Chapter 2

अब Quizwiz के साथ अपने होमवर्क और परीक्षाओं को एस करें!

static

A _______ document is a fixed-content document that is created and stored in a server. The client can get a copy of the document only.

dynamic

A _______ document is created by a Web server whenever a browser requests the document.

root

A _______ server is a computer whose zone system consists of the whole tree.

primary

A ________ server is a computer that stores a file about the zone for which it has an authority.

secondary

A ________ server is a computer that transfers the complete information about a zone from another server.

ICANN

A registrar, a commercial entity accredited by ________ is responsible for adding new domains to DNS data base

a request line and a header line

An HTTP request message always contains _______.

header; body

An e-mail message contains the ________ and the __________.

structured-decentralized

BitTorrent is an example of a ____________ peer-to-peer network

either UDP or TCP

DNS can use the services of ________.

once

During an FTP session the control connection is opened _______.

as many times as needed

During an FTP session the data connection may be opened _______.

TCP

FTP uses the services of ________.

1

For control, NVT uses US ASCII characters with the highest order bit set to ______.

0

For data, NVT uses US ASCII characters with the highest order bit set to ______.

active

For many applications, we need a program or a script to be run at the client site. These are called _______________ documents.

unstructured-decentralized

Gnutella is an example of a ____________ peer-to-peer network

TCP

HTTP uses the services of _________.

file type

In FTP, ASCII, EBCDIC, and image define an attribute called _______.

two

In FTP, _________ well-known port(s) is (are) used.

data structures

In FTP, a file can be organized into records, pages, or a stream of bytes. These are types of an attribute called _______.

transmission modes

In FTP, there are three types of _______: stream, block, and compressed.

store a file

In FTP, when we _______, it is copied from the client to the server.

a proxy

In HTTP, _______ server is a computer that keeps copies of responses to recent requests.

request line; status line (none of the above on test)

In HTTP, the first line in a request message is called a _______ line; the first line in the response message is called the ________ line.

do not include the node itself

In Kademlia, each node in the network divides the binary tree into m subtrees that _______

none of the above

In Kademlia, the distance between the two identifiers (nodes or keys) are measured as the bitwise-___________ between them.

Kademlia

In ________, nodes and data items are m-bit identifiers that create an identifier space of 2m points distributed at the leaves of a binary tree

Pastry

In __________ a key is stored in a node whose identifier is numerically closest to the key.

recursive

In __________ resolution, the resolver expects the server to supply the final answer.

iterative

In __________ resolution, the server returns the IP address of the server that it thinks can resolve the query.

has a partial knowledge about the whole network.

In a DHT-based network, each peer

flat

In a _______ name space, a name is a sequence of characters without structure.

hierarchical

In a _________ name space, each name is made of several parts.

nonpersistent

In a ___________ connection, one TCP connection is made for each request/response.

persistent

In a ___________ connection, the server leaves the connection open for more requests after sending a response.

client-server; peer-to-peer

In a centralized P2P network, the directory system uses the ________ paradigm; the storing and downloading of the files are done using the __________ paradigm.

the server must be running all the time but the client needs to be running only when it is needed

In a client-server paradigm ____________________________.

server; client

In a client-server paradigm, a _______ program provides services to a (another) _______ program.

a pre-defined set of rules is used to link nodes so that a query can be effectively and efficiently resolved

In a structured-decentralized P2P network, ________________.

an inverted-tree

In the DNS, the names are defined in ___________ structure.

local part; domain name

In the Internet, an e-mail address consists of two parts: a _______ and a _______.

two-character

In the Internet, the country domain section uses ___________ country abbreviations.

quoted-printable

In the _______ encoding scheme, a non-ASCII character is sent as 3 characters.

base64

In the _______ encoding scheme, each 24 bits become four 6-bit chunks, and eventually are sent as 32 bits.

two UAs, two pairs of MTAs and a pair of MAAs

In the common scenario, the electronic mail system needs _________________________.

domain

In the domain name space, a _________ is a subtree of the domain name space.

dots

In the domain name space, a full domain name is a sequence of labels separated by ________.

PQDN

In the domain name space, if a label is not terminated by a null string, it is called a __________.

FQDN (none of the above on test)

In the domain name space, if a label is terminated by a null string, it is called a __________.

zone

In the domain name space, what a server is responsible for or has authority over is called a _________.

centralized

Napster is an example of a ____________ peer-to-peer network

data; control

Network Virtual Terminal (NVT) uses two sets of characters, one for _____ and one for __________.

a service (provided by SSH, that creates a secure channel for applications that do not have security services.)

Port forwarding in SSH is ____________________________.

push

SMTP is a __________ protocol.

terminal network

TELNET is an abbreviation for ____________.

TELNET server

The _______ translates NVT characters into a form acceptable by the remote operating system.

TELNET client

The _______ translates local characters into NVT characters.

SSH-TRAN

The _________ component in the SSH provides confidentiality, integrity, authentication and compression.

none of the above

The finger table is the routing table used in ______________.

protocol

The first section of a URL identifier is the __________.

SMTP

The formal protocol that defines the MTA client and server in the Internet is called ___________.

pull

The message access protocol is a ________ protocol.

a string of 15 characters

The root of the DNS tree is _______.

Pastry

To resolve a query, _________ uses two entities: a routing table and a leaf set

Kademlia

Trackerless BitTorrent uses __________ DHT to do the job of tracking.

local

When a user logs into a local time-sharing system, it is called ________ login.

remote

When a user wants to access an application program or utility located on a remote machine, he or she performs ___________ login.

Fix node

Which of the following is not a Chord interface.

version number

Which of the following is present in both an HTTP request line and a status line?

MIME

________ is a supplementary protocol that allows non-ASCII data to be sent through e-mail.

A UA

________ provides service to the user to make the process of sending or receiving a message easier.

XSL, HTML, XML

_____________ is a language for creating a static document.


संबंधित स्टडी सेट्स

Mental Health Unit 3: Schizophrenia-3

View Set

NURS 224 - Exam 1 - Chapters 5, 16, 23

View Set

Guided Reading Mod 5 Spinal Cord/Column

View Set

Chapter 2 Smart Book: The Challenge of Cultural RelativismAssignment

View Set