M2-R4 Web Design 2020
M2-R4 Web Design 2020
¬˝‡Ÿ-¬ÈÁSÃ∑§Ê ∑§Ê πÊ‹Ÿ ∑§ ÁŸŒ¸‡Ê Á◊‹Ÿ ∑§ ¬‡øÊØ ∞fl¥ ©ûÊ⁄U Á‹πŸÊ After receiving the instruction to open the booklet and
•Ê⁄Uê÷ ∑§⁄UŸ ‚ ¬„‹ ©ê◊ËŒflÊ⁄U ¡Ê°ø ∑§⁄U ÿ„ ‚ÈÁŸÁ‡øÃ ∑§⁄U ‹¥ Á∑§ before starting to answer the questions, the candidate should
¬˝‡Ÿ-¬ÈÁSÃ∑§Ê ¬˝àÿ∑§ ŒÎÁc≈U ‚ ‚¥¬Íáʸ „Ò– ensure that the Question Booklet is complete in all respect.
ŸÊ≈U — ÿÁŒ Á„ãŒË ‚¥S∑§⁄UáÊ ◊¥ ∑§Ê߸ òÊÈÁ≈U/Áfl‚¥ªÁà ¬Ê߸ ¡ÊÃË „Ò, ÃÊ ©‚ •flSÕÊ ◊¥ •¥ª¡
˝ Ë ‚¥S∑§⁄UáÊ „Ë ◊Êãÿ „ʪʖ
Note : In case of any discrepancy found in Hindi version, English version will be treated as final.
1. ŸËø ¬˝àÿ∑§ ¬˝‡Ÿ ∑§ ©ûÊ⁄UÊ¥ ∑§ ∑§ß¸ Áfl∑§À¬ ÁŒÿ (A) Áfl¥«UÊ.∑Ò§åø⁄ Ußfl¥≈˜U‚ (Event.CLICK);
ª∞ „Ò¥– ∞∑§ ‚’‚ ©¬ÿÈÄà Áfl∑§À¬ øÈŸ¥ •ÊÒ⁄U ©‚ (B) Áfl¥«UÊ.„Ò¥«U‹ ßfl¥≈˜U‚ (Event.CLICK);
¬˝‡Ÿ ¬òÊ ∑§ ‚ÊÕ ©¬‹éœ ∑§⁄UÊ∞ ª∞ ““•Ê∞◊•Ê⁄U””
©ûÊ⁄U ¬òÊ∑§ ◊¥, ÁŒ∞ ª∞ ÁŸŒ¸‡ÊÊ¥ ∑§ •ŸÈ‚Ê⁄U Œ$¡¸ (C) Áfl¥«UÊ.L§≈U ßfl¥≈˜U‚ (Event.CLICK );
∑§⁄¥U– (1x10=10)
(D) Áfl¥«UÊ.⁄U¡ ßfl¥≈˜U‚ (Event.CLICK );
Each question below gives a multiple
choice of answers. Choose the most To set up the window to capture all Click
appropriate one and enter in the "OMR" events, we use which of the following
answer sheet supplied with the question Statement?
paper, following instructions therein.
(A) window.captureEvents
(1x10=10)
(Event.CLICK);
1.1 ¬„‹Ê ߥ≈U⁄UŸ≈U ‚ø¸ ߥ¡Ÿ ∑§ÊÒŸ ‚Ê „Ò? (B) window.handleEvents
(Event.CLICK);
(A) ªÍª‹ (B) •ÊøË¸
(C) window.routeEvents
(C) •À≈UÊÁflS≈UÊ (D) «UéÀÿÍ.∞.•Ê߸.∞‚. (Event.CLICK );
Which is the first Internet search engine?
(D) window.raiseEvents
(A) Google (B) Archie (Event.CLICK );
(C) Altavista ((D) WAIS
(B) «UéÀÿÍ.∞.∞Ÿ.
1.9 ¬˝flÊ„ ÁŸÿ¥òÊáÊ ÁŸêŸ ◊¥ ‚ Á∑§‚ ‹ÿ⁄U ¬⁄U Á∑§ÿÊ ¡ÊÃÊ
(C) ∞◊.∞.∞Ÿ. „Ò ?
(D) ©¬⁄UÊÄà ∑§Ê߸ Ÿ„Ë¥ (A) Ÿ≈Ufl∑¸§ (B) ÷ÊÒÁÃ∑§
Data communication system spanning (C) «U≈UÊ Á‹¥∑§ (D) ©¬⁄UÊÄà ∑§Ê߸ Ÿ„Ë¥
states, countries, or the whole world is
Flow Control is performed at which of the
(A) LAN following layer
(B) WAN (A) Network (B) Physical
(C) MAN (C) Data Link (D) None of the above
2.3 ∞∑§ $»§Êÿ⁄UflÊÚ‹ ‚ÊÚ$ç≈Uflÿ⁄ •ÊÒ⁄U /ÿÊ „Ê«¸Uflÿ⁄U „Ò ¡Ê 2.3 A firewall is software and/or hardware
∑¥§åÿÍ≈U⁄U ÿÊ Ÿ≈Ufl∑¸§ ∑§Ê ÉÊÈ‚¬ÒÁ∆UÿÊ¥ ‚ ’øÊÃÊ „Ò– that protects a computer or network from
intruders.
2.4 «UéÀÿÍ.∞.∞Ÿ. ∞∑§ ’«∏Ë ÷ÊÒªÊÁ‹∑§ ŒÍ⁄UË ∑§Ê ∑§fl⁄U ∑§⁄UÃÊ
„Ò, ¡Ò‚ Á∑§ ∞∑§ ⁄UÊíÿ, ∞∑§ Œ‡Ê, ÿÊ ÿ„ʰ Ã∑§ Á∑§ ¬Í⁄UË 2.4 A WAN covers a large geographic
ŒÈÁŸÿÊ– distance, such as a state, a country, or even
the entire world.
2.5 Á⁄U¬Ë≈U⁄U ∞∑§ ©¬∑§⁄UáÊ „Ò ¡Ê ∞∑§ ⁄UÁ«UÿÊ Á‚ÇŸ‹ ∑§Ê
¬˝Êåà ∑§⁄UÃÊ „Ò, ©‚ ◊¡’Íà ∑§⁄UÃÊ „Ò, •ÊÒ⁄U •ʪ ÷¡ÃÊ 2.5 A repeater is a device that receives a radio
„Ò– signal, strengthens it, and sends it on.
2.6 ∞∑§ ∑¥§åÿÍ≈U⁄U Ÿ≈Ufl∑¸§ ◊¥ ¬Ê°ø ÿÊ •Áœ∑§ ∑¥§åÿÍ≈U⁄U „ÊÃ
2.6 A computer network consists of five or
„Ò¥ ¡Ê ∞∑§ ŒÍ‚⁄U ‚ ¡È«∏ „Êà „Ò¥–
more computers connected to one another.
2.7 ∞∑§ ©ŒÊ„⁄UáÊ ÁflÁœ ÿÊ ∞∑§ ∑¥§S≈˛UÄ≈U⁄U ◊¥, ““ÿ„”” flø◊ÊŸ 2.7 In an instance method or a constructor,
flSÃÈ ∑§Ê ∞∑§ ‚¥Œ÷¸ „Ò– "this" is a reference to the current object.
2.8 ¡.•Ê⁄U.߸ flSÃȕʥ ∑§Ê Ã’ „≈UÊÃÊ „Ò ¡’ ÿ„ ÁŸœÊ¸Á⁄UÃ
2.8 The JRE deletes objects when it determines
∑§⁄UÃÊ „Ò Á∑§ ©Ÿ∑§Ê ©¬ÿʪ Ÿ„Ë¥ Á∑§ÿÊ ¡Ê ⁄U„Ê „Ò– ß‚ that they are no longer being used. This
¬˝Á∑˝§ÿÊ ∑§Ê ∑§ø⁄UÊ ‚¥ª˝„ ∑§„Ê ¡ÊÃÊ „Ò– Process is called Garbage Collection.
2.9 ∞ø≈UË∞◊∞‹ ∞∑§ ∞ã∑§ÊÁ«¥Uª S∑§Ë◊ Ÿ„Ë¥ „Ò Á¡‚∑§Ê
2.9 HTML is not an encoding scheme which
©¬ÿʪ fl’ ¬¡ ’ŸÊŸ ∑§ Á‹∞ Á∑§ÿÊ ¡ÊÃÊ „Ò–
is used to create a web page.
2.10 ∞◊.•Ê߸.∞◊.߸. ∑§Ê ¬Íáʸ M§¬ ◊À≈Uˬ⁄U¬¡ ߥ≈U⁄UŸ≈U ◊‹ 2.10 MIME stands for Multipurpose Internet
∞Ä‚≈¥U‡Êã‚ „Ò– Mail Extensions.
X Y
3.1 «U≈UÊ ∑§ …Ê¥ø ÿÊ ¬˝ÊM§¬ ∑§Ê ∑§„Ê ¡ÊÃÊ „Ò (A) ¬˝Ê≈UÊ∑§ÊÚ‹
3.2 ∞∑§ ∑¥§åÿÍ≈U⁄U •ÊÒ⁄U ∞∑§ ∑§Ë’Ê«¸U ∑§ ’Ëø ‚¥øÊ⁄U ◊¥ (B) ø∑§‚◊
‡ÊÊÁ◊‹ „Ò
3.3 ¬˝Õ◊ Ÿ≈Ufl∑¸§ (C) Á‚¥å‹ÒÒÄ‚
ÁŸÿ◊Ê¥ ∑§Ê ∞∑§ ‚≈U ¡Ê «U≈UÊ ‚¥øÊ⁄U ∑§Ê ‡ÊÊÁ‚à ∑§⁄UÃÊ
3.4 (D) ÁUU‚¥ ≈ÒUÄ‚
„Ò
3.5 ∞Ä‚≈¥UÁ‚’‹ ◊Ê∑¸§•¬ ‹Ò¥Çfl¡ (E) •⁄U¬ÊŸ≈U
∞∑§ ÿÍ •Ê⁄ U∞‹ ∑§Ê ∞Ä‚‚ ∑§⁄Uà ‚◊ÿ “«U¡ ∞⁄U⁄U
3.6 (F) ∞Ä‚ ∞◊ ∞‹
404 ” ÿÊ “ŸÊÚ≈U »§Ê©¥«U ∞⁄U⁄” ∑§Ê •Õ¸U „Ò
òÊÈÁ≈U ∑§Ê ¬ÃÊ ‹ªÊŸ flÊ‹ ∑§Ê«U ∑§Ë ¡Ê¥ø ∑§⁄UŸ ∑§
3.7 (G) •Ÿ⁄UËøfl‹ URL
Á‹∞ Á’≈˜U‚ ¬⁄U ‚ï◊ ‚ê◊‚Ÿ •ÊÚ¬⁄U‡ÊŸ Á∑§ÿÊ ¡ÊÃÊ „Ò
3.8 ¬̋Á·Ã Á∑§∞ ¡ÊŸ flÊ‹ «U≈UÊ ∑§ é‹ÊÚ∑§ ◊¥ $»§ËÀ«U ∑§ (H) »̋§◊ ø∑§ ‚ËÄfl¥‚
M§¬ ◊¥ ‡ÊÊÁ◊‹ òÊÈÁ≈U ∑§Ê ¬ÃÊ ‹ªÊŸ flÊ‹ ∑§Ê«U ∑§Ê
__________ ∑§ M§¬ ◊¥ ¡ÊŸÊ ¡ÊÃÊ „Ò
X Y
4.2 ∞∑§ ________ ÁŸÿ◊ ∑§Ê ©¬ÿʪ ∞∑§ „Ë ∞ê’«U«U S≈UÊß‹ ‡ÊË≈U ◊¥ ∑§ß¸ ◊ËÁ«UÿÊ ¬˝∑§Ê⁄UÊ¥ ∑§ Á‹∞ ‡ÊÒ‹Ë ÁŸÿ◊Ê¥ ∑§Ê
¬Á⁄U÷ÊÁ·Ã ∑§⁄UŸ ∑§ Á‹∞ Á∑§ÿÊ ¡Ê ‚∑§ÃÊ „Ò–
4.3 ‡ÊÒ‹Ë ÁŸÿ◊Ê¥ •ÊÒ⁄U ◊ÍÀÿÊ¥ ∑§ fláʸ ‚≈U ∞ã∑§ÊÁ«¥Uª ∑§Ê ¬Á⁄U÷ÊÁ·Ã ∑§⁄UŸ ∑§ Á‹∞ ∞∑§ ∞∑§‹ ________ ÁŸÿ◊ ’Ê„⁄UË ‡ÊË≈U
◊¥ ©¬ÿʪ Á∑§ÿÊ ¡Ê ‚∑§ÃÊ „Ò–
4.4 ◊ÈÁŒ˝Ã ‡ÊÒÁ‹ÿÊ¥ ∑§ Á‹∞ ¬Îc∆U é‹ÊÚ∑§ ∑§Ê ¬Á⁄U÷ÊÁ·Ã ∑§⁄UŸ „ÃÈ ∞∑§ ________ ÁŸÿ◊ ∑§Ê ©¬ÿʪ Á∑§ÿÊ ¡ÊÃÊ „Ò–
4.6 ߥ≈U⁄UŸ≈U ¬⁄U ≈UË ‚Ë ¬Ë/ •Ê߸ ¬Ë ∞∑§ ________ Ÿ≈Ufl∑¸§ ◊ÊÚ«U‹ „Ò–
4.10 ÁSŸÁ»¥§ª ∑§Ê ∞Áã∑˝§å≈U«U «U≈UÊ ©¬∑§⁄UáÊ/ ‚ÊÚç≈Uflÿ⁄U mÊ⁄UÊ ¬…∏Ê ¡Ê ‚∑§ÃÊ „Ò Á¡‚∑§Ê ŸÊ◊ ________„Ò–
Page 7 SPACE FOR ROUGH WORK M2-R4-01-20
4. Each statement below has a blank space to fit one of the word(s) or phrase(s) in the list
below. Choose the most appropriate option; enter your choice in the "OMR" answer sheet
supplied with the question paper, following instructions therein. (1x10=10)
4.2 An ________ rule can be used to define style rules for multiple media types in a single embedded
style sheet.
4.3 A single ________ rule can be used in an external sheet to define character set encoding of
the style rules and values.
4.4 An ________ rule is used to define a page block for printed styles.
4.10 Encrypted data of sniffing can be read by tool/ software whose name is ________.
(b) Write HTML code to develop a web (a) List the protocols, devices and unit
page having two frames that divide of data at each of TCP/IP layers.
the page into two equal rows and
divide the first row into equal (b) What is Cryptography? Explain the
columns. Fill each of the different difference between Private Key
background color. Cryptography and Public Key
Cryptography.