Skip to main content

Healthcare Systems Article Category

Medical Factors Which make it The most effective  just by Sejal Kakadiya  Medicine and health agencies with now consentrate on top quality, charge together with great satisfaction health of their solutions. These are typically that support beams which a lot of these agencies redefine the direction they trade. The following really results in thrilled clients.  How come Serious Treatment Direction Can be a Trend Inside Medicine and health Sector  just by Steven Orange  A whole lot of North american healthcare systems' options are generally about that direction together with procedure with serious circumstances. Direction with serious health conditions which include diabetes, excessive circulation demand, cardiovascular disease, together with hypothyroidism can be a vital component of easiest treatment healthcare provider's succeed. Inside standard product, that general practitioner spots someone on an automobile accident with treatment, inspects that condition ...

Solved MCQ on Application Layer in OSI/TCP/IP Model set-2


1) In MIME header field, ............. is a world unique value identifying the content of this part of this message.

A. content-type

B. content-transfer-encoding

C. content-description

D. content-id


2) The Post Office Protocol, version 3, is a standard protocol with STD number 53 and it is described in .....

A. RFC 1939

B. RFC 0937

C. RFC 2821

D. RFC 2822


3) .............. is an electronic mail protocol with both client and server functions.

A. SMTP

B. MIME

C. POP

D. TCP


4) In authentication state of POP3 server, ............ is used to specify a mechanism by which both authentication and data protection can be provided.

A. USER

B. PASS

C. APOP

D. AUTH


5) In transaction state of POP3 commands, .......... retrieve the number of messages and total size of the messages.

A. STAT

B. LIST

C. RETR

D. DELE


6) A MIME compliant message must contain a header field with the ........ verbatim text.

A. MIME-version:1.0

B. MIME-version:1.1

C. MIME-version:2.0

D. MIME-version:2.1


7) In ......... name space, a name is assigned to an address. It is a sequence of characters without structure.

A. hierarchical

B. sequential

C. flat

D. addressed


8) The main disadvantage of a ......... name space is that it cannot be used in a large system such as the internet because it may be centrally controlled to avoid ambiguity and duplication.

A. hierarchical

B. sequential

C. flat

D. addressed


9) The ......... protocol defines a set of messages sent over either User Datagram Protocol(UDP) port53 or Transmission Control Protocol(TCP) port53.

A. Name space

B. DNS

C. Domain space

D. Zone transfer


10) Primary specifications for DNS are defined in which of the following Request for Comments(RFCs)?

A. 974

B. 1034

C. 1035

D. All of the above


11) Which of the following is/are the components of DNS defined by RFC 1034?

A. The domain namespace and resource records

B. Name servers

C. Resolvers

D. All of the above


12) ............ are records in the DNS database that can be used to configure the DNS database server or to contain information of different types of process client queries.

A. Domain namespace

B. Resource records

C. Name servers

D. Resolvers


13) ........... store resource records and information about the domain tree structure and attempt to resolve received client queries.

A. Domain namespace

B. DNS Names

C. Name servers

D. Resolvers


14) ............ are programs that run on DNS clients and DNS servers and that create queries to extract information from name servers.

A. Domain namespace

B. Resource records

C. Name servers

D. Resolvers


15) ........... have a very specific structure, which identifies the location of the name in the DNS namespace.

A. Domain namespace

B. DNS Names

C. Name servers

D. Resolvers


16) A ................... is a DNS domain name that has been constructed from its location relative to the root of the namespace is known as the root domain.

A. Fully Qualified Domain Name(FQDN)

B. Fully Structured Domain Name(FSDN)

C. Fully Constructed Domain Name(FCDN)

D. Fully Rooted Domain Name(FRDN)


17) State whether the following statements are True or False for the attributes of Fully Qualified Domain Name(FQDN).

i) FQDN are case-sensitive

ii) A period character separates each name.

iii) The entire FQDN can not be no more than 255 characters long.

A. i-True, ii-True, iii-False

B. i-True, ii-False, iii-True

C. i-False, ii-True, iii-True

D. i-False, ii-True, iii-False


18) A ...... is a contiguous portion of a domain of the DNS namespace whose database records exist and managed in a particular DNS database file stored on one or multiple DNS servers.

A. Subdomain

B. Zone

C. Sub DNS

D. Sub zone


19) In a/an ........... of DNS resolver, the queried name server is requested to respond with the requested data or with an error stating that data of the requested type or the specified domain name does not exist.

A. Recursive queries

B. Iterative queries

c. Reverse queries

D. Inverse queries


20) In MIME header field, ......... is a plain text description of the object within the body, which is useful when the object is not human-readable.

A. content-type

B. content-transfer-encoding

C. content-description

D.content-id

                                                                                                                                                                                                                Answers:

1) D. content-id
2) A. RFC 1939
3) C. POP
4) D. AUTH
5) A. STAT
6) A. MIME-version:1.0
7) C. flat
8) C. flat
9) B. DNS
10) D. All of the above
11) D. All of the above
12) B. Resource records
13) C. Name servers
14) D. Resolvers
15) B. DNS Names
16) A. Fully Qualified Domain Name(FQDN)
17) C. i-False, ii-True, iii-True
18) B. Zone 
19) A. Recursive queries
20) C. content-description


Related Posts:

For more MCQ's on Computer Networks: Click Here

Comments

Popular posts from this blog

Solved MCQ of Computer Security set -1

1. In computer security, ……………………. means that computer system assets can be modified only by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 2. In computer security, …………………….. means that the information in a computer system only be accessible for reading by authorized parities. A) Confidentiality B) Integrity C) Availability D) Authenticity 3. The type of threats on the security of a computer system or network are …………………….. i) Interruption                   ii) Interception                  iii) Modification iv) Creation                         v) Fabrication A) i, ii, iii and iv only B) ii, iii, iv and v only C) i, ii, iii and v only D) All i, ii, iii, iv and v 4. Whi...

Solved MCQ for IT Officer Exam Part-2

SWIFT Logo (Photo credit: Wikipedia ) 1. SWIFT stands for: A) Society for Worldwide Interbank Financial Telecommunication B) Society for Worldwide International Financial Telecommunication C) Society for Worldwide Interbank Financial Transmission D) Society for Worldwide Interbank Financial Transfer 2. Which one is the correct statement? A) XML is a technology used only on the internet. B) XML is a programming language. C) XML is highly suitable data exchange between two different systems. D) XML is scripting language. 3. Decision support systems usually A) serve managers interested in weekly, monthly and yearly results, not day-to-day activities. B) help managers make decisions that are unique, rapidly changing and not easily specified in advance. C) provide managers with a generalized computing and telecommunications capacity that can be applied to a changing array of problems. D) perform and record the daily routine transactions necessary to the conduct of business. 4. Identifying...

Solved MCQ on Fundamental of C Language set-7

1) 'C' allows a three way transfer of control with the help of A. Unary Operator B. Relational Operator C. Ternary Operator D. Comparison Operator 2) Operators have hierarchy. It is used to know which operator .... A. is most important B. is used first C. is faster D. operators on large numbers 3) The statement that transfers control to the beginning of the loop is called .. A. break statement B. exit statement C. continue statement D. goto statement 4) C programming language was developed by .. A. Dennis Ritche B. Ken Thompson C. Bill Gates D. Peter Norton 5) The value that follows the keyword CASE may only be A. constants B. variable C. number D. semicolon 6) In a C language 'a' represents ... A. a digit B. an integer C. a character D. a word 7) The statement which is used to terminate the control from the loop is A. break B. continue C. goto D. exit 8) The continue command cannot be used with .... A. for B. switch C. do D. while 9) A self contained block of statement...