Home
Current Affairs January 2024

What is the correct answer?

4

There are following statements that are given below, which of them are correct about email addresses?
a) E-mail addresses are case sensitive.
b) E-mail address contains the domain name and user name.
c) In the e-mail address, the user name and domain name are separated by the dollar symbol.
d) E-mail addresses cannot be duplicated.
Options:

A. A and B

B. B and D

C. A, B, and C

D. A, B, and D

Correct Answer :

B. B and D


Related Questions

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about FTP?
a) FTP stands for File Transmission Protocol.
b) FTP is used to transfer files between clients and servers in the network.
c) FTP is a transport layer protocol.
d) FTP works with the command line as well as a graphical user interface.
Options:

A. A and B

B. B and C

C. B and D

D. A, B, and D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct statements about GPRS?
a) GPRS provides consistent IP services.
b) It provides wireless internet accesses over mobile phones.
c) GPRS uses the same infrastructure for different air interfaces.
d) GPRS is older technology; it does not use in the current scenario.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Who was developed HTTP?

A. Jimmy Wales

B. Tim Berners-Lee

C. Larry Page

D. Alan Turing

What is the correct answer?

4

What is the full form of NVT?

A. Network Viewer Terminal

B. Network Virtual Terminal

C. Next Virtual Terminal

D. Network Viewer Telecast

What is the correct answer?

4

What are the correct protocols used by RING topology?
a) Fiber Distributed Data Interface
b) Token Ring
c) Metro Ring
d) Ticket Ring
Options:

A. Only A

B. A, B, and C

C. B and D

D. Only B

What is the correct answer?

4

How many bytes are used for the UDP header?

A. 4 bytes

B. 8 bytes

C. 16 bytes

D. 32 bytes

What is the correct answer?

4

Which utility command is used for FTP in the Linux operating system?

A. FTP

B. ftp

C. linuxftp

D. LinuxFtp

What is the correct answer?

4

Which of the following are application layer protocols?

A. FTP

B. HTTP

C. SNMP

D. All of the above

What is the correct answer?

4

MAC stands for?

A. Most Accessible Controller

B. Mobile Access Control

C. Mobile Access Communication

D. Media Access Control

What is the correct answer?

4

What is the default port for HTTP?

A. 80

B. 443

C. 15001

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Caching?

A. HTTP caching is used to avoid sending HTTP requests many times for better performance.

B. HTTP caching is used to avoid sending HTTP full response many times for better performance.

C. Both of the above

D. None of the above

What is the correct answer?

4

A MAC address of the device is assigned by?

A. Network administrator

B. Manufacturing company

C. Network designer

D. All of them

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about the computer network?

A. A computer network is an interconnection between multiple devices to share hardware resources and information.

B. A computer network is an interconnection between multiple devices to share hardware resources only.

C. Computer network is an interconnection between multiple devices to share only information among all devices.

D. None of the above

What is the correct answer?

4

There are following statements that are given below, which of them are correct about IMAP?
a) The IMAP is used to manipulate email messaging without downloading it on a local machine.
b) It is used to access multiple mailboxes concurrently.
c) IMAP enables users to search for emails.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following is the correct bandwidth of the IEEE 802.11b standard?

A. 22 MHz

B. 20 MHz

C. 30 MHz

D. 25 MHz

What is the correct answer?

4

In which layer of OSI, Network Interface Card is used?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which default port is used for SSL based IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

Which layer of the OSI model is responsible for framing?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

Which of the following schemes can be used in a URL?
a) http://
b) telnet://
c) file://
d) ftp://
Options:

A. A and B

B. A, B, and D

C. A and D

D. A, B, C, and D

What is the correct answer?

4

AM stands for?

A. Access Module

B. Abstract Module

C. Amplitude Modulation

D. Amplitude Module

What is the correct answer?

4

Which of the following are correct IEEE 802.11 network PHY standards?
a) 11a
b) 11b
c) 11p
d) 11y
Options:

A. A and B

B. A , B, and C

C. A, B, and D

D. A, B, C, and, D

What is the correct answer?

4

There are the following commands that are given below, which command is not used in the FTP protocol?

A. KGD

B. USER

C. RETR

D. RMD

What is the correct answer?

4

Which of the following are the parts of VPN logs?
a) User activities
b) Devices used
c) IP addresses
d) Connection and disconnection timestamps
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which of the following statements are the correct advantages of a VPN?
a) The destination cannot find your private network as a traffic origin.
b) Communication using VPN is done in an encrypted manner.
c) This is used to hide your identity to protect from hackers.
d) VPN implementation does not require any kind of server.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

HTCPCP stands for?

A. Hyper Text Coffee Pot Control Protocol

B. Host Text Coffee Pot Control Protocol

C. HUB Type Coffee Pot Control Protocol

D. Huge Text Coffee Pot Control Protocol

What is the correct answer?

4

The telnet protocol operates on which layer of the OSI model?

A. Network layer

B. Transport layer

C. Presentation layer

D. Application layer

What is the correct answer?

4

In which year, the SMTP was proposed the first time?

A. 1980

B. 1982

C. 1983

D. 1988

What is the correct answer?

4

Which of the following is the correct frequency of the IEEE 802.11g standard?

A. 3.1 GHz

B. 3.5 GHz

C. 2.4 GHz

D. 4.0 GHz

What is the correct answer?

4

Which of the following protocols are used as a replacement of RARP?
a) DNS
b) Inverse ARP
c) BOOTP
d) DHCP
Options:

A. A and B

B. C and D

C. A, B and D

D. A, B, and C

What is the correct answer?

4

Which FTP response code is used for Not logged in?

A. 520

B. 530

C. 540

D. 550