Internet Technology and Web Design January 2015 Question practice papers for O level and A level students
Free Internet Technology and Web Design PDF Question download
1.3 The total time to prepare a disk drive mechanism for a block of data to be read from its
2.6 A program in execution is called Procedure.
4.2 ________ address is usually stored in ROM on the network adapter card and is unique.
4.3 Direct Memory Access is abbreviated as ________.
4.4 ________ Protocol used for transmission of IP datagrams across a serial line.
4.5 ________ are present in the network to interconnect the LAN with WANs.
4.6 Write Through technique is used in ________ for updating the data.
4.7 Cache memory acts between CPU and ________.
4.8 ________ loader is executed when a system is first turned on or restarted.
4.9 Device used to translating digital signals into analog signals and vice-versa is called a(n)
Free Internet Technology and Web Design PDF Question download
M2-R4:
INTERNET TECHNOLOGY AND WEB DESIGN(Jan 2015)
TOTAL TIME: 3
HOURS
TOTAL MARKS: 100
(PART ONE – 40; PART TWO – 60)
1. Each question
below gives a multiple choice of answers. Choose the most
appropriate one and
enter in the “tear-off” answer sheet attached to the question
paper, following
instructions therein.
(1x10)
1.1 The memory
allocation scheme subject to “external” fragmentation is
A) segmentation
B) swapping
C) pure demand
paging
1.2 SSTF stands for
A)
Shortest-Seek-time-first scheduling
B) small –
small-time-first
C)
simple-seek-time-first
D)
small-simple-time-first scheduling
1.3 The total time to prepare a disk drive mechanism for a block of data to be read from its
A) latency
B) latency plus
transmission time
C) latency plus seek
time
D) latency plus seek
time plus transmission time
1.4 Resolution of
externally defined symbols is performed by
A) Linker
B) Loader
C) Compiler
D) Editor
1.5 The total time
to prepare a disk drive mechanism for a block of data to be read from
is:
A) latency
B) latency plus
transmission time
C) latency plus seek
time
D) latency plus seek
time plus transmission time
1.6 FTP Tool is to
A) Used to transfer
data/files among computers on the Internet
B) Archive
data/files
C) Copy files from
external sources
D) Delete file from
Internet
1.7 Multi
programming system is
A) A computer system
that permits multiple users to run programs at same time
B) A computer system
that permits run similar programs at multiple time
C) A computer system
that permits multiple Programs to run at same time
D) None of the above
1.8 The circuit used
to store one bit of data is known as
A) Register
B) Encoder
C) Decoder
D) Flip Flop
1.9 ________
Command is used to manipulate TCP/IP routing table.
A) route
B) ipconfig
C) ifconfig
D) traceroute
1.10 Which of the
following is related to ipconfig in Microsoft Windows?
A) Display all
current TCP/IP network configuration values
B) Modify DHCP
settings
C) Modify DNS
settings
D) All of the above
2. Each
statement below is either TRUE or FALSE. Choose the most appropriate
one and ENTER in the
“tear-off” sheet attached to the question paper, following instructions
therein.
(1x10)
2.1 Re-locatable
programs can be loaded almost anywhere in memory.
2.2 Action
implementing instruction’s are actually carried out by Instruction
program.
2.3 The main reason
to encrypt a file is to secure it for transmission.
2.4 Compile and Go
loader is executed when a system is first turned on.
2.5 The average time
required to reach a storage location in memory and obtain its
contents is called access time.
2.6 A program in execution is called Procedure.
2.7 Simple Mail
Transfer Protocol is used for encrypting files.
2.8 DVD is a Memory
Device.
2.9 Printer can be
shared in LAN by many users.
2.10 PKZIP utility
is used to encrypt or decrypt files.
3. Match words
and phrases in column X with the closest related meaning/ word(s)/phrase(s)
in column Y. Enter your selection in the “tear-off” answer sheet attached to the
question paper, following instructions therein.
(1x10)
X
|
Y
|
||
3.1 | Assembly language | A | MS-Office file extensoin |
3.2 | Process | B | Uses alphabetic codes in place of binary numbers used in machine language. |
3.3 | Catch | C | A program in execution is called |
3.4 | An assemler is | D | Machine dependent |
3.5 | .DOC | E | Local Memory where Copies of frequently used or recently requested web pages are saved |
3.6 | An assembly Language is a | F | Network protocol |
3.7 | Virtual memory is | G | Data Compression Software |
3.8 | Throughput of a system is | H | Used in all major commercial operating system |
3.9 | Router | I | Volatile Storage |
3.10 | FTP | J | File Transfer protocol |
K | Low level programming Language | ||
L | A special purpose computer that direct packets of data along a network | ||
M | Number of programs processed by it per unit time |
4. Each
statement below has a blank space to fit one of the word(s) or
phrase(s) in the list below. Enter
your choice in the “tear-off” answer sheet attached to the
question paper, following
instructions therein.
(1x10)
A. | Cache memory | B. | Mail server | C. | SLIP |
D. | PC (program counter) | E. | TCP/IP | F. | RAM |
G. | Win ZIP | H. | MAC | I. | Bootstrap loader |
J. | DMA | K. | Hub | L. | Modem |
M. | WINDOWS |
4.1 Compressing
multiple files into one using ________ is an easy process.
4.2 ________ address is usually stored in ROM on the network adapter card and is unique.
4.3 Direct Memory Access is abbreviated as ________.
4.4 ________ Protocol used for transmission of IP datagrams across a serial line.
4.5 ________ are present in the network to interconnect the LAN with WANs.
4.6 Write Through technique is used in ________ for updating the data.
4.7 Cache memory acts between CPU and ________.
4.8 ________ loader is executed when a system is first turned on or restarted.
4.9 Device used to translating digital signals into analog signals and vice-versa is called a(n)
________.
4.10 The logical
addresses in the ________ protocol suite are called IP addresses.
PART
TWO
(Answer
any FOUR questions)
5.
a) What is traffic shaping?
b) Explain how firewalls protect network.
c) Explain the use of SSL to secure the network. (5+5+5)
6.
a) Define interrupt. Why priority of interrupt is required? How is it
restored?
b) Explain the difference between Internet, Intranet and Extranet?
c) What is the difference between LAN, MAN and WAN? (5+5+5)
7.
a) What do you understand by WWW? What is the use of hypertext links
in Internet access? Name
some popular Internet Browsers.
b) What is Public Key Cryptography? Explain its advantages and
disadvantages.
c) What is on electronic payment system? What are its types and
advantages? (5+5+5)
8.
a) How do you make an image clickable in HTML? Give an example.
b) How non-textual information contained in a web page.
c) What is CGI? Explain.
d) Write an HTML program segment that contains hypertext links from
one document to another?
e) Write a CGI program that prints date and time at which it was run
(3+3+3+3+3)
9.Explain the following terms:
a) Digital Signature
b) Anti-Virus Software
c) Win-Zip Software (5+5+5)
i want nielit o level question paper and solutions both of all modules
ReplyDeleteI want solution of this question paper
ReplyDeleteI want nielet of level questions papers and solutions both of all models papers.
ReplyDeleteThis website added question with answer for nielit o level a level all subject http://nielit.ehomelearn.in/
Delete