Home
Current Affairs January 2024

What is the correct answer?

4

Which of the following are the parts of the URL?
a) Scheme
b) Host address
c) File path
d) None of the above
Options:

A. A and B

B. A and C

C. A, B, and C

D. D

Correct Answer :

C. A, B, and C


Related Questions

What is the correct answer?

4

What is the default port for HTTP?

A. 80

B. 443

C. 15001

D. None of the above

What is the correct answer?

4

What is the full form of W3C?

A. World Wide Web Council

B. World Wide Web Corporation

C. World Wide Web Consortium

D. World Wide Web Collaboration

What is the correct answer?

4

Which default port is used for Redis Server?

A. 3379

B. 4379

C. 5379

D. 6379

What is the correct answer?

4

There are the following statements that are given below, which of them are correct statements about GPRS?
a) GPRS provides consistent IP services.
b) It provides wireless internet accesses over mobile phones.
c) GPRS uses the same infrastructure for different air interfaces.
d) GPRS is older technology; it does not use in the current scenario.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What is the full form of SFTP?

A. Simple File Transfer Protocol

B. Short File Transfer Protocol

C. Secure File Transfer Protocol

D. Scheduled File Transfer Protocol

What is the correct answer?

4

ISDN stands for?

A. Integrated Service Digital Network

B. International Service Digital Network

C. Internet Service Digital Network

D. Intercommunication Service Digital Network

What is the correct answer?

4

WLAN stands for?

A. Wireless Local Area Network

B. World Line Area Network

C. World Line Access Network

D. Wireless Local Access Network

What is the correct answer?

4

There are the following options that are given below, which is not the type of flow control?

A. Congestion avoidance

B. Windowing

C. Cut-through

D. Buffering

What is the correct answer?

4

Which of the following are the states of MS in the GPRS system?
a) Idle state
b) Active state
c) Standby state
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which of the following are not functions of the data link layer?

A. Error Control

B. Routing

C. Flow Control

D. Access Control

What is the correct answer?

4

In which year HTTPS was invented?

A. 1991

B. 1994

C. 1997

D. 1999

What is the correct answer?

4

Which default port is used for Jetty?

A. 8080

B. 8090

C. 9082

D. None of the above

What is the correct answer?

4

There are the following RFC numbers are given below, which of them are related to HTTP?
a) RFC 2616
b) RFC 3616
c) RFC 7230
d) RFC 7231
Options:

A. A and B

B. A, C, and D

C. A, B, and C

D. B, C, and D

What is the correct answer?

4

There are the following options that are given below, which is the correct purpose of segmentation with the bridge?

A. Addition of broadcast domains

B. Addition of bandwidth for users

C. Addition of broadcast users

D. None of the above

What is the correct answer?

4

If N devices are connected in a MESH network, then how many dedicated links are required to them?

A. N

B. N+1

C. N(N+1)

D. N(N-1)/2

What is the correct answer?

4

Which of the following protocol(s) is/are used by IEEE 802.11 standards?

A. CSMA/CA

B. CSMA/CD

C. Both

D. None

What is the correct answer?

4

GPRS stands for?

A. Global Processing Reserved Services

B. General Packet Radio System

C. Global Packet Radio System

D. Global Packet Radio Services

What is the correct answer?

4

VIRUS stands for?

A. Visual Information Resources Under Seized

B. Vital Information Resources Under Server

C. Vital Information Resources Under Seized

D. Vital Information Resources Unified Seized

What is the correct answer?

4

In the RING topology data can travel in which direction?

A. Clockwise

B. Anti-clock wise

C. In both direction

D. None of the above

What is the correct answer?

4

Which of the following network devices are operated at the physical layer of the OSI model?

A. Hub

B. Repeater

C. Modems

D. All the above

What is the correct answer?

4

Which of the following parameters are used for GPRS billing?
a) Amount of data transferred
b) Free of charge
c) Flat monthly rate
d) Quality of service
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

What is the full form of TFTP?

A. Transport File Transfer Protocol

B. Tree File Transfer Protocol

C. Trivial File Transfer Protocol

D. Trim File Transfer Protocol

What is the correct answer?

4

There are the following options that are given below, which of them an IEEE standard is used in Frame tagging?

A. 802.11

B. 802.1Q

C. 802.3

D. 802.16

What is the correct answer?

4

Which default port is used for Jenkins?

A. 8080

B. 8090

C. 9082

D. None of the above

What is the correct answer?

4

Which of the following is not a type of computer network?

A. LAN

B. MAN

C. PAN

D. None of the above

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about remote login?
a) Remote login is a mechanism that is used to access the computer which is located in a different location using remote login protocols.
b) Using remote login we can access the computer through the command line only.
c) Now a day's remote login is very popular for remote support in almost all companies.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

What are the elements of PKI?
a) Certificate management system
b) Certificate authority
c) Registration authority
d) SSL certificate
Options:

A. A and B

B. B, C, and D

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

MAC stands for?

A. Most Accessible Controller

B. Mobile Access Control

C. Mobile Access Communication

D. Media Access Control

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about TLS?
a) TLS stands for Transport Layer Security.
b) TLS is a security protocol that is used to implement secured communication between a web browser and a web server.
c) TLS is also used to implement secured communication for emails, messaging, etc.
d) SSL is the advanced version of TLS.
Options:

A. A and B

B. A, B, and C

C. B, C, and D

D. A, B, C, and D

What is the correct answer?

4

Which POP command is used to delete a message?

A. DELETE

B. DEL

C. DELE

D. REMOVE