Related Questions
What is the correct answer?
4
There are following statements that are given below, which of them are correct about emails?
a) E-mail stands for Electronic Mail.
b) E-mail is used for sending and receiving text, images, and video files.
c) E-mail is also used for identity in the internet world.
d) E-mails are not secured enough for data transmission.
Options:
What is the correct answer?
4
What is the full form of RPC?
B. Remote Predefined Calls
D. Resources Procedure Call
What is the correct answer?
4
Which FTP response code is used for Not logged in?
What is the correct answer?
4
SSH stands for?
What is the correct answer?
4
There are the following options that are given below, which of them are correct about URL encoding in HTTP?
A. URL encoding is used to replace some unsafe characters with specific characters in the URL.
B. URL encoding is used to encrypt data send in URL
C. URL encoding is used to encrypt complete URL
What is the correct answer?
4
Which cryptography mechanism is used SSL?
A. Symmetric cryptography
B. Asymmetric cryptography
What is the correct answer?
4
In which year NFS was developed?
What is the correct answer?
4
There are the following statements that are given below, which statement describes the correct purpose of flow control?
A. The flow control is used to resent the data if data is not received by the receiver
B. It is used to control that a sender can be sent the amount of data
C. It is used to regulate the size of each segment
What is the correct answer?
4
There are the following options that are given below, which of them an IEEE standard is used in Frame tagging?
What is the correct answer?
4
What is the full form of SFTP?
A. Simple File Transfer Protocol
B. Short File Transfer Protocol
C. Secure File Transfer Protocol
D. Scheduled File Transfer Protocol
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about UDP?
a) UDP is used for multimedia streaming.
b) It is a good protocol for flowing data in one direction.
c) This protocol is suitable for query-based applications
d) None of the above
Options:
What is the correct answer?
4
There are the following options that are given below, which is the correct example of a half-duplex system?
What is the correct answer?
4
In which network topology, all hosts are connected to the central device?
What is the correct answer?
4
Which of the following options is used in the /etc/exports file to provide read-only access for shared files to the NFS clients?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct ARP?
a) The ARP protocol is used to get destination MAC address from the destination IP address.
b) The ARP protocol is used to get the destination IP address from the destination MAC address.
c) The ARP stands for Address Resolution Protocol.
d) The ARP protocol works on the same network as well as connected networks.
Options:
What is the correct answer?
4
Which of the following GPRS class of terminal equipment is used to manage both packet data and voice simultaneously?
What is the correct answer?
4
Which layer of the OSI model is responsible for connection-oriented services?
What is the correct answer?
4
NFS stands for?
What is the correct answer?
4
Which layer of the OSI model is responsible for actual physical connections among the network devices?
What is the correct answer?
4
There are the following statements that are given below, which of them are the correct benefits of GPRS?
a) The data rate of GPRS is very high.
b) It is used to maintain constant data and voice communication.
c) The GPRS provides SMS and MMS services.
d) None of the above
Options:
What is the correct answer?
4
There are the following statements that are given below, which of them is correct about the DELETE method of the HTTP request?
A. DELETE method is used to dismiss the HTTP request.
B. The DELETE method is used to remove unwanted data from the HTTP request.
C. The DELETE method is used to remove all current representations of resources.
D. DELETE method is used to remove all encryption information from the HTTP request.
What is the correct answer?
4
Which of the following are correct types of network topologies in computer networks?
What is the correct answer?
4
There are the following options that are given below, which of them are internetworking devices?
What is the correct answer?
4
A MAC is also known as?
D. Both physical address and hardware address
What is the correct answer?
4
There are the following options that are given below, which of them are correct request header fields?
a) Expect
b) Host
c) If-None-Range
d) If-None-Match
Options:
What is the correct answer?
4
SIM stands for?
A. Simple Interface Module
B. Socket Interface Module
C. Subscriber Identity Module
D. Server Identity Module
What is the correct answer?
4
Which of the following protocols are used with HTTPS for security mechanism?
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about HTTP Caching?
A. HTTP caching is used to avoid sending HTTP requests many times for better performance.
B. HTTP caching is used to avoid sending HTTP full response many times for better performance.
What is the correct answer?
4
There are the following statements that are given below, which of them are correct about URL?
a) URL stands for Universal Resource Locator.
b) URL is a global address to access resources over the Web.
c) The resources accessed by the URL can be an HTML file, CSS file, etc
d) URL cannot use any protocol to access web resources.
Options:
What is the correct answer?
4
What is the maximum size limit of the file that can be transferred using the FTP protocol?