Description : XMPP uses ________ architecture. A. Decentralized client-server B. Centralized client-server C. Message D. Public/subscriber
Last Answer : A. Decentralized client-server
Description : Point out the wrong statement. a) All IM clients use peer-to-peer messaging b) IM software aimed at businesses such as XMPP, Lotus Sametime, and Microsoft Office Communicator use a client/server ... messaging is as popular in business as it is in personal communications d) None of the mentioned
Last Answer : None of the mentioned
Description : _____ is a bi-directional, fully duplex communication model that uses a persistent connection between client and server. A. Request-Response B. Publish-Subscriber C. Push-Pull D. Exclusive Pair
Last Answer : D. Exclusive Pair
Description : An organizational system in which responsibility and authority are delegated to lower levels of sales management is called 1. decentralized organization 2. centralized organization 3. both 1 & 2 4. regional organization 5. none of these
Last Answer : decentralized organization
Description : MQTT is: A. Based on client-server architecture B. Based on publish-subscribe architecture C. Based on both of the above D. Based on none of the above
Last Answer : B. Based on publish-subscribe architecture
Description : When you publish a message ________ is automatically created? a) Client b) Server c) Batch d) Server
Last Answer : Batch
Description : XMPP creates _________ identity. A. Device B. Email C. Message D. Data
Last Answer : A. Device
Description : What is Client Server Architecture ?
Last Answer : Client Server Architecture There is always a host called Server. This server serves many other hosts , called clients. The client host does not need to be on all the time. A notable feature of ... server at any time. Notable examples of client server architecture are web , e-mail rematch login etc.
Description : MQTT is: a. Based on client-server architecture b. Based on publish-subscribe architecture c. Based on both of the above d. Based on none of the above
Last Answer : b. Based on publish-subscribe architecture
Description : ____ is a data-centric middleware standard for device-to-device and machine-to-machine communication. A. Data Distribution Serviced (DDS) B. Advance Message Queuing Protocol (AMQP) C. Extensible Messaging and Presence Protocol (XMPP) D. Message Queue Telemetry Transport (MQTT)
Last Answer : A. Data Distribution Serviced (DDS)
Description : ___ is a stateful communication model and server is aware of all open connection. A. Request-Response B. Publish-Subscriber C. Push-Pull D. Exclusive Pair
Description : ________ method publishes messages to pub/sub. a) Client() b) Publish() c) Server() d) Batch()
Last Answer : Publish()
Description : Publishing messages is handled through ________ Class. a) Client() b) Server() c) Publish() d) Batch()
Last Answer : Client()
Description : A client-server system uses a satellite network, with the satellite at a height of 40,000 kms. What is the best-case delay in response to a request? (Note that the speed of light in air is 3,00,000 km/second). (A) 133.33 m sec (B) 266.67 m sec (C) 400.00 m sec (D) 533.33 m sec
Last Answer : (D) 533.33 m sec Explanation: The request has to go up and down, and the response has to go up and down. The total path length traversed is thus 160.000 km. The speed of light in air and vacuum is 300,000 km/sec, so the propagation delay alone is 160,000/300,000 sec or about 533 msec.
Description : XMPP is used for streaming which type of elements? A. XPL B. XML C. XHL D. MPL
Last Answer : B. XML
Description : An organizational design with low departmentalization, wide spans of control, authority centralized in a single person and little formalization are characteristics of ________. (a) Simple structure ; (b) Functional structure ; (c) Divisional structure ; (d) None of given option
Last Answer : (a) Simple structure ;
Description : What is decentralized decision making?
Last Answer : Need answer
Description : The purpose of Directive Principles of State Policy is to - (1) lay down positive instructions which would guide State Policy at all levels (2) implement Gandhiji's idea for a decentralized state ... of arbitrary powers by the government (4) promote welfare of the backward sections of the society
Last Answer : (1) lay down positive instructions which would guide State Policy at all levels Explanation: The purpose of Directive Principle of State Policy is to lay down positive instructions which would guide ... in accordance with which the legislative and executive powers of the state are to be exercised.
Description : The most important or powerful computer in a typical network is _____ 1) Desktop 2) Network client 3) Network server 4) Network station 5) None of these
Last Answer : Answer :3
Description : The most important or powerful device in computer in a typical network is: a) desktop b) network client c) network server d) network station e) None of The Above
Last Answer : c) network server
Description : _______ is a form of denial of service attack in which a hostile client repeatedly sends SYN packets to every port on the server using fake IP addresses. a) Cybergaming crime b) Memory shaving c) Syn flooding d) Software piracy e) None of these
Last Answer : a) Cybergaming crime
Description : _____ is the most important/powerful computer in a typical network a) Desktop b) Network client c) Network server d) Network station e) None of these
Last Answer : c) Network server
Description : Which of the following Operating Systems do you choose to implement a client Server Network 1) MS DOS 2) Windows 7 3) Windows XP 4) Windows 2003
Last Answer : 4) Windows 2003
Description : Which of the following systems run an application layer firewall using proxy software? 1) Proxy NAT 2) Proxy client 3) Client 32 4) Proxy server
Last Answer : 4) Proxy server
Description : The.... controls a client computer's resources. 1) Application program 2) Instruction set 3) Operating System 4) Server application
Last Answer : 4) Server application
Description : Which of the following Operating Systems do you choose to implement a client Server Network 1 MS DOS 2 Windows 7 3 Windows XP 4 Windows 2003
Last Answer : 4 Windows 2003
Description : Which of the following systems run an application layer firewall using proxy software? 1 Proxy NAT 2 Proxy client 3 Client 32 4 Proxy server
Last Answer : 4 Proxy server
Description : The.... controls a client computer's resources. 1 Application program 2 Instruction set 3 Operating System 4 Server application
Last Answer : 4 Server application
Description : State whether the following statement are true. i) An application-level gateway is often referred to as a proxy. ii) In proxy, a direct connection is established between the client and destination server. A) True, False B) False, True C) True, True D) False, False
Last Answer : A) True, False
Description : While initiating SSL session, the client code recognizes the SSL request and establishes a connection through TCP Part.................to the SSL code on the server. A) 420 B) 1032 C) 443 D) 322
Last Answer : C) 443
Description : ............. is a set of information that is exchanged between a client and web browser and a web server during an HTTP transaction. A) infoset B) clientinfo C) cookie D) transkie
Last Answer : C) cookie
Description : SIM means: a) Speed In Mobile b) Special Identity Module c) Subscriber Identity Module d) None of These
Last Answer : c) Subscriber Identity Module
Description : Point out the correct statement. a) Service Oriented Architecture (SOA) describes a standard method for requesting services from distributed components and managing the results b) SOA provides the ... written in different languages and can use multiple messaging protocols d) All of the mentioned
Last Answer : All of the mentioned
Description : The expansion of SOA is __________________. A. Software oriented architecture. B. System oriented architecture. C. Server oriented architecture. D. Service oriented architecture
Last Answer : Service oriented architecture
Description : The building blocks of Google’s App Engine architecture comprises of a) GFS, MapReduce, Chubby, BigTable b) GFS, Scheduler, Chubby, BigTable c) GFS, MapReduce, Chunk Server, BigTable d) Scheduler, MapReduce, Chubby, Chunk Server
Last Answer : GFS, MapReduce, Chubby, BigTable
Description : Which of the following is a violation of the code of professional ethics for certified public accountants? a. A CPA permits his/her name to be used in a client's advertising as having ... the professional designation "CPA" after his name on posters employed in connection with his election campaign
Last Answer : Based on information obtained in an audit, a CPA reports an illegal act of his client to government authorities.
Description : A device that connects to a network without the use of cables is said to be: a) Distributed b) Free c) Centralized d) Open Source e) None of The Above
Last Answer : e) None of The Above
Description : Which of the following protocol is not an Internet Engineering Task Force standard? a) SIP b) SIMPLE c) XMPP d) IMPS
Last Answer : IMPS
Description : Which of the following protocol is adopted for interoperability by top three IM service providers?a) SIP b) SIMPLE c) XMPP d) IMPS
Last Answer : SIMPLE
Description : Point out the correct statement. a) Every third-party IM clients aim to allow their users to connect to the different major IM services b) SIP stands for Secure Initiation Protocol c) XMPP stands for Extensible Messaging and Presence Protocol d) All of the mentioned
Last Answer : XMPP stands for Extensible Messaging and Presence Protocol
Description : Which protocol has a quality of service? A. XMPP B. HTTP C. CoAP D. MQTT
Last Answer : A. XMPP
Description : Which of the following describes a message-passing taxonomy for a component- based architecture that provides services to clients upon demand? a) SOA b) EBS c) GEC d) All of the mentioned
Last Answer : SOA
Description : Public key encryption method is a system a. which uses a set of public keys one for each participant in e-Commerce b. in which each person who wants to communicate has two keys; a private key known to him ... him. c. which uses the RSA coding system. d. which is a standard for use in e-Commerce.
Last Answer : b. in which each person who wants to communicate has two keys; a private key known to him only and a public key which is publicized to enable others to send message to him.
Description : An agent is composed of ________ a) Architecture b) Agent Function c) Perception Sequence d) Architecture and Program
Last Answer : d) Architecture and Program