Wednesday, November 4, 2015

GATE Questions - Web technologies

Previous GATE questions with solutions on Web Technologies - CS/IT

GATE - 2004
1. Which one of the following statements is false?                                                         
(a) HTTP runs over TCP
(b) HTTP describes the structure of web pages
(c) HTTP allows information to be stored in a URL
(d) HTTP can be used to test the validity of a hypertext link

Ans: option (b)

HTTP (hypertext transfer protocol) is an application layer protocol used for accessing web pages. tt uses TCP/IP at the transport and network layer. 
HTML decribes the structure of web pages. HTML is a markup language for describing web documents (web pages). HTML stands for Hyper Text Markup Language. Refer to know more

A Uniform Resource Locator (URL) (commonly informally referred to as a web address, although the term is not defined identically) is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. Refer to know more.

A hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering.[1] A hyperlink points to a whole document or to a specific element within a document. Refer to know more.

GATE - 2004
2. Which of the following objects can be used in expressions and scriptlets in JSP (Java Server Pages) without explicitly declaring them?
(a) session and request only
(b) request and response only
(c) response and session only
(d) session, request and response

Ans: option (a)
JavaServer Pages (JSP) is similar to PHP, but it uses the Java programming language. JSP is a technology that helps software developers create dynamically generated web pages based on HTML, XML, or other document types.
A scriptlet can contain any number of JAVA language statements, variable or method declarations, or expressions. A scriptlet is a fragment of Java code that is run when the user requests the page. Following is the syntax of Scriptlet:
<% code fragment %>
Refer to get example of a scriptlet.

GATE - 2004
3. Consider the following statements:
(1) Telnet, FTP and HTTP are application layer protocols.
(2) EJB (Enterprise Java Beans) components can be deployed in a J2EE (Java2 Enterprise Edition) application server.
(3) If two languages conform to the Common Language Specification (CLS) of the Microsoft.NET framework, then a class defined in any one of them may be inherited in the other.
Which statements are true?
(a) 1 and 2 only
(b) 2 and 3 only
(c) 1 and 3 only
(d) 1, 2 and 3

Ans: option (d)
Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else's computer remotely. The File Transfer Protocol (FTP) is used to transfer computer files from one host to another host over a TCP-based network, such as the Internet. For HTTP refer question no. (1). Telnet, FTP & HTTP are application layer protocols. Some important application layer protocols are BGP, DHCP, DNS, FTP, HTTP, IMAP, LDAP, MGCP, NNTP, NTP, POP, ONC/RPC, RTP, RTSP, RIP, SIP, SMTP, SNMP, SSH, Telnet, TLS/SSL, XMPP, etc.

EJB is a development architecture for building highly scalable and robust enterprise level applications to be deployed on J2EE compliant Application Server such as JBOSS, Web Logic etc. Refer

Common Language Specification (CLS) is a set of basic language features that .Net Languages needed to develop Applications and Services , which are compatible with the .Net Framework. When there is a situation to communicate Objects written in different .Net Complaint languages , those objects must expose the features that are common to all the languages . Common Language Specification (CLS) ensures complete interoperability among applications, regardless of the language used to create the application. Refer

GATE - 2010
4. Which one of the following is not a client server application?
(a) Internet chat
(b) Web browsing
(c) E-mail
(d) Ping

Ans: option (d)
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol network and to measure the round-trip time for messages sent from the originating host to a destination computer and back. Refer

GATE - 2009
5. Consider a HTML table definition given below:
<table border=1>
    <tr> <td rowspan=2> ab </td>
         <td colspan=2> cd </td>
    <tr> <td> ef </td>
         <td rowspan=2> gh </td>
    <tr> <td colspan=2> ik </td>
The number of rows in each column and the number of columns in each row are:
(a) (2,2,3) and (2,3,2)
(b) (2,2,3) and (2,2,3)
(c) (2,3,2) and (2,3,2)
(d) (2,3,2) and (2,2,3)

Ans: option (c)
The above code will give a table like below. Rowspan attribute specifies the number of rows a cell should span. Colspan attribute specifies the number of columns a cell should span.

ab cd
ef gh

GATE - 2005
6. Consider the three commands : PROMPT, HEAD and RCPT. Which of the following options indicate a correct association of these commands with protocols where these are used?

Ans: option (b)
HEAD method is used in HTTP for obtaining metainformation about the entity implied by the request without transferring the entity-body itself. This method is often used for testing hypertext links for validity, accessibility, and recent modification.
RCTP is used in SMTP protocol (Simple Mail Transfer Protocol) in order to tell the mail server who the recipient of your message is.
PROMPT command in FTP turns off prompting for individual files when using the mget or mput commands.

GATE - 2005
7. A HTML form is to be designed to enable purchase of office stationery. Required items are to be selected (checked). Credit card details are to be entered and then the submit button is to be pressed. Which one of the following options would be appropriate for sending the data to the server. Assume that security is handled in a way that is transparent to the form design.
(a) Only GET
(b) Only POST
(c) Either of GET or POST
(d) Neither GET nor POST

Ans: option (b)
The Hypertext Transfer Protocol (HTTP) is designed to enable communications between clients and servers. HTTP works as a request-response protocol between a client and server. Two commonly used methods for a request-response between a client and server are: GET and POST. GET requests should never be used when dealing with sensitive data (like passwords, credit or debit card details etc) because it will display all such detaiuls in the address bar. Also GET requests can be cached and remains in the browser history. Refer

GATE - 2015
8. Which one of the following statements is NOT correct about HTTP cookies?
(a) A cookies is a piece of code that has the potential to compromise the security of an Internet user
(b) A cookie gains entry to the user’s work area through an HTTP header
(c) A cookie has an expiry date and time
(d) Cookies can be used to track the browsing pattern of a user at a particular site

Ans: option (a)
An HTTP cookie (also called web cookie, Internet cookie, browser cookie or simply cookie), is a small piece of data sent from a website and stored in the user's web browser while the user is browsing it. Every time the user loads the website, the browser sends the cookie back to the server to notify the user's previous activity. Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items added in the shopping cart in an online store) or to record the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited in the past). Cookies can also store passwords and form content a user has previously entered, such as a credit card number or an address. Ref:

9. Which of following statements is/are False?
1. XML overcomes the limitations in HTML to support a structured way of organizing content.
2. XML specification is not case sensitive while HTML specification is case sensitive.
3. XML supports user defined tags while HTML uses pre-defined tags.
4. XML tags need not be closed while HTML tags must be closed.
(a) 2 only
(b) 1 only
(c) 2 and 4 only
(d) 3 and 4 only

Ans: option (c)
HTML tags are not case sensitive. XML tags are case sensitive.
HTML tags need not to be closed, but XML tags must be closed.

10. In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that?

Ans: option (a)
FTP uses two TCP connections (one is used for data and another for control informations). 


  1. Aise questions aaye to ham haste khelte qualify honge.

  2. This is a truly good site post. Not too many people would actually, the way you just did. I am really impressed that there is so much information about this subject that have been uncovered and you’ve done your best, with so much class. If wanted to know more about green smoke reviews, than by all means come in and check our stuff. niche releated backlinks

  3. dog grooming is the specialty of my sister, she really loves grooming every dog in our house** website design company nyc

  4. Thermal Paper… Hello! I will be coming back more for your interesting articles and for great Reading soon. I would like to give a thumbs up for the great information you have here on this site!… web design agency new york

  5. You actually make it seem so easy with your presentation but I find this matter to be really something which I think I would never understand. It seems too complex and very broad for me. I am looking forward for your next post, I will try to get the hang of it! branding agency sf

  6. This is such a great resource that you’re offering and you provide out at no cost. I appreciate seeing sites that realize the worth of offering a perfect useful resource totally free. I genuinely loved reading your submit. ux san francisco

  7. His or her shape of unrealistic tats were initially threatening. Lindsay utilized gun first basic, whereas this girl snuck outside by printer ink dog pen. I used absolutely sure the all truly on the shade, with the tattoo can be taken from the body shape. make an own temporary tattoo iphone mockup

  8. A basic knowledge of human development is needed to understand the fundamental nature of the gap that has been created by our technological advancements. niagara falls condos for sale

  9. You are a very persuasive writer. I can see this in your article. You have a way of writing compelling information that sparks much interest. website design san francisco

  10. My spouse and I stumbled over here by a different web address and thought I might check things out. I like what I see so i am just following you. Look forward to checking out your web page again. web design san francisco

  11. You may find two to three new levels inside L . a . Weight loss and any one someone is incredibly important. Initial stage may be real melting away rrn the body. lose weight web design agency san francisco

  12. home repair can be difficult specially if you do not have any idea at all about what you are doing,, website design firms san francisco

  13. when we are looking for apartment for rents, we usually choose those with very clean rooms~ website design firms san francisco

  14. This site is often a walk-through for all of the data it suited you with this and didn’t know who need to. Glimpse here, and you’ll definitely discover it. web design agencies los angeles

  15. Absolutely composed subject matter, thankyou for information . design firms los angeles

  16. not everyone would need a nose job but my girlfriend really needs some rhinoplasty coz her nose is kind of crooked* website design la

  17. hey there, just wanted to tell you that the feed on your site is broken. I was trying to add it to my rss list but it couldn’t work. I had a similar issue on my blog, it wouldn’t work a week and then somehow it just worked! I guess these issues fix thereself sometimes, lol. but I thought to inform you. Take care!. website design la

  18. web marketing would be the next trend in advertising. there are millions of potential costumers on the internet;; web design agency los angeles