Trusted by Students Everywhere
Why Choose Us?
0% AI Guarantee

Human-written only.

24/7 Support

Anytime, anywhere.

Plagiarism Free

100% Original.

Expert Tutors

Masters & PhDs.

100% Confidential

Your privacy matters.

On-Time Delivery

Never miss a deadline.

Florida Gulf Coast University GEB 3250 Chapter 18 Quiz 1)TELNET is an abbreviation for______

Computer Science Jul 03, 2021

Florida Gulf Coast University

GEB 3250

Chapter 18 Quiz

1)TELNET is an abbreviation for______.

  1. terminal network
  2. telephone network
  3. telecommunication network
  4. none of the above
  1. )TELNET is a                                client-server application program.
  1. specific-purpose
  2. general-purpose
  3. both a and b
  4. none of the above
  1. )When a user logs into a local time-sharing system, it is called                                         login.
  1. local
  2. remote
  3. temporary
  4. none of the above
  1. )When a user wants to access an application program or utility located on a remote machine, he or she

performs                                  login.

  1. local
  2. remote
  3. temporary
  4. none of the above
  1. )NVT uses two sets of characters, one for                        and one for                              .
  1. sending; receiving
  2. request; reply
  3. data; control
  4. none of the above
  1. )For data, NVT uses US ASCII characters with the highest order bit set to                                        .
  1. 1
  2. 0
  3. a or b
  4. none of the above
  1. )For control, NVT uses US ASCII characters with the highest order bit set to                                         .
  1. 1
  2. 0
  3. a or b
  4. none of the above
  1. )TELNET uses only one TCP connection. The server uses                                          port and the client uses                

port.

 

  1. a well-known; another well-known
  2. an ephemeral; another ephemeral
  3. a well-known; an ephemeral
  4. none of the above
  1. )To distinguish data from control characters, each sequence of control characters is preceded by a

special control character called                                .

  1. ICA
  2. IAC
  3. AIC
  4. none of the above
  1. )To make control characters effective in special situations, TELNET uses                                        

signaling.

  1. out-of-band
  2. in-band
  3. either a or b
  4. none of the above
  1. )In the                       mode, the echoing is done by the client.
  1. default
  2. character
  3. line
  4. none of the above
  1. )In the                       mode, each character typed is sent by the client to the server.
  1. default
  2. character
  3. line
  4. none of the above
  1. )In the               mode, line editing (echoing, character erasing, line erasing, and so on) is done by the

client.

  1. default
  2. character
  3. line
  4. none of the above
  1. )The                      is software residing on the remote system that allows the remote system to receive

characters from a TELNET server.

  1. terminal driver
  2. pseudoterminal driver
  3. TELNET client
  4. none of the above
  1. )The                      translates local characters into NVT form.
  1. terminal driver
  2. TELNET client
  3. TELNET server
  4. none of the above

 

  1. )The                      translates NVT characters into a form acceptable by the remote operating system.
  1. terminal driver
  2. TELNET client
  3. TELNET server
  4. none of the above
  1. )If the sender wants to disable an option, it sends a                                command.
  1. WILL
  2. DO
  3. WONT
  4. none of the above
  1. )If the sender wants to enable an option, it sends a                               command.
  1. WILL
  2. DO
  3. WONT
  4. none of the above
  1. )If the sender wants an option disabled by the receiver, it sends a                                   command.
  1. WILL
  2. DO
  3. DONT
  4. none of the above
  1. )If the sender wants an option enabled by the receiver, it sends a                                  command.
  1. WILL
  2. DO
  3. WONT
  4. none of the above

 

 

 

 

 

 

 

Archived Solution
Unlocked Solution

You have full access to this solution. To save a copy with all formatting and attachments, use the button below.

Already a member? Sign In
Important Note: This solution is from our archive and has been purchased by others. Submitting it as-is may trigger plagiarism detection. Use it for reference only.

For ready-to-submit work, please order a fresh solution below.

Or get 100% fresh solution
Get Custom Quote
Secure Payment