Microsoft IIS - Anvari.Net

chunkyscreechΔιακομιστές

4 Δεκ 2013 (πριν από 3 χρόνια και 8 μήνες)

130 εμφανίσεις

Prof. M. Anvari Page
1

of
4

CIS
-
309

Midterm Exam



Strayer University

(Arlington Campus)


CIS
-
309 Web Development

Midterm Exam




Student Name:

_________________
Feb 2007



1. Name four commonly used Networking Topologies.


Bu
s, Star, Ring, Mesh



2. What Layers of OSI model is covered by the TCP/IP protocols?


Covers Layers 3
-
4 of the OSI Model ( Network / Transport Layers)


Multiple Layer 1
-
2 (Physical / Data Transport) Protocols Are Supported



3. Describe the IP address cla
sses and Subnetting

Different Classes of Networks:


Class A (Very Large Networks)



IP addresses: 1.0.0.0 to 127.0.0.0


Class B (Large Networks)



IP addresses: 128.0.0.0 to 191.254.254.254


Class C (Small/Medium Networks)



IP addresses: 192.0.0.0 to
223.254.254.254


Subnetting


Breaking Up a “Network” Into Smaller Networks



Subnet Mask: Logical And with IP Address to Define the Network


4. What is IP
v6 ?


IPng


IP Next Generation (IPv6)



128 Bit Addresses



Faster Routing



Security Mechanisms


No: Forwarding Address (Sender Must Follow
-
Up)

No

4. Send Data

5. Repeat Step 3,4 For Each Recipient

6. End Session


5
. Write the following HTML commands definitions next to each command.


Headings
<H1>, <H2>, <H3>, <H4>

Prof. M. Anvari Page
2

of
4

CIS
-
309

Midterm Exam


Paragraphs
<
P>


Line Break
<BR>


Unordered List
<UL>


Ordered List

<OL>


List Item
<LI>


Graphics
<IMG SRC=“
ImageFile
” ALT=“
DisplayText
”>


External / Absolute:
<A HREF = “ http://www.mkat.com/index.htm”>Main Page</A>


External / Relative:
<A HREF = “ index.htm”> Click for Main Page</A>

<NOFRAME>

<BGSOUND SRC=“noise.wav” LOOP=“Infinite”>

6
. What are the differences between Internet, Intranet, and Extranet?


The Main Difference is in the Target Audience



Internet



All Potential Users


Those With GUIs


Those With Current Browsers, Fast Connections


Those With Netscape or Internet Explorer


Intranet


Within a Specific User Community



Microsoft: Users of Microsoft O/S, Browsers


Usually Means Within a Company


Ext
ranet


An Intranet With Some Features Available to a Broader User Community


E.g. Customers, Suppliers


Typically Means Different Levels of Access to Different Users



7
. Define
Safe Tags, Confusing Tags, and Bad Tags.


Safe Tags



Results are Reasonabl
e Even if Tag is Not Recognized


E.g. It was a <B>great</B> day!


Confusing Tags



Result is Confusing, But No Serious Harm Results


The following text is <b>bold</b>



Bad Tags



Result May Be Opposite of What You Expect


<DEL>If this text appears, we
have a deal</DEL>



Page May Be Unreadable


E.g. White Text on Dark Background will be unreadable if Browser does not recognize
background color.

8
. What are the HTML
Hexadecimal

Commands for the Black and White Colors
?


By RGB Value: #RRGGBB (Hexadecim
al)


#000000


Black


#FFFFFF


White



9
. Describe GIF and JPG Image Formats


GIF Files


Graphics Interchange Format


Allows Transparent Backgrounds


256 Color Palette

Prof. M. Anvari Page
3

of
4

CIS
-
309

Midterm Exam


Supports Interlaced GIFs


Supports Animations


Four Sequential Images


May Distract
Users


JPG Files (JPEG)


Better Compression


16.7m Color Palette


Optimized For Color


Not as Good as GIF for Black & White


Better For Photos


Requires More Decompression by Browser


Progressive JPGs


Smoother Version of Interlaced GIFs


Not Supported
by All Browsers (Blank Image Results)



10
. What is Cascading Style Sheets (CSS)?

Similar to Word
-
Processing Styles

Controls Layout, Not Content

Change in Web Page Design Philosophy

The Reality: Web Page Authors Were Using “Tricks” to Control Layout

The R
esponse: Give in to the Inevitable

Develop a Reasonable Standard: Cascading Style Sheets

CSS is now the Preferred Method For Portability

Allows Users to Change Styles for Readability

CSS “Requires” Upgraded Browser

Browser/User Now Have More Options for M
aking it Readable

Older Browsers Won’t “Crash”, Just Won’t Show Formatting

Underlying Text is More Human Readable

Proliferation of Font, Table, etc. Tags Made HTML “Unreadable” in Many Cases

Styles Allow Control of:

Fonts, Colors, Spacing, Margins


11
. Wha
t are the Advanced Web Server Features?

Virtual Hosting

Allow Multiple URL’s to Map to Same Computer

Performance Optimization

Caching

Reliability

Scalability

Proxy Servers (For Security and Performance)

Fetch Documents That are on Other Computers

Cache The
m Locally

Allows for Easy Scalability

Multiple Proxy Servers Can Cache Documents From One Source Computer

Embedded Scripting

Server Side Includes

Custom Scripting Languages

Server API


12
. Compare the Apache Web Server with the Microsoft Internet Informati
on Server.

Prof. M. Anvari Page
4

of
4

CIS
-
309

Midterm Exam

Microsoft IIS

Not Strictly Derived From httpd/Apache

Windows NT

However: Functionally Very Similar to Apache

Emulates Many UNIX Conventions

E.g. Forward Slashes

Configuration via GUI

Personal Web Server

Peer Web Server


Apache, UNIX Origins

Now

Ported to NT

Evolved From httpd

Freeware

Typical UNIX Application

Public Source Code

Many Defaults, Conventions

BUT: All is Configurable

No GUI Interface

Configured via Scripts, Shell
Commands, Config Files

Various “Flavors”

Many Optional Features

API, A
pacheSSL


13
. Define the following terms and describe why the number of visits is important


Hits:

Each HTTP Request is a Hit


Accessing a Web Page May Result in Multiple Hits

E.g. Each Graphic is a Hit

Page Views:
Accessing a Single Web Page is a Pa
ge View

E.g. Typing in a URL or Clicking on a Link

Visits:
A Single Client’s Visit to Your Entire Site (Session)

May Include Multiple Page Views

What Constitutes a Second Visit From the Same Client?

Why is This Important?

Important for Commercial Web Sites

Advertising is Based on Site Access

Typically Sold on Page View Basis


14
. What are the Internet Risks?

Destruction of Data (
Random, Targeted)

Modification of Data (
Random, Targeted, Worms/Viruses)

Publication of Private/Sensitive Data (
Sensitive / Embarr
assing Information, Confidential Information,
Competitive Information, Customer Information, Keys)

Network Disruption, and Machine Crashes / Inoperable Serving Software