EJ – 826

*EJ826*

VII Semester B.E. (CSE/ISE) Degree Examination, January 2013 (2K6 Scheme) CI7.3 : INTERNET PROGRAMMING Time : 3 Hours

Max. Marks : 100

Instruction : Answer any five question choosing at least two from each Part. PART – A 1. a) Explain internal working of CGI. Give the steps to be followed to execute CGI scripts.

12

b) Write CGI script that delivers a different document depending on whether browser supports graphics or not. Open and display file called mypicture gif. 2. a) With perl script explain GET and POST method.

8 10

b) Write CGI program to accept a UNIX Command from HTML file and display output of command.

4

c) With examples explain following SSI directives i) exec ii) Include.

6

3. a) Write HTML document with form for conducting survey on favourite Engg. College. CGI script that processes the form results and places them in file, and CGI script that reads the text file and display tabulated results as pie graph. 12 b) Explain how Static and Dynamic contents are served in a web.

8

4. a) Implement a student class, A student has a name, stipend and Registration number, write a default constructor and constructor with two parameter (name and registration number) and two methods. a) To return the name and registration number b) Method that Increase the student stipend. Write a small programs that test your class.

8 P.T.O.

EJ – 826

-2-

*EJ826*

b) Define terms with example i) Encapsulation ii) Method overloading.

4

c) Write Java program that demonstrate private and public access control.

8

PART – B 5. a) Given three classes called A, B, C. C can be subclass of B, which is a subclass of A. Class A has three components namely width, height, depth class B has its own component called weight similarly class C has its own component called cost. Use inheritance concepts to implement above example.

10

b) Write suitable Java code to generate and handle following Exceptions. i) Divide-by-zero ii) Array-Index-Out-bounds iii) Number format exception iv) Null pointer exception v) Negative Array size exception.

10

6. a) Define interface for circular queue, write Java class to implement interface that perform operation of circular queue.

10

b) There are two task namely i) Generating prime number from 1 to 10 ii) Generating Fibonacci series upto 15 Use multi threading to accomplish above mentioned task.

10

*EJ826*

-3-

EJ – 826

7. a) Write Java program that sorts an Array of strings , use Compare To ( ).

6

b) Write Java program to tokenize string title = Java : the Complete Reference author = yourname publisher = Tata McGraw-Hill Copyright = 2002

6

c) Write java Applete program to set the background colour to green and text colour to red. 8. a) Explain get Document Base ( ) and get Document ( ) methods in Applet. b) Write Java program to demonstrate mouse event handler.

____________

8 8 12

Internet programming.pdf

b) Write CGI program to accept a UNIX Command from HTML file and display. output of command. 4. c) With examples explain following SSI directives. i) exec.

70KB Sizes 3 Downloads 221 Views

Recommend Documents

Internet Internet
any other place with an internet connection and permission from UWM) to ... example, adding reactor startup demonstrations in its tours. VIRTUAL CONSOLE ...

Bell Fibe Internet 5 - Bell Internet Package, Plan and Pricing.pdf ...
Bell Fibe Internet 5 - Bell Internet Package, Plan and Pricing.pdf. Bell Fibe Internet 5 - Bell Internet Package, Plan and Pricing.pdf. Open. Extract. Open with.

Internet Legends Guide & Parent Letter The Internet ... UK
The Parent Letter is designed to be sent home with each student following the ... Presenter 1 and Presenter 2 but it can be run with a single presenter if you want ...

Internet Legends Guide & Parent Letter The Internet Legends ...
The content is most suitable for Year 2's and above but you will know best whether it will work ... You could give them each a red and green card or you could ...

pdf-144\african-internet-business-manifesto-the-official-internet ...
... the apps below to open or edit this item. pdf-144\african-internet-business-manifesto-the-officia ... -netpreneurs-and-their-foreign-partners-by-dr-ope-b.pdf.

Internet The Internet is a worldwide, publicly ...
UDP is a best-effort, connectionless transport, in which data packets that are lost in transit will not be re-sent. The application protocols sit on top of TCP and UDP ... Software products that can access the resources of the Web are correctly terme

Internet Legends Guide & Parent Letter The Internet Legends ...
The Internet Legends Assembly is a fun, interactive session that is designed to teach children a simple code to keep them safer ... This Guide offers support for running an Internet Legends Assembly in your school. ○ The Parent Letter is ... it wil

Internet Legends Guide & Parent Letter The Internet Legends ...
The Internet Legends Assembly is a fun, interactive session that is designed to teach children a simple code to keep them safer online ... This Guide offers support for running an Internet Legends Assembly in your school. ○ The Parent Letter is ...

Internet Marketing.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Internet Marketing.pdf. Internet Marketing.pdf. Open. Extract.

Internet Marketing.pdf
There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Internet ...

Internet Conference.pdf
Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Internet Conference.pdf. Internet Conference.pdf. Open. Extract.

Internet Resources.pdf
(b) Electronic Journals. (c) Data Archives. (d) Common Gateway Interface (CGI). MLI-005. Page 2 of 2. Main menu. Displaying Internet Resources.pdf. Page 1 of ...

y mina internet
... complete search history. Foreign Application Priority Data .... unit, for example to an Internet service provider, are no ... outgoing channel depends on the type of the application and .... monitoring unit 54 in the switching facility 10 additio

Internet Filtering
Instead of a World Wide Web, as the data from our study of Internet filtering makes plain ..... The decision is most complicated when a single domain hosts ... Page 10 ..... these legitimate circumstances, the state reasonably turns to those best ...

Internet Marketer.pdf
CÔNG TY MAJOR EDUCATION. Hạn nộp hồ sÆ¡: 30/04/2015. Địa chỉ: 269A Nguyễn Trọng Tuyển, F10, Phú Nhuận. Page 2 of 2. Internet Marketer.pdf. Internet ...

Internet Appendix -
Sep 5, 2013 - 2 Analytic Solution of Debt and Levered Equity. Let's begin with a lemma that is critical to derive the analytic solution of debt and levered equity.

INTERNET PROGRAMMING.pdf
b) Create HTML document to accept information from user. i.e. name, address,. email-id, education details in table format, list of projects handled (use ordered/.

Internet safety.pdf
participating in the SELCO wide area network to verify continued CIPA compliance. SELCO. staff will provide guidance in determining appropriate policy ...

Internet History.pdf
Sign in. Loading… Whoops! There was a problem loading more pages. Retrying... Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. Internet History.pdf

INTERNET FUNDAMENTALS.pdf
on the Internet, allowing people to send messages to one or more recipients. Email was. invented by Ray Tomlinson in 1972. It is a system used for creating, ...

INTERNET DELL'ENERGIA.pdf
Whoops! There was a problem loading more pages. Whoops! There was a problem previewing this document. Retrying... Download. Connect more apps... Try one of the apps below to open or edit this item. INTERNET DELL'ENERGIA.pdf. INTERNET DELL'ENERGIA.pdf

Internet Vocabulary.pdf
DNS (Domain Name System):. • “the system by which Internet domain names and addresses are tracked and. regulated” (New Oxford American Dictionary).

Swapsies on the Internet
Jul 6, 2015 - “speaks for” and “says” authentication constructs [21] and propose an obeys ... machines on open networks are not mutually suspicious, and that any ...... of trust relationships between high-level system components. (typically .