Question: 1. Match the 2 column (protocols) with the corresponding 1 column Application NameProtocol a. The Web b. File Transfer c. Remote Login d. E-mail e.
1. Match the 2 column (protocols) with the corresponding 1 column Application NameProtocol a. The Web b. File Transfer c. Remote Login d. E-mail e. BitTorrent File Sharing SMTP Telnet BitTorrent HTTP FTP 2. The process which initiates the communication is the the process that waits to be contacted is the a. Receiver; Sender b. Server; Client c. Client; Server d. Sender; Receiver 3. TCP provides a. Reliable data transfer b. A guarantee that a certain value for throughput will be maintained c. A guarantee that data will be delivered within a specified amount of time d. Confideniality 4 protocol uses handshaking at the application layer a. HTTP b. SMTP c. UDP d. TCP protocol requires that all application data be received in the correct order and without gaps. 5. A a. HTTP b. SMTP c. TCP d. UDP technique reduces the communication traffic on links. a. Cookies b. Web Caching c. HTTP d. UDP 7. With the UDP server, there is no welcoming socket, and all data from "n clients enters the server through socket/s a. n b. n+ 1 d. n*n 8. With the TCP server, there is a welcoming socket, and all data from n clients enters the server through socket/s a. n b.n+ 1 d. n*n 9. HTTP does not provide any encryption servic es a. TRUE b. FALSE 10. Which 3 protocols can be used to retrieve mails from server? a. HTTP b. FTP c. IMAP d. POP e. TCP f. DNS
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
