Match List I with List II   List I   List II   (Description)   (Appropriate Technical Term) A. Authoring language used to create documents to be viewed on the World Wide Web I. Browser B. Computer that responds to requests to provide information and services over the Internet II. HTTP C. Defines how messages are transmitted and formatted over the Internet III. HTML D. Software that enables users to access/view documents and other resources on the Internet IV. Internet server Choose the correct answer from the options given below:

Match List I with List II   List I   List II   (Description)   (Appropriate Technical Term) A. Authoring language used to create documents to be viewed on the World Wide Web I. Browser B. Computer that responds to requests to provide information and services over the Internet II. HTTP C. Defines how messages are transmitted and formatted over the Internet III. HTML D. Software that enables users to access/view documents and other resources on the Internet IV. Internet server Choose the correct answer from the options given below: Correct Answer <span style="">(A) ‐ (III), (B) ‐ (IV), (C) ‐ (II), (D) ‐ (I)</span>

Key Points 

Appropriate Technical Term

Description

HTML
  • HTML is an acronym that stands for HyperText Markup Language which is used for creating web pages and web applications. 
  • HyperText is a way to link two or more web pages (HTML documents) with each other.
  • Hence it is used to create documents to be viewed on the World Wide Web
Internet server
  • A web or internet server offers web pages or other content to the web browser by loading the information from a disc and transferring files by using a network to the user's web or internet browser.
  • It is used by a computer or collection of computers to provide content to several users over the internet. This exchange was done with the help of HTTP communication between the browser and the server.
  • This allows computer responds to requests to provide information and services over the Internet
HTTP
  • It stands for The Hypertext Transfer Protocol (HTTP).
  • It is the data communication protocol used to establish communication between client and server.
  • it Defines how messages are transmitted and formatted over the Internet
Browser
  • Browser is a software program that is used to explore, retrieve, and display the information available on the World Wide Web.
  • This information may be in the form of pictures, web pages, videos, and other files that all are connected via hyperlinks and categorized with the help of URLs (Uniform Resource Identifiers)
  • it enables users to access/view documents and other resources on the Internet

Thus we conclude that the correct matching code is (A) ‐ (III), (B) ‐ (IV), (C) ‐ (II), (D) ‐ (I)

Related Questions

You are the administrator of a SQL Server 2000 computer. Your company uses the server to store service contract information for its customers. You are also the administrator of an Oracle relational database management system (RDBMS) server. This server is used to store your company's financial information. The financial information is updated frequently throughout the day.You need to create a series of reports that combine the service contract information and the financial information. These reports will be updated several times a day.You want to create these reports on the SQL Server computer by using the minimum amount of disk space. What should you do?
What is invoked via HTTP on the Web server computer when it responds to requests from a user's Web browser?
In the question below, are given a statement followed by three courses of actions numbered I, II and III. On the basis of the information given, you have to assume everything in the statement to be true, and then decide which of the suggested course of action logically follow (s) for pursuing. Statement: The India Risk Survey 2017 report ranks 'Information & Cyber Insecurity' as the biggest risk facing Indian companies. Indian organizations, both public and private, had witnessed over 27,000 incidents of security threat, from January 2017 till June 2017 alone. Phishing, scanning/probing, website intrusions and defacements, virus/malicious code, ransomware, Denial of Service attacks, and data breaches are some ways in which hackers attack business websites, which can cause operational disruptions and potentially steal sensitive information. Small and medium businesses (SMBs), unfortunately, have been seeing rising incidences of cybercrime. In fact, 70 percent of cyberattacks occur at organizations with lesser than 100 employees  Courses of action: I. Mandate basic security practices and policies for all employees, such as 2-factor authentication, internet use guidelines and create and enforce rules on handling and protecting sensitive data. Conduct frequent training to sensitize employees about opening suspicious emails, encrypting their data, using strong passwords on their devices, installing security apps, and limiting activity over public Wi-Fi. Implement and enforce incident reporting to help ensure that even the smallest breach is report to management as well as the IT teams. II. Basics still matter and are some of the best defenses against viruses, malware, and other online threats. Assess the assets that are most at risk - data, servers, network - and ensure that the systems are updated with the latest security software, web browser, and operating system. Implement firewall security and run antivirus software after each update.  III. Ensure regular backup of all critical data - whether stored in-house or on the cloud. Run scheduled attack drills and stress tests to identify vulnerabilities and ensure that data restoration and business continuity are executed as planned.