Bit Asg

  • October 2019
  • PDF

This document was uploaded by user and they confirmed that they have the permission to share it. If you are author or own the copyright of this book, please report to us by using this DMCA report form. Report DMCA


Overview

Download & View Bit Asg as PDF for free.

More details

  • Words: 517
  • Pages: 2
1 marks: 1 value added services in the context of the internet refers to choose at least one answer. a. values used in internet addressing. b. services which are charged for. c. high level services which run on top of the basic protocols. d. services such as smtp, ftp and nntp. e. web services. 2 marks: 1 which of the following situations require(s) a high bandwidth internet connection? choose at least one answer. a. to read email b. to have a video conference c. to have an audio conference d. to surf the internet e. to send instant messages 3 marks: 1 ssl is choose at least one answer. a. a mechanism to encrypt messages between start and destination points of a web request. b. a mechanism to ensure that the person signing on to a service is actually him or herself. c. an abbreviation for secure service level. d. an email protocol. e. a dialect of xml. 4 marks: 1 when replying to an email it is better, choose at least one answer. a. to keep the entire text of the received email in the reply. b. not to keep any text of the received email in the reply. c. to keep only the relevant text used for the reply from the received email. d. to change the subject of the email. e. to reply using capital letters. 5 marks: 1 which of the following information is/are contained in a typical digital certificate? choose at least one answer. a. owner�s private key b. owner�s public key c. details of the issuer d. digital signature of the owner e. the validity period 6 marks: 1 what is/are true for secret key cryptography? choose at least one answer.

b. c. d. e.

a. it uses the same key to encrypt and decrypt the data it uses different keys to encrypt and decrypt the data the owners have to keep both keys secure the owner can publish one key it enables digital signatures

7 marks: 1 to download an image file from a ftp server one should set the data transfer as, choose at least one answer. a. ascii. b. binary. c. ascii and binary. d. ascii or binary. e. text. 8 marks: 1 you can download a file from an ftp server without creating a connection to it. answer: true false 9 marks: 1 storyboarding is: choose at least one answer. a. the art of writing stories for elearning. b. a part of instructional design employed to plan online lessons. c. a method of conducting online collaboration. d. an open source software development platform. e. an effective method of ecommerce for virtual bookstores. 10 marks: 1 there are tv programs now on the internet. which of the following statements is/are true about them? choose at least one answer. a. all tv stations have an internet tv service. b. all internet tv stations have a traditional tv service. c. not all tv stations have an internet tv service. d. not all internet tv stations have a traditional tv service. e. internet tv is not a type of streaming media.

Related Documents

Bit Asg
October 2019 12
Bit
October 2019 36
Bit
June 2020 26
Bit
July 2020 17
Bit
June 2020 19
Bit
May 2020 17