Which of the following
applications allows a user to access
and change remote files without actual
transfer?
A) DNS
B) FTP
C) NFS
D) Telnet

1 Answer

Answer :

C) NFS

Related questions

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which of the following applications allows a user to access and change remote files without actual transfer? A) DNS B) FTP C) NFS D) Telnet

Last Answer : C) NFS

Description : Which one of the following allows a user at one site to establish a connection to another site and then pass keystrokes from local host to remote host? a.HTTP b.FTP c.Telnet d.TCP

Last Answer : c.Telnet

Description : Which one of the following uses UDP as the transport protocol? a. HTTP b. Telnet c. DNS d. SMTP

Last Answer : c. DNS

Description : . The newer technique uses a distributed database system called ………………….. to translate names to addresses. A. DNS B. IP C. ARP D. Telnet

Last Answer : A. DNS

Description : Internet provides _______ for remote login. a) telnet b) http c) ftp d) rpc

Last Answer : telnet

Description : If you want to connect toyour owncomputer throughthe Internet from another location, you can use– (A) e-mail (B) FTP (C) instant message (D) Telnet (E) None of these

Last Answer : Telnet

Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP

Last Answer : d. SMTP

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer

Last Answer : d. Application layer

Description : What type of telecommunicationshardware allows you to access the web? A) Browser B) Modem C) FTP protocol D) IRC

Last Answer : Modem

Description : WWW provides standardized access to: a) GOPHER b) TELNET c) FTP d) None of These e) All of the Above

Last Answer : e) All of the Above

Description : Which of the following is NOT true about User Datagram Protocol in transport layer? a. Works well in unidirectional communication, suitable for broadcast information. b. It does three way ... File System d. The lack of retransmission delays makes it suitable for real-time applications

Last Answer : b. It does three way handshake before sending datagrams

Description : Which of the following are ways to provide login access to a router? (choose all that apply) A. HTTP B. Aux Port C. Console D. LLC E. Telnet F.

Last Answer : Aux Port

Description : Which of the following is an application layer service? a. Remote log-in b. File transfer and access c. Mail service d. All of the above

Last Answer : d. All of the above

Description : The process of transferring files from acomputer on the Internet to your computer is called– (A) downloading (B) uploading (C) FTP (D) JPEC (E) downsizing

Last Answer : downloading

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : A packet filtering firewall can a. deny certain users from accessing a service b. block worms and viruses from entering the network c. disallow some files from being accessed through FTP d. block some hosts from accessing the network

Last Answer : d. block some hosts from accessing the network

Description : The transport layer protocols used for real time multimedia, file transfer, DNS and email, respectively are: a. TCP, UDP, UDP and TCP b. UDP, TCP, TCP and UDP c. UDP, TCP, UDP and TCP d. TCP, UDP, TCP and UDP

Last Answer : c. UDP, TCP, UDP and TCP

Description : Point out the correct statement. a) WS-+ services carried over XML messages using the SOAP protocol access remote server applications b) REST stands for Representational State Transfer c) A transaction following the rules of SOAP is considered to be RESTful d) All of the mentioned

Last Answer : REST stands for Representational State Transfer

Description : Distinguish between FTP and Telnet. -Technology

Last Answer : FTP (File Transfer Protocol) facilitates the transfer of files from one point to another while Telnet is a connection protocol that allows a user to connect to a remote server.

Description : If you want to connect to your own computer through the internet from another location you can use: a) Telnet b) Instant Messaging c) FTP d) E- Mail e) None of These

Last Answer : a) Telnet

Description : Application layer firewalls works on the application level of the ____stack (i.e. all browser traffic or all telnet or FTP traffic) and may intercept all packets travelling to or from an application: a) TCP b) IP c) Both of Above d) None of These

Last Answer : c) Both of Above

Description : If you want to connect to your own computer through the internet from another location, you can use: a) E - Mail b) FTP c) Instant Message d) Telnet e) None of The Above

Last Answer : c) Instant Message

Description : Which protocol is commonly used to retrieve email from a mail server? a) FTP b) IMAP c) HTML d) TELNET

Last Answer : b) IMAP

Description : Explain following: I. Telnet II. FTP 

Last Answer : 1. Telnet: TELNET is abbreviation for Terminal Network. It is standard TCP/IP protocol for virtual terminal services proposed by ISO. TELNET enables establishment of connection to a remote system in such ... . FTP uses port 21 for the control connection and port 20 for the data connection. 

Description : In which layer Telnet and FTP works?  a. Application b. Session c. Network d. Physical 

Last Answer : In which layer Telnet and FTP works?  a. Application b. Session c. Network d. Physical 

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : D) All i, ii, iii and iv

Description : Which of the following operations can be performed by using FTP. i) Connect to a remote host ii) Select directory iii) Define the transfer mode iv) List file available A) i, and ii only B) i, ii and iii only C) ii, iii and iv only D) All i, ii, iii and iv

Last Answer : C) ii, iii and iv only

Description : FTP stands for A) File transfer protocol B) File transmission protocol C) Form transfer protocol D) Form transmission protocol

Last Answer : A) File transfer protocol

Description : The protocol which allows the file transfer between computers is a. TCP/IP b. FTP c. HTTP d. SOA

Last Answer : b. FTP

Description : How can I create a new user that can only access a single directory with FTP on Ubuntu?

Last Answer : answer:I'm not sure what your needs are, but I had a similar situation where I needed someone to be able to move files to/from my server. It turned out that it was a lot easier for me to use ... https://www.dropbox.com/install?os=lnx I don't use ftp, but google is suggesting proftpd when I search.

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : What is the full form of DNS A)Domain Name System B)Simple mail Transfer Protocol C)Internet Message Access Protocol D) Network Mapper

Last Answer : A)Domain Name System

Description : Which of the following would you use to transfer files over the Internet? (a) FTP (b) E_mail -Technology

Last Answer : (a) FTP is used to transfer files between computer on a network.

Description : Why is it unethical to share copyrighted files withyour friends ? (A) It is notunethical, because it is legal. (B) It is unethical because thefiles arebeing given for free. (C) ... D) It is notunethical becausethe filesarebeing given for free. (E) It is notunethical-anyonecan access acomputer

Last Answer : Sharingcopyrighted files without permission breaks copyright laws

Description : For consumers, _______ is helpful as it allows you to calculate the actual money you would spend in electricity bills for that particular product. a. Electricity bill c. BEE Star Rating b. User manual d. Water bill

Last Answer : BEE Star Rating

Description : Which one of the following is ‘computing that allows continuous access to remote resources even with the physical mobility of small computing devices such as laptops’? a) Soft computing b) Mobile computing c) Remote computing d) Ubiquitous computing

Last Answer : Mobile computing

Description : Which command does not show that two devices are failing to route packets between them successfully? A. show interface B. trace C. telnet D. ping

Last Answer : show interface

Description : Data communications monitors available on the software marked include a. ENVIRON/1 b. TOTAL c. BPL d. Telnet

Last Answer : ENVIRON/1

Description : The name of the protocol which provides virtual terminal in TCP/IP model is. A) Telnet B) SMTP C) HTTP

Last Answer : A) Telnet

Description : Explain about telnet.

Last Answer : Remote terminal protocol. It allows to interact with a remote system as if terminal is directly connected to that machine. - working procedure - applications

Description : Report generatorsare usedto A. store data input bya user B. retrieve information from files C. answer queries D. both (b)and (c) E. None of the above

Last Answer : both (b)and (c)

Description : Point out the wrong statement. a) SPML is used to prepare Web services and applications for use b) With SPML, a system can provide automated user and system access c) Without a provisioning system, a cloud computing system can be very efficient and potentially reliable d) All of the mentioned

Last Answer : Without a provisioning system, a cloud computing system can be very efficient and potentially reliable

Description : It helps a user to have remote access to an application from a server. a) Application virtualization b) Network virtualization c) Desktop virtualization d) Storage virtualization

Last Answer : Application virtualization

Description : What is the best way to remote access files from another computer?

Last Answer : Crossloop is a free online program which anyone can use to access ones files remotely from another computer.You find a helper, share your screen and fix the problem at hand.

Description : Allows users to upload files to an online site so they can be viewed and edited from another location a) General purpose applications b) Microsoft Outlook c) Web-hosted technology d) Office live e) None of these

Last Answer : b) Microsoft Outlook

Description : Allows users to upload files to an online site so they can be viewed and edited from another location a) General purpose applications b) Microsoft Outlook c) Web-hosted technology d) Office live e) None of these

Last Answer : b) Microsoft Outlook

Description : Google cloud SQL Features a) Lets your application read files from and write files to buckets in Google cloud storage b) A Fully -managed web service that allows you to create , ... large applications into logical components that can be share stateful services and communicate in secure fashion.

Last Answer : A Fully –managed web service that allows you to create , configure , and use relational databases that live in Google’s cloud