[Link].
, DEGREE EXAMINATIONS-NOVEMBER 2009
(Candidate admitted from the academic year 2006-2007 onwards)
VII SEMESTER
COMPUTER SCIENCE AND ENGINEERING
WEB TECHNOLOGY
Time:3Hrs Maximum Marks: 100 Marks
Answer all questions
Part A (06x2=12)
1. Intranet is also called as internal web because they allow organizations to have its
own private web sites, used by the users on the intranet.
2. Program for VB script.
<html>
<head>
<title>VB+HTML</title>
<script language=”VB script”>
Sub window_onload
msgBox “welcome to VBscript world”
End sub
</script>
</head>
</html>
3. Various forms that the client can appear to make interaction with e-mail server.
Application based- installed on to the user’s machine and include Microsoft outlook
express and Eudora.
Web based- appears in the browser’s window and include the hot mail and Yahoo and
Out look web client.
4. Public key and private key encryption diagram.
Sender Encrypted Decrypted Receiver
(A) Text Text (B)
Public key of ‘A’ Private key of ‘B’
5. Diagram for streams showing full duplex nature.
User process
Stream Head
Device Driver
Kernel
6. Over all steps for client/server communication using sockets.
Server Client
[Link] a listening socket and wait
for connections from clients.
2. Create a client socket and attempt to
connect to server.
3. Accept the client connection
4. Send and receive the data. 4. Send and receive the data.
5. Close the connection. [Link] the connection.
7. Drawbacks of server side scripting
Server will have the additional work load.
Comparatively slow.
Drawbacks of client side scripting.
Code is completely visible to the user and hence the security is violated.
8. Data Island
Data Island is the method to hold the XML code within an HTML page in
Microsoft internet explorer 5.0 or higher without the support of <OBJECT> tag.
(1 M)
Data Island is also called DSO (Data Source Object) (1 M)
9. Database connectivity established in java.
Data base connectivity achieved by using JDBC connectivity.
[Link](“[Link]”;
ResultSet rs;
Connection conn=[Link](jdbc:odbc:stdmark);
Statement st=[Link]();
Rs=[Link](“select * from smark”);
10. Back Logging
Monitoring user events at a critical position is useful to restore the system to the
old state in case of any occurrence of a new problem called back logging.
PART B (5X16=80)
11. a) (i) Types of server available for specific purpose.
1. Mail servers (2M)
i. POP and SMTP for receiving and sending the mails
ii. Manage incoming and out going mails
2. web servers (2M)
i. stores all web applications
ii. web client, example foe browsers
3. FTP servers (2M)
i. Stores the files
ii. Transferring files, eg, cuteFTP
4. News server (2M)
i. Publishing news
ii. Stores usenet news group articles that can be read and sent
5. Domain Name System (or) DNS servers (2M)
i. Remembering ip address is difficult
ii. Translate the domain address into ip and vice versa.
(ii) HTML program
Displaying text using : <Body> (1M)
Changing text color and background color: <Body bgcolor=”green” text=”blue”>
(2M)
Placing image: <img src=”[Link]” height=”100” width=”100”> (1M)
Changing font: <font face= “ArialBlack”> (1M)
Html structure with the above elements (1M)
11.b)
(i) Push technology (2M)
When the user types the URL the page automatically will be downloaded
automatically. Time consumption is very less to acquire any information.
IF (Information Filters) (2M)
Automatic method of storing relevant information from the available information
base.
Eg, Net nanny, Cyber patrol
Clipping services (2M)
Publishing automated clippings in the web sites said to be clipping service.
Eg, advertisements.
(ii)