Which function is not supported by E-mail?

A. authentication

B. composition

C. Disposition

D. Displaying

Related Questions

  1. Which of the following network topologies has the highest level of redundancy?
  2. When collection of various computers seems a single coherent system to its client, then it is called…
  3. Which of the following can provide a backbone network of 600 meters in length without using repeaters?
  4. Where are routing tables placed?
  5. What is the maximum length of thick Ethernet cable before a signal booster is needed?
  6. Twisted-pair cable uses what type of connector?
  7. 80 is the well-known port number for the HTTP service.
  8. A router receives an IP packet with source IP address and destination IP address…
  9. Which class of IP addressing was not brought in much use?
  10. _______ body looks after the protocol identifiers used over Internet.
  11. You have a network card with the connector in question 43, and it also has a 15 pin female connector,…
  12. Which field in Domain Name System message format specifies the class of query?
  13. The general form of the SMTP destination address is ________________.
  14. You've taken your Windows 2000 laptop to a client's network and plugged it in. Your computer is configured…
  15. Router B receives an update from router A that indicates Net1 is two hops away. The next update from…
  16. What is the distance limitation of Cat5 UTP?
  17. Which of the following defines a family of standards for 100 Mbps fiber optic LANs that provides the…
  18. In an autonomous system with n areas, how many areas are connected to the backbone?
  19. What is the length of MARKER field in BGP message header?
  20. Select the standard for token ring using token-passing media access.
  21. If the organization allocates 10 bits as subnet number, to identify a physical network, then the organization…
  22. How many layers are there in the OSI model?
  23. Which of the following is a media type that is most susceptible to interference?
  24. The packet transmit using standard Internet Protocol(IP) throughout the Internet by
  25. Your network has gotten a single class C address but has 300 computers. How can you connect them to…
  26. Network administrator checks whether all the devices connected to the end-to-end path are _________-enabled.
  27. What is the distance limitation of Cat5 UTP?
  28. Which of the following protocol was developed to overcome limitations of Routing Information Protocol…
  29. Which type of connector is used on 10Base2 networks?
  30. In 1996, 36.44% of _________ addresses were brought in use.

Please do not use chat terms. Example: avoid using "grt" instead of "great".