Seco CareNET Seco CareNET innovative communication system for hospitals.
Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco… · Web...
Transcript of Syntax: - files.csevoc.webnode.comfiles.csevoc.webnode.com/200000067-dab4bdca9a/Seco… · Web...
9227 MAY- 2015
COMPUTER SCIENCE & ENGG- 2ND YEAR
PAPER-1: OOPS & JAVA [THEORY]
Time:- 3 Hrs Max. Marks:- 50
SECTION-A 10 x 2=20
Note:- 1. Answer ALL Questions:
2. Each Question carries TWO Marks.
01. Who developed Java Language ?
A. Java was developed by James Gosling at Sun Microsystems in 1995.
02. What is a class?
A. Class: A class is a collection of objects of similar type. It is a template from which objects are
created.
03. What is an array?
A. Array: An array is a collection of similar type of data elements which are stored in consecutive
memory locations under a common variable name.
04. What is polymorphism?
A. Polymorphism: Polymorphism means the ability to take more than one form is called Polymorphism.
05. What is a Package?
A. Package: Packages are a way of grouping a variety of classes and or interfaces together. The grouping is done according to their functionality. Packages are act like containers for classes.
Syntax: 1. To create a package:
packagepackage_name;2. To import a package:
importpackage_name.*;
06. What is debugging?
A. Debugging: The process of identifying and removing user committed errors from a program is called debugging.
07. What is multithreading?.
A. Multithreading: Multithreading is a programming concept in which a program or a process is
divided into two or more sub programs or threads that are executed at the same time in parallel. Multiple
threads can run concurrently in a single program.
08. What is an Applet?
A. An applet is a Java program that runs in a Web browser.
09. What is an AWT?
A. AWT: AWT stands for Abstract Window Tool Kit. It is a portable GUI library among various
operating systems for stand-alone applications.
10. What is an Event?
A. Event: Changing the state of on object is called an Event. Ex:click on button, dragging mouse etc.
SECTION - B 5 x 6 = 30
Note:- 1. Answer ANY FIVE Questions:
2. Each Question carries SIX Marks.
11. Write about the main feature of OOPS.
A. There are four main features of OOPS are Abstraction Encapsulation Polymorphism Inheritance
Abstraction: The process of abstraction in Java is used to hide certain details and only show the essential features of the object. In other words, it deals with the outside view of an object (interface).
Encapsulation: The process of wrapping data into a single unit is called Encapsulation.
Inheritance: This is the process in which a properties of a predefined class can be inherited in a new class making the object of that class in the making class.
Polymorphism: This is the process in which a program can have more than one function with the same name but different parameters.
12. What are the data types in Java?
A. Java has four main primitive data types built into the language. We can also create our own data types.
Integer: byte, short, int, and long. Floating Point: float and double Character: char Boolean: variable with a value of true or false.
The following chart summarizes the default values for the java built in data types.
Type Size in Bytes Range
byte 1 byte -128 to 127
short 2 bytes -32,768 to 32,767
int 4 bytes -2,147,483,648 to 2,147,483, 647
long 8 bytes -9,223,372,036,854,775,808 to 9,223,372,036,854,775,807
float 4 bytes approximately ±3.40282347E+38F (6-7 significant decimal digits) Java implements IEEE 754 standard
double 8 bytes approximately ±1.79769313486231570E+308 (15 significant decimal digits)
char 2 byte 0 to 65,536 (unsigned)
boolean not precisely defined*
true or false
13. Explain the Relational Operators with examples.
A. The Relational Operators:There are six following relational operators supported by Java language
Operator Purpose
== is Equal to
!= is Not equal to
> is Greater than
< is Less than
>= is Greater than or equal to
<= is Less than or equal to
Suppose a , b and c are integer variables and assigned 3,5and 10 respectively.Relational Expression Result
a>b False
(a+b) < c True
a>=3 True
a != b True
b <= a False
c == 10 True
14. Write about switch statement.
A. Switch Statement: The switch statement tests the value of a given variable against a list of value and
when a match is found, corresponding block of statements associated with the case will be executed. If
none is matched ‘default’ block will be executed. The ‘break’ statement at the end of each block signals
the end of a particular case causes an exit from the switch statement, transferring the control to the
statement immediately following the switch.
Syntax: switch(expression)
{
case value: block1;
break;
case value: block2;
break;
case value: block3;
break;
--------------------
--------------------
default: default block;
break;
}
Sample programwith switch.. case is as follows.
importjava.util.Scanner;
public class SwitchExample
{
public static void main(String args[])
{
System.out.println("enter a code");
Scanner in = new Scanner(System.in);
int code = in.nextInt();
switch(code)
{
case 1 :
System.out.println("first class"); break;
case 2:
System.out.println("second class"); break;
case 3 :
System.out.println("third class"); break;
default :
System.out.println("fail");
}
}
}
15. Write a java program to find factorial of a given number.
A. //to find the factorial of given number
import java.util.Scanner;
class Factorial{
public static void main(String args[]){
int i,f=1,n;
System.out.println("Enter an Integer:");
Scanner in = new Scanner(System.in);
n = in.nextInt();
i = 1;
while(i<=n){
f*=i;
++i;
}
System.out.println("Factorial of"+n+"is" +f);
}}
Output:
Enter an Integer:
5
Factorial of 5 is 120
16. Explain about overloading with an example.
A. Method Overloading: Overloading means creating more than a single method with same name with
different signatures.
Java identifies the methods with by comparing their signatures like return types, constructor
parameters & access modifiers used.
Ex:
class Overload {
void test(int a){
System.out.println("a:"+a); }
void test(int a, int b){
System.out.println("a and b:"+a+","+b);}
double test(double a){
System.out.println("double a" +a);
return a*a; }}
classMethodOverloading{
public static void main(String args[ ]){
Overload overload=new Overload();
double result;
overload.test(10);
overload.test(20,30);
result=overload.test(2.5);
System.out.println("Result:"+result);
}}
Output:
a: 10
a and b: 20,30
double a: 2.5
Result: 6.25
17. What are the differences between package and interface.
A. . Interfaces Vs PackagesA package is just a mechanism for grouping objects, it is very similar to grouping items within a
folder or directory on a file system. A class is found within a package, but this does not have an impact on the class behavior.
An Interface, however, is a.java file that is used (implemented) by another class to tell the outside world that it conforms to a certain specification.
Interfaces have more in common with abstract classes than they do with packages. An Interface, by definition, cannot have any implemented methods.
An abstract class can define some methods and leave some methods to implemented by a subclass.
A class can implement many interfaces, but can only extend one (abstract) class.
18. What are the basic methods of the applet class.
A. Life Cycle of an applet: Four methods give us the framework on which we build an applet.1. init : This method is intended for whatever initialization is needed for our applet. It is called after
the param tags inside the applet tag have been processed.2. Start: This method is automatically called after the browser calls the init method. It is also called
whenever the user returns to the page containing the applet after having gone off to other pages.3. Stop: This method is automatically called when the user moves off the page on which the applet
sits. It can, therefore, be called repeatedly in the same applet.4. Destroy: This method is only called when the browser shuts down normally5. Paint: Invoked immediately after the start() method and also any time the applet needs to repaint
itself in the browser. The paint() method is actually inherited from the java awt.
------X--------X---------X-------
9228 MAY- 2015
COMPUTER SCIENCE & ENGG- 2ND YEAR
PAPER-2: RELATIONAL DATABASEMANAGEMENT SYSTEMS (RDBMS)
Time:- 3 Hrs Max. Marks:- 50
SECTION-A 10 x 2=20
Note:- 1. Answer ALL Questions:
2. Each Question carries TWO Marks.
01. What is a database?
A. . A database is a collection of logically related information that is organized in a systematic manner so
that it can easily be accessed, managed and updated.
02. What is an Entity?
A. Entity: An Entity is an “Object” that exists and is distinguishable from other objects.
03. What is a domain?
A. Domain:Domain is a pool of values of a specific attribute. Separate domains for separate attributes.
04. What is a relational database?
A. Relational database is a database that has a collection of tables of data items, all of which is formally described and organized according to the relations.
05. What is a tuple?
A. Tuple is a record (row) is a table.
06. Write the DDL commands.
A. DDL commands: create, alter and drop.
07. What are the set operators in SQL?
A. There are four basic operations in SQL
1. Select2. Update3. Insert4. Delete
08. Write the different data types in PL-SQL.
A.
Data type Purpose / UsageNumber For storing numeric dataChar For storing charter dataDate For storing date and time dataBoolean For storing TRUE or FALSE or NULL%TYPE Variables based on definitions of columns in a table. And allows programs
to adapt to changes made to the table.NOT NULL To create a variable or a constant that cannot have a null value.
09. What is a system analysis?
A. Analysis is detailed study of a Software system.
10. What is Data dictionary?
A. Data Dictionary is a repository that contains descriptions of all data objects produced by the software.
SECTION - B 5 x 6 = 30
Note:- 1. Answer ANY FIVE Questions:
2. Each Question carries SIX Marks.
11. Explain about different data models.
A. Different data models are
1. Object based data models
2. Record – based data models
3. Physical data models
1. Object base data models: Object-based logical models are used in describing data at logical and view levels. They are characterized by the fact they provide flexible structuring capabilities and allow data constraints to be specified explicitly. There are many different data models, some of them are
i. The Entity-relationship model
ii. The Object-oriented model
iii. The semantic data model
iv. The Functional data model
2. Record based data models: In Record based data models; the database is structured in
fixed formats records of several types. Each record defines fixed number of fields (attributes)
and each field is fixed length. These models are used to specify the overall logical structure of the
database and are used in describing the database at conceptual level.
The three widely accepted record – based data models are:
a) Relational model
b) Network model
c) Hierarchical model
3. Physical data models: Physical data model are used to describe data at the lowest level.
In contrast to logical data models, there are few number of physical data models which are in use.
very few physical data models have been proposed so far. Two of these well known models are
the unifying model and the frame memory model.
12. What are the functions of DBA?
A.
1. Schema definition2. Storage structure and Access method definition3. Schema physical organization and modification4. Granting of authorization for data access5. Routine maintenance
1. Schema Definition: The DBA creates the original database schema by executing a set of definition statements in the DDL.
2. Storage structure and Access method definition: DBA will decide the actual storage structure and different access methodologies for the database.
3. Schema physical organization and modification: The DBA carries out the changes to the schema and physical organization to reflect the changing needs of the organization or to alter the physical organization to improve the performance.
4. Granting of authorization for data access: By granting different types of authorization, the database administrator can regulate which of the database various can access.
5. Routine maintenance: DBA is the final authority to regulate daily activities.
13. Explain mapping constraints with neat diagram.
A. There are 4 types of mapping constraints.
1. ONE – to – ONE relationship
2. MANY – to – ONE relationship
3. ONE – to – MANY relationship
4. MANY – to – MANY relationship
1. ONE – to – ONE relationship: An entity in A is associated with at most one entity in B , An
entity in B is also associated with at most one entity in A.
Example : Relationship between the entities principal and college. i.e., Principals can lead a single
college and a principal can have only one college
2. Many – to – One relationship: An entity set in A is associated with at most one entity in B, An entity
in B however can be associated with any number of entities in A.
Example: Relationship between the entities Districts and state .i.e. many districts belong to a single state
but many states cannot belong to single district.
3. ONE – to - MANY relationship: An entity set A is associated with any number of entities in B. An
entity in B, however can be associated with at most one entity in A.
Example: Relationship between the entities class and student i.e., a class can have many students but a
student cannot be in more than one class at a time.
4. MANY – to – MANY relationship: An entity set A is associated with any number of entities in B
and an entity set in B is associated with any number of entities in A.
Example: Relationship between the Entities College and course .i.e. a college can have many courses and
course can be offered by many colleges.
14. What is a key? write about types of keys.
A. . Keys:
We must have a way to specify how entities within a given entity set are distinguished. Conceptually, individual entities are distinct; from a database perspective, however, the difference among them must be expressed in terms of their attributes.
The values of the attribute, values of an entity must be such that they can uniquely identify the entity. In other words, no two entities in an entity set are allowed to have exactly the same value for all attributes.
A key allows us to identify a set of attributes in an entity . Keys also help uniquely identify relationships, and thus distinguish relationships from each other.
The keys can be categorized in to
1. Super Key: A Super key is a set of one or more attributes that, taken collectively; allow us to identify uniquely an entity in the entity set. For example, the ‘student_id’ attribute of the entity set student is sufficient to distinguish one student entity from another. Thus, ‘student_id’ is a super key
2.Candidate Key: A super key with minimal values is called a candidate key. A super key that does not contain a subset of attributes, that is itself super key.
3. Primary key: The Primary key of a relational data base table is a column name which uniquely identifies each record in the table. It cannot contain NULL entries.
4. Secondary key :- An attribute ( or ) Combination of attributes used strictly for data retrieval purposes.
5. Foreign key :- An attribute or Combination of attributes in one table whose values must either match the primary key in another table or be NULL.
15. What are the codd rules in relational model?
A. CODD rules
Edgar F. Codd, proposed thirteen rules (numbered zero to twelve) and said that if a Database Management System meets these rules, it can be called as a Relational Database Management System. These rules are called as Codd’s12 rules. Hardly any commercial product follows all.
0. Foundation RuleA RDBMS must manage its stored data using only its relational capabilities.
1. Information RuleAll information in the database should be represented in one and only one way - as values in a table.
2. Guaranteed Access RuleEach and every datum (atomic value) is guaranteed to be logically accessible by resorting to a combination of table name, primary key value and column name.
3. Systematic Treatment of Null ValuesNull values (distinct from empty character string or a string of blank characters and distinct from zero or any other number) are supported in the fully relational DBMS for representing missing information in a systematic way, independent of data type.
4. Dynamic On-line Catalog Based on the Relational ModelThe database description is represented at the logical level in the same way as ordinary data, so authorized users can apply the same relational language to its interrogation as they apply to regular data.
5. Comprehensive Data Sublanguage RuleA relational system may support several languages and various modes of terminal use. However, there must be at least one language whose statements are expressible, per some well-defined syntax, as character strings and whose ability to support all of the following is comprehensible:
a. data definitionb. view definitionc. data manipulation (interactive and by program)d. integrity constraintse. authorizationf. transaction boundaries (begin, commit, and rollback).
6. View Updating RuleAll views that are theoretically updateable are also updateable by the system.
7. High-level INSERT, UPDATE, and DELETEThe capability of handling a base relation or a derived relation as a single operand applies nor only to the retrieval of data but also to the insertion, update, and deletion of data.
8. Physical Data IndependenceApplication programs and terminal activities remain logically unimpaired whenever any changes are made in either storage representation or access methods.
9. Logical Data IndependenceApplication programs and terminal activities remain logically unimpaired when information preserving changes of any kind that theoretically permit unimpairment are made to the base tables.
10. Integrity IndependenceIntegrity constraints specific to a particular relational database must be definable in the relational data sublanguage and storable in the catalog, not in the application programs.
11. Distribution IndependenceThe data manipulation sublanguage of a relational DBMS must enable application programs and terminal activities to remain logically unimpaired whether and whenever data are physically centralized or distributed.
12. Non-subversion RuleIf a relational system has or supports a low-level (single-record-at-a-time) language, that low-
level language cannot be used to subvert or bypass the integrity rules or constraints expressed in the higher-level (multiple-records-at-a-time) relational language.
16. Explain DML commands with example.
A. . DML Commands: insert , select , delete and update
1. insert: The INSERT INTO Statement is used to add new rows of data to a table in the database.
Syntax:
Insert into <table name> values (value1 , value2 , value3 , ..valueN);
Example: Following statements would create three records in student table:
insert into student values(101 , ‘chanukya’);
insert into student values(102 , ‘kavya’);
insert into student values(101 , ‘satish’);
2.select: SELECT statement is used to fetch the data from a database table which returns data
in the form of result table. These result tables are called result-sets.
Syntax:
Select column1 , column2 , column from <table name>;
Here, column1, column2...are the fields of a table whose values you want to fetch. If you want to fetch all the fields available in the field, then you can use the following syntax:
Select * from <table_name>
Example1: select * from student;
Then the output will be
Stno stname
------- ---------
101 chanukya
102 kavya
103 satish
Example2: select stname from student;
Stname
---------
chanukya
kavya
satish
Example3: select * from student where stno>=102 ;
Then the output will be
Stno stname
------- ---------
102 kavya
103 satish3.update: The UPDATE command is used to modify the existing records in a table.
You can use WHERE clause with UPDATE query to update selected rows otherwise all the rows would be affected.
Syntax:
UPDATE < table name >SET column1 = value1, column2 = value2....,columnN=valueNWHERE [condition];
Example:
Consider the student table having the following records:
Sql>select * from student;
Stno stname
------- ---------
101 chanukya
102 kavya
103 satish
sql> update student set stname = ‘ratnam’ where stno = 101;
Sql>select * from student;
then the output will be as follows
Stno stname
------- ---------
101 ratnam
102 kavya
103 satish
4.delete: DELETE command is used to delete the existing records from a table.
You can use WHERE clause with DELETE query to delete selected rows, otherwise all the records would be deleted.
Syntax:
Delete from <table name> where [condition] ;
Example:
Sql>select * from student;
then the output will be as follows
Stno stname
------- ---------
101 ratnam
102 kavya
103 satish
Sql>delete from student where stno = 101;
Sql> select * from student;
The output will be as follows
Stno stname
------- ---------
102 kavya
103 satish
17. What is a trigger? Explain with an example.
A. Database Trigger: A database trigger is a stored procedure that will be executed when an event is occurred i.e., insert, update, delete statement is issued against the associated table.
Syntax: Create or replace trigger<trigger_name>[before/after] (insert/delete) on <table_name> (for each statement / for each row) (when <condition)
Parts of trigger: A database trigger has three parts, those are, trigger statement trigger body trigger restrictions
Trigger statement: The trigger statements specifies the DML statements like UPDATE, DELETE, INSERT and it fires the trigger body. It is also specifies the table to which the trigger is associated.
Trigger body: It is PL / SQL block that is executed when a triggering statement is issued.
Trigger restriction: Restrictions on a trigger can be achieved using the WHEN clause. They can be included in the definition of a row trigger, where in , the condition in the WHEN clause is evaluated for each row that is affected by the trigger.
18. Explain different stages of software development life cycle in detail.
A. A. System Development Life Cycle :
The stages involved during System Development Life Cycle are ::
1. Recognition of need
2. Feasibility study
3. Analysis
4. Design
5. Implementation
6. Post implementation and maintenance
1. Recognition of need: This gives a clearer picture of what actually the existing system is. The
preliminary investigation must define the scope of the project and the perceived problems, opportunities and directives that triggered the project.
2. Feasibility Study: The goal of feasibility study is to evaluate alternative system and to purpose
the most feasible and desirable system for development. In the process of feasibility study, the
cost and benefits are estimated with greater accuracy. If cost and benefit can be quantified, they
are tangible ; if not , they are called intangible.
3. System Analysis: System analysis is an in-depth study of end user information needs that
produces functional requirements that are used as the basis for the design of a new information
system.
4. System Design: System design can be viewed as the design of user interface, data, process and
system specification .
5. System Implementation: Implementation is the stage where theory is converted into practical.
The implementation is a vital step in ensuring the success of new systems. Even a well designed
system can fail if it is not properly implemented.
6. Post Implementation and Maintenance: Once a system is fully implemented and being operated
by end user, the maintenance function begins. Systems maintenance is the monitoring, evaluating and
modifying of operational information system to make desirable or necessary improvements.
9229 MAY- 2015
COMPUTER SCIENCE & ENGG- 2ND YEAR
PAPER-3: DATA COMMUNICATION AND COMPUTER NETWORKS [THEORY]
Time:- 3 Hrs Max. Marks:- 50
SECTION-A 10 x 2=20
Note:- 1. Answer ALL Questions:
2. Each Question carries TWO Marks.
01.What is data communication?.
A. Data communication is the transmission of electronic data over some media. The media may be cables, microwaves or fiber optics.
02. What is a network?
A. Computer network is a group of computer systems and other hardware devices that are linked
together through communication channels to facilitate communication and resource-sharing among a
wide range of users.
03. Expand BBN and GAN?
A. BBN: BackBone Networks
GAN: Global Area Networks
04. What is a router?
A. Routers: A Router is a device that forwards data packets along networks. A router is connected to at
least two networks, commonly two LANs or WANs or a LAN and its ISP's network. Router reduces
network traffic by using routing table.
05. What is FTP?
A. File Transfer Protocol, or FTP, is a protocol used for transferring files from one computer to another - typically from your computer to a web server.
06. What is Virus?
A. A Virus is a piece of software that can infect other programs by modifying them; the modification includes a copy of the virus program, which can then go on to infect other programs.
07. Define HTML.
A. HTML stands for Hyper Text Markup Language and it is used to create web pages.
08. What is a hyperlink?
A. A hyperlink is a word, phrase, or image that you can click on to jump to a new document or a new section within the current document. These hyperlinks are mostly used in HTML.
09. Define event handling?
A. Event: Clicking a button, moving the mouse pointer over part of the Web page, selecting some text on the page — these actions are called events.Event handling : An event handler allows you to execute code when an event occurs.
10. Expand CSS and DOM.
A. CSS : Cascading Style Sheets
DOM: Document Object Model
SECTION - B 5 x 6 = 30
Note:- 1. Answer ANY FIVE Questions:
2. Each Question carries SIX Marks.
11. Explain different methods of data transmission.
A. These are all methods used to transfer streams of data. Waveform diagrams can be used to illustrate
these different transmission modes. A waveform diagram shows how the signal might appear on an
oscilloscope screen, which produces a diagram with voltage on the vertical axis and time on the
horizontal axis.
Synchronous
Bits in a synchronous data stream must be transferred in sync with a clock signal. The control signals for the data are derived from a clock signal. Synchronous data transfer systems usually have an error detection mechanism. If an error is detected the data can be resent.
Asynchronous
Bits in an asynchronous data stream can be transferred at random intervals and the data rate of the stream is not required to be constant. Asynchronous systems use a start bit to signal the beginning of a data transmission. A stop bit is used to signal the end of a data transmission. Asynchronous data transfer systems usually have an error detection mechanism. If an error is detected the data can be resent.
Isochronous
An isochronous data transfer system combines the features of an asynchronous and synchronous data transfer system. An isochronous data transfer system sends blocks of data asynchronously, in other words the data stream can be transferred at random intervals.
Each transmission begins with a start packet. Once the start packet is transmitted, the data must be delivered with a
guaranteed bandwidth. Isochronous data transfer is commonly used for where data must be delivered within certain
time constraints, like streaming video.
12. Explain different types of Computer Networks.
A.
13. Explain any three types of Network Topologies?
A. Different types of computer networks
Depending upon the geographical area covered by a network, it is classified as:– Local Area Network (LAN)– Metropolitan Area Network (MAN)– Wide Area Network (WAN)– Personal Area Network (PAN)
LAN(Local Area Network):A LAN is a network that is used for communicating among computer devices, usually within an office building or home.
Is limited in size, typically spanning a few hundred meters, and no more than a mile• Is fast, with speeds from 10 Mbps to 10 Gbps• Requires little wiring, typically a single cable connecting to each device• Has lower cost compared to MAN’s or WAN’s•
MAN(Metropolitan Area Network):
• A MAN is a large computer network that usually spans a city or a large campus.• A MAN is optimized for a larger geographical area than a LAN, ranging from several blocks of buildings to entire cities.• A MAN might be owned and operated by a single organization, but it usually will be used by many individuals and organizations. • A MAN often acts as a high speed network to allow sharing of regional resources.• A MAN typically covers an area of between 5 and 50 km diameter. • Examples of MAN: Telephone company network that provides a high speed DSL to customers and cable TV network.
WAN( Wide Area Network):
• WAN covers a large geographic area such as country, continent or even whole of the world.• A WAN is two or more LANs connected together. To cover great distances, WANs may transmit data over leased high-speed phone lines or wireless links such as satellites. • Multiple LANs can be connected together using devices such as bridges, routers, or gateways, which enable them to share data.• The world's most popular WAN is the Internet.
PAN(Personal Area Network):
• A PAN is a network that is used for communicating among computers and computer devices (including telephones) in close proximity of around a few meters within a room• It can be used for communicating between the devices themselves, or for connecting to a larger network such as the internet.• PAN’s can be wired or wireless• A personal area network (PAN) is a computer network used for communication among
computer devices, including telephones and personal digital assistants, in proximity to an individual's body.• The devices may or may not belong to the person in question. The reach of a PAN is typically a few meters.
14. Explain any three low LAN components.
A.
Server: A network server is a computer designed to process requests and deliver data to other (client)
computers over a local network or the Internet.
Client: A client is a computer that accesses a service made available by a server.
Hubs: A network hub acts as a centralized point for data transmission to computers in a LAN. When
data from one computer reaches the hub it is broadcast to every computer in the network
regardless of where the data is intended to go.
15. Explain any three web browsers.
A. Web Browsers:
1. Internet Explorer
It was developed by Microsoft in 1994 and released in 1995 as a supportive package to Microsoft
Windows line of operating systems. According to statistics, its usage share from 1999 to 2003-04 was
around 95%. Microsoft occasionally releases updates for the previous versions of IE, which have some
enhanced capabilities. IE has come up a preview release of Internet Explorer 11.
Features: There are regular Microsoft updates that IE supports. Favicon allows an image to be used as a
bookmark. It supports Integrated Windows Authentication.It’s icon is as follows.
2. Mozilla Firefox
It is owned by Mozilla Corporation and was the result of an experimentation. 'Mozilla Firefox' was
officially announced in February 2004. It was earlier named Phoenix, Firebird, and eventually Firefox. It
is the second-most famous browser after Internet Explorer, as there were around 100 million downloads
within a year of its release. Until November 2008, 700 million downloads were recorded.
Features: As it is an open source software, it allows everyone to access the code. It supports tabbed
browsing that allows the user to open multiple sites in a single window. Session storage is also an
important feature of Firefox, which allows the user to regain access to the open tabs after he has closed
the browser window. It’s icon is as follows.
3. Google Chrome
This web browser was developed by Google. Its beta and commercial versions were released in
September 2008 for Microsoft Windows.
Features: The main standout feature is the malware and phishing warning that the browser suggests
when the user wants to browse a site. Also, there is a user tracking option available with Chrome.It’s icon
is as follows.
16. Explain any six HTML tags.
1. <html> - This tag tells the browser that it is a html page and the html starts from there. This has
ending tag </html>.
2. <head> - There are few extra information about your webpage like title, meta name etc goes inside
<head> tag. This has ending tag </head>.
3. <title> - This tag defines the title of your web page. This has ending tag <title>.
4. <body> - Contents of the web page is included inside <body> tag. It has ending tag </body>
5. <h1> to <h6> Defines HTML headings6. <hr> Defines a horizontal line
7. <!--> Defines a comment
17. Define list? Define various types of lists used in HTML.
A. A. LISTS:
Lists are used to list out items, subjects or menu in the form of a list. HTML gives you three different types of lists.
<ul> - An unordered list. This will list items using bullets <ol> - A ordered list. This will use different schemes of numbers to list your items <dl> - A definition list. This is arrange your items in the same way as they are arranged in a
dictionary.
HTML Unordered Lists:
This list is created by using <ul> tag. Each item in the list is marked with a bullet. The bullet itself comes in three styles: squares, discs, and circles. The default bullet displayed by most web browsers is the traditional full disc.
Example:
<html><body><center><h2>II YEAR CSE PAPERS</h2></center><ul><li>GFC</li><li>ENGLISH</li><li>OOPS&JAVA</li><li>RDBMS</li><li>DCCN</li></ul></body></html>
This will produce following result:
II YEAR CSE PAPERS
GFC ENGLISH OOPS&JAVA RDBMS DCCN
You can use type attribute to specify the type of bullet you like. By default its is a disc. Following are the possible way:
<ul type="square"><ul type="disc"><ul type="circle">
2.HTML Ordered Lists:
This list is created by using <ol> tag. Each item in the list is marked with a number. By default The numbering starts from one and is incremented by one.
example:
<html><body><center><h2>II YEAR CSE PAPERS</h2></center><ol><li>GFC</li><li>ENGLISH</li><li>OOPS&JAVA</li><li>RDBMS</li><li>DCCN</li></ol>
</body></html>
This will produce following result:
II YEAR CSE PAPERS
1. GFC2. ENGLISH3. OOPS&JAVA4. RDBMS5. DCCN
You can use type attribute to specify the type of numbers you like. By default its is a generic numbers. Following are the other possible way:
<ol type="I"> - Upper-Case Numerals.<ol type="i"> - Lower-Case Numerals.<ol type="a"> - Lower-Case Letters.<ol type="A"> - Upper-Case Letters.
3.HTML Definition Lists:
Definition List makes use of following three tags.
<dl> - Defines the start of the list <dt> - A term <dd> - Term definition </dl> - Defines the end of the list
Example:
<html><body><dl><dt><b>LAN</b></dt><dd>LAN stands for Local Area Network</dd><dt><b>WAN</b></dt><dd>WAN stands for Wide Area Network</dd></dl></body></html>>
This will produce following result:
LANLAN stands for Local Area Network
WANWAN stands for Wide Area Network
18. Write difference between HTML and DHTML.
A. Differences between HTML and DHTML
HTML
1. HTML means Hyper Text Markup Language.2. It is referred as a static HTML and static in nature. 3. A plain page without any styles and Scripts called as HTML.
DHTML
1. DHTML means Dynamic Hyper Text Markup Language.2. It is referred as a dynamic HTML and dynamic in nature. 3. A page with HTML, CSS, DOM and Scripts called as DHTML.