Anna University Trichy, CS, Internet Computing, Nov / Dec , Question Paper. CSInternet Computing Question Bank.» CSInternet Computing Question Bank. Question Bank Provided by. Kings College of Engineering. Mobile Pervasive Computing (MC) (CS ) (CS72) – Question Bank 1 Internet Computing (ANNA UNIV – Trichy) (CS ) To get 7th sem Lecture notes.

Author: Golkree Kazigor
Country: Ecuador
Language: English (Spanish)
Genre: Software
Published (Last): 19 April 2008
Pages: 187
PDF File Size: 14.79 Mb
ePub File Size: 8.30 Mb
ISBN: 713-7-33410-617-9
Downloads: 89428
Price: Free* [*Free Regsitration Required]
Uploader: Sasar

An agreed-upon format for transmitting data between two devices. It is a simple page description language, which enables document creation for theweb.

What is the usage of CSS? Capability to process forms and prepares output based on form input. What are the style precedence rules when using multiple approaches?


What is a protocol? Session -It manages and tracks individual user sessions. What are the sequences of steps for each HTTP request from a client to the server? Style information includes font attributes such as type size, special effects bold,italic,underlinecolor and alignment.

What is mean by firewall A firewall is a piece of network hardware that serves as a secure gate way between an internal network and internet. It is a standard for accessing different databse systems. It is the exchange of information in a standard format between computers without any human intermediary. The protocol determines the following: As a moniker, ActiveX can be very confusing because it applies to a whole set of COM-based technologies.


Demand reply functions An optional,yet key element in architects a distributed systems around XML. Its protect the internal network from unauthorized access or activity. Placing the data inside a package of headers is known as encapsulation. A session is basically a conversation between a browser and a server. It is a specification for identifying an object Such as a file, newsgroup, CGI program or e-mail address by indicating the exact location on the internet. XML Namespace is a simple technology solution that allows elements and attribute name to be distinguished from the similarity named elements and attributes of other XML users.

An ActiveX control can be automatically downloaded and executed by a Web browser.

Conversions for representing remote procedure calls and response. GE Computer Programming 4. Port numbers can jotes from 1 tohowever ports 1 to are reserved. Another difference between Java applets and ActiveX controls is that Java applets can be written to run on all platforms, whereas ActiveX controls are currently limited to Windows environments.

Environmental science and engineering Questions B Server -It controls behavior of your web server 4. Each process already inherits these two handles already open. Rules for exchanging application 3. Navigator plug-ins are based on MIME filetypes. Most operating environments, such as MS- Windows, provide an API so that programmers internnet write applications consistent with the operating environment.

A well-designed applet can be invoked from many different applications. HTTP specification requires that the URL data should be encoded in such a way that it can be used on almost any hardware and software platforms.


What is meant by loop back address? It begins on the client nootes with the browser sending a request to the web server for a document. A Web browser is a program that displays the web pages it retrieves. To control this risk, Microsoft developed a registration system so that browsers can identify and authenticate an ActiveX control before downloading it. All the above technologies can save information for the current session for a particular user visiting a site.

The page directive defines information that will be globally available for that Java Server Page, 1. Scriptlets enable you to create small, reusable web applications that can be used in any web page.

For modeling inter-document linkages 4.

CS1401-Internet Computing Question Bank

What is meant by Plug-in? It protects the internal network from unauthorized access or activity, Why are the protocols layered? Ifnot,it can be return a message indicating an error in the incoming format.

It is Internet Group Management protocol. A set of routines, protocols, and tools for building software applications. A zone that enables the server to direct traffic to itself.

What is the purpose of routers?