Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Florida Gulf Coast University GEB 3250 Chapter 20 Quiz 1)A_is part of a local hard drive, a special file with permission restrictions

Florida Gulf Coast University GEB 3250 Chapter 20 Quiz 1)A_is part of a local hard drive, a special file with permission restrictions

Computer Science

Florida Gulf Coast University

GEB 3250

Chapter 20 Quiz

1)A_is part of a local hard drive, a special file with permission restrictions.

  1. message
  2. response
  3. an agent
  4. none of the above
  1. )When the sender and the receiver of an email are on the same system, we need only

                             .

  1. one UA
  2. two UAs
  3. one UA and one MTA
  4. none of the above
  1. )When the sender and the receiver of an email are on different systems, we need only

                                 _.

  1. one MTA
  2. two UAs
  3. two UAs and one pair of MTAs
  4. none of the above
  1. )When the sender is connected to the mail server via a LAN or a WAN, we need only

                                       .

  1. two MTA
  2. two UAs and two pairs of MTAs
  3. two UAs and a pair of MTAs
  4. none of the above
  1. )When both sender and receiver are connected to a mail server via a LAN or a WAN, we need

 

 
   
 

 

  1. two UAs, two pairs of MTAs, and a pair of MAAs
  2. two UAs, and two pairs of MTAs
  3. two UAs, two pairs of MTAs, and two pairs of MAAs
  4. none of the above
  1. )                       provides service to the user to make the process of sending and receiving a message easier.
  1. An MTA
  2. An MAA
  3. A UA
  4. none of the above

 

  1. )Which of the following services is not provided by a UA?
  1. composing messages
  2. reading messages
  3. replying messages
  4. all are
  1. )There are two types of user agents:                                  and                                .
  1. command-driven; data-driven
  2. command-driven and GUI-based
  3. command-based and data-based
  4. none of the above
  1. )The                         usually contains the sender address, the receiver address, and other information.
  1. message
  2. envelope
  3. both a and b
  4. none of the above
  1. )The message contains the                             and the                             .
  1. header; envelop
  2. header; body
  3. envelop; body
  4. none of the above
  1. )In the Internet, the email address consists of two parts: a                                   and a                      .
  1. local part; domain name
  2. global part; domain name
  3. label; domain name
  4. none of the above
  1. )                         is a supplementary protocol that allows non-ASCII data to be sent through email.
  1. JPEG
  2. MPEG
  3. MIME
  4. none of the above
  1. )The actual mail transfer is done through                                              .
  1. UAs
  2. MTAs
  3. MAAs
  4. none of the above
  1. )The formal protocol that defines the MTA client and server in the Internet is called

                             .

  1. SMTP
  2. SNMP
  3. TELNET
  4. none of the above
  1. )The process of transferring a mail message occurs in                                      phases.
  1. two
  2. four

 

  1. five
  2. none of the above
  1. )SMTP is a                                 protocol.
  1. pull
  2. push
  3. both a and b
  4. none of the above
  1. )The third stage in an email transfer needs a                                   protocol.
  1. pull
  2. push
  3. both a and b
  4. none of the above
  1. )The third stage in an email transfer uses a(n)                                    protocol.
  1. UA
  2. MTA
  3. MAA
  4. none of the above
  1. )Currently two message access protocols are available:                                   and                          .
  1. POP3; IMAP2
  2. POP4; IMAP1
  3. POP3; IMAP4
  4. none of the above
  1. )Which part of the mail created by the UA contains the sender and receiver names?
  1. envelope
  2. address
  3. header
  4. none of the above
  1. )In the                       encoding scheme, 24 bits become 4 characters, and eventually are sent as 32 bits.
  1. 8bit
  2. binary
  3. base64
  4. none of the above
  1. )In the                       encoding scheme, a non-ASCII character is sent as 3 characters.
  1. 8bit
  2. base64
  3. quoted-printable
  4. none of the above
  1. )This command identifies the recipient of the mail.
  1. HELO
  2. MAIL FROM
  3. RCPT TO
  4. none of the above
  1. )This command identifies the sender of the message.
  1. HELO
  2. MAIL FROM

 

  1. RCPT TO
  2. none of the above
  1. )The MIME                          header uses text to describe the type of data in the body of the message.
  1. content-type
  2. content-transfer- encoding
  3. content-description
  4. none of the above
  1. )                    is more powerful and complex than                            .
  1. POP3; IMAP4
  2. IMAP4; POP3
  3. SMTP; POP3
  4. none of the above

 

 

 

 

 

 

Option 1

Low Cost Option
Download this past answer in few clicks

5.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE