Wednesday, November 4, 2015

GATE Questions - Web technologies

Previous GATE questions with solutions on Web Technologies - CS/IT

GATE - 2004
1. Which one of the following statements is false?                                                         
(a) HTTP runs over TCP
(b) HTTP describes the structure of web pages
(c) HTTP allows information to be stored in a URL
(d) HTTP can be used to test the validity of a hypertext link

Ans: option (b)

HTTP (hypertext transfer protocol) is an application layer protocol used for accessing web pages. tt uses TCP/IP at the transport and network layer. 
HTML decribes the structure of web pages. HTML is a markup language for describing web documents (web pages). HTML stands for Hyper Text Markup Language. Refer to know more

A Uniform Resource Locator (URL) (commonly informally referred to as a web address, although the term is not defined identically) is a reference to a web resource that specifies its location on a computer network and a mechanism for retrieving it. Refer to know more.

A hyperlink is a reference to data that the reader can directly follow either by clicking or by hovering.[1] A hyperlink points to a whole document or to a specific element within a document. Refer to know more.

GATE - 2004
2. Which of the following objects can be used in expressions and scriptlets in JSP (Java Server Pages) without explicitly declaring them?
(a) session and request only
(b) request and response only
(c) response and session only
(d) session, request and response

Ans: option (a)
JavaServer Pages (JSP) is similar to PHP, but it uses the Java programming language. JSP is a technology that helps software developers create dynamically generated web pages based on HTML, XML, or other document types.
A scriptlet can contain any number of JAVA language statements, variable or method declarations, or expressions. A scriptlet is a fragment of Java code that is run when the user requests the page. Following is the syntax of Scriptlet:
<% code fragment %>
Refer to get example of a scriptlet.

GATE - 2004
3. Consider the following statements:
(1) Telnet, FTP and HTTP are application layer protocols.
(2) EJB (Enterprise Java Beans) components can be deployed in a J2EE (Java2 Enterprise Edition) application server.
(3) If two languages conform to the Common Language Specification (CLS) of the Microsoft.NET framework, then a class defined in any one of them may be inherited in the other.
Which statements are true?
(a) 1 and 2 only
(b) 2 and 3 only
(c) 1 and 3 only
(d) 1, 2 and 3

Ans: option (d)
Telnet is a user command and an underlying TCP/IP protocol for accessing remote computers. Through Telnet, an administrator or another user can access someone else's computer remotely. The File Transfer Protocol (FTP) is used to transfer computer files from one host to another host over a TCP-based network, such as the Internet. For HTTP refer question no. (1). Telnet, FTP & HTTP are application layer protocols. Some important application layer protocols are BGP, DHCP, DNS, FTP, HTTP, IMAP, LDAP, MGCP, NNTP, NTP, POP, ONC/RPC, RTP, RTSP, RIP, SIP, SMTP, SNMP, SSH, Telnet, TLS/SSL, XMPP, etc.

EJB is a development architecture for building highly scalable and robust enterprise level applications to be deployed on J2EE compliant Application Server such as JBOSS, Web Logic etc. Refer

Common Language Specification (CLS) is a set of basic language features that .Net Languages needed to develop Applications and Services , which are compatible with the .Net Framework. When there is a situation to communicate Objects written in different .Net Complaint languages , those objects must expose the features that are common to all the languages . Common Language Specification (CLS) ensures complete interoperability among applications, regardless of the language used to create the application. Refer

GATE - 2010
4. Which one of the following is not a client server application?
(a) Internet chat
(b) Web browsing
(c) E-mail
(d) Ping

Ans: option (d)
Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol network and to measure the round-trip time for messages sent from the originating host to a destination computer and back. Refer

GATE - 2009
5. Consider a HTML table definition given below:
<table border=1>
    <tr> <td rowspan=2> ab </td>
         <td colspan=2> cd </td>
    <tr> <td> ef </td>
         <td rowspan=2> gh </td>
    <tr> <td colspan=2> ik </td>
The number of rows in each column and the number of columns in each row are:
(a) (2,2,3) and (2,3,2)
(b) (2,2,3) and (2,2,3)
(c) (2,3,2) and (2,3,2)
(d) (2,3,2) and (2,2,3)

Ans: option (c)
The above code will give a table like below. Rowspan attribute specifies the number of rows a cell should span. Colspan attribute specifies the number of columns a cell should span.

ab cd
ef gh

GATE - 2005
6. Consider the three commands : PROMPT, HEAD and RCPT. Which of the following options indicate a correct association of these commands with protocols where these are used?

Ans: option (b)
HEAD method is used in HTTP for obtaining metainformation about the entity implied by the request without transferring the entity-body itself. This method is often used for testing hypertext links for validity, accessibility, and recent modification.
RCTP is used in SMTP protocol (Simple Mail Transfer Protocol) in order to tell the mail server who the recipient of your message is.
PROMPT command in FTP turns off prompting for individual files when using the mget or mput commands.

GATE - 2005
7. A HTML form is to be designed to enable purchase of office stationery. Required items are to be selected (checked). Credit card details are to be entered and then the submit button is to be pressed. Which one of the following options would be appropriate for sending the data to the server. Assume that security is handled in a way that is transparent to the form design.
(a) Only GET
(b) Only POST
(c) Either of GET or POST
(d) Neither GET nor POST

Ans: option (b)
The Hypertext Transfer Protocol (HTTP) is designed to enable communications between clients and servers. HTTP works as a request-response protocol between a client and server. Two commonly used methods for a request-response between a client and server are: GET and POST. GET requests should never be used when dealing with sensitive data (like passwords, credit or debit card details etc) because it will display all such detaiuls in the address bar. Also GET requests can be cached and remains in the browser history. Refer

GATE - 2015
8. Which one of the following statements is NOT correct about HTTP cookies?
(a) A cookies is a piece of code that has the potential to compromise the security of an Internet user
(b) A cookie gains entry to the user’s work area through an HTTP header
(c) A cookie has an expiry date and time
(d) Cookies can be used to track the browsing pattern of a user at a particular site

Ans: option (a)
An HTTP cookie (also called web cookie, Internet cookie, browser cookie or simply cookie), is a small piece of data sent from a website and stored in the user's web browser while the user is browsing it. Every time the user loads the website, the browser sends the cookie back to the server to notify the user's previous activity. Cookies were designed to be a reliable mechanism for websites to remember stateful information (such as items added in the shopping cart in an online store) or to record the user's browsing activity (including clicking particular buttons, logging in, or recording which pages were visited in the past). Cookies can also store passwords and form content a user has previously entered, such as a credit card number or an address. Ref:

9. Which of following statements is/are False?
1. XML overcomes the limitations in HTML to support a structured way of organizing content.
2. XML specification is not case sensitive while HTML specification is case sensitive.
3. XML supports user defined tags while HTML uses pre-defined tags.
4. XML tags need not be closed while HTML tags must be closed.
(a) 2 only
(b) 1 only
(c) 2 and 4 only
(d) 3 and 4 only

Ans: option (c)
HTML tags are not case sensitive. XML tags are case sensitive.
HTML tags need not to be closed, but XML tags must be closed.

10. In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that?

Ans: option (a)
FTP uses two TCP connections (one is used for data and another for control informations). 


  1. Aise questions aaye to ham haste khelte qualify honge.

  2. This comment has been removed by the author.

  3. Great post i must say and thanks for the information. Education is definitely a sticky subject. However, is still among the leading topics of our time. I appreciate your post and look forward to more. capsule caffe

  4. Quite a long while later, Tech would endeavor to return the SEC yet their application was denied, in enormous part because of the resistance of Georgia.why you should use a vpn when pirating

  5. Truth be told, in the event that you incorporate this they may not have to request the details of the PC. They will actually want to explore your model number and track down all that and more about the PC. This is likewise something very helpful to utilize when scanning Google or other web indexes for tech support. túlméretes szállítás Europa-Road Kft.

  6. Nice Information thanks for sharing with us With the evolving online strategies, all the professional SEO services thus help these varieties of businesses to grasp and to stay up with the market trends and also the program rules. It’s very necessary that you just choose an SEO Agency in Wellington of Ocean Digital. For more information regarding company SEO services reach to its website.

  7. It is the specialist's obligation to comprehend those interchanges that come from the craftsmen during a show, at the same time, more critically, it is the sound tech's responsibility to be mindful to the necessities of the designer and the craftsman. IT consulting services Brampton

  8. Nichole disdains the way that her school demands that she had more contact with technology than she is similar with. In any case, she clarifies that as she began doing those school online tasks so regularly she came to understand that they were not excessively terrible. power MOSFET

  9. NAT (Network Address Translation) Traversal permits various gadgets on a private organization to get to the Internet all the while without each requiring its own outer IP address. Most inns and air terminals that give Internet availability use NAT to associate with the Internet.
    vpn free online

  10. Similarly as all youngsters need to figure out how to deal with a book in early education, they should be instructed how to utilize technology, including how to open it, how it works, and how to deal with it. magnetic connectors

  11. chip technology. All which give a considerable lot of the items and administrations we devour today. Be that as it may, is semiconductor technology an upper hand? Best Free Wordpress Themes

  12. Another model, one with which I am personally natural, are purchaser hardware new businesses. I've been related with both those that succeeded and those that fizzled. Each had novel driving edge advances. The thing that matters was opportunity. Click Speed Test