Web Technology

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

WEB TECHNOLOGIES

UNIT I

1. Which protocol is ideal for transmitting large files?


( a) HTTP (b) FTP (c) SMTP (d) RTP 
Answer : a) FTP

2. FTP is built on _____ architecture


(a) Client-server (b) P2P (c) DNS (d) HTML
Answer: (a) Client-server

3. which application allows you to connect and login to a remote computer


(a) Telnet (b) FTP (c) HTTP (d) CGI
Answer:((a) Telnet

4. What is the header size of UDP packet?


(a) 8 bytes (b) 8 bits (c) 16 bytes (d) 124 bytes
Answer: (a) 8 bytes

5.“Total length” field in UDP packet header is the length of


(a) Only UDP header (b) Only data (c) Only checksum (d) UDP header plus data
Answer: (d) UDP header plus data

6.  In FTP protocol, client contacts server using _________ as the transport protocol
(a) Transmission control protocol (b) User datagram protocol
c) Datagram congestion control protocol d) Stream control transmission protocol
Answer: (a) Transmission control protocol

7. The file transfer protocol is built on


(a) Data centric architecture (b) Service oriented architecture
(c) Client server architecture (d) Network architecture
Answer: (c) Client server architecture

8. Connection establishment in TCP is done by which mechanism?


(a) Flow control (b) Three-Way Handshaking
(c) Forwarding (d) Synchronisation
Answer: (b) Three-Way Handshaking

9. The server program tells its TCP that it is ready to accept a connection. This process is called
___________
(a) Active open (b) Active close (c) Passive close (d) Passive open
Answer: (d) Passive open
10. A device operating at network layer is called ____
(a) Router (b) Equalizer (c) Bridge (d) Repeater
Answer: (a) Router

UNIT II

11.  Which of the following protocols uses both TCP and UDP?
(a) FTP (b) SMTP (c) Telnet (d) DNS
Answer: (d) DNS

12.. TCP/IP layer is equivalent to combined Session, Presentation and ______


(a) Network layer (b) Application layer (c) Transport layer (d) Physical layer
Answer: (b) Application layer

13. TCP, FTP, Telnet, SMTP, POP etc. are examples of?
(a) Socket (b) IP Address (c) Protocol (d) MAC Address
Answer: (c) Protocol

14- What is AJAX ?


(a) is a program (b) is a country name (c)is a football club name (d) is web language
Answer: (a) is a program

15- AJAX Stands for:


(a) Asynchronous Javascript and XML (b) Abstract JSON and XML
(c) Another Java Abstraction for X-Windows (d) Another Java and XML Library
Answer: (a) Asynchronous Javascript and XML

16. Which of the following is a stateless protocol?


(a) HTML (b) XHTML (c) HTTP (d) XML
Answer: (c) HTTP

17.  What is the correct JavaScript syntax to write "Hello World"?


(a)  System.out.println("Hello World") (b)  println ("Hello World")
(c) document.write("Hello World") (d) response.write("Hello World")
 Answer: (c) document.write("Hello World")

18. Which of the following event fires when the form element loses the focus: <button>,
<input>, <label>, <select>, <textarea>?
(a)  onfocus (b) onblur (c) onclick (d) ondblclick
 Answer: (b) onblur

19. JavaScript is interpreted by _________


(a)  Client (b)  Server (c)  Object (d) Compiler
Answer: (a) Client
20.  In a Javascript Application what function can be used to send messages to users requesting
for an text input?
(a) Display() (b) Alert() (c) GetOutput() (d) Prompt()
Answer: (d) Prompt()

UNIT III

21. Which of the following is not a reserved word in JavaScript?


(a) interface (b) throws (c) program (d) short
Answer: (c) program

22. What is a web browser?


(a) a program that can display a web page (b) a webpage for display cookie
(c) it does not enables user to access the resources of internet (d) a designing method
Answer: (d) a program that can display a web page

23. Dynamic web page


(a) is same every time whenever it displays
(b) generates on demand by a program or a request from browser
(c) both is same every time whenever it displays and generates on demand by a program or a
request from browser
(d) display the current data
Answer: (b) generates on demand by a program or a request from browser

24. Common gateway interface is used to


(a) generate executable files from web content by web server (b) generate web pages
(c) stream videos (d) generate cookie
Answer: (a) generate executable files from web content by web server

25. URL stands for


(a) unique reference label (b) uniform reference label
(c) uniform resource locator (d) unique resource locator
Answer: (c) uniform resource locator

26. ASP.NET Validation Control works at ________ . 


(a) Client side only (b) Server side only
(c) Both Client Side and Server Side (d) Bluetooth
Answer: (c) Both Client Side and Server Side

27. Which validation control in ASP.NET can be used to determine if the data is entered into a
TextBox control is of type Currency? 
(a) ValidationSummary (b) CompareValidator
(c) RequiredFieldValidator (d) Resource Validator
Answer: (b) CompareValidator
28. File extension used for ASP.NET files.
(a) Web (b) ASP (c) ASPX (d)  None of the above
Answer: .(b)ASP

29 Full form of CGI


(a) Computer Graphics Interface (b) Common Gateway Interface
(c) Common Graphics Interface (d) Computer Gateway Interface
Answer: (b) Common Gateway Interface

30. In cryptography, what is cipher?


(a) algorithm for performing encryption and decryption (b) encrypted message
(c) both algorithm for performing encryption and decryption and encrypted message
(d) algorithm for calculating checksum
Answer: (a) algorithm for performing encryption and decryption

UNIT IV

31.  What is data encryption standard (DES)?


(a) block cipher (b) stream cipher (c) bit cipher (d) stream bit
Answer: (a) block cipher

32 . When user request a web page by entering Uniform Resource Locator (URL) then which
method /verb/command is used in ASP.NET? 
(a) POST (b) SET (c) GET (d) dot
Answer: (c) GET

33.  In asymmetric key cryptography, the private key is kept by


(a) sender (b) receiver (c) sender and receiver (d) all connected devices to the network
Answer: (b) receiver

34. Input message in Cryptography is called;


(a) Plain text (b) Cipher Text (c) Plain and cipher (d) Rough text
Answer: (a) Plain text

35.  Cryptanalysis is used


(a) to find some insecurity in a cryptographic scheme (b) to increase the speed
(c) to encrypt the data (d) to decrypt the data
Answer: (a) to find some insecurity in a cryptographic scheme

36. How constructor can be used for a servlet?


(a) Initialization (b) Constructor function
(c) Initialization and Constructor function (d) Setup() method
Answer: (c) Initialization and Constructor function
37. Which of the following code is used to get an attribute in a HTTP Session object in servlets?
(a) session.getAttribute(String name) (b) session.alterAttribute(String name)
(c) session.updateAttribute(String name) (d) session.setAttribute(String name)
Answer: (a) session.getAttribute(String name)

38. Which method is used to get three-letter abbreviation for locale’s country in servlets?
(a) Request.getISO3Country() (b) Locale.getISO3Country()
(c) Response.getISO3Country() (d) Local.retrieveISO3Country()
Answer: (a) Request.getISO3Country()

39. Document Object Model(DOM) is a ______


(a) Character User Interface (CUI) (b) Application Programming Interface (API)
(c) Both (A) & (B) (d) GUI
Answer: (B) Application Programming Interface (API)

40.Extensible Markup Language (XML) tags are ____


(a) Case Insensitive (b) Case Sensitive (c) Both (A) & (B) (d) Inactive
Answer: (b) Case Sensitive

UNIT V

41. In RMI Architecture which layer Intercepts method calls made by the client/redirects these
calls to a remote RMI service? 
(a) Stub & Skeleton Layer (b) Application Layer
(c) Remote Reference Layer (d) Transport Layer
Answer: (a) Stub and Skeleton Layer

42. Which is an object, acts as a gateway for the client side, all the outgoing requests are routed
through it and it resides at the client side and represents the remote object?
(a) Stub (b) Skeleton (c) Both A & B (d) post
Answer: (a) Stub

43. RMI Stands for? 


(a) Random Method Invocation (b) Remote Memory Interface
(c) Remote Method Invocation (d) Random Method Invocation
Answer: (c) Remote Method Invocation

44. In RMI, the objects are passed by _____. 


a. Value b. Reference c. Value and Reference d. Form
Answer: (a) Value

45.What is document object model (DOM)?


(a) convention for representing and interacting with objects in html documents
(b) application programming interface
(c) hierarchy of objects in ASP.NET
(d) is a website
Answer: (a) convention for representing and interacting with objects in html documents

46. What does XML stand for?


(a) eXtra Modern Link (b) eXtensible Markup Language
(c) Example Markup Language (d) X-Markup Language
Answer: (b) ) eXtensible Markup Language

47. What is the correct syntax of the declaration which defines the XML version?:
(a) <xml version="A.0" /> (b) <?xml version="A.0"?>
(c) <?xml version="A.0" /> (d) <?xml>
Answer: (b) <?xml version="A.0"?>

48. Well formed XML document means


(a) it contains a root element
(b) it contain an element
(c) it contains one or more elements
(d) must contain one or more elements and root element must contain all other elements
Answer: (d) must contain one or more elements and root element must contain all other
elements

49. Comment in XML document is given by


(a) <?-- --> (b) <!-- --!> (c) <!-- --> (d) </-- -- >
Answer: (c) <!-- -->

50. CORBA stands for


(a) Common Object Request Build Architecture
(b) Common Object Request Broker Architecture
(c) Common Object Request Break Architecture (d) All of the mentioned
Answer: (b) Common Object Request Broker Architecture

You might also like