IT1404: Internet and World Wide Web: University of Colombo School of Computing
IT1404: Internet and World Wide Web: University of Colombo School of Computing
IT1404: Internet and World Wide Web: University of Colombo School of Computing
Important Instructions :
• The duration of the paper is 2 (two) hours.
• The medium of instruction and questions is English.
• The paper has 50 questions and 10 pages.
• All questions are of the MCQ (Multiple Choice Questions) type.
• All questions should be answered.
• Each question will have 5 (five) choices with one or more correct answers.
• All questions will carry equal marks.
• There will be a penalty for incorrect responses to discourage guessing.
• The mark given for a question will vary from 0 (All the incorrect choices are
marked & no correct choices marked) to +1 (All the correct choices are marked
& no incorrect choices are marked).
• Answers should be marked on the special answer sheet provided.
• Note that questions appear on both sides of the paper.
If a page is not printed, please inform the supervisor immediately.
• Mark the correct choices on the question paper first and then transfer them to
the given answer sheet which will be machine marked. Please completely
read and follow the instructions given on the other side of the answer
sheet before you shade your correct choices.
1
1. Internet
______(i)_______, was dissolved in 1990 and many of the sites connected to it were absorbed
by the _______(ii)_______. The NSFNET Backbone Service was mainly used by academic and
educational entities, and was a transitional network bridging the era of the ______(iii)______
and _____(iv)______ into the modern Internet of today.
5. One can get an Internet connection through various methods such as leased circuits, dial-up
access, DSL or wireless. These methods differ from each other in
(a) availability.
(b) accessibility .
(c) affordability .
(d) browser supportability.
(e) use of existing resources.
Domain Name System makes it possible to attach (i) _______ to (ii) _______.
2
7. Identify the web servers from among the following.
(a) (i),(ii) and (vii) only. (b) (i), (vii) and (viii) only
(c) (i), (iv) and (vii) only. (d) (i), (ii), (iv) and (vi) only
(e) All
8. NCSA Mosaic
(a) is developed by Apple Inc.
(b) is a Web 2.0 search engine.
(c) has a graphical user interface.
(d) was the first platform independent web browser.
(e) was the first text based browser.
https://vle.bit.lk/faq.html
(i) A spider is a program that visits web sites and reads their pages and other information in
order to create entries for a search engine index.
(ii) A cookie is usually, information sent from a web site and stored in users’ web browser
while a user is browsing a web site.
(iii) Almost all web browsers cache recently obtained data, usually on the local hard drive.
3
13. Consider the following statements in relation to the history of World Wide Web.
i. In 1990, Tim Berners- Lee and a team at the CERN developed WWW.
ii. It is based on an idea by a graduate student of Harvard University.
iii. In 1968, Ted Nelson developed the first ever working hypertext system called NLS.
iv. In 1990, the world’s first web site info.cern.ch was published.
(a) Each individual on the To line is responsible for taking the action outlined on
the Subject line and the message relates directly to them.
(b) Individuals whose work is indirectly affected by the message are included on
the Cc line.
(c) BCC provides a way for you to send messages to several people without
disclosing their email addresses to each other.
(d) Using BCC line in sending mass mail promotes SPAM.
(e) The subject line should effectively summarize the message so that each
recipient will have a clear understanding about the objective of the message.
16. Select the set(s) of HTML tags which only deal(s) with tables.
17. Select HTML tag(s) that correctly represent(s) document body elements.
<a href="http:// vle.bit.lk/ " title=" Home page of the BIT Virtual Learning
Environment" target="_parent"> Welcome to BIT VLE! </a>
4
19. Fill in the blank.
___________________ was a WYSIWYG HTML editor and was replaced by Expression Web
and SharePoint Designer in 2006.
(a) RapidWeaver (b) Bluefish
(c) Dreamweaver (d) KompoZer
(e) Microsoft FrontPage
20. What is/are the correct HTML code(s) for inserting an image?
5
26. Select correct statement(s).
(a) Internet service providers can install mail filters in their mail transfer agents as
a service to all of their customers.
(b) IMAP handles incoming e-mail messages by generally downloading them
from the mail server to a local computer.
(c) POP is an ASCII protocol.
(d) POP protocol uses port 110 as the standard port.
(e) Most email programs are with an automatic spam filtering function.
(i) Address the messages to the list addresses to send a message to all subscribers of a
mailing list.
(ii) List address is the name of the list moderator.
(iii) Send a message to the administrative address to subscribe to a mailing list.
(a) (i) only (b) (i) and (ii) only (c) (ii) and (iii) only
(d) (i) and (iii) only (e) All
29. Consider the following statements in relation to the features available in blogs.
i. Blog posts are organized in reverse-chronological order.
ii. An archive of older articles is available.
iii. Most blogs allow visitors to leave comments.
Which of the following is/are true in relation to the above statements?
(a) (i) only (b) (i) and (ii) only (c) (i) and (iii) only
(d) (ii) and (iii) only (e) All
The following shows the sequence of actions with one action missing in downloading a file from
a FTP server to a computer by using the command line interface.
6
31. Appropriate FTP command(s) for the action (iii) is
32. Select the correct encoding method(s) that can be used to encode email attachments.
33. The main objective(s) for the development of the FTP is/are to
(a) Skype can be used to communicate with peers by video using a webcam.
(b) Calls to other Skype users’ mobile phones are free of charge.
(c) Skype network is operated by Microsoft.
(d) Skype network is operated by Google.
(e) Skype can be used to send and receive files of any size or type.
35. Identify widely used CMS(s) underlying many well known websites from among the following.
(a) Podcasts provide a quick and easy way to distribute audio files.
(b) Users can subscribe to a web feed to get podcasts that interest them.
(c) Podcasts are used to provide live broadcasts of TV shows or sports events.
(d) To download a podcast a software program called a podcatcher is used.
(e) The benefit of podcasts is that users can listen to them whenever they want.
7
37. Consider the following list of services.
i. Transactional Services
Select the correct order of maturity of the e-Government ICT infrastructure when classified by
the nature of the services provided.
(a) (i), (ii), (iii), (iv) (b) (ii), (i), (iii), (iv)
(c) (i), (ii), (iv), (iii) (d) (iii), (ii), (i), (iv)
(e) (i), (iv), (ii), (iii)
A B
A. FaceBook i. Professional networking
B. Skype ii. Communication with peers
C. MySpace iii. SMS of the Internet
D. LinkedIn iv. Social entertainment
E. Twitter v. Social networking
39. Consider the following statements in relation to remotely accessing different computers.
ii. Windows Remote desktop connection can be used to access Linux computers.
iii. VNC can be used to access computers running on Linux or any version of Windows.
(a) (iii) only (b) (i) and (ii) only (c) (i) and (iii) only
(d) (ii) and (iii) only (e) All
40. In e-Learning, learning objects are a new way of thinking about learning content. Learning
objects are
8
41. Which of the following is an /are open source project(s)?
A B
A. Podcasting i. Real-time communication between two or more people
based on typed text
B. IPTV ii. Transmission of audio and/or video over the Internet
using streaming technology.
C. VoIP iii. Transmission technologies for delivery of voice
communications over IP
D. Instant iv. Method of distributing multimedia files over the
Messaging Internet.
E. Webcasting v. Digital television service is delivered using Internet
Protocol over a network
(a) A. -iii, B-v, C-i, D-ii, E-iv (b) A. -v, B-iii, C-i, D-ii, E-iv
(c) A. -iv, B-v, C-iii, D-i, E-ii (d) A. -v, B-i, C-iii, D-ii, E-iv
(e) A. -ii, B-iii, C-i, D-v, E-iv
(a) (i), (ii), (iv) and (v) (b) (ii), (iii), (iv) and (v)
(c) (i), (iii), (v) and (vi) (d) (i), (ii), (iii), (vii) and (viii)
(e) All
9
46. Select the correct statement(s) related to e-Commerce.
(a) Using purely as a channel for advertising is one of the revenue models on the
web.
(b) Internet allows the buyers to reduce the transaction cost in an eCommerce
business by automatic search for the best prices on the web.
(c) Many scholarly works use advertising rather than subscription to fund their
operations.
(d) Provision of Frequently Asked Questions (FAQs) is a way of reducing the
operational cost in eCommerce business.
(e) eBay is a good example for direct fee model.
(a) Secure Shell is typically used to login to a remote machine and execute
commands.
(b) SSL supports both server and client authentication.
(c) S-HTTP is designed to transmit individual messages securely.
(d) When some one is accessing an SSL enabled website using a HTTP browser,
the URL changes to https.
(e) S/MIME protocol enables secure credit card transactions over the Internet.
48.
Consider the following statements.
i. Spam is a message sent , warning the recipient of a non-existent computer virus threat.
ii. Phishers attempt to steal sensitive financial or personal information through fraudulent
email or instant messages.
iii. Spyware is any program that monitors your online activities or installs programs without
your consent for profit or to capture personal information.
Which of the above statements is/are true?
(a) (ii) only. (b) (iii) only. (c) (i) and (iii) only.
(d) (ii) and (iii) only. (e) All.
49. Select the correct statement(s) with regard to Computer worms/Trojan horse.
50. Which of the following statement(s) is(are) correct in relation to crimes on the Internet?
(a) Access to data/information knowing that one has no authority to access such
information is a crime.
(b) Introducing a computer program which will have the effect of malfunctioning
of a computer is not a crime
(c) Different countries and economies have different laws for pornography and
gambling.
(d) Denial of service attacks can be considered as crimes on the Internet.
(e) Domain name squatting cannot be considered as a crime on the Internet..
********
10
11