Tuesday, November 18, 2008

Question PaperClient Server Application Development (MC231) : October 2006


Section A : Basic Concepts (30 Marks)
1. Which of the following statements regarding client-server computing are true?
(a) Client Server computing can be divided into three components, a Client process, a server process and a Middleware in between them for their interaction
(b) The Client server environment is typically homogeneous and single-vendor. The hardware flat form and operating system of Client and Server are usually the same
(c) Database, transaction servers are more advanced and sophisticated types of servers than disk and file servers
(d) Clint-server computing is merely a transitional phase in the larger trend towards fully distributed computing
(e) Reduce operation and maintenance cost to a Server computing in business stream.
2. A client device designed so that most processing and data storage occurs on the client side describes
(a) Thin Client (b) Fat Client (c) Passive Client (d) Active Client (e) Application Client.
3. A built-in Object Transaction Monitor was introduced by
(a) NT 3.5 (b) UNIX (c) NT 5.0 (d) NT.4.0 (e) LINUX.
4. Microsoft Windows NT 2.1 socket interface defines
(a) A connectionless service (b) A reliable connection-oriented service (c) Direct access to lower-level protocols (d) Serial Access to lower-protocols
(e) Proxy connection.
5. Which of the following is used to protect the private intranets from the Internet hordes?
(a) By Encryption (b) By Digital Certificate (c) By Proxy Server (d) By Authentication
(e) By Firewalls.
6. The IPX network number is
(a) 4 bits (b) 8 bits (c) 32 bits (d) 16 bits (e) 2 bits.
7. Which is the protocol that provides a consistent naming schema to identify all web resources?
(a) United Resource Locator (b) Unified Resource Location (c) Unified Resource Locator
(d) Unified Read Locator (e) Unified Range Locator.
8. Firewall that tracks packet state is
(a) Network Layer (b) Application layer (c) Stateful (d) Stateless (e) Session layer.
9. The principle of serial equivalence for distributed transactions says that
(a) When several transactions are executed concurrently, the result should be the same as if they had been executed in sequence.
(b) Concurrent transactions should always be executed in sequence
(c) Sequential transactions should never be executed concurrently, because of the dangers of lost updates.
(d) Concurrent transactions should be atomic
(e) Concurrent transaction should be non-atomic.
10. In nested transactions, if the parent transaction issues the rollback, then it’s descendent is
(a) All are committed if they issue commit
(b) Some are committed and some are roll backed
(c) All are roll backed regardless of whether they issue any one
(d) All are roll backed if they issue rollback
(e) All are roll backed if they issue commit.
11. PC infrastructure is implemented in
(a) CORBA (b) COM (c) DCE (d) DCOM (e) RMI.
12. Which of the following is the HTTP request method?
(a) From (b) To (c) GET (d) PUT (e) STOP.
13. During the design of the web based form, which of the following property of the tag lets us specify the input field?
(a) Name (b) Type (c) Value (d) Field (e) Position.
14. A component which is able to understand the vocabulary of the particular suites and domain-specific extensions is called
(a) Versioning (b) Semantic messaging (c) Relationships (d) Persistence (e) Symmetric Messaging.
15. Which of the following tag is used to create a ordered list in a web page?
(a)

    (b)
  • (c) (d) (e)
      16. CSS is used to describe the presentation of a document written in
      (a) COBOL (b) C (c) XHTML (d) C++ (e) Java.
      17. Which of the following is used to interoperate the client and server objects written in different languages?
      (a) Interface Definition language (b) Object Request Broker (c) Application Program Interface (d) Web Application Server (e) DBMS.
      18. In 3-tier client/server applications, the business logic lies at
      (a) The client (b) The Database Server (c) Divided between client and server alternatively (d) Middle Tier (e) Not anywhere.
      19. Which of the following is an extended service provided by the operating system?
      (a) Semaphores (b) Threads (c) Database and transaction services (d) Task Preemption (e) Monitors.
      20. Which among the following uses CORBA as their standard IDL-defined interface into the object highway?
      (a) Bell AT&T (b) Microsoft (c) Apple (d) Sun Solaris (e) IBM.
      21. OTM is
      (a) Morph in between CORBA and ORB
      (b) Morph in between TP monitor and ORB
      (c) Morph in between client side components and ORB
      (d) Morph in between TP monitor and client side components
      (e) Morph in between TP and CORBA.
      22. The CORBA standard is created and controlled by
      (a) ANSI (b) W3C (c) OMG (d) Sun Microsystems (e) RPC.
      23. The software mechanism that links documents to other related on the same machine or across networks is
      (a) Hypertext (b) Hypercube (c) Web text (d) Web document (e) Cipher text
      24. In CORBA 3-tier Client-Server architecture, the middle tier represents
      (a) View Objects (b) Server Objects (c) Legacy Applications (d) Client Objects (e) NNTP. 25. A scalable system can be altered to accommodate changes in the amount of
      I. Users.
      II. Resources.
      III. Computing entities.
      (a) Only (I) above
      (b) Only (II) above.
      (c) Both (I) and (II) above
      (d) Both (II) and (III) above
      (e) All (I), (II) and (III) above.
      26. What is XATMI?
      (a) Remote procedure call interface
      (b) Peer-to-peer conversational interface
      (c) Message-oriented interface
      (d) Process-oriented interface
      (e) System-Oriented Interface.
      27. Which of the following is a plain ASCII text file with embedded HTML commands?
      (a) Transaction document (b) Web document (c) Action document (d) Turnaround document (e) Web Server.
      28. Which of the following provides the total control of the layout and formatting of HTML documents?
      (a) Controlling Style Sheets (b) Customizing style Sheets (c) Cascading Spread Sheets
      (d) Cascading Separate Sheets (e) Cascading Style Sheets.
      29. The technology for multimedia document management comes from
      (a) Electronic document imaging systems (b) Office automation (c) Scheduling management
      (d) Application management (e) Program Management.
      30. If some unusual event occurs from a managed system to a managing station, which among the following notification is used?
      (a) GET-NEXT (b) SET (c) GET (d) TRAP (e) PUT.
      Section B : Problems (50 Marks)
      1.
      a. What is Message-Oriented Middleware and explain with a neat sketch?
      b. What is Internet work packet exchange protocol (IPX)? (5 + 5 = 10 marks)
      2. What do you understand about HTML’s web based forms? (10 marks)
      3.
      a. How is asymmetric multiprocessing different from symmetric multiprocessing?
      b. Describe the anatomy of the client/server model. (5 + 5 = 10 marks)
      4. What are distributed objects? Describe COM, COM+ and CORBA. (10 marks)
      5. Describe the Internet mail protocols and explain in detail. (10 marks)
      Section C : Applied Theory (20 Marks)
      6. Describe the anatomy of a 3-tier client/server application. Also mention the design of a 3-tier application with any of the popular technologies? (10 marks) 7.
      a. What are all the Base services and extended services provided by the OS?
      b. Compare Windows and Linux operating systems. (5 + 5 = 10 marks)
      Suggested Answers
      1.
      Answer : (b)
      Reason: The Client server environment is typically homogeneous and single-vendor. The hardware flat form and operating system of Client and Server are usually the same is a true statement.
      2.
      Answer : (b)
      Reason: Fat Client is designed in such a way that most processing and data storage occurs on the client side.
      3.
      Answer : (c)
      Reason: A built-in Object Transaction Monitor called MTS was introduced by NT 5.0.
      4.
      Answer : (b)
      Reason: NT 2.1 socket interface defines a reliable connection-oriented service.
      5.
      Answer : (e)
      Reason: Firewalls is used to protect the private intranets from the Internet hordes.
      6.
      Answer : (c)
      Reason: The IPX network number is 32 bits long.
      7.
      Answer : (c)
      Reason: Unified Resource Locator is the protocol that provides a consistent naming schema to identify all web resources.
      8.
      Answer : (c)
      Reason: Firewall that tracks packet state is state full.
      9.
      Answer : (a)
      Reason: The principle of serial equivalence for distributed transactions says that when several transactions are executed concurrently, the result should be the same as if they had been executed in sequence.
      10.
      Answer : (c)
      Reason: In nested transactions, if the parent transaction issues the rollback, its descendent all are roll backed regardless of whether they issue any one.
      11.
      Answer : (c)
      Reason: PC infrastructure is implemented in DCE.
      12.
      Answer : (c)
      Reason: GET is the HTTP request method.
      13.
      Answer : (b)
      Reason: During the design of the web based form, the Type property of the tag lets us specify the input field.
      14.
      Answer : (b)
      Reason: A component which is able to understand the vocabulary of the particular suites and domain-specific extensions is called Semantic messaging.
      15.
      Answer : (e)
      Reason: tag is used to create a ordered list in a web page.
      16.
      Answer : (c)
      Reason: CSS used to describe the presentation of a document written in XHTML.
      17.
      Answer : (a)
      Reason: IDL is used to interoperate the client and server objects written in different languages.
      18.
      Answer : (d)
      Reason: In 3-tier client/server applications, the business logic lies at Middle Tier.
      19.
      Answer : (c)
      Reason: Data base and transaction services are an extended service provided by the operating system.
      20.
      Answer : (e)
      Reason: IBM uses CORBA as their standard IDL-defined interface into the object highway.
      21.
      Answer : (b)
      Reason: OTM stands for Morph in between TP monitor and ORB.
      22.
      Answer : (c)
      Reason: The CORBA standard is created and controlled by OMG.
      23.
      Answer : (a)
      Reason: Hypertext is a software mechanism that links documents to other related on the same machine or across networks.
      24.
      Answer : (b)
      Reason: In CORBA 3-tier Client-Server architecture, the middle tier represents Server objects
      25.
      Answer : (d)
      Reason: A scalable system can be altered to accommodate changes in the amount of users, resources, computing entities.
      26.
      Answer : (c)
      Reason: XATMI is a Message-oriented interface.
      27.
      Answer : (b)
      Reason: Web document is a plain ASCII text file with embedded HTML commands.
      28.
      Answer : (e)
      Reason: CSS provides the total control of the layout and formatting of HTML documents.
      29.
      Answer : (a)
      Reason: The technology for multimedia document management comes from Electronic document imaging systems.
      30.
      Answer : (d)
      Reason: If some unusual event occurs from a managed system to a managing station, TRAP notification is used?


No comments: