Sri C Qns

Download as doc, pdf, or txt
Download as doc, pdf, or txt
You are on page 1of 31

IT8201- Information Technology Essentials Department of IT 2018-2019

IT8201 INFORMATION TECHNOLOGY ESSENTIALS LT PC


3003

OBJECTIVES:
 To introduce the concept of Internet, Networks and its working principles.
 To know scripting languages.
 To understand various applications related to Information Technology.

UNIT I WEB ESSENTIALS 9


Creating a Website - Working principle of a Website - Browser fundamentals - Authoring
tools – Types of servers: Application Server - Web Server - Database Server

UNIT II SCRIPTING ESSENTIALS 9


Need for Scripting languages - Types of scripting languages - Client side scripting - Server
side
scripting - PHP - Working principle of PHP - PHP Variables - Constants - Operators – Flow
Control and Looping - Arrays - Strings - Functions - File Handling - PHP and MySQL - PHP
and
HTML - Cookies - Simple PHP scripts

UNIT III NETWORKING ESSENTIALS 9


Fundamental computer network concepts - Types of computer networks - - Network layers -
TCP/IP model - Wireless Local Area Network - Ethernet - WiFi - Network Routing -
Switching – Network components

UNIT IV MOBILE COMMUNICATION ESSENTIALS 9


Cell phone working fundamentals - Cell phone frequencies & channels - Digital cell phone
components - Generations of cellular networks - Cell phone network technologies /
architecture - Voice calls & SMS

UNIT V APPLICATION ESSENTIALS 9


Creation of simple interactive applications - Simple database applications - Multimedia
applications - Design and development of information systems – Personal Information
System – Information retrieval system – Social networking applications

TOTAL: 45 PERIODS
OUTCOMES:
On Completion of the course, the students should be able to:
 Design and deploy web-sites
 Design and deploy simple web-applications
 Create simple database applications
 Develop information system
 Describe the basics of networking and mobile communications
TEXT BOOKS:
1. Robin Nixon, "Learning PHP, MySQL, JavaScript, CSS & HTML5" Third Edition,
O'REILLY, 2014.
2. James F. Kurose, ―Computer Networking: A Top-Down Approach‖, Sixth Edition,
Pearson, 2012.
REFERENCES:
1. Gottapu Sasibhushana Rao, "Mobile Cellular Communication", Pearson, 2012.

1
IT8201- Information Technology Essentials Department of IT 2018-2019

2. R. Kelly Rainer , Casey G. Cegielski , Brad Prince, Introduction to Information Systems,


Fifth Edition, Wiley Publication, 2014.

COURSE OUTCOMES

On successful completion of this course, the student will be able to


Understand the browser fundamentals ,different types of servers and Authoring
C113.1
tools and effectively create web pages
To understand the need of scripting languages and create dynamic web pages using
C113.2
scripting languages.
C113.3 To introduce the concept of Internet, Networks and its working principles
C113.4 To understand the concepts and fundamentals of mobile communication.
To understand the concept of Information Retrieval system and create simple
C113.5
Interactive, database and multimedia applications

MAPPING BETWEEN CO AND PO, PSO WITH CORRELATION LEVEL 1/2/3

POs PSOs
C113.1
PO1 PO2 PO3 PO4 PO5 PO6 PO7 PO8 PO9 PO10 PO11 PO12 PSO1 PSO2 PSO3 PSO4

C113.1 1 2 2 1 2 2 1 2 2 1 1 2 1 2 1 2
C113.2 1 2 2 1 2 2 1 2 2 1 1 2 1 2 1 2
C113.3 1 2 1 1 2 1 1 - 1 - - 2 1 1 - 2
C113.4 1 2 2 1 2 2 1 2 2 2 - 2 1 1 - 2
C113.5 1 2 1 1 1 1 1 2 2 - - 2 1 1 1 2

RELATION BETWEEN COURSE CONTENT WITH COs


UNIT I - WEB ESSENTIALS
S.No Knowledge Topic Course
level Outcomes
Creating Website- Steps for creating web site ,testing C113.1
1. C&U&An
websites
IP addressing, Domain Name Server and Uniform
2. R&An
Resource Locator
Working principle of a Website features and Design
3. R&An
issues.
Browser fundamental-Web Browser Architecture and
4. R&An
working of a web browser.
HTTP Protocol, HTTP request Message structure,
5. R&U
HTTP Response message structure.
Cache Control, HTTP Tunneling, Features of HTTP
6. R&U
Protocol
Different types of Authoring tools and need of
7. R&U
Authoring tools
8. R&U Application Server, Web Server- Apache, IIS

2
IT8201- Information Technology Essentials Department of IT 2018-2019

9. R&U Database Server- Database server Architecture.

UNIT II - SCRIPTING ESSENTIALS

S.No Knowledge Topic Course


level Outcomes
Need for Scripting languages and types of scripting
10. R&U
languages
Client side scripting language and Server side scripting
11. R&An&E
language.
Working principle of PHP , Installation of PHP, and
12. R&U
Characteristics of PHP.
PHP variables , Data types – Integer, Double, String,
13. R&An&E
Boolean and Constants.
Operators in PHP- Arithmetic, Relational and Boolean
14. R&U&E C113.1
operator.
15. U&An&E Flow control and looping statements.
Arrays- Creation ,Accessing, Types of Array, sorting of
16. R&An&E
Arrays
String – String functions, Function- Characteristic of
17. R&An&E
function, definition of a function.
File Handling- Opening and Closing files, reading ,
18. C&U&An
writing and Accessing a file.
19. C&U&An PHP and MySQL- Connecting PHP to MySQL .
20. R&U Introduction to cookies and PHP support for cookies

UNIT III - NETWORKING ESSENTIALS


S.No Knowledge Topic Course
level Outcomes
21. R&U Fundamentals of computer Network concepts, Topology,
22. R&U Types of Computer Network- LAN,WAN and MAN
23. R&U Network Layer, IPv4, TCP/IP Model, Addressing,
Wireless Local Area Network, Hidden and Exposed
24. R&U
Terminal problem, Wireless LAN Protocol
IEEE802.11 MAC Layer, Carrier sense Multiple Access
25. R&U&An C113.1
with Collision Avoidance
Ethernet, Carrier Sense Multiple Access with Collision
26. R&U&An
Detection, WIFI.
27. R&U Network Routing- Static and Dynamic Routing.
28. R&U&An Switching, Packet Switching and Circuit Switching.
Network Components- Repeater, Bridges, Router,
29. R&U&An
Gateway, NIC, HUB, Switch

UNIT IV - MOBILE COMMUNICATION ESSENTIALS


S.No Knowledge Topic Course
level Outcomes

3
IT8201- Information Technology Essentials Department of IT 2018-2019

30. R&U Cell phone working fundamentals


31. R&U Cell phone Frequencies and Channels
32. R&U Digital Cell phone Components.
33. R&U Generations of Cellular Network
GSM Architecture, Base Station Subsystem, Network
34. R&U C113.1
Switching Subsystem, GSM Channel
35. R&U Cell phone Network Technologies/ Architecture
36. R&U Short Message Services
37. R&U Multi-Brand and Multi-Mode Phones
38. R&U&An Difference between CDMA and GSM

UNIT V - APPLICATION ESSENTIALS


S.No Knowledge Topic Course
level Outcomes
Creation of Simple Interactive Applications- Steps for
39. C&U&Ap
creating simple Interactive Applications
Simple Database Application , Data Models, Architecture
40. C&U&Ap
of Database Systems.
41. R&U Different Multimedia Applications
Information System- Characteristics of Information
42. R&U
System
43. R&U Components of Information System and Types C113.1

44. C&U&Ap Design and Development of Information System


Personal Information System, Functionality of Personal
45. C&U&Ap
Information System
Information Retrieval System, Tasks of Information
46. C&U&Ap
Retrieval , Issues in Information Retrieval Process
47. R&U Social Networking Applications and Its types

UNIT I

4
IT8201- Information Technology Essentials Department of IT 2018-2019

WEB ESSENTIALS
(Part-A)

1. List the desirable features that need to be considered while designing a web
site(Apr-14)
 Quality of web content  Web page speed
 Clear user-friendly  Search engine
Navigation optimization
 Simple and professional  Web compatibility
Web design.
2. List any four authoring tools and highlight the importance of each tool.
(May-13)
 Dreamweaver, by Adobe- Dreamweaver also supports W3C
Recommendations and does pretty well with its WYSIWYG features
- far superior to FrontPage.
 EditPlus, by ES-Computing - Syntax highlighting text editor,
HTML editor, programmer's editor. .
 Expression Web Designer, by Microsoft -Expression Web Designer
replaces FrontPage and is a new product by Microsoft.
 HTML-Kit Tools (Formerly HTML-Kit), by Chami -Popular Web
developer tool for HTML and more.
3. What are the Importance of Authoring tools? (May-2018)
 Authoring tools provides space to edit, preview and publish the
websites.
 Easy To Publish, Update, And Translate.
 Web Authoring Tools Keep Your Work Safe.
 Web Authoring Tools Are Always Up To Date.
 Easy to use and time saving.
 The tools are accessible Anytime and Anywhere.
4. What is Web Browser
 A web browser displays a web document and enables users to access
web documents.
 When the user clicks a hyperlink, the browser initiates a message to a
web server.
 This message requests the server to retrieve the requested
information and send it back to the web browser through the
telecommunications network.
5. List any four browsers and state the basic functionality of a browser?
 Internet Explorer
 Google Chrome
 Safari
 Netscape Navigator
Basic functionality of a browser
 Displaying and printing Web contents on the Internet or intranet
 It allows the user to interact with the web pages and dynamic content
like surveys, forms, etc.
 It also allows the user to navigate through the complete web page and
see its source code in the HTML format.
 It provides security to the data and the resources that are available on
the web that is by using the secure methods.

5
IT8201- Information Technology Essentials Department of IT 2018-2019

6. What are the types of Servers?


There are three types of server,
 Web Server
 Application Server
 Database Server
7. What Web Server
 This is a program that waits patiently for the browser to request a
web page.
 The server looks for the requested information, retrieves it and sends
it to the browser or sends an error message if the file is not found.
8. Define Web page, Web site &Web browser?
 A Web page is a document created using HTML.
 A Web site is a collection of related pages. Web pages and sites can
be stored on the hard drive of a local computer or a web server.
 A Web browser is a program that displays the web pages it retrieves.
9. What is HTML (Hyper Text Markup Language)
 It is the universal language understood by all WWW (World Wide
Web) clients.
 An HTML document (program) is ASCII text with embedded
instructions (markups) which affect the way the text is displayed.
 The basic model for HTML execution is to fetch a document by its
name (e.g. URL), interpret the HTML and display the document,
possibly fetching additional HTML documents in the process.
 It can accept user input and/or cause additional HTML documents to
be fetched by URL.
 Providing safety, platform independence, and the ability to interact
with a variety of formats, protocols, tools, and languages makes it a
universal language.

10. List down font characteristics permitted in style sheets.

6
 font-family font-size
 font-weight
 font-style
 font-variant
11. Discuss about comments in HTML.
A comment in HTML, like comments in other computer languages, is
something that is intended to be read by the programmers but to be ignored
by the software processing the document. A comment begins with the string
of characters <!—which must contain no white space. A comment ends with
the string --> again with no white space.
<!-- Single line Comment
Multi line Comments -->
12. What are Style Sheets?
Style sheets are collections of style information that are applied to plain
text. Style information includes font attributes such as type size, special
effects (bold, italic, underline) color and alignment. Style sheets also
provide broader formatting instructions by specifying values for quantities
such as line spacing and left and right margins.
13. List down the ways of including style information in a document.
 External Styles -Style information is read from a separate file that is
specified in the <LINK> tag
 Embedded Styles -Style information is defined in the document head
using the <STYLE> and </STYLE> tags.
 Inline Styles -Style information is placed inside an HTML tag and
applies to all content between that tag and it companion closing tag.
14. What is the role of server?
The server
 Manages application tasks
 Handles storage
 Handles security
 Provides scalability
 Handles accounting and distribution
15. What is HTML?
 HTML is a language for describing web pages.
 HTML stands for Hyper Text Markup Language
 HTML is not a programming language, it is a markup language
 A markup language is a set of markup tags
 HTML uses markup tags to describe web pages
16. How to implement the HTML Links
HTML links are defined with the <a> tag.
<a her="http://www.w3schools.com">This is a link</a>
17. What are the types of list supported by HTML?
There are three types of list supported by HTML.
 Unordered – A bullet list
 Ordered – a number list
 Definition – A list of terms and definitions for each
16. List any four common browsers. (NOV/DEC2011)
 Firefox  Chrome
 Internet Explorer  Safari
17. Mention the need for cascading style sheets. (APRIL/MAY 2011)
Need for CSS:
Allow the information in the document to be presented without change in a
variety of ways
Relatively easy to give all of the elements on a page consistent appearance
Both the document author and the person viewing the document can specify
aspect of the document style as it is displayed by the browser
18. List out some primary CSS text properties.
Some of the primary CSS text properties are:
 TEXT-DECORATION
 LETTER-SPACING
 WORD-SPACING
 TEXT-TRANSFORM
 TEXT-INDENT
 TEXT-ALIGN
 WHITE-SPACE
19. Define HTML Tables
Tables are defined with the <table> tag. A table is divided into rows (with
the <tr> tag), and each row is divided into data cells (with the <td> tag). td
stands for "table data," and holds the content of a data cell. A <td> tag can
contain text, links, images, lists, forms, other tables, etc.
20. Define HTML Tables
Tables are defined with the <table> tag. A table is divided into rows (with
the <tr> tag), and each row is divided into data cells (with the <td> tag). td
stands for "table data," and holds the content of a data cell. A <td> tag can
contain text, links, images, lists, forms, other tables, etc.
21. What is CSS?
Cascading Style Sheets (CSS) is a slightly misleading term, since a website
might have only one CSS file (style sheet), or the CSS might be embedded
within an HTML file. It is better to think of CSS as a technology (in the
singular). CSS is comprised of statements that control the styling of HTML
documents. Simply put, an HTML document should convey content. A CSS
document should control the styling of that content.
22. What are the types of Authoring tools?
 Pure WYSIWYG (What You See Is what You Get:
pronounced"wiz-ee-wig") editor: Eg: NetObjects Fusion and
Drumbeat.
 Pure code-based editor:
Eg: HomeSite, HotDog Professional, HTMLed Pro, WebberActive,
and WebEdit.
 Compound editor (Pure WYSIWG editors + Pure code-based
editors):
Eg: Macromedia Dreamweaver, Microsoft FrontPage, QuickSite, and
Visual Page.
23. Define the GET() and POST() method.
GET():
The GET method means retrieves whatever information (in the form of an
entity) is identified by the Request-URI. If the Request-URI refers to a data-
producing process, it is the produced data which shall be returned as the
entity in the response and not the source text of the process, unless that text
happens to be the output of the process.
POST():
The POST method is used to request that the destination server accept the
entity enclosed in the request as a new subordinate of the resource identified
by the Request-URI in the Request-Line.

24.
Write html W X code to create the following table
Y Z
<TABLE>
<TR>
<TD>W</TD>
<TD>X</TD>
</TR>
<TR>
<TD>Y</TD>
<TD>Z</TD>
</TR>
</TABLE>
25. Mention some text formatting tags.
 <p></p> - is used for introducing various paragraphs.
 <br> - this tag is used for giving an empty blank line.
 HEADING TAGS - <h1></h1> .. <h6></h6> is used to introduce
various headings.
 <h1> is the biggest and h6 is the smallest heading tag.
 <HR> TAG – is used to draw lines and horizontal rules.
 <B>,<I>,<U> for bold, italic and underline respectively.
Part B
1. Discuss the various HTML tags in detail.

2. Write short notes on the following.


i. IMG tag

ii. TABLE tag

iii. FRAME tag

3. What are the necessities of using HTML forms? What is the use of HTML
Forms? Create a HTML Form page for Railway Registration Form.

4. How to create user interactive web pages using Form elements and Form
objects?
Develop a Student registration form using HTML Form elements. (Assume
your ownfields).
5. Explain the attributes of table tag with an example.
6. Consider a table PRODUCT_DETAILS with PID, PNAME, and
UNIT_PRICE. Write a HTML form to accept the PID and
QUANTITY_REQUIRED from the user and display the total amount to be
paid in another text box. Get the unit price for a given PID from a database
table.
7. Using DIV element, write HTML code to design a web site for a online
catering service. The web site should provide some highlighting facilities
provided by them. The web site must provide the available menu and cost-
of each menu item in a tabular form. The web site must also accept the
order form which includes any number of items and quantity required.
Write java script to validate the form and to compute the total amount to be
paid. Draw the layout of your web site first and write HTML code for each
page.
8. Design a Webpage of a search engine using HTML and list out its
requirements.
9. Explain about the built-in authoring tools available.
10. Describe various types of servers with its architecture.
11. (i)Compare and contrast application server and database serve
(ii)Explain the process of client server communication for web Request.
(May -2018)
12. (i)Discuss on any four components that are needed to create a fully dynamic
web page
(ii)Explain the process of developing a web application and hosting on the
web server.(May -2018)

Unit 2
Scripting Essentials
Part-A
1. Define Scripting Language?
A scripting language is a programming language designed for integrating
and communicating with other programming languages. Some of the most
widely used scripting languages are JavaScript, VBScript, PHP, Perl,
Python, Ruby, ASP and Tell. Since a scripting language is normally used in
conjunction with another programming language, they are often found
alongside HTML, Java or C++.
2. What are the need of Scripting Language?
 Scripting languages are easier to learn and faster to code.
 It is useful tool for developing Interactive web pages.
 Scripting languages are interpreted rather than compiled.
 They are used for producing dynamic web content
3. What are the types of Scripting Languages?
Client side Scripting Language: The client side scripting language is used to
create web pages as a request or response server. These pages are displayed
on the web browser.
Eg:HTML, CSS, Java Script, PHP.
Server side Scripting Language: The server side scripting language is used
to create web pages that provides services. The scripts generally run on
servers.
Eg: ASP,JSP,Servlet,PHP.
4. What is PHP?
 PHP stands for PHP: Hypertext Pre-processor
 PHP is a server-side scripting language
 PHP scripts are executed on the server
 PHP supports many databases (MySQL, Informix, Oracle, Sybase,
Solid, PostgreSQL, Generic ODBC, etc.)
 PHP is an open source software
 PHP is free to download and use
5. What are Rules for writing PHP program?
 A PHP script starts with <?php and ends with ?>
 The default file extension for PHP files is ".php"
 A PHP file normally contains HTML tags, and some PHP scripting
code
 PHP statements are terminated by semicolon (;)
 In PHP, all user-defined functions, classes, and keywords (e.g. if,
else, while, echo, etc.) are not case-sensitive
6. How to write comment lines in PHP?
 // Single line comment (C++ and Java-style comment)
 # Single line comment (Shell-style comments)
 /* Multiple line comment (C-style comments) */
7. Explain ECHO and PRINT statements in PHP?
ECHO - It can output one or more strings
PRINT – It can only output one string, and returns always 1
ECHO is faster compared to PRINT as echo does not return any value
ECHO is not a function and, as such, it does not have a return value
If you need to output data through a function, you can use PRINT() instead:
Example:
echo 50; print (50);
8. List out The PHP superglobal variables.
 $GLOBALS  $_FILES
 $_SERVER  $_ENV
 $_REQUEST  $_COOKIE
 $_POST  $_SESSION
 $_GET
9. Define Array in PHP?
An array stores multiple values in one single variable. In PHP, there are
three kinds of arrays:
 Numeric array
 Associative array
 Multidimensional array
10. Give the general syntax for function in PHP?
The syntax of the function
definition is as follows - function
name_of_function(parameter list)
{
statements to be executed in function-name
.....
.....
}

*The function gets executed only after the call to that function. The call to
the function can be from anywhere in the PHP code.
For example –
<?php
function Addition()
{
$a=10;
$b=20;
return $a+$b;
}
print “Result=”.Addition();
?>
*The return statement is used for returning some value from the
function body.
11. Define Associative array?
Associative array is an array where each ID key is associated with a value .
It is a key value pair.
Eg:
$flower_shop=array("rose"=>"5.00","daisy"=>"4.00","orchid"=>"2.00");
12. Explain PHP Forms ?
 Scripts will interact with their clients using one of the two HTTP
methods. The methods are GET and POST
 When a form is submitted using the GET method, its values are
encoded directly in the query string portion of the URL
 When a form is submitted using the POST method, its values will not
be displayed the query string portion of the URL
13. Difference between $_GET and $_POST function?(April-14)

S.N $_GET $_POST


o
1. This method is used to submit the
This method is used to request data
data to be processed to a specific
from a specified resource.
resource.
2. Information sent from a form with
Information sent from a form with
the GET method is visible to
the POST method is invisible to
everyone (it will be displayed in the
others .
browser's URL)
3. The GET request remains in the The POST request never remains
browser History in the browser History
4. Has limits on the amount of
Has no limits on the amount of
information to send (max. 100
information to send
characters)
5. This method should not be used This method can be used when
when sending passwords or other sending passwords or other
sensitive information. sensitive information.
6. Put Request cannot be
Get request can be Bookmarked
bookmarked.

14. Explain Date() function in PHP ?


 The PHP date() function formats a timestamp to a more readable date
format.
 A timestamp is a sequence of characters, denoting the date and/or
time at which a certain event occurred
Some characters that are commonly used for date and time:
 d - Represents the day of the month (01 to 31)
 m - Represents a month (01 to 12)
 Y - Represents a year (in four digits)
 l (lowercase 'L') - Represents the day of the week
eg:
<?php
echo “Today is “ . date(“Y/m/d”) ;?> Output: Today is 2018/01/05
15. Explain Time() function in PHP.
 The PHP date() function formats a timestamp to a more readable time
format.
 A timestamp is a sequence of characters, denoting the date and/or
time at which a certain event occurred
Some characters that are commonly used for date and time:
 h - 12-hour format of an hour with leading zeros (01 to 12)
 i - Minutes with leading zeros (00 to 59)
 s - Seconds with leading zeros (00 to 59)
 a - Lowercase Ante meridiem and Post meridiem (am or pm)
Eg:
<?php
echo "The time is " . time("h:i:sa");
?>
Output: The time is 09:13:22am
16. What will be the output for the following code?
<?php
$num1=1;
$num2=2;
$num3=$num1+$num2;
Print $num3;
?>
Output: 3
17. What are the characteristics of PHP variable?
 A variable starts with $ symbol followed by the name of the variable.
 A variable name must start with a letter or an underscore character.
 A variable name cannot start with a number.
 A variable name can only contain alpha-numeric characters and
underscores(A-Z, 0-9,and _)
 Variable names are case-sensitive.
18. Explain the way in which sessions are handled in PHP?(May-13)
 Session is a way to store information in variables to be used across
multiple pages.
 A session is started with the session_start() function.
 Session variables are set with the PHP global variable: $_SESSION.
19. Explain different string functions in PHP?
1.Strlen(string1)- Returns the no of characters in the string.
2. Strcmp(str1,str2)- It compares the two string.
It is case sensitive.
If it returns 0 the two strings are equal.
If it returns >0 the string1 is greater than string2.
If it returns <0 the string 1 is less than string 2.
3.strtoupper(string1)- Converts the characters in string1 to uppercase.
4.strtolower(string1)- Converts the string to Lowercase.
5.trim(string1)- It eliminates the white spaces from the both the ends of
the string.
19. With an example, show an array can be stored in a session?(April-14)
The PHP code for storing an array in session is as follows –
<?php
//start the session
session_start();
//set session variables
$_SESSION[“name”]=”AAA”;
echo ”Array is set using session”;?>
20. Write a piece of javaScript code to check if the value of two
fields-‘password’ and ‘confirmPassword’ are the same, and display a
message if they are not.(April-14)
<!DOCTYPE html>
<html><head>
<script type=”text/javascript”>
Function Validate()
{var password=document.getElementByid(“pwd”).value;
var confirmPassword=document.getElementByid(“ConfirmPwd”).value;
if(password!=confirmPassword)
{Alert(“password do not match”);
return false;
{return true;}
</script></head><body>
<form>
Password:<input type=”password” id=”pwd”/>
Confirm Password:<input type=”password” id=”Confirmpwd”/>
<input type=”submit” value=”Submit” onclick=”returnvalidate()”/>
<\form><\body><\head>
21. Write a PHP program to find sum of N Natural numbers?
<?php
$n=10
$sum = 0;
for ($i = 1; $i <= $n; $i++)
{ $sum =$sum+$i;}
echo "Sum of first " . $n . " Natural numbers is :” . $sum;
22. What are Cookies?
 Cookies are used to identify the users.
 Cookie is a small file that server embeds in the users machine.
 A cookie consists of a name and a textual value.
 A cookie is created by some software system on the Server.
23. List out the uses of cookies?
 Cookies are used to identify the users.
 In every HTTP communication between browser and server a header
is included.
 The header stores the information about the message.
 The header part of the http contains the cookies.
24. How will you get cookies in PHP?
We can get the values stored in the cookies using the $_COOKIE variable.
Eg:
<?php
If(isset($_COOKIE[“Myname”]))
Echo”Welcome”. $_COOKIE[“Myname”].”!!!!!!”;
else
Echo “Welcome Guest”;
?>
25. Write an Example how an array can be stored in a session?(April-14)
<?php
//start the session
Session_star();
//set the session variables
$_SESSION[“name”]=”AAA”;
Echo “Array is set using Session”;
?>
26. Write the difference between fread() and fgets()?
fgets() fread()
read the contents of the file. read the contents of the file.
fgets() is used to read single line from the fread() is used to read until the end of the
file. file
Eg:
Eg:
<?php
<?php
$file=fopen(“index.txt”,”r”);
$file=fopen(“index.txt”,”r”);
fread($file,filesize(“index.txt”));
Echo fgets($file);//Reads a single line
//Reads the complete file
Fclose($file);?>
Fclose($file);?>

27. What will be the output of the following PHP code?


<?php
$count=1;
do
echo "$count times is 12".count*12."<br>";
while(++$count<==3);
?>
Ans: Output: Line 4 : count is not defined

Part B
1. i. How strings are declared in PHP? Explain string functions.
ii. Explain about various data types in PHP.
2. i.Explain about Arrays in PHP.

ii.List and Explain the functions in PHP.


3. Explain about database connectivity with PHP with suitable examples.
4. i. List the statements that are used to connect PHP with MySQL.

ii. Write a webpage in PHP to explain the usage of for loop?


5. Explain about the control statements in PHP with example.

6. i.Describe PHP session in detail.


ii.Explain about cookies in PHP with example.
7. Write a user defined function 'Calculatelnterest' using PHP to find the
simple interest to be paid for a loan amount. Read the loan amount, the
number of years and the rate of interest from a database table called
LOANDETAILS having three fields AMT, YEARS, and RATE, and
calculate the interest Using the user defined function. (April-2014)

8. Consider an associative array called person_age with name and age of 10


persons. Write a PHP program to calculate the average age of this
associative array.
9. Create a HTML form “result.html” with a text box and a submit button to
accept registration number of the student. Write a “result.php” code to
check the status of the result from the table to display whether the student
has “PASS” or “FAIL” status. Assume that the MYSQL database
“my_db” has the table “result_table” with two columns REG_NO and
STATUS. (May-2013).
10. Write a PHP program to delete a record from result_table. (May-2013)
11. (i) Write a PHP program to declare an array of integers, to sort them in
ascending order and to display the sorted array using for-each.
(ii) Write a PHP program to read a text file line by line and to dixsplay it
on the screen. (May-18)
12. (i)Design a form that offer choices to user to select country name.
Depending on the name selected map iimage of the country should be
displayed on the same window and the capital of the country in the text
format should be displayed near the image.
(ii)What are cookies and how are they used? (May -18)

UNIT 3
Networking Essentials
Part – A
1. List four commonly used topologies to set up a LAN. Suggest a MAC
scheme for each. (AU-May’13)
Topologies are star, ring, bus and mesh. CSMA/CD is used for all
topologies.
2. Differentiate between a repeater, a Hub and a Switch. (AU-May’13)
Repeater Hub Switch

Used in physical layer Used in physical layer Used in Datalink layer


It is used to extend the Used to set up a LAN Used to set up a LAN
LAN
Regenerates the signal Broadcasting Device Point to point device

3. Give the name of the protocol used in each layer of the network. (AU-
Apr’14)
Layer Name Example Protocol

1 Physical Layer Ethernet, USB, Bluetooth, IEEE 802.11


2 Datalink Layer PPP, ATM, Ethernet
3 Network Layer IP,ARP, RARP, ICMP, IPSec
4 Transport Layer TCP,UDP
5 Session Layer NetBIOS, PPTP
6 Presentation Layer SSL, TLS
7 Application Layer HTTP, FTP, DNS, SNMP, Telnet

4. What is meant by Encapsulation and Decapsulation? (AU-Apr’14)


Encapsulation is used to refer to the process of each layer at the sending
computer adding its own header information. Decapsulation is the reverse
process of Encapsulation, where in each layer at the receiving computer,
interprets the header information sent by its peer layer, takes the required action
based on the information and finally removes the header before passing on the
data to the next higher layer.
5. Define physical and Logical Topology
Physical Topology defines how the nodes of the network are physically
connected. Logical topology has dedicated connection between certain selected
source-destination pairs using the underlying physical topology.
6. What is the difference between passive hub and active hub?
An active hub contains the repeater that regenerates the received bit
patterns before sending them out. A passive hub provides a simple physical
connection between the attached device.
7. Define LAN.
A local area network is a data communication system that allows number
of independent devices to communicate directly with each other in a limited
geographical area. LAN is capable of transmitting data at very faster rates than
over a telephone line but the distance is limited. There is also a limit on the
number of computers that can be attached to a single LAN.

8. What are the responsibilities of network layer?


The network layer is responsible for the source to destination delivery of
the packets across multiple network links. The functions of network layer
includes: Logical Addressing, Routing, Frame Fragmentation
9. What are the characteristics of LAN?
 Easy resource sharing.
 High data transfer rate.
 Small area coverage.
 Cost of setting up the network is usually low.
 Flexibility
 Low error rate
 Reliability of operation
 Simple maintenance
10. What is CSMA/CD?
Carrier sense multiple access with collision detection is a protocol used
to sense whether a medium is busy before transmission and it also has the ability
to detect whether the packets has collided with one another.
11. What is packet switching?
Packet switching the dividing of messages into packets before they are
sent, transmitting each packets individually, and then reassembling them into the
original message once all of them have arrived at the intended destination
12. Define Network.
A network is a set of devices connected by physical media links. A
network is recursively is a connection of two or more nodes by a physical link or
two or more networks connected by one or more nodes.
13. List the layers of OSI
 Physical Layer
 Data Link Layer
 Network Layer
 Transport Layer
 Session Layer
 Presentation Layer
 Application Layer
14. What is a gateway or Router?
A node that is connected to two or more networks is commonly called as
router or Gateway. It generally forwards message from one network to another.
15. Which layers are network support layers?
 Physical Layer
 Data link Layer and
 Network Layers
16. What are the concerns of the Physical Layer?
Physical layer coordinates the functions required to transmit a bit stream
over a physical medium.
 Physical characteristics of interfaces and media
 Representation of bits
 Data rate
 Synchronization of bits
 Line configuration
 Physical topology
 Transmission mode
17. What are the responsibilities of Data Link Layer?
The Data Link Layer transforms the physical layer, a raw transmission
facility, to a reliable link and is responsible for node-node delivery.
 Framing
 Physical Addressing
 Flow Control
 Error Control
 Access Control
18. What are the responsibilities of Transport Layer?
The Transport Layer is responsible for source-to-destination delivery of
the entire message.
 Service-point Addressing
 Segmentation and reassembly
 Connection Control
 Flow Control
 Error Control
19. What are the responsibilities of Session Layer?
The Session layer is the network dialog Controller. It establishes,
maintains and synchronizes the interaction between the communicating systems.
 Dialog control  Synchronization
20. What are the responsibilities of Presentation Layer?
The Presentation layer is concerned with the syntax and semantics of the
information exchanged between two systems.
 Translation
 Encryption
 Compression
21. What are the responsibilities of Application Layer?
The Application Layer enables the user, whether human or software, to access
the network. It provides user interfaces and support for services such as e-mail,
shared database management and other types of distributed information services.
 Network virtual Terminal
 File transfer, access and Management (FTAM)
 Mail services
 Directory Services
22. Difference between LAN, WAN, MAN
LAN WAN MAN
A network that connects a A network that connects two The communication
relatively small number of or more local area networks infrastructure that have been
machines in a relatively close over a potentially large developed in and around
geographical area geographic distance. large countries
Covers small area eg. Within Covers large geographical Covers larger than LAN but
Building area smaller than WAN
Low bit error rate and delay High bit error rate and delay Bit rate error and delay
higher than LAN
Supports high data transfer Supports low data transfer Supports moderate data
rate rate transfer rate
LAN uses inexpensive WAN uses most expensive MAN uses moderately
equipment equipment expensive equipment
23. What is connection oriented and connectionless services?
There is a sequence of operation to be followed by the users of
connection oriented service. These are: Connection is established, Information is
sent, and Connection is released. In connectionless the data is transferred in one
direction from source to destination without checking that destination is still
there or not or if it prepared to accept the message. Authentication is not needed
in this. Example of Connectionless service is UDP (User Datagram Protocol)
protocol.

24. What is TTL?


Time to live is an 8 bit binary value that indicates the remaining life of a
packet. A TTL value is decreased by at least one each time the packet is
processed by the router. When the value becomes zero, the router discards or
drops the packet and it is moved from the network dataflow.
25. Define IPV4 format.
26. Mention the range of IP Address of all classes
Class Starting Address Last Address
Class A 0.0.0.0 127.255.255.255
Class B 128.0.0.0 191.255.255.255
Class C 192.0.0.0 223.255.255.255
Class D 224.0.0.0 239.255.255.255
Class E 240.0.0.0 255.255.255.255
27. Mention the difference between TCP and IP.
TCP IP
Used to transfer packet data Responsible for logical addressing
Connection Oriented Protocol Connectionless Protocol
Breaks messages into packets, hands IP deals with the routing of packets
them off to the IP software for delivery through the maze of interconnected
and then orders and reassembles the networks to their final destination.
packets at their destination.
Reliable Not Reliable

28. Differentiate Wifi and WiMax (AU-JAN 18)


Wi-Fi Wi-Max
Wi-Fi stands for wireless fidelity Wi-Max stands for worldwide interoperobility
for microwave access
100 kms 80-90 kms
It uses CSMA/CA and is not connection- It is connection -oriented
oriented
It has a channel bandwidth of 20Mhz It has a channel bandwidth of 1.25 Mhz – 20
Mhz
It is a short range technology It is a long range technology
Part B
1. Explain the different types of computer networks.
2. Explain in detail about the network components.
3. Explain the various network topologies. List its advantages and
disadvantages.
4. Describe network routing with an example.
5. Explain in detail about switching and its types.
6. Explain in detail the principles, function and services provided by the network
layer.
7. Describe the layers of TCP/IP Model.
8. Explain in detail about WLAN.
9. Explain about Ethernet.
10. Explain the working of Wifi.
11.(i) Explain the functions of each layer in the network protocol stack.
(ii) What are the different topologies that can be used to set up a LAN. (AU
– Apr’14)
12.(i) Explain how an Ethernet based LAN works. You have only 32-port
switches. You
have to construct a network that can connect 200 nodes. How will you
connect them
up ?
(ii) Explain how IP version 4 addresses are designed. How are they used by a
router to
forward packets ? (AU – Apr’14)
13.(i) Show how data flows through different layers in a TCP/IP network, where
you
have to go through 2 routers to go from the source to the destination.
Calculate the
number of times encapsulation and decapsulation take place.
(ii) Explain the CSMA/CD scheme used in Ethernet. If we want to set up an
Ethernet
network connecting 4 different Labs with 90 systems in each Lab, show
a configuration
that can be used with 48-port switches. (AU – May’13)
14.(i) Explain the functions carried out by each layer in the TCP/IP model, and
the
protocols used at these layers.
(ii) Discuss the collision avoidance technique used in wireless LAN. Is it
possible for
collisions to still occur ? Explain. (AU – May’13)
15 (i)Discuss the collision avoidance technique in wireless LAN. Is it possible
for collision to still occur? Explain
(ii)Show how data flows through different layers in the TCP / IP network.
Calculate how many encapsulation and decapsulation take place? (AU – JAN
18)

UNIT 4
MOBILE COMMUNICATION ESSENTIALS
PART - A
1. If you lose your cell phone you would deactivate your SIM. How is this
achieved in GSM architecture? (AU-May’13)
Equipment Identity Register (EIR) is a database that keeps track of
handsets on the network using the IMEI. There is only one EIR per network. It is
composed of three lists. The white list, the grey list and the black list. The black
list is a list if IMEI’s that are to be denied service by the network for some
reason. Reasons includes the IMEI being listed as stolen or cloned or if the
handset is malfunctioning or doesn’t have the technical capabilities to operate on
the network.
2. Differentiate between CDMA and GSM networks in terms of sharing
access to the channel. (AU-May’13)
GSM uses TDMA/FDMA access scheme in order to assign channels to a
different subscribers to utilize the service from the service operator’s base
stations. One frequency and one time slot (f1, t1) is needed for one way
communication and the pair for two way communication. CDMA uses PN codes
for communication between subscribers and node BS.
3. What is meant by frequency reuse factor is a cellular network? Draw the
arrangement of cell for a frequency reuse factor of 3. (AU-Apr’14)
The design process for selecting and allocating channel groups for all
cellular base stations within a system is called frequency reuse. If it uses radio
frequencies (radio channels) over and over again throughout a market with
minimal interference, to serve a large number of simultaneous conversations.

4. Why the cellular network is hexagonal in shape and not in circular


structure?
By using hexagonal concept, we can divide the geographical area into
less number of sub areas. So number of transmitters used is less. In reality the
shape is irregular polygon. If we use circular concept, the hidden areas are not
covered properly.
5. In the 900 MH band of GSM, 890-915MHz is allocated for the uplink and
935-960MHz for downlink i.e. 25 MHz bandwidth for each direction. If 200
KHz are allocated for each channel, how many channels can be supported?
If each channel is further divided into 8 time slots, how many users can be
supported? (AU-Apr’14)
25MHz = 124*200KHz channels.
Each channel is TDMA with burst period of 15/26 ms
8 burst periods = TDMA frame of 120/26ms
1 channel = 1 burst period/TDMA Frame
26 TDMA frames? one multiframe ( 24 are used for traffic , 1 for control, and
1 is unused).
6. What is handoff management?
In a cellular telephone network, handoff is the transition for any given
user of signal transmission from one base station to a geographically adjacent
base station as the user moves around. Each base-station transition, as well as
the switching processor sequence itself, is called handoff. When an MS migrates
out of its current BS into the footprint of another, a procedure is performed to
maintain service continuity, known as handoff management.
7. What is location management?
An agent in a home network called home agent, keeps track of the
current location of the MS. The procedure to keep track of the user’s current
location is referred to as location management.
8. What is reuse factor?
The frequency reuse factor is the rate at which the same frequency can be
used in the network. It is 1/K (or K according to some books) where K is the
number of cells which cannot use the same frequencies for transmission.
9. What happens when multiple signals collide in CDMA?
As multiple signals collide in CDMA they are added to form a new
sequence, it is used at the receiving end to demultiplex the sent data.
10. Define hard handoff.
In Hard handoff a mobile station communicates with one base station at a
time. So, when it moves out from one base station to another, first it breaks
connection with an existing one before establishing the connection with a new
base station. This may create a new transition.
11. What is soft handoff?
In a soft handoff a mobile station can communicate with two base
stations simultaneously. This means that, during handoff, a mobile station may
continue with the new base station before breaking off from the old one. It
provides diversity of Forward and Reverse Traffic Channel Paths on the
boundaries between base stations.
12. Lists the goals of 3G.
Goals of 3G technologies are:
 Allow both digital data and voice communication
 To facilitate universal personnel communication
 Listen music, watch movie, access internet, video conference, etc.,
13. Define paging
The Mobile Identification Number (MIN) is then broadcast over all the
forward control channels throughout the cellular system. It is known as paging.
"Paging" is the one-to-one communication between the mobile and the base
station. It is a procedure; the network uses to find out subscriber’s location
before actual call establishment and also used to alert the mobile station of an
incoming call.
14. Define cell
Each cellular base station is allocated a group of radio channels within a
small geographic area served by a base station called a cell. It consists of
transmitter, receiver and the control unit. The essence of a cellular network is the
use of multiple low-power transmitters.
15. What is interference?
Interference is defined as any adverse interaction between two or more
radio signals that cause noise or cancels out each other
16. What is channel borrowing?
A channel set is nominally assigned to each cell when all the channels in a
cell are occupied the cell borrows channels from other cells to accommodate the
incoming new/ handoff calls as long as the borrowed channels do not interfere
with the ones used by existing calls otherwise the call is blocked.

17. Define Baseband.


In signal processing, baseband describes signal and systems whose range
of frequencies is measured from 0 to a maximum bandwidth or highest signal
frequency. In telecommunication, it is a frequency range occupied by a message
signal prior to modulation, it can be considered as a synonym to low-pass.
18. What are the performance characteristics of GSM?
 Communication
 Total Mobility
 High Capacity
 World – Wide connectivity
 High transmission quality
 Security functions
19. What are the main functions of BTS?
 Directed antenna
 Processing of signals
 Amplification of signals to acceptable strength
 Channel coding / decoding
 Frequency hoping
 Encryption / Decryption of data
20. What is cell splitting?
It is a process of defining new cells which have smaller radius than original
cells by installing the smaller cells between existing cells. Capacity increases
due to additional number of channels per unit area. When traffic density starts to
build up and frequency channels in each cell cannot provide enough mobile calls
then the original cells can be spilt into smaller cells.
21. The simcard securely stores the service subscriber key having 15 digits.
How are the keys spilt up?
 First 3 digits – mobile country code
 Second 2 digits – mobile network code
 Third 10 digits – mobile station identification number
22. Difference between CDMA and GSM.
CDMA GSM
 Carrier spacing is 1230 KHz  Carrier spacing is 200 KHz
 It uses CDMA technology  It uses FDMA / TDMA
 It uses QPSK / BPSK modulation  It uses GMSK modulation
techniques techniques
 Frequency separation is 45 MHz  Frequency separation is 45 / 95 MHZ
 Downlink frequency is 869 – 894  Downlink frequency is 925 – 960
MHz MHz
Part B
1. Explain the working of cell phone
2. What are the components of Digital cell phone? Explain.
3. Explain the generations of cellular networks.
4. Explain the GSM architecture
5. Why is SMS restricted to a few character only? Explain how an SMS is sent
giving the details of the architecture components?
6. Explain the working of voice call.
7. Explain about the cell phone frequencies and channels
8. Explain cell phone technology.
9. Explain multiband and multimode phones
10. Describe how call handoff is carried out in a cellular network.
11. You lose your cell phone, an expensive one.
A. How can you trace it ?
B. You inform your service provider to stop calls from your cell phone. How
is the
service provider able to do. that ?
C. You get a new phone. You still have the same number. How is this
achieved ? (AU – Apr’14)
12. Consider a cellular communication network that spans multiple cities, with
each city having one MSC. Trace the steps in setting up a call for two
subscribers X and Y who belong to the same city, say Chennai, in the following
scenarios. What charges would they have to pay ?
(A) X in Chennai calls Y roaming in Delhi
(B) Y roaming in Delhi calls a local land-line number in Delhi. (AU –
May’13)
13. If you are a Chennai cell phone customer roaming in Mysore, and your
friend who is a Delhi customer sends you an SMS from Delhi, trace .all the
steps that take place to deliver the SMS to you. (AU – Apr’14)
14. How call roaming servicesa are carried out in cellular network? AU-
JAN’18
UNIT V
Application Essentials
Part - A
1. What is interactive application?
 An interactive application is a collection of objects intended for
performing certain tasks when user triggers the command.
 Typical examples of interactive web applications are – Online course
registration system, online shopping system and so on.
2. Enlist the advantage of interactive application.
The advantage of interactive applications is as follows.
 Increases the engagement of users
 Boosts communication by sharing email, files and printing files
 Annotations of documents
 Interactive applications can be ported on mobile devices to avail the
interactivity at finger tips.
3. Lists the steps involved in a typical application development lifecycle.
The steps are as follows.
 Understand the data items and  Understand the report design
the data dictionaries  Understand the data structure
 Understand the table design design
 Understand the business view  Understand the event rules
design design
 Understand the form design  Understand the system function
4. Define the terms database and DBMS
Database is an organized collection of data. A DataBase Management
System (DBMS) is a computer software application that interacts with the user,
other applications and the database itself to capture and analyze data. Examples :
The well-known DBMS softwares are- MS-ACCESS, Oracle, MySQL,
Microsoft SQL Server, Sybase and so on.
5. What are the advantage of DBMS?
The advantage of DBMS are:
 Reduced data redundancy : The database approach removes the
redundancy by integrating the files. But this approach can not completely
eliminate redundancy completely but can control the data redundancy
 Data Consistency : In this approach all copies of data are kept consistent.
 Sharing of data: The centralized stored database can be accessed by
multiple users or application programs.
 Data Integrity : The data integrity provides validity and consistency of
stored data.
 Improved security : The database approach prevents unauthorized access
to data by means of user name, password, and access rights.
6. What is data model in database?
The data model in Database Application describe the logical structure of
database, relationship between the database stored in database and various
constraints on data.
7. What is the importance of data model?
End users have different view for data
Data model organizes data for different users

8.Enlist the data models used in database management system.


Various types of data models are used in database management system –
 Hierarchical data model  Relational model
 Network data model  E-R model
9. Explain the concept of data independence in DBMS
Data independence is an ability by which one can change the data at one
level without affecting the data at another level. Here level can be physical,
conceptual or external
Data independence is one of the important characteristics of database
management system. By this property, the structure of the database or the values
stored in the database can be easily modified by without changing the
application.
10.What is Data Dictionary?
Data dictionary contains information about database itself. The data
dictionary thus contains the metadata i.e data about data. Following type of
information is stored in data dictionary – Definition of database objects such as
tables, views, constraints, clusters, procedures, functions, triggers, Column
name, Data type information, Amount of space required to store the data objects.
11.What is primary key?
This is the most important key in database which uniquely identifies the
record. It can be a single attribute or combination of attributes. The database
designer has to specially assign one of the candidate keys as primary key so that
the record can be uniquely identified with the help of it. For example-
Stud_RollNo is a primary key from student database.
12.What is multimedia technology?
Multimedia technology is computer-based technique of text, images,
audio, video, graphics, animation and any other medium where every type of
information can be represented, processed, stored, transmitted, produced and
presented digitally.
13. Enlist two uses of multimedia technologies
 Multimedia is extensively used in the field of education and training.
 The business application of multimedia includes, product demos, instant
messaging. One the excellent applications is voice and live conferencing.
 Real life like games can be created by multimedia to create games.
 Multimedia is used in simulation and modeling. Flight simulator creates
real life imaging.
14.What is information system?
An information system(IS) is a set of interrelated components that collect,
manipulate, store and disseminate data and information and provide a feedback
mechanism to meet an objective.
Some example of information system are as follows –
 Supply chain management
 Customer Relationship management
 Geographic Positioning System
 Enterprise resource planning
15 .What are parts of information system?
 The input, processing, output and feedback are the parts of information
system.
 Input is an activity of gathering and capturing raw data. Processing
means converting or transforming data into useful output. Output
involves producing of useful information in the form of documents or
reports. In information from the system which is used to make changes to
input or processing activities.
16.What is transaction processing system(TPS)?
 The transaction processing system provides way to collect, process,
store, display, modify, or cancel the transactions.

17. Enlist the different types of information system.


There are four types of information system
 Transaction Processing  Decision Support
System(TPS) System(DSS)
 Management Information  Executive Information
System(MIS) System(EIS)
18.Specify any two desirable characteristics of information system.
 Accurate : The information must be accurate and error loss.
 Complete: Information present in the information system must be
complete so that it will satisfy all the queries of its users.
 Relevant: The relevant information is important for the decision maker.
 Reliable: This is very important characteristics of the information
system. The reliable information is trusted by its users.
19.What is MIS?
A management information system is information system that
uses data collected by Transaction Processing System(TPS). This data is
used for creating reports in such a way that managers can make use of it
to make important business decisions.
20.Give examples of decision support system(DSS).
Some examples of DSS
 Logistics system
 Financial planning system
 Spreadsheet models
21.Enlist the steps used in design and development of information system.
Following are the steps used in design and development of information system –
 Feasibility study  Design
 Requirement analysis  Development and Testing
 Implementation  Maintenance
 Evaluation
22.What is personal information system?
Personal information management is set of activities in which people performs
in order to acquire, organize, maintain, retrieve, and use personal information
such as documents, web pages, email messages every day to accomplish the
assigned task.
Example of personal information system are –
 Address book system  Remainder and Alert System
 Personal Notes  Instant messaging systems
 E-mail Notification
23.Why personal information system is needed?
 This system saves time and efforts in locating the information.
 Information system is used for easy retrieval of information.
 The information system organizes the entire information systematically.
 Using personal information system within an organization means better
employee productivity and better team work in the near term.
24.What information retrieval system (IRS)?
Information retrieval is the activity of obtaining information resources
relevant to an information need from a collection of information resources.
25.What is search engine?
A search engine is the practical application of information retrieval
techniques to large scale text collections.For examples – Google is a popular
search engine
26. Give examples of popular search engines
Search engine Description
Google It is the most popular search engine globally
Bing It was launched in 2009 by Microsoft. It is the latest web-based search engine
that also delivers Yahoo’s results
Ask It was launched in 1996 and was originally known as Ask Jeeves. It includes
support for match, dictionary and conversation question
AltaVista It is powered by Yahoo technology
27. List 5 important features of social networking app.
The desired features of social networking app are as follows –
1. Simple user interface 4. Notification and real time
2. Prominent search facility updates
3. Personalize user profile and 5. Interactivity
experience
28.List any four multimedia applications used in education domain (AU
JAN 18)
 Britannica
 Encarta
 FunSchool
 JFLap
 Matlab /GNU Octave

Part B
1. Explain in detail about Multimedia Applications.
2. What is personal information system? Explain.
3. Describe about information retrieval system. (AU Dec’ 14)
4. What is Social Networking Application? Explain about its types, features and
issues.
5. How will you create a simple interactive application?
6. Explain Database Applications with examples.
7. What is information system? Explain.
8. Explain the design and development of information systems. (AU –Dec’14)
9. Design a simple social-media application to pass on messages to friends
whenever two people come in contact with (within range of) one another.
Assume that you are using devices with Blue-tooth support to transfer
messages. (AU – May’13)
10.Consider a multinational company which sells different electronic gadgets
such as desk tops, lap tops, tablets, cameras, mobile, phones, etc. through
online or various dealers. Dealers are registered with the company. Customers
can buy through online or dealers. Delivery of electronic goods will be through
various agencies. Every shipment of goods will be insured through insurance
company. Considering this as an Information System project, describe the
various requirements for building this Information System. (AU –Apr’13)
11.(i) Explain the architecture, of a text search system. How would this have to
be modified for music search?
(ii) Design an app for your personal use - reminders for homework ! If you
also have to remind your class-mates and friends, what additional features
would you need? (AU – Apr’13)
12.(i) Design a simple personal application that gives you reminders for each
day. Identify the inputs to be taken, processing to be done, and the output to be
produced. What multimedia components can be added to this application ?
(ii) Explain the architecture of a generic search system. If this system is to be
used for searching only images, which components would need to be changed
and how? (AU – May’13).
Design a simple social media application to pass on messages to friends about
birthday of individuals (except the one who has birthday ) in the group to other
friends. AU-JAN-18
13.(i)Design an application for a blood bank that accepts blood requests and
based on the request it identifies the person with the blood group in the database
and send them messages. What are the important features needed for this?
14.(i)Design a simple information system that gives you reminder for each day.
Identify the inputs to be taken, processing to be done and the output expected.
What multimedia components can be added to this application?
(ii) Explain the architecture generic search system. Is the system to be used only
for searching only images, which components needed to changed and how? AU-
JAN 18

You might also like