Download, print and study this document offline |
Page 1 1 Code: AT-15 Subject: INTERNET & WEB TECHNOLOGY PART-I, VOL-I TYPICAL QUESTIONS & ANSWERS OBJECTIVE TYPE QUESTIONS Each Question carries 2 marks. Choose the correct or best alternative in the following: Q.1 A header in CGI script can specify (A) format of the document. (B) new location of the document. (C) (A) & (B) both. (D) start of the document. Ans: A A header in CGI script can specify- Format of the document & New location of the document. Q.2 All exceptions in Java are subclasses of built in class called (A) Exception (B) Error. (C) Throwable. (D) Raise. Ans: C All exception in Java are subclasses of built in class called Throwable. Q.3 In 32bit IP Addressing scheme all 1’s represent (A) this computer. (B) directed broadcast. (C) limited broadcast. (D) loop back. Ans: C In 32 bit IP Addressing scheme all 1’s represent limited broadcast. Q.4 DMSP stands for (A) Distributed Mail System Protocol (B) Distributed Message System Protocol (C) Distributed Message System Pool (D) Distributed Mail System Pool Ans: A DMSP stands for – Distributed Mail system Protocol. Page 2 1 Code: AT-15 Subject: INTERNET & WEB TECHNOLOGY PART-I, VOL-I TYPICAL QUESTIONS & ANSWERS OBJECTIVE TYPE QUESTIONS Each Question carries 2 marks. Choose the correct or best alternative in the following: Q.1 A header in CGI script can specify (A) format of the document. (B) new location of the document. (C) (A) & (B) both. (D) start of the document. Ans: A A header in CGI script can specify- Format of the document & New location of the document. Q.2 All exceptions in Java are subclasses of built in class called (A) Exception (B) Error. (C) Throwable. (D) Raise. Ans: C All exception in Java are subclasses of built in class called Throwable. Q.3 In 32bit IP Addressing scheme all 1’s represent (A) this computer. (B) directed broadcast. (C) limited broadcast. (D) loop back. Ans: C In 32 bit IP Addressing scheme all 1’s represent limited broadcast. Q.4 DMSP stands for (A) Distributed Mail System Protocol (B) Distributed Message System Protocol (C) Distributed Message System Pool (D) Distributed Mail System Pool Ans: A DMSP stands for – Distributed Mail system Protocol. 2 Code: AT-15 INTERNET & WEB TECHNOLOGY Q.5 Which Layer is not present in TCP/IP model? (A) Application Layer (B) Internet Layer (C) Transport Layer (D) Presentation Layer Ans: D Presentation layer is not present in TCP/IP Model. Q.6 Let most segment of a name inn DNS represents (A) Individual Network. (B) Individual computer. (C) Domain name (D) Network type. Ans: B Left Most segment of a name in DNS represents- Individual computer Q.7 Address 192.5.48.3 belongs to (A) class A. (B) class B. (C) class C. (D) class D. Ans: C Address 192.5.48.3 belongs to class C. Q.8 Unlike Ipv4, Ipv6 does not include the following field in thee base header (A) Next Header field. (B) Field for Fragmentation information (B) Flow Label. (D) Kind field. Ans: B Unlike Ipv4, Ipv6 does not include the Field for Fragmentation information in the base header. Q.9 The term byte stuffing refers to: (A) data stuffing used with character oriented hardware. (B) data stuffing used with bit oriented hardware. (C) data stuffing used with both (A) & (B) (D) data stuffing used with byte oriented hardware. Ans: A The term byte stuffing refers to data stuffing used with character-oriented hardware. Page 3 1 Code: AT-15 Subject: INTERNET & WEB TECHNOLOGY PART-I, VOL-I TYPICAL QUESTIONS & ANSWERS OBJECTIVE TYPE QUESTIONS Each Question carries 2 marks. Choose the correct or best alternative in the following: Q.1 A header in CGI script can specify (A) format of the document. (B) new location of the document. (C) (A) & (B) both. (D) start of the document. Ans: A A header in CGI script can specify- Format of the document & New location of the document. Q.2 All exceptions in Java are subclasses of built in class called (A) Exception (B) Error. (C) Throwable. (D) Raise. Ans: C All exception in Java are subclasses of built in class called Throwable. Q.3 In 32bit IP Addressing scheme all 1’s represent (A) this computer. (B) directed broadcast. (C) limited broadcast. (D) loop back. Ans: C In 32 bit IP Addressing scheme all 1’s represent limited broadcast. Q.4 DMSP stands for (A) Distributed Mail System Protocol (B) Distributed Message System Protocol (C) Distributed Message System Pool (D) Distributed Mail System Pool Ans: A DMSP stands for – Distributed Mail system Protocol. 2 Code: AT-15 INTERNET & WEB TECHNOLOGY Q.5 Which Layer is not present in TCP/IP model? (A) Application Layer (B) Internet Layer (C) Transport Layer (D) Presentation Layer Ans: D Presentation layer is not present in TCP/IP Model. Q.6 Let most segment of a name inn DNS represents (A) Individual Network. (B) Individual computer. (C) Domain name (D) Network type. Ans: B Left Most segment of a name in DNS represents- Individual computer Q.7 Address 192.5.48.3 belongs to (A) class A. (B) class B. (C) class C. (D) class D. Ans: C Address 192.5.48.3 belongs to class C. Q.8 Unlike Ipv4, Ipv6 does not include the following field in thee base header (A) Next Header field. (B) Field for Fragmentation information (B) Flow Label. (D) Kind field. Ans: B Unlike Ipv4, Ipv6 does not include the Field for Fragmentation information in the base header. Q.9 The term byte stuffing refers to: (A) data stuffing used with character oriented hardware. (B) data stuffing used with bit oriented hardware. (C) data stuffing used with both (A) & (B) (D) data stuffing used with byte oriented hardware. Ans: A The term byte stuffing refers to data stuffing used with character-oriented hardware. 3 Code: AT-15 INTERNET & WEB TECHNOLOGY Q.10 FDDI (Fiber Distributed Data Interconnect) is an example of (A) token ring. (B) token bus (C) star topology (D) multipoint network. Ans: A FDDI is an example of token ring. Q.11 Hardware that calculates CRC(Cyclic Redundancy Check) uses: (A) Shift register (B) Xor unit (C) Both (A) & (B) (D) Instruction register Ans: B Hardware that calculates CRC uses shift register and Xor unit. Q.12 In TCP protocol header “checksum” is of___________ (A) 8 bits (B) 16 bits (C) 32 bits (D) 64 bis Ans: B In TCP protocol header checksum is of 16 bits. Q.13 In IP addressing scheme, class used for multicasting is: (A) Class A (B) Class B (C) Class C (D) Class D Ans: D In IP addressing scheme, class used for multicasting is class D. Q.14 CIDR stands for (A) Classified Internet Domain Routing (B) Classless Inter Domain Routing (C) Classless Internet Domain Routing (D) Classified Inter Domain Routing Ans: B CIDR stands for Classless Inter Domain Routing. Page 4 1 Code: AT-15 Subject: INTERNET & WEB TECHNOLOGY PART-I, VOL-I TYPICAL QUESTIONS & ANSWERS OBJECTIVE TYPE QUESTIONS Each Question carries 2 marks. Choose the correct or best alternative in the following: Q.1 A header in CGI script can specify (A) format of the document. (B) new location of the document. (C) (A) & (B) both. (D) start of the document. Ans: A A header in CGI script can specify- Format of the document & New location of the document. Q.2 All exceptions in Java are subclasses of built in class called (A) Exception (B) Error. (C) Throwable. (D) Raise. Ans: C All exception in Java are subclasses of built in class called Throwable. Q.3 In 32bit IP Addressing scheme all 1’s represent (A) this computer. (B) directed broadcast. (C) limited broadcast. (D) loop back. Ans: C In 32 bit IP Addressing scheme all 1’s represent limited broadcast. Q.4 DMSP stands for (A) Distributed Mail System Protocol (B) Distributed Message System Protocol (C) Distributed Message System Pool (D) Distributed Mail System Pool Ans: A DMSP stands for – Distributed Mail system Protocol. 2 Code: AT-15 INTERNET & WEB TECHNOLOGY Q.5 Which Layer is not present in TCP/IP model? (A) Application Layer (B) Internet Layer (C) Transport Layer (D) Presentation Layer Ans: D Presentation layer is not present in TCP/IP Model. Q.6 Let most segment of a name inn DNS represents (A) Individual Network. (B) Individual computer. (C) Domain name (D) Network type. Ans: B Left Most segment of a name in DNS represents- Individual computer Q.7 Address 192.5.48.3 belongs to (A) class A. (B) class B. (C) class C. (D) class D. Ans: C Address 192.5.48.3 belongs to class C. Q.8 Unlike Ipv4, Ipv6 does not include the following field in thee base header (A) Next Header field. (B) Field for Fragmentation information (B) Flow Label. (D) Kind field. Ans: B Unlike Ipv4, Ipv6 does not include the Field for Fragmentation information in the base header. Q.9 The term byte stuffing refers to: (A) data stuffing used with character oriented hardware. (B) data stuffing used with bit oriented hardware. (C) data stuffing used with both (A) & (B) (D) data stuffing used with byte oriented hardware. Ans: A The term byte stuffing refers to data stuffing used with character-oriented hardware. 3 Code: AT-15 INTERNET & WEB TECHNOLOGY Q.10 FDDI (Fiber Distributed Data Interconnect) is an example of (A) token ring. (B) token bus (C) star topology (D) multipoint network. Ans: A FDDI is an example of token ring. Q.11 Hardware that calculates CRC(Cyclic Redundancy Check) uses: (A) Shift register (B) Xor unit (C) Both (A) & (B) (D) Instruction register Ans: B Hardware that calculates CRC uses shift register and Xor unit. Q.12 In TCP protocol header “checksum” is of___________ (A) 8 bits (B) 16 bits (C) 32 bits (D) 64 bis Ans: B In TCP protocol header checksum is of 16 bits. Q.13 In IP addressing scheme, class used for multicasting is: (A) Class A (B) Class B (C) Class C (D) Class D Ans: D In IP addressing scheme, class used for multicasting is class D. Q.14 CIDR stands for (A) Classified Internet Domain Routing (B) Classless Inter Domain Routing (C) Classless Internet Domain Routing (D) Classified Inter Domain Routing Ans: B CIDR stands for Classless Inter Domain Routing. 4 Code: AT-15 INTERNET & WEB TECHNOLOGY Q.15 The total number of class of IP address are (A) 3. (B) 4. (C) 5. (D) 9. Ans: C The total number of class of IP addresses are 5. Q.16 Parent class of all Java classes is (A) java.lang.system (B) java.lang.object (C) java.lang.class (D) java.lang.reflect.object Ans: B Parent class of all Java classes is java.lang.object. Q.17 Exceptions of type error inn JAVA are handled by (A) User program (B) Java run time environment (C) Operating system kerne (D) Interrupt Ans: B Exceptions of type error in JAVA are handled by JAVA run time environment. Q.18 Error detecting method that can detect more errors without increasing additional information in each packet is (A) checksum (B) even parity mechanism (C) CRC (D) odd parity mechanism. Ans: C Error detecting method that can detect more errors without increasing additional information in each packet is CRC. Q.19 A Network uses a star topology if (A) Computers are arranged in a closed loop. (B) All computers attach to a central point. (C) All computers attach to a single long cable. (D) Computers attach to multiple hierarchical cables. Ans: B A Network uses a star topology if all computers attach to a central point. Page 5 1 Code: AT-15 Subject: INTERNET & WEB TECHNOLOGY PART-I, VOL-I TYPICAL QUESTIONS & ANSWERS OBJECTIVE TYPE QUESTIONS Each Question carries 2 marks. Choose the correct or best alternative in the following: Q.1 A header in CGI script can specify (A) format of the document. (B) new location of the document. (C) (A) & (B) both. (D) start of the document. Ans: A A header in CGI script can specify- Format of the document & New location of the document. Q.2 All exceptions in Java are subclasses of built in class called (A) Exception (B) Error. (C) Throwable. (D) Raise. Ans: C All exception in Java are subclasses of built in class called Throwable. Q.3 In 32bit IP Addressing scheme all 1’s represent (A) this computer. (B) directed broadcast. (C) limited broadcast. (D) loop back. Ans: C In 32 bit IP Addressing scheme all 1’s represent limited broadcast. Q.4 DMSP stands for (A) Distributed Mail System Protocol (B) Distributed Message System Protocol (C) Distributed Message System Pool (D) Distributed Mail System Pool Ans: A DMSP stands for – Distributed Mail system Protocol. 2 Code: AT-15 INTERNET & WEB TECHNOLOGY Q.5 Which Layer is not present in TCP/IP model? (A) Application Layer (B) Internet Layer (C) Transport Layer (D) Presentation Layer Ans: D Presentation layer is not present in TCP/IP Model. Q.6 Let most segment of a name inn DNS represents (A) Individual Network. (B) Individual computer. (C) Domain name (D) Network type. Ans: B Left Most segment of a name in DNS represents- Individual computer Q.7 Address 192.5.48.3 belongs to (A) class A. (B) class B. (C) class C. (D) class D. Ans: C Address 192.5.48.3 belongs to class C. Q.8 Unlike Ipv4, Ipv6 does not include the following field in thee base header (A) Next Header field. (B) Field for Fragmentation information (B) Flow Label. (D) Kind field. Ans: B Unlike Ipv4, Ipv6 does not include the Field for Fragmentation information in the base header. Q.9 The term byte stuffing refers to: (A) data stuffing used with character oriented hardware. (B) data stuffing used with bit oriented hardware. (C) data stuffing used with both (A) & (B) (D) data stuffing used with byte oriented hardware. Ans: A The term byte stuffing refers to data stuffing used with character-oriented hardware. 3 Code: AT-15 INTERNET & WEB TECHNOLOGY Q.10 FDDI (Fiber Distributed Data Interconnect) is an example of (A) token ring. (B) token bus (C) star topology (D) multipoint network. Ans: A FDDI is an example of token ring. Q.11 Hardware that calculates CRC(Cyclic Redundancy Check) uses: (A) Shift register (B) Xor unit (C) Both (A) & (B) (D) Instruction register Ans: B Hardware that calculates CRC uses shift register and Xor unit. Q.12 In TCP protocol header “checksum” is of___________ (A) 8 bits (B) 16 bits (C) 32 bits (D) 64 bis Ans: B In TCP protocol header checksum is of 16 bits. Q.13 In IP addressing scheme, class used for multicasting is: (A) Class A (B) Class B (C) Class C (D) Class D Ans: D In IP addressing scheme, class used for multicasting is class D. Q.14 CIDR stands for (A) Classified Internet Domain Routing (B) Classless Inter Domain Routing (C) Classless Internet Domain Routing (D) Classified Inter Domain Routing Ans: B CIDR stands for Classless Inter Domain Routing. 4 Code: AT-15 INTERNET & WEB TECHNOLOGY Q.15 The total number of class of IP address are (A) 3. (B) 4. (C) 5. (D) 9. Ans: C The total number of class of IP addresses are 5. Q.16 Parent class of all Java classes is (A) java.lang.system (B) java.lang.object (C) java.lang.class (D) java.lang.reflect.object Ans: B Parent class of all Java classes is java.lang.object. Q.17 Exceptions of type error inn JAVA are handled by (A) User program (B) Java run time environment (C) Operating system kerne (D) Interrupt Ans: B Exceptions of type error in JAVA are handled by JAVA run time environment. Q.18 Error detecting method that can detect more errors without increasing additional information in each packet is (A) checksum (B) even parity mechanism (C) CRC (D) odd parity mechanism. Ans: C Error detecting method that can detect more errors without increasing additional information in each packet is CRC. Q.19 A Network uses a star topology if (A) Computers are arranged in a closed loop. (B) All computers attach to a central point. (C) All computers attach to a single long cable. (D) Computers attach to multiple hierarchical cables. Ans: B A Network uses a star topology if all computers attach to a central point. 5 Code: AT-15 INTERNET & WEB TECHNOLOGY Q.20 MTU is specified by (A) IP Datagram size (B) Hardware technology (C) TCP Segment size (D) None of the above. Ans: B MTU is specified by hardware technology. Q.21 Network address prefixed by 1110 is a (A) Class A address (B) Multicast address (C) Class B address (D) Reserve address. Ans: B Network address prefixed by 1110 is a multicast address. Q.22 FTP does not use (A) Two transfer mode. (B) Control connection to remote computer before file can be transferred. (C) User Datagram Protocol. (D) Authorization of a user through login and password verification. Ans: C FTP does not use User Datagram Protocol. Q.23 A Header in CGI document can represent (A) format of the document (B) location if document used to different URL (C) both (A) & (B) (D) None of the above. Ans: B A header in CGI document can represent format of the document and the location if document used to different URL. Q.24 127.0.0.1 is a (A) limited broadcast address (B) direct broadcast address (C) multicast address (D) loop-back address Ans: D 127.0.0.1 is a loop-back address.Read More
1. What is the difference between Internet and Web-Technology? | ![]() |
2. What are some common Web-Technologies used for web development? | ![]() |
3. What are some benefits of using Web-Technologies for web development? | ![]() |
4. What is the difference between a website and a web application? | ![]() |
5. What are some important considerations for web development? | ![]() |