A ………….. is a set of information that is exchanged between a client and web browser and a web  server during an HTTP transaction.
A) infoset
B) clientinfo
C) cookie
D) transkie

1 Answer

Answer :

D) transkie

Related questions

Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie

Last Answer : C) cookie

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : Which one of the following is not a Client-Server application ? (A) Internet chat (B) Web browser (C) E-mail (D) Ping 

Last Answer : (B) Web browser

Description : Google Chrome is an example of (a) Web browser (b) Web server (c) HTTP (d) WWW -Technology

Last Answer : (a) Web browser is the program that is used to explore the Internet.Thus, Google Chrome is an example of Web browser.

Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3

Last Answer : a. 4,2,1,3

Description : Match the following HTTP status code to their respective definitions. i) 400 a) OK ii) 500 b) Not found iii) 200 c) Continue iv) 100 d) Internal server error A) i-b, ii-d, iii-a, iv-c B) i-a, ii-b, iii-c, iv-d C) i-b, ii-c, iii-a, iv-d D) i-b, ii-a, iii-c, iv-d

Last Answer : A) i-b, ii-d, iii-a, iv-c

Description : Match the following HTTP status code to their respective definitions. i) 400 a) OK ii) 500 b) Not found iii) 200 c) Continue iv) 100 d) Internal server error A) i-b, ii-d, iii-a, iv-c B) i-a, ii-b, iii-c, iv-d C) i-b, ii-c, iii-a, iv-d D) i-b, ii-a, iii-c, iv-d

Last Answer : A) i-b, ii-d, iii-a, iv-c

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : Which of the following is/are the Database server functions? i) Data management ii) Transaction management iii) Compile queries iv) Query optimization A) i, ii, and iv only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii, and iv

Last Answer : A) i, ii, and iv only

Description : State whether true or false. i) Multithreading is useful for application that perform a number of essentially independent tasks that do not be serialized. ii) An example of multithreading is a database server that listens for ... B) i-True, ii-True C) i-False, ii-True D) i-False, ii-False

Last Answer : B) i-True, ii-True

Description : The reasons leading to popularity of client-server systems are: A) More powerful workstations on LANs B) Needed for graphical user interfaces of end users. C) Remove computing load for presentation services from the system managing a shared database resource. D) All

Last Answer : D) All

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322

Last Answer : C) 443

Description : A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay in response to a request? (Note that the speed of light in air is 3,00,000 km/second). (A) 133.33 m sec (B) 266.67 m sec (C) 400.00 m sec (D) 533.33 m sec

Last Answer : (D) 533.33 m sec Explanation: The request has to go up and down, and the response has to go up and down. The total path length traversed is thus 160.000 km. The speed of light in air and vacuum is 300,000 km/sec, so the propagation delay alone is 160,000/300,000 sec or about 533 msec. 

Description : In cash transaction, goods or services are exchanged for __________ 

Last Answer : In cash transaction, goods or services are exchanged for __________ (a) other goods (b) other services (c) immediate cash (d) grains

Description : ___________ value is the amount for which an asset could be exchanged, or a liability settled, between knowledgeable, willing parties in an arm‟s length transaction.

Last Answer : Fair,

Description : Exchange rate is the rate at which an asset could be exchanged, or a liability settled, between knowledgeable, willing parties in an arm’s length transaction.

Last Answer : FALSE

Description : Price is A)the value that is exchanged for products in a marketing transaction. B)always money paid in a marketing transaction. C)more important to buyers than sellers. D)usually the most inflexible marketing mix decision variable.

Last Answer : A)the value that is exchanged for products in a marketing transaction.

Description : Which method will a web browser call on a new applet? A) main method B) destroy method C) execute method D) init method

Last Answer : D) init method

Description : Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of code that has the potential to compromise the security of an Internet user b. A cookie gains entry ... and time d. Cookies can be used to track the browsing pattern of a user at a particular site

Last Answer : a. A cookies is a piece of code that has the potential to compromise the security of an Internet user

Description : In Computer Networking, HTTP is referred to as a stateless protocol as servers do not maintain any information about past client requests. HTTP is an acronym for (A) Hyper Text Translation ... ) Hyper Text Transfer Protocol (C) High TeraByte Transfer Protocol (D) Hypervisor Test Translation Protocol

Last Answer : (B) Hyper Text Transfer Protocol

Description : What is the name of the software that allows us to browse through web pages called ? 1) Browser 2) Mail Client 3) FTP Client 4) Messenger

Last Answer : 1) Browser

Description : What is the name of the software that allows us to browse through web pages called ? 1 Browser 2 Mail Client 3 FTP Client 4 Messenger

Last Answer : 1 Browser

Description : Ingres is a ........................ A) Socket B) Compiler C) Database D) Web server

Last Answer : C) Database

Description : In order to run JSP .................... is required. A) Mail Server B) Applet viewer C) Java Web Server D) Database connection

Last Answer : C) Java Web Server

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : ………. security technology establishes an encrypted link between a Web server and browser. -Technology

Last Answer : SSL security technology establishes an encrypted link between a Web server and browser.

Description : What do you need to put your web pages on the www: a) A connection to the internet b) A web browser c) A web server d) All of The Above e) None of The Above

Last Answer : d) All of The Above

Description : What do you need to put your web pages on the www? (A) a connection to internet (B) a web browser (C) a web server (D) all of the above

Last Answer : (D) all of the above

Description : Which attack allows the attacker to execute the scripts on the victim’s browser? a. SSL attack b. Cookie attack c. Banner grabbing d. XSS attack

Last Answer : d. XSS attack

Description : ………………. is not an operation performed on linear list Get More Mcqs from http://www.siteforinfotech.com/p/mcqs.html a) Insertion b) Deletion c) Retrieval d) Traversal A) only a,b and c B) only a and b C) All of the above D) None of the above

Last Answer : D) None of the above

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Which is the protocol for performing RPCs between applications in a language and system independent way? (A) Hyper Text Transmission Protocol (HTTP) (B) Simple Network Management Protocol (SNMP) (C) Simple Object Access Protocol (SOAP) (D) Simple Mail Transfer Protocol (SMTP)

Last Answer : (C) Simple Object Access Protocol (SOAP)

Description : SQL server stores index information in the ………… system table A) systindexes B) systemindexes C) sysind D) sysindexes

Last Answer : D) sysindexes

Description : Distance vector routing algorithm is a dynamic routing algorithm. The routing tables in distance vector routing algorithm are updated ........... (1) automatically (2) by server (3) by exchanging information with neighbour nodes. (4) with back up database

Last Answer : Answer: 3

Description : The.... controls a client computer's resources. 1) Application program 2) Instruction set 3) Operating System 4) Server application

Last Answer : 4) Server application

Description : The.... controls a client computer's resources. 1 Application program 2 Instruction set 3 Operating System 4 Server application

Last Answer : 4 Server application

Description : State weather the following statement is true or false for EJB. 1. EJB exists in the middle-tier 2. EJB specifies an execution environment 3. EJB supports transaction processing A) 1-true, 2. true, 3. true B) 1- ... false, 3. true C) 1- false, 2- false, 3- false D) 1-true, 2-true, 3-false

Last Answer : A) 1-true, 2. true, 3. true

Description : Which of the following is not open source software? (A) Apache HTTP server (B) Internet explorer (C) Fedora Linux (D) Open office

Last Answer : (B) Internet explorer

Description : Another name for Usenet is A) Gopher B) Newsgroups C) Browser D) CERN

Last Answer : B) Newsgroups

Description : ------------------- is a set of rules governing the format and meaning of the packets, or messages that are exchanged by the peer entities within a layer. a. Interface b. Reference model c. Protocol d. None of these

Last Answer : c. Protocol

Description : What do you mean by cloud in cloud computing? A. Data exchanged among grid nodes. B. Provides tools to monitor and distribute the number of licenses. C. Provides logical view of data. D. Set of hardware, software, network, storage, services and interfaces.

Last Answer : Set of hardware, software, network, storage, services and interfaces.

Description : State the testing approaches that are considered during client server testing.

Last Answer : Testing approaches of client server system: Component Testing: One need to define the approach and test plan for testing client and server individually. When server is tested there is need of a ... testing and compliance testing may be involved if needed, as per testing and type of system.

Description : Which of the following would not be classified as a related-party transaction? a. Sales of merchandise between affiliated companies. b. An advance of one week's salary to an employee. c. Loans ... the principal owner or client. d. Exchanges of equipment between two companies owned by the same person

Last Answer : An advance of one week's salary to an employee

Description : State whether true or false. i) init( ) of servlet is called after a client request comes in ii) Servlets are ultimately converted into JSP A) i-false, ii-false B) i-false, ii-true C) i-true, ii-false D) i-true, ii-true

Last Answer : A) i-false, ii-false

Description : Which of the following is not the function of client? A) Compile queries B) Query optimization C) Receive queries D) Result formatting and presentation

Last Answer : B) Query optimization

Description : The Servlet Response interface enables a servlet to formulate a response for a client using the method ............... (A) void log(Exception e, String s) (B) void destroy() (C) int getServerPort() (D) void setContextType(String Type)

Last Answer : (D) void setContextType(String Type)

Description : In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ………. a. 220 service ready message b. 421 service not available message c. Both of the above d. None of the above

Last Answer : c. Both of the above

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : What ASP.NET object encapsulates the state of the client and the browser?  (1) Application object. (2) Session object. (3) Response object. (4) Request object. 

Last Answer : Session object.