@puchun said: What is the standard IANA port number used for requesting web pages? a. 80 b. 53 c. 21 d. 25
port 80, i guess..its default for HTTP..
puchun
(pb banerjee)
March 12, 2013, 6:50am
3523
Which of the following commands of vi editor deletes the current line: a) dd b) yy c) d d) p 2. Which of the following vi commands is used to replace the character under the cursor: a) P b) R c) r d) a
@puchun said: Which of the following commands of vi editor deletes the current line: a) dd b) yy c) d d) p 2. Which of the following vi commands is used to replace the character under the cursor: a) P b) R c) r d) a
1. dd
2.'a' i think.. not sure..
P.S. I dont think unix will come in ibps it officer scale 1 paper..warna achche achcho ko pareshani ho jayegi ..
@puchun said:
@AnkitChoudhary1
: yaar iska nahi pata ans. 4 hoga.. as ip addresses are like 123.12.12.09.. so 4 blocks of addresses..
puchun
(pb banerjee)
March 12, 2013, 7:00am
3528
Which of the following wireless technologies provides the most security? Bluetooth Wireless Encryption Protocol (WEP) Wi-Fi Protected Access (WPA) Microwave communications
puchun
(pb banerjee)
March 12, 2013, 7:01am
3529
@AnkitChoudhary1 : yar iska batado. Which of the following are logical database structures a) Segments b) Data files c) Data blocks d) Control files
navneet252
(Navneet Singh)
March 12, 2013, 7:01am
3530
Hello Everyone,
Has anybody got the same examination centre ???
INTERNATIONAL COLLEGE OF ENGINEERING NEW EDUCATION HUB DIDOLI GANG NAHAR ROAD MURADNAGAR GHAZIABAD UTTAR PRADESH-20100
If yes then message me so we can pool in to go to the centre as this centre seems faraway from Delhi.
anyone has same centre as mine??
MANGALORE INSTITUTE OF TECHNOLOGY,
MOODBIDRI,
KARNATAKA
??
puchun
(pb banerjee)
March 12, 2013, 7:20am
3537
To avoid SQL Injection attack use a) Static SQL b) Dynamic SQL with bind arguments c) Validate and sanitize input. d) All
puchun
(pb banerjee)
March 12, 2013, 7:25am
3538
What is the purpose of an Intrusion Detection System (IDS)?
a) To prevent unauthorized access to network resources.
b) To prevent users from accessing network resources.
c) To detect Intrusions on the network.
d) To detect Security flaws
@puchun said: Which of the following wireless technologies provides the most security? Bluetooth Wireless Encryption Protocol (WEP) Wi-Fi Protected Access (WPA) Microwave communications
microwave communication cant be.. i just know wpa is more secure than wep..so i will go for wpa..