CERTIFICATE IN INFORMATION TECHNOLOGY (CIT) Term-End Examination June, 2014 CIT-003 : WEB BASED TECHNOLOGIES AND MULTIMEDIA APPLICATIONS Time : 2 hours
Maximum Marks : 50 (Weightage : 75%)
Note : There are two sections in this paper. Section-A and Section-B. All the questions from Section-A are compulsory. There are four questions in Section-B. Attempt any three questions from Section-B.
1.
SECTION - A In the following objective type questions, each 10 question has four choices, select the correct choice as your answer. If none of the given choices is correct then select 0 (zero) as your answer. Each objective type question carries one mark. Write your answer in answer sheet. (a) IPv4 address is long. (i) 16 bits (ii) 32 bits (iii) 64 bits (iv) 96 bits (b) Which of the following is a Web Server ? (i) BIOS (ii) IIS (iii) TCP (iv) HTTP (c) Index of a search engine is implemented using : (i) sorting (iii) hashing
CIT-003
(ii) searching (iv) encoding 1
P.T.O.
WIKI can be used for : (ii) chatting (i) email (iii) browsing (iv) collaboration (e) Smallest heading tag is : (i) (ii)
(iv)
(iii)
scripting language. (f) ASP is a/an client side server side HTML based none of the above (g) Frame page : (i) acts like a container (ii) stores HTML text based web pages only (iii) cannot contain another frame (iv) none of the above (h) •MPEG is used as : picture storage video compression standard frame storage none of the above (i) The size of a bitmap image is than that of a vector image. more less same none of the above (d)
CIT-003
2
4.
(a) (b)
5.
(a)
(b) 6.
Define the term "multimedia". List and explain various components of multimedia. What is DNS in the context of Internet ? Explain the use of DNS in Internet with the help of an example. Explain the use of following tags with the help of an example. (ii)
none of the above. (g) Frame page : (i) acts like a container. (ii) stores HTML text based web pages only. (iii) cannot contain another frame. (iv) none of the above. (h) â¢MPEG is used as : picture storage video compression standard frame storage none of the above. (i) The size of a bitmap image is than that of a vector image.
CERTIFICATE IN INFORMATION. TECHNOLOGY (CIT). Term-End Examination. June, 2014. CIT-003 : WEB BASED TECHNOLOGIES AND. MULTIMEDIA APPLICATIONS. Time : 2 hours. Maximum Marks : 50. (Weightage : 75%). Note : There are two sections in this paper. Section
Explain any two technologies used for. E-learning. (b) What is computer vision ? Explain any two applications of computer vision. 5. 15. (a) What are the different types of e-commerce models ? Discuss them with appropriate examples. 5. (b) What are t
sound, graphics, photographs/images, animation, simulation, games, video, etc. 1. 10. ... applications of computer vision. 5. 15. (a) What are the different types of ...
mark. 10x1.10. (a) The is a cable which carries signals representing data from one place to another. (i). Register. (ii) Bus. (iii) Multiplexer. (iv) Interface. CIT-001.
(c) A group of 8-bits is known as. (i) word. (ii) byte. (iii) nibble. (iv) kilobyte. (d) The information which is permanently stored in a ROM chip is called as. (i) hardware. (ii) software. (iii) firmware. (iv) application software. (e) Operating Sys
Each objective type question carries one mark : 10x1=10. (a) Which of the following operator is "boolean. AND" operator ? (i) I I. (ii) &. (iii) &&. (iv) &= (b) Tuple in a database is also known as : (i) Column. (ii) Table. (iii) Row. (iv) Relation .
10x1=10. (a) Which of the following operator is "boolean. AND" operator ? (i) I I. (ii) &. (iii) &&. (iv) &= (b) Tuple in a database is also known as : (i) Column. (ii) Table. (iii) Row. (iv) Relation. (c) Which of the following is not a type of. DBM
5. 4. (a) Explain the use of ICT in e-Learning. 5. (b) Explain medical transcription process with. 5 the help of a diagram. 5. Explain MIS as an integrated application. Also 10 explain Do's and Don'ts in development of MIS. 6. What is embedded operat
(c) Knowledge Management System cannot be used for creating and sharing information. (d) Digital Signature cannot be used for authentication and integrity. (e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat
(e) user id and password is used as a security tool in online banking. (f) Internet Relay Chat (IRC) is used for synchronous, multi-person, text ... (i) A touch screen is a display which can detect the presence and location of a touch within the disp
10. What layer in TCP/IP stack is equivalent to the. Transport Layer of the OSI model ? (a) Application. (b) Host to Host. (c) Internet. (d) Network Access. SECTION - B. (Attempt all the very short answer type questions.) 11. What is email spoofing ?
OSEI-044 (P) : SERVER SECURITY. Time : 3 hours. Maximum Marks : 100. Note : (i) Attempt any two out of three questions. Each question carries 40 marks.
I OSEI-044 I. No. of Printed Pages : 5. ADVANCED CERTIFICATE IN INFORMATION. SECURITY (ACISE). Term-End Examination. June, 2016. 00286. OSEI-044 : SERVER SECURITY. Time : 2 hours. Maximum Marks : 50. Note : (i). Section-A : Answer all the objective q
(b) Secure Socket Layer (SSL). (c) Firewalls. (d) Authentication. 15. (a) What is Software Maintenance ? What is its significance ? 5. (b) What is Computer Vision ...
environment, and best practices to develop innovative alternatives for business ... Development Corporation Information Technology Consulting Services.pdf.
LR IN Information Technology - Polytechnics - Kerala Technical Education.pdf. LR IN Information Technology - Polytechnics - Kerala Technical Education.pdf.
Translate the following Arabic sentences, related to "conversation between father and son, into Arabic. Li. L.4âº: ci.At : (al-abb : hal t'rif ma wajibuna naHwa ...