Which of the following operations can be performed by using FTP.
i) Connect to a remote host ii) Select directory
iii) Define the transfer mode iv) List file available
A) i, and ii only
B) i, ii and iii only
C) ii, iii and iv only
D) All i, ii, iii and iv

1 Answer

Answer :

D) All i, ii, iii and iv

Related questions

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : C) ii, iii and iv only

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Write the name of layers that perform the following functions in OSI : I. Data Encryption II. Error Correction III. File Transfer IV. Data Encoding

Last Answer : 1. Data Encryption-Presentation Layer 2. Error Correction-Data link layer and Transport layer 3. File Transfer-Application layer 4. Data Encoding-Presentation layer

Description : The most important and common protocols associated TCP/IP internetwork layer are. i) Internet Protocol (IP) ii) Internet Control Message Protocol (ICMP) iii) Bootstrap Protocol (BOOTP) iv) Dynamic Host Configuration Protocol (DHCP) V) ... C) i, iii, iv and v only D) All i, ii, iii, iv and v only

Last Answer : D) All i, ii, iii, iv and v only

Description : In packet-filtering router, the following information can be external from the packet header. i) Source IP address ii) Destination IP address iii) TCP/UDP source port iv) ICMP message type v) TCP/UDP destination port A) i, ii, ... iv and v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : D) All i, ii, iii, iv and v

Description : The following protocols and system are commonly used to provide various degrees of security services in computer network. i) IP filtering ii) Reverse Address Translation iii) IP security Architecture (IPsec) iv) Firewalls v) Socks A) ... v only C) ii, iii, iv and v only D) All i, ii, iii, iv and v

Last Answer : B) i, iii, iv and v only

Description : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Last Answer : Which of the following are the solutions to network security? i) Encryption ii) Authentication iii) Authorization iv) Non-repudiation A) i, ii and iii only B) ii, iii and iv only C) i, iii and iv only D) All i, ii, iii and iv

Description : Explain following: I. Telnet II. FTP 

Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : It is desired to connect five computers that are joined at a single point called central node. i) Draw the setup. ii) Name the topology. iii) State two advantages and disadvantages of this topology.

Last Answer : i. Setup:  ii. Name of topology: Star topology iii. Advantages of Star Topology 1) As compared to Bus topology it gives far much better performance, signals don't necessarily get ... as well number of nodes which can be added in such topology is depended on capacity of central device.

Description : State the functions of i. Repeater ii. Switch iii. Gateway iv. Bridges

Last Answer : i) Repeater: Repeaters are used to take the distorted, weak and corrupt input signal and regenerate this signal at its output. It ensures that the signals are not distorted or weak before it ... and decides whether to forward or discard it. It sends packets between two networks of same type.

Description : Which operations are to be performed on a directory are: a. Search for a file b. Create a file c. Delete a file d. List a directory e. Rename a file f. Traverse the file system g. Allof these

Last Answer : g. Allof these

Description : FTP server listens to connections on port ……………………. A) 19 and 20 B) 20 and 21 C) 21 and 22 D) 20 and 22

Last Answer : B) 20 and 21

Description : Which of the following of the TCP/IP protocolsis the used for transferring filesfrom one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : A series combination of resistance 100 ohm and capacitance 50µf is connected in series to a 230 V, 50HZ supply. Calculate (i) Capacitive reactance (ii) Current (iii) Power factor (iv) Power consumed 

Last Answer : For RC series circuit

Description : Compare series and parallel resonance on the basis of (i) Resonating frequency (ii) Impedance (iii) Current (iv) Magnification

Last Answer : S. No . Parameter Series Circuit Parallel Circuit 1 Resonating frequency 2 Impedance Minimum, Z = R Maximum, Z = L/CR 3 Current Maximum, I ... , I = V/(L/CR)  4 Magnification Voltage magnification takes place Current magnification takes place

Description : (i) Bilateral Network (ii) Node (iii) Loop (iv) Branch

Last Answer : (i) Bilateral Network: If the characteristic of network (response or behavior) is independent of the direction of current through its elements in it, then the network is called as a bilateral network e. ... A part of an electric network which lies between two junctions or nodes is known as branch. 

Description : The examples of Interior Gateway Protocols (IGP) are. i) Open Short Path First (OSPF) ii) Routing Information Protocol (RIP) iii) Border Gateway Protocol (BGP) A) i only B) i, and ii only C) i and iii only D) All i, ii and iii

Last Answer : B) i, and ii only

Description : File management function of the operating system includes i) File creation and deletion ii) Disk scheduling iii) Directory creation iv) Mapping file in secondary storage. A) i, ii and iii only B) i, iii and iv only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : B) i, iii and iv only

Description : Which of the following is / are the types of firewall? A) Packet Filtering Firewall B) Dual Homed Gateway Firewall C) Screen Host Firewall D) All of the above

Last Answer : D) All of the above

Description : The combination of ........... and ............. is often termed the local address or the local portion of the IP Address. A) Network number and host number B) Network number and subnet number C) Subnet number and host number. D) All of the above

Last Answer : C) Subnet number and host number.

Description : 2.address use 7 bits for the and 24 bits for the portion of the IP address. A) Class A B) Class B C) Class C D) Class D

Last Answer : A) Class A

Description : DNS can obtain the ..................of host if its domain name is known and vice versa. A) Station address B) IP address C) Port address D) Checksum

Last Answer : B) IP address

Description : ..................mode is used whenever either end of a security association is gateway. A) Tunnel B) Encapsulating C) Transport D) Gateway

Last Answer : A) Tunnel

Description : In........................mode, a common technique in packet-switched networks consists of wrapping a packet in a new one. A) Tunneling B) Encapsulation C) Both A and B D) None of the above

Last Answer : C) Both A and B

Description : In.................. Mode, the authentication header is inserted immediately after the IP header. A) Tunnel B) Transport C) Authentication D) Both A and B

Last Answer : A) Tunnel

Description : A communication device that combines transmissions from several I/O devices into one line is a A) Concentrator B) Modifier C) Multiplexer D) Full duplex file

Last Answer : C) Multiplexer

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : On the upper layer of SSL, a protocol for initial authentication and transfer of encryption keys, called the ………………… A) SSL handshake protocol B) SSL authentication protocol

Last Answer : A) SSL handshake protocol

Description : State whether true or false. i) A connection oriented protocol can only use unicast addresses. ii) The any cast service is included in IPV6. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : Which of the following statement is true? i) An address with all bits 1 is interpreted as all networks or allhosts. ii) The class A network 128.0.0.0 is defined as the loopbacknetwork. A) i only B) ii only C) Both A and B D) None of the above

Last Answer : A) i only

Description : An a.c series circuit has resistance of 10ohm, inductance of 0.1H and capacitance of 10µf, voltage applied to circuit is 200V. find (i) Resonant frequency (ii) Current at resonance (iii) Power at resonance 

Last Answer : Solution: For RLC series circuit

Description : For R-C series circuit draw (i) Circuit diagram (ii) Vector diagram (iii) Waveform of voltage and current

Last Answer : i) Circuit diagram ii)Vector diagram iii)Waveform of voltage and current

Description : In genetic engineering, a DNA segment (gene) of interest, is transferred to the host cell through a vector. Consider the following four agents (i-iv) in this regard and select the correct option about which one or more of these ... ii) and (iv) (b) (i) only (c) (i) and (iii) (d) (ii) and (iv)

Last Answer : (d) (ii) and (iv)

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Explain infrared communication. List any two disadvantages of infrared communication.

Last Answer : Infrared communication (IR) is an example of wireless communication. However, it is limited to very simple applications & suffers from several disadvantages, mainly very small bandwidth & distances ... areas require multiple emitter panels, which will increase the cost of the system.

Description : List different classes of IP Address.

Last Answer : Different classes of IP address. Class A Class B Class C Class D Class E

Description : List any two disadvantages of bus topology. 

Last Answer : Disadvantages of bus topology. 1. Heavy network traffic slows down the bus speed .In bus topology only one computer can transmit & other have to wait till their turn comes & there ... connectors will cause reflections & bring down the whole network causing all network activity to stop.

Description : Define Protocol and Encapsulation.

Last Answer : i. Protocol: Protocol is defines as the set of rules and regulations to communicate between layers in networking. OR It is set of rules and conventions sender and receiver in data communication ... of encapsulation. OR Encapsulation is the process of adding the headers and footers to the data.

Description : Define protocol. Give the name of any two protocols.

Last Answer : Define protocol: There are certain rules that must be followed to ensure proper communication & a set of such rules is known as protocol. Example: UDP, TCP/IP, SMTP, HTTP, SSL, FTP etc

Description : Define Wi-Max.

Last Answer : Define: Wi- Max is worldwide interoperability for Microwave Access. It is a wireless communication standard which can provide data rates up to 1 Gbps. 

Description : Define LAN. Write any two disadvantages of LAN.

Last Answer : Definition of LAN: LAN is a network which is designed to operate over a small physical area such as an office, factory or a group of buildings. Disadvantages: 1. Power - a good LAN is required ... - if all computers running at once, can reduce speed for each. 6. Area covered is limited.

Description : Define Server. Give the name of any two types of Server.

Last Answer : Definition of server: The central computer which is more powerful than the clients & which allows the clients to access its software & database is called as the server. Types of server: 1. File server 2. Print Sever 3. Application server 4. Message server 5. Database server

Description : Define: (i) Apparent power (ii) Real power

Last Answer : (i) Apparent power It is the product of rms values of applied voltage and circuit current. Unit: volt-ampere (VA) OR kilo-volt-ampere (kVA) OR Mega-volt-ampere (MVA) S = VI = I2 Z volt ... circuit. (OR) It is the power which is actually dissipated in the circuit resistance.

Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False

Last Answer : A) True, False

Description : State true or false. i) Socks are a standard for circuit level gateways. ii) The NAT is used for small number of the hosts in a private network. A) True, False B) False, True C) True, True D) False, False

Last Answer : C) True, True

Description : State the following statement is true or false. i) In class B addresses a total of more than 1 billion addresses can be formed. ii) Class E addresses are reserved for future or experimental use. A) True, False B) True, True C) False, True D) False, False

Last Answer : B) True, True

Description : State whether the following is True or False. i) In bus topology, heavy Network traffic slows down the busspeed. ii) It is multipoint configuration. A) True, True B) True, False C) False, True D) False, False

Last Answer : A) True, True

Description : Explain following protocols: I. PPP II. SLIP

Last Answer : (i)PPP:-PPP means point to point protocol. It is a much more developed protocol than SLIP(which is why it is replacing it).It transfers additional data, better suited to data transmission over the ... character(the END character, the ASCII code of which is 192).A SLIP frame looks like:

Description : Which of the following is/are example(s) of stateful application layer protocols? (i) HTTP (ii) FTP (iii) TCP (iv) POP3 a. (i) and (ii) only b. (ii) and (iii) only c. (ii) and (iv) only d. (iv) only

Last Answer : c. (ii) and (iv) only