Sei sulla pagina 1di 6
LECCE eee eee eee OED Pe |3. Maximum ime alloted for PART ONE is ONE HOUR. Answer book for PART TWO will (M3-R3: INTERNET AND WEB DESIGN ‘There are TWO PARTS in this ModulsiPaper. PART ONE coniains FOUR questions ‘and PART TWO contains FIVE questions PART ONE isto be answered in the TEAR-OFF ANSWER SHEET only, attacies to the question paper, as per the insructions contained therein, PART ONE is NOT to be answered in the answer book be supplied at the table when ihe answer sheet for PART ONE 's retumed. However, ‘candidates. who complete PART ONE eatler than cne hour, can collect the answer ook for PART TWO immesiatly after handing over the answer Sea for PART ONE. TOTAL TIME: SHOURS TOTAL MARKS: 100 (PART ONE 40; PART TWO ~ 60) PART ONE (Answer all the questions) 1. Each quastion below gives @ multiple choice of answers. Choose the most appropriate one and enter inthe “tearoff” answer sheet attached to the question paper following instruetions thorn. (x10) 1:1 Sooure Socket Layer, aproacol developed by a) ETF 8) Apple ©) Netscape D) HP 1.2 Whatis @ good way to protect sensitive information sent via e-mail? A) Enaryptit B) —Wrte tin another language ©) Dontinciude your return aderess ©} Alone above 1.3 Which TOP por is used by a web server to serve web pages? 8 a 8) 80 C2 Dd) 23 1.4 What does IRC stand for? A) Inteenet Real-time chat B) _Intcxnet Resource Centre ©) Internet Relay chat 1B) Internal Reabtime clock 1.5 Choose the correct him! tag forthe largest heating Ay ehi> 8) te? D) WERT age at ary 2008 search Ihe largest ol probably uso? sages for information on black holes’, you woul! Ay eneyelopedia ©) web portal 5) wikipedia 1:1 Coowmership tights as related to content on the web are governed uncer A) Copyright aw B)— Fatent ie )__ Data protection law Dy Privacy taw 18 Aspideris ‘A computer virus B} Abrowser ©} Aprogram thal cata By A hacker community sks web ses. VRMLis Visual Realty Markup Langu Viral Realty Maku Language ©} Vitual Reailly Modeling Language D) Visual Realty Modeling Language ‘Yala IP address for@ computer is Ay 130,300.534 R) 13000.286 c) 130.128.2608 D) OL January, 2008 EP EEEEET EEE CCC eee eer EET EEE 2, 24 Each statement below is either TRUE of FALSE. Choose the most appropriate one land ENTER in the “tear-off” sheet attached to the question paper, following instructions therein, (110) [SMTP protocol is used by a mail client to fetch mal from mail server. 2.2 SSH is a protocol that allows computers to communicate wh each oher over encrypted connections 23 USENET messages are ransmited to subscribers via e-mal 2:4 When you save a cooumentin FrontPage, the fe extnsion et 2.5 The INTERNET is managed by US Government, 28 JPEG is used to compress mages 2.7 FTP uses ine servcas of UDP 2.8 stant messaging (iM) greet way fo chat wi ends oline without having fo woty pout ses. 29 You cannot use JavaSarit in ASP 2.30 Fiewalsytoms ean be used both for separating an orgerizaion from the ousie world tnd cvicing departments within an organtaton 2. Match words and phrases. in_column X with the closest related meaning! ‘vora(sjphrase(s) in column Y. Enter your selection inthe tear-of" answer shoet tached tothe question paper, following Instuetionstheroin (ix) _ x ¥ 1 Serving dynamic documents [Tenet 1 Telecommunisation network (8. Internet ‘An ener sytem tha use wokeys |G. | UDP Serd information to web server 3. [PWN HTTP servico | Autorun Gateway F_ | Gon Private network G._ [Network Traffic Builtin Board H.__| Pubic Domain Area | Live communication 1. | Google | | Search Engine (a Ki | ia | VPN c u_[ter. i M._| Post | i Nes : I (0. | Compiler i P| Chat TERS Page soe Tanaary, 2008

Potrebbero piacerti anche