81. | Internet mail places each object in |
a. | Separate messages for each object |
b. | One message |
c. | Varies with number of objects |
d. | one of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).One message
|
82. | Typically the TCP port used by SMTP is |
a. | 25 |
b. | 35 |
c. | 50 |
d. | 15 |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).25
|
83. | A session may include |
a. | Zero or more SMTP transactions |
b. | Exactly one SMTP transactions |
c. | Always more than one SMTP transactions |
d. | Number of SMTP transactions cant be determined |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).Zero or more SMTP transactions
|
84. | Example of user agents for e-mail |
a. | Microsoft Outlook |
b. | Apple Mail |
c. | Gmail |
d. | All of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).All of the above
|
85. | When the sender and the receiver of an email are on different systems, we need only ______ . |
a. | One MTA |
b. | Two UAs |
c. | Two UAs and one pair of MTAs |
d. | Two UAs and two pairs of MTAs |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (d).Two UAs and two pairs of MTAs
|
86. | TELNET is an abbreviation for ____________. |
a. | terminal network |
b. | telephone network |
c. | telecommunication network |
d. | none of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).terminal network
|
87. | TELNET is a ________ client-server application program. |
a. | specific-purpose |
b. | general-purpose |
c. | both a and b |
d. | none of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).general-purpose
|
88. | When a user logs into a local time-sharing system, it is called ________ login. |
a. | local |
b. | remote |
c. | temporary |
d. | none of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (a).local
|
89. | When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login. |
a. | local |
b. | remote |
c. | temporary |
d. | none of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (b).remote
|
90. | NVT uses two sets of characters, one for _____and one for __________. |
a. | sending; receiving |
b. | request; reply |
c. | data; control |
d. | none of the above |
View Answer Report Discuss Too Difficult! Search Google |
Answer: (c).data; control
|