0% found this document useful (0 votes)
109 views10 pages

IT1404: Internet and World Wide Web: University of Colombo School of Computing

The document is a multiple choice question paper for an exam on IT1404: Internet and World Wide Web. It contains 19 questions related to topics on the internet and web technologies. The questions cover topics such as internet protocols, internet infrastructure, web browsers, HTML, URLs, and search engines. Students are instructed to choose the correct answers from the multiple choice options provided for each question and mark their responses on the answer sheet.

Uploaded by

Rochina Pasquual
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views10 pages

IT1404: Internet and World Wide Web: University of Colombo School of Computing

The document is a multiple choice question paper for an exam on IT1404: Internet and World Wide Web. It contains 19 questions related to topics on the internet and web technologies. The questions cover topics such as internet protocols, internet infrastructure, web browsers, HTML, URLs, and search engines. Students are instructed to choose the correct answers from the multiple choice options provided for each question and mark their responses on the answer sheet.

Uploaded by

Rochina Pasquual
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 10

UNIVERSITY OF COLOMBO, SRI LANKA

UNIVERSITY OF COLOMBO SCHOOL OF COMPUTING

DEGREE OF BACHELOR OF INFORMATION TECHNOLOGY (EXTERNAL)


st
Academic Year 2010/2011 – 1 Year Examination – Semester 1

IT1404: Internet and World Wide Web


Multiple Choice Question Paper

06th March, 2011


(TWO HOURS)

Important Instructions :
• The duration of the paper is 2 (two) hours.
• The medium of instruction and questions is English.
• The paper has 50 questions and 10 pages.
• All questions are of the MCQ (Multiple Choice Questions) type.
• All questions should be answered.
• Each question will have 5 (five) choices with one or more correct
answers.
• All questions will carry equal marks.
• There will be a penalty for incorrect responses to discourage guessing.
• The mark given for a question will vary from 0 to +1 (All the correct choices
are marked & no incorrect choices are marked).
• Answers should be marked on the special answer sheet provided.
• Note that questions appear on both sides of the paper.
If a page is not printed, please inform the supervisor immediately.
• Mark the correct choices on the question paper first and then transfer
them to the given answer sheet which will be machine marked.
Please completely read and follow the instructions given on
the other side of the answer sheet before you shade your
correct choices.

1
1) The Internet

(a) always provides a secure and reliable way of transaction.


(b) is the best example for the largest computer in the world.
(c) uses the internet protocol suite that is commonly known as TCP/IP.
(d) is an open global network of interconnected computer networks.
(e) is also called the semantic web of the future.

2) Internet2

(a) is a single network administered by the University Corporation for Advanced


Internet Development (UCAID).
(b) is a partnership between universities, corporations and government agencies.
(c) actively engages the research community in the development of important new
technology.
(d) is a partnership between American universities only.
(e) can be used for high speed data transfer purposes.

3) Select the correct statement(s) related to newsgroups.

(a) Newsgroups provide an interface for group discussions.


(b) Newsgroups can be considered as electronic whiteboards.
(c) Usenet is a world-wide distributed discussion system consisting of a set of
newsgroups.
(d) Newsgroup is the best internet facility to send a message to one or a very few
individuals.
(e) A newsgroup is a continuous discussion about a particular topic.

4) Select the correct statement(s) related to packet switching.

(a) ARPANET is the first operational packet switching network.


(b) CERN is the second operational packet switching network
(c) Packet switching technique is used by the Internet for data transmission.
(d) Packet switching technique allows multiple computers to communicate without
delay as the computers divide data into small packets.
(e) Packet switching systems do not require additional communication software to
ensure the proper delivery of data.

5) Which of the following IP addresses is/are valid in IPV4 format?


(a) 192.248.16.51 (b) 192.210.18
(c) 192.248.16.290 (d) 192.248. 257.90
(e) 192. 210.16.90

6) Internet bandwidth is usually measured in

(a) Kb. (b) Kbps. (c) Mbps.


(d) MHz. (e) GHz.

7) Select the incompatible set(s) of words from among the following.

(a) Google, Firefox, Internet Explorer


(b) Altavista, Kngine, Mamma
(c) MSN Search, Eudora, Hotbot
(d) Opera, Firefox, Safari
(e) Apache, IIS, CERN Httpd

2
8) Select the set(s) of words that include(s) only e-mail clients from the following.

(a) Eudora, Thunderbird, Outlook Express


(b) Hotbot, Lycos, Eudora
(c) Gmail, Silverlight, Thunderbird
(d) Yahoo, Outlook Express, Firefox
(e) Yahoo. Gmail, Hotbot

9) Which of the following statements is/are correct in relation to NCSA Mosaic?

(a) NCSA Mosaic is a Web 2.0 search engine.


(b) NCSA Mosaic has a graphical user interface.
(c) NCSA Mosaic was the first platform independent web browser.
(d) Origin of the Internet Explorer can be traced to the NCSA Mosaic.
(e) NCSA Mosaic is a proprietary Internet web browser developed by Apple Inc

10) Select the correct statement(s) related to Uniform Resource Locator (URL).

(a) A URL gives a unique identifier to a web document.


(b) ftp://www.bit.lk/index.html is a valid URL.
(c) A URL tells the browser the name of the resource to be retrieved.
(d) In the URL http://www.bit.lk/index.html, www.bit.lk refers to the domain name.
(e) In the URL http://www.bit.lk/index.html, the index.html is part of the domain
name.

11) Select the correct statement(s) about Bookmarks.

(a) To make the task of marking/remembering pages of interest most browsers have a
bookmarking facility.
(b) Bookmarks are used to keep track of the user requests to send a customized page
to a returning user.
(c) A bookmark is a string of characters and numbers that a web server sends to the
browser to uniquely identify a user.
(d) Internet Explorer provides the facility to organize the bookmarks according to
categories.
(e) Firefox allows users to have sub categories under the main category of
bookmarks.

12) Select the correct statement(s) about HTML.

(a) HTML is case insensitive about tags.


(b) HTML ignores the case of text between the tags <H2> and </H2>.
(c) HTML ignores extra white spaces in the document.
(d) The browser can display a document in a different format from how it appears in
the HTML document.
(e) HTML alters the case of the information in the document.

13) Identify the standard port(s) used by SMTP from among the following.

(a) 25 (b) 80 (c) 100


(d) 110 (e) 115

3
14) Consider the following incomplete statement.

There are open source HTML editors with GUIs. ___________ is one such open source editor
available for Linux.

Fill in the blank with appropriate word(s).

(a) Frontpage (b) Bluefish (c) Dreamweaver


(d) Notepad (e) KompoZer

15) Select the correct set(s) of HTML tags which deal(s) with tables.

(a) <table><head><tfoot> (b) <table><tr><td>


(c) <table><tr><tt> (d) <tr><td><th>
(e) <thead><body><td>

16) What is/are the correct HTML code(s) for creating a hyperlink?

(a) <a url=" http://ucsc.cmb.ac.lk/ "> UCSC Home Page</a>


(b) <a src=" http://ucsc.cmb.ac.lk/ "> UCSC Home Page </a>
(c) <a href="http://ucsc.cmb.ac.lk/"> UCSC Home Page </a>
(d) <a name=" http://ucsc.cmb.ac.lk/ "> UCSC Home Page </a>
(e) <a> http://ucsc.cmb.ac.lk/ </a>

17) What is/are the correct HTML code(s) for inserting an image?

(a) <img href="tree.gif />


(b) <image src="tree.gif" />
(c) <img src="tree.gif" />
(d) <image src="tree.gif" alt="Apple tree" />
(e) <img src="tree.gif" alt="Oak tree" />

18) Consider the following statements about search engines.

(i) Mamma.com is a global meta search engine that brings forth refined search results from
the web’s top search engines.
(ii) Kngine.com is a Web 3.0 Search Engine designed to provide customized meaningful
search results.
(iii) scholar.google.com is a search engine specific for scholarly articles.

Which of the following is/are true in relation to the above statements?

(a) (i) and (iii) only. (b) (i) and (ii) only. (c) (ii) and (iii) only.
(d) (iii) only. (e) All.

19) Select the correct statement(s) regarding Search Engine Optimization (SEO).

(a) Meta tags such as keyword tags are the most important factor in search engine
rankings
(b) Including keywords and phrases within the body of the page increases search
engine rankings.
(c) Getting links from link farms or web sites unrelated to a site's theme will
increase search engine rankings.
(d) Web pages must contain a descriptive name with the <title> tag.
(e) Web sites must be constantly resubmitted to search engines to retain rankings.

4
20) Select the correct statement(s) regarding Java programming language.

(a) A Java program can be embedded in an HTML document.


(b) HTML document can contain a link to a Java program.
(c) Java is a machine independent programming language.
(d) Java was invented by the Sun Microsystems.
(e) There is a particular class of Java applications called JavaScripts.

21) Select correct statement(s) regarding PHP.

(a) A PHP code can be embedded in an HTML document.


(b) PHP is used as a server-side programming language.
(c) PHP runs on the web browser when a web page is requested.
(d) PHP is an open-source programming language to generate dynamic HTML
pages.
(e) A PHP program can generate different HTML pages depending on the input that
it gets.

22) Which of the following search statements best locate(s) information on the Web on purchasing a
used car?

(a) (car and automobile and vehicle) or (buy and purchase and used)
(b) (car and automobile and vehicle) and (buy or purchase) and used
(c) (car or automobile or vehicle) and (buy and purchase) or used
(d) (car or automobile or vehicle) and (buy or purchase or used)
(e) (car or automobile or vehicle) and (buy or purchase) and used

23) Select the correct statement(s) about sending attachments via e-mail.

(a) Audio files need to be encoded as text, so that they can be included in an e-mail
message.
(b) Graphics are not required to be encoded as text in order to be included in an e-
mail message.
(c) Multipurpose Internet Mail Extensions (MIME) is the standard method to encode
e-mail attachments.
(d) Decoding of the e-mail attachments is done by the Internet Service Providers
(ISPs).
(e) There are ways to reduce the size of an attachment before sending it through an
e-mail.

24) Match the protocols given in column X with the most suitable description from column Y.

Column X Column Y
i IMAP4 A decides which path an out-going e-mail message takes on the Internet
ii POP3 B keeps e-mail on the server after downloading a copy to read locally
iii SMTP C is not a protocol dedicated for e-mail communications, but it can be used
for accessing your mailbox
iv HTTP D handles incoming e-mail messages by generally downloading them from
the mail server to a local computer and deleting them

(a) i-C, ii-A, iii- B, iv-D (b) i-A, ii-C, iii- D, iv-B
(c) i-A, ii-D, iii- B, iv-C (d) i-B, ii-A, iii- D, iv-C
(e) i-B, ii-D, iii- A, iv-C

5
25) Select the correct statement(s) regarding mailing lists.

(a) Depending on how a mailing list is configured, it can be an online newsletter.


(b) The three general types of mailing lists are, moderated lists, unmoderated lists
and one way lists.
(c) One way lists are used to distribute information from a central source only.
(d) e-newsletter is an unmoderated mailing list.
(e) Most lists are managed by Multi Level Marketing (MLM) Programs.

26) Select the incorrect statement(s) related to phishing.

(a) Phishing is typically carried out by e-mail to acquire sensitive information such
as usernames, passwords and credit card details by masquerading as a
trustworthy entity.
(b) Phishing takes the form of fraudulent e-mails that ask one to "confirm your
password", or "verify your account", or "confirm your identity."
(c) It is recommended to follow a link that asks one to enter personal information
only if that e-mail contains the official logo of the company.
(d) Most legitimate banks will request sensitive information such as usernames,
passwords and credit card details by e-mail.
(e) It is recommended to type web addresses directly into the browser when
following a link of a suspicious e-mail.

27) Select the correct statement(s) about e-mail filtering.

(a) E-mail filtering is an e-mail activity in which the sender address and other parts
of the e-mail header are altered to appear as though the e-mail originated from a
different source.
(b) E-mail filtering is the processing of e-mail to organize it according to specified
criteria.
(c) A Common use for mail filters includes removal of spam
(d) Messages from individuals/groups can be directed into a special folder using e-
mail filters.
(e) By applying filter to the Inbox, you can view the messages sent by a particular
person.

28) FTP

(a) pomotes sharing of files over the internet only.


(b) allows users from different file storage schemes and different operating systems.
(c) enables indirect or implicit access to computers.
(d) increases file download speed from internet.
(e) provides a reliable and efficient way of data transfer between two computers.

29) Select the correct statement(s) with regards to Secure Shell (SSH) Protocol.

(a) The TCP/IP standard is a flexible communication protocol designed for local and
global network communication.
(b) It is designed to be a secure communication mechanism against external attacks.
(c) SSH does not provide the users with secure connections over networks.
(d) The SSH allows your local computer to connect to a remote computer across the
Internet.
(e) It is a widely used efficient standard in data communication.

6
30) Identify the application sets that help users to access remote computers.

(a) Windows Live Messenger, Yahoo Messenger, Google Talk


(b) Yahoo Messenger, Google Talk, Skype
(c) Skype, VNC, Team Viewer, Windows Remote Desktop
(d) Team Viewer, Windows Remote Desktop Connection, SSH
(e) SSH, VNC, Skype

31) Consider the following statements in relation to eLearning.


i. It is a method using any form of a technology enhanced learning mechanism.
ii. It is a way of enhancing traditional face-to-face teaching by transferring some of
the content and interaction designed for classroom situations to electronic means.
iii. It is a whole new model of learning in which some of the traditional pedagogical
assumptions must be questioned.

Which of the above statements is (are) correct?

(a) (i) only. (b) (i) and (ii) only. (c) (i) and (iii) only.
(d) (ii) and (iii) only. (e) All.

32) What data communication type carries longest wireless signals?

(a) WiMAX (b) Bluetooth (c) IR


(d) WiFi N (e) WiFi G

33) eCommerce websites like Amazon.com, ebay.com, paypal.com always use most Secured Socket
Layer (SSL) protocols. Which of these statements is(are) INCORRECT with regard to such
websites?
(a) They maintain secure shopping carts.
(b) They always prevent hackers’ actions during transaction.
(c) They guarantee buyers protection.
(d) They guarantee quick shipping.
(e) They save credit/debit card numbers securely.

34) Consider the following URLs.


news.lk, ucsc.lk, vle.bit.lk, schoolnet.lk
Select correct statement(s) related to the above URLs.

(a) All belong to same sub domain.


(b) All belong to same domain.
(c) news.lk and ucsc.lk belongs to same domain.
(d) ucsc.lk and vle.bit.lk belongs to same domain.
(e) Any of above pair does not belong to the same domain.

35) Match column X with Y.

Column X Column Y
(A) play interactive computer games i Facebook
(B) webcast TV and Radio stations ii BBC
(C) personal networking iii yahoo LAUNCHcast
(D) online news iv Miniclips

(a) (A) – i, (B) – ii, (C) – iii, (D) – iv (b) (A) – i, (B) – iii, (C) – ii, (D) – iv
(c) (A) – ii, (B) – i, (C) – iii, (D) – iv (d) (A) – iv, (B) – iii, (C) – i, (D) – ii
(e) (A) – iv, (B) – ii, (C) – iii, (D) – i

7
36) Select the services freely available on the web from among the following.
.
(a) Blog Space (b) Content Management Systems (CMS)
(c) Wiki (d) Online money
(e) Rich Site Summary (RSS)

37) Consider the following messages.

(A) Programs do not work as usual!


(B) Dark Blue display screen with white printed error message!
(C) Corrupted and missing files!
(D) Internet connection speed is slowing down!
(E) Unreasonable reduction of hard disk space!
(F) System fails to boot unexpectedly!

Which of the above messages indicate(s) that a computer is infected with a computer virus?

(a) (A), (B) and (C) (b) (A), (C) and (D)
(c) (A), (D) and (E) (d) (C), (D) and (E)
(e) (C), (E) and (F)

38) Identify the information typically displayed in a digital certificate from among the following.

(a) Details of the issuer (b) Salary of the owner/holder


(c) PIN (d) A validity period
(e) The public key of the owner

39) Identify non secure protocols from among the following.

(a) SET (b) FTP (c) HTTP


(d) SSL (e) SSH

40) Which of the following is(are) unethical/illegal practices related to email usage?

(a) Use of company email address for all email solutions


(b) Not changing the original wording in forwarding or re-posting a message
(c) Sending chain letters using email
(d) Sending viruses as attachments via email
(e) An employee checking the email messages of an employer

41) Consider of the following statements.


(A) X copies some images from the web and includes in his article.
(B) Y creates a web page and creates links to some other websites found on the web.
(C) Z extracts some facts from an article on the web and includes the facts in his article by
rewording.
Which of the above actions is(are) always ethical/legal?

(a) (A) only. (b) (C) only.


(c) (B) and (C) only. (d) (A) and (C) only.
(e) None.

8
42) Identify the correct statement(s) related to data encryption.

(a) It is the process of correctly identifying the parties involved in a communication


by each party.
(b) In secret key cryptography, two different keys are used to encrypt and decrypt
data.
(c) In public key cryptography, each public party is given a separate key to encrypt
data.
(d) Public key cryptography is more practical than secret key cryptography.
(e) Reversed usage of keys in public key cryptography enables digital signature.

43) “Green IT refers to environmentally sustainable IT”. Select approaches to Green IT from among
the following.

(a) Computer virtualization


(b) Terminal servers
(c) Power management
(d) Operating system of the computer
(e) Type of computer monitor

44) Which of the following is(are) NOT related to security in Internet access ?

(a) Linux operating system (b) Hardware firewalls


(c) Software firewalls (d) NTFS file system
(e) Virus Guards

45) Consider the following remarks about using social networks on the web.

(A) Any social network user is authenticated to upload his/her photograph to a network.
(B) Any social network user is authenticated to upload his/her friend’s photograph to a
network.
(C) Any social network user is authenticated to upload his/her group photograph which
includes few unknown people.

Select correct statement(s) related to the above remarks.

(a) (A) is always true.


(b) (A) and (B) are always true.
(c) (A) is always true and (B) is not always true.
(d) (A), (B) and (C) are always true.
(e) (A) is always true and (B) and (C) are not always true.

46) Consider the following incomplete paragraph.

In ……(A)……………..the most important initial step is ……(B)……….. If a system grants


access to ……(C)……….user, then that user will gain all the information associated with the
legitimate user and even do transactions by suspending the legitimate user. The most basic
authentication mechanism is based on ……..D)…….and password pair.

(a) (A) communication (B) encryption (C) unauthorized (D) email address
(b) (A) authentication (B) decryption (C) authentication (D) email address
(c) (A) communication (B) authentication (C) authorized (D) username
(d) (A) communication (B) authentication (C) unauthorized (D) username
(e) (A) encryption (B) communication (C) authentication (D) user name

9
47) Instant Messaging (IM) is a real-time communication method that allows sending and receiving
instant messages over the Internet.
Which of the following is(are) facilitated by IM clients on the web?

(a) Video conferencing


(b) File transfer
(c) Internet radio
(d) Free Worldwide PC-to-Phone calls
(e) Voicemail

48) Which of the following statements is(are) correct in relation to the FTP service?

(a) FTP can be used without establishing a connection between the FTP client and
the FTP server computers.
(b) Typically, the FTP client and the FTP server involved are managed by same
party.
(c) Client must have a separate login identifier and a password to establish an FTP
connection to a server computer.
(d) FTP servers can be configured to allow general public to exchange files by using
a common identified login and a password.
(e) Convention is to use email address as the password so that the server
administrator can contact users via email.

49) Which of the following sets do/does NOT contain free virus guard products?

(a) Nortan, Macafee, AVG, KasperSky


(b) Macafee, AVG, Windows Security Essential, KasperSky
(c) Macafee, Windows Security Essential, Nortan, KasperSky
(d) AVG, Windows Security Essential, Nortan, Avira
(e) Windows Security Essential, Avira, KasperSky

50) Consider the following statements.


A. Sedar uses his email contact list to market an upcoming musical concert.
B. Udeni uses his free yahoo email account for business purposes.
C. Manju sells his old video camera through eBay.
D. Yasiru buys a newly released book through Amazon from a Hong Kong seller.
E. Anusha uses skype to make free calls to his business partner in United Kingdom.

Which of the above online actions is(are) unethical/illegal?

(a) (A) only. (b) (A), (B) only.


(c) (A), (D) only. (d) (C), (D) only.
(e) None.

********

10

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy