MIDTERM EXAMINATION Spring 2009 (Session 2)
MIDTERM EXAMINATION Spring 2009 (Session 2)
MIDTERM EXAMINATION Spring 2009 (Session 2)
Instance of object
Copy of object
Instance / copy of object (page 69)
Shallow copy of object
http://www.vustudents.net
Question No: 6 __ ( Marks: 1 ) - Please choose one Which one of
following file is used to translate XML:
DTD
XSL (repeated )
XML parser
Browser
VB.net
Java (page 77)
Asp.net
C++
Question No: 8 __ ( Marks: 1 ) - Please choose one
In _________key cryptography, everyone has access to all the public keys
only text
only numbers
only numbers or text
any valid variable
ref
http://www.vustudents.net
http://java.sun.com/docs/books/jls/second_edition/html/arrays.doc.html
Question No: 12 ( Marks: 1 ) - Please choose
one Which tag is used for the hidden fields?
<FIELD>
<TEXT>
<INPUT> (page 88)
<HIDDEN>
Submit button
Reset button
Radio button
None of the given
Application layer
Session layer
Network layer (page 6)
Data link layer
http://www.vustudents.net
In HTML , for displaying information systematically which tag do we usually use ?
Question No: 19 ( Marks: 2 )
How Certification Authority (CA) issues the certificates? Describe briefly
Question No: 20 __ ( Marks: 3 )
What is MAC address? How does it help server to identify the client?
Question No: 21 ( Marks: 5 )
How can we classify E-Commerce by the nature of its transactions? Give at least one real life
example for each of its classification.
Question No: 22 ( Marks: 10 )
Analyze the following given code showing some Cascading Style Sheets tags and explain its
lines one by one.
<html>
<head>
<style type="text/css">
h1 {text-decoration: overline}
h2 {text-decoration: line-through}
h3 {text-decoration: underline}
a {text-decoration: none}
</style>
</head>
</html>
<body>
<h1>This is header 1</h1>
<h2>This is header 2</h2>
<h3>This is header 3</h3>
<p><a href="http ://www.w3schools.com/default.asp">This is a link</a></p>
</body>
http://www.vustudents.net