01. SMTP is a simple:
02. A simple protocol is used for fetching email from a mailbox is__
03. In SMTP the message can be any length.
04. A protocol used for fetching email from mailbox is POP1 .
05. A popular application of computer networking is the world wide web of Newsgroup called?
06. Email address is made up of__?
07. The program supplied by VSNL when you ask for internet connection for email access is__
08. UUCP is UNIX to UNIX File Copy Protocol.
09. SMTP id stand for?
10. All incoming email message are to be stored in the outbox folder.
11. The Email component of Internet Explorer is called
12. Messenger Mailbox is present in__?
13. A convenient place to store contact information for quick retrieval is__?
14. Which of the following statement is not correct for digital signature?
15. Netscape Messenger is the email client packaged with Netscape Communicator 4.0
16. Which of the following is not a protocol for email?
17. Mail-header is offset from mail body by a line of asteriks.
18. Recipient's log in name must form a part of his email address.
19. Email messages are usually addressed and delivered to only one or two people.
20. The two main file formats for images on the web are GIF and TIFF.
21. SMTP is associated with electronic mail
22. Email is limited to text based messages.
23. The two part of email address is seperated by the @ symbol.
24. Bounced mail are returned to the sender.
25. A security attack in which someone inside a company is tricked into running a computer program that sends information from the person's computer to the outsider is known as Trojan Horse.
26. In any good communication system, the message should be safe and secure.
27. PCs connected with internet can also e used for education, entertainment, etc.
28. A listserv delivers communications from a large group of people right to your mailbox.
29. The process of directing a message to the recipient's host is called routing.
30. A simple protocol used for fetching email from a remote mailbox is POP3.
31. Messenger allows you to store email addresses in its address book.
32. A features of using e-commerce is that consumers can make purchases directly from the businesses on internet, saving time for both parties.
33. E-commerce is not suitable for ?
34. Amazon.com comes under the which model?
35. The web pages of your website cannot be connected by hyperlinks.
36. The power of hypertext is its simplicity and transparency.
37. Software that may be used to help you to locate web pages on topics that you do not know the addresses for is called search engines.
38. Identify the odd one out___?
39. Which one is related to internet security?
40. Firewall cannot protect against viruses.
41. In order to transfer message in a computer network, we use the techniques called packet switching.
42. With a valid url a browser can go directly to the page without passing through other documents.
43. Which of the following topology shares a single channel, on which all stations can receive and transmit?
44. A network that can function without a server is a __?
45. CSMA/CD access method is used in bus based network.
46. WAN is based on ethernet.
47. Local area network uses bounded medium.
48. A fiber-optic cable can conduct laser light.
49. LAN can span large geographic distances.
50. The term gateway is commonly used to define a facility, which interconnects two networks so that users on one network can communicate with users on another network of a different type.
0 Comments