Beruflich Dokumente
Kultur Dokumente
Answer: HTTP
The World Wide Web is about communication between web clients and web servers.
Clients are often browsers (Chrome, Edge, Safari), but they can be any type of program
or device.
Servers are most often computers in the cloud.
Basic Features
There are three basic features that make HTTP a simple but powerful protocol:
HTTP is connectionless: The HTTP client, i.e., a browser initiates an HTTP request
and after a request is made, the client waits for the response. The server processes the
request and sends a response back after which client disconnect the connection. So
COMPUTER APPLICATION-IV 1
IMPORTANT QUESTIONS
client and server knows about each other during current request and response only.
Further requests are made on new connection like client and server are new to each
other.
HTTP is media independent: It means, any type of data can be sent by HTTP as long
as both the client and the server know how to handle the data content. It is required for
the client as well as the server to specify the content type using appropriate MIME-
type.
HTTP is stateless: As mentioned above, HTTP is connectionless and it is a direct
result of HTTP being a stateless protocol. The server and client are aware of each other
only during a current request. Afterwards, both of them forget about each other. Due
to this nature of the protocol, neither the client nor the browser can retain information
between different requests across the web pages.
COMPUTER APPLICATION-IV 2
IMPORTANT QUESTIONS
Dynamic IP Address
Dynamic IP Addresses are assigned to the devices that require temporary connectivity
to the n/w. ex. Portable computer.
The most common protocol used for assigning dynamic IP Address is DHCP protocol.
The DHCP grants IP address to a computer for temporary period.
Static IP Address
Static IP Addresses are assigned to the device on the n/w whose existence in the n/w
remains for a longer duration.
The static IP Address are semi-permanent IP address which remain allocated to a
specific device for longer time ex. Server.
IP Address can be classified as
Class A Address
Class A IP address use first byte for the n/w address and other byte for the host address.
Class A IP Address provide 128 n/w block.
Class B Address
Class B IP Address use first two bytes fro the n/w address and other two bytes for the
host address.
Class B IP Address provides 16384 n/w blocks.
Class C Address
Class C IP Address use first three bytes for the n/w address and last byte for the host
address.
Class D Address
Class D address is designed for multicasting.
Each address in this class define a particular group of host on n/w.
When a group of computers are assigned an address from this class, each host withun
the group has a multicast address in addition to its normal addrss.
Class D IP address starts from 224 to 239.
Class E Address
COMPUTER APPLICATION-IV 3
IMPORTANT QUESTIONS
A Two tier client server means that a client s/w is installed on several computers and
the client component will have the communication with the server.
A database is usually involved in this type of n/w.
It has a centralized database and client exchange data with server.
COMPUTER APPLICATION-IV 4
IMPORTANT QUESTIONS
COMPUTER APPLICATION-IV 5
IMPORTANT QUESTIONS
COMPUTER APPLICATION-IV 6
IMPORTANT QUESTIONS
5) Reverse Blog
A Reverse blog is composed by it’s users rather than a single blogger.
This blog is written by many authors on a specific topic.
Some of them are open for all to write message but there the limited numbers
of users are allowed.
COMPUTER APPLICATION-IV 7
IMPORTANT QUESTIONS
There are different categories of the top level domain and they are
(1) Non –Geographical Domain
(2) Geographical Domain
Non –Geographical Domain
Domain name that falls under this category are named using 3 characters that indicates
the functionality of the organization.
Ex. . Com- Commercial Organizatin
.Edu- Education Institution
.Mil- Military Groups
.Org- Non profit Organization
.Int- International Organization
.Gov- Government Institution
.net- Network Organization
Geographical Domain
Domain name that falls under this category are named using 2 character country name
which are specified by ISO (International Standard Organization).
Ex- .In- India
.PK- Pakistan
.CA- Canada
.US- United State of America
.UK- United Kingdom
Ex. WWW.yahoo.com is complete domain name
DNS is the technique used to provide standard naming conversion for finding IP address
on the n/w.
The DNS is based on hierarchical and logical tree structure called Domain Name Space.
Internet domains are classified into various categories like “root”.
COMPUTER APPLICATION-IV 8
IMPORTANT QUESTIONS
Step 1: when the user request to the URL from their web browser first request is senyt
to local name server to get the IP address.
Step 2: If URL is at the local name server than it find the IP address of the requested
URL and give the IP address to the web browser.
Step 3: if the URL is not at the local server than it can not find the IP address and then
local name server sent the request to the root domain server.
Step 4: The root domain server provide the information of primary name server and
secondary name server to local name server.
Step 5: local name server now contact with the primary name server, if the primary
name server find the IP address then it send to the local name server otherwise it connect
with the secondary name server and get IP address of the requested URL.
Step 6: Finally local name server send that IP address to the web browser.
COMPUTER APPLICATION-IV 9
IMPORTANT QUESTIONS
All the search engines are mainly divided into three parts: (1) Spider
(2) Database
(3) Search Tools
Spider:
Database:
Search Tools:
Step 1: Each search engine user spider to crawl across the internet to gather
information.
Step 2: The spiders find out the URLs then software agent who gather the information
from the different sources are instructed to get the documents and send information to
indexing software.
Step 3: Indexing software receives the URLs from the software agent.
Step 4: Indexing software fetch the information from the documents, indexes it and
stores it into the database.
COMPUTER APPLICATION-IV 10
IMPORTANT QUESTIONS
Step 5: When user visit a search engine, types the keyword and need to press search
but to than this request is forwarded to the database.
Step 6: The database finds the SEARCH TEXT’s information.
Step 7: the result will be displayed in form of HTML pages. These webpages are
displayed search tool of the year.
A Meta Search engine is a search engine that send user’s request to several other search
engine and returns the result from each one.
There are number of meta search engines available on internet
Example of meta search engines: Dogpile, Web Crawler.
Meta search engine enables users to enter search TEXT and access several search
engine simultaneously.
Meta search engines reduces the time for searching and eliminates duplicate results.
Step 1: User type the keyword into Meta search engine which he want to search.
Step 2: Meta search engine software send many software agent simultaneously. Each
software agent contact one or more search engine.
Step 3: These software agents have the information about the search keyword which is
used by the search engine. These software agents converts the search keyword into
proper syntax and then submit to the search engine.
Step 4: Each search engine find out the result from its database and send back reply to
the software agent.
Step 5: Software agent send back result to the meta search engine.
Step 6: after submitting result to the meta search engine, software agent goes to another
search engine and find out the result.
Step 7: meta search engine takes all the result from all the search engines, create virtual
database and examine them for the duplicate result if it finds the duplicate result then it
deletes it.
Step 8: meta search engine software display these results to the user.
COMPUTER APPLICATION-IV 11
IMPORTANT QUESTIONS
Answer: E-Mail
Email allows the user to send the data over the internet.
Email is one of the most commonly used service for the transaction of data such as
documents.
An email address is usually in the form of user@domain name. example:
ABC@yahoo.com.
The domain name can have several components usually the name of each node.
An email system is divided into two sub system: (a) UA (User Agent)
(b) MTA (message Transfer Agent)
The most popular email websites allow the user to attach file.
This ATTACHMENT can be of any file ex. Word processing document, spread sheer,
multimedia file, pdf file etc.
Sending Mail:
The user need to provide the destination address and message while sending an
email.
The message can be developed using TEXT editor provided by, the user agent
or with the help of third party software.
Receiving Mail:
The UA at the recipient end checks the mail box periodically for a new email.
If a UA receives email, a notification is given to the user.
If the user is ready to read the email a list is displayed, which contain the
information about the sender’s email address, subject of message and time of
message.
Components of email:
COMPUTER APPLICATION-IV 12
IMPORTANT QUESTIONS
SMTP is an internet standard protocol that is used for transferring email from client to
email server.
SMTP is not dependent on any particulars transmission system.
SMTP protocol makes the connection between the sender and receiver and then transfer
the message.
SMTP protocol is used in TCP/IP network for transferring email message.
SMTP protocol is used only when both the sender and receiver are ready at the same
time.
SMTP provides mechanism for the transfer of message, directly from sender host to
receiver host.
In order to be more reliable the SMTP server must supplied with the destination address.
Binary data is not supported by email MIME standard was developed to enable such
data to be send as attachment to email message.
These attachment includes files such as a word document, spread sheet, multimedia file
and pdf file.
MIME cannot replace SMTP protocol but it is only an extension to SMTP protocol.
COMPUTER APPLICATION-IV 13
IMPORTANT QUESTIONS
IMAP includes the operation for creation, deleting, renaming a mail box
COMPUTER APPLICATION-IV 14
IMPORTANT QUESTIONS
Syntax:
PING (-t) (-a) (-n count) (-i TTL) (-W Timed) destination IP Address
Options:
(-a): If user specify domain name in place of IP address then this option is used.
(-n count): This option is used to specify how many packets user want to send with one
request.
(-i TTL): TTL is Time To Leave, it is used to specify with in how much time user
request must be received by the destination computer.
(-W Timeout): This option is used to specify after how much time user want to check
the network connectivity again.
COMPUTER APPLICATION-IV 15
IMPORTANT QUESTIONS
If user gets this output means PING command cannot find the destination computer.
COMPUTER APPLICATION-IV 16
IMPORTANT QUESTIONS
Step 1: Open any of the instant messaging software from your computer.
Step 2: User has to specify user name & password information to that software.
Step 3: This information is sent to the login server for the verification.
COMPUTER APPLICATION-IV 17
IMPORTANT QUESTIONS
Step 4: Login server checks the information, if the information is correct then login
server instructs the instant messenger to close the connection with the login server and
establish the connection to the chat server.
Step 5: When user sends the message, user’s message is forwarded to the chat server
and then chat server this message to the appropriate user.
(3) Web based chat
Web based chat is even more convenient than windows based chat programs that don’t
need to install any program.
Most web based chat website prohibit SPAM messages.
Most website require user to register before using chat room.
The websites which provides the facility of web based chat also specifies rules for
CHATING.
News group
In USENET number of discussion topics are available on which user can discuss.
This discussion topic in specific area of interest is known as News group.
Number of newsgroups are available on internet and user can also create their own news
group
When user creates his own newsgroup, USENET allocates space on server where all
the articles are POSTED and stored.
COMPUTER APPLICATION-IV 18
IMPORTANT QUESTIONS
(2) Un moderated newsgroup: All the articles are directly posted on NEWSGROUP and
can be viewed by user.
Article
Each newsgroup contains number of message and each message is known as article.
The article is divided into two parts:
(1) Header: The header section includes the technical detail like sender’s name, E-mail
ID, subject of the article and group name etc.
(2) Body: The body section includes the original message.
COMPUTER APPLICATION-IV 19