Choose a topic to test your knowledge and improve your MCA skills
Voice privacy in GSM cellular telephone protocol is provided by _______
ElGamal encryption system is _______
Cryptographic hash function takes an arbitrary block of data and returns _________
In the network HTTP resources are located by ______
FTP server listens for connection on which port number?
In FTP protocol, a client contacts a server using ______ as the transport protocol.
Which methods are commonly used in Server Socket class?
Which constructor of Datagram Socket class is used to create a datagram socket and binds it with the given Port Number?
The client in socket programming must know which information?
TCP, FTP, Telnet, SMTP, POP etc. are examples of _______
What does the java.net.InetAddress class represent?
Which classes are used for connection-less socket programming?
In Inet Address class, which method returns the host name of the IP Address?
Cookies were originally designed for _______
The Cookie manipulation is done using which property?
Which of the following explains Cookies nature?
Which attribute is used to extend the lifetime of a cookie?
Which of the following defines the Cookie visibility?
Which of the following can be used to configure the scope of the Cookie visibility?
How can you set a Cookie visibility scope to local Storage?
Which of the following is a Boolean cookie attribute?
Which of the following function is used as a consequence of not including semicolons, Commas or whitespace in the Cookie value?
What is the constraint on the data per cookie?
What does REST stand for?
Which of the following protocol is used by Restful web services as a medium of communication between client and server?
Which of the following is not a good practice to create a standard URI for a web service?
Which of the following HTTP methods should be idempotent in nature?
Which of the following directive of Cache Control Header of HTTP response indicates that resource is cachable by only client and server?
Which of the following HTTP Status code means CREATED, when a resource is successful created using POST or PUT request?
Which of the following annotation of JAX RS API is used to annotate a method used to create resource?
Which of the following annotation of JAX RS API binds the parameter passed to method to a HTTP matrix parameter in path?
The term that is used to place packet in its route to its destination is called ______
A second technique to reduce routing table and simplify searching process is called _______
Next-Hop Method is used to reduce contents of a _________
Several techniques can make size of routing table manageable and also handle issues such as ______
Host-specific routing is used for purposes such as checking route or providing _____
. In Unicast routing, if instability is between three nodes, stability cannot be _______
In Unicast Routing, Dijkstra algorithm creates a shortest path tree from a ________
In Multicast Routing Protocol, flooding is used to broadcast packets but it creates ________
RPF stands for ______
LSP stands for ______
IPSec is designed to provide security at the _________
Network layer firewall works as a ________
Network layer firewall has two sub-categories called ____________
Open Shortest Path First (OSPF) is also called as _______
The computation of the shortest path in OSPF is usually done by ______
Which of the following is false with respect to the features of OSPF?
In OSPF, which protocol is used to discover neighbour routers automatically?
Which of the following is not a type of OSPF packet?
In OSPF header, which field is used to detect errors in the packet?