IT1404: Internet and World Wide Web: University of Colombo School of Computing
IT1404: Internet and World Wide Web: University of Colombo School of Computing
Important Instructions :
• The duration of the paper is 2 (two) hours.
• The medium of instruction and questions is English.
• The paper has 50 questions and 10 pages.
• All questions are of the MCQ (Multiple Choice Questions) type.
• All questions should be answered.
• Each question will have 5 (five) choices with one or more correct
answers.
• All questions will carry equal marks.
• There will be a penalty for incorrect responses to discourage guessing.
• The mark given for a question will vary from 0 to +1 (All the correct choices
are marked & no incorrect choices are marked).
• Answers should be marked on the special answer sheet provided.
• Note that questions appear on both sides of the paper.
If a page is not printed, please inform the supervisor immediately.
• Mark the correct choices on the question paper first and then transfer
them to the given answer sheet which will be machine marked.
Please completely read and follow the instructions given on
the other side of the answer sheet before you shade your
correct choices.
1
1) The Internet
2) Internet2
2
8) Select the set(s) of words that include(s) only e-mail clients from the following.
10) Select the correct statement(s) related to Uniform Resource Locator (URL).
(a) To make the task of marking/remembering pages of interest most browsers have a
bookmarking facility.
(b) Bookmarks are used to keep track of the user requests to send a customized page
to a returning user.
(c) A bookmark is a string of characters and numbers that a web server sends to the
browser to uniquely identify a user.
(d) Internet Explorer provides the facility to organize the bookmarks according to
categories.
(e) Firefox allows users to have sub categories under the main category of
bookmarks.
13) Identify the standard port(s) used by SMTP from among the following.
3
14) Consider the following incomplete statement.
There are open source HTML editors with GUIs. ___________ is one such open source editor
available for Linux.
15) Select the correct set(s) of HTML tags which deal(s) with tables.
16) What is/are the correct HTML code(s) for creating a hyperlink?
17) What is/are the correct HTML code(s) for inserting an image?
(i) Mamma.com is a global meta search engine that brings forth refined search results from
the web’s top search engines.
(ii) Kngine.com is a Web 3.0 Search Engine designed to provide customized meaningful
search results.
(iii) scholar.google.com is a search engine specific for scholarly articles.
(a) (i) and (iii) only. (b) (i) and (ii) only. (c) (ii) and (iii) only.
(d) (iii) only. (e) All.
19) Select the correct statement(s) regarding Search Engine Optimization (SEO).
(a) Meta tags such as keyword tags are the most important factor in search engine
rankings
(b) Including keywords and phrases within the body of the page increases search
engine rankings.
(c) Getting links from link farms or web sites unrelated to a site's theme will
increase search engine rankings.
(d) Web pages must contain a descriptive name with the <title> tag.
(e) Web sites must be constantly resubmitted to search engines to retain rankings.
4
20) Select the correct statement(s) regarding Java programming language.
22) Which of the following search statements best locate(s) information on the Web on purchasing a
used car?
(a) (car and automobile and vehicle) or (buy and purchase and used)
(b) (car and automobile and vehicle) and (buy or purchase) and used
(c) (car or automobile or vehicle) and (buy and purchase) or used
(d) (car or automobile or vehicle) and (buy or purchase or used)
(e) (car or automobile or vehicle) and (buy or purchase) and used
23) Select the correct statement(s) about sending attachments via e-mail.
(a) Audio files need to be encoded as text, so that they can be included in an e-mail
message.
(b) Graphics are not required to be encoded as text in order to be included in an e-
mail message.
(c) Multipurpose Internet Mail Extensions (MIME) is the standard method to encode
e-mail attachments.
(d) Decoding of the e-mail attachments is done by the Internet Service Providers
(ISPs).
(e) There are ways to reduce the size of an attachment before sending it through an
e-mail.
24) Match the protocols given in column X with the most suitable description from column Y.
Column X Column Y
i IMAP4 A decides which path an out-going e-mail message takes on the Internet
ii POP3 B keeps e-mail on the server after downloading a copy to read locally
iii SMTP C is not a protocol dedicated for e-mail communications, but it can be used
for accessing your mailbox
iv HTTP D handles incoming e-mail messages by generally downloading them from
the mail server to a local computer and deleting them
(a) i-C, ii-A, iii- B, iv-D (b) i-A, ii-C, iii- D, iv-B
(c) i-A, ii-D, iii- B, iv-C (d) i-B, ii-A, iii- D, iv-C
(e) i-B, ii-D, iii- A, iv-C
5
25) Select the correct statement(s) regarding mailing lists.
(a) Phishing is typically carried out by e-mail to acquire sensitive information such
as usernames, passwords and credit card details by masquerading as a
trustworthy entity.
(b) Phishing takes the form of fraudulent e-mails that ask one to "confirm your
password", or "verify your account", or "confirm your identity."
(c) It is recommended to follow a link that asks one to enter personal information
only if that e-mail contains the official logo of the company.
(d) Most legitimate banks will request sensitive information such as usernames,
passwords and credit card details by e-mail.
(e) It is recommended to type web addresses directly into the browser when
following a link of a suspicious e-mail.
(a) E-mail filtering is an e-mail activity in which the sender address and other parts
of the e-mail header are altered to appear as though the e-mail originated from a
different source.
(b) E-mail filtering is the processing of e-mail to organize it according to specified
criteria.
(c) A Common use for mail filters includes removal of spam
(d) Messages from individuals/groups can be directed into a special folder using e-
mail filters.
(e) By applying filter to the Inbox, you can view the messages sent by a particular
person.
28) FTP
29) Select the correct statement(s) with regards to Secure Shell (SSH) Protocol.
(a) The TCP/IP standard is a flexible communication protocol designed for local and
global network communication.
(b) It is designed to be a secure communication mechanism against external attacks.
(c) SSH does not provide the users with secure connections over networks.
(d) The SSH allows your local computer to connect to a remote computer across the
Internet.
(e) It is a widely used efficient standard in data communication.
6
30) Identify the application sets that help users to access remote computers.
(a) (i) only. (b) (i) and (ii) only. (c) (i) and (iii) only.
(d) (ii) and (iii) only. (e) All.
33) eCommerce websites like Amazon.com, ebay.com, paypal.com always use most Secured Socket
Layer (SSL) protocols. Which of these statements is(are) INCORRECT with regard to such
websites?
(a) They maintain secure shopping carts.
(b) They always prevent hackers’ actions during transaction.
(c) They guarantee buyers protection.
(d) They guarantee quick shipping.
(e) They save credit/debit card numbers securely.
Column X Column Y
(A) play interactive computer games i Facebook
(B) webcast TV and Radio stations ii BBC
(C) personal networking iii yahoo LAUNCHcast
(D) online news iv Miniclips
(a) (A) – i, (B) – ii, (C) – iii, (D) – iv (b) (A) – i, (B) – iii, (C) – ii, (D) – iv
(c) (A) – ii, (B) – i, (C) – iii, (D) – iv (d) (A) – iv, (B) – iii, (C) – i, (D) – ii
(e) (A) – iv, (B) – ii, (C) – iii, (D) – i
7
36) Select the services freely available on the web from among the following.
.
(a) Blog Space (b) Content Management Systems (CMS)
(c) Wiki (d) Online money
(e) Rich Site Summary (RSS)
Which of the above messages indicate(s) that a computer is infected with a computer virus?
(a) (A), (B) and (C) (b) (A), (C) and (D)
(c) (A), (D) and (E) (d) (C), (D) and (E)
(e) (C), (E) and (F)
38) Identify the information typically displayed in a digital certificate from among the following.
40) Which of the following is(are) unethical/illegal practices related to email usage?
8
42) Identify the correct statement(s) related to data encryption.
43) “Green IT refers to environmentally sustainable IT”. Select approaches to Green IT from among
the following.
44) Which of the following is(are) NOT related to security in Internet access ?
45) Consider the following remarks about using social networks on the web.
(A) Any social network user is authenticated to upload his/her photograph to a network.
(B) Any social network user is authenticated to upload his/her friend’s photograph to a
network.
(C) Any social network user is authenticated to upload his/her group photograph which
includes few unknown people.
(a) (A) communication (B) encryption (C) unauthorized (D) email address
(b) (A) authentication (B) decryption (C) authentication (D) email address
(c) (A) communication (B) authentication (C) authorized (D) username
(d) (A) communication (B) authentication (C) unauthorized (D) username
(e) (A) encryption (B) communication (C) authentication (D) user name
9
47) Instant Messaging (IM) is a real-time communication method that allows sending and receiving
instant messages over the Internet.
Which of the following is(are) facilitated by IM clients on the web?
48) Which of the following statements is(are) correct in relation to the FTP service?
(a) FTP can be used without establishing a connection between the FTP client and
the FTP server computers.
(b) Typically, the FTP client and the FTP server involved are managed by same
party.
(c) Client must have a separate login identifier and a password to establish an FTP
connection to a server computer.
(d) FTP servers can be configured to allow general public to exchange files by using
a common identified login and a password.
(e) Convention is to use email address as the password so that the server
administrator can contact users via email.
49) Which of the following sets do/does NOT contain free virus guard products?
********
10