Home

Which of the following filed represents the sender of the message in an electronic mail?

A. To

B. From

C. Cc

D. Reply-to

Related Questions

  1. Which of the following protocols were designed for terminal emulation to connect dissimilar systems?
  2. _________ is a type of domain name queries.
  3. What is the distance limitation of Cat5 UTP?
  4. What is the default subnet mask for a class A network?
  5. TCP protocol is responsible for connection-oriented communication
  6. Which of the following protocols are considered unreliable or connectionless?
  7. What does a patch cable connect to within an Ethernet network?
  8. You wish to install a 100BaseT network. What type of cabling will you use?
  9. In an active mode if any FTP client sends the port command "PORT 192,168,0,1,4,1" then what will be…
  10. Which of the following IEEE specifications uses CSMA/CD?
  11. You have a network card with only one connector, which looks like a place to plug an oversized phone…
  12. You're asked to install a Citrix MetaFrame XP server. What protocol will clients use to connect and…
  13. What is 10baseT?
  14. You have a network card with the connector in question 43, and it also has a 15 pin female connector,…
  15. ARP is defined in RFC _____ and it is a current internet standard, ________
  16. What is the maximum length of thinnet cable before a signal booster is needed?
  17. What is the default subnet mask for a class A network?
  18. Which of the following connectors is used by UTP on a Fast Ethernet network?
  19. Network administrator checks whether all the devices connected to the end-to-end path are _________-enabled.
  20. _____________ command is used by the client to transfer the job across to the server.
  21. Which class of IP addressing was not brought in much use?
  22. Thinnet coaxial cable uses what type of connector?
  23. Class C network address class supports 65,534 hosts.
  24. In an autonomous system with n areas, how many areas are connected to the backbone?
  25. What is the code used for Interpret As Command (IAC)?
  26. Which of the following is required to communicate between two computers?
  27. What can be used in the place of DNS to resolve host names to IP addresses?
  28. Which of the following is also known as IP masquerading?
  29. Which of the following fields holds the packets of several protocols?
  30. Which cable type is immune to outside interference and crosstalk?

Please do not use chat terms. Example: avoid using "grt" instead of "great".