MIDTERM EXAMINATION Solved
MIDTERM EXAMINATION Solved
Spring 2009
IT430- E-Commerce (Session - 1)
http://www.vustudents.net
255.0.0.0
255.255.0.0
255.255.255.0 (page 11)
None of above
Star Topology
Bus Topology
Media Topology
Ring Topology
Ref
http://www.w3schools.com/web/web_css.asp
Ref
http://iswww.w3schools.com/jsref/jsref_replace.asp
function:myFunction()
function myFunction() (page 58)
declare myFunction()
new myFunction
<it>
<i> (page 19)
<italics>
<italic>
Rect
Circle
poly
square (page 36)
Horizontal frame
Vertical Frame (page 31)
Top Frame
Bottom Frame
Question No: 16 __ ( Marks: 1 ) - Please choose one
Creating your own tags is not possible in HTML but in XML it is possible to create
Your own tags.
True
False
SMTP
POP3
IMAP (page 18)
ICMP
<css>
<script >
<sheet>
<style>
ref
http://www.ex-designz.net/test_grade.asp?tid=37
News headlines
Announcements
Sound pulgin
Movie controls
Ref
http://www.htmlcodetutorial.com/_MARQUEE.html
Question No: 4 __ ( Marks: 1 ) - Please choose one
Choose the correct HTML code line which left-align the content inside a tablecell.
<td leftalign>
<td valign="left">
<td align="left"> (page 26)
<tdleft>
if =! 5 then
if (i != 5) (page 58)
if <>5
if (i <> 5)
3 Tier
N -Tier
1 Tier
2 Tier
ref
[PPT]
CLIENT SERVER ARCHITECTURE
IP addresses
Request (url)
Date
Contents (page 136 and 3)
IP (PAGE 7)
RIP
MAC
NON OF THE GIVEN
+ (PAGE 61)
*
&&
&
text-transform :capitalize
text-transform: uppercase
text:capitalize
You can't do that with CSS
REF
http://www.ex-designz.net/test_page.asp?tid=37
Question No: 14 __ ( Marks: 1 ) - Please choose one
Why we use reset tag in HTML?
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 3)
http://www.vustudents.net
2. h3 {font-family: times}
3. p {font-family: courier}
</html>
mystyle.css:
h3{ color: red}
Browser default
External style sheet
Inline style
Internal style sheet
view
css
Style
Layout
Ref
http://www.yourhtmlsource.com/stylesheets/csslayout.html
Question No: 5___( Marks: 1 ) - Please choose one What is the correct HTML
for making a hyperlink? http://www.vustudents.net
<a url="http://www.w3schools.com">W3Schools.com</a>
<a>http://www.w3schools.com</a>
<a h ref="http ://www.w3schools.com">W3Schools</a> (page 23)
<a name="http://www.w3schools.com">W3Schools.com</a>
Relative Address
Absolute address
None of the given
Ref
Absolute paths are called that because they refer to the very specific location, including the
domain name. The absolute path to a Web element is also often referred to as the UR
<script>.. .</script>
<%...%>
<%>...</%>
<&>...</&>
ref
http://www.w3schools.com/asp/asp_syntax.asp
Netscape
Internet service providers
The World Wide Web Consortium
Microsoft
Local Variables
Global Variables
Local and Global
None of the above
Ref
http://www.authorpick.net/what-is-variables-in-programming-language/
Ref
http://www.dotnetspider.com/questions/ViewQuestion.aspx?QuestionId=6754&
Stateless (repeated)
State full
Temporary
All of these
EcmaScri pt
JavaScri pt
Java
VBScript (page 85)
catalog display
web hosting (page 92)
web services
transaction processing
Filtering
Cryptographic (page 100)
Server
Security
NORESIZE
ROWS (page 33)
FRAMEBORDER
BORDER
clicks a hyperlink
clicks a button
enters data in a form
all of the above (page 54)
True
False
Application layer
Session layer
Network layer (page 6)
Data link layer
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 4)
http://www.vustudents.net
Which of these is the correct HTML code for creating a reset button?
…..tag is used into …….tag because a row contains multi cells and to fill up these cells with data.
► TD…… TR
► TD…… TG
► TG…… TR
When you declare a variable within a function, the variable can only be accessed within that function.
When you exit the function, the variable is destroyed. These variables are called
► <script>
► <style> (repeated)
► <sheet>
MIDTERM EXAMINATION
Spring 2009
http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one
► Data frames
► Data boxes
► Data streams
► None of these
Which of these is the correct HTML code for creating a reset button?
► <input type =”button” name=”reset” value=”reset”>
…..tag is used into …….tag because a row contains multi cells and to fill up these cells with data.
► TD…… TR
► TR…… TD
► TD…… TG
► TG…… TR
► administrators
► experts
► hackers
► coders
► <FIELD>
► <TEXT>
► <INPUT>
► <HIDDEN>
► Document
► Date
► Loop
► Array
►<
►>
►=
► !=
► instance of new
► Simple Variable
When you declare a variable within a function, the variable can only be accessed within that function.
When you exit the function, the variable is destroyed. These variables are called
► Local Variables
► Global Variables
► i=0.
► i++.
► i<=5.
► (i = 0; i <= 5; i++).
► <frameset rows="16%,84%">
► <frameset columns="16%,84%">
► <frameset cols="100,150">
► <css>
► <script>
► <style>
► <sheet>
► <background>yellow</background>
► <body bgcolor="yellow">
► <body color="yellow">
► None
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
http://www.vustudents.net
REF
http://www.ex-designz.net/test_grade.asp?tid=65
_ Symmetric cryptography
_ Private key cryptography
_ Public key cryptography (PAGE 100)
_ Hash function
Instance of object
Copy of object
Instance / copy of object (page 69)
Shallow copy of object
DTD
XSL (repeated )
XML parser
Browser
only text
only numbers
only numbers or text
any valid variable
ref
http://java.sun.com/docs/books/jls/second_edition/html/arrays.doc.html
Question No: 12 ( Marks: 1 ) - Please choose
one Which tag is used for the hidden fields?
<FIELD>
<TEXT>
<INPUT> (page 88)
<HIDDEN>
Question No: 13 __ ( Marks: 1 ) - Please choose one
Packet filter firewall operates at
a) data link layer
b) network layer
c) transport layer
Submit button
Reset button
Radio button
None of the given
Application layer
Session layer
Network layer (page 6)
Data link layer
Hub
Switch
Router
Repeater (page 15)
<iframe>
<Frame>
<frameset>
<noframes>
<style src=mystlye.css>
<link re = “stylesheet” type= “text/css” herf= “mystyle.css”>
<stlyesheet> mystyle.css</stlyesheet>
All of these
Ref
http://www.ex-designz.net/test_grade.asp?tid=37
<td leftalign>
<td valign="left">
<td align="left"> (page 26)
<tdleft>
Question No: 7 ( Marks: 1 ) - Please choose one
In a Frameset code, do the BODY tags belong inside or outside of the NOFRAMES tag pair?
Inside because an HTM Document can only include one or the other.
Outside, to be seen by the older browsers [NN version 1 and IE version 2].
Outside because the W3C says that to be valid.
Contain a BODY tags pair.
Ref
http://www.tjkdesign.com/articles/frames/quiz.asp
background-attachment: fixed
background-attachment: scroll
background-at tachment : up
All of these
Textboxes
Dropdown
Object
Image
Ref
http://www.w3schools.com/js/js_objects.asp
Instance of object
Copy of object
Instance / copy of object (page 69)
Shallow copy of object
text.substr(5,6);
text.part(5,6)
text. piece(5 ,6)
text.split(5,6);
http://php.net/manual/en/function.substr.php
Sender’s side
Receiver’s side
Both sender and receiver sides
Neither on sender nor on receiver side (100% tuka )
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 4)
http://www.vustudents.net
REF
http://www.webreference.com/programming/javascript/diaries/15/
Ref
http://www.blackwasp.co.uk/CSharpForLoop.aspx
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
Solved
http://www.vustudents.net
Reference
http://www.echoecho.com/htmlforms13.htm
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
Solved
http://www.vustudents.net
► <h6>
Question No: 3 ( Marks: 1 ) - Please choose one
Which of the following tags are used for embedding sound files into HTML code?
► <A href=“song.wav”>
► <EMBED SRC="Skylar.MP3">
► <A href=“song.wav”> and <EMBED SRC="Skylar.MP3"> (page 37)
► None of these
Do correction in all midterm file J
Question No:44 answer is 3rd
Question No: 4 ( Marks: 1 ) - Please choose one
Which of the following is NOT an advantage of CSS ?
► Works on version 4 browsers or newer
► Define the look of your pages in one place
► Easily change the look
► Implement same formatting each time tag is used.
Advantages
1) Improved Search Engine Results
2) Sites Load Faster
3) Design Separated from Content:
4) Displayed on Various Media
5) Compatibility with Browsers
Browser inserts a line break before the <DIV> tag and after the </DIV> end tag.
They are used when you want to apply a specific style to a number of different tags and
sections throughout the document http://www.vustudents.net
The process of scrambling a message with the help of a key is called Encryption.
MIDTERM EXAMINATION
Spring 2010
IT430- E-Commerce (Session - 6)
Solved
http://www.vustudents.net
► Management strategy
Switch is a device that joins multiple computers together within one local area network (LAN).
► True (page 4)
► False
Question No: 3 ( Marks: 1 ) - Please choose one
In which protocol, the messages are not deleted from email server.
► SMTP
► POP3
► ICMP
► None of these
► Loads the new page into the entire window (page 33)
► view
► Layout
Choose the correct HTML code line which left-align the content inside a tablecell.
► <td leftalign>
► <td valign="left">
► <tdleft>
Where in an HTML document is the correct place to refer to an external style sheet?
When you declare a variable within a function, the variable can only be accessed within that
function. When you exit the function, the variable is destroyed. These variables are called
► Local Variables
► Global Variables
ref
http://en.wikipedia.org/wiki/Local_variable
► Instance of object
► Copy of object
► X-Markup Language
► Efficient working
► Networking purpose
► None of these
► None of these
Question No: 14 ( Marks: 1 ) - Please choose one
► Cookies
► JavaScript
► Applets
Firewall is used to
► I only
► I and II only
Which firewall uses strong user authentication to verify identity of a host attempting to connect
to the network?
► Hybrid firewall
► True
In Style Sheets, How do you add a background color for all "<h1>" elements?
► all.h1 {background-color:#FFFFFF}
► h1.all {background-color:#FFFFFF}
► h1 {background-color:#FFFFFF}(page 47)
► h1 {bgcolor:#FFFFFF}
How do you make each word in a text start with a capital letter?
► text-transform:capitalize
► text-transform:uppercase
None of these ►
MIDTERM EXAMINATION
Spring 2010
http://www.vustudents.net
Question No: 1 ( Marks: 1 ) - Please choose one
Network addresses 128--- 191 range belongs to which of the following class networks?
►A
► B (page 10)
►C
►E
► None of these
► Star Topology
► Bus Topology
► Ring Topology
► <textinput type="text">
► <input type="textfield">
► <textfield>
Where in an HTML document is the correct place to refer to an external style sheet?
How do you write a conditional statement for executing some statements only if "i" is
equal to 5?
► if i=5
► if i=5 then
► if i==5 then
► if (i==5)
ref
http://www.ex-designz.net/test_page.asp?tid=65
Question No: 9 ( Marks: 1 ) - Please choose one
Which of the following is used to get remote access of any computer on a network?
► Trojan Horse
► Backdoor
► Virus
► None of these
► <scripting>
► <javascript>
► <js>
► a=a*1;
► a=a+2;
► a=1+2;
► a=a+1;
ref
http://www.academictutorials.com/answers.asp?id=6
If a web server is bombarded with thousands of HTTP requests, that would be an example of ----
-----------.
► sniffing
► password attack
► Password attack
► DoS
► IP spoofing
► Symmetric cryptography
► Hash function
ref
http://www.digistamp.com/signature.htm
http://ecommerce.hostip.info/pages/271/Cryptography-Public-Private-Key.html
► True
► False
ref
http://www.exforsys.com/tutorials/networking/star-topology.html
► h1 {font-size:72pt}
► h1:font-size=72pt
► {h1:font-size=72pt}
► {h1;font-size:72pt}
ref
http://uk.answers.yahoo.com/question/index?qid=20100308120234AAPKmAf
In CSS, How do you make each word in a text start with a capital letter?
► text-transform:capitalize
► text-transform:uppercase (correct )
► text:capitalize
REFERENCE
► Left
► Center
► Right
► None
MIDTERM EXAMINATION
Spring 2009
IT430- E-Commerce (Session - 2)
http://www.vustudents.net
<iframe>
<Frame>
<frameset> (page 31)
<noframes>
<style>
<h1>
<p>
<a> (page 39)
css coding
<HTML><HEAD>
<STYLE TYPE="text/css">
<!--
H1 { color: blue }
-->
</STYLE>
</HEAD><BODY>
</BODY></HTML>
H1 { color: blue;
text-align: center; }
H1 { color: blue; text-align: center; }
<STYLE TYPE="text/css">
<!--
-->
</STYLE>
Equal to Not
Equal
Not Equal (page 58)
Efficient working
None of these
Protection against security attacks (page 96)
Networking purpose
ref http://www.w3schools.com/quiztest/quiztest.asp?qtest=HTML
I and II only
I, II and III (page 96)
I and III only
I only
Ref http://www.webopedia.com/TERM/F/firewall.html
Question No: 12 ( Marks: 1 ) - Please choose one
When two or more intranets are connected to each other they form a/an ----------
VPN
intranet
internet
extranet (page 2)
ref