22B+1D
23B+1D
24B+1D
25B+1D
51 octets
53 octets
55 octets
None of the options
two transfer mode
control connection to remote computer before file can be transferred
User Datagram Protocol (UDP)
authorization of a user through login and password verification
IP addresses
URL
Domain
File name
Copyright law
Patent law
Data protection law
Privacy law
to support email messages containing text and video
to support email messages containing text, audio and video
to support email messages containing audio and video
to support text-based email messages
Extensible markup language
Extreme Memory language
Extensible Memory line
Extra markup language
an extra fast computer network
the intranets of two co-operating organizations interconnected via a secure leased line
an extra network used by an organization for higher reliability
an extra connection to internet
i), ii), iii)
i), ii), iii), iv)
i), ii), iii), iv), v)
i), ii), iii), v)
ii), iii), iv), v)
i), iii), iv)
When following piece of code is executed, what output will be generated?
Network
N
Garbage value
Compilation error
heap
Data segment
Code segment
stack
.vml
.vrm
.wrm
.wrl
Court
Government
Company
Owner
Abbreviation for Transmission Control Protocol and Internet Protocol
A suite of networking protocols
A standard protocol that lets disparate types of computers communicate over the Net
All the above
SLIP
SMTP
SGML
RTF
A Computer virus
A Browser
A program that catalogs web sites
A hacker community
Telnet
TCP/IP
FTP
Point-to-Point protocol (PPP)
HTML
CGI
JAVA
All of the above
Ethernet
FDDI
File Transfer protocol
Gopher