Description : Participate can see and hear each other in a/an: a) Electronic Mail System b) Message System c) Tele - Conference d) Bulletin Board e) None of The Above
Last Answer : c) Tele - Conference
Description : What is the full form of IMAP A)Internet Message Access Protocol B)Simple mail Transfer Protocol C)Internet Message Access Protocol D)None
Last Answer : A)Internet Message Access Protocol
Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper
Last Answer : A)Domain Name System
Last Answer : A)Internet Message Access Protoco
Description : When sending an e-mail, the _____ line describes the contents of the message. 1) to 2) subject 3) contents 4) CC 5) None of these
Last Answer : Answer :2
Description : Which is a hardware component or system of components that allows a human being to interact with a computer? A. Interface device (IDF) B. Graphical User Interface (GUI) C. Musical Digital Instrument Interface (MIDI) D. None of the Above
Last Answer : A. Interface device (IDF)
Description : Didn't the inexorable march to cloud-based, metered service actually begin long ago with the development of activation codes and perhaps even of webmail?
Last Answer : answer:Software as a Service has been around for a bit (linking wikipedia because it explains it better than I could). Better web technologies and faster internet connections made it possible for companies ... quite as easy to learn, but the communities try to support anyone who takes an interest.
Description : If a webmail provider asks you for your cellphone number do you give it?
Last Answer : No, I certainly wouldn’t. Too much information about me is out there already.
Description : Is there a way to hide the small smiley face on a Wordpress.com weblog?
Last Answer : answer:I can’t find any way to do it without custom CSS. Which would just be img#wpstats{width:0px;height:0px;overflow:hidden} at the end of the stylesheet. That’s a really bad call on their part, if you ask me. I’d consider bitching at them.
Description : Who first used the term Weblog ?
Last Answer : Weblog was first used by US citizen Rjon Berger.
Description : What process is a feature of webmail?
Last Answer : What is the answer ?
Description : The word "blog" is a shortened version of __________. A. webblog B. weblog C. welog D. vlog
Last Answer : B. weblog
Description : Is there something similar to Google Reader that allows me to read posts on a private forum?
Last Answer : Many forums actually use RSS, or at least produce RSS feeds for each thread. Hunt around for the little orange broadcast button, or look through the about/help sections of their forum software.
Description : Which of the following is an advantage of mounting an application on the web? a) The possibility of 24 hour access for users b) Creating a system that can be extended globally c) Standardizing the design of the interface d) All of The Above e) None of The Above
Last Answer : d) All of The Above
Description : An interface that provides I/O transfer of data directly to and form the memory unit and peripheral is termed as________ A. DDA B. Serial interface C. Direct Memory Access (DMA) D. None of the Above
Last Answer : C. Direct Memory Access (DMA)
Description : Which is not true for primary storage: a) Information must be transferred to primary storage b) It is relatively more expensive c) It allows very fast access to data d) It is part of processor e) None of The Above
Last Answer : d) It is part of processor
Description : _______ allows users to access accounts and pay bills (1) Distance Learning (2) Online Banking (3) E-Commerce (4) Multimedia
Last Answer : E-Commerce
Description : What is the name of the software that allows us to browse through web pages called ? 1) Browser 2) Mail Client 3) FTP Client 4) Messenger
Last Answer : 1) Browser
Description : What is the name of the software that allows us to browse through web pages called ? 1 Browser 2 Mail Client 3 FTP Client 4 Messenger
Last Answer : 1 Browser
Description : When sending an e-mail, the _____line describe the contents of the message: a) Subject b) Contents c) CC d) None of These
Last Answer : a) Subject
Description : If you want to connect to your own computer through the internet from another location, you can use: a) E - Mail b) FTP c) Instant Message d) Telnet e) None of The Above
Last Answer : c) Instant Message
Description : When sending an e-mail, the … line describe the contents of the message a) Subject b) To c) Contents d) CC e) None of these
Description : When a real time telephone call between people is made over the Internet using computers, it is called a) a chat session b) an e-mail c) an instant message d) internet telephony e) None of these
Last Answer : d) internet telephony
Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet
Last Answer : C) NFS
Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack
Last Answer : d. SQL Injection attack
Description : An _____ is a contract between a class and the outside world. When a class implements an interface, it promises to provide the behavior published by that ______: a) Object b) Interface c) Package d) None of These
Last Answer : b) Interface
Description : _____ transforms one interface into another interface 1) Program 2) Software 3) Data 4) None
Last Answer : 2) Software
Description : _____ transforms one interface into another interface 1 Program 2 Software 3 Data 4 None
Last Answer : 2 Software
Description : The software that allows users to surf the Internet is called a/an _____: a) Search Engine b) Internet Service Provider c) Multimedia Application d) Browser e) Internet Surfing Provider
Last Answer : d) Browser
Description : ……………. Allows definitions and query language statements to be entered; query results are formatted and displayed. A) Schema Processor B) Query Processor C) Terminal Interface D) None of the above
Last Answer : C) Terminal Interface
Description : A(n) _____ bill of lading does not guarantee that the goods have been loaded on the vessel. A. on-board B. foul C. received-for-shipment D. straight E. order
Last Answer : C. received-for-shipment
Description : If tomorrow you wake up anywhere between 500 and 2000 years in the past, what would you do to get a message across time to inform friends or families of what happened?
Last Answer : I wouldn’t live long enough in North America 500 – 2000 years ago to leave a message.
Description : Enter your question herei havent received my w2s n the mail yet is there any way you can access it so i can file my taxes without having to wait another year to do so?
Last Answer : i havent received my w2s n the mail yet is there any way you can acess it for me so i can goahead and file?
Description : Which among the following is correct about goals in cryptography: a) Confidentiality - Only an authorized recipient should be able to extract the contents of the message from its encrypted form. Resulting from steps ... not be able to deny sending the message e) None of These f) All of the Above
Last Answer : f) All of the Above
Description : IMAP stand for………… a. Internet message access protocol b. Internet mailing access protocol c. Information access protocol d. None of these
Last Answer : a. Internet message access protocol
Description : Joystick allows movements in _____ directions. A. Up and Down B. Left an Right C. Both (A) and (B) D. None of the Above
Last Answer : C. Both (A) and (B)
Description : The Switching Elements are also called as ………. A. host B. subnet C. Interface Message Processors (IMPs) D. both a and b
Last Answer : C. Interface Message Processors (IMPs)
Description : Which of the following is not valid with reference to Message Passing Interface (MPI)? (A) MPI can run on any hardware platform (B) The programming model is a distributed memory model. (C) All ... implicit. (D) MPI - Comm - Size returns the total number of MPI processes in specified communication.
Last Answer : (C) All parallelism is implicit.
Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above
Last Answer : All of theabove
Description : The x.25 standard specifies a a. technique for start-stop data b. technique for dial access c. DTE/DCE interface d. data bit rate e. none of above
Last Answer : DTE/DCE interface
Description : How can i connect a digi 002 pro tools interface to a mixing board and external mic preamps?
Last Answer : answer:I'm a bit confused; isn't the presonus an A/D converter in itself? How many simultaneous inputs are you trying to get here? How many mics are you trying to get going at the same ... Describe your setup and goals for tracking and we'll see what we can suggest for your signal chain solution.
Description : ECE Board Exam March 1996 What is the number of pins in the RS-232C interface? A. 25 B. 15 C. 20 D. 20
Last Answer : A. 25
Description : ECE Board Exam March 1996 The standard that specifies a balanced interface cable that will operate bit rates up to 10 Mbps with in a span distances up to 1200 m. A. RS-423A B. RS-422A C. RS-550A D. RS-449A
Last Answer : B. RS-422A
Description : Junk e-mail is also called _____: a) Spam b) Spoof c) Cookie Crumbs d) Sniffer Script e) Spill
Last Answer : a) Spam
Description : How can I store my pictures externally, but access them from anywhere?
Last Answer : answer:I’m trying to future proof this solution as well I admit to being snoopy :)
Description : if i get a network hard drive will i be able to access it from anywhere?
Last Answer : answer:OS X Leopard will add easier networking and backup options, and if you get a new AirPort Extreme Base Station, your external hard drive can be attached to it and becomes a part of your network. Those items will be my next big Apple purchase, probably in the early part of next year. :)
Description : Point out the wrong statement. a) Securing data sent to, received from, and stored in the cloud is the single largest security concern b) The problem with the data you store in the cloud is that ... the cloud from direct client access is to create layered access to the data d) All of the mentioned
Last Answer : One and only approach to isolating storage in the cloud from direct client access is to create layered access to the data
Description : Benefit of cloud computing services A. Fast B. Anywhere access C. Higher utilization D. All of the above
Last Answer : D. All of the above
Description : The issues that deal with the collection and use of data about individual is _____: a) Access b) Publicity c) Accuracy d) Property e) Privacy
Last Answer : e) Privacy