Home

Which of the following filed represents the sender of the message in an electronic mail?

A. To

B. From

C. Cc

D. Reply-to

You can do it
  1. Which of the following is a media type that is most susceptible to interference?
  2. Which of these is a feature of hubs?
  3. What is the maximum length of thinnet cable before a signal booster is needed?
  4. Which of the following SIP request terminates a call?
  5. Which of the following can be used to transfer files from a Unix server?
  6. Which of the following can translate between dissimilar protocols and network types?
  7. This mapping of name to IP address is done by .
  8. 17. Which of the following use default routes for inter-domain routing?
  9. You have a network card with only one connector, which looks like a place to plug an oversized phone…
  10. ----------------is a static algorithm in which every incoming packet is sent out on every outgoing line…
  11. Which of the following is the port used by SMTP?
  12. Which of the following use default routes for inter domain routing?
  13. Data Transmission is not a layer in the OSI model
  14. UDP datagram has a header, which is of ________.
  15. Your network has gotten a single class C address but has 300 computers. How can you connect them to…
  16. E-mail is an example of mode of communication where one party can send a note to another person and…
  17. TCP protocol is responsible for logical addressing and delivery of packets.
  18. The Hamming Distance for the codes generated using either even or odd parity will be------------------
  19. Which type of BGP message is sent by a system to notify another router of the senders existence?
  20. 25 is used by SMTP
  21. In FTP, to execute a file transfer, the user begins by _________.
  22. Which of the following can be used to transfer files from a Unix server?
  23. Following are the advantages of tree topologyi) Point-to-point wiring for individual segments.ii) Supported…
  24. ADSL uses high-speed Internet service phone lines
  25. In the symmetric-key method of cryptography, which key is publicly known?
  26. The idea of sharing one network address among the multiple physical networks can be done using the following…
  27. 80 is the well-known port number for the HTTP service.
  28. What is the range of multicast addressing?
  29. Which class of IP addressing was not brought in much use?
  30. Which of the following address supports 254 hosts on each of 2 million networks?