You are on page 1of 4

CS / B.

Tech (CSE-NEW) / SEM 7 / CS-705A / 2014-15


2014
INTERNET TECHNOLOGY
Time Allotted : 3 Hours

Full Marks : 70

The figures in the margin indicate full marks.


Candidates are required to give their answer in their own words as far as practicable.

Group A
(Multiple Choice Type Questions)
1. Choose the correct alternatives for the following:
10 x 1 = 10
i. In SMTP, the client establishes a ___________ connection with the server.
a) TCP
b) UDP
c) IP
d) HTTP
ii.

The IPv4 address 229.0.0.1 is a


a) Multicast Address
b) Unicast Address
c) Broadcast Address
d) None of the above

iii.

The Prologue of an HTML document can be written as


a) <?DOCTYPE HTML 1.1>
b) <DOCTYPE> HTML 1.1 </DOCTYPE>
c) <DOCTYPE HTML=1.1>
d) <!DOCTYPE HTML 1.1>

iv.

In JavaScript, the onBlur event is triggered when


a) An image fails to load
b) A field loses focus
c) A page is closed
d) A field is hidden

v.

A valid length in CSS is


a) 100cm
b) 100in
c) 100pts
d) 100pix

vi.

The value of an attribute of an XML tag cannot be


a) CDATA
b) PCDATA
c) ID
d) ENTITY

vii.

The status code 301 in a CGI response stands for:


a) Bad request
b) Moved Temporarily
c) Moved Permanently
d) Not Modified

viii.

SSH stands for


a) Secure Shell Host
b) Secure Shell
c) Server Shell
d) Server Side Host

ix.

The minimum size of an RTP header is


a) 16 bytes
b) 12 bytes
c) 10 bytes
d) 10 bits

x.

Stateful Packet Inspection is also known as:


a) Static Packet Filtering
b) TCP Packet Filtering
c) Dynamic Packet Filtering
d) None of the above

GROUP B
(Short Answer Type Questions)
Answer any three of the following.
2. a) What is DTD? Why is it used?
b) Write a DTD for Student Mark sheet.

3 x 5 = 15
3+2

3. a) How can JavaScript be used to modify HTML DOM objects?


b) Write a program in JavaScript to validate a mobile number in international format using
regular expressions.
2+3

4. a) What is Denial of Service attack?


b) How can a DoS attack be avoided?

2+3

5. Write a program in PERL to read a paragraph of text from a file and print only those
sentences in the paragraph which have exactly five words.
5

6. a) What are GET and POST methods in CGI?


b) Describe the CGI Request sent by a client.

2+3

GROUP C
(Long Answer Type Questions)
Answer any three of the following.

3 x 15 = 45

7. Design a page using HTML and CSS containing a FORM with the following fields:
i. First Name
ii. Last Name
iii. Mobile Number
iv.
Email ID
v.
Date of Birth
vi.
Submit Button
vii.
Reset Button
Write a CGI PERL program to accept the form designed above. Validate the mobile
number and email id using regular expressions. If the age of the person is over 18 years,
send the response Form Accepted, else send an appropriate error message.
15

8. a) What is a Proxy Server? Why is it used? State the advantages and disadvantages of
using a Proxy Server.
5
b) What is intra-domain routing? Name and describe an intra-domain routing protocol
using appropriate examples.
5
c) Describe any one error control algorithm used in TCP/IP with suitable examples. 5

9. a) What is a three way handshake in TCP? Why is it used?


b) Draw the well labelled diagram of a three way handshake.
c) Write notes on the security aspect of Java Applets.

5
5
5

10. a) Calculate the network address and broadcast address for the given IP address and mask
pairs:
i. IP Address:
Mask:
ii. IP Address:
Mask:

iii.

IP Address:
Mask:

b) What are codecs? Why are they used? State the importance of codecs in streaming
multimedia.
5
c) Compare server side and client side validation of HTML form data with appropriate
examples.
5

11. Write short notes on any three of the following:


i. Cascading Style Sheet
ii. Applet Life Cycle
iii. Search Engine Optimization
iv.
Post Office Protocol Version 3
v.
Cookie

Answers to MCQ (Q1)


i.
ii.
iii.
iv.
v.
vi.
vii.
viii.
ix.
x.

a) TCP
a) Multicast Address
d) <!DOCTYPE HTML 1.1>
b) A field loses focus
b) 100in
b) PCDATA
c) Moved Permanently
b) Secure Shell
b) 12 bytes
c) Dynamic Packet Filtering

3x5

You might also like