Internet Technologies And Tools
1. Explain how Domain Names are allocated with special reference to special domain names. | [18] |
2. Write a note on how Domain Name System (DNS) Servers work. | [4] |
3. What are the essential functions that the router must perform to achieve internetworking among dissimilar subnetworks? | [6] |
4. Write short notes on: Working of Client/Server architecture | |
5. Write short notes on: Digital Subscriber lines | [6] |
5. Write and explain the procedure for translating a domain name into an equivalent IP address. What are two performance optimizations techniques used by DNS server? | [9] |
6. Explain the differences between Routing and Switching? | [6] |
| |
7. Home based Internet services can be established using analog modems, IDSN, cable modems, ADSL and hi-speed wireless links. Compare their advantages and disadvantages. | [8] |
| |
8. Write any three features of intranet that differences it largely from Internet. | [4] |
| |
9. Explain the difference of functioning between Bridges and Routers. | [6] |
| |
10. Write a short note on baseband technology and broadband technology, with a special reference to advantages and the latest status of broadband in India. | [6] |
11. State the difference between of the following in brief: File-server architecture and client/Server Architecture. | [6] |
| |
12. Expand and explain in detail of the following acronyms: ISDN | [6] |
| |
13. Explain how the naming scheme (DNS) on the Internet works? | [9] |
| |
14. With reference to various applications of Internet in our daily life, explain, how Internet has revolution the area of Learning? | [8] |
| |
15. Suppose a network uses distance vector routing. What happens if the router sends a distance vector with all 0’s(Zero)? | [5] |
| |
16. What is Domain Name System? Explain. | [4] |
| |
17. What is Internet? Describe the Architecture of Internet. Explain how a router works. | [6] |
| |
18. What is Client/Server architecture? Explain the advantages and disadvantages of two-tier and three-tier architecture in detail. | [9] |
| |
19. Which transport technique is most appropriate for multimedia service: packet switching, circuit switching or ATM cell switching? Why? | [4] |
| |
20. What does DNS stand for? What is its main purpose? | [6] |
| |
21. Explain the following terms: Router | [2] |
22. What is xDSL technology? | [4] |
| |
23. Explain the significance of DNS server. | [4] |
| |
24. What is ATM? Discuss the four types of services provided by it. | [6] |
| |
25. Differentiate between multi-protocol router and a traditional single-protocol router. | [6] |
| |
26. Write a short note on Baseband Technology and Broadband Technology, with a special reference to advantages and the latest status of Broadband in India. | [6] |
| |
27. Explain whether an ATM cell carries a source or destination address in its header or not. | [6] |
28. The fundamental property of the DNS is caching. DNS server caches the information when a name server receives information about a mapping. What is the purpose of it and how does it work? | [6] |
| |
29. Explain the client server model of communication? What is the difference between client server architecture and web architecture? | [4] |
| |
30. What are the advantages of ATM that uses small the fixed length packets? | [4] |
| |
31. What are the benefits of DSL? How can a DSL line be shared among multiple users? | [6] |
| |
32. What is Domain Name System? What does it mean to “register” a domain name? What’s the difference between forward lookup and reverse lookup in DNS? | [6] |
| |
33. Discuss how a user gets connected to the Internet using an ISP. | [6] |
| |
34. Write a short note a Baseband Technology and Broadband Technology, with a special reference to advantages and the latest status of Broadband in India. | [6] |
| |
35. What is loopback interface? Explain. | [4] |
| |
36. What is meant by upstream & downstream? | [6] |
| |
37. Compare DSL with the following: 56 kbps analog modems T.1 line ISDN | [6] |
| |
38. When a DNS server receives a request, what are the possible actions that it can take? | [6] |
| |
39. What is domain name system (DNS)? Differentiate between forward lookup and reverse in DNS. | [4] |
| |
40. Write short notes on : Integrated Services Digital Network (ISDN). | [4] |
| |
41. What is the difference between the Basic Rate Interface (BRI) and Primary Rate Interface (PRI) services in ISDN? | [4] |
42. Describe the difference between client server architecture and peer to peer system. | [4] |
| |
43. What do you mean by xDSL? Which DSL technology is mainly deployed in residential areas? | [6] |
| |
44. What is resolver? How does it help in mapping the domain name to IP address? | [6] |
| |
45. Explain Satellite technology for communication across large distances. | [8] |
46. State the advantages and disadvantages of satellite microwave and optical fiber transmission. | [10] |
| |
47. What are optical fibers? Write at least four advantages of fibers over conventional metal wires. | [4] |
| |
48. What media can be used for noise resistance? Briefly state its other advantages. | [4] |
| |
49. Discuss the following techniques to ensure the data against accidental damage: i) parity bits ii) checksum iii) Cyclic redundancy Checks | [6] |
| |
50. What are the types of wireless networks? | [6] |
| |
51. What are EAP, LEAP, PEAP and EAP-TLS & EAP-TTLS? | [6] |
| |
51. How does a router differ from a bridge? | [6] |
| |
52. Briefly discuss major wireless networking standards. | [10] |
| |
53. Which switching technique performs error checking on the first 64 bytes of the frame? What are different processing methods used by switches to make switching decisions? | [6] |
54. Which of the following transport technique is most appropriate for multimedia service? Explain in brief: Packet switching Circuit switching ATM cell switching | [4] |
| |
55. Differentiate between 10Base5, 10Base2, 10BaseT and 10Base F. | [6] |
| |
56. What do you understand by network topology? Discuss any three network topologies? | [6] |
| |
57. What is virtual circuit network? What are its advantages and disadvantages? Name some network technologies and their virtual circuits? | [6] |
| |
58. How do ports on host machine enable communication between them? | [4] |
| |
59. Write short notes on : LAN topologies | [6] |
| |
60. Write short notes on any three of the following: Satellite communication | [6] |
| |
d) Remote Authentication Dial In User Service (RADIUS). [6] | [6] |
| |
61. “MIME is only an extension of SMTP” – Justify. | [4] |
| |
62. Write down four main features of mobiles IP? | [4] |
| |
63. Expand and explain in detail any three of the following acronyms: TCP/IP Protocol | [6] |
| |
64. What is TCP/IP? Discuss the layers of TCP/IP. | [4] |
| |
65. Discuss two protocols used for transmitting data securely over the World Wide Web. | [6] |
| |
66. What is TCP? What are the features, which makes TCP a reliable protocol? | [4] |
| |
67. Discuss Simple Mail Transfer Protocol. | [6] |
| |
68. Why is HTTP known as a stateless protocol? | [4] |
| |
69. What is the layered architecture of the Internet? In a wireless network, describe how each layer would be different from a wired network. | [10] |
70. If an application uses TCP with IP, would it be considered connectionless or connection oriented? What are the problems with using TCP for real-time services (e.g. video conferencing? Explain. | [6] |
| |
71. How does the three-way handshake, for creating a TCP connector, works? | [4] |
| |
72. What is TCP? Connection termination in TCP is symmetric, whereas connection establishment is not. Why? | [6] |
| |
73. Explain, how a session layer establishes, maintains and synchronizes the interaction between two communication hosts. | [6] |
| |
74. Why is IP called a best-effort delivery protocol? | [6] |
| |
75. What is the difference between an Ethernet switch and an Ethernet hub? Which is more suitable for a network with a high traffic load, a switch or a hub? Explain. | [6] |
| |
76. What are the various layers in the TCP/IP model? Discuss the responsibility of each layer. Also name some protocols supported at each layer. | [6] |
| |
77. What is SMTP? How it can be use to send spam? | [4] |
| |
78. What do you understand by internet protocols? Which body does have control on them? List any four protocols along with their basic functions? | [6] |
| |
79. Write the basic features of the following basic network utilities: IP Config Ping Traceroute | [6] |
| |
80. Explain why OSI layer are structured into 7 layer model | [4] |
| |
81. What is TCP? Connection termination in TCP is symmetric, whereas connection establishment is not. Why? | [6] |
82. What is the length of the header in a TCP segment? What happens when a TCP segment arrives at s host for a destination port that does not exist? What happens in case of a UDP datagram? | [6] |
| |
83. Using a network analyzer how can physical address of a computer be found? | [4] |
| |
83. How does ARP handle IP address resolution? | [4] |
| |
84. “IP divides host addresses into three primary classes” What are classes? | [2] |
| |
b) Identify the range of Ipv4 addresses spanned by the Primary Classes. | [6] |
c) Justify the address class/purpose of following addresses: 128.211.6.115 192.5.48.3 0.0.0.0 1.1.1.1 127.0.0.1 | [10] |
| |
85. What are the different classifications of an Internet addressing? Explain the addressing scheme with respect of Internet hosts and networks. | [5] |
| |
86. Subnet the class C network address 198.69.25.0 into eight subnets. | [6] |
| |
87. One function of a routing protocol is to determine the 'best path' between the sending and the receiving nodes. What is considered as 'best path'? | [6] |
| |
88. OSPF is considered to be a distributed routing protocol since routers periodically exchange information with each of their neighbours. Is it possible to have routing protocol that is centralized in nature? How do you think centralized routing protocol would work? Will there be some inherent problems? | [6] |
87. 'DHCP' permits completely automated address assignment'. Justify the statement. | [4] |
| |
88. Expand and explain in detail any three of the following acronyms: OSPF | [6] |
| |
89. Giving suitable examples explain three kinds of classes of an Internet addressing, with special emphasis on the range spanned by each class? | [9] |
| |
90. Why does BGP not exchange routing information periodically as RIP does? | [5] |
| |
91. What is IP Host address? Discuss in detail. | [4] |
| |
92. Explain the following terms: RARP | [2] |
| |
93. How do we reuse IP address using Network Address Translation (NAT) mechanism? | [4] |
94. What is 127.0.0.1? Explain with example. | [4] |
| |
95. What is the difference between a packet and a frame? | [4] |
| |
96. What is MAC Address Filtering? | [4] |
| |
97. What are routing protocols? Compare and contrast different types of protocol. | [6] |
| |
98. Why is Open Shortest Path First (OSPF) protocol required? What kinds of connections does it support? | [6] |
99. Explain the Reverse Address Resolution Protocol (RARP). Why is it required? | [6] |
| |
100. How did CIDR ease the problem of fast depleting Ipv4 addressing? | [4] |
| |
101. What are some important features of DHCP? | [4] |
| |
102. Why is Open Shortest Path First (OSPF) protocol required? What kind of connections does it support? | [6] |
| |
103. How IP addresses are classified? What is the use of classifying IP addresses? What is the possible range of IP addresses for the different classes? | [6] |
| |
104. Write at least three problems associated with Ipv4 addressing. What are some of the solutions that have been proposed to overcome these problems? | [6] |
| |
105. What is ARP cache? What is the normal expiration time of an entry in ARP cache? Why does ARP request message carry the IP address and the link layer address of the sender? | [6] |
| |
106. What is the difference in the subnet mask for a Class A address with 16 bits for the subnet ID and a class B address with 8 bits for the subnet ID? Is the subnet mask 255.255.0.255 valid for a Class A address? | [6] |
| |
107. What is connection-oriented service? Why is it considered reliable? | [6] |
| |
108. Differentiate between ARP and RARP? | [6] |
109. Differentiate between distance vector routing and link state vector routing? | [6] |
| |
110. What is IP address? Why is it needed? What is the difference between public and private IP addresses? | [4] |
| |
111. What is the network prefix of IP address 192.110.50.3/24? Explain the difference between a network IP and a network prefix. | [6] |
102. A network contains two routed subnets: Subnet A and Subnet B. Subnet B contains a Windows 2000 server configured as a DHCP server. This server has scopes created for both Subnet A and Subnet B. Subnet B does not contain DHCP server. The client on Subnet A are not receiving IP addresses from the DHCP server. What is done for enable clients in Subnet A to receive dynamically assigned IP addresses? Choose all that apply. | [6] |
| |
103. Choose any two scenarios from the following in which BGP is recommended: You need a default route to connect to a single ISP. When you need to connect to two or more ISPs. When you are sending traffic through one AS to get to another AS. When you need a simple routing on your internet. | [6] |
| |
104. When is an ARP request packet generated? Describe the various steps that take places when a host receives an ARP request packet? | [6] |
| |
105. A company XYZ has five departments. The company wants to assign a single class B address 167.172.0.0 to its five departments. It wants five different subnets to be created with each subnet having 25 host addresses. Show the steps involved to achieve the above. | [6] |
| |
106. Expand and briefly explain the acronyms PCR SCR MCR and CVDT in terms of Quality of standards parameters. | [4] |
| |
107. What is VOIP? What are the motivations for transmitting voice over IP? | [6] |
| |
108. What is QoS? Discuss the MPLS & DiffServ techniques in WAN network scenario. | [6] |
| |
109. What is VOIP? What are the motivations of transmitting voice over IP? | [6] |
| |
110. What is VOIP? What are the advantages of using VOIP as compared to PSTN? What are basic steps used to setup a VOIO communication channel? | [6] |
| |
111. Discuss in brief the Multiprotocol Label Switching (MPLS). | [4] |
| |
112. What is VOIP? What are the reasons for transmitting voice over IP? | [6] |
| |
113. There is a new version of Internet Protocol (IP) that has been proposed by IETF, to replace the current version. Explain its new important features with special reference to the limitations in the old version. | [18] |
| |
114. What is ICMP? Write at least four functions of ICMP? | [4] |
| |
115. What design features of IPv4 are retained in IPv6? What are the new features that are introduced in IPv6? | [9] |
| |
116. State the difference between any three of the following in brief: Ipv4 and Ipv6. | [6] |
| |
117. Explain briefly, the new features in Ipv6 as compared to Ipv4. | [6] |
| |
118. Explain briefly, how Ipv6 handles multiple headers? What is the purpose of multiple headers? Explain Ipv6 addressing. | [12] |
| |
119. How can IPv4 address be converted to an equivalent IPv6 address? | [4] |
| |
120. What layer protocol is the ICMP? How the ICMP data is passed to the data link layer. | [4] |
| |
121. Describe the role of IPv6 in real time services? | [6] |
| |
122. What is static routing? How it differs from dynamic routing. | [6] |
| |
123. Discuss the reasons behind the definition of IPv6/IPng, including the main new features associated with it. | [6] |
| |
124. Compare QoS support features of IPv6 technology with those of IPv4 technology? | [4] |
| |
125. What is static routing? How it differs from dynamic routing. | [6] |
| |
126. What kinds of messages are generated by ICMP? Briefly describe them. | [6] |
| |
127. How does ICMP software on a host know to which other host it should send an error message? | [6] |
| |
128. How can IPV4 address to be converted to an equivalent IPV6 address? | [4] |
| |
129. How does default routing perform? | [4] |
| |
130. Describe IPv6 with its main features. What is the main problem faced by IPv4 because of which IPV6 has been developed? | [6] |
| |
131. What is DHCP? Is it UDP based or not. What three methods do DHCP servers use for issuing addressing information? | [6] |
| |
132. When is multicasting more useful over broadcasting? | [4] |
| |
133. State the difference between any three of the following in brief: Multicasting and broadcasting. | [6] |
| |
134. What is Internet Multicast Protocol? Explain Internet Group Management Protocol. | [6] |
| |
135. With respect to multicasting scenario, answer the following: i) What should be the MAC address that can be used to send IP packet to a group? ii) How do the hosts get registered to a multicast group? | [8] |
| |
136. Explain, how multicasting and broadcasting differentiate each other. | [6] |
| |
137. What are collision and broadcast domains? | [6] |
| |
138. What is a broadcast IP address? What is IP multicasting? | [4] |
| |
139. What is the purpose IGMP? What is the range of available IP multicast addresses? | [4] |
| |
140. Write short notes on : Multicasting-addressing | [6] |
| |
141. What is the range of available IP multicast addresses? What is the purpose of IGMP? What is an advantage of IGMPv2 over IGMPv1? What information does the router use to do an RPF check? | [6] |
| |
142. What do you think is the role of a network manager? | [4] |
| |
143. Explain briefly about the new technology that combines the advantages of both private network and public network? | [4] |
| |
144. Differentiate between the following pairs: Private key and Public Key. Cookies and Passports | [6] |
| |
145. Write short note on Cookies. | [4] |
| |
146. Explain any three of the following: i) How do Firewalls safeguard the Internet? ii) How do Smurf Attacks cripple Internet Service Providers? iii) How do Viruses work? iv) How do Digital certificates ensure Internet Security? | [4x6] |
| |
147. Write short notes on the following: Working of Proxy Servers | [6] |
| |
148. What is a Proxy Server? Why it is used? | [4] |
| |
149. What is a Firewall? At what layer do they work? What is the main drawback of a firewall? | [4] |
150. Name some packets that are used by SNMP for information transactions | [4] |
| |
151. Describe the concept of Virtual Private Network (VPN). Why is security a concern when using VPN? | [6] |
| |
152. Write the difference between SNMP manager and SNMP agent | [6] |
| |
153. Explain the difference between authentication methods and encryption methods. Give examples of each as a part of your explanation. | [6] |
| |
154. Describe how cookies can be used to store information about a user? | [6] |
| |
155. What is a packet filter that is often used to protect an organization’s computer from unwanted Internet traffic called? Describe the concept in brief? | [4] |
| |
156. What is a malicious code? By which name are they popularly known. | [4] |
| |
157. State the difference between the following in brief: Digital signature and digital certificate. | [6] |
| |
158. Expand and explain in detail any three of the following acronyms: VPN | [6] |
| |
159. What is a Proxy Server? What are its functions? | [4] |
| |
160. What are digital certificates? Explain their role in Internet Security. | [4] |
| |
161. What are Cookies? How are they different from Microsoft Passports? | [6] |
| |
162. What are Firewalls? How do they work? | [4] |
| |
163. What are Viruses? What are the different types of viruses? Explain, how viruses work on Internet? | [8] |
| |
164. Write short notes on: Smurf Attacks | [3] |
| |
165. What the different aspects of Network Security? What do you mean by Accountability and Authorization? | [6] |
| |
166. What is the difference between plain text and cipher text. Explain stream cipher. | [4] |
| |
167. Explain the differences between authentication methods and encryption methods. Give examples of each. | [6] |
| |
168. Describe the concept of VPN. Why is security a concern when using VPN? | [6] |
| |
169. What is a firewall? What are the typical tasks of a firewall? | [6] |
| |
170. Explain the following terms: Virus scanning software | [2] |
| |
171. What is Wired Equivalent Privacy (WEP)? Discuss the Security Issues. | [4] |
| |
172. What is a firewall? Explain with packet filtering concept. | [6] |
| |
173. What are the Internet security threats? What are the factors that constitute a good firewall system? | [6] |
174. Describe the risks involved in Plaintext communication over the Internet? What can be done to ensure that these dangers (risks) are dealt with. | [8] |
| |
175. What is the role played by VPN in the concept of network security? | [4] |
| |
176. What is firewall? Should it come before router or after router in a network? Justify. | [4] |
| |
177. What is IP address spoofing and how could it be defeated? | [4] |
| |
178. What is the difference between passive and active attacks with respect to security threats faced in using the web? | [6] |
| |
179. Describe in detail how public key and private key cryptography are used to provide secure access from a browser to a Web server over the Internet so that a commercial transaction can take place. | [6] |
180. What are the various types of access violations that may lead to the possible attacks, security breaches or information corruption over an internet work? | [6] |
| |
181. What do you understand by IP spoofing? | [4] |
| |
182. What does SNMP enable network managers do, and why is this important? | [4] |
| |
183. What is a firewall? What is the purpose the packet filters and application gateways? | [6] |
| |
184. What are Viruses? What are the different types of viruses? Explain, how viruses work on the Internet? | [6] |
| |
185. Differentiate between stream chipper and block chipper? | [4] |
| |
186. What is the difference between monoalphabetic substitution cipher and polyalphabetic substitution cipher? | [6] |
| |
187. Compare the role of a Firewall with that of a proxy server. | [4] |
| |
188. Define the term encryption and decryption. What are drawbacks of single key encryption? Explain how asymmetric key encryption solves them. | [6] |
| |
189. Explain briefly cookie and its uses. What information does a cookie contain? | [6] |
| |
190. What is IPSec (IP Security Protocol Suite)? How does it similar to SSL? | [6] |
| |
191. What is VPN? What are its salient features? | [4] |
| |
192. What is IP address spoofing and how could it be avoided? | [4] |
| |
193. Why authentication and encryption is required in VPNs? Discuss any protocol of your choice that emphasizes authentication and encryption in VPNs. | [6] |
| |
194. What are the various types of access violations that may lead to the possible attacks, security breaches or information corruption over an internet? | [6] |
| |
195. Write short notes on any three of the following: Denial-of-service Attacks | [6] |
| |
196. Digital certificates | [6] |
| |
197. Explain ‘Server Push technology’. | [4] |
| |
197. How can a web page contain non-textual information (such as images, photographs or signatures)? Which HTML tag is used and how it is used? | [4] |
| |
198. Differentiate between the following pairs: Client side Scripts and Server side Scripts. Java Applets and Java Scripts. | [2x6] |
| |
199. Briefly describe the structure of a Web URL and how they help retrieve Web documents. | [4] |
200. What are Imagemaps and Interactive forms? How do they work? | [4] |
| |
201. How can you use FTP to download and upload files from your computer to another computer on the Internet? Explain in detail how an FTP session works. | [8] |
| |
202. Explain in brief how three most important programming tools associated with Web technologies viz. Java, JavaScript and ActiveX work on the World Wide Web. | [9] |
| |
203. What is a common Gateway Interface Scripts? | [3] |
| |
204. Write short notes on any three of the following: Internet Search Engines | [6] |
| |
205. What do you mean by URL? Explain its three fields. | [4] |
| |
206. Explain the difference between HTTP and HTML | [4] |
| |
207. What is WWW? What is the contribution of JAVA to WWW? | [6] |
| |
208. What is XML and how does XNL compare to SGML and HTML? | [6] |
| |
209. Describe the Common Gateway Interface and server extensions as approaches for integrating databases on the web | [6] |
| |
210. Briefly explain that how can you use TELNET for remote terminal emulation? | [4] |
| |
211. Write short notes on: CGI Scripts | [3] |
| |
212. Explain, how graphic images are embedded in a web page? | [4] |
| |
213. Explain the browser architecture. | [5] |
| |
214. Explain caching in web browsers. | [5] |
| |
215. What is Telnet? | [4] |
| |
216. Describe in brief one method by which web servers can create pages dynamically on demand. | [4] |
| |
217. Why is XML used to publish and exchange database contents? | [4] |
217. What is FTP? How it can be used? | [4] |
218. Explain in brief the important components (title, prologue and links) of the head section of an HTML document. | [6] |
219. What do you understand by Java applets? | [6] |
| |
220. How is Java strongly associated with Internet? | [6] |
| |
221. Explain the following terms: i) URL iii) Telnet | [2x2] |
| |
222. Discuss differences between GET and POST commands of (HTML) web technology? | [6] |
| |
223. Define the terms Web Site, Web Page, Web Server, URL, Home Page and CGI. | [12] |
| |
224. Describe in brief one method by which web servers can create pages dynamically on demand. | [4] |
| |
225. What is XML and how does XML compare to SGML and HTML? | [6] |
| |
226. What is SOAP and why is it important in the context of XML Web Services? | [8] |
| |
227. Differentiate between www, hypertext and hypermedia? | [4] |
| |
228. What are the advantages of client side scripting? | [4] |
| |
229. Why does TELNET protocol require a time sharing operating system? | [6] |
| |
230. What is an Applet? How Applets are invoked? Do applets have constructors? Compare and contrast applets and servlets. | [6] |
| |
231. Describe the role that XSL can play when dynamically generating HTML pages from a relational database. What is SOAP and how does it relate to XML? | [6] |
| |
231. How does FTP work? What is the difference between passive and active FTP? | [6] |
| |
232. How is a pathname and an URL recognized? Discuss at least one way in which pathnames and URLs are similar? | [4] |
233. Explain, what do you understand by CGI script? | [4] |
| |
234. What is the purpose of unpaired img tag in an HTML document? Explain with the help of an example? | [6] |
| |
235. Discuss, how the files can be copied across the network with FTP. What is primary difference between FTP and HTTP? | [6] |
| |
236. Describe the steps involved hen a browser requests for and obtain a web page from a web server? | [6] |
| |
237. What exactly do you means by markup? Explain using a suitable example? | [6] |
| |
238. What are static web pages? How are they different from dynamic web pages? | [4] |
| |
239. Explain in brief the importance of scripting and the main features of Microsoft ASP. Name a common scripting language that is used for web servers. | [6] |
| |
240. What are major differences between XML and HTML coding? | [6] |
| |
241. How are files downloaded using HTTP and FTP protocols? | [6] |
| |
242. What is an Applet? Should applets have constructors? | [4] |
| |
243. Write short notes on: a) HTTP b) Disadvantages of JAVA | [6x2] |
| |
244. Explain what you understand by Common Gateway Interface (CGI). | [4] |
| |
245 Explain how HTTP executes a request initiated by a client on www? | [4] |
| |
246. What is XML and how does XML compare to SGML and HTML? | [6] |
| |
247. Explain how JSP can be used to create web pages? | |
| |
248. In context of e-mail explain: i) e-mail gateway ii) POP Server. | [9x2] |
| |
249. Explain the hierarchy of Usenet Newsgroup. | [4] |
| |
250. Explain any three of the following: i) How is Email delivered over the Internet? ii) How is Email Spam sent and how can it be blocked? iii) What is working of IRC? iv) How does Internet Telephony work? | [6x4] |
| |
251. What is MIME? What are its advantages? | [6] |
| |
252. What is the difference between E-mail server and POP server? What are the versions of POP server currently available? | [6] |
| |
253. In Context of e-mail explain e-mail gateway. | [9] |
| |
254 Explain the POP3 Component and its role in E-Mail Delivery? | [9] |
| |
255. What is email Spam? Explain, how, it can be blocked? | [6] |
| |
256. What is working of IRC? | [4] |
| |
257. What is the difference between E-mail server and POP server? Describe how email is stored and transmitted by POP and SMTP servers. | [6] |
| |
258. Explain, how Multicast IP broadcasts travel along the Mbone. | [4] |
| |
259 How does Real Player streaming audio work over the Internet? | [4] |
| |
260. Write the steps involved in File Compression. | [5] |
| |
261. Write short notes on any three of the following: i) Virtual Reality | [6] |
| |
| |
262. Explain MPEG-1 and MPEG-2 as two audio coding standards. | [4] |
| |
| |
263. Comment on the following statement making special reference to differences between JPEG and MPEG standards. “There is a perceptible need for data compression as per certain standards as the amount and type of data to be transferred over a network increases”. | [6] |
| |
264. What is virtual reality? Describe its applications. | [4] |
| |
265 What is file compression? How is it achieved? | [4] |
| |
266. What is multimedia? What are the requirements multimedia? Explain standardized data formats for Multimedia-based programming. | [9] |
| |
267. What are the reasons for using JPEG? What are the disadvantages of JPEG? | [6] |
| |
268. What is the MPEG-1 standard? | [4] |
| |
269. Define GIF and JPEG image formats. | [6] |
| |
270. Why do you require compression? What is the difference between software-based MPEG and hardware-based MPEG? | [6] |
No comments:
Post a Comment