If you want to connect to your own computer through the internet from another
location
you can use:
a) Telnet
b) Instant Messaging
c) FTP
d) E- Mail
e) None of These

1 Answer

Answer :

a) Telnet

Related questions

Description : If you want to connect to your own computer through the internet from another location, you can use: a) E - Mail b) FTP c) Instant Message d) Telnet e) None of The Above

Last Answer : c) Instant Message

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : Which of these is not a means of personal communication on the internet? a) Chat b) Instant messaging c) Instanotes d) Electronic mail e) None of these

Last Answer : c) Instanotes

Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP

Last Answer : d. SMTP

Description : Which protocol is commonly used to retrieve email from a mail server? a) FTP b) IMAP c) HTML d) TELNET

Last Answer : b) IMAP

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : WWW provides standardized access to: a) GOPHER b) TELNET c) FTP d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer

Last Answer : d. Application layer

Description : Internet provides _______ for remote login. a) telnet b) http c) ftp d) rpc

Last Answer : telnet

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Explain following: I. Telnet II. FTP 

Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : What are some of the benefits of using a firewall for your LAN? 1) Increased access to Instant Messaging 2) Stricter access control to critical resources 3) Greater security to your LAN 4) Both 2 and 3

Last Answer : 4) Both 2 and 3

Description : What are some of the benefits of using a firewall for your LAN? 1 Increased access to Instant Messaging 2 Stricter access control to critical resources 3 Greater security to your LAN 4 Both 2 and 3

Last Answer : 4 Both 2 and 3

Description : Distinguish between FTP and Telnet. -Technology

Last Answer : FTP (File Transfer Protocol) facilitates the transfer of files from one point to another while Telnet is a connection protocol that allows a user to connect to a remote server.

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : In which layer Telnet and FTP works?  a. Application b. Session c. Network d. Physical 

Last Answer : In which layer Telnet and FTP works?  a. Application b. Session c. Network d. Physical 

Description : My friends were using text messaging to instant message people through aim?

Last Answer : Were they? You should ask them how.

Description : When a real time telephone call between people is made over the Internet using computers, it is called a) a chat session b) an e-mail c) an instant message d) internet telephony e) None of these

Last Answer : d) internet telephony

Description : What is the name of the software that allows us to browse through web pages called ? 1) Browser 2) Mail Client 3) FTP Client 4) Messenger

Last Answer : 1) Browser

Description : What is the name of the software that allows us to browse through web pages called ? 1 Browser 2 Mail Client 3 FTP Client 4 Messenger

Last Answer : 1 Browser

Description : Point out the wrong statement. a) All IM clients use peer-to-peer messaging b) IM software aimed at businesses such as XMPP, Lotus Sametime, and Microsoft Office Communicator use a client/server ... messaging is as popular in business as it is in personal communications d) None of the mentioned

Last Answer : None of the mentioned

Description : Do you know of any books that critique texting, instant messaging, or casual speech/writing among teens and young adults througout history?

Last Answer : answer:Try something like this: link The general area for that type of material appears to be (LC Classification: LC149) http://primo02v1 ... =false&query=isbn%2Cexact%2C0415687152&scp.scps=&dstmp=1413557781921&dym=true&bulkSize=30&vl(freeText0)=0415687152&group=GUEST&vid=discovere&institution=EMORY

Description : Is instant messaging ruining your life?

Last Answer : Nope. The opposite. Just text messages – no email. Fewer phone calls.

Description : Does "kk" stand for anything when chatting/instant messaging?

Last Answer : I’m guessing it’s similar to “ok,” “mk,” “k,” “mkay,” “okay,” etc. And they said the internet squelches creativity…

Description : Do you think communication technologies like blogs, instant messaging, texting, and the like, have weakened humanity's ability to communicate orally?

Last Answer : Actually, I think they have enhanced it for me. Now, how I type online is a lot like how I speak. In fact, I sometimes even mouth the words as I type them when I'm IMing, etc. The ... and express them accordingly is good, and even if it is online, it still improves my oral communication as well.

Description : Best instant messaging protocol?

Last Answer : answer:http://en.wikipedia.org/wiki/Comparison_of_instant_messaging_protocols Personally i prefer XMPP – lots of tools/features and easy to get going.

Description : Which Instant Messaging client is most reliable?

Last Answer : i prefer pidgin http://pidgin.im

Description : Instant messaging help!

Last Answer : adium on a mac trillian on PC

Description : How many types of protocols are important for instant messaging? a) 2 b) 3 c) 4 d) All of the mentioned

Last Answer : 3

Description : Is it safe to send sensitive data via email or instant messaging (IM)?

Last Answer : No, you shouldn’t send sensitive personal information like credit card numbers, passwords, your date of birth or Social Security number using email or IM on your computer or any other Web-enabled devices such as a smartphone, tablet or personal digital assistant (PDA).

Description : EDI over internet uses a. MIME to attach EDI forms to e-mail messages b. FTP to send business forms c. HTTP to send business forms d. SGML to send business forms

Last Answer : a. MIME to attach EDI forms to e-mail messages 

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above

Last Answer : SMTP

Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system

Last Answer : d. Messaging‐based workflow system

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : The process of transferring files from computer on the internet is called: a) Downloading b) Uploading c) FTP e) JPEG f) Downsizing

Last Answer : b) Uploading

Description : .............. is a protocol used by e-mail clients to download emails to your computer. (A) TCP (B) FTP (C) SMTP (D) POP

Last Answer : Answer: D

Description : The process of transferring files from a computer on the Internet to your computer is called-- 1) Downloading 2) Uploading 3) FTP 4) JPEG

Last Answer : 1) Downloading

Description : The process of transferring files from a computer on the Internet to your computer is called-- 1 Downloading 2 Uploading 3 FTP 4 JPEG

Last Answer : 1 Downloading

Description : Which type of network is used to connect a company located in one area of a city to another location in a city far away? a.LAN b.PAN c.MAN d.WAN

Last Answer : d.WAN

Description : Which intermediaries are more likely to get involved during the transfer function of an e-mail system? a. Storage and forwarding of e-mail for certain addresses b. Act as gateways to other e-mail or messaging systems c. Both a & b d. None of the above

Last Answer : c. Both a & b

Description : Point out the correct statement. a) Every third-party IM clients aim to allow their users to connect to the different major IM services b) SIP stands for Secure Initiation Protocol c) XMPP stands for Extensible Messaging and Presence Protocol d) All of the mentioned

Last Answer : XMPP stands for Extensible Messaging and Presence Protocol

Description : EDIFACT is a standard a. for representing business forms used in e-Commerce b. for e-mail transaction for e-Commerce c. for ftp in e-Commerce d. protocol used in e-Commerce

Last Answer : a. for representing business forms used in e-Commerce 

Description : Which of the following is not a internet protocol: a) STP b) HTTP c) FTP d) None of These

Last Answer : a) STP

Description : Which of the following of the TCP/IP protocolsis the used for transferring filesfrom one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : You walk into your house the electricity is out you see three doors that you have never seen before. You go through the one with a lion that hasn't eaten for over six months. There are another three ... the knife or the electric chair that will kill you in an instant. How will you survive? -Riddles

Last Answer : The electric chair because your electricity is out.

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : C) ii, iii and iv only