You are on page 1of 5

M3-R3: INTERNET AND WEB DESIGN

NOTE:
1.
There are TWO PARTS in this Module/Paper. PART ONE contains FOUR questions
and PART TWO contains FIVE questions.
2.

PART ONE is to be answered in the TEAR-OFF ANSWER SHEET only, attached to the
question paper, as per the instructions contained therein. PART ONE is NOT to be
answered in the answer book.

3.

Maximum time allotted for PART ONE is ONE HOUR. Answer book for PART TWO will
be supplied at the table when the answer sheet for PART ONE is returned. However,
candidates, who complete PART ONE earlier than one hour, can collect the answer
book for PART TWO immediately after handing over the answer sheet for PART ONE.
TOTAL TIME: 3 HOURS
TOTAL MARKS: 100
(PART ONE 40; PART TWO 60)
PART ONE
(Answer all the questions)
1.

Each question below gives a multiple choice of answers. Choose the most
appropriate one and enter in the tear-off answer sheet attached to the question
paper, following instructions therein.
(1x10)

1.1
A)
B)
C)
D)

Which of the following program works as e-mail client program?


MS-Word
MS-Outlook Express
MS-Excel
MS-Access

1.2
A)
B)
C)
D)

Which of the following is a standard for external gateway programs to interface with
information server such as HTTP server?
Proxy Server
Web Server
CGI
Http daemon

1.3
A)
B)
C)
D)

IRC stands for


Internet Real-Time Communication
Internet Relay Chat
Internet Real-Time Chat
None of the above

1.4

Which of the following file is not compiled, but is a simple ASCII text file that can be
parsed?
Java
C++
VRML
Word

A)
B)
C)
D)

M3-R3

Page 1 of 5

July, 2009

1.5
A)
B)
C)
D)

Which of the following format is not a valid image file format?


TIFF
GIF
JPEG
MPEG

1.6
A)
B)
C)
D)

ASP is product of
Sun Micro System
Red Hat
Oracle
Microsoft

1.7
A)
B)
C)
D)

Which type of physical cable has transmission speed in gigabits?


Twisted-wire pairs
Coaxial cable
Fiber Optic cable
Micro-wave

1.8
A)
B)
C)
D)

Every HTML document should contain


HTML tag
BODY tag
TITLE tag
HEAD tag

1.9
A)
B)
C)
D)

Which type of document contains components that run on a users browser?


Static document
Dynamic document
Active document
All of the above

1.10
A)
B)
C)
D)

Error detection at data link level is achieved by


Bit stuffing
Hamming codes
CRC
Equalization

M3-R3

Page 2 of 5

July, 2009

2.

Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the tear-off sheet attached to the question paper, following
instructions therein.
(1x10)

2.1
2.2
2.3
2.4
2.5
2.6
2.7
2.8
2.9
2.10

HTML documents can be created using any text editor.


Java is a platform dependent programming language.
It is possible to send voice file with e-mail.
Digital certificate provide a means for providing your identity on the internet.
Client sends the request in the form of URLs to the server.
Internet explorer doesnt provide the facility to customize the tool bar.
Telnet is based on the concept of the Network Virtual Terminal.
SMTP works best in stand alone system.
FTP uses TCP/IP for lower level communication.
PPP is protocol for communication between two computers using a parallel interface.

3.

Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the tear-off answer sheet
attached to the question paper, following instructions therein.
(1x10)
X

3.1

Only the information that you provide, or the


choice you make while visiting a web site, can
be stored in

A.

packets

3.2

Exchange of documents in standardized form


between computers is called

B.

USENET

3.3

The pieces of information that are sent over the


internet are called

C.

heading

3.4

Most of the servers newsgroup come as a part


of

D.

WAN

3.5

Gateways are often a major component in


interconnecting backbone networks to form
larger

E.

Cookies

3.6

HTML has a six level of

F.

domain name

3.7

The protocol that web clients and servers use


to communicate with each other is called

G.

EDI

3.8

Last part of e-mail address is

H.

HTTP

3.9

Java does not support

I.

TCP/IP

3.10

To run flash vector file in internet explorer, the


software required is called

J.

multiple inheritances

K.

multi threading

L.

plug-ins

M.

components

N.

tags

M3-R3

Page 3 of 5

July, 2009

4.

Each statement below has a blank space to fit one of the word(s) or phrase(s) in
the list below. Enter your choice in the tear-off answer sheet attached to the
question paper, following instructions therein.
(1 x 10)

A.

JPEG

B.

VRML

C.

Tools

D.

Client program

E.

XML

F.

HTML

G.

X-Windows

H.

Browser

I.

DNS protocol

J.

Firewall

K.

Anchor

L.

FTP

4.1

________ is a simple ASCII-text description of geometries that can be hired across


various platforms.

4.2

The ________ converts host name in the 32 bit IP address.

4.3

________ tag can be used for linking documents in HTML.

4.4

An application receiving data is called ________.

4.5

Client software that access web pages on internet is called ________.

4.6

The ________ protects your network by blocking unwanted users from gaining access.

4.7

________ clients provide features such as multiple windows and point-and-click


command interface on UNIX like operating systems.

4.8

Internet option from ________ menu can be used to set home page for internet explorer.

4.9

________ service is used to transfer files.

4.10

Style sheets let you control the visual appearance of ________ document by creating a
series of description.

M3-R3

Page 4 of 5

July, 2009

PART TWO
(Answer any FOUR questions)
5.
a)
b)
6.
a)
b)
c)

7.
a)
b)
c)

8.
a)
b)
9.
a)
b)
c)
d)

Write an HTML program to send mail. The page should provide three text boxes for user
name, e-mail address, message and two command buttons for sending mails and
resetting text box.
E-mail is the internets most widely used feature. Explain the structure of the e-mail.
(10+5)
Describe the types of Internet crimes.
Explain OS network architecture model.
IRC client programs connect over the Internet to central IRC servers that distribute the
messages around the network. Write a short note on how IRC clients and server
interacts.
(5+6+4)
Search engine can be used to find out various website or software from internet. What
are the types of search engine? Explain with example.
Explain, what is Information Security?
Explain the following FTP command:
i)
ls
ii)
mget
iii)
mput
iv)
open
v)
pwd
(5+5+5)
List four graphics image file formats? Explain the context in which each one of them is
used.
What is encryption? Describe applications of encryption.
(8+7)
Write short notes on any three of the following:
Router
Web server
LAN & WAN
Script language
(5x3)

M3-R3

Page 5 of 5

July, 2009

You might also like