Expand the following terms related to Computer Networks: a. SMTP b. POP c. FTP d. VoIP -Technology

1 Answer

Answer :

a. SMTP: Simple Mail Transfer Protocolb. POP: Point to Point Protocolc. FTP: File Transfer Protocold. VoIP: Voice over Internet Protocol

Related questions

Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP

Last Answer : c. m1: SMTP m2: POP m3: HTTP

Description : .............. is a protocol used by e-mail clients to download emails to your computer. (A) TCP (B) FTP (C) SMTP (D) POP

Last Answer : Answer: D

Description : Which of the following TCP/IP protocol is used for transferring electronic mail messages from one machine to another? A. FTP B. SNMP C. SMTP D. RPC E. None of the above

Last Answer : SMTP

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP B) C) SNMP C) SMTP D) D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : Which of the following protocol is used for transferring electronic mail messages from one machine to another? a. TELNET b. FTP c. SNMP d. SMTP

Last Answer : d. SMTP

Description : In one of the pairs of protocols given below, both the protocols can use multiple TCP connections between the same client and the server. Which one is that? a. HTTP, FTP b. HTTP, TELNET c. FTP, SMTP d. HTTP, SMTP

Last Answer : a. HTTP, FTP

Description : TELNET, FTP, SMTP, Protocols fall in the following layer of OSI reference model? a. Transport layer b. Internet layer c. Network layer d. Application layer

Last Answer : d. Application layer

Description : When displaying a web page, the application layer uses the _____________ A. HTTP protocol B. FTP protocol C. SMTP protocol D. TCP protocol

Last Answer : A. HTTP protocol

Description : Electronic mail uses which Application layer protocol? A. SMTP B. HTTP C. FTP D. SIP

Last Answer : A. SMTP

Description : Which of the following protocol is used to retrieve emails? A. SMTP B. POP3 C. FTP D. SNMP

Last Answer : B. POP3

Description : Which is not a application layer protocol? A. HTTP B. SMTP C. FTP D. UDP

Last Answer : D. UDP

Description : Which of the following of the TCP/IP protocols is the used for transferring files from one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : Which of the following of the TCP/IP protocolsis the used for transferring filesfrom one machine to another? A) FTP C) SNMP B) SMTP D) Rpe

Last Answer : A) FTP

Description : Which of the following TCP/IP protocols is used for transferring files form one machine to another. A) FTP B) SNMP C) SMTP D) RPC

Last Answer : A) FTP

Description : Explain the given terms with respect to computer networks: 1. File and Data Sharing 2. Distributing Computing Power -Technology

Last Answer : 1. File and Data SharingAt a time, file-sharing consisted mostly of saving documents to floppy disks that could be physically transferred to other computers by hand. With networking, files can be shared ... to a network. Any user on the network can access the resources stored on the server.

Description : Expand the following terms : 1. GSM 2. IP -Technology

Last Answer : Expanded form :(i) GSM – Global System for Mobile Communication(ii) IP- Internet Protoco

Description : In electronic mail, which of the following protocols allows the transfer of multimedia messages? (A) IMAP (B) SMTP (C) POP 3 (D) MIME

Last Answer : (D) MIME

Description : Which one of the following is odd? (1) IMAP (2) POP (3) SNMP (4) SMTP

Last Answer : SNMP

Description : FTP is responsible for downloading …………. from computer network. -Technology

Last Answer : FTP is responsible for downloading files from the computer network.

Description : Distinguish between FTP and Telnet. -Technology

Last Answer : FTP (File Transfer Protocol) facilitates the transfer of files from one point to another while Telnet is a connection protocol that allows a user to connect to a remote server.

Description : How does FTP work? -Technology

Last Answer : FTP works on the principle of a client/server model. A FTP client program enables the user to interact with a FTP server program in order to access information and services on the server computer. ... server program, users must be able to connect to the Internet or interact with FTP client program.

Description : Which of the following would you use to transfer files over the Internet? (a) FTP (b) E_mail -Technology

Last Answer : (a) FTP is used to transfer files between computer on a network.

Description : FTP is referred to as (a) Force Transfer Protocol (b) File Transport Protocol (c) File Transfer Partition -Technology

Last Answer : (d) FTP is a protocol through which Internet users can upload files from their computer to a Website. In which, FTP stands for File Transfer Protocol.

Description : FTP utilizes TCP/IP protocol suite. -Technology

Last Answer : True FTP is the easiest way to transfer files between computers via an Internet and utilizes TCP (Transmission Control Protocol)/IP (Internet Protocol) systems to perform uploading and downloading tasks.

Description : MAN’s are the computer networks confined to a localised area such as an office. -Technology

Last Answer : FalseLAN’s are the computer networks confined to a localised area such as an office.

Description : Explain in brief any 2 security threats to computer networks. -Technology

Last Answer : Two security threats to computer networks are as follows :1. Computer worm It is a standalone malware computer program that replicates itself in order to spread to other computers.2. Spam It is flooding the Internet with many copies of the same message.

Description : HTML is a markup language. Expand the term HTML. -Technology

Last Answer : HyperText Markup Language.

Description : Give the three terms related to the following: 1. Attacks -Technology

Last Answer : 1. Attacks Trojan horse, Worm, Denial of Service.2. Backup Online backup, Full backup, Differential backup.3. Security software Digital signature, Firewall, Antivirus.

Description : ………… allows delivery of voice communications over IP networks. -Technology

Last Answer : VoIP allows delivery of voice communications over IP networks.

Description : Which cable networks are used for LAN connections? -Technology

Last Answer : Twisted pair and fibre optic cables are used for LAN connection.

Description : ………. is the formation of networks. -Technology

Last Answer : Networkingis the formation of networks.

Description : ……….. is called network of networks. -Technology

Last Answer : Internetis called network of networks.

Description : Online documents containing underlined phrases or icons that a user can click in order to move immediately to related parts of the current document or to other documents with related information is called ______: a) Hypermedia b) Hypertext c) HTML d) URL e) FTP

Last Answer : d) URL

Description : .Software is a collection of computer (i) ……. and related data that provide the -Technology

Last Answer : (i) programs(ii) instructions(iii) entity(iv) computer(v) procedures(vi) documentation(vii) processing

Description : How can I set Gmail to check my pop accounts more frequently?

Last Answer : answer:I've looked for this parameter / setting too but have never found it. The only thing I've ever found is the "Check Mail Now" link in the Gmail Settings --> Accounts page (in the "Get mail from other accounts" section). Unfortunately, you still have to manually click those links each time.

Description : Is there a way I can see my wireless network's internet history?

Last Answer : Your router should have a page that lists what sites were visited by what computers. How to get to that page depends on your router.

Description : Define following terms: i) Active networks. ii) Unilateral networks

Last Answer : i) Active networks: If a network consists of an energy source then it is called an active network. The type of energy source can be a voltage source or a current source. ii) ... direction of current through its elements in it, then the network is called as a unilateral network.

Description : The tubular and dorsal nervous system of chordates is related to the cephalization in these animals and to bilateral symmetry. The presence of neural integrating centers with concentration of ... These features have been preserved by evolution as they provide adaptive advantage to their owners.

Last Answer : How can the tubular-dorsal nervous system in chordates be compared to the nervous pattern present in invertebrates?

Description : The process of transferring files from acomputer on the Internet to your computer is called– (A) downloading (B) uploading (C) FTP (D) JPEC (E) downsizing

Last Answer : downloading

Description : If you want to connect to your own computer through the internet from another location you can use: a) Telnet b) Instant Messaging c) FTP d) E- Mail e) None of These

Last Answer : a) Telnet

Description : If you want to connect to your own computer through the internet from another location, you can use: a) E - Mail b) FTP c) Instant Message d) Telnet e) None of The Above

Last Answer : c) Instant Message

Description : The process of transferring files from computer on the internet is called: a) Downloading b) Uploading c) FTP e) JPEG f) Downsizing

Last Answer : b) Uploading

Description : The process of transferring files from a computer on the Internet to your computer is called-- 1) Downloading 2) Uploading 3) FTP 4) JPEG

Last Answer : 1) Downloading

Description : The process of transferring files from a computer on the Internet to your computer is called-- 1 Downloading 2 Uploading 3 FTP 4 JPEG

Last Answer : 1 Downloading

Description : How did man develop and expand proper technology? -Geography

Last Answer : Human beings were able to develop proper technology using his knowledge and intelligence. It has taken man a long time to reach at the present level of technology. In primitive age when the level ... within the limits which do not damage the environment and there is no free run without accidents.

Description : Expand RTGS ? 1. Real Time Gross Settlement 2. Real Time Group Selling 3. Retailers Trade Group Selling 4. Reliance Technology Group Sellers 5. None of these

Last Answer : Real Time Gross Settlement

Description : What are VoIP protocols?

Last Answer : What specifically don’t you understand about them?