IWPD July2018
IWPD July2018
IWPD July2018
1.2 Switching in Internets done by using datagram approach to packet switching at the
a) Physical Layer b) Application Layer
c) Datalink Layer d) Network Layer
1.3 What layer in the TCP/IP stack is equivalent to the Transport layer of the OSI Model?
a) Application b) Host-to-Host
c) Internet d) Network Access
1.6 Choos the correct HTML tag for the smallest size heading:
a) <h6> b) <h3>
c) <heading> d) <header>
SAMPARK COMPUTERS, 68 LGF, Udyan Plaza, Near Dena Bank; Raibareli Road, Uterathia, Lucknow-226025
Mob. +91-9415424793
1.8 Search engines are able to search _______________ type of information
a) Documents b) Audio
c) Video d) All of the above
1.10 Apart from <b> tag. What other tag makes text bold?
a) <black> b) <strong>
c) <bold> d) None of the above
2. Each statement below is either TRUE or FALSE. Choose the most appropriate one and enter
your choice in the “OMR” answer sheet supplied with the question paper, following instructions
therein.
2.1 JavaScript is loosely type language. TRUE
2.2 The process of transferring files from a computer on the internet to your computer is called
downloading. TRUE
2.3 Dynamic address doesn’t change every day. FALSE
2.4 To create Web age, we use a term called FTP. FALSE
2.5 12.0.0.1 is private IP address of Class A FALSE
2.6 Search Engines maintain heavy database of keywords and urls. . TRUE
2.7 An attempt to make a computer resource unavailable to its intended users is called denial-of-service
attack. . TRUE
2.8 The method of communication in which transmission takes place in both directions but only one
direction at a time is called Simplex. . TRUE
2.9 MIME stands for Multipurpose Internet Mail Extensions. . TRUE
2.10 A piece of malware that appears to be benign or useful, but actually causes damage to the system or
allows another to gain access to the system is called Trojan. FALSE
3 Match words and phrase in column X with the closed related meaning of word(s)/phrase(s) in
column Y. Enter your selection in the “OMR” answer sheet supplied with the question paper,
following instructions therein.
X Y
3.1 Extensible Markup Language (F) A. How to display web page
3.2 Transmission control protocol and the B. 30
internet protocol (H)
3.3 User Dataram protocol (UDP), queue are C. 128 bits
associated with (K) 2
3.4 Markup tag tells the browser (A) D. SMTP
3.5 Returns the string representation of the E. Executable file
Number’s Value
SAMPARK COMPUTERS, 68 LGF, Udyan Plaza, Near Dena Bank; Raibareli Road, Uterathia, Lucknow-226025
Mob. +91-9415424793
3.6 Web standard build by (L) F. XML
3.7 Maximum number of IP addresses that G. Open Source
can be assigned to hosts on a local subnet
that uses the 255.255.255.224 subnet
mask. (B)
3.8 How long is an IPv6 Address (C) H. TCP/IP
3.9 File Virus attaches itself to the (E) I. 60
3.10 Program code freely available (G) J. Socket
K. Port
L. W3C
M. toString()
4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list below. Choose
the most appropriate option, enter your choice in the “OMR” answer sheet supplied with the question
paper, following instructions therein.
4.2 HTML tag for creating a line break is (A) <BR> ____________
4.6 (L) Stealth Virus__________ is a form of virus explicitly designed to hide itself from detection by
antivirus software.
4.7 (C) <Script>__________ tag is an extension to HTML that can enclose any number of JavaScript
statements.
4.8 The (K) META________ tag provides metadata about the HTML document
SAMPARK COMPUTERS, 68 LGF, Udyan Plaza, Near Dena Bank; Raibareli Road, Uterathia, Lucknow-226025
Mob. +91-9415424793
PART-TWO
(A) What is a Metasearch Engine? What are the advantages and disadvantages of Meta Search
Engine ?
(B) Explain structure of e-Mail. What are various email protocols used for sending and
receiving emails. Explain in brief.
(C) What is Firewall? Explain the basic types of firewalls
6.
Online Courses
1. Web Programming
HTML5
CSS3
Javascript
2. PHP framework
Laravel
Cupcake
Slim
25% Discount for first ten students
Contact us on 990990000
B) What is Java Script ? Write a java Script Program to input any positive number in a Text Box
and display whether it is a palindrome number or not ?
C) Give difference between Container tag and Empty tag. Explain with Example. How do you include
an image with width in 100px and height is 50px in an html document?
4
7.
SAMPARK COMPUTERS, 68 LGF, Udyan Plaza, Near Dena Bank; Raibareli Road, Uterathia, Lucknow-226025
Mob. +91-9415424793
(a) What is the network topology? What are the different types of network toplogy? Discuss Mesh
topology?
(b) TCP/IP plays important role in communication. List the layers of TCP/IP model. Write the
functionality of each layer. State Merit and demerit of TCP/IP Model.
8.
c) What are encryption schemes ? Explain the difference between private cryptography and public
key cryptography.?
d) eCommerce
SAMPARK COMPUTERS, 68 LGF, Udyan Plaza, Near Dena Bank; Raibareli Road, Uterathia, Lucknow-226025
Mob. +91-9415424793