Home
Current Affairs January 2024

What is the correct answer?

4

Which technique is used to provide a small name for the complete URL?

A. URL cutting

B. URL minimizing

C. URL shortening

D. URL smalling

Correct Answer :

C. URL shortening


Related Questions

What is the correct answer?

4

Which of the following network devices are operated at the physical layer of the OSI model?

A. Hub

B. Repeater

C. Modems

D. All the above

What is the correct answer?

4

There are the following options that are given below, which of them are the correct application of UDP to transmit data?
a) SNMP
b) DNS
c) TFTP
d) Routing Information protocol
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, C, and D

What is the correct answer?

4

IPCONFIG stands for?

A. Internet Protocol Configuration

B. International Protocol Configuration

C. Internet Packet Configuration

D. Internet Process Configuration

What is the correct answer?

4

ISDN stands for?

A. Integrated Service Digital Network

B. International Service Digital Network

C. Internet Service Digital Network

D. Intercommunication Service Digital Network

What is the correct answer?

4

There are following statements that are given below, which of them are correct about SMTP?
a) It is an application layer protocol.
b) It is a connectionless protocol.
c) SMTP stands for Simple Mail Transfer Protocol.
d) SMTP is a text-based protocol.
Options:

A. A and B

B. A and C

C. A, C, and D

D. A, B, and C

What is the correct answer?

4

There are the following options that are given below, which of them can be done through UDP?
a) Trace Route
b) Time Stamp
c) Record Route
d) All the above
Options:

A. A and B

B. B and C

C. A and C

D. D

What is the correct answer?

4

SNMP stands for?

A. Simple Network Message Protocol

B. Secure Network Message Protocol

C. Simple Network Management Protocol

D. Secure Network Management Protocol

What is the correct answer?

4

What is the full form of MTA used in SMTP?

A. Mail Time Association

B. Mail Trim Agent

C. Mail Transmission Agent

D. Mail Transfer Agent

What is the correct answer?

4

Which of the following command is used to generate SSH keys in the Linux operating system?

A. keygen-ssh

B. ssh-keygen

C. ssh-key

D. ssk-genkey

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about NFS?
a) The NFS is used to share file system resources over the network.
b) NFS stands for Network File system.
c) NFS is a client/server protocol where File system resources at the server and accessed by the clients.
d) NFS is not a client/ server protocol.
Options:

A. A and B

B. A and C

C. A, B, and C

D. A, B, and D

What is the correct answer?

4

Which default port is used for Tomcat Startup?

A. 8080

B. 8090

C. 9082

D. None of the above

What is the correct answer?

4

There are the following options that are given below, which of them are correct parameters of the UDP header?
a) Source Port number
b) Destination Port Number
c) Checksum
d) Flow control Flags
Options:

A. A and B

B. A, B, and C

C. A, C, and D

D. A, B, C, and D

What is the correct answer?

4

A MAC is also known as?

A. Physical address

B. IP address

C. Hardware address

D. Both physical address and hardware address

What is the correct answer?

4

HTCPCP stands for?

A. Hyper Text Coffee Pot Control Protocol

B. Host Text Coffee Pot Control Protocol

C. HUB Type Coffee Pot Control Protocol

D. Huge Text Coffee Pot Control Protocol

What is the correct answer?

4

There are the following RFC numbers given below which is related HTTPS?

A. RFC 2815

B. RFC 2818

C. RFC 2821

D. RFC 2854

What is the correct answer?

4

Which default port is used for SSL based IMAP?

A. 553

B. 443

C. 143

D. 993

What is the correct answer?

4

How many bytes are used in IPv4 addresses?

A. 4

B. 8

C. 16

D. 32

What is the correct answer?

4

Which of the following are key parameters for the service quality of GPRS?
a) Throughput
b) Delay
c) Reliability
d) All of the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Telnet stands for?

A. Teletype Network

B. Telephone Network

C. Telegram Network

D. Telegraph Network

What is the correct answer?

4

The version number of HTTP contains?
a) Major number
b) Minor number
c) UID
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

There are the following statements that are given below, which of them are correct about HTTP Caching?

A. HTTP caching is used to avoid sending HTTP requests many times for better performance.

B. HTTP caching is used to avoid sending HTTP full response many times for better performance.

C. Both of the above

D. None of the above

What is the correct answer?

4

Which command is used to initiate the SMTP conversation?

A. EHELLO

B. CHELLO

C. HELLO

D. HELLOMAIL

What is the correct answer?

4

Why Entity Tags are used in HTTP?
a) It is used to tag each item in the request created by the client.
b) It is used to compare two or more entities from the same requested resource.
c) It is used to download HTML documents.
d) It is used to download CSS documents.
Options:

A. Only A

B. Only B

C. A and B

D. C and D

What is the correct answer?

4

What are the functions of the Certificate Management System?

A. It is used to store the certificate.

B. It is used to validate the certificate.

C. It is used to revoke certificates.

D. All of the above

What is the correct answer?

4

Which layer of the OSI model is responsible for connection-oriented services?

A. Session Layer

B. Network Layer

C. Physical Layer

D. Transport Layer

What is the correct answer?

4

What is the full form of ETSI?

A. European Telegraph Standard Institute

B. European Telecommunications Standard Institute

C. Eastern Telephonic Standard Institute

D. European Telephonic Standard Institute

What is the correct answer?

4

There are the following statements that are given below, which of them are correct Inverse ARP?
a) The Inverse ARP protocol is used to get the IP address from the MAC address.
b) It is the opposite of ARP.
c) The Inverse is used in only the Linux operating system.
d) All the above
Options:

A. A and B

B. A and C

C. B and C

D. D

What is the correct answer?

4

Which part of the URL describes the protocol used in a URL?

A. Scheme

B. Host Address

C. File Path

D. None of the above

What is the correct answer?

4

What is the full form of LiFi?

A. Line Fidelity

B. Local Fidelity

C. Light Fidelity

D. Logical Fidelity

What is the correct answer?

4

What are the correct protocols used by RING topology?
a) Fiber Distributed Data Interface
b) Token Ring
c) Metro Ring
d) Ticket Ring
Options:

A. Only A

B. A, B, and C

C. B and D

D. Only B