State weather the following statement is true or false for Multipurpose Internet Mail
Extensions 1).The general syntax for MIME header fields is not the same as that for RFC
2822. 2).MIME header field names are never significant, but the cases of field values can b.
3). A MIME-compliant message must contain a header field with the following verbatim text:
MIME-Version: 1.0
A. 1. True, 2. true, 3. true
B. 1. true, 2. false, 3. false
C. 1. false, 2. false, 3. false
D. 1.false, 2. true, 3. true

1 Answer

Answer :

A. 1. True, 2. true, 3. true

Related questions

Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : b. content-transfer-encoding

Description : S/MIME in Internet technology stands for (A) Secure Multipurpose Internet Mail Extension (B) Secure Multimedia Internet Mail Extension (C) Simple Multipurpose Internet Mail Extension (D) Simple Multimedia Internet Mail Extension

Last Answer : (A) Secure Multipurpose Internet Mail Extension

Description : State weather the following statement is true or false for IPV6 Addressing 1). IPV6 is a routable protocol that addresses, routes, fragments, and reassembles packets 2).IPV6 is a connectionless, unreliable datagram protocol. 3). ... C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : A. 1. True, 2. true, 3. true

Description : In the MIME header field____describes how the object within the body is to be interpreted. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : a. content-type

Description : State weather the following statement is true or false for Stream Control Transmission Protocol (SCTP). 1). SCTP uses only few known ports in the TCP space. 2).SCTP is a new transport protocol at the same layer as TCP and ... , 3. false C. 1. false, 2. false, 3. false D. 1.false, 2. true, 3. true

Last Answer : D. 1.false, 2. true, 3. true

Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. False, 3. true

Description : In IPv6, the _______ field inthe baseheader restricts the lifetime ofa datagram. A) version B) next-header C) hoplimit D) neighbor-advertisemen

Last Answer : hoplimit

Description : _____ is an ideaor concept that isa precursor to an Internet standard. A) RCF B) RFC C) ID D) none of the above

Last Answer : RCF

Description : ……………………………. extends …………………………. to provide the full set of configuration parameters defined in the Requirements for Internet Hosts RFC. A. DHCP, BOOTP B. BOOTP, DHCP C. RARP, BOOTP D. DHCP, RARP

Last Answer : A. DHCP, BOOTP

Description : The IETF standards documents that describe various protocols applicable to the working of the Internet are called ________ a) RFC b) RCF c) ID d) DFC

Last Answer : a) RFC

Description : State weather the following statement is true or false for Internetwork layer. 1).Other internetwork-layer protocols are IP, ICMP, IGMP, ARP, and RARP. 2). Internet Protocol (IP) is the least important protocol in this layer ... 3.true C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : B. 1. true, 2. false, 3.true

Description : Which one of the following fields of an IP header is NOT modified by a typical IP router? a. Checksum b. Source address c. Time to Live (TTL) d. Length

Last Answer : b. Source address

Description : What are the different fields in pseudo header?

Last Answer : ∙ Protocol number ∙ Source IP address ∙ Destination IP addresses.

Description : The _______ field of the IGMP message is all zeros in a query message. A) version B) type C) group address D) noneof the above

Last Answer : group address

Description : For which one of the following reasons does Internet Protocol (IP) use the time-to- live (TTL) field in the IP datagram header? a. Ensure packets reach destination within that time b. ... packets from looping indefinitely d. Limit the time for which a packet gets queued in intermediate routers.

Last Answer : c. Prevent packets from looping indefinitely

Description : EDI over internet uses a. MIME to attach EDI forms to e-mail messages b. FTP to send business forms c. HTTP to send business forms d. SGML to send business forms

Last Answer : a. MIME to attach EDI forms to e-mail messages 

Description : Application layer protocol defines ____ a.types of messages exchanged b.message format, syntax and semantics c.rules for when and how processes send and respond to messages d.all of the mentioned

Last Answer : d.all of the mentioned

Description : Which of the following is a technique pharmacists can use to humanize themselves to their patients? a) Using the patient's preferred name in conversation b) Delegating as many tasks as possible to an ... the text of a medication bottle verbatim to a patient d) Providing business cards at the desk

Last Answer : c) Reading the text of a medication bottle verbatim to a patient 

Description : What is the main difference between DDCMP and SDLC? a. DDCMP does not need special hardware to final the beginning of a message b. DDCMP has a message header c. SDLC has a IP address d. SDLC does not use CRC

Last Answer : DDCMP does not need special hardware to final the beginning of a message

Description : In the SMTP header field_____ is a summary of the message being sent which is specified by the sender. a. Reply-to b. Return-path c. Subject d. From

Last Answer : c. Subject

Description : Which provision can resolve / overcome the shortcomings associated with duplication or failure condition of Stop and Wait Automatic Repeat Request protocol especially due to loss of data frames or non reception ... message b. Provision of checksum computation c. Both a & b d. None of the above

Last Answer : Provision of sequence number in the header of message

Description : Header of a Layer two frame usually contain ______________ A. synchronization bytes B. addresses C. frame identifier D. all of the mentioned

Last Answer : D. all of the mentioned

Description : State weather the following statement is true or false for Hierarchical Routing 1). In hierarchical routing, the routers are divided into regions. 2) Each router is having the idea about internal structure of other regions 3). ... C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true

Last Answer : D. 1. true, 2. false, 3. true

Description : State weather the following statement is true or false for Point-to-Point Protocol 1). It is still in widespread use for dial-up TCP/IP connections 2) Point-to-point circuits in the form of asynchronous lines have long been ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. false, 3. true

Last Answer : D. 1. true, 2. false, 3. true

Description : State weather the following statement is true or false for Token Bus 1).It is a linear or tree- shaped cable onto which the stations are attached. 2). the token propagates around the logical ring, with only the token holder ... 3. false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : D. 1. true, 2. true, 3. false

Description : State weather the following statement is true or false for ISDN - Integrated Services Digital Network ISDN is an effort to standardize subscriber services, provide user/network interfaces 2). the goal of ISDN is to form a Local ... C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. false, 3. true

Description : There is _____ number of standard content types in MIME A. 7 B. 5 C. 9 D. 4

Last Answer : A. 7

Description : How does MIME enhance SMTP?

Last Answer : MIME is a supplementary protocol that allows non-ASCII data to be sent through SMTP. MIME transforms non-ASCII data at the sender site to NVT ASCII data and deliverers it to the client SMTP to ... receives the NVT ASCII data and delivers it to MIME to be transformed back to the original data.

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : If the sender is a host and wants tosend a packet toanotherhost on another network, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : the IP address of therouter found inthe routing table

Description : f the sender is a host and wants tosend a packet toanotherhost on the samenetwork, the logical address that must be mapped to a physical address is ______. A) thedestination IP address in the datagram ... the IP address of therouter found inthe routing table C) either a or b D) noneof the above

Last Answer : hedestination IP address in the datagram header

Description : Which of the following statements is TRUE? a. Both Ethernet frame and IP packet include checksum fields b. Ethernet frame includes a checksum field and IP packet includes a CRC field c. Ethernet ... and IP packet includes a checksum field d. Both Ethernet frame and IP packet include CRC fields

Last Answer : Ethernet frame includes a CRC field and IP packet includes a checksum field

Description : In IPv6, when a datagram needs tobediscarded ina congested network, the decision is basedon the _______ field in thebase header. A) hop limit B) priority C) nextheader D) noneof the above

Last Answer : priority

Description : In IPv4, what is the value of the total length field in bytes if the header is 28 bytes and the data field is 400bytes? A) 428 B) 407 C) 107 D) 427

Last Answer : 428

Description : Which of the following is not a field in TCP header? a. Sequence number b. Fragment offset c. Checksum d. Window size

Last Answer : b. Fragment offset

Description : Which field/s of ICMPv6 packet header has/have a provision of minimal integrity level concerning to verification for ICMP messages? a. Type b. Code c. Checksum d. All of the above

Last Answer : c. Checksum

Description : The next header t is an _____ field of Authentication Header that identifies the type of what follows. A. 16-bit B. 64-bit C. 8-bit D. 32-bit

Last Answer : C. 8-bit

Description : In electronic mail, which of the following protocols allows the transfer of multimedia messages? (A) IMAP (B) SMTP (C) POP 3 (D) MIME

Last Answer : (D) MIME

Description : In version field of IPv4 header, when machine is using some other version of IPv4 then datagram is __________ a) Discarded b) Accepted c) Interpreted d) Interpreted incorrectly

Last Answer : a) Discarded

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of code that has the potential to compromise the security of an Internet user b. A cookie gains entry ... and time d. Cookies can be used to track the browsing pattern of a user at a particular site

Last Answer : a. A cookies is a piece of code that has the potential to compromise the security of an Internet user

Description : Write syntax and use of pow ()function of header file.

Last Answer : pow()- compute the power of a input value Syntax: double pow (double x, double y);

Description : State whether the following statements are true / false: 1) A fully qualified domain name starts with a specific host and ends with a top-level domain. 2) Domain names are always written as fully qualified domain names. A. 1.T, 2.T B. 1.T, 2.F C. 1.F, 2.T D. 1.F, 2.F

Last Answer : B. 1.T, 2.F

Description : Which one of the following describes the syntax of prolog program ? I. Rules and facts are terminated by full stop (.) II. Rules and facts are terminated by semicolon (;) III. Variables names must start with upper case alphabets. ... alphabets. Codes : (A) I, II (B) III, IV (C) I, III (D) II, IV

Last Answer : (C) I, III

Description : Javascript and Java has similar name because ........... is/are true. (a) Javascripts syntax is loosely based on Java's syntax (b) Javascript is stripped down version of Java (c) Java and Javascript are originated from Island of Java ... only (B) (a), (b) and (c) (C) (a) and (b) (D) (a) and (c)

Last Answer : Answer: A

Description : One of the fields on a form contains a text box which accepts alpha numeric values. Identify the Valid Equivalence class A. BOOK B. Book C. Boo01k D. book

Last Answer : C. Boo01k

Description : One of the fields on a form contains a text box which accepts numeric values in the range of 18 to 25. Identify the invalid Equivalance class A. 17 B. 19 C. 24 D. 21

Last Answer : A. 17

Description : What is the difference between the Ethernet frame preamble field and the IEEE 802.3 preamble and start of frame Delimiter fields? a. 1 byte b. 1 bit c. 4 bit d. 16 bit

Last Answer : a. 1 byte

Description : In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ………. a. 220 service ready message b. 421 service not available message c. Both of the above d. None of the above

Last Answer : c. Both of the above