Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web...

33
9227 MAY- 2015 COMPUTER SCIENCE & ENGG- 2ND YEAR PAPER-1: OOPS & JAVA [THEORY] Time:- 3 Hrs Max. Marks:- 50 SECTION-A 10 x 2=20 Note:- 1. Answer ALL Questions: 2. Each Question carries TWO Marks. 01. Who developed Java Language ? A. Java was developed by James Gosling at Sun Microsystems in 1995. 02. What is a class? A. Class: A class is a collection of objects of similar type. It is a template from which objects are created. 03. What is an array? A. Array: An array is a collection of similar type of data elements which are stored in consecutive memory locations under a common variable name. 04. What is polymorphism? A. Polymorphism: Polymorphism means the ability to take more than one form is called Polymorphism. 05. What is a Package? A. Package: Packages are a way of grouping a variety of classes and or interfaces together. The grouping is done according to their functionality. Packages are act like containers for classes. Syntax: 1. To create a package: packagepackage_name; 2. To import a package: importpackage_name.*; 06. What is debugging?

Transcript of Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web...

Page 1: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

9227 MAY- 2015

COMPUTER SCIENCE & ENGG- 2ND YEAR

PAPER-1: OOPS & JAVA [THEORY]

Time:- 3 Hrs Max. Marks:- 50

SECTION-A 10 x 2=20

Note:- 1. Answer ALL Questions:

2. Each Question carries TWO Marks.

01. Who developed Java Language ?

A. Java was developed by James Gosling at Sun Microsystems in 1995.

02. What is a class?

A. Class: A class is a collection of objects of similar type. It is a template from which objects are

created.

03. What is an array?

A. Array: An array is a collection of similar type of data elements which are stored in consecutive

memory locations under a common variable name.

04. What is polymorphism?

A. Polymorphism: Polymorphism means the ability to take more than one form is called Polymorphism.

05. What is a Package?

A. Package: Packages are a way of grouping a variety of classes and or interfaces together. The grouping is done according to their functionality. Packages are act like containers for classes.

Syntax: 1. To create a package:

packagepackage_name;2. To import a package:

importpackage_name.*;

06. What is debugging?

A. Debugging: The process of identifying and removing user committed errors from a program is called debugging.

07. What is multithreading?.

A. Multithreading: Multithreading is a programming concept in which a program or a process is

divided into two or more sub programs or threads that are executed at the same time in parallel. Multiple

threads can run concurrently in a single program.

08. What is an Applet?

A. An applet is a Java program that runs in a Web browser.

Page 2: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

09. What is an AWT?

A. AWT: AWT stands for Abstract Window Tool Kit. It is a portable GUI library among various

operating systems for stand-alone applications.

10. What is an Event?

A. Event: Changing the state of on object is called an Event. Ex:click on button, dragging mouse etc.

SECTION - B 5 x 6 = 30

Note:- 1. Answer ANY FIVE Questions:

2. Each Question carries SIX Marks.

11. Write about the main feature of OOPS.

A. There are four main features of OOPS are Abstraction Encapsulation Polymorphism Inheritance

Abstraction: The process of abstraction in Java is used to hide certain details and only show the essential features of the object. In other words, it deals with the outside view of an object (interface).

Encapsulation: The process of wrapping data into a single unit is called Encapsulation.

Inheritance: This is the process in which a properties of a predefined class can be inherited in a new class making the object of that class in the making class.

Polymorphism: This is the process in which a program can have more than one function with the same name but different parameters.

12. What are the data types in Java?

A. Java has four main primitive data types built into the language. We can also create our own data types.

Integer: byte, short, int, and long. Floating Point: float and double Character: char Boolean: variable with a value of true or false.

The following chart summarizes the default values for the java built in data types.

Type Size in Bytes Range

byte 1 byte -128 to 127

short 2 bytes -32,768 to 32,767

Page 3: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

int 4 bytes -2,147,483,648 to 2,147,483, 647

long 8 bytes -9,223,372,036,854,775,808 to 9,223,372,036,854,775,807

float 4 bytes approximately ±3.40282347E+38F (6-7 significant decimal digits) Java implements IEEE 754 standard

double 8 bytes approximately ±1.79769313486231570E+308 (15 significant decimal digits)

char 2 byte 0 to 65,536 (unsigned)

boolean not precisely defined*

true or false

13. Explain the Relational Operators with examples.

A. The Relational Operators:There are six following relational operators supported by Java language

Operator Purpose

== is Equal to

!= is Not equal to

> is Greater than

< is Less than

>= is Greater than or equal to

<= is Less than or equal to

Suppose a , b and c are integer variables and assigned 3,5and 10 respectively.Relational Expression Result

a>b False

(a+b) < c True

a>=3 True

a != b True

b <= a False

c == 10 True

14. Write about switch statement.

Page 4: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

A. Switch Statement: The switch statement tests the value of a given variable against a list of value and

when a match is found, corresponding block of statements associated with the case will be executed. If

none is matched ‘default’ block will be executed. The ‘break’ statement at the end of each block signals

the end of a particular case causes an exit from the switch statement, transferring the control to the

statement immediately following the switch.

Syntax: switch(expression)

{

case value: block1;

break;

case value: block2;

break;

case value: block3;

break;

--------------------

--------------------

default: default block;

break;

}

Sample programwith switch.. case is as follows.

importjava.util.Scanner;

public class SwitchExample

{

public static void main(String args[])

{

System.out.println("enter a code");

Scanner in = new Scanner(System.in);

int code = in.nextInt();

switch(code)

{

Page 5: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

case 1 :

System.out.println("first class"); break;

case 2:

System.out.println("second class"); break;

case 3 :

System.out.println("third class"); break;

default :

System.out.println("fail");

}

}

}

15. Write a java program to find factorial of a given number.

A. //to find the factorial of given number

import java.util.Scanner;

class Factorial{

public static void main(String args[]){

int i,f=1,n;

System.out.println("Enter an Integer:");

Scanner in = new Scanner(System.in);

n = in.nextInt();

i = 1;

while(i<=n){

f*=i;

++i;

}

System.out.println("Factorial of"+n+"is" +f);

}}

Output:

Enter an Integer:

5

Factorial of 5 is 120

16. Explain about overloading with an example.

A. Method Overloading: Overloading means creating more than a single method with same name with

different signatures.

Page 6: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

Java identifies the methods with by comparing their signatures like return types, constructor

parameters & access modifiers used.

Ex:

class Overload {

void test(int a){

System.out.println("a:"+a); }

void test(int a, int b){

System.out.println("a and b:"+a+","+b);}

double test(double a){

System.out.println("double a" +a);

return a*a; }}

classMethodOverloading{

public static void main(String args[ ]){

Overload overload=new Overload();

double result;

overload.test(10);

overload.test(20,30);

result=overload.test(2.5);

System.out.println("Result:"+result);

}}

Output:

a: 10

a and b: 20,30

double a: 2.5

Result: 6.25

17. What are the differences between package and interface.

A. . Interfaces Vs PackagesA package is just a mechanism for grouping objects, it is very similar to grouping items within a

folder or directory on a file system. A class is found within a package, but this does not have an impact on the class behavior.

An Interface, however, is a.java file that is used (implemented) by another class to tell the outside world that it conforms to a certain specification.

Page 7: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

Interfaces have more in common with abstract classes than they do with packages. An Interface, by definition, cannot have any implemented methods.

An abstract class can define some methods and leave some methods to implemented by a subclass.

A class can implement many interfaces, but can only extend one (abstract) class.

18. What are the basic methods of the applet class.

A. Life Cycle of an applet: Four methods give us the framework on which we build an applet.1. init : This method is intended for whatever initialization is needed for our applet. It is called after

the param tags inside the applet tag have been processed.2. Start: This method is automatically called after the browser calls the init method. It is also called

whenever the user returns to the page containing the applet after having gone off to other pages.3. Stop: This method is automatically called when the user moves off the page on which the applet

sits. It can, therefore, be called repeatedly in the same applet.4. Destroy: This method is only called when the browser shuts down normally5. Paint: Invoked immediately after the start() method and also any time the applet needs to repaint

itself in the browser. The paint() method is actually inherited from the java awt.

------X--------X---------X-------

9228 MAY- 2015

COMPUTER SCIENCE & ENGG- 2ND YEAR

PAPER-2: RELATIONAL DATABASEMANAGEMENT SYSTEMS (RDBMS)

Time:- 3 Hrs Max. Marks:- 50

SECTION-A 10 x 2=20

Note:- 1. Answer ALL Questions:

2. Each Question carries TWO Marks.

01. What is a database?

A. . A database is a collection of logically related information that is organized in a systematic manner so

that it can easily be accessed, managed and updated.

02. What is an Entity?

A. Entity: An Entity is an “Object” that exists and is distinguishable from other objects.

03. What is a domain?

A. Domain:Domain is a pool of values of a specific attribute. Separate domains for separate attributes.

04. What is a relational database?

A. Relational database is a database that has a collection of tables of data items, all of which is formally described and organized according to the relations.

Page 8: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

05. What is a tuple?

A. Tuple is a record (row) is a table.

06. Write the DDL commands.

A. DDL commands: create, alter and drop.

07. What are the set operators in SQL?

A. There are four basic operations in SQL

1. Select2. Update3. Insert4. Delete

08. Write the different data types in PL-SQL.

A.

Data type Purpose / UsageNumber For storing numeric dataChar For storing charter dataDate For storing date and time dataBoolean For storing TRUE or FALSE or NULL%TYPE Variables based on definitions of columns in a table. And allows programs

to adapt to changes made to the table.NOT NULL To create a variable or a constant that cannot have a null value.

09. What is a system analysis?

A. Analysis is detailed study of a Software system.

10. What is Data dictionary?

A. Data Dictionary is a repository that contains descriptions of all data objects produced by the software.

SECTION - B 5 x 6 = 30

Note:- 1. Answer ANY FIVE Questions:

2. Each Question carries SIX Marks.

Page 9: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

11. Explain about different data models.

A. Different data models are

1. Object based data models

2. Record – based data models

3. Physical data models

1. Object base data models: Object-based logical models are used in describing data at logical and view levels. They are characterized by the fact they provide flexible structuring capabilities and allow data constraints to be specified explicitly. There are many different data models, some of them are

i. The Entity-relationship model

ii. The Object-oriented model

iii. The semantic data model

iv. The Functional data model

2. Record based data models: In Record based data models; the database is structured in

fixed formats records of several types. Each record defines fixed number of fields (attributes)

and each field is fixed length. These models are used to specify the overall logical structure of the

database and are used in describing the database at conceptual level.

The three widely accepted record – based data models are:

a) Relational model

b) Network model

c) Hierarchical model

3. Physical data models: Physical data model are used to describe data at the lowest level.

In contrast to logical data models, there are few number of physical data models which are in use.

very few physical data models have been proposed so far. Two of these well known models are

the unifying model and the frame memory model.

12. What are the functions of DBA?

A.

1. Schema definition2. Storage structure and Access method definition3. Schema physical organization and modification4. Granting of authorization for data access5. Routine maintenance

Page 10: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

1. Schema Definition: The DBA creates the original database schema by executing a set of definition statements in the DDL.

2. Storage structure and Access method definition: DBA will decide the actual storage structure and different access methodologies for the database.

3. Schema physical organization and modification: The DBA carries out the changes to the schema and physical organization to reflect the changing needs of the organization or to alter the physical organization to improve the performance.

4. Granting of authorization for data access: By granting different types of authorization, the database administrator can regulate which of the database various can access.

5. Routine maintenance: DBA is the final authority to regulate daily activities.

13. Explain mapping constraints with neat diagram.

A. There are 4 types of mapping constraints.

1. ONE – to – ONE relationship

2. MANY – to – ONE relationship

3. ONE – to – MANY relationship

4. MANY – to – MANY relationship

1. ONE – to – ONE relationship: An entity in A is associated with at most one entity in B , An

entity in B is also associated with at most one entity in A.

Example : Relationship between the entities principal and college. i.e., Principals can lead a single

college and a principal can have only one college

Page 11: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

2. Many – to – One relationship: An entity set in A is associated with at most one entity in B, An entity

in B however can be associated with any number of entities in A.

Example: Relationship between the entities Districts and state .i.e. many districts belong to a single state

but many states cannot belong to single district.

3. ONE – to - MANY relationship: An entity set A is associated with any number of entities in B. An

entity in B, however can be associated with at most one entity in A.

Example: Relationship between the entities class and student i.e., a class can have many students but a

student cannot be in more than one class at a time.

4. MANY – to – MANY relationship: An entity set A is associated with any number of entities in B

and an entity set in B is associated with any number of entities in A.

Page 12: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

Example: Relationship between the Entities College and course .i.e. a college can have many courses and

course can be offered by many colleges.

14. What is a key? write about types of keys.

A. . Keys:

We must have a way to specify how entities within a given entity set are distinguished. Conceptually, individual entities are distinct; from a database perspective, however, the difference among them must be expressed in terms of their attributes.

The values of the attribute, values of an entity must be such that they can uniquely identify the entity. In other words, no two entities in an entity set are allowed to have exactly the same value for all attributes.

A key allows us to identify a set of attributes in an entity . Keys also help uniquely identify relationships, and thus distinguish relationships from each other.

The keys can be categorized in to

1. Super Key: A Super key is a set of one or more attributes that, taken collectively; allow us to identify uniquely an entity in the entity set. For example, the ‘student_id’ attribute of the entity set student is sufficient to distinguish one student entity from another. Thus, ‘student_id’ is a super key

2.Candidate Key: A super key with minimal values is called a candidate key. A super key that does not contain a subset of attributes, that is itself super key.

3. Primary key: The Primary key of a relational data base table is a column name which uniquely identifies each record in the table. It cannot contain NULL entries.

4. Secondary key :- An attribute ( or ) Combination of attributes used strictly for data retrieval purposes.

5. Foreign key :- An attribute or Combination of attributes in one table whose values must either match the primary key in another table or be NULL.

15. What are the codd rules in relational model?

A. CODD rules

Page 13: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

Edgar F. Codd, proposed thirteen rules (numbered zero to twelve) and said that if a Database Management System meets these rules, it can be called as a Relational Database Management System. These rules are called as Codd’s12 rules. Hardly any commercial product follows all.

0. Foundation RuleA RDBMS must manage its stored data using only its relational capabilities.

1. Information RuleAll information in the database should be represented in one and only one way - as values in a table.

2. Guaranteed Access RuleEach and every datum (atomic value) is guaranteed to be logically accessible by resorting to a combination of table name, primary key value and column name.

3. Systematic Treatment of Null ValuesNull values (distinct from empty character string or a string of blank characters and distinct from zero or any other number) are supported in the fully relational DBMS for representing missing information in a systematic way, independent of data type.

4. Dynamic On-line Catalog Based on the Relational ModelThe database description is represented at the logical level in the same way as ordinary data, so authorized users can apply the same relational language to its interrogation as they apply to regular data.

5. Comprehensive Data Sublanguage RuleA relational system may support several languages and various modes of terminal use. However, there must be at least one language whose statements are expressible, per some well-defined syntax, as character strings and whose ability to support all of the following is comprehensible:

a. data definitionb. view definitionc. data manipulation (interactive and by program)d. integrity constraintse. authorizationf. transaction boundaries (begin, commit, and rollback).

6. View Updating RuleAll views that are theoretically updateable are also updateable by the system.

7. High-level INSERT, UPDATE, and DELETEThe capability of handling a base relation or a derived relation as a single operand applies nor only to the retrieval of data but also to the insertion, update, and deletion of data.

8. Physical Data IndependenceApplication programs and terminal activities remain logically unimpaired whenever any changes are made in either storage representation or access methods.

9. Logical Data IndependenceApplication programs and terminal activities remain logically unimpaired when information preserving changes of any kind that theoretically permit unimpairment are made to the base tables.

10. Integrity IndependenceIntegrity constraints specific to a particular relational database must be definable in the relational data sublanguage and storable in the catalog, not in the application programs.

11. Distribution IndependenceThe data manipulation sublanguage of a relational DBMS must enable application programs and terminal activities to remain logically unimpaired whether and whenever data are physically centralized or distributed.

12. Non-subversion RuleIf a relational system has or supports a low-level (single-record-at-a-time) language, that low-

Page 14: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

level language cannot be used to subvert or bypass the integrity rules or constraints expressed in the higher-level (multiple-records-at-a-time) relational language.

16. Explain DML commands with example.

A. . DML Commands: insert , select , delete and update

1. insert: The  INSERT INTO Statement is used to add new rows of data to a table in the database.

Syntax:

Insert into <table name> values (value1 , value2 , value3 , ..valueN);

Example: Following statements would create three records in student table:

insert into student values(101 , ‘chanukya’);

insert into student values(102 , ‘kavya’);

insert into student values(101 , ‘satish’);

2.select: SELECT statement is used to fetch the data from a database table which returns data

in the form of result table. These result tables are called result-sets.

Syntax:

Select column1 , column2 , column from <table name>;

Here, column1, column2...are the fields of a table whose values you want to fetch. If you want to fetch all the fields available in the field, then you can use the following syntax:

Select * from <table_name>

Example1: select * from student;

Then the output will be

Stno stname

------- ---------

101 chanukya

102 kavya

103 satish

Example2: select stname from student;

Stname

---------

chanukya

kavya

satish

Example3: select * from student where stno>=102 ;

Page 15: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

Then the output will be

Stno stname

------- ---------

102 kavya

103 satish3.update: The  UPDATE command is used to modify the existing records in a table.

You can use WHERE clause with UPDATE query to update selected rows otherwise all the rows would be affected.

Syntax:

UPDATE < table name >SET column1 = value1, column2 = value2....,columnN=valueNWHERE [condition];

Example:

Consider the student table having the following records:

Sql>select * from student;

Stno stname

------- ---------

101 chanukya

102 kavya

103 satish

sql> update student set stname = ‘ratnam’ where stno = 101;

Sql>select * from student;

then the output will be as follows

Stno stname

------- ---------

101 ratnam

102 kavya

103 satish

4.delete:  DELETE command is used to delete the existing records from a table.

You can use WHERE clause with DELETE query to delete selected rows, otherwise all the records would be deleted.

Syntax:

Page 16: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

Delete from <table name> where [condition] ;

Example:

Sql>select * from student;

then the output will be as follows

Stno stname

------- ---------

101 ratnam

102 kavya

103 satish

Sql>delete from student where stno = 101;

Sql> select * from student;

The output will be as follows

Stno stname

------- ---------

102 kavya

103 satish

17. What is a trigger? Explain with an example.

A. Database Trigger: A database trigger is a stored procedure that will be executed when an event is occurred i.e., insert, update, delete statement is issued against the associated table.

Syntax: Create or replace trigger<trigger_name>[before/after] (insert/delete) on <table_name> (for each statement / for each row) (when <condition)

Parts of trigger: A database trigger has three parts, those are, trigger statement trigger body trigger restrictions

Trigger statement: The trigger statements specifies the DML statements like UPDATE, DELETE, INSERT and it fires the trigger body. It is also specifies the table to which the trigger is associated.

Trigger body: It is PL / SQL block that is executed when a triggering statement is issued.

Trigger restriction: Restrictions on a trigger can be achieved using the WHEN clause. They can be included in the definition of a row trigger, where in , the condition in the WHEN clause is evaluated for each row that is affected by the trigger.

Page 17: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

18. Explain different stages of software development life cycle in detail.

A. A. System Development Life Cycle :

The stages involved during System Development Life Cycle are ::

1. Recognition of need

2. Feasibility study

3. Analysis

4. Design

5. Implementation

6. Post implementation and maintenance

1. Recognition of need: This gives a clearer picture of what actually the existing system is. The

preliminary investigation must define the scope of the project and the perceived problems, opportunities and directives that triggered the project.

2. Feasibility Study: The goal of feasibility study is to evaluate alternative system and to purpose

the most feasible and desirable system for development. In the process of feasibility study, the

cost and benefits are estimated with greater accuracy. If cost and benefit can be quantified, they

are tangible ; if not , they are called intangible.

3. System Analysis: System analysis is an in-depth study of end user information needs that

produces functional requirements that are used as the basis for the design of a new information

system.

4. System Design: System design can be viewed as the design of user interface, data, process and

system specification .

5. System Implementation: Implementation is the stage where theory is converted into practical.

The implementation is a vital step in ensuring the success of new systems. Even a well designed

system can fail if it is not properly implemented.

6. Post Implementation and Maintenance: Once a system is fully implemented and being operated

by end user, the maintenance function begins. Systems maintenance is the monitoring, evaluating and

modifying of operational information system to make desirable or necessary improvements.

9229 MAY- 2015

COMPUTER SCIENCE & ENGG- 2ND YEAR

PAPER-3: DATA COMMUNICATION AND COMPUTER NETWORKS [THEORY]

Time:- 3 Hrs Max. Marks:- 50

SECTION-A 10 x 2=20

Note:- 1. Answer ALL Questions:

2. Each Question carries TWO Marks.

01.What is data communication?.

Page 18: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

A. Data communication is the transmission of electronic data over some media. The media may be cables, microwaves or fiber optics.

02. What is a network?

A. Computer network is a group of computer systems and other hardware devices that are linked

together through communication channels to facilitate communication and resource-sharing among a

wide range of users.

03. Expand BBN and GAN?

A. BBN: BackBone Networks

GAN: Global Area Networks

04. What is a router?

A. Routers: A Router is a device that forwards data packets along networks. A router is connected to at

least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Router reduces

network traffic by using routing table.

05. What is FTP?

A. File Transfer Protocol, or FTP, is a protocol used for transferring files from one computer to another - typically from your computer to a web server.

06. What is Virus?

A. A Virus is a piece of software that can infect other programs by modifying them; the modification includes a copy of the virus program, which can then go on to infect other programs.

07. Define HTML.

A. HTML stands for Hyper Text Markup Language and it is used to create web pages.

08. What is a hyperlink?

A. A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new section within the current document. These hyperlinks are mostly used in HTML.

09. Define event handling?

A. Event: Clicking a button, moving the mouse pointer over part of the Web page, selecting some text on the page — these actions are called events.Event handling : An event handler allows you to execute code when an event occurs.

Page 19: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

10. Expand CSS and DOM.

A. CSS : Cascading Style Sheets

DOM: Document   Object  Model

SECTION - B 5 x 6 = 30

Note:- 1. Answer ANY FIVE Questions:

2. Each Question carries SIX Marks.

11. Explain different methods of data transmission.

A. These are all methods used to transfer streams of data. Waveform diagrams can be used to illustrate

these different transmission modes. A waveform diagram shows how the signal might appear on an

oscilloscope screen, which produces a diagram with voltage on the vertical axis and time on the

horizontal axis.

Synchronous

Bits in a synchronous data stream must be transferred in sync with a clock signal. The control signals for the data are derived from a clock signal. Synchronous data transfer systems usually have an error detection mechanism. If an error is detected the data can be resent.

Asynchronous

Bits in an asynchronous data stream can be transferred at random intervals and the data rate of the stream is not required to be constant. Asynchronous systems use a start bit to signal the beginning of a data transmission. A stop bit is used to signal the end of a data transmission. Asynchronous data transfer systems usually have an error detection mechanism. If an error is detected the data can be resent.

Isochronous

An isochronous data transfer system combines the features of an asynchronous and synchronous data transfer system. An isochronous data transfer system sends blocks of data asynchronously, in other words the data stream can be transferred at random intervals.

Page 20: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

Each transmission begins with a start packet. Once the start packet is transmitted, the data must be delivered with a

guaranteed bandwidth. Isochronous data transfer is commonly used for where data must be delivered within certain

time constraints, like streaming video.

12. Explain different types of Computer Networks.

A.

13. Explain any three types of Network Topologies?

A. Different types of computer networks

Depending upon the geographical area covered by a network, it is classified as:– Local Area Network (LAN)– Metropolitan Area Network (MAN)– Wide Area Network (WAN)– Personal Area Network (PAN)

LAN(Local Area Network):A LAN is a network that is used for communicating among computer devices, usually within an office building or home.

Is limited in size, typically spanning a few hundred meters, and no more than a mile• Is fast, with speeds from 10 Mbps to 10 Gbps• Requires little wiring, typically a single cable connecting to each device• Has lower cost compared to MAN’s or WAN’s•

MAN(Metropolitan Area Network):

• A MAN is a large computer network that usually spans a city or a large campus.• A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities.• A MAN might be owned and operated by a single organization, but it usually will be used by many individuals and organizations. • A MAN often acts as a high speed network to allow sharing of regional resources.• A MAN typically covers an area of between 5 and 50 km diameter. • Examples of MAN: Telephone company network that provides a high speed DSL to customers and cable TV network.

WAN( Wide Area Network):

• WAN covers a large geographic area such as country, continent or even whole of the world.• A WAN is two or more LANs connected together. To cover great distances, WANs may transmit data over leased high-speed phone lines or wireless links such as satellites. • Multiple LANs can be connected together using devices such as bridges, routers, or gateways, which enable them to share data.• The world's most popular WAN is the Internet.

PAN(Personal Area Network):

• A PAN is a network that is used for communicating among computers and computer devices (including telephones) in close proximity of around a few meters within a room• It can be used for communicating between the devices themselves, or for connecting to a larger network such as the internet.• PAN’s can be wired or wireless• A personal area network (PAN) is a computer network used for communication among

Page 21: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

computer devices, including telephones and personal digital assistants, in proximity to an individual's body.• The devices may or may not belong to the person in question. The reach of a PAN is typically a few meters.

14. Explain any three low LAN components.

A.

Server: A network server is a computer designed to process requests and deliver data to other (client)

computers over a local network or the Internet.

Client: A client is a computer that accesses a service made available by a server. 

Hubs: A network hub acts as a centralized point for data transmission to computers in a LAN. When

data from one computer reaches the hub it is broadcast to every computer in the network

regardless of where the data is intended to go.

15. Explain any three web browsers.

A. Web Browsers:

1. Internet Explorer

It was developed by Microsoft in 1994 and released in 1995 as a supportive package to Microsoft

Windows line of operating systems. According to statistics, its usage share from 1999 to 2003-04 was

around 95%. Microsoft occasionally releases updates for the previous versions of IE, which have some

enhanced capabilities. IE has come up a preview release of Internet Explorer 11.

Features: There are regular Microsoft updates that IE supports. Favicon allows an image to be used as a

bookmark. It supports Integrated Windows Authentication.It’s icon is as follows.

2. Mozilla Firefox

It is owned by Mozilla Corporation and was the result of an experimentation. 'Mozilla Firefox' was

officially announced in February 2004. It was earlier named Phoenix, Firebird, and eventually Firefox. It

is the second-most famous browser after Internet Explorer, as there were around 100 million downloads

within a year of its release. Until November 2008, 700 million downloads were recorded.

Page 22: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

Features: As it is an open source software, it allows everyone to access the code. It supports tabbed

browsing that allows the user to open multiple sites in a single window. Session storage is also an

important feature of Firefox, which allows the user to regain access to the open tabs after he has closed

the browser window. It’s icon is as follows.

3. Google Chrome

This web browser was developed by Google. Its beta and commercial versions were released in

September 2008 for Microsoft Windows.

Features: The main standout feature is the malware and phishing warning that the browser suggests

when the user wants to browse a site. Also, there is a user tracking option available with Chrome.It’s icon

is as follows.

16. Explain any six HTML tags.

1. <html> - This tag tells the browser that it is a html page and the html starts from there. This has

ending tag </html>.

2. <head> - There are few extra information about your webpage like title, meta name etc goes inside

<head> tag. This has ending tag </head>.

3. <title> - This tag defines the title of your web page. This has ending tag <title>.

4. <body> - Contents of the web page is included inside <body> tag. It has ending tag </body>

5. <h1> to <h6> Defines HTML headings6. <hr> Defines a horizontal line

Page 23: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

7. <!--> Defines a comment

17. Define list? Define various types of lists used in HTML.

A. A. LISTS:

Lists are used to list out items, subjects or menu in the form of a list. HTML gives you three different types of lists.

<ul> - An unordered list. This will list items using bullets <ol> - A ordered list. This will use different schemes of numbers to list your items <dl> - A definition list. This is arrange your items in the same way as they are arranged in a

dictionary.

HTML Unordered Lists:

This list is created by using <ul> tag. Each item in the list is marked with a bullet. The bullet itself comes in three styles: squares, discs, and circles. The default bullet displayed by most web browsers is the traditional full disc.

Example:

<html><body><center><h2>II YEAR CSE PAPERS</h2></center><ul><li>GFC</li><li>ENGLISH</li><li>OOPS&JAVA</li><li>RDBMS</li><li>DCCN</li></ul></body></html>

This will produce following result:

II YEAR CSE PAPERS

GFC ENGLISH OOPS&JAVA RDBMS DCCN

You can use type attribute to specify the type of bullet you like. By default its is a disc. Following are the possible way:

Page 24: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

<ul type="square"><ul type="disc"><ul type="circle">

2.HTML Ordered Lists:

This list is created by using <ol> tag. Each item in the list is marked with a number. By default The numbering starts from one and is incremented by one.

example:

<html><body><center><h2>II YEAR CSE PAPERS</h2></center><ol><li>GFC</li><li>ENGLISH</li><li>OOPS&JAVA</li><li>RDBMS</li><li>DCCN</li></ol>

</body></html>

This will produce following result:

II YEAR CSE PAPERS

1. GFC2. ENGLISH3. OOPS&JAVA4. RDBMS5. DCCN

You can use type attribute to specify the type of numbers you like. By default its is a generic numbers. Following are the other possible way:

<ol type="I"> - Upper-Case Numerals.<ol type="i"> - Lower-Case Numerals.<ol type="a"> - Lower-Case Letters.<ol type="A"> - Upper-Case Letters.

3.HTML Definition Lists:

Page 25: Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco…  · Web viewpreliminary investigation must define the scope of the project and ... as a supportive

Definition List makes use of following three tags.

<dl> - Defines the start of the list <dt> - A term <dd> - Term definition </dl> - Defines the end of the list

Example:

<html><body><dl><dt><b>LAN</b></dt><dd>LAN stands for Local Area Network</dd><dt><b>WAN</b></dt><dd>WAN stands for Wide Area Network</dd></dl></body></html>>

This will produce following result:

LANLAN stands for Local Area Network

WANWAN stands for Wide Area Network

18. Write difference between HTML and DHTML.

A. Differences between HTML and DHTML

HTML

1. HTML means Hyper Text Markup Language.2. It is referred as a static HTML and static in nature. 3. A plain page without any styles and Scripts called as HTML.

DHTML

1. DHTML means Dynamic Hyper Text Markup Language.2. It is referred as a dynamic HTML and dynamic in nature. 3. A page with HTML, CSS, DOM and Scripts called as DHTML.