To contact people using the internet, you most often use their:
a) domain names
b) e-mail addresses
c) usernames
d) passwords
e) None of these

1 Answer

Answer :

b) e-mail addresses

Related questions

Description : How you manage all your web services account usernames and passwords?

Last Answer : answer:I use Firefox and the Google Browser Sync extension. http://www.google.com/tools/firefox/browsersync/index.html It has never given me any problems.

Description : Why won't the iPhone version of safari remember my passwords and usernames for websites I visit?

Last Answer : Not entirely sure. You may be deleting cookies too much. My iPod touch does the same thing :S

Description : How do you store your usernames and passwords?

Last Answer : I use 1password. It works pretty freakin’ good. Even on iPhone. I think its for macs only.

Description : E-mail addresses separate the user name from the ISP using the .... symbol. 1) & 2) @ 3) % 4) *

Last Answer : 2) @

Description : A computer checks the _____ of user names and passwords for 9 a match before granting access. 1) Website 2) Network 3) Backup file 4) Data base 5) None of these

Last Answer : Answer :4

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : Due to the growth of the internet and the predicted depletion of available addresses, a new version of IP version 6 using _____for the address was developed in 1995: a) 128 Bits b) 129 Bits c) 130 Bits d) None of These

Last Answer : a) 128 Bits

Description : Due to the growth of the internet and the predicted depletion of available addresses, a new version of IP version 6 using _____for the address was developed in 1995: a) 128 Bits b) 129 Bits c) 130 Bits d) None of These

Last Answer : a) 128 Bits

Description : 8. Nslookup can be used to gather information regarding which of the following? A. Host names and IP addresses B. Whois information C. DNS server locations D. Name server types and operating systems

Last Answer : A. Host names and IP addresses

Description : Consider the following statements about Internet facility: 1) It serves as the largest one-line information system. 2) It provides the most dependable and latest mode for sending E-mail. 3) Recurring ... communication E-mail is very high. 4) It is often misused and has triggered cyber-crimes.

Last Answer : 1) It serves as the largest one-line information system

Description : Do you use the same user names and passwords for all of your websites, accounts, etc...?

Last Answer : NO! I user differnent passwords. It’s particularly risky to use the same password in more than one place as your user name for most websites is your email address and some idiot website owners keep user names and passwords in plain text data bases

Description : Have you noticed all the eBay usernames using this format: "b***r"?

Last Answer : Maybe they all have swear word as names… b***r could be bugur, a retard-phonetical version of bugger? Sounds like a conspiracy

Description : What are the two parts of an E - mail address? a) User Name and Street Address b) Legal Name and Phone Number c) User Name and Domain Name d) Initials and Password e) User Name and Recipient Name

Last Answer : c) User Name and Domain Name

Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned

Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Which among the following is correct: a) An IP address can be private - for use on Local Area Network (LAN). b) It can be use on the internet or other wide area network (WAN). c) IP addresses ... dynamically (assigned by another device on the network on demand). d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Why do people put X's in front of their usernames?

Last Answer : answer:I don’t see that very often myself on Fluther, but people do that kind of thing because it is an easy and memorable modification of a common name that is already in use. So if you want to be “fred”, but someone else is already registered as “fred”, you can choose “fredx”.

Description : Where do people get their usernames?

Last Answer : I got my username from my parents, lol.

Description : Can e-mail addresses & other personal informations be traced through your IP address?

Last Answer : In most cases, no. You are likely to be using a dynamic IP address that is changing. You could be traced to the owner of the IP block from which it was allocated (almost certainly your ISP ... d have to be doing something seriously bad before anyone would allocate the time and resources to find you.

Description : Which intermediaries are more likely to get involved during the transfer function of an e-mail system? a. Storage and forwarding of e-mail for certain addresses b. Act as gateways to other e-mail or messaging systems c. Both a & b d. None of the above

Last Answer : c. Both a & b

Description : High levels of demand have decreased the supply of un-allocated internet protocol version 4 addresses available for assignment to internet service providers and end user organization since the _____: a) 1980s b) 1990s c) 2000s d) None of These

Last Answer : a) 1980s

Description : ........... is responsible for converting the higher level protocol addresses to physical Network Addresses. A) Address Resolution Protocol (ARP) B) Reverse Address Resolution Protocol (RARP) C) Bootstrap Protocol (BOOTP) D) Internet Control Message Protocol (ICMP)

Last Answer : A) Address Resolution Protocol (ARP)

Description : To whom is the IP addresses were traced ? a. Internet Service Provider b. Cyber Crime Office c. Only (a) d. None of the above

Last Answer : a. Internet Service Provider

Description : When a real time telephone call between people is made over the Internet using computers, it is called a) a chat session b) an e-mail c) an instant message d) internet telephony e) None of these

Last Answer : d) internet telephony

Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these

Last Answer : a) Cybergaming crime

Description : Secure internet passwords - at one point does it not matter any more?

Last Answer : answer:@elbanditoroso The cracking programs are using dictionaries of millions of known existing passwords plus algorithms that manipulate the existing ones (substitute O's of 0's, 1's for l's etc.). ... crack that password it'll be worthless to them because it's used nowhere else on the internet.

Description : Do you still have to remember usernames with "SuperGenPass"? what about password lenght requirements that are diff on diff sites, also: any alternatives you guys use that's 100% hacker safe?

Last Answer : answer:i just use the same…i don’t care that people see me on empornium etc. but ofcourse, everything will never be fully hackproof…

Description : What Fluther usernames play mind tricks on you?

Last Answer : Rarebear

Description : What are some good usernames for Tumblr?

Last Answer : How about “harmonic pudenda”?

Description : GMail: Why am I suddenly unable to be logged in under two usernames at once?

Last Answer : Wow, I’ve never been able to use both at the same time, I always have to sign out and back in, and if I’m signed into my Fluther one and I log into youtube it signs me out and back into my regular one. How did you even do it in the first place? No fair!

Description : Where can i find a tutorial on how to make a website with logins and usernames (without cms)

Last Answer : answer:http://net.tutsplus.com/tutorials/php/user-membership-with-php/ There is no simple way around this. You are going to need to know how to set up a database and know a bit of PHP. Adding a ... day. It might be worth it to just hire someone to do it for you. Opportunity costs and all that.

Description : How can we change our usernames on Fluther?

Last Answer : Like herpes, you’re carrying that username to your grave. If you want to have a different usename you are just going to have to create a new Fluther account.

Description : Usernames on your facebook profile?

Last Answer : icehky06 is probably fairly unique.

Description : How about a game with our usernames?

Last Answer : answer:Maybe a little more elaboration, but if it’s like the name game then I’ll go first. Eambos

Description : What are y'all roblox username's and do y'all play bee swarm because I can help you guys if you do?

Last Answer : I am a very pro at bee swarm I am at the mid-late game my name is jackie_elemental but I ain't got a lot of bees only 35.

Description : Which of the following will help you to improve your LAN security? 1) Change your passwords frequently 2) Install a firewall program 3) Use a proxy 4) All of the above

Last Answer : 3) Use a proxy

Description : Which of the following will help you to improve your LAN security? 1 Change your passwords frequently 2 Install a firewall program 3 Use a proxy 4 All of the above

Last Answer : 3 Use a proxy

Description : Question about importing mail from one of my g-mail email addresses to another?

Last Answer : If you want mail to be delivered from 2 to 1 as it arrives (or vice versa, from 1 to 2, but obviously not both directions), then you’re in the wrong place. You want to be in the tab for “Forwarding and POP/IMAP” to enable mail to be sent to one address and instantly appear in the other.

Description : mail.google.com, gmail.com, google.com/gmail If you enter these three addresses , why does the same page appear ?

Last Answer : Abul Kalam Azad - Abul , Kalam , Azad are 3 names of the same person. Much like this. Here the red domain from the mail domain server Google to the other 2 URLs / domains with the main domain . There is only one of these three - googlemail.com .

Description : Book of addresses instructions is maintained by a) Deposit Assistant b) Postmaster c) Mail Assistant d) Sorting Assistant

Last Answer : a) Deposit Assistant

Description : At the office of delivery, an unregistered article of the letter mail addressed to more than on person is a) Delivered to any one of the addresses b) Returned to Sender c) Delivered to any one of the addresses but in the order in which the name appear on the cover d) None of these

Last Answer : c) Delivered to any one of the addresses but in the order in which the name appear on the cover

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : Coded entries which are used to gain access to a computer system are called: a) Passwords b) Coded Instructions c) Conceal Feed Entry d) None of These

Last Answer : a) Passwords

Description : Which among the following is wrong characteristic of "Phishing": a) Fakers, by offering special rewards or money prize etc asked for personal information such as passwords, credit card information, social ... purpose is theft or misuse the acquired material c) Both of Above d) None of These

Last Answer : d) None of These

Description : In the United Kingdom, the Regulation of Investigatory Powers Act gives UK police the powers to force suspects to _____that protect encryption keys: a) Hand over passwords b) Decrypt Files c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : ................is to protect data and passwords. A) Encryption B) Authentication C) Authorization D) Non-repudiation

Last Answer : A) Encryption

Description : Which of the following is used to protect objects in computer system, in the absence of more complete protection schemes? (1) digital certificate (2) digital signature (3) passwords (4) tokens

Last Answer : passwords