viva ITWD

Embed Size (px)

Citation preview

  • 8/8/2019 viva ITWD

    1/7

    INTERNET TECHNOLOGY AND WEB DESIGNVIVA QUESTIONS

    1.What is DNS?

    On the Internet, the Domain Name System (DNS) associates various sorts of informationwith so-called domain names; most importantly, it serves as the "phone book" for theInternet by translating human-readable computer hostnames, e.g. en.wikipedia.org, intothe IP addresses, e.g. 66.230.200.100, that networking equipment needs for deliveringinformation. It also stores other information such as the list of mail exchange servers thataccept email for a given domain. In providing a worldwide keyword-based redirectionservice, the Domain Name System is an essential component of contemporary Internetuse.

    2.What is proxy server?

    In computer networks, a proxy server is a server (a computer system or an applicationprogram) which services the requests of its clients by forwarding requests to otherservers. A client connects to the proxy server, requesting some service, such as a file,connection, web page, or other resource, available from a different server. The proxyserver provides the resource by connecting to the specified server and requesting theservice on behalf of the client. A proxy server may optionally alter the client's request orthe server's response, and sometimes it may serve the request without contacting thespecified server.A proxy server that passes all requests and replies unmodified is usually called a gatewayor sometimes tunneling proxy.A proxy server can be placed in the user's local computer or at specific key pointsbetween the user and the destination servers or the Internet.

    3.What is cookies?

    HTTP cookies, sometimes known as web cookies or just cookies, are parcels of text sentby a server to a web browser and then sent back unchanged by the browser each time itaccesses that server. HTTP cookies are used for authenticating, tracking, and maintainingspecific information about users, such as site preferences and the contents of theirelectronic shopping carts.

    4. What is internet?

    The Internet is a worldwide, publicly accessible series of interconnected computernetworks that transmit data by packet switching using the standard Internet Protocol (IP).It is a "network of networks" that consists of millions of smaller domestic, academic,business, and government networks, which together carry various information andservices, such as electronic mail, online chat, file transfer, and the interlinked Web pagesand other documents of the World Wide Web.

  • 8/8/2019 viva ITWD

    2/7

    5.What is ICMP?

    ICMP (Internet Control Message Protocol) also exists at this level. ICMP isconnectionless; it is used for control, signaling, and error reporting purposes.

    6.Define TCP.

    The Transmission Control Protocol (TCP) is one of the core protocols of the Internetprotocol suite. TCP provides reliable, in-order delivery of a stream of bytes, making itsuitable for applications like file transfer and e-mail. It is so important in the Internetprotocol suite that sometimes the entire suite is referred to as "the TCP/IP protocol suite."

    7.Define UDP.

    User Datagram Protocol (UDP) is one of the core protocols of the Internet protocol suite.Using UDP, programs on networked computers can send short messages sometimesknown as datagrams (using Datagram Sockets) to one another. UDP is sometimes calledthe Universal Datagram Protocol.

    8.Define HTTP.

    Hypertext Transfer Protocol (HTTP) is a communications protocol used to transfer orconvey information on the World Wide Web. Its original purpose was to provide a way topublish and retrieve HTML hypertext pages. Development of HTTP was coordinated bythe W3C (World Wide Web Consortium) and the IETF (Internet Engineering Task Force), culminating in the publication of a series of RFCs, most notably RFC 2616 (June1999), which defines HTTP/1.1, the version of HTTP in common use

    9. Define IP ADDRESS.

    An IP address (Internet Protocol address) is a unique address that certain electronicdevices use in order to identify and communicate with each other on a computer network utilizing the Internet Protocol standard (IP)in simpler terms, a computer address. Anyparticipating network deviceincluding routers, switches, computers, time-servers,printers, Internet fax machines, and some telephonescan have their own unique address

    10. How many layer in tcp/ip?

    TCP/IP has five layers,they are1.physical layer2.data-link layer3.network / internet layer4.transport layer5.application layer

  • 8/8/2019 viva ITWD

    3/7

    11. Define Web Servers.

    The term web server can mean one of two things:1. A computer program that is responsible for accepting HTTP requests from clients,which are known as web browsers, and serving them HTTP responses along withoptional data contents, which usually are web pages such as HTML documents andlinked objects (images, etc.).2. A computer that runs a computer program which provides the functionalitydescribed in the first sense of the term.

    12.Define Web Hosting?

    A web hosting service is a type of Internet hosting service that allows individuals andorganizations to provide their own websites accessible via the World Wide Web. Webhosts are companies that provide space on a server they own for use by their clients aswell as providing Internet connectivity, typically in a data center

    13.What is Streaming?

    Streaming media is multimedia that is continuously received by, and normally displayedto, the end-user while it is being delivered by the provider. The name refers to thedelivery method of the medium rather than to the medium itself. The distinction isusually applied to media that are distributed over telecommunications networks, as mostother delivery systems are either inherently streaming (e.g. radio, television) or inherentlynon-streaming (e.g. books, video cassettes, audio CDs).

    14. Define Socket.

    Socket is an end-point of a bi-directional communication link.

    15. REMOTE METHOD INVOCATION:

    The Java Remote Method Invocation API, or Java RMI, is a Javaapplication programming interface for performing the object equivalent of remoteprocedure calls.

    There are two common implementations of the API. The original implementationdepends on Java Virtual Machine (JVM) class representation mechanisms and it thusonly supports making calls from one JVM to another. The protocol underlying this Java-only implementation is known as Java Remote Method Protocol (JRMP). In order tosupport code running in a non-JVM context, a CORBA version was later developed.Usage of the term RMI may denote solely the programming interface or may signify boththe API and JRMP, whereas the term RMI-IIOP, read RMI over IIOP, denotes the RMIinterface delegating most of the functionality to the supporting CORBA implementation.

  • 8/8/2019 viva ITWD

    4/7

    16.SERVER SOCKET:

    A server socket is a computer communications end point for new incomingconnections. The server socket accepts incoming connections, handles lower-levelnetwork traffic to finalize the connection and then forks a new connection for reading orwriting. The server socket continues to be available to accept other incomingconnections.

    17.Define Browsers.

    A web browser is a software application that enables a user to display andinteract with text, images, videos, music and other information typically located on aWeb page at a website on the World Wide Web or a local area network. Text and imageson a Web page can contain hyperlinks to other Web pages at the same or differentwebsite. Web browsers allow a user to quickly and easily access information provided onmany Web pages at many websites by traversing these links. Web browsers formatHTML information for display, so the appearance of a Web page may differ betweenbrowsers.

    18.Define Multicast.

    Multicast is the delivery of information to a group of destinationssimultaneously using the most efficient strategy to deliver the messages over each link of the network only once, creating copies only when the links to the destinations split.The word "Multicast" is typically used to refer to IP Multicast, the implementation of themulticast concept on the IP routing level, where routers create optimal distribution pathsfor datagrams sent to a multicast destination address spanning tree in realtime.

    19.Firewalls:

    A firewall is a hardware or software device which is configured to permit, deny,or proxy data through a computer network which has different levels of trust.

    A firewall's basic task is to regulate the flow of traffic between computernetworks of different trust levels. Typical examples are the Internet which is a zone withno trust and an internal network which is a zone of higher trust. A zone with anintermediate trust level, situated between the Internet and a trusted internal network, isoften referred to as a "perimeter network" or Demilitarized zone (DMZ).

    A firewall's function within a network is similar to firewalls with fire door in buildingconstruction. In former case, it is used to prevent network intrusion to the privatenetwork. In latter case, it is intended to contain and delay structural fire from spreading toadjacent structures.

  • 8/8/2019 viva ITWD

    5/7

    20.Encryption:

    In cryptography, encryption is the process of transforming information(referred to as plaintext) to make it unreadable to anyone except those possessing specialknowledge, usually referred to as a key. The result of the process is encryptedinformation (in cryptography, referred to as ciphertext). In many contexts, the wordencryption also implicitly refers to the reverse process, decryption (e.g. software forencryption can typically also perform decryption), to make the encrypted informationreadable again (i.e. to make it unencrypted).

    21.Define VPN .

    A virtual private network (VPN) is a communications network tunneled throughanother network, and dedicated for a specific network. One common application is securecommunications through the public Internet, but a VPN need not have explicit securityfeatures, such as authentication or content encryption. VPNs, for example, can be used toseparate the traffic of different user communities over an underlying network with strongsecurity features.

    22.NAT(NETWORK ADDRESS TRANSLATION)

    In computer networking, Network Address Translation (NAT, also known asNetwork Masquerading, Native Address Translation or IP Masquerading) is a techniqueof transceiving network traffic through a router that involves re-writing the source and/ordestination IP addresses and usually also the TCP/UDP port numbers of IP packets asthey pass through. Checksums (both IP and TCP/UDP) must also be rewritten to takeaccount of the changes. Most systems using NAT do so in order to enable multiple hostson a private network to access the Internet using a single public IP address (see gateway).Many network administrators find NAT a convenient technique and use it widely.Nonetheless, NAT can introduce complications in communication between hosts andmay have a performance impact.

    23. SEARCH ENGINE:

    A search engine is an information retrieval system designed to help find informationstored on a computer system. Search engines help to minimize the time required to findinformation and the amount of information which must be consulted, akin to othertechniques for managing information overload.The most popular form of a search engine is a Web search engine which searches forinformation on the public World Wide Web. Other kinds of search engines includeenterprise search engines, which search on intranets, desktop search engines, and mobilesearch engines.

  • 8/8/2019 viva ITWD

    6/7

    24.PACKET FILTERING:

    Packet filters act by inspecting the "packets" which represent the basicunit of data transfer between computers on the Internet. If a packet matches the packetfilter's set of rules, the packet filter will drop (silently discard) the packet, or reject it(discard it, and send "error responses" to the source).This type of packet filtering pays no attention to whether a packet is part of an existingstream of traffic (it stores no information on connection "state"). Instead, it filters eachpacket based only on information contained in the packet itself (most commonly using acombination of the packet's source and destination address, its protocol, and, for TCP andUDP traffic, which comprises most internet communication, the port number).

    25.OPTIMIZATION:

    optimization is the process of modifying a system to make some aspect of it work moreefficiently or use fewer resources. For instance, a computer program may be optimized sothat it executes more rapidly, or is capable of operating within a reduced amount of memory storage, or draws less battery power in a portable computer. The system may bea single computer program, a collection of computers or even an entire network such asthe Internet.

    26.CLIENT SERVER MODEL:

    Client-server is a computing architecture which separates a client from a server, and isalmost always implemented over a computer network. Each client or server connected toa network can also be referred to as a node. The most basic type of client-serverarchitecture employs only two types of nodes: clients and servers. This type of architecture is sometimes referred to as two-tier. It allows devices to share files andresources.Each instance of the client software can send data requests to one or more connectedservers. In turn, the servers can accept these requests, process them, and return therequested information to the client. Although this concept can be applied for a variety of reasons to many different kinds of applications, the architecture remains fundamentallythe same.These days, clients are most often web browsers, although that has not always been thecase. Servers typically include web servers, database servers and mail servers. Onlinegaming is usually client-server too. In the specific case of MMORPG, the servers aretypically operated by the company selling the game; for other games one of the playerswill act as the host by setting his game in server mode.

    27.INTERNET INFORMATION SERVERS :

    Microsoft Internet Information Services (IIS, formerly called Internet InformationServer) is a set of Internet-based services for servers using Microsoft Windows. It is theworld's second most popular web server in terms of overall websites.The serverscurrently include FTP, SMTP, NNTP, and HTTP/HTTPS.

  • 8/8/2019 viva ITWD

    7/7

    28.Define APPLET.

    An applet is a software component that runs in the context of another program, forexample a web browser. An applet usually performs a very narrow function that has noindependent use. As such, an applet provides functionality or performance beyond thedefault capabilities of its container (the browser). Also, in contrast with a subroutine,certain capabilities are restricted by the container. An applet is written in a language thatis different from the scripting or HTML language which invokes it. The applet is writtenin a compiled language, while the scripting language of the container is an interpretedlanguage, hence the greater performance or functionality of the applet. Unlike a"subroutine," a complete web component can be implemented as an applet.

    29.Define THREAD.

    Thread in computer science is short for a thread of execution. Threads are a wayfor a program to fork (or split) itself into two or more simultaneously (or pseudo-simultaneously) running tasks. Threads and processes differ from one operating system toanother, but in general, the way that a thread is created and shares its resources isdifferent from the way a process does.