Anna University Trichy, CS, Internet Computing, Nov / Dec , Question Paper. CSInternet Computing Question Bank.» CSInternet Computing Question Bank. Question Bank Provided by. Kings College of Engineering. Mobile Pervasive Computing (MC) (CS ) (CS72) – Question Bank 1 Internet Computing (ANNA UNIV – Trichy) (CS ) To get 7th sem Lecture notes.

Author: Mogal JoJozuru
Country: Barbados
Language: English (Spanish)
Genre: Science
Published (Last): 22 June 2018
Pages: 24
PDF File Size: 6.2 Mb
ePub File Size: 20.11 Mb
ISBN: 770-5-98582-510-2
Downloads: 46133
Price: Free* [*Free Regsitration Required]
Uploader: Tet

Handles intsrnet and distribution 2. Architectural design patterns capture the proven experience of software architectures in the form of architectural patterns, each with distant properties that address different architectural design patterns.


Response -It transmits information from cmoputing web server to web browser 5. What are Style Sheets? What is the purpose of routers? What is a protocol? A simple mechanism for adding style such as fonts,colors, or spacing to web documents. It is a method for referencing an object without declaring the full path to the object.

Application -It manages your web application. List down font characteristics permitted in style sheets.


CS1401-Internet Computing Question Bank

What are the style precedence rules when using multiple approaches? A loosely defined set of technologies developed by Microsoft for sharing information among different applications. A Web site is a collection of related pages. Because IIS is tightly integrated with the operating system, it is relatively easy to administer.

Newer Post Older Post Home. Making the connection 2. Its protect the internal network from unauthorized access or activity. Java servlets are becoming increasingly popular as an alternative to CGI programs. ActiveX is not a programming language, but rather a set of rules for how coomputing should share information. Environmental science and engineering Two Marks Wi What are the two commonly used Request methods? What does ICMP provide? To control this risk, Microsoft developed a registration system so that browsers can identify and authenticate an ActiveX control before downloading it.

Connection oriented transport protocol Sends data as a stream of bytes Guarantee of delivery Connection less protocol Datagram service No guarantee of delivery. This is analogous to a Java applet that runs within a Web browser environment. Manages application tasks 2. With the growing popularity of OLE object linking and embeddingapplets are becoming more prevalent.


How to request Study Material? Why are the protocols layered? A firewall is a piece of network hardware that serves as a secure gateway between an internal network and the Internet.

Cascading refers to a certain set of rules that browsers use, in cascading order, to determine how to use the style information. It is the important approach to software discovery and it is decentralized, loosely coupled. Such a set of rules is useful in the event of conflicting style information because the rules would give the browser a way to determine which style is given precedence. When a web server receives a HTTP request from a web browser it evaluates the request and returns the requested document, if it exists, and then breaks the HTTP connection.

Capability to process forms and prepares output based on form input.