Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above
Last Answer : C) Mail service
Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above
Last Answer : d. All of the above
Description : When a real time telephone call between people is made over the Internet using computers, it is called a) a chat session b) an e-mail c) an instant message d) internet telephony e) None of these
Last Answer : d) internet telephony
Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false
Last Answer : A. 1. True, 2. false, 3. true
Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP
Last Answer : c. m1: SMTP m2: POP m3: HTTP
Description : Which intermediaries are more likely to get involved during the transfer function of an e-mail system? a. Storage and forwarding of e-mail for certain addresses b. Act as gateways to other e-mail or messaging systems c. Both a & b d. None of the above
Last Answer : c. Both a & b
Description : Communication via New media such as computers, teleshopping, internet and mobile telephony is termed as (A) Entertainment (B) Interactive Communication (C) Development Communication (D) Communitarian
Last Answer : (B) Interactive Communication
Description : Which of the following is designated as the international distress, safety and calling frequency for radio telephony for stations of the maritime mobile service when using frequencies in the authorized bands between 156 and 174 MHz? A. 165.8 MHz B. 156.8 MHz C. 158.6 MHz D. 168.5 MHz
Last Answer : B. 156.8 MHz
Description : Which of the following layer protocols are responsible for user and theapplicationprogrammesupport such aspasswords, resource sharing, file transfer and network management? A. Layer 7 protocols B. Layer 6 protocols C. Layer 5 protocols D. Layer 4 protocols E. None of the above
Last Answer : Layer 7 protocols
Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id
Last Answer : b. content-transfer-encoding
Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server
Last Answer : A. electronic mail, server (storage)
Description : What is the difference between a user agent (UA) and a mail transfer agent (MTA)?
Last Answer : The UA prepares the message, creates the envelope, and puts the message in the envelope. The MTA transfers the mail across the Internet.
Description : What is a type of virus that spreads itself, not just from file to file, but from computer to computer via e‐mail and other Internet traffic? a. Computer virus b. Worm c. Denial‐of‐service attack d. None of the above
Last Answer : b. Worm
Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP
Last Answer : c. UDP, TCP, UDP and TCP
Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these
Last Answer : Telnet
Description : FTP stands for A) File transfer protocol B) File transmission protocol C) Form transfer protocol D) Form transmission protocol
Last Answer : A) File transfer protocol
Description : Silly Window Syndrome is related to a. Error during transmission b. File transfer protocol c. Degrade in TCP performance d. Interface problem
Last Answer : c. Degrade in TCP performance
Description : State weather the following statement is true or false for Multipurpose Internet Mail Extensions 1).The general syntax for MIME header fields is not the same as that for RFC 2822. 2).MIME header field names are never ... false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true
Last Answer : A. 1. True, 2. true, 3. true
Description : In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ………. a. 220 service ready message b. 421 service not available message c. Both of the above d. None of the above
Last Answer : c. Both of the above
Description : Subschema can be used to A. create very different, personalized views of the samedata B. present information in different formats C. hide sensitive informationby omitting fields from thesub¬schema's description D. All of theabove E. None of the above
Last Answer : All of theabove
Description : Which of the following are the network services? A) File service B) Print service C) Database service D) All of the above
Last Answer : D) All of the above
Description : How do the deaf and blind interact with technology, especially telephony?
Last Answer : Deaf people use TTY. Blind people do the same thing you do.
Description : when making a call, it must be canceled manually with the handset picked up. How and where to preset it to work the other way around - as it should .... thanks
Last Answer : Need Answer
Description : What is the term used in telephony and telegraphy for irregular disturbing radiation due to various causes and in a particular produced by arc transmitters causing a rushing sound in receiving telephones? A. Fax tone B. Mush C. Hiss D. Crosstalk
Last Answer : B. Mush
Description : Best describe as an amplifier used in radio telephony. A. Magnifier B. Class B C. Class C D. Class A
Last Answer : C. Class C
Description : Technical study which deals with production, transport and delivery of a quality signal from source to destination. A. Transmission system engineering B. Communication system engineering C. Telephony engineering D. Telegraphic engineering
Last Answer : A. Transmission system engineering
Description : How numbering plan is achieved in modern telephony? Give the structure with example.
Last Answer : The objective of numbering plan is to uniquely identify every subscriber connected to a telecommunication network. A numbering plan may be open, semiopen or closed. An open-numbering plan permits wide ... known as the subscriber number which is the number listed in the telephone directory.
Description : What are the different tones used in strowger telephony? Explain with the help of waveforms and the timings.
Last Answer : Dial Tone: This tone is used to indicate that the exchange is ready to accept dialed digits from the subscriber. The subscriber should start dialing only after hearing the dialing tone. Sometimes, ... as the call progresses through different exchanges. Fig. shows a routing tone pattern.
Description : Which of the following comes under supplementary ISDN services? a) Emergency calling b) Packet switched protocols c) Call diversion d) Standard mobile telephony
Last Answer : c) Call diversion
Description : Which of the following does not come under the teleservices of GSM? a) Standard mobile telephony b) Mobile originated traffic c) Base originated traffic d) Packet switched traffic
Last Answer : d) Packet switched traffic
Description : What is the process of copying software programs from secondary storage mediato the hard disk called? (A) Configuration (B) Download (C) Storage (D) Upload (E) Installation
Last Answer : Upload
Description : how long will it take me to download 5 MB of file on a 100mbs internet speed?
Last Answer : 6.82 minutes.
Description : There are ______________ Internet service providers. A) local B) regional C) nationaland international D) all of theabove
Last Answer : all of theabove
Description : MCI and AT&T are examples of whichof the following? A) Social networks B) Communications systems C) Internet service providers D) Mobisodes
Last Answer : Internet service providers
Description : Full form of OSI a. open system interconnection b. operating system interface c. optical service implementation d. open service Internet
Last Answer : a. open system interconnection
Description : OSI stands for __________ a) open system interconnection b) operating system interface c) optical service implementation d) open service Internet
Last Answer : a) open system interconnection
Description : A machine that connects to two or more electronic mail systems and transfers mail messagesamong them is known as A. Gateways B. mail gateway C. bridges D. User Agent E. None of the above
Last Answer : mail gateway
Description : What is the name of the softwarepackage that allows peopleto sendelectronic mail along anetworkof computers and workstations? A. Memory residentpackage B. Project management package C. Data communication package D. Electronic mail package E. None of the above
Last Answer : Data communication package
Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above
Last Answer : SMTP
Description : What is the full form of IMAP A)Internet Message Access Protocol B)Simple mail Transfer Protocol C)Internet Message Access Protocol D)None
Last Answer : A)Internet Message Access Protocol
Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper
Last Answer : A)Domain Name System
Last Answer : A)Internet Message Access Protoco
Description : Data integrity control A. is used to set upper and lower limits on numeric data B. requires the use of passwords toprohibit unauthorized access tothe file C. has the data dictionary keep thedate and time ... back-up,and most recent modificationfor all files D. All of theabove E. None of the above
Last Answer : has the data dictionary keep thedate and time of lastaccess last back-up,and most recent modificationfor all files
Description : A relational database management (RDBM) package manages datain morethan one file at once. How does itorganizethese file? As A. tables B. relations C. tuple D. both (a)and (b) E. None of the above
Last Answer : both (a)and (b)
Description : The master list of an indexed file A. is sortedin ascending order B. containsonly a list of keys and record numbers C. has a number assigned toeach record D. both (b)and (c) E. None of the above
Last Answer : has a number assigned toeach record
Description : The physical location of arecord isdetermined bya mathematical formula that transforms a file key into a record location in A. a tree file B. an indexed file C. a hashedfile D. a sequential file E. None of the above
Last Answer : a hashedfile
Description : It is more accurate to define a _____ as a variety of different recordtypes that aretreated as asingle unit A. Database B. Table C. Record D. Flat File E. None of the above
Last Answer : Database
Description : Database management systems are intended to: A. eliminatedata redundancy B. establishrelationships among records in different files C. manage file access D. maintaindata integrity E. All of theabove