A directory of Objective Type Questions covering all the Computer Science subjects. Here you can access and discuss Multiple choice questions and answers for various compitative exams and interviews.

81. Internet mail places each object in
a. Separate messages for each object
b. One message
c. Varies with number of objects
d. one of the above
View Answer Report Discuss Too Difficult! Search Google
Answer: (b).One message

82. Typically the TCP port used by SMTP is
a. 25
b. 35
c. 50
d. 15
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).25

83. A session may include
a. Zero or more SMTP transactions
b. Exactly one SMTP transactions
c. Always more than one SMTP transactions
d. Number of SMTP transactions cant be determined
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).Zero or more SMTP transactions

84. Example of user agents for e-mail
a. Microsoft Outlook
b. Apple Mail
c. Gmail
d. All of the above
View Answer Report Discuss Too Difficult! Search Google
Answer: (d).All of the above

85. When the sender and the receiver of an email are on different systems, we need only ______ .
a. One MTA
b. Two UAs
c. Two UAs and one pair of MTAs
d. Two UAs and two pairs of MTAs
View Answer Report Discuss Too Difficult! Search Google
Answer: (d).Two UAs and two pairs of MTAs

86. TELNET is an abbreviation for ____________.
a. terminal network
b. telephone network
c. telecommunication network
d. none of the above
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).terminal network

87. TELNET is a ________ client-server application program.
a. specific-purpose
b. general-purpose
c. both a and b
d. none of the above
View Answer Report Discuss Too Difficult! Search Google
Answer: (b).general-purpose

88. When a user logs into a local time-sharing system, it is called ________ login.
a. local
b. remote
c. temporary
d. none of the above
View Answer Report Discuss Too Difficult! Search Google
Answer: (a).local

89. When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.
a. local
b. remote
c. temporary
d. none of the above
View Answer Report Discuss Too Difficult! Search Google
Answer: (b).remote

90. NVT uses two sets of characters, one for _____and one for __________.
a. sending; receiving
b. request; reply
c. data; control
d. none of the above
View Answer Report Discuss Too Difficult! Search Google
Answer: (c).data; control