Which intermediaries are more likely to
get involved during the transfer function
of an e-mail system?
a. Storage and forwarding of e-mail for
certain addresses
b. Act as gateways to other e-mail or
messaging systems
c. Both a & b
d. None of the above

1 Answer

Answer :

c. Both a & b

Related questions

Description : A machine that connects to two or more electronic mail systems and transfers mail messagesamong them is known as A. Gateways B. mail gateway C. bridges D. User Agent E. None of the above

Last Answer : mail gateway

Description : ………………... are needed to communicate with systems on other networks. A. repeaters B. amplifiers C. Bridge D. Gateways

Last Answer : D. Gateways

Description : Devices interconnected by the LAN should include A. Computers and terminals B. mass storage device, printers and plotters C. bridges and gateways D. All of theabove E. None of the above

Last Answer : All of theabove

Description : The Post Office Protocol is an ………... protocol with both client (sender/receiver) and …………...functions A. electronic mail, server (storage) B. three layer , server C. UDP, transfer D. TCP, server

Last Answer : A. electronic mail, server (storage)

Description : The Internet Control Message Protocol (ICMP) A. allows gateways to send error acontrol messages toother gateways or hosts B. provides communication between the Internet Protocol Software on one machine ... and takeaction to correct theproblem D. All of theabove E. None of the above

Last Answer : All of theabove

Description : Which of the following is not the Networking Devices? A. Gateways B. Unix C. Routers D. Firewalls

Last Answer : B. Unix

Description : Which of the following is a function of SEBI? A. to approve by−laws of stock exchanges. B. inspect the books of accounts of financial intermediaries. C. to require the stock exchange to amend their ... compel certain companies to list their shares in one or more stock exchanges. E. All of the Above

Last Answer : E. All of the Above Explanation: Function of SEBI: To approve by−laws of stock exchanges. Inspect the books of accounts of financial intermediaries. To require the stock exchange to amend their by−laws. Compel certain companies to list their shares in one or more stock exchanges.

Description : A ________bridge can forward and filter frames andautomatically buildits forwarding table. A) simple B) dual C) transparent D) none of the above

Last Answer : transparent

Description : RPF eliminates the ________ in theflooding process. A) forwarding B) backwarding C) flooding D) none of the above

Last Answer : none of the above

Description : ICMP is primarily used for __________ a. error and diagnostic functions b. addressing c. forwarding d. routing

Last Answer : a. error and diagnostic functions

Description : What is a good free or very cheap e-mail forwarding service?

Last Answer : answer:She can open a gmail account, then set it to receive and (if she wishes) send under the original email address. Gmail is free, and there's no limit of emails per day. I can't ... have gmail quietly operate under the oldname address, while she doesn't use that address for her login, etc.

Description : Is there free e-mail that allows forwarding rules?

Last Answer : gmail

Description : .The __________ addresses the technical challenges involved in enabling heterogeneous cloud computing systems to interoperate seamlessly a) Logical and Operational Level b) Infrastructure Level c) None of the above d) Conceptual Level

Last Answer : Infrastructure Level

Description : State weather the following statement is true or false for Sendmail. 1).Sendmail is a command-line tool designed for most UNIX-like operating systems. 2).It define a method of transferring mail, and acts as a client/server ... . false C. 1. false, 2. false, 3. false D. 1. true, 2. true, 3. false

Last Answer : A. 1. True, 2. False, 3. true

Description : Forwarding Yahoo mail to Gmail for IMAP access?

Last Answer : You can do it all from Gmail. While you were writing this question, I was answering your previous slightly different one. Quote: I have a workaround. You can read Yahoo mail via POP Gmail can grab your POP ... Maybe 15 minutes. That's a guess, I've never timed it because it's never been a problem.

Description : Forwarding mail?

Last Answer : Elvis Presley,that should do it!

Description : Can e-mail addresses & other personal informations be traced through your IP address?

Last Answer : In most cases, no. You are likely to be using a dynamic IP address that is changing. You could be traced to the owner of the IP block from which it was allocated (almost certainly your ISP ... d have to be doing something seriously bad before anyone would allocate the time and resources to find you.

Description : Why is an application such as POP needed for electronic messaging?

Last Answer : Workstations interact with the SMTP host, which receives the mail on behalf of every host in the organization, to retrieve messages by using a client-server protocol such as Post Office Protocol, ... needed on the desktop to forward messages from the workstation user to its SMTP mail server.

Description : What sends work assignments through an e‐mail system? a. Database‐based enterprise information portal b. Messaging‐based enterprise information portal c. Database‐based workflow system d. Messaging‐based workflow system

Last Answer : d. Messaging‐based workflow system

Description : From the economic system's point of view, the role of marketing intermediaries is to transform: A. raw products into finished products. B. consumer needs into producer needs. C. ... product desires. D. assortments of products made by producers into the assortments wanted by consumers.

Last Answer : D. assortments of products made by producers into the assortments wanted by consumers.

Description : On which factors do the size of block depends in classless addressing? a. Nature & size of an entity b. Number of addresses c. Availability of the address space d. All of the above

Last Answer : a. Nature & size of an entity

Description : Which is a time-sensitive service? A. File transfer B. File download C. E-mail D. Internet telephony

Last Answer : D. Internet telephony

Description : If you want to connect to your own computer through the internet from another location you can use: a) Telnet b) Instant Messaging c) FTP d) E- Mail e) None of These

Last Answer : a) Telnet

Description : Which of these is not a means of personal communication on the internet? a) Chat b) Instant messaging c) Instanotes d) Electronic mail e) None of these

Last Answer : c) Instanotes

Description : E-mail addresses separate the user name from the ISP using the .... symbol. 1) & 2) @ 3) % 4) *

Last Answer : 2) @

Description : Which of the following is an application layer service? A) Network virtual terminal B) File transfer, access and management C) Mail service D) All of the above

Last Answer : C) Mail service

Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : b. content-transfer-encoding

Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above

Last Answer : d. All of the above

Description : What is the difference between a user agent (UA) and a mail transfer agent (MTA)?

Last Answer : The UA prepares the message, creates the envelope, and puts the message in the envelope. The MTA transfers the mail across the Internet.

Description : In _______forwarding, the mask anddestination addresses are both 0.0.0.0 in therouting table. A) next-hop B) network-specific C) host-specific D) default

Last Answer : default

Description : State the following statement is true or false. I. In class B addresses a total of more than 1 billion addresses can be formed. II. Class E addresses are reserved for future or experimental use. a. True, False b. True, True c. False, True d. False, False

Last Answer : b. True, True

Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet

Last Answer : A. DNS

Description : addresses are reserved for multicasting. a. Class B b. Class C c. Class D d. Class E

Last Answer : c. Class D

Description : If in a computer, 16 bits are used to specify address in a RAM, the number of addresses will be a. 216 b. 65,536 c. 64K d. Any of the above

Last Answer : 65,536

Description : A _______ can check the MAC addresses contained inthe frame. A) passive hub B) repeater C) bridge D) route

Last Answer : bridge

Description : Membership in a VLAN can be based on _________. A) port numbers B) MAC addresses C) IP addresses D) all of theabove

Last Answer : all of theabove

Description : In IPv6,____ address defines a groupof computers with addresses that have thesame prefix. A) aunicast B) a multicast C) an anycast D) none of the above

Last Answer : an anycast

Description : An organization isgranteda block of classless addresses with the starting address 199.34.32.0/27. How many addresses are granted? A) 8 B) 16 C) 32 D) none of the above

Last Answer : 16

Description : An organization isgranteda block of classless addresses with the starting address 199.34.76.128/29. How manyaddressesare granted? A) 8 B) 16 C) 32 D) none of the above

Last Answer : 8

Description : An organization isgranteda block of classless addresses with the starting address 199.34.76.64/28. How manyaddresses are granted? A) 8 B) 16 C) 32 D) none of the above

Last Answer : 16

Description : What is the lastaddress of a blockof classless addresses ifone of the addresses is 12.2.2.6/30? A) 12.2.2.2 B) 12.2.2.6 C) 12.2.2.7 D) none of the above

Last Answer : 12.2.2.7

Description : What is the lastaddress of a blockof classless addresses ifone of the addresses is 12.2.2.127/28? A) 12.2.2.16 B) 12.2.2.112 C) 12.2.2.127 D) none of the above

Last Answer : 12.2.2.127

Description : Find thenumber of addresses in ablock of classless addresses if one of theaddresses is 12.2.2.7/30. A) 2 B) 4 C) 8 D) none of the above

Last Answer : 4

Description : Find thenumber of addresses in ablock of classless addresses if one of theaddresses is 12.2.2.7/24. A) 32 B) 64 C) 256 D) none of the above

Last Answer : 256

Description : What is the firstaddressof a block of classless addresses ifone of the addresses is 12.2.2.127/28? A) 12.2.2.0 B) 12.2.2.96 C) 12.2.2.112 D) none of the above

Last Answer : 12.2.2.112

Description : What is the firstaddressof a block of classless addresses ifone of the addresses is 12.2.2.76/10? A) 12.0.0.0 B) 12.2.0.0 C) 12.2.2.2 D) none of the above

Last Answer : 12.0.0.0

Description : What is the firstaddressof a block of classless addresses ifone of the addresses is 12.2.2.76/27? A) 12.2.2.0 B) 12.2.2.32 C) 12.2.2.64 D) none of the above

Last Answer : 12.2.2.64

Description : Which address could be the beginningaddress of ablock of256 classless addresses? A) 2.4.6.5 B) 2.4.6.15 C) 2.4.6.0 D) none of the above

Last Answer : 2.4.6.0

Description : Which address could be the beginningaddress of ablock of16 classless addresses? A) 2.4.6.5 B) 2.4.6.15 C) 2.4.6.62 D) none of the above

Last Answer : none of the above