Q. Which among the following is a malware program that replicates itself in order to spread to other computers?
Computer worm
Q. The act of creating mis leading website for the purpose of online identity theft is
Spoofing
Q. Which of the following is not required to operate wifi
Ans : Transponder
Q. The activity of creating tracks and sectors on a hard disk is called
Ans : Formatting
Q. The indian computer emergency response team
Computer worm
Q. The act of creating mis leading website for the purpose of online identity theft is
Spoofing
Q. Which of the following is not required to operate wifi
Ans : Transponder
Q. The activity of creating tracks and sectors on a hard disk is called
Ans : Formatting
Q. The indian computer emergency response team
Indian Computer Emergency Response Team (CERT-In) is the Government organisation under Ministry of Communications and Information Technology.It is a nodal agency that deals with cyber security threats like hacking and phishing. It strengthens security-related defence of the Indian Internet domain.
Q. What is the function of control unit in the CPU ?
The control unit (CU) is a component of a computer's central processing unit (CPU) that directs operation of the processor. It tells the computer's memory, arithmetic/logic unit and input and output devices how to respond to a program's instructions.
Q. Gnu Privacy Guard ( GPG ) is
Ans: A cryptographic Software which provides for key based asymmetric cryptography used for encryption and authentication
Q. Which of the following protocol is used for email transmission across internet ?
Ans : SMTP
[Email Protocols: IMAP, POP3, SMTP and HTTP
Basicaly, a protocol is about a standard method used at each end of a communication channel, in order to properly transmit information. In order to deal with your email you must use a mail client to access a mail server. The mail client and mail server can exchange information with each other using a variety of protocols.
IMAP Protocol:
IMAP (Internet Message Access Protocol) – Is a standard protocol for accessing e-mail from your local server. IMAP is a client/server protocol in which e-mail is received and held for you by your Internet server. As this requires only a small data transfer this works well even over a slow connection such as a modem. Only if you request to read a specific email message will it be downloaded from the server. You can also create and manipulate folders or mailboxes on the server, delete messages etc.
POP3 Protocol:
The POP (Post Office Protocol 3) protocol provides a simple, standardized way for users to access mailboxes and download messages to their computers.
When using the POP protocol all your eMail messages will be downloaded from the mail server to your local computer. You can choose to leave copies of your eMails on the server as well. The advantage is that once your messages are downloaded you can cut the internet connection and read your eMail at your leisure without incuring further communication costs. On the other hand you might have transferred a lot of message (including spam or viruses) in which you are not at all interested at this point.
SMTP Protocol:
The SMTP (Simple Mail Transfer Protocol) protocol is used by the Mail Transfer Agent (MTA) to deliver your eMail to the recipient's mail server. The SMTP protocol can only be used to send emails, not to receive them. Depending on your network / ISP settings, you may only be able to use the SMTP protocol under certain conditions (see incoming and outgoing mail servers
HTTP Protocol:
The HTTP protocol is not a protocol dedicated for email communications, but it can be used for accessing your mailbox. Also called web based email, this protocol can be used to compose or retrieve emails from an your account. Hotmail is a good example of using HTTP as an email protocol. ]
No comments:
Post a Comment