Iwt Solution Sheet Set - B
Iwt Solution Sheet Set - B
E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
SECTION-A
UNIT-2
Components of a URL
1. Protocol: Indicates the method used to retrieve the resource.
Common protocols include http, https, ftp, and mailto.
o Example: https
2. Domain Name: The main part of the URL that identifies the
website. It often includes a top-level domain (TLD) like .com, .org, or
.net.
o Example: www.example.com
UNIT-3
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
Ans:
<html>
<head>
<title>Color Tags Example</title>
</head>
<body>
</body>
</html>
UNIT-4
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
Variable Names: firstName and firstname would be considered two
different variables in JavaScript.
Function Names: myFunction and MyFunction are treated as
distinct functions.
Keywords: The keyword if must always be in lowercase; writing it
as If would result in an error because JavaScript wouldn't recognize
it as the same command.
In essence, in JavaScript, every character, including its case, is important
and must be used consistently to ensure that the code functions correctly.
UNIT-5
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
6. Encryption:
o Protects data in transit and at rest by converting it into a
coded format that can only be read by authorized parties.
7. Network Segmentation:
o Divides a network into smaller segments to limit the spread of
potential attacks and make it easier to manage security.
8. Security Policies:
o Define the protocols for maintaining network security,
including guidelines for user behavior, access levels, and
response to security incidents.
Importance of Network Security:
Protects Sensitive Data: Ensures that personal, financial, and
confidential information remains secure.
Maintains System Integrity: Prevents unauthorized access and
potential system disruptions.
Compliance: Helps organizations meet regulatory requirements
and avoid legal issues.
Trust and Reputation: Builds trust with customers and partners
by demonstrating a commitment to security.
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
o Only download apps from official app stores (Google Play
Store, Apple App Store) to reduce the risk of installing
malicious apps.
7. Use a VPN:
o When using public Wi-Fi, connect through a Virtual Private
Network (VPN) to secure your internet connection and protect
your data from hackers.
8. Enable Two-Factor Authentication (2FA):
o Add an extra layer of security to your accounts by enabling
two-factor authentication, requiring a second form of
verification.
9. Back Up Your Data:
o Regularly back up your data to a secure cloud service or
external storage to prevent data loss in case of a security
breach.
10. Be Aware of Phishing Scams:
o Be cautious of suspicious emails, messages, and links. Verify
the source before clicking on any links or providing personal
information.
11. Disable Unnecessary Features:
o Turn off Bluetooth, NFC, and location services when not in use
to prevent unauthorized access.
12. Monitor Your Accounts and Device:
o Regularly check your accounts and device for unusual activity
or unauthorized access.
Section-B
Unit-1
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
Ans: Telephone lines have played a significant role in providing internet
connectivity, especially in the early days of the internet. Here’s how they
function:
Dial-Up Internet
Connection: Dial-up internet uses a telephone line to connect to an
Internet Service Provider (ISP). The user’s computer or modem dials
a phone number provided by the ISP to establish a connection.
Speed: Typically slow, with speeds ranging from 56 kbps. It is
adequate for basic web browsing and email but not suitable for
high-bandwidth activities like streaming or online gaming.
Availability: One of the earliest forms of internet access, available
in most areas with phone lines.
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
3. Data Encoding and Presentation: Manages how data is
presented to ensure that the information is understood across
different systems (e.g., text, graphics, audio).
4. Session Management: Establishes, manages, and terminates
sessions between applications on different devices.
Examples of Application Layer Protocols:
HTTP (HyperText Transfer Protocol): Used for transmitting web
pages over the internet.
FTP (File Transfer Protocol): Used for transferring files between
computers.
SMTP (Simple Mail Transfer Protocol): Used for sending emails.
DNS (Domain Name System): Translates domain names into IP
addresses.
Role in Networking:
The Application Layer enables users and applications to
communicate with each other, providing essential services and
protocols for data exchange.
It ensures that the data is correctly formatted and presented so that
different applications can understand and use it effectively.
Unit-2
Q-2: What is the search Engine? Explain it’s working and list down some
search engines
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
Ans: A search engine is an online tool that helps users find information on
the internet. It does this by crawling, indexing, and ranking web pages so
that relevant content can be quickly retrieved in response to user queries.
Popular search engines include Google, Bing, Yahoo, and many others.
1. Crawling:
o Purpose: The search engine sends out automated programs
called spiders or crawlers to explore the internet and collect
data from web pages.
o Process: These crawlers follow links from one page to
another, gathering information about the content on each
page.
2. Indexing:
o Purpose: Organizing the data collected by crawlers into a
searchable index.
o Process: The gathered data is stored in massive databases.
Each page's content is analyzed and categorized based on
keywords, metadata, and other factors.
3. Ranking:
o Purpose: Determining the order in which search results are
presented to the user.
o Process: When a user enters a query, the search engine uses
complex algorithms to rank pages based on relevance,
quality, and other criteria. Factors include keyword presence,
page authority, user engagement, and more.
4. Retrieving Results:
o Purpose: Delivering relevant search results to the user.
o Process: The search engine displays a list of web pages that
best match the user's query, often accompanied by snippets
of text to give context.
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
4. DuckDuckGo
o Known for its focus on user privacy, it does not track users
and provides a straightforward search experience.
5. Baidu
o The leading search engine in China, offering search services,
multimedia content, and various other features.
6. Yandex
o The most popular search engine in Russia, providing a range
of services including search, maps, and email.
UNIT-3
1. <!DOCTYPE html>:
o Declares the document type and HTML version.
o Ensures the browser correctly interprets the HTML code.
2. <html>:
o The root element that contains all other HTML elements.
o Encloses the entire HTML document.
3. <head>:
o Contains meta-information about the document, such as the
title, character set, and links to external resources (like
stylesheets and scripts).
o Typical elements within the <head> include:
<title>: Specifies the title of the webpage.
<meta>: Provides metadata like character set and
viewport settings.
<link>: Links to external stylesheets.
<script>: Embeds or links to JavaScript files.
4. <body>:
o Contains the visible content of the webpage.
o The main container for text, images, links, tables, and other
media.
o Typical elements within the <body> include:
<header>: Defines the header section of the page,
usually containing the logo and navigation.
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
<nav>: Contains navigation links.
<main>: Specifies the main content of the document.
<section>: Defines a section in the document, used to
group related content.
<article>: Represents a self-contained piece of
content, such as a blog post.
<aside>: Contains content indirectly related to the
main content, like sidebars.
<footer>: Defines the footer of the document, usually
containing copyright and contact information.
UNIT-5
1. Confidentiality:
o Prevents unauthorized users from reading the email content.
o Ensures that sensitive information is protected from
eavesdropping.
2. Integrity:
o Ensures that the message has not been altered during transit.
o Provides a way to verify that the email content is complete
and untampered.
3. Authentication:
o Verifies the identity of the sender.
o Ensures that the recipient is communicating with the intended
party.
1. Encryption Algorithms:
o Uses cryptographic algorithms to convert plaintext into
ciphertext.
o Common algorithms include AES (Advanced Encryption
Standard), RSA (Rivest-Shamir-Adleman), and others.
2. Public Key Infrastructure (PKI):
o Utilizes a pair of keys: a public key and a private key.
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
o The public key encrypts the email, and the private key
decrypts it.
o Only the recipient with the corresponding private key can
decrypt and read the email.
3. Digital Signatures:
o Adds a digital signature to the email to verify the sender's
identity.
o Ensures the authenticity and integrity of the message.
4. End-to-End Encryption:
o Encrypts the email content from the sender to the recipient
without any intermediaries having access to the plaintext.
o Ensures complete privacy throughout the email’s journey.
1. Packet Filtering:
o Firewalls inspect packets of data as they travel between the
network and the internet.
o They check the packet’s source and destination IP addresses,
port numbers, and protocols against a set of security rules.
o Based on these rules, the firewall decides whether to allow or
block the packet.
2. Stateful Inspection:
o Beyond packet filtering, stateful inspection firewalls track the
state of active connections.
o They analyze packets within the context of the ongoing
communication, ensuring that only legitimate packets related
to an established connection are allowed through.
3. Proxy Services:
o Proxy firewalls act as intermediaries between users and the
internet.
o They fetch the requested content on behalf of the user and
then deliver it, hiding the internal network’s IP addresses and
adding a layer of security.
4. Network Address Translation (NAT):
o NAT firewalls mask the internal IP addresses by translating
them into a single external IP address.
o This process hides the internal network structure from the
outside world, enhancing security.
5. Application Layer Filtering:
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
o Advanced firewalls can inspect data at the application layer.
o They examine the data content of packets to detect and block
malicious activity, such as viruses or unauthorized access
attempts.
SECTION-B
UNIT-1
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
o Function: Uses existing telephone lines to provide high-speed
internet access.
o Speed: Faster than dial-up, with speeds ranging from a few
Mbps to over 100 Mbps.
o Usage: Popular for residential and small business internet
connections.
o Types: ADSL (Asymmetric DSL), VDSL (Very High Bitrate DSL),
SDSL (Symmetric DSL).
3. Cable Modems:
o Function: Uses cable television lines to provide internet
access.
o Speed: Generally faster than DSL, with speeds ranging from
tens to hundreds of Mbps.
o Usage: Common in residential areas with cable TV service.
4. Fiber Optic Modems:
o Function: Uses fiber-optic cables to provide internet access.
o Speed: Extremely high-speed, often exceeding 1 Gbps.
o Usage: Increasingly common in urban areas, providing high-
speed internet to homes and businesses.
5. Satellite Modems:
o Function: Uses satellite technology to provide internet
access.
o Speed: Variable, typically slower than fiber and cable but
faster than dial-up.
o Usage: Useful in remote or rural areas where other forms of
internet access are unavailable.
6. Wireless Modems:
o Function: Uses cellular networks to provide internet access.
o Speed: Comparable to 4G or 5G cellular data speeds.
o Usage: Provides internet access on-the-go, often used in
mobile hotspots or USB dongles.
UNIT-2
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
o Description: These pages display the same content to every
visitor. They are fixed and do not change unless manually
updated by the webmaster.
o Usage: Suitable for small websites with content that doesn’t
need frequent updates, such as personal blogs, portfolios, or
small business websites.
o Pros: Easy to create and load quickly.
o Cons: Limited interactivity and difficult to maintain for larger
sites.
2. Dynamic Web Pages:
o Description: These pages generate content on-the-fly based
on user interactions or other variables. They can display
different content for different users or at different times.
o Usage: Commonly used in social media platforms, e-
commerce sites, and news websites where content needs to
be frequently updated.
o Pros: Highly interactive and customizable.
o Cons: More complex to develop and can be slower to load.
3. Responsive Web Pages:
o Description: Designed to adapt to different screen sizes and
devices. They provide an optimal viewing experience on
desktops, tablets, and smartphones.
o Usage: Essential for modern websites as more users access
the web on mobile devices.
o Pros: Enhances user experience across all devices.
o Cons: Requires careful design and testing to ensure
compatibility.
4. Landing Pages:
o Description: Standalone web pages created for a specific
marketing or advertising campaign. They are designed to
capture leads or prompt users to take a specific action.
o Usage: Used in online marketing campaigns, product
launches, and promotions.
o Pros: Highly focused content tailored to specific goals.
o Cons: May need frequent updates and testing to optimize
conversion rates.
5. Home Pages:
o Description: The main page of a website, serving as the
gateway to the rest of the site’s content. It often contains
navigation menus, links to key sections, and an overview of
what the site offers.
o Usage: Found on all types of websites, from corporate sites to
blogs.
o Pros: Provides a comprehensive overview and easy
navigation.
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
o Cons: Needs to be well-organized to avoid overwhelming
visitors.
6. Portal Pages:
o Description: Aggregates content from various sources,
offering a centralized point for users to access different
services and information.
o Usage: Common in intranets, educational websites, and news
sites.
o Pros: Provides easy access to a wide range of resources.
o Cons: Can be cluttered and complex to navigate if not well-
organized.
7. Blogs:
o Description: Web pages that are regularly updated with
articles, also known as posts. They typically display content in
reverse chronological order.
o Usage: Used by individuals, companies, and organizations to
share news, opinions, and updates.
o Pros: Engages readers with fresh content and fosters
community interaction.
o Cons: Requires regular updates and quality content to retain
readers.
8. E-commerce Pages:
o Description: Pages designed for selling products or services
online. They include product listings, shopping carts, and
payment processing features.
o Usage: Used by online retailers and businesses to conduct
sales over the internet.
o Pros: Facilitates online shopping and business transactions.
o Cons: Requires secure payment processing and inventory
management.
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
2. Request-Response Model:
o HTTP operates on a request-response model, where the client
initiates requests and the server responds. This model is
stateless, meaning each request from the client to the server
is independent of previous requests.
3. Resource Access:
o HTTP is used to request and transmit web resources, such as
HTML documents, images, videos, and other multimedia files.
It facilitates the retrieval of these resources from the server to
the client.
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
3xx (Redirection): Further action needs to be taken to
complete the request (e.g., 301 Moved Permanently).
4xx (Client Error): Client-side error (e.g., 404 Not
Found).
5xx (Server Error): Server-side error (e.g., 500
Internal Server Error).
Security in HTTP:
HTTPS: Secure version of HTTP that uses SSL/TLS encryption to
protect data transmitted between the client and server. It ensures
confidentiality, integrity, and authenticity of the data.
Advantages:
o Protects sensitive information from eavesdropping.
o Prevents data tampering during transmission.
o Verifies the identity of the server, ensuring that users are
connecting to the intended website.
Importance of HTTP:
1. Web Browsing:
o HTTP is the backbone of web browsing, allowing users to
access and navigate web pages seamlessly.
2. Data Exchange:
o Facilitates the exchange of data between clients and servers,
enabling various online activities such as shopping, social
networking, and content consumption.
3. Interoperability:
o Ensures that web resources are accessible across different
browsers, devices, and platforms, promoting a consistent user
experience.
UNIT-3
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
oUses tags to "mark up" text, defining its role and format on
the webpage. These tags are enclosed in angle brackets (e.g.,
<tagname>).
2. Structure and Layout:
o Defines the structure of a webpage, organizing content into
elements such as headings, paragraphs, lists, links, images,
and multimedia.
3. Hypertext:
o Allows linking to other documents or resources, enabling the
creation of a web of interconnected pages.
4. Platform-Independent:
o Can be used on any device and operating system that
supports a web browser, making it universally accessible.
<html>
<head>
<title>Page Title</title>
<meta charset="UTF-8">
<meta name="viewport" content="width=device-width, initial-scale=1.0">
<link rel="stylesheet" href="styles.css">
</head>
<body>
<header>
<h1>Welcome to My Website</h1>
<nav>
<ul>
<li><a href="#home">Home</a></li>
<li><a href="#about">About</a></li>
<li><a href="#contact">Contact</a></li>
</ul>
</nav>
</header>
<main>
<section>
<h2>Main Content</h2>
<p>This is where the main content goes.</p>
</section>
</main>
<aside>
<h3>Related Links</h3>
<p>Additional content related to the main content.</p>
</aside>
<footer>
<p>© 2024 My Website</p>
</footer>
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
</body>
</html>
1. <!DOCTYPE html>:
o Declares the document type and version of HTML being used.
This helps browsers interpret the content correctly.
2. <html>:
o The root element that contains all other HTML elements,
representing the entire HTML document.
3. <head>:
o Contains meta-information about the document, such as the
title, character set, and links to external resources like
stylesheets and scripts.
4. <title>:
o Specifies the title of the webpage, displayed on the browser
tab.
5. <meta>:
o Provides metadata about the HTML document. The charset
attribute sets the character encoding, and the viewport
attribute ensures the page is responsive.
6. <link>:
o Links to an external stylesheet, allowing for the separation of
content (HTML) and presentation (CSS).
7. <body>:
o Contains the visible content of the webpage, including text,
images, links, and other elements.
8. <header>:
o Defines the header section, usually containing a logo,
navigation menu, and introductory content.
9. <nav>:
o Contains the navigation links, providing a way to navigate
through different sections of the site.
10. <main>:
o Specifies the main content area of the document, where the
primary information is displayed.
11. <section>:
o Groups related content together within the main content area.
12. <aside>:
o Contains content indirectly related to the main content, such
as sidebars or additional links.
13. <footer>:
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
o Defines the footer section, typically containing copyright
information, contact details, and related links.
UNIT-5
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
o Prevention: Use strong passwords, enable two-factor
authentication, and encrypt sensitive data.
4. Unsecured Wi-Fi Networks:
o Description: Public Wi-Fi networks that are not secure,
allowing attackers to intercept data transmitted over the
network.
o Examples: Man-in-the-middle attacks, eavesdropping.
o Prevention: Use VPNs (Virtual Private Networks) when
connecting to public Wi-Fi, avoid accessing sensitive
information on unsecured networks.
5. Malicious Applications:
o Description: Apps that appear legitimate but contain
malicious code designed to steal data or harm the device.
o Examples: Fake banking apps, spyware-infected apps.
o Prevention: Download apps only from official app stores,
check app permissions, and read user reviews before
installing.
6. Outdated Software:
o Description: Using outdated operating systems and apps
that contain known vulnerabilities.
o Examples: Exploits targeting old versions of Android or iOS.
o Prevention: Regularly update the operating system and apps
to the latest versions.
7. SIM Hijacking:
o Description: Attackers gain control of a user's SIM card to
intercept messages and calls, potentially leading to account
takeovers.
o Examples: Fraudulent phone number porting.
o Prevention: Enable SIM card lock, use strong passwords, and
monitor account activity.
8. Cryptojacking:
o Description: Unauthorized use of a device's resources to
mine cryptocurrency.
o Examples: Malicious websites or apps that secretly mine
cryptocurrency using the device's CPU.
o Prevention: Install ad blockers, avoid suspicious websites,
and monitor device performance.
By ritambhara | By Ritambhara
Diploma C.S.E 2024-2025
Subject: IWT
Subject-code: DICS-330
Solution sheet
Ans:
By ritambhara | By Ritambhara