Professional Documents
Culture Documents
18. Desktop Publishing is the creation of page layouts for documents using
DTP Software 2
22. 1. Communication
2. Resource sharing
3. Data (or) software sharing 2
4. Money saving
(any 2)
24. 1. 3-D Secure is a secure payment protocol on the Internet
2. This authentication model comprise 3 domains. 1
1
Part III (Q.No. 33 is Compulsory)
Absolute URL 2
Relative URL
32. 1. Business to Business (B2B) 2. Business to Consumer (B2C)
3. Business to Government (B2G) 4. Consumer to Business (C2B)
5. Consumer to Consumer (C2C) 6. Consumer to Government (C2G)
7. Government to Business (G2B) 8. Government to Consumer (G2C) 3
9. Government to Government (G2G)
33. The Electronic Data Interchange (EDI) is the exchange of business
documents between one trade partner and another electronically.
1
Direct EDI
EDI via VAN
EDI via FTP/VPN, SFTP, FTPS
2
Web EDI
Mobile EDI
Part IV
34 1. Conceptual Analysis and Planning
(a) 2. Project design
3. Pre-production
4. Budgeting
5. Multimedia Production Team
6. Hardware/Software Selection
7. Defining the Content
8. Preparing the structure 5
9. Production
10. Testing
11. Documentation
12. Delivering the Multimedia Product
34 To draw a Star
(b) a) Click on the Polygon tool from the toolbox. The cursor changes
to a crosshair.
b) Click and drag anywhere on the screen. As you drag, a Polygon
appears.
c) Release the mouse button when the Polygon is of the desired size.
d) Choose Element > Polygon settings in the menu bar. Now 5
Polygon Settings dialogue box appears.
e) Type 5 in the Number of sides text box.
f) Type 50% in Star insert textbox.
g) Click OK.
Now the required star appears on the screen.
35 Indexed Arrays: Arrays with numeric index for the available values in
(a) array variable which contains key value pair as user / developer can take 2½
the values using keys.
36 Form tag is used to mention a method (POST or GET) and control the
(b) entire form controls in the HTML document. 2
Post Method: The input data sent to the server with POST method is
stored in the request body of the client‟s HTTP request. 1½
Get Method: The input data sent to the server with POST method via
URL address is known as query string. All input data are visible by user 1½
after they clicks the submit button.
37 There are four total layers of TCP/IP protocol, each of which is listed
(b) below with a brief description.
Network Access Layer – concerned with building packets.
Internet Layer – describes how packets are to be delivered.
Transport Layer – ensure the proper transmission of data. 5
Application Layer – application network processes. These processes
include File Transfer Protocol (FTP), Hypertext Transfer Protocol (HTTP),
and Simple Main Transfer Protocol (SMTP).
38 1. Coaxial Cables
(a) 2. Twisted Pair Cables
3. Fiber Optics
4. USB Cables
5. Serial and Parallel Cables 5
6. Ethernet Cables