Which of the following applications allows a user to access and change remote files without actual transfer?
A) DNS B) FTP
C) NFS D) Telnet

1 Answer

Answer :

C) NFS

Related questions

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : C) ii, iii and iv only

Description : Internet provides _______ for remote login. a) telnet b) http c) ftp d) rpc

Last Answer : telnet

Description : WWW provides standardized access to: a) GOPHER b) TELNET c) FTP d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : Which one of the following uses UDP as the transport protocol? a. HTTP b. Telnet c. DNS d. SMTP

Last Answer : c. DNS

Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet

Last Answer : A. DNS

Description : Which is the protocol for performing RPCs between applications in a language and system independent way? (A) Hyper Text Transmission Protocol (HTTP) (B) Simple Network Management Protocol (SNMP) (C) Simple Object Access Protocol (SOAP) (D) Simple Mail Transfer Protocol (SMTP)

Last Answer : (C) Simple Object Access Protocol (SOAP)

Description : FTP stands for A) File transfer protocol B) File transmission protocol C) Form transfer protocol D) Form transmission protocol

Last Answer : A) File transfer protocol

Description : FTP stands for A) Folder Transfer Protocol B) File Transfer Process C) File Transfer Protocol D) File Text Protocol

Last Answer : C) File Transfer Protocol

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Distinguish between FTP and Telnet. -Technology

Last Answer : FTP (File Transfer Protocol) facilitates the transfer of files from one point to another while Telnet is a connection protocol that allows a user to connect to a remote server.

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP

Last Answer : d. SMTP

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer

Last Answer : d. Application layer

Description : If you want to connect to your own computer through the internet from another location you can use: a) Telnet b) Instant Messaging c) FTP d) E- Mail e) None of These

Last Answer : a) Telnet

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : If you want to connect to your own computer through the internet from another location, you can use: a) E - Mail b) FTP c) Instant Message d) Telnet e) None of The Above

Last Answer : c) Instant Message

Description : Which protocol is commonly used to retrieve email from a mail server? a) FTP b) IMAP c) HTML d) TELNET

Last Answer : b) IMAP

Description : Explain following: I. Telnet II. FTP 

Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : In which layer Telnet and FTP works?  a. Application b. Session c. Network d. Physical 

Last Answer : In which layer Telnet and FTP works?  a. Application b. Session c. Network d. Physical 

Description : What type of telecommunicationshardware allows you to access the web? A) Browser B) Modem C) FTP protocol D) IRC

Last Answer : Modem

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : The protocol which allows the file transfer between computers is a. TCP/IP b. FTP c. HTTP d. SOA

Last Answer : b. FTP

Description : How can I create a new user that can only access a single directory with FTP on Ubuntu?

Last Answer : answer:I'm not sure what your needs are, but I had a similar situation where I needed someone to be able to move files to/from my server. It turned out that it was a lot easier for me to use ... https://www.dropbox.com/install?os=lnx I don't use ftp, but google is suggesting proftpd when I search.

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : Which of the following would you use to transfer files over the Internet? (a) FTP (b) E_mail -Technology

Last Answer : (a) FTP is used to transfer files between computer on a network.

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Consider a project with the following functional units : Number of user inputs = 50 Number of user outputs = 40 Number of user enquiries = 35 Number of user files = 06 Number of external interfaces = 04 ... average, the function points for the project will be (A) 135 (B) 722 (C) 675 (D) 672

Last Answer : (D) 672

Description : In Unix operating system, special files are used to : (A) buffer data received in its input from where a process reads (B) provide a mechanism to map physical device to file names (C ... pointers associated with i-nodes (D) store information entered by a user application program or utility program

Last Answer : (B) provide a mechanism to map physical device to file names 

Description : In electronic mail, which of the following protocols allows the transfer of multimedia messages? (A) IMAP (B) SMTP (C) POP 3 (D) MIME

Last Answer : (D) MIME

Description : For consumers, _______ is helpful as it allows you to calculate the actual money you would spend in electricity bills for that particular product. a. Electricity bill c. BEE Star Rating b. User manual d. Water bill

Last Answer : BEE Star Rating

Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing

Last Answer : Mobile computing

Description : It is better to use files than a DBMS when there are (A) Stringent real-time requirements. (B) Multiple users wish to access the data. (C) Complex relationships among data. (D) All of the above.

Last Answer : (B) Multiple users wish to access the data.

Description : Data Integrity control uses ................ (A) Upper and lower limits on numeric data. (B) Passwords to prohibit unauthorised access to files. (C) Data dictionary to keep the data (D) Data dictionary to find last access of data

Last Answer : (B) Passwords to prohibit unauthorised access to files.

Description : DNS can obtain the ................. of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : A packet whose destination is outside the local TCP/IP network segment is sent to .............. (1) File server (2) DNS server (3) DHCP server (4) Default gateway

Last Answer : Answer: 4 

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : Serial access memories are useful in applications where (A) Data consists of numbers (B) Short access time is required. (C) Each stored word is processed differently. (D) None of these

Last Answer : (D) None of these Explanation: data naturally needs to flow in and out in serial form.

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : What is the best way to remote access files from another computer?

Last Answer : Crossloop is a free online program which anyone can use to access ones files remotely from another computer.You find a helper, share your screen and fix the problem at hand.

Description : Allows users to upload files to an online site so they can be viewed and edited from another location a) General purpose applications b) Microsoft Outlook c) Web-hosted technology d) Office live e) None of these

Last Answer : b) Microsoft Outlook

Description : Allows users to upload files to an online site so they can be viewed and edited from another location a) General purpose applications b) Microsoft Outlook c) Web-hosted technology d) Office live e) None of these

Last Answer : b) Microsoft Outlook