Sunday, March 4, 2018

M2-R4: JULY 2010. DOEACC O LEVEL INTERNET TECHNOLOGY AND WEB DESIGN, QUESTION AND ANSWERS,.NIELIT

"Olevel course of DOEACC Scheme is equivalent to a Foundation Level Course in Computer Applications. Students can acquire this qualification by undergoing this course and passing the examination conducted by the NIELIT.

1. Each question below gives a multiple choice of answers.  (1x10)

1.1. The main function of a browser is to
A) compile HTML
B) interpret HTML
C) de-compile HTML
D) interpret CGI programs

1.2. Spider is a________
A) a program that crawls around the web and stores pages in search engines.
B) hacking software that spreads virally
C) software that examines network vulnerabilities
D) a protocol for distributing large files

1.3. FTP does not use
A) two transfer mode
B) control connection to remote computer before file can be transferred
C) User Datagram Protocol (UDP)
D) authorization of a user through login and password verification

1.4 ___________ is used to enable the use of active documents
A) HTML
B) CGI
C) JAVA
D) All the above

1.5. In <IMG SRC=”C:PICTURE/BB1.gif” ALIGN=middle> ALIGN is
A) A tag
B) The head
C) The body
D) An attribute

1.6 Web pages are uniquely defined using
A) IP addresses
B) URL
C) Domain
D) File name

1.7. Which of the following services are available on the World Wide Web?
i) Encryption
ii) HTTP
iii) HTML
iv) Firewalls
A) i) and ii)
B) ii) and iii)
C) iii) and iv)
D) i) and iv)

1.8. Internet uses
A) packet switching
B) circuit switching
C) telephone switching
D) telex switching

1.9 The ownership rights as related to content on the web are governed under
A) Copyright law
B) Patent law
C) Data protection law
D) Privacy law

1.10. Multipurpose Internet Mail Extension (MIME) was developed
A) to support email messages containing text and video
B) to support email messages containing text, audio and video
C) to support email messages containing audio and video
D) to support text-based email messages

2. Each statement below is either TRUE or FALSE. Choose the most appropriate one
and ENTER in the “tear-off” sheet attached to the question paper, following
instructions therein. (1x10)

2.1 TCP provides packet-level reliability.  TRUE
2.2 Subnet mask allows flexible division of address bits into a network address part and a host
address part.  TRUE
2.3 The Internet is managed and controlled by the US Government.  FALSE
2.4 There are upto six levels of header tag in HTML.  TRUE
2.5 Client sends the request in the form of URLs to the server.  TRUE
2.6 A single hypertext document can contain link to one document on the World Wide Web. FALSE
2.7 IP only allows fixed packet sizes.  TRUE
2.8 DNS is a distributed database offering strong consistency and atomicity guarantees.   TRUE
2.9 HTTP uses TCP and DNS uses UDP.  FALSE
2.10 Connectivity is equivalent to a point-to-point physical link.  TRUE

3. Match words and phrases in column X with the closest related meaning/
word(s)/phrase(s) in column Y. Enter your selection in the “tear-off” answer sheet
attached to the question paper, following instructions therein. (1x10)

A. Public key infrastructure
B. FTP
D. TCP
C. </HTML?> and <HTML>
E. Firewalls
F. https
G. <HTML> and </HTML>
H. Ping
I. PPP
J. UDP
K. ATM
L. POP3
M. http
N. Web browser

3.1 A technique in which two different keys are used for performing encryption and decryption  A
3.2 The Internet transfer protocol means that you are working through a secure web connection  F
3.3 Every web document must begin and end with   G
3.4 The path up to destination is allocated before the transmission of message begins  D
3.5 Control Gateways in a computer by enabling selected connections from external network and disabling selected connection to external networks  E
3.6 It allows user to dial into the Internet   I
3.7 It is a process that along with providing an interface to the user, sends messages into a socket  N
3.8 Connectionless protocol   J
3.9 It is a cell relay protocol that in combination with SONET, allows high-speed connections  K
3.10 It is an application program that uses the services of ICMP to test the reachability of a host  H

4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the
list below. Enter your choice in the “tear-off” answer sheet attached to the question
paper, following instructions therein. (1x10)

A. Client-Server
B. Telnet
C. Internet Protocol
D. Browser
E. IMAP4
F. Active
G. Common Gateway Interface
H. Net id
I. FTP
J. Host id
K. Decryption
L. EMAIL
M. SMTP

4.1 ____K____ transforms an intentionally unintelligible message (ciphertext) into meaningful
information.
4.2 ____F____ document is a copy of a program retrieved by the client and executed at the client
site.
4.3 Multipurpose Internet Mail Extension (MIME) is an extension of ____L____ that allows the
transfer of multimedia and other non-ASCII messages.
4.4 POP3 and ____E____ are protocols used by a mail server in conjunction with SMTP to
receive and hold email for hosts.
4.5 Domain Name System (DNS) is a _____A_____application that identifies each host on the
Internet with a unique user-friendly name.
4.6 In remote login, ____B____ is used to access distant service.
4.7 IPv6 is the latest version of the ____C____ which has a 128-bit address space, a resource
allocation, and increased security measures.
4.8 The ____G____ is a standard for creating and handling dynamic Web documents.
4.9 Java is a combination of a high-level programming language, a run-time environment, and a
class library that allows a programmer to write an active document and a ____D____ to run it.
4.10 The portion of the IP address that identifies the network is called the ____H____.

2 comments:

  1. By equipping you with the latest industry trends and best practices, this course can expand your job prospects and help you achieve your career aspirations. boat rental abu dhabi

    ReplyDelete