Identify the correct order in which a server
process must invoke the function calls
accept, bind, listen, and recv according to
UNIX socket API
a. listen, accept, bind recv
b. bind, listen, accept, recv
c. bind, accept, listen, recv
d. accept, listen, bind, recv

1 Answer

Answer :

b. bind, listen, accept, recv

Related questions

Description : Which of the following system calls results in the sending of SYN packets? a. socket b. bind c. listen d. connect

Last Answer : d. connect

Description : Socket-style API for windows is called ____________ a. wsock b. winsock c. wins d. sockwi

Last Answer : b. winsock

Description : Socket-style API for windows is called ____________ a. wsock b. winsock c. wins d. sockwi

Last Answer : b. winsock

Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. False, 3. true

Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3

Last Answer : a. 4,2,1,3

Description : An endpoint of an inter-process communication flow across a computer network is called a. socket b. pipe c. port d. machine

Last Answer : a. socket

Description : An endpoint of an inter-process communication flow across a computer network is called a. socket b. pipe c. port d. machine

Last Answer : a. socket

Description : Simple Storage Service use for? A. It allows the users to store and retrieve various types of data using API calls. B. It does contain computing element. C. Both A and B D. None of the above

Last Answer : It allows the users to store and retrieve various types of data using API calls.

Description : To invoke the LISP system, you must enter __________ a) AI b) LISP c) CL (Common Lisp) d) Both LISP and CL

Last Answer : b) LISP

Description : To invoke the LISP system, you must enter a. AI b. LISP c. both b and c d. None of the above

Last Answer : d. None of the above

Description : A ________ is a 16-bit number used by the host-to-host protocol to identify to which higher- level protocol or application program (process) it must deliver incoming messages A. connection B. UDP C. port D. TCP

Last Answer : C. port

Description : _______ is the protocol suite for thecurrent Internet. A) TCP/IP B) NCP C) UNIX D) ACM

Last Answer : TCP/IP

Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls

Last Answer : B. Unix

Description : What does SSL stands for ? System socket layer Secure system login Secure socket layer Secure system login

Last Answer : Secure socket layer

Description : HMP (Host Monitoring Protocol) is: A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... used to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol used to monitor computers

Description : ICMP (Internet Control Message Protocol) is A. a TCP/IP protocol used todynamically bind ahigh level IP Address to alow-level physical hardware address B. a TCP/IP high level protocol for transferring ... to monitor computers D. a protocol that handles error andcontrol messages E. None of the above

Last Answer : a protocol that handles error andcontrol messages

Description : Transferring Files From Windows To UNIX Server?

Last Answer : Many companies are switching to a different platform because ofthe many issues they have with Windows. UNIX is one of the mostpopular choices, but often requires that employees be trained. Thissystem is difficult ... to a Windows server.The transfer process is simple, but may take some time. It is

Description : Ingres is a ........................ A) Socket B) Compiler C) Database D) Web server

Last Answer : C) Database

Description : Which of the following is/ are the characteristics of friend function. A) It is not in the scope of the class to which it has been declared as friend. B) It can invoke like a normal function without the help of any object. C) Usually, it has the objects as arguments. D) All of the above.

Last Answer : D) All of the above.

Description : How do we invoke a constructor function?

Last Answer : A constructor is invoked automatically when an object of its class is created. Example: class ABC { public: ABC( ) { } }; void main( ) { ABC obj; } In the above example, creating „obj‟ object automatically invokes constructor ‟ABC ( )‟.

Description : For heterosexuals only: What process did you undertake, if any, in order to identify and accept your sexual orientation?

Last Answer : I believe few people are 100% homosexual or straight. That said then I just asked myself if I had to choose, how could I live in good conscience and with no regret or supression.

Description : What is the main function of Session layer in OSI model? a. Defines how data is formatted between the devices b. Made physical connection between server and client c. Both a and b d. None of the above

Last Answer : a. Defines how data is formatted between the devices

Description : What is the function of following UNIX command? WC - lb& (A) It runs the word count program to count the number of lines in its input, a, writing the result to b, as a foreground process. (B) It runs ... (D) It copies the l ' numbers of lines of program from file, a, and stores in file b.

Last Answer : (B) It runs the word count program to count the number of lines in its input, a, writing the result to b, but does it in the background.

Description : Ring joint gaskets must be in accordance with which of the following? a) API 574. b) ASME B16.5 c) ASME B16.20 d) ASME B31.3

Last Answer : c) ASME B16.20

Description : Which statement is not correct about “init” process in Unix? (1) It is generally the parent of the login shell. (2) It has PID 1. (3) It is the first process in the system. (4) Init forks and execs a ‘getty’ process at every port connected to a terminal.

Last Answer : It is the first process in the system.

Description : Why does "ruby1.8 script/console" fails to invoke ruby1.8?

Last Answer : answer:I'm not a Rails guru, but I have been poking around lately with a Rails app under Debian. Apparently Rails' API is frequently broken between major versions. If your scripts are written for Rails 1 ... been keeping a blog about this project, you can check it out if you want the gory details.

Description : What does invoke built-in do?

Last Answer : This procedure invokes a method. Syntax: PROCEDURE OLE2.INVOKE (object obj_type, method VARCHAR2, list list_type := 0); Parameters: object Is an OLE2 Automation Object. method Is a method (procedure) ... OLE2 object. list Is the name of an argument list assigned to the OLE2.CREATE_ARGLIST function.

Description : What package procedure used for invoke sql *plus from sql *forms ?

Last Answer : Host (E.g. Host (sqlplus))

Description : To invoke assembler following command are given at command line: a. $ hello.s -o hello.o b. — $as hello.s -o 0 c. $ as hello —-o hello.o d. $ashello.s—o hello.o

Last Answer : d. $ashello.s—o hello.o

Description : How would you use java & App Engine to write to the file system? a. Disconnect from the internet and Google App Engine automatically writes to the disk. b. Edit the configuration file accordingly c. ... Invoke an instance of Google App Engine within the sandbox and it will then write to the disk.

Last Answer : You cannot write t the file system with the exception of resources files.

Description : How would you use java & App Engine to write to the file system? a. Disconnect from the internet and Google App Engine automatically writes to the disk. b. Edit the configuration file accordingly c. ... Invoke an instance of Google App Engine within the sandbox and it will then write to the disk.

Last Answer : You cannot write t the file system with the exception of resources files.

Description : Which of the following situations would invoke "question of law"? a) Disputing parties do not agree to the valuation arrived by the valuer. b) Disputing parties do not agree to choice of the ... from the well accepted principles of valuations. d) Valuer did not submit its report within the time.

Last Answer : c) Valuer has departed from the well accepted principles of valuations.

Description : Which is the model have to develop in order to protect e-commerce and online shopping provided by e-logistic vendors a) Cloud model b) API model c) Security model d) Trust model

Last Answer : Trust model

Description : Which of the subsequent must not be a section of cotter joint? a) Socket b) Spigot c) Cotter d) Collar

Last Answer : d) Collar

Description : As far as localised alveolar osteitis (dry socket) is concerned; which one of the following is true? M07 A. The incidence in the mandible and maxilla is similar B. The prophylactic ... diagnosis and irrigation is mandatory E. Zinc oxide eugenol and alvogyl dressing promote a rapid bone growth

Last Answer : C. Excessive fibrinolysis is the likely aetiology

Description : Which address is used to identify a process on a host by the transport layer? a) physical address b) logical address c) port address d) specific address

Last Answer : c) port address

Description : Which of the following statement is incorrect? a. Multiplexers are designed to accept data from several I/O devices and transmit a unified stream of data on one communication line b. HDLC is a standard ... indicates that it is ready to accept data d. RTS/CTS is the way the terminal indicates ringing

Last Answer : RTS/CTS is the way the DTE indicates that it is ready to transmit data and the way the DCW indicates that it is ready to accept data

Description : Which of the following is correct? a) Module A uses Module B if a correct version of B must be present for A to execute correctly b) Module A calls (or invokes ) module B if B triggers execution of A c) All of the mentioned d) None of the mentioned

Last Answer : Module A uses Module B if a correct version of B must be present for A to execute correctly

Description : Three gods, A, B, and C, are called, in some order, True, False, and Random. True always speaks truly, False always speaks falsely, but whether Random speaks truly or falsely is completely random. ... a trick question. As a matter of fact, there are multiple ways to get the correct answer. -Riddles

Last Answer : 1. To god A: Does da' mean yes' if and only if you are True and if and only if B is Random? (We supposed A said, ja, making B True or False). 2. To god B: Does da mean yes' if and ... only if A is Random? Since B's True, he must say da, which means A is Random, leaving C to be False.

Description : What is used to see if a client is still connected to a NetWare server? A. Spoofing TCP/SAP B. Watchdog packet C. GNS Round Robin D. DNS Round Robin

Last Answer : Watchdog packet

Description : . A _____ DBMS distributesdata processing tasks between the workstation anda network server. A. Network B. Relational C. Client Server D. Hierarchical E. None of the above

Last Answer : Client Server

Description : Personal computers can be connectedtogether to form a– (A) server (B) supercomputer (C) network (D) enterprise (E) None of these

Last Answer : network

Description : A central computer that holds collections of data and programs for many PCs, workstations, and other computers is a(n) – (A) supercomputer (B) minicomputer (C) laptop (D) server (E) None of these

Last Answer : serve

Description : The most open source DBMS. A) Microsoft SQL Server B) Microsoft Access C) MySQL D) Oracle

Last Answer : MySQL

Description : The most popular commercial DBMS. A) Microsoft SQL Server B) Microsoft Access C) MySQL D) Oracle

Last Answer : Oracle

Description : Intranetsand extranets can use their network fire walls andother security features to establish secureInternet links within an enterpriseor with its trading partners. Select the best fit for answer: A. Network Server B. Virtual Private Network C. Networkoperating system D. OS

Last Answer : Virtual Private Network

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : What cangreatly reduce TCP/IP configuration problems? A. WINS Server B. WINS Proxy C. DHCP Server D. PDC E. None of the above

Last Answer : DHCP Server

Description : Devices on one network can communicate with devices on another network via a ....... A) File Server B) Utility Server C) Printer Server D) Gateway

Last Answer : D) Gateway

Description : Which of the following protocols is used by email server to maintain a central repository that can be accessed from any machine ? a. POP3 b. IMAP c. SMTP d. DMSP

Last Answer : b. IMAP