Web Development Exam  >  Web Development Notes  >  Internet and Web-Technology - Sample Question paper, Exam Prepration

Internet and Web-Technology - Sample Question paper, Exam Prepration - Web Development PDF Download

Download, print and study this document offline
Please wait while the PDF view is loading
 Page 1


 
 1
Code: AT-15 Subject: INTERNET & WEB TECHNOLOGY 
PART-I,  VOL-I 
 
TYPICAL QUESTIONS & ANSWERS 
 
OBJECTIVE TYPE QUESTIONS 
 
Each Question carries 2 marks. 
 
Choose the correct or best alternative in the following: 
 
Q.1  A header in CGI script can specify 
 
  (A) format of the document. (B) new location of the document. 
  (C) (A) & (B) both. (D) start of the document. 
 
Ans:   A 
A header in CGI script can specify- Format of the document & New location 
of   the  document. 
 
 
Q.2  All exceptions in Java are subclasses of built in class called 
 
  (A) Exception (B) Error. 
  (C) Throwable. (D) Raise. 
 
Ans: C 
   All exception in Java are subclasses of built in class called Throwable. 
 
 
Q.3  In 32bit IP Addressing scheme all 1’s represent 
 
  (A) this computer. (B) directed broadcast. 
  (C) limited broadcast. (D) loop back. 
 
Ans: C 
In 32 bit IP Addressing scheme all 1’s represent limited broadcast. 
 
Q.4   DMSP stands for 
 
(A) Distributed Mail System Protocol 
(B) Distributed Message System Protocol 
(C) Distributed Message System Pool 
(D) Distributed Mail System Pool 
 
Ans: A  
   DMSP stands for – Distributed Mail system Protocol. 
Page 2


 
 1
Code: AT-15 Subject: INTERNET & WEB TECHNOLOGY 
PART-I,  VOL-I 
 
TYPICAL QUESTIONS & ANSWERS 
 
OBJECTIVE TYPE QUESTIONS 
 
Each Question carries 2 marks. 
 
Choose the correct or best alternative in the following: 
 
Q.1  A header in CGI script can specify 
 
  (A) format of the document. (B) new location of the document. 
  (C) (A) & (B) both. (D) start of the document. 
 
Ans:   A 
A header in CGI script can specify- Format of the document & New location 
of   the  document. 
 
 
Q.2  All exceptions in Java are subclasses of built in class called 
 
  (A) Exception (B) Error. 
  (C) Throwable. (D) Raise. 
 
Ans: C 
   All exception in Java are subclasses of built in class called Throwable. 
 
 
Q.3  In 32bit IP Addressing scheme all 1’s represent 
 
  (A) this computer. (B) directed broadcast. 
  (C) limited broadcast. (D) loop back. 
 
Ans: C 
In 32 bit IP Addressing scheme all 1’s represent limited broadcast. 
 
Q.4   DMSP stands for 
 
(A) Distributed Mail System Protocol 
(B) Distributed Message System Protocol 
(C) Distributed Message System Pool 
(D) Distributed Mail System Pool 
 
Ans: A  
   DMSP stands for – Distributed Mail system Protocol. 
 
 2
Code: AT-15               INTERNET & WEB TECHNOLOGY 
 
 
Q.5  Which Layer is not present in TCP/IP model? 
 
  (A)  Application Layer (B)  Internet Layer 
  (C)  Transport Layer (D)  Presentation Layer 
 
Ans: D 
 Presentation layer is not present in TCP/IP Model.   
 
Q.6  Let most segment of a name inn DNS represents 
 
  (A)  Individual Network. (B)  Individual computer. 
  (C)  Domain name (D)  Network type. 
 
Ans: B 
            Left Most segment of a name in DNS represents- Individual computer 
 
 
Q.7  Address 192.5.48.3 belongs to 
 
  (A)  class A. (B)  class B. 
  (C)  class C. (D)  class D. 
 
Ans: C 
  Address 192.5.48.3 belongs to class C. 
 
 
Q.8  Unlike Ipv4, Ipv6 does not include the following field in thee base header 
 
  (A)  Next Header field.         (B)  Field for Fragmentation information 
  (B)  Flow Label.  (D)  Kind field. 
 
Ans: B 
               Unlike Ipv4, Ipv6 does not include the Field for Fragmentation information 
               in the base header. 
 
 
Q.9  The term byte stuffing refers to: 
 
(A) data stuffing used with character oriented hardware. 
(B) data stuffing used with bit oriented hardware. 
(C) data stuffing used with both (A) & (B) 
(D) data stuffing used with byte oriented hardware. 
 
Ans: A 
           The term byte stuffing refers to data stuffing used with character-oriented            
hardware.  
Page 3


 
 1
Code: AT-15 Subject: INTERNET & WEB TECHNOLOGY 
PART-I,  VOL-I 
 
TYPICAL QUESTIONS & ANSWERS 
 
OBJECTIVE TYPE QUESTIONS 
 
Each Question carries 2 marks. 
 
Choose the correct or best alternative in the following: 
 
Q.1  A header in CGI script can specify 
 
  (A) format of the document. (B) new location of the document. 
  (C) (A) & (B) both. (D) start of the document. 
 
Ans:   A 
A header in CGI script can specify- Format of the document & New location 
of   the  document. 
 
 
Q.2  All exceptions in Java are subclasses of built in class called 
 
  (A) Exception (B) Error. 
  (C) Throwable. (D) Raise. 
 
Ans: C 
   All exception in Java are subclasses of built in class called Throwable. 
 
 
Q.3  In 32bit IP Addressing scheme all 1’s represent 
 
  (A) this computer. (B) directed broadcast. 
  (C) limited broadcast. (D) loop back. 
 
Ans: C 
In 32 bit IP Addressing scheme all 1’s represent limited broadcast. 
 
Q.4   DMSP stands for 
 
(A) Distributed Mail System Protocol 
(B) Distributed Message System Protocol 
(C) Distributed Message System Pool 
(D) Distributed Mail System Pool 
 
Ans: A  
   DMSP stands for – Distributed Mail system Protocol. 
 
 2
Code: AT-15               INTERNET & WEB TECHNOLOGY 
 
 
Q.5  Which Layer is not present in TCP/IP model? 
 
  (A)  Application Layer (B)  Internet Layer 
  (C)  Transport Layer (D)  Presentation Layer 
 
Ans: D 
 Presentation layer is not present in TCP/IP Model.   
 
Q.6  Let most segment of a name inn DNS represents 
 
  (A)  Individual Network. (B)  Individual computer. 
  (C)  Domain name (D)  Network type. 
 
Ans: B 
            Left Most segment of a name in DNS represents- Individual computer 
 
 
Q.7  Address 192.5.48.3 belongs to 
 
  (A)  class A. (B)  class B. 
  (C)  class C. (D)  class D. 
 
Ans: C 
  Address 192.5.48.3 belongs to class C. 
 
 
Q.8  Unlike Ipv4, Ipv6 does not include the following field in thee base header 
 
  (A)  Next Header field.         (B)  Field for Fragmentation information 
  (B)  Flow Label.  (D)  Kind field. 
 
Ans: B 
               Unlike Ipv4, Ipv6 does not include the Field for Fragmentation information 
               in the base header. 
 
 
Q.9  The term byte stuffing refers to: 
 
(A) data stuffing used with character oriented hardware. 
(B) data stuffing used with bit oriented hardware. 
(C) data stuffing used with both (A) & (B) 
(D) data stuffing used with byte oriented hardware. 
 
Ans: A 
           The term byte stuffing refers to data stuffing used with character-oriented            
hardware.  
 
 3
Code: AT-15               INTERNET & WEB TECHNOLOGY 
 
 
Q.10 FDDI (Fiber Distributed Data Interconnect) is an example of  
 
  (A)  token ring.  (B)  token bus 
  (C)  star topology  (D)  multipoint network. 
 
Ans: A 
            FDDI is an example of token ring. 
 
Q.11 Hardware that calculates CRC(Cyclic Redundancy Check) uses: 
 
  (A)  Shift register  (B)  Xor unit 
  (C)  Both (A) & (B)  (D)  Instruction register 
 
Ans: B 
  Hardware that calculates CRC uses shift register and Xor unit. 
 
Q.12 In TCP protocol header “checksum” is of___________ 
 
  (A)  8 bits  (B)  16 bits 
  (C)  32 bits  (D)  64 bis 
 
Ans: B 
  In TCP protocol header checksum is of  16 bits. 
 
Q.13 In IP addressing scheme, class used for multicasting is: 
 
  (A)  Class A  (B)  Class B 
  (C)  Class C  (D)  Class D 
 
Ans: D 
  In IP addressing scheme, class used for multicasting is class D.   
 
Q.14 CIDR stands for 
 
(A) Classified Internet Domain Routing 
(B) Classless Inter Domain Routing 
(C) Classless Internet Domain Routing 
(D) Classified Inter Domain Routing 
 
Ans: B 
  CIDR stands for Classless Inter Domain Routing. 
 
 
 
 
 
Page 4


 
 1
Code: AT-15 Subject: INTERNET & WEB TECHNOLOGY 
PART-I,  VOL-I 
 
TYPICAL QUESTIONS & ANSWERS 
 
OBJECTIVE TYPE QUESTIONS 
 
Each Question carries 2 marks. 
 
Choose the correct or best alternative in the following: 
 
Q.1  A header in CGI script can specify 
 
  (A) format of the document. (B) new location of the document. 
  (C) (A) & (B) both. (D) start of the document. 
 
Ans:   A 
A header in CGI script can specify- Format of the document & New location 
of   the  document. 
 
 
Q.2  All exceptions in Java are subclasses of built in class called 
 
  (A) Exception (B) Error. 
  (C) Throwable. (D) Raise. 
 
Ans: C 
   All exception in Java are subclasses of built in class called Throwable. 
 
 
Q.3  In 32bit IP Addressing scheme all 1’s represent 
 
  (A) this computer. (B) directed broadcast. 
  (C) limited broadcast. (D) loop back. 
 
Ans: C 
In 32 bit IP Addressing scheme all 1’s represent limited broadcast. 
 
Q.4   DMSP stands for 
 
(A) Distributed Mail System Protocol 
(B) Distributed Message System Protocol 
(C) Distributed Message System Pool 
(D) Distributed Mail System Pool 
 
Ans: A  
   DMSP stands for – Distributed Mail system Protocol. 
 
 2
Code: AT-15               INTERNET & WEB TECHNOLOGY 
 
 
Q.5  Which Layer is not present in TCP/IP model? 
 
  (A)  Application Layer (B)  Internet Layer 
  (C)  Transport Layer (D)  Presentation Layer 
 
Ans: D 
 Presentation layer is not present in TCP/IP Model.   
 
Q.6  Let most segment of a name inn DNS represents 
 
  (A)  Individual Network. (B)  Individual computer. 
  (C)  Domain name (D)  Network type. 
 
Ans: B 
            Left Most segment of a name in DNS represents- Individual computer 
 
 
Q.7  Address 192.5.48.3 belongs to 
 
  (A)  class A. (B)  class B. 
  (C)  class C. (D)  class D. 
 
Ans: C 
  Address 192.5.48.3 belongs to class C. 
 
 
Q.8  Unlike Ipv4, Ipv6 does not include the following field in thee base header 
 
  (A)  Next Header field.         (B)  Field for Fragmentation information 
  (B)  Flow Label.  (D)  Kind field. 
 
Ans: B 
               Unlike Ipv4, Ipv6 does not include the Field for Fragmentation information 
               in the base header. 
 
 
Q.9  The term byte stuffing refers to: 
 
(A) data stuffing used with character oriented hardware. 
(B) data stuffing used with bit oriented hardware. 
(C) data stuffing used with both (A) & (B) 
(D) data stuffing used with byte oriented hardware. 
 
Ans: A 
           The term byte stuffing refers to data stuffing used with character-oriented            
hardware.  
 
 3
Code: AT-15               INTERNET & WEB TECHNOLOGY 
 
 
Q.10 FDDI (Fiber Distributed Data Interconnect) is an example of  
 
  (A)  token ring.  (B)  token bus 
  (C)  star topology  (D)  multipoint network. 
 
Ans: A 
            FDDI is an example of token ring. 
 
Q.11 Hardware that calculates CRC(Cyclic Redundancy Check) uses: 
 
  (A)  Shift register  (B)  Xor unit 
  (C)  Both (A) & (B)  (D)  Instruction register 
 
Ans: B 
  Hardware that calculates CRC uses shift register and Xor unit. 
 
Q.12 In TCP protocol header “checksum” is of___________ 
 
  (A)  8 bits  (B)  16 bits 
  (C)  32 bits  (D)  64 bis 
 
Ans: B 
  In TCP protocol header checksum is of  16 bits. 
 
Q.13 In IP addressing scheme, class used for multicasting is: 
 
  (A)  Class A  (B)  Class B 
  (C)  Class C  (D)  Class D 
 
Ans: D 
  In IP addressing scheme, class used for multicasting is class D.   
 
Q.14 CIDR stands for 
 
(A) Classified Internet Domain Routing 
(B) Classless Inter Domain Routing 
(C) Classless Internet Domain Routing 
(D) Classified Inter Domain Routing 
 
Ans: B 
  CIDR stands for Classless Inter Domain Routing. 
 
 
 
 
 
 
 4
Code: AT-15               INTERNET & WEB TECHNOLOGY 
 
 
Q.15 The total number of class of IP address are 
 
  (A)  3.  (B)  4. 
  (C)  5.  (D)  9. 
Ans: C 
  The total number of class of IP addresses are 5. 
 
Q.16 Parent class of all Java classes is 
 
  (A)  java.lang.system  (B)  java.lang.object 
  (C)  java.lang.class  (D)  java.lang.reflect.object 
 
Ans: B 
  Parent class of all Java classes is java.lang.object. 
 
Q.17 Exceptions of type error inn JAVA are handled by 
 
  (A)  User program  (B)  Java run time environment 
  (C)  Operating system kerne  (D)  Interrupt 
 
Ans: B 
  Exceptions of type error in JAVA are handled by JAVA run time 
environment. 
 
Q.18 Error detecting method that can detect more errors without increasing 
additional information in each packet is 
 
  (A)  checksum  (B)  even parity mechanism 
  (C)  CRC  (D)  odd parity mechanism. 
 
Ans: C 
Error detecting method that can detect more errors without increasing 
additional information in each packet is CRC. 
 
 
Q.19 A Network uses a star topology if 
 
(A) Computers are arranged in a closed loop. 
(B) All computers attach to a central point. 
(C) All computers attach to a single long cable. 
(D) Computers attach to multiple hierarchical cables. 
 
Ans: B 
  A Network uses a star  topology if all computers attach to a central point. 
 
 
Page 5


 
 1
Code: AT-15 Subject: INTERNET & WEB TECHNOLOGY 
PART-I,  VOL-I 
 
TYPICAL QUESTIONS & ANSWERS 
 
OBJECTIVE TYPE QUESTIONS 
 
Each Question carries 2 marks. 
 
Choose the correct or best alternative in the following: 
 
Q.1  A header in CGI script can specify 
 
  (A) format of the document. (B) new location of the document. 
  (C) (A) & (B) both. (D) start of the document. 
 
Ans:   A 
A header in CGI script can specify- Format of the document & New location 
of   the  document. 
 
 
Q.2  All exceptions in Java are subclasses of built in class called 
 
  (A) Exception (B) Error. 
  (C) Throwable. (D) Raise. 
 
Ans: C 
   All exception in Java are subclasses of built in class called Throwable. 
 
 
Q.3  In 32bit IP Addressing scheme all 1’s represent 
 
  (A) this computer. (B) directed broadcast. 
  (C) limited broadcast. (D) loop back. 
 
Ans: C 
In 32 bit IP Addressing scheme all 1’s represent limited broadcast. 
 
Q.4   DMSP stands for 
 
(A) Distributed Mail System Protocol 
(B) Distributed Message System Protocol 
(C) Distributed Message System Pool 
(D) Distributed Mail System Pool 
 
Ans: A  
   DMSP stands for – Distributed Mail system Protocol. 
 
 2
Code: AT-15               INTERNET & WEB TECHNOLOGY 
 
 
Q.5  Which Layer is not present in TCP/IP model? 
 
  (A)  Application Layer (B)  Internet Layer 
  (C)  Transport Layer (D)  Presentation Layer 
 
Ans: D 
 Presentation layer is not present in TCP/IP Model.   
 
Q.6  Let most segment of a name inn DNS represents 
 
  (A)  Individual Network. (B)  Individual computer. 
  (C)  Domain name (D)  Network type. 
 
Ans: B 
            Left Most segment of a name in DNS represents- Individual computer 
 
 
Q.7  Address 192.5.48.3 belongs to 
 
  (A)  class A. (B)  class B. 
  (C)  class C. (D)  class D. 
 
Ans: C 
  Address 192.5.48.3 belongs to class C. 
 
 
Q.8  Unlike Ipv4, Ipv6 does not include the following field in thee base header 
 
  (A)  Next Header field.         (B)  Field for Fragmentation information 
  (B)  Flow Label.  (D)  Kind field. 
 
Ans: B 
               Unlike Ipv4, Ipv6 does not include the Field for Fragmentation information 
               in the base header. 
 
 
Q.9  The term byte stuffing refers to: 
 
(A) data stuffing used with character oriented hardware. 
(B) data stuffing used with bit oriented hardware. 
(C) data stuffing used with both (A) & (B) 
(D) data stuffing used with byte oriented hardware. 
 
Ans: A 
           The term byte stuffing refers to data stuffing used with character-oriented            
hardware.  
 
 3
Code: AT-15               INTERNET & WEB TECHNOLOGY 
 
 
Q.10 FDDI (Fiber Distributed Data Interconnect) is an example of  
 
  (A)  token ring.  (B)  token bus 
  (C)  star topology  (D)  multipoint network. 
 
Ans: A 
            FDDI is an example of token ring. 
 
Q.11 Hardware that calculates CRC(Cyclic Redundancy Check) uses: 
 
  (A)  Shift register  (B)  Xor unit 
  (C)  Both (A) & (B)  (D)  Instruction register 
 
Ans: B 
  Hardware that calculates CRC uses shift register and Xor unit. 
 
Q.12 In TCP protocol header “checksum” is of___________ 
 
  (A)  8 bits  (B)  16 bits 
  (C)  32 bits  (D)  64 bis 
 
Ans: B 
  In TCP protocol header checksum is of  16 bits. 
 
Q.13 In IP addressing scheme, class used for multicasting is: 
 
  (A)  Class A  (B)  Class B 
  (C)  Class C  (D)  Class D 
 
Ans: D 
  In IP addressing scheme, class used for multicasting is class D.   
 
Q.14 CIDR stands for 
 
(A) Classified Internet Domain Routing 
(B) Classless Inter Domain Routing 
(C) Classless Internet Domain Routing 
(D) Classified Inter Domain Routing 
 
Ans: B 
  CIDR stands for Classless Inter Domain Routing. 
 
 
 
 
 
 
 4
Code: AT-15               INTERNET & WEB TECHNOLOGY 
 
 
Q.15 The total number of class of IP address are 
 
  (A)  3.  (B)  4. 
  (C)  5.  (D)  9. 
Ans: C 
  The total number of class of IP addresses are 5. 
 
Q.16 Parent class of all Java classes is 
 
  (A)  java.lang.system  (B)  java.lang.object 
  (C)  java.lang.class  (D)  java.lang.reflect.object 
 
Ans: B 
  Parent class of all Java classes is java.lang.object. 
 
Q.17 Exceptions of type error inn JAVA are handled by 
 
  (A)  User program  (B)  Java run time environment 
  (C)  Operating system kerne  (D)  Interrupt 
 
Ans: B 
  Exceptions of type error in JAVA are handled by JAVA run time 
environment. 
 
Q.18 Error detecting method that can detect more errors without increasing 
additional information in each packet is 
 
  (A)  checksum  (B)  even parity mechanism 
  (C)  CRC  (D)  odd parity mechanism. 
 
Ans: C 
Error detecting method that can detect more errors without increasing 
additional information in each packet is CRC. 
 
 
Q.19 A Network uses a star topology if 
 
(A) Computers are arranged in a closed loop. 
(B) All computers attach to a central point. 
(C) All computers attach to a single long cable. 
(D) Computers attach to multiple hierarchical cables. 
 
Ans: B 
  A Network uses a star  topology if all computers attach to a central point. 
 
 
 
 5
Code: AT-15               INTERNET & WEB TECHNOLOGY 
 
 
Q.20 MTU is specified by 
 
  (A)  IP Datagram size  (B)  Hardware technology 
  (C)  TCP Segment size  (D)  None of the above. 
 
Ans: B 
  MTU is specified by hardware technology. 
 
Q.21 Network address prefixed by 1110 is a 
 
  (A)  Class A address  (B)  Multicast address 
  (C)  Class B address  (D)  Reserve address. 
 
Ans: B 
  Network address prefixed by 1110 is a multicast address. 
 
Q.22 FTP does not use 
 
(A) Two transfer mode. 
(B) Control connection to remote computer before file can be transferred. 
(C) User Datagram Protocol. 
(D) Authorization of a user through login and password verification. 
 
Ans: C 
  FTP does not use User Datagram Protocol. 
 
Q.23 A Header in CGI document can represent 
 
(A) format of the document 
(B) location if document used to different URL 
(C) both (A) & (B) 
(D) None of the above. 
 
Ans: B 
 A header in CGI document can represent format of the document and the  
location if document used to different URL. 
 
 
Q.24 127.0.0.1 is a 
 
  (A)  limited broadcast address  (B)  direct broadcast address 
  (C)  multicast address  (D)  loop-back address 
 
Ans: D 
  127.0.0.1 is a loop-back address. 
 
Read More

FAQs on Internet and Web-Technology - Sample Question paper, Exam Prepration - Web Development

1. What is the difference between Internet and Web-Technology?
Ans. The Internet is a global network of interconnected networks, while Web-Technology refers to the tools, protocols, and software used to create, manage, and deliver web-based content. In simple terms, the Internet is the infrastructure that allows communication between computers, while Web-Technology is the software that allows us to access and interact with information on the Internet.
2. What are some common Web-Technologies used for web development?
Ans. Some common Web-Technologies used for web development include HTML, CSS, JavaScript, PHP, and SQL. HTML is used for structuring websites, CSS is used for styling, JavaScript is used for adding interactivity, PHP is used for server-side scripting, and SQL is used for database management.
3. What are some benefits of using Web-Technologies for web development?
Ans. Using Web-Technologies for web development offers several benefits, including the ability to create dynamic and interactive websites, the ability to create responsive websites that adapt to different screen sizes, the ability to easily update and maintain websites, and the ability to integrate with other web-based technologies and services.
4. What is the difference between a website and a web application?
Ans. A website is a collection of web pages that are accessed through a web browser, while a web application is a program that can be accessed through a web browser and allows users to perform specific tasks or functions. In other words, a website is typically informational or provides content, while a web application is interactive and allows users to perform actions.
5. What are some important considerations for web development?
Ans. Some important considerations for web development include ensuring that websites are accessible to all users, designing websites that are user-friendly and easy to navigate, optimizing websites for search engines, ensuring that websites are secure and protect user data, and using responsive design to ensure that websites work well on different devices and screen sizes.
Download as PDF

Top Courses for Web Development

Related Searches

Summary

,

Exam Prepration - Web Development

,

Free

,

mock tests for examination

,

Semester Notes

,

Objective type Questions

,

Internet and Web-Technology - Sample Question paper

,

Extra Questions

,

past year papers

,

Sample Paper

,

study material

,

Viva Questions

,

Previous Year Questions with Solutions

,

Important questions

,

Internet and Web-Technology - Sample Question paper

,

MCQs

,

Internet and Web-Technology - Sample Question paper

,

Exam Prepration - Web Development

,

pdf

,

Exam Prepration - Web Development

,

video lectures

,

Exam

,

ppt

,

practice quizzes

,

shortcuts and tricks

;