0% found this document useful (0 votes)
12 views

Web Programming

The document discusses various topics related to web programming including email, telnet, FTP, video conferencing, e-commerce, e-business, and internet service providers. Some key points are: 1. Email is exchanged using email servers and clients, and has three components - the user agent, mail transfer agent, and SMTP. 2. Telnet and FTP lack encryption, making them vulnerable. FTP has two connection modes - active and passive. 3. Video conferencing systems include desktop, room-based, and mobile. Components include cameras, microphones, displays, codecs, and network infrastructure. 4. E-commerce includes B2B, B2C, and C2C

Uploaded by

alaahusseinn25
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views

Web Programming

The document discusses various topics related to web programming including email, telnet, FTP, video conferencing, e-commerce, e-business, and internet service providers. Some key points are: 1. Email is exchanged using email servers and clients, and has three components - the user agent, mail transfer agent, and SMTP. 2. Telnet and FTP lack encryption, making them vulnerable. FTP has two connection modes - active and passive. 3. Video conferencing systems include desktop, room-based, and mobile. Components include cameras, microphones, displays, codecs, and network infrastructure. 4. E-commerce includes B2B, B2C, and C2C

Uploaded by

alaahusseinn25
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Web Programming

Chapter two :
1. Define the internet. What protocol suit does it follow?
The internet is a global network of interconnected computers that communicate using
the Internet Protocol Suite, which includes protocols such as TCP/IP, HTTP, FTP, and
SMTP.
2. What is email? How is it sent and received?
Email is a method of exchanging digital messages over the internet. It is sent and
received using email servers and clients, such as Outlook or Gmail.

3. Describe the three components of email.


The three components of email are the user agent (email client), mail transfer agent
(email server), and simple mail transfer protocol (SMTP).
4. What is meant by email address? What are the required parts of email address?
An email address can be up to 255 characters long and the required parts are two
strings separated by the character "@".
5. Are following email addresses valid?
a. [email protected]
b. [email protected]

c. [email protected]
d. [email protected]
Yes, they are valid.
6. What is telnet used for?

Telnet is used for remotely accessing and managing devices or systems over a network.
7. What is virtual terminal? What is it used for?
Virtual terminal is a application service that allows host in a multi terminal network to
communicate with other hosts irrespective of terminal type or characteristics and it is
used to connect to the remote hosts.

Web Programming 1
8. Name applications of telnet.
Few applications of telnet include the ‗putty‘ TCP client which can access a linux server
using windows operating system, Absolute telnet (windows client) and RUMBA (terminal
emulator).
9. Why is FTP protocol used?
FTP protocol is used for transferring files over a network. It is commonly used for
uploading web pages and other files to a web server, as well as for downloading files
from a server to a local computer.
10. Explain different connections that can be used by FTP.
There are two types of connections that can be used by FTP: active mode and passive
mode. In active mode, the client connects to the server's port 21 and then sends a
command to open a data port. In passive mode, the client connects to the server's port
21 and then sends a PASV command, which tells the server to open a data port for the
client to connect to.
11. What are drawbacks of telnet and FTP?
The drawbacks of telnet include lack of encryption, which makes it vulnerable to
eavesdropping and unauthorized access. The drawbacks of FTP include lack of security
features, such as encryption, which makes it vulnerable to attacks such as
eavesdropping and unauthorized access.
12. Define E commerce. What are the advantages of e commerce?

E-commerce refers to the buying and selling of goods or services over the internet. The
advantages of e-commerce include convenience, cost savings, access to a global
market, and the ability to easily compare prices and products.

13. Give one example of B2B, B2C and C2C e commerce.


An example of B2B e-commerce is when a manufacturer purchases raw materials from
a supplier. An example of B2C e-commerce is when a customer purchases clothing
from an online retailer. An example of C2C e-commerce is when an individual sells their
used furniture on an online marketplace.
14. Identify following E commerce category

a. Sale of online admission form for a college.


E-services

Web Programming 2
b. Submission of the above form.
E-services

c. Online resale of a second hand car.


E-tailing

d. Purchase of raw material by an automobile company.


B2B E-commerce

15. What is visual collaboration?


Visual collaboration is a method of communication and collaboration that involves the
use of visual aids, such as images, videos, and other visual elements, to facilitate
communication and problem-solving among individuals or groups.
16. What is codec how does it function?

A codec is a device or software that compresses and decompresses digital media files
for transmission. It functions by encoding the data into a smaller file size for
transmission over a network, and then decoding it back to its original format at the
receiving end.
17. What are different types of video conferencing system?

There are different types of video conferencing systems, including:

1. Desktop video conferencing: This type of system allows individuals to participate in


video conferences from their personal computers or laptops.

2. Room-based video conferencing: This system is designed for larger groups and
involves dedicated conference rooms with specialized equipment for high-quality
video and audio transmission.

3. Mobile video conferencing: This type of system allows participants to join video
conferences from their mobile devices, such as smartphones or tablets.

18. List the components of video conferencing system.


The components of a video conferencing system typically include:

1. Cameras: These capture the video feed of the participants in the conference.

2. Microphones: These capture the audio feed of the participants in the conference.

Web Programming 3
3. Displays: These show the video feed of the remote participants in the conference
room.

4. Codecs: These compress and decompress digital media files for transmission over
a network.

5. Network infrastructure: This includes routers, switches, and other networking


equipment to facilitate data transmission between different locations.

19. Discuss the problems faced by video conferencing system.

Some common problems faced by video conferencing systems include:

1. Connectivity issues: Poor internet connection can lead to dropped calls or poor
audio/video quality during conferences.

2. Compatibility issues: Different devices and software may not always be compatible
with each other, leading to difficulties in joining or hosting conferences.

3. Bandwidth limitations: Insufficient bandwidth can result in lagging or freezing during


video conferences.

4. Security concerns: Video conferences can be vulnerable to hacking or unauthorized


access if proper security measures are not in place.

5. User experience challenges: Participants may struggle with using unfamiliar


technology or navigating through different features during a conference.

20. Define E business.


E-business, or electronic business, refers to the use of the internet and other digital
technologies to conduct business activities. This can include online retail, online
banking, online advertising, and more.
21. List a few applications of e business.

Some applications of e-business include:

1. E-commerce: buying and selling goods and services online

2. Online banking: managing finances and conducting transactions over the internet

3. Digital marketing: promoting products or services through digital channels such as


social media and email

4. Online booking systems: for travel, accommodation, events, etc.

Web Programming 4
5. Online customer service: providing support and assistance to customers through
digital platforms

22. What is a E business model? Give three examples of E business model.

An e-business model is a framework that outlines how a company will generate revenue
and achieve profitability through its online activities. Three examples of e-business
models are:

1. Subscription model: offering access to products or services for a recurring fee

2. Advertising model: generating revenue through advertising on a website or platform

3. E-commerce model: selling products or services directly to consumers through an


online store

23. What are risks for E business? What are the solutions available for these risks?

Risks for e-business can include security breaches, data privacy concerns, competition
from other online businesses, and technological changes. Solutions for these risks can
include implementing strong cybersecurity measures, complying with data protection
regulations, staying updated on industry trends, and continuously innovating technology.

24. What is ISP? Explain the role of ISP in an internet connection.

ISP stands for Internet Service Provider. An ISP is a company that provides individuals
and businesses with access to the internet and related services such as email accounts
and web hosting. The role of an ISP in an internet connection is to connect users to the
internet through various means such as dial-up, DSL, cable modem, fiber optic, or
wireless connections. ISPs also manage network infrastructure and provide technical
support for their customers' internet connections.
25. Classify following technologies of ISP in business or home connections

a. A dial up connection with speed 1Mbps

A dial up connection with speed 1Mbps - Home connection

b. A connection to a LAN using leased cable lines


A connection to a LAN using leased cable lines - Business connection

c. Hosting of personal web page

Hosting of personal web page - Home and business connection

d. Use of wi-fi for a laptop.

Web Programming 5
Use of wi-fi for a laptop - Home and business connection

26. What are different services provided by ISP?

Different services provided by ISP include internet access, email services, web hosting,
domain registration, and online storage.

27. Explain what is peering? What is its advantage?

Peering is the arrangement of traffic exchange between Internet service providers


(ISPs) where they directly connect their networks and exchange traffic without having to
pay a third party for the transit of data. The advantage of peering is that it can improve
network performance by reducing latency and increasing bandwidth for both parties
involved.

28. What is VISP? Give one example to explain its use.

VISP stands for Virtual Internet Service Provider, which is a company that resells
internet services under its own brand name using the infrastructure of another ISP. An
example of VISP is a company that offers internet services to its customers but does not
own the physical network infrastructure.

29. Discuss the concept of freenet and its importance.

Freenet is a decentralized peer-to-peer network that allows users to anonymously share


files, browse and publish "freesites" (web sites accessible only through Freenet), and
chat on forums. Its importance lies in providing a platform for secure and censorship-
resistant communication and information sharing.
30. What are domain name servers? What is their function?

Domain Name Servers (DNS) are specialized servers that translate domain names into
IP addresses, allowing users to access websites using human-readable addresses
instead of numerical IP addresses. Their function is to maintain a directory of domain
names and translate them into IP addresses when requested by a user's device.

31. What is internet address? How is it assigned?


An internet address is an IP address assigned to devices connected to the internet in
order to identify them on the network. It is assigned either manually or automatically
through DHCP (Dynamic Host Configuration Protocol) when a device connects to the
network.

32. Write a note on evolution of www

Web Programming 6
The World Wide Web (WWW) has evolved from its inception as a collection of static
web pages with basic text and images to a dynamic platform with interactive content,
multimedia, e-commerce, social networking, and cloud based applications.

33. What is a web browser? List and compare different available web browsers
A web browser is an application used to access information on the World Wide Web.
Some popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge,
Safari, and Opera. They differ in terms of features, performance, security, and
compatibility with different operating systems.

Chapter Four :
1. Explain how to create text based top navigation bar in details.

1. Open your HTML file in a text editor or an HTML editor.

2. Use the <nav> tag to define the navigation bar.

3. Inside the <nav> tag, use an unordered list (<ul>) to create a list of links.

4. Inside the <ul> tag, use list items (<li>) to create individual links.

5. Use anchor tags (<a>) inside each list item to create clickable links.

6. Add text inside the anchor tags to label each link.

<nav>
<ul>
<li><a href="#home">Home</a></li>
<li><a href="#about">About</a></li>
<li><a href="#services">Services</a></li>
<li><a href="#contact">Contact</a></li>
</ul>
</nav>

2. Create text based bottom navigation bar of four link.


To create a text-based bottom navigation bar with four links, simply follow the same
steps as above but position it at the bottom of your webpage.

3. Write a short note on graphical based navigation bar.


A graphical-based navigation bar is a navigation bar that uses images instead of text for
its links. This can be visually appealing and can enhance the overall design of a

Web Programming 7
website. However, it's important to ensure that the images are clear and easily
recognizable as navigation buttons.

4. Explain image mapping concept in details.


Image mapping is a technique used in HTML to define clickable areas on an image.
This allows you to turn an image into a navigation menu by defining specific regions on
the image that act as links when clicked.

Chapter Five :
1. Create the structure of from pre-designed websites using HTML5 semantic elements.
HTML5 introduced a set of semantic tags that provide a more meaningful structure to
web pages, making it easier for search engines and screen readers to understand the
content. Some of the commonly used semantic tags include <header>, <nav>, <main>,
<section>, <article>, <aside>, and <footer>.

2. Explain HTML5 Semantic Tags in details.

<header>: Represents the header of a section or page.

<nav>: Represents a group of navigation links.

<main>: Represents the main content of the document.

<section>: Represents a thematic grouping of content.

<article>: Represents an independent piece of content within a document.

<aside>: Represents content that is tangentially related to the main content.

<footer>: Represents the footer of a section or page.

3. Explain positioning in divisions with examples.


In HTML, divisions (<div>) are used to create sections or groups within a web page. The
positioning of these divisions can be controlled using CSS. For example, you can use
CSS properties like "position", "top", "left", "right", and "bottom" to position a division on
the web page.

<!DOCTYPE html>
<html>
<head>
<style>

Web Programming 8
.container {
position: relative;
}
.box {
position: absolute;
top: 50px;
left: 50px;
}
</style>
</head>
<body>

<div class="container">
This is a container
<div class="box">This is positioned box</div>
</div>

</body>
</html>

4. What is division tags and explain how to use it?


The division tag (<div>) is a generic container that can be used to group and style
elements on a web page. It does not have any specific meaning or semantics attached
to it. It is often used as a building block for creating layouts and organizing content.

<div id="header">
This is the header
</div>
<div id="content">
This is the main content
</div>
<div id="sidebar">
This is the sidebar
</div>
<div id="footer">
This is the footer
</div>

5. Explain difference between <div> tag and semantic tag in details with examples.
The main difference between <div> tag and semantic tags lies in their purpose and
meaning. Semantic tags provide more context and meaning to the content, making it

Web Programming 9
easier for search engines and screen readers to understand. On the other hand, <div>
tag is simply a generic container without any specific meaning attached to it.

<!-- Using semantic tags -->

<header>This is the header</ header>

<nav>This is navigation</nav> <main>This is main content</ main>

<!-- Using div tag -->

<div id="header">This is the @header</div>

<div id="nav">This is navigation</ div>

<div id="main">This is main content</div>

Chapter Six :
1. What is the use of rowspan and colspan attribute?
The rowspan and colspan attributes are used in HTML tables to merge cells.
The rowspan attribute specifies the number of rows a cell should span, while the
colspan attribute specifies the number of columns a cell should span. This allows for
more complex table layouts and can be useful for creating tables with merged cells.
2. What is the importance of table tag in web page

The table tag is important in web pages as it allows for the creation of structured data
and layout. It is used to display tabular data in a structured format, making it easier for
users to read and understand.

3. What are the attributes that can be used in table tag


Some of the attributes that can be used in the table tag include: border: Specifies the
width of the border around the table

cellpadding: Specifies the space

between the cell content and cell border

cellspacing: Specifies the space between cells

width: Specifies the width of the table

Web Programming 10
4. Explain cell padding and cell spacing in details with example.
Cell padding refers to the space between the content of a cell and its border, while cell
spacing refers to the space between cells.

For example, if you have a table with cellpadding set to 5 and cellspacing set to 10,
there will be 5 pixels of space between each cell's content and its border, and 10 pixels
of space between each cell.

5. Explain background and foreground attributes of table with examples.


The background attribute is used to specify an image or color as the background for a
table.

<table background="background.jpg">
<tr>
<td>Cell 1</td>
<td>Cell 2</td>
</tr>
</table>

The foreground attribute is used to specify an image or color as the foreground (text)
color for a table.

<table foreground="red">
<tr>
<td>Cell 1</td>
<td>Cell 2</td>
</tr>
</table>

Chapter Seven :
1. Explain basic html input types?

Basic HTML input types are used to create different types of form fields such as text,
password, checkbox, radio button, submit button, etc. These input types allow users to
enter and submit data in a web form.

2. Create Basic Html forms with four fields?

Web Programming 11
<form>
<label for="name">Name:</label>
<input type="text" id="name" name="name"><br>

<label for="email">Email:</label>
<input type="email" id="email" name="email"><br>

<label for="password">Password:</label>
<input type="password" id="password" name="password"><br>

<label for="message">Message:</label>
<textarea id="message" name="message"></textarea><br>

<input type="submit" value="Submit">


</form>

3. Explain HTML5 input types and controls in details?

HTML5 introduced new input types and controls that provide better user experience and
validation. Some of the HTML5 input types include email, url, number, date, time, color,
range, etc. HTML5 also introduced new form controls such as datalist, output, and
progress.
4. Write short notes on following:
a. Audio tag: The audio tag in HTML is used to embed audio content in a web page. It
supports various audio formats such as MP3, WAV, and OGG.
b. Video tag: The video tag in HTML is used to embed video content in a web page. It
supports various video formats such as MP4, WebM, and OGG.

5. Explain how to embed video in web page?

<video width="320" height="240" controls>


<source src="movie.mp4" type="video/mp4">
Your browser does not support the video tag.
</video>

6. Explain how to incorporate audio in web page?

<audio controls>
<source src="music.mp3" type="audio/mpeg">

Web Programming 12
Your browser does not support the audio element.
</audio>

Chapter Eight :
1. Define javascript. How is it used?
JavaScript is a programming language commonly used for creating interactive and
dynamic content on websites. It is primarily used for client-side scripting, allowing web
developers to create features such as form validation, interactive maps, and dynamic
content updates without needing to reload the entire webpage.

2. explain the difference between client side and server side javascript.
Client-side JavaScript runs on the user's web browser, allowing for immediate feedback
and interaction with the user. It can manipulate the HTML and CSS of a webpage,
making it more responsive and engaging.
Server-side JavaScript, on the other hand, runs on the server hosting the website. It is
used to handle tasks such as data processing, database

operations, and server communication.


3. explain how virus threat from javascript is avoided?
To avoid virus threats from JavaScript, web developers should follow best practices
such as using secure coding techniques, validating user input, and regularly updating
their software to patch any security vulnerabilities.
4. write a javascript to find greatest of three given numbers

function findGreatest(num1, num2, num3) {


if (num1 >= num2 && num1 >= num3) {
return num1;
} else if (num2 >= num1 && num2 >= num3) {
return num2;
} else {
return num3;
}
}

Web Programming 13
Web Programming 14

You might also like