Description : Identify the correct order in which the following actions take place in an interaction between a web browser and a web server. 1. The web browser requests a webpage using HTTP. 2. The web browser establishes a TCP connection with the web ... DNS. a. 4,2,1,3 b. 1,2,3,4 c. 4,1,2,3 d. 2,4,1,3
Last Answer : a. 4,2,1,3
Description : Google Chrome is an example of (a) Web browser (b) Web server (c) HTTP (d) WWW -Technology
Last Answer : (a) Web browser is the program that is used to explore the Internet.Thus, Google Chrome is an example of Web browser.
Description : Encrypted data is referred as cipher text. -Technology
Last Answer : TrueEncrypted data is presented in coded form. So, it is known as cipher text.
Description : In NetBill's protocol for small payments for internet services (i) Key to decrypt information is sent to customer by NetBill only when there is enough amount in debit account (ii) The vendor supplies the key to NetBill server when he ... i, ii b. i, ii, iii c. i, ii, iii, iv d. i, ii, iv
Last Answer : b. i, ii, iii
Description : In SMTP mail transaction flow, the sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ………. a. 220 service ready message b. 421 service not available message c. Both of the above d. None of the above
Last Answer : c. Both of the above
Description : The client code recognizes the SSL request and establishes a connection through TCP port ____ to the SSL code on the server A. 1023 B. 402 C. 443 D. 8080
Last Answer : C. 443
Description : The sender SMTP establishes a TCP connection with the destination SMTP and then waits for the server to send a ____ Service ready message.. A. 420 B. 320 C. 220 D. 120
Last Answer : C. 220
Description : Point out the wrong statement. a) Distributed transaction systems such as internetworks or cloud computing systems magnify the difficulties faced by identity management systems b) Services that provide digital ... a domain as belonging to a set of assigned addresses d) None of the mentioned
Last Answer : IDaaS Server establishes the identity of a domain as belonging to a set of assigned addresses
Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322
Last Answer : C) 443
Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part …………….. to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322
Description : Safari is a Web browser developed by ……….. -Technology
Last Answer : Safari is a Web browser developed byApple.
Description : Which software browse the Internet in a systematic manner? (a) Web crawler (b) Web browser -Technology
Last Answer : (a) Web search engine works by storing information about many Web pages, retrieved by a Web crawler.
Description : What is the method of viewing the source code of the current page in the Web browser? -Technology
Last Answer : Right click on the Web page and then select View Source from the context menu.
Description : Which tag do we use to change the size and style (face) of the text of an HTML file viewed on a Web browser? -Technology
Last Answer : tag is used to change the size and style (face) of the text of an HTML file displayed on a Web browser. Two attributes of tag are as follows:size: It specifies the size of the text inside a tag.Syntaxface: It specifies the font name of the text inside a tag.Syntax
Description : To create an HTML page, you need (a) text editor (b) Web browser -Technology
Last Answer : (c) Because text editor is required to write HTML code and the Web browser is needed to display the page.
Description : The ……….. tag is used to make the Web browser ignore anything that the tag contains. -Technology
Last Answer : The tag is used to make the Web browser ignore anything that the tag contains.
Description : An image to be displayed in a Web page has to cover 25% of the browser window horizontally and 50% vertically. -Technology
Last Answer : An image to be displayed in a Web page has to cover 25% of the browser window horizontally and 50% vertically. The attributes height and width of the tag would be used for achieving this.
Description : An XML document can be viewed in a (a) Word processor (b) Web browser -Technology
Last Answer : (b) An XML document can be viewed in a Web browser.
Description : Mozilla Firebox is a (a) Web Browser (b) News Website (c) Graphing Package (d) Word Processor -Technology
Last Answer : Mozilla Firebox is aWeb Browser
Description : What is the purpose of a web browser? Give the name of any two popular web browsers. -Technology
Last Answer : A web browser is an application program used for exploring the information resources available on the World Wide Web to retrieve the required information. Two popular web browsers are Google Chrome and Mozilla Firefox.
Description : Point out the correct statement: 1) Different types of cloud computing service models provide different levels of security services 2) Adapting your on-premises systems to a cloud model requires that you determine what ... are correct B. only 1 is correct C. 2 and 3 are correct D. none are correct
Last Answer : 1,2,3 are correct
Description : Point out the correct statement. a) Different types of cloud computing service models provide different levels of security services b) Adapting your on-premises systems to a cloud model requires that ... be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Last Answer : Data should be transferred and stored in an encrypted format for security purpose d) All of the mentioned
Description : DES and public key algorithm are combined (i) to speed up encrypted message transmission (ii)to ensure higher security by using different key for each transmission (iii) as a combination is always better than individual system (iv ... e-Commerce a. i and ii b. ii and iii c. iii and iv d. i and iv
Last Answer : a. i and ii
Description : Consider different activities related to email: m1: Send an email from a mail client to a mail server m2: Download an email from mailbox server to a mail client m3: Checking email in a web browser Which is the application ... FTP m3: HTTP c. m1: SMTP m2: POP m3: HTTP d. m1: POP m2: SMTP m3: IMAP
Last Answer : c. m1: SMTP m2: POP m3: HTTP
Description : What do you need to put your web pages on the www: a) A connection to the internet b) A web browser c) A web server d) All of The Above e) None of The Above
Last Answer : d) All of The Above
Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie
Last Answer : C) cookie
Description : A ………….. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie
Last Answer : D) transkie
Description : What do you need to put your web pages on the www? (A) a connection to internet (B) a web browser (C) a web server (D) all of the above
Last Answer : (D) all of the above
Description : Which one of the following is not a Client-Server application ? (A) Internet chat (B) Web browser (C) E-mail (D) Ping
Last Answer : (B) Web browser
Description : Web site to link multiple screens through web browser?
Last Answer : Just found it! Junkyard Jumbotron
Description : A website address is a unique name that identifies a specific ___ on the web a) Web browser b) Website c) PDA d) Link e) None of these
Last Answer : a) Web browse
Description : Firefox is a Web server. -Technology
Last Answer : False Firefox is a Web browser.
Description : When you copy a Web page or a file from a server to your local computer, this process is called (a) conferencing (b) downloading -Technology
Last Answer : (b) Because we store information from a server computer to a user computer.
Description : Why is it so important that users passwords to web sites remain in DB in encrypted form?
Last Answer : Because users are idiots and use the same password for everything. If a hacker gets access to the db they’ll know the users email and password and they probably use the same in for everything from fluther to paypal.
Description : The tag used in HTML to link a Web page with other Web page is (a) (b) -Technology
Last Answer : (a) anchor tag is used to create links.
Description : ………. attribute of the tag is used to name a section in a Web page to create an internal link. (a) href (b) name -Technology
Last Answer : (b) name attribute is used to create an internal link.
Description : An ……….. link allows a link to another Web page or another Website. -Technology
Last Answer : An externallink allows a link to another Web page or another Website.
Description : An link............ allows a link to another section on the same or different Web page. -Technology
Last Answer : An linkinternal allows a link to another section on the same or different Web page.
Description : Write the HTML code to generate the following Web page:1. Link color is green, active link color is blue and visited link color is red. -Technology
Last Answer : The HTML code isEat healthy, live healthy KHAO PIYO RESTAURANTCollect Information for .MenusTours Menus available are 1 INDIAN 2 ITALIAN 3 CONTINENTAL 4 THAI < /tab1e> For further queries and reservation
Description : A link used to navigate or open other web pages on a website on internet is called: -Technology
Last Answer : A link used to navigate or open other web pages on a website on internet is calledHyperlink
Last Answer : A link used to navigate or open other web pages on a website on internet is calledHyperlink .
Description : What is the fastest web browser for a PC?
Last Answer : Nothing overall is better than firefox, but I heard Google Chrome is faster.
Description : Name two common graphic files formats that most browser recognize. -Technology
Last Answer : The two common graphic file formats are: .gif and .jpg.
Description : How would you display text in the title bar of a browser? -Technology
Last Answer : To display text in a title bar of a browser, use the tag inside the tag in the HTML document.e.g. HTML document
Description : topmargin is used to specify the distance between the top of the document and top of the browser window. -Technology
Last Answer : True topmargin is an attribute of the tag, which is used to specify the distance between the top of the document and top of the browser window.
Description : How can text be displayed in place of image for users whose browser do not support images? -Technology
Last Answer : The alt attribute of the tag is used to display the text in place of the image for the users whose browser do not support images.
Description : The cellspacing attribute tells the browser how much space to include between the walls of the table. -Technology
Last Answer : False cellspacing attribute is used to create space between different cells in a table.
Description : Which amongst the following is not an example of browser ? (a)Chrome (b)Firefox (c)Avast (d)Edge -Technology
Last Answer : (c)Avast
Description : Which of the following simply means to hardware or software load over web servers, that improver's the efficiency of the server as well as the application? A. Amazon Cloud-front B. Elastic Load Balancer C. Load Balancing D. Security Management
Last Answer : Load Balancing