it430 subjective question and answers

16
1) Name three Style Properties (2 Marks) ANSWER background-break background-clip background-origin http://webdesign.about.com/od/css/a/aastylelibrary_3.htm 2) Name Three Server Side Scripting Language (2 Marks) ANSWER PHP: Hypertext Preprocessor ASP - Active Server Pages JSP : Java server page 2) What are servlets (MARKS 2) ANSWER Servlets are very fast Java applications on the server side which are available in an active form in the memory of the server. They use JDBC to connect to the databases. Q.No.4: Short Note on Circuit Firewall ? 2marks ANSWER It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality. As a rule, the higher the layer of OSI model where a firewall operates, the more sophisticated is the firewall. It can also determine whether TCP/IP connection between a host and a machine outside firewall has been properly established. Question No: 19 ( Marks: 2 ) Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to

Upload: zohaib-shakoor

Post on 27-Nov-2014

357 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: It430 Subjective Question and Answers

1) Name three Style Properties (2 Marks)

ANSWER

background-break

background-clip

background-origin

http://webdesign.about.com/od/css/a/aastylelibrary_3.htm

2) Name Three Server Side Scripting Language (2 Marks)

ANSWER

PHP: Hypertext Preprocessor

ASP - Active Server Pages

JSP : Java server page

2) What are servlets (MARKS 2) ANSWER

Servlets are very fast Java applications on the server side which are available in an active form in the memory of the server. They use JDBC to connect to the databases.

Q.No.4: Short Note on Circuit Firewall ? 2marks ANSWER It is quite similar to the packet filter firewall. It also works on the basis of a set of rules for filtering packets but operates at the transport layer of the OSI Model so has greater functionality. As a rule, the higher the layer of OSI model where a firewall operates, the more sophisticated is the firewall. It can also determine whether TCP/IP connection between a host and a machine outside firewall has been properly established.

Question No: 19 ( Marks: 2 ) Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to

Page 2: It430 Subjective Question and Answers

include this applet in your web page. ANSWER <HTML> <BODY> <APPLET CODE= "http://www.vu.edu.pk/demo.class". width=100 height=200>DEMO</APPLET> </BODY> </HTML>

Question No: 19 __ ( Marks: 2 ) When does we use the parseFloat() function? ANSWER ‘parseFloat()’, that is, a function of predefined global object.

Question No: 19 __ ( Marks: 2 ) What is bandwidth of a network? Bandwidth is the speed of a network. It indicates how many bits can be transmitted

across a network in a given time.

Question No: 19 ( Marks: 2 ) What are the three position style properties? Absolute – you can place the element box anywhere on the page position:

Relative – position is relative to the normal position of the element

Position: static – position remains unchanged

Question No: 19 ( Marks: 2 )

What is common between proxy server and firewall?

common things in proxy server and firewall filtering request for web

pages

Question No: 21 ( Marks: 2 )

What does PPTP stand for?

Ans (page98)

PPTP stands for point to point transfer protocol.

Question No: 22 ( Marks: 2 )

What are the keywords to define a variable and a function in JavaScript?

“var” is the keyword used to define a variable in Javascript

e.g var a; “function” is the keyword to define a function in javascript

e.g function myfunction(){ // some code }

Question No: 21 ( Marks: 2 )

What value will be printed after executing the following statement in JavaScript:

document.write( Math.pow(3, 2) ); document.write("Math.pow(2,3) :"+Math.pow(2,3)+"<P>");

Question No: 22 ( Marks: 2 )

What is a web server?

Page 3: It430 Subjective Question and Answers

ANSWER:

Web server – machine that services internet request

OR

Web server web server is a machine that serves up the web page requests of a client on the internet. It is a combination of hardware and software. Decision as regards the type of a web server is largely dependent on the volume and type of web activities.

Question No: 22 ( Marks: 2 )

What does ‘parseFloat(string)’ And NaN mean?

The parseFloat() function parses a string and returns a floating point number. This

function determines if the first character in the specified string is a number. If it is,

it parses the string until it reaches the end of the number, and returns the number

as a number, not as a string.

The NaN property represents "Not-a-Number" value. This property indicates that a

value is not a legal number.

Question No: 22 ( Marks: 2 )

What is meant by a constructor? (page 69)

Constructor is defined as the initializing function used to create instance/copy of an

object. It is after the name of the object whose constructor it is

Question No: 19 ( Marks: 2 ) Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to

include this applet in your web page.

<APPLET CODE= “http://www.vu.edu.pk/demo.class” width=100 height=200> DEMO </APPLET>

Question No: 21 ( Marks: 2 ) How Certification Authority (CA) issues the certificates? Describe briefly

Certification authorities work in a hierarchical fashion. There is the CA at the top called root CA (the most reputed CA). It can issue certificates to CAs working below it and those CAs’ can further issue certificates to CAs working under them. In this fashion a hierarchy of CAs is developed with each CA confirming the public key of the CA below it through a digital certificate

Page 4: It430 Subjective Question and Answers

Question No: 22 ( Marks: 2 ) Discuss the role of child element tags while in writing XML code. Question No: 21 ( Marks: 2 )

What you understand about Denial of services (DOS) attacks? DOS important to establish a security policy for an e-business organization outlining as to which assets have to be protected and how to be protected.

The attacker gains access to the network and then send invalid data to network

services or applications. These services or applications consequently become unable

to perform their normal tasks or functions

Question No: 22 ( Marks: 2 )

Discuss the role of (W3C) keeping in view the web documents ?

Not sure

This area encompasses defining the Web, Web documents, and the protocols for

accessing and disseminating Web documents. Furthermore, the consortium also

addresses issues of intellectual ownership of Web documents, rating systems for

Web documents, and Internet privacy.

3) Types of Cryptography and difference between them. (3 Marks)

Cryptography is a collection of mathematical techniques used to ensure confidentiality of information

Two type

Symmetric Cryptography In symmetric cryptography same keys are used for encryption and decryption.

Asymmetric or Public Key Cryptography In this type a pair of public and private keys is used for encryption and decryption

Question No: 20 __ ( Marks: 3 ) Identify the object, property and method in the following: Math.sin(45) Math.PI document.write("Math.sin(45) :"+Math.sin(45)+"<P>"); document.write("Math.PI :" +Math.PI +"<P>");

Page 5: It430 Subjective Question and Answers

4) What is function of Commands: (3 Marks)

str.toLowerCase() :The capitalize, lowercase,

str.toUpperCase() :Uppercase capitalize

str.Split(") :splits the string on the basis of blank space.

document.write("str.toLowerCase() :"+str.toLowerCase()+"<P>");

document.write("str.toUpperCase():"+str.toUpperCase()+"<P>");

document.write("str.Split(' ') myArray[0] :"+myArray[0]+"<P>");

document.write("str.Split(' ') myArray[1]:"+myArray[1]+"<P>");

Q.No.3: Different logical operators in Java script? Only write there name and there symbols? 3 marks Logical operators ‘&&’ for logical and ‘||’ for logical or ‘!’ for logical not Question No: 20 ( Marks: 3 ) Name the JavaScript function that convert strings to float numbers. How do you give the function a string value to convert to a number?

String to number

If you want to change a string to a number, first make sure there are only the

characters 0-9 in the string. What I always do is simply multiplying the string by 1.

var c = '1234';

d = c * 1;

Since multiplying assumes numbers, JavaScript makes the string a number, if

possible. If that isn't possible, the result is NaN. Note that you cannot do

var c = '1234';

d = c + 0;

Question No: 20 ( Marks: 3 ) What is the purpose of padding? How many types of padding are: Name of these?

Padding – general property that applies to all four padding properties in this order:

Padding top

padding-right

padding-bottom

padding-left

Page 6: It430 Subjective Question and Answers

Question No: 20 ( Marks: 3 ) Write at least three rules for writing an XML code. -All elements must be properly nested <outer><inner>content</inner></outer>

-All attribute values must be quoted <FRIES SIZE=“LARGE”>

-All elements with empty content must be identified by ending in />

Question No: 20 ( Marks: 3 )

What does RAS and RAC stand for in context of virtual private network?

Answer

That server machine may be called a Remote Access Server (RAS) and

the client may be called a Remote Access Client (RAC).

Question No: 24 ( Marks: 3 )

Performance of web servers can be evaluated mainly on the basis of two factors. What

are they?

Ans:

Performance of web sever Performance of web servers can be evaluated mainly on the basis of two factors: Throughput, which is the number of http requests that a particular server hardware and software can handle in the unit time; and Response time, which is the amount of time a web server requires to process one request. Web server hardware architectures

Question No: 23 ( Marks: 3 )

To calculate the area of a circle the formula pi r squared is used. How would you code it

in JavaScript?

<html>

<script type="text/javascript">

var radius,area;

radius = 10;

area = Math.PI*Math.pow(radius,2);

document.write("Area of circle with radius 10 is " + area );

</script>

</html>

Question No: 24 ( Marks: 3 )

How ‘Man in The middle Attacks’ operates?

Man in the middle attacks

Page 7: It430 Subjective Question and Answers

In it the attacker is able to monitor, capture and control data between sending and

receiving machines. He may apply IP address spoofing technique to divert the

packets to its machine, then modify the packets and resend the misleading

information to the actual client. Another form of man-in-the-middle attack is where

the hacker is able to substitute the IP address of a genuine web site with the IP

address of his own web site due to some security hole in the software that runs on a

domain name server. A client would think that he is communicating or receiving the

information form a genuine web site, though it would not be the case actually.

Question No: 23 ( Marks: 3 )

What is meant by ‘Shopping Cart’ in context of e commerce? (page 92)

Shopping cart was used wherein the user had to remember and type certain

information. It is now replaced by electronic shopping cart/basket that keeps record

of the items the customer has selected and allows customers to view the details of the

items selected. The customer can add new items or remove items. To order an item,

a customer simply clicks at that item option. All details of an item, including its

price, product no. and order identifying information are stored automatically in the

cart.

Question No: 20 ( Marks: 3 ) What do you think, is there any difference between Static and Dynamic IP Address assignment? Discuss. A static IP address is a number (in the form of a dotted quad) that is assigned to a

computer by an Internet service provider (ISP) to be its permanent address on the

Internet. Computers use IP addresses to locate and talk to each other on the

Internet, much the same way people use phone numbers to locate and talk to one

another on the telephone. When you want to visit whatis.com, your computer asks a

domain name system (DNS) server (think telephone information operator) for the

correct dotted quad number (think phone number) for whatis.com and your

computer uses the answer it receives to connect to the whatis.com server

Question No: 24 ( Marks: 3 ) Write a function for the addition of two numbers? Question No: 23 ( Marks: 3 )

Differentiate between the HTML and XML. Identify At least three major

differences.

(1) XML was designed to describe data and to focus on what data is. HTML was

designed to display data and to focus on how data looks .

Page 8: It430 Subjective Question and Answers

(2) HTML is about displaying information, while XML is about describing

information.

(2) XML data can also be stored inside HTML pages as "Data Islands". You can

still concentrate on using HTML only for formatting and displaying the data.

Question No: 24 ( Marks: 3 )

What are the different logical operators in JavaScript? Only write their names. Also write

the

symbols of operators.

ANSWER

Logical operators „&&‟ for logical and „||‟ for logical or „!‟ for logical not

Question No: 20 __ ( Marks: 3 ) What is MAC address? How does it help server to identify the client?

Data to be delivered on a network has to be converted first into serial transmission. This is done through a device called Network Interface Card (NIC) that must be installed in a computer on the network. NIC has also got printed on it a 48 bits unique address called the MAC or hardware address of the computer machine. In other words, it consists of 12 hexadecimal characters and can have different format as shown below: 090017A9B2EF 09:00:17:A9:B2:EF 09-00-17-A9-B2-EF

Question No: 20 ( Marks: 3 ) What are the three methods for using style sheets with a web page?

Method #1: Embedded method

Method # 2: Linking to an external style sheet

Method # 3: Inline styles Question No: 20 __ ( Marks: 3 ) What are cookies? Why these are used in web development?

Not complete answer Cookies are text files stored on client’s hard disk sent by the server side due to cookie related programming in the code. Cookies are usually generated by JavaScript or CGI scripts.

Question No: 21 __ ( Marks: 5 )

Page 9: It430 Subjective Question and Answers

What is a web form? What is its usage in reference to client-server communication? 2+3

A webform on a web page allows a user to enter data that is sent to a server for

processing. Webforms resemble paper forms because internet users fill out the forms

using checkboxes, radio buttons, or text fields.

You are now familiar with the fact that internet presents a two-way communication model, also called theClient-Server Model. In the client server model some data is processed on the client side and certain data is processed by the server on the server side.

Question No: 21 __ ( Marks: 5 ) Write your personal profile in a file saving it with the extension of e.g. “abc.js”and then call it in a JavaScript code.

Question No: 21 __ ( Marks: 5 ) Write any four essential features and two extra features which should exist in E-Commerce softwares. A catalog display

Shopping cart capabilities

Transaction processing

Another feature

Middleware

Application integration

Web services

Integration with ERP Software

Supply chain management software

Customer Relationship Management (CRM) Software

Content Management Software

Knowledge Management Software

Question No: 21 ( Marks: 5 ) What is the difference between an interpreted and a compiled language? Give one example of each.

We compile the code or convert it into machine language using software called

compiler, as we use in case of C or C++. The other way is that we interpret the code

Page 10: It430 Subjective Question and Answers

(line by line) at the run time using a program called interpreter. Browser is an

interpreter

Question No: 21 ( Marks: 5 )

Identify protocol stack used in each layer of OSI model?

Network protocol Network protocols are those standard rules using which computers on a network communicate and Exchange data with each other. A group of protocols that prepare the data for communication on the Network is called the Protocol stack Question No: 25 ( Marks: 5 )

Write the code for a web page displaying a button named "Testing". After clicking

that button an alert should be displayed saying "The test is successful".

<html>

<head>

<script type="text/javascript">

function sndAlert() {

window.alert("The test is successful!!!"); }

</script>

</head>

<body>

<FORM

NAME="form1">

<INPUT TYPE="Button" name="showAlert" VALUE="Show Alert"

onclick="sndAlert()">

</FORM>

</body>

</html>

Q.No.1: Enlist the "Outside attacks on the Network" and write note on DoS? 5 marks Q.No.2: Differentiate between the relative position and absolute position of a text by using

Page 11: It430 Subjective Question and Answers

CSS tags? 5 Marks 5) Difference b/w (i) Virus & Worms (ii) Backdoors & Trojan Horse (5 Marks)

Question No: 25 ( Marks: 5 )

Write the types of firewalls. Only names? Explain these briefly

Packet filter firewall

It uses a set of rules to determine whether outgoing or incoming data packets are allowed

to pass through the firewall.

Circuit level firewall

It is quite similar to the packet filter firewall. It also works on the basis of a set of rules

for filtering packets but operates at the transport layer of the OSI Model so has greater

functionality.

Application gateway firewall

It operates at application layer of the OSI Model. It uses strong user authentication to

verify identity of a host attempting to connect to the network using application layer

protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather

than packets entering/leaving the network. It can block any outgoing HTTP or FTP

requests.

Question No: 26 ( Marks: 5 )

Differentiate between front end and back end.

Answer: Front end consists of that information which is visible to the user and he

can interact with the same through some interface. The back end comprises that

information which resides on the server side and is used to create certain dynamic

results for the user. It would include different programs or scripts that may be

developed in different languages/tools. Backend is mainly used for two purposes –

for querying with the databases and for the maintenance of state. We can use

different tools (ASP, JSP etc.) for that purpose depending upon their respective

advantages/disadvantages.

Question No: 25 ( Marks: 5 )

Page 12: It430 Subjective Question and Answers

Describe the importance of Cryptography in internet data transfer security in E-

Commerce?

1. It is a collection of mathematical techniques used to ensure confidentiality of

information. The process of scrambling a message with the help of a key is

called Encryption.

2. It provides the Transaction Integrity. Transaction detail of both the parties

can be verified which help to built the confidence between business

communities.

3. It provide Privacy like it provide controls to prevent third parties from

getting access to the information within the transaction

4. Without cryptography, it is doubtful that banks, businesses and individuals

would feel safe doing business online.

5. Cryptography provides the confidence to the customer that their data is safe

and secure. Otherwise due to lack of confidence and doubt e-commerce

business can not flourish.

Question No: 26 ( Marks: 5 )

Write a list of comparison operators in JavaScript with symbols.

Comparison operators

„==‟ for Equal

„!=‟ for not equal

„< „ for Less than

„<=‟ for less than equal

„>‟ for Greater than

„>=‟ for Greater than equal

Question No: 21 ( Marks: 5 ) What is cryptography? What techniques are used for cryptography?

Cryptography is the technique of converting a message into unintelligible or non-understandable form such that even if some unauthorized or unwanted person intercepts the message he/she would still not be able to make any sense out of it. Cryptography is thousands of years old. Techniques used for cryptography Substitution In substitution we replace each letter in the message with another to make the message non-understandable. For example, each letter “a” in the message can be

Page 13: It430 Subjective Question and Answers

replaced with letter “d” and letter “b” with letter “e” and so on. Transposition It is based on scrambling the characters in a message. A transposition system may first write a message into a table row by row then the message can be read and rewritten column by column to make it scrambled.

Question No: 25 ( Marks: 5 ) Write the JavaScript code which will display the following in a web page using a FOR loop: The number is 0 The number is 1 The number is 2 The number is 3 The number is 4 The number is 5

Question No: 25 ( Marks: 5 )

Write HTML code for the form displaying a drop-down list containing the following

entries: Honda, Suzuki, Santro, Corolla.

Question No: 26 ( Marks: 5 )

Write a note on any two methods used to maintain state between HTTP requests.

HEAD

Asks for the response identical to the one that would correspond to a GET

request, but without the response body. This is useful for retrieving meta-

information written in response headers, without having to transport the entire

content.

GET

Requests a representation of the specified resource. Requests using GET (and a

few other HTTP methods) "SHOULD NOT have the significance of taking an

action other than retrieval".[12]

The W3C has published guidance principles on this

distinction, saying, "Web application design should be informed by the above

principles, but also by the relevant limitations."[13]

See safe methods below.

Question No: 21 __ ( Marks: 5 ) Identify protocol stack used in each layer of OSI model?

Question No: 21 ( Marks: 5 )

Page 14: It430 Subjective Question and Answers

What is the difference between physical address and logical address? Support your answer with at least two examples.

Question No: 17 __ ( Marks: 1 ) What is the function of UDP protocol at TCP/IP stack?Give precise answer. Answer Function is transport Connectionless transport protocol Question No: 18 ( Marks: 1 ) What tag is used for displaying a border between the frames? ANSWER - BORDER or FRAMEBORDER – Set this attribute to 0 for not displaying a border between the frames

Question No: 17 __ ( Marks: 1 ) What are the two types of twisted pair cables for networking ?

ANSWER

Type of twisted pair cables

Unshielded twisted pair (utp)

Shielded twisted pair (stp) Question No: 18 ( Marks: 1 ) What it stands for IIS? ANSWER Internet information server

Page 15: It430 Subjective Question and Answers

Question No: 18 __ ( Marks: 1 ) What do you say that Cookies can also be used to maintain state between two broken sessions. Justify with solid argument

ANSWER

It is possible that some information of the previous session is stored in the

cookie file, and this information is available (through cookie) to the server side on

starting a subsequent session.

Question No: 18 __ ( Marks: 1 ) Do you agree or not that in In Java Script we are not provided with certain already defined objects which are ready to use? justify

ANSWER

I am not agree, because in java script we are

provided with certain already defined objects

which are already to use.

Question No: 17 ( Marks: 1 )

Shortly Explain RIP?

Answer RIP is a dynamic routing protocol used in local and wide area networks. As such it

is classified as an interior gateway protocol (IGP). It uses the distance-vector

routing algorithm.

Question No: 18 ( Marks: 1 )

In which layer of OSI model, the data is converted into binary digits or

electric pulses?

Answer Physical layer

Question No: 17 ( Marks: 1 )

What does this mean?

padding-right

ANSWER

Padding-right means adds space to the right of the content

Page 16: It430 Subjective Question and Answers

Question No: 18 ( Marks: 1 ) Do you agree or not that using Cascading Style Sheets one can apply an image to

sections of one‟s page or even to individual words.

Answer Yes! I agree, using CSS one can apply his/her defined design, image or wording to multiple pages of his/her website Question No: 18 __ ( Marks: 1 ) In HTML , for displaying information systematically which tag do we usually use ?

Answer Tables are used largely for page layout as well as for displaying information systematically

Tables use the basic tag <Table> and </Table>. Question No: 17 __ ( Marks: 1 ) What does this mean document.write("str.charAt(3) : "+str.charAt(3) +"<P>"); ?

Answer charAt(3) would provide the value of the element at the index three. Question No: 18 __ ( Marks: 1 ) What does this term mean "Non-repudiation"?

Answer Non-repudiation means that the execution of the digital signatures Question No: 17 __ ( Marks: 1 ) What it stands for (W3C)? Answer World Wide Web Consortium