0% found this document useful (0 votes)
5 views4 pages

Long Answer of HTML

The document provides an overview of the Internet, including its advantages and disadvantages, and distinguishes between the Internet, intranet, and extranet. It covers various topics such as the World Wide Web, TCP vs. UDP, Internet Protocol, encryption methods, firewalls, digital signatures, HTML structure, and form elements. Additionally, it explains how to create links between web pages using the <a> tag.

Uploaded by

bloodbank3001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views4 pages

Long Answer of HTML

The document provides an overview of the Internet, including its advantages and disadvantages, and distinguishes between the Internet, intranet, and extranet. It covers various topics such as the World Wide Web, TCP vs. UDP, Internet Protocol, encryption methods, firewalls, digital signatures, HTML structure, and form elements. Additionally, it explains how to create links between web pages using the <a> tag.

Uploaded by

bloodbank3001
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4

Long answer

Unit 1

1. What is Internet? Explain the advantages and disadvantages of Internet.


2. Write a note on internet, intranet and extranet.

Answer

1.Internet is a global network of billions of computers and other electronic devices that are
connected together. It allows users to access almost any information, communicate with anyone
else in the world, and do much more. The advantages of the Internet include the ability to send and
receive instant electronic messages through email, access to information on a wide range of topics,
and availability 24 hours a day, 7 days a week. However, there are also some disadvantages such as
the potential for theft of personal information through electronic messages sent over the Internet.

2.Internet is a global network of computers and other electronic devices that are connected
together. Intranet is a private network that is used within an organization to share information and
resources among employees. Extranet is an extension of an intranet that allows authorized external
users to access certain parts of an organization’s intranet.

Unit 2

3. Write a note on www.

4. Write difference between TCP and UDP.

5. Explain Internet Protocol.

6. Write a note on applications of internet.

Answer

3. The World Wide Web (WWW) is a system of interlinked hypertext documents accessed via the
internet. It allows users to access and share information through web pages, websites, and other
resources. However, there are some disadvantages to using the WWW, such as difficulty in
prioritizing and filtering information, no guarantee of finding what one is looking for, danger in
case of overload of information, lack of quality control over available data, and no regulation.

4. TCP (Transmission Control Protocol) and UDP (User Datagram Protocol) are both transport layer
protocols used for communication over the internet. The main difference between them is that
TCP provides reliable delivery services by ensuring that all packets are received in order and
without errors, while UDP does not provide reliability but offers faster transmission speeds.

5. Internet Protocol (IP) is a set of rules that governs the communication and exchange of data over
the internet. Both the sender and receiver must follow the same protocols to communicate
data. When a user requests a web page on the internet, somewhere in the world, the server
processes that request and sends back an HTML Page to that user using a protocol called HTTP.
The HTTP then requests the TCP layer to set up the required connection and send the HTML file.
The TCP breaks down data into small packets and forwards it toward IP layer which sends
packets to their destination through different routes.

6. The applications of the internet are vast and varied. Some common applications include email
communication, online shopping, social networking sites like Facebook or Twitter, online banking
services like PayPal or Venmo, video conferencing tools like Zoom or Skype for remote meetings or
classes, cloud storage services like Google Drive or Dropbox for storing files remotely accessible from
anywhere with an internet connection etc.

Unit 3

6. Explain Symmetric key and Asymmetric key data encryption.


7. Write a note on Firewall.
8. Explain Digital Signature in detail.

7. Symmetric key encryption, also known as private key encryption, is a


method of encryption where the sender and receiver of a message use the
same key to encrypt and decrypt the message. On the other hand,
asymmetric key encryption, also known as public key encryption, uses two
separate keys - public and private - for encrypting and decrypting messages.
Each person's public key is published while the private key is kept secret.

8. A firewall is a network security system that monitors and controls incoming


and outgoing network traffic based on predetermined security rules. It acts as
a barrier between a trusted internal network and an untrusted external
network, such as the internet.

9. Digital Signature is a technique used to validate the authenticity and


integrity of a message. It involves signing a document electronically using a
public key encryption technique. There are two ways to sign a document:
signing the whole document or signing a digest. In digital signature, the
sender signs the document using their private key, which can be verified by
anyone using their public key. This ensures that the message has not been
tampered with during transmission and that it originated from the sender
whose signature is on it.

Unit 4

1.Explain the difference between container and non-container elements with appropriate

example.

2. Explain the text formatting elements

3. Write a note on the structure of HTML document

4. Explain the block and inline elements


1. Container elements are HTML elements that can contain other HTML
elements within them, while non-container elements cannot. For example, the
<div> element is a container element as it can contain other HTML elements
within it, whereas the <img> element is a non-container element as it cannot
contain any other HTML elements within it.

2. Text formatting elements in HTML are used to change the appearance of


text on a web page. Some examples of text formatting elements include <b>
for bold text, <i> for italicized text, <u> for underlined text, and <strike> for
strikethrough text.

3. The structure of an HTML document typically consists of three main parts:


the head section, the body section, and the closing tag. The head section
contains information about the document such as its title and any scripts or
stylesheets that are used. The body section contains all of the visible content
on the web page such as text and images. The closing tag marks the end of
the document.

4. Block-level elements in HTML take up an entire line on a web page and


create a new line after they are displayed. Examples of block-level elements
include <div>, <h1>-<h6>, and <p>. Inline-level elements, on the other
hand, do not create new lines after they are displayed and only take up as
much space as necessary to display their content. Examples of inline-level
elements include <a>, <span>, and <img>.

Unit 5

1. Explain the various <INPUT> elements available in HTML

2. Explain the <FORM> tag with its attributes

3. Write a note on the tags used to handle tables

4. How to link various pages of the website? in how many ways the link can be created. or Explain

the <a> tag.

1. The <INPUT> element in HTML is used to create different types of form controls that allow users
to input data. Some of the available <INPUT> elements are:

- <input type=”text”>: creates a single-line text input field

- <input type=”password”>: creates a password input field

- <input type=”checkbox”>: creates a checkbox for selecting zero or more options

- <input type=”radio”>: creates a radio button for selecting one option from many

- <input type=”submit”>: creates a submit button for submitting the form

- <input type=”reset”>: creates a reset button for resetting the form

2. The <FORM> tag in HTML is used to create an HTML form for user input. It has several attributes
that can be used to customize its behavior, such as:

- action: specifies the URL of the file that will process the form data when submitted
- method: specifies the HTTP method (GET or POST) used to submit the form data

- target: specifies where to display the response after submitting the form (e.g., in a new window)

- enctype: specifies how to encode the form data before sending it to the server (e.g.,
multipart/form-data for file uploads)

3. Tables in HTML can be created using several tags, such as:

- <table>: creates a graphical table with rows and columns

- <tr>: defines a table row within a table

- <td>: defines a table cell within a row

Other tags that can be used with tables include:

- <th>: defines a header cell within a row or column

- <caption>: adds a caption to the table

- colspan and rowspan attributes: allow cells to span multiple rows or columns

4. To link various pages of a website, we can use the <a> tag in HTML. This tag is used to create
hyperlinks that allow users to navigate between pages or websites. There are two ways to create
links using this tag:

- Absolute links: specify the full URL of the page being linked (e.g.,
https://www.example.com/page.html)

- Relative links: specify only part of the URL, relative to the current page’s location (e.g., page.html or
../page.html). Relative links are often preferred because they are shorter and easier to maintain if
page locations change.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy