Which field of cookie in WWW
represents the server's directory structure
by identifying the utilization of part
associated with server's file tree?
a. Domain
b. Path
c. Content
d. Secure

1 Answer

Answer :

b. Path

Related questions

Description : . Which attack is an HTTP attack which allows attackers to access restricted directories and execute commands outside the web servers root directory? a. XSS attack b. Path Traversal attack c. MITM attack d. SQL Injection attack

Last Answer : d. SQL Injection attack

Description : In unicast routing,each router in the domain has a table thatdefines a______ path tree to possible destinations. A) average B) longest C) shortest D) none of the above

Last Answer : shortest

Description : The directory structure used in Unix file system is called (A) Hierarchical directory (B) Tree structured directory (C) Directed acyclic graph (D) Graph structured directory

Last Answer : (C) Directed acyclic graph

Description : A zone is a contiguous portion of a ………….. of the DNS namespace whose database records exist and are managed in a……….. DNS database file. A. domain, particular B. Class, particular C. tree, local D. Domain, every

Last Answer : A. domain, particular

Description : The distance between two stations M and N is L kilometers. All frames are K bits long. The propagation delay per kilometer is t seconds. Let R bits/second be the channel capacity. Assuming that processing ... maximum utilization, when the sliding window protocol used is: a. A b. B c. C d. D

Last Answer : c. C

Description : How to make cookie in php track both in www.site.com and site.com for some web-site?

Last Answer : answer:Set the domain argument to just '.site.com', including the leading period, rather than accepting the default (which will be whatever the current domain is) http://php.net/manual/en/function.setcookie.php ... So you might have something like: setcookie( my_cookie', 123, 0, , '.site.com');

Description : _________ utilization is the useof availablebandwidthto achieve specificgoals. A) Frequency B) Bandwidth C) Amplitude D) None of the abov

Last Answer : Bandwidth

Description : Which one of the following statements is FALSE? a. Packet switching leads to better utilization of bandwidth resources than circuit switching. b. Packet switching results in less variation ... than circuit switching d. Packet switching can lead to reordering unlike in circuit switching

Last Answer : Packet switching results in less variation in delay than circuit switching.

Description : For pure ALOHA, the maximum channel utilization is a. 100% b. 50% c. 36% d. 18%

Last Answer : d. 18%

Description : Where in the Oracle directory tree structure are audit traces placed?

Last Answer : In unix $ORACLE_HOME/rdbms/audit, in Windows the event viewer

Description : How to link domain names to servers?

Last Answer : Just for clarification. Are you wanting people to be able to enter www.123.reg.co.uk into their browser and have that domain name link up to your 10hosting.com site? Also do you have a DNS server in your network set up?

Description : How do I access the "Total DNS" settings for my domain if I changed the name servers?

Last Answer : answer:Your domains are registered through Godaddy correct? When you manage your domain under Nameservers set your name servers back to Godaddy DNS servers (NS17.DOMAINCONTROL.COM, NS18.DOMAINCONTROL.COM) ... server you could, but you would get flooded with requests trying to resolve your domain.

Description : If you register a domain with a host but then point servers to another host to host with a new server company does it slow down your site or any other affect?

Last Answer : No, it shouldn’t make any difference. Registrars simply handle the selling of domain names. Once they are registered they are all put into the same core DNS servers. It’s really not that long of a process, and you should switch if the other company has better rates or features.

Description : in the dns hierarchy, where is information about how to find the top-level domain servers held? -General Knowledge

Last Answer : You can find on the DNS root servers.

Description : A network consists of eight NT servers. You are planning to move servers to different segments of yournetwork, what utility should be used at eachserver to determine which server generates the most traffic? A. NBTSTAT B. NETSTAT.EXE C. Performance Monitor D. Network Monitor E. ARP.EXE

Last Answer : Network Monitor

Description : Suppose you are browsing the world wide web using a web browser and trying to access the web servers. What is the underlying protocol and port number that are being used? a. UDP, 80 b. TCP, 80 c. TCP, 25 d. UDP, 25

Last Answer : b. TCP, 80

Description : Generally TCP is reliable and UDP is not reliable. DNS which has to be reliable uses UDP because a. UDP is slower b. DNS servers has to keep connections c. DNS requests are generally very small and fit well within UDP segments d. None of these

Last Answer : c. DNS requests are generally very small and fit well within UDP segments

Description : A set of rules that governs data communication is called a. Protocols b. Standards c. RFCs d. Servers

Last Answer : a. Protocols

Description : The ______ are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers. A. transporter B. distributers C. Resolvers D. both a and b

Last Answer : C. Resolvers

Description : What information is required to map a domain name to a directory on a web server?

Last Answer : You need to edit your dns entries. You’d need to create an NS entry in your DNS settings. Of course this is all very dependent on your host. I’m also assuming you want to create a sub-domain for this, rather than your main domain. If you’re doing it for your main domain, I’d simply do a redirect.

Description : Where should i keep my forum? domain root or sub-directory?

Last Answer : What's your plan with the forum? Some of the times people want different site on the root and different forums on the subdomain or directory. So find out how you want things to be. ... seen most people following this approach end upn with better directory and the SEO organization for the content.

Description : In a telephone system, the customer’s telephone directory numbering is from 000 to 999, what is the capacity of the system? A. 1000 lines B. 100,000 lines C. 10,000 lines D. 100 lines

Last Answer : A. 1000 lines

Description : The _______ is a server whose zone consists of the whole tree. A. domain server B. zone server C. root server D. none of the above

Last Answer : C. root server

Description : Capacity utilization - (1) is usually near 100 percent. (2) represents the percent of the labour force that is employed. (3) is a measure of the proportional of the existing capital ... into a recession, since firms must replace unemployed workers with some other resources to maintain production.

Last Answer : (3) is a measure of the proportional of the existing capital stock used for current production. Explanation: Capacity utilisation refers to the extent or level to which the productive capacity of a ... as a percentage, it is computed by dividing the total capacity with the portion being utilized.

Description : The following graph represents the installed capacity for cement production (in tonnes) and the actual production (in tonnes) of nine cement plants of a cement company. Capacity utilization of a plant ... difference between total production of large plants and small plants, in tonnes is _____

Last Answer : Correct answer is 120.

Description : In IPv6, the _______ field inthe baseheader and thesender IP address combineto indicate aunique path identifier for aspecific flow of data. A) flow label B) nextheader C) hoplimit D) destination IP address

Last Answer : flow label

Description : Which domain has been acquired for www.Twiceproshno.com ?

Last Answer : GoDaddy domain has been taken for www.twiceproshno.com .

Description : Refers to one of a commonly used internet service domain. A. www B. http C. gov D. infoseek

Last Answer : C. gov

Description : One of the commonly used domain in the internet service. A. Yahoo B. http C. com D. www

Last Answer : C. com

Description : Which query will give the list of web pages indexed by a particular search engine on given domain?  A. list:https://www.courseya.com/  B.link:https://www.courseya.com/  C.site:https://www.courseya.com  D.webpage:https://www.courseya.com/

Last Answer : C.site:https://www.courseya.com

Description : Which of the following must be contained in a URL? a) A protocol identifier b) The letters www. c) The unique registered domain name d) www.and the unique registered domain name e) None of these

Last Answer : d) www.and the unique registered domain name

Description : Which one of the following statements is NOT correct about HTTP cookies? a. A cookies is a piece of code that has the potential to compromise the security of an Internet user b. A cookie gains entry ... and time d. Cookies can be used to track the browsing pattern of a user at a particular site

Last Answer : a. A cookies is a piece of code that has the potential to compromise the security of an Internet user

Description : Which country created the most used networking software in 1980's ? Sun IBM Novell Microsoft Collection From: www.cs-mcqs.blogspot.com

Last Answer : Microsoft

Description : Which language in WWW specifies a web's way by describing three- dimensional objects? a. HTML b. VRML c. XML d. UML

Last Answer : b. VRML

Description : In ________ is a repository of information linked together from points all over the world. A. The WWW B. HTTP C. HTML D. none of the above

Last Answer : A. The WWW

Description : Explain the WWW in detail

Last Answer : ∙ Hypertext & Hypermedia ∙ Browser Architecture ∙ Categories of Web Documents ∙ HTML ∙ CGI ∙ Java

Description : RPB creates a shortest path _______ tree from thesourceto each destination. A) unicast B) multicast C) broadcast D) none of the above

Last Answer : broadcast

Description : In the _______ treeapproach, each router needs tohave oneshortest path tree for each group. A) group-shared B) source-based C) a or b D) none of the above

Last Answer : source-based

Description : In multicast routing, eachinvolvedrouter needs toconstructa ________ path tree for each group. A) average B) longest C) shortest D) none of the above

Last Answer : shortest

Description : www represents: (A) who what and where (B) weird wide web (C) word wide web (D) world wide web

Last Answer : (D) world wide web

Description : For a project manager to have an effective means of identifying and communicating the planned activities and their interrelationships, he must use a network technique. One of the network ... evaluation review technique c. Path evaluation review technique d. Project execution review technique

Last Answer : b. Program evaluation review technique

Description : Should I leave a secure but possibly unsustainable career for a riskier but potentially rewarding one in a new domain?

Last Answer : answer:I hate to be that guy. But by asking you already know what you want to do and are looking for confirmation. The best person to ask this question to is your future spouse.

Description : Is domain backordering an effective way to secure a domain when it expires?

Last Answer : It will be just as effective for you to check back several times a day yourself, as to use a service. they have no ‘inside’ that you don’t have. Pretend you want tickets to a popular concert, and just keep trying.

Description : As a whole, I am both safe and secure. Behead me, and I become a place of meeting. Behead me again, and I am the partner of ready. Restore me, and I become the domain of beasts.What am I? -Riddles

Last Answer : A Stable

Description : As a whole, I am both safe and secure. Behead me, and I become a place of meeting. Behead me again, and I am the partner of ready. Restore me, and I become the domain of beasts.What am I? -Riddles

Last Answer : Stable.

Description : What does SSL stands for ? System socket layer Secure system login Secure socket layer Secure system login

Last Answer : Secure socket layer

Description : A _____ should be considered as a means to divide the world into two or more networks: one or more secure networks and one or more non-secure networks. A. firewall B. ESP C. SSL D. both a and b

Last Answer : A. firewall

Description : What does HTTPS stands for? A. Hyper Text Transmission Protocols B. Hyper Text Tile Protocols C. Hyper Text Transfer Protocol Secure D. None

Last Answer : C. Hyper Text Transfer Protocol Secure

Description : Name four factors needed for a secure network.

Last Answer : Privacy: The sender and the receiver expect confidentiality. Authentication: The receiver is sure of the sender's identity and that an imposter has not sent the message. Integrity: The data ... -Reputation: The receiver must able to prove that a received message came from a specific sender.

Description : In the MIME header field, ____describes how the object within the body was encoded in order that it be included in the message using a mail-safe form. a. content-type b. content-transfer-encoding c. content-description d. content-id

Last Answer : b. content-transfer-encoding