100% found this document useful (1 vote)
5K views

Internet Its Applications PDF

Uploaded by

Deepak Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
5K views

Internet Its Applications PDF

Uploaded by

Deepak Kumar
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 71

ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

UNCA45 – INTERNET AND ITS APPLICATIONS


Unit-1 – Introduction to computer & Internet
Type: 100% Theory
Question Bankwith Answers
PART – A QUESTIONS

1. List out the components of a computer.

 Hard disk
 Motherboard
 Processor
 RAM

2. What is meant by programming language?

A programming language is a formal constructed language designed to communicate


instructions to a machine, particularly a computer. Programming languages can be used to
create programs to control the behavior of a machine.

3. What is WWW?

The World Wide Web (www) is an open source information space where documents
and other web resources are identified by URLs, interlinked by hypertext links, and can be
accessed via the Internet.

4. What is a computer?

It an electronic device which is capable of receiving information (data) in a particular


form and of performing a sequence of operations in accordance with a predetermined format.

5. Define internet.

It a global computer network providing a variety of information and communication


facilities, consisting of interconnected networks using standardized communication
protocols.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 1 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

6. Define DNS.

The domain name system (DNS) is the way that Internet domain names are located
and translated into Internet Protocol addresses. A domain name is a meaningful and easy-to-
remember "handle" for an Internet address.

7. What is email?

A message distributed by electronic means from one computer user to one or more
recipients via a network.

8. Define spam.

An irrelevant or unsolicited message sent over the Internet, typically to large numbers
of users, for the purposes of advertising, phishing, spreading malware, etc.

9. What are the various applications of computer?

 Banking
 Insurance
 Education
 Health care
 Military

10. List out the various programming languages?

 Machine language
 Assembly language
 High level language

11. Define data.

Data can be defined as a representation of facts, concepts or instructions in a


formalized manner which should be suitable for communication, interpretation, or processing
by human or electronic machine.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 2 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

12. What is information?

Information is an organized or classified data which has some meaningful values for
the receiver. Information is the processed data on which decisions and actions are based.

13. Define program.

A program is a specific set of ordered operations for a computer to perform.

14. What is an Input Device?

An inputdevice isa device thatisused toinputdata orinformation into a computer.

15. What is an Output Device?

In computers,a unitwhich deliversinformation from the computer to an externaldevice


orfrominternalstorage to externalstorage.

16. Define binary code.

A coding system using the binary digits 0 and 1 to represent a letter, digit, or other
character in a computer or other electronic device.

17. Define byte.

A byte is a unit of measurement used to measure data. One byte contains eight binary
bits, or a series of eight zeros and ones. Each byte can be used to represent 2^8 or 256
different values.

18. Define Compiler.

A compiler is nothing but a translator, which converts the high level programming
language into a machine readable form. It converts the set of data simultaneously.

19. What is an Interpreter?

An interpreter is system software which also converts the high level programming
language by one instruction at a time into a machine readable form.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 3 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

20. Define Assembler.

It translates the assembly language program (i.e. mnemonics) into to machine


language. It’s a machine dependent one.

21. Expand ARPANET & NSFNET.

 ARPANET- Advanced Research Projects Agency Network

 NSFNET- National Science Foundation Network

PART – B QUESTIONS

1. State the different characteristic of a computer.

 Speed: Computer speed depends upon the type of processor and bus line
architecture used.

 Accuracy: Computer performs millions of operations but within the given input
set of instructions and data, the result obtained should be precise one without any
errors.

 Reliability: Reliable means that they can do their task properly and consistently.
Computer communication and components are very reliable and has very less
failure rate.

 Storage: Two types of storage are used, first is primary storage (Eg: RAM) and
second is secondary storage (Eg: Hardisk).

 Automation: Once a set of program is fed into the computer, then the computer
can take decision automatically without interfering with the user. Example: Pen
drives.

 Versatility: Computers are capable of performing various operations at same


time. Like you are reading this webpage and downloading two files from the
internet and also printing the documents simultaneously.
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0
Unit – 1Answer Page 4 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Diligence: Computer can work lot of hours with same speed and accuracy on each
operation, without getting tired.

2. Explain the block diagram of computer with neat diagram.

All types of computers follow a same basic logical structure and perform the
following five basic operations for converting raw input data into information useful to their
users

Input Unit

This unit contains devices with the help of which we enter data into computer. This
unit makes link between user and computer.

The input devices translate the information into the form understandable by computer.

CPU (Central Processing Unit)

 CPU is considered as the brain of the computer.


 CPU performs all types of data processing operations.
 It stores data, intermediate results and instructions(program).It controls the
operation of all parts of computer.
 CPU itself has following three components
o ALU(Arithmetic Logic Unit)
o Memory Unit
o Control Unit

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 5 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

Output Unit

 Output unit consists of devices with the help of which we get the information
from computer.
 This unit is a link between computer and users.
 Output devices translate the computer's output into the form understandable by
users.

Memory or Storage Unit:

 This unit can store instructions, data and intermediate results.


 This unit supplies information to the other units of the computer when needed. It
is also known as internal storage unit or main memory or primary storage or
Random access memory (RAM).
 Its size affects speed, power and capability. Primary memory and secondary
memory are two types of memories in the computer.

Control Unit

This unit controls the operations of all parts of computer but does not carry out any
actual data processing operations.

3. Comment on web resources.

 The concept of a web resource is primitive in the web architecture, and is used in
the definition of its fundamental elements.

 The term was first introduced to refer to targets of uniform resource


locators (URLs).

 In the Semantic Web, abstract resources and their semantic properties are
described using the family of languages based on Resource Description
Framework (RDF).

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 6 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 The concept of a web resource has evolved during the web history, from the early
notion of static addressable documents or files.

From documents and files to web resources:

 In the early specifications of the web (1990–1994), the term resource is barely
used at all.

 The web is designed as a network of more or less static addressable objects,


basically files and documents, linked using uniform resource locators (URLs).

 A web resource is implicitly defined as something which can be identified.

4. Write short note on history of java.

 Java was designed by Sun Microsystems in the early 1990s.

 Basic aim of java was to solve the problem of connecting many household
machines together.

 Project was unsuccessful because no one wanted to use it.

 Earlier Name of Java : OAK

 Creator of Java : James Gosling (the father of Java)

 As there was another language called Oak, they decided to rename OAK. New
name was given to OAK , OAK was renamed Java in 1994

 Java was publicly released on : May 27, 1995

 Java was targeted at : Internet development

 Applets Had early support from companies : Netscape Communications

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 7 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

5. Discuss on the Microsoft software .NET.

 .NET is business strategy from Microsoft and its collection of programming


support for what are known as Web services.

 It has ability to use the Web rather than your own computer for various services.

 The .NET platform includes servers; building-block services, such as Web-based


data storage; and device software.

The .NET platform was designed to provide:

 Make the entire range of computing devices work together.


 Increased interactive capability for Web sites, enabled by greater use of XML
rather than HTML
 Centralized data storage, which will increase efficiency and ease of access to
information.
 The ability to integrate various communications media, such as e-mail, faxes, and
telephones
 For developers, the ability to create reusable modules, which should increase
productivity and reduce the number of programming errors

6. Explain internet communication protocols.

 FTP (File Transfer Protocol) - a protocol that is used to transfer and manipulate
files on the Internet
 HTTP (Hypertext Transfer Protocol) - An Internet-based protocol for sending
and receiving webpage
 TCP/IP (Transmission Control Protocol / Internet Protocol) - manages the
assembling of a message or file into smaller packets that are transmitted over the
Internet and received by a TCP layer that reassembles the packets into the original
message.
 UDP (User Datagram Protocol) - uses a simple connectionless transmission
model with a minimum of protocol mechanism.
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0
Unit – 1Answer Page 8 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 IMAP (Internet Message Access Protocol) - A protocol for e-mail messages on


the Internet
 IRC - (Internet Relay Chat ) - used for Internet chat and other communications
 POP3 (Post Office protocol Version 3) - used by e-mail clients to retrieve
messages from remote servers
 SMTP (Simple Mail Transfer Protocol) - A protocol for e-mail messages on the
Internet
 NTF- (Network Time Protocol) - synchronizes clock between computer systems
over packet-switched, variable-latency data networks.

7. Discuss about W3C.

 In October 1994, Tim Berners-Lee founded an organization called the World


Wide Web Consortium (W3C) for developing nonproprietary, interoperable
technologies.

 One of the W3C’s primary goals is to make the Web universally accessible
regardless of disability, language or culture.

 Web technologies standardized by the W3C are called Recommendations.

 W3C Recommendations include the XHTML, CSS, HTML and XML.

 A recommendation is not an actual software product, but a document that


specifies a technology’s role, syntax, rules, etc.

Before becoming a W3C Recommendation, a document passes through three phases:

 Working Draft- which, as its name implies, specifies an evolving draft,

 Candidate Recommendation - a stable version of the document that industry


may begin implementing

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 9 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Proposed Recommendation - Candidate Recommendation that is considered


mature (i.e., has been implemented and tested over a period of time) and is ready
to be considered for W3C Recommendation status.

8. Explain about e-mail.

 The full form of e-mail is Electronic Mail. It is a system for sending and receiving
messages electronically over a computer network

 Email is used as a means of communication between 1 or more parties.

 It is often more efficient than traditional mail which has a longer transit between
the sender and the receiver(s).

Advantages:

 Email is effective in providing quick answers to yes and no, type questions.
 Email is effective in finding the right person in an organization or company to
answer your question.
 Email is good to make appointments for busy people.
 Email can distribute information quickly to many people for the time it takes to
email one person.

Disadvantages:

 Spam emails can be sent which can clutter your inbox.


 Email hoaxes.
 Viruses can be sent by email.
 Misunderstandings can occur if messages are not constructed properly.
 Not everyone has internet connectivity.

9. Explain the history of internet.

 Grew out of a research network originally funded by U.S. Department of Defense.


 Development of this network, known as the Arpanet after the Advanced
 American Research Projects Agency (ARPA), began in 1969.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 10 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 As the network grew, it was used for applications beyond research, such as
electronic mail.
 In the early 1980s, the current versions of the core Internet protocols, TCP and IP,
were introduced across the network.
 The term Internet comes from the word inter-network - an interconnected set of
networks.
 In 1992, the Center for European Nuclear Research (CERN) released the first
versions of World Wide Web software.
 Subsequently, the number of Web servers has grown quickly.

10. Write short note on Personal Computer.

 A PC can be defined as a small, relatively inexpensive computer designed for an


individual user.
 PCs are based on the microprocessor technology that enables manufacturers to put
an entire CPU on one chip.
 Businesses use personal computers for word processing, accounting, desktop
publishing, and for running spreadsheet and database management applications.
 At home, the most popular use for personal computers is playing games and
surfing Internet.
 Although personal computers are designed as single-user systems, these systems
are normally linked together to form a network.
 In terms of power, now-a-days High-end models of the Macintosh and PC offer
the same computing power.
 Provide graphics capability as low-end workstations by Sun Microsystems,
Hewlett-Packard, and Dell.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 11 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

PART – C QUESTIONS

1. What are the types of programming language available? Explain.

Computer languages are classified into three categories:

 Machine language
 Assembly language
 High level languages

MACHINE LANGUAGE

 The form in which information is denoted or represented by a combination of “1”


and “0”s is called machine language.

 Programs and data are ultimately represented in machine language in memory and
other hardware of the computer.

Advantages of Machine Language:

 Translation Free
 High Speed

Disadvantages of Machine Language:


 Machine Dependent
 Complex Language
 Error Prone
 Tedious

ASSEMBLY LANGUAGE:

 As computer field advanced, computer scientists felt the necessity of making


computer programming easier.

 They invented computer languages that are easy to remember and use.

 These languages called assembly language uses mnemonic codes.

For Example: For adding two quantities X and Y, You may code as follows.

ADD X Y
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0
Unit – 1Answer Page 12 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

ADD is called operation code that tells the computer what operation it has to perform.
X and Y are called operation addresses.

HIGH LEVEL LANGUAGES:

 High level languages are similar to English language.

 Programs written using these languages can be machine independent.

 A single high- level statement can substitute several instructions in machine or


assembly language.

 In high- level language, programs are written in a sequence of statements to solve


a problem.

Advantages:

 Readability
 Machine Independent
 Easy Debugging
 Easier to Maintain
 Low Development Cost
 Easy Documentation

Disadvantages:

 Poor Control on Hardware


 Less Efficient

2. Discuss the types of internet connections.

There are many ways a personal electronic device can connect to the internet. They
all use different hardware and each has a range of connection speeds. Some of them are as
follows,

Dial-Up (Analog 56K).

 Dial-up access is cheap but slow.


 A modem connects to the Internet after the computer dials a phone number.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 13 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Here analog signal is converted to digital via the modem and sent over a
telephone lines.

DSL:

 DSL stands for Digital Subscriber Line. It is an internet connection that is always
“on”.
 This uses 2 lines so your phone is not tied up when your computer is connected.
 DSL uses a router to transport data and the range of connection speed, depending
on the service offered, is between 128K to 8 Mbps.

Cable:
 Cable provides an internet connection through a cable modem and operates over
cable TV lines.
 There are different speeds depending on if we are uploading data transmissions or
downloading.
 Coaxial cable provides a much greater bandwidth over dial-up or DSL telephone
lines

Wireless:
 Wireless or Wi-Fi does not use telephone lines or cables to connect to the internet.
It uses radio frequency.
 Wireless is also an always on connection and it can be accessed from just about
anywhere.
 Speeds will vary, and the range is between 5 Mbps to 20 Mbps.

Satellite.
 Satellite accesses the internet via a satellite in Earth’s orbit.
 It provides a delayed connection compared to cable and DSL.
 Satellite connection speeds are around 512K to 2.0 Mbps.

Cellular:

 Cellular technology provides wireless Internet access through cell phones.


 The speeds vary depending on the provider, but the most common are 3G and 4G
speeds.
 The goal of 4G is to achieve peak mobile speeds of 100 Mbps but the reality is
about 21 Mbps currently.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 14 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

3. Explain the different units of a computer

CPU:

This is the computational unit and is the computer's heart. This entity controls the
operations of the computer and performs its data processing functions.

CPU comprises three units

 Arithmetic Logic Unit (ALU), where all the arithmetic and logical operations are
performed.

 Control Unit (CU) which coordinates with all other units for proper
systemoperation.

 Memory unit (MU), which stores the instructions, data and results as well.

Input/output interface:

They are used to move data from the computer and from its external environment.
The external environment may be an input or an output device like Printer, displays,
keyboard etc.

System interconnection:

This constitutes some mechanism that provide for communication among CPU,
Memory & I/O. These can be referred to as a system BUS.

Traditionally the computer system consists of a single CPU. But some machines like
multiprocessing involves the use of multiple CPU’s and share a single memory.

Registers:

The registers are used to store the data, addresses, and flags that are in use, by the CPU.

Primary Memory:

 Primary memory is also called as main memory, which operates at electronic


speeds.
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0
Unit – 1Answer Page 15 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 CPU can directly access the program stored in the primary memory.
 Main memory consists of a large number of semiconductor storage cells.
 Each cell is capable of storing one bit of information.

Secondary Memory:

 This memory type is much larger in capacity and also much slower than the main
memory.
 Secondary memory stores system programs, large data files and the information
which is not regularly used by the CPU.

4. Explain sending and receiving an attached file using Netscape messenger.

Sending a file:

 Attaching a file to a message means sending a file along with it. An attachment
can be any type of file, such as a word-processor file, an image, or a Web page,
and it can be of any size. You can attach as many files
to a message as you'd like.

 To attach a file to a message,compose a message as you


would normally, but click the Attach button on
the toolbar before sending it. A little menu will pop
down. You can select to send a File, which is a file on your hard drive, or a Web
Page, which is a file on the Web.

 To attach a file, click File in the Attach menu. Locate and highlight the file you
want to attach, and then click Open. The file will be added to the list of file
attachments. You can repeat this process as often as you'd like.

 Click Send when you want to send your message and attachments.

Receiving a file:
 When someone sends you an e-mail message with an attachment, we will see an

icon ( ) in the head of the e-mail message.


RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0
Unit – 1Answer Page 16 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Click this icon to display an icon of the attached file in the bottom of the window.

 When we double-click this attached file icon, we will be prompted to either save
or open the file. Choose Save.

 Once the file is saved, and before opening it, you might want to scan it
for viruses.

Attached images and Web pages:

 If someone sends you an e-mail message with an image or a Web page attached to
it, you will see the image or the Web page in the body of the message.

 Attached Web pages will also have a hyperlink to them somewhere in the body of
the message.

-------------

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-1ANS/VER 2.0


Unit – 1Answer Page 17 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

UNCA46 – INTERNET AND ITS APPLICATIONS


Unit-2 – Web Browsers
Type: 100% Theory
Question Bankwith Answers
PART – A QUESTIONS

1. Compare internet and intranet.

Internet Intranet
Internet is wide network of computers and is Intranet is also a network of computers
open for all. designed for a specific group of users
The number of users is unlimited The number of users is limited
Intranet can be safely privatized as per the
Internet is not as safe
need

2. What is a browser?

A computer program with a graphical user interface for displaying HTML files, used
to navigate the World Wide Web.

3. List out any four search engines.

 Internet Explorer
 Mozilla Firefox
 Google Chrome
 Opera

4. Define IRC.

Internet Relay Chat (IRC) is an application layer protocol that facilitates


communication in the form of text. The chat process works on a client/server networking
model.

5. What is newsgroup?

A newsgroup is a discussion about a particular subject consisting of notes written to a


central Internet site and redistributed through Usenet.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 1 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

6. Define internet.

A global network that provides a variety of information and communication facilities,


consisting of interconnected networks using standardized communication protocols.

7. Define bandwidth.

A range of frequencies within a given band, in particular that used for transmitting a
signal.

8. What is baud rate?

Baud rate means the number of times a signal in a communications channel changes
state.

9. Define cookies.

A message given to a Web browser by a Web server. The browser stores the message
in a text file. The message is then sent back to the server each time the browser requests a
page from the server.

10. Define session.

The session of activity that a user with a unique IP addressspends on a Web


site during a specified period of time

11. What is Usenet?

Usenet is a collection of user-submitted notes or messages on various subjects that are


posted to servers on a worldwide network.

12. What is NIC?

A network interface card (NIC) is a circuit board or card that is installed in a


computer so that it can be connected to a network.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 2 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

13. Define DSL.

Digital Subscriber Line is defined as the way a computer connects to the Internet at
high speeds using telephone lines.

14. What is ISP?

An Internet Service Provider (ISP) is a company that provides you with access to the
Internet, usually for a fee. The most common ways to connect to an ISP are by using a phone
line (dial-up) or broadband connection (cable or DSL).

15. Define MODEM.

A modem is a device or program that enables a computer to transmit data over, for
example, telephone or cable lines.

16. What is URL?

Uniform Resource Locator and is an address to a resource on the Internet. A URL has
three main components: Protocol, Server name and Domain name.

17. Define hypertext.

Hypertext is text displayed on a computer display with references (hyperlinks) to


other text which the reader can immediately access, progressively at multiple levels of detail
(also called Stretch Text)

18. Define Hyperlink.

It is an electronic link that providing direct access from one distinctively marked
place in a hypertext or hypermedia document to another in the same or a different document.

19. Define protocol.

A protocol is the special set of rules that end points in a telecommunication


connection use when they communicate. Protocols specify interactions between the
communicating entities.
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0
Unit – 2Answer Page 3 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

20. Define port.

An interface on a computer to which we can connect a device is known as Port.


Personal computers have various types of ports such as connecting disk drives, keyboards
modems, and other peripheral devices.

21. What is meant by gateway?

A gateway is a network point that acts as an entrance to another network. On the


Internet, a node can be either a gateway node or a host node.

22. Define HTML.

Hypertext Markup Language, a standardized system for tagging text files to achieve
font, color, graphic, and hyperlink effects on World Wide Web pages.

PART – B QUESTIONS

1. What are the advantages of internet search?

 Information on almost every subject imaginable.

 Ability to do research from your home versus research libraries.

 Information at various levels of study. Everything from scholarly articles to ones


directed at children.

 Message boards where people can discuss ideas on any topic.

 The internet provides the ability of emails. Free mail service to anyone in the
country.

 Platform for products like SKYPE, which allow for holding a video conference
with anyone in the world who also has access.

 Things such as Yahoo Answers and other sites where kids can have readily
available help for homework.

 News, of all kinds is available almost instantaneously. Commentary, on that news,


from every conceivable viewpoint is also available.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 4 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

2. Explain the procedure for connecting to internet?

Setting Up a Cable Internet Connection

 Plug the cable modem into your computer. Make sure your computer is near a
wall cable socket.
 Plug the cable modem into the wall cable socket.
 Plug in the cable modem's power cord.
 Test your internet connection.

Setting Up a DSL Internet Connection

 Plug the DSL modem into your computer.


 Plug the DSL modem into the wall cable socket.
 Plug in the DSL modem's power cord.
 Log in to the modem's administrative screen.
 Enter your DSL account username and password.
 Save your settings. When the setup is complete, save the settings.
 Test your internet connection.

3. What is IE? Explain.

 Internet Explorer commonly abbreviated IE or MSIE.

 It is a series of graphical web browsers developed by Microsoft and included as


part of the Microsoft Windows line of operating systems, starting in 1995.

 It is one of most popular browser in use, despite strong competition from the likes
of Mozilla Firefox, Apple's Safari, Opera and Google Chrome.

 Internet Explorer supports Java, JavaScript, ActiveX, RSS, CSS and Ajax.

 It also offering features like tabbed browsing, private browsing, and built-in
malware and phishing protection.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 5 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

4. Discuss about the procedure used for browser setting.

To protect privacy and security of the information from internet, browsers setting are
useful. Some of them are as follows

 General Settings - Change your home page, delete the browsing history, change search
settings, change tab settings, and customize the appearance of Internet Explorer.

 Security settings - Set default and custom security levels for the Internet, intranet, and
specific websites.

 Privacy settings - Change cookie and Pop-up Blocker settings.

 Content settings - Turn on Content Advisor or change its settings, view and manage
security certificates, change AutoComplete settings, or change feed (RSS) settings.

 Programs settings - Change your default web browser, e‑mail program, HTML editor,
Newsgroup reader, or Internet telephone, and manage web browser add-ons.

 Advanced settings - Change advanced settings for accessibility, browsing, HTTP


protocol handling, etc.

5. Explain the features of IE6.

These are the four main features of Internet Explorer 6:

 Error reporting mechanism: Lets end users report failures they encounter
during use.
 Personal Bar: Brings a new level of personalization and convenience to Web
browsing.
 Privacy enhancements: Provide the end user with control over how cookies can
be used in collecting information.
 Standards Support: Internet Explorer 6 supports more features of the standards,
CSS level 1 and DOM level 1.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 6 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

Microsoft is promoting the new version and its features to three target audiences:

 End users: Internet Explorer is an application that enables them to view and
interact with Web-based content.
 Web application developers: They use Internet Explorer as a platform for
building and deploying Web-based applications.
 Stand-alone application developers: Internet Explorer 6 enables Web content to
be part of their applications.

6. Discuss finding interesting newsgroup.

 Learn to Use the Browser

 In Newsgroup, click Discussion Help Index and click on the choices under the
basics to learn.

 Click BACK to the Browse Discussion Groups page. Find the name(s) of groups
that might interest you. Write their names here: Example: biz

 Choose a group and read some messages.

 We will need to find topics with several messages.

 Spend some time reading the messages in your newsgroup.

 Spend some time reading the previous in thread and next in thread messages.

 At the very top of one of the message pages in the word thread.

7. Explain creating newsgroup.

To create a new newsgroups

 Think twice - first make sure that you really want to do this. Learn about the
various kinds of forums that you can create on the net, and decide which kind fits
your purposes best.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 7 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Choose your hierarchy - decide in which top-level hierarchy you want to put the
group. Different hierarchies of newsgroups have different rules for creating new
groups.

Guidelines for choosing a hierarchy

 International topics - If the topic is of broad international interest, then the


logical place is an international hierarchy such as one of the Big Eight (comp,
humanities, misc, news, rec, sci, soc, and talk) or alt.

 Regional or local topics - If the topic is of local or regional interest, you should
look for an appropriate national, regional or local newsgroup hierarchy.

Note: Sources of information are found at *.general or *.config group in the hierarchy

8. Write short note on IRC.

 Internet Relay Chat was developed in August 1988, by Jarkko Oikarinen,

 It is a popular chat service still in use today.

 IRC enables users to connect to a server using a software program or web service
and communicate with each other live.

 To connect and chat with other IRC users, we must either have an IRC client or a
web interface that connects you to IRC servers. Eg: HydraIRC program

Basic Commands

 NICK – Give the user a nickname or change the previous one

 USER – Specify the username, hostname, and real name of a user.

 QUIT – End the client session.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 8 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

PART – C QUESTIONS

1. Explain about FTP.

 File Transfer Protocol (FTP) is a standard Internet protocol for transmitting files
between computers on the Internet over TCP/IP connections.

 FTP is a client-server protocol that relies on two communications channels


between client and server

 A command channel for controlling the conversation and a data channel for
transmitting file content.

 Clients initiate conversations with servers by requesting to download a file.

 Using FTP, a client can upload, download, delete, and rename, move and copy
files on a server.

 A user typically needs to log on to the FTP server, although some servers make
some or all of their content available without login, also known as anonymous
FTP.

 FTP was originally defined in 1971, prior to the definition of TCP and IP, and has
been redefined many times.

 Users can work with FTP via a simple command line interface or with a dedicated
graphical user interface (GUI).

 Web browsers can also serve as FTP clients

 It works well across firewalls and Network Address Translation (NAT) gateways.

FTP sessions:

It works in passive or active modes.

 In active mode, after a client initiates a session via a command channel request,
the server initiates a data connection back to the client and begins transferring
data.

 In passive mode, the server instead uses the command channel to send the client
the information it needs to open a data channel.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 9 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

2. Briefly explain sending messages with yahoo messenger and windows messenger.

Send an Instant Message (IM) to someone on your Yahoo Messenger List

 Double-click the contact's name on your Messenger List. This will automatically
open an IM window.

 Compose you instant message in the box at the bottom.

 Click Send, or hit Enter on your keyboard.

Send an IM to someone not on your yahoo Messenger List

 Click Actions.

 Select Send Instant Message.

 Select the Other Contacts tab.

 Type the Yahoo ID of the person you want to send a message to, and click OK.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 10 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Compose you instant message in the box at the bottom.

 Click Send, or hit Enter on your keyboard.

Send an Instant Message (IM) to someone on your windows Messenger

 Click the Windows Messenger icon in the status area of the taskbar.

 Point to Send an Instant Message, and then click the name of the person who you
want to contact.

 Type your message, and then click Send or press ENTER. Your message is then
displayed to your contact.

3. Discuss features of ICQ.

 Internet Chat Query is an instant messaging computer program that was first
developed and popularized by the Israeli company Mirabilis in 1996.

 The name ICQ stands for "I Seek You". Its ownership was passed to AOL in 1998
and to Mail.Ru Group in 2010.

Variety of themes:

Customize your ICQ! Choose from the wide variety of themes and background
colors. Bright, colorful or minimalistic - ICQ comes with themes for every mood.

File sharing:

Send any type of files to your contacts, right from your chat window. Sharing photos,
videos, audio files and any other documents in ICQ is fast and easy.

Social networks:

Connect ICQ with your social network accounts and chat with all of your friends in
one app. Messaging is so much easier with ICQ.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 11 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

Free voice & video calls:

Unlimited calling is just a few clicks away! With free voice calls and video chat in
ICQ you can catch up and wave hello anytime and anywhere.

Bright and colorful stickers:

Chatting is more fun with ICQ stickers. Send stickers to express your mood, cheer
your friends up or for no reason at all!

4. Explain the different types of browsers.

A web browser is an interface that helps a computer user gain access to all the content
that is on the Internet and the hard disk of the computer. It can view images, text documents,
audio and video files, games, etc.

Internet Explorer

 Internet Explorer (IE) is a product from software giant Microsoft.

 This is the most commonly used browser in the universe.

 This was introduced in 1995 along with Windows 95 launch and it has passed
Netscape popularity in 1998.

Google Chrome

 Developed by Google and its beta version was first released on September 2, 2008
for Microsoft Windows.

 Today, chrome is known to be one of the most popular web browsers with its
global share of more than 50%.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 12 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

Mozilla Firefox

Firefox is a new browser derived from Mozilla. It was released in 2004 and has grown to
be the second most popular browser on the Internet.

Safari

 Safari is a web browser developed by Apple Inc. and included in Mac OS X.


 It was first released as a public beta in January 2003.
 Safari has very good support for latest technologies like XHTML, CSS2 etc.

Opera
 Opera is smaller and faster than most other browsers.
 Fast, user-friendly, with keyboard interface, multiple windows, zoom functions,
and more.
 Java and non Java-enabled versions available.
.

-------------

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-2ANS/VER 2.0


Unit – 2Answer Page 13 of 13
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

UNCA45 – INTERNET AND ITS APPLICATIONS


Unit-3 – E-Mail
Type: 100% Theory
Question Bankwith Answers
PART – A QUESTIONS

1. Define E-mail.

E-mail (electronic mail) is the exchange of computer-stored messages by


telecommunication. E-mail messages are usually encoded in ASCII text.

2. Define newsgroup.

A newsgroup is a discussion about a particular subject consisting of notes written


to a central Internet site and redistributed through World Wide Web.

3. What is spamming?

Spam is flooding the Internet with many copies of the same message, in an
attempt to force the message on people who would not otherwise choose to receive it.

4. What are the disadvantages of E-mail?

 Privacy issues
 Email can be encrypted
 Difficult to completely erase and destroy.
 Easy to get swamped (but you can filter and sort messages)

5. What is an address book?

An address book is a database that stores names, addresses and other contact
information for a computer user. Address books allow easy access to the user's friends,
family, business associates and others by maintaining their email

6. What are the advantages of E-mail?

 Fast and cheap


 Ideal for international communications
 We can check your email from any computer in the world;
 Ability to send same message to predefined groups of people
 Ability to include attached files, documents, pictures, datasets
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0
Unit – 3Answer Page 1 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

7. What is instant messaging?

It is a type of service available on the internet that allows you to exchange written
messages with someone else who is using the service at the same time

8. List out the types of messengers.


 AIM (AOL Instant Messenger)
 Face book Chat
 Google Talk (Gtalk)
 Windows Live Messenger (Formerly MSN)
 Yahoo Messenger

9. Difference between CC and BCC.

Bcc Cc

Sight Receiver cannot see Bcc Receiver can see Cc

Replying Bcc's cannot see the receiver's reply Cc's cannot see the receiver's reply

10. What are file attachments?

An email attachment is a computer file sent along with an email message. One or
more files can be attached to any email message, and be sent along with it to the
recipient.

11. Define Server.

A Server is a program or computer system that stores and distributes email from
one mailbox to another, or relays email from one server to another in a network.

12. What is Shared server?

An email server used by more than one company or sender. Shared servers are
less expensive to use because the broadcast vendor can spread the cost over more users.

13. What is Signature?

A line or two of information found in the closing of an email usually followed the
sender’s name. Signatures can include advertising information, such as a company name,
product, brand message or marketing call to action
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0
Unit – 3Answer Page 2 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

14. Define SMTP.

Simple Mail Transfer Protocol, the most common protocol for sending email
messages between email servers.

15. What is a Virus?

A program or computer code that affects or interferes with a computer’s operating


system and gets spread to other computers through email messages, downloads, infected
CDs or network messages

16. Define Worm.

A piece of malicious code delivered via an executable attachment in email or over


a computer network and which spreads to other computers by automatically sending itself
to every email address on a recipient’s contact list or address book.

17. What is Reverse DNS?

It is a process in which an IP address is matched correctly to a domain name,


instead of a domain name being matched to an IP address. Reverse DNS is a popular
method for catching spammers who use invalid IP addresses.

18. Define POP.

Post Office Protocol, which an email client uses to send to or receive messages
from an email server.

19. Define IP address.

A unique number assigned to each device connected to the Internet. An IP address


can be dynamic, meaning it changes each time an email message is deployed, or it can be
static meaning it does not change.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0


Unit – 3Answer Page 3 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

20. What is meant by Phishing?

Technique for acquiring information such as user names, passwords, credit cards,
social security numbers and other personal data by masquerading as a trusted business
like a bank or credit card company.

21. What is WHOIS Record?

A record of domain registration whereby we can discover when and by whom a


domain was registered along with contact information and expiry dates.

PART – B QUESTIONS

1. What are the features of Instant Messenger?

 Instant messages - Send notes back and forth with a friend who is online

 Chat - Create a chat room with friends or co-workers

 Web links - Share links to your favorite Web sites

 Video - Send and view videos, and chat face to face with friends

 Images - Look at an image stored on your friend's computer

 Sounds - Play sounds for your friends

 Files - Share files by sending them directly to your friends

 Talk - Use the Internet instead of a phone to actually talk with friends

 Streaming content - Real-time or near-real-time stock quotes and news

 Mobile capabilities - Send instant messages from your cell phone

2. What are the advantages of email?

 Emails are delivered extremely fast when compared to traditional post.

 Emails can be sent 24 hours a day, 365 days a year.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0


Unit – 3Answer Page 4 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Webmail means emails can be sent and received from any computer,
anywhere in the world, that has an Internet connection.

 Cheap - when using broadband, each email sent is effectively free.

 Emails can be sent to one person or several people.

3. How does E-mail work?

 Email is based around the use of electronic mailboxes.

 When an email is sent, the message is routed from server to server, all the way
to the recipient's email server.

 On the Internet, MTAs communicate with one another using the


protocol SMTP are called SMTP servers

 The recipient's MTA then delivers the email to the incoming mail server
(called Mail Delivery Agent), which stores the email as it waits for the user to
accept it.

 There are two main protocols used for retrieving email on an MDA:

o POP3 (Post Office Protocol) - is used for retrieving email andleaving


a copy of it on the server.

o IMAP (Internet Message Access Protocol) - is used for coordinating


the status of emails (read, deleted, moved) across multiple email
clients.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0


Unit – 3Answer Page 5 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

4. What are the disadvantages of email?

 The recipient needs access to the Internet to receive email.

 Viruses are easily spread via email attachments (most email providers scan
emails for viruses on your behalf).

 Phishing - sending an email to a user falsely claiming to be a legitimate


company to scam the user into providing information, such as personal
information and bank account numbers on a bogus website.

 The details will then be used for identity theft.

 No guarantee the mail will be read until the user logs on and checks their
email.

 Spam - unsolicited email, i.e. junk mail.

5. Write short notes on E-mail spam.

 Spam is flooding the Internet with many copies of the same message
 Most spam is commercial advertising, often for dubious products, get-rich-
quick schemes, or quasi-legal services.
 Spam costs the sender very little to send.

Types of Spam:

There are two main types of spam, and they have different effects on Internet users.

 Cancellable Usenet spam - is a single message sent to 20 or more Usenet


newsgroups.

 Usenet spam - is aimed at "lurkers", people who read newsgroups but rarely
or never post and give their address away.

Functions:

 Email spam targets individual users with direct mail messages.

 Email spam lists are created by scanning Usenet postings, stealing Internet
mailing lists, or searching the Web for addresses.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0


Unit – 3Answer Page 6 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 One particularly nasty variant of email spam is sending spam to mailing lists.

 Spammers will use automated tools to subscribe to as many mailing lists as


possible

6. What are the classifications of newsgroup?

 comp.* - Any computer related newsgroup or discussion should be located in


the comp.* hierarchy.

 news.* - Any general Usenet news or discussions would be in news.*.

 sci.* - There are numerous discussion newsgroups about scientific topics, all
of which would fall into the sci.* hierarchy.

 rec.* - newsgroups are for discussions of recreational topics such as games


and hobbies.

 soc.* - These are the newsgroups devoted to talking about social issues.
People also come to the soc.* groups for socializing with each other.

 talk.*- newsgroups are typically devoted to heated discussion over


contentious social issues.

 humanities.* - Newsgroups containing discussion about the arts, literature,


etc.

 misc.* - The newsgroups are typically those that don't make sense in any of
the other Big 8 hierarchies.

7. What are the operations performed on E-mail?

 New, Compose, Write: Write a new message

 Erase, Delete, Remove: Erase a message

 Store, Save, Backup, Drafts: Copy a message into a safer place

 Print: Print a message

 Reply: Send a reply message to the sender

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0


Unit – 3Answer Page 7 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Replay all:The Reply All button makes it possible to send a reply to the
sender as well as everyone else who had been put as a recipient or on copy.

 Forward: Forwards the message to someone else, letting them know that the
message comes from you. The subject is generally preceded by Fwd: to
indicate that it is a forwarded message.

 Redirect, Transmit: Forward a message to someone, letting them know


where it originally came from. The subject is generally preceded by Fwd: to
indicate that it is a forwarded message.

8. Write about the structure of E-Mail.

An email has three basic parts:

 The header, a set of lines containing information about the message's


transportation, such as the sender's address, the recipient's address.

 The message proper, made up of the two following elements:

o the header fields, a set of lines describing the message's settings, such
as the sender, the recipient, the date, etc.

Each one has the following form:

 An email includes at least the three following headers:

o From: The sender's email address

o To: The recipient's email address

o Date: The date when the email was sent

 It may contain the following optional fields:

o Received: information about the intermediary servers and the date


when the message was processed.

o Reply-To: A reply address.

o Subject: The message's subject

o Message-ID: A unique identification for the message.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0


Unit – 3Answer Page 8 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

PART – C QUESTIONS

1. Explain the different types of browsers.

A web browser is an interface that helps a computer user gain access to all the
content that is on the Internet and the hard disk of the computer. It can view images, text
documents, audio and video files, games, etc.

Internet Explorer

 Internet Explorer (IE) is a product from software giant Microsoft.

 This is the most commonly used browser in the universe.

 This was introduced in 1995 along with Windows 95 launch and it has passed
Netscape popularity in 1998.

Google Chrome

 Developed by Google and its beta version was first released on September 2,
2008 for Microsoft Windows.

 Today, chrome is known to be one of the most popular web browsers with its
global share of more than 50%.

Mozilla Firefox

Firefox is a new browser derived from Mozilla. It was released in 2004 and has
grown to be the second most popular browser on the Internet.

Safari

 Safari is a web browser developed by Apple Inc. and included in Mac OS X.


 It was first released as a public beta in January 2003.
 Safari has very good support for latest technologies like XHTML, CSS2 etc.

Opera
 Opera is smaller and faster than most other browsers.
 Fast, user-friendly, with keyboard interface, multiple windows, zoom
functions, and more.
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0
Unit – 3Answer Page 9 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Java and non Java-enabled versions available.

2. Explain the characteristics of Mailing lists.

Configurable Rules:

 Most mailing list rules are configured in the List Type through a combination
of options available in the argument string.

 These are extended by list-level options that control Web availability, Web
archives and Subscriber Lists.

 Troubleshooting a mailing list based on a List Type with a custom ezmlmrc


file.

Multiple Mailboxes

 The messages can be filtered into different mailboxes and stored or processed
rather than simply forwarded.

 The message is also sent to a digest mailbox where it is eventually processed


into a digest and sent to addresses on the Digest Subscriber List.

Multiple Subscriber Lists

 A mailing list can have several different kinds of Subscriber Lists.

 It apply different rules when it receives an email message depending

Incoming Message Processing

 The primary task is to receive email messages and forward them to


subscribers.

 The main mailing list mailbox is the one that receives messages submitted for
posting.

 Posting rules and other configuration settings determine how the message is
then routed.

Forwarding and Generation of Outgoing Messages

 A mailing list send messages in response to email commands, send


moderation messages.
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0
Unit – 3Answer Page 10 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 These messages are described Bounces and Automated Bounce Handling and
Mailing List Moderation.

3. Explain about various E-Mail services.

 Email services offer many features and functionality for managing e-mail.

 Some of the more popular online email services are Yahoo! Mail, Gmail,
Hotmail and AOL Mail.

Email Providers:

 There are several companies, which offer email service, absolutely free.

 All we have to do is register, choose an email ID, and give a password.

 We can access these mailboxes from anywhere, provided we have an Internet


connection.

Example:

Microsoft Hotmail, Mail City, Yahoo! Mail

Mail Forwarding Services:

 This service is basically a message forwarding facility.

 We can choose an email address and specify the address to which the
messages are to be forwarded.

 So, whenever our email ID changes, we can go to the site of the service
provider and change the forwarding addresses.

Service Providers:

a) Poboxes
b) Pobox
c) iName

E-mail Remainder Services:


 Using this service, we have to just give our email ID and when we want a
reminder email sent.

 We will be reminded automatically. This service is a free service.


RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0
Unit – 3Answer Page 11 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

Reminder services:

a) Netminder

b) Conklyn’s Florist Reminder Service

4. Explain about sending mail.

Step 1: Log in to your Gmail account so that you are on the dashboard (main page) of
your mail account.

Step 2: Click Compose button

Step 3: A new blank email window will open up.

Step 4:Enter the recipient address to send mail.

Step 5: The subject field allows us to give the recipient an idea of the topic of our email.

Step 6: Email text can be formatted in a similar way to text in a word document.

Step 7: Type your message in the main body field of our email.

Step 8: If you want to attach some files to the composing mail, click the attachment.

Step 9: In that dialog box, choose the path of a file to be attached.

Step 10: Finally, click the Send button at the bottom of the compose window.

-------------

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-3ANS/VER 2.0


Unit – 3Answer Page 12 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

UNCA45 – INTERNET AND ITS APPLICATIONS


Unit-4 – HTML
Type: 100% Theory
Question Bankwith Answers
PART – A QUESTIONS

1. Define HTML.

Hypertext Markup Language, a standardized system for tagging text files to achieve
font, color, graphic, and hyperlink effects on World Wide Web pages.

2. State the functions of HTML editor.

 Code completion
 HTML entities library
 Site Explorer
 Built in FTP client
 Search and Replace

3. What is Tag?

HTML tags are the hidden keywords within a web page that define how the browser
must format and display the content. Most tags must have two parts, an opening and a closing
part.

4. What are the two sections of HTML document structure?

 Head - contains information that is useful to the Web browser and search engines.
 Body - contains the information that you want the visitor to see.

5. What are the various attributes of <BODY> tag?


 alink,vlink&link

 background, bgcolor&text

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 1 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

6. Write syntax for HTML.

<HTML>
<HEAD>
<TITLE> Document Title Goes Here </TITLE>
</HEAD>
<BODY>
Document content and markup go here....
</BODY>
</HTML>

7. Define List and write its types.

Lists are block formatting elements that define a block structure. List can be classified
into three types as follows

 Ordered list (OL)


 Unordered list (UL)
 Definition list (DL)
 <MENU> and <DIR>are rarely used list.

8. Define frame.

A frame is an independent scrolling region, or window of a Webpage. Every Web


page can be divided into many individual frames. Each frame in a window may be separated
from the others with a border.

9. Define DTD.

A document type definition (DTD) is a set of markup declarations that define a


document type for an SGML-family markup language (SGML, XML, HTML). It defines the
legal building blocks of a document.

10. What is DHTML?

Dynamic HTMLor DHTML, is an umbrella term for a collection of technologies used


together to create interactive and animated web sites by using a combination of a static

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 2 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

markup language, a client-side scripting language, a presentation definition language, and the
Document Object Model.

11. Define XML.

Extensible Markup Language (XML) is used to describe data. The XML standard is a
flexible way to create information formats and electronically share structured data via the
public Internet, as well as via corporate networks.

12. Define table?

A table places information inside the cells formed by dividing a rectangle into rows
and columns.HTML represents a basic table using four elements.

 <table>…</table>
 <th>…..</th>
 <tr>…..</tr>
 <td>…..</td>

13. Define hypertext.

Hypertext is text displayed on a computer display with references (hyperlinks) to


other text which the reader can immediately access, progressively at multiple levels of detail
(also called Stretch Text)

14. Define Hyperlink.

It is an electronic link that providing direct access from one distinctively marked
place in a hypertext or hypermedia document to another in the same or a different document.

15. Define SGML.

SGML (Standard Generalized Markup Language) is a standard for how to specify a


document markup language or tag set. SGML is not in itself a document language, but a
description of how to specify one.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 3 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

16. Define Form.

An HTML form is a section of a document which contains controls such as text


fields, password fields, checkboxes, radio buttons, submit button, menus etc.

An HTML form facilitates the user to enter data that is to be sent to the server for
processing.

17. What is the difference between HTML elements and tags?

HTML elements communicate to the browser to render text. When the elements are
surrounded by brackets <>, they form HTML tags. Most of the time, tags come in pair and
surround content.

18. What is semantic HTML?

Semantic HTML is a coding style. It is the use of HTML markup to reinforce the
semantics or meaning of the content. For example: In semantic HTML <b></b> tag is not
used for bold statement as well as <i></i> tag is used for italic. Instead of these we use
<strong></strong> and <em></em> tags.

19. What is image map?

Image map facilitates to link many different web pages using a single image. Itdefines
shapes in images that you want to make part of an image mapping.

20. What is the use of iframe tag?

An iframe is used to display a web page within a web page.

Syntax:

<iframe src="URL"></iframe>

Example:

<iframe src="demo_iframe.html" width="200px" height="200px"></iframe>

21. What is the use of span tag?

 For adding color on text


 For adding background on text
 Highlight any color text etc.
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0
Unit – 4Answer Page 4 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

22. What is canvas in HTML5?

The HTML canvas element provides HTML a bitmapped surface to work with. It is used
to draw graphics on the web page.

The <canvas> element allows for dynamic and scriptable rendering of 2D shapes and
bitmap images.

PART – B QUESTIONS

1. How to enhance web page with character formatting?

HTML tags are used to format the appearance of the text on the web page are as
follows,

 <I> … </I> Italics

 <B> … </B> Bold

 <TT> … </TT> Typewriter (monospaced)

 <U> … </U> Underline

 <STRIKE> … </STRIKE> Strikethrough

 <S> … </S> Alternative element form of strikethrough

 <SUB> … </SUB> Subscript

 <SUP> … </SUP> Superscript

 <BIG> … </BIG> Bigger font (one font size bigger)

 <SMALL> … </SMALL> Smaller font (one font size smaller)

2. What are three alignment values? Explain.

It is possible to align block elements (tables, images, objects, paragraphs, etc.) on the
canvas with the align attribute.

Attribute may be set for many HTML elements, its range of possible values
sometimes differs from element to element.
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0
Unit – 4Answer Page 5 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

Attribute definitions

align = left|center|right|justify

This attribute specifies the horizontal alignment of its element with respect to the
surrounding context.

Possible values:

 left: text lines are rendered flush left.

 center: text lines are centered.

 right: text lines are rendered flush right.

 justify: text lines are justified to both margins.

Example:

<H1 align="center"> How to Carve Wood </H1>

3. Write a basic structure of HTML document.

An HTML document has two* main parts:

 Head: The head element contains title and meta data of a web document.

 Body: The body element contains the information that you want to display on a
web page.

To make your web pages compatible with HTML, we need to add DTD before the
HTML element.

The following illustration provides a summary.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 6 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

4. How will you add an image into your HTML document?

To add an image to a HTML document, <IMG> tag is used. The <IMG> element has
no ending tag.

IMG Attributes

 SRC - The path and filename of the image which specifies its location.
 ALT - This is a message displayed if the image could not be found.
 ALIGN- Sets the image alignment.
 VSPACE - The space between the image and the text above and below it in
pixels.
 HSPACE- The space between the image and the text to the left and right of it in
pixels.
 BORDER - Sets a border of the specified width in pixels to be drawn around the
image.
 HEIGHT - The height of the image. If this is not specified, the image will be the
size as determined by the file.
 WIDTH - The width of the image. If this is not specified, the image will be the
size as determined by the file.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 7 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

Example:
<div style="text-align: center"
<ahref="Picture1.gif">
<imgsrc="Picture.gif" ALT="Picture1" height="20%" width="40%">
</a>
div>

5. Discuss about <Div> in html.

 The HTML <div> tag is used to group the large section of HTML elements
together.

 <div> tag is a container unit which is used to encapsulate other page elements and
divides the HTML documents into sections.

 The div tag is generally used by web developers to group HTML elements
together.

Difference between HTML div tag and span tag

div tag span tag


HTML div is a block element. HTML span is an inline element
HTML div element is used to wrap large HTML span element is used to wrap small
sections of elements. portion of texts, imageetc.

Eg:

<div style="border:1px solid pink;padding:20px;font-size:20px">

<p>Welcome to Internet and its applications.</p>

<p>This is second paragraph</p>

</div>

Output:

Welcome to Javatpoint.com, Here you get tutorials on latest technologies.

This is second paragraph.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 8 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

6. Write short note on DTD.

 The<!DOCTYPE html> declaration is not an HTML tag.


 It is used to instruct the web browser about the HTML page.
 There are many type of HTML,
o HTML 4.01 Strict
o HTML 4.01 Transitional
o HTML 4.01 Frameset
o XHTML 1.0 Strict
o XHTML 1.0 Transitional
o XHTML 1.0 Frameset
o XHTML 1.1

 The <!DOCTYPE> declaration refers Document Type Declaration (DTD) in HTML


4.01; because HTML 4.01 was based on SGML. But HTML 5 is not SGML based
language.
 DTD defines the rules for the markup languages so that the browsers recognize the
content correctly.
 The doctype declaration differs between HTML versions.

Eg:
<!DOCTYPE html>
<html>
<head>
<title>This is the title</title>
</head>
<body>
This is the content of the document.
</body>
</html>

7. Explain about creating tables in HTML with an example.

 A table places information inside the cells formed by dividing a rectangle into
rows and columns.

 Most cells contain data. Some cells, usually on the table contain headings.

 HTML represents a basic table using four elements.


RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0
Unit – 4Answer Page 9 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Table should starts and end with <TABLE>…</TABLE>tags.

 Containsoneormorerows, <TR>…</TR>.

 Each row contains cells holding a hearing, <TH> … </TH>, or data, <TD> …
</TD>.

Example:

<HTML>
<HEAD>
<TITLE>Simple Table Example</TITLE>
</HEAD>
<BODY>
<TABLE BORDER="1">
<CAPTION>Basic Fruit Comparison Chart</CAPTION>
<TR>
<TH>Fruit</TH>
<TH>Color</TH>
</TR>
<TR>
<TD>Apple</TD>
<TD>Red</TD>
</TR>
<TR>
<TD>Avocado</TD>
<TD>Green</TD>
</TR>
<TR>
<TD>Banana</TD>
<TD>Yellow</TD>
</TR>
</TABLE>
</BODY>
</HTML>

Output:

Fruit Color
Apple Red
Avacoda Green
Banana Yellow

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 10 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

8. Discuss about HTML anchor tag.

 The HTML anchor tag defines a hyperlink that links one page to another page.

 The "href" attribute is the most important attribute of the HTML a tag.

 The href attribute is used to define the address of the file to be linked.

Syntax:

<a href = "..........."> Link Text </a>

Eg:

<a href="second.html">Click for Second Page</a>

Appearance of HTML anchors tag:

 An unvisited link is displayed underlined and blue.

 A visited link displayed underlined and purple.

 An active link is underlined and red.

PART – C QUESTIONS

1. How to create a variety of lists in HTML? Explain.

Lists are block formatting elements that define a block structure. HTML has three
basic forms of lists:
 Ordered lists (<OL>)
 Unordered lists (<UL>)
 Definition lists (<DL>).

Two other rarely used list elements, <MENU> and <DIR>, are sparsely supported
and are usually treated as an unordered list.

Ordered lists (<OL>)


 An ordered list, as enclosed by <OL> and </OL>, defines a list in which order
matters.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 11 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Ordering is typically rendered by a numbering scheme, using Arabic numbers,


letters, or Roman numerals.
 List items in ordered and other lists are defined by using the list item element,
<LI>….</LI>. Numbering starts from 1.

Un-Ordered lists (<UL>)


 An unordered list, signified by <UL> and </UL>, is used for lists of items in
which the ordering is not specific.
 A browser typically adds a bullet of some sort (a filled circle, a square, or an
empty circle) for each item and indents the list.

Definition list(<DL>)
 A definition list is a list of terms paired with associated definitions in other words,
a glossary.
 Definition lists are enclosed within <DL> and </DL> tags.
 Each term being defined is indicated by a <DT>…</DT> element, which is
derived from definition term.

Example:
<HTML>
<HEAD>
<TITLE>List Example</TITLE>
</HEAD>
<BODY>
<P>Ordered List</P>
<UL START=”1” TYPE="a">
<LI>OSS</LI>
. <LI>MM</LI>
</UL>

<P>Un-Ordered List.</P>
<UL TYPE="disc">
<LI>OSS</LI>
. <LI>MM</LI>
<UL>

<P>Defintion List.</P>
<DL>
<DT>Coffee</DT>
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0
Unit – 4Answer Page 12 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

<DD>Black Hot Drink</DD>


<DT>Milk</DT>
<DD>White Cold Drink</DD>
</DL>
</BODY>
</HTML>

2. Explain in detail about frames.

 A frame is an independent scrolling region, or window of a Webpage.


 Every Web page may be divided into many individual frames, which can even be
nested within other frames.
 Each frame in a window may be separated from the others with a border.
 To specify the framing document, we need to create a file that uses the
<FRAMESET> element instead of the <BODY> element.
 The <FRAMESET> element defines the set of frames that makes up the
document.
 The major attributes for this element are the ROWS or COLS attributes.
 In this case, two columns take up set percentages of the total screen, so the code
reads <FRAMESET COLS="20%, 80%">.

Frame attributes:

Attribute Description

src This attribute is used to give the file name that should be loaded in the
frame.

name This attribute allows you to give a name to a frame.

frameborder This attribute specifies whether or not the borders of that frame are shown

marginwidth This attribute allows you to specify the width of the space between the left

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 13 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

and right of the frame's borders and the frame's content.

marginheight This attribute allows you to specify the height of the space between the top
and bottom of the frame's borders and its contents.

noresize The noresize attribute prevents a user from being able to resize the frame.
For example noresize="noresize".

scrolling This attribute controls the appearance of the scrollbars that appear on the
frame.

longdesc This attribute allows you to provide a link to another page containing a long
description of the contents of the frame.

Example:

<HTML>
<HEAD>
<TITLE>Simple Frame Example</TITLE></HEAD>

<FRAMESET COLS="120,*">

<FRAME SRC="menupage.htm" NAME="MENU">

<FRAMESET ROWS="*,50">

<FRAME SRC="welcomepage.htm" NAME="MAIN">

<FRAME SRC="bottombanner.htm" NAME="BOTTOM">

</FRAMESET>

</frameset></HTML>

3. Explain about forms in HTML.

 HTML forms are popular for collecting information from the user, so online forms
are used for user's input.
 By using HTML, we can only create a form.
 To collect the information from a form, we will need to use a web programming
language.
 To create a form use the <form>….</form> tags.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 14 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

To collect information from a user, we need to:

 use HTML code to create the form with the information you are requesting the user to
provide

 use a web programming language (such as ASP, PHP, Perl, etc.) to process that form

Form Elements:

Appearance in
Field type HTML tag to use Description
browser
Input (text) <input type="text"> Single line text box for users to
box enter single line of data
Password <input type="password"> Single line text box that hides the *****
box text being typed.
Radio <input type="radio"> Allows the user to select a single
Checked
Button option from a predefined list
Unchecked

Check Box <input type="checkbox"> Allow the user to select zero, one
Checked
or more options
Unchecked

Selection <select> Drop-down list box - displaying a


list <option>Option 1</option> long list of options HTML
<option>Option 2</option>
</select>
Text area <textarea rows="5" A (scrollable) text box used for
cols="15"></textarea> extended entries that might include
several lines of text

Submit <input type="submit"> A submit button submits (sends) Submit Form


button the form to the web server for
processing.
Reset <input type="reset"> Clears the data user has entered Reset Form
button into the form.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 15 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

4. Explain the Various HTML Tags.

NAME DESCRIPTION
A anchor
ABBR abbreviated form (e.g., WWW, HTTP, etc.)
APPLET Java applet
AREA client-side image map area
B bold text style
BASE document base URI
BGSOUND background sound
BIG enlarge text style
BLINK blinking text
BLOCKQUOTE long quotation
BODY document body
BR forced line break
BUTTON push button
CENTER shorthand for DIV align=center
EM emphasis
EMBED embeds external object in HTML
FIELDSET form control group
FONT local change to font
FORM interactive form
FRAME subwindow
FRAMESET window subdivision
H1…H6 heading
I italic text style
IMG Embedded image
INPUT form control/field
LABEL form field label text
LEGEND fieldset legend
LI list item
LINK a media-independent link
MAP client-side image map
MARQUEE scrolling text field
OPTION selectable choice
P paragraph
PARAM named property value
PLAINTEXT text format
PRE preformatted text
SPAN generic language/style container

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 16 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

STRIKE strike-through text


STRONG strong emphasis
STYLE style info
SUB subscript
SUP superscript
TEXTAREA multi-line text field
TITLE document title

-------------

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-4ANS/VER 2.0


Unit – 4Answer Page 17 of 17
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

UNCA45 – INTERNET AND ITS APPLICATIONS


Unit-5 – E-Commerce
Type: 100% Theory
Question Bankwith Answers
PART – A QUESTIONS

1. What is E-Marketing?

E-marketing refers to the use of the Internet and digital media capabilities to help
sell your products or services. These digital technologies are a valuable addition to
traditional marketing approaches regardless of the size and type of your business

2. List any two banner-hosting services.

Valueclick.com and Doubleclick.com are examples of companies that offer


banner-hosting services

3. What are the different modes of online payments?

Credit-card payments, digital cash and e-wallets, smart cards, micropayments and
electronic bill presentment and payment are methods for conducting online transactions.

4. Define E-Wallet.

E-wallets keep track of billing and shipping information so that it can be entered
with one click at participating merchants’ sites. E-wallets also store e-checks, e-cash and
credit-card information for multiple cards.

5. What are micropayments?

Micropayment enables ways for nominally priced products and services (such as
music, pictures, texts or videos) to be sold profitably over the Web.

6. What is a smart card?

Smart cards are able to hold more information than can ordinary credit cards with
magnetic strips. Smart cards enable the convenient storage of information regarding such
topics as health-care, personal identification, retail and banking.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0


Unit – 5Answer Page 1 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

7. What is meant by brand?

A brand is typically defined as a name, logo or symbol that identifies a company’s


products or services. Brands should be unique, recognizable and easy to remember.

8. Define Brand Equity.

Brand equity includes the value of tangible and intangible items, such as a brand’s
monetary value over time, customer perceptions and customer loyalty to a company, its
products or services.

9. What are Promotions?

Promotions can both attract visitors to a site and influence purchasing. Promotions
can also be used to increase brand loyalty through reward programs.

10. What are the possible methods of consumer tracking?

Log Files, ID Cards and Cookies are the different methods of consumer tracking.

11. Define Log Files.

A file contains data generated by site visits, including each visitor’s location, IP
address, time of visit and frequency of visits is called Log file.

12. Define Cookies.

Cookies, a type of tracking device, are text files stored by Websites on


individuals’ personal computers. Cookies allow a site to track the actions of a visitor.

13. What is meant by Electronic Advertising?

E-business advertising is conducted through such media as television, movies,


newspapers and magazines, as well as online and wireless channels. Advertising gives e-
businesses the opportunity to establish and strengthen branding.

14. Define term CRM.

Customer relationship management (CRM) focuses on the provision and


maintenance of quality service for customers. Effective CRM involves communicating
with customers and delivering products, services, information and solutions in response
to customers’ problems, wants and needs.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0


Unit – 5Answer Page 2 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

15. What is Digital Cash?

It is stored electronically and can be used to make online electronic payments.


Digital-cash accounts are similar to traditional bank accounts; consumers deposit money
into digital-cash accounts for use in digital transactions.

16. What are search engines?

A search engine is a program that scans Web sites for desired content, listing
relevant sites on the basis of keywords or other search-engine ranking criteria.

17. What is search engine ranking?

The method used by a search engine to rank a Web site will determine how
“high” a site appears on lists of search results. Businesses can customize and register
their sites to improve the sites’ positions in search-engine results.

18. Define the term “spider” in search engine.

The spider reads the meta tags, determines the relevance of the Web page’s
information and keywords and then ranks the site according to that visit’s findings.

19. What is an affiliate program? Give example

An affiliate program is a form of partnership in which a company pays affiliates


on the basis of pre-specified actions by visitors who click-through from an affiliate site to
a merchant site.

20. What are Public Relations?

Public relations (PR) provide customers and employees with the latest
information about products, services and such issues as company promotions and
consumer reactions.

21. What are Press Releases?

Press releases, which announce current events and other significant news to the
press, can be delivered over the Web.

22. What are the major aspects of CRM?

 Call handling
 Sales tracking
 Transaction support
RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0
Unit – 5Answer Page 3 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

23. Define the term iCRM.

The term iCRM (Internet customer relationship management) can be used


interchangeably with eCRM in reference to e-business customer relationship
management. Business analysts should review all CRM plan details and data, such as
reductions in costs or an influx of customer complaints, to refine the CRM system

PART – B QUESTIONS

1. Write short notes on Electronic Advertising.

 E-business advertising is conducted through media as television, movies,


newspapers and magazines, online and wireless channels.

 Advertising gives e-businesses the opportunity to establish and strengthen


branding.

 The publication of URLs on all direct mailings, business cards, billboards, print,
wireless advertisements.

 Other media also can increase brand awareness, bringing more visitors to a site.

 The Internet is quickly becoming an important medium through which to market


companies, products and services.

 Online advertising can include the placement of links and banners on other
company’s websites.

 Banner advertisements are similar to billboards seen along the highway, but
banners offer the additional feature of interactivity.

 Valueclick.com and Doubleclick.com are examples of companies that offer


banner-hosting services.

 Some companies base advertisement charges on the number of times a banner ad


is viewed on a page.

2. Explain briefly about Public Relations.

 Public relations (PR) provide customers and employees with the latest
information.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0


Unit – 5Answer Page 4 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 A vital aspect of public relations is communication with customers and employees


through media.

 Press releases, which announce current events and other significant news to the
press, can be delivered over the Web.

 Crisis management, an aspect of PR, is conducted in response to problems a


company is experiencing.

 When a company is doing poorly, its public-relations department will often issue
information regarding the causes.

 Announcing what steps will be implemented to remedy the problem.

3. Write short notes on Credit-Card Payment.

 Credit cards are a popular form of online payment.

 Many people resist online credit-card transactions because of security concerns.

 Customers fear credit-card fraud by merchants and third parties.

 Internet® MasterCard® and American Express, have features that enable secure
online and offline payments.

 To accept credit-card payments, a merchant must have a merchant account with a


bank.

 Traditional merchant accounts accept only point-of-sale (POS) transactions.

 The growth of e-commerce has resulted in the establishment of specialized


Internet merchant accounts that handle online credit-card transactions.

 These consist of card-not-present (CNP) transactions.

4. Write short notes on Digital Cash and E-Wallets.

Digital Cash

 Digital cash is one example of digital currency.

 It is stored electronically and can be used to make online electronic payments.

 Digital-cash accounts are similar to traditional bank accounts;

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0


Unit – 5Answer Page 5 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Consumers deposit money into digital-cash accounts for use in digital


transactions.

E-Wallets

 To facilitate the credit-card order process, many companies are introducing


electronic wallet services.

 E-wallets keep track of billing and shipping

 E-wallets also store e-checks, e-cash and credit-card information for multiple
cards.

5. Write short notes on Micropayments.

 Merchants are required to pay a fee for each credit-card transaction.

 They process, which becomes costly when customers purchase inexpensive items.

 Micropayment enables ways for nominally priced products and services to be sold
profitably over the Web.

 For instance, a phone bill is essentially an aggregation of micropayments that are


charged

 Periodically at set intervals to justify the transaction fee.

 To offer micropayment processing, some companies have formed strategic


partnerships with telephone carriers and utility companies.

6. What is marketing research? Explain its services.

 Marketing research can help a company develop its marketing mix.

 It includes product or service details and development, effective pricing,


promotion and distribution.

 Traditionally, marketing research has consisted of focus groups, interviews, paper


and telephone surveys, questionnaires and secondary research.

 Research can now be performed over the Internet, giving marketers a new, faster
channel

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0


Unit – 5Answer Page 6 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 The Internet also provides a relaxed and anonymous setting to hold focus-group
discussions and distribute questionnaires.

 To target marketing campaigns effectively, it is useful to learn about the


demographics of Internet, World Wide Web and wireless device users.

 Demographics are statistics on the human population, including age, sex, marital
status and income.

 Knowledge of customers’ personal information can help to reveal their purchase


preferences and buying power.

7. Explain briefly about email marketing.

 E-mail marketing campaigns provide an inexpensive and effective method of


targeting potential customers.

 It includes geographic locations and demographic profiles.

 The marketer should also determine the level of personalization of the campaign.

 Internet mailing lists can help marketers target customers through personalized e-
mail.

 Opt-in e-mail is sent to people who explicitly choose to receive offers,


information and promotions.

 It is important to avoid flooding opt-in customers with promotional e-mail.

 Excessive correspondence can decrease the effectiveness of an e-mail campaign.

 Marketers should avoid sending e-mail to people who have not shown interest in
specific products or services.

8. Explain briefly about smart cards.

 Smart cardcontains embedded computer chips.

 They are able to hold more information than can ordinary credit cards with
magnetic strips.

 Smart cards enable the convenient storage of information regarding various


sources.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0


Unit – 5Answer Page 7 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Smart cards are either contact or contactless.

 To read and update the information on a contact smart card’s computer chip, the
card must be placed in a smart card reader.

 A contactless smart card contains both a coiled antenna and a computer chip,
enabling the card to transmit information

 Smart cards can require users to enter passwords, thus offering a higher level of
security than credit cards.

 Information maintained on smart cards can be designated as “read only” or as “no


access.”

 The cards can also be enhanced with additional security features, such as
encryption and photo identification.

PART – C QUESTIONS

1. Explain in detail about electronic fund transfer.

 Secure electronic funds transfer (EFT) is crucial to e-commerce.

 Credit-card payments, digital cash and e-wallets, smart cards, micropayments and
electronic bill presentment and payment are methods for conducting online
transactions.

 Many companies offer products, software and services that enable monetary
transactions on the Web.

Credit-Card Payment:

 Credit cards are a popular form of online payment.

 Many people resist online credit-card transactions because of security concerns.

 Customers fear credit-card fraud by merchants and third parties.

 Internet® MasterCard® and American Express, have features that enable secure
online and offline payments.

 To accept credit-card payments, a merchant must have a merchant account with a


bank.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0


Unit – 5Answer Page 8 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

Digital Cash

 Digital cash is one example of digital currency.

 It is stored electronically and can be used to make online electronic payments.

 Digital-cash accounts are similar to traditional bank accounts;

 Consumers deposit money into digital-cash accounts for use in digital


transactions.

E-Wallets

 To facilitate the credit-card order process, many companies are introducing


electronic wallet services.

 E-wallets keep track of billing and shipping

 E-wallets also store e-checks, e-cash and credit-card information for multiple
cards.

Smart card

 Smart cardcontains embedded computer chips.

 They are able to hold more information than can ordinary credit cards with
magnetic strips.

 Smart cards enable the convenient storage of information regarding various


sources.

 Smart cards are either contact or contactless.

2. Describe briefly about Customer Relationship Management.

 Customer relationship management (CRM) focuses on the provision and


maintenance of quality service for customers.

 Effective CRM involves communicating with customers and delivering products,


services, information and solutions.

 Customer satisfaction is a key to business success.

 Online businesses should give particular attention to CRM.

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0


Unit – 5Answer Page 9 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 The establishment of personal relationships with customers requires innovative


strategies.

Aspects of CRM:

 The maintenance of outbound and inbound calls from customers and service
representatives.

 The tracking and recording of all sales made.

 Support for technology and personnel involved in business transactions.

Applications of CRM:

 Personalization and customization of customer experiences.

 Interactions with a website, call center or any other forum

 Customer contact with the business.

 Business analysts should review all CRM plan details and data

 Reductions in costs or an influx of customer complaints, to refine the CRM


system.

3. Describe briefly about e-Marketing.

E-marketing refers to the use of the Internet and digital media capabilities to help
sell your products or services. These digital technologies are a valuable addition to
traditional marketing approaches regardless of the size and type of your business

Brand

A brand is typically defined as a name, logo or symbol that identifies a company’s


products or services. Brands should be unique, recognizable and easy to remember.

Brand Equity

Brand equity includes the value of tangible and intangible items, such as a brand’s
monetary value over time, customer perceptions and customer loyalty to a company, its
products or services.

Marketing Research:

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0


Unit – 5Answer Page 10 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

 Marketing research can help a company develop its marketing mix.

 It includes product or service details and development, effective pricing,


promotion and distribution.

 Traditionally, marketing research has consisted of focus groups, interviews, paper


and telephone surveys, questionnaires and secondary research.

 Research can now be performed over the Internet, giving marketers a new, faster
channel

 The Internet also provides a relaxed and anonymous setting to hold focus-group
discussions and distribute questionnaires.

Email Marketing:

 E-mail marketing campaigns provide an inexpensive and effective method of


targeting potential customers.

 It includes geographic locations and demographic profiles.

 The marketer should also determine the level of personalization of the campaign.

 Internet mailing lists can help marketers target customers through personalized e-
mail.

 Opt-in e-mail is sent to people who explicitly choose to receive offers,


information and promotions.

Electronic Advertisements:

E-business advertising is conducted through such media as television, movies,


newspapers and magazines, as well as online and wireless channels. Advertising gives e-
businesses the opportunity to establish and strengthen branding.

 Banner advertisements offer the additional feature of interactivity.

 Valueclick.com and Doubleclick.com are examples of companies that offer


banner-hosting services.

 Some companies base advertisement charges on the number of times a banner ad


is viewed on a page

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0


Unit – 5Answer Page 11 of 12
ACADEMIC YEAR: 2016 – 2017 REGULATION CBCS - 2012

4. What are search engines? Explain in detail about different search engines.

-------------

RAAK/B.COM/MOHANRAJ/II YEAR/IV Sem/UNCA 45/IA/UNIT-5ANS/VER 2.0


Unit – 5Answer Page 12 of 12

You might also like