You are on page 1of 7

INTERNET TECHNOLOGY AND WEB DESIGN

VIVA QUESTIONS

1.What is DNS?

On the Internet, the Domain Name System (DNS) associates various sorts of information
with so-called domain names; most importantly, it serves as the "phone book" for the
Internet by translating human-readable computer hostnames, e.g. en.wikipedia.org, into
the IP addresses, e.g. 66.230.200.100, that networking equipment needs for delivering
information. It also stores other information such as the list of mail exchange servers that
accept email for a given domain. In providing a worldwide keyword-based redirection
service, the Domain Name System is an essential component of contemporary Internet
use.

2.What is proxy server?

In computer networks, a proxy server is a server (a computer system or an application


program) which services the requests of its clients by forwarding requests to other
servers. A client connects to the proxy server, requesting some service, such as a file,
connection, web page, or other resource, available from a different server. The proxy
server provides the resource by connecting to the specified server and requesting the
service on behalf of the client. A proxy server may optionally alter the client's request or
the server's response, and sometimes it may serve the request without contacting the
specified server.
A proxy server that passes all requests and replies unmodified is usually called a gateway
or sometimes tunneling proxy.
A proxy server can be placed in the user's local computer or at specific key points
between the user and the destination servers or the Internet.

3.What is cookies?

HTTP cookies, sometimes known as web cookies or just cookies, are parcels of text sent
by a server to a web browser and then sent back unchanged by the browser each time it
accesses that server. HTTP cookies are used for authenticating, tracking, and maintaining
specific information about users, such as site preferences and the contents of their
electronic shopping carts.

4. What is internet?

The Internet is a worldwide, publicly accessible series of interconnected computer


networks that transmit data by packet switching using the standard Internet Protocol (IP).
It is a "network of networks" that consists of millions of smaller domestic, academic,
business, and government networks, which together carry various information and
services, such as electronic mail, online chat, file transfer, and the interlinked Web pages
and other documents of the World Wide Web.
5.What is ICMP?

ICMP (Internet Control Message Protocol) also exists at this level. ICMP is
connectionless; it is used for control, signaling, and error reporting purposes.

6.Define TCP.

The Transmission Control Protocol (TCP) is one of the core protocols of the Internet
protocol suite. TCP provides reliable, in-order delivery of a stream of bytes, making it
suitable for applications like file transfer and e-mail. It is so important in the Internet
protocol suite that sometimes the entire suite is referred to as "the TCP/IP protocol suite."

7.Define UDP.

User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite.
Using UDP, programs on networked computers can send short messages sometimes
known as datagrams (using Datagram Sockets) to one another. UDP is sometimes called
the Universal Datagram Protocol.

8.Define HTTP.

Hypertext Transfer Protocol (HTTP) is a communications protocol used to transfer or


convey information on the World Wide Web. Its original purpose was to provide a way to
publish and retrieve HTML hypertext pages. Development of HTTP was coordinated by
the W3C (World Wide Web Consortium) and the IETF (Internet Engineering Task
Force), culminating in the publication of a series of RFCs, most notably RFC 2616 (June
1999), which defines HTTP/1.1, the version of HTTP in common use

9. Define IP ADDRESS.

An IP address (Internet Protocol address) is a unique address that certain electronic


devices use in order to identify and communicate with each other on a computer network
utilizing the Internet Protocol standard (IP)—in simpler terms, a computer address. Any
participating network device—including routers, switches, computers, time-servers,
printers, Internet fax machines, and some telephones—can have their own unique address

10. How many layer in tcp/ip?

TCP/IP has five layers,they are


1.physical layer
2.data-link layer
3.network / internet layer
4.transport layer
5.application layer
11. Define Web Servers.

The term web server can mean one of two things:


1. A computer program that is responsible for accepting HTTP requests from clients,
which are known as web browsers, and serving them HTTP responses along with
optional data contents, which usually are web pages such as HTML documents and
linked objects (images, etc.).
2. A computer that runs a computer program which provides the functionality
described in the first sense of the term.

12.Define Web Hosting?

A web hosting service is a type of Internet hosting service that allows individuals and
organizations to provide their own websites accessible via the World Wide Web. Web
hosts are companies that provide space on a server they own for use by their clients as
well as providing Internet connectivity, typically in a data center

13.What is Streaming?

Streaming media is multimedia that is continuously received by, and normally displayed
to, the end-user while it is being delivered by the provider. The name refers to the
delivery method of the medium rather than to the medium itself. The distinction is
usually applied to media that are distributed over telecommunications networks, as most
other delivery systems are either inherently streaming (e.g. radio, television) or inherently
non-streaming (e.g. books, video cassettes, audio CDs).

14. Define Socket.

Socket is an end-point of a bi-directional communication link.

15. REMOTE METHOD INVOCATION:

The Java Remote Method Invocation API, or Java RMI, is a Java


application programming interface for performing the object equivalent of remote
procedure calls.

There are two common implementations of the API. The original implementation
depends on Java Virtual Machine (JVM) class representation mechanisms and it thus
only supports making calls from one JVM to another. The protocol underlying this Java-
only implementation is known as Java Remote Method Protocol (JRMP). In order to
support code running in a non-JVM context, a CORBA version was later developed.
Usage of the term RMI may denote solely the programming interface or may signify both
the API and JRMP, whereas the term RMI-IIOP, read RMI over IIOP, denotes the RMI
interface delegating most of the functionality to the supporting CORBA implementation.
16.SERVER SOCKET:

A server socket is a computer communications end point for new incoming


connections. The server socket accepts incoming connections, handles lower-level
network traffic to finalize the connection and then forks a new connection for reading or
writing. The server socket continues to be available to accept other incoming
connections.

17.Define Browsers.

A web browser is a software application that enables a user to display and


interact with text, images, videos, music and other information typically located on a
Web page at a website on the World Wide Web or a local area network. Text and images
on a Web page can contain hyperlinks to other Web pages at the same or different
website. Web browsers allow a user to quickly and easily access information provided on
many Web pages at many websites by traversing these links. Web browsers format
HTML information for display, so the appearance of a Web page may differ between
browsers.

18.Define Multicast.

Multicast is the delivery of information to a group of destinations


simultaneously using the most efficient strategy to deliver the messages over each link of
the network only once, creating copies only when the links to the destinations split.
The word "Multicast" is typically used to refer to IP Multicast, the implementation of the
multicast concept on the IP routing level, where routers create optimal distribution paths
for datagrams sent to a multicast destination address spanning tree in realtime.

19.Firewalls:

A firewall is a hardware or software device which is configured to permit, deny,


or proxy data through a computer network which has different levels of trust.
A firewall's basic task is to regulate the flow of traffic between computer
networks of different trust levels. Typical examples are the Internet which is a zone with
no trust and an internal network which is a zone of higher trust. A zone with an
intermediate trust level, situated between the Internet and a trusted internal network, is
often referred to as a "perimeter network" or Demilitarized zone (DMZ).

A firewall's function within a network is similar to firewalls with fire door in building
construction. In former case, it is used to prevent network intrusion to the private
network. In latter case, it is intended to contain and delay structural fire from spreading to
adjacent structures.
20.Encryption:

In cryptography, encryption is the process of transforming information


(referred to as plaintext) to make it unreadable to anyone except those possessing special
knowledge, usually referred to as a key. The result of the process is encrypted
information (in cryptography, referred to as ciphertext). In many contexts, the word
encryption also implicitly refers to the reverse process, decryption (e.g. “software for
encryption” can typically also perform decryption), to make the encrypted information
readable again (i.e. to make it unencrypted).

21.Define VPN.

A virtual private network (VPN) is a communications network tunneled through


another network, and dedicated for a specific network. One common application is secure
communications through the public Internet, but a VPN need not have explicit security
features, such as authentication or content encryption. VPNs, for example, can be used to
separate the traffic of different user communities over an underlying network with strong
security features.

22.NAT(NETWORK ADDRESS TRANSLATION)

In computer networking, Network Address Translation (NAT, also known as


Network Masquerading, Native Address Translation or IP Masquerading) is a technique
of transceiving network traffic through a router that involves re-writing the source and/or
destination IP addresses and usually also the TCP/UDP port numbers of IP packets as
they pass through. Checksums (both IP and TCP/UDP) must also be rewritten to take
account of the changes. Most systems using NAT do so in order to enable multiple hosts
on a private network to access the Internet using a single public IP address (see gateway).
Many network administrators find NAT a convenient technique and use it widely.
Nonetheless, NAT can introduce complications in communication between hosts and
may have a performance impact.

23. SEARCH ENGINE:

A search engine is an information retrieval system designed to help find information


stored on a computer system. Search engines help to minimize the time required to find
information and the amount of information which must be consulted, akin to other
techniques for managing information overload.
The most popular form of a search engine is a Web search engine which searches for
information on the public World Wide Web. Other kinds of search engines include
enterprise search engines, which search on intranets, desktop search engines, and mobile
search engines.
24.PACKET FILTERING:

Packet filters act by inspecting the "packets" which represent the basic
unit of data transfer between computers on the Internet. If a packet matches the packet
filter's set of rules, the packet filter will drop (silently discard) the packet, or reject it
(discard it, and send "error responses" to the source).
This type of packet filtering pays no attention to whether a packet is part of an existing
stream of traffic (it stores no information on connection "state"). Instead, it filters each
packet based only on information contained in the packet itself (most commonly using a
combination of the packet's source and destination address, its protocol, and, for TCP and
UDP traffic, which comprises most internet communication, the port number).

25.OPTIMIZATION:

optimization is the process of modifying a system to make some aspect of it work more
efficiently or use fewer resources. For instance, a computer program may be optimized so
that it executes more rapidly, or is capable of operating within a reduced amount of
memory storage, or draws less battery power in a portable computer. The system may be
a single computer program, a collection of computers or even an entire network such as
the Internet.

26.CLIENT – SERVER MODEL:

Client-server is a computing architecture which separates a client from a server, and is


almost always implemented over a computer network. Each client or server connected to
a network can also be referred to as a node. The most basic type of client-server
architecture employs only two types of nodes: clients and servers. This type of
architecture is sometimes referred to as two-tier. It allows devices to share files and
resources.
Each instance of the client software can send data requests to one or more connected
servers. In turn, the servers can accept these requests, process them, and return the
requested information to the client. Although this concept can be applied for a variety of
reasons to many different kinds of applications, the architecture remains fundamentally
the same.
These days, clients are most often web browsers, although that has not always been the
case. Servers typically include web servers, database servers and mail servers. Online
gaming is usually client-server too. In the specific case of MMORPG, the servers are
typically operated by the company selling the game; for other games one of the players
will act as the host by setting his game in server mode.

27.INTERNET INFORMATION SERVERS:

Microsoft Internet Information Services (IIS, formerly called Internet Information


Server) is a set of Internet-based services for servers using Microsoft Windows. It is the
world's second most popular web server in terms of overall websites.The servers
currently include FTP, SMTP, NNTP, and HTTP/HTTPS.
28.Define APPLET.

An applet is a software component that runs in the context of another program, for
example a web browser. An applet usually performs a very narrow function that has no
independent use. As such, an applet provides functionality or performance beyond the
default capabilities of its container (the browser). Also, in contrast with a subroutine,
certain capabilities are restricted by the container. An applet is written in a language that
is different from the scripting or HTML language which invokes it. The applet is written
in a compiled language, while the scripting language of the container is an interpreted
language, hence the greater performance or functionality of the applet. Unlike a
"subroutine," a complete web component can be implemented as an applet.

29.Define THREAD.

Thread in computer science is short for a thread of execution. Threads are a way
for a program to fork (or split) itself into two or more simultaneously (or pseudo-
simultaneously) running tasks. Threads and processes differ from one operating system to
another, but in general, the way that a thread is created and shares its resources is
different from the way a process does.

You might also like