Sie sind auf Seite 1von 19

IMPORTANT QUESTIONS

UNIT 1: INTERNET ARCHITECTURE

QUESTION 1: EXPLAIN HTTP.

Answer: HTTP

 HTTP stands for Hyper Text Transfer Protocol.


 WWW is about communication between web clients and servers.
 Communication between client computers and web servers is done by sending HTTP
Requests and receiving HTTP Responses
World Wide Web Communication

 The World Wide Web is about communication between web clients and web servers.
 Clients are often browsers (Chrome, Edge, Safari), but they can be any type of program
or device.
 Servers are most often computers in the cloud.

HTTP Request / Response

Communication between clients and servers is done by requests and responses:

1. A client (a browser) sends an HTTP request to the web


2. An web server receives the request
3. The server runs an application to process the request
4. The server returns an HTTP response (output) to the browser
5. The client (the browser) receives the response

Basic Features

There are three basic features that make HTTP a simple but powerful protocol:
 HTTP is connectionless: The HTTP client, i.e., a browser initiates an HTTP request
and after a request is made, the client waits for the response. The server processes the
request and sends a response back after which client disconnect the connection. So

COMPUTER APPLICATION-IV 1
IMPORTANT QUESTIONS

client and server knows about each other during current request and response only.
Further requests are made on new connection like client and server are new to each
other.
 HTTP is media independent: It means, any type of data can be sent by HTTP as long
as both the client and the server know how to handle the data content. It is required for
the client as well as the server to specify the content type using appropriate MIME-
type.
 HTTP is stateless: As mentioned above, HTTP is connectionless and it is a direct
result of HTTP being a stateless protocol. The server and client are aware of each other
only during a current request. Afterwards, both of them forget about each other. Due
to this nature of the protocol, neither the client nor the browser can retain information
between different requests across the web pages.

 HTTP/1.0 uses a new connection for each request/response exchange, where as


HTTP/1.1 connection may be used for one or more request/response exchanges.

QUESTION 2: EXPLAIN IP ADDRESS.


Answer: IP Address
 A device on the n/w needs an IP address to communicate with other devices.
 IP address is unique 4 byte decimal number or 32 bit binary number which is assigned
to each device on a n/w.
 IP address is same as telephone number which is unique.
 A unique address mostly used by computer to communicate over n/w that uses IP as its
basic protocol.
 IP address is a unique number assigned any device on n/w, for example: Computer,
Printer and internet fax machine.
 Each part of an IP address is referred to as octet. Each octet is 8 bit binary number.
 Each part of an IP address start from 0 to 255. An IP address consists of two things.
(1) Network Address: contains the first byte and it is used to identify the n/w in
which computer is available.
(2) Host Address: identify the actual computer on the n/w.

 An IP address granted to computer is divided in to two category.


(1) Dynamic IP Address

COMPUTER APPLICATION-IV 2
IMPORTANT QUESTIONS

(2) Static IP Address

Dynamic IP Address
 Dynamic IP Addresses are assigned to the devices that require temporary connectivity
to the n/w. ex. Portable computer.
 The most common protocol used for assigning dynamic IP Address is DHCP protocol.
 The DHCP grants IP address to a computer for temporary period.
Static IP Address
 Static IP Addresses are assigned to the device on the n/w whose existence in the n/w
remains for a longer duration.
 The static IP Address are semi-permanent IP address which remain allocated to a
specific device for longer time ex. Server.
 IP Address can be classified as

Class First Bytes


A 0-127
B 128-191
C 192-223
D 224-239
E 240-255

Class A Address
 Class A IP address use first byte for the n/w address and other byte for the host address.
 Class A IP Address provide 128 n/w block.
Class B Address
 Class B IP Address use first two bytes fro the n/w address and other two bytes for the
host address.
 Class B IP Address provides 16384 n/w blocks.
Class C Address
 Class C IP Address use first three bytes for the n/w address and last byte for the host
address.
Class D Address
 Class D address is designed for multicasting.
 Each address in this class define a particular group of host on n/w.
 When a group of computers are assigned an address from this class, each host withun
the group has a multicast address in addition to its normal addrss.
 Class D IP address starts from 224 to 239.
Class E Address

COMPUTER APPLICATION-IV 3
IMPORTANT QUESTIONS

 Class e Address is reserved for special purpose.


 The first byte of class E IP Address starts from 240 to 255.

QUESTION 3: EXPLAIN CLIENT SERVER MECHANISM


ARCHITECTURE.
Answer:
Client
 The clients are those which make request to the server
Server
 The server are those which provide response to the clients.
The client server architecture can be categorized in different forms.
(1) Two Tier client-server architecture
(2) Three Tier client-server architecture
(3) N-Tier client-server architecture
Two Tier client-server architecture

 A Two tier client server means that a client s/w is installed on several computers and
the client component will have the communication with the server.
 A database is usually involved in this type of n/w.
 It has a centralized database and client exchange data with server.

COMPUTER APPLICATION-IV 4
IMPORTANT QUESTIONS

Three Tier client-server architecture


 Suppose that you have a database living on a Unix server and you want to get it with
your windows client.
 A third node called middle way server is introduced which help to translate the request.
 The user makes a request to middle way server which in turn pass the request to Unix
server and then request is sent back to user from Unix server to windows client.

N Tier client-server architecture


 N-Tier client server has much more complicated level than standard 2 tier and 3 tier
client server system.
 N-tier n/w have database lying on either Unix server or database server.
 You can have a system that hoes many level deep that is why is called as n-tier client
server n/w.

COMPUTER APPLICATION-IV 5
IMPORTANT QUESTIONS

QUESTION 4: EXPLAIN ABOUT BLOG.


Answer: Blog
 A Blog is a website that contains dated entries in sequential order about particular topic
which is managed by single user.
 A blog is a personal diary of thoughts that are CHANNEL into an organized format and
readable on internet.
 The user who keeps the blog is known a Blogger.
 When user updates the blog this activity is known as Blogging.
 Blog is a short form of We Blog.
 All the Blog community is known as BLOG SPACE.
How to create a Blog
 Step1: Create your account by specifying USER NAME and password in the website
which allow you to create your Blog. Ex. Blogger.com, World Press.com.
 Step2: Name your Blog.
 Step3: Select the template you want to apply to your Blog.
Types of Blog
There are many different types of blogs available which is not only different in the type of
content, but also in the way the content is delivered.
1) Personal Blog
 Personal Blog is the most common Blog which is created by individual to
provide commentary, is included in this category.
 Others can read the messages and responses them.
 This type of blog is only used to provide the PERSONAL information to others.

COMPUTER APPLICATION-IV 6
IMPORTANT QUESTIONS

2) Corporate or Organization Blog


 The blogs which are private for the organization is included in this category.
 These blogs are used to enhance the communication in the organization for
doing marketing and maintaining public relation.

3) Subject wise Blog


 Many blogs are created which are based on specific subjects are included in this
category.
 Ex. Political Blog, Travel Blog, Fashion Blog, Education Blog, Music Blog,etc.

4) Devise wise Blog


 Some blog can run only by mobile phone is included in this category.
 The blogs which run only on mobile are known as moblog.

5) Reverse Blog
 A Reverse blog is composed by it’s users rather than a single blogger.
 This blog is written by many authors on a specific topic.
 Some of them are open for all to write message but there the limited numbers
of users are allowed.

QUESTION 5: EXPLAIN DNS (DOMAIN NAME SYSTEM). ALSO


EXPLAIN CLASSIFICATION OF VARIOUS DOMAINS.
Answer: DNS
 Name resolution is the process of mapping computer name to their IP address.
 The name, user enters in the browser are converted in to IP address, so that the website
can be accessed.
 To identify a device, the internet uses the IP address, which uniquely identify the
connection of a computer to the n/w.
 But user prefer to use name instead of number address.
 Because to remember the numeric addresses are difficult compare to name therefore we
need a system that can map a name to an IP address
 The naming scheme used in the internet is called domain name.

COMPUTER APPLICATION-IV 7
IMPORTANT QUESTIONS

 There are different categories of the top level domain and they are
(1) Non –Geographical Domain
(2) Geographical Domain
Non –Geographical Domain
 Domain name that falls under this category are named using 3 characters that indicates
the functionality of the organization.
Ex. . Com- Commercial Organizatin
.Edu- Education Institution
.Mil- Military Groups
.Org- Non profit Organization
.Int- International Organization
.Gov- Government Institution
.net- Network Organization

Geographical Domain
 Domain name that falls under this category are named using 2 character country name
which are specified by ISO (International Standard Organization).
 Ex- .In- India
.PK- Pakistan
.CA- Canada
.US- United State of America
.UK- United Kingdom
 Ex. WWW.yahoo.com is complete domain name

Domain Name System

 DNS is the technique used to provide standard naming conversion for finding IP address
on the n/w.
 The DNS is based on hierarchical and logical tree structure called Domain Name Space.
 Internet domains are classified into various categories like “root”.

COMPUTER APPLICATION-IV 8
IMPORTANT QUESTIONS

How DNS Works?

 Step 1: when the user request to the URL from their web browser first request is senyt
to local name server to get the IP address.
 Step 2: If URL is at the local name server than it find the IP address of the requested
URL and give the IP address to the web browser.
 Step 3: if the URL is not at the local server than it can not find the IP address and then
local name server sent the request to the root domain server.
 Step 4: The root domain server provide the information of primary name server and
secondary name server to local name server.
 Step 5: local name server now contact with the primary name server, if the primary
name server find the IP address then it send to the local name server otherwise it connect
with the secondary name server and get IP address of the requested URL.
 Step 6: Finally local name server send that IP address to the web browser.

QUESTION 6: WHAT IS SEARCH ENGINE AND META SEARCH


ENGINE? GIVE THE NAME OF ANY TWO SEARCH ENGINE. ALSO
EXPLAIN HOW SEARCH ENGINE WORKS?

Answer: SEARCH ENGINE


 Search Engine is an information retrieval system designed to find out the information
stored on the remote computer.
 If any of the user want to find information any topic then he need to search by typing
the URL of the website which contain the information but it is very difficult to
remember all the URL of the website.
 But with the help of search engine you can find out the information very easily.
 Search engine gives facility to type the keyword and find out information from many
website.
 Search engine gives facility to type the keyword and find out information from many
website.
 Search engine prepares webpages of the result with the help of HTML language and
then display on the web browser.

COMPUTER APPLICATION-IV 9
IMPORTANT QUESTIONS

 There are number of search engines available on the internet.


 Examples of search engine: Google, Yahoo, Alta Vista, Bing, ASK, excite, Lycos.

 All the search engines are mainly divided into three parts: (1) Spider
(2) Database
(3) Search Tools
Spider:

 Spider is a program that automatically fetch the webpage.


 Spider crawls across the internet to gather the information.
 Because most webpages contain links to other pages, a spider can start almost from
anywhere. As soon as it gets a link to another page, it goes off and fetches information.
 Large search engines have many spiders working parallel to fetch the information.

Database:

 Database is used to store the information fetched by the spiders.


 Database is continuously updated to give most up to date information.

Search Tools:

 It is a place from user can search inform by typing keywords.


 All the search engines have their website throw user can type the keyword.
 Example: google.com, yahoo.com, AltaVista.com, Bing.com etc.

How search engine works:

 Step 1: Each search engine user spider to crawl across the internet to gather
information.
 Step 2: The spiders find out the URLs then software agent who gather the information
from the different sources are instructed to get the documents and send information to
indexing software.
 Step 3: Indexing software receives the URLs from the software agent.
 Step 4: Indexing software fetch the information from the documents, indexes it and
stores it into the database.

COMPUTER APPLICATION-IV 10
IMPORTANT QUESTIONS

 Step 5: When user visit a search engine, types the keyword and need to press search
but to than this request is forwarded to the database.
 Step 6: The database finds the SEARCH TEXT’s information.
 Step 7: the result will be displayed in form of HTML pages. These webpages are
displayed search tool of the year.

Answer: META SEARCH ENGINE

 A Meta Search engine is a search engine that send user’s request to several other search
engine and returns the result from each one.
 There are number of meta search engines available on internet
 Example of meta search engines: Dogpile, Web Crawler.
 Meta search engine enables users to enter search TEXT and access several search
engine simultaneously.
 Meta search engines reduces the time for searching and eliminates duplicate results.

How Meta search engine works:

 Step 1: User type the keyword into Meta search engine which he want to search.
 Step 2: Meta search engine software send many software agent simultaneously. Each
software agent contact one or more search engine.
 Step 3: These software agents have the information about the search keyword which is
used by the search engine. These software agents converts the search keyword into
proper syntax and then submit to the search engine.
 Step 4: Each search engine find out the result from its database and send back reply to
the software agent.
 Step 5: Software agent send back result to the meta search engine.
 Step 6: after submitting result to the meta search engine, software agent goes to another
search engine and find out the result.
 Step 7: meta search engine takes all the result from all the search engines, create virtual
database and examine them for the duplicate result if it finds the duplicate result then it
deletes it.
 Step 8: meta search engine software display these results to the user.

QUESTION 7: WHAT IS E-MAIL? HOW DOES IT WORK? DISCUSS


VARIOUS PROTOCOLS REQUIRED FOR E-MAIL.

COMPUTER APPLICATION-IV 11
IMPORTANT QUESTIONS

Answer: E-Mail
 Email allows the user to send the data over the internet.
 Email is one of the most commonly used service for the transaction of data such as
documents.
 An email address is usually in the form of user@domain name. example:
ABC@yahoo.com.
 The domain name can have several components usually the name of each node.
 An email system is divided into two sub system: (a) UA (User Agent)
(b) MTA (message Transfer Agent)
 The most popular email websites allow the user to attach file.
 This ATTACHMENT can be of any file ex. Word processing document, spread sheer,
multimedia file, pdf file etc.

User Agent (UA):

 The UA allows the user to send and read email.


 The UA is a program that provide the method to interact with the email.
 It is program which accepts the command for creating, receiving, replying a message.

 Sending Mail:

 The user need to provide the destination address and message while sending an
email.
 The message can be developed using TEXT editor provided by, the user agent
or with the help of third party software.

 Receiving Mail:

 The UA at the recipient end checks the mail box periodically for a new email.
 If a UA receives email, a notification is given to the user.
 If the user is ready to read the email a list is displayed, which contain the
information about the sender’s email address, subject of message and time of
message.

Message Transfer Agent (MTA):

 The MTA moves the message from source to destination.


 The MTA is a process which run in the background and transfer email through the
system.
 Both the client and server should have MTA for sending and receiving email.

Components of email:

 Every email consist of message header or email envelope.


 The message header is equivalent to the envelope like regular postal mail.
 From Field: The From field includes the email address of the sender.
 To Field: The To field includes the email address of the receiver.
 TO Cc Field: If you wish to send same copy of a message to other people then this
field is used. It is similar to making a copy of a letter using carbon copy.

COMPUTER APPLICATION-IV 12
IMPORTANT QUESTIONS

 Subject Field: The subject field includes the subject of message.


 Message Area: The message area field includes the original message or content that
user want to send.

Answer: Protocols used by Email

(1) SMTP (Simple Mail Transfer Protocol)

 SMTP is an internet standard protocol that is used for transferring email from client to
email server.
 SMTP is not dependent on any particulars transmission system.
 SMTP protocol makes the connection between the sender and receiver and then transfer
the message.
 SMTP protocol is used in TCP/IP network for transferring email message.
 SMTP protocol is used only when both the sender and receiver are ready at the same
time.
 SMTP provides mechanism for the transfer of message, directly from sender host to
receiver host.
 In order to be more reliable the SMTP server must supplied with the destination address.

(2) MIME (Multipurpose Internet Mail Extension)

 Binary data is not supported by email MIME standard was developed to enable such
data to be send as attachment to email message.
 These attachment includes files such as a word document, spread sheet, multimedia file
and pdf file.
 MIME cannot replace SMTP protocol but it is only an extension to SMTP protocol.

(3) Mail Access Protocol


a) POP (Post Office Protocol)
b) IMAP (Internet Mail Access Protocol)

a) POP (Post Office Protocol)


 If the destination computer is not connected then POP must be used for
temporary storage of message.
 The POP allows to access the host so that email messages can be received from
server.
 POP has two mode: Delete mode, Keep mode.
 Delete mode: In delete mode the email message is deleted from the mail box
after the retrieval of message from server.
 Keep mode: In keep mode the email message remains in the mail box after the
retrieval of message from server.

b) IMAP (Internet Mail Access Protocol)


 Another mail access protocol is IMAP it is similar to POP, but it has more
feature than POP.
 IMAP is more powerful protocol than POP.
 IMAP allows a client to access email message from server and allows to access
the mailbox.

COMPUTER APPLICATION-IV 13
IMPORTANT QUESTIONS

 IMAP includes the operation for creation, deleting, renaming a mail box

QUESTION 8: WRITE A SHORT NOTE ON TELNET.


Answer: TELNET
 The internet standard for remote login SERVICE is found in the TELNET protocol.
 The full form of TELNET is (Telecommunication Net Work).
 TELNET specify how remote client and remote server interact with each other.
 TELNET gives the facility to access the REMOTE computer resources (ex. Printers,
hard disk, scanner and fax machines).
 User can logon to the remote computer, can write the command using keyboard from
his computer and can get back result which is processed by the remote computer.
 To use telnet remote computer’s address is required to login into the system.
 TELNET use terminal EMULATION service which determines how client keyboard
will transmit information to the remote computer and how information will be displayed
on computer.
 TELNET assumes that at each end there is NVT (Network Virtual Terminal) which has
one keyboard and one Monitor through which telnet client and server transfer the data.
 After getting the command using keyboard NVT passes the information to TCO/IP for
further transmission.

How TELNET Works?


 Step 1: Telnet client must connect the remote computer by specifying the IP Address.
Remote computer send back login prompt to client.
 Step 2: Client specify the username and password. This information passes to the
remote computer for verification.
 Step 3: Remote computer verify and send back reply to the client then actual
CONNECTION between client and remote computer is established.
 Step 4: Telnet client and server decide which TERMINAL. Emulation service they are
going to use.
 Step 5: Telnet assumes that each end there is NVT through which the data will be
transferred.
 Step 6: Telnet remote computer receive the data, process the data and sends back reply
to the NVT of the client then it is displayed on monitor.
 Step 7: After the completion of task, client logout from the remote computer then the
connection between client and server is disconnected.

QUESTION 9: SHORT NOTE ON PING.


Answer:

COMPUTER APPLICATION-IV 14
IMPORTANT QUESTIONS

 PING- Packet Internet Groper


 PING is a computer network administration utility.
 It is a command used to check the network connection.
 PING checks that the connection with the server is properly set or not.
 PING checks the packets are received by the computer and sent to another computer or
not.
 PING checks the TCP protocol during the transmission of data packet on internet.
 PING also checks whether router is working properly or not.
 PING is also use to check the network errors.

 Syntax:
PING (-t) (-a) (-n count) (-i TTL) (-W Timed) destination IP Address

 Options:

Destination IP address: It is compulsory to specify the IP address of destination


computer.

(-t): This option checks the network connectivity continuously.

(-a): If user specify domain name in place of IP address then this option is used.

(-n count): This option is used to specify how many packets user want to send with one
request.

(-i TTL): TTL is Time To Leave, it is used to specify with in how much time user
request must be received by the destination computer.

(-W Timeout): This option is used to specify after how much time user want to check
the network connectivity again.

Output of PING Command:

(1) Series of reply:


 If the output is series of reply, it means that the connection between two computers is
properly set.
 User is able to exchange information through network.

(2) Request Timeout:


 If the output is request time out, it means that the connection between two computers
is not properly set.

(3) Destination Host Unreachable:

COMPUTER APPLICATION-IV 15
IMPORTANT QUESTIONS

 If user gets this output means PING command cannot find the destination computer.

QUESTION 10: SHORT NOTE ON WWW.


Answer: WWW (World Wide Web)
 WWW is a system of interlinked hypertext document accessed on the internet.
 With a web browser, one can view the web page that contain text, audio, video, picture
and other multimedia files.
 The WWW is a system of internet services that use HTTP protocol to transfer
documents in HTML format.
 These documents are viewed using a web-browser called Internet Explorer, Mozilla
Firefox, etc.
 A website is a set of related webpages that contain text, audio, video, picture etc.
 A website is hosted on webserver, accessible via network through an address known as
URL (Universal Resource Locator).
 The URL is the global address of document other resources on the web.
Ex: http://www.yahoo.co.
 The first part of the address indicates the protocol e.g. http and second part of the
address indicate the domain name server where the information is located.

QUESTION 11: SHORT NOTE ON CHAT SERVICE.


Answer: Chat Service
 Real time communication between two devices via computer on the internet is known
as CHAT.
 Once a chat has been started user can text by typing on the keyboard from his computer
and entered text is appeared on the other user’s computer.
 Following are the types of chat
1) Internet Relay Chat (IRC)
2) Instant Messaging Chat
3) Web based Chat
(1) Internet Relay Chat (IRC)
 Internet relay chat is a form of real time internet text messaging.
 It is mainly designed for groups of forum where communication can be done via private
message.
 IRC allows number of user to participate in the discussion.
 All other users in the chat room can instantly view the other’s message.
 IRC is based on client server network model.
 IRC servers are connected through the internet to form IRC network.
 An IRC server is connected to other IRC server to expand the IRC network.

COMPUTER APPLICATION-IV 16
IMPORTANT QUESTIONS

How IRC works?


 Step 1: Start any of the client software and logon to the IRC server.
 Step 2: Select the forum on which you want to discuss.
 Step 3: Now you are able to see the conversation of the selected forum.
 Step 4: Type the message in the text box and click send button. This message is sent
from IRC client software to the IRC server. This IRC server sends this message to all
other IRC server.
 Step 5: Each IRC server sends this message to the client who are in the chat room.
(2) Instant Messaging Chat
 Instant messenger is used to chat with a single or specified group.
 It provides one to one communications.
 It allows user to add friend and send message to them and provide facility to specify
user name and password.
 It provide the list of online and offline information of friends.
 Yahoo messenger, MSN messenger are the example of instant messaging chat.

How Instant Messenger Works:

 Step 1: Open any of the instant messaging software from your computer.
 Step 2: User has to specify user name & password information to that software.
 Step 3: This information is sent to the login server for the verification.

COMPUTER APPLICATION-IV 17
IMPORTANT QUESTIONS

 Step 4: Login server checks the information, if the information is correct then login
server instructs the instant messenger to close the connection with the login server and
establish the connection to the chat server.
 Step 5: When user sends the message, user’s message is forwarded to the chat server
and then chat server this message to the appropriate user.
(3) Web based chat
 Web based chat is even more convenient than windows based chat programs that don’t
need to install any program.
 Most web based chat website prohibit SPAM messages.
 Most website require user to register before using chat room.
 The websites which provides the facility of web based chat also specifies rules for
CHATING.

QUESTION 12: SHORT NOTE ON BBS (BULLETIN BOARD SERVICE).


Answer: BBS
 BBS is one of the service which is provide by internet.
 BBS allows the user to participate in multiple discussion forum or groups.
 BBS allows the user to select one or more discussion group to check whether new article
is posted or not.
 USENET is one of the most popular BBS which is available on the internet.
 USENET is worldwide distributed discussion system.

News group

 In USENET number of discussion topics are available on which user can discuss.
 This discussion topic in specific area of interest is known as News group.
 Number of newsgroups are available on internet and user can also create their own news
group
 When user creates his own newsgroup, USENET allocates space on server where all
the articles are POSTED and stored.

 There are two types of NEWSGROUP available.


(1) Moderated newsgroup: Each article is first of all moderated by moderator and if it is
appropriate for the group then it is posted on NEWSGROUP.

COMPUTER APPLICATION-IV 18
IMPORTANT QUESTIONS

(2) Un moderated newsgroup: All the articles are directly posted on NEWSGROUP and
can be viewed by user.

Article
 Each newsgroup contains number of message and each message is known as article.
 The article is divided into two parts:
(1) Header: The header section includes the technical detail like sender’s name, E-mail
ID, subject of the article and group name etc.
(2) Body: The body section includes the original message.

How BBS Works?


 Step 1: User select the newsgroup and post the article.
 Step 2: if the newsgroup is of moderated type then after verifying the article by
moderator, it is displayed on the USENET server or if the newsgroup is of Un
moderated type then it is directly posted on the USENET server.
 Step 3: On the internet, all the USENET servers are interconnected with each other, so
USENET server passes the copy of the same article to other.
 Step 4: When user wants to read any article, USENET server sends the copy of the
article using NNTP (Network News Transfer Protocol).
 Step 5: All the articles are stored on USENET server after specific period, these articles
are deleted from the server.

COMPUTER APPLICATION-IV 19

Das könnte Ihnen auch gefallen