Lost your password? Please enter your email address. You will receive a link and will create a new password via email.
Please briefly explain why you feel this question should be reported.
Please briefly explain why you feel this answer should be reported.
Please briefly explain why you feel this user should be reported.
Which of the following can be used to configure the scope of the Cookie visibility?
D. server
D. server
See lessWhich of the following defines the Cookie visibility?
D. all of the mentioned
D. all of the mentioned
See lessWhich attribute is used to extend the lifetime of a cookie?
C. max-age
C. max-age
See lessWhich of the following explains Cookies nature?
D. transient
D. transient
See lessThe Cookie manipulation is done using which property?
A. cookie
A. cookie
See lessWhat does the java.net.InetAddress class represent?
B. ip address
B. ip address
See lessTCP, FTP, Telnet, SMTP, POP etc. are examples of ___________
C. protocol
C. protocol
See lessTCP, FTP, Telnet, SMTP, POP etc. are examples of __________
C. protocol
C. protocol
See lessThe client in socket programming must know which information?
C. both ip address of server & port number
C. both ip address of server & port number
See lessWhich methods are commonly used in Server Socket class?
B. public socket accept ()
B. public socket accept ()
See less