Internet
Technologies And Tools
1.
Explain how Domain Names are allocated with special
reference to special domain names.
|
[18]
|
2. Write
a note on how Domain Name System (DNS) Servers work.
|
[4]
|
3. What
are the essential functions that the router must perform to
achieve internetworking among dissimilar subnetworks?
|
[6]
|
4. Write
short notes on: Working of
Client/Server architecture
|
|
5. Write
short notes on: Digital Subscriber lines
|
[6]
|
5. Write
and explain the procedure for translating a domain name into an
equivalent IP address. What are two performance optimizations
techniques used by DNS server?
|
[9]
|
6. Explain
the differences between Routing and Switching?
|
[6]
|
|
|
7. Home
based Internet services can be established using analog modems,
IDSN, cable modems, ADSL and hi-speed wireless links. Compare
their advantages and disadvantages.
|
[8]
|
|
|
8. Write
any three features of intranet that differences it largely from
Internet.
|
[4]
|
|
|
9. Explain
the difference of functioning between Bridges and Routers.
|
[6]
|
|
|
10. Write
a short note on baseband technology and broadband technology,
with a special reference to advantages and the latest status of
broadband in India.
|
[6]
|
11. State
the difference between of the following in brief:
File-server
architecture and client/Server Architecture.
|
[6]
|
|
|
12. Expand
and explain in detail of the following acronyms:
ISDN
|
[6]
|
|
|
13. Explain
how the naming scheme (DNS) on the Internet works?
|
[9]
|
|
|
14. With
reference to various applications of Internet in our daily life,
explain, how Internet has revolution the area of Learning?
|
[8]
|
|
|
15. Suppose
a network uses distance vector routing. What happens if the
router sends a distance vector with all 0’s(Zero)?
|
[5]
|
|
|
16. What
is Domain Name System? Explain.
|
[4]
|
|
|
17. What
is Internet? Describe the Architecture of Internet. Explain how a
router works.
|
[6]
|
|
|
18. What
is Client/Server architecture? Explain the advantages and
disadvantages of two-tier and three-tier architecture in detail.
|
[9]
|
|
|
19. Which
transport technique is most appropriate for multimedia service:
packet switching, circuit switching or ATM cell switching? Why?
|
[4]
|
|
|
20. What
does DNS stand for? What is its main purpose?
|
[6]
|
|
|
21. Explain
the following terms:
Router
|
[2]
|
22. What
is xDSL technology?
|
[4]
|
|
|
23. Explain
the significance of DNS server.
|
[4]
|
|
|
24. What
is ATM? Discuss the four types of services provided by it.
|
[6]
|
|
|
25. Differentiate
between multi-protocol router and a traditional single-protocol
router.
|
[6]
|
|
|
26. Write
a short note on Baseband Technology and Broadband Technology,
with a special reference to advantages and the latest status of
Broadband in India.
|
[6]
|
|
|
27. Explain
whether an ATM cell carries a source or destination address in
its header or not.
|
[6]
|
28. The
fundamental property of the DNS is caching. DNS server caches the
information when a name server receives information about a
mapping. What is the purpose of it and how does it work?
|
[6]
|
|
|
29. Explain
the client server model of communication? What is the difference
between client server architecture and web architecture?
|
[4]
|
|
|
30. What
are the advantages of ATM that uses small the fixed length
packets?
|
[4]
|
|
|
31. What
are the benefits of DSL? How can a DSL line be shared among
multiple users?
|
[6]
|
|
|
32. What
is Domain Name System? What does it mean to “register” a
domain name? What’s the difference between forward lookup and
reverse lookup in DNS?
|
[6]
|
|
|
33. Discuss
how a user gets connected to the Internet using an ISP.
|
[6]
|
|
|
34. Write
a short note a Baseband Technology and Broadband Technology, with
a special reference to advantages and the latest status of
Broadband in India.
|
[6]
|
|
|
35.
What is loopback interface? Explain.
|
[4]
|
|
|
36.
What is meant by upstream & downstream?
|
[6]
|
|
|
37.
Compare DSL with the following: 56
kbps analog modems
T.1 line
ISDN
|
[6]
|
|
|
38.
When a DNS server receives a request, what are the
possible actions that it can take?
|
[6]
|
|
|
39.
What is domain name system (DNS)? Differentiate between
forward lookup and reverse in DNS.
|
[4]
|
|
|
40.
Write short notes on :
Integrated
Services Digital Network (ISDN).
|
[4]
|
|
|
41.
What is the difference between the Basic Rate Interface
(BRI) and Primary Rate Interface (PRI) services in ISDN?
|
[4]
|
42.
Describe the difference between client server architecture
and peer to peer system.
|
[4]
|
|
|
43.
What do you mean by xDSL? Which DSL technology is mainly
deployed in residential areas?
|
[6]
|
|
|
44.
What is resolver? How does it help in mapping the domain name
to IP address?
|
[6]
|
|
|
45. Explain
Satellite technology for communication across large distances.
|
[8]
|
46. State
the advantages and disadvantages of satellite microwave and
optical fiber transmission.
|
[10]
|
|
|
47. What
are optical fibers? Write at least four advantages of fibers over
conventional metal wires.
|
[4]
|
|
|
48. What
media can be used for noise resistance? Briefly state its other
advantages.
|
[4]
|
|
|
49. Discuss
the following techniques to ensure the data against accidental
damage:
i) parity
bits
ii) checksum
iii) Cyclic
redundancy Checks
|
[6]
|
|
|
50. What
are the types of wireless networks?
|
[6]
|
|
|
51. What
are EAP, LEAP, PEAP and EAP-TLS & EAP-TTLS?
|
[6]
|
|
|
51. How
does a router differ from a bridge?
|
[6]
|
|
|
52. Briefly
discuss major wireless networking standards.
|
[10]
|
|
|
53. Which
switching technique performs error checking on the first 64 bytes
of the frame? What are different processing methods used by
switches to make switching decisions?
|
[6]
|
54.
Which of the following transport technique is most
appropriate for multimedia service? Explain in brief:
Packet
switching
Circuit
switching
ATM
cell switching
|
[4]
|
|
|
55.
Differentiate between 10Base5, 10Base2, 10BaseT and
10Base F.
|
[6]
|
|
|
56.
What do you understand by network topology? Discuss any
three network topologies?
|
[6]
|
|
|
57.
What is virtual circuit network? What are its advantages
and disadvantages? Name some network technologies and their
virtual circuits?
|
[6]
|
|
|
58.
How do ports on host machine enable communication between
them?
|
[4]
|
|
|
59.
Write short notes on :
LAN
topologies
|
[6]
|
|
|
60.
Write short notes on any three of the following:
Satellite
communication
|
[6]
|
|
|
d)
Remote Authentication Dial In User Service (RADIUS).
[6]
|
[6]
|
|
|
61.
“MIME is only an
extension of SMTP” – Justify.
|
[4]
|
|
|
62. Write
down four main features of mobiles IP?
|
[4]
|
|
|
63. Expand
and explain in detail any three of the following acronyms:
TCP/IP
Protocol
|
[6]
|
|
|
64. What
is TCP/IP? Discuss the layers of TCP/IP.
|
[4]
|
|
|
65. Discuss
two protocols used for transmitting data securely over the World
Wide Web.
|
[6]
|
|
|
66. What
is TCP? What are the features, which makes TCP a reliable
protocol?
|
[4]
|
|
|
67. Discuss
Simple Mail Transfer Protocol.
|
[6]
|
|
|
68. Why
is HTTP known as a stateless protocol?
|
[4]
|
|
|
69. What
is the layered architecture of the Internet? In a wireless
network, describe how each layer would be different from a wired
network.
|
[10]
|
70. If
an application uses TCP with IP, would it be considered
connectionless or connection oriented? What are the problems with
using TCP for real-time services (e.g. video conferencing?
Explain.
|
[6]
|
|
|
71. How
does the three-way handshake, for creating a TCP connector,
works?
|
[4]
|
|
|
72. What
is TCP? Connection termination in TCP is symmetric, whereas
connection establishment is not. Why?
|
[6]
|
|
|
73.
Explain, how a session layer establishes, maintains and
synchronizes the interaction between two communication hosts.
|
[6]
|
|
|
74.
Why is IP called a best-effort delivery protocol?
|
[6]
|
|
|
75.
What is the difference between an Ethernet switch and an
Ethernet hub? Which is more suitable for a network with a high
traffic load, a switch or a hub? Explain.
|
[6]
|
|
|
76.
What are the various layers in the TCP/IP model? Discuss
the responsibility of each layer. Also name some protocols
supported at each layer.
|
[6]
|
|
|
77.
What is SMTP? How it can be use to send spam?
|
[4]
|
|
|
78.
What do you understand by internet protocols? Which body
does have control on them? List any four protocols along with
their basic functions?
|
[6]
|
|
|
79.
Write the basic features of the following basic network
utilities:
IP
Config
Ping
Traceroute
|
[6]
|
|
|
80.
Explain why OSI layer are structured into 7 layer model
|
[4]
|
|
|
81.
What is TCP? Connection termination in TCP is symmetric,
whereas connection establishment is not. Why?
|
[6]
|
82.
What is the length of the header in a TCP segment? What
happens when a TCP segment arrives at s host for a destination
port that does not exist? What happens in case of a UDP
datagram?
|
[6]
|
|
|
83.
Using a network analyzer
how can physical address of a computer be found?
|
[4]
|
|
|
83. How
does ARP handle IP address resolution?
|
[4]
|
|
|
84.
“IP divides host addresses into three primary
classes”
What
are classes?
|
[2]
|
|
|
b) Identify
the range of Ipv4 addresses spanned by the Primary Classes.
|
[6]
|
c) Justify
the address class/purpose of following addresses:
128.211.6.115
192.5.48.3
0.0.0.0
1.1.1.1
127.0.0.1
|
[10]
|
|
|
85. What
are the different classifications of an Internet addressing?
Explain the addressing scheme with respect of Internet hosts and
networks.
|
[5]
|
|
|
86. Subnet
the class C network address 198.69.25.0 into eight subnets.
|
[6]
|
|
|
87. One
function of a routing protocol is to determine the 'best path'
between the sending and the receiving nodes. What is considered
as 'best path'?
|
[6]
|
|
|
88. OSPF
is considered to be a distributed routing protocol since routers
periodically exchange information with each of their neighbours.
Is it possible to have routing protocol that is centralized in
nature? How do you think centralized routing protocol would work?
Will there be some inherent problems?
|
[6]
|
87. 'DHCP'
permits completely automated address assignment'. Justify the
statement.
|
[4]
|
|
|
88. Expand
and explain in detail any three of the following acronyms:
OSPF
|
[6]
|
|
|
89. Giving
suitable examples explain three kinds of classes of an Internet
addressing, with special emphasis on the range spanned by each
class?
|
[9]
|
|
|
90. Why
does BGP not exchange routing information periodically as RIP
does?
|
[5]
|
|
|
91. What
is IP Host address? Discuss in detail.
|
[4]
|
|
|
92. Explain
the following terms:
RARP
|
[2]
|
|
|
93. How
do we reuse IP address using Network Address Translation (NAT)
mechanism?
|
[4]
|
94. What
is 127.0.0.1? Explain with example.
|
[4]
|
|
|
95. What
is the difference between a packet and a frame?
|
[4]
|
|
|
96. What
is MAC Address Filtering?
|
[4]
|
|
|
97. What
are routing protocols? Compare and contrast different types of
protocol.
|
[6]
|
|
|
98. Why
is Open Shortest Path First (OSPF) protocol required? What kinds
of connections does it support?
|
[6]
|
99. Explain
the Reverse Address Resolution Protocol (RARP). Why is it
required?
|
[6]
|
|
|
100. How
did CIDR ease the problem of fast depleting Ipv4 addressing?
|
[4]
|
|
|
101. What
are some important features of DHCP?
|
[4]
|
|
|
102. Why
is Open Shortest Path First (OSPF) protocol required? What kind
of connections does it support?
|
[6]
|
|
|
103. How
IP addresses are classified? What is the use of classifying IP
addresses? What is the possible range of IP addresses for the
different classes?
|
[6]
|
|
|
104. Write
at least three problems associated with Ipv4 addressing. What are
some of the solutions that have been proposed to overcome these
problems?
|
[6]
|
|
|
105. What
is ARP cache? What is the normal expiration time of an entry in
ARP cache? Why does ARP request message carry the IP address and
the link layer address of the sender?
|
[6]
|
|
|
106. What
is the difference in the subnet mask for a Class A address with
16 bits for the subnet ID and a class B address with 8 bits for
the subnet ID? Is the subnet mask 255.255.0.255 valid for a Class
A address?
|
[6]
|
|
|
107.
What is connection-oriented service? Why is it considered
reliable?
|
[6]
|
|
|
108.
Differentiate between ARP and RARP?
|
[6]
|
109.
Differentiate between distance vector routing and link
state vector routing?
|
[6]
|
|
|
110.
What is IP address? Why is it needed? What is the
difference between public and private IP addresses?
|
[4]
|
|
|
111.
What is the network prefix of IP address 192.110.50.3/24?
Explain the difference between a network IP and a network prefix.
|
[6]
|
102.
A network contains two routed subnets: Subnet A and Subnet
B. Subnet B contains a Windows 2000 server configured as a DHCP
server. This server has scopes created for both Subnet A and
Subnet B. Subnet B does not contain DHCP server.
The
client on Subnet A are not receiving IP addresses from the DHCP
server. What is done for enable clients in Subnet A to receive
dynamically assigned IP addresses? Choose all that apply.
|
[6]
|
|
|
103.
Choose any two scenarios from the following in which BGP
is recommended:
You
need a default route to connect to a single ISP.
When
you need to connect to two or more ISPs.
When
you are sending traffic through one AS to get to another AS.
When
you need a simple routing on your internet.
|
[6]
|
|
|
104.
When is an ARP request packet generated? Describe the
various steps that take places when a host receives an ARP
request packet?
|
[6]
|
|
|
105.
A company XYZ has five departments. The company wants to
assign a single class B address 167.172.0.0 to its five
departments. It wants five different subnets to be created with
each subnet having 25 host addresses. Show the steps involved to
achieve the above.
|
[6]
|
|
|
106. Expand
and briefly explain the acronyms PCR SCR MCR and CVDT in terms of
Quality of standards parameters.
|
[4]
|
|
|
107. What
is VOIP? What are the motivations for transmitting voice over IP?
|
[6]
|
|
|
108. What
is QoS? Discuss the MPLS & DiffServ techniques in WAN network
scenario.
|
[6]
|
|
|
109. What
is VOIP? What are the motivations of transmitting voice over IP?
|
[6]
|
|
|
110.
What is VOIP? What are the advantages of using VOIP as
compared to PSTN? What are basic steps used to setup a VOIO
communication channel?
|
[6]
|
|
|
111.
Discuss in brief the Multiprotocol Label Switching
(MPLS).
|
[4]
|
|
|
112.
What is VOIP? What are the reasons for transmitting
voice over IP?
|
[6]
|
|
|
113.
There is a new version of Internet Protocol (IP) that has
been proposed by IETF, to replace the current version. Explain
its new important features with special reference to the
limitations in the old version.
|
[18]
|
|
|
114. What
is ICMP? Write at least four functions of ICMP?
|
[4]
|
|
|
115. What
design features of IPv4 are retained in IPv6? What are the new
features that are introduced in IPv6?
|
[9]
|
|
|
116. State
the difference between any three of the following in brief:
Ipv4
and Ipv6.
|
[6]
|
|
|
117. Explain
briefly, the new features in Ipv6 as compared to Ipv4.
|
[6]
|
|
|
118. Explain
briefly, how Ipv6 handles multiple headers? What is the purpose
of multiple headers? Explain Ipv6 addressing.
|
[12]
|
|
|
119. How
can IPv4 address be converted to an equivalent IPv6 address?
|
[4]
|
|
|
120. What
layer protocol is the ICMP? How the ICMP data is passed to the
data link layer.
|
[4]
|
|
|
121. Describe
the role of IPv6 in real time services?
|
[6]
|
|
|
122. What
is static routing? How it differs from dynamic routing.
|
[6]
|
|
|
123. Discuss
the reasons behind the definition of IPv6/IPng, including the
main new features associated with it.
|
[6]
|
|
|
124. Compare
QoS support features of IPv6 technology with those of IPv4
technology?
|
[4]
|
|
|
125. What
is static routing? How it differs from dynamic routing.
|
[6]
|
|
|
126. What
kinds of messages are generated by ICMP? Briefly describe them.
|
[6]
|
|
|
127. How
does ICMP software on a host know to which other host it should
send an error message?
|
[6]
|
|
|
128.
How can IPV4 address to be converted to an equivalent IPV6
address?
|
[4]
|
|
|
129.
How does default routing perform?
|
[4]
|
|
|
130.
Describe IPv6 with its main features. What is the main
problem faced by IPv4 because of which IPV6 has been developed?
|
[6]
|
|
|
131.
What is DHCP? Is it UDP based or not. What three methods
do DHCP servers use for issuing addressing information?
|
[6]
|
|
|
132.
When is multicasting more
useful over broadcasting?
|
[4]
|
|
|
133. State
the difference between any three of the following in brief:
Multicasting
and broadcasting.
|
[6]
|
|
|
134. What
is Internet Multicast Protocol? Explain Internet Group Management
Protocol.
|
[6]
|
|
|
135. With
respect to multicasting scenario, answer the following:
i) What
should be the MAC address that can be used to send IP packet to a
group?
ii) How
do the hosts get registered to a multicast group?
|
[8]
|
|
|
136. Explain,
how multicasting and broadcasting differentiate each other.
|
[6]
|
|
|
137. What
are collision and broadcast domains?
|
[6]
|
|
|
138. What
is a broadcast IP address? What is IP multicasting?
|
[4]
|
|
|
139.
What is the purpose IGMP? What is the range of available
IP multicast addresses?
|
[4]
|
|
|
140.
Write short notes on :
Multicasting-addressing
|
[6]
|
|
|
141.
What is the range of available IP multicast addresses? What
is the purpose of IGMP? What is an advantage of IGMPv2 over
IGMPv1? What information does the router use to do an RPF check?
|
[6]
|
|
|
142.
What do you think is the role of a network manager?
|
[4]
|
|
|
143. Explain
briefly about the new technology that combines the advantages of
both private network and public network?
|
[4]
|
|
|
144. Differentiate
between the following pairs:
Private
key and Public Key.
Cookies
and Passports
|
[6]
|
|
|
145. Write
short note on Cookies.
|
[4]
|
|
|
146. Explain
any three of the following:
i) How
do Firewalls safeguard the Internet?
ii) How
do Smurf Attacks cripple Internet Service Providers?
iii) How
do Viruses work?
iv) How
do Digital certificates ensure Internet Security?
|
[4x6]
|
|
|
147. Write
short notes on the following:
Working
of Proxy Servers
|
[6]
|
|
|
148. What
is a Proxy Server? Why it is used?
|
[4]
|
|
|
149. What
is a Firewall? At what layer do they work? What is the main
drawback of a firewall?
|
[4]
|
150. Name
some packets that are used by SNMP for information transactions
|
[4]
|
|
|
151. Describe
the concept of Virtual Private Network (VPN). Why is security a
concern when using VPN?
|
[6]
|
|
|
152. Write
the difference between SNMP manager and SNMP agent
|
[6]
|
|
|
153. Explain
the difference between authentication methods and encryption
methods. Give examples of each as a part of your explanation.
|
[6]
|
|
|
154. Describe
how cookies can be used to store information about a user?
|
[6]
|
|
|
155. What
is a packet filter that is often used to protect an
organization’s computer from unwanted Internet traffic called?
Describe the concept in brief?
|
[4]
|
|
|
156. What
is a malicious code? By which name are they popularly known.
|
[4]
|
|
|
157. State
the difference between the following in brief:
Digital
signature and digital certificate.
|
[6]
|
|
|
158. Expand
and explain in detail any three of the following acronyms:
VPN
|
[6]
|
|
|
159. What
is a Proxy Server? What are its functions?
|
[4]
|
|
|
160. What
are digital certificates? Explain their role in Internet
Security.
|
[4]
|
|
|
161. What
are Cookies? How are they different from Microsoft Passports?
|
[6]
|
|
|
162. What
are Firewalls? How do they work?
|
[4]
|
|
|
163. What
are Viruses? What are the different types of viruses? Explain,
how viruses work on Internet?
|
[8]
|
|
|
164. Write
short notes on:
Smurf
Attacks
|
[3]
|
|
|
165. What
the different aspects of Network Security? What do you mean by
Accountability and Authorization?
|
[6]
|
|
|
166. What
is the difference between plain text and cipher text. Explain
stream cipher.
|
[4]
|
|
|
167. Explain
the differences between authentication methods and encryption
methods. Give examples of each.
|
[6]
|
|
|
168. Describe
the concept of VPN. Why is security a concern when using VPN?
|
[6]
|
|
|
169. What
is a firewall? What are the typical tasks of a firewall?
|
[6]
|
|
|
170. Explain
the following terms:
Virus
scanning software
|
[2]
|
|
|
171. What
is Wired Equivalent Privacy (WEP)? Discuss the Security Issues.
|
[4]
|
|
|
172. What
is a firewall? Explain with packet filtering concept.
|
[6]
|
|
|
173. What
are the Internet security threats? What are the factors that
constitute a good firewall system?
|
[6]
|
174. Describe
the risks involved in Plaintext communication over the Internet?
What can be done to ensure that these dangers (risks) are dealt
with.
|
[8]
|
|
|
175. What
is the role played by VPN in the concept of network security?
|
[4]
|
|
|
176. What
is firewall? Should it come before router or after router in a
network? Justify.
|
[4]
|
|
|
177. What
is IP address spoofing and how could it be defeated?
|
[4]
|
|
|
178. What
is the difference between passive and active attacks with respect
to security threats faced in using the web?
|
[6]
|
|
|
179. Describe
in detail how public key and private key cryptography are used to
provide secure access from a browser to a Web server over the
Internet so that a commercial transaction can take place.
|
[6]
|
180. What
are the various types of access violations that may lead to the
possible attacks, security breaches or information corruption
over an internet work?
|
[6]
|
|
|
181. What
do you understand by IP spoofing?
|
[4]
|
|
|
182. What
does SNMP enable network managers do, and why is this important?
|
[4]
|
|
|
183. What
is a firewall? What is the purpose the packet filters and
application gateways?
|
[6]
|
|
|
184. What
are Viruses? What are the different types of viruses? Explain,
how viruses work on the Internet?
|
[6]
|
|
|
185.
Differentiate between stream chipper and block chipper?
|
[4]
|
|
|
186.
What is the difference between monoalphabetic
substitution cipher and polyalphabetic substitution cipher?
|
[6]
|
|
|
187.
Compare the role of a Firewall with that of a proxy
server.
|
[4]
|
|
|
188.
Define the term encryption and decryption. What are
drawbacks of single key encryption? Explain how asymmetric key
encryption solves them.
|
[6]
|
|
|
189.
Explain briefly cookie and its uses. What information
does a cookie contain?
|
[6]
|
|
|
190.
What is IPSec (IP Security Protocol Suite)? How does it
similar to SSL?
|
[6]
|
|
|
191.
What is VPN? What are its salient features?
|
[4]
|
|
|
192.
What is IP address spoofing and how could it be avoided?
|
[4]
|
|
|
193.
Why authentication and encryption is required in VPNs?
Discuss any protocol of your choice that emphasizes
authentication and encryption in VPNs.
|
[6]
|
|
|
194.
What are the various types of access violations that may
lead to the possible attacks, security breaches or information
corruption over an internet?
|
[6]
|
|
|
195.
Write short notes on any three of the following:
Denial-of-service
Attacks
|
[6]
|
|
|
196.
Digital certificates
|
[6]
|
|
|
197.
Explain ‘Server Push
technology’.
|
[4]
|
|
|
197. How
can a web page contain non-textual information (such as images,
photographs or signatures)? Which HTML tag is used and how it is
used?
|
[4]
|
|
|
198. Differentiate
between the following pairs:
Client side Scripts and Server side Scripts.
Java Applets and Java Scripts.
|
[2x6]
|
|
|
199. Briefly
describe the structure of a Web URL and how they help retrieve
Web documents.
|
[4]
|
200. What
are Imagemaps and Interactive forms? How do they work?
|
[4]
|
|
|
201. How
can you use FTP to download and upload files from your computer
to another computer on the Internet? Explain in detail how an FTP
session works.
|
[8]
|
|
|
202. Explain
in brief how three most important programming tools associated
with Web technologies viz. Java, JavaScript and ActiveX work on
the World Wide Web.
|
[9]
|
|
|
203. What
is a common Gateway Interface Scripts?
|
[3]
|
|
|
204. Write
short notes on any three of the following:
Internet
Search Engines
|
[6]
|
|
|
205. What
do you mean by URL? Explain its three fields.
|
[4]
|
|
|
206. Explain
the difference between HTTP and HTML
|
[4]
|
|
|
207. What
is WWW? What is the contribution of JAVA to WWW?
|
[6]
|
|
|
208. What
is XML and how does XNL compare to SGML and HTML?
|
[6]
|
|
|
209. Describe
the Common Gateway Interface and server extensions as approaches
for integrating databases on the web
|
[6]
|
|
|
210. Briefly
explain that how can you use TELNET for remote terminal
emulation?
|
[4]
|
|
|
211. Write
short notes on:
CGI
Scripts
|
[3]
|
|
|
212. Explain,
how graphic images are embedded in a web page?
|
[4]
|
|
|
213. Explain
the browser architecture.
|
[5]
|
|
|
214. Explain
caching in web browsers.
|
[5]
|
|
|
215. What
is Telnet?
|
[4]
|
|
|
216. Describe
in brief one method by which web servers can create pages
dynamically on demand.
|
[4]
|
|
|
217. Why
is XML used to publish and exchange database contents?
|
[4]
|
217. What
is FTP? How it can be used?
|
[4]
|
218. Explain
in brief the important components (title, prologue and links) of
the head section of an HTML document.
|
[6]
|
219. What
do you understand by Java applets?
|
[6]
|
|
|
220. How
is Java strongly associated with Internet?
|
[6]
|
|
|
221. Explain
the following terms:
i) URL
iii) Telnet
|
[2x2]
|
|
|
222. Discuss
differences between GET and POST commands of (HTML) web
technology?
|
[6]
|
|
|
223. Define
the terms Web Site, Web Page, Web Server, URL, Home Page and CGI.
|
[12]
|
|
|
224. Describe
in brief one method by which web servers can create pages
dynamically on demand.
|
[4]
|
|
|
225. What
is XML and how does XML compare to SGML and HTML?
|
[6]
|
|
|
226. What
is SOAP and why is it important in the context of XML Web
Services?
|
[8]
|
|
|
227. Differentiate
between www, hypertext and hypermedia?
|
[4]
|
|
|
228. What
are the advantages of client side scripting?
|
[4]
|
|
|
229. Why
does TELNET protocol require a time sharing operating system?
|
[6]
|
|
|
230. What
is an Applet? How Applets are invoked? Do applets have
constructors? Compare and contrast applets and servlets.
|
[6]
|
|
|
231. Describe
the role that XSL can play when dynamically generating HTML pages
from a relational database. What is SOAP and how does it relate
to XML?
|
[6]
|
|
|
231. How
does FTP work? What is the difference between passive and active
FTP?
|
[6]
|
|
|
232.
How is a pathname and an URL recognized? Discuss at least
one way in which pathnames and URLs are similar?
|
[4]
|
233.
Explain, what do you understand by CGI script?
|
[4]
|
|
|
234.
What is the purpose of unpaired img tag in an HTML
document? Explain with the help of an example?
|
[6]
|
|
|
235.
Discuss, how the files can be copied across the network
with FTP. What is primary difference between FTP and HTTP?
|
[6]
|
|
|
236.
Describe the steps involved hen a browser requests for
and obtain a web page from a web server?
|
[6]
|
|
|
237.
What exactly do you means by markup? Explain using a
suitable example?
|
[6]
|
|
|
238.
What are static web pages? How are they different from
dynamic web pages?
|
[4]
|
|
|
239.
Explain in brief the importance of scripting and the
main features of Microsoft ASP. Name a common scripting language
that is used for web servers.
|
[6]
|
|
|
240.
What are major differences between XML and HTML coding?
|
[6]
|
|
|
241.
How are files downloaded using HTTP and FTP protocols?
|
[6]
|
|
|
242.
What is an Applet? Should applets have constructors?
|
[4]
|
|
|
243.
Write short notes on:
a)
HTTP
b)
Disadvantages of JAVA
|
[6x2]
|
|
|
244.
Explain what you understand by Common Gateway Interface
(CGI).
|
[4]
|
|
|
245
Explain how HTTP executes a request initiated by a
client on www?
|
[4]
|
|
|
246.
What is XML and how does XML compare to SGML and HTML?
|
[6]
|
|
|
247.
Explain how JSP can be used to create web pages?
|
|
|
|
248.
In context of e-mail explain:
i)
e-mail gateway
ii)
POP Server.
|
[9x2]
|
|
|
249. Explain
the hierarchy of Usenet Newsgroup.
|
[4]
|
|
|
250. Explain
any three of the following:
i) How
is Email delivered over the Internet?
ii) How
is Email Spam sent and how can it be blocked?
iii) What
is working of IRC?
iv) How
does Internet Telephony work?
|
[6x4]
|
|
|
251. What
is MIME? What are its advantages?
|
[6]
|
|
|
252.
What is the difference between E-mail server and POP server?
What are the versions of POP server currently available?
|
[6]
|
|
|
253. In
Context of e-mail explain e-mail gateway.
|
[9]
|
|
|
254 Explain
the POP3 Component and its role in E-Mail Delivery?
|
[9]
|
|
|
255. What
is email Spam? Explain, how, it can be blocked?
|
[6]
|
|
|
256. What
is working of IRC?
|
[4]
|
|
|
257. What
is the difference between E-mail server and POP server? Describe
how email is stored and transmitted by POP and SMTP servers.
|
[6]
|
|
|
258. Explain,
how Multicast IP broadcasts travel along the Mbone.
|
[4]
|
|
|
259 How
does Real Player streaming audio work over the Internet?
|
[4]
|
|
|
260. Write
the steps involved in File Compression.
|
[5]
|
|
|
261. Write
short notes on any three of the following:
i) Virtual
Reality
|
[6]
|
|
|
|
|
262. Explain
MPEG-1 and MPEG-2 as two audio coding standards.
|
[4]
|
|
|
|
|
263. Comment
on the following statement making special reference to
differences between JPEG and MPEG standards. “There is a
perceptible need for data compression as per certain standards as
the amount and type of data to be transferred over a network
increases”.
|
[6]
|
|
|
264. What
is virtual reality? Describe its applications.
|
[4]
|
|
|
265 What
is file compression? How is it achieved?
|
[4]
|
|
|
266. What
is multimedia? What are the requirements multimedia? Explain
standardized data formats for Multimedia-based programming.
|
[9]
|
|
|
267. What
are the reasons for using JPEG? What are the disadvantages of
JPEG?
|
[6]
|
|
|
268.
What is the MPEG-1 standard?
|
[4]
|
|
|
269.
Define GIF and JPEG image formats.
|
[6]
|
|
|
270.
Why do you require compression? What is the difference
between software-based MPEG and hardware-based MPEG?
|
[6]
|
No comments:
Post a Comment