Which is a time-sensitive service?
A. File transfer
B. File download
C. E-mail
D. Internet telephony

1 Answer

Answer :

D. Internet telephony

Related questions

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above

Last Answer : d. All of the above

Description : When a real time telephone call between people is made over the Internet using computers, it is called a) a chat session b) an e-mail c) an instant message d) internet telephony e) None of these

Last Answer : d) internet telephony

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : Which intermediaries are more likely to get involved during the transfer function of an e-mail system? a. Storage and forwarding of e-mail for certain addresses b. Act as gateways to other e-mail or messaging systems c. Both a & b d. None of the above

Last Answer : c. Both a & b

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : Communication via New media such as computers, teleshopping, internet and mobile telephony is termed as (A) Entertainment (B) Interactive Communication (C) Development Communication (D) Communitarian

Last Answer : (B) Interactive Communication 

Description : Which of the following is designated as the international distress, safety and calling frequency for radio telephony for stations of the maritime mobile service when using frequencies in the authorized bands between 156 and 174 MHz? A. 165.8 MHz B. 156.8 MHz C. 158.6 MHz D. 168.5 MHz

Last Answer : B. 156.8 MHz

Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above

Last Answer : Layer 7 protocols

Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : b. content-transfer-encoding

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : What is the difference between a user agent (UA) and a mail transfer agent (MTA)?

Last Answer : The UA prepares the message, creates the envelope, and puts the message in the envelope. The MTA transfers the mail across the Internet.

Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above

Last Answer : b. Worm

Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP

Last Answer : c. UDP, TCP, UDP and TCP

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : FTP stands for A) File transfer protocol B) File transmission protocol C) Form transfer protocol D) Form transmission protocol

Last Answer : A) File transfer protocol

Description : Silly Window Syndrome is related to a. Error during transmission b. File transfer protocol c. Degrade in TCP performance d. Interface problem

Last Answer : c. Degrade in TCP performance

Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ………. a. 220 service ready message b. 421 service not available message c. Both of the above d. None of the above

Last Answer : c. Both of the above

Description : Subschema can be used to A. create very different, personalized views of the samedata B. present information in different formats C. hide sensitive informationby omitting fields from thesub¬schema's description D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Which of the following are the network services? A) File service B) Print service C) Database service D) All of the above

Last Answer : D) All of the above

Description : How do the deaf and blind interact with technology, especially telephony?

Last Answer : Deaf people use TTY. Blind people do the same thing you do.

Description : when making a call, it must be canceled manually with the handset picked up. How and where to preset it to work the other way around - as it should .... thanks

Last Answer : Need Answer

Description : What is the term used in telephony and telegraphy for irregular disturbing radiation due to various causes and in a particular produced by arc transmitters causing a rushing sound in receiving telephones? A. Fax tone B. Mush C. Hiss D. Crosstalk

Last Answer : B. Mush

Description : Best describe as an amplifier used in radio telephony. A. Magnifier B. Class B C. Class C D. Class A

Last Answer : C. Class C

Description : Technical study which deals with production, transport and delivery of a quality signal from source to destination. A. Transmission system engineering B. Communication system engineering C. Telephony engineering D. Telegraphic engineering

Last Answer : A. Transmission system engineering

Description : How numbering plan is achieved in modern telephony? Give the structure with example.

Last Answer :  The objective of numbering plan is to uniquely identify every subscriber connected to a telecommunication network. A numbering plan may be open, semiopen or closed. An open-numbering plan permits wide ... known as the subscriber number which is the number listed in the telephone directory.   

Description : What are the different tones used in strowger telephony? Explain with the help of waveforms and the timings.

Last Answer : Dial Tone: This tone is used to indicate that the exchange is ready to accept dialed digits from the subscriber. The subscriber should start dialing only after hearing the dialing tone. Sometimes, ... as the call progresses through different exchanges. Fig. shows a routing tone pattern.   

Description : Which of the following comes under supplementary ISDN services? a) Emergency calling b) Packet switched protocols c) Call diversion d) Standard mobile telephony

Last Answer : c) Call diversion

Description : Which of the following does not come under the teleservices of GSM? a) Standard mobile telephony b) Mobile originated traffic c) Base originated traffic d) Packet switched traffic

Last Answer : d) Packet switched traffic

Description : What is the process of copying software programs from secondary storage mediato the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation

Last Answer : Upload

Description : how long will it take me to download 5 MB of file on a 100mbs internet speed?

Last Answer : 6.82 minutes.

Description : There are ______________ Internet service providers. A) local B) regional C) nationaland international D) all of theabove

Last Answer : all of theabove

Description : MCI and AT&T are examples of whichof the following? A) Social networks B) Communications systems C) Internet service providers D) Mobisodes

Last Answer : Internet service providers

Description : Full form of OSI a. open system interconnection b. operating system interface c. optical service implementation d. open service Internet

Last Answer : a. open system interconnection

Description : OSI stands for __________ a) open system interconnection b) operating system interface c) optical service implementation d) open service Internet

Last Answer : a) open system interconnection

Description : A machine that connects to two or more electronic mail systems and transfers mail messagesamong them is known as A. Gateways B. mail gateway C. bridges D. User Agent E. None of the above

Last Answer : mail gateway

Description : What is the name of the softwarepackage that allows peopleto sendelectronic mail along anetworkof computers and workstations? A. Memory residentpackage B. Project management package C. Data communication package D. Electronic mail package E. None of the above

Last Answer : Data communication package

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above

Last Answer : SMTP

Description : What is the full form of IMAP A)Internet Message Access Protocol B)Simple mail Transfer Protocol C)Internet Message Access Protocol D)None

Last Answer : A)Internet Message Access Protocol

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : What is the full form of IMAP A)Internet Message Access Protocol B)Simple mail Transfer Protocol C)Internet Message Access Protocol D)None

Last Answer : A)Internet Message Access Protoco

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above

Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files

Description : A relational database management (RDBM) package manages datain morethan one file at once. How does itorganizethese file? As A. tables B. relations C. tuple D. both (a)and (b) E. None of the above

Last Answer : both (a)and (b)

Description : The master list of an indexed file A. is sortedin ascending order B. containsonly a list of keys and record numbers C. has a number assigned toeach record D. both (b)and (c) E. None of the above

Last Answer : has a number assigned toeach record

Description : The physical location of arecord isdetermined bya mathematical formula that transforms a file key into a record location in A. a tree file B. an indexed file C. a hashedfile D. a sequential file E. None of the above

Last Answer : a hashedfile

Description : It is more accurate to define a _____ as a variety of different recordtypes that aretreated as asingle unit A. Database B. Table C. Record D. Flat File E. None of the above

Last Answer : Database

Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove

Last Answer : All of theabove