Fill This Form To Receive Instant Help

Help in Homework
trustpilot ratings
google ratings


Homework answers / question archive / Saudi Electronic University IT 210 1)HTTP uses the services of_______________

Saudi Electronic University IT 210 1)HTTP uses the services of_______________

Computer Science

Saudi Electronic University

IT 210

1)HTTP uses the services of_______________.

A) UDP

B) IP C) TCP

D) DNS

 

2 In HTTP, the first line in a request message is called a   line; the first line in the response message is called the  line.

A) request; response B) status; response C) status; status

D) None of the choices are correct

 

3 In a     connection, one TCP connection is made for each request/response. A) persistent

B)            nonpersistent

C)            persistent or a nonpersistent

D)           None of the choices are correct

 

4 In a     connection, the server leaves the connection open for more requests after sending a response.

A)           persistent

B)            nonpersistent

C)            persistent or nonpersistent

D)           None of the choices are correct

 

5 In HTTP,            server is a computer that keeps copies of responses to recent requests.

A) a regular B) a proxy

C) an auxiliary D) a remote

                 

 

6 An HTTP request message always contains       . A) a header line and a body

B)            a request line and a header line

C)            a request line, a header line, and a body

D)           a request line, a header line, a blank line, and a body

 

7 Which of the following is present in both an HTTP request line and a status line? A) Version number

B)            URL

C)            Status code D) Method

 

8 FTP uses the services of            . A) UDP

B) IP C) TCP

D) None of the choices are correct

 

9 In FTP,               well-known port(s) is (are) used. A) one

B) two C) three D) four

 

10 During an FTP session the control connection is opened           . A) once

B)            twice

C)            many times

D)           None of the choices are correct

 

11 During an FTP session the data connection may be opened    . A) only once

B)            only two times

C)            as many times as needed

D)           None of the choices are correct

 

 

12 In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called                .

A)           file types

 

B)            data structures

C)            transmission modes

D)           None of the choices are correct

 

13 In FTP, there are three types of           : stream, block, and compressed. A) file types

B)            data types

C)            transmission modes

D)           None of the choices are correct

 

14 An FTP, ASCII, EBCDIC, and image define an attribute called   . A) file type

B)            data structure

C)            transmission mode

D)           None of the choices are correct

 

15 In FTP, when we         , it is copied from the client to the server. A) retrieve a file

B) store a file C) open a file

D) None of the choices are correct

 

16 In the common scenario, the electronic mail system needs    . A) two UAs, two MTAs, and one MAA

B)            two UAs, two MTAs, and two MAAs

C)            two UAs, two pairs of MTAs, and a pair of MAAs

D)           two UAs, two pairs of MTAs, and two pairs of MAAs

 

                 

 

17           provides service to the user to make the process of sending or receiving a message easier.

A) An MTA B) An MAA C) A UA

D) None of the choices are correct

 

18 An e-mail message contains the          and the . A) header; envelop

B) header; body C) envelop; body

D) None of the choices are correct

 

19 In the Internet, an e-mail address consists of two parts: a       and a     . A) local part; domain name

B) global part; domain name C) label; domain name

D) local part; label

 

20           is a supplementary protocol that allows non-ASCII data to be sent through e- mail.

A)           SMPT B) MPEG C) MIME D) POP

 

21 The formal protocol that defines the MTA client and server in the Internet is called

                . A) SMTP

B)            SNMP C) TELNET D) SSH

 

                 

 

22 SMTP is a       protocol. A) pull

B)            push

C)            push and pull

D)           None of the choices are correct

 

23 The message access protocol is a        protocol. A) pull

B)            push

C)            push and pull

D)           None of the choices are correct

 

24 In the              encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits.

A)   8bit B) binary

C)            base64

D)           quoted-printable

 

25 In the              encoding scheme, a non-ASCII character is sent as 3 characters. A) 8bit

B)            base64

C)            quoted-printable D) binary

 

26 TELNET is an abbreviation for                . A) terminal network

B)            telephone network

C)            telecommunication network

D)           None of the choices are correct

 

27 When a user logs into a local time-sharing system, it is called login. A) local

B)            remote

C)            local or remote

D)           None of the choices are correct

 

 

28 When a user wants to access an application program or utility located on a remote machine, he or she performs                login.

A)   local B) remote

C)            local or remote

D)           None of the choices are correct

 

29 Network Virtual Terminal (NVT) uses two sets of characters, one for and one for

                .

A) sending; receiving B) request; reply

C)            data; control

D)           None of the choices are correct

 

30 For data, NVT uses US ASCII characters with the highest order bit set to           . A) 1

B) 0

C) 1 or 0

D) None of the choices are correct

 

31 For control, NVT uses US ASCII characters with the highest order bit set to     .

 

A) 1 B) 0

C) 1 or 0

D) None of the choices are correct

 

32 The   translates local characters into NVT characters. A) terminal driver

B) TELNET client C) TELNET server

D) pseudoterminal driver

 

                 

 

33 The   translates NVT characters into a form acceptable by the remote operating system.

A) terminal driver B) TELNET client C) TELNET server

D) pseudoterminal driver

 

34 The   component in the SSH provides confidentiality, integrity, authentication, and compression.

A) SSH Application B) SSH-AUTH

C) SSH-CONN D) SSH-TRAN

 

35 Port forwarding is      .

A) a protocol used to forward messages from one port to another port B) a procedure for changing an ephemeral port to a well-known port

C)            a service, provided by SSH, that creates a secure channel for applications that do not have security services

D)           None of the choices are correct

 

36 In a (an)          name space, a name is a sequence of characters without structure. A) linear

B)            flat

C)            hierarchical D) organized

 

37 In a (an)          name space, each name is made of several parts. A) linear

B)            flat

 

C)            hierarchical D) organized

 

                 

 

38 In the DNS, the names are defined in               structure. A) a linear list

B)            an inverted-tree

C)            a three-dimensional

D)           None of the choices are correct

 

39 The root of the DNS tree is    . A) a string of 127 characters

B) a string of 63 characters C) a string of 15 characters D) an empty string

 

40 In the domain name space, a full domain name is a sequence of labels separated by

                . A) colons

B) semicolons C) dots

D) commas

 

41 In the domain name space, if a label is terminated by a null string, it is called a

                . A)  PQDN B)  CQDN C) SQDN

D) None of the choices are correct

 

42 In the domain name space, if a label is not terminated by a null string, it is called a

                . A)  FQDN B)  PQDN C) SQDN

D) None of the choices are correct

 

                 

 

43 In the domain name space, a                is a subtree of the domain name space. A) label

B)  name C) domain

D) None of the choices are correct

 

44 In the domain name space, what a server is responsible for or has authority over is called a    .

A) domain B)   label C) zone

D) None of the choices are correct

 

45 A       server is a computer whose zone system consists of the whole tree. A) domain

B) zone C) root

D) primary

 

46 A       _ server is a computer that stores a file about the zone for which it has an authority.

A)           primary

B)            secondary C) zone

D) root

 

47 A       server is a computer that transfers the complete information about a zone from another server.

A)           primary

B)            secondary C) zone

D) root

 

                 

 

48 In the Internet, the country domain section uses        country abbreviations. A) two-character

B) three-character C) four-character

D) None of the choices are correct

 

49 In      resolution, the resolver expects the server to supply the final answer. A) iterative

B) recursive C) straight

D) None of the choices are correct

 

50 In      resolution, the server returns the IP address of the server that it thinks can resolve the query.

A) iterative B) recursive C) straight

D) None of the choices are correct

 

51 DNS can use the services of   . A) UDP

B)            TCP

C)            either UDP or TCP

D)           None of the choices are correct

 

Option 1

Low Cost Option
Download this past answer in few clicks

8.83 USD

PURCHASE SOLUTION

Already member?


Option 2

Custom new solution created by our subject matter experts

GET A QUOTE