Virtual University VU Solved Assignments/Quizzes/GDBs, Past Solved Papers/Assignments/Online Quizzes Solutions.

Wednesday, December 1, 2010

IT430 Mid Term Current Paper (Dec 2010)

Question No: 1    (Marks: 1)    - Please choose one

For which of the following we need to know the classification of E-commerce?

► Market planning strategy

► Build Mission statement

► Management strategy

► none

Question No: 2    ( Marks: 1 )    - Please choose one

Switch is a device that joins multiple computers together within one local area network (LAN).

► True

► False

Question No: 3    ( Marks: 1 )    - Please choose one

In which protocol, the messages are not deleted from email server.

► SMTP

► POP3

► IMAP

► ICMP

Question No: 4    ( Marks: 1 )    - Please choose one

How can you open a link in a new browser window?

► <a href="/url" target="new">

► <a href="/url" target="_blank">

► <a href="/url" new>

► None of these

Question No: 5    ( Marks: 1 )    - Please choose one

What does the Target= "_top" tag perform?

► Loads the new page into the same frame

► Loads the new page into the entire window

► Loads the new page into a new browser window

► All of the above

Question No: 6    ( Marks: 1 )    - Please choose one

Which attribute is used in a tag to control the layout of element?

► view

► css

► Style

► Layout

Question No: 7    ( Marks: 1 )    - Please choose one

Choose the correct HTML code line which  left-align the content inside a tablecell.

► <td leftalign>

► <td valign="left">

► <td align="left">

► <tdleft>

Question No: 8    ( Marks: 1 )    - Please choose one

Where in an HTML document is the correct place to refer to an external style sheet?

► In the <body> section

► At the end of the document

► In the <head> section

► At the top of the document

Question No: 9    ( Marks: 1 )    - Please choose one

When you declare a variable within a function, the variable can only be accessed within that function. When you exit the function, the variable is destroyed. These variables are called

► Local Variables

► Global Variables

► Local and Global

► None of the above


Question No: 10    ( Marks: 1 )    - Please choose one

Constructor is defined as the  initializing function used to create…........

► Instance of object

► Copy of object

► Instance / copy of object

► Shallow copy of object

Question No: 11    ( Marks: 1 )    - Please choose one

What does XML stand for?

► eXtra Modern Link

► X-Markup Language

► eXtensible Markup Language

► Example Markup Language

Question No: 12    ( Marks: 1 )    - Please choose one

For which of following purpose the Firewall is used ?

► Efficient working

► Protection against security attacks

► Networking purpose

► None of these

Question No: 13    ( Marks: 1 )    - Please choose one

PPP stands for

► Point to Point Protocol

► Post to Post Protocol

► Point to Post Protocol

► None of these

Question No: 14    ( Marks: 1 )    - Please choose one

Which of the following is NOT processed on the client side?

► Cookies

► JavaScript

► CGI scripts

► Applets

► Cookies

Question No: 15    ( Marks: 1 )    - Please choose one

Firewall is used to

I - examine the data entering the network

II - examine the data leaving the network

III - filter the data according to certain rules

► I, II and III

► I only

► I and III only

► I and II only


Question No: 16    ( Marks: 1 )    - Please choose one

Which firewall uses strong user authentication to verify identity of a host attempting to connect to the network?

► Packet filter firewall

► Circuit level firewall

► Application gateway firewall

► Hybrid firewall

Question No: 17    ( Marks: 1 )    - Please choose one

Bus networks is same as the system bus of a computer.

► True

► False

Question No: 18    ( Marks: 1 )    - Please choose one

In Style Sheets, How do you add a background color for all "<h1>" elements?

► all.h1 {background-color:#FFFFFF}

► h1.all {background-color:#FFFFFF}

► h1 {background-color:#FFFFFF}

► h1 {bgcolor:#FFFFFF}


Question No: 19    ( Marks: 1 )    - Please choose one

How do you make each word in a text start with a capital letter?

► text-transform:capitalize

► text-transform:first_capitalize.

►     Cann't be possible with CSS

► text-transform:uppercase

Question No: 20    ( Marks: 1 )    - Please choose one

MAC address is written in

►Binary form 0-1

►Decimal form            0-9

►Hexadecimal form  0-f

►None of these

Question No: 21    ( Marks: 2 )

What is a web server?

Answer : Web server – machine that services internet request.

Web server You know that web server is a machine that serves up the web page requests of a client on the internet. It is a combination of hardware and software. Decision as regards the type of a web server is largely dependent on the volume and type of web activities. So, transaction processing sites generating dynamic pages with high traffic volumes would need web server software that is more efficient and can easily be upgraded.

Question No: 22    ( Marks: 2 )

What does  'parseFloat(string)' And NaN mean?

The parseFloat() function parses a string and returns a floating point number. This function determines if the first character in the specified string is a number. If it is, it parses the string until it reaches the end of the number, and returns the number as a number, not as a string.

The NaN property represents "Not-a-Number" value. This property indicates that a value is not a legal number.

Question No: 23    ( Marks: 3 )

Write at least three rules for writing an XML code.

Rules for writing an XML code

-All elements must be properly nested <outer><inner>content</inner></outer>

-All attribute values must be quoted <FRIES SIZE="LARGE">

-All elements with empty content must be identified by ending in />

Question No: 24    ( Marks: 3 )

How 'Man in The middle Attacks' operates?

Man in the middle attacks

In it the attacker is able to monitor, capture and control data between sending and receiving machines. He may apply IP address spoofing technique to divert the packets to its machine, then modify the packets and resend the misleading information to the actual client. Another form of man-in-the-middle attack is where the hacker is able to substitute the IP address of a genuine web site with the IP address of his own web site due to some security hole in the software that runs on a domain name server. A client would think that he is communicating or receiving the information form a genuine web site, though it would not be the case actually.

Question No: 25    ( Marks: 5 )

Write the code for a web page displaying a button named "Testing". After clicking that button an alert should be displayed saying "The test is successful".

<html>

<head>

<script type="text/javascript">

function sndAlert()

{

window.alert("The test is successful!!!");

}

</script>

</head>

<body>

<FORM

NAME="form1">

<INPUT TYPE="Button" name="showAlert" VALUE="Show Alert"

onclick="sndAlert()">

</FORM>

</body>

</html>

Question No: 26    ( Marks: 5 )

Differentiate between front end and back end.

Answer: Front end consists of that information which is visible to the user and he can interact with the same through some interface.  The back end comprises that information which resides on the server side and is used to create certain dynamic results for the user. It would include different programs or scripts that may be developed in different languages/tools. Backend is mainly used for two purposes – for querying with the databases and for the maintenance of state. We can use different tools (ASP, JSP etc.) for that purpose depending upon their respective advantages/disadvantages.

No comments:

Post a Comment