XMPP creates _________ identity.
A. Device
B. Email
C. Message
D. Data

1 Answer

Answer :

A. Device

Related questions

Description : XMPP creates _________ identity. A. Device B. Email C. Message D. Data

Last Answer : A. Device 

Description : ____ is a data-centric middleware standard for device-to-device and machine-to-machine communication. A. Data Distribution Serviced (DDS) B. Advance Message Queuing Protocol (AMQP) C. Extensible Messaging and Presence Protocol (XMPP) D. Message Queue Telemetry Transport (MQTT)

Last Answer : A. Data Distribution Serviced (DDS) 

Description : XMPP uses ________ architecture. A. Decentralized client-server B. Centralized client-server C. Message D. Public/subscriber

Last Answer : A. Decentralized client-server

Description : XMPP uses ________ architecture. A. Decentralized client-server B. Centralized client-server C. Message D. Public/subscriber

Last Answer : A. Decentralized client-server 

Description : XMPP is used for streaming which type of elements? A. XPL B. XML C. XHL D. MPL

Last Answer : B. XML

Description : _________ is a device used for reading bar coded data (contains light and dark lines). A. Graphic Tablet B. Numeric pad C. Bar Code reader D. Magnetic Stripe reader

Last Answer : C. Bar Code reader

Description : A _________ is an electronic device that processes data, converting it into information 1) Computer 2) Processor 3) Case 4) Stylus

Last Answer : 2) Processor

Description : A(n) ________function creates a message digest out of a message.

Last Answer : hash

Description : Point out the wrong statement. a) All IM clients use peer-to-peer messaging b) IM software aimed at businesses such as XMPP, Lotus Sametime, and Microsoft Office Communicator use a client/server ... messaging is as popular in business as it is in personal communications d) None of the mentioned

Last Answer : None of the mentioned

Description : Which of the following protocol is not an Internet Engineering Task Force standard? a) SIP b) SIMPLE c) XMPP d) IMPS

Last Answer : IMPS

Description : Which of the following protocol is adopted for interoperability by top three IM service providers?a) SIP b) SIMPLE c) XMPP d) IMPS

Last Answer : SIMPLE

Description : Point out the correct statement. a) Every third-party IM clients aim to allow their users to connect to the different major IM services b) SIP stands for Secure Initiation Protocol c) XMPP stands for Extensible Messaging and Presence Protocol d) All of the mentioned

Last Answer : XMPP stands for Extensible Messaging and Presence Protocol

Description : Which protocol has a quality of service? A. XMPP B. HTTP C. CoAP D. MQTT

Last Answer :  A. XMPP  

Description : XMPP is used for streaming which type of elements? A. XPL B. XML C. XHL D. MPL

Last Answer : B. XML 

Description : _________ is a service that creates and manages virtual network interfaces. a) VMware vStorage b) VMware vNetwork c) VMware vCompute d) Application services

Last Answer : VMware vNetwork

Description :  _________ as a Service is a cloud computing infrastructure that creates a development environment upon which applications may be build. A. Infrastructure B. Service C. Platform D. All of the mentioned

Last Answer : C. Platform 

Description : ____ software creates a mirror image of the entire hard disk, including the operating system, applications, files and data. a) Operating system b) Backup software c) Utility programs d) Driver imaging e) None of these

Last Answer : b) Backup software

Description : A digital code attached to an electronic message to provide it unique identity is called ………… -Technology

Last Answer : A digital code attached to an electronic message to provide it unique identity is calleddigital signature.

Description : A digital signature is required (i) to tie an electronic message to the sender's identity (ii)for non repudiation of communication by a sender (iii) to prove that a message was sent by the sender in a court of law (iv) in all ... a. i and ii b. i, ii, iii c. i, ii, iii, iv d. ii, iii, iv

Last Answer : b. i, ii, iii

Description : A dynamo is a device which – (1) creates mechanical energy (2) creates electrical energy (3) converts mechanical energy into electrical energy (4) converts electrical energy into mechanical energy

Last Answer : (3) converts mechanical energy into electrical energy Explanation: A dynamo is an electrical generator that produces direct current with the use of a commutator. Dynamos were the first electrical ... based, including the electric motor, the alternating-current alternator, and the rotary converter.

Description : A dynamo is a device which – (1) creates mechanical energy (2) creates electrical energy (3) converts mechanical energy into electrical energy (4) converts electrical energy into mechanical energy

Last Answer : (3) converts mechanical energy into electrical energy Explanation: A dynamo is an electrical generator that produces direct current with the use of a commutator. Dynamos were the first electrical ... based, including the electric motor, the alternating-current alternator, and the rotary converter.

Description : A dynamo is a device which (1) creates mechanical energy (2) creates electrical energy (3) converts mechanical energy into electrical energy (4) converts electrical energy into mechanical energy

Last Answer :  converts mechanical energy into electrical energy

Description : Why do you have more than one social media and/or email identity?

Last Answer : answer: Sometimes I wonder if my use of social media consumes too much of my energy. Yes! Pull the plug. You don't need that many accounts. Me? I have four eMail accounts: work, personal, professional, ... no Instagram, Pintrest, Google+, Tumblr, etc. At the moment, I have no need for any of them.

Description : The legal term for brand is _________ 1. Trademark 2. Name 3. Identity of Product 4. Symbol of Product 5. None of these

Last Answer : Trademark

Description : _________ is one of the more expensive and complex areas of network computing. a) Multi-Factor Authentication b) Fault tolerance c) Identity protection d) All of the mentioned

Last Answer : Identity protection

Description : The _________ Open Source Identity Framework uses an i-Card metaphor. A. Hughes B. Higgins C. Hinges D. XACML

Last Answer : Higgins

Description : Language Translators can be divided into three major categories.They are _________ A. Compiler, Operating System and Assembler B. Compiler, Device Driver and Assembler C. Compiler, Interpreter and System Utility D. Compiler, Interpreter and Assembler

Last Answer : D. Compiler, Interpreter and Assembler

Description : _________ is the time from the start of one storage device access to the time when the next access can be started. A. Mode B. Access time C. capacity D. None of the Above

Last Answer : B. Access time

Description : _________ is a device which recognises physical or behavioural traits of the individual. A. Smart Card Reader B. Optical Character Reader(OCR) C. Optical Mark Reader(OCR) D. Biometric Sensor

Last Answer : D. Biometric Sensor

Description : In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is _________ a. Application layer b. Transport layer c. Link layer d. Session layer

Last Answer : d. Session layer

Description : In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is _________ a. Application layer b. Transport layer c. Link layer d. Session layer

Last Answer : d. Session layer

Description : In OSI model, when data is sent from device A to device B, the 5th layer to receive data at B is _________ a) Application layer b) Transport layer c) Link layer d) Session layer

Last Answer : d) Session layer

Description : A person who creates software is called a: a) Programmer b) Software Engineer c) Software Developer d) All of the Above e) None of These

Last Answer : d) All of the Above

Description : Compiling creates a(n)- 1) Program Specification 2) Algorithm 3) Executable Program 4) Subroutine

Last Answer : 3) Executable Program

Description : The collection of links throughout the Internet creates an interconnected network called the - 1) WWW 2) Web 3) World Wide Web 4) All of the above

Last Answer : 4) All of the above

Description : The collection of links throughout the Internet creates an interconnected network called the - 1 WWW 2 Web 3 World Wide Web 4 All of the above

Last Answer : 4 All of the above

Description : What is the word that goes with the email message "....destroy it if it's not meant for you" See detail.

Last Answer : « Privé « ?

Description : How can I send email to a cell phone as a text message if I don't know the phone's carrier?

Last Answer : answer:The go-to service for this used to be Teleflip, but they’ve gone belly up. You can try to find a similar resource on this website: http://www.freetextsms.net/

Description : What is the etiquette on the amount time to respond to an email, text message or twitter?

Last Answer : answer:They're different for each medium. While you could get back to an email in 1-2 days easily, texts and tweets are people looking for a quick response or reply. So essentially those would be easily ... urgency of the email. Sometimes I'll reply right away, or sometimes I'll wait a few days.

Description : Would you consider it extrememly rude if you send a personal email to a family member, and they invariable "delete without reading, " knowing full well you'll get that message at your end?

Last Answer : You find out that people deleted your email without reading? How is this? I haven’t heard of this before. What email client are you using? I hope Andrew doesn’t know about this technology or else he’ll realize how many mod emails I’ve been deleting without reading.

Description : If i send an email as a text message to iphone, I know the receipent will see my address. Will my email address or name appear on their paper or online bill?

Last Answer : If you’re in the UK then no as incoming calls, texts and emails are not logged. As for anywhere else, can’t help I’m afraid, sorry!

Description : How do I stop a constant incoming email error message from filling up my inbox?

Last Answer : Generally you want to set up a server-side rule to delete such messages. You would need to create that rule and give it specific criteria that would identify that particular message only and not ... steps will vary by platform and vendor and client. But it should be possible in all instances.

Description : How do you remove the instant message in yahoo when you open your email?

Last Answer : check your settings page. And if you do find out, let me know, because mine does that too, and its so annoying.

Description : Can you send someone a text message via email?

Last Answer : btw, I don’t know what kind of phone/plan they have

Description : Does anyone know of a way to set up automatic text message reminders to others? (either from email or cell phone)

Last Answer : If you use Microsoft Outlook you can delay sent messages by using the options button under view. I’m not sure how to set up continuous delayed messages though. I need to do some research.

Description : Why is it sometimes important not to leave out the message thread i.e. the previous messages in the email chain plus?

Last Answer : Feel Free to Answer

Description : Who receive email message is called?

Last Answer : Need answer

Description : Can I send a text message to a cell phone from my email account?

Last Answer : Yes, you can send a text from your email. The address for the text will probably be the phone number followed by the "@" symbol, and then the internet extension specific to the carrier of the ... is Verizon). You should check the website of the carrier to get the correct format for the address.

Description : Components of an email message?

Last Answer : Subject. Sender (From). Date and time received (On). Reply-to. Recipient (To:) Recipient email address. Attachments.

Description : Components of an email message?

Last Answer : Subject. Sender (From). Date and time received (On). Reply-to. Recipient (To:) Recipient email address. Attachments.