How many types of protocols are important
for instant messaging?
a) 2
b) 3
c) 4
d) All of the mentioned

1 Answer

Answer :

3

Related questions

Description : The most commonly used set of protocols uses ______ as the messaging format. a) XML b) JSON c) BSON d) All of the mentioned

Last Answer : XML

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) All IM clients use peer-to-peer messaging b) IM software aimed at businesses such as XMPP, Lotus Sametime, and Microsoft Office Communicator use a client/server ... messaging is as popular in business as it is in personal communications d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the wrong statement. a) Virtual appliances are becoming a very important standard cloud computing deployment object b) Cloud computing requires some standard protocols c) Cloud computing relies on a set of protocols needed to manage interprocess communications d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) Every third-party IM clients aim to allow their users to connect to the different major IM services b) SIP stands for Secure Initiation Protocol c) XMPP stands for Extensible Messaging and Presence Protocol d) All of the mentioned

Last Answer : XMPP stands for Extensible Messaging and Presence Protocol

Description : Point out the wrong statement. a) Atom is a syndication format that allows for HTTP protocols to create and update information b) Cloud services span the gamut of computer applications c) ... discourage the use of open-network protocols in place of proprietary protocols d) None of the mentioned

Last Answer : The impact of cloud computing on network communication is to discourage the use of open-network protocols in place of proprietary protocols

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems b) Platforms are used to create more easy software c) All SLAs are enforceable as contracts d) All of the mentioned

Last Answer : Cloud computing is a natural extension of many of the design principles, protocols, plumbing, and systems

Description : Point out the correct statement : A. Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service B. Cloud computing relies on a ... communications C. Platforms are used to create more complex software D. All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : What is Onion diagram illustrates? a) It illustrates the connection between the layers in communications protocols, such as the International Standards Organization Open Systems Interconnection (ISO OSI) model,or the ... with the kernel at the core c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Point out the correct statement. a) Cloud architecture can couple software running on virtualized hardware in multiple locations to provide an on-demand service b) Cloud computing relies on a set of ... communications c) Platforms are used to create more complex software d) All of the mentioned

Last Answer : All of the mentioned

Description : The most commonly used model for discovery and description used with SOAP messaging is the? A. WSDL B. VMc C. DHML D. SOA

Last Answer : WSDL

Description : Which of the following module of SOA is shown in the following figure? a) Description b) Messaging c) Business Process d) QOS

Last Answer : QOS

Description : The architecture for _______ is built on the concepts of shared-nothing and messaging-based information exchange. a) HDFS b) Chabby c) Nova d) BigTable

Last Answer : Nova

Description : The architecture for _______ is built on the concepts of shared-nothing and messaging-based information exchange. a) HDFS b) Chabby c) Nova d) BigTable

Last Answer : Nova

Description : Which of the following module of SOA is shown in the following figure? a) Description b) Messaging c) Business Process d) QOS

Last Answer : QOS

Description : What is true about FIDM? A. FIDM describes the technologies and protocols B. It uses Security Markup Language (SAML) to package a user's security credentials C. SAML has access control D. All of the above

Last Answer : All of the above

Description : Do you know of any books that critique texting, instant messaging, or casual speech/writing among teens and young adults througout history?

Last Answer : answer:Try something like this: link The general area for that type of material appears to be (LC Classification: LC149) http://primo02v1 ... =false&query=isbn%2Cexact%2C0415687152&scp.scps=&dstmp=1413557781921&dym=true&bulkSize=30&vl(freeText0)=0415687152&group=GUEST&vid=discovere&institution=EMORY

Description : Is instant messaging ruining your life?

Last Answer : Nope. The opposite. Just text messages – no email. Fewer phone calls.

Description : Does "kk" stand for anything when chatting/instant messaging?

Last Answer : I’m guessing it’s similar to “ok,” “mk,” “k,” “mkay,” “okay,” etc. And they said the internet squelches creativity…

Description : Do you think communication technologies like blogs, instant messaging, texting, and the like, have weakened humanity's ability to communicate orally?

Last Answer : Actually, I think they have enhanced it for me. Now, how I type online is a lot like how I speak. In fact, I sometimes even mouth the words as I type them when I'm IMing, etc. The ... and express them accordingly is good, and even if it is online, it still improves my oral communication as well.

Description : Best instant messaging protocol?

Last Answer : answer:http://en.wikipedia.org/wiki/Comparison_of_instant_messaging_protocols Personally i prefer XMPP – lots of tools/features and easy to get going.

Description : Which Instant Messaging client is most reliable?

Last Answer : i prefer pidgin http://pidgin.im

Description : Instant messaging help!

Last Answer : adium on a mac trillian on PC

Description : My friends were using text messaging to instant message people through aim?

Last Answer : Were they? You should ask them how.

Description : If you want to connect to your own computer through the internet from another location you can use: a) Telnet b) Instant Messaging c) FTP d) E- Mail e) None of These

Last Answer : a) Telnet

Description : Which of these is not a means of personal communication on the internet? a) Chat b) Instant messaging c) Instanotes d) Electronic mail e) None of these

Last Answer : c) Instanotes

Description : What are some of the benefits of using a firewall for your LAN? 1) Increased access to Instant Messaging 2) Stricter access control to critical resources 3) Greater security to your LAN 4) Both 2 and 3

Last Answer : 4) Both 2 and 3

Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : Is it safe to send sensitive data via email or instant messaging (IM)?

Last Answer : No, you shouldn’t send sensitive personal information like credit card numbers, passwords, your date of birth or Social Security number using email or IM on your computer or any other Web-enabled devices such as a smartphone, tablet or personal digital assistant (PDA).

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Which of the following is one of the most actively developing and important areas of cloud computing technology? a) Logging b) Auditing c) Regulatory compliance d) None of the mentioned

Last Answer : Regulatory compliance

Description : Which of the following is incorrect? a) Layered architectures are highly changeable, so this pattern can be used when changeability is an important quality attribute CSE-R17.BLOGSPOT.COM b) Layered-style programs ... of the rest of the program c) All of the mentioned d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Which of the following is the most important area of concern in cloud computing? a) Security b) Storage c) Scalability d) All of the mentioned

Last Answer : Security

Description : Which of the following correctly represents different types of mobile patterns? a) b) c) d) All of the mentioned

Last Answer : a)

Description : Point out the correct statement. a) Platforms can be based on specific types of development languages, application frameworks, or other constructs b) SaaS is the cloud-based equivalent of shrink- ... succinctly described as software that is deployed on a hosted service d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Platforms cannot be based on specific types of development languages, application frameworks, or other constructs b) PaaS systems offer a way to create user ... customers may interact with the software to enter and retrieve data d) All of the mentioned

Last Answer : PaaS systems offer a way to create user interfaces

Description : How many types of security boundary values exist in Cloud Cube model? a) 1 b) 2 c) 3 d) None of the mentioned

Last Answer : 2

Description : _________ model consists of the particular types of services that you can access on a cloudcomputing platform. a) Service b) Deployment c) Application d) None of the mentioned

Last Answer : Service

Description : Point out the correct statement. a) Platforms can be based on specific types of development languages, application frameworks, or other constructs b) SaaS is the cloud-based equivalent of shrink- ... succinctly described as software that is deployed on a hosted service d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned

Description : Which of the following is a core management feature offered by most cloud management service products? a) Support of different cloud types b) Creation and provisioning of different types of cloud ... and uptime, response time, resource quota usage, and other characteristics d) All of the mentioned

Last Answer : All of the mentioned

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage

Description : Which of the following correctly represents different types of mobile patterns? a) b) c)d) All of the mentioned

Last Answer : b) c) CSE-R17.BLO

Description : Which of the following correctly represents different types of mobile patterns? a) b) c)d) All of the mentioned

Last Answer : a)

Description : How many types of virtual private server instances are partitioned in an IaaS stack? a) One b) Two c) Three d) All of The Mentioned

Last Answer : Three

Description : Point out the wrong statement. a) Some APIs are both exposed as SOAP and REST b) The role of a cloud vendor specific API has impact on porting an application c) There are mainly three types of cloud storage d) None of the mentioned

Last Answer : There are mainly three types of cloud storage