A2zNotes.com -Best Bcom BBA Bed Study Material

MBA 1st Year Network And Internet Short Questions Answers Study Notes

Q.16. Give the anatomy of an e-mail address. 

Or Explain the purpose of the following in e-mail: 1. CC, 2. BCC, 3. Forward mail.(2005-06) 

Or Distinguish between ‘CC’ and ‘BCC’ fields of address part of your e-mail. 

Ans. Anatomy of E-mail Address: To send a message to someone, you must type his or her e-mail address in the section and your e-mail message. Generally there are two parts of your e-mail address: your login identity and your ISP. These are separated by the symbol @ of a typical e-mail address for someone who uses Hotmail, e.g. look like this, yourname@hotmail.com, i.e. ritendragoel@hotmail.com, ppkumar@vsnl.net.in

In the above example, kumar is the name of the user, who has his account on vsnl.net.in server. 

Mailing Basics 

1. Recipient’s Address(To): For Internet mail, the address has the format: Mail_name@siteaddress 

An actual address as an example is


2. Sender’s Address (From): The e-mail address of the sender of the mail, normally is inserted automatically by the mail software.

3.CC (Carbon Copy): The e-mail address of any other people you want to receive the e-mail.

4. Title (or Subject): The general subject of the e-mail, and is very useful if you receive a large number of e-mails or want to store them after receipt.

5.BCC (Blind Carbon Copy): The BCC field is identical to CC field except that BCC recipients are invisible to the To and CC recipients of the message as well as To each other.

6. Body of the Message: The text of the message, with some e-mail packages, it is possible to include files in both text and binary, prior to sending these need encoding, with the same coding method being available in both the senders-e-mail package and the recipient’s. This should be checked prior to enclosing encoded files and for clarity, the encoding method should be described in the body of the message

7.Signature Files: At the end of a message, a standard file can be added which provides information about the sender. In some cases, this has been developed to almost an art form by making pictures from different printable characters.

8. Attachment. It is used to attach file with the mail.

9. Forward Mail: it means that after the mail has been ready to be forwarded, this option is used. 

MBA 1st Year Network And Internet Short Questions Answers Study Notes

Q.17. Briefly discuss different protocols available on Internet.


Or Explain the concept of protocol with the help of example.(2013-14) 

Or Briefly discuss TCP/IP protocol suite. As an essential part of TCP/IP, also explain Telnet and FTP.(2014-15)

Ans. Protocol: It is defined as a set of rules governing the exchange of data between two objects. It consists of syntax, semantics and timing. There are various protocols used in Internet among which most common are:

1. TCP/IP: It stands for Transmission Control Protocol/Internet Protocol. These protocols are linked together. The linking of several protocols is common since the functions of different protocols can be complementary so that together they carryout some complete task. The term TCP/IP is normally used to refer to a whole suite of protocols each with different functions. This is used on many LANs. TCP is the means for creating the packets putting them back together in the correct order at the end and checking to make sure that no packets got lost in transmission.

IP is the method used to route information to the proper address. Every computer (or device) on the internet has its own unique address known as the IP address.

2. Mail Protocols: E-mail requires its own set of protocols and there are the varieties for both sending and receiving the mail. The most common are: 

(a) SMTP (Simple Mail Transfer Protocol): The standard rules that many e-mail clients use to handle outgoing e-mail messages. SMTP identifies the sender itself, specifies the recipient of mail and then transfer the e-mail message. It also enables the sender to keep a copy of the mail until it is actually delivered. This enhances the reliability of message delivery. 

(b) POP3 (Post Office Protocol 3): The standard rules that many e-mail clients use to handle incoming e-mail messages. 

(c) PPP (Point to Point Protocol): This is used when the Internet is accessed using a telephone line. It is the set of rules that specify how the data will be communicated over telephone line from your computer and when the connection with your ISP has been established. This protocol is used in conjunction with SLIP.

(d) SLIP Seriall Line Internet Protocol): This protocol is used when the communication is done over a serial transmission line like the telephone line. The protocol allows the user to use Gul based web browsers like Netscape and MS Internet Explorer. ISP use the PPP and SLIP accounts to enable users to view graphics on the Internet. These accounts assign IP address to your computer when the connection is established.

(e) MIME (Multi-purpose Internet Mail Extensions): A format for turning an e-mail attachment, such as a Microsoft Word file, into ASCII text so that it can be sent mom another: 

E-mail clients built on standards like SMTP and POP3 can share information with each other, so we don’t need to use the same e-mail client. To set-up your e-mail client, you may need to know your SMTP server address and your POP3 server address. If so, your Internet service provider can give you this information. Some e-mail clients use programs called wizards to help you get set-up. 

3. HTTP (Hyper Text Transfer Protocol): Webpages are constructed according to a standard method called HTML (Hyper Text Markup Language). An HTML page is transmitted over the web in a standard way and format known as hyper text transfer protocol. This protocol uses TCP/IP to manage the web transmission. A webpage using this protocol will have https: at the front of the URL.

4. FTP (File Transfer Protocol): This is both a program and the method used to transfer files between computers. Anonymous FTP is an option that allows users to transfer files from thousands of host computers on the Internet to their personal computer account. FTP sites contain books, articles, software, games, images, sounds, multimedia, course work, data sets and more.

If your computer is directly connected to the Internet via an Ethernet cable, you can use one of several PC software programs, such as WS_FTP for Windows, to conduct a file transfer.

5. Telnet: Refer to Section-C, Q.6. 

Q.18. Write the various steps needed to develop a corporate website.(2005-06, 06-07) 

Or What are the precautions one should take while developing a website? 

Ans. The steps needed to develop a corporate website are:

1. Feasibility Study: This is the initial step for developing a website. In this step, we find out all possible solutions to develop particular website project. All these solutions are checked on these points.

(a) Technical feasibility. 

(b) Economic feasibility. 

(c) Time required to develop. 

(d) Manpower. On the basis of these aspects, a unique solution is chosen from various solutions.

2. Requirements Analysis: The basic requirements include hardware requirements, software requirements, money, manpower, etc. one has to fulfil all these requirements and analyse the solution.

3. Design: Documents are developed using the instructions called algorithms. Then, flowcharts are developed and at least data flow diagram is also developed.

4. Coding: This is the phase in which DFD is implemented into an appropriate language like HTML, XML, VB script. In this phase, a platform is selected in which you can develop a project.

5. Testing: The project developed must produce the required result. The types of testing include unit testing, integration testing, system testing.

6. Maintenance: This is the last step for developing a website. In this phase, projects are implemented on client side and if there comes any error, then it requires maintenance.

So, while developing a website one should follow the above steps in a concise and sequential manner.

Leave a Comment

Your email address will not be published.