You are on page 1of 16

1) Name three Style Properties (2 Marks)

ANSWER
 background-break
 background-clip
 background-origin
http://webdesign.about.com/od/css/a/aastylelibrary_3.htm

2) Name Three Server Side Scripting Language (2 Marks)

ANSWER
PHP: Hypertext Preprocessor
ASP - Active Server Pages
JSP : Java server page

2) What are servlets (MARKS 2)

ANSWER
Servlets are very fast Java applications on the server side which
are available in an active form in the memory of the server.
They use JDBC to connect to the databases.

Q.No.4: Short Note on Circuit Firewall ? 2marks

ANSWER
It is quite similar to the packet filter firewall. It also works on the basis of a set of
rules for filtering packets but operates at the transport layer of the OSI Model so has
greater functionality. As a rule, the higher the layer of OSI model where a firewall
operates, the more sophisticated is the firewall. It can also determine whether
TCP/IP connection between a host and a machine outside firewall has been properly
established.

Question No: 19 ( Marks: 2 )


Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to
include this applet in your web page.
ANSWER
<HTML> <BODY>
<APPLET CODE= "http://www.vu.edu.pk/demo.class". width=100
height=200>DEMO</APPLET>
</BODY> </HTML>

Question No: 19 __ ( Marks: 2 )


When does we use the parseFloat() function?
ANSWER
‘parseFloat()’, that is, a function of predefined global object.

Question No: 19 __ ( Marks: 2 )


What is bandwidth of a network?
Bandwidth is the speed of a network. It indicates how many bits can be transmitted
across a network in a given time.

Question No: 19 ( Marks: 2 )


What are the three position style properties?
Absolute – you can place the element box anywhere on the page position:
Relative – position is relative to the normal position of the element
Position: static – position remains unchanged

Question No: 19 ( Marks: 2 )


What is common between proxy server and firewall?
common things in proxy server and firewall filtering request for web
pages

Question No: 21 ( Marks: 2 )


What does PPTP stand for?
Ans (page98)
PPTP stands for point to point transfer protocol.

Question No: 22 ( Marks: 2 )


What are the keywords to define a variable and a function in JavaScript?
“var” is the keyword used to define a variable in Javascript
e.g var a; “function” is the keyword to define a function in javascript
e.g function myfunction(){ // some code }

Question No: 21 ( Marks: 2 )


What value will be printed after executing the following statement in JavaScript:
document.write( Math.pow(3, 2) );
document.write("Math.pow(2,3) :"+Math.pow(2,3)+"<P>");

Question No: 22 ( Marks: 2 )


What is a web server?
ANSWER:

Web server – machine that services internet request


OR
Web server
web server is a machine that serves up the web page requests of a client on the
internet. It is a combination of hardware and software. Decision as regards the type
of a web server is largely dependent on the volume and type of web activities.

Question No: 22 ( Marks: 2 )

What does ‘parseFloat(string)’ And NaN mean?

The parseFloat() function parses a string and returns a floating point number. This
function determines if the first character in the specified string is a number. If it is,
it parses the string until it reaches the end of the number, and returns the number
as a number, not as a string.

The NaN property represents "Not-a-Number" value. This property indicates that a
value is not a legal number.

Question No: 22 ( Marks: 2 )

What is meant by a constructor? (page 69)

Constructor is defined as the initializing function used to create instance/copy of an


object. It is after the name of the object whose constructor it is

Question No: 19 ( Marks: 2 )


Suppose, there is an applet at "http://www.vu.edu.pk/demo.class". Write the code to
include this applet in your web page.
<APPLET CODE= “http://www.vu.edu.pk/demo.class” width=100 height=200> DEMO
</APPLET>

Question No: 21 ( Marks: 2 )


How Certification Authority (CA) issues the certificates? Describe briefly
Certification authorities work in a hierarchical fashion. There is the CA at the top
called root CA (the most reputed CA). It can issue certificates to CAs working below
it and those CAs’ can further issue certificates to CAs working under them. In this
fashion a hierarchy of CAs is developed with each CA confirming the public key of
the CA below it through a digital certificate
Question No: 22 ( Marks: 2 )
Discuss the role of child element tags while in writing XML code.

Question No: 21 ( Marks: 2 )


What you understand about Denial of services (DOS) attacks?

DOS important to establish a security policy for an e-business organization outlining


as to which assets have to be protected and how to be protected.
The attacker gains access to the network and then send invalid data to network
services or applications. These services or applications consequently become unable
to perform their normal tasks or functions
Question No: 22 ( Marks: 2 )
Discuss the role of (W3C) keeping in view the web documents ?
Not sure
This area encompasses defining the Web, Web documents, and the protocols for
accessing and disseminating Web documents. Furthermore, the consortium also
addresses issues of intellectual ownership of Web documents, rating systems for
Web documents, and Internet privacy.

3) Types of Cryptography and difference between them. (3 Marks)

Cryptography is a collection of mathematical techniques used to ensure confidentiality of


information
Two type
Symmetric Cryptography
In symmetric cryptography same keys are used for encryption and decryption.
Asymmetric or Public Key Cryptography
In this type a pair of public and private keys is used for encryption and decryption

Question No: 20 __ ( Marks: 3 )


Identify the object, property and method in the following:
Math.sin(45)
Math.PI

document.write("Math.sin(45) :"+Math.sin(45)+"<P>");
document.write("Math.PI :" +Math.PI +"<P>");
4) What is function of Commands: (3 Marks)
str.toLowerCase() :The capitalize, lowercase,
str.toUpperCase() :Uppercase capitalize
str.Split(") :splits the string on the basis of blank space.

document.write("str.toLowerCase() :"+str.toLowerCase()+"<P>");
document.write("str.toUpperCase():"+str.toUpperCase()+"<P>");
document.write("str.Split(' ') myArray[0] :"+myArray[0]+"<P>");
document.write("str.Split(' ') myArray[1]:"+myArray[1]+"<P>");

Q.No.3: Different logical operators in Java script?


Only write there name and there symbols? 3 marks
Logical operators

‘&&’ for logical and


‘||’ for logical or
‘!’ for logical not

Question No: 20 ( Marks: 3 )


Name the JavaScript function that convert strings to float numbers. How do you
give the function a string value to convert to a number?

String to number

If you want to change a string to a number, first make sure there are only the
characters 0-9 in the string. What I always do is simply multiplying the string by 1.

var c = '1234';
d = c * 1;

Since multiplying assumes numbers, JavaScript makes the string a number, if


possible. If that isn't possible, the result is NaN. Note that you cannot do

var c = '1234';
d = c + 0;

Question No: 20 ( Marks: 3 )


What is the purpose of padding? How many types of padding are: Name of these?
Padding – general property that applies to all four padding properties in this order:
 Padding top
 padding-right
 padding-bottom
 padding-left
Question No: 20 ( Marks: 3 )
Write at least three rules for writing an XML code.
-All elements must be properly nested <outer><inner>content</inner></outer>
-All attribute values must be quoted <FRIES SIZE=“LARGE”>
-All elements with empty content must be identified by ending in />

Question No: 20 ( Marks: 3 )


What does RAS and RAC stand for in context of virtual private network?
Answer
That server machine may be called a Remote Access Server (RAS) and
the client may be called a Remote Access Client (RAC).

Question No: 24 ( Marks: 3 )


Performance of web servers can be evaluated mainly on the basis of two factors. What
are they?
Ans:
Performance of web sever
Performance of web servers can be evaluated mainly on the basis of two
factors:
Throughput, which is the number of http requests that a particular
server hardware and software can handle in the unit time; and

Response time, which is the amount of time a web server requires to


process one request. Web server hardware architectures

Question No: 23 ( Marks: 3 )


To calculate the area of a circle the formula pi r squared is used. How would you code it
in JavaScript?
<html>
<script type="text/javascript">
var radius,area;
radius = 10;
area = Math.PI*Math.pow(radius,2);
document.write("Area of circle with radius 10 is " + area );
</script>
</html>

Question No: 24 ( Marks: 3 )

How ‘Man in The middle Attacks’ operates?

Man in the middle attacks


In it the attacker is able to monitor, capture and control data between sending and
receiving machines. He may apply IP address spoofing technique to divert the
packets to its machine, then modify the packets and resend the misleading
information to the actual client. Another form of man-in-the-middle attack is where
the hacker is able to substitute the IP address of a genuine web site with the IP
address of his own web site due to some security hole in the software that runs on a
domain name server. A client would think that he is communicating or receiving the
information form a genuine web site, though it would not be the case actually.

Question No: 23 ( Marks: 3 )

What is meant by ‘Shopping Cart’ in context of e commerce? (page 92)

Shopping cart was used wherein the user had to remember and type certain
information. It is now replaced by electronic shopping cart/basket that keeps record
of the items the customer has selected and allows customers to view the details of the
items selected. The customer can add new items or remove items. To order an item,
a customer simply clicks at that item option. All details of an item, including its
price, product no. and order identifying information are stored automatically in the
cart.

Question No: 20 ( Marks: 3 )


What do you think, is there any difference between Static and Dynamic IP
Address assignment? Discuss.
A static IP address is a number (in the form of a dotted quad) that is assigned to a
computer by an Internet service provider (ISP) to be its permanent address on the
Internet. Computers use IP addresses to locate and talk to each other on the
Internet, much the same way people use phone numbers to locate and talk to one
another on the telephone. When you want to visit whatis.com, your computer asks a
domain name system (DNS) server (think telephone information operator) for the
correct dotted quad number (think phone number) for whatis.com and your
computer uses the answer it receives to connect to the whatis.com server

Question No: 24 ( Marks: 3 )


Write a function for the addition of two numbers?

Question No: 23 ( Marks: 3 )


Differentiate between the HTML and XML. Identify At least three major
differences.

(1) XML was designed to describe data and to focus on what data is. HTML was
designed to display data and to focus on how data looks .
(2) HTML is about displaying information, while XML is about describing
information.

(2) XML data can also be stored inside HTML pages as "Data Islands". You can
still concentrate on using HTML only for formatting and displaying the data.

Question No: 24 ( Marks: 3 )


What are the different logical operators in JavaScript? Only write their names. Also write
the
symbols of operators.
ANSWER
Logical operators „&&‟ for logical and „||‟ for logical or „!‟ for logical not

Question No: 20 __ ( Marks: 3 )


What is MAC address? How does it help server to identify the client?
Data to be delivered on a network has to be converted first into serial transmission. This is
done through a device called Network Interface Card (NIC) that must be installed in a
computer on the network. NIC has also got printed on it a 48 bits unique address called the
MAC or hardware address of the computer machine. In other words, it consists of 12
hexadecimal characters and can have different format as shown below:
090017A9B2EF
09:00:17:A9:B2:EF
09-00-17-A9-B2-EF

Question No: 20 ( Marks: 3 )


What are the three methods for using style sheets with a web page?

Method #1: Embedded method


Method # 2: Linking to an external style sheet
Method # 3: Inline styles

Question No: 20 __ ( Marks: 3 )


What are cookies? Why these are used in web development?
Not complete answer
Cookies are text files stored on client’s hard disk sent by the server side due to cookie related
programming in the code. Cookies are usually generated by JavaScript or CGI scripts.

Question No: 21 __ ( Marks: 5 )


What is a web form? What is its usage in reference to client-server
communication? 2+3

A webform on a web page allows a user to enter data that is sent to a server for
processing. Webforms resemble paper forms because internet users fill out the forms
using checkboxes, radio buttons, or text fields.

You are now familiar with the fact that internet presents a two-way
communication model, also called theClient-Server Model. In the client
server model some data is processed on the client side and certain data is
processed by the server on the server side.

Question No: 21 __ ( Marks: 5 )


Write your personal profile in a file saving it with the extension of e.g. “abc.js”and then call it in
a JavaScript code.

Question No: 21 __ ( Marks: 5 )


Write any four essential features and two extra features which should exist in E-Commerce
softwares.
A catalog display
Shopping cart capabilities
Transaction processing

Another feature
Middleware
Application integration
Web services
Integration with ERP Software
Supply chain management software
Customer Relationship Management (CRM) Software
Content Management Software
Knowledge Management Software

Question No: 21 ( Marks: 5 )


What is the difference between an interpreted and a compiled language?
Give one example of each.

We compile the code or convert it into machine language using software called
compiler, as we use in case of C or C++. The other way is that we interpret the code
(line by line) at the run time using a program called interpreter. Browser is an
interpreter

Question No: 21 ( Marks: 5 )


Identify protocol stack used in each layer of OSI model?

Network protocol
Network protocols are those standard rules using which
computers on a network communicate and
Exchange data with each other. A group of protocols that
prepare the data for communication on the
Network is called the Protocol stack

Question No: 25 ( Marks: 5 )


Write the code for a web page displaying a button named "Testing". After clicking
that button an alert should be displayed saying "The test is successful".
<html>
<head>
<script type="text/javascript">
function sndAlert()
{
window.alert("The test is successful!!!");
}
</script>
</head>
<body>
<FORM
NAME="form1">
<INPUT TYPE="Button" name="showAlert" VALUE="Show Alert"
onclick="sndAlert()">
</FORM>
</body>
</html>

Q.No.1: Enlist the "Outside attacks on the


Network" and write note on DoS? 5 marks

Q.No.2: Differentiate between the relative


position and absolute position of a text by using
CSS tags? 5 Marks

5) Difference b/w (i) Virus & Worms

(ii) Backdoors & Trojan Horse (5 Marks)

Question No: 25 ( Marks: 5 )


Write the types of firewalls. Only names? Explain these briefly
Packet filter firewall
It uses a set of rules to determine whether outgoing or incoming data packets are allowed
to pass through the firewall.
Circuit level firewall
It is quite similar to the packet filter firewall. It also works on the basis of a set of rules
for filtering packets but operates at the transport layer of the OSI Model so has greater
functionality.
Application gateway firewall
It operates at application layer of the OSI Model. It uses strong user authentication to
verify identity of a host attempting to connect to the network using application layer
protocols such us FTP. In contrast to packet filter firewall, it filters the requests rather
than packets entering/leaving the network. It can block any outgoing HTTP or FTP
requests.

Question No: 26 ( Marks: 5 )

Differentiate between front end and back end.

Answer: Front end consists of that information which is visible to the user and he
can interact with the same through some interface. The back end comprises that
information which resides on the server side and is used to create certain dynamic
results for the user. It would include different programs or scripts that may be
developed in different languages/tools. Backend is mainly used for two purposes –
for querying with the databases and for the maintenance of state. We can use
different tools (ASP, JSP etc.) for that purpose depending upon their respective
advantages/disadvantages.

Question No: 25 ( Marks: 5 )


Describe the importance of Cryptography in internet data transfer security in E-
Commerce?

1. It is a collection of mathematical techniques used to ensure confidentiality of


information. The process of scrambling a message with the help of a key is
called Encryption.
2. It provides the Transaction Integrity. Transaction detail of both the parties
can be verified which help to built the confidence between business
communities.
3. It provide Privacy like it provide controls to prevent third parties from
getting access to the information within the transaction
4. Without cryptography, it is doubtful that banks, businesses and individuals
would feel safe doing business online.
5. Cryptography provides the confidence to the customer that their data is safe
and secure. Otherwise due to lack of confidence and doubt e-commerce
business can not flourish.

Question No: 26 ( Marks: 5 )

Write a list of comparison operators in JavaScript with symbols.

Comparison operators
„==‟ for Equal
„!=‟ for not equal
„< „ for Less than
„<=‟ for less than equal
„>‟ for Greater than

„>=‟ for Greater than equal

Question No: 21 ( Marks: 5 )


What is cryptography? What techniques are used for cryptography?
Cryptography is the technique of converting a message into unintelligible
or non-understandable form such
that even if some unauthorized or unwanted person intercepts the message
he/she would still not be able to
make any sense out of it. Cryptography is thousands of years old.
Techniques used for cryptography Substitution In substitution we replace
each letter in the message with
another to make the message non-understandable. For example, each letter
“a” in the message can be
replaced with letter “d” and letter “b” with letter “e” and so on.
Transposition It is based on scrambling the
characters in a message. A transposition system may first write a message
into a table row by row then the
message can be read and rewritten column by column to make it
scrambled.

Question No: 25 ( Marks: 5 )


Write the JavaScript code which will display the following in a web page
using a FOR loop:
The number is 0
The number is 1
The number is 2
The number is 3
The number is 4
The number is 5

Question No: 25 ( Marks: 5 )


Write HTML code for the form displaying a drop-down list containing the following
entries: Honda, Suzuki, Santro, Corolla.

Question No: 26 ( Marks: 5 )


Write a note on any two methods used to maintain state between HTTP requests.

HEAD
Asks for the response identical to the one that would correspond to a GET
request, but without the response body. This is useful for retrieving meta-
information written in response headers, without having to transport the entire
content.
GET
Requests a representation of the specified resource. Requests using GET (and a
few other HTTP methods) "SHOULD NOT have the significance of taking an
action other than retrieval".[12] The W3C has published guidance principles on this
distinction, saying, "Web application design should be informed by the above
principles, but also by the relevant limitations."[13] See safe methods below.

Question No: 21 __ ( Marks: 5 )


Identify protocol stack used in each layer of OSI model?

Question No: 21 ( Marks: 5 )


What is the difference between physical address and logical address? Support your
answer with
at least two examples.

Question No: 17 __ ( Marks: 1 )


What is the function of UDP protocol at TCP/IP stack?Give precise answer.

Answer
Function is transport
Connectionless transport protocol

Question No: 18 ( Marks: 1 )


What tag is used for displaying a border between the frames?

ANSWER
- BORDER or FRAMEBORDER – Set this attribute to 0 for not displaying a border between
the frames

Question No: 17 __ ( Marks: 1 )


What are the two types of twisted pair cables for networking ?
ANSWER

Type of twisted pair cables

Unshielded twisted pair (utp)


Shielded twisted pair (stp)

Question No: 18 ( Marks: 1 )


What it stands for IIS?

ANSWER
Internet information server
Question No: 18 __ ( Marks: 1 )
What do you say that Cookies can also be used to maintain state between
two broken sessions. Justify with solid argument

ANSWER
It is possible that some information of the previous session is stored in the
cookie file, and this information is available (through cookie) to the server side on
starting a subsequent session.

Question No: 18 __ ( Marks: 1 )


Do you agree or not that in In Java Script we are not provided with certain
already defined objects which are ready to use? justify

ANSWER
I am not agree, because in java script we are
provided with certain already defined objects
which are already to use.

Question No: 17 ( Marks: 1 )


Shortly Explain RIP?
Answer
RIP is a dynamic routing protocol used in local and wide area networks. As such it
is classified as an interior gateway protocol (IGP). It uses the distance-vector
routing algorithm.

Question No: 18 ( Marks: 1 )


In which layer of OSI model, the data is converted into binary digits or
electric pulses?

Answer
Physical layer

Question No: 17 ( Marks: 1 )


What does this mean?
padding-right
ANSWER
Padding-right means adds space to the right of the content
Question No: 18 ( Marks: 1 )
Do you agree or not that using Cascading Style Sheets one can apply an image to
sections of one‟s page or even to individual words.

Answer
Yes! I agree, using CSS one can apply his/her defined design, image or
wording to multiple pages of his/her website

Question No: 18 __ ( Marks: 1 )


In HTML , for displaying information systematically which tag do we usually use ?

Answer
Tables are used largely for page layout as well as for displaying
information systematically
Tables use the basic tag <Table> and </Table>.

Question No: 17 __ ( Marks: 1 )


What does this mean document.write("str.charAt(3) : "+str.charAt(3)
+"<P>"); ?

Answer
charAt(3) would provide the value of the element at the index three.

Question No: 18 __ ( Marks: 1 )


What does this term mean "Non-repudiation"?

Answer
Non-repudiation means that the execution of the digital signatures

Question No: 17 __ ( Marks: 1 )


What it stands for (W3C)?
Answer
World Wide Web Consortium

You might also like