Web browser and an Internet connection. Users fill out a profile specifying what types of
information they want. The profile acts as a filter and is stored either on the client's
machine (client-based filter) or on the push vendor's server (server-based filter).
Based on the user's profile, the vendor's server searches across a variety of Web
sites or its own channel-a collection of Web-based content that it has rights to distribute.
The filter then retrieves relevant information and sends it to the user's desktop.
30. What is web casting? Discuss its uses.
Ans Webcasting generally refers to the streaming of audio on the Internet. It is
sometimes called "Internet radio." Webcasters may be Internet-only services that transmit
several different channels of highly-themed genres or retransmitters of over-the-air
broadcasts ("AM/FM Webcasts").
A license usually must be obtained for each of the two copyrighted works
embodied in a musical recording. The first is the underlying musical composition,
comprised of the written notes and lyrics (for purposes of copyright law, the musical
composition is referred to as a "musical work").
The second copyrighted work is the actual recording itself - the sounds, including
the recording artist's interpretation of the musical composition, and the creative efforts of
the producer, sound engineers and background musicians. (This is referred to in copyright
law as a "sound recording.") The copyrighted recording brings to life the written notes and
lyrics of the musical work.
44. Discuss various network topologies, along with their advantages and
Internet & Web Page Designing - Long Type Questions - Rajeev Ranjan Kumar/6
disadvantages?
Ans. Topology is the way networks are physically connected together. Topology
determines the complexity and therefore the cost of network cable installation. Topology
also determines the strategy for physically expanding the network. There are several type
of topology but mainly three type are :-
1. STAR TOPOLOGY - Each node is connected to a single, centrally located file server,
using its own dedicated segment of cable. This topology has the advantage of
minimum data traffic along the cables (node to server only), thus providing
optimum performance. But because a single machine must co-ordinate all the data
communications, this requires an extremely powerful and expensive file server.
2. RING OR CIRCULAR TOPOLOGY - In this layout, each node is physically connected
to only two others. Each node passes information along to the next, until it arrives
at its intended destination. Performance is faster on this system because each
portion of the cabling system is handling only the data flow between two machines.
3. LINEAR BUS TOPOLOGY - In this layout, a single main cable connects each node, in
what amounts to a single line of computers accessing it from end to end. Each
node is connected to two others except the machines at either end of the cable,
which are connected only to one other node. The network operating system keeps
track of a unique electronic address for each node and manages the flow of data
based on this addressing scheme.
4. TREE TOPOLOGY - This is a network topology containing zero or more nodes that
are linked together in a hierarchical fashion. The topmost node is called the root.
The root may have zero or more child nodes, connected by edges (links); the root
is the parent node to its children. Each node can in turn have zero or more children
of its own. Nodes sharing the same parents are called siblings. Every node is a tree
has exactly one parent node (except for the root, which has none) and all nodes in
the tree are descendants of the node. These relationships ensures that there is
always one and only one path from one node to any other node in the tree.
5. GRAPH TOPOLOGY - In this method of connection, zero or more nodes are linked
together in an arbitrary fashion. Any two nodes in a graph may (or may not) be
connected by a link. Not all the nodes in a graph need to be connected, but if a
path can be traced between any two nodes, the graph is a connected one.
63. How does copyright affect what I take from the Internet?
Ans. You'll find a lot of serious twaddle talked about copyright - usually by people who
should know better. Copyright applies in the exactly the same way on the internet as in
any other medium; material belongs to the person or organization that created the work,
unless and until they choose to waive their rights, or sell them. So anything - text, images
or sound - published on the internet belongs to someone.
In almost every country, copying something once, for your own private use, is
acceptable and legal. Republishing, selling or claiming ownership is a different matter!
Many websites will allow - even encourage - downloading and copying; some will
ask for payment, some will forbid copying. In law, it is usually permissible to use a
reasonable amount of the document for the purposes of review, news or discussion. In this
case, the original source should be cited. If in doubt, be guided by notices posted on the
site. But be clear - there is no copyright in ideas; if something inspires you - or
simply helps you - it's good manners to give credit where it's due
Ans. Cookies are items of information about your preferences that a site can place on your hard
drive. Cookies can remember your password, or greet you with a fond and personalized
"Welcome Back" message. Many people resent cookies as an invasion of privacy, as they
are 'planted' on your computer without you having much control. In practice, however,
cookies can save you time getting the information you want from a site, and there is scant
evidence of any problem associated with them. Cookie can be refused (through your
browser options/preferences).
66. Is the World Wide Web full of pornography?
Ans. There is a lot of pornography on the web; but it is perfectly possible to use the internet
without ever seeing any of it. The Internet Content Rating Association has been set up to
develop, implement and manage an internationally acceptable voluntary self-rating
system which provides internet users world wide with the choice to limit access to content
they consider harmful, especially to children.
52. What is a Web Server application? How is it different from a Web browser?
29. What is a Web Server? How does it function?
Ans. Web Server is the software program running on the computer who hosts the web
page. Generally the computer who is running a web server programme should be too
much fast and capable to handle multiple users at a time. Naturally a Web server can run
on a network operating system only. This program keeps track of all the visitors accessing
the web page and internally creates and removes clones of web pages for each user. It
works on HTTP protocol. HTTP protocol enables a user to connect and download the
current page and automatic disconnect. through this method it reduce the crowd of
visitors on the web site at a time. So, thousands of people may be served simultaneously.
Such as APACHI, Front Page etc. It is also called the controller of web pages. In other word
the document, which we see in a browser, is called Web page and the controller is known
as Web Server.
31. What is a shareware? How is it different from freeware. Discuss with examples.
Ans. Same as below
57. Write short notes on any two of the following :
(a) Freeware - The software available in the market for using free of cost without
paying anything to its developer is known as Free ware. Such as -
Linux Operating System, MP3 Player, Internet Explorer etc.
(b) Shareware - The software supplied by a vendor free of cost of a limited time
period and after it if he ask some charge to use it for future then this
is known as Shareware. Such as - Virus Remover programme, Alfa or
Bita version of many software packages etc.
(c) Middleware - Sometimes some software we get for trial purpose and after passing
trial period it should be registered with the vendor after paying some
money, but in later stage no any cost we have to pay to the vendor,
i.e. paying after one time we can use it for lifetime. Such as - Songs
of any film, album's songs, CBT (Computer Based Tutorials) etc.
(d) Author ware - The copyrights messages associated with many programs, CBTs,
Logo of the company, etc. are known as author ware. It should not
changed while using it.
(e) Vapour ware - Some software have a timer to use it for some specific period or time
and then it automatic stop responding. These are known as vapour
ware.
50. Discuss the features of any two of the following browsers :
(a) Netscape Navigator
(b) Internet Explorer
(c) NCSA Mosaic
(d) Lynx
Ans. Browser is client software who provides us facility to log on a web site through very
interactive manner. It is fully capable to read a document having HTML code, i.e. HTML
document. Through the help of HTML it can interpret text, pictures, animation etc. on the
users website. We can post our request through a browser to a web site and again can get
result from it.
(a) Netscape Navigator - This browser is developed by Netscape Communication
Internet & Web Page Designing - Long Type Questions - Rajeev Ranjan Kumar/8
Corporation whose founder is Mr. Marc Anderson. It is the most popular browser of the
world. It is freeware. The interface of this browser is so simple that a some known
person can access all the services on web easily. Saving and Printing of a web page is
so simple as we are saving a simple document file. It can be used on many operating
system.
(b) Internet Explorer - It is also a free ware provided by Microsoft Corporation. It has all
the feature as Netscape Navigator. It has automatic simplicity inherited from Microsoft
product. It is so much popular mainly among those persons using windows as their
OS, because it is free and included with all windows CD.
(c) NCSA Mosaic - This browser was developed by NCSA and it was the first GUI browser
of the world. It makes WWW so popular that within a year 7000 networks become part
of the internet which was only 700 in its last year.
(d) Lynx - It is a text based browser. So, we can access all the services related with textual
item. The person who wants to access the Internet with full speed and no graphics uses
this browser widely.
not.
• Records of messages automatically maintained
• Need not face the personnel, so can put our thought more widely in front of him
• Easy to communicate the person have same interest but no any previous identification
• Can hide own identity from the recipient.
Disadvantages:
• Some person doesn't like letters and want to talk instantly
• Sometimes we receive much vulgar mails.
• Can't express our body language to someone
• Messages may be hacked etc.
39. Discuss the advantages and disadvantages of the World Wide Web.
Ans. Advantages:
• Hypertext Information System
• Graphical and Easy to navigate
• Cross - platform
• Web is distributed
• Web is dynamic
• Can access many information through it
• Web is interactive
Disadvantages:
• Full of Unwanted and false news
• Porn sites misguiding the teenagers
• Many sites have information for hacking, terrorism etc.
• Not easy to find actual site for required matter etc.
40. What is a URL? What does it contain? Describe its implementation in FTP, email,
HTTP and telnet programs.
Ans. URLs contain information about both the access method to use and also about the
resource itself. The first part of the URL before the colon specifies the access method and
the second part after colon specifies the resource. It is case sensitive, so one must pay
special attention to uppercase and lowercase letters and to symbols as well.
FTP URL
ftp://nasa/space/f1_name
E-mail URL
mailto:rdm@dte.vsnl.net.in
HTTP URL
http://www.microsoft.com
Telnet URL
telnet:80.10.10.5
41. Discuss advantages of JAVA over conventional software languages.
Ans • Java is an Internet programming language. So, we can access Java programs from any
corner of the world.
• Java is secure due to its Virus-free system.
• Java is a platform - independent language. The Java compiler compiles the code to
"Bytecode" that is understood by the Java environment and supported by any
computer in the world.
• Java is a high-speed and high-performance language
• It is Object Oriented Language.
• It is simple to learn.
42. What is a scripting language? How is it different from the other high-level
computer language?
Ans. Scripting language are those language used with HTML to validate the data entered
in the Form of web page. It is a simple text included with the HTML tags and need no any
compilation. We can make our web page dynamic through a scripting language. These
languages have no any strict grammar and we need not declare all the variables before
using it. When someone asks for a web page then the script automatically downloaded on
his system along with the HTML code.
In a high level language a program must be compiled before run. We have to follow
Internet & Web Page Designing - Long Type Questions - Rajeev Ranjan Kumar/11
very strict grammar of the specified language. In case of language a program compiled on
one computer may not run on another if there is any other O/S.
So, we can say that the scripting language is far better than HLL in case of internet.
43. What are the differences between JAVA and JavaScript? What advantage
JavaScript has over HTML?
Ans. Java JavaScript
• It is compiled on the server before being • The client side computer interprets it.
executed on the client-side computer. • It supports dynamic binding. Objects
• It supports static binding. Object references are checked at run time.
references must exist at compile time. • No need of declaring data type.
• Variable data types must be declared. • JavaScript code is integrated with and
• Code is not integrated with HTML. embedded in HTML.
• Applications written in Java are stand- • JavaScript is limited to browser
alone applications. functions.
• Java has no access to browser objects or • JavaScript is able to access browser
functionality. objects and functionality.
45. Discuss the broad features of ActiveX technology and compare it with Java.
Ans. ActiveX is a method for adding advanced features and functions to a Web page,
including multimedia sounds and images and direct access to other programs. It is a
technology from Microsoft that can essentially turn the Internet into an extension of our
computer. It can do anything that a normal application can do, in addition to interacting
with the Web, the Internet and other computer connected to the Internet. To run these
controls, a browser that supports ActiveX, such as Internet Explorer, is needed.
55. What is a mail server program? Discuss its uses?
46. Discuss the major implementation of mail servers and mail clients in different
OS platforms like Unix, DOS, Windows 9x and Mac OS.
Ans. E-mail Server are the software program used to keep track of users associated with
the mail server and all the information about their different folder. It is must to run this
program on a NOS. Actually it is a database application in which every user have a master
record as per their user name and he can access his account only if he gives proper
password to access it.
Mail client are the software provides facility to access the users account through
remote login. It also helps the user to read, send and download the mail from the E-mail
server. There are so many e-mail server available, mainly as - Outlook Express, Eudora
etc.
61. What is Image Maps?
Ans. Image maps offer a means of defining multiple link areas within a single graphic on
a web page .This means when you click on one part of image that is hyperlink, you will
view say document A and if you click on another part of the same picture you will be able
to view document B and so on. Thus you can make a banner graphic for the top of your
page, and embedded multiple button areas within the graphic. Image maps have become
a standard feature of most professionally designed web sites because they offer and
effective combination of visual appeal. Image maps are particularly effective when
incorporated into moderately sized splash graphics at the top of home page, or into the
signature graphics that define your pages. With image maps you can abandon HTML page
layout, and build links into large graphics.
47. What is IRC? Discuss how it is implemented in various environments.
Ans. IRC means Internet Relay Chat is where to meet people on the net. There is a
channel for just about anything IRC is a great place of visit. Through IRC we meet many
people and through chatting get mutual information.
It is actually combination of hundreds of channels who works together. We need
not register ourselves on any of the IRC server. Only at the time of chatting we have to
give our any valid e-mail address and than choose a nickname to start chat. After
validating our e-mail we allowed for chatting with our nickname. We can't think that on
which server the listed people are existing, because the list may be combination of users
of different sites but want to chat on the same topic.
49. Compare the advantages and disadvantages of using a text-based Web browser
like Lynx with a graphic Web browser like Internet Explorer.
Ans. Advantages of using Text Based Browser like Lynx
Internet & Web Page Designing - Long Type Questions - Rajeev Ranjan Kumar/12
for what purpose we are going to develop one. We have to decide that what content
will be placed on the Web.
• Target Audience - One have to decide that who will visit the site most. As per age
group and the type of audience (i.e. Student, competitors, filmonia) we have to decide
about the color of the page, background, matter, picture etc. that which thing will be
arrange on the page and in which fashion.
• Web authoring Tool - We also have to choose the web page creater software in
which we can create our pages easily. This authoring tool should support each feature
of the current web page.
• Organize concepts and materials - Developer have to decide carefully that which
content should include and which should exclude from the web page. He also make
provision for regular changing in the content because if the same content will remain
for ever then no one will return on the site. So, we should always make changing in the
web page and should leave room for changing.
• A Directory Structure - All the files related with the Web site should keep in a
separate folder and within that folder we also create some more folder to keep HTML
files, CGI scripts, pictures etc. separately.
• Sketch of the Web Site - Before starting the web page creation process, we must
draw the sketch of the web site, so that later we can examine ourselves that whether
we are succeeded or not.
• Look and Feel - Our web page should not look hazy, and the space between lines,
position of pictures, color of text and picture should so carefully arranged that when
someone visit it then sure like to read it once.
59. What are the languages/ methods available for web database programming?
Discuss them briefly.
Ans. Language/ methods available for Web database are - MS-SQL Server, Oracle,
Sybase etc. These relational databases are works as backend and it requires some front-
end software like Java Program, VB Programs etc. These databases can be connected
through a programme to a web server easily. When someone makes a query through a
web form then a CGI script receives the request and then query the database for answer.
These databases are so created that they can easily understand the rules and regulation
of the web page requirement.
Java and VB are two most popular language used to develop the application used to
access the web from one corner and then a database like Oracle or SQL on the other end.
But one can also use C++, C or other High-level language as the front end.
60. What are the software utilities you would like to have if you were a professional
web designer and programmer? Why?
Ans. I will use following software if I will be a Web Professional:
• Microsoft Front Page - This is a authoring tool used to develop a professional web
page in a very easy steps. It automatically creates folder to keep all the files separate
on the disk. We can see the preview of the page in the Preview pane. It is just simple
as a word processor. We can put all the controls from a toolbar to the page. There are
so many layouts available for designing a web page in this software.
• Photoshop - This a graphical software in which we can design button, graphic,
background etc. very easily and we can also save the drawing in any format like .jpg.
• Internet Exproler/ Netscape Navigator - this browser is required for the purpose to
see that how the page will look like when it will be published.
• C++/ Java - For creating CGI script and web server assistant program these two are
most preferable language. Java is specially a web application creator, so it supports all
the features required for a web page.
16. Describe an Intranet. What hardware and software will be needed to establish
one?
Ans. Intranet is personal network of any company or person. It may be LAN or WAN but
no any other person can access the network member. Normally in case of Intranet, the
company spread its own channel of cable to make the network. Security mechanism in the
intranet is very high.
Normally as per size of the network we requires following hardware: -
• Repeater - If want to spread the network only.
Internet & Web Page Designing - Long Type Questions - Rajeev Ranjan Kumar/14
53. Discuss how secure connections are supported through SSL. How is the
technique helpful in e-commerce?
Ans.
48. Discuss the features of any two of the following e-mail programs:
(a) Microsoft Outlook -
(b) Pegasus Mail
(c) Pine
(d) Eudora Mail
(e) Netscape Messenger
12. What is IP Multicasting?
35. What is hypermedia? How is it different from hypertext?