adplus-dvertising
frame-decoration

Question

In the architecture of e-mail, we can have

a.

2 Scenarios

b.

3 Scenarios

c.

4 Scenarios

d.

6 Scenarios

Posted under Networking

Answer: (d).6 Scenarios

Engage with the Community - Add Your Comment

Confused About the Answer? Ask for Details Here.

Know the Explanation? Add it Here.

Q. In the architecture of e-mail, we can have

Similar Questions

Discover Related MCQs

Q. In File Transfer Protocol (FTP), a user needs an account (user name) and a password on the

Q. In EMAIL, We need two VAs and two pairs of MTAs, When the sender is connected to the mail server via

Q. Mail access starts with the client when the user needs to download e-mail from the

Q. TELNET is a general-purpose

Q. Example of command-driven user agents are

Q. When the sender and the receiver of an e-mail are on the same system, we need only two

Q. The command of End-of-File in the UNIX operating system is

Q. Most TELNET implementations operate in one of the modes

Q. An Email can have fields like, a number, a sender, size of the message and

Q. Examples of GUI based user agents are Eudora, netscape and

Q. In electronic mail, the MTA transfers the mail across the Internet via

Q. The well-known port used for FTP's control connection is

Q. MTA stands for

Q. FTP copies a file from

Q. For transmission FTP requires

Q. The three modes of TELNET implementations are default mode, character mode and

Q. When the sender and the receiver of an e-mail are on different systems, we need two VAs and a pair of

Q. When the sender and the receiver of an e-mail are on the same system, we need only

Q. In File Transfer Protocol (FTP), the data connection is opened and then closed for each

Q. Post Office Protocol, version 3 (POP3), has two modes, Delete Mode and