Home
Current Affairs January 2024

What is the correct answer?

4

What is the full form of BCC in email?

A. Basic Carbon Copy

B. Blind Carbon Copy

C. Black Carbon Copy

D. Blind Clone Copy

Correct Answer :

B. Blind Carbon Copy


Related Questions

What is the correct answer?

4

There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

What is the full form of RDF related to WWW?

A. Resource Description Framework

B. Reliable Document Framework

C. Robust Descriptive Framework

D. Resource Document Framework

What is the correct answer?

4

Why Entity Tags are used in HTTP?
a) It is used to tag each item in the request created by the client.
b) It is used to compare two or more entities from the same requested resource.
c) It is used to download HTML documents.
d) It is used to download CSS documents.
Options:

A. Only A

B. Only B

C. A and B

D. C and D

What is the correct answer?

4

WML stands for?

A. World Markup Language

B. Wisdom Markup Language

C. Worst Markup Language

D. Wireless Markup Language

What is the correct answer?

4

Which default port is used for MongoDB?

A. 25017

B. 27017

C. 26017

D. 11111

What is the correct answer?

4

How many bits are used in IPv6 address?

A. 32 bits

B. 64 bits

C. 128 bits

D. 256 bits

What is the correct answer?

4

There are the following options that are given below, which of them are the correct example of a simplex system?
a) Telephone
b) Walkie-Talkie
c) Radio
d) Television
Options:

A. Only A

B. Only B

C. A and B

D. C and D

What is the correct answer?

4

There are following statements that are given below, which statement correctly define full duplex?

A. In a full-duplex system, during communication only devices can send information at a time.

B. In a full-duplex system, during communication both devices can send or receive information simultaneously.

C. In a full-duplex system, during communication one device can send information and another device can receive.

D. None of the above.

What is the correct answer?

4

Which POP command is used to delete a message?

A. DELETE

B. DEL

C. DELE

D. REMOVE

What is the correct answer?

4

Which default port is used for HTTPS?

A. 80

B. 443

C. 543

D. 643

What is the correct answer?

4

There are the following options that are given below which of them are correct layers used in WWW?
a) Cryptography
b) User Interface Applications
c) Identifiers
d) None of the above
Options:

A. B and C

B. A and B

C. A, B, and C

D. D

What is the correct answer?

4

There are following statements that are given below, which of them are correct about email addresses?
a) E-mail addresses are case sensitive.
b) E-mail address contains the domain name and user name.
c) In the e-mail address, the user name and domain name are separated by the dollar symbol.
d) E-mail addresses cannot be duplicated.
Options:

A. A and B

B. B and D

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

Which layer of the OSI model is responsible for framing?

A. Data Link Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about radio signals in WiFi communication?

A. Radio signals are transmitted by WiFi Antenna and received by WiFi receivers within the range of WiFI.

B. WiFi cards are used to read the WiFi signal and create connectivity between user and network.

C. Both of the above

D. None of the above

What is the correct answer?

4

Which layer of the OSI model is responsible for encryption and decryption?

A. Session Layer

B. Network Layer

C. Presentation Layer

D. Transport Layer

What is the correct answer?

4

The version number of HTTP contains?
a) Major number
b) Minor number
c) UID
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following default port is used for TFTP?

A. 69

B. 65

C. 70

D. 71

What is the correct answer?

4

Which of the following are not functions of the data link layer?

A. Error Control

B. Routing

C. Flow Control

D. Access Control

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about URL?
a) URL stands for Universal Resource Locator.
b) URL is a global address to access resources over the Web.
c) The resources accessed by the URL can be an HTML file, CSS file, etc
d) URL cannot use any protocol to access web resources.
Options:

A. A and B

B. B and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

There are the following options that are given below, which is the correct purpose of segmentation with the bridge?

A. Addition of broadcast domains

B. Addition of bandwidth for users

C. Addition of broadcast users

D. None of the above

What is the correct answer?

4

Which of the following are the parts of the HTTP response?
a) Status
b) Message Body
c) The encryption key used for HTTP protocol security
d) Header fields for a response
Options:

A. A and B

B. B and D

C. B, C, and D

D. A, B, and D

What is the correct answer?

4

Which of the following are the types of HTTP messages?
a) HTTP header message
b) HTTP request message
c) HTTP response message
d) HTTP footer message
Options:

A. A and D

B. B and C

C. Only B

D. A, B, C, and D

What is the correct answer?

4

What are the responsibilities of SGSN?
a) Registration of mobiles in the network.
b) SGSN is used for authenticating GPRS mobiles
c) It is used to store routing information of GPRS mobile
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following are functions of the application layer?

A. Mail Services

B. File Transfer

C. Virtual terminals

D. All of the above

What is the correct answer?

4

Which default port is used for Jenkins?

A. 8080

B. 8090

C. 9082

D. None of the above

What is the correct answer?

4

Which default port is used for SSL based IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

Which of the following parameters are used for GPRS billing?
a) Amount of data transferred
b) Free of charge
c) Flat monthly rate
d) Quality of service
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

A MAC is also known as?

A. Physical address

B. IP address

C. Hardware address

D. Both physical address and hardware address

What is the correct answer?

4

Telnet stands for?

A. Teletype Network

B. Telephone Network

C. Telegram Network

D. Telegraph Network

What is the correct answer?

4

How can we send some data or information to the particular webpage using URL?

A. Using Select Query

B. Using Query String

C. Using some special ports

D. Using the FTP protocol